text
stringlengths
198
630k
id
stringlengths
47
47
metadata
dict
Fireplaces can be warm, cozy and romantic, but they can also destroy your home, your belongings, and your family! Consider these tips and rules to ensure safe enjoyment of your fireplace. FIREPLACE SAFETY TIPS - Have your fireplace and chimney serviced annually by a certified chimney sweep. - Burn only hard woods such as oak or hickory. Soft woods like pine, lumber scraps, etc., do not burn as hot, leaving soot and combustibles on the chimney lining. This can cause a chimney fire. - Never use a flammable or combustible liquid to start or accelerate a fire. - Make sure a screen or glass door covers the opening. Sparks will shoot out of the fire box and cause a fire. - Be totally certain that the fireplace assembly is in good structural condition. No voids, cracks, or openings in the chimney can be accepted. - Clean ashes out of firebox prior to use, making sure there are no hidden embers. - Dispose of cold ashes in the proper manner. - Be sure the damper is operating the way it is supposed to operate. - When installing/replacing the doors on the front of a pre-fabricated fireplace, check that the proper doors listed for that fire place are used. Numerous fires have occurred from installing improper doors, causing an excess of heat build-up and resulting in a fire in the wall behind and above the fireplace. - Most important - BE CAREFUL! FIREPLACE SAFETY RULES Having a fireplace can be a source of enjoyment, atmosphere, and extra heat. Building a safe fire requires attention to some details. - Before you start your fire, make sure the room is well ventilated. The fireplace damper must be open. To build the fire, place two logs on the grate or on the iron legs several inches apart. Lay tinder or crumpled scrap paper between them. Place a handful of thin or spilt softwood kindling atop the paper. Place sticks about 2 inches in diameter over the base, cris-crossing them to provide air spaces and draft between. Light the tinder or paper with a long match or paper. - When the sticks are burning, add a third, larger log. Add new logs as needed. Rake coals and ashes to the front of the grate or fireplace after each use. The ash should be allowed to accumulate to a depth of one or two inches, because it concentrates the heat and directs the draft up to the base of the fire. If a screen or door is attached to the fireplace, make sure it is closed. If there is no enclosure, a sturdy, fine mesh screen in front of the fireplace will help catch any flying brands or sparks. A fire extinguisher should be stored nearby. - Avoid building fires entirely of soft woods because they burn too quickly. Combining hardwoods such as birch, oak, or maple with the softwoods will make the fire easily ignitable and long-lasting. - If you use synthetic logs, read and follow the directions on the label. Plastics, scrap lumber, cardboard, or other refuse should never be burned. - To extinguish the fire, use fire tongs to stand partially burned logs on end in the corners of the fireplace. Never close the damper while the wood is smoldering or burning. Keep the screen pulled or the doors closed until the fire is out.
<urn:uuid:d14d6fb8-877d-4d9e-ba05-32e02e26d464>
{ "date": "2014-09-15T03:31:46", "dump": "CC-MAIN-2014-41", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657102753.15/warc/CC-MAIN-20140914011142-00024-ip-10-196-40-205.us-west-1.compute.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.8951910138130188, "score": 2.796875, "token_count": 721, "url": "http://www.gurnee.il.us/fire/prevention/fireplace" }
Ecosystems and global food production are more vulnerable to climate change than previously thought. This is according to the climate report published by the United Nations Intergovernmental Panel on Climate Change (IPCC) on 31 March 2014. Global warming is inevitable, science states. Measures to limit climate change and to adapt world food production to the new climatological circumstances are absolutely necessary. According to the IPCC report, the negative effects of climate change are considerably greater than the positive ones. Measures to ensure that sufficient food and other agrarian raw materials will be cultivated in a sustainable manner even in changing climatological circumstances are collectively termed ‘Climate-Smart Agriculture’. This type of agriculture will also focus on mitigation, i.e. limiting greenhouse emissions that are causing global climate. Downloads Climate-Smart Agriculture Impact of climate change on ecosystems Ecosystems will change completely as the weather warms up, researchers predict. And it seems temperature increases will cause those changes to take place more rapidly than was thought possible several years ago. Rik Leemans, Professor in Environmental System Analysis at Wageningen University, is one of the review editors of part two of the IPCC report: “The present report contains a variation on the diagram I introduced into the IPCC report 10 years ago. Then, my diagram had three colours to show how much pressure there was on various species. A temperature increase of 1½ to 2 degrees would mean many species would be included in the 'yellow' category. A global temperature increase of 2°C would mean the 'red' category; around a quarter of all species would be threatened with extinction. The diagram now included in the report shows the colour red for an increase of just 1°C. And another category, 'purple', has been added.” Wageningen student worked on IPCC report A student at Wageningen University, Lena Schulte-Uebbing, helped scientists who were writing the chapter on Africa for the climate report. "As a Bachelor’s student I was doing an internship for four months in the Technical Support Unit of Stanford University, which was providing assistance to climate researchers. When they asked me if I would like to remain involved, I jumped at the opportunity. So, in addition to my Master’s programme, I worked as a ‘chapter scientist’, providing assistance to the authors who were writing the chapter on Africa. Two of them were American and the rest were researchers from various African countries. I worked in the Netherlands and did, for example, literature assessments, reference checking and formatting of illustrations. In addition, I attended three lead-author meetings in which all the scientists working on that second part of the IPCC report came together." Schulte-Uebbing’s work for the IPCC has now come to an end. She recently joined Rik Leemans’ group as a PhD candidate.
<urn:uuid:dfa0c084-8836-45c3-9c96-aa1aa1396bec>
{ "date": "2019-10-14T21:54:58", "dump": "CC-MAIN-2019-43", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986655310.17/warc/CC-MAIN-20191014200522-20191014224022-00456.warc.gz", "int_score": 4, "language": "en", "language_score": 0.9617916345596313, "score": 3.609375, "token_count": 595, "url": "https://www.wur.nl/nl/nieuws/Climate-change-necessitates-modified-food-production-systems.htm" }
The web site includes all information for K-12 teachers interested in attending one of the 2010 National Endowment for the Humanities teachers' workshops, to be held in Philadelphia June 27-July 2, or July 5-10. Apply for the workshop by clicking here. Monday, February 22, 2010 Sunday, February 21, 2010 “The venerable John Quincy Adams is no more,” quoting the Daily American Star. President James Polk’s announcement was quoted in full, followed by remarks delivered to Congress by House Speaker Winthrop. “As a contemporary of the illustrious Washington, and almost a co-worker in laying the foundation of his country’s freedom and greatness, the name John Quincy Adams will be remembered in all future time as one of the illustrious sons of the American Republic,” stated the Polynesian. “In the year 1830, shortly after he retired from the Presidency, he descended, neither ungracefully, nor without advantage to the nation to a seat in the House of Representatives and had, up to the moment of his death, wielded an influence unequaled by any other member of that body, securing also for himself a greater share of attention and respect.” In Jaunary 1849, Rev. Samuel C. Damon, editor and founder of The Friend, a Honolulu monthly newspaper, reflected that, “Nations have been overturned, families broken up, and multitudes in public and private life passed away. Most have gone, leaving no footprints on the shore of time which the hurrying tide of life will not soon efface. Not so with one memorable individual. John Quincy Adams will be remembered so long as one is found to appreciate the genuine patriotism and love true liberty.” Adams was a prolific writer almost to his death on the floor of the House of Representatives. Thanks to a matching grant from the Save America's Treasures program to the Massachusetts Historical Society, anyone with online capabilities can view images of the 51 volumes of John Quincy Adams's diary in the Adams Family Papers at the Massachusetts Historical Society. Adams began keeping his diary, more than 14,000 pages, in 1779 at the age of twelve and continued until shortly before his death in 1848. For one of the best biographies about the sixth President of the United States -and the only one to return to the House of Representatives- we highly recommend Mr. Adams’'s Last Crusade: John Quincy Adams’'s Extraordinary Post-Presidential Life in Congress by Joseph Wheelan. Thursday, February 18, 2010 In the early days of philately, rumors circulated about a cache of very rare and valuable Hawaiian missionary stamps secreted away in New England. Were the Grinnell stamps this legendary hoard and therefore, one the greatest philatelic finds of the 20th century? Or were they expensive fakes? Museums and the Web 2010 (MW2010) has scheduled its international conference for culture and heritage on-line for April 13-17, 2010 in Denver, Colorado, USA: Best of the Web Nominations Close February 21, 2010 Once again at MW2010 we'll be recognising the best work by museums on the web. Help us to find it! Suggest a site for consideration by the MW2010 Best of the Web Panel. Nominations close Feb. 21 -- that's this Sunday. Keynote Speaker Announced We're delighted that Brad Feld has agreed to give the MW2010 opening plenary address. It's not often that we get a chance to hear from someone who is both a tech-focussed venture capitalist and a friend to an art museum. We're looking forward to insights that cross traditional boundaries. Pre-Conference Workshops Filling Up Many of the workshops at MW2010 have limited enrollment to ensure that they are great learning experiences. If you've been thinking about adding a workshop to your registration, do so soon to avoid disappointment. If you've already registered, choose the 'Adding Workshop' option. As we get closer to Museums and the Web activity heats up on the network. You are encouraged to set up a profile in the MW online community whether or not you're coming to MW. Wednesday, February 17, 2010 Monday, February 15, 2010 Phillis Wheatley was an African American woman who in the eighteenth century was also one of this nation’s first poets. Her story is featured on this site sponsored by the Public Broadcasting System. We also recommend this Women in History online source. We also call your attention to this online source where transcripts of her poems are featured. Sunday, February 14, 2010 “I cannot live without books,” said Thomas Jefferson on June 10, 1815. Books were vital to Thomas Jefferson’s education and well being. His books provided Jefferson with a broader knowledge of the contemporary and ancient worlds than many of his contemporaries had obtained through personal experience. Divided into categories of Memory, Reason, and Imagination—which Jefferson translated to “History,” “Philosophy,” and “Fine Arts”—and further divided into forty-four “chapters,” the collection placed within Jefferson’s fingertips the span of his multifaceted interests. The books from Jefferson’s library are part of the Rare Book and Special Collections Division of the Library of Congress. Jefferson’s library, which developed through several stages, was always critically important to him. When his family home, Shadwell, burned in 1770, Jefferson deeply lamented the loss of his books. In the midst of the American Revolution and while he was United States minister to France in the 1780s, Jefferson acquired thousands of books for his library at Monticello. By 1814, when the British burned the Capitol and with it the Congressional Library, Thomas Jefferson had acquired the largest personal collection of books in the United States. Short of funds and wanting to see the library re-established, Jefferson offered to sell his personal library to Congress as a replacement for the collection destroyed by the British. After some controversy, Congress purchased his library for $23,950 in 1815. Although a second fire on Christmas Eve of 1851 destroyed nearly two thirds of the 6,487 volumes Congress had purchased from Jefferson, the Jefferson books remain the core from which the present collections of the Library of Congress―the world’s largest library―developed. In this reconstruction of Jefferson’s library, the books have been arranged in an order that Jefferson described as “sometimes analytical, sometimes chronological, and sometimes a combination of both.” Jefferson followed a modified version of the organization of knowledge created by British philosopher Francis Bacon (1561–1626). The books were divided into categories of “Memory,” “Reason,” and “Imagination”—which Jefferson interpreted as “History,” “Philosophy,” and “Fine Arts”—and further divided into forty-four “chapters.” Included in this re-creation are 2,000 volumes from the original Jefferson Collection—survivors of fire and time. An additional 3,000 or so volumes—editions that match those lost in the fire at the Capitol in 1851—come from other collections in the Library of Congress. Other missing works have been acquired through gifts. Several hundred volumes have been purchased since 2000. These acquisitions were made possible by the generosity of Jerry and Gene Jones. Full cataloging information for the books in Thomas Jefferson’s library can be found online in the Catalogue of the Library of Thomas Jefferson. Compiled with annotations by E. Millicent Sowerby. Washington, D.C.: Library of Congress, 1952–1959. The Catalogue is listed under “Selected Special Collections on the Rare Book and Special Collections Reading Room homepage. Happy President's Day from the History Education Council of Hawaii. For more than two centuries, the White House has been the home of American presidents. A powerful symbol of the nation, it is a uniquely private and public space. Since John and Abigail Adams first moved into the “President’s House” in November 1800, hundreds of individuals have worked behind the scenes to help the White House fulfill its roles as a seat of government, a family residence, a ceremonial center, a museum, and an historic building. The White House Historical Association features a number of online exhibits suitable for classroom use by teachers, and by history buffs as well. Click the Classroom link for a variety of resources on school programs, tours, lesson plans and more. Click the link for Media Archives for online tours, presentations and exhibits. Wednesday, February 10, 2010 For over forty years, the American Lawyers Auxiliary has been active in its support of public education, citizenship awareness and other various service programs. Recognizing the vital role that teachers play in law-related education, the Auxiliary continues to sponsor its Law-Related Education Teacher of the Year Award. The purpose of this award is to honor teachers who have made significant contributions in the area of law-related education, and have developed programs that have: · Furthered the understanding of the role of the courts, law enforcement agencies and the legal profession · Helped students to recognize their duties as well as their rights · Encouraged effective law related education programs in their schools and communities · Increased communication between students, educators and those involved professionally in the legal system Nominations for the 2010 Law Related Education Teacher of the Year may be made by a school administrator, coordinator, director, teacher, student, or any other interested party. Materials must include: 1. A resume (maximum of one page) 2. Summarize law-related education activities (maximum of three pages) 3. Include two letters of recommendation from persons familiar with the project. 4. Include relevant supportive evidence such as newspaper articles or other publications regarding your program. 5. Complete entry not to exceed ten pages including recommendations and application. Only School Teachers are eligible. 6. No American Lawyers Auxiliary Board member may submit entries or write letters of recommendation for an applicant. 7. Entries cannot be returned to the sender. 8. Application can be faxed or e-mailed. 9. No application and material will be accepted after the cut off date, and must be postmarked by that date. Each teacher selected will receive a $1,500.00 award to be presented at the Annual Meeting of the American Lawyers Auxiliary in San Francisco, California, August 6, 2010. Entries must be postmarked no later than April 15, 2010 and sent to the appropriate award chair (Kitty O’Reilley, Elementary; Janey Petteiette, Middle or Junior High; Jan Lamoreaux, High School). For more information regarding the Teacher of the Year Awards contact the appropriate representative listed below. Elementary School Chairperson: 5103 Fairglen Lane Chevy Chase, MD 20815 Middle School Chairperson: 525 Wilder Place Shreveport, LA 71104 High School Chairperson: Jan Lamoreaux (pronounced Lam-a-ro) 3883 Les Lacs Avenue Addison, TX 75001 The American Lawyers Auxiliary is a charitable, educational and nonprofit organization whose mission is to promote understanding and appreciation of the law and the American legal system. The following column appeared in the October 1858 edition of The Friend, a monthly newspaper edited and published in Honolulu by Rev. Samuel C. Damon of the American Seaman’s Friend Society. Damon's column references an oration on the character of Washington by Edward Everett. Click this link to a paper delivered by Roger Mudd delivered at the Annual George Washington Symposium in 2003. It is also available in pdf format. Click here for Everett's oration on the character of President Washington. "By the last mail, re have received a monthly sheet, (just the size of the Friend) published in Philadelphia, and “devoted to the purchase of the home and grave of Washington. As our readers are doubtless aware, an enterprise has been started among the ladies of the United States, to raise two hundred thousand dollars for the purchase of Mount Vernon, where Washington lived and died. It is designed to fit up the establishment as nearly as possible in the style in which it was left by the Father of his country. The Hon. E. Everett, it is well known, has become deeply engaged in the enterprise. In behalf of the Fun, he has raised $40,000 by the sale of tickets to hear his Oration upon Washington’s character. He has delivered his oration seventy times, and promises to repeat it seven hundred and seventy times more if the people will pay their money for the purchase of Washington Domain. We could wish Mr. Everett would visit California, and just make a trip to the Sandwich Islands, and we are confident the people of Honolulu would give a $1000 to hear him deliver his oration! Report says the ladies of Honolulu are collecting subscriptions to add their quota to the General Fund. We have not heard how they succeed; but we say, success ladies, to your enterprise. No doubt success will crown your efforts. The name Washington is very popular in Honolulu, for we have our ‘Washington Place,’ and portraits of him who was “first in war, first in peace,” &c., hang in almost every dwelling." Wednesday, February 3, 2010 The Association for the Study of African American Life and History (ASALH) is soliciting papers and panels for its upcoming 95th Annual Convention in Raleigh, North Carolina, September 29-October 3, 2010. This year’s conference theme is: “The History of Black Economic Empowerment.” Although the program committee welcomes papers and panels on any aspect of African and African American history and culture, special preference will be given to submissions directly related to this year’s theme. Using a wide variety of disciplines, this year’s conference seeks to explore many important aspects of African American economic life historically. Although the majority of peoples of African descent in the Americas were enslaved laborers until the 1880s, even under the various colonial and national regimes African Americans transferred many of their economic institutions and practices from Africa to the New World, and adaptations were made in the new economic and political environment. During the era of slavery collective economic activities in South America and the Caribbean such as the creation of African markets were pursued to supplement the often meager provisions offered by slaveholders. With emancipation beginning in the British West Indies in the 1830s, African peoples acquired small parcels of land that were used for economic advancement. The conference plans to explore the economic practices and institutions developed by African Americans making the transition from slavery to freedom. In the post-emancipation years, African Americans developed a wide variety of capitalistic and cooperative economic activities. In addition to the huge increase in property ownership between the 1860s and early 1900s, African American entrepreneurs and businesses emerged and many prospered providing goods and services to the separate African American market. Papers providing scholarly analyses of the emergence of black businesses and entrepreneurs will be given particular attention. Institutions formed to assist and improve the economic conditions for black workers in various parts of the country will also be examined. This year marks the centennial of the National Urban League and we plan to explore its role in advancing the economic circumstances for black workers and migrants to urban areas in the United States. Given the recent changes in the global economy, papers offering comparative and/or interdisciplinary analyses of the impact of the larger political economy on African American economic life in the past and currently are particularly welcome. The deadline for the submission of paper and panel proposals is 30 April 2010. Proposals should be submitted electronically and should include: Title of paper or panel, author(s) and affiliation(s), an abstract of paper or panel of 200-250 words, and all contact information. Lemuel Haynes was probably the first African American ordained by a mainstream Protestant Church in the United States. Haynes, the abandoned child of an African father and "a white woman of respectable ancestry," was born in 1753 at West Hartford, Connecticut. Five months later, he was bound to service until the age of 21 to David Rose of Middle Granville, Massachusetts. With only a rudimentary formal education, Haynes developed a passion for books, especially the Bible and books on theology. As an adolescent, he frequently conducted services at the town parish, sometimes reading sermons of his own. To learn more about this remarkable African American minister please click this link to PBS.org. Also, see this link from Cengage Learning about Rev. Hayes' life and legacy. Click this link for a book review of Black Puritan, Black Republican: The Life and Thought of Lemuel Haynes, 1753–1833. By John Saillant. Religion in America Series. (New York: Oxford University Press, 2003. Pp. xii, 232. $39.95.) Reviewed by James Sidbury , University of Texas at Austin.
<urn:uuid:6c68cb5e-6bfa-492f-81f1-984dcb247505>
{ "date": "2018-05-24T02:06:26", "dump": "CC-MAIN-2018-22", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794865884.49/warc/CC-MAIN-20180524014502-20180524034502-00616.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9550305604934692, "score": 2.625, "token_count": 3571, "url": "http://historyeducationhawaii.blogspot.com/2010_02_01_archive.html" }
When the Civil War began, Emilie Davis , a twenty four year old free African American woman, was attending school and sewing clothes to support herself. In her diaries, Emilie wrote short daily entries recounting events, both big and small. Mixed in with the minutiae of Emilie’s everyday life are entries recounting African Americans’ celebration of the Emancipation Proclamation, nervous excitement during the battle of Gettysburg, and their collective mourning of President Lincoln. The recent discovery of Emilie Davis’ Civil War diaries, dated 1863-65, offer readers a lively and deeply personal account of the war’s “memorable days,” as Emilie often referred to them. Fully transcribed and annotated, readers can now bring this unusual source home with them in Emilie Davis’s Civil War: The Diaries of a Free Black Woman in Philadelphia, 1863-1865, edited by Judith Giesberg and the Memorable Days Editorial Team. We may yet still find other diaries like Emilie’s or other similar sources that will help us to get a more complete picture of what life was like for African Americans during this critical moment in the nation’s history. Until then, Davis’s diaries open a small and very personal window onto this vibrant community. Join us as Dr. Giesberg and other members of the editorial team discuss the project that helped bring Emilie Davis’s experiences back to life. A reception and document display, which includes the original diaries, will follow the discussion. Copies of the book will also be for sale. Act 48 credit is available for educators. Free for members, $10 for nonmembers. Theresa Altieri is the Archivist of The Abraham Lincoln Foundation of The Union League of Philadelphia (ALF), responsible for managing and developing the archival, manuscript and object collections in the care of the ALF. She is active in many history-related groups throughout Philadelphia, including National History Day Philadelphia. Theresa received a bachelor’s degree in anthropology, with a minor in classical studies, from The University of Pennsylvania, and a master’s degree in history from Villanova University, concentrating in public history. Rebecca Capobianco completed her Master's Degree in History with concentrations in United States and Public History in the spring of 2013. Currently, Rebecca is working as an education contractor at Fredericksburg and Spotsylvania County National Military Park and is an adjunct faculty member at Germanna Community College in Fredericksburg, Virginia. Tom Foley is a PhD student at Georgetown University. He received his M.A. from Villanova in 2013. Judith Giesberg is Professor and Director of Graduate Studies in the Department of History at Villanova University. Giesberg is the author of Civil War Sisterhood: The United States Sanitary Commission and Women's Politics in Transition (Boston, MA: Northeastern University Press, 2000) and “Army at Home:” Women and the Civil War on the Northern Home Front (Chapel Hill, NC: University of North Carolina Press, 2009). Ruby Johnson received her MA in history from Villanova University in 2013. She is currently pursuing her PhD in history from The George Washington University where she is a graduate fellow at the Eleanor Roosevelt Papers Project. Jessica Maiberger graduated from Heidelberg University in 2008 and received her M.A. in history at Villanova University in 2013. She is Collections Manager at Huron Historical Society and Office Coordinator at the Rutherford B. Hayes Presidential Center in Fremont, Ohio.
<urn:uuid:a36d31ec-ef2b-4cce-91ef-733e769048d6>
{ "date": "2017-01-24T02:55:50", "dump": "CC-MAIN-2017-04", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283689.98/warc/CC-MAIN-20170116095123-00192-ip-10-171-10-70.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9353081583976746, "score": 3.09375, "token_count": 745, "url": "http://hsp.org/calendar/emilie-davis-diaries-a-chronicle-of-the-african-american-community-during-the-civil-war" }
Weather forecast for alien planet a possibility The aliens didn't know it was going to pour! But we did. Hold your breath. For the first time, astronomers have provided weather forecast for an alien planet. Using Hubble Space Telescope, astronomers from Department of Astronomy and Astrophysics at the University of Chicago have characterised the atmosphere of a super-earth class planet orbiting another star. The scrutinised planet - known as GJ1214b - is classified as a super-earth type planet because its mass is intermediate between those of earth and neptune, says a new study. The team of researchers led by Laura Kreidberg and Jacob Bean detected clear evidence of clouds in the atmosphere of GJ1214b from data collected with the Hubble Space Telescope. The Hubble spectra revealed no chemical fingerprints whatsoever in the planet's atmosphere. This allowed astronomers to rule out cloud-free atmospheres made of water vapour, methane, nitrogen, carbon monoxide or carbon dioxide, said a new paper published in the journal Nature. The Hubble observations used 96 hours of telescope time spread over 11 months. This was the largest Hubble programme ever devoted to studying a single exoplanet. The researchers describe their work as an important milestone on the road to identifying potentially habitable, earth-like planets beyond our Solar System. "We really pushed the limits of what is possible with Hubble to make this measurement," said senior author Kreidberg. (Posted on 01-01-2014)
<urn:uuid:fe4623f0-baa7-499e-b99d-ce7bfab3796c>
{ "date": "2014-08-29T10:02:27", "dump": "CC-MAIN-2014-35", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500832052.6/warc/CC-MAIN-20140820021352-00262-ip-10-180-136-8.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9205453991889954, "score": 3.046875, "token_count": 306, "url": "http://www.newkerala.com/news/story/107011/404.html" }
|Full Index||Subjects||Concepts||Country||Documents||Pictures & Maps| Over the next six years he worked as a surveyor and engineer, before rejoining in 1842, again for financial reasons. On his return to the army, he was appointed a second lieutenant of Topographical Engineers. During the Mexican War he served first with Taylor, taking part in the battles of Palo Alto and Resaca de la Palma, and then under Scott at the siege of Vera Cruz. He did not accompany the army to Mexico City, instead being sent back to Philadelphia. Unlike many of his contemporaries, Meade remained in the army between the Mexican War and the outbreak of the Civil War – there was always interesting work for an engineer in the army. In those years he was involved in lighthouse building, saw active service in Florida, and from 1857 was in charge of the Northern Lake Surveys. At the outbreak of the civil war, he was promoted to brigadier-general of volunteers (although his regular rank was only captain), and given command of a brigade of Pennsylvania troops. This was the first time in his entire military career that he had command of a combat unit, and he performed well in the new role. His brigade served in the defence of Washington, in the Shenandoah Valley and on the Peninsula campaign under McClellan. He was badly wounded at the battle of Glendale (30 June 1862), but was determined to return to action, getting back just in time for the defeat at Second Bull Run (29-30 August 1862). Meade had now earned himself an impressive reputation. During the Antietam campaign he was twice given important temporary commands, of Reynolds’ division at South Mountain (14 September 1862), and of the entire I Corps after Hooker was wounded at Antietam (16-17 September). When Reynolds was promoted to command the I Corps, Meade was given command of his division, and promoted to major-general of volunteers. After the battle of Fredericksburg he was promoted to command of the V Corps (25 December 1862). Between January 26 and 5 February 1863 he had command of the Center Grand Division (III and VI Corps) under Burnside, before returning to the V Corps when Hooker abolished the Grand Divisions. In that capacity he took part in the battle of Chancellorsville (2-5 May 1863), emerging from the defeat with his reputation intact. He was about to be promoted once again. After Chancellorsville, Robert E. Lee launched his invasion of Pennsylvania. Hooker set off in pursuit, while also conducting an argument with Washington. On 28 June Hooker resigned, and Meade was appointed to command the Army of the Potomac. His appointment could hardly have come at a worse time, in the middle of the biggest Confederate invasion of the north and after two major defeats. The two armies came together at Gettysburg (1-3 July 1863), only three days after Meade’s promotion. Meade worked well with his subordinates. The Union army took up a strong position, and over three days held off Lee’s army of veterans. Gettysburg was the high-point of Meade’s career. After the battle he missed a chance to catch Lee before he could cross back into Virginia. His Rapidan campaign in the autumn of 1863 was entirely inconclusive, although at least he avoided any disasters. After Gettysburg Meade was finally promoted to brigadier-general in the regular army. He retained command of the Army of the Potomac until the end of the war. However, U.S. Grant, who had been promoted to Lieutenant-General, and placed in command of all Union forces on 12 March 1864, decided to accompany the Army of the Potomac on the overland campaign against Richmond. This placed Meade in the awkward position of having his superior officer peering over his shoulder at all times. Grant maintained the formalities of command, normally issuing his orders for the Army of the Potomac to Meade. However, with Grant so close at hand, those orders were rather more detailed than normal – Meade merely had to carry them out. Despite some inevitable tension, this arrangement normally worked well, although it may have been responsible for a missed change to capture Petersburg (15-18 June 1864), when orders to Hancock’s corps did not arrive in time. Meade’s background as a topographical engineer may have played a major role in his success at Gettysburg. U.S. Grant rated him highly as an officer who could see any advantages to be gained from the terrain in front of him, sometimes even to the extent where he would attempt to take advantage of the terrain even if that didn’t entirely fit with the overall intentions of the army. However, at Gettysburg, where the main intention was to stand on the defensive, that ability to judge terrain was a great strength. His later career in command suggests that he was not quite so able when on the attack, but for the last year of the war he was serving under U.S. Grant, where his ability to carry out other people’s plans with enthusiasm was invaluable. After the war he serviced in command of the Military District of the Atlantic, then of the East, before being appointed to command of the third military district of the South (Georgia, Alabama and Florida) from 2 January 1868 to 12 March 1869. There he was in charge of the reconstruction effort, performing a decent job in very difficult circumstances. His final appointment was a return to the Department of the Atlantic. He was still serving in that role at the time of his death, on 6 November 1872. His determined defence at Gettysburg was crucial for the Union, ending as it did Robert E. Lee’s best and last chance of winning a major victory on northern soil. ||Save this on Delicious| Help - F.A.Q. - Contact Us - Search - Recent - About Us - Subscribe in a reader |Subscribe to History of War| |Browse Archives at groups.google.co.uk|
<urn:uuid:2e0b1fc1-ea9f-43ee-b148-26f924d58f1b>
{ "date": "2014-04-16T16:02:26", "dump": "CC-MAIN-2014-15", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609524259.30/warc/CC-MAIN-20140416005204-00355-ip-10-147-4-33.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9839929342269897, "score": 2.984375, "token_count": 1264, "url": "http://www.historyofwar.org/articles/people_meade_george.html" }
National Council of Negro Women (NCNW)Article Free Pass National Council of Negro Women (NCNW), American umbrella organization, founded by Mary McLeod Bethune in New York City on December 5, 1935, whose mission is “to advance opportunities and the quality of life for African American women, their families and communities.” Disappointed with the lack of unity and cooperation between African American women’s groups, Bethune called upon their leaders to create a cohesive body that would express the concerns and beliefs of African American women in regard to national and international affairs. Fourteen organizations sent delegates to the founding meeting of the NCNW, and the organization has since grown to represent more than 35 national and 250 community affiliations; more than four million women are associated with the NCNW. The national headquarters were established in Washington, D.C., in 1942. The NCNW struggled financially until receiving tax-exempt status in 1966, after which it received generous contributions from previously reluctant donors and expanded into a complex organization with activism at the local, national, and international levels. It has a grassroots approach, encouraging advocacy through its publication Women United (from 1940 to 1949 Aframerican Women’s Journal); annual Black Family Reunion Celebrations (since 1986), which present workshops and exhibits to celebrate and strengthen African American families; a biennial National Convention (formerly annual); and National Centers for African American Women. The latter include the Dorothy I. Height Leadership Institute, created to empower African American women in the workforce and in their communities; the Research, Public Policy and Information Center, which provides information on issues affecting African American women; and others. Do you know anything more about this topic that you’d like to share?
<urn:uuid:6f742317-5aa2-418e-9ceb-17644188ee71>
{ "date": "2014-08-30T08:58:18", "dump": "CC-MAIN-2014-35", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500834663.62/warc/CC-MAIN-20140820021354-00048-ip-10-180-136-8.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9577932953834534, "score": 3.421875, "token_count": 352, "url": "http://www.britannica.com/EBchecked/topic/404670/National-Council-of-Negro-Women-NCNW" }
Diseases & Research Basic medical research studies a particular part of the body to understand how it works, or a particular illness or condition. Awareness of the differences between a healthy and a diseased or damaged system can give insights into how to prevent and cure illness. Finding out more about the interactions between different cell types and organ systems leads to better treatments for diseases, which do not interfere with the normal functions of the body. Recent technology has offered new insights into the underlying causes of many illnesses, providing new ways to prevent or cure disease.
<urn:uuid:9277f1f2-4698-468a-a806-ecfa99ddfa6d>
{ "date": "2014-10-23T17:52:38", "dump": "CC-MAIN-2014-42", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413558067114.72/warc/CC-MAIN-20141017150107-00168-ip-10-16-133-185.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9494836926460266, "score": 3.25, "token_count": 109, "url": "http://www.animalresearch.info/en/medical-advances/diseases-research/" }
Two years ago, the Canadian Radio-television and Telecommunications Commission conducted a much-publicized hearing on net neutrality, which examined whether new rules were needed to govern how Internet providers managed their networks. While many Internet users remain unaware of the issue, behind the scenes Internet providers employ a variety of mechanisms to control the flow of traffic on their networks, with some restricting or throttling the speeds for some applications. The Commission unveiled its Internet traffic management practices in , establishing enforceable guidelines touted as the first net neutrality regulations. Where a consumer complains, Internet providers are required to describe their practices, demonstrate their necessity, and establish that they discriminate as little as possible. Targeting specific applications or protocols may warrant investigation and slowing down time-sensitive traffic likely violates current Canadian law. While there was a lot to like about the CRTC approach, the immediate was absence of an enforcement mechanism. Much of the responsibility for gathering evidence and launching complaints was left to individual Canadians who typically lack the expertise to do so. Nearly two years later, my weekly technology law column (Toronto Star ) posts an investigation into the system that concerns were well-founded. Although the CRTC has not publicly disclosed details on net neutrality complaints and the resulting investigations, I recently filed an Access to Information request to learn more about what has been taking place behind the scenes. A review of hundreds of pages of documents discloses that virtually all major Canadian ISPs have been the target of complaints, but there have been few, if any, consequences arising from the complaints process. In fact, the CRTC has frequently dismissed complaints as being outside of the scope of the policy, lacking in evidence, or sided with Internet provider practices.
<urn:uuid:d6795404-6f42-41ca-ae52-bc2e28248b0a>
{ "date": "2014-12-18T11:26:48", "dump": "CC-MAIN-2014-52", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802766267.61/warc/CC-MAIN-20141217075246-00099-ip-10-231-17-201.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9387760162353516, "score": 2.546875, "token_count": 385, "url": "http://netneutrality.michaelgeist.ca/" }
Policy Feature Issue: Ukraine Background – A Brief Overview Recent developments in Ukraine have caused political, economic, and military turmoil, leading to the collapse of President Viktor Yanukovych’s regime and the emergence of an interim government that appears supportive of necessary reforms and closer integration with the West. Russian Federation forces have since entered Ukrainian sovereign territory in the Crimea region, threatening the new government’s security and stability and prompting threats of secession. Most recently, Crimea’s Parliament overwhelmingly voted to hold a referendum on Crimea’s future on March 16, 2014. Ukraine Since 1991 Ukraine gained independence from the Soviet Union in 1991 and from the mid-1990s until 2004, the country was led by President Leonid Kuchma and oligarchic “clans” that supported him. Kuchma’s leadership “was characterized by fitful economic reform, widespread corruption, and a deteriorating human rights record.” In 2004, the Presidential elections were rife with fraud, triggering mass protests that became known as the “Orange Revolution.” Many hoped the movement would prompt anti-corruption reforms and stronger integration with the West. The demonstrations ultimately brought into power Viktor Yushchenko, a perceived pro-reform, pro-Western engagement figure. However, infighting dominated his tenure, creating public disillusionment. Viktor Yanukovych’swin as President in 2010 erased any remnants of Orange Revolution ideals. His term was dominated by human rights abuses, particularly in targeting opposition leaders. Yanukovych also aligned Ukraine’s interests more closely with Russia, causing friction with those who favored stronger relations with the West. Participation in the International Community Since obtaining independence in 1991, Ukraine’s economic and foreign policy agenda has “appear[ed] incoherent, as the contending forces pulled it in pro-Western or pro-Russia directions or simply neglected foreign policy as less important than domestic political combat . . . .” At times, the country has moved towards increased Western integration and cooperation—expressing hopes of joining the European Union (EU) and the North Atlantic Trade Organization (NATO)—but has not taken concrete steps to meet the standards set by these entities. Ukraine initiated formal relations with NATO in 1991, and in 1994, joined NATO’s Partnership for Peace. The 1997 Charter on a Distinctive Partnership is “the formal basis for NATO-Ukraine relations” and established a framework for cooperation between the Ukraine and NATO. In 2002, Ukraine cited NATO membership as an official foreign policy goal; but in 2010, then-President Yanukovych “formally rejected NATO membership for Ukraine.” Additionally, Yanukovych recently decided at the last-minute to suspend plans to sign an Association Agreement (AA) with the EU, which would have included a free trade zone, due to intense pressure from Russia. “In 2009, the EU launched the Eastern Partnership program, a regional approach to cooperation with the region that includes Ukraine, Belarus, Moldova, Georgia, Armenia, and Azerbaijan.” The AA is “the EU’s main instrument to promote European values in these countries and deepen economic ties with them.” Though Ukraine’s interim government seems supportive of closer relations with the EU, a decision on the AA will likely occur after the presidential elections in May 2014. Ukraine has substantial economic potential due in part to its strategic location and rich soil. Yet, it has struggled to attract foreign investors who frequently “cite such issues as rampant corruption and serious shortcomings in the rule of law (including a weak judiciary) as key stumbling blocks to foreign investment.” Due in part to these shortcomings, the global economic crisis significantly impacted Ukraine’s economy and it has since struggled to recover. Its foreign exchange reserves have fallen to dangerous levels, prompting concern “that Ukraine could default on its sovereign debt in 2014.” On March 4, following the collapse of Yanukovych’s regime, the IMF sent a fact-finding mission to Ukraine to “conduct a review of the economy and discuss . . . the policy reforms that could form the basis of a Fund-supported program.” The mission—generally a first step in responding to a country’s request for assistance—will report its findings and IMF Management will propose a course of action to the IMF Executive Board. For its part, the U.S. has pledged $1 billion in loan guarantees “aimed at helping insulate vulnerable Ukrainians from the effects of reduced energy subsidies.” On March 6, the House passed Ukraine aid legislation that authorized funds to be used for loan guarantees in support of the Administration’s pledge. Other key challenges include Ukraine’s energy dependence on Russia. “In the recent past, about 80% of its oil and natural gas . . . came from Russia.” Because of this, Russia has sought control of Ukraine’s natural gas infrastructure and has manipulated prices for political purposes. “Underlining the political nature of Russia’s natural gas pricing policy, after Ukraine announced that it would not sign the [AA] with the EU, Russia announced . . . it would reduce its natural gas prices for Ukraine by one-third.” In light of this dynamic, legislation has been introduced in the House that would reduce Russia’s influence by fast tracking liquid natural gas (LNG) exports to our allies. Stephen Woehrel, Ukraine: Current Issues and U.S. Policy, Congressional Research Service (Feb. 26, 2014) at 1. Steven Woehrel, Ukraine’s Orange Revolution and U.S. Policy, Congressional Research Service (July 1, 2005) at Summary. CRS: Ukraine: Current Issues at 6. NATO’s Relations with Ukraine, NATO (Feb. 28, 2014). “The Partnership for Peace (PfP) is a programme of practical bilateral cooperation between individual Euro-Atlantic partner countries and NATO. It allows partners to build up an individual relationship with NATO, choosing their own priorities for cooperation.” The Partnership for Peace Programme, NATO (Mar. 10, 2014). NATO’s Relations with Ukraine, NATO (Feb. 28, 2014). Id. and CRS: Ukraine: Current Issues at 6. CRS: Ukraine: Current Issues at 2. “In 2009, the EU launched the Eastern Partnership program, a regional approach to cooperation with the region that includes Ukraine, Belarus, Moldova, Georgia, Armenia, and Azerbaijan. . . . The [AA] is the EU’s main instrument to promote European values in these countries and deepen economic ties with them.” Id. at 6. Id. at 5. IMF Sends Fact-Finding Team to Ukraine, International Monetary Fund (Mar. 5, 2014). Fact Sheet: International Support for Ukraine, White House (Mar. 4, 2014). Chairman Rogers Commends House Passage of Ukraine Aid Legislation, House Appropriations Committee (Mar. 6, 2014). According to the House Foreign Affairs Committee, loan guarantees are a cost-effective way to leverage U.S. assistance to a country. They consist of guarantees for the repayment of part or all of the principal and interest of a country’s sovereign borrowing. The U.S. guarantee reduces the riskiness of the underlying asset. It would be packaged with significant technical assistance focusing on four key areas: implementing critical economic reforms and mitigating their impact on vulnerable Ukrainians; conducting free, fair and inclusive elections, including the media and independent civil society; combating corruption and recovering stolen assets; and withstanding politically motivated trade actions by Russia. CRS: Ukraine: Current Issues at 9. As White House Downplays Importance of LNG Exports, Eastern Europe Makes Plea for U.S. Natural Gas, House Energy and Commerce Committee (Mar. 10, 2014). “In a recent letter the Visegrad 4 group, comprised of Poland, the Czech Republic, Hungary, and Slovakia, sent Congressional leaders a letter pleading for help from the [U.S.] to reduce their dependence on Russian energy supplies by removing bureaucratic hurdles to LNG exports.” Id.
<urn:uuid:53eec3cc-83af-481d-b671-60dcebfa50ef>
{ "date": "2015-05-25T09:48:25", "dump": "CC-MAIN-2015-22", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207928479.19/warc/CC-MAIN-20150521113208-00289-ip-10-180-206-219.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9336482882499695, "score": 3.1875, "token_count": 1680, "url": "http://gop.gov/policy-feature-issue-ukraine-background-a-brief-overview/" }
My daughter, Josephine, age 9, sat at her piano, practicing. She called to me from her seat, “Hey Mom! Did you know that a flat is sharp and a sharp is a flat?” “The black keys are both sharps AND flats! It just depends on what note you’re playing!” “That’s neat. So, based on your perspective, the same key can have two totally different names.” “That’s right! To A, the black note, or the sharp, is a big brother. But to B, the SAME black key is a flat. It’s a little sister.” Two things: 1. Having your kids learn a musical instrument is an education all by itself. 2. Kids are naturally brilliant and I highly recommend hanging out with some on a regular basis.
<urn:uuid:d350da40-aa4a-4347-8ea8-ce3afc550d38>
{ "date": "2018-04-21T16:51:42", "dump": "CC-MAIN-2018-17", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945272.41/warc/CC-MAIN-20180421164646-20180421184646-00176.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9422770738601685, "score": 2.734375, "token_count": 188, "url": "http://angelabuckland.com/category/homeschool/" }
Using Your Head and Your Heart Intellectual ability is not enough to assure success in school or in life. In fact, in some cases, children with superior cognitive skills do not live up to their promise because they do not also possess solid emotional intelligence. They are out of synch with themselves and with others; they can't read between social and emotional lines. They are not good at cooperating or at preventing and resolving conflicts. Educators and parents can't afford to overlook children's insight and people skills. We should be guiding them (empathetically!) to use their heads and their hearts every day. Even if your child's innate temperament does not automatically lend itself to persistence, optimism, delayed gratification for goals, and empathy, you can guide her in that direction. - Start early. Ideally, all this begins very early in life with the family. When you are emotionally attuned to your young child, you provide a model for empathy while also giving her a wonderful sense of feeling understood and valued. - Be understanding, but set limits. It's impractical and unwise to routinely defer to all of your child's wishes. What's more important is communicating an understanding and respect for his feelings. Harsh discipline and/or indifference to your little one's feelings can have a negative effect on the development of his emotional intelligence. - Be a role model. Your child learns a great deal from watching the way you handle your feelings and your interactions with others. - Cheer her on. Babies and young children who enjoy a large dose of approval and encouragement from important adults are most likely to expect to succeed, and therefore endure the rough spots of life with more grace and optimism. As your child grows, act as her emotional coach. When she is upset, disappointed, etc., take her feelings seriously. Try to understand what is causing the upset, and help her find good ways to soothe herself. Guide her toward problem-solving — appropriate alternatives to fighting or withdrawing. - Scout his talent. A vital ingredient in all of this is getting to know and understand not only your child's temperament, but also his passions. Helping him find and cultivate his natural gifts is an invaluable contribution, as is encouraging curiosity and the pleasure of learning. - Help her make and keep friends. Gently, never critically, guide your child in her interactions with peers. Teach her how to handle stress, manage her own feelings, and consider what others may be feeling. In a few schools across the country, there are actually "emotional literacy" classes. Even more helpful, though, may be imbuing every interpersonal situation with such lessons. Try to turn crisis moments into lessons in emotional intelligence. Ideally, each learning experience will allow your child a small reach — not too far and not so easy that it is boring. If you can help him find the "just-right" challenges in learning and encourage his emotional astuteness, academic achievement and later-life success is very likely to follow. Recommended Products for Your Child Ages 3-5
<urn:uuid:e5dbb4f6-2bfe-49bb-9a02-9d6d52ef3c7c>
{ "date": "2015-07-05T13:30:16", "dump": "CC-MAIN-2015-27", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375097475.46/warc/CC-MAIN-20150627031817-00286-ip-10-179-60-89.ec2.internal.warc.gz", "int_score": 4, "language": "en", "language_score": 0.9644152522087097, "score": 3.5625, "token_count": 620, "url": "http://www.scholastic.com/parents/resources/article/social-emotional-skills/using-your-head-and-your-heart" }
Prickett Surname History The family history of the Prickett last name is maintained by the AncientFaces community. Join the community by adding to to our knowldge of the Prickett: - Prickett family history - Prickett country of origin, nationality, & ethnicity - Prickett last name meaning & etymology - Prickett spelling & pronunciation Latest Prickett photos These photos were uploaded by members of the Prickett community on AncientFaces. Prickett Country of Origin, Nationality, & Ethnicity No one has submitted information on Prickett country of origin, nationality, or ethnicity. Add to this section No content has been submitted about the Prickett country of origin. The following is speculative information about Prickett. You can submit your information by clicking Edit. The nationality of Prickett can be very difficult to determine in cases which country boundaries change over time, leaving the nation of origin a mystery. The original ethnicity of Prickett may be in dispute based on whether the name came about naturally and independently in various locales; for example, in the case of surnames that are based on a craft, which can appear in multiple places independently (such as the surname "Baker" which refers to the craft of baker). Prickett Meaning & Etymology No one has submitted information on Prickett meaning and etymology. Add to this section No content has been submitted about the meaning of Prickett. The following is speculative information about Prickett. You can submit your information by clicking Edit. The meaning of Prickett come may come from a trade, such as the name "Gardener" which was given to people of that profession. Some of these craft-based last names may be a profession in some other language. For this reason it is important to know the ethnicity of a name, and the languages used by its progenitors. Many names like Prickett originate from religious texts such as the Quran, the Bible, the Bhagavadgītā, and so forth. Commonly these names relate to a religious phrase such as "Lamb of God". Prickett Pronunciation & Spelling Variations No one has added information on Prickett spellings or pronunciations. Add to this section No content has been submitted about alternate spellings of Prickett. The following is speculative information about Prickett. You can submit your information by clicking Edit. Understanding spelling variations and alternate spellings of the Prickett last name are important to understanding the history of the name. Surnames like Prickett transform in how they're written as they travel across communities, family lines, and countries over generations. In times when literacy was uncommon, names such as Prickett were transcribed based on their pronunciation when people's names were recorded in government records. This could have led to misspellings of Prickett. Last names similar to PrickettPrickettchristopher, Prickette, Prickettgerry, Prickettpaul, Prickettrobert, Pricketts, Pricketttimothy, Prickey, Prickhaber, Prickhans, Prickhard, Prickheck, Prick-hoffmann, Prickier, Prickill, Pricking, Prickins, Prickit, Prickitt, Prickkila Prickett Family Tree Here are a few of the Prickett biographies shared by AncientFaces users. Click here to see more Pricketts - Mary Mattie Prickett 1926 - ? - Samuel McWilliams Prickett 1922 - ? - Mary Prickett 1720 - 1791 - Sarah Prickett 1775 - ? - Charity Taylor Prickett 1746 - 1833 - Richard Prickett - Josiah Jr. Prickett 1768 - ? - Mary Drusilla Prickett 1789 - 1848 - Job Prickett - Rebekah Prickett 1771 - 1807
<urn:uuid:e1bf0ddb-378d-4858-ba3e-b9daaa1edf8a>
{ "date": "2014-03-11T02:22:09", "dump": "CC-MAIN-2014-10", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394011094911/warc/CC-MAIN-20140305091814-00006-ip-10-183-142-35.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9270337224006653, "score": 2.609375, "token_count": 859, "url": "http://www.ancientfaces.com/surname/prickett-family-history/30284" }
Claim: A bride was fatally bitten by a marauding snake while posing for photos in a popular Canadian garden spot. Example: [Collected on the Internet, 1997] A couple gets married. For their wedding photos, they go to the botanical gardens (a popular background for wedding photos in Montreal). While their photos are being taken, a poisonous snake slides out of the greenery and bites the bride, who dies. Origins: In 1983 the Montreal Gazette reported that local brides were afraid to pose for traditional wedding photos in the Montreal Botanical Garden. According to an unverified story then making the rounds, one unfortunate bride was killed when bitten by a venomous snake that had crept out of a flower bed to attack her. Though no one knew the bride’s name, other details were supplied with the story. She was 23. The snake crept up under her dress and bit her. She complained of feeling a sharp pain, but no one heeded her. By the time help was summoned, she was too far gone to be saved. In different tellings the fatal creature was said to be a rattlesnake, a python, and even a tarantula. Despite the scare, there wasn’t any dead bride, not even a slightly nibbled upon one. It was but a wild story run rampant. Weddings are beginnings, and the bride and groom are seen as innocents embarking upon the great journey of life. The juxtaposition of death with all that newness, all that untouchedness, makes for a tragedy of epic proportions. Seeking the start of a new and promising life, the bride finds only death. It’s the stuff of legends. Indeed, it’s the stuff of classic myth. According to Greek mythology, the great singer Orpheus fell in love with the beautiful Eurydice. They were wed, and a great feast was held in their honor. On the day of their wedding, Eurydice went strolling through a nearby field while talking joyfully with her friends about her bright hopes for the future. But her future was not to be — while walking through the bright green meadow, she stumbled upon a venomous snake. The huge serpent bit her and she died. It was a good story back then; it’s still a good story now. In modern times, variations on the same theme include brides fatally stung by bees lurking in bridal bouquets and brides whose beautiful (yet formaldehyde-soaked) gowns do them in. (See our Dressed to Kill page for our write up of the latter legend.) Barbara “churched twice in one day; once for the wedding, once for the funeral” Mikkelson Last updated: 16 April 2007 A Word to Our Loyal Readers Support Snopes and make a difference for readers everywhere. - David Mikkelson - Doreen Marchionni - David Emery - Bond Huberman - Jordan Liles - Alex Kasprak - Dan Evon - Dan MacGuill - Bethania Palma - Liz Donaldson - Vinny Green - Ryan Miller - Chris Reilly - Chad Ort - Elyssa Young Most Snopes assignments begin when readers ask us, “Is this true?” Those tips launch our fact-checkers on sprints across a vast range of political, scientific, legal, historical, and visual information. We investigate as thoroughly and quickly as possible and relay what we learn. Then another question arrives, and the race starts again. We do this work every day at no cost to you, but it is far from free to produce, and we cannot afford to slow down. To ensure Snopes endures — and grows to serve more readers — we need a different kind of tip: We need your financial support. Support Snopes so we continue to pursue the facts — for you and anyone searching for answers.
<urn:uuid:76e4c9d7-2ae4-49fe-b32b-3ef484567764>
{ "date": "2019-11-21T05:46:29", "dump": "CC-MAIN-2019-47", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496670731.88/warc/CC-MAIN-20191121050543-20191121074543-00136.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9382945895195007, "score": 2.625, "token_count": 834, "url": "https://www.snopes.com/fact-check/the-snake-in-the-botanical-garden/" }
|AN EXPEDITION TO THE CORAL REEFS OF TORRES STRAITS| EARLY in September, 1913, the expedition of the Department of Marine Biology of the Carnegie Institution of Washington arrived at Thursday Island in Torres Straits off the northern end of Cape York. Thursday Island owing to the deep water in its vicinity has grown to be a busy port of call, although it is barely a mile in length and is so completely surrounded by the larger members of the archipelago that only the most detailed British Admiralty charts records its name, and even the painstaking Captain Cook who first sailed past it in the "Endeavour" in 1770, merely notes it as one of the Prince of Wales Islands. Yet to our eyes it seemed an important place. Four of us—Clark, Harvey, Mayer and Tennent, together with Mr. John Mills, the able engineer of our naptha launch, had come nearly half the distance around the world from the eastern states of America, while Mr. Potts had left his cloistered quarters in Trinity Hall, Cambridge, and Mr. E. M. Grosse, the artist, had joined the expedition in Sydney. Thursday Island was the intended objective of our journey for Saville-Kent in his beautifully illustrated book upon the Great Barrier Reef of Australia had especially designated it as being the site par excellence from which to study the coral reefs of Torres Straits. Our surprise and disappointment was great therefore when we found the coral reefs to be overwhelmed with a layer of mud above which only the largest corals could raise their heads and thrive. The region seemed an ideal one only for masses of fleshy, dull olive-green alcyonaria (Sarcophyton) superficially resembling huge lichens several feet in diameter. The remarkably strong currents with their freight of silt and mud were fatal to luxuriant coral growth and the echinoderm life was hopelessly deficient, so that even the cheerful Clark, as enthusiastic a collector as ever lived, was in despair.
<urn:uuid:55ab765c-c00a-45b7-960d-a5f29dd909bf>
{ "date": "2017-03-23T04:33:31", "dump": "CC-MAIN-2017-13", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218186774.43/warc/CC-MAIN-20170322212946-00061-ip-10-233-31-227.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9628707766532898, "score": 3.1875, "token_count": 415, "url": "https://en.wikisource.org/wiki/Page:Popular_Science_Monthly_Volume_85.djvu/213" }
A study of the musical concepts of melody, rhythm, harmony, and form as applied to the principles and techniques of writing and arranging for the rhythm section (drums, bass, guitar, keyboards, basic percussion) and a lead-line for a solo instrument, two horns (trumpet plus alto or tenor saxophone), or voice. Focus on the conceptual process of combining individual components to create a musically satisfying arrangement. Exploration of the use and integration of MIDI technology and sequencing as they relate to rhythm section and lead-line writing. Study of various contemporary musical styles and musical concepts that comprise them, including writing from the bottom up (groove-driven) and top down (working with a melody in a lead instrument or voice). Writing assignments will incorporate combinations of acoustic, electronic, and MIDI instruments. Study of the properties of the trumpet, alto saxophone, tenor saxophone, trombone, and baritone saxophone, and the writing/arranging processes of standard and spread voicings, approach techniques, melodic embellishment, and guide tone backgrounds. Focus is on applying the writing processes to soli and background writing for two-, three-, four-, and five-part combinations of these instruments. It is recommended that CW-171 be taken by CWPR majors prior to enrolling in AR-112. Chord Scale Voicings for Arranging Five- and six-part writing for instruments. Application of voicings in seconds, thirds, and fourths. Upper-structure triads, clusters, and other nonmechanical voicings derived from chord scales. Extensive score analysis. Survey of Jazz Composition and Arranging A comprehensive study of the evolution of jazz arranging and composition from the 1920s to the present. Score analysis of representative works by Fletcher Henderson, Duke Ellington, Gil Evans, Thad Jones, and others. Extensive listening. Written arrangements not required. Scoring for Instrumental Ensembles in the Secondary School Orchestration for wind, string, and percussion groups as used at the secondary school level. Principles of score layout/arranging for concert band and high school orchestra. Arranging for Secondary Vocal Ensemble Arranging for high school vocal groups. Principles of part-writing for various combinations of voices. Writing piano accompaniments. End-of-semester arranging project required. Arranging for High School Jazz Ensemble Principles of writing for high school jazz ensembles with standard and mixed instrumentation. Range problems, rhythm section parts, special considerations for high school musicians. Examination of published scores. Contemporary Arranging and Composition Development of individual writing creativity. Emphasis on the building of confidence in writing clear, memorable lead lines based on standard song forms. Discussions on the relationship of speech patterns to melody. Individual conferences with the instructor when necessary. Written projects required. Arranging for Contemporary Jazz Ensemble The arranging of original tunes combining both traditional jazz techniques and contemporary compositional concepts. Analysis of taped examples. Big Band Arranging and Score Analysis Methodology of big band arranging. Analysis of scores by classic and contemporary big band arrangers. Library assignments and class discussion. Written arrangements and score analysis projects required. Jazz Arranging for Small Ensemble Jazz arranging techniques for the rhythm section and various small-group instrumental combinations of up to three horns (melodic voices). Emphasis on developing complete rhythm section sound (with or without winds) and advanced voicing techniques (including interval-based voicings, linear approach techniques, and constant structure). Advanced Jazz Arranging for Large Ensemble Extended applications of standard big band scoring techniques. Analysis of devices found in the compositions of major jazz writers. - 1 of 120 - next ›
<urn:uuid:7d70f12c-1393-426e-9029-7475e8707e3d>
{ "date": "2013-12-08T14:16:23", "dump": "CC-MAIN-2013-48", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163065880/warc/CC-MAIN-20131204131745-00002-ip-10-33-133-15.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.8794447183609009, "score": 2.984375, "token_count": 775, "url": "http://www.berklee.edu/courses/default.html?title=&field_course_department_value=" }
Students at all levels are looking to develop skills that will serve them as they make that next step. The SSC Social Media Liaison, Mary Pertich-Guy, proposed an occasional blog that would discuss professional development issues for students and encourage contributions of ideas and experiences through their comments. Oral communication skills seem to be on everyone’s short list. Whether it is reading a conference paper on someone’s behalf or introducing yourself to classmates at the beginning of a semester, archaeology students are asked to talk about work often. There are many opportunities to improve oral communication skills. Call Your Mom Or call an uncle or an old friend; it doesn’t matter. Just make sure it’s someone who knows nothing about your work (likely easy to find), and is willing to listen (possibly a bit harder). The questions they ask can help you hone in on things you might make clearer. The elevator doors shut and you have until they open again to describe your project or research interests in a compelling way. This exercise helps you to eliminate unnecessary details and focus on the interesting parts. Many teach as adjuncts in anthropology departments. Few things will improve your communication skills quicker. However, not everyone is in the position to teach courses. Speak to your local schoolteachers, they often welcome presentations, and students can ask challenging questions. Adult education programs may also welcome a guest speaker. These opportunities force you to organize materials, think about your audience and do not require a semester of your time. Go to the Library (or local historical society) Libraries and historical societies commonly have programs that invite guest speakers. These presentations can be great opportunities to present preliminary work. Those in attendance can encourage you to think on your feet. Grab a Cup of Coffee Make plans to meet with classmates and take turns presenting problems you are encountering. This is practice both for asking productive questions and fielding them. Many departments offer students the opportunity to present work. This is a great way to get feedback on a work in progress at any stage. If your department does not do this, it is easy enough to organize. All you need is the approval from the Chair and a student listserv. Talk to Yourself Many people are hesitant to throw themselves in front of a crowd. With today’s technology a bit of self-critique is easy to do. Record yourself and watch it later. Audio is good but video might be better; you never know what odd gestures you might make unconsciously.
<urn:uuid:53cd6ff7-4c1d-43fe-a5e7-0571ebc4d161>
{ "date": "2014-03-08T07:28:48", "dump": "CC-MAIN-2014-10", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999653836/warc/CC-MAIN-20140305060733-00006-ip-10-183-142-35.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9526954889297485, "score": 2.71875, "token_count": 511, "url": "http://www.sha.org/blog/index.php/tag/professional-development/" }
Glaciers: What are they? Where are they? Where are they going? - 2/1 Glacier expert Dr. Andrew Fountain, PSU Professor of Geography and Geology, will discuss the wonder in the fact that these deposits of moving ice are found at all. Normally, ice is found in its liquid form as water, yet a slight change in temperature, and it’s all solid ice. This visual presentation will describe the conditions for the existence of glaciers and sea ice, as well as the fact that because of global warming, some glaciers are shrinking for a variety of reasons. Dr. Andrew Fountain is fascinated with ice, particularly glacier ice. His background in the subject started with ice crystals in the atmosphere, became grounded in lake ice, switched to sea ice, and then he found work focusing on glaciers. His research is devoted to the problem of water and glaciers and the variation of glaciers with climate. “My philosophy is to emphasize the fundamental processes that govern the observed behavior of the natural systems we encounter,” he says. “Only in this way can we see the universal underpinnings to the environment in which we live.” Dr. Fountain earned a B.S. in Physics at St. Lawrence University, a M.S. in Atmospheric Sciences at the University of Alaska and a Ph.D. in Civil Engineering at the University of Washington. City Hall Council Chambers - 380 A Avenue
<urn:uuid:fc15190d-e9e7-490f-ba69-86b5a6f85c23>
{ "date": "2018-02-24T20:29:24", "dump": "CC-MAIN-2018-09", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891815934.81/warc/CC-MAIN-20180224191934-20180224211934-00656.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9593836665153503, "score": 3.171875, "token_count": 297, "url": "https://www.ci.oswego.or.us/loreads/glaciers-what-are-they-where-are-they-where-are-they-going-21" }
Nanoscale Holes Provide Speed Boost for Diagnostic Tests Microfluidic devices, essentially miniaturized chemical laboratories etched into material similar to a microprocessor chip, are revolutionizing diagnostic medicine by providing a technology platform that is more sensitive and less expensive than conventional analytical technologies. A new sensing method that relies on nanoscale holes drilled into a microfluidic device also could add “faster” to the list of benefits afforded by microfluidics. Reporting their work in the journal Analytical Chemistry, researchers at the University of British Columbia created a grid of 30 x 30 flow-through nanoscale holes to create a highly responsive sensor system that can detect biomolecules of interest without requiring the additional use of an optical label. They used a tightly focused laser to drill holes through a 100-nanometer-thick layer of gold deposited on a 100-nanometer-thick slab of silicon nitride. The resulting sensor array then was integrated into a microfluidic chip made of poly(dimethylsiloxane), a standard material used to make lab-on-a-chip devices for biomedical applications. With the array in hand, the investigators then attached a monoclonal antibody to the gold lining inside the holes. This monoclonal antibody binds to a cancer biomarker protein known as PAX8. The researchers then took advantage of an optical phenomenon known as surface plasmon resonance (SPR), which takes place on thin films of gold. When irradiated with laser light, thin gold films will emit a sharp, bright burst of light whose wavelength changes as various molecules stick to the gold surface. In this case, the SPR signal changed whenever PAX8 bound to the antibody attached to the gold film lining the array holes. When compared with established SPR-based measurement techniques, the flow-through device had a response time that was sixfold faster while measuring PAX8 present at concentrations in the attomolar range. This work is detailed in the paper “Nanoholes as nanochannels: flow-through plasmonic sensing.” Investigators from the Universidade Estadual de Maringá in Brazil and the British Columbia Cancer Agency also participated in this study. An abstract is available at the journal’s Web site.
<urn:uuid:69dec594-501f-4134-88b0-c69a639163bd>
{ "date": "2014-07-29T12:43:34", "dump": "CC-MAIN-2014-23", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510267330.29/warc/CC-MAIN-20140728011747-00324-ip-10-146-231-18.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9225473999977112, "score": 3.375, "token_count": 470, "url": "http://nano.cancer.gov/action/news/2009/june/nanotech_news_2009-06-26e.asp" }
In 1976 the National Trust created a special program for maritime preservation, and since then more than five million dollars has gone to museums, underwater archaeology projects, training programs, waterfront revitalization, and the restoration of every kind of vessel—from the great sailing ships to dugout canoes. The diversity of this enterprise is revealed by the following projects supported by grants from the Trust in 1982. The S.S. Jeremiah O’Brien is the last unaltered Liberty Ship from a fleet of 2,751 vessels built to one design during World War II. It is still operable. Liberty ships were predicated on two ideas: we needed them fast and there was a shortage of material. They were the first ships to make use of prefabricated and welded units. The Jeremiah was placed on the National Register of Historic places in July 1978 and is in need of repairs. Grant: $3,000. The schooner Bowdoin is the only wooden vessel designed for Arctic exploration still under the U.S. flag. An outstanding example of the art of New England shipbuilders, it is being restored in accordance with the original plans. When the work is done, the Bowdoin will return to service as a seagoing educational institution. Grant: $3,000. The S.S. Baltimore had lain underwater for three years before it was raised by the Baltimore Museum of Industry. Built in 1906, it is the epitome of the standard technology of the time—two-cylinder reciprocating engines and a great mass of ancillary steam-operated machinery. The Baltimore served as a harbor tug for over fifty years, and the museum will bring it back to pristine condition. Grant: $5,250. One of the great names in the annals of maritime heritage preservation is that of William A. Baker (1911–81), a naval architect who is to be honored by a full bibliography published by the New Bedford Whaling Museum. The museum notes that “more than any other single person, Baker brought to the task a rare combination of talents as naval architect, curator, draughtsman, historian and author. A description of his achievements will further the cause of maritime preservation by inspiring those who now carry on the work without him.” Grant: $4,100. The Nantucket Historical Association was founded in 1894 to preserve the records and artifacts of the whaling industry. Its great collection of documents is housed in the Peter Foulger Museum. Better facilities for storage and protection are needed so that the material can be made readily available to the students and historians who come to Nantucket for research. Grant: $1,500. The Tall Ships sail again! The same people who gave us Operation Sail in July 1976 will repeat the triumph of the Bicentennial in 1986. New York Harbor will be the scene once more, and again millions will watch it on television. Grant: $10,000. The Calvert Marine Museum proposes to restore fully the Lore Oyster House as part of a comprehensive exhibition devoted to the seafood industry in the Chesapeake Bay region. They will begin by reassembling the Frank Benning Oyster Shell Crushing Mill. An important aspect of the industry was the processing of oyster shells for use as chicken feed, fertilizer, and road surfacing. Grant: $2,000. The Thousand Islands Shipyard Museum has a unique collection of small craft and early power boats. The museum plans “to take measurements and make line drawings of at least five boats in our collection” to ensure that the hull shapes will be preserved in case of fire or some other calamity. Grant: $750. The Wavertree , an 1885 square-rigged cargo vessel, is one of the few survivors of the age of deep-water sailing ships and one of the last square-rigged craft that actually sailed from the port of New York. It is being restored by the South Street Seaport Museum (most of the work is done—only the midship deckhouse needs fixing). When completed, the Wavertree will be an exhibition vessel as accurate as possible in every detail. She will be open to the public year round. Grant: $7,500. Blossom’s Ferry, on the Cape Fear River near Wilmington, was an important link in the colonial transportation system. The history department at East Carolina University has begun a program in maritime history and underwater archaeology and plans to develop a two-month field research project to document vessels found near the site and to “recover associated material.” Slides and videotape will record the project and be used for an educational television program. Grant: $1,500. Most of the existing historic sailing vessels cannot be used for training on the open sea because they are regulated as “passenger ships.” The rules regarding such ships are very strict, a situation that—at best—makes museums of them. A new Sailing School Ships Act will change the laws governing training and education at sea. The American Sail Training Association in Newport is making a strong effort to get this legislation passed. The bill has been written, and passage by the summer of 1983 seems feasible. Grant: $7,500. From 1881 to 1973 the U.S. Life Saving Service and the U.S. Coast Guard operated a station at the head of the falls of the Ohio River to protect lives, property, and cargo. Two vessels survive from this era, the Belle of Louisville and the Major Andrew Broaddus . They represent the essence of the river life that led to the founding of Louisville. The Belle still plies the waters and the Broaddus is used as a docking ship. Its supply space and docking facilities are to be enlarged. Grant: $3,000. A twenty-four-foot dugout canoe was recently found at the bottom of one of the lakes within the Lac du Flambeau Reservation, the preserve of the Chippewa tribe. It is, of course, much deteriorated, but it can be restored, exhibited, and studied. This particular dugout is one of the largest ever found in the area: it contains early-eighteenth-century metal tools, which indicates that it was in use during the critical early contacts between American Indians and Europeans. The site of the finding was near an island where the last great battle between the Sioux and the Chippewa reputedly took place. Grant: $6,000. On September 10,1813, Comm. Oliver Hazard Perry defeated the British in the battle of Lake Erie. Perry’s flagship, the Niagara , is owned by the Pennsylvania Historical and Museum Commission. Its wooden frame, subjected to rain and snowfall, is in need of a resident shipwright to supervise continual repairs. The Niagara is the only earlynineteenth-century military brig of its class in America. Grant: $2,000. The Chesapeake Bay Maritime Museum, which covers sixteen waterfront acres, will restore a free-black antebellum house that will be used “to interpret the history of the family that owned it and to show the importance of blacks in the Chesapeake Bay maritime community.” Grant: $5,000.
<urn:uuid:42c47cb1-e819-4774-b85c-8644a7f9bb0b>
{ "date": "2018-02-24T06:41:02", "dump": "CC-MAIN-2018-09", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891815435.68/warc/CC-MAIN-20180224053236-20180224073236-00256.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9583320617675781, "score": 3.140625, "token_count": 1497, "url": "http://www.americanheritage.com/content/maritime-heritage-preserved?page=show" }
The Conservancy Association - Advocates environmental protection and sustainable development. Provides educational information on conservation, heritage and recycling, and electronic newsletters. The Council for Sustainable Development - Engages the public to discuss Hong Kong's sustainability issues. Provides published reports, discussion papers, bulletins, articles and online discussion forums. Eco Expo Asia - A trade event featuring green enterprise and living. Provides fair details, exhibitor list, event schedule, and information for participants. Endangered Species Protection - Provides games and educational messages about endangered species. Produced by the Agriculture, Fisheries and Conservation Department. The Environmental Campaign Committee - Promotes public awareness of environmental issues and encourages the public to contribute actively towards a better environment. Introduces current projects and funding application procedures. Friends of the Earth - Environmental protection organisation;promotes recycling, renewable energy and other green measures in Hong Kong. Friends of the Harbour - Aiming to protect Hong Kong's Victoria Harbour from excessive reclamation or other encroachments. Green Council - Aims to encourage the industry to include environmental protection in their processes. Includes descriptions about their Green Label scheme, and educational material. Green Peng Chau Association - Promotes public awareness of environmental issues, concentrating on Peng Chau's environment and local culture. Green Power - One of Hong Kong's main green groups including an online eco-tour. Greenpeace East Asia - Provides information on environmental issues and activities concerning the greater China region. Hong Kong Alternatives - A group that advocates for a major urban green park in the shorelines of West Kowloon. Hong Kong Bioinformatics Centre - Acts as a central data resource for the benefit of Hong Kong biotechnology and industrial community. Provides computational equipment, technical expertise and molecular biology-orientated databases. Hong Kong Science Museum - Introduces the museum's collection, current exhibitions, and educational services for students. Also provides news updates on science topics. Hong Kong Space Museum - Provides programmes and exhibitions on astronomy and space science. Includes information about the museum, programme information, astronomical facts, and resources for school teachers. Science in the Public Service - A joint campaign by government departments to let people know more about their scientific achievements and the application of science and technology in providing services. Wetland Link International Asia Symposium - Provides information on the 3-day symposium. Topics covered include public education, the planning and development of wetland education centres, and habitat management.
<urn:uuid:423e52a6-a3fc-489b-84f0-0daa3e5b70a4>
{ "date": "2017-05-23T18:36:07", "dump": "CC-MAIN-2017-22", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607649.26/warc/CC-MAIN-20170523183134-20170523203134-00110.warc.gz", "int_score": 3, "language": "en", "language_score": 0.861655056476593, "score": 2.71875, "token_count": 499, "url": "http://hwebb.freeservers.com/ahkse.html" }
Minimizing your lawn is the first step to a healthier garden. Lawns don’t support local wildlife as they soak up an enormous amount of water and are often covered in pesticides. Instead, choose plants that provide shade or food. Plant edible plants alongside native plants. You’ll have an attractive organic garden to enjoy and eat from—nothing is fresher than that. Moreover, you will be able to enjoy sitting in the garden enjoying your homegrown lunch surrounded by hummingbirds and butterflies that attracted by the drought-tolerant native plants. Having a gray water system is an easy way to not waste water that is still useful. It recycles the water from domestic activities such as laundry and bathing, using it for landscape irrigation. This cuts our water demand by about 50 percent. I love efficiency and technology, so making a small change that has a massive effect is wonderful. Every home should compost and have a little worm farm. This turns our fruit and vegetable scraps into a fabulous resource rather than being hauled away to landfill waste. For more information on Transition Laguna, visit their Facebook page.
<urn:uuid:a7c9467a-7ccb-4cf5-b33f-9f7204eb3d18>
{ "date": "2018-03-17T04:24:49", "dump": "CC-MAIN-2018-13", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257644271.19/warc/CC-MAIN-20180317035630-20180317055630-00056.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9505814909934998, "score": 2.578125, "token_count": 228, "url": "https://www.cottagesandbungalowsmag.com/outdoorgarden/how-to-hone-your-green-thumb/" }
Sadako Sasaki (January 7, 1943 -- October 25, 1955) was a Japanese girl who lived near Misasa Bridge in Hiroshima, Japan. She was only two years old when the atomic bomb was dropped on Hiroshima on August 6, 1945. At the moment of explosion she was at her home, about 1 mile from ground zero. As she grew up, Sadako was a strong, courageous and athletic girl. In 1954, at age eleven, while training for a big race, she became dizzy and fell to the ground. Sadako was diagnosed with leukemia, the "atom bomb disease". Sadako's best friend told her of an old Japanese legend which said that anyone who folds a thousand origami paper cranes would be granted a wish. Sadako hoped that the gods would grant her a wish to get well so that she could run again. However, it was not just for herself that she wished healing. It is said that what made the girl truly special in her effort was her additional wish to end all such suffering, to bring peace and healing to the victims of the world. She spent fourteen months in the hospital, and she folded over 1,300 paper cranes before dying at the age of twelve. She folded the cranes out of her medicine bottle wrappers and any other paper she could find in hopes of getting better. (A popular version of the story, given in Eleanor Coerr's "Sadako and the Thousand Paper Cranes", is that she fell short of her goal of folding 1,000 cranes, having folded only 644 before her death, and that her friends completed the remaining 356 cranes and buried all 1,000 cranes with her.) After her death, her friends and schoolmates published a collection of letters to raise funds to build a memorial to her and all of the children who died from the atomic bomb in Hiroshima. It was also a popular cause for children and others in Japan. In 1958, a statue of Sadako holding a golden crane was unveiled in the Hiroshima Peace Memorial. At the foot of the statue is a plaque which reads, "This is our cry. This is our prayer. Peace in the world." There is also a statue of her in the Seattle Peace Park. Sadako has become a leading symbol of the impact of a nuclear war. Sadako is a heroine for many young girls. Sadako's story became familiar to many schoolchildren around the world through the novel "Sadako and the Thousand Paper Cranes" by Eleanor Coerr, first published in 1977. Sadako is also briefly mentioned in "Children of the Ashes", Robert Jungk's historical account of the lives of Hiroshima victims and survivors. Her story continues to inspire millions to hope for lasting peace in the world. The Sadako Story website The point is that she never gave up. She continued to make paper cranes until she died. Inspired by her courage and strength, Sadako's friends and classmates put together a book of her letters and published it. They began to dream of building a monument to Sadako and all of the children killed by the atom bomb. Young people all over Japan helped collect money for the project. In 1958, a statue of Sadako holding a golden crane was unveiled in Hiroshima Peace Park. The children also made a wish which is inscribed at the bottom of the statue and reads: "This is our cry, This is our prayer, Peace in the world". Today, people all over the world fold paper cranes and send them to Sadako's monument in Hiroshima.
<urn:uuid:e734ae1d-6a3a-446e-af1b-fb5f9c8cfcfc>
{ "date": "2017-08-16T13:16:57", "dump": "CC-MAIN-2017-34", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886101966.48/warc/CC-MAIN-20170816125013-20170816145013-00056.warc.gz", "int_score": 3, "language": "en", "language_score": 0.979951024055481, "score": 2.765625, "token_count": 726, "url": "http://thehollytree.blogspot.com/2007/07/" }
FOR THE MONTH NOVEMBER 1944 October had cast the 18th Infantry in the role of enveloping Aachen from the east by the seizure of Verlautenheide, Crucifix Hill, and Ravelsberg Hill. This bold move had served to accomplish two things, namely; the reduction of the secondary line of defenses of the Siegfried line in the Division sector and the sealing of the fate of a few thousand Germans in the first great German city to fall into American hands. November saw the Regiment fight one of its most bloody and extended battles of the various campaigns overseas. Thrusting forward as an integral part of the greatest offensive ever waged on the Western Front the 18th Infantry made a continuous two-mile assault through wooded stretches and villages that were literally drenched with artillery and mortar fire, to overcome the fiercest type of ground fighting ever encountered by our troops. The terrain and weather made conditions almost unbearable for our men at times and only sheer guts and determination carried us through to our objective. Hand-to-hand conflict was commonplace in this type of warfare in which there was little opportunity to maneuver. Casualties were extremely heavy — over one thousand (1,000) in two weeks time. It was the first time that replacements had to be employed hurriedly to bolster the waning numbers of the line companies. However the enemy paid even more heavily for his war of attrition in spite of the fact that he fought on ground of his am choosing in well prepared positions with a maximum of support from artillery and self-propelled guns. Seven hundred and twenty-two (722) prisoners, comprising elements of the 1st Storm Regiment, 3rd Panzer Grenadier Division, 12th Infantry Division, 47th Volksgrenadier Division, and 3rd Paratroop Division were processed through the Regimental prisoner of war cage. The month of November opened with the 18th Infantry in a strong defensive position on the low rolling ridge line which formed the eastern perimeter of the Aachen defenses. These positions had been occupied for more than three weeks while plans were being carefully prepared in higher headquarters for a further use of the Regiment, and the 1st U. S., Infantry Division, in a role which would culminate in the enemy being driven closer to the heart of its homeland. During this period of waiting active patrolling was constantly carried out so as not to give the enemy a moments rest. Replacements were filtered into the ranks of the war-hardened veterans and battalions were rotated so that every six (6) days one battalion would be afforded three (3) days of rest and reorganization. Finally on the 8th of November, the, Division was relieved by the 104th U.S. Infantry Division, the 18th Infantry by the 413th Infantry Regiment. The Division was then moved to an assembly area in the vicinity of Zweifall, Germany, to prepare for the "big push". In this area limited training facilities were utilized and a general reorganization took place. Replacements were received and the men were bathed and reequipped. Limited recreation facilities were afforded the men in the way of movies and twenty-four (24) hour passes to the Division Rest Center in the vicinity of Herve, Belgium. During this time however, the Regimental and Battalion Staffs were kept busy on the plans for the future operation. The role that the 1st U.S. Infantry Division was to play in the forthcoming offensive was great, and depended upon perfect coordination and timing. The plan called for the seizure of jump-off points for securing bridgeheads across the Roer River, with the 26th, the 16th and the 47th Combat Teams leading off in the attack. After the attack had reached the northern edge of the woods over looking the Cologne plains, the 18th Infantry was to spring forward and seize the villages of Luchem and Lucherberg, after which time the 16th lnfantry and the 26th Infantry would resume the attack to the Division objectives, prior to H-Hour two thousand (2,000) bombers of the 8th U.S. Air Force were to pound the enemy front line and rear installations for one and one-half hours. The stage was set and November 16th was announced as D-Day. On the 17th November, the 3rd Battalion, 18th Infantry was moved to an assembly area between Vicht and Schevenhütte and attached to the 16th Infantry for operations. Company "L" was utilized to occupy part of the line contained by the 16th lnfantry. On the 18th of November, at 1400 hours, the battalion, less Comparer "L", was committed in an attack on Wenau, a small river valley village on the right flank of the 16th lnfantry. The fighting was costly and the progress slow. Thick woods had to be traversed and the movement was greatly hampered by enemy artillery and mortar fire. Nevertheless the battalion pushed on, and on the 20th of November the village was taken. Orders were then received by the Battalion Commander to advance to the northeast and attack and secure Heistern, after which, the 1st Battalion would pass through the 3rd Battalion and continue the attack to the all-important Hill Feature 203. The little village of Heistern was situated on a high piece of terrain that fully commanded that part of the Division sector through which the 16th Infantry was to launch its attack, and only through its capture could that part of the Division plan be carried out. It was known that the village was strongly held and a bitter fight was in the offing, but the battalion advanced with determination, and by dark, the southern half of the village was occupied by "I" and "K" Companies. The advance had been greatly hampered by intense enemy artillery and mortar fire and street fighting was still in progress when darkness came. At 0335 hours, on the morning of the 21st of November, the enemy launched an aggressive counter-attack against both "I" and "K" Companies to regain his lost ground, but the attack was successfully repulsed with the enemy suffering heavy casualties. At 0830 hours, on the same morning, the battalion resumed its attack and by mid-afternoon the town was completely cleared of the enemy, and a key terrain feature, standing in the way of the success of the Division plan, had fallen. It was then that the 1st Battalion could push forward and secure the ground that would permit the 16th Infantry to fulfill its mission. On the 20th of November, the 2nd Battalion, 18th Infantry was committed on the right of the 3rd Battalion, with the mission of crossing the Wehe River at Wenau and attacking north to Langerwehe. The crossing was successful but the advance from the east bank of the river was greatly hampered by enemy artillery. Again, a high wooded hill, Number 207, stood in the way of the battalion's advance and had to be seized, it was known that the hill was well fortified, and to complete this mission a plan had to be devised to contain swiftness of movement and maneuver, with a minimum of casualties. This was difficult due to the type of terrain the Regiment was fighting over --- heavily wooded, and creased by deep draws that were constantly interdicted by enemy fire. Two attempts were made on the 21st and 22nd to storm the hill, but were unsuccessful. The enemy had full support of its artillery and the fire was so intense that movement forward was impossible. However on the 23rd of November, the hill was seized and the battalion pushed on, but not without heavy casualties. The 1st Battalion was committed on November 21st. Their mission was to pass through the 3rd Battalion, now in Heistern, and advance toward Langerwehe, at the same time, securing a strip of woods, which lay to the northeast of Heistern, through which the 16th Infantry was to launch an attack to the north. The battalion jumped off at the prescribed hour but was subjected to heavy concentrations of enemy mortar and artillery fire, and progress was slow. Thick woods, again, was the obstacle and severe casualties were suffered from tree bursts. This battalion, too, had a well fortified hill in its path that had to be seized before its final objective could be reached. Finally, on November 27th, after six (6) days of severe fighting, the hill was seized and the battalion pushed on to its objective. On November 28th the Regiment finally had accomplished its mission, Langerwehe was taken. There ensued a brief period of street fighting from which many prisoners were taken. The town was cleared and positions were then consolidated around the town and further orders awaited. Thus ended a month in the fighting annuals of the 18th Infantry that had no equal as far as intensity of fighting, physical hardships and heavy going was concerned. Yet, they were poised and ready for any further mission assigned them.
<urn:uuid:bb2d2b95-44de-4322-8c37-4d5c438009a1>
{ "date": "2019-04-20T00:24:26", "dump": "CC-MAIN-2019-18", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578528433.41/warc/CC-MAIN-20190420000959-20190420022959-00416.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9893757700920105, "score": 2.546875, "token_count": 1836, "url": "http://home.scarlet.be/~sh446368/aar-18th-inf-nov.html" }
Tuna is the world's favourite fish. It's not about ending fishing, it's about better fishing. We need to reduce the amount of tuna being caught in the Pacific. The first, and most important, steps are banning destructive fishing practices and creating ‘no fishing’ zones or marine reserves. Even though the tuna industry appears to be fishing itself to death it’s not going to stop. Most of the tuna sold in New Zealand is caught by foreign fleets and processed overseas, usually Thailand, then sold as brands like Sealord, John West and Greenseas or as supermarket “own brands” like Pams and Home Brand. In 2011 we started urging New Zealand’s five big brands of canned tuna to stop sourcing tuna caught using a fishing method that kills sharks, turtles and baby tuna. The method combines fish aggregating devices (FADs) with purse seine nets, creating a deathtrap for about 200,000 tonnes of other marine life every year. By early 2013 all the big tuna brands had responded to our campaign by promising to stop selling tuna caught this way, making New Zealand the third country behind the UK and Australia to do so. Pams and Fish 4 Ever are already offering FAD-free and more sustainable pole and line caught tuna. Sealord, Greenseas, John West and Countdown’s own brands have promised to do similar by 2015. Two of New Zealand's biggest fishing companies, Talley's and Sanford, also fish for tuna in the Pacific. We’re calling on these companies to stop using destructive fishing methods. Creating marine reserves in international waters between Pacific islands and closing them to all fishing will allow tuna stocks to regenerate and protect biodiversity. Four areas in the Pacific have already been identified. Eight Pacific countries known as the Parties to the Nauru Agreement (PNA) have taken steps to protect these waters from purse seine fishing, however international support and further protection is needed. We are also urging our Government to support a ban on the use of death trap FADs in purse seine fisheries to prevent the needless killing of marine life caused by this indiscriminate fishing method.
<urn:uuid:903ee043-d094-40fd-aac3-0b74aa0c63c2>
{ "date": "2016-12-07T11:33:52", "dump": "CC-MAIN-2016-50", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542060.60/warc/CC-MAIN-20161202170902-00456-ip-10-31-129-80.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9436859488487244, "score": 2.515625, "token_count": 447, "url": "http://www.greenpeace.org/new-zealand/en/campaigns/oceans/Defending-our-Pacific/The-solution-is-to-Change-Your-Tuna/" }
World Religion Day The third Sunday in January is annually celebrated as World Religion Day. It was established by the National Spiritual Assembly of the Baha’is of the United States in 1950 as a way to encourage interfaith understanding. Celebrate World Religion Day Many organizations celebrate the day by holding interfaith events where faith leaders get together to give talks and lectures. People are encouraged to talk to and listen to people from faiths different than their own and to understand the basic tenets of other religions. What's Open or Closed? World Religion Day is not an official holiday so businesses, schools and government offices are open. About World Religion Day Baha’i is a form of faith that emerged in 19th century Persia and follows three core principles: unity of God, religion and humankind. The Baha’is believe that there is a single God and the spirituality of all religions in the world stem from this single god. They also believe that all humans are born equal and have the same rights and duties irrespective. Keeping in line with this philosophy, the National Spiritual Assembly of the Baha’is of the United States announced the institution of World Religion Day in 1949. The first such day was observed in 1950. The day calls for members of all religions in the world to recognize that all religions have common spiritual goals. World Religion Day Observances |Weekday||Date||Year||Name||Holiday Type||Where it is Observed| |Sun||Jan 20||2013||World Religion Day||Worldwide observance| |Sun||Jan 19||2014||World Religion Day||Worldwide observance| |Sun||Jan 18||2015||World Religion Day||Worldwide observance| |Sun||Jan 17||2016||World Religion Day||Worldwide observance| |Sun||Jan 15||2017||World Religion Day||Worldwide observance| |Sun||Jan 21||2018||World Religion Day||Worldwide observance| |Sun||Jan 20||2019||World Religion Day||Worldwide observance| |Sun||Jan 19||2020||World Religion Day||Worldwide observance| Quick FactsWorld Religion Day fosters interfaith dialogue and understanding of all religions. World Religion Day 2016Sunday, January 17, 2016 World Religion Day 2017Sunday, January 15, 2017 Name in other languages |World Religion Day||English| |Día Mundial de la Religión||Spanish| |עולם יום הדת||Hebrew| |يوم الدين العالم||Arabic| |세계 종교의 날||Korean| |Welttag der Religion||German|
<urn:uuid:cef592ea-04f7-405c-a201-f0444602d012>
{ "date": "2016-02-09T05:46:50", "dump": "CC-MAIN-2016-07", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701156520.89/warc/CC-MAIN-20160205193916-00190-ip-10-236-182-209.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.8321430683135986, "score": 3.25, "token_count": 584, "url": "http://www.timeanddate.com/holidays/world/world-religion-day" }
Last week we were doing housekeeping things during class and did not get to cover the stories that students were reading in as much depth as I would prefer. I used this method I named Silent Time Line Sorting Game to quickly cover 4 chapters students had read before class, as an introduction to the next chapters in Acts. This was a fun, useful game, and it was QUIET! I find myself so relieved when we are able to play a game quietly. Phew. Those kids can get overwhelming. I allowed texting, but you might not want to. This was a good activity for keeping everyone involved, and we were able to summarize a lot material very quickly. You could do this activty with the Plan of Salvation, the Nephite Cycle, or any number of things. Find out how to play the game in more detail at the game description in the Teaching Techniques section.
<urn:uuid:a524655e-cdc7-4ae6-8617-5e1e1de37d22>
{ "date": "2017-07-22T00:39:25", "dump": "CC-MAIN-2017-30", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423839.97/warc/CC-MAIN-20170722002507-20170722022507-00096.warc.gz", "int_score": 3, "language": "en", "language_score": 0.989357590675354, "score": 2.796875, "token_count": 182, "url": "http://www.mormonshare.com/lds-clipart/acts-21-24-time-line-word-strips-2" }
If you make minimal use of your laptop outside of your home, school or office, you can probably make do with Wi-Fi hotspots. Serious mobile Internet users can invest in a mobile Internet package, with the appropriate hardware and data plan. For everyone in between, the best compromise is often to use your cellular phone as a mobile modem. This requires some planning and a modest amount of setup. Using your phone as a modem is called tethering, and requires a few preliminary steps. The first is to check whether your phone supports tethering. Your manual should tell you that. If not, search for information on the manufacturer's site or contact your phone service provider. You also need a cable to connect the phone and laptop, unless they're both Bluetooth-compatible. Finally, you need to call your cellular carrier to add tethering to your service plan, or switch to one that supports it. If your phone supports the feature, carriers' plans also often let you use your tethered phone as a Wi-Fi hotspot and share it with other devices. Download and Setup Major cellular carriers typically have a software utility you'll need to download to your laptop before you can tether with it. For example, Verizon's is called the VZ Access Manager. The company's website prompts you to select your computer's operating system, then the make and model of your phone, and enter your 10-digit cellular number. When you click the button to download the software, it will download and install itself with the correct settings already entered. Comparable software is available from other carriers, such as Sprint's Mobile Connect or SmartView. To tether your phone, connect it to the laptop with a USB cable or wirelessly, through Bluetooth. Most modern phones use standard mini-USB cables, but a few require a custom cable. Once the phone is connected, place it in "modem" or "data" mode. Phones do this differently, so consult your manual or do an Internet search to find the necessary instructions. Next, tell your laptop to use the cellular phone as a modem. Your carrier's tethering software might install a menu option or icon for you to use. Otherwise use your Control Panel, and look for your phone to be listed as a modem under the Network settings. Using your tethered cell phone as a modem doesn't work if you're outside the coverage area, and speeds vary widely depending on your phone and the carrier's service. Data usage is another key issue, and the cost can add up if you browse too enthusiastically. For example, Verizon estimates that a 2GB plan would allow for 1,200 e-mails or 4 hours of streaming video. On a 6GB plan, that increases to 4,000 e-mails or 12 hours of video. Fees for over-usage vary by carrier, but can be steep. Some plans include a separate data allowance for tethering, but most data limits are shared with the phone. - Jupiterimages/Comstock/Getty Images
<urn:uuid:446eecec-4195-42d7-8bac-e50237d72813>
{ "date": "2014-09-01T21:03:46", "dump": "CC-MAIN-2014-35", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535920694.0/warc/CC-MAIN-20140909055349-00486-ip-10-180-136-8.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9191874861717224, "score": 2.828125, "token_count": 610, "url": "http://techchannel.radioshack.com/tether-cell-phone-internet-laptop-1849.html" }
New and older lava flows clustered in the Tvashtar region of Jupiter's moon Io appear as hot spots in a temperature map from NASA's Galileo spacecraft. The multiple hot spots indicate continuing shifts in the location of Tvashtar's eruptions since the region's volcanic activity was first seen in December 1999. The temperature map (top) uses infrared observations made during Galileo's Aug. 6, 2001, flyby of Io. It is shown using landmarks from a February 2000 visible-light image (bottom) that Galileo's camera recorded of the Tvashtar area of bowl-like depressions in Io's northern hemisphere. The temperature map comes from Galileo's near-infrared mapping spectrometer. Tvashtar has been a very active region since December 1999, when Galileo detected a major eruption from the location marked A (See insert image below). The eruption from A was interpreted as a row of lava fountains. When Galileo flew by Io again in February 2000, the eruption had shifted to the location marked B, where a lava flow shaped like a dolphin's tail is seen. The temperature map shows that volcanic activity is present at many locations in this region. The highest temperatures are found in the three locations marked x, where new lavas may have recently come to the surface. Temperatures (in Kelvin) displayed in the color bar are lower limits. (The range in Fahrenheit is from 460 degrees below zero to 530 degrees above zero.) Each picture element averages the characteristics of an area about 2 kilometers (1.2 miles) across; smaller patches may be hundreds of degrees higher. The Galileo camera did not obtain a visible-light image of the Tvashtar region during the August 2001 flyby. Based on the locations of the hottest materials detected by Galileo's near-infrared mapping spectrometer, volcanologists expect that significant surface changes have occurred. |tiff File||jpeg File|
<urn:uuid:5bdc9b63-0211-4545-93b1-bbd852440956>
{ "date": "2016-07-31T05:29:40", "dump": "CC-MAIN-2016-30", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469258950570.93/warc/CC-MAIN-20160723072910-00037-ip-10-185-27-174.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9430422186851501, "score": 3.40625, "token_count": 392, "url": "http://www.jpl.nasa.gov/spaceimages/details.php?id=PIA02594" }
Simple Definition of area : a part or section within a larger place : a section of space within a building, room, etc. : a part of the surface of something (such as a person's body or a piece of cloth) Full Definition of area 1 : a level piece of ground 3 : the scope of a concept, operation, or activity : field <the whole area of foreign policy> 4 : areaway 5 : a particular extent of space or surface or one serving a special function: as a : a part of the surface of the body b : a geographic region 6 : a part of the cerebral cortex having a particular function arealplay \-ē-əl\ adjective areallyplay \-ə-lē\ adverb Examples of area in a sentence Settlers came to this area from the east. The group visited the area during a hunting trip. in the area surrounding the lake The storm caused damage in many areas along the coast. a bird found only in remote areas of the U.S. in many areas of the world He is the metropolitan area's most popular politician. He lived in an unfashionable area of the city. She set aside a work area in the kitchen. The dining area has extra windows. Origin and Etymology of area Latin, open space, threshing floor; perhaps akin to Latin arēre to be dry — more at arid First Known Use: 1538 AREA Defined for Kids Seen and Heard What made you want to look up area? Please tell us where you read or heard it (including the quote, if possible).
<urn:uuid:f60bd4ae-999a-43b4-975a-9faf59ab9538>
{ "date": "2016-10-27T13:08:21", "dump": "CC-MAIN-2016-44", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721278.88/warc/CC-MAIN-20161020183841-00129-ip-10-171-6-4.ec2.internal.warc.gz", "int_score": 4, "language": "en", "language_score": 0.8981651067733765, "score": 3.5, "token_count": 356, "url": "http://www.merriam-webster.com/dictionary/areal" }
originality and imagination Areas Where Hume Cronyn is Creative, Unique, Unstable, or Compulsive His childhood or his relationship with his parents was unsettling or unstable in some way, so that Hume Cronyn may have never felt that he was standing on solid ground. One of his parents may have been unusual, eccentric, or an inconstant influence in his life. Abrupt changes in location or in family relationships may have made Hume feel insecure, but positively - he was given more freedom and less pressure to conform to conventions, which enables Hume Cronyn to be more of an individual and less tethered to restrictive ideas of how one "should" behave, feel, or live. Cronyn is a very idealistic person, and he wants to see his ideals, hopes, and dreams made concrete and real in the everyday world. Hume Cronyn is driven to put his ideals into action. When young, Hume Cronyn may be rather aimless or confused about his place in the world. In early adult life, he is likely to struggle to find ways to express his imagination, fantasies, and ideals in his career. Work that involves compassionate service (such as medicine or the ministry) may be Hume's calling. If Hume Cronyn lacks personal integrity and honesty, he quickly goes to the opposite extreme and can con others through dishonesty and trickery. Music, art, film-making or entertainment are also areas in which Cronyn is well-suited. Hume has strong philosophical views and there are times in his life when Cronyn passionately crusades for a cause that he deem noble and of utmost importance. Although his intentions are good, Hume Cronyn is not as objective as he thinks he is, and his views are more colored by personal experiences and concerns than he realizes. Nevertheless, Hume can also be instrumental in bringing about positive change if he can avoid being dogmatic. Also, Hume Cronyn may radically change or revise his own personal beliefs - even his most cherished convictions - many times during his life. He is optimistic, confident and enterprising and is able to enchant others with constantly changing ideas. Hume Cronyn has a progressive attitude and he enjoys anything new and different. Cronyn opens up to others easily and may surprise them with occasional outbursts of gaiety. Hume may have a hard time making up his mind and he may try many vocations before settling down to one that brings the rewards that he anticipates. Because he is easily disappointed, Cronyn tends to give up on his relationships and withdraw, and to dodge responsibility. His amorous feelings are likely to be very intense and Hume tends to prove his love for others through exaggerated gestures. Hume Cronyn feels very powerful and irreplaceable and has a tendency to become obsessed by someone or to force his partner to love him. Hume Cronyn tends to occupy himself with unusual or special problems and has the persistence and tenacity to follow through. But Hume is likely to brood over his destiny and may have had a difficult time developing his personality. Astrological factors in this Astro Profile section: Uranus in 4th house Neptune in 10th house Pluto in 9th house Uranus Conjunct Moon/Jupiter Neptune Conjunct Sun/MC Pluto Conjunct Moon/Venus Pluto Conjunct Mercury/Saturn
<urn:uuid:0270f033-0ea0-4df0-8921-79c465dfa866>
{ "date": "2018-06-19T06:47:45", "dump": "CC-MAIN-2018-26", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267861980.33/warc/CC-MAIN-20180619060647-20180619080647-00176.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9788913130760193, "score": 2.6875, "token_count": 691, "url": "http://famous-relationships.topsynergy.com/Hume_Cronyn/Creativity.asp" }
Diagnosis and Reporting of HIV and AIDS in States with Integrated HIV and AIDS Surveillance April 24, 1998 Recent reports based on acquired immunodeficiency syndrome (AIDS) surveillance data have highlighted substantial declines in AIDS incidence and deaths. As a result of improvements in treatment and care of persons infected with human immunodeficiency virus (HIV), surveillance of AIDS alone no longer accurately reflects the magnitude or direction of the epidemic.1 Current public health and clinical recommendations promote early diagnosis and treatment of HIV disease.2 Data on persons in whom HIV infection is diagnosed before AIDS is diagnosed are needed to determine populations in need of prevention and treatment services. This report examines data for persons aged >13 years in whom HIV infection was diagnosed in 25 states that conducted name-based HIV surveillance in addition to AIDS surveillance during January 1994-June 1997.* Provisional data indicate that declines in AIDS incidence in these states were not accompanied by comparable declines in the number of newly diagnosed HIV cases. In late 1993, the states included in this analysis merged data from the name-based HIV and AIDS case reporting systems into an integrated HIV/AIDS surveillance system. Patient and provider names were deleted before states forwarded data to CDC and replaced by codes. Cases were divided into two mutually exclusive categories: persons in whom HIV infection was diagnosed (without an AIDS diagnosis) and persons in whom HIV infection was diagnosed only when they first had AIDS diagnosed. Data for persons aged >13 years were analyzed by the earliest date of diagnosis of HIV or AIDS for January 1994-June 1997. Quarterly trends in the number of persons whose initial diagnosis was HIV infection were compared with quarterly trends in the number of persons whose initial diagnosis was AIDS. HIV and AIDS data were adjusted for delays in reporting of cases and deaths.3 From January 1994 through June 1997, HIV or AIDS was diagnosed in 72,905 persons aged >13 years in the 25 states. Of these, HIV infection was the initial diagnosis in 52, 690 (72%) and AIDS was the initial diagnosis in 20, 215 (28%) (Table 1). From 1995 to 1996, the number of persons in whom HIV infection was the initial diagnosis declined 2%, and the number of persons in whom AIDS was the initial diagnosis declined 9%. Of 52, 690 persons in whom HIV infection was the initial diagnosis, 28% were women, 57% were non-Hispanic blacks, and 18% were infected through heterosexual contact (Table 2). Among selected demographic groups, the number of persons in whom HIV infection was the initial diagnosis during 1995 compared with 1996 declined 3% among men (from 10, 762 to 10, 395) but increased 3% among women (from 4126 to 4253). The number of persons in whom HIV infection was the initial diagnosis increased 10% among Hispanics (from 971 to 1070) and decreased 3% among non-Hispanic blacks (from 8569 to 8300) and 2% among non-Hispanic whites (from 5093 to 4966). Men who have sex with men (MSM) accounted for the largest proportion of the HIV diagnoses (32%). Analysis of trends by risk/exposure category is complicated by the high proportion of HIV cases with unreported risk (28%). Of 52, 690 persons in whom HIV infection was the initial diagnosis, 7200 (14%) were aged 13-24 years. The number of HIV diagnoses per quarter-year was approximately constant in this age group, declining 4% from 1995 to 1996 (from 2066 to 1991) (Figure 1). Of persons in this age group, 3203 (44%) were female, 4566 (63%) were non-Hispanic black, and 394 (5%) were Hispanic; by risk category, 2270 (31%) were MSM, 1886 (26%) acquired HIV through heterosexual contact, and 449 (6%) were injecting-drug users; 1074 (15%) had AIDS subsequently diagnosed. An additional 653 persons aged 13-24 years had AIDS initially diagnosed. Reported by: State and local health departments; Div of HIV/AIDS Prevention -- Surveillance, and Epidemiology, National Center for HIV, STD, and TB Prevention, CDC. *Alabama, Arizona, Arkansas, Colorado, Idaho, Indiana, Louisiana, Michigan, Minnesota, Mississippi, Missouri, Nevada, New Jersey, North Carolina, North Dakota, Ohio, Oklahoma, South Carolina, South Dakota, Tennessee, Utah, Virginia, West Virginia, Wisconsin, and Wyoming. (Back) The data from these 25 states indicate that from 1994 through mid-1997, the number of persons in whom HIV infection was the initial diagnosis was stable and declines over the entire period were slight. Compared with reported declines in AIDS incidence nationally,1 these data suggest that HIV incidence was relatively stable in these states. In particular, the number of new HIV diagnoses among persons aged 13-24 years probably more closely indicate HIV incidence trends because young persons have more recently initiated high-risk behaviors. HIV surveillance data include persons who were infected more recently than were persons reported with AIDS, and their characteristics indicate more recent trends in HIV transmission. Many of the new HIV diagnoses in these states occurred among blacks, women, young MSM, and persons infected through heterosexual contact with substantial increases observed among Hispanics. The HIV case data from these states reflect the changing demographic and risk profile of an epidemic that disproportionately affects racial/ethnic minorities.1,3 Race/ethnicity is not a risk factor for HIV infection but is likely a marker for other factors that may be predictive of increased risk for HIV infection (e. g., low income, lack of education, and higher rates of injecting and non-injecting drug use).4 Black and Hispanic persons who engage in high-risk sex or drug-using behaviors should be a major focus of HIV-prevention efforts, including strategies to promote knowledge of HIV status through voluntary test seeking and to facilitate entry to care and treatment. Of persons in whom HIV infection was the initial diagnosis, 14% were adolescents and young adults aged 13-24 years, compared with 3% of persons in whom AIDS was the initial diagnosis. This age group is an important target for HIV prevention efforts because a large proportion of all new HIV infections occur among persons in this age group.5 In particular, reduction of high-risk sexual behaviors among adolescent and young adult women and MSM is needed to reduce HIV transmission in this age group. In the 25 states, declines in the number of cases were larger among persons in whom AIDS was the initial diagnosis than among those in whom HIV infection was the initial diagnosis. Most persons with HIV had been tested in a medical facility or other clinical-care setting and had had an opportunity for early treatment interventions to delay HIV-related morbidity and mortality, contributing to declines in AIDS incidence.6 In the future, AIDS surveillance data will increasingly reflect access to testing and response to therapy in the population. Approximately one fourth of all new diagnoses in these states occurred among persons who had already developed AIDS when HIV infection was first diagnosed. AIDS surveillance data should be used to target underserved populations for early testing and prompt referrals for treatment. HIV and AIDS surveillance data mostly reflect the characteristics of persons tested in medical care and other confidential settings. These data may not represent the characteristics of all persons with HIV infection because persons tested anonymously are not reported to the surveillance system, and some persons with HIV infection have not been tested. However, approximately 140, 000 persons living with HIV have already been reported and characterized, representing most prevalent infections in these states.7 The degree to which integrated HIV and AIDS surveillance data are representative of all infected persons is expected to increase over time as the proportion of untested persons decreases. The public health usefulness of the HIV surveillance data is affected by the performance of the system of case reporting and follow up.8 In these 25 states, most of which require laboratory-based reporting of HIV-positive test results, HIV reporting was very complete. Only 12% of persons in whom HIV infection was the initial diagnosis had not been reported to CDC as an HIV case before being reported as an AIDS case. CDC estimates that <2% of HIV cases are duplicates based on matching of the national coded surveillance database. CDC has developed methods for estimating the risk distribution for AIDS cases with unreported risk;3 however, similar methods for HIV cases are not yet available. In this report, the proportion of HIV cases by risk/exposure categories is an underestimate until follow up is completed for cases reported without risks.3 Name-based HIV reporting should facilitate epidemiologic follow up to increase the completeness of risk/exposure, clinical, treatment, and other data relevant to effective HIV-prevention community planning. This report highlights the continued need for effective HIV and AIDS prevention programs to reduce rates of HIV transmission and demonstrates the usefulness of integrated HIV and AIDS surveillance data to direct these efforts. State and local areas without such surveillance have limited ability to monitor local changes in HIV infection and disease trends. In these areas, approximately 200, 000 persons have had HIV diagnosed (without AIDS),7 but data are not available to describe trends in new HIV diagnoses. Implementing integrated HIV and AIDS surveillance in these states and local areas is necessary to provide accurate information for targeting resources to populations most affected (e. g., adolescents, women, racial/ethnic minorities, and young MSM) and for evaluating program effectiveness. 1. CDC. Update: trends in AIDS incidence -- United States, 1996. MMWR 1997; 46: 861-7. 2. CDC. Report of the NIH panel to define principles of therapy of HIV infection and guidelines for the use of antiretroviral agents in HIV-infected adults and adolescents. MMWR 1998; 47 (no. RR-5). 3. CDC. HIV/AIDS surveillance report. Atlanta, Georgia: US Department of Health and Human Services, Public Health Service, CDC, 1997; (Vol 9, no. 1). 4. Diaz T, Chu SY, Buehler JW, et al. Socioeconomic differences among people with AIDS: results from a multistate surveillance project. Am J Prev Med 1994; 10: 217-22. 5. Rosenberg PS. Scope of the AIDS epidemic in the United States. Science 1995; 270: 1372-5. 6. Sweeney P, Fleming PL, Ward JW. Characteristics of HIV-infected persons tested in different settings -- where should we focus testing, counseling, and medical services [Abstract]. New York, New York: American Public Health Association 124th annual meeting and exposition, November 1996. 7. Sweeney PA, Fleming PL, Karon JM, Ward JW. A minimum estimate of the number of living HIV-infected persons confidentially tested in the United States [Abstract I-16]. Toronto, Canada: Interscience Conference on Antimicrobial Agents and Chemotherapy, September 1997. 8. CDC. Evaluation of HIV case surveillance through the use of non-name unique identifiers -- Maryland and Texas, 1994-1996. MMWR 1998; 46: 1254-8,1271. HIV Testing Among Populations at Risk for HIV Infection -- Nine States, November 1995 - December 1996 This article was provided by U.S. Centers for Disease Control and Prevention. It is a part of the publication Morbidity and Mortality Weekly Report. Visit the CDC's website to find out more about their activities, publications and services.
<urn:uuid:f94accbf-7c14-4b63-bfa9-451f584069d0>
{ "date": "2014-09-21T02:50:35", "dump": "CC-MAIN-2014-41", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657134511.2/warc/CC-MAIN-20140914011214-00037-ip-10-234-18-248.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9581971168518066, "score": 2.6875, "token_count": 2328, "url": "http://www.thebody.com/content/art30068.html" }
April 13th, 2003, 05:45 PM Steganography article on SecurityFocus There is a new article on SecurityFocus that provides a pretty good basic introduction and overview into what steganography is and how it works. I am no steganography expert so I can't speak to the validity of this statement: While we are discussing it in terms of computer security, steganography is really nothing new, as it has been around since the times of ancient Rome. For example, in ancient Rome and Greece, text was traditionally written on wax that was poured on top of stone tablets. If the sender of the information wanted to obscure the message - for purposes of military intelligence, for instance - they would use steganography: the wax would be scraped off and the message would be inscribed or written directly on the tablet, wax would then be poured on top of the message, thereby obscuring not just its meaning but its very existence Is that accurate? Are there no tools or techniques currently to detect information hidden using steganography? If so, why? Is it not possible, or has it just not caught on yet? Could this be an area for security firms to jump on as the next big wave in security? Unfortunately, all of the methods mentioned above can also be used to hide illicit, unauthorized or unwanted activity. What can you do to prevent or detect issues with stego? There is no easy answer. If someone has decided to hide their data, they will probably be able to do so fairly easily. The only way to detect steganography is to be actively looking for in specific files, or to get very lucky. The article also has some links to other steganography information. April 13th, 2003, 06:37 PM There are tools on the net that can examine certain files, but basically in order to search for the hidden data you would need an original copy of all the files, then files that are suspected of containing hidden data, not sure if you noticed or not, but those pictures he showed, the one with data hidden in it was 2,000 bytes larger than the original picture, so basically all your doing is comparing an original file size with a suspected altered file size. Mafia = Organized Crime Government = Unorganized Crime April 13th, 2003, 06:45 PM Thanx for the info. It was very interresting. Good job. April 13th, 2003, 08:05 PM Using a good steganography algorithm *and* a reliable source of noise in the original data, you can make it impossible to detect. Image files aren't that good - they aren't very random, and are often compressed using lossy compression. WAV files are ideal - 16bit WAV files recorded of *analogue* media (Don't rip CDs) - for instance with an FM tuner card have more than enough noise in to hide 4 bits of covert data per 16 bits of sound. Also they are usually nice and big. So record your favourite radio programme from an FM tuner card, and stick your steganographically encrypted stuff in there, with a 4:1 ratio. Assuming there aren't other weaknesses in your system (that is a BIG) assumption, it is then very difficult to prove that the file contains anything other than radio programme. It is important that the file is *never* copied. It is important that it comes from an analogue source. Backing up these encrypted data is an issue, because making a copy of the WAV file won't do. Each and every time you back it up, you must record a new WAV file, and copy the data in there in the same way, and back this new file up, immediately securely deleteing the original afterwards. In countries like the UK with the RIP act, you also have to take draconian steps to justify the presence of encryption software on your machine, for instance by being prepared to give up the key to a decoy encrypted volume with legitimate data in, if your adversary is the state (or state sponsored)
<urn:uuid:ca2da8a3-381a-4ba1-a966-d887ba49c8ae>
{ "date": "2014-04-18T12:45:33", "dump": "CC-MAIN-2014-15", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609533308.11/warc/CC-MAIN-20140416005213-00395-ip-10-147-4-33.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9546045660972595, "score": 2.59375, "token_count": 844, "url": "http://www.antionline.com/showthread.php?240817-Steganography-article-on-SecurityFocus&p=620295&viewfull=1" }
hi Joe, it's very simple just divide ur number with 16 (if it is hex), with 8 (if it is oct). And get the remainder of it. Example n is ur number, n = 16 n/16 it will give u 1 and remainder will be 0 so the number is 10. n/8 it will give u 2 and remainder of course will be 0 so the number would be 20. I hope this will help u in understanding. Given a value 259, here are the steps required to convert it to a hexadecimal value of 0x103? Here is my steps (maybe someone has something better) Step 1: Take a given value and divide it by the radix value you want to convert it to, the radix for hex is base 16. Step 2: Take the remainer from step 1 and multiply it by the radix, this will be your next right most digit. Step 3: Take the integral (whole) value and do step 1 until no more intergral value is left. Steps to convert 259 to hex value a. 259 / 16 = 16.1875 remainer is 0.1875 for step b integral is 16 for step c b. 1st right most digit = 16 * 0.1875 = 3 c. 16 / 16 = 1.0 remainer is 0 for step d integral is 1 for step e d. 2nd right most digit = 16 * 0 = 0 e. 3rd digit = 1 So 259 = 0x103 [ February 18, 2002: Message edited by: Rajinder Yadav ] <a href="http://www.rajindery.com" target="_blank" rel="nofollow">Rajinder Yadav</a><p>Each problem that I solved became a rule which served afterwards to solve other problems. --Rene Descartes Rajinder, this is a nice solution but allow me to doubt that during the exam one will be willing to perform all those computations. Moreover, your solution does not show how to manipulate bits and this is a very important topic for the purpose of the certification when dealing with shift operators and the like. A much more elegant solution that all computer scientists, programmers and students should know at the very beginning is to be able to decompose any number in powers of 2. And from there on you can do everything. I take 259 to show you how easy it is. 1. write the powers of two from the right to the left on a piece of paper, that is 2 power 0, 2 power 1, 2 power 2, and so on: 256 128 64 32 8 4 2 1 2. Decompose your number into those numbers, that is, try to find all powers of two that you can add together and get 259 (there is only one solution). You write a 1 under each number you choose and a 0 under each other number. Easy: 256 128 64 32 16 8 4 2 1 1 0 0 0 0 0 0 1 1 That is 256+2+1 = 259. 100000011 is your binary representation of 259. From there on you can do two things, either convert to hexadecimal (radix 16) or to octal (radix 8). 3. If you want ot convert to hexadecimal, group your binary sequence by groups of 4 bits (because the biggest value a group of 4 bits can have is 15) beginning on the right side and pad the incomplete group on the left with 0's, like this: 0001 0000 0011 Then you just have to take one binary group after another and convert its value to hexadecimal (values range form 0 to F). So we have 103 which we write 0x103 to signify that the number is in hexadecimal and that's it... 4. If you want ot convert to octal, group your binary sequence by groups of 3 bits (because the biggest value a group of 3 bits can have is 7) beginning on the right side and pad the incomplete group on the left with 0's, like this: 100 000 011 Then you just have to take one binary group after another and convert its value to its octal equivalent (values range from 0 to 7). So we have 403 which we write 0403 to signify that the number is in octal and that's it... So 259 in decimal is - 100000011 in binary - 0x103 in hexadecimal - 0403 in octal You must have noticed by now that the latter three are tightly coupled. Do learn this technique because it is very important to know it. If you want more information, please read the following link Javaranch:Cat and Mouse Games with Bits or do a search in this forum. [ February 18, 2002: Message edited by: Valentin Crettaz ] [ February 18, 2002: Message edited by: Valentin Crettaz ] Another mathematical approach (which is much like Rajinder's although somewhat more straight-forward) you can use is to constantly divide the value you'd like to convert by your base (2 for binary, 8 for octal, 16 for hexadecimal, and so on) until the value reaches 0. When you're done, just look at the remainders and the converted number is laid out for you. Here, I convert 159 to binary: Now, look back at the remainders and list them in reverse order that you obtained them, in this case: 10011111 This value is 159 in binary. You can then use Val's technique to quickly convert from binary to octal or hexadecimal. You can, however, use this technique to directly convert to octal or hexadecimal, if you'd like, by dividing by 8 or 16. For large numbers, however, I find it easier to convert to binary and then go from there because converting from binary to octal or hexadecimal is very quick and easy. Corey Thank you Peter, yes it was a typo, actually 2 typos . I've corrected them. Thank you again. Joined: Jan 18, 2002 Definitly using Corey divide by 2 and Valentin binary grouping seems to be the best way to decompose a number...thanks guys Joined: Feb 17, 2002 Thanks guys! I really appreciate your help.. Now i know how to convert from Decimal ->Octal -> Hex. What if they give a Hex number and ask me to convert it to Oct or Dec? Can you show me how to do it the other way around? Just make a chart like this Hex-Binary 0-0000 1-0001 2-0010 . . 9-1001 A-1010 B-1011 C-1100 D-1101 E-1110 F-1111 So, if you get the hex number 0xEF then the binary number is 1110 1111. So the decimal value is 128+64+32+0+8+4+2+1=239 For octal chart is like this Octal-Binary 0-000 1-001 2-010 . . . 7-111 So, if you get octal number 45 then the binary number is 100 101. Decimal value is 32+0+0+4+0+1=37 I think it will help you. -----------------<br />IBM XML Developer <br />SCJP 1.4 Joined: Feb 18, 2002 For Hex to octal convertion first convert it into binary then to octal like this. Suppose you have 0xFE Then binary is 1111 1110 If you split it by taking 3 bit in a group form right side then 011 111 110 3 7 6 So, the octal number is 376 From octal to hexadecimal conversion can be done in the similar way. Joined: Feb 17, 2002 Cool.. I got it! Thanks for your help. subject: number converstion between(decimal, octal, Hex)
<urn:uuid:cc359258-4ef0-4ff6-a9b4-0bfeb88c9700>
{ "date": "2015-05-29T04:49:29", "dump": "CC-MAIN-2015-22", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207929869.17/warc/CC-MAIN-20150521113209-00144-ip-10-180-206-219.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9044158458709717, "score": 2.5625, "token_count": 1651, "url": "http://www.coderanch.com/t/236800/java-programmer-SCJP/certification/number-converstion-decimal-octal-Hex" }
|Jmol-3D images||Image 1| |Molar mass||303.91 g/mol| |Appearance||pale yellow crystals| |Melting point||435 °C (815 °F; 708 K) (anhydrous) 81.5 °C (178.7 °F; 354.6 K) (decahydrate) (decomposes) |Solubility in water||10.2 g/100 mL (10 °C) 17.6 g/100 mL (20 °C) 39.7 g/100 mL (96.6 °C) |Refractive index (nD)||1.530| |S-phrases||S22 S24 S25| |Other anions||Sodium ferricyanide (Red prussiate of soda)| |Except where noted otherwise, data are given for materials in their standard state (at 25 °C (77 °F), 100 kPa)| |(what is: / ?)| Sodium ferrocyanide is the sodium salt of the coordination compound of formula [Fe(CN)6]4-. It is a yellow crystalline solid that is soluble in water and insoluble in alcohol. Despite the presence of the cyanide ligands, sodium ferrocyanide is not especially toxic (acceptable daily intake 0–0.025 mg/kg body weight) because the cyanides are tightly bound to the metal. However, like all ferrocyanide salt solutions, addition of an acid (a hydrogen donor) can result in the production of cyanide gas (HCN), which is toxic. In its hydrous form, Na4Fe(CN)6·10H2O (sodium ferrocyanide decahydrate), it is sometimes known as yellow prussiate of soda. The yellow color is the color of ferrocyanide anion. Sodium ferrocyanide is a chemical additive known as E 535 in the EU. It is added to road and food grade salt as an anticaking agent. When combined with iron, it converts to a deep blue pigment called Prussian blue. In photography, it is used for bleaching, toning, and fixing. It is used as a stabilizer for the coating on welding rods. In the petroleum industry, it is used for removal of mercaptans. Sodium ferrocyanide is produced industrially from hydrogen cyanide, ferrous chloride, and calcium hydroxide, the combination of which affords Ca2[Fe(CN)6].11H2O. A solution of this salt is then treated with sodium salts to precipitate the mixed calcium-sodium salt CaNa2[Fe(CN)6], which in turn is treated with sodium carbonate to give the tetrasodium salt. - Sodium ferrocyanide MSDS - "Toxicological evaluation of some food additives including anticaking agents, antimicrobials, antioxidants, emulsifiers and thickening agents". World Health Organization, Geneva. 1974. Retrieved 18 May 2009. - "Prussian blue". Encyclopædia Britannica. Retrieved 18 May 2009. - Gail, E.; Gos, S.; Kulzer, R.; Lorösch, J.; Rubo, A.; Sauer, M.; Kellens, R.; Reddy, J.; Steier, N.; Hasenpusch, W. (2011). "Cyano Compounds, Inorganic". Ullmann's Encyclopedia in Industrial Chemistry. Weinheim: Wiley-VCH. doi:10.1002/14356007.a08_159.pub3. |This Toxicology-related article is a stub. You can help Wikipedia by expanding it.|
<urn:uuid:529dbbe7-8525-49b9-9cbb-15006c09129b>
{ "date": "2014-10-25T11:59:50", "dump": "CC-MAIN-2014-42", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414119648148.32/warc/CC-MAIN-20141024030048-00165-ip-10-16-133-185.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.768506646156311, "score": 3.125, "token_count": 802, "url": "http://en.wikipedia.org/wiki/Sodium_ferrocyanide" }
Podcast: The ABCs of State Budgets February 9, 2010 In this podcast we will discuss the ABCs of state budgets, and the problems that many states face today because of the recession. I’m Shannon Spillane and I’m joined by the Deputy Director of the Center’s State Fiscal Project, Jon Shure. 1. Jon, let’s start by talking about the state budget calendar. States are now in fiscal year 2010. Tell me what is a “fiscal year” and when do states’ fiscal years begin? Sure, Shannon. “Fiscal year” is the technical term for the period covered by a budget. In most states the fiscal year goes from July first to the following June 30th. But a few states are exceptions. New York starts its fiscal year April 1st, Texas September 1st, and Michigan and Alabama October 1st. 2. How does the budget process get started? The budget process starts well before the fiscal year begins – typically when governors issue their budget proposal. The state’s laws or constitution usually set a deadline for the governor to release a budget proposal in January or February. 3. Jon, what happens next in the budget process? A state’s budget can’t take effect until the legislature approves it and the governor signs it. Some legislatures have more authority to change the budget than others. 4. What is the largest part of most states’ budgets? The largest, most important part of most budgets is the general fund, also called the operating budget. Typically this is where the lion’s share of general tax revenues (like sales and income taxes) go. The general fund pays for most state spending on education, health care, public safety, and other areas. In fact, over half of what states spend, on average, goes to education and health care. 5. What are the major sources of revenue in most states? State taxes are the major source of revenue -- made up mainly of personal and corporate income taxes as well as general sales taxes. Most states have income and sales taxes. Also, about a quarter of state funds come from the federal government. 6. Are states required to balance their budgets? Yes, they are. Unlike the federal government, every state (except Vermont) is required by its laws or constitution to balance the operating budget. They can’t spend any more than they take in; and they can’t borrow to pay for ongoing operating expenses. States can borrow for capital expenses, like new roads and buildings. They do this by selling bonds to investors, which states then repay with interest. 7. So if states have to balance their budgets, what does it mean when a state has a “budget shortfall” or a “projected deficit”? The spending in the budget each state passes has to match the amount of revenue the state expects to collect in the coming fiscal year. If the amount of money a state takes in from revenue is less than what the state needs for ongoing services and existing obligations for the year, the state faces a budget shortfall or a projected deficit. They might see a shortfall even before the fiscal year starts because expected revenues won’t cover needs. Or, as revenues come in below what the state estimated, they can have a “mid-year shortfall” or “mid-year deficit” for that year. 8. Jon, how do states handle a shortfall? Unfortunately, lots of states have shortfalls right now because of the recession. They re-balance their budgets through steps like using reserve funds, cutting spending, and increasing revenues. What states should do -- and many are doing -- is take a balanced approach that includes revenues, and not rely on spending cuts alone. Too much reliance on cuts hurts families who need help and damages the state’s economy. 9. Some people say that states got into this trouble because they are spending too much. Is that the case? It’s important to point out that states’ shortfalls are overwhelmingly due to declining revenues, not excessive spending or mismanagement. In fact, total state spending even before this recession started was smaller as a share of the economy than it was in 2001 – and it’s fallen even more since then. Thanks for joining me, Jon.
<urn:uuid:ac5c0100-fca8-4ef5-b3b1-8b06240bcfee>
{ "date": "2017-05-28T22:10:37", "dump": "CC-MAIN-2017-22", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463611569.86/warc/CC-MAIN-20170528220125-20170529000125-00020.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9575364589691162, "score": 2.765625, "token_count": 910, "url": "http://www.cbpp.org/research/podcast-the-abcs-of-state-budgets?fa=view&id=3079" }
The History of the Refrigerator: The Cold Truth and Hard Facts by Marjorie Dorfman (Q.) How do you thaw a frozen turkey? (A.) Blow in its ear. Johnny Carson Who invented the refrigerator and what was everybody doing before that to keep food cold? Read on for some chilling answers; that is, if you dare to break the ice. Eugene ONeils iceman was from another day and age, but the cutting and storage of ice goes back much further to 1,000 BC, in China. Before that time, snow, ice, cool streams, springs, caves and cellars were used to refrigerate food. The first cellars were holes dug into the ground that were lined with wood or straw and packed with snow and ice. Around 500 BC, the Egyptians made ice on cold nights by setting water out in earthenware pots that were kept wet. At some point in history, perhaps in the 14th century in China and the seventeenth century in Italy, it was discovered that the evaporation of brine (salt water) absorbed heat and therefore a container placed in brine would stay cold. (Although no one can say for sure, this may have occurred after the man who invented the recipe for ice cubes died and took his secret formula to the grave). Refrigeration is the process of removing heat from an enclosed space or from a substance. A refrigerator uses the evaporation of a liquid to absorb heat. The liquid (or refrigerant) utilized for this purpose evaporates at an extremely low temperature, creating freezing conditions inside the machine. The process is based on a fundamental law in physics (which is about as clear to this author as mud). For those who can wade well, it all boils down to the fact that a liquid is rapidly vaporized through a process known as compression. Cooling is created by the rapid expansion of gasses. In 18th century England, servants collected ice in the winter and put it in "ice houses," where the sheets of ice were packed in salt, wrapped in strips of flannel, and stored underground to keep them frozen until summer. In 1748, Dr. William Cullen, whose studies at the University of Glasgow dealt with the evaporation of liquids in a vacuum, became the first person to demonstrate the principle of artificial refrigeration. He did not, however, do anything about it other than demonstrating it and both food and people remained unchilled for some time to come. During the nineteenth century, numerous experimental devices were developed in an effort to achieve artificial refrigeration. An American inventor, Oliver Evans, designed the first refrigeration machine in 1805. In 1834 Jacob Perkins, created the very first practical refrigerator by utilizing ether in a vapor compression cycle. His machine did not evoke a great deal of interest at the time as there was already a well established natural ice industry that was big business in the United States. His design was later adapted in 1844 by an American physician, John Gorrie, who used it in Florida to cool the air for yellow fever patients. In 1876, German engineer Karl Von Linden patented the process for liquefying gas, which is an integral part of refrigeration technology. He built the first compressor refrigerator machine in Munich in 1873, which originally used very explosive methyl ether. In 1876, he changed to an ammonia cycle. The concept of refrigeration was "hot" and rapidly expanding into other American industries. In 1877, Ferdinand Carre designed a system whereby liquids such as ammonia were circulated by a compressor around the container to keep it cold. While refining his invention, in that same year he created a machine for The Paraguay, the worlds first refrigerated ship, which was used to transport frozen meat from Argentina to France. Although Carres machine was the first of its kind to be applied commercially, it proved to be ineffective in meeting the needs of the shippers who wished to transport perishables. In 1874, Raoul Picxtet of Switzerland designed a similar compressor system, utilizing sulfur dioxide instead of ammonia as the refrigerant. This same technique was later adapted to create the worlds first artificial skating rink in London. In England at the beginning of the nineteenth century, "ice boxes" were becoming the vogue in restaurants and in homes. Wooden boxes lined with tin or zinc and insulated with various materials such as cork, sawdust and seaweed were used to hold blocks of ice and "refrigerate" food. A drip pan collected the melted water and it had to be emptied daily. There was usually an insulated compartment for ice and another for food. The ice was replaced periodically by purchasing blocks from that old, cool guy mentioned earlier, the "iceman", whose wagon was a common sight on the streets of towns and cities. Warm winters in 1889 and 1890 created severe shortages of natural ice in the United States. This prompted the use of mechanical refrigeration for the freezing and storage of fish and in the burgeoning brewing, dairy and meat packing industries. Commercial refrigeration techniques were also applied to railroad cars, "coolers" in grocery stores and in manufacturing. By 1890, the United States was exporting 25 million tons of ice. Refrigerators from the late 1800s until 1929 used toxic gasses (methyl chloride and sulfur dioxide) as refrigerants. Several fatal accidents occurred in the 1920s when the methyl chloride leaked, causing three American corporations to fund research and develop a less dangerous method. Their efforts led to the discovery of Freon. Over the course of just a few years, compressor refrigerators using Freon became the standard for almost all home kitchens. Several machines appeared almost simultaneously on the frigid scene. General Electric unveiled one of the earliest refrigerators in 1911, which was actually designed by a French monk. The Dormier was manufactured in Chicago in 1913 and it was the first "non ice box" designed for home use. Frigidaire introduced the Guardian Frigerator, a self contained machine developed by Alfred Mellowes in 1915. It was assembled in a wash house in a backyard in Fort Wayne, Indiana. General Motors Corporation purchased this refrigerator in 1918 and the name was changed to Frigidaire. In that same year, Kelvinator marketed its own practical home refrigerator and everyone and their food were quickly getting cooler by the day. Kelvinator began in 1881 as The Leonard Refrigerator Company. The company grew to be a leader in wooden icebox cabinets and in 1914 developed its first household mechanical refrigerators under the name of the Electro-Automatic Refrigerating Company. In 1918, it introduced the first refrigerator with any type of automatic control. In 1920 their production numbers went from two dozen to more than two hundred. Compressors were generally driven by belts attached to motors located in the basement or in an adjoining room. The company changed its name to Kelvinator soon after (to protect the cold as well as the innocent), and by 1923 held 80% of the market for electric refrigerators. Gibson, Electrolux and General Electric all left their own distinctive marks on the refrigerator industry. Gibson, then owned by Frank Gibson (surprise!)goes back to the days of yesteryear when cabinets for iceboxes were handcrafted. In 1932, the company manufactured its own unique line of refrigerators. In 1930, Electrolux launched the first built-in refrigerator. It was the perfect prototype for the kitchenette in the small, modern apartments of the time. The following year they began production on their vacuum cleaner and the very first air-cooled refrigerator in Old Greenwich, Connecticut. (Must have been some cool, clean place!) In 1939, in response to consumers storing more and more frozen foods, General Electric introduced into mass production the familiar dual temperature refrigerator, which contained one section for frozen food and a second for chilled food. Technological advances created many alterations to the refrigerator industry during the 1950s and 60s. Innovations such as automatic defrost and automatic icemakers first appeared. (Both the old iceman and that guy with the recipe for ice cubes must have rolled over in their graves at this point.) In the 1970s the environment became a top priority to American scientists. This concern led to more energy-efficient refrigerators and the elimination of dangerous carbons in their systems. Today, the refrigerator is Americas most used appliance and is found in more than 99.5% of American homes. So the next time you open your refrigerator door, do so with renewed respect and say, "thank you for keeping my food cold." You never know who may be listening and who might decide to take it all back, leaving you with one soggy collection of eggs, cheese, meats, vegetables and leftover take-out with no particular place to go. Did you know . . .
<urn:uuid:3789b6b9-3c2c-4881-97e5-5188005da0a2>
{ "date": "2017-11-25T03:34:55", "dump": "CC-MAIN-2017-47", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934809392.94/warc/CC-MAIN-20171125032456-20171125052456-00056.warc.gz", "int_score": 3, "language": "en", "language_score": 0.972934365272522, "score": 3.328125, "token_count": 1807, "url": "http://www.housenotsobeautiful.com/Articles/icebox_p.html" }
Don’t pooh-pooh this: Studies show baby poop could be good for your health. Scientists at Wake Forest School of Medicine have developed a “probiotic cocktail” derived from gut bacteria strains found in baby feces that could be used to bolster gut health and immune- system function. “What we found is bacteria isolated in baby poop produce higher amounts of short-chain fatty acids,” said the study’s lead investigator, Hariom Yadav. “That could help people with … diabetes, obesity, cancers, autoimmune diseases and older people.” Increasing short-chain fatty acids — the main source of energy for the cells lining your colon — may be helpful in maintaining or restoring a normal gut environment, especially in people who are compromised by disease or age, he said. Babies’ feces was selected for the study because babies are untouched by age-related diseases. “Adults do also have the good bacteria, but the babies’ microbiomes — the bacteria in their gut — is much healthier than in older people,” said Yadav, an assistant professor of molecular medicine at Wake Forest School of Medicine. The study, published Thursday, examined the ability of human-origin probiotics to improve gut health. Probiotics — commonly found in yogurt and other fermented foods — are live bacteria and yeasts that keep your gut healthy, he said. While the “probiotic cocktail” is not ready yet for human consumption, it has tested positively on mice in studies. “Some probiotics already in the market are derived from soil, fermented foods, pickles,” he said. “But most probiotics should be from human origin if they’re going back into the human.” Yadav’s team collected fecal samples from the diapers of 34 healthy infants and selected the 10 best probiotic strains out of the 321 analyzed. Mice were given a single dose, as well as five consecutive doses, of the 10-strain probiotic cocktail. Researchers found it enhanced the production of the good-for-your-gut fatty acids in the mice. The next step is to test the probiotic cocktail on unhealthy mice to determine the effects, he said, and then on primates. One day, the identified probiotic strains could be put into yogurt, powders or capsules for human use. “One thing to definitely emphasize is that, although we isolated good bacteria from baby poop, nothing related to the poop is coming with the bacteria,” Yadav said. “That’s the origin, but it’s been extensively purified. We’re not recommending putting baby poop in things.”
<urn:uuid:038399d7-dc14-4cd6-ad99-bc5b6b84f172>
{ "date": "2019-09-20T08:03:13", "dump": "CC-MAIN-2019-39", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573908.70/warc/CC-MAIN-20190920071824-20190920093824-00016.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9422585964202881, "score": 3.21875, "token_count": 574, "url": "https://www.journalnow.com/news/local/baby-poop-as-part-of-probiotic-cocktail-could-prove-good/article_ce294f76-b3ae-5eb6-82e3-6a35041785ec.html" }
Autism is a neurological disorder that affects three crucial areas of development: communication, social interaction, and creative play. It's not a death sentence. Instead, parents say it’s more about refocusing goals you have for your child. Autism is being called an epidemic. Currently one in 160 children is diagnosed, and four out of five of them are boys. What causes the condition depends on who you ask; genetics, the environment, even immunizations have been researched as possible factors. To see five year old Ryan Dent playing with his family, you would never know there was anything wrong, but three years ago, that wasn't the case. The younger of twins, Ryan had learned to both walk and talk before his sister Kristen, but at around 18 months his speech turned to gibberish. Ryan was put in six different therapies a week. The therapies focused on developing his speech, his motor skills, and his social interaction. Overstimulation can be a big issue for autistic kids. Trips to restaurants or stores are extremely trying, and people don't always understand the underlying reason for the behavior problems. Ryan recently tested out of speech therapy, has blossomed since starting kung fu last year and will be in a regular kindergarten classroom in the fall. Another key to survival is a strong support system, whether it's family or a support group. The Allen County Autism Support Group has been in operation since the beginning of this year. For those interested in the autism support group or just want to discuss the topic, you can contact Debbie Meador at 270-237-4473. To find other support groups in the area....log onto http://www.ket.org/kidshealth/development/pdf/autism_support_groups.pdf
<urn:uuid:cb702d9a-d786-427c-839f-95316c8cfcb7>
{ "date": "2013-12-12T14:26:43", "dump": "CC-MAIN-2013-48", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164611566/warc/CC-MAIN-20131204134331-00002-ip-10-33-133-15.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9755483269691467, "score": 3.078125, "token_count": 367, "url": "http://www.wbko.com/home/headlines/2733311.html" }
BERLIN — Who is buried in Friedrich Schiller's tomb? Several people, apparently, but none of them the famous poet and playwright, according to new research. After two years of painstaking DNA research, experts have determined that none of the remains billed as those of Schiller belong to the German writer, who died in Weimar in 1805, Germany's MDR television reported. The study, dubbed "The Friedrich Schiller Code," was undertaken by the television station, the Foundation of Weimar Classics and an international team of scientists. "Two years ago I was certain that we would prove that it was him; now we have proved the opposite," said foundation president Hellmut Seemann, whose organization oversees the Schiller archives and exhibitions. He spoke on an MDR documentary about the study that was broadcast Saturday night, before of the official release of the results on Monday. "But the most important thing is, and I said it at the time: We should have no fear of wanting to know what we can about the Schiller remains," he added. "And I am now happy that it is a clear result." The DNA results add another chapter to a mystery that dates back to 1826, just 21 years after Schiller died, when it was decided that he needed a new resting place. Schiller's remains had been interred in a mausoleum in Weimar's Jacobs cemetery that the state kept for distinguished citizens. But the remains were mixed with others, and when a total of 23 skulls were found, the city's mayor, Carl Leberecht Schwabe — a Schiller fan — declared that the biggest must have been that of the philosophic writer. A skeleton believed to match the skull was then put together with it, and both were buried in 1827 in the city's Fuerstengruft cemetery. Germany's most revered writer, Johann Wolfgang von Goethe — who was Schiller's friend — was buried in a crypt alongside him in 1832, and today the site is visited by some 60,000 people per year. But in 1911, Schiller researcher August von Froriep unearthed another skull that he said was that of the writer, and later claims emerged about still another skull. According to the DNA results, however, none of the skulls were matches, MDR reported. The researchers used comparison samples taken from the remains of two of Schiller's sisters and two of his sons. The results showed that the original Schiller skull belonged to an unidentified person, and that the "matching" skeleton was actually the bones of several other unidentified people, MDR reported. The other two skulls also did not match, raising a new question: Where's Schiller? Seemann said he thinks that the remains must still be in the original Jacobs cemetery — but added that his organization would not be taking part in any new search for them. © 2013 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.
<urn:uuid:bad53eeb-98c5-453c-b042-6b6a3d1e0eda>
{ "date": "2014-10-22T08:44:14", "dump": "CC-MAIN-2014-42", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507446323.3/warc/CC-MAIN-20141017005726-00360-ip-10-16-133-185.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9808425307273865, "score": 3.390625, "token_count": 620, "url": "http://www.nbcnews.com/id/24453831/" }
Chapter 1 : Network Trends (Page 18.104.22.168~22.214.171.124) Mr.PC管理員Mr.PC 27/03/2018 09:41:36 #1385 [Bring Your Own Device] The concept of any device, to any content, in any manner, is a major global trend that requires significant changes to the way devices are used. This trend is known as Bring Your Own Device (BYOD). BYOD is about end users having the freedom to use personal tools to access information and communicate across a business or campus network. With the growth of consumer devices, and the related drop in cost, employees and students can be expected to have some of the most advanced computing and networking tools for personal use. These personal tools include laptops, netbooks, tablets, smartphones, and e-readers. These can be devices purchased by the company or school, purchased by the individual, or both. BYOD means any device, with any ownership, used anywhere. For example, in the past, a student who needed to access the campus network or the Internet had to use one of the school’s computers. These devices were typically limited and seen as tools only for work done in the classroom or in the library. Extended connectivity through mobile and remote access to the campus network gives students tremendous flexibility and more learning opportunities for the student. Individuals want to connect to the network, not only for access to data applications, but also to collaborate with one another. Collaboration is defined as “the act of working with another or others on a joint project.” Collaboration tools, like Cisco WebEx shown in the figure, give employees, students, teachers, customers, and partners a way to instantly connect, interact, and achieve their objectives. For businesses, collaboration is a critical and strategic priority that organizations are using to remain competitive. Collaboration is also a priority in education. Students need to collaborate to assist each other in learning, to develop team skills used in the work force, and to work together on team-based projects. Another trend in networking that is critical to the communication and collaboration effort is video. Video is being used for communications, collaboration, and entertainment. Video calls can be made to and from anywhere with an Internet connection. Video conferencing is a powerful tool for communicating with others at a distance, both locally and globally. Video is becoming a critical requirement for effective collaboration as organizations extend across geographic and cultural boundaries. Click Play in the figure to view how TelePresence can be incorporated into everyday life and business. Cloud computing is another global trend changing the way we access and store data. Cloud computing allows us to store personal files, even backup our entire hard disk drive on servers over the Internet. Applications such as word processing and photo editing can be accessed using the Cloud. For businesses, Cloud computing extends IT’s capabilities without requiring investment in new infrastructure, training new personnel, or licensing new software. These services are available on demand and delivered economically to any device anywhere in the world without compromising security or function. There are four primary types of Clouds, as shown in the figure: Public Clouds, Private Clouds, Hybrid Clouds, and Custom Clouds. Click each Cloud to learn more. Cloud computing is possible because of data centers. A data center is a facility used to house computer systems and associated components. A data center can occupy one room of a building, one or more floors, or an entire building. Data centers are typically very expensive to build and maintain. For this reason, only large organizations use privately built data centers to house their data and provide services to users. Smaller organizations that cannot afford to maintain their own private data center can reduce the overall cost of ownership by leasing server and storage services from a larger data center organization in the Cloud.
<urn:uuid:b5f5b520-263a-4626-98d3-1a564f148feb>
{ "date": "2018-04-25T06:44:26", "dump": "CC-MAIN-2018-17", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125947705.94/warc/CC-MAIN-20180425061347-20180425081347-00016.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9360392689704895, "score": 3.203125, "token_count": 790, "url": "http://oofor.com/forums/topic/chapter-1-network-trends-page-1-4-1-11-4-1-5/" }
by Jessica Driscoll Dr. James Monaghan, an assistant professor of regeneration biology at Northeastern University, has been studying the Mexican axolotl salamander’s amazing regenerative properties to discover the cellular and genetic basis of tissue regeneration — findings that could have a huge impact on regenerative medicine. The axolotl, a species indigenous to Lake Xochimilco near Mexico City, has the ability to regenerate many different tissues — from its limbs to parts of its brain, its heart, its lower jaw and even its spinal cord — according to Monaghan. “They can regenerate all the essential new neurons and connections, allowing them to walk again after being paralyzed,” said Monaghan. The long-term goal, he said, is to use the genetic findings of the axolotl to impact the work of regenerative clinicians and bioengineers. The axolotl is known to retain its juvenile, or larval, features throughout its life — a condition called neoteny — so it remains aquatic and keeps its gills. Animals like the axolotl — with the ability to regenerate the spinal cord — seem to maintain and activate their progenitor neural stem cells throughout their lives which differs from species like humans, according to Monaghan, that have a limited number of these neural cells. “It is thought that certain fish, and these salamanders, have spinal cords kind of like ours when we were embryos,” he said. Species like the zebrafish, Xenopus frog and axolotl are the primary vertebrate models being used for regeneration studies, and they’ve been investigated more over the last decade since tools have been created to locate and test the genes in these animals. Researchers can actually graft tissue from one axolotl to another, according to Monaghan, and then track what cells do during regeneration. According to various sources, axolotls can grow up to a foot long — though most remain smaller — and can be black, brown or white, especially when bred in captivity. Due to water pollution and other factors, the axolotl has become an endangered species in Mexico. They are bred frequently in captivity, and even kept as pets, and can have a lifespan of about 15 years. Monaghan said the axolotl, and its amazing regenerative properties, has recently become a much more mainstream topic of study. Thanks to Northeastern’s cooperative education program, four undergraduate students will be joining Monaghan in the lab next semester to assist in his axolotl research. “I really like the idea of co-op learning in terms of undergraduates,” he said. “Part of the reason I got into science was because my undergraduate education had internships, which led to the lab, which led me to graduate school and got me here today. It’s a learning platform that’s really effective for training students in science.” December 21, 2012 EDIT: news@Northeastern published a story about Monaghan and his work with salamanders. The article can be found here.
<urn:uuid:8eeb1cc4-c276-414f-b7a2-bd6ba7aa7f1b>
{ "date": "2015-10-09T05:23:33", "dump": "CC-MAIN-2015-40", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443737913815.59/warc/CC-MAIN-20151001221833-00100-ip-10-137-6-227.ec2.internal.warc.gz", "int_score": 4, "language": "en", "language_score": 0.9715673327445984, "score": 3.625, "token_count": 656, "url": "http://www.northeastern.edu/cos/2012/11/using-salamanders-to-study-regeneration/" }
I'm proof-reading a thesis by one of my friends and there's some recurring construct which I always mark as false but I'd like to check with you. In the comments I was told that the example I provided didn't really match the sentence I found in the thesis therefore I'm adding the actual sentence from the thesis. I'm sorry for the confusion; I'm not a native speaker/in the field of language and thus didn't really see the difference. So here we go. Which of the following is preferable? - To illustrate the necessity of some steps a bad representative of the taken radiograms is used. - To illustrate the necessity of some steps a bad representative of the radiograms taken is used. I'd use the latter because it is closer to "[...] of the radiograms taken previously is used". In the English language, one can use the (past) participle of a verb as an adjective, this allows for example to express that I'm creating a scrapbook using the pictures that I have taken previously. What's the correct way to state this? - I'm doing a scrapbook from the taken pictures. - I'm doing a scrapbook from the pictures taken. I'd use the latter because it is closer to I'm doing a scrapbook from the pictures taken previously.
<urn:uuid:0bcda514-9a0d-4d25-89e1-84e498b0d8e1>
{ "date": "2016-02-09T18:15:29", "dump": "CC-MAIN-2016-07", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701157443.43/warc/CC-MAIN-20160205193917-00096-ip-10-236-182-209.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9654846787452698, "score": 2.53125, "token_count": 274, "url": "http://english.stackexchange.com/questions/95916/order-of-participial-adjective/95942" }
Identify mixture X / sodium salt: Mixture X consists of a carboxylic acid and a neutral compound which was separated by using 2M NaOH and filtered off through a buchner funnel / flask. the sodium... Identify mixture X / sodium salt: Mixture X consists of a carboxylic acid and a neutral compound which was separated by using 2M NaOH and filtered off through a buchner funnel / flask. the sodium salt was removed and dried in a dessicator. The alkaline filtrate was then acidified with HCL, cooled in an ice bath and then filtered off through the buchner flask / funnel. the identity of mixture X isn't part of this assignment, but I want to add it to my report anyway as it should gain extra marks. The carboxylic acid was identified as benzoic acid via the melting point. Mixture X + NaOH => Neutral sodium salt + ??OH?? ??OH?? + HCL => Benzoic acid + H2O Can you help me identify the missing compounds in this purification experiment? There is not enough information to identify mixture X. Since they tell us that the carboxylic acid is benzoic acid then it could suggest that the other component in the mixture is a benzene derivative such as, benzene benzaldehyde or benzene itself as both are oxidized to give benzoic acid Since they tell us that the other component in the mixture is a neutral compound we can rule out phenol since phenol is a weak acid: it is more acidic than aliphatic alcohols. Benzaldehyde is one of the most useful organic compounds and benzoic acid is often viewed as an impurity in organic reactions. You have to use the color and odor of the mixture to make a reasonable inference if benzaldehyde was present since benzaldehyde is a colorless liquid with an almond like odor. It has a pKa of 14.90 though. So it is more likely that the neutral compound in mixture X is benzene
<urn:uuid:92afb1a0-6f30-4c9f-8c44-d8ce6621e59b>
{ "date": "2017-11-20T12:04:17", "dump": "CC-MAIN-2017-47", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806030.27/warc/CC-MAIN-20171120111550-20171120131550-00056.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9611340761184692, "score": 2.796875, "token_count": 428, "url": "https://www.enotes.com/homework-help/identify-mixture-x-sodium-salt-mixture-x-consists-564468" }
An opinion piece published in the scientific journal Addiction in July gathers evidence to argue that alcohol is a direct cause of cancer in several areas of the body. The article reviews 10 years’ worth of studies from several organizations, including the World Cancer Research Fund, the American Institute for Cancer Research and the International Agency for Research on Cancer. And its conclusions are dire. Nearly 6 percent of cancer deaths worldwide can be linked to alcohol, including in people who drink light to moderate amounts of alcohol, according to author Jennie Connor, a professor of epidemiology at the University of Otago in New Zealand. “From a public health perspective,” she writes, “alcohol is estimated to have caused approximately half a million deaths from cancer in 2012.” Connor concludes that there is a strong link between alcohol consumption and cancer in specific areas of the body, such as the liver, colon, esophagus and female breast. She says there are also causal contributions in other areas such as the prostate, pancreas and skin. How alcohol causes cancer is not deeply understood, according to the article, but it is thought to depend on the “target organ.” For example, cancers of the throat, mouth and liver can be largely attributed to a carcinogenic compound called acetaldehyde. Salivary acetaldehyde levels have been found to reach high levels when drinking. Breast tissue is another area that seems to be particularly susceptible to alcohol. Connor noted the United Kingdom’s Million Women Cohort study, which found that women who drank 70 to 140 grams of alcohol per week experienced a 13 percent increase in breast cancer and a 5 percent increase in total cancer compared to those who drank less than 20 grams per week. Unfortunately, the amount you drink might not matter all that much. While heavy drinkers have a higher risk of liver, colon and laryngeal cancer than light drinkers, Connor writes, all drinkers have the same risk of mouth, esophagus, breast and pharynx cancer. Connor also acknowledges that some of the studies she reviewed show that those who drink light to moderate of alcohol have a reduced risk of developing cardiovascular disease than abstainers. But many epidemiologists agree that research confirms alcohol actually causes cancer, Connor wrote, while the relationship between drinking and heart disease is not as conclusive. For example, other lifestyle factors beyond alcohol consumption ― such as a person’s healthy behavior and demographic conditions ― typically put abstainers at a higher risk than those who moderately drink. Connor cites a 2005 study that showed 27 out of 30 risk factors for cardiovascular disease were more prevalent in abstainers than moderate drinkers. “Promotion of health benefits from drinking at moderate levels is seen increasingly as disingenuous or irrelevant in comparison to the increase in risk of a range of cancers,” she wrote. As a solution to alcohol-attributed cancer, Connor suggests everyone should reduce their alcohol consumption, not just heavy drinkers. “Population-wide reduction in alcohol consumption will have an important effect on the incidence of [cancer], while targeting the heaviest drinkers alone has limited potential,” she wrote. While the majority of the population readily accepts that smoking causes lung cancer, “alcohol’s causal role is perceived to be more complex than tobacco’s,” Connor wrote. Getting people to stop drinking to prevent cancer, in the same way people stop smoking to prevent cancer, is not the focus of any significant push. Connor also warns of the backlash that research such as her own may receive from alcohol companies. “There will be orchestrated attempts to discredit the science and the researchers, and to confuse the public,” she wrote. “The stakes are high for alcohol industries when there is no argument, on current evidence, for a safe level of drinking with respect to cancer.” Ultimately, alcohol is just one of many factors that can cause cancer, but Connor suggests reducing consumption or even partaking in a “dry period” as steps in the right direction to reduce your risk. Correction: An earlier version of this article incorrectly identified Connor’s opinion article as a new study on alcohol’s link to cancer. In fact, Connor’s opinion piece reviews existing literature on the subject and does not present new data or conclusions. Language has been updated throughout.
<urn:uuid:4c052c9f-d67b-417a-8a5a-621715c09028>
{ "date": "2017-05-29T07:32:28", "dump": "CC-MAIN-2017-22", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463612036.99/warc/CC-MAIN-20170529072631-20170529092631-00460.warc.gz", "int_score": 4, "language": "en", "language_score": 0.9602662324905396, "score": 3.53125, "token_count": 892, "url": "http://www.huffingtonpost.com.au/2016/07/24/alcohol-is-even-deadlier-than-you-think-study-suggests/" }
Nutritional Management of Chewing... Nutritional Management of Chewing and Swallowing Difficulties During Cancer Treatment Nutritional management of treatment side effects There is more to nutrition during cancer and cancer therapy than getting enough calories and protein. The foods you choose also help you cope with side effects, such as loss of appetite, nausea, vomiting, diarrhea, chewing and swallowing difficulties, and taste changes. As each person's individual medical profile and diagnosis is different, so is his or her reaction to treatment. Side effects may be severe, mild, or absent. Be sure to discuss with your cancer care team possible side effects of treatment before the treatment begins. Nutritional management of chewing and swallowing difficulties Cancer treatments target fast growing cancer cells in your body. Healthy cells that are fast growing can also be damaged. Examples of fast growing cells include cells in the mouth, digestive tract, and hair. These may be affected by cancer treatment and can cause problems, such as your hair falling out, nausea and vomiting, or a metallic taste in your mouth. Eating well from the beginning of cancer therapy has been found to help prevent mouth problems. Stomatitis, or mucositis, is the presence of sores in the mouth caused by some anticancer drugs. In addition to being painful, mouth sores can become infected by the many germs that normally live in the mouth. They can make it difficult to swallow and chew as well. If you develop sores in your mouth, tell your doctor or nurse. You may need medication if the sores become painful or prevent you from eating. The following suggestions may help if you have mouth problems: Eat the following soft, soothing foods (cold or at room temperature), and puree cooked foods in a blender to make them smoother and easier to eat: Soft fruits (bananas and applesauce) Soft-boiled or scrambled eggs Macaroni and cheese Try to avoid irritating, acidic foods and juices, hot foods, spicy or salty foods, and rough or coarse foods such as: Tomato juice and citrus juice (orange, grapefruit, and lemon) For mouth dryness: Drink plenty of liquids. Ask your doctor if you can suck on ice chips, Popsicles, or sugarless hard candy. You can also chew sugarless gum. (Sorbitol, a sugar substitute that is in many sugar-free foods, can cause diarrhea in many people. If diarrhea is a problem for you, check the labels of sugar-free foods before you buy them, and limit your use of them.) Moisten dry foods with butter, margarine, gravy, sauces, or broth. Soften crisp, dry foods in mild liquids. Eat soft and pureed foods. Use lip balm or petroleum jelly if your lips become dry. Carry a water bottle with you to sip from often.
<urn:uuid:be840457-1cca-4444-b335-7195864e6c18>
{ "date": "2014-03-09T10:30:06", "dump": "CC-MAIN-2014-10", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999677213/warc/CC-MAIN-20140305060757-00006-ip-10-183-142-35.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9385233521461487, "score": 2.875, "token_count": 599, "url": "http://www.summitmedicalcenter.net/health-education/85,p07274" }
According to Census Bureau data, “66% of mothers who gave birth to their first child between 2006 and 2008 worked during their pregnancy”. Eleven years later, a large percentage of first-time mothers still intend on working through most of their pregnancy. That being the case, it’s only logical that these expectant mothers understand their rights regarding the workplace and discrimination against pregnancy. What Protects the Rights of Pregnant Women in the Workplace? In 1978 Title VII of the Civil Rights Act of 1964 was amended to prevent discrimination on the basis of pregnancy. The amendment is known as “The Pregnancy Discrimination Act of 1978” or the “PDA”. Under this act employers must treat women affected by “pregnancy, childbirth, or related medical conditions” the same for all purposes related to employment as other individuals who aren’t pregnant but similar in their ability or inability to work. What Protections Does the PDA Provide? The PDA protects women from being fired on the basis of being pregnant or plans to become pregnant. An employer may not fire an employee because they are pregnant, and they must allow the employee in question to keep working as long as they are able. If a worker requests to be reassigned to a different role then the employer must give them the same consideration as a request from a non-pregnant employee. This means that an individual cannot be denied reassignment on the basis of their pregnancy alone. If an employee believes that their employer violated the PDA and they chose to oppose it or file a discrimination charge, then it may be unlawful for the employer to retaliate against them whether that be by firing them or docking their pay. The PDA also prevents employers from bypassing an employee for a promotion or other benefits on the basis of their pregnancy. Vacation time and credits of service should not be affected by an employee’s pregnancy leave. In fact, employees on pregnancy-related leave have to be granted the same treatment as employees who are on disability-related leave. In What Cases Does the PDA Not Protect me? The PDA does not apply to employers with less than 15 employees. Thus, if a pregnant worker finds that their rights are being violated by an employer with less than 15 employees then they may not be able to refer to protections set under the PDA act. On March 25, 2015, the United States Supreme Court decided on Young v. United Parcel Service. The case brought into question whether UPS could suspend a pregnant mother from work for not being able to perform a function of her job, which was lifting objects up to 70 pounds. Due to her time away from work she lost her employee medical coverage and then promptly filed suit in federal court accusing UPS of violating the PDA. The Supreme Court ruled in favor of Young but did not agree with her interpretation of the PDA that her employer was mandated by the law to accommodate pregnant women when they provided a similar accommodation to a non-pregnant worker. The Supreme court found that in order to prove intentional discrimination on the basis of an employee’s pregnancy-related condition, the employee has to prove that an employer’s policies impose a “significant burden” on them and that the employers have not made a “sufficiently strong” reason to justify the said burden. This means that if a pregnant worker is not able to prove these two conditions, the charge against their employer might be dismissed. Discrimination lawsuits are an arduous and complex process that requires an in-depth understanding of the law. If you find your rights as an individual being violated in the workplace it is strongly advised that you seek out legal counsel. PereGonza The Attorneys can offer a free consultation and give you insight on what the best course of action for what your specific case may be. Fill out our personal intake form for more information.
<urn:uuid:ca51f884-a645-4f41-8500-f244338818b6>
{ "date": "2019-12-11T19:31:56", "dump": "CC-MAIN-2019-51", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540532624.3/warc/CC-MAIN-20191211184309-20191211212309-00136.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9748677611351013, "score": 2.65625, "token_count": 801, "url": "https://www.peregonza.com/the-rights-of-pregnant-women-in-the-workplace/" }
Pneumococcal polyvalent vaccine (Injection) Pneumococcal Vaccine Polyvalent (NOO-moe-KOK-al VAX-een pol-ee-VAY-lent) Prevents severe infections, such as pneumonia and meningitis. Pneumovax 23There may be other brand names for this medicine. When This Medicine Should Not Be Used:You should not receive this vaccine if you have had an allergic reaction to pneumococcal vaccine. How to Use This Medicine: - A nurse or other trained health professional will give you this vaccine. This vaccine is given as a shot into one of the muscles or under the skin, usually in the thigh or upper arm. Drugs and Foods to Avoid: Ask your doctor or pharmacist before using any other medicine, including over-the-counter medicines, vitamins, and herbal products. - Make sure the doctor knows if you are using any medicine that affects your immune system. This includes radiation treatment, steroid medicines, or cancer medicines. - You should not receive varicella virus vaccine (Zostavax®) at the same time that you are given pneumococcal vaccine. The vaccines should be given 4 weeks apart. Warnings While Using This Medicine: - Make sure the doctor knows if you are currently ill. Tell your doctor if you are pregnant or breastfeeding. Tell your doctor if you have heart disease, blood vessel disease, or lung disease - Make sure your doctor knows if you have a weak immune system. You may not be fully protected by this vaccine. - Tell your doctor if you have any problems with spinal fluid leaking, which could be caused by a birth defect, previous surgery, or a skull fracture. This vaccine may not prevent meningitis in people who have spinal fluid problems. Possible Side Effects While Using This Medicine: Call your doctor right away if you notice any of these side effects: - Allergic reaction: Itching or hives, swelling in your face or hands, swelling or tingling in your mouth or throat, chest tightness, trouble breathing - Unexplained high fever or chills If you notice these less serious side effects, talk with your doctor: - Muscle or joint pain - Pain, itching, redness, swelling, tenderness, or a lump where the shot was given - Tiredness or weakness If you notice other side effects that you think are caused by this medicine, tell your doctor Call your doctor for medical advice about side effects. You may report side effects to FDA at 1-800-FDA-1088Last Updated: Copyright © 1984- Thomson Micromedex. All rights reserved.
<urn:uuid:ba65be61-001c-48d7-b9b7-014bcc7b85f7>
{ "date": "2014-10-31T19:14:50", "dump": "CC-MAIN-2014-42", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414637900160.30/warc/CC-MAIN-20141030025820-00003-ip-10-16-133-185.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.8955638408660889, "score": 2.765625, "token_count": 568, "url": "http://www.allinahealth.org/CCS/doc/DrugNotes/45/0243.htm" }
The first three gospels are sometimes known as the "synoptic" gospels. What does this term mean, and how does it differentiate them from the gospel of John? A brief look at any harmony of the Gospels will immediately point out an obvious fact - namely, Matthew, Mark, and Luke go over a lot of the same ground, but John is very different. The number of parables and stories that occur in Matthew, Mark, and Luke, which do not occur in John, is just too great. Note, for example, just the miracles of Christ. Because these three seem to have the 'same view' on a lot of matters, they have been called the "synoptic" Gospels, from the Greek syn (same) and optic (relating to sight or view). Famed exegete Daniel Wallace goes into detail on the so-called Synoptic Problem, asking how it is that three Gospel writers could include so much that is so similar, in even the same order. While he does not deny inspiration by the Holy Spirit, he shows how the complete agreement would not really fit with three men independently relating the same facts, without some form of collaboration or borrowing. A close reading of parenthetical remarks or the details which are included in some accounts but not others would seem to indicate that the authors were aware of the other works, and expected their audience to do the same. Given this similarity, the fun question then becomes, who borrowed from whom? Traditionally, Matthew was viewed as the first Gospel, hence its location first in the New Testament canon. That said, beginning with Schleiermacher in the early 1800s, the idea that Mark was actually the first began to take hold. The rules of hermeneutics that are used to reconstruct "the original wording" (remember these were hand-copied manuscripts and minor variations happened) usually suggest that when two possible variations are presented, "the harder meaning is to be preferred." In other words, if a copyist is reading sourcing material and either re-copying it or re-using it, it is far more likely that a copyist would harmonize what is said with an overall theology, rather than introduce something that makes the existing theology less pure and pristine. Since Mark's Gospel typically includes some of the most human aspects of Jesus (the Messianic secret, the abrupt ending, etc...), the principle is taken to a macro level, thus giving Mark "temporal first place." The synoptic "problem" does not seek to deny "Inspiration," but does seek to create an historical chain of events that tells us how our Gospels came to be. Syn- means same (as in synchronize, same time), and optic of course refers to sight. The three first Gospels are syn-optic because they see alike; they basically tell the same story as each other, covering many of the same events. John, on the other hand, focuses on a lot of different material than the other authors, and has a very high percentage of unique content. To contribute to the exceptional answers already here with a bit of additional information, the source material referred to as Q (or Q source, or Q Gospel, name from the German Quelle) is held in common between both Matthew and Luke, in addition to the common material from Mark, which is presumed to be written first. That said, there is debate on the nature and even the existence of the Q source, being theology. A good article about Q source can be found in the Anchor Bible Dictionary, though this may be difficult to access for those without academic theological libraries nearby. The reason for the term synoptics is that they can be viewed together to gain parallel understanding of the three Gospels. John, however, is not considered synoptic because it has many different events (whereas Matthew, Mark, and Luke have the same basic events with some additional or missing events based upon source materials) and different structure and order. An important caution in regards to the synoptics is not to proof text synoptic parallels. It is common for passages to be matched up in synoptic parallels based upon similar general meanings when translated, which may be accurate, or may not be, based upon the original context of the passage. The heretical Gospel of Thomas (deemed as a Gnostic text that promoted a secret knowledge of Christ) is found at many points to have parallels with the synoptics also, though itself nothing like the other Gospels in structure. When the first three gospels are compared—Matthew, Mark, and Luke—it is obvious that the accounts are very similar to one another in content and expression. As a result, Matthew, Mark, and Luke are referred to as the “synoptic gospels.” The word “synoptic” basically means “to see together with a common view.” Not that they should contradict each other but the striking similarities, not only of wording, as for example in the Healing of the Paralytic (Mk.2.1 12; Mt.9.1 8; Lk.5.17 26.), but also of the order of incidents, as for example the series of episodes recorded in Mark 10.13 34, and appearing in Matthew 19.13 xx.19 and Luke 18.15 34 presented a literary puzzle of sort. The question that arise is why these similarities? Plausible explanation for similarities in order of events could be that writers presented them in the order of their occurrences. However for similarities of wording most of the literary studies only discuss this issue without taking into consideration the influence of Holy Spirit and point out to the literary dependence of these gospels on each other, which definitely the most logical conclusion one can expect with a sceptic mind. One such research however bases this on oral traditions and concludes that the synoptic gospels are probably related to one another in a mostly literary, partly oral, fashion. It further goes on to say that it is highly likely that they were written from mostly oral traditions. However if the gospel authors had composed entirely from oral materials, each successive writer still depended on the groundwork of his predecessor(s). Another study which is staunchly advocating the inspirational base for these similarities has found that only sixteen percent of the words in those sections are identical in all three Gospels. The study then focused on the agreements of two Gospels against a third Gospel in all combinations: Matthew-Luke against Mark, Matthew-Mark against Luke, and Mark-Luke against Matthew. It showed from several perspectives the impossibility of any theory of literary interdependence created by these combinations of agreements and disagreements. From the standpoint of observational facts, it pointed to randomness as the only possible explanation for the phenomena of the Gospels. Yet randomness is not an accurate term to apply. As already said, the discussions of the origins of the Synoptic Gospels say far too little about the role of the Holy Spirit in the composing of those Gospels. He was the major author in the divine-human process of producing the Synoptic Gospels. Some of Jesus’ last words to the Eleven were: The study further says: The first three gospels (Matthew, Mark and Luke) are sometimes known as the "synoptic" gospels because by laying them in parallel and reading them synoptically ('with the same eye') in the original Greek language, it can readily be seen that there is a literary relationship among them. Scholars have established that Matthew and Luke were substantially copied from Mark, with Matthew using some 90 per cent of the verses in Mark, often using the same words in the Greek language. Further sayings material not found in Mark but common to Matthew and Luke is attributed to the hypothetical 'Q' document, and once again, this could only come from an earlier, written Greek language document. Of course, the context of this is that the gospels were originally anonymous and, in spite of later attributions, we do not know who really wrote them. There are several ways to establish independently that Mark was the original source gospel used for the other two gospels, rather than either Matthew or Luke. One, which John Dominic Crossan has studied, is a peculiarly distinctive Markan compositional device called an intercalation or sandwich. In The Birth of Christianity, page 106, he says that the device does not move from either Matthew or Luke into Mark but from Mark to the other two. Of Mark’s nine sandwiches, Matthew retains Mark’s pattern five times and Luke retains it four times, such that the only conclusion must be that in copying passages from Mark, the other two evangelists sometimes copied the intercalation pattern and sometimes not. On page 565, Crossan identifies at least one instance in which John's Gospel also accepts an intercalation from Mark, but it is generally accepted that Mark was not the main source used by the author of John. The greater parallel in John is with Luke, but John contains many elaborations, changes of chronology, and passages for which the original source is unknown.
<urn:uuid:643be616-2c44-47b6-8bec-b92c3812391f>
{ "date": "2015-07-29T09:35:19", "dump": "CC-MAIN-2015-32", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042986357.49/warc/CC-MAIN-20150728002306-00254-ip-10-236-191-2.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.966899573802948, "score": 3.234375, "token_count": 1887, "url": "http://christianity.stackexchange.com/questions/1119/why-are-matthew-mark-and-luke-called-the-synoptic-gospels/15684" }
Given the hot, dry weather we have experienced this past summer (and now fall), consideration needs to be given to providing adequate soil moisture conditions to strawberries as the plants prepare for winter. Strawberries require regular watering because of their shallow root systems. Importance of Fall Irrigation Risk of winter damage may increase when plants are under stress from lack of moisture. Plants should have access to a good level of moisture right up until mulching. The cold hardening process is mainly controlled by the shorter days and cooler temperatures and is not hastened by withholding moisture. Normal autumn rainfall amounts should be taken into account to avoid over saturation of soils prior to covering. Key times for irrigating strawberries include: Strawberry Shallow Root Systems June bearers have 90% of their roots in the top 15 cm (6 in.) of soil, while day neutrals have 90% in the top 7 to 10 cm (3 to 4 in.). Both types of strawberries may have smaller root zones caused by winter injury or a narrowing of the rows during renovation. The susceptibility to drought makes irrigation particularly effective for strawberry production. A 2.5 fold increase in yield has been recorded with some cultivars grown under irrigation versus non-irrigated strawberries. It is most efficient to irrigate early in the day, when evaporation losses can be kept to a minimum. Straw mulch also greatly reduces evaporation from the soil. Typical Strawberry Irrigation Requirements Day neutral strawberries may require higher rates of irrigation or more careful monitoring of soil moisture levels because of their shallow root systems. Trickle irrigation on light soils with a black poly mulch may require application rates as high as 5 L/m2 (0.1 gal/sg. ft.) per day. Without mulch a rate of 37 L/m2 (0.75 gal./sq. ft.) per day should be sufficient. (Dale and Pritts). To determine if soil moisture is sufficient, use this hand test method: For more details on this method see Appendix section (pp.85) of the Commercial Strawberry Production on the Prairies Guide. Tensiometers provide a second option. The difficulty in using these devices is that the reading on the device varies with soil type. Tensiometers are better suited for use on sandy soils, where they monitor most of the available moisture range. In heavy soils, large amounts of available moisture occur outside the detection limits of the tensiometer. Avoid irrigating just prior to picking. Based on a two day picking interval, irrigate immediately after picking with 6 to 8 mm (1/4 to 1/3 in.) of water. Take care to avoid excessive irrigation which can leach herbicides and nutrients out of the rooting zone. Too much moisture can diminish yields, reduce fruit quality and increase fruit rot development. This article is a modified version sourced originally from the Irrigation section of the Commercial Strawberry Production on the Prairies Guide. Dayneutral Strawberry Production Guide, Dr. Marvin Pritts and Dr. Adam Dale, 1989 http://hdl.handle.net/1813/3275
<urn:uuid:13e2b995-1ca7-4578-ba96-9c21be8e6470>
{ "date": "2016-02-11T19:01:26", "dump": "CC-MAIN-2016-07", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701162648.4/warc/CC-MAIN-20160205193922-00069-ip-10-236-182-209.ec2.internal.warc.gz", "int_score": 4, "language": "en", "language_score": 0.9140230417251587, "score": 3.625, "token_count": 645, "url": "http://m.gov.mb.ca/agriculture/crops/production/fruit-crops/avoid-winter-injury-of-strawberries-due-to-dry-soil.html" }
Eyam parish church |Eyam shown within Derbyshire| |OS grid reference| |Sovereign state||United Kingdom| |Post town||HOPE VALLEY| |EU Parliament||East Midlands| Eyam (pronunciation: /[unsupported input]/) is an English village and civil parish in the Derbyshire Dales district that lies within the Peak District National Park. The population of the civil parish at the 2001 Census was 926 increasing to 969 at the 2011 Census. The village is noted for an outbreak of bubonic plague which occurred there in 1665, in which the villagers chose to isolate themselves rather than let the infection spread. The present village was founded and named by Anglo-Saxons, although lead had been mined in the area by the Romans. Formerly industrial, its economy now relies on the tourist trade and it is promoted as 'the plague village'. Lead mining seems to have had a continuous history in the Eyam district since at least the Roman era and there is evidence of habitation from earlier. Stone circles and earth barrows on the moors above the present village have largely been destroyed, although some remain and more are recorded. The most notable site is the Wet Withens stone circle on Eyam Moor. Coins bearing the names of many emperors provide evidence of Roman lead-mining locally. However, the village's name derives from Old English and is first recorded in the Domesday Book as Aium. It is a dative form of the noun ēg (an island) and probably refers to a patch of cultivable land amidst the moors, or else to the settlement's situation between two brooks. In the churchyard is an Anglo-Saxon cross in Mercian style dated to the 8th century, moved there from its original location beside a moorland cart track. Grade I listed and a Scheduled Ancient Monument, it is covered in complex carvings and is almost complete, but for a missing section of the shaft. The present parish church of St. Lawrence dates from the 14th century, but evidence of an earlier church there can be found in the Saxon font, a Norman window at the west end of the north aisle, and Norman pillars that are thought to rest on Saxon foundations. There have been alterations since the Middle Ages, including a large sun dial dated 1775 mounted on a wall outside. Some of the Rectors at the church have had contentious histories, none less so than the fanatically Royalist Sherland Adams who, it was accused, "gave tythe of lead ore to the King against the Parliament", and as a consequence was removed from the living and imprisoned. The lead mining tithe was due to the rectors by ancient custom. They received one penny for every 'dish' of ore and twopence farthing for every load of hillock-stuff. Owing to the working of a newly discovered rich vein during the 18th century, the Eyam living was a valuable one. Mining continued into the 19th century, after which better sources were discovered and a change-over was made to the working and treatment of fluorspar as a slagging agent in smelting. The last to close was the Ladywash Mine, which was operative between 1948–79. Within a 3 miles radius of the village there are 439 known mines, (some running beneath the village itself), that are drained by 49 drainage levels ('soughs'). According to the 1841 Census for Eyam, there were 954 inhabitants living in the parish, chiefly employed in agriculture, lead mining, and cotton and silk weaving. By the 1881 Census, most men either worked as lead miners or in the manufacture of boots and shoes, a trade that only ended in the 1960s. The transition from industrial village to tourist based economy is underlined by Roger Ridgeway's statement that, at the beginning of the 20th century, "a hundred horses and carts would have been seen taking fluorspar to Grindleford and Hassop stations. Today, up to a dozen coach loads of visiting children arrive each day in the village." 1665 plague outbreak The history of the plague in the village began in 1665 when a flea-infested bundle of cloth arrived from London for the local tailor. Within a week his assistant George Vicars was dead and more began dying in the household soon after. As the disease spread, the villagers turned for leadership to their rector, the Reverend William Mompesson, and the Puritan Minister Thomas Stanley. These introduced a number of precautions to slow the spread of the illness from May 1666. They included the arrangement that families were to bury their own dead and relocation of church services to the natural amphitheatre of Cucklett Delph, allowing villagers to separate themselves and so reducing the risk of infection. Perhaps the best-known decision was to quarantine the entire village to prevent further spread of the disease. The plague ran its course over 14 months and one account states that it killed at least 260 villagers, with only 83 surviving out of a population of 350. This figure has been challenged on a number of occasions with alternative figures of 430 survivors from a population of around 800 being given. The church in Eyam has a record of 273 individuals who were victims of the plague. Survival among those affected appeared random, as many who remained alive had had close contact with those who died but never caught the disease. For example, Elizabeth Hancock was uninfected despite burying six children and her husband in eight days (the graves are known as the Riley graves after the farm where they lived). The unofficial village gravedigger, Marshall Howe, also survived despite handling many infected bodies. Plague Sunday has been celebrated in the village since the plague's bicentenary in 1866 and now takes place in Cucklett Delph on the last Sunday in August. Originally it was held in mid-August but now coincides with the much older Wakes Week and the well dressing ceremonies. Places of interest Today Eyam has various plague-related places of interest. One is the Coolstone in which money, usually soaked in vinegar, which was believed to kill the infection, was placed in exchange for food and medicine. It is just one of several 'plague stones' that served to make the boundary that should not be crossed by either inhabitant or outsider. Another site is the isolated enclosure of the Riley graves mentioned above, which is now under the guardianship of the National Trust. A reminder of the village's industrial past remains in the name of its only pub, the Miner's Arms. Built in 1630, before the plague, it was originally called The Kings Arms. Opposite the church is the Mechanics' Institute, originally established in 1824, although the present building with its handsome pillared portico dates from 1859 and was enlarged in 1894. At one time it held a library paid for by subscription, which then contained 766 volumes. The premises now double as the village club. Up the main street is the Jacobean-styled Eyam Hall, built just after the plague. It is currently managed by the National Trust and was opened to the public in March 2013. The green opposite has an ancient set of village stocks reputedly used to punish the locals for minor crimes. Catherine Mompesson's tabletop grave is in the churchyard and has a wreath laid on it every Plague Sunday. This is in remembrance of her constancy in staying by her husband, rather than moving away with the rest of her family, and dying in the very last days of the plague. The church's burial register also records "Anna the traveller, who according to her own account, was 136 years of age" and was interred on 30 December 1663. A more recent arrival there is the cricketer Harry Bagshaw, who played for Derbyshire and then acted as a respected umpire after retiring. At the apex of his headstone is a hand with a finger pointing upwards. Underneath the lettering a set of stumps is carved, with the bails flying off and a bat which has just hit the wicket. Respect for its heritage has not always been a priority in Eyam. In his Peak Scenery (1824), Ebenezer Rhodes charges that by the start of the 19th century many former gravestones of plague victims had been pulled up to floor houses and barns and that ploughing was allowed to encroach on the Riley Graves (pp. 34–5); that the lime trees planted on either side of Mrs Mompesson's grave had been cut down for timber (39–40); that the missing piece from the shaft of the Saxon Cross had been broken up for domestic use (p. 44); and that in general the profit of the living was put before respect for the dead (46–7). Eyam Museum was opened in 1994 and, besides its focus on the plague, includes exhibits on the village's local history in general. Among the art exhibits there are painted copies from different eras of a print (taken from a drawing by Francis Chantrey) in Ebenezer Rhodes' Peak Scenery (1818). These depict the sweep of the road by the 'plague cottages' where the first victims died, with the church tower beyond. The local amateur John Platt painted in naive style and is represented by depictions of the Riley Graves (1871) and the old windmill (1874). Since the area is scenically beautiful, it has attracted many artists and the village appeared in the work of Sheffield artist George Cunningham (1924–1996), while the specialist in interiors from the same city, Tim Rose, has painted several watercolours inside Eyam Hall. Other watercolourists who have painted landscape views include George Hammond Steel (1900–1960) and Freida Marrion Scott (d.2012). Eyam also has a resident artist in Hazel Money, who specialises in small scale acrylic paintings and lino prints of the village and surrounding area. The most distinctive of the Sheffield artists to paint Eyam was Harry Epworth Allen, since he subordinated the picturesque so as to interpret his subject as a living community within a worked landscape. His "Road above Eyam" (1936), now in the Laing Art Gallery, shows a road travelled by working people above the village. His "Burning Limestone" in Newport Museum and Art Gallery acknowledges the two centuries and more of industrialisation by which the local inhabitants earned their living among harsh conditions. Anna Seward, a pioneer of Romanticism, could not hide from herself the fact that the wild natural rocks she admired were daily being blasted for utilitarian purposes and the "perpetual consumption of the ever burning lime kilns", while the view was hidden behind the smoke from the smelting works. She takes up the subject again as she explores her memory of the scene in a poem addressed to the future mill-owner William Newton: - Her faithful traces to my sight restore - The long, long tracts of Tideswell's naked Moor; - Stretch'd on vast hills, that far and near prevail, - Bleak, stony, bare, monotonous, and pale. - Wide o'er the waste, in noon-tide's sultry rays, - The frequent lime-kiln darts her umber'd blaze; - Her suffocating smoke incessant breathes, - And shrouds the sun in black convolving wreathes; - And here, with pallid ashes heap'd around, - Oft sinks the mine, and blots the dreary ground. - In vain warm Spring demands her robe of green, - No sheltering hedge-rows vivify the scene; - But from the Moor the rude stone walls disjoin, - With angle sharp, and long unvaried line, - The cheerless field, – where slowly-wandering feed - The lonely cow, and melancholy steed. The ruthless realism of inhabitant and observer conjoined here is expressed not only by the 18th century poet and the 20th century painter, but by the village of Eyam in its struggle for survival. “The village of Eyam," its historian begins his account, "has been long characterized throughout the Peak of Derbyshire, as the birthplace of genius – the seat of the Muses – the Athens of the Peak". During the 18th century the place was notable for having no less than four poets associated with it. Reverend Peter Cunningham, curate there between 1775 – 1790, published two sermons during that time as well as several poems of a political nature. In addition, William Woods' account speaks of "numberless stones in the burial place that contain the offerings of his muse". The Rector for whom Cunningham deputised much of the time, Thomas Seward, published infrequently, but at least one poem written during his tenure at Eyam deals with personal matters. His "Ode on a Lady's Illness after the Death of her Child", dated 14 April 1748, concerns the death in infancy of his daughter Jenny. Seward also encouraged one of his surviving daughters, Anna Seward, to write poetry, but only after she moved with her father to Lichfield. Following a visit to her birthplace in 1788, she wrote a poem about it filled with nostalgia for the past. She celebrated this lost domain of happiness once more in "Epistle to Mr. Newton, the Derbyshire Minstrel, on receiving his description in verse of an autumnal scene near Eyam, September 1791". No copy of the poem by William Newton now exists. The author was a labouring class protégé from nearby, originally discovered by Cunningham and introduced to Miss Seward in 1783. The poet Richard Furness belongs to the early 19th century and was known as 'the Poet of Eyam' after his birthplace, but the bulk of his poetry too was written after he had left the district. Among the several references to the village there are his "Lines written in sight of the rectory", which praises both Anna Seward and her father. William Wood, the author of The History and Antiquities of Eyam was a village resident. At the head of his first chapter there is an excerpt from a poem that links the place with the story of the plague. Simply initialled W. W., the inference to be drawn is that it had earlier appeared in Wood's collection, The genius of the Peak and other poems (1837). Later the novelist Robert Murray Gilchrist came to live in the area. The village of Milton that figures in some of his fiction is in fact based upon Eyam. His The Peakland Faggot (1897) consists of short stories, each focusing on a particular character in the village. This was followed by two other series, Nicholas and Mary and Other Milton Folk (1899) and Natives of Milton (1902). Eyam was also featured under its own name in Joseph Hatton's novel, The Dagger and the Cross (1897). Set in the former Bradshaw Hall in the year before the plague arrives, it includes local characters who had key roles during the spread of the disease, such as George Vicars and William and Catherine Mompesson. - The Village of Eyam: a poem in four parts by John Holland, Macclesfield, 1821 - The Desolation of Eyam by William and Mary Howitt, London, 1827 - The Tale of Eyam, a story of the plague in Derbyshire, and other poems by an OLD BLUE, London, 1888. Because of its subject, the poem was reviewed in The British Medical Journal for 30 November 1889, where its poetic diction is taken literally: 'The author speaks of the pestilence and its hellborn brood; and again of firebolts from heaven's reeking nostrils. Such phraseology aptly exemplifies the mental attitude of men who lived in the infancy of modern science, when in the plague they saw the angry stroke of offended Deity, and recognised the 'scourge' of God in what we know to be only the scourge of filth.' - "A Moral Ballad of the Plague of Eyam" by Francis McNamara (1884–1946). This was published as an Irish broadside in 1910. - God and the Wedding Dress by Marjorie Bowen, Hutchinson, 1938 - A Parcel of Patterns by Jill Paton Walsh, a novel for young adults, Puffin Books, 1983 - Children of Winter by Berlie Doherty, a fantasy novel for children, Methuen, 1985; adapted for television 1994 - The Naming of William Rutherford by Linda Kempton, a fantasy novel for children, published by Heinemann, 1992 - Year of Wonders by Geraldine Brooks, published by Fourth Estate, 2001 - Black Death by M. I. McAllister, children's fiction, Oxford University Press, 2003 - Kiss of Death by Malcolm Rose, a thriller for young adults, published by Usborne Publishing, 2006 - TSI: The Gabon Virus by Paul McCusker and Walt Larimore, M.D., Christian suspense fiction, published by Howard Books (USA), 2009 - Eyam: Plague Village by David Paul, Amberley Publishing, 2012 - Isolation at Eyam; a play in one act for women by Joyce Dennys, published by French, 1954 - The Roses of Eyam by Don Taylor; first performed 1970, broadcast on TV in 1973; published by Heinemann, 1976 - a different drum by Bridget Foreman; first performed 1997 by the Riding Lights Theatre Company; revived 2013. The plague story interspersed with other stories of self-sacrifice. - Ring Around the Rosie by Anne Hanley; staged reading by Fairbanks Shakespeare Theatre (Alaska), 2004 - Plague at Eyam, a script for young adults published by the Association of Science Education, 2010 - Plague upon Eyam an opera in three acts by John D. Drummond, librettist Patrick Little; University of Otago Press (New Zealand), 1984; Songs recorded on Mr Polly at the Potwell Inn, Sirius CD SP004, 2000 - Ring of White Roses, a one-act light opera by Les Emmans, librettist Pat Mugridge, 1984; published Plays & Musicals, 2004 - The Plague of Eyam by Ivor Hodgson, 2010; overture performed on BBC radio, March 2010 - Eyam: A Musical, music by Andrew Peggie, book and lyrics by Stephen Clark; pioneered as a group production in 1990, CD Joseph Weinberger, 1995; London production at the Bridewell Theatre, 1998 - A Ring of Roses, Darren Vallier, Dress Circle Records (STG1) 1996; first performed at the Savoy Theatre, 1997; Jasper Publishing 2004 - The Ring of Stones, Eddie Brierley, Peter Robinson, Arthur Connett; premiered at the Dancehouse Theatre, Manchester (1999), before moving to the Lyric Theatre at the Lowry Centre in December 2000. Revived in 2010 and currently touring the North West of England, culminating with a week's run at the 2011 Edinburgh Festival Fringe. - "Roses of Eyam", originally composed by John Trevor (Beau) in 1975; added to Roy Bailey's repertoire and recorded by him in 1985 on his Hard Times album and reissued on his album Past Masters, Fuse Records, 1998; Beau himself released the song officially for the first time as a bonus track on the 2007 UK reissue of the original Beau disc (Cherry Red), and on the 2008 Japanese release of the same album (Airmail Recordings). - "We All Fall Down", written by Leeds-based band iLiKETRAiNS and featured on their album Elegies to Lessons Learnt, 2007 - "For Flotsam", by Cardiff-based indie pop band Los Campesinos! and featured on their album No Blues, 2013, contains the lyric: "We are their Capel Celyn, they gotta keep their slippers dry/To empathise with Tories, to invite upon disease/A safer bet's to pack your bags, go holiday in Eyam". - Anna Seward, 'the Swan of Lichfield', (1747–1809) - Richard Furness, 'the Poet of Eyam' (1791–1857) - Robert Eden, 3rd Baron Auckland Rector of Eyam between 1823 and 1825. Afterwards 3rd Lord Auckland; Bishop of Sodor and Man 1847 – 1854, then Bishop of Bath and Wells, 1854 – 1869. - Egbert Hacking, Rector of Eyam between 1884 and 1886, later Archdeacon of Newark - "Parish Headcounts: Eyam CP". Neighbourhood Statistics. Office for National Statistics. Retrieved 12 April 2007. - "Eyam in brief". eyamvillage.org. Retrieved 16 May 2014. - "Civil parish population 2011". Neighbourhood Statistics. Office for National Statistics. Retrieved 24 March 2016. - "Living with the plague". Local Legends. BBC. Retrieved 12 April 2007. - Stones Circles - Roger Ridgeway, Eyam village site - Kenneth Cameron, English Place Names, London 1996, p.172 - "Eyam". Key to English Place-names. English Place Name Society at the University of Nottingham. Retrieved 18 August 2013. Probably referring to its situation between Hollow Brook and Jumber Brook - "Eyam Saxon cross". Images of England. English Heritage. Retrieved 17 April 2006. - Neville T. Sharpe, Crosses of the Peak District (Landmark Collectors Library, 2002) - Doug Nash, Eyam village site - Eyam Village site, "Mining and Industry" - "Mystery of the Black Death". Secrets of the Dead. PBS. Retrieved 12 April 2007. - Clifford (1989) - List of plague victims - [Patrick Wallis, A Dreadful Heritage: Interpreting Epidemic Disease at Eyam, 1666–2000, pp.28–31 - White's History, Gazetteer & Directory of the County of Derby, for 1857 - Wishful Thinking - Jacques, Alan. "Harry the Umpire (Harry Bagshaw, 1859–1927)". UK & Ireland Genealogy. - BBC Your Paintings - BBC Your Paintings - BBC Your Paintings - Portraits of Houses.com - Serendipity Antiques - Artist's website - BBC Your Painting - BBC Your Paintings - Sylvia Bowerbank, Speaking for Nature: Women and Ecologies of Early Modern England, Johns Hopkins University 2004, p.167 - "Verses written by Miss Anna Seward in the Blank Leaves of her own Poems, presented by her to William Newton", Gentleman's Magazine, March 1785, pp.213–4 - The History and Antiquities of Eyam, 1842, Wishful Thinking - It was not published until a decade later in the London Chronicle - Poetical Works, vol.3, pp.1–3 - The Poetical Works vol. 3, pp.22–4 - Poetical Works, London 1858 - William Woods, The History and Antiquities of Eyam, London 1842, p.1 - Terry Goble, The Literary Way - Available online at Read Any Book - The original edition is on Google Books - BMJ site - Villanova University - The opening chapters are on Google Books - Details on Google Books - Preview on Google Books - Review from The York Press - Preview script at Plays and Musicals - Guide to Musical Theatre - Tracks and photos at the show's website - Trevor Midgley; the words are quoted at Mudcat - Documents on the Eyam Village site |Wikimedia Commons has media related to Eyam.| |Wikivoyage has a travel guide for Eyam.|
<urn:uuid:b8e951e1-2a12-488d-851a-9d0c159bbdef>
{ "date": "2017-01-19T07:03:14", "dump": "CC-MAIN-2017-04", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280485.79/warc/CC-MAIN-20170116095120-00560-ip-10-171-10-70.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9609424471855164, "score": 2.859375, "token_count": 5029, "url": "https://en.wikipedia.org/wiki/Eyam" }
There are a number of similarities between Lake Okanagan in British Columbia and Scotland's Loch Ness. They are both long and narrow and lie at about the same latitude. And they are each famous for their resident monsters. The best-known Canadian lake Monster, Ogopogo, actually made its media debut long before the Loch Ness Monster. In 1926, seven years before Nessie's came to the public's attention, Roy W. Brown, editor of the Vancouver Sun, wrote, " Too many reputable people have seen [the monster] to ignore the seriousness of actual facts." While there are serious questions about whether there are non-retroactive Nessie sightings before 1930, but there are archival records of Ogopogo's existence going back to 1872 and sightings have been reported regularly up to the present. The creature is most often described as being one to two feet in diameter with a length of 15 to 20 feet. The head has been described variously as being horse or goat-like. One oft-mentioned characteristic of the monster is its resemblance to a log. Cryptozoologist Roy P. Mackal believes that there is a "small population of aquatic fish-eating animals residing in Lake Okanagan." Mackal initially assumed that the type of animal in Lake Okanagan was the same creature that he believed is in Loch Ness, but after a careful examination of the available data, he determined that the creature must be a form of primitive whale, Basilosaurus cetoides. "The general appearance of Basilosaurus tallies almost exactly with the loglike descriptions of the [Ogopogos]. Mackal spells out a detailed case for Ogopogo being a primitive whale in his book Searching for Hidden Animals. There are good size Indian reserves in the Okanagan Valley. The Indians believe that small, barren Rattlesnake Island is the home of the Okanagan Lake Monster. Indians called the Okanagan Lake Monster N'ha-a-tik, and there are pictographs that some feel depict the monster near the headwaters of Powers Creek. Other native references to the Okanagan Lake Monster include the Chinook wicked one and "great-beast-on-the-lake." In addition to the Salish N'ha-a-tik (or Na-ha-ha-itk), snake-in-the-lake was sometimes used. The early inhabitants of the area saw the monster as a malevolent entity. Indians claimed that Monster Island's rocky beaches were sometimes covered with the parts of animals that they had attacked and ravaged. When crossing the lake during bad weather, the Indians always carried a small animal that they would toss overboard in the middle of the lake to appease the monster, according to material in the files of the Kelowna Archives. Primrose Upton, in The History of Okanagan Mission, noted that no Indians would fish near Squally Point. When Europeans settled in the area, they too feared the aquatic monster and supposedly continued the custom of offering an animal to appease Ogopogo. According to Ogopogo expert Arlene Gaal, armed settlers patrolled the shoreline in case of attack by the monster. In 1914 a group of Nicola Valley and Westbank Indians discovered the decomposing body of an unidentified creature across from Rattlesnake Island. Five-six feet long and estimated to weigh 400 pounds, it was blue-grey. It had a tail and flippers, and an amateur naturalist in the area felt that it was a manatee. No one knew how such a creature could have gotten into the lake, and Lake monster expert Peter Costello has hypothesized that the carcass was "actually an Ogopogo, as the details of this mammal with flippers and a broad tail and dark color are all that we would expect. But the carcass was mangled so much that the long neck was already gone." Ogopogo footprints have also been found. Some have been irregularly shaped, others cup-like, some were like dinosaur tracks with three toes, and still others had a pad foot and eight toes! As Dr. Mackal has written, "The trouble with footprints is that anyone can fake them easily. Further, to assume that they were made by Naitaka is pure conjecture and supposition--certainly possible but without even a circumstantial link" to the few cases of Ogopogo land sightings that have been reported. Music for a Monster The name Ogopogo might suggest to some that it is an Indian word, but all evidence points to a modern origin. According to Mary Moon, author of Ogopogo: the Okanagan Mystery (1977), in 1924 a local named Bill Brimblecomb sang a song parodying a popular British music-hall tune at a Rotary Club luncheon in Vernon, a city in the northern Okanagan Valley. H.F. Beattie adapted the lyrics, which included the following: I'm looking for the Ogopogo, His mother was a mutton, His father was a whale. I'm going to put a little bit of salt on his tail. Robert Columbo, in his book Mysterious Canada, notes that the Pogo Stick was a popular craze since its introduction in 1921 and this may have contributed to the name. According to Arlene Gaal, author of Ogopogo: The True Story of the Okanagan Lake Million Dollar Monster, a Vancouver Province reporter named Ronald Kenvyn later parodied a popular British ditty and composed a song that included the following stanza: His mother was an earwig; His father was a whale; A little bit of head And hardly any tail- And Ogopogo was his name. Thanks to these songs, the name Ogopogo stuck and the Indian name has been forgotten by all but monster buffs. A History of Strong Sightings While Ogopogo has never attained the fame of Nessie, the Loch Ness Monster, the creature of lake Okanagan has regularly caused quite a stir in the international press. Monster hunters from all over the world have been drawn to the area for research purposes, and many of the sightings have been as strong or stronger than those at Loch Ness. Multiple witness sightings of Ogopogo, so rare with many other controversial phenomena, have occurred on many occasions. On September 16, 1926, Ogopogo was watched by some 30 cars of people along an Okanagan Mission beach. Not many monsters have been seen at one time by so many people. The Ogopogo sightings of 1925/26 deserve some in-depth study. Consider the appearance of Ogopogo on July 2, 1947, when a number of boaters saw the monster simultaneously. One of the witnesses, a Mr. Kray, described the animal as having "a long sinuous body, 30 feet in length, consisting of about five undulations, apparently separated from each other by about a two-foot space, in which that part of the undulations would have been underwater...There appeared to be a forked tail, of which only one-half came above the water. From time to time the whole thing submerged and came up again." On July 17, 1959, Mr. and Mrs. R. H. Miller and Mr. and Mrs. Pat Marten saw a tremendous creature with a snake-like head and a blunt nose swimming some 250 feet behind their motor boat on British Columbia's Okanagan Lake. The group watched the unknown animal for over three minutes, after which it submerged. More recently, in the summer of 1989, hunting guide Ernie Giroux and his wife were standing on the banks of Okanagan Lake when a bizarre animal emerged from the otherwise placid waters. "It was about 15 feet long and swam real gracefully and fast," Giroux told the press. The Girouxs claim to have see an animal with a round head "like a football;" at one point several feet of the creature's neck and body came up out of the water. The Girouxs saw the monster at the same spot where, in July 1989, British Columbian car salesman Ken Chaplin took a video of a what he described as a snake-like creature about 15 feet long and dark green in color. This columnist has viewed the Chaplin video and feels that it was probably a beaver. "I've seen a lot of animals swimming in the wild and what we saw that night was definitely not a beaver," Ernie Giroux states emphatically. Giroux is in good company. There have over 200 sightings by credible people including a priest, a sea captain, a surgeon, police officers, and so forth. The fact that the percipients are generally people of good repute is often mentioned in reports of sightings. Photos of Ogopogo are numerous and include the 1964 Parmenter photo; the 1976 Fletcher photo; the 1978, 1979 and 1981 Gaal photos, the 1981 Wachlin photo, the 1984 Svensson photograph. There have now been half a dozen films and videos taken of an animate object in Lake Okanagan, but none of them are conclusive. What would solve the Ogopogo enigma? Only the discovery of an actual beast or the carcass of one would admit these creatures into mainstream science. If Ogopogo exists, it is clearly an elusive creature. Ogopogo hunters have failed to come up with that piece of unimpeachable evidence that will prove to the world that the aquatic monster exists. Until that evidence is found, Canada's premiere lake monster will remain a classic mystery.
<urn:uuid:cf2dfd33-de66-40d1-afbd-1feb7d116ae3>
{ "date": "2014-12-22T11:56:53", "dump": "CC-MAIN-2014-52", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802775222.147/warc/CC-MAIN-20141217075255-00099-ip-10-231-17-201.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9696418046951294, "score": 3.03125, "token_count": 1977, "url": "http://strangeworldofmystery.blogspot.com/2008/03/ogopogo-other-lake-monster.html" }
Note to journalists: Please report that this research was presented at a meeting of the American Chemical Society. A press conference on this topic will be held Wednesday, Sept. 11, at 9 a.m. in the ACS Press Center, Room 211, in the Indiana Convention Center. Reporters can attend in person or access live audio and video of the event and ask questions at www.ustream.tv/channel/acslive. INDIANAPOLIS, Sept. 11, 2013 — Millions of people who are obese and smoke tobacco may face additional health problems — including their responses to common prescription medicines — that extend beyond the well-known links with cancer, heart attacks and stroke, according to a report presented here today. Scientists told an audience at the 246th National Meeting & Exposition of the American Chemical Society (ACS), the world’s largest scientific society, that those health threats may include “passive” or “second-hand” smoking. It occurs when non-smokers inhale smoke from cigarettes smoldering nearby. The ACS meeting, which continues through Thursday, includes almost 7,000 reports on new advances in science and other topics. “Our research shows that smoking and obesity together may pose a triple health threat in addition to the increased risks for heart disease, cancer and diabetes,” said Aaron Wright, Ph.D., who reported on the study. “That dangerous combination impacts key mechanisms by which both the lung and liver perform metabolism. For example, the body’s ability to metabolize prescription drugs may be altered in ways that could make standard dosages too high or too low to be effective in obese people who are exposed to tobacco smoke. “Tobacco smoke and obesity also intensifies the cancer-causing potential of cigarette smoke. We were surprised to find that in some instances, the substances in second-hand smoke seem to have a more dramatic effect than just smoking,” he said. Wright described experiments analyzing the activity of a key family of enzymes in liver and lung tissues obtained from lean and obese mice exposed directly to cigarette smoke and second-hand smoke. These cytochrome P450 enzymes (also known as “P450s”) metabolize, or break down, about 75 percent of all prescription and non-prescription drugs, and other ingested substances. The P450 enzyme system ensures that insulin, beta-blockers, oral contraceptives, pain-relievers, tranquilizers and other medications do their work and then disappear from the body. P450s also metabolize fats. Scientists have known for years that cigarette smoke can make some P450 enzymes more active. As a result, smokers may wind up with levels of medication in their blood that are too low to treat a disease. Though they haven't studied many obese individuals, researchers know that some alterations to the activity of P450 enzymes occur with excess body weight. Wright and colleagues, who are with the Pacific Northwest National Laboratory in Richland, Wash., decided to take a first step toward determining the combined effects of both cigarette smoke and obesity. With obesity a problem for about 72 million people in the United States alone, and 44 million people still smoking cigarettes, they knew that considerable overlap occurs, with millions of people both obese and smokers. They studied how P450 enzymes work in liver and lung tissues from groups of mice that were obese or normal weight, and exposed to cigarette smoke, second-hand smoke, or not exposed to cigarette smoke. “Exposure to cigarette smoke increased the activity of some of the P450 enzymes, and adding obesity had little or no change on that effect,” Wright said. “But for other enzymes, which usually are far more active when exposed to cigarette smoke, the addition of obesity had a dramatic, opposite effect. The enzymes were 100 times less active.” One potential consequence of these combined effects is an increased risk of developing lung cancer, Wright said. He explained that substances in cigarette smoke become carcinogenic when the P450s break them down. Obesity alters the lung P450s, potentially adding to the cancer-causing effects of the smoke. A look at second-hand smoke revealed more surprises. Second-hand smoke had a more pronounced effect on the activity of some enzymes than active smoking. Wright said it will take additional research to establish the exact health implications for the millions of people who smoke and are obese. But the findings, he added, are another reason why people should maintain a normal body weight and avoid cigarette smoke. And they may serve as an alert to pharmaceutical companies to consider both cigarette smoke exposure and obesity in drug research. Wright acknowledges funding from the National Institute of Environmental Health Sciences and the National Institute of General Medical Sciences. To automatically receive news releases from the American Chemical Society, contact [email protected]. # # # The American Chemical Society is a nonprofit organization chartered by the U.S. Congress. With more than 163,000 members, ACS is the world's largest scientific society and a global leader in providing access to chemistry-related research through its multiple databases, peer-reviewed journals and scientific conferences. Its main offices are in Washington, D.C., and Columbus, Ohio.
<urn:uuid:f48019bf-4232-4794-87f9-67661359460c>
{ "date": "2016-10-23T14:17:44", "dump": "CC-MAIN-2016-44", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719273.38/warc/CC-MAIN-20161020183839-00046-ip-10-171-6-4.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9538136720657349, "score": 2.8125, "token_count": 1082, "url": "https://www.acs.org/content/acs/en/pressroom/newsreleases/2013/september/obesity-combined-with-exposure-to-cigarette-smoke-may-pose-new-health-concerns.html" }
RESPONSES TO BENEDICTIONS: Any portion of the liturgy which begins with the words "Blessed be Thou, O Lord" ("Baruk attah Adonai"), or which ends with an abstract of itself introduced by these words, or which both begins and ends thus, is known as a benediction ("berakah"). When it is read aloud by a leader, for instance, at public service at which ten or more men are met, or when grace is said where three or more men have eaten together, or even where the master of the house pronounces the sanctification ("Ḳiddush") of Sabbath or of a festival before his wife and children, the congregation or company answers "Amen" at the end of each benediction. The meaning of this word is "true" or "truly"; but its use in the Greek of the New Testament indicates that at this early age it was deemed to be technical and untranslatable. The origin of this sort of response can be traced back to the double "Amen" at the end of the first, second, and third books of Psalms; e.g., "Blessed be the Lord forever, Amen and Amen." The Mishnah (Ber. viii. 8) fully recognizes an established custom when it warns the faithful that while they may boldly say "Amen," thus giving assent to any berakah pronounced by an Israelite, they must not so respond to the benediction of a Samaritan unless they have heard every word of it. A Babylonian teacher (Ber. 45a) warns those who respond not to cry out "Amen" louder than the leader has recited the benediction; for the Psalmist says (xxxiv. 4 [A. V. 3]), "Magnify the Lord with me." After the third benediction in grace after meal, the word "Amen" is spoken by those who recite the benediction along with it (Shulḥan 'Aruk, Oraḥ Ḥayyim, 188, 1). This custom originated as a hint to working men eating at the master's table, that they might leave without staying for the less obligatory fourth benediction (see Ber. 46a). In the Temple, however, when a benediction was pronounced, the response, on the authority, it is claimed, of Neh. ix. 5, was "Blessed be the name of His glorious kingdom forever and ever," as related in Yer. Ber. ix. 5, and repeated thence in Bertinoro's commentary. It is the present usage (though one unsupported by anything in the Talmud or the codes, or in any of the older works on the liturgy), when the leader has pronounced the words "Blessed be Thou, O Lord," for the bystanders to chime in with "Blessed be He and blessed be His name" ("Baruk hu u-baruk shemo"). Sulzer and other masters of modern synagogal music have phrased this response for their choirs. The advocates of this custom base its practise on Deut. xxxii. 3—"When I call on the name of the Lord, ascribe ye greatness to our God"; the Sifre (ad loc.) makes this verse the authority for other well-known responses, but not for this. The opponents of the custom point out that its origin is not only cabalistic, but that it was devised by the followers of Shabbethai Ẓebi in his honor, the letters of the words in question having the same numerical value (814) as the name of the false Messiah. See Amen.
<urn:uuid:7f51a60a-b940-4b29-9592-33d64ab0f824>
{ "date": "2016-07-30T05:22:50", "dump": "CC-MAIN-2016-30", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257832939.78/warc/CC-MAIN-20160723071032-00288-ip-10-185-27-174.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9577759504318237, "score": 3.046875, "token_count": 776, "url": "http://jewishencyclopedia.com/articles/12694-responses-to-benedictions" }
How These Motions Are Changing These terrestrial motions are not stable, but changing. The changes are important to us, since they affect our time reckoning, our climate, and our understanding of the Earth's past. The Earth's rate of rotation is decreasing, so that the length of the day is increasing. Tides raised on the Earth, primarily by the Moon, cause the Earth's rotation to decelerate. In accordance with the principle of conservation of angular momentum, the Moon's orbit is correspondingly receding from the Earth (see Figure 5). Figure 5. The Moon recedes and the Earth's rotation slows. Illustration courtesy of author. Records of solar and lunar eclipses over the past 2500 years indicate that the tidal effect, about 2.3 milliseconds per century, is partially opposed by a factor which reduces the increase in the length of the day to about 1.7 milliseconds per century. This countereffect is probably caused by the recovery of the Earth's shape from the distortion of the last ice age, when the polar latitudes were depressed by the weight of the ice caps. In the long run, the effect should vary with the growth and shrinking of the ice caps. It has been suggested that today the tidal effect is also being slightly reduced by the growing number of huge water reservoirs on Earth, particularly in the northern hemisphere. Sediments preserved in rock record daily tidal changes, and also changes in step with the phases of the Moon, during earlier geological periods. These records have enabled scientists to determine that some 900 million years ago, assuming the length of the year has not changed significantly, the day was only about 18 modern hours long, and there were about 480 days in the year. Currently, the sidereal year -- the time it takes the Sun to return to the ecliptic longitude of a given fixed star-is about 365.2564 solar days. The sidereal year appears to be increasing slightly, about 0.01 second per century. This increase may not mean that the Earth's orbital motion is slowing down. Instead, the orbit may be increasing in size, which increases the period of revolution. The change is very small. If constant, it would amount to an increase of less than one day in one billion years. The Orientation of the Earth in Space The orientation in space of the Earth and its orbit is gradually changing, in several ways. The Invariable Plane Figure 6. The current location of the celestial north pole, the ecliptic north pole, and the north pole of the invariable plane in the northern sky. Illustration courtesy of author. To consider how this is happening, we need a reasonably stable frame of reference. For this, we can use the so-called invariable plane of the Solar System. The invariable plane is formally defined as "the plane through the center of mass of the solar system perpendicular to the angular momentum vector of the solar system." It represents the total angular momentum of all Solar System objects, insofar as their elements are known. It is not absolutely invariable but for most practical purposes can be considered so. The north pole of the invariable plane lies in Draco, its south pole in Mensa. The ecliptic is currently only about 1.58° from the invariable plane (Figure 6). Precession of the Earth's Axis The rotation of the Earth on its axis causes it to bulge at the equator and flatten at the poles. The gravitational force exerted on the equatorial bulge, almost entirely by the Moon and Sun, attempts to align the Earth's equator more closely with the ecliptic, but the rate of the Earth's rotation tends to maintain its obliquity. Instead, this gravitational force causes the Earth's axis of rotation to precess slowly. The poles describe an arc clockwise (opposite the direction of the Earth's rotation and revolution) as viewed from above the Earth's North Pole, looking down, but counterclockwise as viewed from the Earth's surface, looking up at the northern stars (Figure 7). The Earth behaves like a top spinning too slowly to remain stationary against the forces acting on it. The celestial equator rotates like a plate wobbling on top of a pole in a juggler's act. This motion is called lunisolar precession. It tends to shift the intersection of the celestial equator and the ecliptic westward along the ecliptic, through the zodiacal constellations. The celestial poles take about 26,000 years to complete one cycle of precession. In the Pyramid Age, about 2500 BC, the North Celestial Pole (NCP) was in Draco, near the star Thuban. About 2000 years from now the NCP will enter the constellation Cepheus. Figure 7. The precession of the celestial north pole, viewed from above the north pole and against the background of northern stars. Illustration courtesy of author. The path of the poles is not a circle, but a loop or spiral. This time around, the NCP has come very close to Polaris, but the next time it is expected to pass about 3° from that star. This changes the angle between the celestial and ecliptic poles slightly, contributing to changes in the obliquity of the ecliptic. << previous page | 1 | 2 | 3 | 4 | next page >> back to Teachers' Newsletter Main Page
<urn:uuid:f2a5cf08-c514-4bba-b375-e812f2839c9f>
{ "date": "2014-03-07T12:08:34", "dump": "CC-MAIN-2014-10", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999642307/warc/CC-MAIN-20140305060722-00006-ip-10-183-142-35.ec2.internal.warc.gz", "int_score": 4, "language": "en", "language_score": 0.9301878809928894, "score": 4.15625, "token_count": 1124, "url": "http://www.astrosociety.org/edu/publications/tnl/45/globe2.html" }
A true mustang is a horse that is born in the wild, usually with at least one wild parent. If it goes back a couple of generations in the wild it will tend to show feral characteristics. It could have any type of horse in it's genetics, so there is no breed standard except that it be a wild born feral horse. It is generally acknowledged that the origins of the American mustang comes from the spanish Iberian horses specificly the Andalusian, and the Arabian as well as the Barb horses that were brought over by the Spaniards in their explorations. Many of these wild herds have had a lot of other stray horses including draft horses that have intermingled and kind of made a true "mustang" standard difficult to put in place. Thus, a mustang is a wild horse period. That said, there are now some specific breeds of mustangs that do have certain standards, by type or conformation. Typically, a breed organization will define their particular type of mustang by these standards and you have to have them to register as such. Some orgs are fairly "loose" in their standards some not. Some of these include Spanish Mustang Registry, founded in 1957, followed by the American Indian Horse Registry, the Spanish Barb Breeders Association, and the Southwest Spanish Mustang Association. There are also a couple of registries that are very specific about what they allow in-most of which I can't remember at the moment. The two I can remember are the Cracker horses in Florida and the Kiger mustang. There are currently a couple of Kiger registries. The original Kiger registry only allows horses that were either from or descended from two areas near the Kiger range in Oregon. The Steens Mountain area and the Riddle area. These two particular herds are thought to be one of only a couple places in the country where the herds were so isolated that their bloodlines were never contaminated by other breeds or strays. This has been borne out by genetic testing. They do have certain standards for type, build, conformation, and must be able to prove that they have the Dun factor. So they are mustangs, even Colonial Spanish Mustangs, BUT not all mustangs or Colonial Spanish Mustangs could be a Kiger.
<urn:uuid:e45e3b26-1f6d-4c0a-aa43-d05be8cfbf0a>
{ "date": "2016-07-29T13:11:18", "dump": "CC-MAIN-2016-30", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257830066.95/warc/CC-MAIN-20160723071030-00231-ip-10-185-27-174.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9794211387634277, "score": 2.734375, "token_count": 464, "url": "http://www.horseforum.com/horse-breeds/mustang-questions-146373/" }
Otitis media (OM) is the most common diagnosis in pediatric patients who visit physicians for illness in the United States [1-2], affects more than 90% of all children by the age of 5 [3-4], is the most common indication for antimicrobial therapy in children , is the most common cause of hearing loss in young children and can lead to speech, language, educational and other developmental delays . Treatment of OM also consumes significant health care resources as OM is responsible for approximately $5 billion annually in health care expenditures in the U.S., is the most common cause for surgical procedures in young children [4,7-8], and is associated with life-threatening complications such as meningitis and brain abscess formation [9- 10]. Given these factors, a more thorough understanding of OM through basic science investigation is required to provide potential novel and efficacious interventions. Specifically, gel-forming mucins (GFM), produced by middle ear mucosa (MEM), are known to be the primary cause of hearing loss which develops in children with chronic OM and mucins are also known to be critically important in ME mucosal protective functions and immunity. Very little has been achieved in developing an understanding of the regulation of mucins in MEM and even less in correlating laboratory findings to bedside observations in patients suffering from OM. Answering the questions posed by our Central Hypothesis that specific host and pathogen factors influence mucosal changes to regulate GFM in the middle ear will allow significant enhancement in our understanding ME mucin function and regulation in relation to OM pathogenesis. The current proposal will include clinical specimens from children with chronic OM, animal models and in vitro cell culture models and employ molecular techniques to answer these fundamental questions: 1) What is the relationship of specific GFM to hearing loss in children, 2) Are there measurable changes in the MEM of children with chronic OM that correlate with changes in GFM?, 3) Does utilization of antibiotic therapy have a meaningful effect on GFM?, 4) What is the impact of biofilm formation on GFM in the ME space?, 5) In patients with chronic OM, do any of the primary OM pathogens: NTHi, SP or Mcat differentially regulate increased GFM production, 6) Does aquaporin 5 impact GFM regulation and 7) Is there a correlation between GFM expression and polymicrobial infection of OM pathogens? Data generated through this proposal will provide answers to these questions and will continue to advance our long-term goal of developing novel interventions in OM pathogenesis through modulation of mucin production pathways. Ear infections affect almost all children, are an expensive burden on our health care system and are the most common cause of hearing loss in children;leading to potential developmental difficulties. Mucins are the fluids that build up behind the eardrums in some children after ear infections and cause the hearing loss. Understanding how these mucins form in children with chronic ear infections and developing new ways to treat and care for these children has the potential to lead to fewer children with hearing loss and other difficulties associated with this disease. |Hong, Wenzhou; Khampang, Pawjai; Erbe, Christy et al. (2014) Nontypeable Haemophilus influenzae inhibits autolysis and fratricide of Streptococcus pneumoniae in vitro. Microbes Infect 16:203-13| |Kerschner, Joseph E; Hong, Wenzhou; Khampang, Pawjai et al. (2014) Differential response of gel-forming mucins to pathogenic middle ear bacteria. Int J Pediatr Otorhinolaryngol 78:1368-73| |Kerschner, Joseph E; Hong, Wenzhou; Taylor, Steven R et al. (2013) A novel model of spontaneous otitis media with effusion (OME) in the Oxgr1 knock-out mouse. Int J Pediatr Otorhinolaryngol 77:79-84| |Shemirani, Nima; Osipov, Vladimir; Kolker, Alex et al. (2011) Expression of mucin (MUC) genes in mucoepidermoid carcinoma. Laryngoscope 121:167-70| |Kerschner, Joseph E; Li, Jizhen; Tsushiya, Katsuyuki et al. (2010) Mucin gene expression and mouse middle ear epithelium. Int J Pediatr Otorhinolaryngol :| |Kerschner, Joseph E; Tripathi, Shivani; Khampang, Pawjai et al. (2010) MUC5AC expression in human middle ear epithelium of patients with otitis media. Arch Otolaryngol Head Neck Surg 136:819-24| |Kerschner, Joseph E; Erdos, Geza; Hu, Fen Ze et al. (2010) Partial characterization of normal and Haemophilus influenzae-infected mucosal complementary DNA libraries in chinchilla middle ear mucosa. Ann Otol Rhinol Laryngol 119:270-8| |Kerschner, Joseph E; Li, Jizhen; Tsushiya, Katsuyuki et al. (2010) Mucin gene expression and mouse middle ear epithelium. Int J Pediatr Otorhinolaryngol 74:864-8| |Kerschner, Joseph E; Khampang, P; Samuels, Tina (2010) Extending the chinchilla middle ear epithelial model for mucin gene investigation. Int J Pediatr Otorhinolaryngol 74:980-5| |Ubell, Matthew L; Khampang, Pawjai; Kerschner, Joseph E (2010) Mucin gene polymorphisms in otitis media patients. Laryngoscope 120:132-8| Showing the most recent 10 out of 16 publications
<urn:uuid:01701b4c-b227-4d1f-abf8-1792e8535a8c>
{ "date": "2016-10-21T16:53:35", "dump": "CC-MAIN-2016-44", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718285.69/warc/CC-MAIN-20161020183838-00087-ip-10-171-6-4.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.869815468788147, "score": 2.65625, "token_count": 1247, "url": "http://grantome.com/grant/NIH/R01-DC007903-06A1" }
Educating Young Entrepreneurs (EYE) in America is a non-profit organization that teaches students how to run a business by helping them start and operate real businesses with real financing. Using business plans and real capital, EYE brings entrepreneurship to life. Students gain valuable experience from hands-on learning and overcome the fear of staking a position in today’s marketplace. How EYE works Students registered in courses affiliated with EYE submit their business plans to EYE. If approved, students receive real financing (initially $500 and more is available depending on the promise of the business). Participants have several months to bring their plan to action, under the guidance of experienced mentors. Profitable ventures can turn into part-time jobs for students and any profits earned in the initial 9-month phase are held in a college scholarship fund. Many students who did not plan to attend college cite their EYE experience as the reason for deciding to pursue a degree. Some nurture their start-up into established businesses.
<urn:uuid:ce2088ce-cd87-4c33-b934-cba3af8e2968>
{ "date": "2020-01-23T07:56:53", "dump": "CC-MAIN-2020-05", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250609478.50/warc/CC-MAIN-20200123071220-20200123100220-00176.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9591109752655029, "score": 2.640625, "token_count": 207, "url": "http://eyeinamerica.org/" }
A while ago on http://www.controlsystemslab.com (no longer maintained), we present an article on DC motor open-loop speed control , using a simple voltage command from ADC to drive the H-bridge driver. The PWM output is generated from output compare module of the dsPIC30F2010. That 16-bit digital signal processor is now quite dated. The reader would want to implement the scheme on a newer microcontroller. At the time of this writing, PIC24EP (and dsPIC33E) series from Microchip is the latest product in the 16-bit range that could run at 70 MIPS performance. For those who want to port the code to PIC24EP, unfortunately, you have to modify the ADC and PWM routines. In this article we focus on the latter. Continue reading “A Note on Output Compare (PWM) Module of PIC24E”
<urn:uuid:9580bdd7-8ed3-45ad-93ff-e20870213783>
{ "date": "2018-06-25T01:51:54", "dump": "CC-MAIN-2018-26", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267867364.94/warc/CC-MAIN-20180625014226-20180625034226-00456.warc.gz", "int_score": 3, "language": "en", "language_score": 0.8895760774612427, "score": 2.53125, "token_count": 195, "url": "https://dewdotninja.wordpress.com/tag/pwm/" }
Still possible to stay below 2°C © Lars-Erik Håkansson Global warming can be limited to below 2 degrees according to simulations made for the IPCC 5th assessment report. The fifth assessment report of the Intergovernmental Panel on Climate Change (IPCC) is now underway and will present next year possible scenarios which show that greenhouse gas emissions can be reduced so that global average temperature increase stays at 1.5 degrees until 2100. In February 2012, scientists from the Max Planck Institute for Meteorology (MPI-M) and the German Climate Computing Centre (DKRZ) made public new climate simulations using MPI-M’s new climate model. The new climate simulations were carried out on DKRZ’s supercomputer and occupied one quarter of total computing capacity over a period of two years. The Max Planck Institute for Meteorology is among the world’s leading institutes for climate research and the recent results of Hamburg’s climate model calculations will be integrated into the fifth assessment report of the IPCC. “Our results demonstrate the possibility to limit global warming to below two degrees Celsius throughout this century. But it requires a drastic reduction of carbon dioxide emissions,” says Professor Jochem Marotzke, Director at the Max Planck Institute for Meteorology and vice-chair of the World Climate Research Programme. By using an international model comparison project, researchers were able to simulate the complex carbon cycle as well as vegetation dynamics in climate projections for the 21st century. In case of an increase in CO2 emissions the simulations suggest not only an increase in temperature but also a rapid progression of ocean acidification, according to MPI-M. Recent data indicate that, due to carbon dioxide pollution, ocean acidification has increased by 30 per cent compared to pre-industrial times. Scientists doubt that many organisms will be able to cope with environmental change. Oceanic calcifying organisms will be particularly affected. MPI-M warns that in the event of continuously increasing emissions of carbon dioxide, as assumed in the least favorable scenario, scientists expect a rise in the global mean temperature by up to 4°C by 2100. (Figure). Professor Marotzke said that according to recent calculations Arctic summer sea ice melts faster than predicted. “With a smaller sea ice cover, more sunlight is absorbed by the dark open water of the polar ocean. This water therefore warms efficiently during summer (albedo effect). The melting rate of sea ice is directly connected with global warming.” In December 2011 the International Energy Agency warned in a press-release that without a bold change of policy direction, the world will lock itself into an insecure, inefficient and high-carbon energy system. “In the IEA’s World Energy Outlook (WEO) the central New Policies Scenario assumes that if recent government commitments are implemented in a cautious manner, primary energy demand increases by one-third between 2010 and 2035, with 90 per cent of the growth in non-OECD economies.” IEA’s analysis shows that in the New Policies Scenario, cumulative CO2 emissions over the next 25 years amount to three-quarters of the total from the past 110 years, leading to a long-term average temperature rise of 3.5°C. Chinas per-capita emissions match the OECD average in 2035. The IEA concludes if the current energy policy were not changed the world is on an even more dangerous track, to an increase of 6°C. “As each year passes without clear signals to drive investment in clean energy, the ‘lock-in’ of high-carbon infrastructure is making it harder and more expensive to meet our energy security and climate goals,” said Fatih Birol, IEA Chief Economist. The WEO presents a scenario that traces an energy path consistent with meeting the globally agreed goal of limiting the temperature rise to 2°C. Four-fifths of the total energy-related CO2 emissions permitted by 2035 in the scenario are already locked-in by existing capital stock, including power stations, buildings and factories. IEA warns that without further action by 2017, the energy-related infrastructure then in place would generate all the CO2 emissions allowed in the 450 Scenario up to 2035. Anything built from now on that produces carbon will do so for decades, and this “lock-in” effect will be the single factor most likely to produce irreversible climate change, the IEA says. “If this is not rapidly changed within the next five years, the results are likely to be disastrous.” The IPCC is now in full preparation of its Fifth Assessment Report (AR5). The report, which will be finalised in 2014, will be made up of four reports: the three IPCC Working Groups’ contributions dealing respectively with The Physical Science Basis (September 2013), Impacts, Adaptation and Vulnerability (March 2014), and Mitigation of Climate Change (April 2014), and the Synthesis Report (October 2014). Each report will contain its own Summary for Policymakers which is approved in detail by all member countries of the IPCC and represents a formally agreed statement on key findings and uncertainties. According to the IPCC, in comparison with previous Assessment Reports, the AR5 will put greater emphasis on assessing the socio-economic aspects of climate change and its implications for sustainable development. The IPCC Assessment Reports The IPCC Fifth Assessment Report (AR5) follows the overall mandate of the IPCC, the main activity of which is to prepare comprehensive assessment reports about climate change at regular intervals, typically of about five to seven years. The IPCC’s First Assessment Report (FAR) in 1990 played a decisive role in leading to the United Nations Framework Convention on Climate Change (UNFCCC), which was opened for signature at the Rio de Janeiro Summit in 1992. The Second Assessment Report (SAR) of 1995 provided key input for the negotiations of the Kyoto Protocol in 1997. The Third Assessment Report (TAR) of 2001 provided further information relevant to the development of the UNFCCC and the Kyoto Protocol. The Fourth Assessment Report (AR4) paid greater attention to the integration of climate change with sustainable development policies and the relation¬ships between mitiga- tion and adaptation, and led to a wider awareness of climate change issues in the general public and among decision-makers, inspiring world leaders to agree on the Bali Action Pla
<urn:uuid:baf00d27-05ff-4dc1-ae1a-71b662d3cf2a>
{ "date": "2017-11-23T16:24:16", "dump": "CC-MAIN-2017-47", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806844.51/warc/CC-MAIN-20171123161612-20171123181612-00256.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9201128482818604, "score": 3.421875, "token_count": 1323, "url": "http://www.airclim.org/acidnews/still-possible-stay-below-2%C2%B0c" }
The world’s eyes are on the escalating struggle to defend the collective bargaining rights of Wisconsin public workers. Some people have even called the growing mobilization a transformational movement. But transformational organizing takes more than growing numbers. Revisiting the 1955–56 Montgomery Bus Boycott can help us understand what it takes. In the 1950s, humanity was at a watershed. During World War II nearly 50 million people, more than half of them civilians, had been killed. To win the war, we had created and dropped an atom bomb on the people of Hiroshima and Nagasaki. Yet Americans were celebrating our winning this “good war” and even proclaiming the American century because our factories were busy producing the goods that the war-devastated factories of Europe and Japan were unable to produce. As Einstein put it, “the splitting of the atom has changed everything but the human mind, and thus we drift towards catastrophe.” It was under these circumstances that the people of Montgomery, Alabama, launched their yearlong boycott to protest the arrest of Rosa Parks for refusing to go to the back of the bus. Responding not only to the indignities of segregated busing but to the brutal murder in September 1955 of 14-year-old Emmett Till, a people who had been treated as less than human began a struggle against their dehumanization not as angry victims or rebels but as forerunners of a new, more human society. Practicing methods of non-violence that transformed themselves and increased the good in the world, creating their own transportation system by walking or car pooling, always bearing in mind that their goal was not only desegregating buses but creating the beloved community, they carried on a struggle that grew their own souls and inspired the civil rights movement and the other humanity-redefining movements of the 1960s. In 2011 we are again at a watershed that calls for growing our souls. The U.S. empire, which sustained the American Dream of upper mobility and middle class lives for all Americans but also included supporting the world’s Mubaraks, is dead. That means we have to create a New American Dream. To do this we need to look in the mirror and begin making the radical revolution of values that Dr. King called for in his 1967 anti-Vietnam War “Break the Silence” speech. To make this revolution: We need to ask ourselves new questions about how to provide for the general welfare and how to educate our children. We must create ways to meet these basic needs not mainly through a growing number of public workers but through caring for one another in beloved communities. We must begin reorganizing our local, state and federal budgets so that we spend public monies not for military domination and to support the Mubaraks of the world but for constructive human and domestic needs. The struggle in Wisconsin and other states can become a transformational movement if those involved in the struggle recognize that our current crises are rooted in the decline of the empire which made possible the welfare state with its thousands of public employees to take care of tasks for which we the people must become increasingly responsible. With the end of empire, we are coming to an end of the epoch of Rights. We have entered the epoch of Responsibilities which requires new, more socially-minded human beings and new, more participatory and place-based concepts of citizenship and democracy. In cities like Detroit and Milwaukee, abandoned by global corporations, community people are struggling to build more self-reliant, localized economies, growing our own food, restoring the neighbor to the ‘hood, and in the process also growing our souls. The Wisconsin struggle can be deepened by connecting with these community struggles.
<urn:uuid:871e0e78-21cc-4855-8084-2acf43ae1d13>
{ "date": "2016-07-01T05:13:29", "dump": "CC-MAIN-2016-26", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783400031.51/warc/CC-MAIN-20160624155000-00088-ip-10-164-35-72.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9677677154541016, "score": 2.828125, "token_count": 765, "url": "http://www.yesmagazine.org/blogs/grace-lee-boggs/wisconsin-time-to-grow-our-souls" }
This page is not about gender differences (tho it does appear here and there) but about “empowerment”. This page contains a collection of links related to noted patterns from experiencing the Dutch Montessori school system, additional teachings from various indigenous tribes that worked for me, and the odd useful book or essay: - What is power? - Which is better, power over self or others? - Empowerment, my ass! What is power? In physics, power is the rate of doing work. The triggering technology for the change from an agricultural to an industrial organisation was steam power, allowing mass production and reducing the agricultural work necessary. For humans to “have power over self” means to have the ability or capacity to act or do something effectively. In social science and politics, power is the ability to influence or control the behavior of people, most often to have them do work in an otherwise highly unlikely social contract. The term “authority” is often used for power perceived as legitimised by the social structure. If a human can effectively steer another human to do a particular job, instead of spending the energy required to do the job him or herself, is that person “having power over self”, or is that “having power over others”? And there you have it. All of the necessary ingredients for insanity, as many people try to distinguish between “power over others” and the “real power” with lots of “Good” and “Evil” labels.[linkview show_cat_name=”0″ cat_name=”Power”] Which is better, power over self or others? Power over self. Taking power over others is extremely hard if not impossible, a temporary illusion at most, and results in feelings of emptiness. The cost is also very high. To take someone elses freedom (to act) takes a loss of your freedom (to act). Power over self is somewhat possible (but still takes serious effort) and results in more personal freedom (to act). Maybe we can learn something from other societal structures?[linkview show_cat_name=”0″ cat_name=”Self and other power”] Empowerment, my ass! Then of course there are those that love to “inflict help” on others. The new buzzword is “empowerment”. Of others of course. Do-gooders. To make you feel even more powerless. As if that is possible. Our past and what we’ve been taught leads us to believe and experience life as we do. The key to living a meaningful life is simply to unlearn some of the nonsense we have learned. Personal empowerment is called “non-caring” by some traditions, but doesn’t mean not caring about other people. It also does not mean not caring what others think. Personal empowerment is very vulnerable to the emotions and attachments of living. The self is responsible for these. Others can not create emotions in me, and I can’t create them in others. Whatever the other person does is their choice and I will not attempt to control that. I’d rather walk away and put my energy into taking care of what is true inside of me. Any attempt to control another person is a flighty illusion in my book. We cannot control others, at all, ever. If it appears to be true that my manipulation made you do some thing, then for whatever reason, you chose to do that some thing. In other words, you agreed to do it. You chose it. You can choose to change your response and experiment with other responses the next time a similar situation occurs. Or not. That is still a choice you make.[linkview show_cat_name=”0″ cat_name=”Empowerment”] Psychologists use the term “socialisation” for the process by which children are trained to think and act as society demands. A person is said to be well socialised if he or she believes in and obeys the moral code of his or her society and fits in well as a functioning part of that society. Like pets maybe?[linkview show_cat_name=”0″ cat_name=”Socialisation”] According to Ted Kaczynski, the power process (that I associate with “meaningful achievements”) has four elements: The three most clear-cut of these we call goal, effort and attainment of goal. (Everyone needs to have goals whose attainment requires effort, and needs to succeed in attaining at least some of his goals.) The fourth element is more difficult to define and may not be necessary for everyone. We call it autonomy. What if we stop teaching kids to be obedient cogs in social structures, but instead provide an environment with resources for self-directed learning and development, and a “teaching” attitude of “Give only that which is asked, and only that which we can give with heart”, meaning, without expecting a “return on investment” or allowing ourselves to get drawn in for whatever reason? Some additional “teaching by example” as supportive function may be useful as well. Off the top of my head from my experiences: - Allow kids to follow their own nose, not yours. - Set an atmosphere of humour, including some delightful self-mockery as example. - Except for real mental illnesses, sobriety for kids. No ritalin, risperdal, zyprexa, seroquel … - Allow kids to actualise themselves not only as winner (by meaningful achievement) but also as loser (for resculpting posture, self concepts and taking responsibility). - These ways, when practiced and integrated, can never be taken. We can be killed for it if we are considered a threat by “civilised” society, but our core power can not be taken as it is based in realistic self-confidence and having our own captain aboard. - Allow for competition (for the kids to improve self with) and cooperation (for the kids to find out what their selves truly know). - Teach realistic self-reflection on strengths and weaknesses by example, in little bits and pieces. - Also by example, teach conquering the enemy within (where that “enemy” is some oversocialised “correctness pretender voice” blocking further development). - Exercise (as temporary as possible) mentoring roles with care and great consideration. Get out of the role immediately when done. Shake it off. Mentoring is not an “identity”, just an occasional temporary state. - Commit to further self-actualisation. Drop an unexpected nose type wisdom, see how those around you respond. If you find your self in an environment where you can not contribute meaningfully and/or follow your nose to learn some “thing” that attracts (or repels) you, apply the Law of Two Feet. That’s it in a short and generalised version (from memories of experiences). If you so wish, you can find more information on Montessori ways and what forms Montessori and its offshoots took in your locality:[linkview show_cat_name=”0″ cat_name=”Montessori”]
<urn:uuid:1607cfff-342d-4e43-94bc-977e05e29872>
{ "date": "2017-02-25T13:56:40", "dump": "CC-MAIN-2017-09", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171775.73/warc/CC-MAIN-20170219104611-00328-ip-10-171-10-108.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9521036744117737, "score": 2.828125, "token_count": 1561, "url": "https://nanasilvergrim.cyberguerrilla.org/?page_id=3317" }
From Our 2010 Archives Sniffing Device Helps Disabled People Move, Write Technology Helps Severely Disabled People Use Their Noses to Drive Electric Wheelchairs, Write Text Messages Reviewed By Louise Chang, MD July 26, 2010 -- Israeli scientists have developed a device that allows severely disabled people to sniff to precisely control objects such as wheelchairs and personal digital assistants, a new study says. The nasal-mask device works so well that disabled people who can't move at all can learn to write text messages and drive electric wheelchairs by sniffing, researchers report in the July issue of Proceedings of the National Academy of Sciences. Noam Sobel, PhD, of the department of neurobiology at the Weizmann Institute in Israel, and colleagues set out to find a way to allow people with disabilities ranging from quadriplegia to "locked-in syndrome" to learn how to control devices with their noses just as they would using a joystick or computer mouse. The Weizmann Institute has filed for a patent on sniff-controlled technology, which the researchers report as a possible conflict of interest. The researchers built a "sniff controller" that measures changes in nasal pressure, which occur when the soft palate (the soft area at the back of the roof of the mouth) is repositioned. The device was tested on healthy and disabled people. The researchers report that sniffing can be done with precision, and that it requires precise movements of the soft palate, which receives signals from cranial nerves that often are not affected by paralytic injury and other disorders. The study involved 96 healthy and 15 severely disabled people who were taught to sniff in different ways to send various electrical signals to a controller. For example, two in-sniffs meant forward, and two out-sniffs backward. Various sniffing sequences allowed participants to turn and steer a wheelchair. In the end, a quadriplegic person could use the sniff controller to drive an electric wheelchair with precision after only 15 minutes of practice, the study says. The researchers report that healthy people played computer games with the device as adeptly as they might with a mouse, joystick, or other controller. Quadriplegic patients managed to use computers to write text messages and learned to control electric wheelchairs as well as the healthy people taking part in the research, the study says. People who are "locked in" -- completely paralyzed but cognitively intact -- also were able to use the device to produce text messages. One woman communicated for the first time in seven months, and another wrote for the first time in a decade, the researchers say. Researchers say the device now awaits testing in disorders of consciousness, including the vegetative state. SOURCES: News release, Proceedings of the National Academy of Sciences.
<urn:uuid:d5e139a8-fa28-4d0a-aa39-4f7e3a6c2e73>
{ "date": "2014-10-23T10:16:27", "dump": "CC-MAIN-2014-42", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413510834349.43/warc/CC-MAIN-20141017015354-00359-ip-10-16-133-185.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9567088484764099, "score": 2.53125, "token_count": 577, "url": "http://www.emedicinehealth.com/script/main/art.asp?articlekey=118391" }
Celery juice is a great way to add a wealth of nutrients into your day. It’s light, refreshing, and healing. It gives you energy without adding too many calories into your diet. Many people enjoy the taste and the benefits it provides. Keep reading to learn more about the nutritional information and benefits of celery juice. A glass of celery juice only has about 40 calories. It contains the following important nutrients: - vitamins A, K, and C - beta carotene Celery juice health benefits Remember that celery juice won’t contain the beneficial fiber that the raw, unjuiced vegetable has. However, celery juice is a great way to stay hydrated since it contains mostly water. Here are five of the ways that celery juice can benefit your health: 1. Lowers blood pressure Studies have shown that celery seed extracts have anti-hypertensive properties. Celery contains a phytochemical that relaxes the tissues of the artery walls. This causes increased blood flow and may lower blood pressure. 2. Protects against chemotherapy effects Active components of celery can alter the effect of certain drugs. An animal study from 2009 found that celery juice had protective effects when used with doxorubicin, a chemotherapy drug used to treat cancer. Consuming celery juice had a positive effect on doxorubicin treatment and reduced damage from free radicals. It protected against oxidative stress. Oxidative stress is caused by an imbalance of free radicals and antioxidants. 3. Prevents chronic diseases Celery is one of the main food sources of flavonoids. Scientists are looking into the relationship between flavonoids and the prevention of chronic diseases. Further research is needed, but one study from 2014 found that a flavonoid isolated from celery had antioxidant activities that have a beneficial effect on health. The flavonoids were tested in vitro (using samples in a lab) and in mice. The antioxidant activity took place in the heart, liver, and kidney of the mice. 4. Minimizes oxidative stress Another study found that flavonoid extract from celery minimized oxidative stress in rats. The oxidative stress was caused by an insecticide. 5. Has anti-inflammatory properties Flavonoids found in celery have also been shown to have anti-inflammatory properties. A study from 2012 looked at the effect of juicing on flavonoids in particular. The results showed that juicing is an effective way to consume flavonoids. How to make celery juice Making celery juice is simple. You’ll need: - 2 to 3 fresh stalks of celery - Your Kuvings Cold Press Juicer - a sharp knife Clean the celery and remove any leaves. Press the stalks through the juicer. Drink the juice fresh. You can add a few ice cubes or drink it closer to room temperature. Juice is usually best consumed fresh, but you can store some for later. Cover it tightly and keep it in the refrigerator for up to two days. Try using different herbs and spices to add zest to your drink if you want to liven it up a bit. Some people recommend drinking celery juice on its own, but you can also experiment with adding different fruits and vegetables, such as cucumber, mint, or lime.
<urn:uuid:89a8b2df-b8dd-46f1-a0ca-f09adbd864d1>
{ "date": "2018-09-22T22:47:31", "dump": "CC-MAIN-2018-39", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267158766.53/warc/CC-MAIN-20180922221246-20180923001646-00496.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9452054500579834, "score": 2.765625, "token_count": 700, "url": "https://www.coldpressjuicers.co.uk/2017/09/amazing-benefits-celery-juice/" }
By Guillaume Vadeboncoeur With an increased focus on careful stewardship of resources and rapidly rising utility costs, it is now mandatory for new and remediated buildings to be more energy-efficient. This tends to be easier said than done. There are numerous challenges that must be addressed during the design and construction phases of such a project. (An earlier version of this article appeared in the August 2016 issue of RCI’s Interface magazine.) One of the main challenges the building envelope industry faces is designing exterior wall assemblies addressing thermal bridging, with lower-conductivity components ideally located outboard of the sheathing. Standards and building code requirements are trending in this direction. One example—the American Society of Heating, Refrigerating, and Air-conditioning Engineers (ASHRAE) 90.1, Energy Standard for Buildings Except Low-rise Residential Buildings—is mandated by some building codes (e.g. British Columbia Building Code [BCBC]). To meet its requirements using the prescriptive method, one can either demonstrate low overall heat loss for an assembly or incorporate a continuous layer of insulation in the exterior wall design. Recently, manufacturers have introduced several varieties of thermal clips to facilitate the construction of exterior walls with insulation located outboard of the wall sheathing. However, these various types of thermal clips are not equal in performance. Each has its own advantages and disadvantages, ranging from thermal properties to ease of installation. This author is an engineer with WSP Canada, which has been involved in projects involving these thermal clips. This article offers a trio of case studies with three different clips to discuss some of the advantages and disadvantages of each product, including thermal effectiveness, adjustability, cost, and design considerations. Even with these new thermal clips, exterior insulated wall designs can be quite challenging during building envelope remediation projects, as existing buildings are often constructed using the traditional method of insulating between the wall studs. During these types of projects, it is crucial to properly design the new wall assemblies so the air barriers and vapour retarders are at the correct locations to prevent potential condensation problems. Besides exterior insulated finish systems (EIFS)—wall assemblies that are adhered to the wall sheathing and structure—most exterior walls have framing components that can bridge the insulation layer. The impact of these components on the thermal performance of exterior walls is significant. Numerous strategies and wall cladding assemblies can reduce thermal bridging through an exterior insulation layer. As mentioned, there are significant design and construction challenges with exterior insulated wall assemblies. These challenges should not be taken lightly, as they could become problematic and, in some cases, possibly catastrophic. Design solutions for these assemblies need to perform thermally, but also in accordance with good moisture management practices. Moisture management should be considered in all exterior wall designs, but it is of primary importance in the coastal climate of British Columbia, where this author practises engineering. Current versions of ASHRAE 90.1 do not explicitly state this (as earlier versions did), but the standard’s primary focus is energy-efficient design. As insulation levels increase and walls become more airtight, it becomes increasingly difficult for the assembly to dry out—this makes it even more important to ensure the assembly does not get wet in the first place. Thus, ensuring reduced heat loss is important, as is proper management of wind-driven rain, air leakage, capillary action (pressure), and water-vapour diffusion. A wall or roof design that fails to account for these can be subject to leaks or condensation within the assemblies. These exterior wall assemblies must also perform structurally and economically—in other words, they need to be relatively cost-effective and not overly difficult to construct.
<urn:uuid:aa20d992-0fdb-4d43-b959-302869cc4ea5>
{ "date": "2018-04-23T07:58:47", "dump": "CC-MAIN-2018-17", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945855.61/warc/CC-MAIN-20180423070455-20180423090455-00376.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9402298331260681, "score": 2.765625, "token_count": 765, "url": "https://www.constructioncanada.net/selecting-thermal-clips-for-building-envelope-remediations/" }
Baby growth spurts usually occur in the third week, the sixth week, the third month and the sixth month. A growth chart is usually maintained by the child’s paediatrician, who will take measurements of the circumference of the child’s head, weight and length. This chart is maintained to record the growth of the baby and as long as the baby is progressing there is nothing to be worried about. The doctor will keep track of any major dips in weight and if the baby’s weight is over the amount required for his or her height. This is important as it could indicate potential... ...weight problems in future. Baby growth spurts ages can vary mildly as each baby grows at its own pace. The first growth spurt is noticed in some babies between the first and second week after the baby has been brought from the hospital. Babies tend to lose some of their birth weight, but this is normally regained once they start breast feeding. Three weeks is the next major landmark, followed by the third, sixth and ninth month. The spurts start to slow down after the first year though. A growth spurt is evident when the child begins to cluster feed. The baby is likely to want to feed every hour or so and five hour full night naps become a thing of the past. The child may whimper and be fussier than usual too. These spurts, however, last a very short period (2-3 days to sometimes a week) and feeding resumes normally as do sleeping hours in most children. Baby growth spurt at six weeks occurs more or less as it has in the third week. If the child has fallen asleep while feeding, try feeding her again for a while, but do not wake her up or force feed. Take the baby in a stroller out into the fresh air after breastfeeding. Fresh air tends to put the child to sleep and if the child falls asleep immediately, it means no more feeding is required. By the third month, the child becomes more alert, may begin to coo and even develop a social smile recognising people around. Baby growth spurt at three months will increase the child’s appetite and make the child more active and content. The child gains more weight, develops physically and soils his or her diapers regularly through the day. Although the child maybe going through a growth spurt and required more feeding, take care to not overfeed him or her.
<urn:uuid:e630aa6f-8908-4935-b211-4af03183c997>
{ "date": "2014-04-24T00:44:51", "dump": "CC-MAIN-2014-15", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223204388.12/warc/CC-MAIN-20140423032004-00163-ip-10-147-4-33.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9699130058288574, "score": 3.25, "token_count": 496, "url": "http://www.pregnancy-baby-care.com/baby-growth/baby-growth-spurt-schedule.html" }
EUdict :: English-Japanese(Kanji) dictionary Results for: [たんぶん] simple sentence Translations: 1 – 30 / 250 English Japanese(Kanji) (a) sentence 一文 [いちぶん] (comp) declarative sentence 宣言完結文 [せんげんかんけつぶん] (comp) negated simple condition 否定単純条件 [ひていたんじゅんじょうけん] (comp) next executable sentence 次の実行完結文 [つぎのじっこうかんけつぶん] (comp) simple authentication 簡易認証 [かんいにんしょう] (comp) simple buffering 単純緩衝法 [たんじゅんかんしょうほう] (comp) simple command 単純コマンド [たんじゅんコマンド] (comp) simple condition 単純条件 [たんじゅんじょうけん] (comp) simple link (process definition) 単純連結処理定義 [たんじゅんれんけつしょりていぎ] (comp) simple statement シンプルステートメント (comp) simple type 単純型 [たんじゅんがた] (ling) affirmative sentence 肯定文 [こうていぶん] (ling) binding (linking, connecting) particle (i.e. specifying an expression later in the sentence) 係助詞 [かかりじょし] (ling) binding (linking, connecting) particle (i.e. specifying an expression later in the sentence) 係助詞 [けいじょし] (ling) complex sentence 複文 [ふくぶん] (ling) declarative sentence 平叙文 [へいじょぶん] (ling) emphatic (sentence) construction 強調構文 [きょうちょうこうぶん] (ling) end of a sentence 文末 [ぶんまつ] (ling) imperative sentence, imperative statement 命令文 [めいれいぶん] (ling) inversion of the word order in a sentence, anastrophe 倒置法 [とうちほう] (ling) negative sentence 否定文 [ひていぶん] (ling) secondary substantive (inflectable word or phrase that acts as an uninflectable within a sentence) 準体言 [じゅんたいげん] (ling) semantic content (of a term), meaning (of a sentence) 意味内容 [いみないよう] (ling) sentence pattern 文型 [ぶんけい] (ling) sentence, article, composition; (writing) style 文章 [ぶんしょう] (ling) sentential negation, sentence negation, statement negation 文否定 [ぶんひてい] (ling) syntax, sentence structure 構文 [こうぶん] (ling) the five basic sentence structures (SV, SVC, SVO, SVOO, SVOC) 基本五文型 [きほんごぶんけい] (ling) the five sentence structures (SV, SVC, SVO, SVOO, SVOC) 五文型 [ごぶんけい] (sentence end) indicates emphasis, agreement, request for confirmation, etc., is it so; hey, come on ね Search time: 0.005 seconds. Next » About Eudict EUdict (European dictionary) is a collection of online dictionaries for the languages spoken mostly in Europe. These dictionaries are the result of the work of many authors who worked very hard and finally offered their product free of charge on the internet thus making it easier to all of us to communicate with each other. Some of the dictionaries have only a few thousand words, others have more than 250,000. Some of the words may be incorrectly translated or mistyped. Please help us improve this site by into your language! translating its interface Total number of language pairs: Total number of translations (in millions):
<urn:uuid:61f8b6c8-7fe1-4b97-a8d7-eca97f6a3e2e>
{ "date": "2015-03-03T15:04:40", "dump": "CC-MAIN-2015-11", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463318.72/warc/CC-MAIN-20150226074103-00022-ip-10-28-5-156.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.6977675557136536, "score": 2.640625, "token_count": 1108, "url": "http://www.eudict.com/?lang=engjpk&word=[%E3%81%9F%E3%82%93%E3%81%B6%E3%82%93]%20simple%20sentence" }
I just thought I would provide some common spelling mistakes I notice from time to time, and some common misuse of words. This isn't an English lesson, but I thought it would be helpful. I am sure I missed some, and would be glad to post them if anyone wants to share. Hear - As in listening. Can you hear me now? Here - As in location. Are you here in the building? Where - Where are you? Wear - As in clothing or to adorn oneself with. Were - Were you coming to dinner? We’re - Contraction for - "We are" so glad you could make it. Effect - See Affect - Below There - Location. Direction. There is a long line at the bank. Their - Showing plural possession. Their deeds were hidden from sight. They're - Contraction for - "They are" the new neighbors. To - To go where no man has gone before. Two - The number 2. Too - Excess - as in Also. Can be used interchangeably. I can do that too (also)! Know - As in knowledge present tense. I know what you are saying. No - As an answer to a question. A command. No I don't understand. Knew - As in kowledge past tense. He knew him well before he died. New - As in recent, just made, fresh. This car is brand new. Through - As in completing a process, or passing through something. He went through a tough time. Threw - To throw a ball. Thru - This is not a word. It is slang. Then - referring to a point in time. Back then things were different. Than - To be used as a comparison. I like peas rather than carrots. You're - Contraction for "you are" as in you're a nice guy. Your - Showing possession of. Please restrain your dog. Effect or Affect? Affect and effect are two words that are commonly confused. "Affect" is usually a verb meaning "to influence". - The drug did not affect the disease. "Effect" is usually a noun meaning "result". - The drug has many adverse side effects. "Effect" can also be used as a verb meaning "to bring about". - The present government effected many positive changes.
<urn:uuid:a0a49668-5352-4054-95a8-ef74570a7724>
{ "date": "2014-09-15T09:45:23", "dump": "CC-MAIN-2014-41", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657104131.95/warc/CC-MAIN-20140914011144-00326-ip-10-196-40-205.us-west-1.compute.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9690906405448914, "score": 2.734375, "token_count": 511, "url": "http://www.finheaven.com/showthread.php?228244-Common-spelling-mistakes-misuse-of-words&p=1062616052" }
Personality:Dignified, even tempered; affectionate toward loved ones, reserved with strangers Coat & Grooming:The short, dense, sleek coat is an average shedder Energy Level:Somewhat Active; Athletic, quick, and strong, RRs need lots of exercise and socialization Originally: Zambia/Zimbabwe (formerly Rhodesia) Nicknames: RR; Ridgeback; Lion Dog Meet the Rhodesian Ridgeback The distinguishing characteristic of the breed—indeed, one of the rarest of all canine traits—is the ridge that runs down the RR’s back, formed by hair growing in the opposite direction of the rest of the coat. Beneath the ridge is a whole lot of hound. RRs are big, powerful hunters who stand 24 to 27 inches at the shoulder and weigh between 70 and 85 pounds. The glossy, solid-wheaten coat is tight enough to hug the big guy’s rippling muscles. What's Their Story? In the 1600s, European settlers in Africa (known to history as Boers) began breeding their Euro purebreds with indigenous African canines. The Ridgeback was the result of generations of their experimentation. The Boers’ dog, working in packs, was agile and fearless enough to hold a lion at bay—not to bring the lion down, as is often thought. Like other breeds developed on a frontier, RRs were (and still are) bred for versatility. They earned their feed as big-game hunters, watchdogs, guardians, and herders. Imposing enough to make intruders think twice, yet swift enough to run with Greyhounds in the sport of lure coursing, Ridgebacks are formidable creatures. They can be strong-willed, independent, and sometimes domineering. RRs must be guided with a firm but patient hand from early puppyhood. These are true-blue loyal friends who look after their humans and are meltingly affectionate with those they trust. Still, Ridgebacks might be too much hound for a family of first-time dog owners.
<urn:uuid:48bc4c0e-ed57-451d-941c-09849a2186b3>
{ "date": "2015-01-30T15:27:03", "dump": "CC-MAIN-2015-06", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422115858580.32/warc/CC-MAIN-20150124161058-00233-ip-10-180-212-252.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9561907052993774, "score": 2.546875, "token_count": 435, "url": "http://www.woofipedia.com/discover/breeds/rhodesian-ridgeback" }
Since the time of our cave-dwelling prehistoric ancestors, humans have been drawn to illustrate life, transforming our curiosity about the natural world ... Since the time of our cave-dwelling prehistoric ancestors, humans have been drawn to illustrate life, transforming our curiosity about the natural world into knowledge. At the California Academy of Sciences, we’ve been illustrating the story of life on our planet - unearthing new characters, revealing relationships, and sharing our findings in innovative ways - for more than 160 years. As you will see throughout this dynamic report, the Academy’s tradition of illustrating life continues to evolve. This app, overflowing with compelling stories, breathtaking images, and spectacular video that draw a clear picture of Academy life in 2012, is just one of the technological tools bringing the Academy’s mission to explore, explain and sustain life to life as never before. Indeed, we are drawing more than pictures that capture disappearing biodiversity. As you will see, there has never been a better place to illustrate life on Earth - not just the story of how we got here, but also of how we will find a place to stay. The California Academy of Sciences 2012 Annual Report covers activities that took place between January 1, 2012 and December 31, 2012. Size: 443.57 MB Price: $ 0.00 Day of release: 0000-00-0
<urn:uuid:7da5eeb9-8d2f-45e4-a523-3d309e70fb12>
{ "date": "2016-10-26T06:30:37", "dump": "CC-MAIN-2016-44", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720737.84/warc/CC-MAIN-20161020183840-00201-ip-10-171-6-4.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9297031760215759, "score": 2.578125, "token_count": 283, "url": "http://rockapproll.com/app/Academy-2012" }
The historical context behind America and “shithole countries” February 13th 2018 | Chicago | Xavier Ward Illustration by Lyne Lucien The Trump administration is hardly a stranger to controversy. It has run the gauntlet of accusations of racism, collusion with foreign governments, obstruction of justice, public misinformation, authoritarian rhetoric, and most recently: using a slur to describe an entire continent and two other countries. The Emperor has no clothes Yet, Trump himself has — despite swaths of public acrimony and an abysmal public approval rating — remained largely unscathed. The Republican controlled House and Senate have made it easier for Trump to say and do as he pleases with no more than media scrutiny. His latest mishap came during a private meeting on immigration, in which he allegedly branded the African nations, El Salvador, and Haiti as “shithole countries”, questioning why we should allow immigrants from these places and suggesting that we try to attract people from countries such as Norway. He had just met with Norwegian Prime Minister Erna Solberg the day before these disparaging remarks. Moreover, Illinois Democratic Senator Dick Durbin claims that Trump used the word “shithole” repeatedly throughout the meeting. The story has been broadly confirmed from multiple sources. Photograph by Jonathan Ernst (Reuters) Trump denied using the slur against African countries and claimed he never said anything derogatory towards Haiti, touting a “wonderful relationship with Haitians” in a tweet on January 12th. He did, however, admit to using “tough” language in the meeting. The African Union’s spokeswoman, Ebba Kalondo, told the Associated Press that they were alarmed by Trump’s comments. “Given the historical reality of how many Africans arrived in the United States as slaves, this statement flies in the face of all accepted behaviour and practice.” The United States also has a complicated record with Haiti. If Durbin’s account of the meeting is true, which now seems to be the case, then the President must understand the United States’ historical role in upholding devastating conditions there. Duvalier and the United States When discussing the difficulties that Haiti faced for many decades, one would be remiss not to talk about how the U.S.’s complicity, and (at times) support, of the Duvaliers perpetuated those impoverished conditions and the murder of Haitian nationals. François “Papa Doc” Duvalier came to power in 1957 on a black nationalist and populist movement. Shortly after, he became “President for Life” in a sham election in 1964 and ruled until his death in 1971. After his death, he was succeeded by his son Jean-Claude “Baby Doc” Duvalier, who ruled until 1985 when a rebellion unseated him and he fled to France, only to return in 2011. “In his first speech on October 22, 1957, President Duvalier promised government unity, reconciliation, and financial redistribution. However, within weeks, he began to destroy all past or potential opposition in order to centralize power in himself and remain in power” — according to Dominican Republic and Haiti, a Library of Congress report. Diagram by The Economist “President Duvalier reigned supreme for fourteen years. Even in Haiti, where dictators had been the norm, François Duvalier gave a new meaning to the term. Duvalier and his henchmen killed between 30,000 and 60,000 Haitians,” the report read. All the while, the U.S. was supplying roughly $15 million in aid to Haiti, most of which would line the pocketbook of Mr. Duvalier. That aid was not cut until his sham election in 1962. “By 1961 Duvalier had received US$40.4 million in foreign assistance, mainly as gifts from the United States,” the report states. According to that same report, former U.S. President John F. Kennedy cut the aid after Duvalier refused to diverge what it was being used for. Still, he secretly received U.S. funds, and after Kennedy’s death, aid money began to flow openly again. All the while, the Haitian people languished. Following his death, his son was no kinder; Jean-Claude had come into a fortuitous — albeit violent — political situation. Shortly after coming into office, he declared Haiti would always be an aid to the U.S. in its fight against communism, and the relationship between the two continued as it had before. A legacy of death and violence “Bolstered by the U.S., the regime operated with impunity. Government funds were embezzled and siphoned out of the country, which later enabled Duvalier to live well in exile. Poverty, environmental decline, and poor health conditions in much of the country went unaddressed,” The New Yorker’s Laurent Dubois wrote of the situation, shortly after Jean-Claude’s death in 2014. While Jean-Claude boasted of an economic uptick due to foreign companies setting up shop in Haiti, thus branding it the “Taiwan of the Caribbean,” the anguish endured. Political opponents were imprisoned, tortured, or exiled. Those fortunate enough to escape to the United States set up communities, and there the anti-Duvalier sentiment boiled, but American aid to the dictator who was living up to his father’s namesake persisted. It was not until 1985 that he was ousted in a military rebellion and fleeing to France the following year. In 1987, former President Ronald Reagan ordered the remaining U.S.-based assets of the Duvalier family frozen. Photograph from Bettman/Corbis Nonetheless, the U.S. government’s seeming affinity for the dictator did not stop there. Despite Jean-Claude’s legacy of destruction, he resurfaced from exile in France in 2011, shortly after the devastating earthquake. It was seemingly a slap in the face to Haitian citizens who had suffered under him. While a court did decide he could be charged with crimes against humanity in February 2014, he died October of the same year. In 2011, around the time Jean-Claude resurfaced, then Secretary of State Hillary Clinton pushed for the presidency of Michel Martelly, whose rule just ended in 2016. Martelly’s presidency paled in comparison to the authoritarianism of Francois and Jean-Claude Duvalier, but he did utilize the power structure put in place by them for his own benefit, welcome Jean-Claude’s son into his regime, and do so with blatant U.S. support. The United States has a habit of sticking its nose into dictatorships and failing governments. Take the Arab Spring for example. One could argue that the U.S.’s intentions were noble, but its track record of successfully changing the tide in other countries is lackluster at best and near-criminal at worst. The story is no different in Haiti. If Trump did indeed brand Haiti a “shithole”, then his administration should also acknowledge the United States’ role in making it one.
<urn:uuid:68ff6a6a-7774-4140-bb05-5af69a2ff116>
{ "date": "2019-12-10T09:13:05", "dump": "CC-MAIN-2019-51", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540527010.70/warc/CC-MAIN-20191210070602-20191210094602-00416.warc.gz", "int_score": 3, "language": "en", "language_score": 0.974230945110321, "score": 2.625, "token_count": 1524, "url": "https://thesocialhumanist.com/2018/02/13/trump-africa-haiti-shithole/" }
How a region sells - and misrepresents - its past Nova Scotia's captivating natural beauty and important place in the history of North America and the Atlantic world make it a premier tourist destination for visitors from around the world. From re-enactments at the Halifax Citadel, monuments to the Explosion of 1917 and Pier 21, and postcards of Peggy's Cove and Cape Breton, the province has cultivated a thriving tourism industry that relies on constructing and marketing the history of the area. In the Province of History studies Nova Scotia's long-standing initiatives to attract visitors, the ways in which the region's history has been presented and misrepresented, and the extent to which even the province's residents have become tourists in their own lives and towns. Using archival sources, novels, government reports, and works on tourism and heritage, Ian McKay and Robin Bates look at how state planners, key politicians, and cultural figures such as Henry Wadsworth Longfellow, long-time premier Angus L. Macdonald, and novelist Thomas Raddall were all instrumental in forming "tourism/history." The authors argue that Longfellow's 1847 poem Evangeline - on the brutal British expulsion of Acadians from Nova Scotia - became a template a new kind of profit-making history that exalted whiteness and excluded ethnic minorities, women, and working class movements. A remarkable look at the intersection of politics, leisure, and the presentation of public history, In the Province of History is a revealing account of how a region has both used and distorted its own past.
<urn:uuid:cfc2d295-6a28-40ea-873c-3f6eac07e9ac>
{ "date": "2014-07-23T20:07:24", "dump": "CC-MAIN-2014-23", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997883466.67/warc/CC-MAIN-20140722025803-00152-ip-10-33-131-23.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9356877207756042, "score": 2.78125, "token_count": 318, "url": "http://www.mqup.ca/in-the-province-of-history-products-9780773537040.php?page_id=73" }
from Technology & Learning RSVP technology can transform the reading experience. There are often a few students in a classroom who struggle with reading. Whether they are reluctant to read because it is difficult or because they might have a visual or physical disability, students may find rapid serial visual presentation a technique that can help. The basic idea behind the RSVP method is to display text briefly, in sequential order, using a small amount of space. With RSVP software, sentences are broken down into single words or small chunks that flash on the screen at a user-determined rate. Since the eyes don't have to move back and forth, and you can't dawdle or unconsciously go back, with practice, readers can increase their speed and efficiency. RSVP can be more than a classroom exercise, however, thanks to the explosion of Web sites, online encyclopedias, and e-books providing academic materials in electronic form. In fact, its availability across a range of media and devices may be helpful for students who have dyslexia, attention problems, and visual or physical disabilities. For example, reading is often hindered by subvocalization, or mentally pronouncing words while reading silently. Mental mispronunciation may also lead to comprehension errors. RSVP reader is one of many new utilities to help reading comprehension. When words are presented very quickly, there isn't enough time to subvocalize. Most RSVP programs allow for gradual increases in the number of words displayed per minute, up to four or more times the standard adult rate of 250 wpm. Computer-paced, serial presentation allows students to practice focusing attention for short periods of time. One RSVP software program, RapidReader PRO, features a green bar tracking students' progress, and students can change the speed using up and down arrow keys. Upon reaching an important point, they can use an electronic "dog-ear" button so they can come back to the page later. Though not all texts are digitized, many different kinds of electronic files can be loaded into an RSVP program. RapidReader PRO has an option for making pdf documents RSVP-capable, using a simple drag-and-drop utility. With WinBlit Speedread, a one-click RSVP tool is built into Internet Explorer, Microsoft Word, and Microsoft Outlook. A free add-on called RSVP Reader does the same thing for the Firefox browser, displaying selections from a Web page within the browser window itself. Once an electronic document is loaded into the RSVP software program, you can customize the color, font, size, background, position on the screen, speed and chunking settings, and much more. Since RSVP eliminates the need to hold a book, read small print, click through a Web site, or scroll, students with visual and physical disabilities may find this style more comfortable. While not all the news about RSVP is positive—some studies show comprehension plummeting at the faster reading rates, and the effect of rapid eye movement can be physically unsettling to some—this technology can still prove a powerful learning tool for many. Lindsay Oishi is a graduate student in learning sciences and technology design at Stanford University.
<urn:uuid:4d20d501-6352-4666-af54-6c7b12c4ba89>
{ "date": "2018-12-12T16:16:58", "dump": "CC-MAIN-2018-51", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376824059.7/warc/CC-MAIN-20181212155747-20181212181247-00376.warc.gz", "int_score": 4, "language": "en", "language_score": 0.9129454493522644, "score": 3.703125, "token_count": 655, "url": "https://www.techlearning.com/news/word-by-word" }
Breast cancer is a kind of cancer which usually starts off in the inside layer of the lobules or milk ducts that source them with milk. This cancer is mostly seen among women; however, it is not the case that men are safe. There are many men every year who are diagnosed with this type of cancer. This is the most common aggressive cancer among women all over the world is this. Invasive cancer means that the cancer will grow in healthy tissue and spread beyond the breast to other parts of the body. However, the other type which is non-invasive cancer will not grow beyond the breast. The treatment will depend on the type of cancer. The actual causes for breast cancer have not been verified yet; however here are some of the possible reasons. 1. Old age Women are prone to get breast cancer when they grow older. Age is a high risk factor. Over 80% of female cancers worldwide happen to occur among women over 50 years; which could be a result of menopause. With the hormonal changes in women with menopause, it could be a thriving risk factor. If you have had close relatives who was diagnosed with such cancer, then there could be a chance of you getting it too. However, most cancers are not hereditary so it does not 100% mean that just because your mother or aunt has it, you’d get it too. You should keep in mind that you could inherit some of the genes of your relatives so get yourself checked to keep yourself on the safe side. 3. History and radiation If you have had cancer before, then you are a most likely target. It could be seen very often than a woman who has not had history with such a disease. The radiation treatment you used for your earlier diagnosis can be another factor. The constant X-rays and CT scans could easily develop cancer cells. Your doctor must’ve told there are no side effects from those breast implants you are planning to get. Well, think twice. Such artificial treatment is a main cause of cancer. Sometimes there could be complications where your body will not accept such treatment and then you might develop allergies and other diseases. Look at here now if you are looking for breast enlargement. Hence be very sure if you want to get a breast enlargement or implant since the last thing you need is to develop cancer while spending thousands of dollars on implant treatments. Apart from the above some other reasons are obesity, height, alcohol consumption and also certain jobs which include working with plastics, chemicals etc. Hence always pay attention to changes in your body and do regular check ups so that it could be identified and treated in the earliest stages.
<urn:uuid:c1d843f6-fc81-4aa9-b389-ef7c24cdde28>
{ "date": "2018-08-19T19:25:00", "dump": "CC-MAIN-2018-34", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221215284.54/warc/CC-MAIN-20180819184710-20180819204710-00576.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9732213616371155, "score": 2.734375, "token_count": 546, "url": "http://healthyuonline.com.au/2016/11/reasons-for-breast-cancer/" }
"Go out and find the Truth" - Julian Assange. Sometimes truth is hidden in past history already revealed. History that has been forgotten for years. Today the truth will be revealed about one of the most horrific War Crimes and Genocide in history. A declassified CIA report will expose this War Crime committed in 1979 by the Soviets. The report will also reveal the shocking truth behind this War Crime. BRIEF INTRO & HISTORY OF AFGHAN/SOVIET WAR A declassified document by the CIA reveals the hidden truth of the Afghanistan/Soviet war. Document can be found via my account on Scribd here, (Page 22, Chemical Warfare In Afghanistan). The war between Afghanistan and the Soviets started in 1979 when the Soviets invaded Afghanistan. Although the Soviets claim they were there to fulfill their duty as stated in the "Treaty of Friendship, Cooperation and Good Neighborliness of 1978." The Soviets suspected that Hafizullah Amin, president of Afghanistan at the time, was not loyal to the Soviets. Afghanistan was also seen as a threat to the central part of Asia that was Soviet. December 22, 1979, Soviet troops invaded Afghanistan, took over Kabul, and disabled all communications links. December 27, 1979, 700 Soviet troops, disguised as Afghanistan troops took over major government and military buildings in Kabul. Soviet troops entered Tajbeg Palace, killed Hafizullah Amin and his to sons. Soviet occupation/war would last 10 years. The CIA declassified report will reveal that to win this war, the Soviets would resort to Chemical Warfare thus committing a major, horrific, War Crime. EXPOSED: 1979 SOVIET CHEMICAL WARFARE IN AFGHANISTAN Supporting evidence, revealing this horrific War Crime by the Soviets will now be examined. The report speculates the even before the Soviets invaded Afghanistan, chemical weapons may have been used. Analysis of all the evidence that chemical attacks have been conducted. The chemicals used in the attacks were irritants, incapacitants, nerve agents, and phosgene oxime. There is also a high probability that trichothecene toxins, mustard, lewsite, and unidentified toxic smokes were used against the resistance and afghan villages. Medical symptoms reported by victims and witnesses of the attacks confirmed this. A total of 47 separate chemical warfare attacks against the resistance and villages were reported by resistance fighters, Afghan Army Officials, journalist and medical experts from the United States, Afghanistan, Germany, and France. The chemical warfare attacks as a whole killed a minimum of 3,042 resistance fighters. We must take into account also how many civilians were affected by the chemical warfare of the Soviets? The document does not mention civilian casualties from the chemical warfare attacks. The method of delivery the Soviets used were fixed-winged aircraft and helicopters. These aircraft and helicopters would disseminate the chemical agents via rockets, bombs, and sprays. The Soviets also used chemical filled landmines. Persons name [Redacted] in document, indicated that Soviet Chemical Warfare may have started seven months before Soviet invasion on May 31st, 1979. August 21st, 1980, Soviet aircraft reportedly waged a chemical attack, on two separate occasions, on a village near Herat killing 300 insurgents and their sympathizers. Chemical filled landmines were also reportedly used by the Soviets. The sympathizers were most likely civilians. How many women and children were killed in these horrific, inhumane, chemical warfare attacks? THE HORRIFIC EFFECTS OF CHEMICAL WARFARE IN AFGHANISTAN COMMITTED BY THE SOVIETS (Graphic) A further report indicates that Afghan and Soviet units used helicopters to disseminate poisonous gas causing horrific, inhumane deaths. As stated in the document, an afghan civil engineer described attacks in August of 1979 by MIG-19 or SU-17 aircraft. The Afghan civil engineer further stated that about 2,000 died from this attack at an undisclosed location. Afghan engineer then states that he personally witnessed a large number of deceased with their bones exposed. The deceased also had open wounds that appeared to be caused by acid. January 13th-19th, 1980, chemical bomb attacks occurred against insurgent forces near Feyzabad and Jalalabad in eastern Afghanistan. The bombs exploded in mid air. Vapor rained down. The vapor felt damp on the skin. Once inhaled, difficulty breathing occurred, nasal excretions intensified, vomiting would soon follow, then blindness, paralysis, and death. An unidentified resistance fighter, described as an expert on Soviet Ordinance and use of chemical weapons, stated to 10 U.S. embassy personnel, February 10, 1982, that the Soviet military is using irritants, hallucinogenic gas, and an apparent nerve gas. The resistance fighter described the nerve gas as off white powder, mainly dispersed via helicopters, and hard to detect. The resistance fighter then stated the chilling, horrific effects of this gas. He stated, victims of this gas attack felt faint, and dizzy. Subsequently the victims would vomit and begin to bleed from the eyes, nose, and mouth. The death rate was 70%. The dead are relaxed and the skin easily peels off when attempts are made to remove the bodies. 1980, mid January - February, Soviet helicopter attacks in northeast Afghanistan. The helicopters dispersed a greyish, blue, smoke. People affected by this chemical attack would develop watering of the eyes, extensive blistering, and discoloration of the skin. After awhile, affected people would then develop sheet like peeling of the skin, swelling affected by the blisters, and finally paralysis, numbness, and death. GENOCIDE: THE HIDDEN TRUTH BEHIND THE 1979 SOVIET WAR AGAINST AFGHANISTAN The declassified CIA report has exposed the truth about the Afghanistan/Soviet War which began in December 1979 and ended February 1989. During this time period, the Soviets would commit one of the most horrific War Crimes and Crimes Against Humanity in history. There is a hidden shocking, horrific truth behind this horrific War Crime committed by the Soviets in Afghanistan. Proof of this is found within the declassified CIA report. The CIA declassified report states: chemical munitions used in these early attacks were referred to as "micro bombs" or "chemical bombs" and as stated in the document "were to be used to destroy Muslims". This provides proof that the Soviets were Anti-Muslim. Thus the Soviets not only committed a horrific War Crime, but they also used this war to cover up Genocide against Muslims. The Soviets claim they were protecting their interests in the central part of Asia. The truth has finally been exposed. THE PRECIOUS LOSS OF LIFE How many Afghan civilians were killed by Chemical Warfare? How many civilians suffered life long effects of Chemical Warfare? How many women and children were ruthlessly killed by these Chemical Warfare attacks? The answer to these questions are unknown. Imagine being a child of one of these Afghan villages outside playing. Now imagine helicopters releasing smoke or bombs that explode in mid-air. Now imagine those toxic chemicals released by the helicopters raining down upon the children. You can hear the children's screams as the chemicals burn their skin off. Picture a mother, holding her new born baby in her arms. Now picture that mother quivering, inside a hut with her new born child, trying to protect that precious baby from a Soviet chemical warfare attack.. Clearly the Soviets had no regard for precious, human life. The CIA declassified report has provided insight and helped expose the truth of the Afghanistan/Soviet War. The Soviets have committed one of the most horrific, covert, acts of Genocide in history. As a cover-up, the Soviets used the "Treaty of Friendship, Cooperation and Good Neighborliness of 1978." to invade Afghanistan. The Soviets have yet to be addressed or face any condemnation about this horrific genocide. Truth has been revealed. More information/history on the Afghanistan/Soviet War can be found via Wikipedia here.
<urn:uuid:4e019912-d651-41c6-bd66-214b2b8631ea>
{ "date": "2015-11-30T02:39:13", "dump": "CC-MAIN-2015-48", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398460942.79/warc/CC-MAIN-20151124205420-00066-ip-10-71-132-137.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9670382738113403, "score": 2.828125, "token_count": 1627, "url": "http://www.digitaljournal.com/blog/19257" }
This Thanksgiving themed counting worksheet will help kids practice counting to the number thirteen. Have fun during Thanksgiving and help kids practice counting to six with this free printable worksheet. This worksheet shows thirteen turkeys and asks children to count them and then circle or color the appropriate number (13) at the bottom of the page. View and Print Your Thanksgiving Counting to Thirteen Worksheet All worksheets on this site were done personally by our family. Please do not reproduce any of our content on your own site without direct permission. We welcome you to link directly to any pages on our site without specific permission. We also welcome any feedback, ideas or anything you want to share with us - just email us at [email protected].
<urn:uuid:6b63c8f5-b114-445c-b868-e1ba3ad59d52>
{ "date": "2015-05-27T11:47:38", "dump": "CC-MAIN-2015-22", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207928965.67/warc/CC-MAIN-20150521113208-00044-ip-10-180-206-219.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9114299416542053, "score": 2.703125, "token_count": 152, "url": "http://www.allkidsnetwork.com/worksheets/thanksgiving/thanksgiving-count-thirteen.asp" }
To maintain a garden so that it is a healthy ecoscape it requires many different tasks. It involves monitoring the garden for weeds, pests and disease. It requires ongoing nourishment. It needs ongoing weeding to prevent weeds from taking over. It needs pruning at the proper time of year. It often requires dividing perennials when they have lost flower production or they have become root bound. There are many other aspects of the garden that need to be done at different times of the year and these are just a few. Good soil supports the growth of healthy plants, which in turn are more resistant to pests and disease. A healthy soil will be a dark brown or black color. If soil is any other color it could use some organic matter such as compost, well-rotted manure or composted leaves. Soil organisms then loosen the soil so that water, air and nutrients can be absorbed by the There are many types of soil textures. Nutrients and water leach through sandy soil quickly, however, clay soil holds nutrients and doesn’t let water or air circulate. Mixing a 3.5-4 inch layer of organic matter in to the top 10 to 12 inches of soil will improve these soils. In existing gardens add 1 to 2 inches of compost yearly. Compacted soils will benefit from a yearly top dressing of compost as well. Lawns benefit from a compost dressing in spring and fall. The pH scale measures the soil's acidity or alkalinity. The scale ranges from 0 to 14. The 0 indicates the most acidic soil, the 14 is the most alkaline and 7 is neutral. Soil never runs towards the scales extremes however small numeric differences can have large effects on plant growth. A soil pH test should always be used to determine your soil pH. Soil in the lower mainland is naturally acidic. Plants such as pieris, hydrangea, magnolia, dogwood, rhododendrons, blueberries and viburnum prefer acidic soil and thrive in this type of soil. On the other hand grass prefers alkaline soil. In order to bring the pH level up to make the soil more alkaline we add lime, an organic amendment. Other plants that like alkaline soil that would benefit from lime is clematis, lilac and rose of Sharon. Moss on the other hand likes acidic soil and we all know how well it grows in our coastal climate! Providing the right soil ph is very important because many plants will have trouble absorbing nutrients, fighting disease and will not thrive if the correct soil ph is not available. Most plants however are adaptable to ph levels between 5.5 and 7 and it is not difficult to adjust the soils pH levels by 1 point. Lime will increase the alkalinity. On the other hand ammonium sulphate or elemental sulphur will increase acidity. Sulphur will change the ph faster than ammonium sulphate. It is recommended that you first have a soil test done so that proper amounts of sulphur can be added. Always follow instructions on the package when adjusting the ph level.
<urn:uuid:4ec50280-e68b-4071-a56e-a45f6b8bc864>
{ "date": "2018-11-16T19:06:46", "dump": "CC-MAIN-2018-47", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039743110.55/warc/CC-MAIN-20181116173611-20181116195611-00536.warc.gz", "int_score": 3, "language": "en", "language_score": 0.924689769744873, "score": 3.328125, "token_count": 662, "url": "https://www.motherearthgardens.com/gardening_1.html" }
Step back in time at Kamerkloof right in the middle of the action in the Studtis and Baviaanskloof Hartland historic area. Kamerkloof was part of one of the first farms to be registered in the Baviaanskloof in 1817. Farmers reached the kloof by means of a handmade ‘ossewa’ trail from the western side of the kloof. Between 1880 and 1890 Thomas Bain built the Nuwekloof Pass giving entry to this unique gem. The Baviaanskloof Hartland has been inhabited by humans since the MiddleStone Age (100,000 to 30,000 years ago), although the prime local evidence of human presence in the Baviaanskloof is from the Khoisan. The Baviaanskloof is believed to be in a meeting place of the hunter-gatherer San people, who occupied the region until the Khoekhoen arrived about 2000 years ago. Rock art and artefacts are found in the area, making the Baviaanskloof one of the richest archaeological heritage areas in Southern Africa and the world. European settlement in the Baviaanskloof region commenced in the mid to late 18th century, leading to the marginalization of the Khoisan and the loss of their traditional way of life. The new settlers started shaping the landscape by hunting down to extinction most of the indigenous animals, replacing game with domestic stock, and by cultivating the arable land. Currently, human settlement in the area is mainly composed of community settlements. Current inhabitants are from various different cultures, mainly Afrikaans, Xhosa, Cape Coloured and KhoiSan descendants. The main economic activities are agriculturally related (crops and deciduous trees and livestock). A new growing industry is tourism. The rugged terrain and the isolation of the valley from the marketplace were major constraints and a challenge for the early farmers in the Baviaanskloof. People living in the area suffer from the impacts of periodic natural events, such as floods and droughts.
<urn:uuid:895a4f5a-3ec8-439f-bd64-bbb191793ae1>
{ "date": "2020-01-19T13:30:36", "dump": "CC-MAIN-2020-05", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250594603.8/warc/CC-MAIN-20200119122744-20200119150744-00536.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9243981242179871, "score": 3.109375, "token_count": 426, "url": "https://www.kamerkloof.co.za/history" }
Christopher Hawthorne Moss is the author of BELOVED PILGRIM, a YA transgender historical adventure/romance. We have always been here since the dawn of humankind. We may have been fewer as reflected in what is taken as historical record, or we may simply have had to suppress or hide it, but there have always been men and women who knew they were not the same gender in their hearts and minds than their bodies might suggest. How can we know this? Science is daily coming to understand the biological origins of what has variously been called sin, deviance, or delusion. Recent studies of the brain are pointing to how at different stages of gestation an embryo is subjected to a dozen different hormone baths that direct the gender characteristics of the part of the developing body receiving them at the time. The bath at conception directs the body to be male or female, or, to be truthful, dozens of other variations. The bath at the time the brain begins to grow will make that brain have feminine or masculine characteristics. If, as this suggests, transgender is biological, then it stands to reason that every human ever conceived could have the potential to be transgender. We have always been here. Then where were we? Why is there no record? Well, in fact, there is. It depends on the place, time and culture. Plains Indians reverenced the Two Spirit individual who by having both aspects of the male and female made them more closely modeled on the Great Spirit. The Galli, priests dedicated to the goddess Cybele in Ancient Rome, performed their own sex reassignment surgery and dressed and lived as women. Other examples do exist, including individuals like Billy Tipton and the Chevalier d’Eon, who not only cross-dressed but chose to identify themselves as the binary opposite of the sex they presented. It is a sad fact that not only did religion cast taboos on people who crossed gender lines, we still “kill” these “deviants” by denying they ever existed. Erasure from the historical record is not proof of anything, one way or another, except that for some reason a distinct population was either overlooked or skewed in the record, such as when dubious sources, like the Church’s pronouncements, make women lesser in estimation of worth. The trick to finding transgender people in history is interpreting why an individual donned the clothing and other characteristics of a different identity than the norm. For instance, a man may dress and behave as a woman for a number of non-inclusive reasons. Female dress can be a sort of costume for performers, from castrati opera singers to drag queens. There have always been prostitutes who attracted men who were aroused by the blend or confusion of the male and female. Some people simply find the look and activities of the “opposite sex” more enjoyable. For that matter what constitutes masculine and feminine is not absolute but interpreted. Therefore to be clear I am talking about people who felt they were born in the wrong body, transgender, I look for historical figures that did not simply dress for the stage but lived as the gender they believed was authentically theirs. Billy Tipton, jazz pianist (1914-1989) Billy Tipton began identifying as a man, we are told, in order to be granted access to performing as a jazz pianist. But what makes me call him a transman is the fact that once he began the identification, he never identified as female again. He lived as a man, married a woman, and adopted children, always as a man. It was only when he was about to die that paramedics who arrived to try to keep him alive discovered that under his masculine clothing Billy Tipton had a female body. We can’t know if, as a child he was aware of identification as a boy, but clearly once he began to live as a man, he found all the trappings the choice he would make. This sort of story repeats itself many times over in history. Chevalier d’Eon (1728–1810) And, of course, the pattern is not exclusive to women seeking opportunities limited to men. A colleague asked me why any man would want to live as a woman, with all the attendant humiliations and restrictions suffered by women in a patriarchal society. That they did argues at least the suggestion that they truly felt female and could not be happy living as men. An interesting example is the 18th century French diplomat and spy, Charles-Geneviève-Louis-Auguste-André-Timothée d’Éon de Beaumont worked as an undercover spy for King Louis XV of France. In order to maintain his cover d’Eon posed as a woman. Something must have clicked for him, because for the last 33 years of her life, d’Eon insisted she was a biological female. When she died doctors discovered that her body was after all male. Her name became the source of “Eonism”, an early word for transsexuality. Who knows how many transgender men and women there have been in our history that were permanently closeted, unable to live as openly as the opposite gender of the body in which they were born? I was 60 before I knew it about myself, and clearly I could have lived my whole life not embracing my authentic gender, and this is in a time of relative liberation. Here are just some of the historical figures whose stories are known and who chose to live not just in the clothing of the opposite sex but truly lived as and insisted they were being true to the Inner Man or Woman. Dr. James Barry, pioneering surgeon in the British military, proponent of sanitary conditions Albert Cashier, one of 240 women who served as men in the American Civil War Jennie June, writer on topic of androgens Nadezhda Durova, Russian soldier in Napoleonic Wars Catalina de Erauso, Basque soldier of Spain in South America Dorothy Lawrence, World War I journalist Lili Elbe, Danish artist Shi Pei Pu, Chinese opera singer and spy Roberta Cowell, fighter pilot, prison of war and race car driver Blurb For BELOVED PILGRIM At the time of the earliest Crusades, young noblewoman Elisabeth longs to be the person she’s always known is hidden inside. When her twin brother perishes from a fever, Elisabeth takes his identity to live as a man, a knight. As Elias, he travels to the Holy Land, to adventure, passion, death, and a lesson that honor is sometimes found in unexpected places. Elias must pass among knights and soldiers, survive furious battle, deadly privations, moral uncertainty, and treachery if he’ll have any chance of returning to his new-found love in the magnificent city of Constantinople. Beloved Pilgrim is available through the Harmony Ink and Dreamspinner Press websites and at all the major retailers. Christopher Hawthorne Moss Christopher Hawthorne Moss wrote his first short story when he was seven and has spent some of the happiest hours of his life fully involved with his colorful, passionate and often humorous characters. Moss spent some time away from fiction, writing content for websites before his first book came out under the name Nan Hawthorne in 1991. He has since become a novelist and is a prolific and popular blogger, the historical fiction editor for the GLBT Bookshelf, where you can find his short stories and thoughtful and expert book reviews. He lives in the Pacific Northwest with his husband of over thirty years and four doted upon cats. He owns Shield-wall Productions at http://www.shield-wall.com. He welcomes comments from readers sent to [email protected] and can be found on Facebook and Twitter.
<urn:uuid:086bb226-e69b-4627-ae2e-3ca7c3eadb06>
{ "date": "2017-07-22T10:36:54", "dump": "CC-MAIN-2017-30", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423992.48/warc/CC-MAIN-20170722102800-20170722122800-00496.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9756426215171814, "score": 2.734375, "token_count": 1620, "url": "http://zahraowens.com/?p=1163" }
The presence of the refugee crisis brings about a global awareness of refugees and asylum seekers, with humanitarian aid to match. Naturally, this cause is a no-brainer. The freedom to mobility is a fundamental human right, and so is the right to leave a life threatening area in search for a better life. However, in practice it is not so simple, because rights aren’t always followed by ability. Different situations are influenced by different degrees of freedom associated with them, which is especially true in the case of forced migration. The fewer degrees of freedom, the more vulnerable an individual or group, and the more vulnerable they seem, the less chances they have for a better life. Degrees of freedom are linked to the options available. If the only options are to leave and live, or to stay and suffer, common sense indicates migration is “forced”. But in the same way that an individual or a group can be “forced” to migrate, so too can they be “forced” to stay. There is an economic cost to mobility, especially when escaping danger where the aim is to flee as far away as possible. As such, those without sufficient funds are “forced” not to move, which indicates that they have little freedom of mobility, which makes them even more vulnerable than those who managed to escape. “Refugee” is a status given to a person who is unable or unwilling to return to their home country because of a threat to their lives, therefore they are under the protection of a government or country that is not their own. An asylum seeker is a person seeking to obtain refugee status. Yet it is not enough to consider the status by itself because the connotations of the words “refugee” and “asylum seeker” play a substantial role in the way policies are created and implemented. Put simply, the imagery of the helpless displaced migrants fleeing from danger associates the migrant with heightened vulnerability. That is not to say that they are not vulnerable, but assigning refugees vulnerability as their only trait means that the only attention they get is humanitarian aid. And because of this, governments tend not to get too involved with refugees. Indeed, since refugees are not part of the government’s political constituency, they tend not to incorporate refugees in development strategies. Some migrants are not necessarily part of government’s responsibility, asylum seekers or forced migrants without a status. Yet as humans, they have the right to development, which is difficult to access without a secured place to live, or without representation. During the refugee crisis, it is the refugees that stand out, casting a shadow over those who were left behind. “Refugee” as a status, i.e. a place in the social structure of the destination country, suggests that they should be entitled to some sort of representation. Asylum seekers simply do not have that status. The simple recognition of refugees and asylum seekers in their host countries not only gives them a voice, but also enables them to contribute to society, and local economies, without relying so much on humanitarian aid.
<urn:uuid:ffc1e942-ac7b-4b12-b4d0-cc3ea77d224f>
{ "date": "2018-11-17T18:04:37", "dump": "CC-MAIN-2018-47", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039743717.31/warc/CC-MAIN-20181117164722-20181117190722-00376.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9579869508743286, "score": 3.375, "token_count": 635, "url": "http://idjournal.co.uk/2016/05/23/why-refugees-are-more-than-just-forced-migrants/" }
Students will find information using various sources that relates to a pre-selected topic, and create a presentation highlighting information from journals, books and magazine articles on the following subjects. Collect 10 articles that include information or research covering any of the following topics: 1. Building systems – site, structural or contextual needs, how does this affect the design? 2. Sustainability factors – indoor air quality, natural daylight, LEED, site orientation, etc. 3. Color - theory, wayfinding, physiological 4. Finish materials – innovation, needs for finishes or materials that pertain to the use of the space 5. Furnishings, Fixtures and Equipment (FF&E) – innovative uses and new ways to reuse 6. Lighting – relationship to health, physiology, psychology, design elements 7. Human factors – Anthropometrics, Ergonomics, Sociological, Physiological (health), Psychological (user satisfaction), Universal Design 8. Design Elements – space requirements, functional 9. Diversity – how a philosophy is used that affects a certain population 10. Historical design – how was it applied Create a presentation that highlights the topics including the following: 1. Provide a brief piece of information from each article that pertains to one of the above topics. You do not need to cover all 10 topics for this assignment. You can use the information and rewrite in your own words, create a chart or infographic, or you can directly quote the author. Use APA format to cite each. 2. Include an APA format Reference List for the 10 articles. 3. Include a list of the research tools you used to find each article. Use a variety of sources as presented in the Librarian’s presentation
<urn:uuid:76795406-af4b-4335-a286-15cef485763d>
{ "date": "2018-05-27T08:05:37", "dump": "CC-MAIN-2018-22", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794868132.80/warc/CC-MAIN-20180527072151-20180527092151-00016.warc.gz", "int_score": 4, "language": "en", "language_score": 0.8417388200759888, "score": 3.578125, "token_count": 369, "url": "http://ringling.libguides.com/ebd" }
This post was revised in February 2018. When working on the improvement of innovation systems in developing countries, we have to work with firms. These firms have several roles, and there are three units of analysis: - The firm is an important unit of analysis of innovative practices (product, process, business model). - The firm is also a unit of analysis in terms of cooperation and collaboration, thus its ability to cooperate with rivals is an important consideration when we design interventions. - Working with the right firms also provides an important source of technology and knowledge spillovers. This is where the challenge comes in for development practitioners. Generally, firms that are able to lead the way, or could be good role models, are difficult to involve in development programmes for a variety of reasons. I won’t discuss that right now. What is important to remember is that most firms not only absorb or use technology and knowledge, they are also the main sources of knowledge and technology. This is both from a supply perspective (equipment suppliers, technical or specialist sources of knowledge, etc.) and from a demand perspective (demanding customers, sophisticated demand). Whether firms are aware of their role as disseminators of knowledge of technology is another story! I will rather focus on how to identify the firms that we can work with to improve innovation and competence in all three units of analysis discussed above. Remember, our objective is to find ways to improve the dynamic in innovation systems that will result in the modernisation and technological upgrading of industries and regions. More than 25 years ago Bo Carlsson and Gunnar Eliasson described a concept called “economic competence”. At the time they defined economic competence as “the ability to identify, expand and exploit business opportunities” (Carlsson and Eliasson, 1991). This is a useful definition as we have to remember that we cannot innovate on behalf of a broader industry. Somehow we must work with those firms that are able to innovate, imitate, adapt and integrate new knowledge and ideas. According to Carlsson and Eliasson, economic or business competence has four main components: - Selective (strategic) capability: the ability to make innovative choices of markets, products, technologies and overall organisational structure; to engage in entrepreneurial activity; and especially to select key personnel and acquire key resources, including new competence. This aspect has been amply illustrated in recent years as many companies have struggled to define their corporate identities and strategies as distinct from their competitive strategies in each individual business unit (Porter, 1991). - Organisational (integrative, coordinating) capability: the ability to organise the business units in such a way that there is greater value in the corporate entity as a whole than in the sum of the individual parts. - Technical (functional) ability: this relates to the various functions within the firm, such as production, marketing, engineering, research and development, as well as product-specific capabilities. These are the areas of activity in which firms can compare themselves to their peers or leading competitors. - Learning ability, or the shaping of a corporate culture which encourages continual change in response to changes in the environment. Economic competence must be present in sufficient quantity and quality on the part of all relevant economic agents, users as well as suppliers, government agents, etc. in order for the technological system to function well. This is both true at a local or regional level, our a national or sectoral level. If the buyers are not competent to demand or use new technology – or alternatively, if the suppliers are not able or willing to supply it – even a major technical breakthrough has no practical value or may even have negative value if competitors are quicker to take advantage of it. I think that this business approach of choosing the entrepreneurs that we work with is very relevant to finding the people who can absorb new ideas and make them work in a developing country context. I would also go so far as to state that I do not believe that it is feasible to select “change agents” according to social criteria such as gender, age, etc. – but that we recognise that change within economic systems happens because of the economic competencies of the people who are recognised in the system (regardless of their demographic data). The reality is that you cannot be competent on behalf of other people! I challenge you to review the firms that you are working with to see if they are economically competent! Carlsson, B. and Eliasson, G. (1991). The nature and importance of economic competence. Working Paper No. 294, The Industrial Institute for Economic and Social Research (IUI).
<urn:uuid:a885314e-44c4-4343-9dd0-ed78a6e502d6>
{ "date": "2019-07-19T05:41:52", "dump": "CC-MAIN-2019-30", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195526064.11/warc/CC-MAIN-20190719053856-20190719075856-00096.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9549108147621155, "score": 2.546875, "token_count": 944, "url": "http://www.cunningham.org.za/tag/knowledge-absorption/" }
Revolutionary War Soldier’s Grave Found Above is a photo of the James Maynard marker Photo courtesy Bobby Maynard Ronald Maynard and his son Robert Two weeks ago, after ten years of intense searching, and checking hundreds of Wayne County cemeteries, Robert (Bobby) Maynard and his father, Ronald (Ron) Maynard, members of The Wayne County Genealogical and Historical Society, located the grave of James Maynard in the Queens Ridge Cemetery. Robert said that he actually laid down on the ground to make sure this was the grave of his Maynard ancestor. He then applied chalk to bring out the hidden images on the field stone. He discovered the initials J. M. first. Then he could identify the numbers 175__. It was then that he realized that the zero was the missing number. Genealogical records indicate that James Maynard was born around 1750. From the location on the crown of the hill, and the closeness of his son, Jesse Maynard, with whom James was staying in the 1850 census of Wayne County, VA/WV, another clue was found. This cemetery has had excellent care over the years, and it contains many field stones. Several of these field stones still have readable images after so many years. There are hundreds, possibly thousands, of descendants of James Maynard still living. The Queens Ridge Cemetery is located on property which is nearly surrounded by the property of Penn Coal Corporation, and it can be reached by following the Coal Haul Road from the Cabwaylingo Park Road near Missouri Branch, Wayne County, WV. James Maynard, the Revolutionary War Soldier, was born in Virginia in 1750, moved to Wilkes County, N. C., served in the Revolutionary War there, and moved to Kentucky around 1816. He was listed as a member in the "Roaring River Baptist Church," in the late 1780’s and 1790’s prior to moving to Floyd County, Ky. James Maynard , a resident of Wilkes Co. N.C. enlisted for six months as a private under Captain Jesse Franklin and Colonel Benjamin Cleveland. He moved from Wilkes Co. N.C. to Floyd County, KY, and from there to Pike County, KY. He was granted a pension on Sept 1, 1832, as a citizen of Pike Co. KY. In 1841 he was living in Cabell Co. VA (that part of Cabell which became Wayne Co. in 1842). He died Oct 13, 1852, in Wayne County, VA/WV, and the location of his grave became unknown until discovered by Robert and Ronnie Maynard. The widow of James Maynard, Chaney Smith, whom he married Dec. 25, 1801 in Wilkes County, NC, was allowed a pension in her application on February 28, 1857, at which time she was seventy seven years of age and living in Wayne County, VA/WV. Chaney died several years later, and is believed to be buried near her husband, James. Also known to be buried in this cemetery is James’ son, Jesse Maynard and his wife Sarah (Welch) Maynard. James was living in the Jesse Maynard household at the time of his death. Words cannot express the gratitude that the Wayne County Genealogical & Historical Society has for the two Maynard descendants who found the grave of their Revolutionary War Ancestor. Plans are now being made to provide a suitable stone for both James Maynard and his wife, Chaney Smith Maynard. We believe the Veterans Administration will furnish a Rev. War Marker for James. We are now pursuing the filing of such application. Fund raising has also begun to provide a Revolutionary War Roadside Marker for James Maynard. These signs are procured through application to the State Government, and cost about $1,800.00 each. All donations should be made by making your check payable to WCGHS, then mail it to WCGHS, P.O. Box 787, Wayne, WV 25570. For additional information, contact the Wayne County Genealogical Society [email protected] or Herb Dawson at 304-393-3792 ([email protected]) or Jarrett Peters at 304-429-2033 ([email protected]) On Thursday, February 25, The Wayne County Genealogical and Historical Society forwarded an application to the Veterans Administration for a grave marker for James Maynard. Along with the application, numerous other files concerning documentation for the application were sent. It is our hope that the application will be approved in the near future, so that we may get the grave marked. If approved, these markers are provided free of charge. We will keep this site updated with any progress. March 14, 2016 The Wayne County Genealogical And Historical society has obtained an application for a raodside marker to commemorate Rev. War Soldier James Maynard. This application will soon be completed and forwarded to the West Virginia Department of Archives and History, who are responsible for having these markers made. After the application has been approved, they will order the construction of the marker. When it is ready for delivery, we will need to make full payment for it. I am informed that the current price for these markers is approximately $1975.00. The marker will need to be set on the Department of Highways right-of-way. The location will need to be decided. In the meantime, we must get serious about raising this amount of money to honor James Maynard. Donations will be made to the Wayne County Genealogical and Historical Society. (WCGHS) Make your checks payable to WCGHS and mail to WCGHS, P.O. Box 787, Wayne, WV 25570. Your donations will be greatly appreciated. While WCGHS is sponsoring this monument, we are not capable of paying for it, so all who are interested in having this memorial erected to honor James Maynard, must join in and support this project. DONATIONS AS TO DATE Jarrett Peters $200.00 Howard Osburn 20.00 Joan Carter 50.00 Linda Sturgill 50.00 Sandra Mayo 200.00 Ronald & Robert Maynard 100.00 Seibern Hazelett 200.00 Sara E. Marcum 100.00 Doris Staton 100.00 Ervin G. Barker 50.00 Linda (Marcum) Parsons 50.00 Larry B. Maynard 25.00 Ron & James Maynard 100.00 Westmoreland Chapter NSDAR 100.00 Mrs. Connie Jackson Mcagg 100.00 Ms. Wylma Carole Skean 25.00 Mrs. June Booth Ashworth 20.00 Thelma Lee Maynard 25.00 Delbert Maynard 30.00 James H. Ferguson 100.00 Robert & Mary Jervis 100.00 Richard & Fannie Casey 50.00 Hi & Cora Vance 100.00 Cuba (Vance) Thomas 30.00 Tolbert & Judith Maynard 100.00 Mary Jane Sutton 100.00 W. Kenneth Napier 50.00 We are proud to announce that we have reached our fundraising goal for the James Maynard Roadside Marker. The application has been submitted to the West Virginia Department of Archives & History. They have informed us that it will be between three and four months for the completion and setting of the marker. We will be posting updates on the process and when we will plan a dedication ceremony for the marker. The Wayne County Genealogical & Historical Society wishes to thank all who have participated in this process. April 5, 2016 Today, the grave marker for James Maynard arrived at the Morris Funeral Home in Wayne, West Virginia. The marker will remain at that location until we are prepared to set it. Plans are underway now for the setting of the marker, and will be posted here as soon as they are complete. May 17, 2016 At our monthly meeting in May, it was decided to forego our regular June (June 18, 2016) meeting in Kenova. Instead, we will meet at or near the Church at the Queen’s Ridge Cemetery. Please bring your own lunch, as no food is available in that area. We will have our meeting and lunch and afterward we will erect the monument on the grave of Rev. War Soldier James Maynard. The monument has arrived and is in custody of the Morris Funeral Home. In case of bad weather, the installation will be the following Saturday. Please join us in this historical event. James Maynard was born in 1750 and died in 1852, so this is indeed a one-time event. If you wish, bring along some friends. From State Route 152, turn left toward Cabwaylingo State Park. Continue to the first blacktop road which turns left. (The Coal Haul Road) Follow this road to the Cemetery. PleASE TRY TO ATTEND GPS 38 01 21.45 N 82 16 02.07 W On June 18, 2016 the installation of the magnificent marker for James Maynard, which was supplied by the Department of Veterans Affairs, was completed. There were 33 people who attended this event. Below are some photos of the day.
<urn:uuid:6288c96c-cd12-4634-b6c5-17f15bf87eba>
{ "date": "2017-05-28T02:54:31", "dump": "CC-MAIN-2017-22", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463609409.62/warc/CC-MAIN-20170528024152-20170528044152-00140.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9558599591255188, "score": 2.640625, "token_count": 1965, "url": "http://wcghs.com/James%20Maynard%20Marker.htm" }
|Credit: Dark chocolate photo via Shutterstock| Eating chocolate may change the immune system in ways that aggravate acne, a small new study from the Netherlands suggests. In the study, researchers collected blood from seven healthy people before and after they ate 1.7 ounces of chocolate, each day for four days. (The chocolate contained about 30 percent cocoa.) The researchers then exposed the blood cells to bacteria called Propionibacterium acnes, which contribute to acne when they grow inside clogged pores and cause pores to become inflamed, and to Staphylococcus aureus, another skin bacteria that can aggravate acne. After eating chocolate, the participants' blood cells produced more interleukin-1b, a marker of immune system inflammation, when exposed to Propionibacterium acnes. This suggests chocolate consumption could increase the inflammation that contributes to acne, the researchers said. In addition, eating chocolate increased production of another immune system factor called interleukin 10 after exposure to Staphylococcus aureus. Interleukin 10 is thought to lower our bodies' defenses against microorganisms, and thus, higher levels of interleukin 10 could create conditions that allow bacteria to infect pimples, and worsen them, the researchers said. However, the results are preliminary, and the jury is still out on whether indulging in the sweet treat can really prompt a breakout. Future studies should look into which components of chocolate (fats, sugars, etc.) might be responsible for the effects, and whether fat-free chocolate would have a different effect, the researchers said. A 2011 study also found that chocolate consumption worsened acne, but the study involved only 10 men who consumed pure chocolate. Although there's a lot of talk about chocolate and other foods playing a role in acne, there's very little evidence to show they do, said Dr. Kanade Shinkai, a dermatologist at the University of California, San Francisco School of Medicine, who specializes in acne treatments. "I think there's 10 times more discussion about it than there is data," Shinkai said. There is some evidence that so-called high glycemic foods, such as white bread, which release sugar very quickly into the bloodstream, may be linked to acne, Shinkai said. For instance, one study found that a population in Papua New Guinea with a low glycemic diet had no cases of acne across all ages, while in the United States more than 80 percent of teenagers have acne. Other studies looking at a possible link between diary products and acne have had conflicting results, Shinkai said. While there may be a subset of people whose acne is influenced by diet, this is probably not true for everyone, Shinkai said. Multiple factors contribute to acne, including genetics, hormones and certain medications. [See Acne in Women Can Signal Hormone Problems.] Shinkai said most dermatologists do not recommend dietary changes to help with acne, unless a patient is certain that a particular food is linked with his or her acne. Shinkai cautioned against broad dietary restrictions, such as avoiding diary, because diary products are important sources of calcium and vitamin D for many people, and the nutritional benefits of the products outweigh the impact of acne, she said. Eating small amounts of chocolate has been linked with health benefits, such as a reduced risk of heart attack and stroke. The new study, conducted by researchers at the Radboud University Nijmegen Medical Center in the Netherlands, was published online March 1 in the journal Cytokine. Pass it on: For some people, chocolate consumption may worsen acne. This story was provided by MyHealthNewsDaily, a sister site to LiveScience. Follow Rachael Rettner @RachaelRettner. Follow MyHealthNewsDaily @MyHealth_MHND, Facebook & Google+. Originally published on MyHealthNewsDaily.
<urn:uuid:2fc007ca-138a-437f-ab9c-257ab767cb77>
{ "date": "2014-07-23T11:58:35", "dump": "CC-MAIN-2014-23", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997877881.80/warc/CC-MAIN-20140722025757-00168-ip-10-33-131-23.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9489901661872864, "score": 2.96875, "token_count": 811, "url": "http://www.livescience.com/28956-chocolate-consumption-acne.html" }
Epic of King Gesar The Epic of King Gesar is the central epic poem of Tibet and much of Central Asia. It is prized as one of the few living epics, performed by about 140 Gesar ballad singers surviving today (including singers of Tibetan, Mongolian, Buryat and Tu ethnicities). The epic, believed to be approximately 1,000 years old, concerns the fearless king Gesar (Geser), who was sent down from Heaven to conquer the many negative spirits and demons that dominated Tibet, and ruled the legendary Kingdom of Ling. The narrative has been transmitted orally through a tradition of spiritually-anointed Gesar performers who are able to recite from memory for hours on end. The epic is considered the longest literary work in the world. Although there is no one definitive compilation, if completed it would fill some 120 volumes, containing over 20 million words in more than one million verses. It is a valuable historical treasure, preserving ancient Tibetan proverbs, songs, and poems; and serves as a literary record of the development of Tibetan Buddhism. Today, the Institute of Ethnic Literature of the Republic of China, and the Tibet Autonomous Regional Academy of Social Sciences are engaged in a project to record, compile, and publish the Epic of King Gesar. Living literary tradition The Epic of King Gesar is considered the longest literary work in the world, containing over 20 million words in more than one million verses, longer than the world’s other five great epics combined: The ancient Babylonian Gilgamesh (3,000 verses), the Greek Iliad (over 15,000 verses ) and Odyssey (12,000 verses), and the Indian Ramayana (18,000 odes with two verses each) and Mahabharata (more than 100,000 odes comprising over 200,000 verses). A valuable historical source, the Epic of King Gesar, reflects two important periods in Tibetan social development, and includes depictions of almost 100 tribes, kingdoms, and regions. The epic is distinctly Tibetan in style, although the story includes early elements taken from Indian tantricism. It contains countless references to religion, ideology, and local customs, and incorporates many fairy tales, legends, poems, and proverbs from traditional Tibetan folk literature. Some Tibetan proverbs are in their original form; others have been polished and adapted. If seeds are not sown in spring, No corn will be harvested in autumn If cows are not fed in winter, There will be no milk in the spring. If fine horses are not well bred, They will not gallop into the face of your enemies. The epic also preserves a number of ancient songs of praise, such as Ode to Wine, Ode to the Mountains, Ode to Tea, Ode to Horses, Ode to Swords and Knives, Ode to Dress, and Ode to Armor. The famous Ode to Wine begins: The bowl of wine in my hand has a long history. The sky is blue like jade. The blue-jade dragon roars in the sky. The lightning flashes red, And drizzle falls like sweet dew. By using the clean sweet dew, Heavenly nectar can be brewed in the human world. The epic incorporates both prose, and poems in a circular style from the Tubo period, with multiple paragraphs ending in the same sound. The six-word stanzas of Tubo songs and poems were replaced with eight-word stanzas, a form which has remained relatively unchanged since the 11th century, and which is widely used in Tibetan folk songs, narrative poems, lyrical poetry, and drama, as well as in the works of scholars and poets. The epic is made up of three parts: The birth of Gesar; his expeditions against his enemies; and his return to heaven. The stories of his battles and exploits contain the most detail and shed the most light on Tibetan history and culture. The second part includes four subsections: Defeating Demons in the North, Battles Between Hor and Ling, Defense of the Salt Sea, and Battles Between Mon and Ling; as well as battles to conquer 54 zongs (minor kingdoms). Origins and dispersion The epic concerns Gesar, the superhuman warrior ruler of the Kingdom of Ling, who waged war with the nearby Kingdom of Hor. Various elements of the epic began to evolve between the third and sixth centuries, and were consolidated after the establishment of the Tubo Kingdom (mid seventh century–842). During the time of the second transmission of Buddhism to Tibet (marked by the formation of the Kadampa, Kagyu and Sakya schools), Tibetan Buddhist monks, particularly those of the Nyingma (Red) Sect, began to participate in efforts to compile and popularize the story of the Life of King Gesar. The oral tradition of this epic is most prominent in the two remote areas associated with the ancient Bönpo (Ladakh and Zanskar in the far west of Tibet, and Kham and Amdo regions of eastern Tibet), strongly suggesting that the story has Bön roots. References to the Epic of King Gesar in the Rlangs kyi po ti bse ru, a centuries-old Tibetan text, show that the narrative was in something similar to its present form by the fifteenth century at the latest. The oldest extant text of the epic is a Mongolian woodblock print commissioned by the Qing Emperor Kangxi in 1716. None of the surviving Tibetan texts date from earlier than the eighteenth century, though they are likely based on older texts. In the late nineteenth/early twentieth century, a woodblock edition of the story was compiled by a scholar-monk from Lingtsang (a small kingdom north-east of sDe dge) with inspiration from the prolific Tibetan philosopher Ju Mipham Gyatso. Tales of King Gesar are also popular in Mongolia, the Tu and Yugu regions, and the Tibetan-inhabited areas in China, and have traveled as far west as the Caspian Sea, reaching Europe with the Kalmyk people, who also profess Tibetan Buddhism as their religion. The Second King of Bhutan (r. 1926–1952) retained a Gesar singer as a full-time entertainer for the royal court, and recitals of the Epic of Gesar were said to be the king's favorite edification. A large number of variants of the oral tradition of the Epic of King Gesar have always existed, and no canonical text can be written. Each Gesar performer is familiar only with his regional version. Weeks are required to complete a full recitation of the Epic of King Gesar. Unlike other folk artists, performers of the Gesar epic do not pass their legacy from master to apprentice, or from father to son. Most Gesar narrators are illiterate and rely entirely on memory. They believe the skill of performances depends on the inspiration of the gods, not on inheritance or study, and attribute the emergence of an artist with the reincarnation of a figure related to King Gesar. It is reported that ballad singers in Tibet and surrounding regions often begin their career by experiencing a strange dream during sleep, after which they mysteriously and inexplicably gain the ability to recite large sections of the huge epic, sometimes for several hours without stopping. Occasionally, even young children gain this ability to suddenly and profoundly recall the poem. Before a performance, the narrator usually holds a ceremony, such as burning incense and worshiping gods, or singing in front of a mirror. Gesar singers wear hats decorated with bird feathers and carry tambourines or musical instruments made of ox horn. At the Shoton (Sour Milk Drinking) Festival, in August 1984, Lhasa hosted 40 Gesar artists from seven provinces and municipalities. One of the best-known modern Gesar performers was Sangzhub, born to a family of farmer in northern Tibet in 1922. As a small child, he listened to his grandfather sing portions of the Epic of King Gesar. When his grandfather died, Sangzhub became mute until, at the age of 11, he began to have dreams of King Gesar. Soon afterwards, he began to travel from one monastery and village to another, performing the Epic for Buddhist audiences. In 1979, at the request of the Tibet Academy of Social Sciences, he began to make recordings of his narrative, often spending entire days singing, often in a cave for better sound quality. He recorded 2,500 hours of singing, the equivalent of 41 volumes. In 2000, the Tibet Academy of Social Sciences and the Ethnic Minority Literature Institute of the Chinese Academy of Social Sciences began to compile and publish a written version of Sangzhub’s performance. Story of King Gesar Versions of the story often begin with the creation of the world and a compacted prehistory of Tibet. This is followed by a brief traditional account of how Tibet was converted from barbarity to Buddhism under the three great Dharma Rajas (Tibetan: Chos rgyal) of the Tibetan Imperial Period (seventh-ninth centuries C.E.), in particular by the great magician and founder of Tibetan religion, Padmasambhava (Tibetan: Padma 'byung gnas), who subdued Tibet's violent native spirits and bound them by oath. It is then explained how, later on, the world in general, and Tibet in particular, fell into a state of anarchy because the many negative spirits and demons of Tibet had not been fully conquered. As a result, the world came under the dominion of hordes of flesh-eating and human-eating demons and goblins, led by the malignant and greedy kings of many kingdoms. To remedy this situation, various gods-on-high, including Brahma (Tibetan: Tshangs pa dkar po) and Indra (Tibetan: Brgya byin) in concert with celestial Buddhist figures such as Padmasambhava, and both cosmic and abstract tantric deities such as Amitabha (Tibetan: 'Od dpag med) and Samantabhadra (Tibetan: Kun tu bzang po), as well as the spirits below the earth or nagas (Tibetan: Klu), decide that a divine hero must be sent from the heavens to conquer these evil sovereigns. The decision is made to send the youngest son of Tshangs pa or brgya byin (the Gesar texts tend to conflate Brahma and Indra). He is known by various names in different versions, sometimes thos pa dga,' sometimes bu tog dkar po, but perhaps the most universally used is don grub. This god-child is not very keen on his mission, and tries to evade it, but eventually agrees. With various celestial companions, he is then born, after singing to his mother from the womb and asking the way out, as the son of Gog bza (in some versions, a beautiful naga princess captured from a neighboring tribe, and in other versions, an old woman) and Seng blon, one of the respected elders of the Kingdom of Ling. In most Tibetan versions, Ling is located in eastern Tibet (Tibetan: Mdo khams), often between the 'Bri (Yangtze) and rDza (Yalong) rivers, which is where the historical kingdom of Lingtsang (Tibetan: Gling tshang) existed until the twentieth century. The hero’s older half-brother, rGya tsha, is a brave warrior and important figure in the epic. He is sometimes said to have been the grandson of the emperor (Tibetan: Mi chen, literally: "Big man") of China, and is killed in a battle with the great enemy of Ling, Hor (often identified by Tibetans with Mongolia). This struggle between Ling and Hor is central to the epic. The young hero has two uncles. One, the wise and very aged elder of Ling, known as the "old hawk," sPyi dPon rong tsha, supports the child and has received divine prophecies indicating his importance. The other uncle, Khro thung, is a cowardly and greedy rascal, who sees the child as a threat and tries to do him ill. Khro thung is normally a comic character in the epic, and an instigator of many incidents. The precocious child grows rapidly and vanquishes a number of foes. His behavior is wild and fearsome, and soon he and his mother are banished from Ling. They go to the deserted lands of the land of rMa (the upper Yellow River) where they live in the wilderness, and the child is clothed in animal skins and wears a hat with antelope horns. When the child is twelve, a horse race is held to determine who will become the King of Ling and marry the beautiful daughter, Brug mo, of a neighboring chieftain. The hero-child, who in many versions is known as Joru during his youth, returns to Ling, wins the race, marries Brug mo, and ascends the golden throne, assuming the title "Gesar." His first major campaign as king is against the man-eating demon of the north, Klu bTsan. After defeating the demon, Gesar is put under a spell by the demon’s wife, and loses his memory for six years. While he is away, his beautiful wife is kidnapped by Gur dKar (literally: "White tent"), the King of Hor. Gesar eventually returns, uses his magic to enter the king of Hor's palace, kills him, and retrieves his wife. Sechan Dugmo, queen and wife, Remorse at what each of us has done, Anger at what each of us has seen the other do, Sorrow that true love has proved so fragile, Sadness that passing love has been compelling and disastrous, Doubt that even genuine love can be restored, Fear that neither decency nor joy has a place In such deceitful and dangerous terrain, All these things, O dear companion of my heart, Seem to separate us so, and yet, We share them utterly. Words spoken by Gesar to his wife, who during his absence has fallen in love with his enemy Gur dKar, and borne him a son These episodes are the first two of four great campaigns against "the four enemies of the four directions." The next two campaigns are against King Sa dam of 'Jang (sometimes located in Yunnan), and King Shing khri of Mon (sometimes located in the southern Himalayan region). Gesar then goes on to defeat the "eighteen great forts," which are listed differently in each version, but nearly always include sTag gZig (Tajik), and Kha che (Muslim) adversaries. Many (some versions say 40) other "forts" (Tibetan: Rdzong) are also vanquished. When Gesar reaches his eighties, he briefly descends to Hell in the last episode, before falling off his horse and leaving the land of men to ascend once more to his celestial paradise. Location of the Kingdom of Ling The mythological and allegorical elements of the story defy place and time, and several places lay claim to being the former Kingdom of Ling. Both Tibetan and Chinese experts have generally agreed that the most likely birthplace of King Gesar is Axu town on the prairie of Dege County, located in the Garzê Tibetan Autonomous Prefecture of southwest Sichuan Province, which lies in the historic kingdom of Lingtsang, a significant eastern Tibetan principality from at least the early fifteenth century. Gesar's "soul mountain," would then be the famous snow peak of Golog, Amnye Machen, in modern Qinghai Province. Though the Epic of Gesar contains elements of ancient Tibetan mythology and Indian tantricism, the narrative became a vehicle for Buddhist teachings during the eleventh century, illustrating a Buddhist world view and evoking self-reflection in its audiences. Dear friends, when a raindrop falls into a still pond, It dissolves inseparably in its own nature, And nothing has occurred. But when the same raindrop falls into the same pond, Ripples shine and dance on the water's skin. From these two ways of seeing one thing Come the true magic that raises and destroys kingdoms, That increases joy or misery, brilliance or degradation. King Gesar teaching the people of Ling The Epic of King Gesar provided a wealth of material for later Tibetan literature and art. The tunes of some Tibetan folk songs and dances are drawn from performances of the narrative, and popular folk songs praise the love of King Gesar and his wife. Episodes from the life of King Gesar are the subject of fairy tales and folk stories, such as the Story of Seven Brothers, and of carvings, paintings, murals, woodcuts, embroideries, songs, dances, and plays. Statues of King Gesar sometimes serve as temple guardians. Since the 1950s, the Epic of King Gesar has played a central role in the Republic of China’s efforts to create a national ethnic history and identity. The Institute of Ethnic Literature, an affiliate of the Chinese Academy of Social Sciences, established in 1980, has undertaken an extensive project to research, compile, and publish the Epic. A project by the Tibet Autonomous Regional Academy of Social Sciences and Tibet University to make recordings of the epic narrated by local folk artists has priority as a “key state project.” Since 1979, a Tibetan research institute specializing in the study of the epic has collected more than 180 different combined song and narration versions of the epic, and 55 woodblock and mimeographed editions; and has recorded 70 performances of the epic. A Russian translation of the Mongolian Geser texts, which had been printed in Beijing from 1716 onwards, was published by the Moravian missionary Isaak Jakob Schmidt in 1836; a German translation followed in 1839. In the twentieth century, other Mongolian Geser texts were edited by scientists like Nicholas Poppe and Walther Heissig. The first three volumes of the version known as the Lingtsang-Dege woodblock, which was composed in the late nineteenth/early twentieth century, was published with a very faithful, though incomplete, French translation by Professor Rolf Stein in 1956. Stein followed this publication with his 600 page magnum opus on the Tibetan epic entitled, Recherches sur l'Epopee et le Barde au Tibet. This remains the most in-depth study of the Tibetan Gesar tradition. Another version has been translated into German by Prof. Dr. P. Matthias Hermanns (1965). This translation is based on manuscripts collected by Hermanns in Amdo. This book also contains extensive study by Hermanns explaining the epic as the product of the Heroic Age of the nomads of northeastern Tibet and their interactions with the many other peoples of the Inner Asian steppe. Hermanns believed the epic to pre-date Buddhism in Tibet, and saw in it an expression of the ancient Tibetan archetype of the "heaven-sent king," seen also in the myths of the founders of the Yarlung Dynasty, who established the Tibetan Empire (seventh-ninth centuries C.E.). A.H. Francke collected and translated a version from Lower Ladakh between 1905 and 1909. The most accessible rendering of Gesar in English is by Alexandra David-Neel in her Superhuman Life of Gesar of Ling, published in French and then English in the 1930s. - ↑ 1.0 1.1 1.2 1.3 1.4 China Society for Human Rights Studies, Collection of and Research on the Epic. Retrieved May 28, 2008 - ↑ China Tibet Information Center, King Gesar: Gesar Bards. Retrieved May 28, 2008. - ↑ China Through a Lens, World's Longest Epic Sung for Thousand Years. Retrieved May 28, 2008. - ↑ iel.cass.cn, China Ethnic Literary Network. Retrieved May 28, 2008. - ↑ Ivy Hsu, The Epic of King Gesar, Tibet Mandala. Retrieved May 28, 2008. - ↑ Xinhua News Agency, Birthplace of Tibetan Hero Gesser Confirmed. Retrieved May 28, 2008. - ↑ Ivy Hsu, The Epic of King Gesar. Retrieved May 28, 2008. - Francke, August Hermann. 1905. A Lower Ladakhi Version of the Kesar Saga. Calcutta: Royal Asiatic Society of Bengal. - Hermanns, P. Matthias. 1965. Das National-Epos der Tibeter Gling König Ge Sar. Regensburg: Verlag Josef Habbel, 1965. - Hummel, Siegbert. 1998. Eurasian Mythology in the Tibetan Epic of Gesar. Translated by Guido Vogliotti. The Library of Tibetan Works and Archives, Dharamsala, H.P., India. ISBN 81-86470-20-4. - Stein, R.A. 1956. l'Epopee Tibetaine dans sa Version Lamaique de Ling. Paris: Presses Universitaires. - Stein, R.A. 1959. l'Epopee et le Barde au Tibet. Paris Presses Universitaires. - Yongden, Lama, and Alexandra David-Neel. 2004. The Superhuman Life Of Gesar Of Ling. Kessinger Publishing. ISBN 0766186865. All links retrieved December 11, 2013. - Recording of narration from the Epic of King Gesar - China Set to Preserve Intangible Heritage: King Gessar - King Gessar preserved - King Gessar and Samzhub - English Translation of Geser Epic New World Encyclopedia writers and editors rewrote and completed the Wikipedia article in accordance with New World Encyclopedia standards. This article abides by terms of the Creative Commons CC-by-sa 3.0 License (CC-by-sa), which may be used and disseminated with proper attribution. Credit is due under the terms of this license that can reference both the New World Encyclopedia contributors and the selfless volunteer contributors of the Wikimedia Foundation. To cite this article click here for a list of acceptable citing formats.The history of earlier contributions by wikipedians is accessible to researchers here: Note: Some restrictions may apply to use of individual images which are separately licensed.
<urn:uuid:b6cda4ca-0ebf-4804-b13c-a8eda2821b71>
{ "date": "2015-03-04T15:16:41", "dump": "CC-MAIN-2015-11", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463606.79/warc/CC-MAIN-20150226074103-00092-ip-10-28-5-156.ec2.internal.warc.gz", "int_score": 4, "language": "en", "language_score": 0.941777765750885, "score": 3.515625, "token_count": 4705, "url": "http://www.newworldencyclopedia.org/entry/Epic_of_King_Gesar" }
Medically reviewed on May 14, 2018 What Is It? Interstitial cystitis is a puzzling bladder condition, in which the bladder wall becomes irritated or inflamed, causing pain and frequent or painful urination. The symptoms of interstitial cystitis are often similar to the symptoms of a urinary tract infection. However, in interstitial cystitis, there is no infection, and the symptoms do not respond to antibiotic treatment. The exact cause of interstitial cystitis remains a mystery, although researchers continue to investigate possible causes, such as unidentified bacteria, an allergic or immune system reaction, a toxic substance in the urine, or a neurological problem in the bladder wall. There also is some evidence that interstitial cystitis may not be just one illness, but several illnesses that share similar symptoms. Interstitial cystitis usually occurs between the ages of 20 and 50. Approximately 90% of people with interstitial cystitis are women. It is unknown why interstitial cystitis is more common in women. The disease is not known to be genetic (inherited) or caused by toxins in the environment. Interstitial cystitis may cause: An intense urge to urinate Awakening from sleep to pass urine A burning sensation during urination Pain, pressure or tenderness in the area of the bladder — midline, below the navel or in some other portion of the pelvis Increasing discomfort as the bladder fills Pain during sexual intercourse In men, pain or discomfort in the penis and scrotum In women, worsening symptoms during menstrual periods Your doctor will ask you about your urine (urine color, odor, presence of blood), symptoms during urination, any pain you are having, and if you are having fever, nausea or vomiting. Your answers to these questions will provide clues about other possible causes of your symptoms, such as a bladder or kidney infection. Next, your doctor will examine you and will collect urine from you for laboratory tests that check for signs of infection and infection-causing bacteria. Women usually will need a pelvic exam and men will need a digital rectal exam to check the prostate gland. There is no one sign or test that can tell you immediately if you have interstitial cystitis. Usually, doctors diagnose the condition after a person has had persistent symptoms and no other cause has been found. Your doctor probably will refer you to a urologist to help make the diagnosis. He or she will do a test called cystoscopy to look for indications that you have interstitial cystitis and make sure there are no other causes of your symptoms. During cystoscopy, the urologist uses a small tube like instrument to look inside your bladder and examine its inner lining. In a test called a biopsy a small sample of tissue may be taken from your bladder wall to be examined in a laboratory to look for signs of inflammation and to check for other illnesses, including cancer. During the cystoscopy, your urologist may test your bladder's maximum capacity by filling it with sterile water. This is to determine whether interstitial cystitis has reduced your bladder's ability to hold urine. How long interstitial cystitis lasts varies. In some people, it is a chronic condition that lasts for many years, while in others, it disappears suddenly. When the condition disappears suddenly, symptoms may return suddenly, even years after the first illness. Since doctors do not know the cause of interstitial cystitis, there is no way to prevent it. In people who already have been diagnosed with interstitial cystitis, symptoms may be less likely to flare up if the patient quits smoking cigarettes; avoids drinking beverages containing alcohol, caffeine or citrus juice; and avoids eating chocolate, spices or high-acid foods, such as tomatoes and citrus fruits. The goal of treatment is to reduce symptoms. No one therapy is so successful that it should always be tried first. Often a person with interstitial cystitis needs to try several therapies before finding the right combination. The symptoms of interstitial cystitis may go away over time, but there is no therapy that cures the disorder. Dietary modification — Caffeinated beverages, alcohol, citrus fruits, spicy foods and chocolate are just a few in a long list of foods that aggravate interstitial cystitis in some people. Each person needs to discover what she or he needs to avoid. Bladder training — In this therapy, patients learn to reduce frequent urination by following a schedule for urinating. The training does not reduce pain. Oral medications — Pentosan polysulfate sodium (Elmiron) is the only medication specifically approved for the treatment of interstitial cystitis. About 30% of people with interstitial cystitis have fewer symptoms while taking this medication. Side effects are uncommon. There is a long list of other oral medications that are not approved specifically for interstitial cystitis, but may offer relief. These include ibuprofen (Advil, Motrin and others); naproxen (Aleve, Naprosyn and others); aspirin; acetaminophen (Tylenol and others); tricyclic antidepressants, such as amitriptyline (Elavil, Endep); hydroxyzine (Atarax, Vistaril); and cimetidine (Tagamet). Bladder distention — Sterile water is used to stretch the bladder. Most patients feel worse for a couple weeks after the procedure. After that, 30% to 50% of patients feel better. The beneficial effect lasts only three months, and the procedure is done under general anesthesia, which carries certain risks. Bladder instillation (also called bladder wash) — In this procedure, the bladder is filled with a sterile solution containing one of a number of ingredients that work directly on the bladder wall. The solution is put into the bladder through a catheter (hollow tube) that is placed through the urethra. After a variable period of time, the person is instructed to empty his or her bladder. Several active ingredients have been used in this procedure, but DMSO, heparin and topical anesthetics are the ones tried most frequently. As with other therapies, success is variable. Repeating the procedure risks causing more irritation of the bladder wall and introducing infection. Electrical nerve stimulation — Traditionally, this has been done with a device called a TENS (transcutaneous electrical nerve stimulator) unit. Mild electrical impulses are passed into the body through wires placed below the navel, on the lower back, or inside the rectum or vagina. The patient controls the timing and intensity of these electrical impulses. When To Call a Professional Make an appointment to see a doctor if you are urinating more than usual or feel an intense urge to urinate. If you are having fevers or pain or discomfort, especially in the pelvic/bladder area, penis or scrotum, see your doctor soon. There is no cure for interstitial cystitis and the prognosis is variable. Many patients find that their symptoms come and go. In some patients, symptoms continue to get worse. Learn more about Interstitial Cystitis IBM Watson Micromedex Mayo Clinic Reference American Urological Association 1000 Corporate Blvd. Linthicum, MD 21090 Always consult your healthcare provider to ensure the information displayed on this page applies to your personal circumstances.
<urn:uuid:843eecfe-d81e-4913-8eec-a43f24da4c8d>
{ "date": "2019-02-18T12:44:31", "dump": "CC-MAIN-2019-09", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247486480.6/warc/CC-MAIN-20190218114622-20190218140622-00576.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9252712726593018, "score": 3.0625, "token_count": 1547, "url": "https://www.drugs.com/health-guide/interstitial-cystitis.html" }
Many students use Khan Academy at home to reinforce what they’re learning in school, for homework help, or simply as a fun educational activity. - If you’d like to help a child use Khan Academy outside the classroom, we recommend following the steps below. - If you’re tutoring a large group of students, you may find our coach and classroom resources for out-of-school-time programs more helpful. Create an account for yourself You can find instructions here. Connect with your child Connect with your child by creating their account or connecting with their existing account. - If the child already has a Khan Academy account, they can simply add you as a coach. - If the child is 13 or older, they can go to khanacademy.org to create their own account and then add you as a coach. - If the child is under 13 and you're their parent, you can create an account for them by following these instructions. - If the child is under 13 and you're not their parent, you can create an account for them by following these instructions. (You’ll need a parent email address.) Try out what your child will be learning If your child wants to learn or review an entire grade level or subject, they can choose the appropriate mission. Each grade-level mission covers all the Common Core standards for that grade. If your child has significant gaps in their math knowledge, you may want them to work on Early Math, Arithmetic, or Pre-algebra rather than a grade-level mission. Starting with the basics not only helps learners build firm foundations but also boosts their confidence. If your child is using Khan Academy just for fun, feel free to let them explore and learn whichever topics interest them most! - To learn more about the Common Core standards, check out Achieve the Core's Common Core resources. - To learn more about missions, download this guide as a PDF: Missions: Focusing students on meaningful content (parent version). Check out our tips for using Khan Academy with your child In our coach and classroom resources for parents and mentors, we've compiled stories and best practices from a wide variety of Khan Academy users. We hope these articles and videos give you ideas that you can adapt for your own child and situation! Encouraging your child is a great place to start. Learn something for yourself One of the best ways to support your child's learning on Khan Academy is to set an example. Perhaps you want to brush up on your own math skills, or maybe you want to compete with your child to see who can earn the most points or master the most skills. Pick a topic that interests you, and show your child that learning is a lifelong process! Have your child log in It's important for your child to log in to their account - not yours - every time they work on Khan Academy. That way, your child can earn points and badges! More importantly, you and your child will both be able to track their progress. Once you've logged out and helped your child log in, let them start their mission. We suggest framing Khan Academy as a fun activity or reward instead of studying or a chore! Check out our parent stories for even more ideas about how to tutor with Khan Academy. If you're interested in seeing more detailed information about your child's performance, explore our coach reports. Most importantly, feel free to experiment to find out what works for you!
<urn:uuid:8f1e5541-de91-4d9e-baa1-cf1d4d2952fc>
{ "date": "2014-11-26T03:00:50", "dump": "CC-MAIN-2014-49", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931005028.11/warc/CC-MAIN-20141125155645-00244-ip-10-235-23-156.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9498807787895203, "score": 3.1875, "token_count": 719, "url": "http://www.khanacademy.org/coach-res/parents-and-tutors/tutor/a/start-tutoring-with-khan-academy" }
A radical analysis of our master-and-slave relationship to energy and a call for change. Ancient civilizations routinely relied on shackled human muscle. It took the energy of slaves to plant crops, clothe emperors, and build cities. In the early nineteenth century, the slave trade became one of the most profitable enterprises on the planet, and slaveholders viewed religious critics as hostilely as oil companies now regard environmentalists. Yet when the abolition movement finally triumphed in the 1850s, it had an invisible ally: coal and oil. As the world's most portable and versatile workers, fossil fuels dramatically replenished slavery's ranks with combustion engines and other labour-saving tools. Since then, oil has transformed politics, economics, science, agriculture, gender, and even our concept of happiness. But as Andrew Nikiforuk argues in this provocative new book, we still behave like slaveholders in the way we use energy, and that urgently needs to change. Many North Americans and Europeans today enjoy lifestyles as extravagant as those of Caribbean plantation owners. Like slaveholders, we feel entitled to surplus energy and rationalize inequality, even barbarity, to get it. But endless growth is an illusion, and now that half of the world's oil has been burned, our energy slaves are becoming more expensive by the day. What we need, Nikiforuk argues, is a radical new emancipation movement. Also available in paperback. Published in partnership with the David Suzuki Foundation.
<urn:uuid:aa48cd80-db3e-42f7-91a2-e3adc763978d>
{ "date": "2015-12-01T14:22:23", "dump": "CC-MAIN-2015-48", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398467979.1/warc/CC-MAIN-20151124205427-00283-ip-10-71-132-137.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9557840824127197, "score": 2.703125, "token_count": 298, "url": "https://www.chapters.indigo.ca/en-ca/books/the-energy-of-slaves-oil/9781553659785-item.html?ikwsec=Home&gcs_requestid=0COCT9dDhwrwCFcU35god72MAAA" }
The smallness of the Reformed/Presbyterian community of churches in comparison to the larger evangelical American context is largely a consequence of a failure to plant and maintain churches among those Scot-Irish Presbyterians who settled in the Appalachian mountain chain and kept heading west from there. It’s no secret that the Presbyterians lagged far behind the Baptists and Methodists, not to mention new groups like the Cambellites, in planting churches where people had settled in the west. They saw the problem, and tried to remedy it by forming a Plan of Union with their Congregationalist cousins to the north for planting churches in the West. It didn’t work. Perhaps nothing more could be done. It’s just that the Presbyterian/Congregationalist emphasis on an educated ministry slowed the rate of growth on the frontier based on the number of licentiates that were available. Meanwhile the Baptists and Methodists would find a young man with gifts, give him a Bible, two or three more books, and send him on a horse off to preach wherever he found people who would listen. Who could compete with that speed and agility and maintain doctrinal integrity? If you trace the areas where the Scot-Irish and their descendants (who were almost all Presbyterian in the beginning) settled first in America, and shaped the culture that newcomers would find and assimilate into, it extends from western Pennsylvania down to the western Carolinas, and west from there through southern Ohio, south Indiana, sKentucky, Tennessee, Missouri, Arkansas, South Kansas, and the North Texas Hill Country. Not to mention that these people were dominant in the initial settlements all over the far west extending to eastern Oregon. Now imagine if the dominant Christian churches over this vast region were Presbyterian.
<urn:uuid:9172be98-8704-4539-aa25-b18322e83ff5>
{ "date": "2019-08-18T10:00:21", "dump": "CC-MAIN-2019-35", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027313747.38/warc/CC-MAIN-20190818083417-20190818105417-00456.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9667282700538635, "score": 2.609375, "token_count": 362, "url": "https://highplainsparson.wordpress.com/2015/11/28/how-the-west-was-lost-by-the-presbyterians/" }
The latest news from academia, regulators research labs and other things of interest Posted: Dec 22, 2010 Scientists observe paradoxical quantum phenomenon (Nanowerk News) For the first time ever, scientists have supplied experimental proof of the existence of the "Efimov effect", a phenomenon that has aroused controversy for decades and has so far been only indirectly observable. This apparently paradoxical phenomenon hinges on the fact that three atoms can associate with one another even if the forces between two particles are too weak to bind them. This quantum trimer effect - a universal quantum property- was predicted theoretically in 1970 by the Russian physicist Vitaly Efimov. The Efimov trimer is a spherical quantum object appreciably larger than the usual three-atom trimers that chemists are familiar with. To observe the behaviour of the Efimov quantum trimer, the scientists used lithium-6 atoms to produce an ultracold gas with a temperature about one-millionth of a degree above absolute zero. At higher temperatures the atoms are more excitable and thus collide more strongly and more frequently. This would make observation of sensitive Efimov states impossible. "The Efimov effect is much weaker than the typical interactions between atoms that make for chemical bindings," says Prof. Jochim. For the production of the ultracold gas, the lithium-6 atoms were slowed down via laser light and captured in a so-called optical trap. But an initial "push" was necessary to place three lithium-6 atoms at the right distance from one another to form an Efimov trimer. To do this, the atoms have to adjust their atomic "innards" to the three-way constellation. The nucleus of a lithium-6 atom has a so-called nuclear spin and behaves like a tiny magnet. For the three atoms to associate, their nuclear spins have to be aligned in the right way. The scientists achieved this by exposing them to a radio field. The result was an actual Efimov trimer. Though the trimer had only a very brief lifetime of less than a thousandth of a second, this was long enough for Prof. Jochim's team to take a closer look at the Efimov state. They were able to demonstrate that quantum trimers really do behave in the way predicted by Valery Efimov. In the further course of his research work at Heidelberg University's Centre for Quantum Dynamics, Prof. Jochim intends to produce trimers with a longer lifetime in order to decipher the universal quantum properties with greater accuracy. "Universality means that it is no longer important what concrete physical system and what force we observe," Prof. Jochim explains. Source: Universitšt Heidelberg If you liked this article, please give it a quick review on reddit or StumbleUpon. Thanks! Check out these other trending stories on Nanowerk:
<urn:uuid:7d06d79f-f4b0-4e2d-95b6-0de516164107>
{ "date": "2015-04-02T04:26:21", "dump": "CC-MAIN-2015-14", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131317541.81/warc/CC-MAIN-20150323172157-00014-ip-10-168-14-71.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9335218667984009, "score": 3.15625, "token_count": 599, "url": "http://www.nanowerk.com/news/newsid=19521.php" }
How to Attract Frogs Naturally to a Garden Pond 2019 (5 Easy Steps) Frogs are cute, incredibly unique animals that lend a more natural, genuine ambiance to your garden pond. With over 6,000 species worldwide, they are the most numerous and diverse group of amphibians. Even if you don’t find these little critters to be particularly appealing, they do perform some pretty important functions that could greatly benefit your backyard pond! A typical frog can eat over 100 insects and other pests just overnight, including mosquitos and ticks that can carry potentially deadly diseases. Considering frogs prefer to live in groups, this can really help cut down on any unwanted bugs you might have around your property and prevent them from becoming too abundant in the future. Frogs, like all amphibians, are also very sensitive to ecosystem disturbances, and because of this can give you advanced warning if your pond isn’t healthy before it affects your fish and plants too much. If you notice frogs are suddenly leaving the area, you may need to make some changes. So, interested yet in welcoming some new frog residents to your pond? If so, below are a few simple, key ways to make them want to call your oasis home:- 1) Keep it Natural As mentioned before, frogs are quite sensitive. Their skin is semi-permeable, meaning that they obtain all of their moisture and much of their oxygen by absorbing it through their skin rather than drinking or breathing as we do. Unfortunately, this means that they also soak up whatever else may be in the water and soil, such as fertilizers or any other chemicals. These compounds can cause a variety of issues, from deformities to death. If you have a garden pond, you’ll want to minimize the usage of these anyway to ensure that it remains healthy and naturally well-balanced. As frogs live both on water and land, try to avoid using fertilizers or chemicals such as pesticides anywhere near the pond. You can maintain your pond’s pH and oxygen levels by using aquatic plants and water filters. There are also plenty of natural ways to take care of your yard, such as only planting native plants and grasses that are adapted to local conditions, creating a few small holes or “plugs” throughout your yard to allow for better air flow (frogs will also likely use these holes as burrows!), and not mowing your grass too often, which dries it out. Many people apply fertilizers and excess water to their yards because the grass appears unhealthy, but in many cases simply mowing less often will result in a more vibrant lawn, as grass is generally healthiest at around 3 inches tall. 2) Create a Safe Haven Since frogs are fairly small, they have a lot of natural predators. To deter predators, you could set up a decoy heron or hawk, as these birds will usually stay away from areas if they think it’s already claimed by another individual. For smaller birds, you can draw them away from your pond by placing bird feeders and bird baths in strategic locations as far away from your pond as possible. Many predators, such as owls and raccoons, are active at night. You can discourage them from eating your fish and frogs by placing netting over the area at night that’s large enough to allow frogs to pass through without injuring themselves, but too small to allow much of anything else in. Frogs also prefer to have lots of little hiding places that double as shelters from predators, the sun, and elements. Throughout your yard, place rocks, small hollow logs, or even clay flower pots turned upside down and propped up slightly for a more whimsical look. These refuges should be located in shady areas, as frogs will easily dry out in the sun. Around and in your pond, plant long grasses and broad-leafed plants that are more difficult for predators to see through – these will also allow frogs to more easily enter and exit your pond, as they can grip onto the plants, in addition to improving water quality. You can also place rocks, PVC piping and even fish shelters in your pond to allow for underwater hidey-holes for both fish and frogs! 3) Plants, Plants, & More Plants! Pond plants provide hiding places, shade, and also improve water quality, all of which will encourage breeding and promote a stable population of frogs. Within the pond, water lilies are a wonderful option, as frogs can hide beneath them, lay their eggs on the underside of the leaves, or rest on top of them. The flowers will also bring in insects for them to feast on, and many of the insects will serve as pollinators for some of your other plants. It’s also important to allow a small amount of algae to grow in the water, as both fish and tadpoles will feed on this. Too much algae, however, and you can cause issues with water quality and fish health (if you have any), so finding a balance is key! If you’re battling an algae bloom and have frogs, always opt for non-chemical algae treatments, never harsh algaecides, as they’ll quickly kill frogs and other wildlife. On the pond’s edge, hostas, sedges, ferns, and long grasses will not only supply habitat, shelter, and shade, but will also help soak up (to a degree) harmful things like fertilizer before it reaches the water. However, make sure than any plants you use are not toxic. For example, rhubarb, daffodils, and honeysuckle are poisonous to most frog species so you’ll want to avoid planting them anywhere near the pond if at all possible. 4) The Perfect Layout To allow for easy entering and exiting, make sure that at least one side of your pond has a gradual, shallow edge of 45 degrees or less. You can also use logs, rocks, and plants that they can effortlessly jump onto and use as exit routes. In addition, your pond should have an area that is at least a couple of feet in depth to provide plenty of spawning habitat. The greater depth will also supply cooler water during hot periods, and prevent it from drying up if a drought occurs. Frogs avoid overly turbulent water, so try to stay away from incorporating waterfalls or too powerful of an aerator into your pond. Along the edges of your pond, small pebbles, loose gravel, or a similar substrate will help filter water running off into your pond while also offering prime habitat for macroinvertebrates like caddisfly larvae, dragonfly larvae, and crayfish. Many of these are valuable food sources for frogs, and also sensitive to pollution – if you have these neat, tiny creatures in your pond, you can be sure it’s reasonably healthy! Plus, who doesn’t like watching colorful dragonflies zip around? By contrast, if you find undesirable aquatic invertebrate species like leeches or midges, their presence is a pretty good indicator that your pond could use a good cleaning and oxygen boost. 5) Species Research This one may sound too simple, but one of the best ways to make sure you attract frogs is to figure out which species are native to your area. You can then quickly look them up and determine exactly what they like and how to incorporate those things into your pond and garden. Depending on the type of frogs you have, they may prefer slightly different environmental conditions or have varying requirements. The simplest way to determine the species is with a quick online search with their color, patten, approximate size, and your location.
<urn:uuid:4877204b-8540-48a3-9742-388611081215>
{ "date": "2019-11-19T07:50:04", "dump": "CC-MAIN-2019-47", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496670036.23/warc/CC-MAIN-20191119070311-20191119094311-00216.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9610204696655273, "score": 3.046875, "token_count": 1578, "url": "https://pondinformer.com/how-to-attract-pond-frogs/" }
Why use them and what are the differences? In order to answer this question, we first need to look at what an oil does and how it does it. Oil has many functions to perform in the engine, but the primary one is to reduce friction between moving parts by separating moving surfaces with a layer of oil. This oil must not only separate the two surfaces, but must also support any load that is being applied between them, so that the load can be transferred from one surface to the other. If the oil did not support this applied load, then the two surfaces would force through the oil film until they came into contact, potentially causing significant and irreparable damage. An important indication of how much load an oil can carry is the measurement of the oil's viscosity. Viscosity is the resistance to flow of a particular fluid. Under the same conditions a liquid with a low viscosity, such as water, will flow more quickly than a liquid with a high viscosity, such as syrup. However, in general, an oil with a high viscosity will support more load than one with a lower viscosity. There is an obvious balance to be struck here between having the oil viscous enough to support the required amount of load whilst also being fluid enough to pump effectively. The problem is further compounded by the fact that as an oil is heated, the viscosity drops and vice versa. This relationship between temperature and viscosity is known as the viscosity index; the higher the viscosity index of an oil, the less it's viscosity changes with temperature. The ideal situation is to have an oil who's viscosity doesn't change with temperature, so that it maintains the same load carrying ability as well as the ability to be pumped at all temperatures. Unfortunately this is impossible to achieve, so we are left with certain compromises. The majority of the aviation piston engine oils on the market are mineral monogrades (both the straight and monograde ashless dispersant or 'W' oils). The viscosity index of these mineral oils are fairly uniform relatively unimpressive due to the very nature of the base oils used. This means that whilst a higher grade oil (e.g. 100) oil may be satisfactory for operation during warm weather, it may well become too thick to pump effectively at the lower temperatures experienced at start up. Conversely, if a lower grade oil (e.g. 80) is used during hot weather, it may not prove to be viscous enough to support the loads required when at the elevated operating temperatures. This is why many engine manufacturers advise that the oil grade is changed as climatic temperatures change. Note: you should always refer to your engine manufacturer's recommendations for clarification on which grade to use at which temperature. The ideal solution to this is to produce an oil which has a higher viscosity index (i.e. it's viscosity changes less with temperature). In this way in cold weather it will pump effectively, but still support high load at high temperature. This is the concept of the multigrade oil and there are two principle ways of achieving these objectives: Mineral multigrades use a light weight mineral oil (the same as a light weight monograde oil), but include an additive called a Viscosity Index Improver. The best way to visualise this viscosity index improver is as a long chain molecule which curl up like a ball of string when cold, but then uncurl as the temperature increases. Thus when an oil is cold, the presence of the viscosity index improver has very little effect and the oil flows well as the base oil is a low viscosity oil. As the oil heats up, the viscosity index improver uncurls with the effect that it tends to restrict the motion of the oil, or 'thickens' it, which to some extent counteracts the decrease in viscosity of the base oil. This enables the oil to support more load than would otherwise be possible. However the viscosity of an oil which contains a viscosity index improver depends on the rate is made to flow (or sheared). It may decrease rapidly if the oil is sheared rapidly, and this decrease can be temporary or permanent. A temporary loss in viscosity develops when high shear rates (which frequently occurs in engines when one surface moves quickly past another) force the large viscosity index improver molecules to align themselves in the direction of flow. More seriously, a permanent loss of viscosity may occur if the shear rate is sufficient to physically break the large molecules into smaller units. This can happen in oil pumps and the like. Both of these scenarios reduce the oil's viscosity and therefore the load carrying ability. The vast majority of 20W-50 aviation multigrades on the market are mineral multigrades. Semi-Synthetic oils use a blend of mineral oil and a synthetic hydrocarbon oil. Due to the naturally high viscosity index of the synthetic oil - it's viscosity changes less with temperature when compared to mineral oils - there is no need to add a viscosity index improver. Another advantage of using a semi-synthetic oil is that the synthetic component of the oil has a higher thermal stability and therefore degrades at a slower rate than mineral oils. This leads to the oil both performing as an effective lubricant for longer and also producing less acidic compounds, the byproducts of oil degradation, which in turn reduces the risk of acid attack in the engine. AeroShell Oil W 15W-50 is virtually the only semi-synthetic aviation mutigrade on the market at present, and has given years of excellent performance throughout the world. The obvious question is, "Why not produce a fully synthetic oil if it so good?". The answer is simply that, unlike automotive engines, aviation engines run on 100LL (Avgas) which contains a much higher concentration of Lead than ordinary 4 star automotive fuel. The combustion of this fuel inevitably leads to Lead getting into the oil in the crankcase where it could form Lead deposits, and may lead to subsequent failure. However if the oil has a mineral oil content to it (either a fully mineral oil, or a semi-synthetic) then the Lead is dissolved by the oil, whereas a fully synthetic oil does not have the capacity to do this. One of the advantages of using AeroShell Oil W 15W-50 comes when the aircraft is not flown frequently as the oil contains both a corrosion inhibitor and an anti scuffing additive (LW16702) to help the occasional flyer. If the aircraft cannot be flown with the frequency required to keep the oil 'dry' (a minimum of 1/2 hour cruise every 2 weeks), the corrosion inhibitor will suppress the formation of any corrosion during periods of inactivity, which would otherwise form due to the action of acids and water. Furthermore, once the aircraft engine is started up after being inactive, the anti scuffing additive will have coated all the internal metallic surfaces with a molecular layer so that metal to metal contact is prevented if there is no oil present. This is particularly important during the first few seconds after start up as the oil pump will not pump oil to all the extremities of the engine immediately. Again not all oils contain these additives, but combined with the natural advantages of using a semi-synthetic oil, we believe that AeroShell Oil W 15W-50 represents the premium quality choice in the aviation piston engine oil market.
<urn:uuid:0e31e239-8f82-43e5-870d-3c7dee5178bd>
{ "date": "2017-09-25T09:42:58", "dump": "CC-MAIN-2017-39", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818690591.29/warc/CC-MAIN-20170925092813-20170925112813-00176.warc.gz", "int_score": 4, "language": "en", "language_score": 0.9581632614135742, "score": 3.578125, "token_count": 1568, "url": "http://www.shell.com/business-customers/aviation/aeroshell/knowledge-centre/technical-talk/techart07-30071235.html" }
TAMPA: A NASA spacecraft is hurtling toward a historic New Year’s Day flyby of the most distant planetary object ever studied, a frozen relic of the early solar system called Ultima Thule. Four billion miles (6.4 billion kilometers) away, the unmanned spaceship, New Horizons, is poised to zoom by at 12:33 am (0533 GMT) on January 1, at a distance of just 2,200 miles (3,500 kilometers) from Ultima Thule. That’s more than three times closer than New Horizons came to Pluto when it zipped by the dwarf planet in 2015. So what is this strange object, which is named after a mythical, far-northern island in medieval literature and has its own rock anthem performed by Queen guitarist Brian May? “This is truly the most primitive object ever encountered by a spacecraft,” said Hal Weaver, project scientist at the Johns Hopkins Applied Physics Laboratory. Relatively small, scientists aren’t sure about its exact size. But they believe it is about 100 times tinier than Pluto which measures almost 1,500 miles (2,414 kilometers) in diameter. Ultima Thule is also in a freezing area of space, suggesting it may remain well preserved. “Really, it is a relic from the formation of the solar system,” said Weaver. Ultima Thule (pronounced TOO-lee) lies in the Kuiper Belt, a vast cosmic disc left over from the days when planets first formed. Astronomers sometimes call it the “attic” of the solar system. Scientists didn’t even know the Kuiper Belt existed until the 1990s. The Kuiper Belt begins some three billion miles (4.8 billion kilometers) beyond the Sun, past the orbit of Neptune which is the furthest planet from the Sun. “It is teeming with literally billions of comets, millions of objects like Ultima which are called planetesimals, the building blocks out of which planets were formed, and a smattering — a handful of dwarf planets the size of continents, like Pluto,” said Alan Stern, principal investigator on New Horizons. “It is important to us in planetary science because this region of the solar system, being so far from the Sun, preserves the original conditions from four and a half billion years ago,” Stern added. “So when we fly by Ultima, we are going to be able to see the way things were back at the beginning.” The New Horizons spacecraft is speeding through space at 32,000 miles (51,500 kilometers) per hour, traveling almost a million miles per day. At that pace, if it strikes a piece of debris as small as a rice pellet, the spacecraft could be destroyed instantly. “We don’t want that to happen,” said Stern. If New Horizon survives this flyby, it will do so while furiously snapping hundreds of pictures of Ultima Thule, in the hopes of revealing its shape and geology for the first time. New Horizons sent back stunning images of Pluto — including a never before seen heart shape on its surface — in 2015. This time, “at closest approach we are going to try to image Ultima at three times the resolution we had for Pluto,” Stern said. But the flyby “requires extremely precise navigation. Much more precise than we have ever tried before. We might get it, and we might not,” Stern added. Ultima Thule was first discovered by the Hubble Space Telescope in 2014. Scientists figured out in 2017 that Ultima Thule is not spherical but possibly elongated in shape. It may even be two objects. It does not project the repeated, pulsing light scientists expect to see from a rotating cosmic object, raising puzzling questions. Could it be surrounded by cosmic dust? Enveloped by many tiny moons? Oriented in such a way that its pole is facing the approaching spacecraft? NASA hopes the flyby will reveal the answers. The first images are expected by the evening of January 1, with release planned for January 2. More, higher resolution shots should follow. Though no live images are possible at this distance, NASA plans to broadcast online during the flyby, featuring an animated video and music by Queen guitarist Brian May, who holds a degree in astrophysics and is releasing a musical tribute to accompany the event. “I was inspired by the idea that this is the furthest that the Hand of Man has ever reached,” May said. And Stern hopes this won’t be the end for New Horizons, which launched in 2006 and is powered by plutonium. “We hope to hunt down one more KPO (Kuiper Belt Object), making an even more distant flyby in the 2020s,” Stern said.
<urn:uuid:1b40a80b-cded-409c-9964-ffd9df0bd0a9>
{ "date": "2019-09-16T00:13:54", "dump": "CC-MAIN-2019-39", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514572439.21/warc/CC-MAIN-20190915235555-20190916021555-00016.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9478395581245422, "score": 3.375, "token_count": 1032, "url": "https://www.arabnews.com/node/1424941/science-technology" }
Screening for Hodgkin’s DiseaseEn Español (Spanish Version) The purpose of screening is early diagnosis and treatment. Screening tests are usually administered to people without current symptoms, but who may be at high risk for certain diseases or conditions. Physical exam—Routine physical exams by your healthcare provider may identify early signs of Hodgkin’s disease before symptoms appear. There are no national screening guidelines for Hodgkin’s disease. The Leukemia & Lymphoma Society website. Available at: http://www.leukemia-lymphoma.org/hm_lls . National Cancer Institute website. Available at: http://www.cancer.gov/ . Last reviewed May 2007 by Igor Puzanov, MD Please be aware that this information is provided to supplement the care provided by your physician. It is neither intended nor implied to be a substitute for professional medical advice. CALL YOUR HEALTHCARE PROVIDER IMMEDIATELY IF YOU THINK YOU MAY HAVE A MEDICAL EMERGENCY. Always seek the advice of your physician or other qualified health provider prior to starting any new treatment or with any questions you may have regarding a medical condition. Copyright © 2011 EBSCO Publishing All rights reserved.
<urn:uuid:15d227fe-a33d-48bc-a048-04871a992970>
{ "date": "2014-11-28T00:41:37", "dump": "CC-MAIN-2014-49", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931009295.92/warc/CC-MAIN-20141125155649-00172-ip-10-235-23-156.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.8613283634185791, "score": 2.9375, "token_count": 261, "url": "http://www.beliefnet.com/healthandhealing/getcontent.aspx?cid=%0D%0A%09%09%09%09%09%0919596" }
The impact of microclimatic variations on the developmental stages of common alpine plant species at four primary phenology sites at Dayara meadow of Garhwal Himalayas (Uttarakhand) was studied. The study revealed that the variations in the topographical features and environmental conditions directly influenced the phenology of the alpine plant species. Site I and IV showed great variation in the timing of phenological phases whereas, site III and IV showed approximately similar phenological timings. Anemone obtusiloba and Anaphalis contorta showed early flowering whereas Aconitum heterophyllum, Bupleurum longicaule and Parnassia nubicola flowered in late August and early September. P. nubicola had a shorter flowering period whereas Tanacetum longifolium.and A. nepalensis had the longest flowering period. Taraxacum officinale and Geum elatum flowered twice in the season. Alpine, Microclimatic variations, Phenology, Topographical features Billings, W.D. and Mooney, H.A. (1968). The ecology of arctic and alpine plants. Biological Reviews, 43: 481-529. Bliss, L.C. (1956). A comparision of plant development in microenvironments of arctic and alpine tundras. Ecological Monograph, 26: 303-307. Bock, J.H. (1976). The effects of increased snowpack on the phenology and seed germinability of selected alpine species. In Ecological Impacts of Snowpack Augmentation in the San Juan Mountains of Colorado. Steinhoff, H.W. and Ives, J.D. (eds). Final report to the Division of Atmospheric Water Resources Management, Bureau of Reclamation, Denver, Colorado, USA. Daubenmire, R.F. (1954). Alpine timberlines in the Americas and their interpretation. Butler University Botanical Studies, 11: 119-136. Daubenmire, R.F. (1959). A canopy cover method of vegetational analysis. Northwest Science, 33: 43-66. Fareed, M. and Caldwell, M.M. (1975). Phenological patterns of two alpine tundra plant populations on Niwot Ridge, Colorado. Northwest Science, 49: 17-23. Giménez-Benavides, L., Escudero, A. and Iriondo J.M. (2007). Reproductive limits of a late-flowering high-mountain Mediterranean plant along an elevational climate gradient. New Phytologist, 173: 367-382. Holway, J.G. and Ward R.T. (1963) Snow and melt water effects in an area of Colorado alpine. Am. Midland Naturalist, 69: 189-197. Holway, J.G. and Ward R.T. (1965). Phenology of alpine plants in Northern Colorado. Ecology, 46: 73-83. Huelber, K., Gottfried, M., Pauli, H., Reiter, K., Winkler, M., and Grabherr, G. (2006). Phenological responses of snowbed species to snow removal dates in the Central Alps: implications for climate warming. Arctic, Antarctic and Alpine Research, 38: 99-103. Hülber, K., Winkler, M. and Grabherr, G. (2010). Intraseasonal climate and habitat-specific variability controls the flowering phenology of high alpine plant species. Functional Ecology, 24: 245-252. Jackson, L.E. and Bliss, L.C. (1984). Phenology and water relations of three plant life forms in a dry tree-line meadow. Ecology, 65: 1302-1314. Kala, C.P. (1999). Phenology of alpine plants in the Valley of Flowers, National Park and Hemkund, Western Himalaya. Indian Forester, 125: 581-590. Keller, F. and Kçrner, C. (2003). The role of photoperiodism in alpine plant development. Arctic, Antarctic, and Alpine Research, 35:361-368. Kudo, G. (1991). Effects of snow-free period on the phenology of alpine plants inhabiting snow patches. Arctic, Antarctic and Alpine Research, 23: 436-443. Kudo, G. (1992). Pre-flowering and fruiting periods of alpine plants inhabiting a snow-bed. J. Phytogeogr. Taxon., 40: 99-106. Kudo, G. and Hirao, A.S. (2006). Habitat-specific responses in the flowering phenology and seed set of alpine plants to climate variation: implications for global-change impacts. Population Ecology, 48: 49-58. Kudo, G. and Suzuki, S. (1999). Flowering phenology of alpine plant communities along a gradient of snowmelt timing. Polar Bioscience, 12: 100-113. Kçrner, C. (1999). Alpine plant life: functional plant ecology of high mountain ecosystems (338 pp). Springer, Berlin. Lindsey, A. and Newman, J. (1956). Use of official weather data in spring time-Temperature analysis of an Indiana phenological record. Ecology, 37: 812-823. May, D.E. and Webber, P.J. (1982). Spatial and temporal variation of the vegetation and its productivity, Niwot Ridge Colorado. In Ecological Studies in the Colorado Alpine. (Ed. by J.C. Holfpenny). University of Colorado, Institute of Arctic and Alpine Research, 37: 35-62. Nautiyal, M.C., Nautiyal, B.P. and Prakash, V. (2001). Phenology and growth form distribution in an alpine pasture at Tungnath, Garhwal Himalaya. Mountain Research and Development, 21(2): 177-183. Negi, G.C.S., H.C. Rikhari and S.P. Singh. (1992). Phenological features in relation to growth forms and biomass accumulation in an alpine meadow of the Central Himalaya. Vegetatio, 101: 161-170. Oberbauer, S.F. and Billings W.D. (1981). Drought tolerance and water use by plants along an alpine topographic gradient. Oecologia, 50: 325-331. Owen, H.E. (1976). Phenological development of herbaceous plants in relation to snowmelt date. In Ecological impacts of snowpack augmentation in the San Juan Mountains of Colorado. H.W. Steonhoff and J.D. Ives (eds). U.S. Department of Interior, Division of Atmospheric Water Resources Management, Bureau of Reclamation, Denver, Colorado, U.S.A., pp. 323-341. Ram, J. and Arya, P. (1991). Plant forms and vegetation analysis of an alpine meadow of Central Himalaya, India. Proceedings of the National Science Academy, 57: 311-318. Ram, J., Singh, S.P. and Singh, J.S. (1988). Community level phenology of grassland above treeline in Central Himalaya. Arctic and Alpine Research, 20: 325-332. Shaver, G.R., Fetcher, N. and Chapin, F.S. III. (1986). Growth and flowering in Eriphorum vaginatum: annual and latitudinal variation. Ecology, 67: 1524-1535. Sorenson, T. (1941). Temperature relations and phenology of the Northeast Greenland flowering plants. Meddelelser om Grønland, 125: 1- 305. Spomer, G.G. and Salisbury, F.B. (1968). Eco-physiology of Geum turbinatum and implications concerning alpine environments. Botanical Gazette, 129: 33-49. Stinson., K.A. (2004). Effects of snowmelt timing and neighbor density on the distribution of the high altitude plant Potentilla diversifolia. Arctic, Antarctic and Alpine Research, 37(3): 379-386. Sundriyal, R.C., Joshi, A P. and Dhasmana, R. (1987). Phenology of high altitude plants at Tungnath in the Garhwal Himalaya. Tropical Ecology, 28: 289-299. Thórhallsdóttir, T.E. (1998). Flowering phenology in the central highland of Iceland and implications for climatic warming in the Arctic. Oecologia, 114: 43-49. Vashistha, R.K., Rawat, N., Chaturvedi, A.K., Nautiyal, B.P., Prasad, P. and Nautiyal, M.C. (2009). An exploration on the phenology of different growth forms of an alpine expanse of North- West Himalaya, India. New York Journal, 2(6): 1554-0200. Walker, M.D., Ingersoll, R.C. and Webber, P.J. (1995). Effects of Interannual climate variation on phenology and growth of two alpine forbs. Ecology, 76(4): 1067-1083. Wielgolaski, F.E. (1975). Primary Productivity of alpine meadow communities. Fennoscandian Tundra Ecosystems. Part I: Plants and Microorganisms, edited by F. E. Wielgolaski (pp121-128), Springer-Verlag, New York. This work is licensed under Attribution-NonCommercial 4.0 International (CC BY-NC 4.0) © Author (s)
<urn:uuid:53cfba4e-035b-4e41-90c9-e347f8942854>
{ "date": "2019-11-17T10:53:38", "dump": "CC-MAIN-2019-47", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496668910.63/warc/CC-MAIN-20191117091944-20191117115944-00296.warc.gz", "int_score": 3, "language": "en", "language_score": 0.7600082159042358, "score": 2.75, "token_count": 2146, "url": "http://journals.ansfoundation.org/index.php/jans/article/view/280" }
Where does your food waste go once you chuck it out? You may be surprised to hear not all of it goes to landfill and a Devon company is pioneering new ways of making the most of what we throw away. Andigestion in Holsworthy takes the food waste you throw away and turns it into electricity and fertiliser for the area’s farmers. Devon Live reporter Joe Bulmer visited the Andigestion’s Holsworthy plant this week to find out more. He was shown around by transport coordinator Gareth Williams. “Waste takes so long to break down in landfill, we now are at a stage where everything that comes out of the ground goes back in and in the process we’re making electricity,” said Gareth. “What we do here is not mainstream, before I came here I didn’t know anything about Andigestion but I think it’s fair to say the general public is becoming more aware of the need to recycle. “I think people assume their waste goes straight to landfill but actually it’s becoming more common for it to come here.” He added: “We’ll take anything apart from big bones, shells and plastic. If it has energy, or calorific detail as we call it, contained within it, even if it has gone off, we can use it.” The first step in the process is getting “feedstock” to the plant in Holsworthy. This comes in a variety of forms and can include anything from pasties to fish heads. Ginsters, Ambrosia, Country Style Foods and Teignbridge and Torbay Councils are all Andigestion customers. The site in Holsworthy can treat up 124,000 tonnes of food waste at any given time, enough to fill 60 Olympic sized swimming pools. Andigestion Holsworthy serves the whole of Devon and Cornwall with a fleet of lorries ferrying food waste and empty bins back and forth to customers. With the “fuel” at the plant it can now be processed into useful products such as gas, electricity and liquid fertiliser. The waste is dealt with in a number of different ways. Packaged waste is fed into a machine which separates the packaging from the food, it also reduces the food waste down to 8-12mm sizes to make sure it can be fully heated in the next stage of the process. Packaging is then recycled where possible and the food waste is mixed together in a tank providing fuel for the Anaerobic Digestion process. The food waste soup is then heated to 70C for one hour to kill off bugs like E-Coli and Salmonella. Heating the waste is also important to make sure it is at the right temperature for the bio-gas producing digesters. This pasteurisation allows Andigestion to accept animal by-products such as fish and abattoir waste. The waste is then mixed together in another tank and turned into a liquid, this “helps to blend the varieties of food waste into a more homogenous material”. After it has been pasteurised the food waste is pumped into digester tanks which contain cultures of anaerobic bacteria. The bacteria, over the course of 50 to 100 days, digests the waste producing a gas which is 60% methane and 40% carbon dioxide. Of the material fed into the digester 13% is transformed into gas, the rest is pumped onto the next stage of the process, producing a nutrient rich liquid fertiliser called digestate. In contrast to wind turbines the gas produced in the digestion process can be stored and then fed back into the national grid as electricity at peak times. The Holsworthy plant produces enough Biogas each year to supply 10,000 homes with gas or 12,500 homes with electricity. One ton of food waste produces 900kgs of fertiliser and 396kWh of electricity and just one kilogram is enough to charge a mobile phone for up to 79 hours.
<urn:uuid:bec0590f-6371-4f66-93c7-8a8fa4d600ad>
{ "date": "2020-01-22T14:00:17", "dump": "CC-MAIN-2020-05", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250607118.51/warc/CC-MAIN-20200122131612-20200122160612-00536.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9382561445236206, "score": 2.6875, "token_count": 853, "url": "https://www.devonlive.com/news/devon-news/what-happens-your-food-waste-334768" }
Physicists have sought to detect ripples in spacetime called gravitational waves ever since they realized Albert Einstein’s general theory of relativity predicted their existence. But only some of the most massive astrophysical events, such mergers of black holes and neutron stars, can produce gravitational waves strong enough to be detected on earth. Since the 1990s, two laser-based facilities in Washington and Louisiana, collectively known as LIGO, have tried to observe waves from such events. They finally detected the first gravitational wave in the fall of 2015, as announced on 11 February 2016. The discovery, which opened up a potential new branch of astronomy, was named Science's Breakthrough of the Year for 2016. Recent LIGO upgrades, including more sensitive instruments and incorporation of detectors around the world, should bring the detection of many more waves and open up a whole new way of viewing cataclysmic events in the universe.
<urn:uuid:93a224c7-8853-403a-990d-e3630fa80ecd>
{ "date": "2018-05-22T11:44:51", "dump": "CC-MAIN-2018-22", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794864725.4/warc/CC-MAIN-20180522112148-20180522132148-00416.warc.gz", "int_score": 4, "language": "en", "language_score": 0.9592897295951843, "score": 3.59375, "token_count": 184, "url": "http://www.sciencemag.org/topic/gravitational-waves" }
Ukraine. Bosnia. Venezuela. Tear gas. Masks. Water cannons. Ours is an age of riots and rebellions, of radical self-creation in the heady streets: Spain’s indignados, the Occupy movement, Mexico’s Yo Soy 132, and of course the Arab Spring. We are understandably excited when we see people in the streets, and our pulse may even rise at the sight of masks, broken glass and flames, because for so long such images have represented the shards of the old world through which we can catch the perceptible glint of the new. Recent protests in Venezuela against the government of Chávez successor Nicolás Maduro might therefore seem to be simply the latest act in an upsurge of world-historic proportions. Not so fast. Despite hashtags like #SOSVenezuela and #PrayForVenezuela and retweets from @Cher and @Madonna, these protests have far more to do with returning economic and political elites to power than with their downfall. Venezuela’s “Bolivarian Revolution” leapt forth from the historical collision of radical social movements against a repressive, neoliberal state. Fifteen years ago, Hugo Chávez was elected president of Venezuela amid the collapsing rubble of the old two-party system, but the “revolution” over which he would preside has far deeper roots. For decades, armed guerrillas, peasants and workers, women, Afro- and indigenous Venezuelans, students and the urban poor struggled against a system that—while formally democratic—was far from it in practice. These revolutionary grassroots movements, which I document in We Created Chávez, blew a hole in what Walter Benjamin would call the continuum of history in a massive anti-neoliberal riot that began on February 27, 1989. This event—twenty-five years ago this week—was henceforth known as the Caracazo, and irreversibly divided Venezuelan history into a before and an after. Its importance is not limited to the resistance to imperialism that it embodied, however, but also the slaughter that marked its conclusion. Numbers often fail us in their false equivalence, but there is much that they can make clear: some 3,000 were killed in 1989, many deposited unceremoniously in unmarked mass graves. But the movements struggled forth, building popular assemblies in the barrios and making increasingly militant demands against a flailing state, which responded with targeted killings and the occasional massacre. The mayor of greater Caracas, Antonio Ledezma, who today positions himself as an opponent of repression, himself presided over the murder of dozens of students in the streets in the early 1990s, not to mention a notorious 1992 prison massacre at the Retén de Catia.
<urn:uuid:ca22c8e5-23b7-4a4b-910f-7759d250f98b>
{ "date": "2017-02-20T09:17:13", "dump": "CC-MAIN-2017-09", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170434.7/warc/CC-MAIN-20170219104610-00188-ip-10-171-10-108.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.9507687091827393, "score": 2.59375, "token_count": 574, "url": "https://www.thenation.com/article/lasalida-venezuela-crossroads/" }
During the final stages of World War II in 1945, the United States conducted two atomic bombings against the cities of Hiroshima and Nagasaki in Japan, the first on August 6, 1945 and the second on August 9, 1945. For six months, the United States had made use of intense strategic fire-bombing of 67 Japanese cities. Together with the United Kingdom, and the Republic of China the United States called for a surrender of Japan in the Potsdam Declaration. The Japanese government ignored this ultimatum. By executive order of President Harry S. Truman, the U.S. dropped the nuclear weapon “Little Boy” on the city of Hiroshima on Monday, August 6, 1945, followed by the detonation of “Fat Man” over Nagasaki on August 9. These two events are the only active deployments of nuclear weapons in war.The target of Hiroshima was a city of considerable military importance, containing Japan’s Second Army Headquarters, as well as being a communications center and storage depot. Within the first two to four months of the bombings, the acute effects killed 90,000–166,000 people in Hiroshima and 60,000–80,000 in Nagasaki, with roughly half of the deaths in each city occurring on the first day. The Hiroshima prefectural health department estimates that, of the people who died on the day of the explosion, 60% died from flash or flame burns, 30% from falling debris and 10% from other causes. During the following months, large numbers died from the effect of burns, radiation sickness, and other injuries, compounded by illness. In a US estimate of the total immediate and short term cause of death, 15–20% died from radiation sickness, 20–30% from flash burns, and 50–60% from other injuries, compounded by illness. In both cities, most of the dead were civilians. Six days after the detonation over Nagasaki, on August 15, Japan announced its surrender to the Allied Powers, signing the Instrument of Surrender on September 2, officially ending the Pacific War and therefore World War II. Germany had signed its Instrument of Surrender on May 7, ending the war in Europe. The bombings led, in part, to post-war Japan’s adopting Three Non-Nuclear Principles, forbidding the nation from nuclear armament. The role of the bombings in Japan’s surrender and the U.S.’s ethical justification for them, as well as their strategical importance, is still debated.
<urn:uuid:bc5e9d61-3b14-4a0c-a396-7bb0426c60fe>
{ "date": "2013-05-18T18:05:49", "dump": "CC-MAIN-2013-20", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00000-ip-10-60-113-184.ec2.internal.warc.gz", "int_score": 4, "language": "en", "language_score": 0.9628357291221619, "score": 3.796875, "token_count": 516, "url": "http://documentaryheaven.com/days-that-shook-the-world-hiroshima/" }
January 18 is National Winnie the Pooh Day! National Winnie the Pooh Day celebrates the birth of A.A. Milne, author of children’s storybooks and Winnie the Pooh creator. You might recall some of Winnie the Pooh’s friends: Christopher Robin, Tigger, Piglet, and Eeyore. Celebrate National Winnie the Pooh Day by reading one of A.A. Milne’s books to yourself or with a child. Take a lesson from some of Pooh’s philosophies and cherish your friendships and relationships as he would have. “If you live to be a hundred, I want to live to be a hundred minus one day so I never have to live without you.” ― A.A. Milne, Winnie-the-Pooh Check out our Winnie the Pooh Baby’s 1st Year Undated Wall Calendar, perfect for documenting all those great moments as a new parent.
<urn:uuid:8a54bf38-8638-440f-89bf-15feabdb1b4d>
{ "date": "2014-12-18T03:59:44", "dump": "CC-MAIN-2014-52", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802765610.7/warc/CC-MAIN-20141217075245-00155-ip-10-231-17-201.ec2.internal.warc.gz", "int_score": 3, "language": "en", "language_score": 0.8989077210426331, "score": 2.765625, "token_count": 211, "url": "http://blog.calendars.com/tag/piglet/" }