text
stringlengths 198
630k
| id
stringlengths 47
47
| metadata
dict |
---|---|---|
Wood is a common material used in a variety of products and structures. There are many types of cases that involve defects in wooden materials, environmental issues, and pest infestations, among other possible issues. Wood experts are used in a variety of cases, such as woodworking and manufacturing, as well as trees failure, agriculture, and irrigation.
Woodworking plants may be subject to an unforeseen accident involving machinery and/or employee safety. Wood science related to combustion and flammability is a major factor in preventing accidents from occurring in such settings, as wood is a highly flammable material. Other safety concerns must be addressed by adhering to codes and compliance regarding the material and industrial nature of the field, including construction safety.
Wood experts have knowledge of wood in an environmental context, as wood is extracted from forested areas. A lawsuit may focus on the environmental repercussions of deforestation and how the process is affecting the surrounding environment. Acquiring wood for manufacturing purposes should also be conducted under strict safety-related guidelines, as well as in a way that does not damage the material for manufacturing purposes.
Because wood is often used in building material for houses and apartment complexes, the material is susceptible to infestations from termites and other types of pests. Knowledge of how such insects may affect the wood in relation to building safety can be a very important aspect of a pest-related case.
ForensisGroup has spent over twenty years recruiting top-notch experts. Call us today or submit an expert request form to retain a qualified and experienced wood product expert witness for your case. | <urn:uuid:8b4f5474-e46e-455b-a3de-afa6b86d318a> | {
"date": "2019-07-18T02:34:26",
"dump": "CC-MAIN-2019-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195525483.64/warc/CC-MAIN-20190718022001-20190718044001-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9610247611999512,
"score": 2.640625,
"token_count": 321,
"url": "https://www.forensisgroup.com/expert-witness/wood/"
} |
A scientist’s discovery that dolphins have a genetic ability to turn diabetes on and off, depending on the availability of food, could lead to research into whether humans might have a similar-although dormant-gene.
Dr. Stephanie Venn-Watson, a veterinary epidemiologist and director of clinical research at the National Marine Mammal Foundation in San Diego, recently told the American Association for the Advancement of Science that dolphins can induce type 2 diabetes when food is scarce, then immediately turn it off when food becomes abundant.
Venn-Watson made the discovery after analyzing blood samples from dolphins that she was studying off the coast of San Diego. She theorizes that dolphins acquired the ability to control diabetes when they evolved from land animals into sea animals about 55 million years ago. Because their fish-only diet provided no carbohydrates and their large brains demanded constant nourishment, dolphins developed the ability to induce a condition of high blood sugar during lean times, then switch it off once they found food.
Venn-Watson said that some evidence suggests that humans had a similar ability during the last ice age because their diets were almost entirely protein-based. Because humans depended on the luck of the hunt, like dolphins they had to find a way to keep their large brains sufficiently nourished in between animal kills. If so, that “fasting gene” probably still exists in humans, although in a dormant form.
Studying this gene could provide a much deeper understanding of how to control the disease or thwart its onset. Eventually, scientists could begin experimenting with chemical “switches” that could turn the dormant gene on. In several current lab animal studies involving the genetic origins of diabetes, scientists have succeeded in controlling certain genes through the use of chemical messengers that instruct them to turn on or off.
One problem that researchers might face is resistance from animal rights organizations concerned that further study of the dolphin gene could involve taking dolphins into captivity. However, Venn-Watson said that when she took blood samples from dolphins, they “volunteered” her access to them by approaching her on the beach and presenting their tails. | <urn:uuid:113dfa6a-f3f4-4fb9-ac71-b4385f442c72> | {
"date": "2017-09-22T20:42:29",
"dump": "CC-MAIN-2017-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689192.26/warc/CC-MAIN-20170922202048-20170922222048-00656.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9667317271232605,
"score": 3.859375,
"token_count": 436,
"url": "https://www.diabeteshealth.com/dolphins-ability-to-switch-diabetes-on-and-off-could-point-to-a-similar-knack-in-humans-/?isComment=1"
} |
- Word Parts
|part of speech:
||not usual or ordinary; not common; remarkable.
She had never seen such an unusual bird before.It is unusual for workers in the U.S. to take an afternoon nap.
- exceptional, remarkable, strange, uncommon
- common, commonplace, everyday, normal, typical, usual
- similar words:
- abnormal, curious, extraordinary, freak, individual, notable, novel, odd, particular, queer, rare, scarce, singular, unfamiliar
||distinctive, eccentric, extreme, fantastic, foreign, fresh, new, peculiar, special, trick, weird
||unusually (adv.), unusualness (n.) | <urn:uuid:f1698bb0-abd8-4541-90ff-ea0317130803> | {
"date": "2017-02-25T21:15:23",
"dump": "CC-MAIN-2017-09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171834.68/warc/CC-MAIN-20170219104611-00372-ip-10-171-10-108.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.7552071213722229,
"score": 2.9375,
"token_count": 142,
"url": "http://www.wordsmyth.net/?level=2&rid=45145"
} |
Matsumoto-jo: A Virtual 16th-Century Japanese Castle
Theme: Future History
|Museum exhibitions on historical subjects involve presentation of a wide range of source material ranging from material artifacts to architecture, oral histories, and performance art. Matsumoto-jo is a model for a new kind of history exhibit that integrates an unprecedented range of source material in an immersive and interactive format.|
The use of 3D to present educational and cultural heritage projects has the potential for evolving into a new medium for documentary programming. This new medium enhances and enriches presentation of content and is well suited for the next generation of hybrid web and television content.
Matsumoto-jo seeks to demonstrate that videogame media can be applied to enhance educational and cultural-heritage projects.
While Matsumoto-jo is not the first history-focused project to utilize interactive 3D media, it emphasizes aesthetics and technical and scholarly rigor to an unprecedented degree.
Matsumoto-jo is a model for future projects involving educational and cultural content. These future projects may include a series of similar presentations on subjects such as Chichén Itzá and the Maya, the Colosseum in Rome, Masada, Dun Aengus, and Alhambra. | <urn:uuid:c830db5c-00a9-4f44-a907-fb2de5b11d56> | {
"date": "2016-08-30T14:58:21",
"dump": "CC-MAIN-2016-36",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982984973.91/warc/CC-MAIN-20160823200944-00236-ip-10-153-172-175.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8779057860374451,
"score": 3.40625,
"token_count": 262,
"url": "http://www.siggraph.org//s2008/attendees/newtech/24.php"
} |
Posttraumatic Stress Disorder
What is Posttraumatic Stress Disorder (PTSD)?
Though it may seem like a relatively simple concept, trauma—a powerful experience that may have long-lasting effects—has not always been defined the same. Scientists continue to study experiences of trauma in hopes of finding better treatments. One particular type of trauma is known as posttraumatic stress disorder (PTSD).
PTSD can affect many different people, from survivors of rape and survivors of natural disasters to military service men and women. Roughly 10 percent of women and 5 percent of men are diagnosed with PTSD in their lifetimes, and many others will experience some adverse effects from trauma at some point in their lives. According to the National institute of Mental Health (NIMH), about 1 in 30 adults in the U.S. suffer from PTSD in a given year—and that risk is much higher in veterans of war.
Not all “traumatic” events meet the clinical standards for trauma. The loss of a loved one or the limitations resulting from an illness may cause trauma but the shock of such events is not in itself abnormal. PTSD includes both an event that threatens injury to self or others and a response to those events that involves persistent fear, helplessness or horror.
Recent scientific understanding shows that experiencing traumatic events can change the way our brains function. Especially with severe or repeated exposure, the brain can be affected in such a way that makes a person feel like the event is happening again and again. Repeated experience of the traumatic event can prevent healing and keep a person stuck in a pattern that may induce anxiety, sleeplessness, anger or an increased possibility of substance abuse.
What are the symptoms of PTSD?
Although the symptoms for individuals with PTSD can vary considerably, they generally fall into three categories:
- Re-experience - Individuals with PTSD often experience recurrent and intrusive recollections of and/or nightmares about the stressful event. Some may experience flashbacks, hallucinations, or other vivid feelings of the event happening again. Others experience great psychological or physiological distress when certain things (objects, situations, etc.) remind them of the event.
Avoidance - Many with PTSD will persistently avoid things that remind them of the traumatic event. This can result in avoiding everything from thoughts, feelings, or conversations associated with the incident to activities, places, or people that cause them to recall the event. In others there may be a general lack of responsiveness signaled by an inability to recall aspects of the trauma, a decreased interest in formerly important activities, a feeling of detachment from others, a limited range of emotion, and/or feelings of hopelessness about the future.
Increased arousal - Symptoms in this area may include difficulty falling or staying asleep, irritability or outbursts of anger, difficulty concentrating, becoming very alert or watchful, and/or jumpiness or being easily startled.
It is important to note that those with PTSD often use alcohol or other drugs in an attempt to self-medicate. Individuals with this disorder may also be at an increased risk for suicide.
How is PTSD treated?
There are a variety of treatments for PTSD, and individuals respond to treatments differently. PTSD often can be treated effectively with psychotherapy or medication or both.
Behavior therapy focuses on learning relaxation and coping techniques. This therapy often increases the patient's exposure to a feared situation as a way of making him or her gradually less sensitive to it.
Cognitive therapy is therapy that helps people with PTSD take a close look at their thought patterns and learn to do less negative and nonproductive thinking. Group therapy helps for many people with PTSD by having them get to know others who have had similar situations and learning that their fears and feelings are not uncommon.
Medication is often used along with psychotherapy. Antidepressant and anti-anxiety medications may help lessen symptoms of PTSD such as sleep problems (insomnia or nightmares), depression, and edginess.
Read about Treatments and Supports for Mental Illness | <urn:uuid:e0b3b32e-0b1d-4e23-b787-d6bce8c3e95c> | {
"date": "2015-07-02T16:58:31",
"dump": "CC-MAIN-2015-27",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375095632.21/warc/CC-MAIN-20150627031815-00136-ip-10-179-60-89.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9543236494064331,
"score": 4.09375,
"token_count": 813,
"url": "http://www2.nami.org/Template.cfm?Section=By_Illness&Template=/TaggedPage/TaggedPageDisplay.cfm&TPLID=54&ContentID=23045"
} |
For too long we have believed the myth that we simply need to find the right friend. But the truth is we need is to learn how to foster the right friendship.
In other words, our biggest problem isn't that we don’t know enough people, but rather that most of us don’t actually know how to make a friendship happen with the people we’re meeting.
And who can blame us for not knowing how to develop healthy friendships? Most of us were never taught!
In fact, most of us don’t even know the definition of friendship, let alone understand how the three requirements of all healthy friendships can teach us how to start, develop, repair, and even end, any friendship. Unfortunately our education didn’t teach us such things as how to express empathy without taking on the feelings of others, what healthy expectations in a friendship should be, how to practice appropriate vulnerability, or how to express what we need in our relationships. That knowledge doesn’t come automatically!
As part of The Friendship University, you can purchase any class you want and start practicing better friendships today.
What Each Class Includes:
- 1-hr audio class (mp3) taught to inspire, provide research, and focus on personal application of actions for personal and relational growth
- Customized worksheet designed to increase learning retention and encourage personal reflection and evaluation
- Choose Your Courageous Practice to inspire you to commit to one goal or action that you will practice in your friendships based on each subject
- Sharing Questions written to serve as conversation starters with your friends so you can keep exploring the subject while bonding with those in your life
- and, 4 Inspiring memes that you can post or print as reminders of your learnings or as inspiration to share on social media | <urn:uuid:351fa692-00cb-4b9b-9266-c2f883f462e2> | {
"date": "2019-02-15T19:31:36",
"dump": "CC-MAIN-2019-09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247479101.30/warc/CC-MAIN-20190215183319-20190215205319-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9460164904594421,
"score": 2.53125,
"token_count": 367,
"url": "https://www.thefriendshipuniversity.com/pages/about"
} |
For many of us, the darker days of winter affect our energy levels and may leave us feeling lethargic or sad.
If this sounds like you, it's important to know this is common and you are not alone: It's not just in your head.
Fewer hours of daylight and decreased sun exposure directly relate to feeling sluggish and lacking energy. This typically leads to a decreased interest in exercise, which in turn leads to decreased energy and enthusiasm. It's a vicious cycle of inactivity and lack of interest.
One of the best methods for staying energetic and optimistic at this time of year is exercise.
A growing body of research over the past 10 years has looked at how physical activity and exercise improve psychological well-being. People who exercise on a regular basis can experience the benefits of feeling stronger, not only physically, but mentally as well.
Overall, research shows people with higher levels of fitness are capable of managing stress more effectively than those who are less fit.
It appears that cardiovascular exercise at a moderate to high intensity has the most benefits in stress reduction. The recommendation is a minimum of three 20-minute sessions per week for 12 weeks.
Other kinds of activities - such as yoga, tai chi and meditation - also result in a decrease in blood pressure, heart rate and anxiety. These practices assist in lowering the body's stress response and stimulating the calming hormones, leaving you feeling rested and relaxed. Calming the mind and body also decreases the biochemical reaction that occurs when we're stressed, which can negatively affect memory and mood.
Numerous studies have looked at the best activity recommendation for reducing anxiety. However, the jury is still out as to the optimum amount, intensity and types of exercise. All activities seem to have a positive effect on anxiety. The research indicates that consistency in an exercise program for a period of 10 to 15 weeks offers the greatest beneficial effect.
One of the most commonly accepted psychological benefits of exercise is in the treatment of depression. Patients with depression have credited exercise as an important element in comprehensive treatment programs. Cardiovascular and resistance exercise can be as effective as antidepressant medication in some cases, and as little as one exercise session can help.
Getting outdoors during daylight hours is vital, especially during the winter. Sunlight is especially important if you suffer from seasonal affective disorder (SAD), which leaves you feeling sapped of energy and low in enthusiasm. Even though you may feel tired, remember that as little as 15 minutes of walking in the sunlight can change your mood, increase your energy and keep you healthy.
The best advice is to push yourself to move and you will feel the benefits.
It appears that all activity has a positive effect on mood, tension, fatigue, anger and stress. Even a single exercise bout will leave you feeling better, both mentally and physically. It's not just in your head. | <urn:uuid:248f9fe5-6ef2-4fdc-9fc1-8215735d3628> | {
"date": "2018-01-21T03:12:15",
"dump": "CC-MAIN-2018-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084889917.49/warc/CC-MAIN-20180121021136-20180121041136-00656.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9642834067344666,
"score": 2.953125,
"token_count": 580,
"url": "http://www.vancouversun.com/health/Exercise+works+beat+blahs/6056475/story.html"
} |
If you head south down Ann Arbor-Saline Road, past Interstate 94 and the strip malls, you soon find yourself in a rural area, with large green spaces and farms that line the road. What you might not realize is that one of these farms could soon be changing the way we think about food and agriculture.
, a project of the
- a non-profit center focused on the teachings of the
- has recently started the process of launching a full-scale permaculture installation on its 55-acre farm. Originally developed as an organic apple orchard three years ago, the organization hired Ann Arbor permaculture expert Nathan Ayers to manage the farm and broaden its scope.
Permaculture is an agricultural philosophy that employs methods that work with, rather than against, nature. It is often referred to as a closed-loop system, where one plant's waste becomes another plant's fuel. The landscape is molded with swales and mounds to better utilize and retain water from rainfall. Ayers, who refers to himself as a "soil geek," speaks passionately about permaculture and his plans for the farm. "We're running out of topsoil in this country," said Ayers. "By the U.S.D.A.'s numbers, we're losing two billion tons of topsoil every year, which is totally unsustainable. Couple that with a situation where a city like Toledo with over 500,000 people can't drink the water because of algae blooms caused by run-off, that's a huge wake-up call. And that was totally and unequivocally related to farming practices." Ayers explained that in order to be able to continue to feed the earth's population, a change in approach to farming will have to be implemented. "A big part of permaculture is about transitioning away from annual monoculture, which is what we see in many U.S. farms - typically corn, soy or wheat year after year - to what we would call a perennial polyculture," explained Ayers. "We want to mimic a forest. Sometimes that's called an edible food forest, sometimes it's called an edible forest garden. That's really sort of the mainstay of permaculture. It's a different design system for embracing natural systems." A 2013
echoes Ayers' concerns about our current predominent farming methods. Citing climate change-driven issues with drought, soil depletion and "a burgeoning environmental crisis of agriculture," the commission calls for "a fundamental transformation of agriculture." "This implies a rapid and significant shift from conventional, monoculture-based and high-external-input-dependent industrial production towards mosaics of sustainable, regenerative production systems that also considerably improve the productivity of small-scale farmers," according to the U.N. report. Still in his first year at Amrita Farms, Ayers has begun his work terraforming the land. Hardy, native plants like radishes, potatoes, onions and kale grow on earth mounded around a pond - called a
The mounds add a verticality to the growing area, effectively tripling the amount of food that can be grown in a given footprint. Comfrey and nettles provide groundcover, adding nutrients to the soil and preventing soil erosion. Hazelnut trees have been added to the existing apple orchard. Though Amrita has begun supplying some food to Ann Arbor restaurant Back2Roots, and has plans to start producing apple and kale chips, food production is almost more of a means than an end for this farm. What Ayers is building here is a template that he hopes will be applicable on farms across the country and the world. "
and education is really the future for this farm," said Ayers. "We're on 55 acres. A lot of food can be grown here. A massive amount of food. But what we have is a template that can be expanded across thousands of acres. It's about designing these ecologically-based design templates that are replicable." Ayers said that permaculturists are, by nature, working in research in development. "We're still working to figure out what works, what's going to allow us to provide for our families, what's going to allow us to get off fossil fuels, and what's going to allow us to produce more than we consume. I see this is a living, learning laboratory, where students can come and participate in the work that's going on here, but also take away hands-on skills to replicate what's happening." Allen R. Pyle, who heads the
says that there are not yet a lot of well-established, long-term permaculture farm examples in the region, but he's seeing "a huge amount of interest" for backyard and small community-scale permaculture and small-scale permaculture farm development. "I have found that sharing some basic permaculture practices and principles at this level can really get people excited about permaculture and recognize its potential," said Pyle. "Even something as simple as using plants weeded from the garden as mulch, or growing herbs vegetables very close to the house so they are easy to harvest for use in cooking makes people's eyes light up."
is the other half of the Amrita equation. A former Ann Arbor Public Schools employee himself, Ayers is working closely with the schools on a K-12 STEAM-focused, project-based program called The Future Farm. Students visit the farm to learn about sustainability, nutrition, mindfulness and agri-science. Adult education opportunities are offered, too, with classes on beekeeping, composting, earth building and permaculture. "If we change our food systems in America, it will address so many other issues," said Ayers. "It will address energy issues, it will address pollution issues, and it will potentially address transportation issues. About one-third of all the oil in the U.S. is used for food production, so when we start switching to perennial, poly-culture system, we're using way less fossil fuels and way less water." Ayers said that permaculture would encourage people to eat locally and more seasonally. If that makes you worry that we would have to shift away from what we consider traditional food sources, Ayers said that shouldn't be a problem. "There are permaculture solutions for everything, including cattle," said Ayers. "There are ways to do it all with way fewer resources and way less impact on the land." Interested in checking out the farm? Amrita is hosting a
at the farm (4201 Ann Arbor Saline Rd.) on Thursday at 5 p.m. Attendees are encouraged to bring their own "superfoods, fruits and recipes to mix and match" with kale harvested on the farm. | <urn:uuid:7b7fca82-7ca6-4b16-b7b2-a5e9c191cfe1> | {
"date": "2019-03-22T15:31:55",
"dump": "CC-MAIN-2019-13",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202671.79/warc/CC-MAIN-20190322135230-20190322161230-00296.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9663193225860596,
"score": 3.28125,
"token_count": 1399,
"url": "https://www.mlive.com/news/ann-arbor/2015/10/amrita_farms_a_living_learning.html"
} |
The official motto of Jamaica is, "out of many, one people." This motto can be seen on Jamaica's official coat-of-arms and is based on the multiracial history and roots of its people.
The Jamaican coat-of-arms not only features its official motto, but it also has several other important elements that relate to the history of the country. On either side of a red cross that features five pineapples are male and female Tainos, who were the native tribe of the island.
On top of the cross is a Jamaican crocodile standing on the Royal Helmet of the British Monarchy, which symbolizes Jamaica's history as a British colony. | <urn:uuid:cd912abf-91ef-4676-8ef1-be17044f304e> | {
"date": "2019-03-22T14:44:23",
"dump": "CC-MAIN-2019-13",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202671.79/warc/CC-MAIN-20190322135230-20190322161230-00296.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9718300700187683,
"score": 3.03125,
"token_count": 141,
"url": "https://www.reference.com/geography/jamaica-s-motto-bbe78493f99e6b21"
} |
National Institute of Environmental Health Sciences
PEER Curriculum | PEER Home
Measuring Water Quality
This module will focus on five different measurable properties of water. Determining the quality of water involves more than observing its color and sensing its odor. The properties or characteristics of water in a river or lake can be affected by man, weather, time, and animals or plants within the water.
lesson within this module has six sections: | <urn:uuid:eaa5d7de-2d3b-4fea-80c0-7d30b6db1403> | {
"date": "2017-01-24T19:14:50",
"dump": "CC-MAIN-2017-04",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285244.23/warc/CC-MAIN-20170116095125-00568-ip-10-171-10-70.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9206227660179138,
"score": 3.6875,
"token_count": 91,
"url": "http://peer.tamu.edu/curriculum_modules/Water_Quality/index.html"
} |
Display *XOpenDisplay(display_name) char *display_name;
|display_name||Specifies the hardware display name, which determines the display and communications domain to be used. On a POSIX-conformant system, if the display_name is NULL, it defaults to the value of the DISPLAY environment variable.|
|hostname||Specifies the name of the host machine on which the display is physically attached. You follow the hostname with either a single colon (:) or a double colon (::).|
|number||Specifies the number of the display server on that host machine. You may optionally follow this display number with a period (.). A single CPU can have more than one display. Multiple displays are usually numbered starting with zero.|
|screen_number||Specifies the screen to be used on that server. Multiple screens can be controlled by a single X server. The screen_number sets an internal variable that can be accessed by using the DefaultScreen() macro or the XDefaultScreen() function if you are using languages other than C (see "Display Macros").|
For example, the following would specify screen 1 of display 0 on the machine named ``dual-headed'':
The XOpenDisplay() function returns a Display structure that serves as the connection to the X server and that contains all the information about that X server. XOpenDisplay() connects your application to the X server through TCP or DECnet communications protocols, or through some local inter-process communication protocol. If the hostname is a host machine name and a single colon (:) separates the hostname and display number, XOpenDisplay() connects using TCP streams. If the hostname is not specified, Xlib uses whatever it believes is the fastest transport. If the hostname is a host machine name and a double colon (::) separates the hostname and display number, XOpenDisplay() connects using DECnet. A single X server can support any or all of these transport mechanisms simultaneously. A particular Xlib implementation can support many more of these transport mechanisms.
If successful, XOpenDisplay() returns a pointer to a Display structure, which is defined in X11/Xlib.h. If XOpenDisplay() does not succeed, it returns NULL. After a successful call to XOpenDisplay() all of the screens in the display can be used by the client. The screen number specified in the display_name argument is returned by the DefaultScreen() macro (or the XDefaultScreen() function). You can access elements of the Display and Screen structures only by using the information macros or functions. For information about using macros and functions to obtain information from the Display structure, see Display Macros.
X servers may implement various types of access control mechanisms (see "Controlling Host Access"). | <urn:uuid:4568754b-918e-427d-8c31-28816a25e65c> | {
"date": "2015-10-07T02:28:44",
"dump": "CC-MAIN-2015-40",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443736680773.55/warc/CC-MAIN-20151001215800-00180-ip-10-137-6-227.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.7692887783050537,
"score": 3.140625,
"token_count": 579,
"url": "http://www.tronche.com/gui/x/xlib/display/opening.html"
} |
AGE, RACE, SEX
Biological referents for social inequality
by Phil Bartle, PhD
What do age, race and sex have in common when used for creating social mobility barriers and/or bigotry?
What these three things have in common is that they all interface between biological and cultural (or social) on the cusp, as it were. We all vary in our age, sex and physical characteristics. We have no choice in the circumstances of our birth, eg a choice of parents, date and location of birth, or what variation of x and y chromosomes are involved in the uniting of egg and sperm ("luck of the draw"). These variations are not pure enough to make precise biological categories, but we human beings add meanings to those physical variations and create social categories (believing them to be biological). See Race and Biology.
All three lie on the interface; all three are problematical as biological categories (yes, even sex). All three are used to socially construct barriers to social mobility. All three are used to construct bigoted and prejudicial thinking, and thus the unequal treatment of individuals. Note that barriers to mobility (actions) and bigotry or prejudice (thoughts) are different, although similar, and you should distinguish between them.
When groups are formed by people with similar physical characteristics (often because of their closeness in birth and residence), they may interact, and may develop similar, learned traits. This may reinforce the prejudices of people, and appear (falsely) to support the wrong notion that people's physical characteristics may determine their social and psychological attributes. Thus you get stereotypes about people according to their age, race and gender. The treatment of individuals because they are so categorized may include refusing them service in shops or rental housing, this is based on bigotry (a way of thinking). The refusal of offering jobs or promotions on such basis is a hindrance to upwards mobility (seldom downwards). Refusing to issue driver's permits and giving permission to purchase liquor or tobacco, is institutionalized (legal) discrimination.
The glass ceiling refers to barriers hindering upward mobility of women, not to race and age. Although there are different physical characteristics between babies, children, youth, adults and seniors, there are no precise biological boundaries. The choice of a particular precise age to issue licences or start pensions is physically arbitrary. Not hiring persons (or forcing them to retire) for being too young or too old, regardless of their abilities, is a serious barrier to mobility, as well as action based on bigoted thinking Differences in dressing, acting, talking (even the variations in using tones of voice –– males tend to use three while females tend to use five tones) are all learned, and learned differently by males and females (and changed by transgendered individuals). What is masculine in one culture might be feminine in another culture. Race may be based on normal biological variations but there are no pure categories, many blends in between (by both intermarriage and by descent), and many exceptions to common stereotypes.
If you copy text from this site, please acknowledge the author(s) | <urn:uuid:cf82ec9d-a780-4145-b446-40a473be1a16> | {
"date": "2016-12-06T12:12:16",
"dump": "CC-MAIN-2016-50",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698541905.26/warc/CC-MAIN-20161202170901-00040-ip-10-31-129-80.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9491465091705322,
"score": 3.421875,
"token_count": 632,
"url": "http://cec.vcn.bc.ca/cmp/modules/ine-ars.htm"
} |
If it wasn't enough that the Puritans were influenced by it, America's supreme law, the Constitution, is the incarnation of Martin Luther's doctrine of the Two Kingdoms, the idea that the religious and civil realms are, and should be, separate, which is, of course, an explication of Christ's command to "Give to Caesar what is Caesar's, and give to God what is God's."
How do we know this? James Madison, the Father of the Constitution declares it in an 1821 letter to F. L. Schaeffer:
It illustrates the excellence of a system [American Constitutional government] which, by a due distinction, to which the genius and courage of Luther led the way, between what is due to Caesar and what is due to God, best promotes the discharge of both obligations. The experience of the United States is a happy disproof of the error so long rooted in the unenlightened minds of well-meaning Christians, as well as the corrupt hearts of persecuting usurpers, that without a legal incorporation of religious and civil polity, neither could be supported. A mutual independence is found most friendly to practical Religion, to social harmony, and to political prosperity. | <urn:uuid:e2a48a23-5629-4c76-9def-2108c65b209a> | {
"date": "2017-04-26T23:19:51",
"dump": "CC-MAIN-2017-17",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121752.57/warc/CC-MAIN-20170423031201-00294-ip-10-145-167-34.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9571835994720459,
"score": 3.046875,
"token_count": 246,
"url": "https://amillennialist.blogspot.com/2013_04_01_archive.html"
} |
Circuit Theory/Power supplies
- 1 Sources
- 1.1 Voltage Sources
- 1.2 Current Sources
- 1.3 Power Supply Terminal Relation
- 1.4 Power/Energy Equations
- 1.5 Power Supply Safety
- 1.6 Example 1
- 1.7 Example 2
All sources can be alternating current (AC) or direct current (DC).
Many power sources or supplies such as batteries or wall outlets are voltage sources. This means they vary the current to keep the voltage constant. AAA and AA batteries ideally put out 1.5 volts at all times. Most of the time they are open (not connected to anything). Eventually they are connected to a circuit that draws current from them. An ideal AAA or AA battery could deliver infinite amount of current. A real world battery tries to deliver infinite current if shorted, but usually heats up, catches on fire or explodes.
Most consumers have never had an first hand experience with a current source. Neither will most students in the first semester of Circuit Theory course's lab section. Current sources are the opposite of voltage sources: they keep the current constant by varying the voltage. This makes them very dangerous.
Current sources would require a wire shorting them at all times. If the shorting wire were removed, the ideal currents source would create the biggest, scariest lightening bolt instantaneously.
Current sources are important conceptually in order to understand ideal transistors and op amps. This is why they are part of circuit theory from the very beginning. Working with current sources inside op amps and transistors has few safety risks.
Power Supply Terminal Relation
There is no relationship between the current voltage through a power supply. A 5 volt DC power supply will vary it's current based upon the circuit attached. A 5 Amp DC power supply will vary it's voltage based upon the circuit attached.
A power supply is a dependent device ... dependent upon the independent resistors, capacitors, inductors that are arranged in a circuit and attached to it.
At any given instant, the power flowing through a two terminal device is:
The average power being consumed during time t is:
If p(t) is Sinusoidal, then the upper limit is one time period.
Remember that the period of is
The energy consumed or work done during time t is similar:
All other power concepts derive from the above. For example:
- If the voltage and current are constant (DC), then
- If the voltage and current are Sinusoidal (AC) and enough time has passed that the circuit is steady state, then math can be simplified, but first have to learn phasors. However there are peak power, average power and power factor concepts that need to be understood to develop an intuition about circuits and understand the fictitious "flux capacitor".
- If the voltage and current are in any pattern and are steady state, then the above math can be simplified.
Power Supply Safety
There are many different types of power supplies that each have different safety concerns. LiPo batteries can explode/catch on fire if over charged. Here is a video of someone exploring 244 dead 9 volt batteries creating a 2000 volt power supply. If shorted, voltage supplies can do the same. If opened, current sources (very rare) can do the same.
In most labs, the power supplies are protected by a fuse like a home is. Shorts cause a circuit breaker to trip, fuse to burn out, relay to cut off the circuit, etc. But batteries are typically not protected.
Most power supplies just stop working.
Find the average power consumed by a 20 ohm resistor when a current is applied.
Assume the initial average power is 0. Actually this makes no rational sense. But every time an integral is computed, consider the possibility.
...... from resistor terminal relation
..... from definition of power
...... average power definition
.... definition of period
... using wolfram
Given the two graphs of voltage and current, find and graph the power and energy for t=0 to t=8.
Turn the Question into Math
convert the voltage and current graphs to equations:
Find the Power by Multiplying
Now do the math to find the power:
Find the Energy by Integrating
Now comes the more difficult part. Energy . Integrate from the initial condition to t rather than a specific value. Evaluate the integrals using wolfram alpha.
Find the integration constant and next initial condition
Find the first initial condition from the problem statement. Setting beginning t to the initial condition and find the integration constant. Find the next initial condition by setting the t to the end value of the defined segment.
The goal is to find the cumulative energy, not the change in energy of each segment. This is done by making sure that the end point of the previous segment matches the value at the beginning of the next segment. When graphed, there should be no vertical jumps.
Graphing and Checking the Solution
Graphing is a form of checking your work. Without graphing, the intuitive process can not kick in.
When doing a long problem like this one, it is important to build one's intuition. There are two basic ways to do this:
- Think about power supply experiences and ask "What does this imply?"
- Add expectation feelings and emotion. Think of experiences, the emotion, the happening, not the end product of things you like. Attach the emotion associated with them to the problem at hand. Mix the doing them with solving the problem.
- Tell a story, then check the story against the graphs.
What kind of device are we looking at? Has to be an element that both consumes and generates electricity. The current is switching back and forth every two seconds, thus it is most likely a motor driving some kind of back and forth motion. Motors are essentially an inductor. An inductor is going to vary the voltage all over the place to try and keep the current constant ... like a current source. The motor is working as planned (consuming energy) for the first four seconds sort of. During the second four seconds, something else is happening. It looks like a 2 year old has grabbed the fan that is trying to oscillate back and forth and is forcing it in the opposite direction. This could cause the motor to turn into a generator, hence the voltage variations, the negative energy and power. | <urn:uuid:a624f063-c4b4-47cc-a900-6dae088d4998> | {
"date": "2018-04-26T17:34:33",
"dump": "CC-MAIN-2018-17",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125948426.82/warc/CC-MAIN-20180426164149-20180426184149-00496.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9151333570480347,
"score": 4.4375,
"token_count": 1322,
"url": "https://en.wikibooks.org/wiki/Circuit_Theory/Power_supplies"
} |
The federal No Child Left Behind Act requires states to define challenging academic standards and administer high-quality assessments so that students, teachers, parents, and administrators can measure progress against shared expectations for student achievement.Elementary and middle school students in New York State take yearly State tests in core academic subjects to assess their mastery of the Common Core Learning Standards.Students’ test results are one of the factors that schools use to decide whether to promote a student to the next grade. In high school, students must pass five Regents Exams in order to graduate and may earn an Advanced Diploma if they pass more exams. Read more about the elementary and middle school promotion policies or high school graduation requirements. Students in New York City also take tests to apply for admission to selective schools and programs and to prepare for college. New York City and New York State use test results to evaluate how well schools are serving students. To learn more about how the subjects are taught in New York City, see the academics page. Parents and guardians can see their child’s test scores and learn more about what the scores mean on ARIS Parent Link.
Educators can find information about test administration and procedures on the Yearly Testing page on the DOE intranet.
Grades 3–8 State Tests
Elementary and middle school students in New York State take yearly State tests in core academic subjects to assess their mastery of the Common Core Learning Standards. Students’ test results are one of the factors that schools use to decide whether to promote a student to the next grade. Educators also analyze students’ test results to help determine which instructional standards to focus on, and to evaluate their programs.The links below take you to pages with more information about each particular test that elementary and middle school students take; you can also read more about how subjects are taught in New York City on the Academics page. For information about student participation in State tests, see this Frequently Asked Questions (FAQ) resource; a two-page Parent Guide is also available. Translated versions of the Parent Guide are also available in Arabic, Bengali, Chinese, French, Haitian Creole, Korean, Russian, Spanish, and Urdu.
Test Coordinators can find more information here.
On June 17, 2013, the NYC LOTE (Languages Other than English) exams will be offered in 21 languages: Albanian, Arabic, Bengali, Chinese (Simplified), Chinese (Traditional), French, German, Greek, Haitian Creole, Hebrew, Hindi, Italian, Japanese, Korean, Latin, Polish, Punjabi, Russian, Spanish, Urdu, and Vietnamese.For questions, contact your network assessment team.
High school students in New York State take Regents Exams to assess their mastery of New York State Learning Standards. In order to graduate from high school, students must pass exams in five subjects: English, mathematics, science, global history, and U.S. history and government. Student may also earn an Advanced Regents diploma if they pass additional exams in math, science, and a foreign language. Learn more about Regents Exams and New York City high school graduation requirements. Back to the top
Some students with disabilities are eligible to take New York State Alternate Assessments (NYSAA) in place of the general education State tests in grades 3-8, or Regents Competency Tests (RCTs) in place of Regents Exams in high school. Back to the top
New students who speak languages other than English at home take the Language Assessment Battery (LAB-R) test within ten days of starting school in New York State. The LAB-R assesses students’ English language skills. Educators use the results of the assessment to determine whether students should receive special services to help them learn English. Students who receive English as a second language assistance take the New York State English as a Second Language Achievement Test (NYSESLAT) every year to determine how well they are learning English. Students will continue to receive special language services until their scores on the NYSESLAT are high enough to show that they are ready to participate in English-only programs. Educators also use students’ NYSESLAT scores to help determine which instructional standards to focus on, and to evaluate their programs.Students who are unable to understand the math, science, and social studies State tests in English may take versions translated into Chinese (traditional), Haitian Creole, Korean, Russian, or Spanish. When tests are not available in the student's native language, the test may be translated orally to the student. ELLs who have been in the United States for less than one year are not required to take the New York State ELA test in their grade, but must start taking ELA tests after their first year. Back to the top
Any student who wishes to apply to New York City’s Gifted and Talented (G&T) elementary school programs must take the Gifted and Talented Test. All students in pre-Kindergarten through Grade 2 who are current New York City residents are eligible for the tests. Students who score in the top ten percent are eligible for G&T programs in their local district. Students who score in the top three percent are also eligible for citywide G&T programs. For more information about New York City Elementary School Gifted and Talented programs, see the Gifted and Talented Test Information and handbooks.Back to the top
Students in grades 8 or 9 who wishes to enroll in one New York City’s specialized high schools must take the Specialized High School Admissions Test (SHSAT) in the fall to demonstrate their verbal and math skills. All students in grades 8 and 9 who are current New York City residents are eligible for the tests. Students are ranked according to their scores on the test, and assigned to a school depending on their rank on the list, the priority in which they placed schools, and the seats available at each school. Learn more about the high school admissions process.
Back to the top
City public school students in grades 10 and 11 may take the Preliminary SAT (PSAT) for free in the fall. The PSAT assesses students' verbal and math skills. It helps put students on track for college success by giving them practice for the SAT exams, which many colleges require for admission. It also gives students access to college and career planning tools and the chance to enter the National Merit Scholarship competition. Schools administer the PSAT to their students; families do not need to register students or make a special request to participate in the test.Back to the top
Students in grades 3 through 12 whose native language is Spanish and who are receiving language arts instruction in Spanish take El Examen de Lectura en Español (ELE) to assess their reading achievement in Spanish. Students who receive instruction in Chinese may take the Chinese Reading Test to determine their Chinese proficiency.Back to the top
A sample of New York City schools also participate in NAEP assessments every year. NAEP provides a common way of comparing academic performance at a high level across states and over time. Not every student or school takes the NAEP; only a limited sample of schools and students participate each year. NAEP assesses students in math, reading, science, writing, the arts, civics, economics, geography, and U.S. history; different subjects are assessed in different years. NAEP does not give scores for individual students or schools, and is not used for any New York State or New York City accountability purposes.Back to the top | <urn:uuid:802c4c3a-21c8-4de4-af23-d0fb186e80b9> | {
"date": "2013-05-19T19:05:33",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697974692/warc/CC-MAIN-20130516095254-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9464805126190186,
"score": 3.484375,
"token_count": 1558,
"url": "http://schools.nyc.gov/Accountability/resources/testing/default.htm"
} |
Ah, the elusive far side of the Moon.
The far side of the Moon, sometimes poetically called the dark side of the Moon, is the part of the Earth’s Moon that faces away from our planet. Satellite images show that the area appears to be nothing but vast rugged train, adorned with impact craters and a few lunar maria. One of the most eye-catching pieces is the South Pole–Aitken basin, also known as one of the largest craters in the solar system.
Of the entire section, only 18 percent of the far side is visible from Earth thanks to libration or the apparent oscillation of the Moon. The remaining 82 percent was finally seen in 1959 after the Soviet Union’s Luna 3 space probe managed to photograph it.
Astronomers have entertained the prospect of installing a large radio telescope on the far side to study the area. But it looks like China is about to beat them to it. The Asian country is planning to venture to the area no man has ever gone before—and they look pretty determined to complete their mission before the year ends.
China to Launch Mission to the Far Side of the Moon
China wants to be the first man on the far side of the Moon.
If they succeed, they’ll achieve a feat no other country was ever able to complete. Over the years, there have been numerous missions sent to observe Earth’s natural satellite. In 1966, mankind sent the Luna 9, marking it the first spacecraft to achieve a controlled soft landing, while its successor, Luna 10, became the first to enter orbit.
A total of six missions landed men on the Moon, starting with Neil Armstrong‘s famous voyage that culminated with Apollo 11 landing in July 1969.
It goes without saying that man’s fascination with the moon has been steadfast, to say the least.
For 2018, China is looking to make history as the first country to place a lander on the far side of the Moon. They’re launching not one but two spacecraft later this year. One will serve as a lander and the other a communications satellite assigned to relay signals to and from Earth.
Scroll down for the video
The mission is known as Chang’e 4, named after the Chinese moon goddess. By landing on the far side of the Moon, China will surpass the historical accomplishments of the USA and the USSR. The first component of the Chang’e 4, a relay satellite, is scheduled to lift off in June 2018. | <urn:uuid:e026b24f-d224-42ec-8795-08cd84e2b591> | {
"date": "2018-08-16T16:37:02",
"dump": "CC-MAIN-2018-34",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221211126.22/warc/CC-MAIN-20180816152341-20180816172341-00656.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9505499601364136,
"score": 3.234375,
"token_count": 519,
"url": "https://www.wowamazing.com/featured-stories/china-visit-far-side-of-the-moon/"
} |
Genesis 3:9-15, 20; Ephesians 1:3-6, 11-12; Luke 1:26-38
On the 8th of December the Church celebrates the feast of the Immaculate Conception of Mary. In teaching that Mary was immaculately conceived, the Catholic Church teaches us that from the very moment of her conception, the Blessed Virgin Mary was free from all stain of original sin. This simply means that from the very beginning, she was in a state of grace, sharing in God’s own life, and hence she was free from the sinful inclinations which have beset human nature after the fall. The Feast of Mary’s Conception is clearly known, as early as the 7th century in the East, and may even date to as early as the 5th century in the Churches of Syria. The feast spread to the West, at least by the 9th century. In the eleventh century it received its present name, the feast of the Immaculate Conception. Pope Sixtus IV in the fifteenth century while promoting the festival explicitly described it as the feast of the Immaculate Conception in 1476, to be celebrated on the 8th of December. The feast tells us that the Blessed Virgin Mary was created by God immaculate in nature for the sake of his Son. Mary was the only new and second Eve who was created in an immaculate state which was equal to the state of holiness that the first Eve enjoyed prior to her having disobeyed the Lord God in the Garden of Eden. There can be some confusion about what we are celebrating in this feast. What we are not celebrating, although it is part of the faith of the Church, is that Mary remained a virgin after the birth of Jesus. What we are celebrating is that Mary, from the very first moment of her existence, was free from any taint of original sin, that tendency to evil with which we are all born into this world.
The feast tells us that the whole being of the Blessed Virgin Mary was created by God immaculate in nature. Mary was the only new and second Eve who was created in an immaculate state which was equal to the state of holiness that the first Eve enjoyed prior to her having disobeyed the Lord God in the Garden of Eden. What we are celebrating today is that Mary, from the very first moment of her existence, was free from any taint of original sin, that tendency to evil with which we are all born into this world. In 1854 Pius IX gave the infallible statement after consulting the Bishops and the theologians: “The most Blessed Virgin Mary, in the first instant of her conception, by a singular grace and privilege granted by almighty God, in view of the merits of Jesus Christ, the saviour of the human race, was preserved free from all stain of original sin.” The “splendour of an entirely unique holiness” by which Mary is “enriched from the first instant of her conception” comes wholly from Christ: she is “redeemed, in a more exalted fashion, by reason of the merits of her Son.” The Father blessed Mary more than any other created person in Christ with every spiritual blessing in the heavenly places and chose her in Christ before the foundation of the world, to be holy and blameless before him in love. In simple terms, this dogma proclaims that: first and foremost the entire being of the Blessed Virgin Mary, her physical and spiritual natures, were created by God Himself at her conception; and, second, she who was to become the tabernacle of the incarnation, was never subject to original sin, but was completely preserved from all the effects of the sin of Adam. In other words, the whole being of the Blessed Virgin Mary was created by God immaculate in nature.
The Gospel of today narrates the account of the Annunciation from Luke. As the angel comes into the little house at Nazareth, he greets Mary. He tells her: “Rejoice, so highly favoured! The Lord is with you”. The older translation with which we are familiar in the prayer is, “Hail, Mary, full of grace.” It is this term, ‘full of grace’ which led theologians to asserting that Mary, not only at the moment of Jesus’ conception, but at every moment of her existence was totally free from any kind of sin. From these words, the angel Gabriel was expressing that the Blessed Virgin Mary enjoyed a unique state of grace that far surpassed the creation of all men and the angels. Her soul, spirit and body were immaculate because of her immaculate conception. Not only was the Blessed Virgin Mary immaculate in her conception, but she remained faithful and immaculate to God to the end of her earthly life. During the annunciation Angel Gabriel tells Mary what is going to take place in her life. The message he gave was very clear but the way it would take place was not at all clear. She would become pregnant and have a child of the line of David who will be called Messiah was indeed a privilege. This is a miracle as the Holy Spirit would over shadow her and she would be with child who in fact is the son of God. The Angel tells her how God works miracles in the life of people as he has done in the life of Elizabeth and he can do anything without any hindrance. Nothing is impossible for God and Mary accepts his word and says God your will be done.
We read in the Book of Genesis that God created the first woman who was called Eve. They were created immaculate in their physical and spiritual natures for the Divine purpose. But the woman allowing her to be tricked by the evil one lost the glory and beatific vision that they enjoyed in the Garden of Eden along with her Adam. This blessing that they had enjoyed was a conditional gift from God. In the new Eve, the Blessed Virgin Mary, God planned to reclaim His Kingdom and save His people from death. In today’s Second Reading, Paul praises God, the Father of our Lord Jesus Christ who has blessed us through Christ with every spiritual blessing in the heavenly places. Through our living faith in Christ and the Church Sacraments, we now qualify to receive the blessed hope of enjoying our rightful inheritance that was taken from us. Through our living faith in Jesus Christ and the Sacrament of Baptism, we now have the opportunity to once more become holy and blameless children before God in perfect love. We now qualify to be raised to the blameless and immaculate state of grace that the Blessed Virgin Mary enjoyed throughout her life and continues to enjoy to this date.
The papal definition of the dogma declares with absolute certainty and authority that Mary possessed sanctifying grace from the first instant of her existence and was free from the lack of grace caused by the original sin at the beginning of human history. Mary’s salvation was won by her son Jesus Christ through his passion, death, and resurrection and was not due to her own merits. For the Roman Catholic Church the dogma of the Immaculate Conception gained additional significance from the apparitions of Our Lady of Lourdes in 1858. At Lourdes a 14-year-old girl, Bernadette Soubirous, claimed a beautiful lady appeared to her. The lady said, “I am the Immaculate Conception”, and the faithful believe her to be the Blessed Virgin Mary. In fact, the doctrine had only been infallibly declared a doctrine of faith four years previously in 1854. It was most unlikely that a girl from an impoverished family without access to the “media” of the day would have been familiar with such a theological expression, still less that she could have made it up. In spite of much scepticism on the part of both civil and church authorities, Bernadette won through and Lourdes became a place of pilgrimage. Today millions of people go there to find healing in body and soul.
Speaking in Rome on the feast of the Immaculate Conception, Pope Benedict XVI said that Mary Immaculate helps us rediscover and defend what is inside people, because in her there is perfect transparency of soul and body. She is purity in person in the sense that the spirit, soul and body are fully coherent in her and with God’s will. Our Lady teaches us said the Holy Father to open up to God’s action and to look at others as he does, starting with the heart, to look upon them with mercy, love, infinite tenderness, especially those who are lonely, scorned or exploited. Where sins increased, grace overflows all the more. Further the Pope said that he wants to pay tribute publicly to all those who in silence, in deeds not in words, strive to practice the Evangelical law of love which drivers the world forward. There are so many of them even here in Rome. They do not make the headlines. They are men and women of all ages, who realise that it is not worth condemning, complaining or recriminating; that it is better to respond to evil doing good; to changes things; or better, to changes people, hence improve society.”
Giving his reflections on the feast of the Immaculate Conception, the Holy Father commented on the title of “Immaculate” by referring to the book of Genesis and the account of the Annunciation in the Gospel of St. Luke. He said that it is through woman that God Himself will triumph. That woman is the Virgin Mary from whom was born Jesus Christ who, with His sacrifice, defeated the ancient tempter once and for all. For this reason, in so many paintings and statues of the Immaculate, she is shown in the act of crushing a serpent under her foot. He further added that the Evangelist Luke shows us the Virgin Mary receiving the announcement from the heavenly messenger. She appears as the humble and authentic daughter of Israel, the true Zion in which God wishes to establish His dwelling. She is the branch from which the Messiah, the just and merciful King, will grow. … Unlike Adam and Eve, Mary remains obedient to the Lord’s will. With all of herself she pronounces her ‘yes’ and fully places herself at the disposal of the divine plan. She is the new Eve, the true ‘mother of all creatures’; that is, of everyone who, through faith in Christ, receives eternal life. The Pope concluded by rendering thanks unto God “for this marvellous sign of His goodness”, and by entrusting to the Virgin Immaculate “each one of us, our families and communities, the whole Church and the world entire”.
In the Immaculate Conception we can see the redemption fully at work. We can say that through this gift Mary is the fully healed one: she never had the spiritual flaws that hold us back from total love of God. Thus the Immaculate Conception allowed Mary’s yes at the Annunciation to be limitless, without any unconscious restriction. In several places the liturgy speaks of Mary as the beginning of the Church. She is also where the grace of redemption reaches its highest expression. What the whole church will one day become is already perfect in Mary through her Immaculate Conception and Assumption. These are consoling mysteries since they are the real pledge and guarantee that God’s grace is more powerful than our guilt. So the Immaculate Conception of the Blessed Virgin reveals that God loves humanity as such. The Immaculate Conception also means that God surrounds this life of humanity with loving fidelity.
On this great feast day we can say that by the grace of God, we have received a new heart, a new spirit and the indwelling Holy Spirit to raise us to the level of holiness that the Blessed Virgin Mary enjoyed during her earthly life. Through faith in Jesus and the Sacrament of Baptism, having been born again of water and Spirit, we have been adopted into the Body of Christ in the living hope of receiving our salvation. Through our living faith, including the reception of the Sacrament of Confession, we receive the righteousness of our souls. Today we thank God for all the blessings and graces he showered on the Mother of his Son. We ourselves have been far from immaculately conceived and are aware of both the sins we have committed and of all the tendencies, appetites and urges which drive us away from God and into conflict with our brothers and sisters. Let us pray today to Mary our Mother to be with us, to guide us, to protect us through her prayers of intercession with her Son. Above all, let us ask her to respond as generously to God’s call as she did and to be as faithful a disciple of her Son as she was. As we continue with the celebration of the Holy Mass, let us be thankful to the Immaculate Conception for answering her special calling that was instrumental to our salvation.
Not only was the Blessed Virgin Mary immaculate in her conception, but she remained faithful and immaculate to God to the end of her earthly life. Through the Immaculate Conception of Mary who fully cooperated with the Divine Plan of God, we are led to Jesus. The glorious Feast of the Immaculate Conception is a reminder that the Blessed Virgin Mary is the new Eve, our spiritual Mother, she who has become co-redeemer with Christ in our salvation by allowing her womb to become the humble instrument and Sacred Temple of the Living God. As we continue with the celebration of the Holy Mass, let us be thankful to the Immaculate Conception for answering her special calling that was instrumental to our salvation. Let us praise her for having remained immaculate to the end. Let us look up to her, a precious gem of the Holy Catholic Church, as a perfect model of virtues. Let us always remember that, by the grace of God, when we will be glorified to the fullness of our beings, we also will become immaculate in nature.
Do you know the legend of the Cherokee Indian Youth’s Rite of Passage? His father takes him into the forest, blindfolds him and leaves him alone. He is required to sit on a stump the whole night and not remove the blindfold until the rays of the morning sun shine through it. He cannot cry out for help to anyone. Once he survives the night, he is a MAN. He cannot tell the other boys of this experience, because each lad must come into manhood on his own. The boy is naturally terrified. He can hear all kinds of noises. Wild beasts must surely be all around him. Maybe even some human might do him harm. The wind blew the grass and earth, and shook his stump, but he sat stoically, never removing the blindfold. It would be the only way he could become a man! Finally, after a horrific night the sun appeared and he removed his blindfold. It was then that he discovered his father sitting on the stump next to him. He had been at watch the entire night, protecting his son from harm. We, too, are never alone. Even when we don’t know it, God through Mary, is watching over us, sitting on the stump beside us. When trouble comes, all we have to do is reach out to Him.
Fr. Eugene Lobo S.J. Rome | <urn:uuid:f34f7e56-1ca8-4d6e-b206-16499dcc498c> | {
"date": "2016-05-28T21:58:23",
"dump": "CC-MAIN-2016-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049278244.51/warc/CC-MAIN-20160524002118-00091-ip-10-185-217-139.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.97707200050354,
"score": 2.59375,
"token_count": 3203,
"url": "https://msjnov.wordpress.com/2011/12/04/immaculate-conception-of-mary-december-8-2011/"
} |
Having always been closely linked to the ideal of peace, the concept of civil society has a long history as a third actor besides the state and the economy. It is a nonviolent “zone of civility” that can debate and address war and other problems. In today’s interconnected world we see the emergence of a “global civil society”, which transcends national borders and attempts to solve global challenges that established political and economic structures fail to address. This global civil society is organized like a network, just like the global communication systems that produced it are also organized like a network. However, while popular social network services such as Facebook, Twitter and Youtube are often said to be powerful tools for peace and democracy, they are in fact highly centralized services operated by for-profit companies. For a global civil society to truly work, both the architectural structure and the governance mechanisms of its communication channels must themselves be based on civil society principles.
Follow this link for further information: http://projectdanube.org/wp-content/uploads/2012/02/ICTs-for-a-Global-Civil-Society.pdf | <urn:uuid:80782f74-1aa3-4f2b-a8d9-1a2d2c858a72> | {
"date": "2018-10-22T22:00:48",
"dump": "CC-MAIN-2018-43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583515539.93/warc/CC-MAIN-20181022201445-20181022222945-00016.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9482339024543762,
"score": 2.796875,
"token_count": 232,
"url": "https://dlap.danubestrategy.eu/project/icts-global-civil-society"
} |
Rubella is caused by type of virus called Rubivirus. A rubella vaccine is part of the standard immunization schedule of all preschoolers. In Canada, the vaccine is only available as a combined vaccine against measles, mumps and rubella. Adequate immunization is probably the best available protection against this illness.
Onset of symptoms occurs 14 to 21 days following contact with the virus.
Rubella is sometimes mild and goes unnoticed. It starts with relatively mild generalized symptoms:
These symptoms appear 1 or 2 days before a reddish rash with papules appears on the face and trunk. This rash never lasts more than 3 days. There is only mild or no fever. Moreover, rubella can be very harmful to an unborn fetus when the pregnant woman contracts the illness, especially at the beginning of the pregnancy.
The illness is spread by infected nose and throat secretions, urine or stools. The contagious period starts 7 days before the rash appears and lasts up to 14 days.
Vaccinated and unvaccinated pregnant women and those trying to become pregnant should avoid all contact with a person with rubella.
Children born to mothers who contracted the illness during pregnancy may be contagious until they are 1 or 2 years old. The virus is shed in the urine and respiratory secretions.
Remember: Washing your hands frequently significantly reduces the risk of transmitting most contagious diseases.
For more information:
Canadian Paediatric Society
© Copyright Vigilance Santé
The patient information leaflets are provided by Vigilance Santé Inc. This content is for information purposes only and does not in any manner whatsoever replace the opinion or advice of your health care professional. Always consult a health care professional before making a decision about your medication or treatment. | <urn:uuid:6d56bed9-bb52-4d0e-b3ed-5ebeb33ce767> | {
"date": "2019-11-12T13:12:52",
"dump": "CC-MAIN-2019-47",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496665573.50/warc/CC-MAIN-20191112124615-20191112152615-00136.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9325073957443237,
"score": 3.90625,
"token_count": 356,
"url": "https://www.medicineshoppe.ca/en/article/disease/rubella"
} |
But it always adds up to a bad day.
Dear Word Detective: Countless times I’ve heard the phrase “to do a number on” someone or something, meaning “to affect strongly, often negatively.” I wonder how that came into our language. It seems like a usage that sprang up with the ’60s and ’70s counter-culture, maybe originating as musicians’ slang. — Slidedaddy.
“Do a number on” is one of those stealthy little phrases that you pick up without really thinking about it and then use for years, blissfully never questioning what the “number” might be or how one “does” a number in the first place. Of course, most slang spreads in just this casual, unquestioning fashion; few of us would think to ask a friend exactly what “number” his latest fender-bender “did” on his car. Asking is uncool. One interprets such things from context, and it’s pretty clear that nothing was ever improved by having a “number done” on it.
“Number” is, as you can imagine, a very old word. It first appeared in English around 1300 with the meaning “the precise sum or aggregate of a collection of individual things or persons” (“He sayth that then shall the nomber of sore and sick beggers decreace,” 1529). The root of “number” was the Latin “numerus” (meaning “sum” or “total,” which also gave us “numerous,” “numeral,” “enumerate” and other modern English words), which in turn came from a root meaning “to divide or distribute.” The use of “number” to mean “symbol of arithmetic value” appeared around 1400.
As most core English words do, “number” has acquired a wide range of figurative and slang senses. One of the older uses of “number” in slang is “playing the numbers,” i.e., betting in an illegal lottery, a use common in US cities since the mid-19th century. Also in the 19th century, we began to use “number” in a very vague sense to mean “one of something,” such as an article of clothing (“[A]n exquisite but throat-high ‘little number’ redeemed by lumps of jade,” 1953), or even a person (“Have you seen a little blond number named Adeline?”, 1955).
In the mid-19th century, we began to use “number” as theatrical slang to mean “a particular item in a program of musical entertainment,” most likely because items in a printed program given to audience members were often literally numbered. This led to the use of “number” to mean “a song” as well as, at least within the theatrical community, to mean a “bit” or “routine” associated with a particular performer. This led in turn, by the late 1960s, to the use of “number” to mean “manner or routine pattern of behavior” (“Bob always does his poverty number, but he actually has pots of money.”).
All of which brings us to “to do a number on,” which first appeared in the African-American community in the late 1960s meaning “to act with destructive impact on” (“There were about four or five cats doing a number on (beating hell out of) a Puerto Rican,” New York Times, 1972) or “to criticize severely.” This slang sense seems to combine the intentionally vague use of “number” to mean an unspecified “something” with the sense of “a personal routine or characteristic behavior,” in this case ranging from an angry tirade to a physical beating. The phrase “do a number on” has been tempered somewhat as its use became more mainstream, and it’s often now used to mean simply “affect negatively” (“Frigid temperatures can do a number on your plumbing if your pipes aren’t properly insulated,” 2010). | <urn:uuid:162e2660-b1ed-47fb-b1be-5c1ac4f24dd4> | {
"date": "2015-11-29T05:10:47",
"dump": "CC-MAIN-2015-48",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398456289.53/warc/CC-MAIN-20151124205416-00350-ip-10-71-132-137.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9661795496940613,
"score": 2.828125,
"token_count": 938,
"url": "http://www.word-detective.com/2010/07/number-to-do-a/comment-page-1/"
} |
Land requirements in regional planning are calculated from land cover maps based on criteria such as the expected production of natural resources and the expected need for settlement areas and infrastructure. Difficulties arise in assessing the impact of the land use because data on the concrete management of a piece of land are often not available.
Furthermore, WP 4.5 addresses the energy efficiency of biomass production by considering the full energy used in agricultural production. Agriculture in developing countries is characterized by a large portion of energy supplied through human and animal traction, and a large part of household energy consumption provided from adjacent woodlands. Including these areas and the energies generated therein in the analysis provides not only a more realistic energy efficiency analysis for biomass production, it also allows factoring these needed “supportive areas” in land use planning.
- Simulate the impact of alternative land use pattern scenarios on regional biomass production potentials.
- Assessing the impact of the scenarios on the provision of other ecosystem services (trade-off analyses).
- Develop a holistic assessment framework that assesses energy efficiency in agronomic land use as a whole (not only confined to livestock production).
- Supply the value web system analysis (cluster 3) with additional information on possible trade-offs regarding the challenge of world-wide increasing energy scarcity.
- Which is the potential contribution of different land use pattern alternatives to satisfy future demands?
- How can be modeled the impact of real land uses on the provision of ecosystem services, thereby surpassing the traditional evaluation based only on land cover information.
- What are meaningful system boundaries to assess the energy efficiency and sustainability of the land systems.
- Which types of energy and energy fluxes should be involved into the analysis to account also for energy sources and fluxes specific for land systems in development countries.
- Which energy reference unit (renewable / non-renewable) should be defined to make comparable different land systems from traditional management (e.g. extensively used grazing and fuelwood areas) up to highly intensified industrial systems and to support comparison for alternative land use scenarios.
As a basis for spatial scenario simulation, future land requirements for different land use types are calculated. A set of models, complemented by statistical data, will be established to provide information on nutrient / energy / biomass output.
Analyses and simulation will be done with the software platform GISCAME, which supports connecting the land use types with their modeled productivity data to get spatially explicit production potential maps. The identification of priority areas for specific land use types will serve to provide options of choice for the decision makers.
Furthermore, we are working on a classification of “typical” land systems (agricultural / agroforestry / importance of gracing / pasture).and in-depth analysis and systematization of the energy sources and fluxes and area (actively managed / extensively used). We develop an energy efficiency assessment framework incl. relevant renewable and non-renewable energy sources (Vigne et al. 2012; 2013) and include xpert consultation to define future alternative land use concepts (change of cropping systems / management techniques / labor and draft energy input, intensification, spatial extension, etc.) for application of the assessment framework. Finally, we derive recommendations on eligible land use (change) scenarios.
Countries of field research
- University of Cape Coast
- West African Science Service on Climate Change and Adapted Land Use (WASCAL)
- West and Central African Council for Agricultural Research and Development (CORAF)
- Forum for Agricultural Research in Africa (FARA)
- Prof. Dr. Christine Fürst
Institute for Geosciences and Geography
Dept. Sustainable Landscape Development
- Marcos Jiménez Martínez and Francis Mwambo
Center for Development Research (ZEFc)
- Francis Mwambo
Center for Development Research (ZEFc)
- PiSolution GmbH
- University of Hohenheim, Institute for Biological Chemistry and Food Science
- University of Hohenheim, Institute for Crop Sciences
- University of Bonn, Institute for Crop Science and Resource Protection (INRES) | <urn:uuid:03c1f17a-8ddd-4765-859b-f3aabbf43c97> | {
"date": "2017-06-27T07:03:05",
"dump": "CC-MAIN-2017-26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321025.86/warc/CC-MAIN-20170627064714-20170627084714-00697.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8487309813499451,
"score": 3.09375,
"token_count": 856,
"url": "http://biomassweb.org/integrated-assessment-of-land-use-adaptation/"
} |
People, it seems, spend an extraordinary amount of effort and energy in conflict. Now, in evolutionary terms, a certain amount of conflict is inevitable and desirable, but the wholescale violent conflict between groups that dominates the news is clearly wasteful.
The origins of the battles between Serbs and Kosovars, between Jews and Palestinians, between Shias and Sunnis, between Georgians and Ajarians, and between every aggrieved minority and its neighbours, seems obvious. Competition for power and resources, protection of family and extended family, the twisting of natural human responses into abstract conflicts that serve a small minority at the top, and that cost the rest an arm and a leg.
The "ethnic" conflicts that dominate the news are, IMHO, 99% driven by a few individuals in each case, who polarise and encite populations into mutual hatreds so that they can build power bases and do the protection money racket that men with sticks love to do.
It works because people identify themselves with family and kin, in an ever increasing circle that includes anyone who speaks the same language, follows the same customs, and belongs to the same identifiable group.
But these groups are virtual, existing more in the mind of their members than in their real constitution. Often religion and language are the strongest binding attributes: factors that can be learned and adopted well into adult life. Genetic closeness is certainly the core of the family and extended family structures, but it is almost irrelevant when talking about larger groups.
It's been measured that the average genetic differences within a single well-defined "ethnic" group are about ten times more significant than the average differences between two such groups. In other words, the genes that affect our appearance are trivial compared to the genes that affect the rest of our human variability. Genes for the way our minds and bodies are constructed have a standard distribution throughout our species, thanks to two main mechanisms. First, valuable genes are conserved and maintained over long periods of time (the gene for dark hair is shared by humans, cows, and other animals, but may be absent from light-haired people); secondly, rare genes spread rapidly, so that no population is really isolated unless they are physically cut-off from the rest of the world.
It's quite likely, and this is the basis of my idea, that you will be much closer, genetically, to random strangers scattered throughout the globe, than to anyone further away than second or third cousin.
Kurt Vonnegut once wrote a story (I think it's "Breakfast of Champions", but most of my books are in cases somewhere in a depot right now) in which everyone was assigned a surname attaching them to a surrogate family. A dozen or so of such families cut through social and cultural layers, giving people another level for competition and collaboration. Vonnegut had a great idea, but I reckon it can be made even more practical by basing this on genetics.
Extended interest groups based on genetic similarity that transcends superficial "ethnic" markers is not such a far-fetched idea. I suspect that we feel real affinity for people, from any background, who think and react like ourselves: atheletes, business people, teachers, artists, musicians, travellers, aesthetes, preachers, facists... the attraction of like to like is strong.
So I suggest that by encouraging and formalizing this into "genegroups" we can give people a strong tool with which to fight the authoritarian "us and them" discourse that sends communities into spirals of violent conflict. "Yes, we are here, and they are there, but I'm an alpha-thirteen, and if you excuse me, I have an alpha-thirteen meeting with some of 'them' in five minutes..."
Possibly the alpha-thirteen genegroup will plot to take over the world, and the gamma-two's will initiate a terrible revenge. But at that point close family interests ("but my sister's a gamma-three, and that's almost a gamma-two!") will step in to prevent extremism.
Ideally, genetic tagging should be universal at birth. I'm not sure whether our genegroups should be tattooed onto our foreheads or not, being able to lie about one's genegroup might be fun, and a life saver when the delta-fours (with a marked tendency to psychotic violence) break out of the asylum.
One last comment. Genes do not define us unconditionally, and I'm not proposing that all criminals can be identified at birth (although if you are a delta-four, please be warned, I have a large and violent dog, also a delta-four). Much behaviour is driven by local economics.
However: feeling close to someone because they share real and tangible parts of your makeup seems a better basis for creating communities than feeling close to someone because they have learnt your language and share your religious delusions. | <urn:uuid:93ddddee-9e00-4c99-a244-24062f8f1b0a> | {
"date": "2017-06-26T12:33:43",
"dump": "CC-MAIN-2017-26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320736.82/warc/CC-MAIN-20170626115614-20170626135614-00617.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9620002508163452,
"score": 2.796875,
"token_count": 1011,
"url": "https://slashdot.org/journal/65841/fixing-it---genegroups"
} |
Note: This message is displayed if (1) your browser is not standards-compliant or (2) you have you disabled CSS. Read our Policies for more information.
Colonel Eli Lilly is the founder of Eli Lilly and Company, an international pharmaceutical corporation headquartered in Indianapolis. He moved to Indiana in 1852 and attended Indiana Asbury College (now DePauw University). After opening his own drugstore in 1860, Lilly enlisted in the Union Army during the Civil War. He was captured by the Confederate Army until released in 1865 during a prisoner exchange. Upon returning to duty, he was promoted to colonel.
After returning to Indianapolis, Lilly opened “Eli Lilly, Chemist” in 1876, the business that would one day become Eli Lilly and Company. The business grew to become one of the world’s most-respected pharmaceutical companies, and with its success, Lilly became an active civil leader and philanthropist. He was an advocate of federal regulation of the pharmaceutical industry, and many of his suggested reforms were enacted into law in 1906, resulting in the creation of the Food and Drug Administration. Lilly died in 1898.
An official biography of Lilly, provided by the Lilly Archives, can be found at this address: http://www.in.gov/gov/files/Press/lillybio.pdf | <urn:uuid:ec4252a4-a385-4cad-84a7-2ad90a6a49a3> | {
"date": "2016-06-26T17:26:55",
"dump": "CC-MAIN-2016-26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395546.12/warc/CC-MAIN-20160624154955-00006-ip-10-164-35-72.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9680922627449036,
"score": 2.890625,
"token_count": 273,
"url": "http://in.gov/governorhistory/mitchdaniels/3446.htm"
} |
Syria country profile
Once the centre of the Islamic Caliphate, Syria covers an area that has seen invasions and occupations over the ages, from Romans and Mongols to Crusaders and Turks.
A country of fertile plains, high mountains and deserts, it is home to diverse ethnic and religious groups, including Kurds, Armenians, Assyrians, Christians, Druze, Alawite Shia and Arab Sunnis, the last of whom make up a majority of the Muslim population.
Modern Syria gained its independence from France in 1946, but has lived through periods of political instability driven by the conflicting interests of these various groups.
Since 2011 political power, long held by a small mainly Alawite elite, has been contested in a bitter civil conflict initially sparked by the Arab Spring that turned into a complex war involving regional and international powers.
The Syrian Arab Republic
Population 21.1 million
Area 185,180 sq km (71,498 sq miles)
Major language Arabic
Major religion Islam, Christianity
Life expectancy 74 years (men), 78 years (women)
Currency Syrian pound
President: Bashar al-Assad
In power since succeeding his father in 2000, Bashar al-Assad is fighting for control of his country after protests against his rule turned into a full-scale war.
He inherited a tightly controlled and repressive political structure from long-time dictator Hafez al-Assad, with an inner circle dominated by members of the Assad family's minority Alawite Shia community.
But cracks began to appear in early 2011, in the wake of the "Arab Spring" wave of popular dissent that swept across North Africa and the Middle East.
Syria has a complex and changeable media landscape, split between pro-government outlets and those run by armed groups and the opposition.
More than 200 media workers been killed since the start of the revolt, says Reporters Without Borders.
Social media are used by the government, the opposition and jihadist groups to deliver their messages.
- Read full media profile
Some key dates in Syria's history:
1918 October - Arab troops led by Emir Feisal, and supported by British forces, capture Damascus, ending 400 years of Ottoman rule.
1920 - San Remo conference splits up newly-created Arab kingdom by placing Syria-Lebanon under a French mandate, and Palestine under British control.
1946 - Independence.
1958-61 - Short-lived union of Syria with Egypt as the United Arab Republic.
1967 - Egypt, Jordan, and Syria are defeated in the Six-Day War with Israel. Israel seizes the Golan Heights.
1970 - Hafez al-Assad comes to power in a coup. His rule is characterised by repression and a major arms build-up.
1973 - Egypt and Syria launch surprise attack on Israel in October to try reverse defeats of 1967.
1976 - Syria intervenes in the Lebanese civil war. It maintains military presence there for next three decades and exerts significant influence on Lebanese politics.
1982 - Muslim Brotherhood uprising in the city of Hama is suppressed in a month-long siege by the military, who kill tens of thousands of civilians.
2000 - President Assad dies and is succeeded by his son Bashar.
2005 - Syrian forces withdraw from Lebanon under international pressure following assassination of Lebanese premier Rafiq al-Hariri.
2011 - Unrest inspired by "Arab Spring" uprisings. Confrontation between government and opposition soon develops into civil war that draws in world powers and triggers refugee crisis.
- Read full timeline | <urn:uuid:98b58cb4-b763-4cd2-a18e-11bfc5d51aa9> | {
"date": "2018-11-16T11:35:37",
"dump": "CC-MAIN-2018-47",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039743011.30/warc/CC-MAIN-20181116111645-20181116133645-00216.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9389820694923401,
"score": 3.125,
"token_count": 725,
"url": "https://www.bbc.co.uk/news/world-middle-east-14703856"
} |
BARNEGAT — For the third time in a year, volunteers will bend at the knees along the ecological-challenged Barnegat Bay estuary Thursday and help cleanup the watershed of trash and debris.
The initiative, expected to attract thousands, is part of a state-sponsored effort to resurrect the degraded 660-square-mile watershed in Ocean County, which for decades has been impacted by development, runoff and pollution.
The state Department of Environmental Protection-sponsored cleanup, called Barnegat Bay Blitz, begins at 8 a.m. and runs until dusk.
Volunteers will work at several locations along the watershed, including wetlands, stream banks, stormwater discharge points, school grounds, trails, docks, areas around bulkheads and the bay itself, the DEP said. The first such cleanup of the estuary was a year ago.
The bay’s degradation is the result of several factors, the DEP and scientists say, but development and the consequent runoff as well as excessive algae growth caused by nutrient pollution from nearby fertilization are among the principal reasons.
More information on the event can be found online at http://www.nj.gov/dep/barnegatbay/bbblitz.htm.
Gov. Chris Christie’s administration has said it intends to keep the bay at the top of its environmental agenda. The administration’s 10-point plan for the bay includes the closure of the Oyster Creek nuclear power plant by 2019, additional state funds for local pollution-control projects and what DEP commissioner Bob Martin has called the nation’s toughest fertilizer-use law.
But critics say the governor’s plan doesn’t go far enough or at the rate the cleanup needs to proceed to return the bay to health.
A multi-year, interdisciplinary effort by Rutgers University and the United States Geological Survey concluded earlier this year that the estuary is “in insidious ecological decline.”
Because the bay is a shallow coastal lagoon, it is exceedingly sensitive to development and resulting pollution. As a result, water quality has been declining throughout the estuary for about 20 years, the study says.
In testimony to lawmakers in August, one of the study’s lead authors, Michael Kennish, a professor of marine and coastal sciences at Rutgers University, faulted previous assessments of the estuary. He recommended that more rigorous testing be undertaken to determine if the bay is in fact “impaired” according to state standards.
If the bay is in fact determined to be impaired, the state would have the legal authority to impose restrictions and limits on the types of contaminants flowing into it. | <urn:uuid:636f7db1-753d-4a7c-9f89-d5dd4c6cf4d9> | {
"date": "2016-07-01T14:32:15",
"dump": "CC-MAIN-2016-26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402746.23/warc/CC-MAIN-20160624155002-00078-ip-10-164-35-72.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9516773819923401,
"score": 2.796875,
"token_count": 551,
"url": "http://www.nj.com/ocean/index.ssf/2012/10/volunteers_to_clean_up_barnegat_bay_estuary.html"
} |
NEW DELHI: STEM (Science, Technology, Engineering, Mathematics) is a teaching method to literate the children through act and understand approach. Students can enact the theories of science and use the mathematics formulas in various models and experiments under this program. They can learn the concepts by enjoying its impact from the practical output.
Galway Foundation has been trying to be a helping hand in the field of Education. The Foundation has been working on providing training in computer skills through its Digitalya Program for empowering people Digitally. This program is available free of cost to the public. Galway Foundation has digitally enabled over 15000 students in past 4 years.
A survey of Students by NCAER across all levels revealed that 22% students from 6th to 8th grade wants to be scientist and 60% of them are interested in studying science. However, due to no or poor access to resources and lack of exposure to institutes offering science streams, minimal competent teacher’s availability, equipment, examples, lack of willingness to shift, language barriers are major challenge for the students to pursue their dreams.
With the STEM concept, the quality of education and access learning Centres are improved, especially for students from less privileged section of society. It promotes hands-on experience, self-learning, easy and interesting concept explanation to students. It encourages the students to understand the Science & Maths basics and physics engineering concepts to apply them in their creative manner.
Team Galway Foundation met Abhishek Singh, Member of Parliament of Rajnandagaon in Chhattisgarh, in CSR Roundtable on 5th Jan’17, where he was looking for some potential CSR to drive some socio-economic development programs in Chhattisgarh. Galway Foundation was one of the NGO partner in the event. With the emerging opportunity Galway Foundation took an initiative to propose our contribution for the same alongwith many other NGO present there.
With understanding the need of Science Education and acknowledging STEM Education’s significance, the Galway Foundation has partnered with STEM Learning Pvt. Ltd. for establishing the Mini Science Centers in the 1st stage of the pilot project.
It is our responsibility to encourage our children for education so that they become empowered for creating a better India. STEM emphasis on student’s analytical skills to enhance their constructive imagination.
These Galway STEM Centers are to be launched in Chhattisgarh by next month in following schools:
- Govt. Higher Secondary School, Salhewara, Rajnandagaon
- Govt. Higher Secondary School, Kodwagodan, Kabirdham
- Govt. Higher Secondary School, Parsadih, Bilaigarh, Baloda Bazar
- Govt. Higher Secondary School, Raigarh
Galway STEM Centre is being initially embarked in school program as it is based within the school premises with 65 plug and play models, 30 backdrops, and 130 Science & Math’s concepts. The program also works on empowerment of teachers for sustainability by way of Peer lead teachers training.
Good education does not mean to study hard and get good results however it is to conquer economic prosperity, social development, self-dignity and new things for better whole mankind.
Disclaimer: The views expressed in this feature are entirely their own and does not necessarily reflect the views of India CSR Network and its Editor.
Terms & Conditions: India CSR Network does not permit other Websites/Agency to copy or reproduce or reprint the above article/feature in any form or means. | <urn:uuid:c90a3bd0-53a4-403f-b33a-02c75575b3a3> | {
"date": "2019-06-19T03:16:54",
"dump": "CC-MAIN-2019-26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998882.88/warc/CC-MAIN-20190619023613-20190619045613-00216.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9495465755462646,
"score": 3.078125,
"token_count": 735,
"url": "https://indiacsr.in/galway-foundation-establishes-4-stem-centres-in-chhattisgarh/"
} |
Artist's impression of the evolution of a hot high-mass binary star
This artist's impression shows how hot, brilliant and high-mass stars evolve. New work using ESO telescopes has shown that most such stars are in pairs. These stars are up to one million times brighter than the Sun, and evolve about one thousand times more quickly. As the stars evolve they expand slowly. The more massive brighter star expands first, until the outer layers start to strongly feel the gravitational pull of the companion, deforming the star into a teardrop shape. The companion then starts to suck material from the primary star. When the primary has been stripped from its entire hydrogen rich envelope it shrinks. At this point the secondary star is now rotating very fast and has an oblate shape. The hot compact star continues to fuse heavier and heavier elements in its centre until it explodes as a supernova. During the explosion a neutron star is born which probably escapes. The secondary is left behind alone. It swells up and becomes a red supergiant with a radius a few times larger than the orbit of the Earth around the Sun. Eventually the second star also explodes as a supernova.
Note: this video is based on simulations but is not intended to be quantitatively accurate in detail.
ESO/L. Calçada/M. Kornmesser/S.E. de Mink
About the Video
|Release date:||26 July 2012, 20:00|
About the Object
|Type:||• Milky Way : Star : Evolutionary Stage : Supernova|
• Milky Way : Star : Evolutionary Stage : Neutron Star
• Milky Way : Star : Spectral Type : O
• Milky Way : Star : Grouping : Binary
• X - Stars | <urn:uuid:bc93e52e-5f5b-4da3-99ac-a2e1a2f14103> | {
"date": "2014-04-16T08:24:59",
"dump": "CC-MAIN-2014-15",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609521558.37/warc/CC-MAIN-20140416005201-00347-ip-10-147-4-33.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.888765275478363,
"score": 3.375,
"token_count": 365,
"url": "http://eso.org/public/videos/eso1230a/"
} |
Menopause in the Ancient World
in News Headlines /
The ancient world is where we can find the origin of the word menopause. To give a brief summary from the article “Origin of the World Menopause, ” the ancient Greek roots of the term menopause are: “men” + “pauein.” The word “men” means month which is closely related to word for moon “mene” because the months were measured by the moon. The word “pauein” means to cause to cease or stop. So the Greek term pauein from which the word “pause” is derived actually does mean to stop rather than pause. But there is more to this story than menopause having Greek roots.
Even before the age of hormone therapy and menopause supplements, there was an awareness of menopause in the ancient Greek world. There is not a lot of literature on this issue probably because fewer women lived to the age of menopause, non-fertile women were probably not as inspiring to ancient Greek men, menopause not being considered disease, and the general disinterest in women. However, there is a little bit known about the Ancient Greek views.
While the average age of death in ancient Greece is not known, based on skeletal analysis 50% of women died by the age of about 34. Seeing as the average age of menopause is 51 years old, we can surmise that menopause not as many women went through menopause back in those times. In contrast to modern times, the life expectancy of women was less than those of men.
There was a general belief that the female body was inferior to the male body which reflected attitudes that women are inferior to men (go figure why women did not live as long). In most every society fertility is highly valued. Thus a fertile woman was more valued than a non-fertile one, but less valued than a male. So under these conditions it is no surprise that menopause was not a huge topic of conversation in Ancient Greek times. However, we do know a little.
Aristotle reports in the History of Animals 585b that women stopped menstruating around age 40 and some were fertile up to age 50. This is a surprising accurate assessment of menopause although today we have the average closer to 50. Neither Aristotle nor Hippocrates suggest reasons for why women go through menopause. However, they suggest women do longer have enough sustenance to sustain menstruation. Additionally menopausal women were seen to become drier or colder. This is ironic given today that women are said to go through hot flashes and night sweats- making them both wetter and colder in a sense (albeit the Greeks were right in the sense that vaginal dryness is an issue). Overall, the Greeks did not know or appreciate menopause the way it is today, but it is interesting to know their views.
Interestingly enough, the ancient Greeks did not see menopause as an abnormal condition or disease. Today while some may argue it is, the FDA for example would argue that menopause is a natural condition just like the Greeks would. | <urn:uuid:8f77dc4c-713c-4374-88dd-4a0c30af1a0c> | {
"date": "2018-01-24T09:19:20",
"dump": "CC-MAIN-2018-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084893629.85/warc/CC-MAIN-20180124090112-20180124110112-00656.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9747993350028992,
"score": 3.1875,
"token_count": 665,
"url": "http://menopausesupplement.com/category/news-headlines/"
} |
69th Infantry Regiment
New York State Militia
New York National Guard
First Regiment, Irish Brigade
Mustered in: May 9, 1861
Mustered out: August 3, 1861
Left the State: May 29, 1862
Mustered out: September 3, 1862
Left the State: June 22, 1863
Mustered out: July 25, 1863
Mustered in: July 6, 1864
Mustered out: October 6, 1864.
The following is taken from New York in the War of the Rebellion,
3rd ed. Frederick Phisterer. Albany: J. B. Lyon Company, 1912.
The 69th Regiment, located in New York city and
still in existence, was organized October 12, 1851. In 1858 it was reorganized
as an artillery regiment,
duty as infantry. The regiment has rendered the State service during the
Quarantine riots in 1858, the Draft riots, 1863, and the Quarantine disturbances
in 1892. It was reduced, December 6, 1893, to a battalion of five companies,
A, C, D, I and K. The battalion was on duty at Brooklyn during the Motormen's
strike in January, 1895. New companies were organized for the battalion
as follows: Company B, June 5, 1894; Company G, June 10, 1895; Company E, June
11, 1895, and Company F, September 7, 1900. The battalion was reconstituted
a regiment September 4, 1895. April 28, 1898, the regiment
received authority to organize as a twelve-company regiment, preparatory
its entry in the United States service, in which service it was mustered
May 19, 1898, as the 69th Regiment, N. Y. Volunteer Infantry, and mustered
January 31, 1899. Companies L and M were disbanded April 12, 1899; Company
F, February 8, 1900, and Company B, March 5, 1900. Company F was reorganized
and mustered in, May 31, 1900.
Service in the War of the Rebellion.
April 20, 1861, it was ordered to proceed
to Washington, D..C.; it left the State April 23, 1861, and May 9, 1861,
under the command of Col. Michael
Corcoran, it was mustered in the service of the United States for three
months; it served
at and near Annapolis, Md., from April 27, 1861; at and near Washington
and in the 3d Brigade, 1st Division, Army North-East Virginia from May, 1861;
it was mustered out in New York city, August 3, 1861.
On its return from
this service a large majority of the regiment volunteered for a period of three
years, forming the nucleus of the 69th Volunteers.
May 26, 1862, the regiment,
then commanded by Col. James Bagley, was again ordered to Washington
and was mustered in the service of the United States
for three months; it left the State May 29, 1862; served in the defenses
of Washington, and was mustered out September 3, 1862, at New York city.
the return of the regiment from this service again a large portion of it entered
the volunteer service as part of an organization known as the 69th
Regiment National Guard Artillery, but later as the 182d Volunteers.
18, 1863, the regiment was ordered to Harrisburg, Pa., for a service of thirty
days. It left the State June 22, 1863, commanded by Colonel Bagley;
served at Baltimore, Md., in the 2d Separate Brigade, Middle Department,
Corps, and was mustered out of the United States service July 25, 1863, at
New York city.
July 6, 1864, the regiment, still commanded by Colonel Bagley,
was again mustered in the United States service, but for a period of ninety
the harbor of New York, and was mustered out October 6, 1864.
In its service
in 1861, the regiment lost, killed in action, 1 officer, 37 enlisted men;
died of wounds received in action, 2 enlisted men; died of
disease, etc., 5 enlisted men; in its service in 1864, died of disease, 2 officers,
1 enlisted man; total, 3 officers, 45 enlisted men; aggregate, 48.
part in the advance into Virginia and occupation of Arlington Heights, May
24, 1861; in a skirmish at Blackburn's Ford, July 18, 1861; and in the
battle of Bull Run, Va., July 21, 1861, where it lost, killed, 1 officer,
36 enlisted men; wounded, 1 officer, 59 enlisted men; captured 3 officers,
enlisted men; aggregate, 192.
The following is taken from Third Annual Report of the Bureau
of Military Statistics of the State of New York, Albany: [The Bureau],
(C. Wendell), 1866.
SIXTY-NINTH REGIMENT, N. Y. S. MILITIA.
The Sixty-ninth regiment was organized in the city of New York, and is in the
Fourth brigade, First division of the New York State Militia. It departed
from the State on the 23d of April, 1861—Strength: 1,050 men.
The followimg were the field officers :
Lieutenant-Colonel—Robert Nugent. Major—James Bagley.
The services which were rendered by the Sixty-ninth were of a most valuable
character, and as a representative regiment of a large class of our metropolitan
population, the promptness with which its ranks were filled, even to overflowing,
and the alacrity with which the regiment moved to the scene of expected hostilities,
augured at the time most favorably for the success of the Union cause, and
proved how deep seated in the hearts of all Northern citizens, whether native
or adopted, was the love of the nation.
Some time before the Sixty-ninth offered its services, Colonel Corcoran had
been summoned before a court-martial for disobedience of orders in not
appearing with his command on the occasion of the reception of the Prince of
Wales some months before in the city of New York. His popularity With his countrymen,
and especially with his regiment, rendered it important that he should take
the command at once; and on the morning of April 20th, Governor Morgan received
a request to "quash at once the court martial on Col. Corcoran and restore
him to his command." This was followed by this dispatch; "The Sixty-ninth
Irish regiment is ready for service anywhere; can the court-martial be discontinued,
and thei regiment be ordered into service?" The Governor at once directed
the discontinuance of the court, and that the charges against the Colonel be
dismissed, that he be released from arrest and the court dissolved. Ho at once
issued a call for volunteers. Up to Monday night 6,500 names had been
enrolled in his regiment. On Tuesday morning the Sixty-ninth was ordered to
assemble at the armory to receive their equipments. It was not until 2 o'clock
in the afternoon that all the men were equipped, after which the companies
were formed, and accompanied by the enthusiastic crowd, marched to Great Jones
street, from which point the regiment was to start. For several hours there
had been an assemblage of men, women and children in Broadway, mostly Irish,
which had driven every vehicle from that thoroughfare. Several Irish civic
societies, comprising about 2,000 persons, with waving banners, had formed
in procession in Broadway, as an escort, and patiently waited for the regiment
to move. About 3 o'clock the order to march was received, and the entire procession,
civic and military, moved down Broadway. The march was a triumphant one, and
Colonel Corcoran, who arose from a bed of sickness to accompany his regiment,
had to be protected by the police from the friendly crowd which pressed upon
him. After the presentation of a beautiful stand of national colors by Mrs.
Judge Daly, the Sixty-ninth embarked at half-past six on board the James Adger,
After its arrival at Washington, the Sixty-ninth was stationed at Georgetown
college. Subsequently on the 30th of May, they removed to a new camp on Arlington
Heights, where defensive works had been erected, when the raising of the stars
and striped and naming of the fort (Corcoran) were celebrated with appropriate
ceremonies. Near sunset, Colonel Corcoran having assembled all the troops,
not on duty, numbering over thirteen hundred, introduced Colonel Hunter, of
the Third cavalry, United States Army, who had just been assigned the command
of the brigade of the Aqueduct, consisting of the Fifth, Twenty-eighth and
Sixty-ninth New York militia regiments, and the detachments in the vicinity.
Colonel Hunter was received with great enthusiasm, and Colonel Corcoran made
some patriotic allusions to the flag, which were loudly cheered. Captain Meagher
having been called upon made a brief but high-toned and patriotic address,
showing the devotion Irishmen should bear to that flag which brought succor
to them in Ireland, and to which, upon landing in this country, they had sworn
At the time of the battle of Bull Run, the, Sixty-ninth served in the Third
brigade (Sherman's), First division (Tyler's). The regiment behaved with
great gallantry. Its loss was 38 killed, 59 wounded, and 95 missing, making
a total of 192. Among the captured was Colonel Corcoran. The Third brigade
was composed of the Sixty-ninth and Seventy-ninth New York Militia, the Thirteenth
New York Volunteers and the Second Wisconsin, with a company of artillery under
Captain Ayres., and was in the hottest part of the tight, all suffering severely.
Colonel Sherman's brigade, before going into action, made a junction with
Hunter's division, and formed in the rear of Colonel Porter's brigade.
It was just before making this junction that lieutenant-Colonel Haggerty, of
the Sixty-ninth, in attempting to intercept the retreat of a party of the enemy,
was shot, and fell dead from his horse. The fight which followed was near the
Stone Bridge, crossing Bull Run, at which the brigade first took its position.
It crossed the stream, with the exception of Ayres' battery, at a ford which
had been indicated to Colonel Sherman, by observing, early in the day, a horseman
of the enemy cross at the same point. The crossing was made in obedience to
orders from the division commander that the brigade should go to the assistance
of Colonel Hunter, then en-gaged with the enemy. Immediately after crossing,
the brigade ascended the steep bluff opposite, with its infantry, meeting with
no opposition. Shortly after ascending the bluff, Colonel Sherman received
orders from General McDowell to join in the pursuit of the enemy, who were
falling back to the left of the road by which the army had approached from
Sudley Springs. Colonel Sherman says: "Placing Colonel Quinby's regiment
of rifles (Thirteenth New York Volunteers) in front in column by division,
I directed the other regiments, to follow in the order of the Wisconsin
Second, New York Seventy-ninth, and New York Sixty-ninth. These regiments attacked
the enemy successively, the Sixty-ninth being the last engaged." The part
it took in the fight is thus described in the official report: After the Wisconsin
regiment had been repulsed a second time " the New York Sixty-ninth
had closed up and in like manner it was ordered to cross the brow of the hill
and drive the enemy from cover. It was impossible to get a good view of the
ground. In it there was one battery of artillery, which poured an incessant
fire upon an advancing column, and the ground was irregular with small
clusters of pines, affording shelter, of which the enemy took good advantage.
The fire of rifles and musketry was very severe. The Seventy-ninth New York,
headed by its Colonel (Cameron) charged across the hill, and for a short time
the contest was severe. They rallied several times under fire, but finally
broke and gained the brow of the hill. This left the field open to the New
York Sixty-ninth, Colonel Corcoran, who in his turn led his regiment over the
crest, and had in full open view the ground so severely contested. The firing
was very severe, and the roar of cannon, musketry and rifles incessant. It
was manifest the enemy were here in great force, far superior to us at that
point. The Sixty-ninth held the ground for sometime, but finally fell back
in disorder." Colonel Corcoran was captured during the retreat. Colonel
Sherman says: " On the ridge to the west we succeeded in partially re-forming
the regiment, but it was manifest they would not stand, and I directed
Colonel Corcoran to move along the ridge to the rear. General McDowell was
there in person, and used all possible efforts to re-assure the men. By the
active exertions of Colonel Corcoran an irregular square was formed against
the cavalry, which was then seen to issue from the position from which our
men had been driven, and the retreat was commenced towards that ford of Bull
Run by which the field of battle had been approached." Colonel Corcoran
was missing immediately Astor the cavalry charge, near the building used as
Shortly after the battle (on the 27th of July) the Sixty-ninth returned to
New York and was mustered out of the service.
69th NY State Militia Prince of Wales Flag
See here for a brief history of the State Militia / National Guard.
This is meant to be a comprehensive list. If, however, you know of a resource that is not listed below, please send an email to [email protected] with the name of the resource and where it is located. This can include photographs, letters, articles and other non-book materials. Also, if you have any materials in your possession that you would like to donate, the museum is always looking for items specific to New York's military heritage. Thank you.
69th Regiment Association. www.sixtyninth.net/index.html
Athearn, Robert G. Thomas Francis Meagher: an Irish revolutionary in America. Boulder: University of Colorado Press, 1949.
Ballard, Ted. Battle of First Bull Run. Washington, D.C. Center of Military History, United States Army, 2004.
Boyle, Frank A. A party of mad fellows : the story of the Irish regiments in the Army of the Potomac. Dayton, Ohio: Morningside House, Inc, 1996.
Bruce, Susannah U. "Remember Your Country and Keep Up Its Credit : Irish Volunteers and the Union Army." The Journal of Military History 69:2 (April 2005) 331-359.
Chapman, Frederick T. and Frederick P. Todd. "69th Regiment,
N.Y.S.M. at the First Battle of Bull Run, 21 July, 1861." Military Collector
Clarke, Joseph I.C. "The Ballad of the Sixty-ninth." Lyrics
Collins F. "Battle of Bull Run." [United States : s.n.,] 1861-1865.
Verse in seven stanzas; first line: Our gallant soldiers they are going to leave their friends to mourn./ Lyrics only./ Other editions attributed to F. Collins./ Text within ornamental border.
Corcoran, Michael. The captivity of General Corcoran,
the only authentic and reliable narrative of the trials and sufferings endured
during twelve months imprisonment in Richmond and other Southern cities,
by Brig.-General Michael Corcoran, the hero of Bull run. Philadelphia:
Barclay & co., 1862.
Coyle, John G. "General Michael Corcoran." Journal
of the American Irish historical society XIII (1913/ 14) 109-26.
Demeter, Richard. The fighting 69th : a history. Pasadena, CA: Cranford Press, 2002.
Fitzgerald, James. "The Sixty-ninth regiment, New York
city." Journal of the American Irish historical society IX (1910)
Glynn, Gary. "Meagher of the Sword." America's Civil War (September 1995) 54-61.
Halpine, Charles Graham. Baked meats of the funeral,
a collection of essays, poems, speeches, histories and banquets, by Private
Miles O'Reilly, late of the 47th reg't New York volunteer infantry.
Collected, revised, and edited, with the requisite corrections of punctuation,
spelling, and grammar, by an ex-Colonel of the Adjutant-general's department,
with whom the Private formerly served as Lance Corporal of orderlies. New
York: Carleton, 1866.
Note: Halpine mustered in 69th infantry as Lieutenant, unassigned, April 20, 1861; Aide de-Camp to Colonel Hunter; mustered out with Regiment, August 3, 1861.
Halpine, Charles Graham. The life and adventures, songs,
services, and speeches of Private Miles O'Reilly (47th regiment, New York
volunteers). "The post of honor is the Private's station." With
comic illustrations by Mullen. From the authentic records of the New York
herald. New York, Carleton, 1864.
Note: Halpine mustered in 69th infantry as Lieutenant, unassigned, April 20, 1861; Aide de-Camp to Colonel Hunter; mustered out with Regiment, August 3, 1861.
Halpine, Charles Graham. "Two songs of '61." Magazine
of history XXIII (New York 1916) 241-5.
Loback, Tom. Civil War flags of the Irish Brigade and others in the 69th Regiment's Armory collection. S.l. s.n, 1999.
Mahon, John, 1930. New York's Fighting Sixty-ninth : a regimental history of service in the Civil War's Irish Brigade and the Great War's Rainbow Division. Jefferson, N.C. McFarland, 2004.
McLaughlin, James H. James Haggerty of Tír Conaill : Irish patriot, American hero : on the occasion of the unveiling of a memorial, First Calvary Cemetery, Woodside, New York, May 30, 1992 ... . [New York] Donegal Association? 1992.
Meagher, Thomas Francis. The last days of the 69th in
Virginia, a narrative in three parts, by Thomas Francis Meagher, Captain,
Company K ("Irish zouaves"). New York: "Irish American," 1861.
Moshier, James. "Affinity for Controversy : Wherever Dan Sickles went, controversy soon flared, even at Gettysburg." Military History (June, 1990) 58 ff.
O'Flaherty, Patrick Daniel. The history of the sixty-ninth regiment of the New York State Militia 1852 to 1861 . Ann Arbor, Mich. University Microfilms, 1985, ©1964. Ph. D. Dissertation.
Pohanka, Brian C. James McKay Rorty : an appreciation. s.n. 1993.
Powers, Kenneth H. "A Bit of the Irish: The 69th Regiment
of New York." National Guard. (March 1998) pp. 22-24.
Reynolds, Lawrence. A poetical address: delivered by Doctor Lawrence Reynolds, 63d Regiment, N.Y.S.V., before the Irish Brigade, in camp, near Falmouth, Va., on St. Patrick's Day, March 17, 1863 . Albany: Weed, Parsons and Co. : Michael O'Sullivan, 1863.
Items in the museum collection are in bold.
Back to Civil War Infantry
New York State Division of Military and Naval Affairs: Military History
August 31, 2011 | <urn:uuid:fcbd3f9e-d679-4154-97f3-c18509ebc045> | {
"date": "2016-12-08T21:57:38",
"dump": "CC-MAIN-2016-50",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542657.90/warc/CC-MAIN-20161202170902-00264-ip-10-31-129-80.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9558699131011963,
"score": 2.90625,
"token_count": 4349,
"url": "http://dmna.ny.gov/historic/reghist/civil/infantry/69thNYSM/69thInfNYSMMain.htm"
} |
Think pounds of nutrients instead of tons of hay for winter needs
September 5, 2014
PINE BLUFF, Ark. – When ranchers buy hay, they usually think of how many tons they need to get their livestock through the winter when they should be thinking of the pounds of nutrients they are buying, said David Fernandez, Cooperative Extension Program livestock specialist at the University of Arkansas at Pine Bluff.
Ranchers can feed their animals 33 pounds of pine straw per day and meet their need to eat something, but that will not meet their nutritional needs, Fernandez said. Most hay producers don’t test their hay, so ranchers can’t know whether or not they are buying enough nutrients for the animals’ needs.
There is one way to find out – hay testing. Take a core sample from several bales using a hay probe, available in Arkansas at your county Extension office. Put the sample in a quart size bag and take it to your county Extension office. Remember to keep it out of the sun so the forage in the sample does not become bleached or “cooked” on the dashboard, he said. Dr. Fernandez. The cost of a hay analysis is $18; the results of the hay analysis will tell you how many pounds of nutrients are in each ton of hay.
Then, look at your animals and their nutritional needs. Typically, producers are most concerned about TDN, a measurement of the energy in the feed, and crude protein, or CP. An 1,100-pound pregnant cow needs about 11 pounds of TDN and 1.5 pounds of CP each day. If your hay analysis shows your hay is 60 percent TDN and 9 percent CP and your cow eats 25 pounds of hay each day, she will get 13.2 pounds of TDN and 1.98 pounds of CP. Your hay will more than meet her needs.
Keep in mind that hay is typically 88 percent dry matter, and TDN and CP are reported as percent of dry matter, Fernandez said. In the above example, 25 (amount consumed) x 88 percent (dry matter) x 60 percent (TDN) = Amount of TDN in the hay.
What if your hay analysis shows 45 percent TDN and 6 percent CP? If so, she will only get 9.9 pounds of TDN and 1.32 pounds of CP which is not enough to meet her nutritional needs. You may have paid the same amount of money for each ton, but you did not buy as many nutrients in the second example, he said.
When feeding poor quality hay, you have to supplement your livestock with grain, pellets or cubes. A cow eating this hay needs an extra 1.1 pounds of TDN and a quarter pound of CP daily to meet her needs.
For more details on hay testing, see Extension fact sheet FSA 3114 “Test Hays for Nutrition Composition Before Feeding” by Shane Gadberry and Mark Keaton. To learn how to substitute supplements for hay, get FSA 3037 “Substitution Grain for Hay in Beef Cow Diets” by Gadberry and Paul Beck. If you have questions, contact Dr. Fernandez at (870) 575-7214 or [email protected].
The Arkansas Cooperative Extension Program offers its programs to all eligible persons regardless of race, color, sex, gender identity, sexual orientation, national origin, religion, age, disability, marital or veteran status, genetic information, or any other legally protected status, and is an Affirmative Action/Equal Opportunity Employer.
By Carol Sanders, writer/editor
UAPB School of Agriculture, Fisheries and Human Sciences | <urn:uuid:57ef03ef-dd62-41f8-b7c9-52ccb9ba2049> | {
"date": "2018-12-09T19:04:58",
"dump": "CC-MAIN-2018-51",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823009.19/warc/CC-MAIN-20181209185547-20181209211547-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9227262139320374,
"score": 2.890625,
"token_count": 754,
"url": "https://www.uaex.edu/media-resources/news/september2014/09-05-2014-UAPB-Winter-Nutrients.aspx"
} |
Expected Family Contribution (EFC)
The U.S. Department of Education uses the data on your FAFSA to calculate an Expected Family Contribution (EFC). The EFC is an indicator of your family's financial strength. Family income, assets, household size, number in college, and parent age (if applicable) are considered in the federal methodology for calculating EFC. The Financial Aid Office will subtract your EFC from the total cost of attendance. The result is your financial need.
The EFC is not the amount of money that your family must provide. Rather, you should think of the EFC as an index that colleges use to determine how much and what types of financial aid (grants, loans, or work-study) you would receive if you were to attend that school.
Your application results are transmitted to the school(s) listed on your FAFSA, and the school(s) uses the EFC to determine the amount and type of financial aid that you are eligible to receive from both state and federal programs.
An estimate of your Expected Family Contribution can be calculated by clicking the link below. Please note that this is only an EFC estimate and is not an estimate of aid eligibility. No financial information will be sent to the Department of Education from this link. | <urn:uuid:eb615895-5e8b-48d4-b78e-7b3c343a0c20> | {
"date": "2014-03-08T10:54:11",
"dump": "CC-MAIN-2014-10",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999654330/warc/CC-MAIN-20140305060734-00006-ip-10-183-142-35.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9580767154693604,
"score": 2.71875,
"token_count": 271,
"url": "http://www.uwgb.edu/financial-aid/after-fafsa/efc.asp"
} |
Nature has two papers out about something called “Behçet’s disease.” It has apparently also been termed the “Silk Road Disease”, because of its associations with populations connected to the Central Eurasian trade networks.Though described by Hippocrates 2,500 years ago, apparently it was “discovered” only in the 20th century by a Turkish physician. The reason that that might be is obvious; the prevalence of Behçet’s disease is far higher in Turkey than any other nation. Two orders of magnitude difference between Northwest Europeans and Turks. East Asian populations are somewhere between Europeans and Turks, while the coverage of Inner Asia itself is thin (the first case diagnosed in Mongolia was in 2003). Additionally, the relatively similar frequency in Morocco and Iran, despite the latter nation being strong influenced by Turkic migration (25-30% of Iranian citizens are ethnically Turk), and the former not at all, leads to me wonder if there may be convergence or parallelism, rather than common ancestry, at work (or, more likely, a combination of both). The relationship between Morocco and Japan to the Silk Road in a direct fashion is tenuous at best. These were two polities which managed to be just outside the maximum expanse of Turanian empires. The Japanese famously repulsed the Mongol invasion ordered by Kublai Khan, while the Arab rulers of Morocco never fell under Ottoman control.And the early documentation by Hippocrates makes me wonder at the frequency of the disease in Greece itself. Greeks presumably contributed to the ancestry of modern Anatolian Turks, but it is far less likely because of the nature of the Ottoman system that Turks would have contributed to the ancestry of Greeks. I can’t find prevalence data for Greece, but it may be an open question in what direction the disease spread along the Silk Road.
But studies like these are nice because they are steps to overcoming one of the main issues with genome-wide associations: they use a narrow population sample, and so are not of necessary world wide relevance. Remember that even if a risk allele is not the direct cause of the disease, if it is closely associated with that alleles which are, it is of diagnostic utility. At least within that particular population. This study used groups from western and eastern Eurasia to check the power of particular single nucleotide polymorphisms (SNPs) to predict disease risk. First, Genome-wide association studies identify IL23R-IL12RB2 and IL10 as Behçet’s disease susceptibility loci:
Behçet’s disease is a chronic systemic inflammatory disorder characterized by four major manifestations: recurrent ocular symptoms, oral and genital ulcers and skin lesions1. We conducted a genome-wide association study in a Japanese cohort including 612 individuals with Behçet’s disease and 740 unaffected individuals (controls). We identified two suggestive associations on chromosomes 1p31.3 (IL23R–IL12RB2, rs12119179, P = 2.7 × 10−8) and 1q32.1 (IL10, rs1554286, P = 8.0 × 10−8). A meta-analysis of these two loci with results from additional Turkish and Korean cohorts showed genome-wide significant associations (rs1495965 in IL23R–IL12RB2, P = 1.9 × 10−11, odds ratio = 1.35; rs1800871 in IL10, P = 1.0 × 10−14, odds ratio = 1.45).
Behçet’s disease is a genetically complex disease of unknown etiology characterized by recurrent inflammatory attacks affecting the orogenital mucosa, eyes and skin. We performed a genome-wide association study with 311,459 SNPs in 1,215 individuals with Behçet’s disease (cases) and 1,278 healthy controls from Turkey. We confirmed the known association of Behçet’s disease with HLA-B*51 and identified a second, independent association within the MHC Class I region. We also identified an association at IL10 (rs1518111, P = 1.88 × 10−8). Using a meta-analysis with an additional five cohorts from Turkey, the Middle East, Europe and Asia, comprising a total of 2,430 cases and 2,660 controls, we identified associations at IL10 (rs1518111, P = 3.54 × 10−18, odds ratio = 1.45, 95% CI 1.34–1.58) and the IL23R–IL12RB2 locus (rs924080, P = 6.69 × 10−9, OR = 1.28, 95% CI 1.18–1.39). The disease-associated IL10 variant (the rs1518111 A allele) was associated with diminished mRNA expression and low protein production.
Observe that the SNPs differ between the two studies. Here are the tables which show the SNPs, their odds ratios and statistical significance for the first and second paper respectively.
In the second paper they actually did an analysis of the effect of the disease associated allele at one of the SNPs, rs1518111. The A allele is disease associated.
Finally, the last paragraphs to the two papers:
We report here a GWAS identifying two new susceptibility loci for Behçet’s disease; these loci include interleukin and interleukin receptor genes, which are central in immune response. The quantitative alteration of these cytokines (and others in the same cascade) could help explain in part the complex pathophysiology of Behçet’s disease and suggest new therapeutic avenues.
In summary, we report a GWAS and meta-analysis identifying common variants in IL10 and at the IL23R–IL12RB2 locus that predispose to Behçet’s disease. Our study also supports the association of HLA–B*51 as the primary association to Behçet’s disease within the MHC region and reveals another independent MHC Class I association telomeric to HLA-B. Expression studies indicate that the disease-associated IL10 variants are associated with decreased expression of this anti-inflammatory cytokine. This may suggest a mechanism, possibly in concert with commensal microorganisms…that results in an inflammation-prone state that increases susceptibility to Behçet’s disease.
The relationship to commensal microorganisms may be pointing to a major reason why the frequency of the illness seems to decrease as one moves north. This could be a case where genetically susceptibilities toward expression of the illness interact with environmental factors. One could imagine, for example, that the harsh cold and light population of Inner Asia may have incubated particular susceptibilities which never manifested themselves because of the environment. But with the shift toward the denser and moister climes of western and eastern Eurasia the combination of genes and environment resulted in the emergence of the disease.
With that said, again, I’m curious as to the nature of the SNPs, and the phylogenetics of the disease causing mutations. Do they derive from common mutants? Implying then that common ancestry via the Silk Road was critical. If the genetic variation around the mutants implies common descent then the Silk Road may have been critical in the spread of the risk alleles, but it would still be an open question whether they flowed from east to west or west to east, contingent on patterns of genetic variation. Or, are they independent mutations? Perhaps they’re side effects of adaptations?
Citation: Remmers EF, Cosan F, Kirino Y, Ombrello MJ, Abaci N, Satorius C, Le JM, Yang B, Korman BD, Cakiris A, Aglar O, Emrence Z, Azakli H, Ustek D, Tugal-Tutkun I, Akman-Demir G, Chen W, Amos CI, Dizon MB, Kose AA, Azizlerli G, Erer B, Brand OJ, Kaklamani VG, Kaklamanis P, Ben-Chetrit E, Stanford M, Fortune F, Ghabra M, Ollier WE, Cho YH, Bang D, O’Shea J, Wallace GR, Gadina M, Kastner DL, & Gül A (2010). Genome-wide association study identifies variants in the MHC class I, IL10, and IL23R-IL12RB2 regions associated with Behçet’s disease. Nature genetics PMID: 20622878
Citation: Mizuki N, Meguro A, Ota M, Ohno S, Shiota T, Kawagoe T, Ito N, Kera J, Okada E, Yatsu K, Song YW, Lee EB, Kitaichi N, Namba K, Horie Y, Takeno M, Sugita S, Mochizuki M, Bahram S, Ishigatsubo Y, & Inoko H (2010). Genome-wide association studies identify IL23R-IL12RB2 and IL10 as Behçet’s disease susceptibility loci. Nature genetics PMID: 20622879 | <urn:uuid:34aef90b-6379-4b08-a2ee-5f445c386977> | {
"date": "2019-07-17T05:19:32",
"dump": "CC-MAIN-2019-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195525046.5/warc/CC-MAIN-20190717041500-20190717063500-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9215723872184753,
"score": 2.828125,
"token_count": 1928,
"url": "http://blogs.discovermagazine.com/gnxp/2010/07/diseases-of-the-silk-road/"
} |
Today, Canadians celebrate DNA Day – the anniversary of the major scientific discovery of DNA’s double helix structure, published in Nature by James Watson and Francis Crick in April 1953. Other scientists, including Rosalind Franklin and Maurice Wilkins, also contributed to this discovery.
The discovery – arguably one of the most important of the 20th century – answered a fundamental mystery about how living organisms pass genetic instructions from generation to generation, and eventually enabled later researchers to understand the genetic code.
DNA Day also marks the April 2003 completion of the Human Genome Project, an international scientific research project allowing us to read nature’s complete genetic blueprint for creating a human being.
Canadian genomics researchers are building on these foundational discoveries and their advances are helping to solve complex biological challenges across sectors as diverse as health, agriculture and agri-food, forestry, fisheries and aquaculture, environment, energy and mining. The results are saving lives and combating disease, improving food safety and production to feed the world’s growing population, defending our natural resources against the effects of climate change, and enabling us to mitigate environmental damage from resource extraction.
Moreover, genomics is equipping Canadian businesses with cutting-edge science and technologies that are driving economic growth, improving competitiveness, increasing productivity and creating high-quality jobs in Canada.
Genome Canada is proud to work in collaboration with the federal government, Canada’s six regional Genome Centres, and many partners from the public, private and not-for-profit sectors to drive cutting-edge genomics research and innovation for the benefit of all Canadians now and into the future.
To learn more about Genome Canada and our funded research, visit www.genomecanada.ca. Also, explore a plethora of information and resources about genomics presented by the North American travelling exhibit Genome: Unlocking Life’s Code at https://unlockinglifescode.org/. | <urn:uuid:f83de9db-be64-4ec8-816c-a579aba2f849> | {
"date": "2019-01-16T05:43:55",
"dump": "CC-MAIN-2019-04",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583656897.10/warc/CC-MAIN-20190116052151-20190116074151-00136.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9144907593727112,
"score": 3.46875,
"token_count": 396,
"url": "https://www.genomecanada.ca/en/news/dna-day-celebrates-historic-1953-discovery-dnas-double-helix"
} |
- Open Access
Microbiome and mental health in the modern environment
© Deans. 2016
- Received: 15 January 2016
- Accepted: 23 June 2016
- Published: 27 June 2016
A revolution in the understanding of the pathophysiology of mental illness combined with new knowledge about host/microbiome interactions and psychoneuroimmunology has opened an entirely new field of study, the “psychobiotics”. The modern microbiome is quite changed compared to our ancestral one due to diet, antibiotic exposure, and other environmental factors, and these differences may well impact our brain health. The sheer complexity and scope of how diet, probiotics, prebiotics, and intertwined environmental variables could influence mental health are profound obstacles to an organized and useful study of the microbiome and psychiatric disease. However, the potential for positive anti-inflammatory effects and symptom amelioration with perhaps few side effects makes the goal of clarifying the role of the microbiota in mental health a vital one.
- Mental health
Mental health problems such as affective disorders, anxiety disorders, and psychotic disorders are not just diseases caused by psychological stressors added to genetic vulnerability, but rather full-body, inflammatory conditions related to the immune state [1–4]. In this light, the role of the microbiome, 100 trillion or so organisms that provide a barrier and a profound effect on our immune regulatory function, most notably in the large intestine , becomes immensely important. The state of our microbiome affects not only diseases of the gut but also autoimmune disease, obesity [6, 7], and even how well the liver metabolizes alcohol . While every person’s microbiome is unique, generally healthy people share certain species, diversity, and abundance. It is clear that the microbiomes of humans living in the developed world are far different from those of hunter-gatherers living more as our ancestors did . Are these observed differences in microbiota a surrogate marker for modern pressures exerted on humans? The available evidence would suggest that microbiota and mental health be viewed through the lens of physiological anthropology in the context of evolutionary medicine. Researchers have taken these findings to explore the impact of the microbiome on mental health .
The gut-brain connection hinges on how the microbiome influences the hypothalamic-adrenal-pituitary axis in a similar way to psychological stress, with pathogenic species of bacteria interacting with the immune and endocrine systems to create an inflammatory cascade with an increase in sympathetic reactivity . These inflammatory species also have direct communication with the brain via self-produced neurotransmitters and the vagus nerve receptors in the gut, with mostly unknown significance [12, 13]. Probiotics or anti-inflammatory species, the most studied being the Lactobacillus and Bifidobacteria, can act to suppress this immune and sympathetic reaction. Demonstrations in both animal and human studies have shown that the administration of beneficial microbes can reduce both inflammation and anxiety or behavioral signs of distress [14–16]. These agents work on the same system but in a different location as chemical antidepressants, suggesting possibilities for a new “psychobiotic” class of low-side effect anti-inflammatory, anti-anxiety, and antidepressant.
The studies thus far are promising though small in scale and broad in scope. Rodent behavior and levels of anxiety are influenced by probiotics, prebiotics (types of fiber that act as food for the microbiome), and fecal transplants . In humans, decreased negative, ruminative thoughts have occurred in randomized controlled trials after a month on probiotics , while prebiotics and the administration of pseudocommensals (microbial species that do not live in the gastrointestinal tract but due to presence in water and soil have had continuously passed through the human gut in evolutionary history) have decreased anxiety [20, 21]. The rates of ADHD or autistic spectrum disorders in young teenagers supplemented with probiotics as infants dropped to 0 % compared to controls in one fascinating study . In another paper, researchers were able to determine the patients with and without depression with 100 % sensitivity and 97 % specificity just by looking at the microbial genomes from fecal swabs . The administration of antibiotics with antidepressants had a significant effect on psychotic depression compared to antidepressants alone in a small group of inpatients. In addition, major differences have been found between the oral microbiome of people with schizophrenia vs. controls , and, not surprisingly, the microbiome of people with anorexia is quite different during disease behavior than in recovery . Further studies postulate a role between but microbiota and Alzheimer’s dementia .
Having established there are some fascinating links between the microbiome and mental health, the challenges to finding safe, actionable clinical data are profound. One obvious obstacle is the sheer diversity of diagnoses of mental illness, ameliorated somewhat by the goal of addressing underlying systemic inflammation with microbiome manipulation. That goal may not be as simple as it sounds, given that the microbiome is a changeable entity reacting to local stress, food intake, sleep, and baseline conditions. One microbiome may be ideal for one person and not for another with a different diet or situation. One-size-fits-all probiotics may not show us the best clinical effect. A more bespoke approach based on microbiome sequencing and filling gaps of known guardian species such as Bifidobacterium longum and Akkermnansia muciniphila may be more effective. We need to also establish the benefit/risks of low vs. high-dose probiotic supplementation and the utility of giving prebiotic fibers and probiotics together.
Food intake is a massive confounder to any study of the microbiome. Numerous studies show more traditional, whole foods are superior for mental health . While optimal levels of vitamins, minerals, and certain fatty acids are key for brain functioning, these traditional diets also tend to be higher in certain fibers and prebiotics whose benefits for the microbiome could explain much of the effect of these diets on mental health [30, 31]. Clearly, we need to do more work and use the information from studies designed to more carefully discern the effects of diet, prebiotics, and probiotics on general health. Numerous one-off studies of various probiotic brands for mental disorders will leave us in a similar state to those trying to glean some wisdom from the research on omega 3 fatty acids, confused and underwhelmed.
In addition, attention must be paid to another long-term modifier of the immune system in human evolutionary history, ignored in many “psychobiotic” studies, the eukaryotic helminths [32, 33]. Humans have coevolved with helminthic infection for the entire evolutionary history of our species, and recent times are striking for their absence. Since the early 1900s such common infections such as hookworms and Enterobius vermicularis in the developed world have decreased tremendously [34, 35] with numerous possible downstream effects on long-term immunity and host behavior. Parasitic contribution falls alongside that of the commensal microbiome, and helminths deserve a chair at the table of microbiome research in mental health. Helminths have been used experimentally for treatment of autoimmune diseases such as Crohn’s disease and multiple sclerosis with some interesting case reports of psychiatric disorders (including anxiety disorders, affective disorders, and autistic spectrum disorders) co-occuring with the autoimmune disease remitting as well . It would be prudent to study helminthic therapies for neuropsychiatric conditions, particularly in those conditions such as OCD or some types of psychosis where there is a suspected autoimmune contribution [38, 39].
Microbiome manipulation is an evolving tool in the armamentarium to fight mental illness. We must temper enthusiasm and marketing of any particular probiotic strain or brand with a large helping of wisdom and experience already gleaned from the many researchers becoming experts in this relatively new field of human medicine. Multidisciplinary communication among medical researchers, anthropologists, and physiologists can help us to modulate our modern environment to ameliorate the need for psychobiotics in the first place.
The author declares that she has no competing interests.
Open AccessThis article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The Creative Commons Public Domain Dedication waiver (http://creativecommons.org/publicdomain/zero/1.0/) applies to the data made available in this article, unless otherwise stated.
- Berk M, Williams LJ, Jacka FN, O’Neil A, Pasco JA, Moylan S, Allen NB, Stuart AL, Hayley AC, Byrne ML, Maes M. So depression is an inflammatory disease, but where does the inflammation come from? BMC Med. 2013. doi:10.1186/1741-7015-11-200.Google Scholar
- Leonard B, Maes M. Mechanistic explanations how cell-mediated immune activation, inflammation and oxidative and nitrosative stress pathways and their sequels and concomitants play a role in the pathophysiology of unipolar depression. Neurosci Biobehav Rev. 2012. doi:10.1016/j.neubiorev.2011.12.005.PubMedGoogle Scholar
- Kapczinski F, Dal-Pizzol F, Teixeira AL, Magalhaies PV, Kaur-Sant’Anna M, Klamt F, Moreira JC, de Bittencourt Pasquali MA, Fries GR, Quevedo J, Gama CS, Post R. Peripheral biomarkers and illness activity in bipolar disorder. J Psychiatr Res. 2011. doi:10.1016/j.jpsychires.2010.05.015.Google Scholar
- Noto C, Ota VK, Santoro ML, Gouvea ES, Silva PN, Spindola LM, Cordeiro Q, Bressan RA, Gadelha A, Brietzke E, Belangero SI, Maes M. Depression, cytokine, and cytokine by treatment interactions modulate gene expression in antipsychotic naïve first episode psychosis. Mol Neurobiol. 2015. doi:10.1007/s12035-015-9489-3.Google Scholar
- Nagpal R, Kumar M, Yadav AK, Hemalatha R, Yadav H, Marotta F, Yamashiro Y. Gut microbiota in health and disease: an overview focused on metabolic inflammation. Benef Microbes. 2015. doi:10.3920/bm2015.0062.PubMedGoogle Scholar
- Ridaura VK, Faith JJ, Rey FE, Cheng J, Duncan AE, Kau AL, Griffin NW, Lombard V, Henrissat B, Bain JR, Muehlbauer MJ, Ilkayeva O, Semenkovich CF, Funai K, Hayashi DK, Lyle BJ, Martini MC, Ursell LK, Clemente JC, Van Treuren W, Walters WA, Knight R, Newgard CB, Heath AC, Gordon JI. Cultured gut microbiota from twins discordant for obesity modulate adiposity and metabolic phenotypes in mice. Science. 2013. doi:10.1126/science.1241214.PubMedPubMed CentralGoogle Scholar
- Tilg H, Kaser A. Gut microbiome, obesity, and metabolic dysfunction. J Clin Invest. 2011. doi:10.1172/JCI58109.PubMedPubMed CentralGoogle Scholar
- Chen P, Schnabl B. Host-microbiome interactions in alcoholic liver disease. Gut Liver. 2014. doi:10.5009/gnl.2014.8.3.237.Google Scholar
- Obregon-Tito AJ, Tito RY, Metcalf J, Sankaranarayanan K, Clemente JC, Ursell LK, Zech Xu Z, Van Treuren W, Knight R, Gaffney PM, Spicer P, Lawson P, Marin-Reyes L, Trujillo-Villarroel O, Foster M, Guija-Poma E, Troncoso-Corzo L, Warinner C, Ozga AT, Lewis CM. Subsistence strategies in traditional societies distinguish gut microbiomes. Nat Commun. 2015. doi:10.1038/ncomms7505.PubMedPubMed CentralGoogle Scholar
- Zhou L, Foster J. Psychobiotics and the gut–brain axis: in the pursuit of happiness. Neuropsychiatr Dis Treat. 2015. doi:10.2147/NDT.S61997.Google Scholar
- Bailey MT, Dowd SE, Galley JD, Hufnagle AR, Allen RG, Lyte M. Exposure to a social stressor alters the structure of the intestinal microbiota: implications for stressor-induced immunomodulation. Brain Behav Immun. 2011. doi:10.1016/j.bbi.2010.10.023.PubMed CentralGoogle Scholar
- Lyte M. Probiotics function mechanistically as delivery vehicles for neuroactive compounds: microbial endocrinology in the design and use of probiotics. Bioessays. 2011. doi:10.1002/bies.201100024.PubMedGoogle Scholar
- Forsythe P, Bienenstock J, Kunze WA. Vagal pathways for microbiome-brain-gut axis communication. Adv Exp Med Biol. 2014. doi:10.1007/978-1-4939-0897-4_5.PubMedGoogle Scholar
- Tillisch K, Labus J, Kilpatrick L, Jiang Z, Stains J, Ebrat B, Guyonnet D, Legrain-Raspaud S, Trotin B, Naliboff B, Mayer EA. Consumption of fermented milk product with probiotic modulates brain activity. Gastroenterology. 2013. doi:10.1053/j.gastro.2013.02.043.Google Scholar
- Cryan JF, Dinan TG. Mind-altering microorganisms: the impact of the gut microbiota on brain and behaviour. Nat Rev Neurosci. 2012. doi:10.1038/nrn3346.PubMedGoogle Scholar
- Messaoudi M, Lalonde R, Violle N, Javelot H, Desor D, Nejdi A, Bisson JF, Rougeot C, Pichelin M, Cazaubiel M, Cazaubiel JM. Assessment of psychotropic-like properties of a probiotic formulation (Lactobacillus helveticus R0052 and Bifidobacterium longum R0175) in rats and human subjects. Br J Nutr. 2011. doi:10.1017/S0007114510004319.PubMedGoogle Scholar
- Bercik P, Denou E, Collins J, Jackson W, Lu J, Jury J, Deng Y, Blennerhassett P, Macri J, McCoy KD, Verdu EF, Collins SM. The intestinal microbiota affect central levels of brain-derived neurotropic factor and behavior in mice. Gastroenterology. 2011. doi:10.1053/j.gastro.2011.04.052.Google Scholar
- Bravo JA, Forsythe P, Chew MV, Escaravage E, Savignac HM, Dinan TG, Bienenstock J, Cryan JF. Ingestion of Lactobacillus strain regulates emotional behavior and central GABA receptor expression in a mouse via the vagus nerve. Proc Natl Acad Sci U S A. 2011. doi:10.1073/pnas.1102999108.PubMedPubMed CentralGoogle Scholar
- Steenbergen L, Sellaro R, van Hemert S, Bosch JA, Colzato LS. A randomized controlled trial to test the effect of multispecies probiotics on cognitive reactivity to sad mood. Brain Behav Immun. 2015. doi:10.1016/j.bbi.2015.04.003.PubMedGoogle Scholar
- Silk DBA, Davis A, Vulevic J, Tzortzis G, Gibson GR. Clinical trial: the effects of a trans-galactooligosaccharide prebiotic on faecal microbiota and symptoms in irritable bowel syndrome. Aliment Pharmacol Ther. 2009. doi:10.1111/j.1365-2036.2008.03911.x.PubMedGoogle Scholar
- O’Brien ME, Anderson H, Kaukel E, O’Byrne K, Pawlicki M, Von Pawel J, Reck M. SRL172 (killed Mycobacterium vaccae) in addition to standard chemotherapy improves quality of life without affecting survival in patients with advanced non-small-cell lung cancer: phase III results. Ann Oncol. 2004;15(6):906–14.View ArticlePubMedGoogle Scholar
- Pärtty A, Kalliomäki M, Wacklin P, Salminen S, Isolauri E. A possible link between early probiotic intervention and the risk of neuropsychiatric disorders later in childhood: a randomized trial. Pediatr Res. 2015. doi:10.1038/pr.2015.51.Google Scholar
- Naseribafrouei A, Hestad K, Avershina E, Sekelja M, Linløkken A, Wilson R, Rudi K. Correlation between the human fecal microbiota and depression. Neurogastroenterol Motil. 2014. doi:10.1111/nmo.12378.PubMedGoogle Scholar
- Miyaoka T, Wake R, Furuya M, Liaury K, Ieda M, Kawakami K, Tsuchie K, Taki M, Ishihara K, Araki T, Horiguchi J. Minocycline as adjunctive therapy for patients with unipolar psychotic depression: an open-label study. Prog Neuropsychopharmacol Biol Psychiatry. 2012. doi:10.1016/j.pnpbp.2012.02.002.PubMedGoogle Scholar
- Castro-Nallar E, Bendall ML, Pérez-Losada M, Sabuncyan S, Severance EG, Dickerson FB, Schroeder JR, Yolken RH, Crandall KA. Composition, taxonomy and functional diversity of the oropharynx microbiome in individuals with schizophrenia and controls. PeerJ. 2015. doi:10.7717/peerj.1140.Google Scholar
- Kleiman SC, Watson HJ, Bulik-Sullivan EC, Huh EY, Tarantino LM, Bulik CM, Carroll IM. The intestinal microbiota in acute anorexia nervosa and during renourishment: relationship to depression, anxiety, and eating disorder psychopathology. Psychosom Med. 2015. doi:10.1097/PSY.0000000000000247.PubMedGoogle Scholar
- Bester J, Soma P, Kell DB, Pretorius E. Viscoelastic and ultrastructural characteristics of whole blood and plasma in Alzheimer-type dementia, and the possible role of bacterial lipopolysaccharides (LPS). Oncotarget. 2015. doi:10.18632/oncotarget.6074.PubMedPubMed CentralGoogle Scholar
- Dao MC, Everard A, Aron-Wisnewsky J, Sokolovska N, Prifti E, Verger EO, Kayser BD, Levenez F, Chilloux J, Hoyles L, MICRO-Obes Consortium, Dumas ME, Rizkalla SW, Doré J, Cani PD, Clément K. Akkermansia muciniphila and improved metabolic health during a dietary intervention in obesity: relationship with gut microbiome richness and ecology. Gut. 2015. doi:10.1136/gutjnl-2014-308778.Google Scholar
- Rahe C, Unrath M, Berger K. Dietary patterns and the risk of depression in adults: a systematic review of observational studies. Eur J Nutr. 2014. doi:10.1007/s00394-014-0652-9.PubMedGoogle Scholar
- Dash S, Clarke G, Berk M, Jacka FN. The gut microbiome and diet in psychiatry: focus on depression. Curr Opin Psychiatry. 2015. doi:10.1097/YCO.0000000000000117.PubMedGoogle Scholar
- O’Keefe SJ, Li JV, Lahti L, Ou J, Carbonero F, Mohammed K, Posma JM, Kinross J, Wahl E, Ruder E, Vipperla K, Naidoo V, Mtshali L, Tims S, Puylaert PG, DeLany J, Krasinskas A, Benefiel AC, Kaseb HO, Newton K, Nicholson JK, de Vos WM, Gaskins HR, Zoetendal EG. Fat, fibre and cancer risk in African Americans and rural Africans. Nat Commun. 2015. doi:10.1038/ncomms7342.PubMedPubMed CentralGoogle Scholar
- Rook GA, Raison CL, Lowry CA. Microbiota, immunoregulatory old friends and psychiatric disorders. Adv Exp Med Biol. 2014. doi:10.1007/978-1-4939-0897-4_15.PubMedGoogle Scholar
- Raison CL, Lowry CA, Rook GA. Inflammation, sanitation, and consternation: loss of contact with coevolved, tolerogenic microorganisms and the pathophysiology and treatment of major depression. Arch Gen Psychiatry. 2010. doi:10.1001/archgenpsychiatry.2010.161.PubMedPubMed CentralGoogle Scholar
- Elliott DE, Weinstock JV. Helminth–host immunological interactions: prevention and control of immune-mediated diseases. Ann N Y Acad Sci. 2012. doi:10.1111/j.1749-6632.2011.06292.x.PubMedPubMed CentralGoogle Scholar
- Chang TK, Liao CW, Huang YC, Chang CC, Chou CM, Tsay HC, Huang A, Guu SF, Kao TC, Fan CK. Prevalence of Enterobius vermicularis infection among preschool children in kindergartens of Taipei City, Taiwan in 2008. Korean J Parasitol. 2009. doi:10.3347/kjp.2009.47.2.185.PubMedPubMed CentralGoogle Scholar
- Fleming JO, Isaak A, Lee JE, Luzzio CC, Carrithers MD, Cook TD, Field AS, Boland J, Fabry Z. Probiotic helminth administration in relapsing–remitting multiple sclerosis: a phase 1 study. Mult Scler. 2011. doi:10.1177/1352458511398054.PubMedPubMed CentralGoogle Scholar
- Cheng AM, Jaint D, Thomas S, Wilson JK, Parker W. Overcoming evolutionary mismatch by self-treatment with helminths: current practices and experience. J Evol Med. 2015. doi:10.4303/jem/235910.Google Scholar
- Nicolini H, López Y, Genis-Mendoza AD, Manrique V, Lopez-Canovas L, Niubo E, Hernández L, Bobes MA, Riverón AM, López-Casamichana M, Flores J, Lanzagorta N, De la Fuente-Sandoval C, Santana D. Detection of anti-streptococcal, antienolase, and anti-neural antibodies in subjects with early-onset psychiatric disorders. Actas Esp Psiquiatr. 2015;43(2):35–41.PubMedGoogle Scholar
- Steiner J, Walter M, Glanz W, Sarnyai Z, Bernstein HG, Vielhaber S, Kästner A, Skalej M, Jordan W, Schiltz K, Klingbeil C, Wandinger KP, Bogerts B, Stoecker W. Increased prevalence of diverse N-methyl-D-aspartate glutamate receptor antibodies in patients with an initial diagnosis of schizophrenia: specific relevance of IgG NR1a antibodies for distinction from N-methyl-D-aspartate glutamate receptor encephalitis. JAMA Psychiatry. 2013. doi:10.1001/2013.jamapsychiatry.86.Google Scholar | <urn:uuid:e34fc3fe-98b3-4a3f-8b39-cd2ff99c813f> | {
"date": "2019-01-19T08:07:40",
"dump": "CC-MAIN-2019-04",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583662863.53/warc/CC-MAIN-20190119074836-20190119100836-00096.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.7620057463645935,
"score": 3.140625,
"token_count": 5217,
"url": "https://jphysiolanthropol.biomedcentral.com/articles/10.1186/s40101-016-0101-y"
} |
This post originally appeared in RealClearScience's Newton blog. Read the original here.
If you think humans are polluting the planet to a degree never before seen in history, well, "You're suffering from a species-level delusion of grandeur," insists science writer Annalee Newitz in her new book, Scatter, Adapt, and Remember. "We're not even the first creatures to pollute the Earth so much that other creatures go extinct." That foul distinction belongs to ancient cousins of ours: cyanobacteria.
About 2.5 billion years ago, the Earth was much different than it is today. Rotating at faster speeds, there were about 450 20-hour days in a year. Far from cool and invigorating, the planet's atmosphere was superheated, and comprised mostly of methane and carbon, not oxygen and nitrogen, the primary constituents of today's atmosphere. The surface was no more hospitable to modern life. Magma seeped and bubbled amidst immense, acidic oceans. 2.5 billion years ago, Earth was a hot mess.
But in this environment -- one we would deem noxious -- life persisted. Oxygen-despising anaerobic bacteria floated in the ocean deep, kept cozy by hot magma streams. They subsisted on simple amino acids and sugars. Earth was turbulent, but alive.
Then cyanobacteria ruined everything. As the first organisms to use photosynthesis, they drank in the oceans' water and absorbed photons from sunlight, using the energy from those photons to separate water's two hydrogen molecules from its lone oxygen molecule. Afterwards, the microbes consumed the hydrogen and spit out the oxygen as a waste product.
This recipe was so successful that after millions of years cyanobacteria, also known as blue-green algae, nearly blanketed the planet's surface, continuously belching boatloads of oxygen in the process. All of the smokestacks from all of today's factories and power plants couldn't come close to their polluting prowess.
Eventually, Earth's natural oxygen absorbers -- like iron -- became saturated with the gaseous element, and an "oxygen apocalypse" ensued. We recognize oxygen as a bringer of life, but it's also a powerful degrader of organic compounds and quite toxic to anaerobes. With oxygen now suffusing throughout the atmosphere, pretty much all life except the cyanobacteria gradually became extinct. Excess oxygen also reacted with the atmosphere's methane, turning it into a weaker greenhouse gas: carbon dioxide. With a diminished ability to retain heat, the planet entered an ice age that lasted upwards of 300 million years!
One thing that this fascinating, true story demonstrates is that one bacteria's trash is another life form's treasure. Over many millions of years, organisms evolved that could use the built-up oxygen, mixing it with sugars to create energy. Pollution problem solved.
Of course, there's also a more humorous and ironic takeaway. Today, we oxygen-breathers are steadily working towards the goal of turning our Earth back into the hot mess that it once was. In 2012, humans emitted 31.6 billion tons of carbon dioxide. We're also putting more methane into the atmosphere, although at a much slower rate.
Will we ever atone for the dirty sins of our blue-green cousins and give the Earth totally back to the anaerobes? Probably not. It will take a far more concerted pollution effort than the comparatively paltry one we are currently mustering.
Primary Source: Scatter, Adapt, and Remember: How Humans Will Survive a Mass Extinction, Annalee Newitz
(Image: Iron Ore Pit via Shutterstock) | <urn:uuid:cc5badd0-085a-49c1-8151-9ce215191ac3> | {
"date": "2016-08-25T09:03:44",
"dump": "CC-MAIN-2016-36",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982292975.73/warc/CC-MAIN-20160823195812-00096-ip-10-153-172-175.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9504664540290833,
"score": 3.453125,
"token_count": 756,
"url": "http://bigthink.com/experts-corner/humans-arent-worst-polluters-in-history-not-even-close"
} |
Elaine and Jim
Pearl shell comes from pearl oysters, gathered at low tides or from off-shore reefs or sourced from cultured pearl farms. After a lengthy process of cleaning, chipping and grinding the outer shell, the shiny inner face is ready for engraving. Contemporary Aboriginal artists continue to maintain cultural customs by engraving traditional geometric or figurative designs. The designs are highlighted with a mixture of ochre or charcoal and resin or fat, which is rubbed into the grooves.
Aubrey Tigan lives on the Dampier Peninsula north of Broome, Western Australia, and is a respected traditional elder and lawman from the Bardi and Djawi people. He is a trained jeweller and a renowned carver, pearl shell being his preferred medium. He engraves on pearl shell to maintain traditional culture. He uses old and new designs, which he often sees in his dreams and which draw on his deep knowledge of the coastal environment.Activities
- Close your eyes and turn the riji over in your hands. What does it feel like? Hold it up to the light and see how the surface changes and shimmers. Describe what you see.
- Draw an outline of a pearl shell on shiny paper. Design a pattern that relates to water in your environment and draw it on your pearl-shell shape.
- Can you think of an object used during a special event in your life? Perhaps it is kept in a particular place and only brought out for important occasions. Does it have any special qualities? | <urn:uuid:ec439d51-882b-4d72-be02-60a881d8d656> | {
"date": "2017-02-19T14:28:11",
"dump": "CC-MAIN-2017-09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169776.21/warc/CC-MAIN-20170219104609-00404-ip-10-171-10-108.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9557901620864868,
"score": 3.0625,
"token_count": 316,
"url": "http://nga.gov.au/Wolfensohn/RED/208017.cfm"
} |
Sexual Arousal is the body’s involuntary reaction to sexual thoughts or stimuli. In both males and females, arousal involves increased blood flow to the genitals, increased heart rate, and dilation of the pupils. The skin may also become flushed or red. Males experience an erection (swelling of the penis); females experience genital swelling and lubrication. These reactions prepare the body for possible sexual intercourse. | <urn:uuid:49263d3f-e371-4ea6-bb72-ff717438b84b> | {
"date": "2019-12-08T23:54:38",
"dump": "CC-MAIN-2019-51",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540515344.59/warc/CC-MAIN-20191208230118-20191209014118-00136.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8916774988174438,
"score": 2.578125,
"token_count": 82,
"url": "https://www.alleydog.com/glossary/definition.php?term=Sexual+Arousal"
} |
A new web-based training tool from the Occupational Safety and Health Administration is designed to help truck body, trailer manufacturers, and other businesses identify hazards in their work areas.
The online tool helps employers and workers can locate workplace hazards commonly found in manufacturing and construction industries. In addition, those who use the training tool can learn to remedy the hazard maintain plant safety.
“Hazard identification is a critical part of creating an injury and illness prevention program that will keep workers safe and healthy on the job,” said Dr. David Michaels, assistant secretary of labor for occupational safety and health. “This new tool not only educates employers about how to take control of their workplaces and protect workers, it also demonstrates that following well-established safety practices is also good for the bottom line.”.
Through the hazard identification tool, users can play from the perspective of either a business owner or an employee as they learn to identify realistic, common hazards and address them with practical and effective solutions. The tool explains the key components of the hazard identification process, which include information collection, observation of the workplace, investigation of incidents, employee participation and prioritizing hazards.
OSHA developed the tool in conjunction with its Training Institute to assist small business owners in effectively identifying hazards in their workplace. The hazard identification training tool can be found on OSHA’s website at www.osha.gov/hazfinder. To view the game trailer, visit https://www.youtube.com/watch?v=Yj_IqaWSbKo&feature=youtu.be. For additional compliance assistance resources visit www.osha.gov. | <urn:uuid:18ad284d-1c07-4b50-adf3-943270fea932> | {
"date": "2015-11-30T17:00:38",
"dump": "CC-MAIN-2015-48",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398462709.88/warc/CC-MAIN-20151124205422-00210-ip-10-71-132-137.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9419668912887573,
"score": 2.65625,
"token_count": 335,
"url": "http://trailer-bodybuilders.com/news/osha-tool-identifies-workplace-hazards"
} |
This is the continuation of Rene's Nieva article on the ancestral roots of the Nieva clan from Marinduque. Chapter 2 was posted on July 13, 2015. Enjoy!
CAMALIG: ROOTS OF THE NIEVAS : In 1579, ten years after the first group of Spaniards led by Captain Luis Enriquez de Guzman and including Augustinian priests arrived in Camalig and started colonizing and Christianizing the residents, a Spanish galleon led by shipmaster Mateo de Saz and Captain Martin de Goiti also came to thesettlement. They formally took it over as a Spanish colony, one of the earliest places in the Philippines to be brought under the Spanish flag. They were accompanied by Franciscan missionaries Father Pablo de Jesus and Fr. Bartolome Ruiz who continued the colonization drive initiated by the Augustinians.
Camalig and the rest of nearby settlements that would eventually comprise the province of Albay always had abundant natural resources and a thriving agricultural industry consisting of coconut, rice, sugar and abaca plantations. This was because they were close to Mayon Volcano, which through regular eruptions throughout the ages has deposited rocks that have decomposed and weathered into rich soil.
Not content with being just farmers, albeit prosperous ones, the more adventurous and enterprising residents of Albay including the Nievas of Camalig engaged in trading in these farm product and putting up plantations elsewhere during the Spanish era. This brought them westward to provinces in the Southern Tagalog region including Batangas, Laguna, Tayabas (the former name of Quezon), Marinduque (formerly part of Tayabas) and Mindoro.They eventually settled in these provinces, growing further in wealth and political over the three centuries of Spanish rule. They became members of the Illustrado class that was considered just below the governing Spanish overlords.
Further proof that the Nievas were originally from Camalig was when sometime in late 1990s. I met a Manila congressmen, Ernesto "Banzai" Nieva. Intrigued by the similarity in our surname, I asked him if he was a native of Tondo, which he represented in Congress. He said his family moved to Tondo from Laguna when he was young but as far as he knew his forebears were originally from Camalig. He was then being groomed by the Liberal Party in Manila (led at the time by his ally and my Ateneo classmate Lito Atienza) for either Vice Mayor or Mayor. But unfortunately he died quite young (only in his late 40s or early 50s at most).
Not all the Nievas have left Camalig for parts beyond though. To this day, there are still residents of town who carry the Nieva surname. One time, while on a tour of the Bicol region with some friends, we passed by Camalig on the way to Legazpi and I saw houses with signs on which were written Attorney this or Doctor that. My research also showed that Nievas have occupied local government positions over the years or owned businesses such as gaming cock farms and the like.
I've also seen photos of some Nievas in Camalig over the Internet and noticed that they were invariably good-looking, which must prove that this must have been a common Nieva family. Said good looks have been bolstered and further enhanced through intermarriages with men and women from other races like the Spaniards, the Chinese, and even the French.
Personal Note: I have met more than a hundred of Macrine's relatives here in the US and in the Philippines . They are not only good looking, smart but also humble. Most of them have accomplished lives and successful financially. Of course, there are a few exceptions. If you are following this series, do you know the ancestry of your surname? I will be glad to hear from you.
Welcome to My Site
If this is your first visit, welcome! This site is devoted to my life experiences as a Filipino-American who immigrated from the Philippines to the United States in 1960. I came to the US as a graduate student when I was 26 years old. I am now in my early-80's and thanks God for his blessings, I have four successful and professional children and six grandchildren here in the US. My wife and I had been enjoying the snow bird lifestyle between US and Philippines after my retirement from USFDA in 2002. Please do not forget to read the latest national and International News in this site . I have also posted some of my favorite Filipino and American dishes and recipes in this site. Some of the photos and videos in this site, I do not own. However, I have no intention on infringing on your copyrights. Cheers! | <urn:uuid:18881eee-ab00-4e9c-a6c2-079f97f7b598> | {
"date": "2018-05-22T09:46:18",
"dump": "CC-MAIN-2018-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794864657.58/warc/CC-MAIN-20180522092655-20180522112655-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.983752429485321,
"score": 2.921875,
"token_count": 994,
"url": "http://theintellectualmigrant.blogspot.com/2015/07/ancestral-roots-of-nieva-clan-of.html"
} |
A simple letter-shift is the change of one word into another word by shifting each of its letters n steps along the alphabet. Thus, shifted three steps, the letters COLD appropriately make FROG. Similarly, but with the alphabet arranged in a circle (A following Z), it takes just nine steps to persuade the exhausted rabbit to SLEEP, BUNNY.
"Shiftgrams: My Deft Ruse,"
Word Ways: Vol. 29
, Article 16.
Available at: https://digitalcommons.butler.edu/wordways/vol29/iss1/16 | <urn:uuid:139deff5-afdd-4e8f-9989-e515770cc3af> | {
"date": "2018-02-21T07:17:30",
"dump": "CC-MAIN-2018-09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891813571.24/warc/CC-MAIN-20180221063956-20180221083956-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.830034077167511,
"score": 3.203125,
"token_count": 124,
"url": "https://digitalcommons.butler.edu/wordways/vol29/iss1/16/"
} |
Financial Aid Acronyms
ACG (Academic Competitiveness Grant) – For citizens who have graduated from high school in a rigorous program of study after June 2005; and eligible to receive the Federal Pell Grant. Sophomore students require a grade point average of 3.0 or higher. This federal program is currently not funded.
COA (Cost of Attendance) – This budget includes tuition, fees, room, board, books, supplies, transportation and personal expenses for one academic year of education. The COA is used to determine the maximum amount of financial aid that a student can receive for an academic period.
EFC (Estimated Expected Family Contribution) – The EFC is an index that schools use to determine your eligibility and is not the amount of money that you have to pay. Your school's financial aid office will use your EFC to determine the specific types and amounts of student aid you are eligible to receive.
FAFSA (Free Application for Federal Student Aid) – A form required by the government for application to any federal aid program; this form is used to determine the expected family contribution based on family financial information. This form is also used to determine the specific Federal Student Aid Programs that can contribute to a student’s total financial aid package and in what proportions.
FAO (Financial Aid Office) – NMU's Financial Aid Office is located at 2107 C.B. Hedgcock.
FSEOG or SEOG (Federal Supplement Educational Opportunity Grant) – Grant that is campus based and provides assistance for Pell eligible recipients. The amount may vary at different schools based on availability and funding parameters.
FWS (Federal Work Study Program) – Funds used for community or campus employment; all money earned through this program based on need is considered non-taxable income.
GPA (Grade Point Average) – The average grade earned by a student, figured by dividing the grade points earned by the number of credits attempted.
MCS (Michigan Competitive Scholarship) – Available to Michigan undergraduate students pursuing their first degree at an approved Michigan post secondary institution.
MEAP (Michigan Educational Assessment Program) – This is a standardized test that is taken by all public school students in Michigan from elementary to junior high. The high school test was replaced by the Michigan Merit Exam, if the student scores a high score they get the Michigan Merit Award for $2.500, a college scholarship.
MET (Michigan Educational Trust) – This prepaid tuition program offers several options to the Michigan family to lock in tuition at Michigan public institutions.
MPN (Master Promissory Note) – A legally binding loan agreement a borrower signs to promise to repay the loan, with interest, in periodic installments. The note may be signed in writing or electronically. A borrower may receive multiple loans under the same MPN.
PELL (Federal Pell Grant) – This is an entitlement from federal government to eligible undergraduate students.
PLUS (Parent Loan for Undergraduate Dependent Students) – Provides parents and students with an alternative way to finance attending college.
SAP (Satisfactory Academic Progress) – Federal regulation requires that all financial aid recipients progress at a reasonable rate toward achieving a certificate or degree. This is measured by the student’s cumulative grade point average; the number of credits earned in relation to those attempted; and the maximum time frame allowed to complete an academic program.
SAR (Student Aid Report) – The official notification sent out after the FAFSA has been processed. This document will state your expected family contribution.
SMART (National Science & Mathematics Access to Retain Talent Grant) – This grant is available during the third and fourth years of undergraduate study to full-time students who are eligible for the Federal Pell Grant and who are majoring in physical science, life science, computer science, mathematics, technology, engineering or foreign language that are determined critical to national security. This federal program is currently not funded.
TIP (Tuition Incentive Program) – This is a State of Michigan program that encourages eligible students to complete high school by providing tuition assistance for the first two years of college and beyond. | <urn:uuid:88bb9572-9d71-4aa3-be74-0a793f983b51> | {
"date": "2014-04-19T07:01:14",
"dump": "CC-MAIN-2014-15",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609536300.49/warc/CC-MAIN-20140416005216-00083-ip-10-147-4-33.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9413021802902222,
"score": 2.53125,
"token_count": 849,
"url": "http://www.nmu.edu/financialaid/acronyms"
} |
for National Geographic News
Three mummies have been moved from the Valley of the Kings in Luxor to the Egyptian Museum in Cairo to begin extensive studies of their origins, Egyptian authorities recently announced.
Two female mummies found in a tomb known as KV21 and one male mummy found outside the tomb of Pharaoh Seti II, who ruled Egypt from 1200 to 1194 B.C., will undergo CAT scans and DNA analysis.
Such tests could tell researchers the mysterious mummies' ancestry and could even pinpoint their identities, although it may be years before scientists can say anything definitive.
Still, the females already show promise that they may be among several Egyptian queens that archaeologists have been searching for.
Both bodies were found in the Egyptian royal pose of women: the left arm bent at the elbow with the hand clenched diagonally across the chest, and the right arm laid straight alongside the body.
"We'll try to look at the two females in KV21, because we are now looking for the families of Tutankhamun through the Egyptian Mummy Project," said Zahi Hawass, secretary general of Egypt's Supreme Council of Antiquities.
The project is a five-year plan launched by Hawass to test and catalog the DNA of every mummy in the country.
"Maybe one of them could be Nefertiti or Tiye or Kiya, we do not know," said Hawass, who is also a National Geographic Explorer-in-Residence. (The National Geographic Society owns National Geographic News.)
An Egyptian team will examine the mummies' genes in what Hawass describes as the only DNA lab in the world dedicated exclusively to the study of mummies.
The best way to study ancient genes is to examine mitochondrial DNA, said Angelique Corthals, a lecturer in biomedical and forensic studies at the University of Manchester in the United Kingdom, who trained the Egyptian team.
This type of DNA is passed on through the mother and contains thousands of copies of genetic information in each cell. (Get an overview of human genetics.)
SOURCES AND RELATED WEB SITES | <urn:uuid:ca900fab-88d0-44dc-858d-ed4318c6a083> | {
"date": "2016-05-29T05:56:00",
"dump": "CC-MAIN-2016-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049278389.62/warc/CC-MAIN-20160524002118-00111-ip-10-185-217-139.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9469980597496033,
"score": 3.421875,
"token_count": 433,
"url": "http://news.nationalgeographic.com/news/2008/06/080606-egypt-mummies.html"
} |
This flu season has been marked by an early start and high activity across the United States.
For the week between December 30, 2012 and January 5, 2013, the Centers for Disease Control and Prevention reported that 24 states and New York City were experiencing high rates of influenza-like illness.
In comparison, the 2011-2012 flu season set a record for the shortest and lowest peak of influenza-like illness.
“Many people confuse the flu and colds, as symptoms are similar,” said Susan J. Rehm, M.D., the medical director for the National Foundation for Infectious Diseases.
“Knowing the difference can be simple if you know the 'F.A.C.T.S.' F stands for fever, A is for aches, C is for chills, T is for tiredness and S, this one might be the most important, it stands for sudden onset. Flu strikes fast, unlike a cold, which could take days to come on."
With so many getting sick this season, it is important to help prevent the spread of the virus. “The CDC recommends the 'Take 3' approach to fighting flu: 1. Take time to get a flu vaccine. 2. Take everyday preventive action to stop the spread of the virus. 3. Take prescription antiviral medicines if your doctor prescribes them,” explained Dr. Rehm.
Taking those preventive everyday actions can make a difference in spreading the virus to others. But, as Anna Post, the great-great granddaughter of Emily Post and the co-author of the 18th edition of the Emily Post’s Etiquette book, noted, “during flu season, when symptoms such as fever, aches, chills and extreme tiredness suddenly hit, it’s easy to forget ones manners.”
That is where it is important to know your flu etiquette. “Flu etiquette is being considerate of those around you if you are sick. Flu is highly contagious and droplets from a cough or sneeze can travel to others up to about six feet away,” Post said.
There are several situations where the flu can be easily shared from one person to another. | <urn:uuid:013e868e-0189-43c2-82da-d5053d744f49> | {
"date": "2014-08-23T01:36:35",
"dump": "CC-MAIN-2014-35",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500824990.54/warc/CC-MAIN-20140820021344-00430-ip-10-180-136-8.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9502893686294556,
"score": 3.421875,
"token_count": 455,
"url": "http://www.empowher.com/influenza/content/flu-season-know-your-flu-etiquette"
} |
Latest update: December 12th, 2012
Every Jew is familiar with Deuteronomy 30:19: “I have set before you life and death, the blessing and the curse. Therefore, choose life, that you and your descendants may live.” This Torah obligation is binding not only upon individuals, but also upon states – especially the always imperiled State of Israel. Even before individual Israelis can “choose life” with confidence, it is incumbent upon the government of Israel to do the same. In essence, this means putting an immediate end to its time-dishonored policy of “Land For Nothing,” and ensuring a national capacity to assure protection of the country’s citizens. Whether driven by Oslo Agreements or a so-called “Road Map,” Israel can never expect citizen compliance with a policy of collective suicide.
Significantly, in this matter of national protection, international law parallels Torah. Governments maintain their legitimate authority only to the extent that they can offer their citizens a reasonable assurance of protection. This principle is well known in Western political philosophy. According to the 17th century English philosopher, Thomas Hobbes, sovereignty actually derives from the assurance of protection: “The obligation of subjects to the sovereign,” says Hobbes in Chapter XXI of Leviathan, “is understood to last as long, and no longer, than the power lasteth by which he is able to protect them.”
Similarly, Jean Bodin, a 16th century French political theorist, argues that sovereignty stems entirely from the capacity to provide safety: In The Republic, he comments:
“The word of protection in generall extendeth unto all subjects which are under the obeysance of one soveraigne prince…As we have said, that the prince is bound by force of armes, and of his lawes, to maintaine his subjects in suretie of their persons, their goods, and families: for which the subjects by a reciprocall obligation owe unto their prince faith, subjection, obeysance, and succour.”
It is also true, under compulsory international law, that governments must conform to certain clear standards of human rights, and that where they do not meet such standards, individual citizens may have the right – and perhaps even the obligation – to disobey that government. Under certain circumstances (that is, where government policies are heading the country toward genocide and war), these citizens may even have the right and/or obligation to overturn that government by extraordinary means.
What do these principles have to do with the current State of Israel? Plainly, for both philosophical and jurisprudential reasons, there is compelling ground for arguing that Israeli government authority over its citizens is now increasingly problematic. From the standpoint of philosophy, Israel’s multiple and debilitating surrenders of territory that incrementally create an enemy state of “Palestine” call into question government authority over the citizenry. After all, these surrenders have made it substantially unlikely that Israel can any longer protect its citizens from authentically existential harms.
From the standpoint of international law, to the extent that Israeli surrenders and consequent citizen vulnerabilities may constitute a violation of essential human rights, namely the incontestable and immutable rights to live and to endure, the people of Israel may now have a right or obligation to oppose their government with very far-reaching acts of civil resistance. Moreover, these arguments not only extend as well, to the Jewish citizens of YESHA, they apply especially to these particularly endangered citizens.
Over the next several months, as Palestine is carved incrementally out of the still-living body of Israel, the Jewish State will face a growing threat of war and extermination. Recognizing this unbearable condition, an expanding portion of Israel’s Jewish citizens will certainly calculate that government authority has disappeared together with government capacity to assure protection. From this correlative argument these citizens will then do what they believe is necessary to prevent their own individual and collective annihilation. At the beginning, their actions may take the form of traditional civil disobedience. After a time, it is likely that they would escalate to more robust forms of civil resistance.
This is not a pleasant or welcome picture. On the contrary, it is a scenario that must be avoided. But to succeed in such avoidance, the government of Israel must take the initiative. It is the government’s responsibility, immediately, to take such measures as are needed to prevent the coming regional war – a war that could involve chemical, biological or even nuclear weapons.
What are these measures? The answer is to implement policies that will restore citizen protections and thereby enhance government authority. At a minimum, such policies must point to (1) an absolute cessation of Oslo/Road Map-generated territorial transfers to the Hamas-controlled Palestine Authority (PA), including any transference of Jerusalem. These policies must also include (2) an absolute Israeli rejection of Palestinian demands for the “right of return,” demands that would put a decisive end to the State of Israel via demographic implosion; (3) increased Israeli military preparations for dealing with the renewed Egyptian/Syrian menace and the rapidly growing strategic threat from Iran; and (4) increased Israeli preparations for dealing with terrorist-directed chemical and biological weapons.
If the next post-Sharon government of Israel wishes to forestall civil disobedience and prevent outright civil war, it will first have to restore its severely compromised capacity to assure citizen protections. With such restoration, it will be acting in conformance with the authoritative expectations of both Torah and international law. Without such restoration, it will not only create a condition of intolerable national insecurity, it will also ensure that virtually any subsequent form of anti-government opposition in Israel would be permissible. It is time, finally, for the government of Israel to “choose life.”
Copyright The Jewish Press, 2006. All rights reserved.
LOUIS RENE BERES was educated at Princeton (Ph.D., 1971), and is author of many books and articles dealing with political philosophy and international law. He is Strategic and Military Affairs columnist for The Jewish Press.
About the Author: Louis René Beres (Ph.D., Princeton, 1971) is professor of political science and international law at Purdue University and the author of many books and articles dealing with international relations and strategic studies.
If you don't see your comment after publishing it, refresh the page.
Our comments section is intended for meaningful responses and debates in a civilized manner. We ask that you respect the fact that we are a religious Jewish website and avoid inappropriate language at all cost.
If you promote any foreign religions, gods or messiahs, lies about Israel, anti-Semitism, or advocate violence (except against terrorists), your permission to comment may be revoked. | <urn:uuid:49f49a73-0f73-4b69-94e4-63e3c081cf49> | {
"date": "2015-03-04T20:54:07",
"dump": "CC-MAIN-2015-11",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463658.66/warc/CC-MAIN-20150226074103-00096-ip-10-28-5-156.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9425097703933716,
"score": 2.546875,
"token_count": 1400,
"url": "http://www.jewishpress.com/indepth/columns/louis-bene-beres/israeli-government-authority-must-be-based-on-a-capacity-to-protect-its-citizens/2006/07/26/"
} |
"The Devil's Miner" follows two brothers, 14-year-old Basilio and his 12-year-old brother Bernardino, who live in poverty with their mother in the mountains of Bolivia. They work long shifts in the Cerro Rico silver mines, braving deadly conditions to earn enough money to attend school.
Daily the brothers go into the underground mining tunnels and tempt fate in order to gain a better life.
Through the children's eyes, we encounter the sixteenth century mine, where devout Catholics sever their ties with God each time they enter the shafts, because of the ancient belief that the devil, as represented in the hundreds of statues constructed in the tunnels, determines the fate of all who work there.
Raised without a father, the boys assume many adult responsibilities and must work to afford the clothing and supplies vital to their education. Basilio believes only the mountain devil's generosity will allow them to earn enough money to continue the new school year.
Without an education, the brothers have no chance to escape their destiny in the silver mines. | <urn:uuid:ea69760f-b748-40be-be41-a412876505b5> | {
"date": "2016-12-10T09:35:23",
"dump": "CC-MAIN-2016-50",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698543030.95/warc/CC-MAIN-20161202170903-00048-ip-10-31-129-80.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9566689729690552,
"score": 3.34375,
"token_count": 215,
"url": "https://www.showtimes.com/movies/the-devils-miner-12035/"
} |
Clinicians have long speculated that poor sleep may be a mechanism involved in the higher risk of further cardiac events or death among those with post-traumatic stress disorder following a heart attack, but the association between PTSD and sleep after a heart event has been unknown.
Recent data from Columbia University Medical Center researchers have shown that symptoms of PTSD after a heart attack are relatively common. A PLoS ONE study (published in June 2012) found that 1 in 8 heart attack survivors suffer PTSD and that survivors with PTSD have a doubled risk of having another cardiac event or of dying within one to three years, compared with survivors without PTSD.
A paper published in the current issue of Annals of Behavioral Medicine, by Jonathan A. Shaffer, PhD, and colleagues at Columbia's Center for Behavioral Cardiovascular Health, reports on an analysis of the association of PTSD and sleep in nearly 200 patients who had experienced a heart attack within the previous month, recruited from NewYork-Presbyterian Hospital/Columbia University Medical Center. The study—the first of its kind—found that PTSD following a heart attack is associated with poor sleep.
The results showed that the more heart attack-induced PTSD symptoms patients reported, the worse their overall self-reported sleep was in the month following their heart attack. Greater PTSD symptoms following a heart attack were associated with worse sleep quality, shorter sleep duration, more sleep disturbances, use of sleeping medications, and daytime dysfunction due to poor sleep the night before.
The data also showed that people with poor sleep following a heart attack were more likely to be female and to have higher body mass index and more symptoms of depression; they were less likely to be Hispanic.
Dr. Shaffer and colleagues hypothesize that the strong association between heart attack-induced PTSD and sleep may be due to the fact that disturbed sleep is a standard characteristic of PTSD. Results of recent treatment studies for PTSD and sleep disturbance suggest that the two conditions should be viewed as comorbid, rather than one being merely a symptom of the other.
In addition, dysregulation of the autonomic nervous system (the part of the nervous system responsible for regulating involuntary bodily functions, such as breathing, heartbeat, and digestive processes), which is associated with both PTSD and disrupted sleep, may represent a common mechanism underlying their association.
Further research is needed to better understand the associations of PTSD due to heart attack, poor sleep, and risk for future heart attacks.
The paper is titled, "Association of Acute Coronary Syndrome-Induced Posttraumatic Stress Disorder Symptoms with Self-Reported Sleep." The other authors are Ian M. Kronish, MD, MPH; Matthew Burg, PhD; Lynn Clemow, PhD; and Donald Edmondson, PhD. All are members of the Center for Behavioral Cardiovascular Health at Columbia University Medical Center. | <urn:uuid:df43be30-adc9-4738-98ef-b402e43b1914> | {
"date": "2014-11-26T07:51:31",
"dump": "CC-MAIN-2014-49",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931006593.41/warc/CC-MAIN-20141125155646-00236-ip-10-235-23-156.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9614330530166626,
"score": 2.6875,
"token_count": 571,
"url": "http://medicalxpress.com/news/2013-05-poor-linked-ptsd-heart.html"
} |
Today, carbon dioxide (CO2) levels in our atmosphere are the highest they've been in 15 million years. It's the cumulative impact of an ever-expanding population―7 billion people and rising―and an ever-increasing thirst for energy, requiring 24/7 electricity, factories, cars, trucks, planes and more. CO2 and other gases, like methane and nitrous oxide, amplify what is called the greenhouse effect. Historically, this has been a good thing. These gases trap heat, making the atmosphere warm enough for the earth to sustain an enormous diversity of life, including people. But over the past 150 years since the industrial revolution, greenhouse gases have shot up by 30 percent, rapidly raising Earth's global temperature. This trend could spell disaster. Higher CO2 levels have altered the chemistry of the ocean―making it more acidic. The ocean plays a key role in regulating climate, absorbing more than a quarter of the carbon dioxide that humans put into the air. But the ocean is struggling to keep up with rising CO2 levels. And thousands of plant and animal species could go extinct without time to adapt to a warmer planet. Humans, too, could be forced to leave their homes from the multiple impacts of climate change.
Swimmers brave the waters in the shadow of a coal-fired power plant. Coal plants like this one emit CO2 into our atmosphere which is warming the planet and altering the chemistry of the ocean.
Joel W. Rogers/Corbis | <urn:uuid:5a4c2265-739c-4b49-8b1c-d1f18602dce4> | {
"date": "2016-08-23T21:08:12",
"dump": "CC-MAIN-2016-36",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982290442.1/warc/CC-MAIN-20160823195810-00056-ip-10-153-172-175.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9308333396911621,
"score": 3.953125,
"token_count": 299,
"url": "http://ocean.si.edu/climate-change"
} |
Saņem informāciju par jaunajiem Atlants.lv darbiem!
Akcija: ZiņotājsPRO uz 6 mēnešiem - bezmaksas!Abonēt bez maksas
Denmarks 11th century conquest of Scandinavia
During the eleventh century the lands of Scandinavia were constantly at war. The kings of these great states were constantly changing. The great state of Denmark ruled most of the Scandinavia lands the most part of the century. Denmark although the smallest of its neighbours had plenty of good land and had both population and resources along with better climate over Norway and Sweden. Norway had mountains in the east and reasonable amount of arable land in the west but not enough to support a large population. Much of Sweden's best land was often Danish control, so central Sweden deve…
E-pasta adrese, uz kuru nosūtīt darba saiti:
Saite uz darbu: | <urn:uuid:fd66dd7e-3c4a-4059-92b7-ff392fca202c> | {
"date": "2017-09-20T02:18:41",
"dump": "CC-MAIN-2017-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818686117.24/warc/CC-MAIN-20170920014637-20170920034637-00296.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8882201910018921,
"score": 3.25,
"token_count": 215,
"url": "https://www.atlants.lv/eseja/denmarks-11th-century-conquest-of-scandinavia/646848/"
} |
Empathy: Not Such a Soft Skill
Katherine Bell is Deputy Editor at Harvard Business.org.
Empathy is the word of the moment in the media, as President Obama and the GOP disagree over whether Supreme Court Justices should use it.
In this debate, empathy has come to imply an emotional impulse to root for the underdog. Ron Elving wrote at NPR.org: "In the parlance of their party, Democrats use this word to mean sensitivity to the plight of the poor, the disadvantaged and the downtrodden... Republicans, for their part, regard empathy as a code word for emotion." To explain Obama's all-female shortlist of candidates for the court, Paul Taylor of the Pew Research Center pointed to a 2008 finding that 80% of Americans believe that women are more compassionate than men, arguing that "Empathy and compassion aren't synonymous, but they're close cousins."
All of this makes empathy sound like the softest of soft skills.
But here's the Oxford English Dictionary's definition: "The power of projecting one's personality into (and so fully comprehending) the object of contemplation."
Nothing in that definition tells us how we're supposed to judge the object of our empathy once we've imagined ourselves into his or her point of view.
As a writer and teacher of fiction, I've learned that empathy isn't about being nice or tolerant. It's not about feeling sorry for people or giving them the benefit of the doubt. It's an act of imagination in which you try to look at the world from the perspective of another person, a human being whose history and point of view are as complex as your own. When you write a piece of fiction, you need to imagine yourself into the minds of the bad guys as well as the good — without forgiving or excusing or oversimplifying them. It's tremendously difficult, which is why so few novels contain a variety of equally convincing characters.
It can be disturbing, too. A friend of mine, Yiyun Li, recently published a novel, The Vagrants, in which she brings the reader fully inside the mind of a young pedophile as he walks the banks of a Chinese river, hoping to find an abandoned baby girl he can take home and bring up as his own. (Publisher's Weekly called the book "magnificent and jaw-droppingly grim.") Yiyun's writing didn't make me feel sorry for her character or excuse his behavior. It made me understand the story in a completely different way. And it made me complicit — or, to put it in business terms, accountable.
Last week, David Brooks argued in the New York Times that successful CEOs are "organized, dogged, anal-retentive and slightly boring" instead of "warm, flexible, team-oriented and empathetic." It's not at all clear to me why he considers these mutually exclusive. And I'd argue that at all levels of management empathy is a critical skill. If you can imagine a person's point of view — no matter what you think of it — you can more effectively influence him. Empathizing with your team, your boss, your coworkers, and your colleagues won't make you a pushover — it'll give you more power.
In his 2001 HBR article, "Leadership in a Combat Zone," Lieutenant General William Pagonis, Director of Logistics during the Gulf War, wrote:
Owning the facts is a prerequisite to leadership. But there are millions of technocrats out there with lots of facts in their quivers and little leadership potential. In many cases, what they are missing is empathy. No one is a leader who can't put himself or herself in the other person's shoes. Empathy and expertise command respect.
Put that way, it doesn't sound quite so soft, does it?
Please email us to report offensive comments.
The comments to this entry are closed. | <urn:uuid:9248e299-af6d-4de0-925c-029f0116ba96> | {
"date": "2016-10-24T18:36:43",
"dump": "CC-MAIN-2016-44",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719677.59/warc/CC-MAIN-20161020183839-00541-ip-10-171-6-4.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9668092131614685,
"score": 2.515625,
"token_count": 804,
"url": "http://voices.washingtonpost.com/leadership/2009/05/empathy_not_such_a_soft_skill.html"
} |
AWIS Statement on Equal Pay Day 2016
For Immediate Release
Tuesday, April 12, 2016 is Equal Pay Day, a national day of action highlighting unfair pay for women. The Association for Women in Science (AWIS) strives to educate both women and men about pay inequity in the science, technology, engineering and mathematics (STEM) fields and shine a light on the need to find viable solutions to wage discrimination.
This day in April is chosen as Equal Pay Day because it represents the approximate date that women must work to in the current year to make the same amount of money white men did in the previous year. So, a woman must have worked all of 2015 and well into 2016 to earn what her white male counterparts earned in 2015 alone.
The pay gap in STEM is no different:
- In science and engineering occupations, men make an average of $25k more per year ($88k compared to $63k).
- Though women earn the majority of degrees in the life sciences, they don’t go on to earn the majority of the pay. Women earn nearly $9k less than men ($60k versus $68.8k).
- Across all STEM disciplines, the average income for men is almost $14k more than for women ($72.6k for men, $58.9k for women).
- Across all STEM disciplines, men make an average of $73k. That’s $19k more than underrepresented minority women who earn an average of $54k.
Fair pay requires real change! AWIS encourages the businesses and organizations to review their pay practices to ensure that women receive equitable compensation. As an individual, you can take action, as well. Contact your Congressional representatives and tell them to support equal pay legislation by visiting www.house.gov and www.senate.gov or tweet your members of Congress using WeTweet.org: http://www.wetweet.org/fair-pay.html. | <urn:uuid:da2bd3d0-5dba-4f5c-9648-eb3938824501> | {
"date": "2018-10-22T08:38:53",
"dump": "CC-MAIN-2018-43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583514879.30/warc/CC-MAIN-20181022071304-20181022092804-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9286639094352722,
"score": 2.78125,
"token_count": 406,
"url": "https://www.awis.org/awis-statement-on-equal-pay-day-2016/"
} |
The author wrote this book primarily for his archaeology students, to show them how dangerous anthropological analogy is and how variable the actual practices of foragers of the recent past and today are. His survey of anthropological literature points to differences in foraging societies' patterns of diet, mobility, sharing, land tenure, exchange, gender relations, division of labour, marriage, descent and political organisation. By considering the actual, not imagined, reasons behind diverse behaviour this book argues for a revision of many archaeological models of prehistory.
Back to top
Rent The Foraging Spectrum 1st edition today, or search our site for other textbooks by Robert L. Kelly. Every textbook comes with a 21-day "Any Reason" guarantee. Published by Percheron Press.
Need help ASAP? We have you covered with 24/7 instant online tutoring. Connect with one of our tutors now. | <urn:uuid:8114696e-f171-4faa-b740-6e987d19bb71> | {
"date": "2016-08-31T05:49:00",
"dump": "CC-MAIN-2016-36",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471983577646.93/warc/CC-MAIN-20160823201937-00150-ip-10-153-172-175.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9222955703735352,
"score": 2.578125,
"token_count": 182,
"url": "http://www.chegg.com/textbooks/the-foraging-spectrum-1st-edition-9780975273883-0975273884"
} |
Upward Bound provides fundamental support to participants in their preparation for college entrance. The program provides opportunities for participants to succeed in their precollege performance and ultimately in their higher education pursuits. Upward Bound serves: high school students from low-income families; high school students from families in which neither parent holds a bachelor’s degree; and low-income, first-generation military veterans who are preparing to enter post secondary education. The goal of Upward Bound is to increase the rate at which participants complete secondary education and enroll in and graduate from institutions of post secondary education.
Types of Projects
Upward Bound projects provide academic instruction in mathematics, laboratory sciences, composition, literature, and foreign languages. Tutoring, counseling, mentoring, cultural enrichment, and work-study programs also are supported.
All Upward Bound projects MUST provide instruction in math, laboratory science, composition, literature, and foreign language. Other services include:
- Instruction in reading, writing, study skills, and other subjects necessary for success in education beyond high school
- Academic, financial, or personal counseling
- Exposure to academic programs and cultural events
- Tutorial services
- Mentoring programs
- Information on post secondary education opportunities
- Assistance in completing college entrance and financial aid applications
- Assistance in preparing for college entrance exams
- Work study positions to expose participants to careers requiring a post secondary degree | <urn:uuid:15d9520e-da8e-4423-98c6-519d72a855d5> | {
"date": "2015-02-01T16:41:01",
"dump": "CC-MAIN-2015-06",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422121744242.57/warc/CC-MAIN-20150124174904-00020-ip-10-180-212-252.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9185791611671448,
"score": 2.8125,
"token_count": 281,
"url": "http://www.obu.edu/specialprograms/upward-bound/"
} |
Going the Distance
A couple of weeks ago, we published a Cabling Chronicles Blog about exceptions to the 100-meter (m) channel length rule and the fact that you can’t necessarily go the full distance due to temperature rise, gauge size and subsequent insertion loss and DC resistance. But did you know that you can also EXCEED the 100 m length? Let’s take a look at that scenario.
A Common Concern
One of the most common questions we get in our technical support department is why length didn’t fail when the permanent link exceeded the 90 m distance or the channel exceeded the 100 m distance.
If you look at the permanent link test in the example, you see that there are four different length measurements for each of the four pairs. This is expected, as each pair has a different twist rate, and the lengths would be different were you to untwist each pair and stretch them out. The standard requires a pass/fail on the shortest length, which is why the 90.8 m pair is the one the tester looks at and the others are grayed out.
But considering the shortest length of 90.8 m noted in this test is greater than the 90 m permanent link limit, why didn’t it fail?
The 10% Rule
In the ANSI/TIA-1152 standard, Requirements for Field Test Instruments and Measurements for Balanced Twisted-Pair Cabling, the permanent
length limit is the limit plus the nominal NVP uncertainty of 10 %. To refresh your memory, NVP stands for nominal velocity of propagation. Expressed as a percentage, it essentially characterizes how fast a signal is traveling down the cable relative to the speed of light in a vacuum, and it is what allows the tester to calculate the length of the cable.
Since the speed of light in a vacuum is the highest speed that can possibly be achieved, the NVP is always below 100%. It should be set using the NVP specification provided by the cable manufacturer, which can range from 56 to 78% range depending on the cable design – each type of cable insulating material has its own NVP. This is a fairly broad range, and there is often uncertainty in setting the NVP, which is why ANSI/TIA-1152 allows for NVP uncertainty of 10%. To give you an indication of the impact NVP has on a tester, consider that an NVP of 60% reports the permanent link length at 80 meters, while an NVP of 78% reports a length of 98.7 meters.
Because the ANSI/TIA-1152 standard states the length limit as the limit plus the 10% nominal uncertainly of NVP, the permanent link length will not fail until the 90 m maximum length plus 10% has been exceeded. In other words, the permanent link length would have to get to 99 m before it would fail, and the channel length would have to get to 110 m before it would fail.
Don’t Get Hung Up on Length
Some installers get a bit wound up about this, but the reality is that the NVP setting affects the length measurement only and NO other parameter during testing. The active equipment doesn’t care at all about the length – it only cares about the length-dependent performance parameters like insertion loss and propagation delay. So if those parameters pass, do we really care that the permanent link length is greater than 90 m? In fact, in ISO/IEC standards, there is no pass/fail on length alone. While that is certainly not an excuse to go to 99 meters, it’s technically okay as long as the performance parameters pass as that is ultimately what will decide if the link can support the application. But if you do go all the way to 99 m on your permanent link, there’s a pretty good chance that the length-dependent performance parameters will fail. Your Fluke Networks’ DSX CableAnalyzer™ will let you know. | <urn:uuid:67b587fc-f7f0-42ca-9580-278dfe72ad5d> | {
"date": "2019-09-16T16:13:40",
"dump": "CC-MAIN-2019-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514572879.28/warc/CC-MAIN-20190916155946-20190916181946-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9212835431098938,
"score": 2.546875,
"token_count": 822,
"url": "https://www.flukenetworks.com/blog/cabling-chronicles/going-distance"
} |
A significant threshold has been crossed by renewable energy as analysts report that the sectorʼs size last year reached double the level it was at just 10 years earlier.
Nook and cranny gardens optimize micro-climates — water catchment for perennial plants, rocks that retain warmth to extend the growing period, and trees providing fuel, food and shade.
So what might a commons-based economy actually look like in its broadest dimensions, and how might we achieve it?
Put otherwise, based on my calculations, if the whole world came to look like one of our most successful ecovillages, we would still need one and a half planet’s worth of Earth’s biocapacity. Dwell on that for a moment.
Humans often “speak to” nature, as when we assume a dominant attitude and expect to be able to “improve” upon nature with technological solutions to perceived (or real) problems....
We cannot begin to say how refreshing it is to see Pope Francis face the urgency of the situation and awaken us to our need to be alive, and to swim upstream. "When people become agents for truth and vital change, they are elevated, enlarged, and lit up."
(Roundup) Go and pollute no more! Hispanics hear Pope's message. Rethinking what it is to be human. Encyclical may be slow to take hold.
You can plant just about anything in your hugel beds and they will do well, but there are certain plants that tend to do very well in a hugel bed.
EPA’s draft assessment made one thing clear: fracking has repeatedly contaminated drinking water supplies (a fact that the industry has long aggressively denied).
The point is not that the Anthropocene should be abandoned—clearly it’s had its uses. But should it be a call-to-action for climate researchers and activists alike?
With fewer than six months to go until the UN climate summit in Paris, it’s worth asking: what’s been achieved in this very significant year for action on climate change? Recent news has certainly been positive, and from unusual suspects.
Earth is on brink of a sixth mass extinction, scientists say, and it’s humans’ fault, Dutch government ordered to cut carbon emissions in landmark ruling, Europe’s energy revolution marches on: one-third of power supply now renewable, The Men Who’re Stealing The Sun , Why …
Walking is moving fast these days.
Hard times for climate change deniers (roundup)
The real situation is that we right now seem to be reaching peak energy demand through low commodity prices. I see evidence of this in the historical energy data recently updated by BP...
What ultimately fuels me to be part of the Ferguson uprising and the solidarity economy movement is a firm belief that people have the right to control the decisions that affect their lives--call it self-determination, democracy, social justice, whatever you will.
Farm commentators are remarking somewhat in surprise that the new move towards local food production and backyard farming are much more in evidence in and around cities than out where the big tractors lumber over the landscape.
Humanity is approaching a time when philanthropy will be more needed than ever, to address proliferating environmental and humanitarian crises. Yet our existing philanthropic model depends upon growth, via returns on financial investments.
A midweek update. There was little change in oil prices so far this week as New York futures continued to trade around $60 per barrel and London futures around $64.
I’m sure most of my readers have heard at least a little of the hullaballoo surrounding the release of Pope Francis’ encyclical on the environment, Laudato Si. It’s been entertaining to watch...
In my life there are two things that have the effect of at least somewhat isolating me from others. The first is being a writer on climate change, peak oil, and the economic crises bound up with those modern predicaments. The other is being a Christian environmentalist. | <urn:uuid:c22d1b53-e385-4497-8db4-63deda3404f2> | {
"date": "2015-06-30T10:02:34",
"dump": "CC-MAIN-2015-27",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375093400.45/warc/CC-MAIN-20150627031813-00196-ip-10-179-60-89.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.944500207901001,
"score": 2.640625,
"token_count": 847,
"url": "http://www.resilience.org/news-archive"
} |
The Push & Pull Method of Lifting
The push and pull method of lifting is a popular training plan among bodybuilders and strength athletes. It involves splitting exercises into two categories -- pushes and pulls -- and training each movement pattern in separate workouts. There are many different ways you can set up your push-pull split, but to make it as effective as possible, consider training frequency, exercise selection and workout volume.
Exercises can be grouped into two basic categories: pushes and pulls. Pushing exercises are those in which the weight is moving away from your body, or you're pushing away from the floor. Pulls are any exercise where you bring the weight toward you. Muscle groups will usually be either pushing or pulling muscles. Your quadriceps, calves, chest, shoulders and triceps are responsible for pushing, while your hamstrings, glutes, rhomboids, lats, biceps, traps and abdominals take care of the pulling exercises.
Types of Exercise
Push and pull exercises can be divided further into compound and isolation categories. Compounds work multiple muscle groups and involve the movement of more than one joint, while isolations focus on just one muscle and joint. Strength coach Christian Thibaudeau writes in his book "The Black Book of Training Secrets" that compound exercises are the best all-around muscle builders and should make up the bulk of your routine, but isolations are useful for bringing up lagging body parts.
A sample push workout may include bench presses or incline presses, dumbbell shoulder presses and triceps pushdowns or close grip presses for your upper body, and squats or leg presses plus calf raises for your legs. For your pull workouts, perform bent-over rows or a deadlift variation, pulldowns or pullups, shrugs, biceps curls and stiff-legged deadlifts or leg curls.
To reap the full benefits from a push-pull routine, John Hansen, natural bodybuilder and writer at "Iron Man" magazine, recommends training four times per week -- two push workouts and two pull workouts. Hansen also advises having an A and B workout for each, so that you can vary your exercise choice. For example, push A may start with back squats, while push B has front squats. However, if you're new to training, you may perform just one push and one pull workout per week to begin with, increasing to two of each when your progress plateaus.
- The Black Book of Training Secrets; Christian Thibaudeau
- Gallo Images/Getty Images Sport/Getty Images | <urn:uuid:095a1556-5e85-4280-ba65-aee1ba80b5e6> | {
"date": "2018-12-12T23:41:57",
"dump": "CC-MAIN-2018-51",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376824180.12/warc/CC-MAIN-20181212225044-20181213010544-00456.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9297061562538147,
"score": 2.546875,
"token_count": 519,
"url": "https://healthyliving.azcentral.com/push-pull-method-lifting-4682.html"
} |
The IAOMT is concerned about the many sources of fluoride and health risks from this exposure.
Sources of human exposure to fluoride have drastically increased since community water fluoridation began in the U.S. in the 1940’s. In addition to water, these sources now include food, air, soil, pesticides, fertilizers, dental products used at home and in the dental office, pharmaceutical drugs, cookware (non-stick Teflon), and an array of other consumer items used on a regular basis. Most people are not aware of important fluoride facts about these sources.
Exposure to fluoride is suspected of impacting nearly every part of the human body, and the potential for harm has been clearly established in scientific research. A 2006 report by the National Research Council (NRC) identified a number of health risks associated with fluoride exposure. Susceptible subpopulations, such as infants, children, and individuals with diabetes or renal or thyroid problems, are known to be more severely impacted by intake of fluoride. Since such populations and all people can potentially be impacted by fluoride exposure, consumers need to know these crucial fluoride facts.
Given the current levels of exposure, policies should reduce and work toward eliminating avoidable sources of fluoride, including water fluoridation, fluoride-containing dental materials, and other fluoridated products, as a means to promote overall health.
Learn the important fluoride facts by accessing these resources from the IAOMT: | <urn:uuid:c7bc4b6d-88d9-4afc-9144-869dd5c5dcaf> | {
"date": "2017-12-17T04:30:28",
"dump": "CC-MAIN-2017-51",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948592972.60/warc/CC-MAIN-20171217035328-20171217061328-00456.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9528263211250305,
"score": 3.5,
"token_count": 291,
"url": "https://iaomt.org/resources/fluoride-facts/"
} |
29th March 2007, 15:18 #1
Member level 2
Calculate the gain in matlab
Can anyone explain how to calculate the gain of a filter in matlab. I can simulate the filter using fdatool and it tells me the gain. However i cannot manually calculate the gain via the results viewer.
Its an iir filter and i have coefficients / transfer fucntion etc.
29th March 2007, 15:18
30th March 2007, 08:36 #2
Junior Member level 3
Re: Calculate the gain in matlab
If u have coefficients a and b den use [H,W]=freqz(b,a,....) built in function of MATLAB. Plot abs(H) against W because you have to compute gain at each frequency W | <urn:uuid:5739bf42-f98b-4a8f-abef-635c3987d723> | {
"date": "2014-10-31T04:01:18",
"dump": "CC-MAIN-2014-42",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414637898844.3/warc/CC-MAIN-20141030025818-00169-ip-10-16-133-185.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9092052578926086,
"score": 2.609375,
"token_count": 170,
"url": "http://www.edaboard.com/thread92146.html"
} |
Fostering joyful learners from kindergarten to fifth grade
Kindergarten: Self and Seasons — Placing Yourself in the World
In kindergarten, children spend time learning about themselves and their natural environment. The bulk of their time is spent in play, much of that play taking place with the open-ended, un-gendered, “loose parts” provided by nature. This play is complemented by more direct and project-based instruction, in which children are exposed of concepts of print, mathematics, science and art. The academic focus is on asking questions and thinking about oneself as a learner, as well as practicing “student behaviors."
First and Second Grade: People and Places — Discovering and Developing your Skills, Learning about your Community
In our first- and second-grade program, our dynamic team nurtures young learners through the blossoming of their academic talents, and continues to foster their social and emotional skills. Students look inward as they develop the skills of reading, writing, mathematics and other academic disciplines. They look outward to their peers, teachers and parents, and the greater community of Seattle and beyond. Instruction takes place mostly indoors, with purposeful field trips to enhance learning.
Third, Fourth and Fifth Grade: People, Otherness and Our Environment
Our oldest students start looking toward the world and their place in it. Children in this age group are full of bold ideas and big questions, and our inspiring teachers help them shape this curiosity and passion for learning into meaningful projects and adventures. Through exploration, our students continue building their strong academic foundations, preparing them to be independent, resourceful, confident students in middle school. | <urn:uuid:bad629c0-d59d-4a69-8cd3-5291dd5cf586> | {
"date": "2018-10-19T19:29:40",
"dump": "CC-MAIN-2018-43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512434.71/warc/CC-MAIN-20181019191802-20181019213302-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9612155556678772,
"score": 3.171875,
"token_count": 337,
"url": "http://www.kapkaschool.org/curriculum"
} |
From 1237 to 1480, following an invasion. the Russian principalities were subjected to rule by Mongols and Tatars (this period is often referred to as the ‘Mongol Yoke’.) Prince Dmitiri of Moscow led the fightback with a spectacular victory at Kulikova in 1380. This year is marked as the start of the Mongol decline; from this point, the Russian principalities, particularly Muscovy, consolidated their power. It was from this time that Russia started to be thought of as an independent nation.
Under rulers such as Ivan IV (‘the Terrible’), the Russian principalities seized control of numerous khanates, gaining huge swathes of territory in northern Asia. By this time, Moscow was by far the most dominant principality. During Peter the Great's reign in the 18th century, victory over Sweden in the Great Northern War led to Russia becoming a major European power. This position was further bolstered by the rule of Catherine the Great, who pushed the Russian border further into Central Europe. Russia also expanded its territory into North and North-East Asia at this time.
The late 19th century saw a substantial increase in Russia's industrial development. There was a concomitant rise of various socialist movements, which culminated in the Russian Revolution of 1917 and the creation of the world's first socialist country, the Union of Socialist Soviet Republics or Soviet Union. There followed a civil war in which the communists eventually prevailed.
In 1924, Joseph Stalin became the effective dictator of an increasingly brutal totalitarian state. Millions were forcibly repatriated, persecuted or killed. Following his death in 1953, the oppression eased slowly. Meanwhile, from 1945, tensions between the USSR-led Warsaw Pact and the USA-led NATO had escalated into the Cold War. Both sides vied for supremacy, often using whatever means available, though the Soviet Union was the more ruthless of the two sides.
In 1985, President Gorbachev started the decommissioning of the totalitarian state in earnest, and in 1991 the USSR was dissolved. The Russian Federation, the largest of the 15 Soviet republics, was widely accepted as the USSR’s successor state in diplomatic affairs, assuming its permanent membership and veto in the UN Security Council. In the immediate aftermath of the Soviet Union’s downfall, Russia became more liberal and seemed to be heading towards a more stable, democratic future.
However, Russia has (quite reasonably) viewed the continuing eastward expansion of NATO and the European Union as a threat, and, under President Putin, has (less than reasonably) shown aggression towards its neighbours. Both Georgia and the Ukraine have been attacked; in 2014 the Ukrainian province of Crimea was annexed. Such actions are an unwelcome reminder of the dark days of the Soviet era.
Coordinates: 55°76'N 37°62'E
Capital Coordinates: 55°76'N 37°62'E
Other Main Cities: Saint Petersburg, Novosibirsk, Yekaterinburg
Official Language(s): Russian
Ethnic Group(s): Russian 79.8%, Tatar 3.8%, Ukrainian 2%, Bashkir 1.2%, Chuvash 1.1%, other or unspecified 12.1%
Currency: Russian Ruble, RUB
GDP: $2.558 trillion
Time Zone: (UTC+3 to +12a)
International Dialling Code: 7
Internet TLD: .ru
Electricity Voltage: 220 Volts AC (50Hz) | <urn:uuid:68e20990-2d2f-46df-a02d-59a27e84af10> | {
"date": "2017-10-17T18:31:07",
"dump": "CC-MAIN-2017-43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187822480.15/warc/CC-MAIN-20171017181947-20171017201947-00056.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9590827822685242,
"score": 3.859375,
"token_count": 724,
"url": "https://www.expatbriefing.com/country/russia/"
} |
A Cowboy’s Rope
To the cowpuncher of the 1880”s his throw rope was almost as important as his horse.
The word lariat comes from la reata, the Spanish term for “the rope.” The word lasso may have come from the Spanish word lazada, which means “running knot” or “bowline.” It also might have come from the word lazo meaning “snare.” However the cowboy of the old west always referred to his lariat as a “catch rope” or “throw rope.” He never called it a “lasso.”
Throw ropes varied in length from between twenty and sixty feet. In the brush country of Texas, men threw a small loop, where on the plains longer and bigger loops were used.
Ropes were made of “seagrass,” Mexican maguey fiber, sisal and a few made of horse hair. Hemp was not used. Grass fiber ropes were coarse and bristly when new so they were laid on a pile of newspaper, then the newspaper was lit to burn off the loose fibers. Grass ropes were strong and could take the strain of stopping heavy cattle and it was preferred by many Texas cowboys.
Nearly two-thirds of the open range cowmen preferred a rawhide rope. Rawhide, called “reata,” are usually braided, though some early types were cut spirally from one long strip of hide. Many rawhide ropes were braided by the men who used them, using four to eight strands of rawhide. Generally though working reatas were made from four strands and were three-eighths of an inch in diameter.
Saddle shops carried these ropes in stock, made by cowboys during the winter months. Braiding this type of rope was an art and a good reatero was an artist.
Since the slip loop or honda (the loop through which the noose was tightened) was the most important part of the rope, great care was taken to fashion it. It was tied into the end and had to be as small as possible to offer the least resistance to the wind, be the lightest possible weight at the rope’s working end, yet allow for slippage and still be strong enough to hold.
A metal ring or half ring was sometimes braided into the honda to provide the easiest slippage for the line. Not too many cowboys used these metal Honda though. They were dangerous when swung and could easily take out a horse’s eye. Some men carved them out of deer and mountain sheep horns. In the 1880’s there was a fad among cowboys for brass and iron Hondas.
To soften up a rawhide rope it was run through two holes in a heavy plank then pulled back and forth.
A lot of work went into a rawhide rope. It was expensive and required more care and it could not take the pop-your-head-off strain that a grass rope could.
Ready for use the rope or reata was carried on the right side either tied to the saddle or slung over the horn. Rope tricks and fancy roping were popular among the men and many spent their leisure time perfecting their skill which in later years became popular entertainment at wildwest shows.
McLoughlin, Denis, Wild and Wooly, An Encyclopedia of the Old West, Barnes and Noble, Inc., 1975
Rickey, Don Jr., $10 Horse, $40 Saddle, Cowboy Clothing, Arms, Tools and Horse Gear of the 1880’s, The Old Army Press, 1976
Foster-Harris, William, The Look of the Old West, A Fully Illustrated Guide, Skyhorse Publishing, Inc., 2007 | <urn:uuid:1d3311ac-601c-4d1c-b567-b59e6d83ceaa> | {
"date": "2016-09-30T22:11:50",
"dump": "CC-MAIN-2016-40",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738662400.75/warc/CC-MAIN-20160924173742-00182-ip-10-143-35-109.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9861268401145935,
"score": 3.296875,
"token_count": 793,
"url": "http://sweetheartsofthewest.blogspot.com/2012/04/cowboys-rope.html"
} |
The Maroons led several wars against the British in Jamaica. In 1795 and 1796, Trelawny Town Maroons, under the leadership of Cudjo, fought once again against the settlers. At the end of the conflict, several hundred Maroons were deported to Nova Scotia, where they complained of the cold weather and poor land. They were eventually transported to Sierra Leone. Five hundred and fifty Maroons arrived there in 1800.
"They were a people active and intrepid by nature, prodigal of their lives, confident of their strength, proud of the character of their body, and fond, though not jealous, of their independence. This had been acquired through a long period of free and unrestrained habits on the mountains of Jamaica, where they had for many years been the only free black element of the population."
Claude George, The Rise of British West Africa, comprising the early history of the colony of Sierra Leone, The Gambia, Lagos, Gold Coast, etc. (London: Frank Cass & Co., 1904) | <urn:uuid:a3673afd-7469-4d06-8650-f8f030e9fbd8> | {
"date": "2015-08-28T00:12:22",
"dump": "CC-MAIN-2015-35",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644060103.8/warc/CC-MAIN-20150827025420-00350-ip-10-171-96-226.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9730874300003052,
"score": 3.78125,
"token_count": 215,
"url": "http://www.inmotionaame.org/gallery/detail.cfm?migration=4&topic=99&id=569448&type=image&page=2"
} |
By: Jeanna Bryner
Published: 02/04/2013 11:37 AM EST on LiveScience
The remains of eight new species of crustaceans, including the oldest known spider crabs that lived 100 million years ago, have been uncovered in a fossil reef in northern Spain, scientists report.
The fossils were found in the abandoned Koskobilo quarry alongside other species of decapod crustaceans (a group that includes crabs, shrimp and lobsters). The two oldest-known spider crabs, named Cretamaja granulata and Koskobilius postangustus, are much older than the previous record holder, said study author Adiël Klompmaker, a postdoctoral researcher at the Florida Museum of Natural History at the University of Florida.
"The previous oldest one was from France and is some millions of years younger," Klompmaker told LiveScience, referring to the spider crabs. "So this discovery in Spain in quite impressive and pushes back the origin of spider crabs as known from fossils."
C. granulatawas about 0.6 inches (15 millimeters) long and showed distinctive features to suggest it was a spider crab, including two diverging spines coming out of its rostrum (the extended portion of the carapace, or shell, in front of the eyes) and a somewhat pear-shaped carapace. The fossil spider crab also sported spines on its sides at the front of the body. [See Photos of the Ancient Spider Crabs]
The reef where they were found seems to have vanished shortly after these creatures lived. "Something must have happened in the environment that caused reefs in the area to vanish, and with it, probably many of the decapods that were living in these reefs," Klompmaker said. "Not many decapods are known from the time after the reefs disappeared in the area," added Klompmaker, who details the findings in a forthcoming issue of the journal Cretaceous Research.
With a team of researchers from the United States, the Netherlands and Spain, Klompmaker collected fossils in the Koskobilo quarry in 2008, 2009 and 2010.
"We went there in 2008, and in the first two hours found two new species," Klompmaker said in a statement. "That’s quite amazing — it just doesn’t happen every day."
With the new findings, some 36 decapod species are known to have existed at the abandoned quarry, making it one of the most diverse localities for decapods during the Cretaceous period (145 million to 66 million years ago), Klompmaker said.
The researchers also found there were more diverse ancient decapods living within the reefs — where they fed, mated and sought shelter — than in other parts of the ocean. | <urn:uuid:d0646050-62f0-43d0-9ef6-c46f5fe06d67> | {
"date": "2014-10-25T11:53:43",
"dump": "CC-MAIN-2014-42",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414119648148.32/warc/CC-MAIN-20141024030048-00165-ip-10-16-133-185.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9686263203620911,
"score": 3.609375,
"token_count": 576,
"url": "http://www.scenereleases.eu/oldest-crabs-found-spider-crab-species-in-fossil-reef-date-back-100-million-years-scientists-say/"
} |
The Department of Energy Office of Scientific and Technical Information (OSTI) has launched a new database product called SciTech Connect.
SciTech Connect consolidates the contents of OSTI’s Information Bridge and Energy Citations Database, and will gradually replace these products. SciTech Connect employs an innovative semantic search tool enabling users to retrieve more relevant information. Other features include faceting, in-document search, word clouds, and personalization.
SciTech Connect’s semantic search technique is known as keyword-to-concept mapping. It accepts keyword-based queries and returns concept-mapped queries as in a taxonomy; a search term is mapped to other associated terms, including narrower and related concepts.
The semantic search is utilized only in the Basic Search. The Advanced Search uses the traditional word/phrase search. With this semantic search, Basic Search will generally return a significantly higher number of search results than Advanced Search. Compare the results of a search for “Greenhouse Effect” in Advanced Search.
Included in SciTech Connect are scientific and technical research results in disciplines of interest to DOE such as chemistry, physics, materials, environmental science, geology, engineering, mathematics, climatology, oceanography, and computer science. It includes bibliographic citations to report literature, conference papers, journal articles, books, dissertations, and patents.
There are over 2.5 million citations in SciTech Connect, including citations to 1.4 million journal articles, 368,000 of which have digital object identifiers (DOIs) linking to full-text articles on publishers’ websites. SciTech Connect also has over 316,000 full-text DOE sponsored scientific and technical reports; most of these are post-1991, but close to 85,000 of the reports were published prior to 1990. | <urn:uuid:18ce630b-8898-4937-9996-d412baca7488> | {
"date": "2017-05-24T17:32:26",
"dump": "CC-MAIN-2017-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607849.21/warc/CC-MAIN-20170524173007-20170524193007-00442.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9109951853752136,
"score": 2.703125,
"token_count": 373,
"url": "https://www.llrx.com/2013/04/doe-launches-new-database-scitech-connect/"
} |
Biodiversity is beautiful
July 2, 2013 —
Last weekend’s Upper Delaware BioBlitz on a 63.5-acre wildlife preserve near Starlight, PA got us thinking about the value of biodiversity. This bioblitz was an inventory of as many species—animals, plants, birds, fish, reptiles, amphibians, insects, fungi and other life—as teams of biologists and volunteers could find and identify in 24 hours. [See Scott Rando’s feature article and photos on page 24.]
Species diversity, ecosystem diversity and genetic diversity are essential to the rich variety of life on this earth; all three of these are included under the definition of biodiversity. The Upper Delaware BioBlitz was most concerned with species diversity within this one particular ecosystem on the West Branch of the Delaware River near its confluence with the East Branch. What the biologists and volunteers found was an amazing community of living things.
There’s no question that billions of people the world over have benefited by using natural ecosystems to supply the products and services that have improved countless lives. There also is no question that this exploitation is now causing natural systems to change and to degrade, and that serious long-term plans for sustainable development and meaningful conservation are necessary if future generations are to enjoy the fruits of earth’s bounteous biological diversity and its valuable products. If allowed to continue unchecked such degradation eventually will place local economies and local societies at risk of becoming impaired as well.
One of the questions that sustainability poses is: how much of the earth’s natural resources and biodiversity we can “harvest” without irreparably damaging planet earth, our one and only home. Sadly, the world’s economic systems place insufficient value on long-term, sustainable outcomes, giving priority to short-term interests instead. And there’s another big challenge—changing human behavior to reduce the rate at which we consume nature’s products will be slow and difficult. (It is currently estimated that humans consume about 20% more of the planet’s natural and biological resources than the earth can continue to support.)
Consider what nature’s ecosystems supply us with: food, water, medicines, fiber to clothe ourselves, biomass for multiple purposes including material to build our houses and to heat some of our homes. These are life’s essentials, and so it seems clear that protecting biodiversity is in our self interest, not to mention the interests of millions of other living species that share our planet. | <urn:uuid:cce929b8-b2d7-47b6-a222-94fc54d48488> | {
"date": "2015-04-01T22:46:04",
"dump": "CC-MAIN-2015-14",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131309963.95/warc/CC-MAIN-20150323172149-00182-ip-10-168-14-71.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9408575892448425,
"score": 2.953125,
"token_count": 515,
"url": "http://www.riverreporter.com/editorial/4302/2013/07/02/biodiversity-beautiful"
} |
"A dog is the only thing on earth that loves you more than you love yourself." – Josh Billings
If you decide to adopt a dog, although you already have a dog back home you also have to think about the integration of the new pet. Adoption is a great thing and it should be done the least amount of stress for all family members. Dogs are very territorial of their home and their family, so keep that in your mind. Dogs are also pack animals and humans are primates. These two groups interact differently. Here are some advices:Dos:
- First of all, write down some house rules and everyone needs to agree to them. For example: Who feeds the dog, where, when? Who will exercise the dog?
- If you pick up the new dog you should wear clothes that smell like your pets, so that the new dog can already smell the other pet.
- Put the new dog in a crate and leave the crate in the middle of a room in plain view. The crate should be an open air crate with wires so the other dogs can see and smell the new puppy.
- Pretend that you have no idea the new dog is even there. Your new dogs will discover the new pet and will probably become excited.
- If your other pets are not aggressive about the new dog and they have a good behavior, you can treat them.
- As soon as you are satisfied with the new situation you can let the new dog out of the crate.
- Show the existing pets that the new dog is now part of the pack.
- Give your new dog rules, so that he can feel safe and show him where he can find food and where he can sleep.
- Go for a walk with both of them and when you come to an open field you can leave them, they get the chance to play and to interact.
- Show the new dogs the surroundings and his new home and environment.
- Always try to stay calm and be silent.
- Do not bring the other dog when picking up the new dog. You will have more time for the new dog.
- Do not favor the new dog. Every dog should get the same amount of attention.
- If the new dog and the existing dog don't want to interact, don't force them and if they become aggressive, separate them.
Keep in mind. There are some dogs, whatever you do; they will be never reliably accepting another dog. And if you follow these rules you won't have any problems with the integration of the new dog into your family.
Ready to adopt?
For more information, contact FORA:
Many people enjoy the companionship of cats and dogs, who were domesticated thousands of years ago. Over time, people have manipulated animal breeding to produce certain physical characteristics, resulting in the different types of cats and dogs we know today. But domestication took these animals out of their natural environment, and their reproduction is no longer regulated by predators or habitat. The result is an overpopulation crisis that can only be controlled through widespread spaying and neutering.
Thank you for visiting FurKidz.co.za, with your consideration of adopting a shelter animal you have taken your first step toward responsible pet ownership. Caring for a companion animal goes far beyond providing food, water and shelter. It takes research and careful planning to bring the right pet into your home, and to make sure your lifestyle is the right one for your pet. The following 10 questions are there to help you with your decision and to make you aware of the responsibility you are carrying:
Certainly the most serious of all negative behaviors a dog can exhibit, biting cannot be tolerated under any circumstances.
Understanding the root cause will help you to identify the most appropriate training technique to correct and eliminate this negative behavior.
So you opened your heart and home to a shy, timid rescue dog. What can you do to help your new pet adjust and become an involved member of the family? I will assume you already had your dog checked out by a veterinarian to make sure the behavior isn't due to an illness or injury.
It's only a matter of time before you'll want to take your new best friend – who you trained to be sociable and obedient – on some road trips. Maybe to the park, to a little league game, to a 5K run, a camping trip, wherever. Since an ounce of prevention is worth far more than a bucket seat full of doggie vomit, you would be well-advised to take precautionary steps to prepare your buddy for his first family road trip. | <urn:uuid:bb37bdfb-4e01-4746-8d4d-0885cbaf2145> | {
"date": "2015-09-05T10:12:21",
"dump": "CC-MAIN-2015-35",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440646242843.97/warc/CC-MAIN-20150827033042-00168-ip-10-171-96-226.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9592632055282593,
"score": 2.640625,
"token_count": 943,
"url": "http://www.furkidz.co.za/index.php?option=com_content&view=category&layout=blog&id=5&Itemid=15"
} |
There is something not being talked about here.
The guidebooks paint an exotic picture of the floating islands of the Uros, a pre-Incan people who live on self-constructed floating reed islands off the coast of Lake Titicaca near Puno, as a cultural novelty that must be seen to believe.
And indeed, the construction of the islands, boats and furniture using a layered reed system is a true marvel which is difficult to comprehend unless you see it.
However, since the Uros opened up their homes to curious tourists some 30 years ago, something has gone awry. Our day trip to Summa Willjta floating reed island on Peru’s side of Lake Titicaca was awkward, uncomfortable and felt exploitative for both us as well as the Uros people.
We are still left scratching our heads as to how this experience could be improved for tourists as well as the people of Uros.
Uros People of The Floating Reed Islands
What draws people to the edge of Peru’s southern border (aside from the gorgeous Lake Titicaca) is the cultural tourism of the indigenous communities inhabiting islands and small villages along the border of the lake.
The Floating Reed Islands (Isla Flotantes) of the Uru people are one of these communities due to their unique choice of lifestyle living on islands they’ve made entirely out of reeds. Originally built for defensive purposes, the floating reed islands allowed the Uros to be able to move their homes further into Lake Titicaca if needed. Today only about 200 of the remaining 2,000 Uros descendants still live on a network of nearly 70 floating reed islands five kilometers from the coastal mainland town of Puno, Peru.
What Are The Uros Islands Made Of
The construction of islands and boats out of totora reeds which grows abundantly on Lake Titicaca is truly remarkable.
The Uros people start by cutting out a block of the dense reed root system measuring two meters in depth. This root layer is woven together and anchored with ropes and sticks to the bottom of the lake to hold the islands in place. From here layers of reed are placed in contrasting directions on top of the root system until the total density of the island measures 4 meters or so. Building an island is an intensive process; in total it can take up to a year to construct a new island and they typically can accommodate between 7 and 10 families. While a reed island can last up to 25 years, because of rotting of the reeds at the bottom of the island, new layers have to be added constantly.
Lake Titicaca and Floating Reed Island Tour
We came to Puno, Peru with the intention of visiting Taquile, another Lake Titicaca island. However, due to strong winds that capsized a boat the previous day they weren’t allowing boat traffic to navigate that far into the lake. So instead our tour company, All Ways Travel, who we thought were pretty mediocre despite their raving reviews, sold us a half-day Uros floating island tour. When in Puno, I guess…
From the port our boat navigated us slowly through a forest of shallow reeds until we arrived at Summa Willjta, one of the floating islands of the Uros indigenous population. We were greeted by the president of this island (population 22) who then proceeded to demonstrate using a miniature model how his community constructs islands, boats and furniture out of the totora reeds. The tour was good, though very staged, up until this point.
Next the tour group was divided up and each group was asked to visit one of the family’s houses. We were paired with the president of the island who we followed to his home and did our best to understand his Spanish as he pointed out his bed, furniture, and the clothes of his family members. Then came the first round of trinket sales where we were asked to buy handicrafts that he and his wife supposedly made. When we didn’t show interest we were led outside of his home to where all of the women from the island were lined up with even more trinkets. One by one the President’s wife held up different textiles and described how much time it took her to make each of them. Unfortunately, we had seen these very same handicrafts in the local markets only a few days prior and they most certainly were not handmade or unique to the Uru people.
When we said no thank you to buying handicrafts our guide from Puno reminded us that the only way the Uros make money is via tourism and each family has to sell at least 8 large textiles (100 bolivianos each) per month to make ends meet. I wanted to ask him why these families weren’t being compensated adequately from the actual boat tour revenues. Uncomfortable by the high pressure sales we tried our best to escape to the islands edge until all of the other groups were finished.
Next was an “optional” (but really not optional) additional 10 boliviano per person ride on one of Summa Willjta constructed reed boats to take us across the island complex. After our entire tour group loaded up onto the boat, the women of the island initiated a song and dance (twice in different languages) to bid us farewell. They looked about as uncomfortable as I felt at that moment.
Our boat ride lasted all of five minutes and landed us at another reed island built entirely for tourism to yet again try to sell us more trinkets and overpriced coffees and baked goods. Two coffees and another fifteen long minutes later, we were gladly boarding our original boat to return us to Puno.
Cultural Tourism & Best Intentions
Not unlike our experience visiting the Siona people in the Ecuadorian Amazon, our trip to the Uros Floating Islands felt contrite, forced and very staged. Rather than having an authentic experience (an unrealistic expectation on our parts from the start) we left feeling guilty and uncomfortable and without much of an understanding for why the Uros have chosen to continue living in the unique and rather remarkable way they do. It didn’t seem like these feelings of discomfort were that far off for the Uros that we met on Summa Willjta either.
Today cultural tourism provides one of the only means of income for the Uru people. Yet these cultural tours have clearly put a strain on their traditional ways of life and forced them into the position of constant sales to survive. The end result is an experience that leaves everyone wanting for more (except perhaps the profiting tour operators from Puno).
While the construction of the floating reed islands was truly fascinating, our day at Summa Willjta will make me think twice (and do my research) before signing up for another cultural tour.
Have you visited the floating reed islands? Did you have a different experience or other reactions? We’d love to hear what you thought! | <urn:uuid:7c036aca-e248-4fb0-a4bc-cd87a5823ea3> | {
"date": "2018-01-17T04:40:46",
"dump": "CC-MAIN-2018-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084886815.20/warc/CC-MAIN-20180117043259-20180117063259-00256.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9690055847167969,
"score": 2.84375,
"token_count": 1448,
"url": "http://www.boldtravel.com/why-tourism-has-failed-the-uros-people-on-the-floating-reed-islands/"
} |
Capalungan, Jann Mark*, Cho, Eunnuri, Cortez, Noelene
and Concepcion, David.
Department of Chemistry, University of Santo Tomas Manila, Philippines
This experiment sought to separate and calculate (in %) the alcohol content of Ginebra San Miguel by distillation and also compare the efficiency of simple and fractional distillation techniques. The experiment is divided into two parts, simple and fractional distillation. Distillate was collected and the remaining sample that didn’t pass through the process of evaporation and condensation is called residue. The residue wasn’t measured because the sample got burned before reaching 100°C temperature. The results show that the ethanol content of Ginebra San Miguel that was separated by simple is 38%. While for fractional distillation, the ethanol content is 46%. The percentage errors for simple and fractional distillation are both 5%. It is also found that fractional distillation is more efficient than simple distillation in terms of decontamination or separation of substances.
Distillation is the process where compounds are purified by separating the more volatile substance from non-volatile or less volatile substance. An example of this is the differences in boiling point. Boiling point is the temperature when the vapor pressure of a liquid-phased compound equals with the pressure exerted on it. This external pressure is usually atmospheric pressure. As the temperature of the liquid increase, the vapor pressure will also increase. And if this case will happen, the vapor pressure will equal to the atmospheric pressure that will cause boiling. Since different compounds have different boiling points, the components often separate from a mixture when the mixture is subjected to distillation. Also, boiling points can be determined by the process of distillation. In distillation, vapor and liquid compositions are both interest. The compositions of the vapor and liquid are governed by Raoult’s and Dalton’s Laws; provided the vapor and solutions are both Ideal. Raoult’s law states that the vapor pressure of an ideal solution is dependent on the vapor pressure of each chemical component and the mole fraction of the component present in the solution. While Dalton’s Law states that the total pressure exerted by a gaseous mixture is equal to the sum of the partial pressures of each individual component in a gas mixture. At any temperature, some molecules of a liquid possess enough kinetic energy to escape into the vapor phase (evaporation) and some of the molecules in the vapor phase return to the liquid (condensation). Equilibrium is set up, with molecules going back and forth between liquid and vapor. At higher temperatures, more molecules possess enough kinetic energy to escape, which results in a greater number of molecules being present in the vapor phase. There are two types of distillation according to separation, the simple and fractional. Fractional distillation is used when the boiling points of chemicals in a mixture are close to each-other, while simple distillation is generally used when the boiling points are significantly different. In simple distillation, evaporation of a volatile liquid from a solution of non-volatile substances takes place. The water will condense the vapor through the water condenser that will be collected in the receiver. There are cases when the distillate would contain a majority of one liquid but would still contain a little of the second. In order to separate this, another distillation must take place. This repeated distillation is the principle behind fractional distillation wherein it redistills automatically. Automatic redistillation takes place on the apparatus called fractionating column. The vapor produced by the boiling mixture will rise up in the column and will condense when it reaches a certain point. Then it will turn into... | <urn:uuid:2ec7f868-33d6-4c4e-88c6-91fd01ac4645> | {
"date": "2016-10-26T11:50:54",
"dump": "CC-MAIN-2016-44",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720941.32/warc/CC-MAIN-20161020183840-00500-ip-10-171-6-4.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9053859710693359,
"score": 3.609375,
"token_count": 765,
"url": "http://www.studymode.com/essays/Formal-Report-541890.html"
} |
The Ugandan Minister for Environment, Ms Maria Mutagamba, launched a collection of drawings that young people form Bangladesh, Malawi and Uganda, have created to express what Climate Change means to them.
The drawings were entered into a competition that Oxfam co-coordinated, so that young people in developing countries, could send a message to delegates in Bali, to think about their future, when making decisions at this conference
Ms Mutagamba was moved by the images and said that the children “ …. expressed themselves (through) images of floods and drought … they have lost hope and we must restore their hope in the global community.”
The drawings drew a big crowd at their unveiling, you can see the images in more detail on our Flickr profile and watch the video of the unveiling of the drawings below.
One of the drawings has gone off to a special meeting. More about that in our next few blogs. [youtube=http://www.youtube.com/watch?v=B5JZAtyLb-8] | <urn:uuid:54c65df2-b9c0-45bf-923e-7c2a0bccd1be> | {
"date": "2019-10-22T22:47:14",
"dump": "CC-MAIN-2019-43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987824701.89/warc/CC-MAIN-20191022205851-20191022233351-00336.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9633378386497498,
"score": 2.796875,
"token_count": 215,
"url": "https://blogs.oxfam.org/fr/blogs/07-12-10/ugandan-minister-environment-unveils-art-children-about-climate-change/index.html"
} |
It takes a lot of fossil energy to mine uranium, and then to extract and prepare the right isotope for use in a nuclear reactor. It takes even more fossil energy to build the reactor, and, when its life is over, to decommission it and look after its radioactive waste.
As a result, with current technology, there is only a limited amount of uranium ore in the world that is rich enough to allow more energy to be produced by the whole nuclear process than the process itself consumes. This amount of ore might be enough to supply the world's total current electricity demand for about six years.
Moreover, because of the amount of fossil fuel and fluorine used in the enrichment process, significant quantities of greenhouse gases are released. As a result, nuclear energy is by no means a 'climate-friendly' technology.
How Long Before Uranium Shortages?
Posted by Gail the Actuary on February 19, 2009
URANIUM RESOURCES AND NUCLEAR ENERGY
Lower grade uranium could hasten climate change pace
By Rob Edwards Environment Editor
AS the use of nuclear power expands, it will become increasingly ineffective at combating global warming, warns a report by an independent think tank published today .
The Oxford Research Group argues that a worldwide shortage of high- grade uranium ore will force new nuclear reactors to exploit increasingly lower-grade ores for their fuel. Because that requires more energy to extract, the process will result in ever-greater amounts of climate-wrecking pollution.
A report by the Dutch nuclear expert Jan Willem Storm van Leeuwen says that, after 2034, the grade of uranium ore being dug out of the ground will fall dramatically. “This will cause nuclear power to become increasingly inefficient and expensive, leading to an increase in carbon dioxide emissions,” he says.
By 2070 the grade of uranium ore being used will have become so poor he predicts that nuclear power will become a net energy user. At the end of 2005 the world’s known recoverable uranium resources amounted to about 3.6 million tonnes, mostly in Australia, Canada and Kazakhstan.
A similar point will be made tomorrow when the Scottish National Party (SNP) publishes its energy review. It has been written for the party by leading energy experts Stephen Salter, Kerr MacGregor and Clifford Jones.
The SNP review argues that within 50 years or less carbon dioxide emissions from nuclear power could be as high as those from gas-fired power stations. Nuclear technology also releases chlorine and fluorine which can be thousands of times more effective at causing climate chaos, it points out.
The value of nuclear power as a weapon against climate change might have been exaggerated, the review concludes. “The advantage may not be as large as has been claimed.”
The nuclear industry, however, is optimistic that new reserves of uranium will be discovered. And, if not, it will rely on the fast breeder reactor, which extracts up to 60 times more energy from uranium than conventional reactors.
According to Luis Echavárri, director-general of the Nuclear Energy Agency of the OECD club of industrialised nations, fast reactors will be needed in 60 years’ time. They are “most attractive from a sustainable point of view”, he said.
But the industry’s view is dismissed by the Green MSP Chris Ballance. The fast reactor was a “discredited technology across the world”, he said. “And building nuclear power stations to tackle climate change is about as much use as a chocolate fireguard.”
09 July 2006 | <urn:uuid:a6980919-1d5c-4a9b-8024-2a43473897ef> | {
"date": "2015-04-28T19:44:42",
"dump": "CC-MAIN-2015-18",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246662032.70/warc/CC-MAIN-20150417045742-00254-ip-10-235-10-82.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9442208409309387,
"score": 3.703125,
"token_count": 743,
"url": "http://www.oilempire.us/peak-uranium.html"
} |
As I load up my trunk with containers of blocks and found materials in preparation for yet another training for early childhood teachers, I tell myself that I am getting too old for all this schlepping. Just as quickly as the thought crosses my mind, a surge of excitement and energy pulses through me. After six years of facilitating professional development sessions on the exploration of materials with teachers, I am more convinced than ever that blocks are one of the most essential materials for the early childhood classroom.
“Why then, in the name of school readiness, is block play marginalized, if not disappearing from children’s classrooms?” asks Margie Carter in the foreword to Creative Block Play (Hansel 2017). Increasingly, young children today are sitting in front of two-dimensional screens and worksheets instead of having playful, hands-on, sensory experiences with three-dimensional objects (Hansel 2015). Why is this a problem and what is it about blocks, and wooden unit blocks in particular, that make them such an important material for young children?
Many early childhood experts, including Friedrich Froebel, Caroline Pratt, Harriet Johnson, Elizabeth Hirsch, and Mary Jo Pollman, have documented the value of blocks for children’s learning, offering evidence that when children are given time to plan, construct, and create with blocks, they develop socially, emotionally, cognitively, and physically (Hansel 2017, 5). This evidence is now being confirmed by scientists using new technologies to see the inner workings of the brain.
According to Dr. Jo Boaler, a professor of mathematics education at Stanford University, brain research now shows that as you learn something deeply, the synaptic activity in the brain will create lasting connections (unlike when you learn something in a superficial way) and that “synapses fire when we have conversations, play games, or build with toys” (Boaler 2016, 1). In other words, building with blocks to experience their three-dimensional properties will create a lasting pathway in the brain and a deeper understanding of shape, whereas identifying three dimensional shapes on a workbook page is unlikely to build understanding of shape and three-dimensionality.
The Importance of Spatial Skills
In addition, there is exciting new evidence linking good spatial skills and children’s future achievement in all the STEM (Science, Technology, Engineering and Mathematics) subjects (Lubinski 2013; Newcombe 2010). “Despite the evidence, however, the importance of spatial skills is often overlooked as a key feature of STEM education. This frequent neglect of spatial development creates an additional barrier to children’s STEM learning” (Berkowicz and Myers 2017) and reminds those of us in early childhood education that we must start paying attention to developing spatial skills. While laying the foundation in the STEM subjects is important, especially for underserved populations and those underrepresented in the STEM fields, including girls, spatial skills are critical in many other fields, as well as in everyday life, such as when we load up a trunk with blocks and navigate our way to a new location for the first time.
The great news is that spatial skills can be improved with practice. While not all experts agree on a common definition of what spatial skills are (Hansel 2017, 20), most agree that the use of manipulatives helps children make sense of abstract concepts. Wooden unit blocks are a perfect example of a child-friendly manipulative that can be used to strengthen spatial skills. Think about how a child recreates a zoo with blocks while closely referring to a map of the zoo and carefully ensuring that each zoo animal fits into the enclosures she has made to scale.
Isn’t it time to put blocks back in the spotlight again?
Start with giving children ample time for open-ended exploration with blocks, but don’t stop there. If you really want to see children’s spatial thinking flourish, target the spatial skills in the table below and offer block activities that encourage spatial language and challenging tasks! Now the spotlight is on you!
Reprinted with Permission: Regan Hansel, Rosanne. “Blocks: Back in the Spotlight Again!” Teaching STEM with Ramps, Community Playthings, 5 Sept. 2017, www.communityplaythings.com/resources/articles/2017/blocks-back-in-the-spotlight.
- Berkowicz, Jill and Myers, Ann. “Spatial Skills: A Neglected Dimension of Early STEM Education.” Retrieved on June 27, 2017 at http://blogs.edweek.org/edweek/leadership_360/2017/02/spatial_skills_a_neglected_dimension_of_early_stem_education.html
- Boaler, Jo. 2016. Mathematical Mindsets: Unleashing Students’ Potential through Creative Math, Inspiring Messages and Innovative Teaching. San Francisco, CA: Jossey-Bass.
- Hansel, Rosanne. 2017. Creative Block Play: A Comprehensive Guide to Learning through Building. St. Paul, MN: Redleaf Press.
- Hansel, Rosanne. 2015. “Bringing Blocks Back to the Kindergarten Classroom.” Young Children 70 (1):44-51.
- Lubinski, David. 2013.“Early Spatial Reasoning Predicts Later Creativity and Innovation, Especially in STEM Fields.” Science Daily. July 15.
- Newcombe, Nora. 2010. “Picture This: Increasing Math and Science Learning by Improving Spatial Thinking.” American Educator, Summer 2010, 29-43.
- Pollman, Mary Jo. 2010. Blocks and Beyond: Strengthening Early Math and Science Skills through Spatial Learning. Baltimore, MD: Brookes.© | <urn:uuid:dd4366a2-3372-491e-a4dd-39cf0b4bdd21> | {
"date": "2019-09-19T05:01:19",
"dump": "CC-MAIN-2019-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573439.64/warc/CC-MAIN-20190919040032-20190919062032-00296.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9141273498535156,
"score": 3.84375,
"token_count": 1193,
"url": "https://www.4-c.org/blog/blog/com-sef-page-4.html"
} |
A gas operated fully automatic air cooled aircraft machine gun invented by Col. Isaac Lewis of the US Army. Highly distinctive in appearance, the original Lewis gun had a large, round ammunition magazine on top of the receiver and its barrel enclosed in a long, round aluminum tube. Developed as an assault weapon the original gun had a stock that was removed when modified for aircraft use. In its day the Lewis gun was a real innovation, weighing just 26 pounds against its competition, the Vickers machine gun at 68 pounds. The Lewis Gun was the first gun to be mounted on an airplane. A Bristol Scout had one mounted on the left side of the cockpit and angled out to miss the propeller. Wing mounts, ring mounts, and fixed mounts were developed to deploy the Lewis gun on several WW1 allied fighters. The early magazines held 47, 30 cal. Rounds, later magazines were up-graded to hold 94 rounds. The Lewis light machine gun was also an amazing World War I success story. By the spring of 1916, more than 50,000 Lewis guns were in combat use by allied Troops. Lewis machine guns were used well into the 1940’s. | <urn:uuid:d59414b8-6b70-4eaf-b286-39e0d070eeb9> | {
"date": "2015-12-01T05:00:40",
"dump": "CC-MAIN-2015-48",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398464396.78/warc/CC-MAIN-20151124205424-00068-ip-10-71-132-137.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9859023690223694,
"score": 2.9375,
"token_count": 234,
"url": "http://www.turbosquid.com/FullPreview/Index.cfm/ID/488701"
} |
The service you are requesting requires authentication.
Basket of fruit
Michelangelo Merisi, known as Caravaggio - 1597-1598 circa
A basket of fruit. A simple subject, but with a wealth of symbolism and allusion, painted with considerable expressive power. As usual, the famous 16th century painter Caravaggio is dazzling for his extreme realism.
This canvas can be seen in the Pinacoteca Ambrosiana.
One has the impression of almost scenting the fragrance and tasting the flavour of these fruits, as if reliving the story behind this composition. The painting is the result of an exchange of letters between Cardinal Federico Borromeo and Cardinal del Monte, both sharing the same passion for art and art collecting, which, in the case of Cardinal Borromeo, led to his project for the Gallery.
The painting was created in 1597-1598, and given to Cardinal Borromeo in 1618. It is an example of the artist’s early work. In this period, he dedicated particular attention to the naturalistic depiction of objects.
The basket of fruit is in the foreground, a harmonious composition of fruit and leaves. It is placed on a table, off centre, almost unbalanced, as if it were about to fall.
It expresses the ephemeral nature of earthly things (a theme that was often discussed by the two Cardinals in their letters). The reds and browns of the fruit contrast with the bright, featureless background, which seems to evoke an almost divine light that models reflections and transparency, focusing the attention onto the foreground image.
The work was one of the Cardinal’s favourites. It belongs to a group of paintings with natural subjects, such as the collection of still life paintings by Flemish artist Bruegel.
A curiosity: the painting was reproduced on the 100,000 lire banknote thus known as the “Caravaggio” (it was legal tender from 1983 to 2001). | <urn:uuid:cd258040-7f74-48d7-a6d4-e32ec41d15fb> | {
"date": "2018-11-14T17:28:25",
"dump": "CC-MAIN-2018-47",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039742253.21/warc/CC-MAIN-20181114170648-20181114192648-00416.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9634081125259399,
"score": 2.859375,
"token_count": 415,
"url": "http://www.turismo.milano.it/wps/portal/tur/en/arteecultura/capolavorieopere/pittura/La_Canestra_di_Frutta"
} |
Join the Nation's Conversation
To find out more about Facebook commenting please read the Conversation Guidelines and FAQs
7 history lessons that help explain the Dakota Access Pipeline protests
Oceti Sakowin camp in N.D. is the largest of three set up in opposition to the DAPL. The campers are concerned about the pipeline, but a history of tribal land losses and worries about climate change have helped turn the opposition into a movement.
CANNONBALL, N.D. — There are a lot of terms tossed around at the Oceti Sakowin camp near the Standing Rock Reservation that the outside world might not be familiar with.
“Water is life,” — “Mni Wiconi” in Lakota — is the refrain from those opposed to the Dakota Access Pipeline, who call themselves “water protectors” in reference to their concerns about leaks into the Missouri River.
The safety of the water supply is the immediate issue at Standing Rock, but the discussions at camp go well beyond Dakota Access. There’s talk of treaties, discovery doctrines, environmental racism and centuries of unkept promises undergirding the pipeline fight.
Within the camps, the Treaty of 1851 is as common a piece of historical knowledge as the Civil War.
Outside, however, the facts are less well-known.
Here are a few key historical points to help understand what has animated Native American tribes near the proposed pipeline and their supporters.
The Doctrine of Discovery
This legal concept was used by European colonial powers to justify the taking of aboriginal land. Essentially, it gave land title to any Christian nation whose explorers set foot upon non-Christian soil. In 1823, the U.S. Supreme Court decision of Johnson vs. M’Intosh codified the doctrine into U.S. law, when Chief Justice John Marshall wrote an opinion stating that Native Americans could occupy land, but only the government could own it. Marshall, as it happens, stood to lose much of his own land if he’d ruled for the other side.
The Fort Laramie Treaty of 1851
This treaty with eight Native American nations drew boundaries in the Dakotas, Nebraska, Wyoming and Montana and offered safe passage to travelers on the Oregon Trail and the right of the U.S. to build roads and forts. The treaty has been ignored, but it was never rescinded.
This is the treaty referenced most often in coverage of the camp. Some of the land crossed by the Dakota Access Pipeline is within the 1851 boundaries for the Standing Rock, Cheyenne River and Yankton Sioux tribes, including the “treaty camp” from which protesters were forcefully ejected on Oct. 27.
The Fort Laramie Treaty of 1868
This treaty created the “Great Sioux Reservation,” which included the entirety of South Dakota west of the Missouri River. Much of the 1851 treaty land was included as Indian hunting ground. The U.S. promised to keep white settlers out of the reservation, but that promise collapsed quickly after the discovery of gold in the Black Hills, considered sacred by the Sioux.
Act of Feb. 28, 1877
In August of 1876, just after General George Custer’s defeat at the hands of the Great Sioux Nation, the U.S. Congress attached a “sell or starve” provision to the Indian Appropriations Act that tied food rations to surrender of the territory. Seven months later, this act was passed, removing the Black Hills from tribal control. Overturning the 1868 treaty technically required a vote of three-quarters of the Sioux males, but that didn’t happen. The government got just 48 signatures from the Standing Rock Nation.
Dawes Act and shrinking reservations, 1887-89
This move pushed individual land ownership into reservation communities. It offered U.S. citizenship to Native Americans who accepted individual tracts of land and agreed to “adopt the habits of civilized life” for 25 years. In 1889, just after North and South Dakota's admission to the Union, Congress acted to further shrink Native land holdings and created five smaller reservation. Homestead Acts further eroded their size into the 20th century.
Pick-Sloan Plan of 1944
Massive flooding along the Missouri River inspired a plan to build a series of dams and reservoirs, including Lake Oahe. This required the taking and flooding of more than 200,000 acres of the tribes’ most fertile land, on which they hunted and from which they gathered the ingredients for traditional medicines.
The tribes were paid pennies on the dollar for the flooding. Standing Rock, which lost 56,000 acres of bottom lands, estimated the value at $23 million, according to lawyer and historian Peter Capossela's 2016 book The Land Along the River. The Bureau of Indian Affairs appraised it at $1.3 million.
The land on which the main protest camp now sits and under which the Dakota Access Pipeline would be built belong to the U.S. by virtue of the Pick-Sloan plan. Standing Rock and Cheyenne River Sioux Tribes had lobbied for the return of land unneeded for the dams in the 1990s, but former Gov. Bill Janklow and former Sen. Tom Daschle negotiated a plan to transfer jurisdiction of some of it to the South Dakota Department of Game, Fish and Parks instead.
United States vs. Sioux Nation of Indians, 1980
This U.S. Supreme Court case sifted through the facts of the 1877 taking of the Black Hills. The Justices ruled that the Congressional action constituted a taking of property under the Fifth Amendment of the U.S. Constitution. The government was ordered to pay the tribes $17.5 million for the land, plus interest. The tribes have yet to accept payment, however. The money – more than $1 billion - remains in a trust with the Bureau of Indian Affairs.
Centuries of distrust
Marcella LeBeau, 97, of Eagle Butte, S.D., remembers life before Pick-Sloan. Her family was forced off their land to make way for the dams.
“We were paid, but we weren’t paid as much as the people across the river were paid,” LeBeau said. “… to this day, we’re still trying to get the compensation we deserve.”
The World War II nurse, of the Two Kettle Band of the Cheyenne River Sioux Tribe, has visited Oceti Sakowin five times in support the movement. The history of land losses is something LeBeau hopes the younger visitors learn through it.
“I look at it as a reawakening of our history from the past, beginning way back to the doctrine of discovery,” LeBeau said.
Pipeline supporters prefer to keep the conversation confined to the specific topic of Dakota Access itself.
Kelcy Warren, the CEO of Dakota Access operator Energy Transfer Partners, acknowledged last week during an interview with the Dallas Morning News that there are indigenous issues reaching farther back into history than his company's pipeline, but said it wouldn't be appropriate for him to weigh in on them.
As for the pipeline project, ETP has consistently said that Dakota Access took all the legal steps and more needed to consult with tribes near the pipeline route.
This week, Dakota Access filed a lawsuit asking a judge to allow it to proceed with drilling beneath the Missouri River without a formal easement from the U.S. Army Corps of Engineers, who approved the project over the summer.
Follow John Hult on Twitter: @ArgusJHult | <urn:uuid:99f98aaf-cdf5-4bb4-b29d-83dad6d89dc0> | {
"date": "2018-12-16T22:17:32",
"dump": "CC-MAIN-2018-51",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376827998.66/warc/CC-MAIN-20181216213120-20181216235120-00216.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9586160778999329,
"score": 3.5625,
"token_count": 1599,
"url": "https://www.usatoday.com/story/news/nation-now/2016/11/16/7-history-lessons-help-explain-dakota-access-pipeline-protests/93979484/"
} |
I read a book over the summer about total participation techniques. I was really excited about this idea of getting every kid to answer questions, rather than just one kid. So as I started planning for building my classroom climate, this was one of my major considerations. I really wanted to utilize technology in a way to increase whole class participation whenever possible. These have been the things that I've been really pleased with in the first two weeks when it comes to increasing class participation.
1. Go Formative--I was introduced to GoFormative as one of the sessions at Space Camp this summer and thought it had potential. I tried it last week and loved it! I have used online quizzes on Google forms or quia, but what is different about Go Formative is that you are seeing data real-time (not just when kids finish). And not only can you see it real-time, you can send kids individual feedback, and they can make corrections based on the feedback you sent them. So here was a sample question:
The answer I was wanting was that students disagreed, because the numbers were not in order.
Here is an example interaction between one student and myself.
I was impressed with how powerful these interactions were, and look forward to using this tool more in my classroom!
2. Desmos--I have written before about being a big fan of Desmos, but this week as I used it as a way to encourage whole class participation and formative assessment. We were doing one of my favorite lessons, one about students who are going into business together. My class has to analyze the business plans in terms of how much money each partner initially has, and how much they save each week. It's a great activity to teach distributive property, combining like terms, and the appearance of linear functions with positive/negative slope. I have always loved this lesson, but Desmos added something to it. We did most of the lesson on paper, and then I used just a few Desmos questions for real-time formative assessment.
You can see here the responses of just a few of my students to a question that asked them to look at a graph and identify which person it represented. I loved being able to quickly show several different strategies for determining whose graph it was, while highlighting student work. It was fantastic!
3. Response Cards--This was my low-tech whole class participation technique...but still effective. We were having a debate about a question I had on the board, so I had students take out the "agree, disgree, or not sure" cards. I was able to get a quick feel for the mood of the class, as well as who might present arguments for each side to further our discussion. Quick, easy method for formative assessment! (You can get these response cards free at Teachers Pay Teacher, by the way)
4. Google Questions on classroom--I really enjoyed using the question function on Google Classroom. I played a video which showed a visual representation of mean, and then asked students to respond as a Google Question whether they thought the video represented mean, median or mode. Again, quick, easy formative assessment. Some classes got it right away, and that was great. Other classes were split down the middle at first, but after viewing the responses in the question, every class quickly concluded that is was mean.
The whole interaction probably only took 10 minutes, and it was extremely effective!
5. Kahoot--This is certainly not a new one to me, as I used Kahoot frequently last year as well. This year, I'm trying to refine a few things about Kahoot. A couple of things I'm planning to incorporate in my Kahoots this year are spiraling review and trivia. I want to add just a couple of spiral review questions to every Kahoot, just to keep skills sharp. And the trivia is just for fun...the kids love knowing that every now and then I'll throw in something random just for fun!
I also love to use Kahoot to teach error analysis, and trying to get the kids to figure out what error had to be made to get the incorrect answers. | <urn:uuid:ff288597-95be-4d6d-90b8-32378d01593d> | {
"date": "2017-05-29T03:44:56",
"dump": "CC-MAIN-2017-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463612013.52/warc/CC-MAIN-20170529034049-20170529054049-00484.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9816575050354004,
"score": 2.828125,
"token_count": 850,
"url": "http://wilcoxsway.blogspot.com/2016/08/"
} |
Understanding The Real Retention Crisis in America’s Urban Schools
July 30, 2012
America’s schools are losing too many of their best teachers.
America’s urban schools are taking a negligent approach to teacher retention; many rarely make a strong effort to keep “Irreplaceables,” teachers so successful at advancing student learning that they are nearly impossible to replace, or usher unsuccessful teachers out. As a result, the best and worst teachers leave urban schools at strikingly similar rates.
The Irreplaceables spans four urban school districts encompassing 90,000 teachers, 2,100 schools and 1.4 million students to focus on the experiences of exceptional teachers. From the data we analyzed from these districts, we found three main causes for the destructive retention patterns we saw in schools.
Principals make far too little effort to retain Irreplaceables or remove low-performing teachers.
Poor school cultures and working conditions drive away great teachers.
- Policies give principals and district leaders few incentives to change their ways.
To combat the real retention crisis and create the profession that teachers deserve, we offer two major recommendations for education leaders: make retention of Irreplaceables a top priority, and strengthen the teaching profession with higher expectations. | <urn:uuid:09a609a7-4ad4-465d-ab3f-e05a87f1c298> | {
"date": "2016-09-30T17:05:23",
"dump": "CC-MAIN-2016-40",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738662321.82/warc/CC-MAIN-20160924173742-00082-ip-10-143-35-109.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9252246022224426,
"score": 2.8125,
"token_count": 254,
"url": "http://tntp.org/publications/view/retention-and-school-culture/the-irreplaceables-understanding-the-real-retention-crisis"
} |
Foods and supplements that might help
Back to Diet and arthritis
Research has shown that some foods and food supplements really can help with arthritis, although the effects are fairly specific to the type of arthritis you have. Arthritis Research UK has recently funded a grant into a study looking at
whether a compound found in broccoli can slow the progression of osteoarthritis, for example.
You may find it helpful to talk your dietary needs through with a nutritionist. You can find a nutiritionist in your area at the
Nutritionist Resource website. Omega-3 fatty acids for inflammatory arthritis
Omega-3 (also called ‘n-3’) polyunsaturated fatty acids have been shown to help some people with inflammatory types of arthritis such as
rheumatoid arthritis, reactive arthritis, psoriatic arthritis and ankylosing spondylitis. Recent research shows they can help even if you're also taking strong disease-modifying anti-rheumatic drugs (DMARDs) such as methotrexate. What are fatty acids?
Our digestive system breaks down the oils and fats we eat into fatty acids. But other fatty acids cannot be produced in the body and must be obtained from food – these are called essential fatty acids (EFAs). These polyunsaturated fatty acids are divided into two main groups, omega-3 and omega-6.
Omega-3 fatty acids exist in two forms:
long-chain forms (DHA, EPA) are found in higher levels in oily fish, e.g. pilchards, sardines, mackerel, salmon.
short-chain forms (ALA) are found in rapeseed oil, flaxseed oil and walnuts.
Omega-6 fatty acids are found in sunflower and corn oils.
The body uses both omega-3 and omega-6 fatty acids to make chemicals called prostaglandins and leukotrienes. The right balance of these helps to control inflammation, and EPA and DHA promote the anti-inflammatory chemicals. Too much omega-6 can increase inflammation in the body but omega-3 fatty acids, especially the long-chain forms EPA and DHA, are thought to be of use in inflammatory arthritis. It’s possible that the short-chain forms may be converted within the body into the long-chain forms that benefit arthritis. However, it's not yet clear whether these are as useful as the long-chain omega-3 fatty acids found in fish oil.
How do I increase my intake of fatty acids?
Research suggests you need at least 2.7 g (2,700 mg) per day of the long-chain omega-3 fatty acids EPA and DHA. In the UK, dietary guidelines recommend eating two portions of fish a week, including one oily. This works out at about 0.45 g per day of omega-3 fatty acids, so you may want to take a supplement to reach the full amount. You can buy supplements from health food shops and some chemists, either in liquid forms or as capsules.
Fish oils act quite slowly so we recommend that you give them at least 3 months’ trial. in rheumatoid arthritis.
complementary and alternative medicines report has given fish body oil a score of 5 out of 5 for effectiveness for rheumatoid arthritis, but fish liver oil has only been given a 1 out of 5 for effectiveness in osteoarthritis. We don’t have enough evidence to give a score for fish liver oil for rheumatoid arthritis or fish body oil for osteoarthritis. Possible side-effects of omega-3 fatty acids
Some people may have mild stomach upsets and diarrhoea from taking high doses of fish oils. If this happens, try taking the supplement with food and/or splitting the total dose into two or three smaller doses per day. If this doesn’t work, try a lower dose, eating more oily fish or a combination of both.
Recently, there have been concerns about a possible link between high levels of omega-3 polyunsaturated fatty acids and prostate cancer. If you’re male and are considering taking high-dose fish oil, you should check with your doctor first.
Caution with fish liver oils
It’s important not to confuse fish body oil with fish liver oil (e.g. cod liver oil and halibut liver oil). Fish liver oils contain omega-3 polyunsaturated fatty acids as well as vitamin D (which helps the body to absorb calcium) and vitamin A.
But it’s dangerous to take fish liver oils in the large doses recommended for arthritis because of the risk of overdosing with vitamin A. This is particularly important for pregnant women, or women who might become pregnant, because vitamin A can harm the unborn baby.
If you’re pregnant, or could become pregnant, you should not take fish liver oils or vitamin A supplements at all. You should only use vitamins designed for pregnancy to make sure you don’t take excess vitamin A.
Adults shouldn’t take more than 3,000 micrograms (µg) of vitamin A per day. If you eat liver, bear in mind that this also contains a lot of vitamin A and will need to be counted as part of your daily intake of vitamin A.
If you want to increase your intake of omega-3 fatty acids, we recommend taking pure fish body oil rather than fish liver oil.
Glucosamine for osteoarthritis
Many people with
osteoarthritis try glucosamine, sometimes combined with chondroitin. Joint cartilage normally contains glucosamine and chondroitin compounds, and it’s thought that taking supplements of these natural ingredients may help to improve the health of damaged cartilage.
Research has produced some mixed results but suggests that glucosamine sulphate is more likely to be helpful than glucosamine hydrochloride. If you’re thinking of trying glucosamine we suggest taking 1,500 mg per day of glucosamine sulphate. If you notice an improvement in your joint pain after 3 months you may wish to continue with them. There doesn’t seem to be much extra benefit in taking glucosamine combined with chondroitin.
Glucosamine is available from chemists, health food shops or on the internet. You should avoid internet sites from non-UK organisations, as international safety regulations for supplements can vary.
Possible side-effects of glucosamine
You should bear in mind the following:
There’s some evidence that glucosamine may increase the level of sugar in the blood, so if you have diabetes be sure to check your blood sugar and talk to your doctor if your readings seem to be higher.
If you’re taking blood-thinning (anto-coagulants) such as aspirin or warfarin, your blood-thinning control may be affected, so make sure you have your regular blood checks and again discuss this with your doctor.
Glucosamine is often made from shellfish. If you’re allergic to shellfish make sure you take a vegetarian or shellfish-free variety.
Back to Diet and arthritis | <urn:uuid:b3fc074a-7538-4ec0-9c84-31e05b4a7cde> | {
"date": "2015-08-04T07:23:40",
"dump": "CC-MAIN-2015-32",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042990603.54/warc/CC-MAIN-20150728002310-00244-ip-10-236-191-2.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9223580360412598,
"score": 2.53125,
"token_count": 1504,
"url": "http://www.arthritisresearchuk.org/arthritis-information/arthritis-and-daily-life/diet-and-arthritis/foods-and-supplements-that-might-help.aspx"
} |
TISSUE grown from human embryonic stem cells, the most prized, and most controversial, cells ever grown in a lab, could at last make it into the human body.
After a decade of scientific and political wrangling, several therapies are now edging towards human trials. Which will be first?
A decade ago the medical possibilities seemed limitless. Human embryonic stem cells are unique in their ability to grow into all 200 types of human tissue. The idea was to create a range of hESC lines and to implant into people tissues and organs derived from the lines that best matched their existing tissue to prevent immune rejection.
A big hurdle came in 2001 in the US when then-president George Bush restricted federally funded researchers to working on just a dozen or so hESC lines, to please those who object to hESC research on religious or ethical grounds. Research continued in other ...
To continue reading this article, subscribe to receive access to all of newscientist.com, including 20 years of archive content. | <urn:uuid:e7924897-cbaa-4044-bda0-cdc4b0f58548> | {
"date": "2015-04-26T17:18:44",
"dump": "CC-MAIN-2015-18",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246655589.82/warc/CC-MAIN-20150417045735-00018-ip-10-235-10-82.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.951971709728241,
"score": 3.21875,
"token_count": 206,
"url": "http://www.newscientist.com/article/mg20427364.400-race-is-on-to-use-embryonic-stem-cells-in-humans.html"
} |
BAY ST. LOUIS, Miss. -- NASA has announced three winners in the Spaced Out Sports competition, which challenged U.S. students in fifth through eighth grades to create games for astronauts to play aboard the International Space Station. The challenge is part of a broader agency education effort to engage students in science, technology, engineering and mathematics (STEM) activities.
Students at K.W. Barrett Elementary School in Arlington, Va., got the top prize for creating a game entitled "Save the World." Second-place honors went to students at Kinser Elementary School, a Department of Defense Education Activity (DoDEA) School in Okinawa, Japan, for their "Alligator Clip Capture" game. Third-place was awarded to students at Manhattan Beach Middle School in Manhattan Beach, Calif., for their "Independence Day" game.
"Save the World" features teams gathering objects and building devices to save Earth from incoming meteorites. In "Alligator Clip Capture," players race around the station's Destiny Lab retrieving alligator clips of varying point values. "Independence Day" challenges players to throw batons through 'Liberty Rings' to gain points. All three games will be played aboard the station.
"I was delighted to see this level of engagement from the student teams, and I want to congratulate all three winning teams on their hard work and creativity," said NASA Associate Administrator for Education Leland Melvin. "I am especially pleased to note that one of the winning teams is from a DoDEA school. April is the Month of the Military Child, and NASA is kicking off a new initiative to engage military families in our education programs."
NASA will kick off its Military Families Initiative at an education summit in Orlando later this month.
The Spaced Out Sports challenge, a Teaching from Space project, was unveiled last fall and focused on helping students learn and apply Sir Isaac Newton's Laws of Motion. Using the accompanying curriculum, teachers led students through a study of Newton's laws, highlighted by hands-on activities and video podcasts featuring NASA scientists and engineers explaining how the laws are used in the space program.
The videos also feature celebrity athletes explaining the science behind their sports. Contributors include Olympic gymnast Nastia Liukin; NASCAR driver Juan Pablo Montoya; Women's National Basketball Association player Temeka Johnson; National Hockey League player Ryan O'Reilly and members of the National Football League's New Orleans Saints. Astronauts Melvin and Nicole Stott also are featured.
Students learned the differences in a game played in the gravity environment of Earth and the same game played in a microgravity environment, such as the space station. They used the knowledge to design or redesign a game to illustrate and apply Newton's laws.
"Response to the challenge was very encouraging, with more than 55 submissions," said Katie Wallace, director of NASA's Stennis Space Center's Office of Education in Bay St. Louis, Miss., where the challenge and accompanying curriculum were developed. "Even more encouraging was seeing students excited about, and involved in, learning science. Hopefully, they will continue in these studies and consider STEM careers."
For information about the Science and Sports curriculum and related resources, visit: http://education.ssc.nasa.gov/spacedoutsports
For information about NASA education programs, visit: http://www.nasa.gov/education
For information about Stennis, visit: http://www.nasa.gov/stennis | <urn:uuid:96a44c55-92bd-4f45-a21d-6d13cedb4ada> | {
"date": "2014-11-27T19:33:18",
"dump": "CC-MAIN-2014-49",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931009084.22/warc/CC-MAIN-20141125155649-00180-ip-10-235-23-156.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9502866268157959,
"score": 2.6875,
"token_count": 706,
"url": "http://www.spaceref.com/news/viewpr.html?pid=33187"
} |
Thomas Augustine Arne Facts
At a time when musical life of England was dominated by foreign music and musicians, Thomas Augustine Arne (1710-1778) was the most successful and popular native composer, keeping alive and advancing the traditions of the English baroque school.
Thomas Arne was born in London on March 12, 1710, the son of an upholsterer and coffin-maker. Educated at Eton, he spent 3 years apprenticed to an attorney before his obvious talents in music persuaded his father to allow him to pursue a career in this field. Arne's first major composition was a setting of Joseph Addison's Rosamond (1733). Arne's sister Susannah Maria, 4 years his junior, sang a leading role; later, as Mrs. Cibber, she was a famous dramatic actress and singer. In 1736 Arne married Cecelia Young, a soprano who later gave remarkable performances of music by her husband and by George Frederick Handel.
Arne quickly established himself as a major talent with music to three masques done at the Drury Lane Theatre: Comus (1738), adapted from John Milton by John Dalton; The Judgment of Paris (1740), by William Congreve; and The Masque of Alfred (1740), to a libretto by James Thomson and David Mallet, which concludes with an "Ode in Honour of Great Britain," known now as "Rule, Britannia," Arne's most persistently popular invention. Drury Lane launched a series of revivals of some Shakespearean plays, commissioning Arne to write music to some of the lyrics. As You Like It (1740) was followed by Twelfth Night (1741), The Merchant of Venice (1742), The Tempest (1746), and Love's Labour's Lost (1747). Many of Arne's most enduring songs, such as "Under the Greenwood Tree," "When Daisies Pied," and "Where the Bee Sucks," were written for these productions.
Arne spent the years 1742-1744 in Dublin, where he composed his first oratorio, The Death of Abel. On his return to London, he became the leader of the orchestra at Drury Lane, and in 1745 he was also appointed official composer for Vauxahll Garden. The music he wrote here, and later for Mary-le-bone and Ranelagh gardens, became extremely popular and was printed in such collections as Lyric Harmony and The Vocal Grove, then reprinted and rearranged in other publications for many decades in England and the American colonies.
In 1759 Oxford University awarded Arne the degree of doctor of music. Soon he left Drury Lane for Covent Garden, where he wrote operas in a wide range of styles. Love in a Village (1762) was a ballad opera, with spoken dialogue alternating with songs, some his own and some arrangements of popular airs of the day. Thomas and Sally, or the Sailor's Return (1780) is a true comic opera, with all original music and dialogue set as recitative. His most ambitious work was Artaxerxes (1762), an opera seria with a libretto adapted and translated by Arne himself from a play by the Italian dramatist Metastasio. It is the only example of a full-length opera in English for a period of many decades. Despite some contradictions in style, it had immediate success and held the stage for many years. A less successful piece was Olimpiade (1764), also from Metastasio, in Italian and completely in the Italian style.
Arne's catches and glees, written for the Madrigal Club, have proved to be durable works for social and school singing groups. His second oratorio, Judith (1761), is considered by some to be one of his finest works, and his setting of Libera me for solo voices and five-part chorus is an interesting and rare example of a setting of a Latin text from this period in England.
Arne also wrote concertos for keyboard, overtures for orchestra, lessons (or sonatas) for harpsichord, and trio sonatas, but this instrumental music has received little attention. He died in London on March 5, 1778.
Arne's dramatic and vocal works are his best; his greatest talent was for graceful, expressive, and memorable melodic lines. His contemporary Charles Burney offers this opinion in A General History of Music: "From the death of Purcell to that of Arne, a period of more than fourscore years, no candidate for musical fame among our countrymen had appeared, who was equally admired by the nation at large…In secular music, he must be allowed to have surpassed him [Purcell] in ease, grace, and variety."
Further Reading on Thomas Augustine Arne
Brief biographies of Arne are Burnham W. Horner, Life and Works of Dr. Arne, 1710-1778 (1893), and Hubert Langley, Doctor Arne (1938), neither of which is scholarly. Arne's place in the history of music in England is noted in Frank Howes, The English Musical Renaissance (1966). There is a discussion of some aspects of Arne's life and works in Charles Burney, A General History of Music: From the Earliest Ages to the Present Period (4 vols., 1786-1789; new ed., with notes by Frank Mercer, 1957).
Additional Biography Sources
Burden, Michael, Garrick, Arne, and the masque of Alfred: a case study in national, theatrical, and musical politics, Lewiston: Edwin Mellen Press, 1994. | <urn:uuid:01413e3a-9849-4ed8-a6fa-ce55beb52a5f> | {
"date": "2017-05-24T06:12:47",
"dump": "CC-MAIN-2017-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607802.75/warc/CC-MAIN-20170524055048-20170524075048-00276.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9734542965888977,
"score": 2.75,
"token_count": 1193,
"url": "http://biography.yourdictionary.com/thomas-augustine-arne"
} |
Projection of Older Australians With a History of Midlife Obesity and Overweight 2010–2050
This study projects midlife obesity status in future older Australians. Cross-sectional prevalence of being obese or overweight by broad age groups was interpolated to obtain single-year-age data. These estimates were then used to derive prevalence of normal weight and underweight. Data by birth year and year of observation of persons aged 30–70 years were used to construct prediction equations. Results show that older people with a history of midlife obesity is projected to rise substantially in the future. For people aged 65 years, midlife obesity was estimated at 22% in 2010 and is projected to increase to 43% for males and 37% for females in 2050. While the proportion of individuals with midlife normal weight is projected to decline substantially, prevalence of midlife overweight remains almost stable. The number of persons aged 65 years and over having a history of midlife obesity is projected to increase nearly six-fold from less than 500,000 persons in 2010 to 2.8 million in 2050. In comparison, between 2010 and 2050, Australia's older population aged 65 years and over is projected to increase by only 2.5-fold. Growing obesity prevalence in the Australian population translates into a large increase in older people with a history of midlife obesity, with major implications for the future burden of disease in older persons. | <urn:uuid:34e347e5-fe7f-4374-8c3d-e7a17f26ac20> | {
"date": "2018-12-17T19:13:18",
"dump": "CC-MAIN-2018-51",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376829115.83/warc/CC-MAIN-20181217183905-20181217205905-00456.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9504455924034119,
"score": 2.609375,
"token_count": 280,
"url": "https://natsem.canberra.edu.au/publications/search-by-author/?publication=projection-of-older-australians-with-a-history-of-midlife-obesity-and-overweight-2010-2050"
} |
Companions of the Cave
Or dost thou reflect that the Companions of the Cave and of the Inscription were wonders among Our Sign? (Surat al-Kahf: 9)
The eighteenth surah of the Qur’an, "Al-Kahf", or "the cave", tells about a group of young people who took shelter in a cave to hide away from a ruler who denied Allah and practised oppression and injustice upon the believers. The verses on the subject are as follows:
Or dost thou reflect that the Companions of the Cave and of the Inscription were wonders among Our Sign?
Behold, the youths betook themselves to the Cave: they said, "Our Lord! bestow on us Mercy from Thyself, and dispose of our affair for us in the right way!"
Then We draw (a veil) over their ears, for a number of years, in the Cave, (so that they heard not):
Then We roused them, in order to test which of the two parties was best at calculating the term of years they had tarried!
We relate to thee their story in truth: they were youths who believed in their Lord, and We advanced them in guidance:
We gave strength to their hearts: Behold, they stood up and said: "Our Lord is the Lord of the heavens and of the earth: never shall we call upon any god other than Him: if we did, we should indeed have uttered an enormity!
These our people have taken for worship gods other than Him: why do they not bring forward an authority clear (and convincing) for what they do? Who doth more wrong than such as invent a falsehood against Allah?"
"When ye turn away from them and the things they worship other than Allah, betake yourselves to the Cave: Your Lord will shower His mercies on you and disposes of your affair towards comfort and ease."
Thou wouldst have seen the sun, when it rose, declining to the right from their Cave, and when it set, turning away from them to the left, while they lay in the open space in the midst of the Cave. Such are among the Signs of Allah: He whom Allah guides is rightly guided; but he whom Allah leaves to stray -for him wilt thou find no protector to lead him to the Right Way.
Thou wouldst have deemed them awake, whilst they were asleep, and We turned them on their right and on their left sides: their dog stretching forth his two fore-legs on the threshold: if thou hadst come up on to them, thou wouldst have certainly turned back from them in flight, and wouldst certainly have been filled with terror of them.
Such (being their state), we raised them up (from sleep), that they might question each other. Said one of them, "How long have ye stayed (here)?" They said, "We have stayed (perhaps) a day, or part of a day. (At length)" they (all) said, "Allah (alone) knows best how long ye have stayed here? Now send ye then one of you with this money of yours to the town: let him find out which is the best food (to be had) and bring some to you, that (ye may) satisfy your hunger therewith: And let him behave with care and courtesy, and let him not inform any one about you.
For if they should come upon you, they would stone you or force you to return to their cult, and in that case ye would never attain prosperity."
Thus did We make their case known to the people, that they might know that the promise of Allah is true, and that there can be no doubt about the Hour of Judgment. Behold, they dispute among themselves as to their affair. (Some) said, "Construct a building over them": Their Lord knows best about them: those who prevailed over their affair said, "Let us surely build a place of worship over them."
(Some) say they were three, the dog being the fourth among them; (others) say they were five, the dog being the sixth -doubtfully guessing at the unknown; (yet others) say they were seven, the dog being the eighth.
Say thou: "My Lord knoweth best their number; It is but few that know their (real case)." Enter not, therefore, into controversies concerning them, except on a matter that is clear, nor consult any of them about (the affair of) the Sleepers.
Nor say of anything, "I shall be sure to do so and so tomorrow"- without adding, "So please Allah!" and call thy Lord to mind when thou forgettest, and say, "I hope that my Lord will guide me ever closer (even) than this to the right road."
So they stayed in their Cave three hundred years, and (some) add nine (more) Say: "Allah knows best how long they stayed: with Him is (the knowledge of) the secrets of the heavens and the earth: how clearly He sees, how finely He hears (everything)! They have no protector other than Him; nor does He share His Command with any person whatsoever." (Surat al-Kahf: 9-26)
According to widespread belief, the Companions of the Cave who are praised both by Islamic and Christian sources, were subjected to the cruel tyranny of the Roman Emperor, Decius. Meeting the oppression and injustice of Decius, these young people warned their own people many times not to abandon the religion of Allah. The indifference of their people to their communication of the message, the increase in oppression of the emperor and their being threatened with death, caused them to leave their homes.
As historical documents verify, at that time, many emperors extensively executed policies of terror, oppression, and injustice on believers who stood for early Christianity in its original and pure form.
In a letter written by the Roman Governor Pilinius (69-113 AD) who was in North West Anatolia, to the Emperor Trayanus, he referred to "the companions of the Messiah (the Christians) who were punished because they resisted worshipping the statue of the Emperor." This letter is one of the important documents which relate the oppression visited on early Christians at that time. Under such circumstances, these young people, who were asked to submit to a non-religionist system and to worship an emperor as a god apart from Allah, did not accept this and said:
"... Our Lord is the Lord of the heavens and of the earth: never shall we call upon any god other than Him: if we did, we should indeed have uttered an enormity! These our people have taken for worship gods other than Him: why do they not bring forward an authority clear (and convincing) for what they do? Who doth more wrong than such as invent a falsehood against Allah?"(Surat al-Kahf: 14-15)
As regards the region where the Companions of the Cave lived, there are several different opinions. The most reasonable of these are Ephesus and Tarsus.
Almost all the Christian sources show Ephesus as the location of the Cave where these young believers took shelter. Some Muslim researchers and the Qur’anic commentators agree with the Christians regarding Ephesus. Some others explained that Ephesus could not be the place, and then tried to prove that the event took place in Tarsus. In this study, both of these alternatives will be dealt with. Yet, all those researchers and commentators - including the Christians - concur that the event took place at the time of Roman Emperor Decius (also called as Decianus), around 250 AD.
Decius, together with Nero, is known to be the Roman Emperor who most severely tortured the Christians. During his short reign, he passed a law that compelled everyone under his rule to offer a sacrifice to the Roman gods. Everyone was obliged to offer a sacrifice to these deities, and moreover, to get a certificate showing that they had done this, which they had to show to state officials. Those who did not obey were executed. In Christian sources, it is written that a great majority of the Christians refused this idolatrous act and fled from "one city to another", or hid in secret shelters. The Companions of the Cave are most probably a group among these early Christians.
Meanwhile, there is a point that has to be emphasised here: this topic has been narrated in a story-like manner by some of Muslim and Christian historians and commentators, and turned into a legend as a result of the addition of much falsehood and hearsay. However, this incident is a historical reality.
Are the Companions of the Cave in Ephesus?
The interior of the Cave in Ephesus which is thought to be one of the places where Companions of the Cave resided.
As regards the city where these young people lived and the cave in which they took shelter, various places are indicated in different sources. The main reasons for this are: people's wish to believe that such courageous and brave-hearted people lived in their town, and the great similarity of the caves in those regions. For instance, in almost all of these places, there is a place of worship said to be built over caves.
As is well known, Ephesus was accepted to be a holy place by the Christians, because, there is a house in this city which was said to be the Virgin Mary's and which was later turned into a church. So, it is highly probable that the Companions of the Cave resided in one of those holy places. Moreover, some Christian sources state their certainty that it was the place.
The oldest source on the subject is the Syrian priest, James of Saruc (born 452 AD). The famous historian, Gibbon, has taken many quotations from James’ study, in his book The Decline and Fall of the Roman Empire. According to this book, the name of the Emperor, who tortured the seven young Christian believers and compelled them to hide away in a cave, was Decius. Decius ruled over the Roman Empire between 249-251 AD and his period of reign is widely known for the torments he practised on the followers of ‘Isa (Jesus). According to Muslim commentators, the region where the event took place was either "Aphesus" or "Aphesos". According to Gibbon, the name of this place is Ephesus. Situated on the western coast of Anatolia, this city was one of the largest ports and cities of the Roman Empire. The ruins of this city are known as "The Antique City of Ephesus" today.
The name of the Emperor who reigned in the period when the Companions of the Cave woke up from their long sleep, is Tezusius according to Muslim researchers, whereas it is Theodosius II according to Gibbons. This Emperor ruled between 408-450 AD, after the Roman Empire had converted to Christianity.
Referring to the verse below, in some commentaries it is said that the mouth of the cave looks towards the north, and hence the sunlight could not penetrate inside. Thus, someone passing by the cave would be unable to see inside. The verse of the Qur’an informs:
Thou wouldst have seen the sun, when it rose, declining to the right from their Cave, and when it set, turning away from them to the left, while they lay in the open space in the midst of the Cave. Such are among the Signs of Allah: He whom Allah guides is rightly guided; but he whom Allah leaves to stray,- for him wilt thou find no protector to lead him to the Right Way. (Surat al-Kahf: 17)
In the year 250 BC, seven young people living in Ephesus choose Christianity and reject idolatry. Trying to find a way out, these young people find a cave in the eastern slope of the Pion mountain. The Roman soldiers see this and build a wall to the entrance of the cave. 45
Today, it is acknowledged that over these old ruins and graves, many religious constructions are built. Excavations made by the Austrian Archaeological Institute in 1926, revealed that the ruins found on the eastern slope of the Pion mountain belonged to a construction built on behalf of the Companions of the Cave in the middle of the fifth century (during the rule of Theodosius II). 46
Are the Companions of the Cave in Tarsus?
The cave in Ephesus seen from the outside.
The second place presented as a possibility for where the Companions of the Cave lived, is Tarsus. Indeed, there is a cave that is very similar to the one described in the Qur'an, which is located on a mountain known either as Encilus or Bencilus, to the north-west of Tarsus.
The idea that Tarsus is the correct location is the view of many Islamic scholars. One of the most important Qur’anic interpreters, at-Tabari specified the name of the mountain where the cave stood as "Bencilus" in his book named Tarikh al-Umam, and added that this mountain was in Tarsus. 47
Again, another famous commentator on the Qur’an, Muhammed Emin stated that the name of the mountain was "Pencilus" and that it was in Tarsus. The name that is pronounced as "Pencilus" may sometimes be pronounced as "Bencilus". According to him, the difference between the words is caused by different pronunciations of the letter "B" or by the loss of a letter from the original word which is called "historical word abrasion".48
Fakhruddin ar-Razi, another well known Qur'anic scholar, explains in his work that "even though this place is called Ephesus, the basic intention is to say Tarsus here, because Ephesus is just another name of Tarsus".49
In addition, in the commentaries of Qadi al-Baidawi and an-Nasafi, in the commentaries of al-Jalalayn and in at-Tibyan, in the commentaries of Elmali and Omar Nasuhi Bilmen, and many other scholars, this place is specified as "Tarsus". Besides, all of these commentators explain the sentence of the seventeenth verse, "the sun, when it rose declined to the right from their cave, and when it set, turned away from them to the left", by saying that the mouth of the cave in the mountain looked towards the north.50
The cave in Tarsus that is thought to belong to the Companions of the Cave.
The residence of the Companions of the Cave was a subject of interest also at the time of the Ottoman Empire and some research was done on the subject. There is some correspondence and an exchange of information on the subject in the Ottoman Archives of the Prime Ministry. For instance, in a letter sent to the Treasury Superior of the Ottoman State by the local administration of Tarsus, there is a formal request and an attached message notifying of their demand to give salary to those people who dealt with the cleaning and maintenance of the cave of Ashab-ı Kahf (Companions of the Cave). The reply to this letter stated that in order for these salaries to be paid to the workers from the state treasury, it was necessary to find out whether this was indeed the place where the Companions of the Cave had resided. The research made for this purpose has been very useful in determining the real location of the Cave.
In a report prepared after an investigation made by the National Council, it was stated: "To the north of Tarsus, a province of Adana, there is a cave on a mountain two hours away from Tarsus, and the mouth of this cave looks to the north as stated in the Qur'an."51
The debates which developed as to who the Companions of the Cave were, where and when they lived, has always led the authorities to research into the subject and many comments were made on the subject. Yet, none of these comments may be considered certain, and, therefore, questions such as: at which period these young believers lived, and where the cave mentioned in the verses was, remain without substantial answers. | <urn:uuid:8211a199-a232-45ed-9d57-0e655db13e77> | {
"date": "2013-12-07T15:17:11",
"dump": "CC-MAIN-2013-48",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163054867/warc/CC-MAIN-20131204131734-00002-ip-10-33-133-15.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9778919816017151,
"score": 2.671875,
"token_count": 3404,
"url": "http://harunyahya.com/en/books/904/Perished_Nations/chapter/3371"
} |
Empire of the Rising Sun
|“||Who knows what nightmares we have created...?
- Dr. Gregor Zelinsky, witnessing the accidental rise of the Empire.
The Empire of the Rising Sun is the Imperial regime of Japan, led by the Emperor and the Shogunate. Created as a result of Anatoly Cherdenko's erasure of Albert Einstein from the timeline, the Empire of the Rising Sun declared war on both the Allies and the Soviet Union during the Third World War, believing that it is its "divine destiny" to rule the world. Influenced by nationalism, militarism and imperialism, the Empire has adopted aggressive policies, viewing the Allies and Soviets nothing more than "western barbarians".
- 1 History
- 2 Military Doctrine
- 3 Technology Level
- 4 Important People
- 5 List of Zaibatsu and Military Contractors
- 6 Behind the scenes
- 7 Fate outside of the Red Alert universe
History[edit | edit source]
Previous incanation[edit | edit source]
Despite the removal of Adolf Hitler, the USS Arizona Memorial and Iwo Jima Memorial are present in the timeline of Red Alert and Red Alert 2. The independence of Korea during the Third World War indicates that the Empire of Japan collapsed long before 1972 and gave independence to her colonies. Notably, a telephone with "Tokyo" written on it can be seen next to the one with "Moscow" written on it that Michael Dugan uses to call Alexander Romanov during the opening of Red Alert 2. It is unknown whether the presence of that phone has any significance.
In the Third World War, Japan was colored blue on the map at the start of the war so it's either neutral or loosely affiliated with the Allies. During the first mission of the Guardians of the East campaign, South Korean forces fought the Soviets along the coast of Japan for naval supremacy of the Pacific.
Formation[edit | edit source]
The Empire of Japan transformed into the Empire of the Rising Sun after 1927 following two significant temporal events: the erasure of Adolf Hitler by Albert Einstein in 1924, and the erasure of Einstein by Anatoly Cherdenko in 1927. By the time of the Third World War, the Empire extended to Oahu in the mid-Pacific.
Spurred by Emperor Yoshiro's vision of "divine destiny" and global hegemony, the Empire undertook a significant expansion of its armed forces prior to the war. The Allies and Soviets estimated the Empire's resources as greatly inferior to their own. The sophistication and scale of the build up, including notable developments in Wave-Force and nanotechnology, went largely unnoticed.
War[edit | edit source]
Imperial strategy took advantage of circumstances generated by the war between the Allies and the Soviet Union. The concentration of Soviet forces in Western Europe was an opportunity not to be missed. The Imperial bid for world domination opened with an offensive on the relatively poorly defended eastern territories of the Soviet Union.
Emperor Yoshiro waited until the Allies expended themselves pushing the Soviets out of Western Europe before announcing the Empire's ambitions to the world. The deployment of floating fortresses into the North Sea and western Mediterranean to force European submission coincided with the announcement. The question then becomes: can the upstart Empire fulfil its destiny and triumph over two global superpowers?
The wait for the answer was not a long one.
The Allies and Soviets organized a truce and a combined European counter-offensive against the Empire. The North Sea floating fortress was destroyed when its power reactors were induced to overload by enemy sabotage action. With the immediate threat to Europe removed, the Allies began planning an attack on where the Empire of the Rising Sun calls home: Japan.
With the war developing apace the Supreme Shogunate held a meeting in Tokyo. Allied spies learned of this and an Allied/Soviet joint strike on Tokyo was organized to eliminate the Imperial leadership. While Soviet forces abandoned the offensive to prepare for a resumption of operations against the Allies, the Allied component was equal to the task. Allied forces, under the command of Lissette Hanley and an unnamed Allied Commander, successfully destroyed the Empire's military infrastructure, as well as its military headquarters, the Toyama High Command. With its ability to wage war effectively crippled, the Empire no longer posses a threat to the rest of the world, ending its campaign of conquest.
Uprising[edit | edit source]
After the decisive defeat of the Empire at Tokyo Harbor and the death of Emperor Yoshiro, the Empire's citizens feared for the Emperor's only son, Crown Prince Tatsu. However, rather than fall prey to desperation or despair, Tatsu did something no one, not even the Allies, expected: He surrendered, and agreed to cooperate with the Allies to put an end to their war. The Imperial people perceived this surprising move as bold and cowardly in equal measure.
Until a future game comes out and says otherwise, all Red Alert 3: Uprising missions are treated as canon.
Imperial campaign[edit | edit source]
One of the remaining Imperial Commanders still loyal to Yoshiro's legacy, commanded by Emperor Tatsu, was assigned to relieve Kenji Tenzai of his defense post in a bid to fend off Soviet incursions, namely the one taking place at Sakhalin Island. However, the Commander's next assignment was of cultural and moral importance: left to their own devices, the Soviets can pretty much defile the Oki Island tomb of the late Emperor Yoshiro, resulting in a disgraceful blow to Imperial morale for generations to come, so the Commander saw to it to deny such an atrocious action from the Soviet invaders led by Moskvin, effectively sending the Soviet invasion falling to pieces.
The fall of Vladivostok was the finishing touch of Emperor Tatsu's show of independence from his Allied slave-drivers. In spite of facing both Allied and Soviet forces in one theater of combat, with Giles poised to quell Tatsu's uprising, the brilliant Imperial commander made sure none of them were a match for the crown jewel of Imperial military robotics: the Giga Fortress.
Vladivostok's destruction, in the end, proved a symbolic victory, for the Empire of the Rising Sun has risen from its ruins just as the Phoenix rises from its ashes. Now Tatsu and his Commander shall start together their trick to the Allied Occupational Forces on Japan, in order to restore the power they lost during the war.
Allied campaign[edit | edit source]
Despite the Empire's surrender, several Imperial commanders refused to obey Tatsu, and rebelled against the Allied occupational forces. Because of this, the Allied Commander from the previous war returned to duty, and was tasked with quelling these insurrections with assistance from Tatsu.
The Commander's first target was Shinzo Nagama, who retreated to his ancestral home in Shin Iga Province after the Emperor's death. He secretly gathered followers, and prepared to rise against Tatsu. However, the Allied Commander defeated his loyalist forces, and froze his mansion with cryo weapons. The aged Imperial warlord attempted to escape in a disguised Sudden Transport, but was still captured and transferred to Detention Camp Dakota.
With Shinzo's defeat, his forces swore allegiance to Tatsu. However, the uprising was not over. Even after Shinzo's capture, former Shogunate leader Kenji Tenzai was still marshalling his forces in Osaka. Kenji was prepared for the Allied Commander's arrival, and protected his manor with three modified Nanoswarm hives, capable of operating indefinitely, making it indestructible. However, the Commander's forces managed to disable or destroy all of the Nanoswarm hives.
With the help of reinforcements from Tatsu, the Commander destroyed Kenji's manor, forcing Kenji out of hiding. However, Kenji had one last card up his sleeve: a stolen Allied Technology inhibitor and a customized King Oni for his own use. The activation of the Tech Inhibitor disabled all structures and vehicles in the area (except his personal King Oni), and caused all aircraft to crash, including his own. However, the Allies sent in a squad of Cryo Legionnaire and Agent Tanya, who killed all of Kenji's loyal infantry, destroyed the Tech Inhibitor, and froze Kenji's King Oni. Soon, Kenji joined Shinzo in an Allied detention camp.
With Kenji's imprisonment, there is only one last rebelling Imperial Shogun left: Takara Sato. This renegade Imperial commander is planning a full-scale assault on the throne from Miyako. Once again, the Commander succeeded, forcing Takara's forces to retreat. However, Tatsu suddenly reveals that he has being using the Allies for his own purposes. He crowns himself Emperor Tatsu, and claimed that he will drive out the Allies using the surrendered forces of the warlords. For this battle, Tatsu deployed the devastating Giga Fortresses and a captured Allied Chronosphere (which was somehow able to Chronoshift structures) against the Commander. However, he was still defeated in the end, marking the end of the Empire's uprising.
Military Doctrine[edit | edit source]
|“||With enough time, any man may master the physical. With enough knowledge, any man may become wise. It is a true warrior who can master both.
- Emperor Yoshiro
The Imperial military is a unique blend of Japanese tradition and technology. The Empire maintains its well known discipline and loyalty through the philosophy of bushido and reverence for the ancient warriors known as Samurai. The Imperial order of battle includes high-tech, highly versatile transforming units, more traditional ones and a living weapon - namely a young female commando with psychic powers, Yuriko Omega. The Empire's manpower is naturally not as much as the one of the Soviets and the Allies. However to compensate for this, they developed advanced technologies and mechas, drones and massive robots to fight for them along with their warriors.
Despite believing in honor above all else, the Empire is not above relying on stealth and subterfuge. For example, advanced androids are used to gather intelligence from both the Allies and the Soviets, Shinobis infiltrate enemy bases in the field, and Sudden transports are utilized to ambush the enemy from behind the lines. More recently, female warriors have also been accepted into the ranks of the Imperial Army, despite initial controversies amongst the Emperor's more-conservative subjects.
One of the Empire's greatest technological innovations is the Nanocore, which embodies both the Empire's mastery over nanotechnology and its aggressive, expansionist ideals. It allows the Empire to extend its control far and wide, building structures in distant location from the Construction Yard.
Under Emperor Yoshiro, Imperial military campaigns usually involve attacking an enemy by surprise with overwhelming force and demoralising the enemy into submission. To this end, the Empire concentrated their military operations against symbolic targets as well as using the media to win hearts and minds. This approach did not always work. One of the Emperor's more outspoken (by Imperial standards) critic is Crown Prince Tatsu, who advocated a simpler approach to war - namely killing all who stand in their way.
After the defeat of the Empire, the doctrine of what's left of the Imperial military (which has apparently reorganized into a resistance movement known as the Imperial Final Defense Force) shifted from offense to defense and guerrilla tactics. The Steel Ronins, originally created as a punishment for Imperial soldiers who cracked under pressure or displayed extreme violence, were activated as a last resort weapon for the defense of the Imperial homeland. Archer maidens, women who were rejected by the Rocket Angel ranks, defended the borders of their country with guerrilla-style ambushes. Takara Sato, former chief of the Rocket Angels' First Batallion, was experienced in surprise assaults, and launched a series of successful attacks on the Allied occupation forces.
Technology Level[edit | edit source]
|“||Though culturally they are a backward and superstitious people, technologically they are quite advanced.
- Premier Cherdenko, on the Empire
The Empire of the Rising Sun had an impressive tally of technological achievements. Its military forces combine cutting-edge nanotechnology with traditional Japanese aesthetics. With soldiers wielding both rifles and katanas, men resembling ancient Ashigaru equipped with plasma cannons, and even mysterious ninjas armed with nothing but swords and shurikens fighting alongside towering mechanical walkers and transformable vehicles.
- The use of nanotechnology is extremely prevalent in the Empire's military, due to its versatility. The most obvious example being the Nanocores used to construct field bases. Various different nanomaterials are also used in Imperial war machines: the Tsunami tank is equipped with nano-deflective armor that can dampen ballistic impact, the Naginata cruiser's hull is made of durable nano-steel, and the Wave-Force Artillery uses carbon nanotube supercapacitors to contain the massive amount of energy it generates. On a larger scale, the Nanoswarm hive houses billions of nanomachines, which can temporarily form an impenetrable barrier at a designated location.
- The Empire has the technology to create android infiltrators that are nearly indistinguishable from humans. Several of these infiltrators infiltrated both the Allies and the Soviets, and obtained the blueprints for their Mobile Construction Vehicles, allowing the Empire to develop its own. The Emperor also has his own android body double, to protect him from assassination attempts. However, these androids have to be remotely controlled manually and would go berserk if the connection is severed.
- In addition, the Empire employs many different types of pilot-assisted robots, from the towering King Oni to the nimble Mecha Tengu. Many of these robots are also transformable, making them extremely versatile on the battlefield. After the end of the war, Imperial scientists created the Giga Fortress - a massive dual-form robot controlled by a sophisticated artificial intelligence.
- Kinetic-burst weapons
- The primary anti-infantry weapon technology used by the Empire. Kinetic-burst weapons are energy weapons that fire superheated slugs instead of conventional bullets, which cause painful lacerations and burns in unarmored targets. No shell casings or physical projectiles are left behind, making residues from these weapons untraceable, and reducing overall weight-of-equipment. Kinetic-burst carbine is the primary weapon of Imperial warriors, and larger caliber versions are used by vehicles and stationary defenses, such as the Mecha Tengu and the Defender VX turret.
- Plasma weapons
- The plasma-cutter cannon was a unique anti-armor weapon developed by the Empire, capable of melting foot-thick steel in seconds, making them extremely effective against armored vehicles and structures. These weapons are used by the Empire's Tankbuster divisions. In addition, the Tankbusters' sunburst headgears may fire plasma beams straight down to cut out a man-sized hole on any surface, allowing them to burrow underground in order to set up ambushes or avoid being crushed by enemy vehicles.
- Wave-Force technology
- Supposedly inspired by the Empire's anthem, Wave-Force technology is able to generate a tremendous amount of power. In the case of the Empire's Wave-Force Artillery, it uses a powerful generator to harmonize the waveforms of heavy matter particles. As each molecule is aligned, the matter begins to resonate, and soon this closed system takes on tremendous destructive potential. At the moment in which the system's energy can no longer be contained in the supercapacitors, all of it is channeled in a powerful long-range beam, which can tear through most known matter. Despite its destructive power, this beam is extremely focused, preventing unnecessary collateral damage.
- This technology supposedly existed in research facilities for years, but engineers at Kanegawa Industries were the first to be able to create a version of the weapon that could effectively operate in the field. The energy weapon requires no bulky ammunition and very infrequent recharging due to a sophisticated energy recovery system. However, the delicate electronics require a nearby clean-room environment and regular maintenance.
- The same technology is also used in stationary defenses, such as the Wave-Force tower and the Wave-Force Triguns of the Floating fortresses. Further more, localized wave-force fields can be used to fashion melee weapons, such as the wave-force glaive used by the Steel Ronin and the massive wave-force katanas used by the Shogun Executioner.
- Psionics is possibly the least understood of the Empire's various technological marvels. What is known is that Yuriko Omega, the Empire's psychic commando, is capable of crushing even the most heavily armored tanks and wiping out large groups of infantry using only her mind. She was also able to project a Psionic Shield that reflects enemy projectiles and dominate the minds of weaker minded foes.
- The only other known Imperial Psionic was Izumi, who was considered one of the Empire's most precious assets prior to Yuriko's deployment into the war. While the full extent of her powers are unknown, she apparently had similar powers to Yuriko.
- Both of these Psionic commandos were the products of Imperial research into psionics conducted at Shiro Sanitarium before it was utterly destroyed by Yuriko. Reports indicate that a detachment of Archer maidens volunteered to provide extra security for the Shiro facility in exchange for psychic training. However, whether or not Shiro scientists have indeed found a way to train more psychics is unknown.
- Cloning technology
- Through the use of cloning technology, countless clones of Yuriko were created at the Shiro Sanitarium and possibly other secret facilities. These clones were not as powerful as the original, lacking many of her unique Psionic Talents. However, they were still extremely powerful on the battlefield. They serve as Psionic commandos under Imperial Commanders, and were also used to power the ultimate weapon of the Empire: the Psionic Decimator.
Important People[edit | edit source]
|The following is based on the Empire of the Rising Sun campaign for Red Alert 3 and contradicts canon sources.|
Emperor Yoshiro[edit | edit source]
|“||Do not struggle against what is inevitable!
- Emperor Yoshiro's Ultimatum
The Emperor of the Rising Sun. The longtime ruler of the Empire of the Rising Sun, he is cherished as a living god by his people and the military. Emperor Yoshiro is a traditionalist who strictly follows the code of bushido, the samurai way of the warrior. He fundamentally believes that the Rising Sun's destiny is to rule the entire world, he is Emperor by divine right and that his fate is preordained. He rarely shows emotion and often speaks in a seemingly wise tone.
While the Soviets and Allies were fighting each other, Yoshiro was building up a massive high-tech military force bent on world domination, and demands that both the Allies and Soviets submit to Imperial dominance. In case his Imperial Palace is destroyed, Yoshiro will jump in his own personal King Oni for a last resort.
In the Imperial Campaign he gave Commander *Name Classified* the honorable title of Supreme Shogun.
|“||The opportunity is here to destroy the Russian barbarians once and for all!
- Suki before Crumble Kremlin Crumble Begins
An Intelligence Officer of the Imperial military and a childhood friend of Tatsu. She performs the same function as Lt. Eva does for the Allies, and like Eva, develops an attraction to the up and coming Commander. In the end of WWIII in the Imperial perspective, she's last seen in a bikini inviting the Commander, now Supreme Shogun, to join her a vacation in the tropics.
Toyoma High Command was named after her family, who have been serving the Emperor for generations.
Crown Prince Tatsu[edit | edit source]
|“||I want their hearts and souls, commander. But I also want Krukov's head on a stick!
- Prince Tatsu on the preparations for the Battle of Odessa
Emperor Yoshiro's son and heir. He is a major figure in the Imperial armed forces and directs many of the missions against the Empire's enemies. He wants to lead Japan with a more modern outlook, while maintaining his father's traditional way of thinking.
In the Imperial perspective of the War, he is revealed to be responsible for certain Imperial technologies such as the Shogun Executioner and the Howard T. Ackerman android. He takes command after Yoshiro's resignation and orders the commander to swiftly defeat the Soviets and Allies, earning his father's respect. Tatsu is later able to cheer up his father with the prospect that the Empire is creating their own destiny.
As the Crown Prince he fielded his own naval fleet and will take command of it whenever the situation arises. For instance he commissioned his navy to destroy the Allied invaders at Tokyo Harbour but was soon sunk by the Allied navy, ensuring Allied naval supremacy during the battle.
Tatsu served as the puppet leader during the Allied occupation of Japan and was deeply resentful of this. Under the guise of cooperating with the Allies, he aided the Allied effort to quell the uprisings of the rebel Shogunate leaders before betraying the Allies and attempting to rid the Empire of the foreign barbarians.
Commando Yuriko Omega[edit | edit source]
|“||They won't bother us anymore.
- Yuriko, ordered to destroy
See "Yuriko" Datafile for information.
|“||With me at your side you'll sure have the advantage.
A shogunate leader. Young, arrogant and full of life, this man is a nationalist and loyal servant of the Empire. He has great confidence and trust in the Emperor and his sacred will. He was the one that helped mastermind the Imperial Invasion of Russia, and it's his goal to train the next generation of Commanders to carry out the Emperor's will. Kenji is at his best on the battlefield, and his knowledge of Imperial technology is unmatched. Thus, he is known for using vehicles over infantry in battle.
Tenzai Robotics, as reported by Allied forces in their drive for Tokyo, was named after this nationalistic and hyperactive shogunate.
|“||I die with honor you will not!
A calculating shogunate who is referred to as the "Emperor's Shadow". He assists the Imperial Shogun Commander in a battle against General Krukov and Allied Commander Hanley. His ambitions for the Empire are great and sees the Imperial Commander as his protégé as the Imperial campaign ends.
Nagama Dojos, as reported by Allied forces during the Tokyo siege, was named after the Emperor's Shadow and his calculating personality.
|“||I don't think your are big enough for this fight! You better turn around while you still can!
Born on a Shogun Battleship, Naomi is a shogunate with a cold soul and ruthless battle strategies to match it. Bearing strong hatreds for the Soviet "barbarians", she will stop at nothing to bring glory and honor to the Empire.
Shirada Docks and the Shogun Battleship's 6 "Shirada" main guns were named after her as a reflection of her naval superiority tactics.
Commander *Name Classified*[edit | edit source]
In the Imperial Campaign, he managed to aid the Empire in defeating both the Allies and the Soviets, almost single-handedly turned the tide of the war. After the Empire's victory, he became the Imperial Supreme Shogun.
List of Zaibatsu and Military Contractors[edit | edit source]
Here are a list of Companies directly responsible for constructing the Empire's arsenal:
- Gomusubi Heavy Industries
Behind the scenes[edit | edit source]
- The Empire of the Rising Sun is, obviously, based on Japanese popular culture and historical periods. The Japanese units and buildings are largely inspired by anime, manga, feudal Japan and the Pacific War.
- The Empire's futuristic technological level alludes to Japanese post-war economic boom and the numerous high-tech products manufactured by the advanced Japanese industry.
- The Empire's defense contractors and armament manufacturers are influenced by the concept of zaibatsu, a Japanese term referring to business conglomerates with strong political, economical and military connections in the Imperial Japan.
- Emperor Yoshiro is worshipped by Japanese people as a divine being (arahitogami), mirroring a primeval Japanese mythical tale of the Emperors of Japan being descendants of the sun goddess Amaterasu.
- The Empire's militaristic ideology and nationalist policies, like the belief of the "divine destiny" to rule all mankind, are inspired by the nationalistic slogan Hakkō ichiu, which was interpreted that the Japanese were a "divine" race destined to unite the world and adopt expansionist policies to establish dominion over the continental Asia. In the 1930s, the slogan culminated in the Greater East Asia Co-Prosperity Sphere, a Japanese concept to establish a bloc of Asian nations led by the Empire of Japan, which is alluded in the game by the Empire's attempts to establish a global hegemony.
- According to the designers, the Soviet nuclear weapons were removed (via the removal of Einstein) because they felt it would be highly inappropriate to have a video game that featured the use of nuclear arms against the Japanese, given Japan's status as the only nation to ever suffer a nuclear attack in history.
- The Japanese actually made claim on Hawaii in 1880-1890s, considering the Kingdom of Hawaii as their protectorate. The Japanese Empire protested against the US-inspired Wilcox rebellion in 1895 (which led to eventual annexion of Hawaii by the United States) and send warships to support their position, but eventually backed off, unvilling to start a war with USA in 1897. The presence of Japanese-controlled Hawaii in Empire of the Rising Sun may indicate that changes in timeline might actually went in XIX century.
- In the Japanese version of Command & Conquer: Red Alert Mobile, the Empire of the Rising Sun's Japanese name is given as "暁の帝国" (lit. "Empire of Dawn").
Fate outside of the Red Alert universe[edit | edit source]
Tiberium universe[edit | edit source]
Following the Firestorm Conflict, Japan was classified as Blue Zone B-6. In the initial stage of the Third Tiberium War, it was attacked by Nod forces as part of a coordinated attack on every Blue Zone in the world. Its fate following the Nod attack as well as the subsequent Scrin invasion is unknown. | <urn:uuid:395a3245-f0ed-4bbb-8e97-9f7bfeee35ba> | {
"date": "2019-05-20T03:13:10",
"dump": "CC-MAIN-2019-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232255536.6/warc/CC-MAIN-20190520021654-20190520043654-00456.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9551208019256592,
"score": 2.65625,
"token_count": 5515,
"url": "https://cnc.gamepedia.com/Imperial"
} |
Dictionaries - Surveying the Territory
By Jack Lynch
You Could Look It Up has a modest little purview: all reference books in all genres in all languages from the beginning of time to yesterday. (The subtitle, The Reference Shelf from Babylon to Wikipedia, hints at the range.)
Just how many reference books are there? No one knows, but the number is vast - far more than most people imagine. Major research libraries have entire rooms devoted to tens of thousands of reference books. There’s even a category called “bibliographies of bibliographies” - and, since the Library of Congress Catalog now features 1,038 works labeled “bibliography of bibliographies,” it may be time for a bibliography of bibliographies of bibliographies.
No one has ever compiled a complete catalogue of all of the world’s reference books, and the task won’t be easy. Not all the world’s libraries have been catalogued; not all the library catalogues are available in electronic form; not all the electronic catalogues can be searched from a central location. And sometimes the query is too much for the catalogue. The Library of Congress Online Catalog, when asked to display all its holdings with the word dictionary in the title, comes back with an error message: “Your search retrieved more records than can be displayed. Only the first 10,000 will be shown.” The same thing happens when you search for encyclopedia.
But we can get a rough idea of the magnitude of the task by searching a few major library catalogues. The General Catalogue of the British Library, one of the world’s great collections, sports 35,650 titles that contain the word dictionary; the Catalogue Général of the Bibliothèque Nationale de France contains 42,162 works with dictionnaire in their titles; the Deutsche National Bibliothek in Leipzig features 41,892 titles with the word Wörterbuch; the Rossiiskaia Gosudarstvennaia Biblioteka in Moscow has 16,124 titles with словарь (slovar’); Spain’s Biblioteca Nacional de España has 12,563 titles with diccionario; the Italian Biblioteca Nazionale Centrale di Firenze has 7,760 titles with the word dizionario. We get similar figures for encyclopaedia (18,482 in the British Library), encyclopédie (24,273 titles in the Bibliothèque Nationale), Enzyklopädie (8,549 in the Deutsche National Bibliothek), and so on.
The closest thing to a comprehensive library catalogue may be WorldCat, the combined catalogues of 71,000 libraries from 112 countries, though even WorldCat is far from complete. There a search for dictionary comes up with an overwhelming 311,602 books, 35,756 separately catalogued articles, 15,051 Internet resources, 2,637 computer programs, 1,859 periodicals, 824 sound recordings, 659 visual materials, 239 maps, 238 musical scores, 154 archival records, and 19 “updated resources,” for a total of 369,071 titles. Throw in the words for dictionary in the other major European languages, and the total swells to 727,930. Another 259,724 records for encyclopedia in the major European languages brings the total number of dictionaries and encyclopedias to nearly a million - and that’s in a single catalogue, far from complete, covering only the major languages of Europe. If it were possible to broaden the search further - covering every library; including Chinese, Japanese, Korean, Arabic, Hindi, Urdu, Bengali, Russian, and other languages whose speakers number in the hundreds of millions; and searching not only for dictionaries and encyclopedias, but also atlases, thesauruses, legal references, and so on - the number would be much higher.
The varieties are also innumerable. There are general dictionaries, learners' dictionaries, bilingual dictionaries, polyglot dictionaries, gardeners' dictionaries, legal dictionaries, and biographical dictionaries. There’s a German-Basque dictionary, an Italian-Armenian-Turkish dictionary, and a Dictionary of Jewish Surnames from the Kingdom of Poland. There are general encyclopedias, technical encyclopedias, encyclopedias of the arts, encyclopedias of philosophy, encyclopedias of etiquette, encyclopedias of Altertumswissenschaft. The Star Trek Encyclopedia is now in its fifth edition, and competes with the Encyclopedia of Trekkie Memorabilia. There’s an Encyclopedia of R.F.D. Cancels, 281 pages on the postmarks used on Rural Free Deliveries, and an Encyclopedia of Knots and Fancy Rope Work. Atlases range from the Atlas of South Sarasota County to the Atlas of South Asia to the Atlas of Southern Milky Way.
You Could Look It Up will obviously cover only a tiny number of these reference works. I hope to tell the story of reference books from the beginning of literacy to the present by focusing on a few dozen hugely important reference books, with another few hundred providing context and background.
On this blog I'll be providing snippets of my work-in-progress, focusing on the most amusing and quirky projects I can find. I'll provide a "reference book of the day," and while I can't promise it'll be every day, I do hope to do at least a few posts a week, at least when I'm not traveling.
Published on You Could Look It Up. The Reference Shelf from Babylon to Wikipedia. Presented here by permission of the author. Picture: BvB | <urn:uuid:093472ef-90d9-4cd6-b522-9c16fdcaf297> | {
"date": "2018-10-23T18:09:23",
"dump": "CC-MAIN-2018-43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583516892.84/warc/CC-MAIN-20181023174507-20181023200007-00416.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8652868270874023,
"score": 2.6875,
"token_count": 1229,
"url": "https://www.ilab.org/fr/node/57604"
} |
The Genetic Resources Committee and Resource Center Subcommittees
Diverse strains of experimental organisms are indispensable
for the research of Life Sciences. In addition, a large number of
mutant strains have recently been produced, due to the explosive worldwide
development of biological strains, including genome studies and gene
function research using these mutant strains. The development and
analysis of the expanding variety of living strains, their preservation
and distribution and databank systems for the efficient proliferating
of information concerning living strains have become extremely important,
not only for basic research of Life Sciences but also in the fields
of Applied Science such as Medicine and Agriculture.
Under these circumstances, the report on "The Use of Biological and Genetic Resources for Scientific Research" was issued by the Scientific Information and Materials Section of the Science Council (June, 1996). This report defined "biological and genetic resources" to include "living strains for scientific genetic research utilizing wild living organisms that can be subject to scientific research and the cells and DNA of these living organisms".
The report made recommendations primarily for the establishment of databases of information containing the characteristics of these organisms and the development of networks for their wide and effective use.
The first concrete step for the creation of such a system was the implementation of Genetic Resources Centers. A Genetic Resources Center was constructed for each of the major species and the centers were expected to play a leading role in the character development, maintenance and preservation, supply and database creation for each biological strain. For this purpose, subcommittees concerning the relevant biological and genetic resources were organized at each center for the promotion and evaluation of associated operations.
The second step was the establishment of the Genetic Resources Committee as a superstructure of the Genetic Resources Centers and Strain Information Database operations. Their objectives were to comprehensively evaluate and coordinate the procurement and use of biological and genetic resources in Japan from diverse scientific viewpoints and to establish bases for the integrated collection and distribution of information.
Urged by this report, the Resources Centers mentioned below have been established within universities since 1997. The National Institute of Genetics reorganized the Genetic Stock Research Center and founded the Genetic Strains Research Center, serving as a resources center for 3 species, the Genetic Resources Committee and the Center for Genetic Resource Information, which manages the Genetic Resources Strain Information Database.
In a sense, the Genetic Resources Committee is the parliament of the "genetic resources operations" and should, by nature, be placed at the center. Its role may have become slightly unclear as it came to be managed by the National Institute of Genetics. However, as shown in the attached diagram, it does not supervise the National Institute of Genetics but it meant to evaluate and coordinate the entire genetic resources operations (particularly) at universities in Japan.
For this purpose, the Committee is expected not only to be well informed about the present state of all genetic resources operations and to reflect the opinions of the rank and file, but also to formulate future plans, including defining the position of genetic resources operations in Bioscience from a broad perspective.
In view of the above, Directors of Resources Centers of various species
(shown in the attached
), researchers in the related fields who aspire to develop
resources centers in the future and staff members of other ministries
in charge of related operations gathered and appointed the Genetic
Resource Committee. Also, a Steering Committee was implemented, for
the flexible direction and overseeing of the forementioned Committee.
The establishment of the Steering Committee required time and labor,
as it differed from a conventional committee of a research institute,
however it met in June 1999.
A Genetic Resources Committee meeting was held in October the same year, 1999, where the rules were determined and the Genetic Resources Committee was put into action. In the future, the Committee is anticipated to embark on the activities that are its primary purpose, such as evaluating the principles of genetic resources operations and supporting the establishment of new resource centers.
A Genetic Resources Subcommittee is placed in each resources center, which is implemented on a rough revenue set aside by the institution such as the university to which it belongs. Therefore, its management and rules depend on the founding university or the research institute. But the primary duty of the Subcommittee is to exchange information and conduct investigations so that the strain-preserving operations of the relevant species are executed smoothly and efficiently. Thus, the Subcommittee is composed of the Director of the Center and related researchers.
Construction of Database of information concerning the presence and characteristics of the strains is also included in the duties of the Subcommittee and this duty is often carried out in consultation with the Strain Information Database staff of the Center for Genetic Resource Information.
As shown in the attached Table 2 , Resources Centers and Subcommittees for the mouse, rice and Escherichia coli have been established at the Genetic Strains Research Center, National Institute of Genetics. At other universities -
- barley (Barley Germplasm Center, Okayama University, Research Institute for Bioresources)
- the Fruit fly (Kyoto Institute of Technology)
- cells in culture (Tohoku University, Institute of Development, Aging and cancer)
- silkworm (Kyushu University, Institute of Genetic Resources Center)
Due to the prolific development of genome studies and research on the diversity and evolution of life, new light is about to be shed on strain-preserving operations. Such operations themselves also need dynamic remodeling to keep abreast with major trends of Bioscience. Activities of the above - mentioned various centers and Committees are expected to accelerate these movements and lead them in a desirable direction.
Center for Genetic Resource Information
National Institute of Genetics | <urn:uuid:a45ed99a-4fe4-4f25-9275-7b533bc0989a> | {
"date": "2017-05-29T19:29:03",
"dump": "CC-MAIN-2017-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463612537.91/warc/CC-MAIN-20170529184559-20170529204559-00388.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9390482306480408,
"score": 2.90625,
"token_count": 1145,
"url": "http://shigen.nig.ac.jp/shigen/grc/grc.jsp;jsessionid=78FD47BCC5B475451720C0674728CD99"
} |
Global Online Forum to Give Teachers a Voice on HIV
May 14, 2009
In order to review progress made and identify ways forward, UNESCO's International Institute for Educational Planning (IIEP) and the UNAIDS Inter-Agency Task Team on Education are organizing an E-Forum on 'Teachers and HIV & AIDS: Reviewing achievements, identifying challenges' from 18 to 29 May 2009.
The forum will bring together a wide range of actors including educational planners, policy-makers, representatives of teachers' unions and teaching staff, networks of teachers living with HIV, civil society groups, donors, UNAIDS cosponsors and other multilateral agencies. They will exchange views and experiences and explore how teachers can capitalize on their influence and expertise to mitigate the effects of an epidemic which is having a profound and negative impact on schools and entire education systems.
In many countries, curricula now include AIDS-related content and teachers themselves are often taking the lead. For example, the South African Democratic Teachers' Union is building institutional capacity, providing training to support colleagues in examining their own vulnerability to infection, their awareness about HIV and their attitudes towards helping others avoid infection. Educators in general are given an important responsibility to ensure that children and young people acquire essential knowledge, skills and attitudes for prevention and that, in higher prevalence settings, pupils infected with and affected by HIV have access to care and support.
According to a joint statement by Mark Richmond, UNESCO's Global Coordinator on HIV and AIDS and Mark Bray, Director of UNESCO's IIEP, "The AIDS epidemic is raising many issues for the teaching profession, particularly in high prevalence settings."
"This forum promises to be a valuable opportunity... to enable the voices of teachers to be heard by all those responding to the challenges posed by HIV."
-- Mark Richmond, UNESCO's Global Coordinator on HIV and AIDS and Mark Bray, Director of UNESCO's IIEP
"This forum promises to be a valuable opportunity for teachers and other stakeholders to share their knowledge and experience and, even more importantly, to enable the voices of teachers to be heard by all those responding to the challenges posed by HIV," they continued.
The outcomes of the Forum will feed directly into the Spring Meeting of the UNAIDS IATT on Education, hosted by Irish Aid, the Irish government's assistance programme for developing nations. Taking place in June this year, the meeting has 'Teachers and HIV & AIDS: Reviewing achievements, identifying challenges' as its Symposium theme.
A report on the discussion will also be more widely available at the IIEP's HIV and AIDS Education Clearinghouse.
The Forum will invite the exchange of views on four interrelated sub-topics:
All four sub-topics will be accessible over the course of the Forum which will be animated by e-moderators (IIEP and UNAIDS IATT Secretariat staff), with daily syntheses of discussions and commentary to guide further debate on these issues.
To join the Forum, please send an e-mail message to: [email protected], stating your name, title, organization and nationality. You will then be sent detailed instructions on how to access the Forum and contribute to the discussion.
Please note that you can sign up at any time prior to or during the Forum but that it will be active only from 18 May.
For more information on the IATT Symposium in Ireland, please contact: [email protected]
This article was provided by UNAIDS. Visit UNAIDS' website to find out more about their activities, publications and services. | <urn:uuid:12145f41-5a3c-477e-8d49-4db841bccc75> | {
"date": "2016-10-24T22:35:56",
"dump": "CC-MAIN-2016-44",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719784.62/warc/CC-MAIN-20161020183839-00407-ip-10-171-6-4.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9377802610397339,
"score": 2.53125,
"token_count": 732,
"url": "http://www.thebody.com/content/art51821.html"
} |
ANN ARBOR, Mich.—A hidden facet of a math problem that goes back to timeworn Sanskrit manuscripts has just been exposed by nanotechnology researchers at the University of Michigan and the University of Connecticut.
It turns out we've been missing a version of the famous "packing problem," and its new guise could have implications for cancer treatment, secure wireless networks, microelectronics and demolitions, the researchers say.
Called the "filling problem," it seeks the best way to cover the inside of an object with a particular shape, such as filling a triangle with discs of varying sizes. Unlike the traditional packing problem, the discs can overlap. It also differs from the "covering problem" because the discs can't extend beyond the triangle's boundaries.
"Besides introducing the problem, we also provided a solution in two dimensions," said Sharon Glotzer, U-M professor of chemical engineering.
That solution makes it immediately applicable to treating tumors using fewer shots with radiation beams or speeding up the manufacturing of silicon chips for microprocessors.
The key to solutions in any dimension is to find a shape's "skeleton," said Carolyn Phillips, a postdoctoral fellow at Argonne National Laboratory who recently completed her Ph.D. in Glotzer's group and solved the problem as part of her dissertation.
"Every shape you want to fill has a backbone that goes through the center of the shape, like a spine," she said.
For a pentagon, the skeleton looks like a stick-drawing of a starfish. The discs that fill the pentagon best will always have their centers on one of those lines.
Junctions between lines in the skeleton are special points that Glotzer's team refers to as "traps." The pentagon only has one trap, right at its center, but more complicated shapes can contain multiple traps. In most optimal solutions, each trap has a disc centered over it, Phillips said.
Other discs in the pattern change size and move around, depending on how many discs are allowed, but those over the traps are always the same. Phillips suspects that if a design uses enough discs, every trap will have a disc centered over it.
In their paper, published online today in Physical Review Letters, the researchers report the rules for how to find the ideal size and spacing of the discs that fill a shape. In the future, they expect to reveal an algorithm that can take the desired shape and the number of discs, or the shape and percentage of the area to be filled, and spit out the best pattern to fill it.
Extending the approach into three dimensions, Glotzer proposes that it could decide the placement of wireless routers in a building where the signal must not be available to a potential hacker in the parking lot. Alternatively, it could help demolition workers to set off precision explosions, ensuring that the blast covers the desired region but doesn't extend beyond a building's outer walls.
Phillips expects filling solutions to be scientifically useful as well. Glotzer's team developed the new problem by trying to find a way to represent many-sided shapes for their computer models of nanoparticles. In addition to nanotechnology, biology and medicine often need models for complex shapes, such as those of proteins.
"You don't want to model every single one of the thousands of atoms that make up this protein," Phillips said. "You want a minimal model that gives the shape, allowing the proteins to interact in a lock-and-key way, as they do in nature."
The filling approach may prove a perfect fit for a variety of fields.
The paper is titled "Optimal filling of shapes." Funding for this study included grants from the Department of Energy and the Department of Defense
- Sharon Glotzer: http://che.engin.umich.edu/people/glotzer.html | <urn:uuid:71610a8b-8127-4fe1-808c-5dc2af1526b7> | {
"date": "2017-02-21T00:41:41",
"dump": "CC-MAIN-2017-09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170614.88/warc/CC-MAIN-20170219104610-00624-ip-10-171-10-108.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9517382383346558,
"score": 3.46875,
"token_count": 789,
"url": "http://www.ns.umich.edu/new/releases/20388-new-twist-on-ancient-math-problem-could-improve-medicine-microelectronics"
} |
This course is about the various technologies that we use to build Web applications. It is focused on preparing you for enterprise applications and thus focuses more on Java based back ends. It also introduces you to the vagaries of information technology standards. Standards are quantifiable metrics to which parties adhere for purposes of allowing some common ground for interchange. Some students of standards view monetary systems developed for the exchange of goods as the earliest standards. The alphabet may also be viewed as an early standard - a compatibility standard for the exchange of information. Modern U.S. standards first appear in the manufacturing arena. The history is somewhat cloudy and many stories are told, but in most of them, mass production and the railroads play a role, e.g. the railroads required standardization on many fronts, from track gauge to time. The World Wide Web is made possible by the adoption of standards that allow many independent systems to work together.
We will take an in depth look at the XML technologies. The XML standards will be reviewed. Particular attention will be paid to XML data types, XML Schema, XSLT, XPATH and XQuery. Derivative standards such as the Resource Description Framework and the RDF Schema language RSS and SVG, etc. will be introduced. The course will provide students with the opportunity to explore these standards in the course of real application development.
Applications standards pertinent to the web – SMTP and HTTP – will be dissected. The course will touch on distributed object standards such as CORBA, and DCOM that have led to the development of infrastructure standards for distributed services such as IDLs (including WSDL), directory service standards such as LDAP and UDDI and security standards such as DES and PKI. As time permits, we may take a look at some of the network protocols which include addressing standards (IP), transport standards (TCP), and some supporting standards such as ARP, Ethernet, and DNS.
Within the realm of information technology standards, we still look primarily at the higher level software and information formatting standards. While hardware standards are important they are generally addressed in other courses in the curriculum. Less well addressed, but of increasing prominence, are the software and information formatting standards. They will be the focus of our attention here.
Philosophy and Approach
IS 2560 is a graduate course. This means students have responsibility to be proactive in their learning. The instructor's role is less directive and more one of stimulating and guiding learning. If you think back to the things you remember from other courses you have taken, you will probably find that the things you remember best are the things you had to work hard to learn. What takes place in the classroom constitutes only a small part of the overall learning in any course. To this end, the course is constructed to provide three kinds of learning experiences. First, class lectures and discussions that help to clarify the concepts and principles in operation. Second, readings that both provide an overview and some in depth discussion of the topic. Third, practical experiences related to the subject matter at hand.
The most important learning will come from the efforts you undertake beyond the textbook and class lectures. The lectures will provide a counterpoint to what is in the book and the assignments will require the use of skills learned in this course along with the many other skills you have developed throughout your program. The lectures for the course will cover a broad range of topics in an effort to provide both orientation and understanding about basic concepts. Finally, the assignments will provide an opportunity to see, in relatively simple situations, how the concepts discussed in the lectures and readings are implemented in practice.
Expectations about Preparation
At a very minimum, it is expected that you will read any material assigned to you before the class for which it is assigned. This does not mean skimming the material - it means reading, annotating, and understanding the material. It also means that it is your responsibility to identify areas in which you need to do extra work to bring yourself up to basic competency in the areas we will cover. Any course in this school brings together a diverse group of people with vastly different experiences. This makes it difficult to know where to start in a multifaceted course like this one. While the discussion of standards in the first part of the course is fairly well self contained, the latter parts of the course will require a fundamental understanding of telecommunication and computer systems. The basic knowledge and the associated skills developed in data structures, networking, and information systems provide a common starting point for our discussion. Should you find yourself totally ignorant in these areas, you are encouraged to do some preliminary reading, skill enhancement, or thinking during the first few weeks of the course. It is important that you understand that what you take out of the course will to a large extent be determined by what you bring to it.
While there is no accepted or standard programming language or operating system, there is a growing trend to establish such. For the last decade, many viewed the Unix operating system as a standard toward which we should be moving. Because of the close association between Unix and the C programming language, which has been used extensively for interactive system programming, some saw C and C++ as emerging language standards. More recently NT, XP, and Vista have begun to emerge as operating system platform standards. In conjunction with the explosive growth of the World Wide Web, Java has begun to gain in popularity as a language of choice. While work may be done on any platform and in any scientific language, you are encouraged to use either Unix or XP/Vista operating systems and the C or Java languages for programming work you do in this course.
The goals of the course are:
The required textbooks for this course are:
Students may also wish to read:
· Global Standards: Building Blocks for the Future, Linda Garcia, Office of Technology Assessment (Copies will be provided by the instructor)
· Charles F. Goldfarb's XML Handbook, Fifth Edition Charles F. Goldfarb, Paul Prescod Prentice Hall PTR; 5 edition (November 3, 2003), ISBN: 0130497657
Students are expected to come to class prepared to discuss the topic assigned for the day. In addition, students are expected to be doing their own exploratory reading on related subjects throughout the term. As indicated, the instructor believes that the knowledge and skills you take away from a course come not only from what the instructor espouses in class, but from your external readings and your own work and writing.
The instructor reserves the right to modify the course requirements. In particular, if deemed necessary, exams may be added to the requirements or substituted for selected requirements if in the instructor's opinion students are not staying abreast of course readings.
In addition to readings and class participation (accounting for 10 points of the grade awarded by the instructor), students are required to complete 90 points of project activities. There are 50 points worth of activities to be undertaken by all students. Beyond these minimum requirements, students may choose from the optional activities listed below or they may propose new activities (in writing to be reviewed and if appropriate approved by the instructor.) Proposed activities may be individual or group, but care should be taken to insure that the scope of group activities are significantly larger than individual projects.
(Copies of sample code and other resource materials will be made available at http://www.sis.pitt.edu/~mbsclass. )
· At least 5 separate pages
· Be xhtml compliant (http://validator.w3.org/)
· Meet web accessibility guidelines (http://www.w3.org/WAI/eval/Overview)
· Include a simple navigation scheme
· Include one or more images
· Make use of a CSS style sheet
· what is being standardized and how it is being standardized,
· the motivation for standardization,
· what is being addressed and what is being left out,
· the process that is being used, who is involved and what is going on.
Examples of areas would include any of the topics listed on the main W3C pages.
· Facility with netbeans as a development environment
· Scriplet code in a JSP page
· Business logic in a servlet
· Request dispatching in a serlet
· Use of a bean to store session/request information
The activities below are simply illustrative of those suggested for the class. They are far from exhaustive, and are intended only to stimulate thinking about the kinds of projects students might undertake. The first three suggestions below provide more detailed specifications.
· RSS Reader – Based on ATOM
· ATOM is the new standard for syndication and blogging – replacing the various versions of RSS standard
· The tool could be a web site or a stand alone program that generates a valid ATOM feed. The generator should guarantee all required elements and allow selected optional elements.
· AJAX editor
· The tool could provide some advanced feature – editing and existing feed, or translating one feed format to another, etc.
· The tool could be one or more components of ATOM/AJAX based editing and annotation tool – the instructor will explain
· Write a weblog analysis tool that provides at least three of the following kinds of information
· Most frequent visitors to a website
· Starting and stopping pages
· Pages with bad links
· Pages that have not been modified in over a year
· Average session length
· Missing pages
· Path analysis – this can serve as 2 kinds of information
· Social Networking/Collective Intelligence
· Social Networking sites provide an opportunity to harvest user information and contributions into new data sets that may represent new information
· The SN/CI site should serve some useful function – such as a group site for members of the SIS community
· The site should provide automated tools that expose new information or insights for collective uses
· Joint calendaring, shared bookmarks and blogs are all examples of what might be done here
· Management Spider tool to catalog the information on a website.
· The tool might check links and pages and report on potential web site problems
· It might recommend web site changes based on the analysis
· Develop an analysis of the significant issues in web standardization that must be addressed related to:
· The National Information Infrastructure.
· Web accessibility for various disabilities
· E-Business and Web Services
· The semantic web
· Mobile and location based services
Assignment Due Dates and Grading
Assignments are due according to the following tentative schedule:
The submission of required activities are all due by week 8. Late assignments will be subject to a 10% penalty.
Grades for all the assignments will be summed and from 0-10 points will be added by the instructor based on an assessment of class participation. Final grades will be assigned as follows:
You are expected to be fully aware of your responsibility to maintain a high quality of integrity in all of your work. All work must be your own, unless collaboration is specifically and explicitly permitted as in the course group project. Any unauthorized collaboration or copying will at minimum result in no credit for the affected assignment and may be subject to further action under the University Guidelines for Academic Integrity. You are expected to have read and understood these Guidelines. A document discussing these guidelines was included in your orientation materials.
If you have a disability that requires special testing accommodations or other classroom modifications, please, notify both the instructor and Disability Resources and Services by the second week of the term. You may be asked to provide documentation of your disability to determine the appropriateness of accommodations. To notify Disability Resources and Services, call 64807890 (voice or TDD) to schedule and appointment. The office is located in the William Pitt Union, Room 216.
Professionalism and Plagiarism
There are a couple things that you need to keep in mind as you start this course. Any documents you submit should be carefully proofread and formatted professionally. The paper should provide all the necessary information – your name, your email address, student ID, the course, the term, the CRN, and the assignment for which the paper is submitted. Any code that is submitted should be thoroughly tested to insure that I will be able to run it on any machine. The project source code and executable files should both be included. The material, if it is extensive, should be zipped up in a zip or jar file. Care should be taken to make sure that all necessary supporting DBMS and lib or jar files are included. A readme file should be included that explains any particular constraints or steps that need to be taken. ALL CODE THAT COMES FROM ANY SOURCE OTHER THAN YOUR HEAD NEEDS TO BE FULLY AND CAREFULLY MARKED. This includes code which you have adapted from some source but which is essentially someone else’s work. Failure to note such use is cause for a grade of 0 on the assignment and an F in the course. All of your code should be carefully and professionally commented and explained. In both the mail note to which the project is attached and in the main file of the project, you should include:
Schedule of Topics and Readings
This course is addresses a subject which has not traditionally been a part of the information science curriculum. The topics are interdisciplinary, broad, deep, and complex. From the academic perspective there is not any comprehensive perspective or model from which the subject may be suitably studied. For these reasons, students should anticipate that the sequence of topics may be adjusted, expanded, or contracted as the term proceeds.
In general, the course will be divided into four parts.
Introduction and Overview
· Review of the course syllabus
· Discussion of the assignments
Frameworks for Understanding Standards
· The purpose of standards
· The history of standards development
o nationally (in the U.S. and in other countries)
· Broad Categories
o Internal corporate standard
o De-facto standard
o De-jure and client determined standards
o Formal consensus standards
· Classificatory Models
· Economic Models
· Impact on research and development
· Impact on end user purchases
· Cost of the standards themselves
· Impact of technological developments
· Operational Models -- OSI
· Organizational Models
W3C and Standards
· Accreditation of a developer
· Planning and coordination of standards
· Designation, publication, maintenance, and interpretation of standards
· Procedures for development of a standard by a committee
· Organization of the committee
· Responsibilities, officers and membership
· Subgroups of the committee
· Termination of the committee
· Role of consortia
· XML data types
· XML Schema
· Derivative standards such as the Resource Description Framework and the RDF Schema language RSS and VRML, etc. will be introduced. The course will provide students with the opportunity to explore these standards in the course of real application development.
Java and Parsers
Next Generation Web (Web 2.0)
· Web Services | <urn:uuid:433723ea-b33f-4623-88c5-dc4d8a60a344> | {
"date": "2017-01-18T05:52:31",
"dump": "CC-MAIN-2017-04",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280239.54/warc/CC-MAIN-20170116095120-00496-ip-10-171-10-70.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9242681264877319,
"score": 3.203125,
"token_count": 3089,
"url": "http://www.sis.pitt.edu/spring/courses/is2560syl141.htm"
} |
Follow us:Follow Us on Twitter Like Us on Facebook Follow Us on Google+ Watch videos on our Youtube channel
Answer: Mucopolysaccharidosis. Genetic testing confirmed the diagnosis of Hunter’s syndrome.
- Axial T1 and T2 MRI of the brain: On T1 diffuse ovoid and lenticular areas of hypointensity in the white matter are present. These areas have high T2 signal similar to CSF. Not shown: There is no associated gliosis or enhancement. These findings are consistent with prominent Virchow-Robin spaces.
- Sagittal T1 of the cervical spine and Sagittal T2 of lumbar spine: There is a pannusbetween the arch of C1 and the odontoid process that extends posteriorly. It is causing narrowing of the spinal canal. The lumbar vertebrae demonstrate anterior beaking and posterior scalloping.
- Mucopolysaccharidosis is an inherited disorder of the lysosomal enzymes that break down mucopolysaccharides, also known as glycosaminoglycans (GAGs). GAGs are proteins that are bound to repeating chains of sugar and form a wide variety of compounds. Some well-known members of this group of molecules include heparin, which is vital in anticoagulation, and chondroitin which is found in joints, ligaments, tendons and cartilage. The ubiquity of these molecules means they build up in nearly all tissues. This produces clinical and radiological findings which at first may seem unrelated.
- Virchow-Robin spaces are perivascular spaces normally filled with interstitial fluid. In Hunter’s syndrome, these spaces become distended with mucopolysaccharides. The pannus at C1-2 is also formed by deposition within the stabilizing ligaments of the atlanto-axial joint. This cervical spine is particularly important to monitor because of the potential for spinal canal compromise and atlanto-axial instability. However, all tendons and ligaments are susceptible to enlargement.
- The deposition of mucopolysaccharides within the vertebrae creates characteristic “beaks” andscallops seen on MRI. Deposition in the calvarium results in macrocephaly, frontal bossing and coarse facies. Long tubular bones such as ribs and fingers are particularly susceptible to widening. The chest x-ray below is from the same patient and shows “oar ribs” which are ribs with normal thickness at the costovertebral joints but widen more distally. In this example, the lower ribs show this finding best.
Prognosis and Treatment:
- Unfortunately, the mucopolysaccharidoses are progressive diseases that often lead to significant morbidity and mortality. Radiologists should be cognizant of the wide variety of imaging manifestations.
- Heike E. Daldrup-Link, Charles A. Goodin. Essentials of Pediatric Radiology: A Multimodality Approach 2010, pg 244-248.
- Kwee RM, Kwee TC. “RSNA Education Exhibits: Virchow-Robin Spaces at MR Imaging.” Radiographics July-August 2007 27:4 1071-1086; doi:10.1148/rg.274065722.
|< Previous Page||View our Case of the Month Archives| | <urn:uuid:c11a0330-bd5b-43df-85e2-238d80105774> | {
"date": "2015-03-27T17:21:22",
"dump": "CC-MAIN-2015-14",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131296587.89/warc/CC-MAIN-20150323172136-00250-ip-10-168-14-71.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8879761695861816,
"score": 2.90625,
"token_count": 714,
"url": "http://www.cedars-sinai.edu/Patients/Programs-and-Services/Imaging-Center/For-Physicians/Case-of-the-Month/Case-of-the-Month-Archive-2012/Case-of-the-month-2012-05/Case-of-the-Month-May-2012-Page-2.aspx"
} |
The following events occurred in the 1940s:
- 1940: Rubeus Hagrid starts at Hogwarts.
- 1940 to 1945: Grindelwald's Revolution.
- 1943: Tom Riddle opens the Chamber of Secrets. Several students get injured, Moaning Myrtle gets killed by the Basilisk. Hagrid is framed for the attacks by Riddle and is expelled.
- Summer, 1943: Tom Riddle murders his father, Tom Riddle Sr., and his grandparents, Thomas and Mary Riddle, for the abandoning of his late mother, Merope Gaunt. His uncle, Morfin Gaunt is framed for the attacks by Riddle and is sent to Azkaban.
- 1945: Tom Riddle graduates from Hogwarts School of Witchcraft and Wizardry.
- 1945: Albus Dumbledore defeats Gellert Grindelwald, who is sentenced to life in Nurmengard.
- 1 September, 1946: Minerva McGonagall starts attending Hogwarts School of Witchcraft and Wizardry, and proves to be a Hatstall during her Sorting.
- 1946: Tom Riddle murders Hepzibah Smith, stealing artefacts of Helga Hufflepuff and Salazar Slytherin
- 1947: The Werewolf Register is introduced.
- 1947: A History of Magic by Bathilda Bagshot is first published.
- A fanged gerbil was found to have been put into Augusta Longbottom's handbag as a joke by her husband.
- 1949: A hippocampus is caught by Merpeople off the coast of Scotland.
- 1940 to 1944: Winky Crockett captained the Slytherin Quidditch team.
- 1944 to 1948: Neil Lament captained the Slytherin Quidditch team.
- 1948: Andrew Snowyowl captained the Slytherin Quidditch team from 1948 until the end of the decade.
- 1940: Fabius Watkins
- 15 May, 1941 or 1931: Pomona Sprout
- 1945: Devlin Whitehorn
- 1946: Broderick Bode
- 1947: Laurentia Fletwock
- 1942: Stephen Hawking
- 1941: Karl Broadmoor
- 1949: Unidentified Minister of Magical Transportation
- 30 October 1949: Molly Prewett
- 1940: Mr. Hagrid
- 1942: Eunice Murray
- 1943: Cygnus Black II
- 13 June, 1943: Moaning Myrtle
- Summer, 1943: Tom Riddle Sr.
- Summer, 1943: Thomas Riddle
- Summer, 1943: Mary Riddle
- 1946: Hepzibah Smith
Behind the scenesEdit
- 1942: Mike Newell, director of the film adaptation of Harry Potter and the Goblet of Fire, was born on 28 March.
- 1942: Gemma Jones, who plays Hogwarts' Nurse Poppy Pomfrey, was born on 4 December.
- 1945: Andrew Burt, a British actor who provided voices in the video game adaptation of Harry Potter and the Deathly Hallows: Part 1, was born on 23 May.
- 1946: Alan Rickman, the actor who portrays Severus Snape, was born on 21 February.
- According to the mini-adventure The Queen's Handbag, Augusta Longbottom, grandmother of Neville Longbottom, was the victim of a prank by her husband involving her handbag and a fanged gerbil in 1947, leading her to booby-trap her handbags from then on (leading to some pain for Ron Weasley). The Queen's Handbag breaks from canon in several places (not least of which by being set in 2006), so therefore whether anything included in the adventure actually counts as continuity is a matter of debate. This piece of information regarding Longbottom is listed here, however, as the only piece of new Potter Universe backstory offered in the mini-adventure.
- 1940s on Wikipedia
Notes and referencesEdit
- ↑ Harry Potter and the Chamber of Secrets
- ↑ Fantastic Beasts and Where to Find Them (real) - Chapter 1 (About the Author)
- ↑ Fantastic Beasts and Where to Find Them (real) - Chapter 3 (A Brief History of Muggle Awareness of Fantastic Beasts)
- ↑ 4.0 4.1 4.2 Harry Potter: The Exhibition, (see this image)
- ↑ Mugglenet — Birthday archive: Pomona Sprout (information retrieved from J.K. Rowling's Official Site)
- ↑ Pottermore biography of Minerva McGonagall (transcription available here)
| 20th century|
1900s 1910s 1920s 1930s 1940s 1950s 1960s 1970s 1980s 1990s | <urn:uuid:23da26a4-8955-4d1a-81ce-bdc909949d1c> | {
"date": "2014-04-16T08:17:44",
"dump": "CC-MAIN-2014-15",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609521558.37/warc/CC-MAIN-20140416005201-00347-ip-10-147-4-33.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8671018481254578,
"score": 2.71875,
"token_count": 968,
"url": "http://harrypotter.wikia.com/wiki/1940s?diff=cur&oldid=751754"
} |
Thermionic emission is the heat-induced flow of charge carriers from a surface or over a potential-energy barrier. This occurs because the thermal energy given to the carrier overcomes the binding potential, also known as work function, of the metal. The charge carriers can be electrons or ions, and in older literature are sometimes referred to as "thermions". After emission, a charge that is equal in magnitude and opposite in sign to the total charge emitted is initially left behind in the emitting region. But if the emitter is connected to a battery, the charge left behind is neutralized by charge supplied by the battery as the emitted charge carriers move away from the emitter, and finally the emitter will be in the same state as it was before emission.
The classical example of thermionic emission is the emission of electrons from a hot cathode into a vacuum (also known as thermal electron emission or the Edison effect) in a vacuum tube. The hot cathode can be a metal filament, a coated metal filament, or a separate structure of metal or carbides or borides of transition metals. Vacuum emission from metals tends to become significant only for temperatures over 1000 K. The science dealing with this phenomenon has been known as "thermionics", but this name seems to be gradually falling into disuse.[according to whom?]
The term "thermionic emission" is now also used to refer to any thermally-excited charge emission process, even when the charge is emitted from one solid-state region into another. This process is crucially important in the operation of a variety of electronic devices and can be used for electricity generation (such as thermionic converters and electrodynamic tethers) or cooling. The magnitude of the charge flow increases dramatically with increasing temperature.
|This section needs additional citations for verification. (February 2013)|
Because the electron was not identified as a separate physical particle until the 1897 work of J. J. Thomson, the word "electron" was not used when discussing experiments that took place before this date.
The phenomenon was initially reported in 1873 by Frederick Guthrie in Britain. While doing work on charged objects, Guthrie discovered that a red-hot iron sphere with a negative charge would lose its charge (by somehow discharging it into air). He also found that this did not happen if the sphere had a positive charge. Other early contributors included Johann Wilhelm Hittorf (1869–1883), Eugen Goldstein (1885), and Julius Elster and Hans Friedrich Geitel (1882–1889).
The effect was rediscovered by Thomas Edison on February 13, 1880, while trying to discover the reason for breakage of lamp filaments and uneven blackening (darkest near one terminal of the filament) of the bulbs in his incandescent lamps.
Edison built several experimental lamp bulbs with an extra wire, metal plate, or foil inside the bulb that was separate from the filament, and thus could serve as an electrode. He connected a galvanometer, a device used to measure current, to the output of the extra metal electrode. When the foil was put at a negative potential relative to the filament, no charge flowed between the filament and the foil. But when the foil was raised to a positive potential relative to the filament, negative charge could flow from the filament through the vacuum to the foil. It would only flow if the filament was heated sufficiently (by its own external power source).
We now know that the filament was emitting electrons, which were attracted to a postively charged foil, but not a negatively charged one. This one-way current was called the Edison effect (although the term is occasionally used to refer to thermionic emission itself). He found that the current emitted by the hot filament increased rapidly with increasing voltage, and filed a patent application for a voltage-regulating device using the effect on November 15, 1883 (U.S. patent 307,031, the first US patent for an electronic device). He found that sufficient current would pass through the device to operate a telegraph sounder. This was exhibited at the International Electrical Exposition in Philadelphia in September 1884. William Preece, a British scientist, took back with him several of the Edison effect bulbs. He presented a paper on them in 1885, where he referred to thermionic emission as the "Edison Effect." The British physicist John Ambrose Fleming, working for the British "Wireless Telegraphy" Company, discovered that the Edison Effect could be used to detect radio waves. Fleming went on to develop the two-element vacuum tube known as the diode, which he patented on November 16, 1904.
Following J. J. Thomson's identification of the electron in 1897, the British physicist Owen Willans Richardson began work on the topic that he later called "thermionic emission". He received a Nobel Prize in Physics in 1928 "for his work on the thermionic phenomenon and especially for the discovery of the law named after him".
In any solid metal, there are one or two electrons per atom that are free to move from atom to atom. This is sometimes collectively referred to as a "sea of electrons". Their velocities follow a statistical distribution, rather than being uniform, and occasionally an electron will have enough velocity to exit the metal without being pulled back in. The minimum amount of energy needed for an electron to leave a surface is called the work function. The work function is characteristic of the material and for most metals is on the order of several electronvolts. Thermionic currents can be increased by decreasing the work function. This often-desired goal can be achieved by applying various oxide coatings to the wire.
In 1901 Richardson published the results of his experiments: the current from a heated wire seemed to depend exponentially on the temperature of the wire with a mathematical form similar to the Arrhenius equation. Later, he proposed that the emission law should have the mathematical form
In the period 1911 to 1930, as physical understanding of the behaviour of electrons in metals increased, various theoretical expressions (based on different physical assumptions) were put forwards for AG, by Richardson, Saul Dushman, Ralph H. Fowler, Arnold Sommerfeld and Lothar Wolfgang Nordheim. Over 60 years later, there is still no consensus amongst interested theoreticians as to what is the exact expression of AG, but there is agreement that AG must be written in the form
where λR is a material-specific correction factor that is typically of order 0.5, and A0 is a universal constant given by
where m and −e are the mass and charge of an electron, and h is Planck's constant.
In fact, by about 1930 there was agreement that, due to the wave-like nature of electrons, some proportion rav of the outgoing electrons would be reflected as they reached the emitter surface, so the emission current density would be reduced, and λR would have the value (1-rav). Thus, one sometimes sees the thermionic emission equation written in the form
However, a modern theoretical treatment by Modinos assumes that the band-structure of the emitting material must also be taken into account. This would introduce a second correction factor λB into λR, giving . Experimental values for the "generalized" coefficient AG are generally of the order of magnitude of A0, but do differ significantly as between different emitting materials, and can differ as between different crystallographic faces of the same material. At least qualitatively, these experimental differences can be explained as due to differences in the value of λR.
Considerable confusion exists in the literature of this area because: (1) many sources do not distinguish between AG and A0, but just use the symbol A (and sometimes the name "Richardson constant") indiscriminately; (2) equations with and without the correction factor here denoted by λR are both given the same name; and (3) a variety of names exist for these equations, including "Richardson equation", "Dushman's equation", "Richardson–Dushman equation" and "Richardson–Laue–Dushman equation". In the literature, the elementary equation is sometimes given in circumstances where the generalized equation would be more appropriate, and this in itself can cause confusion. To avoid misunderstandings, the meaning of any "A-like" symbol should always be explicitly defined in terms of the more fundamental quantities involved.
Because of the exponential function, the current increases rapidly with temperature when kT is less than W. (For essentially every material, melting occurs well before kT = W.)
||The following text needs to be harmonized with text in Schottky effect.
In electron emission devices, especially electron guns, the thermionic electron emitter will be biased negative relative to its surroundings. This creates an electric field of magnitude F at the emitter surface. Without the field, the surface barrier seen by an escaping Fermi-level electron has height W equal to the local work-function. The electric field lowers the surface barrier by an amount ΔW, and increases the emission current. This is known as the Schottky effect (named for Walter H. Schottky) or field enhanced thermionic emission. It can be modeled by a simple modification of the Richardson equation, by replacing W by (W − ΔW). This gives the equation
where ε0 is the electric constant (also, formerly, called the vacuum permittivity).
Electron emission that takes place in the field-and-temperature-regime where this modified equation applies is often called Schottky emission. This equation is relatively accurate for electric field strengths lower than about 108 V m−1. For electric field strengths higher than 108 V m−1, so-called Fowler-Nordheim (FN) tunneling begins to contribute significant emission current. In this regime, the combined effects of field-enhanced thermionic and field emission can be modeled by the Murphy-Good equation for thermo-field (T-F) emission. At even higher fields, FN tunneling becomes the dominant electron emission mechanism, and the emitter operates in the so-called "cold field electron emission (CFE)" regime.
Thermionic emission can also be enhanced by interaction with other forms of excitation such as light. For example, excited Cs-vapours in thermionic converters form clusters of Cs-Rydberg matter which yield a decrease of collector emitting work function from 1.5 eV to 1.0–0.7 eV. Due to long-lived nature of Rydberg matter this low work function remains low which essentially increases the low-temperature converter’s efficiency.
Photon-enhanced thermionic emission
Photon-enhanced thermionic emission (PETE) is a process developed by scientists at Stanford University that harnesses both the light and heat of the sun to generate electricity and increases the efficiency of solar power production by more than twice the current levels. The device developed for the process reaches peak efficiency above 200°C, while most silicon solar cells become inert after reaching 100°C. Such devices work best in parabolic trough collectors, which reach temperatures around 800°C. Although the team used a gallium nitride semiconductor in its proof-of-concept device, it claims that the use of gallium arsenide can increase the device's efficiency to 55–60 percent, nearly triple that of existing systems, and 12–17 percent more than existing 43 percent multi-junction solar cells.
- Space charge, work function — key physics concepts that influence thermionic emission.
- Hot cathode — article describing construction and behaviour of practical thermionic cathodes.
- Thermionic converter — a type of heat engine that directly produces electrical power via thermionic emission.
- Vacuum tube, X-ray tube, fluorescent lamp, cathode ray tube — vacuum electronic devices that typically use a thermionic cathode as an electron source.
- Thermoelectric effect — not to be confused with thermionic emission, thermoelectricity is the thermal generation of electric currents within solid conductors.
- Guthrie, Frederick (October 1873). "On a relation between heat and static electricity". The London, Edinburgh and Dublin Philosophical Magazine and Journal of Science. 4th 46: 257–266.
- Guthrie, Frederick (February 13, 1873). "On a new relation between heat and electricity". Proceedings of the Royal Society of London 21: 168–169.
- Richardson, O. W. (2003). Thermionic Emission from Hot Bodies. Wexford College Press. p. 196. ISBN 978-1-929148-10-3.
- Hittorf, W. (1869). "Ueber die Electricitätsleitung der Gase" [On electrical conduction of gases]. Annalen der Physik und Chemie. 2nd series (in German) 136 (1): 1–31.
- Hittorf, W. (1869). "Ueber die Electricitätsleitung der Gase" [On electrical conduction of gases]. Annalen der Physik und Chemie. 2nd series (in German) 136: 197–234.
- Hittorf, W. (1874). "Ueber die Electricitätsleitung der Gase" [On electrical conduction of gases]. Annalen der Physik und Chemie (in German). Jubalband (anniversary volume): 430–445.
- Hittorf, W. (1879). "Ueber die Electricitätsleitung der Gase" [On electrical conduction of gases]. Annalen der Physik und Chemie. 3rd series (in German) 7: 553–631.
- Hittorf, W. (1883). "Ueber die Electricitätsleitung der Gase" [On electrical conduction of gases]. Annalen der Physik und Chemie. 3rd series (in German) 20: 705–755.
- Hittorf, W. (1884). "Ueber die Electricitätsleitung der Gase" [On electrical conduction of gases]. Annalen der Physik und Chemie. 3rd series (in German) 21: 90–139.
- E. Goldstein (1885) "Ueber electrische Leitung in Vacuum" (On electric conduction in vacuum) Annalen der Physik und Chemie, 3rd series, 24 : 79-92.
- Elster and Geitel (1882) "Ueber die Electricität der Flamme" (On the electricity of flames), Annalen der Physik und Chemie, 3rd series, 16 : 193-222.
- Elster and Geitel (1883) "Ueber Electricitätserregung beim Contact von Gasen und glühenden Körpern" (On the generation of electricity by the contact of gases and incandescent bodies), Annalen der Physik und Chemie, 3rd series, 19 : 588-624.
- Elster and Geitel (1885) "Ueber die unipolare Leitung erhitzter Gase" (On the unipolar conductivity of heated gases") Annalen der Physik und Chemie, 3rd series, 26 : 1-9.
- Elster and Geitel (1887) "Ueber die Electrisirung der Gase durch glühende Körper" (On the electrification of gases by incandescent bodies") Annalen der Physik und Chemie, 3rd series, 31 : 109-127.
- Elster and Geitel (1889) "Ueber die Electricitätserregung beim Contact verdünnter Gase mit galvanisch glühenden Drähten" (On the generation of electricity by contact of rarefied gas with electrically heated wires) Annalen der Physik und Chemie, 3rd series, 37 : 315-329.
- US 307031, Edison, Thomas A., "Electrical indicator", published November 15, 1883, issued October 21, 1884
- Preece, William Henry (1885). "On a peculiar behaviour of glow lamps when raised to high incandescence". Proceedings of the Royal Society of London 38: 219–230. Preece coins the term the "Edison effect" on page 229.
- Josephson, M. (1959). Edison. McGraw-Hill. ISBN 0-07-033046-8.
- Provisional specification for a thermionic valve was lodged on November 16, 1904. In this document, Fleming coined the British term "valve" for what in North America is called a "vacuum tube": "The means I employ for this purpose consists in the insertion in the circuit of the alternating current of an appliance which permits only the passage of electric current in one direction and constitutes therefore an electrical valve."
- GB 190424850, Fleming, John Ambrose, "Improvements in instruments for detecting and measuring alternating electric currents", published August 15, 1905, issued September 21, 1905
- US 803684, Fleming, John Ambrose, "Instrument for converting alternating electric currents into continuous currents", published April 29, 1905, issued November 7, 1905
- O. W. Richardson (1901) "On the negative radiation from hot platinum," Philosophical of the Cambridge Philosophical Society, 11 : 286-295.
- Crowell, C. R. (1965). "The Richardson constant for thermionic emission in Schottky barrier diodes". Solid-State Electronics 8 (4): 395–399. Bibcode:1965SSEle...8..395C. doi:10.1016/0038-1101(65)90116-4.
- Kiziroglou, M. E.; Li, X.; Zhukov, A. A.; De Groot, P. A. J.; De Groot, C. H. (2008). "Thermionic field emission at electrodeposited Ni-Si Schottky barriers". Solid-State Electronics 52 (7): 1032–1038. Bibcode:2008SSEle..52.1032K. doi:10.1016/j.sse.2008.03.002.
- Orloff, J. (2008). "Schottky emission". Handbook of Charged Particle Optics (2nd ed.). CRC Press. pp. 5–6. ISBN 978-1-4200-4554-3.
- Murphy, E. L.; Good, G. H. (1956). "Thermionic Emission, Field Emission, and the Transition Region". Physical Review 102 (6): 1464–1473. Bibcode:1956PhRv..102.1464M. doi:10.1103/PhysRev.102.1464.
- Mal'Shukov, A. G.; Chao, K. A. (2001). "Opto-Thermionic Refrigeration in Semiconductor Heterostructures". Physical Review Letters 86 (24): 5570–5573. Bibcode:2001PhRvL..86.5570M. doi:10.1103/PhysRevLett.86.5570.
- Svensson, R.; Holmlid, L. (1992). "Very low work function surfaces from condensed excited states: Rydber matter of cesium". Surface Science. 269/270: 695–699. Bibcode:1992SurSc.269..695S. doi:10.1016/0039-6028(92)91335-9.
- Bergeron, L. (2 August 2010). "New solar energy conversion process discovered by Stanford engineers could revamp solar power production". Stanford Report. Retrieved 2010-08-04.
- Schwede, J. W.; et al. (2010). "Photon-enhanced thermionic emission for solar concentrator systems". Nature Materials 9 (9): 762. Bibcode:2010NatMa...9..762S. doi:10.1038/nmat2814.
- Green, M. A.; Emery, K.; Hishikawa, Y.; Warta, W. (2011). "Solar cell efficiency tables (version 37)". Progress in Photovoltaics: Research and Applications 19 (1): 84. doi:10.1002/pip.1088.
- How vacuum tubes really work with a section on thermionic emission, with equations, john-a-harper.com.
- Owen Richardson's Nobel lecture on thermionics, nobel.se, December 12, 1929. (PDF)
- Derivations of thermionic emission equations from an undergraduate lab, csbsju.edu. | <urn:uuid:7ca78cc1-9616-4601-b134-4941ff4a0cb6> | {
"date": "2014-07-13T20:59:45",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1404776438683.27/warc/CC-MAIN-20140707234038-00016-ip-10-180-212-248.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.8751515746116638,
"score": 3.671875,
"token_count": 4408,
"url": "http://en.wikipedia.org/wiki/Thermionics"
} |
05-07-2012, 01:18 AM
| || |
Originally Posted by ladayen
Since th leaves are out of the water there is little to no benefit to water quality from this plant. It is pretty much purely for aesthitic purposes.
Is this necessarily true? I mean, the roots are still taking in nutrients from the water/substrate. To my knowledge, non-rhizome plants don't actually take in nutrients through their leaves. That's why a nutrient-rich substrate can be important in planted tanks. So I would think it would still benefit water quality...at least as much as similar slow-growing plants.
Now, I'm assuming that we're talking about lucky bamboo (Dracaena sanderiana
) here and not actual
Last edited by kafkabeetle; 05-07-2012 at 01:20 AM.. | <urn:uuid:b1279649-ed88-4f99-bcc8-03c0b795d808> | {
"date": "2016-02-14T06:10:19",
"dump": "CC-MAIN-2016-07",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701169261.41/warc/CC-MAIN-20160205193929-00297-ip-10-236-182-209.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9607652425765991,
"score": 2.53125,
"token_count": 182,
"url": "http://www.tropicalfishkeeping.com/beginner-planted-aquarium/bamboo-stalks-tank-100704/"
} |
| ||Format||Pages||Price|| |
|6||$43.00|| ADD TO CART|
|Hardcopy (shipping and handling)||6||$43.00|| ADD TO CART|
Significance and Use
4.1 This test method is used to measure one-dimensional vertical flow of water through initially saturated TDAs under an applied hydraulic gradient. Hydraulic conductivity is required in various civil engineering applications of TDAs.
4.2 TDAs are to be tested at a unit weight and under an overburden pressure representative of field conditions. Data from the literature indicate a reduction in hydraulic conductivity with increasing vertical pressure (1).
4.3 Use of a dual-ring permeameter is included in this test method in addition to a single-ring permeameter. The dual-ring permeameter allows for minimizing potential adverse effects of sidewall leakage on measured hydraulic conductivity of the test specimens. The use of a bottom plate with an inner ring with a diameter smaller than the diameter of the permeameter and two outflow ports (one from the inner ring, one from the annular space between the inner ring and the permeameter) allows for separating the flow from the central part of the test specimen from the flow near the sidewall of the permeameter.
4.4 Darcy's law is assumed to be valid, flow is assumed to be laminar (Reynolds number less than approximately 2000–3000), and the hydraulic conductivity is assumed to be essentially independent of hydraulic gradient. The validity of Darcy's law may be evaluated by measuring the hydraulic conductivity of a specimen at three hydraulic gradients. The discharge velocity (v = k × i) is plotted against the applied hydraulic gradient. If the resulting relationship is linear and the measured hydraulic conductivity values are similar (i.e., within 25 %), then Darcy’s law may be taken as valid.
1.1 This test method covers laboratory measurement of the hydraulic conductivity (also referred to as coefficient of permeability) of water-saturated tired derived aggregates (TDA) obtained from scrap tires using a rigid-wall permeameter. The tire materials covered in this method include tire chips, tire shreds, and tire derived aggregate (TDA) as described in Practice D6270 with particle sizes ranging from approximately 12 to 305 mm. Whole scrap tires are not included in this standard. A clear trend between hydraulic conductivity and shred size has not been established at a given vertical pressure for shreds ≥50 mm (1).2
1.2 A single- or dual-ring permeameter may be used in the tests. A dual-ring permeameter may be preferred over a single-ring permeameter to take into account and prevent short-circuiting of permeant along the sidewalls of the permeameter. The effects of sidewall flow is more significant at high stresses and when the cell diameter is less than 6 times the particle size (1).
1.5 Test Method D2434 also can be used for determination of hydraulic conductivity of TDAs with sizes smaller than 19 mm under constant head conditions in a rigid-wall permeameter. Method D2434 includes the use of a permeameter with a single ring.
1.6 The standard units for the hydraulic conductivity values are the SI units, unless other units are specified. Hydraulic conductivity has traditionally been expressed in cm/s in the U.S., even though the official SI unit for hydraulic conductivity is m/s.
2. Referenced Documents (purchase separately) The documents listed below are referenced within the subject standard but are not provided as part of the standard.
D653 Terminology Relating to Soil, Rock, and Contained Fluids
D2434 Test Method for Permeability of Granular Soils (Constant Head)
D3740 Practice for Minimum Requirements for Agencies Engaged in Testing and/or Inspection of Soil and Rock as Used in Engineering Design and Construction
D4753 Guide for Evaluating, Selecting, and Specifying Balances and Standard Masses for Use in Soil, Rock, and Construction Materials Testing
D6026 Practice for Using Significant Digits in Geotechnical Data
D6270 Practice for Use of Scrap Tires in Civil Engineering Applications
ICS Number Code 83.160.01 (Tyres in general)
UNSPSC Code 25172500(Tires and tire tubes)
ASTM D7760-12, Standard Test Method for Measurement of Hydraulic Conductivity of Tire Derived Aggregates Using a Rigid Wall Permeameter, ASTM International, West Conshohocken, PA, 2012, www.astm.orgBack to Top | <urn:uuid:49a26cf7-ebd4-4e2f-9531-edb6a2d092d1> | {
"date": "2015-03-28T00:42:37",
"dump": "CC-MAIN-2015-14",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131297146.11/warc/CC-MAIN-20150323172137-00082-ip-10-168-14-71.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8827040791511536,
"score": 2.59375,
"token_count": 1001,
"url": "http://www.astm.org/Standards/D7760.htm"
} |
Researchers at Duke University and the National Institutes of Health have found a way to calm the fears of anxious mice with a drug that alters their brain chemistry. They’ve also found that human genetic differences related to the same brain chemistry influence how well people cope with fear and stress.
It’s an advance in understanding the brain’s fear circuitry that the research team says may hold particular promise for people at risk for anxiety disorders, including those suffering post-traumatic stress disorder (PTSD).
“What is most compelling is our ability to translate first from mice to human neurobiology and then all the way out to human behavior,” said Ahmad Hariri, a neurobiologist at the Duke Institute for Genome Sciences & Policy. “That kind of translation is going to define the future of psychiatry and neuroscience.”
The common thread in their studies is a gene encoding an enzyme called fatty acid amide hydrolase, or FAAH. The enzyme breaks down a natural endocannabinoid chemical in the brain that acts in essentially the same way that Cannabis, aka marijuana, does (hence the name endocannabinoid).
Earlier studies had suggested that blocking the FAAH enzyme could decrease fear and anxiety by increasing endocannabinoids. (That’s consistent with the decreased anxiety some experience after smoking marijuana.) In 2009, Hariri’s lab found that a common variant in the human FAAH gene leads to decreased enzyme function with affects on the brain’s circuitry for processing fear and anxiety.
In the new study, Andrew Holmes’ group at the National Institute on Alcoholism and Alcohol Abuse tested the effects of a drug that blocks FAAH activity in fear-prone mice that had also been trained to be fearful through experiences in which they were delivered foot shocks.
Tests for the ability of those mice to get over their bad experiences found that the drug allowed a faster recovery from fear thanks to higher brain endocannabinoid levels. More specifically, the researchers showed that those drug effects traced to the amygdala, a small area of the brain that serves as a critical hub for fear processing and learning.
To test for the human relevance of the findings, Hariri’s group went back to the genetic variant they had studied earlier in a group of middle-aged adults. They showed study participants a series of pictures depicting threatening faces while they monitored the activity of their amygdalas using functional magnetic resonance imaging (fMRI) scans. They then looked for how the genetic variant affected this activity.
While the activity of the amygdala in all participants decreased over repeated exposures to the pictures, people who carried the version of the FAAH gene associated with lower enzyme function and higher endocannabinoid levels showed a greater decrease in activity. Hariri says that suggests that those individuals may be better able to control and regulate their fear response.
Further confirmation came from an analysis led by Duke’s Avshalom Caspi and Terrie Moffitt of 1,000 individuals in the Dunedin Study (http://dunedinstudy.otago.ac.nz/), who have been under careful observation since their birth in the 1970s in New Zealand. Consistent with the mouse and brain imaging studies, those New Zealanders carrying the lower-expressing version of the FAAH gene were found to be more likely to keep their cool under stress.
“This study in mice reveals how a drug that boosts one of the brain’s naturally occurring endocannaboids enables fear extinction, a process that forms the basis of exposure therapy for PTSD,” Holmes said. “It also shows how human gene variation in the same chemical pathways modulates the amygdala’s processing of threats and predicts how well people cope with stress.”
Studies are now needed to further explore both the connections between FAAH variation and PTSD risk as well as the potential of FAAH inhibition as a novel therapy for fear-related disorders, the researchers say. | <urn:uuid:ef99b2f5-fe0e-431b-a265-ccc6973ee64f> | {
"date": "2019-02-18T23:43:08",
"dump": "CC-MAIN-2019-09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247488490.40/warc/CC-MAIN-20190218220415-20190219002415-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9500152468681335,
"score": 3.09375,
"token_count": 818,
"url": "https://scienceblog.com/54962/experimental-drug-helps-calm-fears/"
} |
Camassia scilloides (Raf.) Cory
Atlantic camas, Wild hyacinth
Liliaceae (Lily Family)
Synonym(s): Camassia esculenta, Quamasia hyacinthina
USDA Symbol: casc5
Grass-like leaves in a tight, basal clump surround a 1-2 ft. blossom stalk topped by lavender flowers in 5-7 in. spikes. A leafless stem with lavender to blue flowers in an elongated, loose-flowered cluster rising from an underground bulb. The sweet-scented flowers have six, petal-like segments and protruding, yellow stamens.
The bulbs of this plant were used by Native Americans and early explorers for food. The flower somewhat resembles the cultivated Easter Hyacinth, in the genus Hyacinthus. Grape Hyacinth (Muscari botryoides), which occasionally escapes from cultivation, has blue, ball-like flower clusters resembling bunches of grapes.
From the Image Gallery
Plant CharacteristicsDuration: Perennial
Leaf Complexity: Simple
Flower: Flowers in 7 inch spikes
Size Class: 0-1 ft.
Bloom InformationBloom Color: White , Blue , Purple
Bloom Time: Mar , Apr , May , Jun
DistributionUSA: AL , AR , DC , GA , IA , IL , IN , KS , KY , LA , MD , MI , MO , MS , NC , OH , OK , PA , SC , TN , TX , VA , WI , WV
Native Distribution: SC to e. TX, n. to w. PA, s. Ont., s. WI & e. KS
Native Habitat: Prairie, Plains, Meadows, Pastures, Savannahs, Woodlands edge, Opening, Open woodlands
Growing ConditionsWater Use: Medium
Light Requirement: Part Shade , Shade
Soil Moisture: Dry
Soil pH: Circumneutral (pH 6.8-7.2)
CaCO3 Tolerance: High
Soil Description: Moist, well-drained soils. Limestone-based, Sandy, Sandy Loam, Medium Loam, Clay Loam, Clay
Conditions Comments: Looks best in masses – at least three to a clump. Green in spring only – dormant the rest of the year.
BenefitUse Ornamental: Showy, Blooms ornamental, Shortgrass meadow, Perennial garden
Use Wildlife: Nectar-Bees, Nectar-Butterflies
Use Food: The bulbs of this plant were used by Native Americans and early explorers for food.
Conspicuous Flowers: yes
PropagationPropagation Material: Seeds
Description: Propagate by seed sown in fall or division of clumps. Remove offsets from larger bulbs and plant them separately. Do not plant small bulbs more than 2 in. deep.
Seed Collection: Not Available
Seed Treatment: Not Available
Commercially Avail: yes
Find Seed or Plants
Order seed of this species from Native American Seed and help support the Wildflower Center.
Find seed sources for this species at the Native Seed Network.
View propagation protocol from Native Plants Network.
National Wetland Indicator Status
From the National Suppliers DirectoryAccording to the inventory provided by Associate Suppliers, this plant is available at the following locations:
Edge of the Woods Native Plant Nursery - Orefield, PA
Sunshine Farm & Gardens - Renick, WV
American Native Nursery - Quakertown, PA
Prairie Nursery - Westfield, WI
From the National Organizations DirectoryAccording to the species list provided by Affiliate Organizations, this plant is on display at the following locations:
Lady Bird Johnson Wildflower Center - Austin, TX
Pineywoods Native Plant Center - Nacogdoches, TX
Native Seed Network - Corvallis, OR
Mt. Cuba Center - Hockessin, DE
BibliographyBibref 946 - Gardening with Prairie Plants: How to Create Beautiful Native Landscapes (2002) Wasowski, Sally
Bibref 318 - Native Texas Plants: Landscaping Region by Region (2002) Wasowski, S. & A. Wasowski
Bibref 291 - Texas Wildscapes: Gardening for Wildlife (1999) Damude, N. & K.C. Bender
* The Midwestern Native Garden: Native Alternatives to Nonnative Flowers and Plants An Illustrated Guide (2011) Adelman, Charlotte and Schwartz, Bernard L.
Bibref 328 - Wildflowers of Texas (2003) Ajilvsgi, Geyata.
Bibref 286 - Wildflowers of the Texas Hill Country (1989) Enquist, M.
Search More Titles in Bibliography
From the ArchiveWildflower Newsletter 1991 VOL. 8, NO.3 - Native Plants Provide a Wealth of Foods and Fibers, Letter from the President, A...
Additional resourcesUSDA: Find Camassia scilloides in USDA Plants
FNA: Find Camassia scilloides in the Flora of North America (if available)
Google: Search Google for Camassia scilloides
MetadataRecord Modified: 2014-07-29
Research By: TWC Staff | <urn:uuid:8a00a04f-78e7-47f4-aefa-b1f5586e66f9> | {
"date": "2015-03-30T23:23:24",
"dump": "CC-MAIN-2015-14",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131300031.56/warc/CC-MAIN-20150323172140-00234-ip-10-168-14-71.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.7473212480545044,
"score": 3.015625,
"token_count": 1117,
"url": "http://www.wildflower.org/plants/result.php?id_plant=casc5"
} |
How do you confuse a Canadian? Simple – use a word or phrase that they don’t know, or even one that they do know but in the wrong context or accent. Result: silent stare and you being ignored.
Want some tips on how to do this?
Go to the supermarket and ask where the trolleys are? Their open mouthed response might remind you that they are not picturing the cart that you wheel around (with the left front wheel that sticks) but a trolley bus taking tourists up and down the hills of San Francisco.
Or on your next trip to the swimming pool, tell your Canadian buddies you need to pick up your swimming costume. While you are thinking of your cute new bikini or board shorts, they are more likely to be wondering whether you are hoping to get a part in Bard on the Beach (Vancouver’s summer Shakespeare festival).
Want something easier? And sure to make you the laughing stock (especially recommended for high school students). Ask someone to pass you a rubber. You will do this only once and from then on you’ll wish you had an eraser to rub out your mistake.
OK that was a cheap shot. Some words mean different things. But why does using “car park” confuse a Canadian, especially when you are trying to find somewhere to park? Can they not work out that a car park is somewhere you park a car and has nothing to do with the provincial park? I managed to work out that they meant by parking lot and even parkade. It seems that Canadians struggle with generalising.
Sometimes a British accent is an advantage. It still has associations with being posh (not the spice girl variety) and so we often hear British accents in the voice overs in adverts (commercials). But when you say “toe ma toe” and they say “toe may toe”, you may well be treated to silence or “eh?” Come to think of it maybe that’s where the Canadian love of ending sentences with “eh” comes from. | <urn:uuid:212c90ff-3f9d-4ca7-a409-5dba5f416ef2> | {
"date": "2017-10-21T13:53:55",
"dump": "CC-MAIN-2017-43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824819.92/warc/CC-MAIN-20171021133807-20171021153807-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9604451060295105,
"score": 2.5625,
"token_count": 431,
"url": "http://www.relocation2bc.com/blog/2008/07/confuse-a-canadian/?shared=email&msg=fail"
} |
Originally written by Tarus Balog [email protected]. This page based on v1.0.2 from August 2002.
This How-To is one in a series designed to serve as a reference for getting started with OpenNMS. Eventually, these documents will cover everything necessary to get OpenNMS installed and running in your environment.
Content is available under a Creative Commons Attribution-NonCommercial-ShareAlike2.5 License.
Corrections and Omissions
Please submit any corrections and omissions to the author.
OpenNMS is an enterprise-grade network management platform developed under the open-source model. Unlike traditional network management products which are very focused on network elements such as interfaces on switches and routers, OpenNMS focuses on the services network resources provide: web pages, database access, DNS, DHCP, etc. (although information on network elements is also available).
There are two major ways that OpenNMS gathers data about the network. The first is through polling. Processes called monitors connect to a network resource and perform a simple test to see if the resource is responding correctly. If not, events are generated. The second is through data collection using collectors. Currently, the only collector is for SNMP data, and it will be covered in another How-To.
The basic idea behind the poller starts with grouping network devices into packages. Each package will consist of various services and how they are to be polled (i.e. frequency). In addition, should an outage be detected, each package can have its own downtime model which controls how the poller will dynamically adjust its polling on services that are down. Finally, each package has an outage calendar that schedules times when the poller is not to poll (i.e. scheduled downtime).
The poller will only operate on interfaces and services that have been previously discovered by capsd (see the Discovery How-To for information on configuring that process).
The Poller Configuration File Header
Polling in OpenNMS is controlled by the poller-configuration.xml file.
Let's look at that file:
<poller-configuration threads="30" serviceUnresponsiveEnabled="false" pathOutageEnabled="false"> <node-outage status="on" pollAllIfNoCriticalServiceDefined="true"> <critical-service name="ICMP"/> </node-outage>
There are three basic behaviors that are configured in the header of this file:
- poller-configuration threads
- This determines the maximum number of threads that will be used for polling, and can be adjusted up or down depending on the size of your network and the power of your server. (See Performance tuning#Poller threads.)
- A poll consists of a connection to a particular port on a remote interface, and then a test to see if the service on that port returns an expected response. If the response is not received within the timeout, the service is considered down. In some networks, however, short, intermittent failures are common. This will result in what is known as a "30 second outage". Due to the default downtime model, a failed service will be polled again in 30 seconds. Note that this is a real problem: a user attempting to access that resource would also have experienced a timeout. But in some networks these 30 second outages can be annoying yet hard to correct. So the option was added to denote a failure as when the port connection fails and not the response. In this case, an unresponsive service does not generate an outage, but only a "service unresponsive" event. To enable this behavior, set this value to "true".
- The basic event that is generated when a poll fails is called "NodeLostService". If more than one service is lost, multiple NodeLostService events will be generated. If all the services on an interface are down, instead of a NodeLostService event, an "InterfaceDown" event will be generated. If all the interfaces on a node are down, the node itself can be considered down, and this section of the configuration file controls the poller behavior should that occur. If a "NodeDown" event occurs and
node-outage status="on"then all of the InterfaceDown and NodeLostService events will be suppressed and only a NodeDown event will be generated. Instead of attempting to poll all the services on the down node, the poller will attempt to poll only the
critical-service, by default ICMP. Once the critical service returns, the poller will then resume polling the other services. If the critical service is not available on a node, the
pollAllIfNoCriticalServiceDefinedparameter controls the behavior. If set to "true" then all services will be polled. If set to "false" then the first service in the package that exists on the node will be polled until service is restored, and then polling will resume for all services.
It is also here that you can activate the "path outage" functionnality, with the pathOutageEnabled parameter (see also Path Outage configuration). The path outage functionnality is disabled be default.
Note that any changes to this file will not take affect until OpenNMS is restarted (note 2011/11/25: Apparently, this is not the case anymore as of OpenNMS 1.6. to be confirmed).
The full XML schema specification of this file can be found here.
A poller package consists of a name, a group of interfaces to poll, and the services to be polled on those interfaces. Multiple packages can be configured, and an interface can exist in more than one package (although the value of that is questionable). This gives great flexibility to how the service levels will be determined for a given device.
For example, you could build packages based upon different polling rates, say, "gold", "silver" and "bronze". In the gold package, services would be polled every minute, the silver package every five minutes and the bronze package every fifteen. Or, you could build different poller packages based upon levels of monitoring. A "basic" package may just poll ICMP and HTTP, whereas a "deluxe" package would include databases, etc..
In addition to a list of services, each package can have a "downtime" model and an "outage calendar", both discussed below.
The definition of a package starts with a
This is followed by a list of tags that define what interfaces will be included in the package. There are five of these tags:
IPADDR IPLIKE *.*.*.*
Each package must have a filter tag that performs the initial test to see if an interface should be included in a package. Filters operate on interfaces (not nodes) and are discussed on the filters page. Only one
filter statement can exist per package.
This specifies a particular IP address to include in a package.
<include-range begin="192.168.0.1" end="192.168.0.254"/>
This specifies a particular range of IP addresses to include in a package.
<exclude-range begin="192.168.0.100" end="192.168.0.104"/>
This specifies a particular range of IP addresses to exclude in a package. This will override an
This tag will point to a file that consists of a list of IP addresses, one to a line, that will be included in the package. Comments can be imbedded in this file. Any line that begins with a "#" character will be ignored, as will the remainder of any line that includes a space followed by "#".
All of the above tags, except for filter, are optional and unbounded.
Once the IP addresses to include in a package are defined, the services to be polled are listed. For example:
<service name="DNS" interval="300000" user-defined="false" status="on"> <parameter key="retry" value="3"/> <parameter key="timeout" value="5000"/> <parameter key="port" value="53"/> <parameter key="lookup" value="localhost"/> </service>
The common parameters for the poller service are as follows:
- The number of attempts that will be made to connect to the service. Default is
- The amount of time, in milliseconds, that OpenNMS will wait for a response from the service. Default is
This will poll the DNS service once every five minutes (300,000 ms). The rest of the block is similar to the corresponding block in the capsd configuration. Since users can define new services to be polled, the
user-defined attribute indicates this for a particular service. Polling can also be universally stopped for a particular service, indicated by the
status tag. Note that the service as defined in the poller can be different from the one defined in capsd. You may want a longer timeout during discovery, for example. Also, in this example, a DNS request will be made to look up "localhost". This should return an error (as localhost is usually not listed in a DNS) but if that error is returned, DNS is functioning properly and the test passes. Microsoft's implementation of DNS, however, sometimes has problems with this, so you may want to put a real host for the lookup value (and in capsd as well).
There must be at least one service defined per package.
In order to keep servers operating properly, it is often necessary to bring them down for scheduled maintenance. Instead of having these maintenance outages reflected as a true service outage, they can be included in a Scheduled Outage and then referenced by the poller package using the
outage-calendar tag. This tag contains the name of a valid outage in the
outage-calendar tag is optional and unbounded (i.e. you can reference more than one outage).
Since version 1.5.91 you can configure scheduled outages from the GUI, got to Admin -> Scheduled Outages. Note that scheduled outages may be edited fully from the web UI; it's no longer necessary to edit the poller configuration manually to associate a scheduled outage with a poller package, although it's still possible.
Before version 1.5.91, there were three types of scheduled outages: weekly, monthly and specific. Since 1.5.91 there is also the possibility to configure daily scheduled outages.
If you have the problem that nodes are reported to be down although they are within a daily outage which goes past midnight, try to define two timespans within the outage, one until midnight and the other one starting after midnight, e.g. instead of outage 22:00:00-01:00:00 define 22:00:00-23:59:59 and 00:00:00-01:00:00.
Examples from the
<outage name="global" type="weekly"> <time day="sunday" begins="12:30:00" ends="12:45:00"/> <time day="sunday" begins="13:30:00" ends="14:45:00"/> <time day="monday" begins="13:30:00" ends="14:45:00"/> <time day="tuesday" begins="13:00:00" ends="14:45:00"/> <interface address="192.168.0.1"/> <interface address="192.168.0.36"/> <interface address="192.168.0.38"/> </outage>
This defines an outage calendar called "global" that is run every week. It specifies four outage times: Sunday starting at 12:30 pm and lasting 15 minutes, Sunday starting at 1:30 pm and lasting an hour and fifteen minutes, the same outage on Monday, and one on Tuesday from 1:00 pm to 2:45 pm. This is to demonstrate that you can have multiple outages on a given day and the same outage on different days. Three interfaces will be affected.
<outage name="hub maintenance" type="monthly"> <time day="1" begins="23:30:00" ends="23:45:00"/> <time day="15" begins="21:30:00" ends="21:45:00"/> <time day="15" begins="23:30:00" ends="23:45:00"/> <interface address="192.168.100.254"/> <interface address="192.168.101.254"/> <interface address="192.168.102.254"/> <interface address="192.168.103.254"/> <interface address="192.168.104.254"/> <interface address="192.168.105.254"/> <interface address="192.168.106.254"/> <interface address="192.168.107.254"/> </outage>
This outage calendar is called "hub maintenance" that is run every month. On the first of the month the outage begins at 11:30 pm and lasts 15 minutes. The same outage occurs on the 15th of the month in addition to another outage from 9:30 pm to 9:45 pm. Thus you can have the same outage on different dates as well as more than one outage on a particular date. Eight interfaces are affected by this outage.
<outage name="proxy server tuning" type="specific"> <time begins="10-Nov-2001 17:30:00" ends="11-Nov-2001 08:00:00"/> <interface address="192.168.0.1"/> </outage>
It is also possible to include an outage on a specific date and time. This outage named "proxy server tuning" began on November 10th, 2001 at 5:30 pm and lasted until 8:00 am the next day. This affected one interface. You can have more than one "time" entry per specific outage.
If a particular outage calendar is included in a poller package, then polling will not occur during this time. Note that this does not mean that the service will be considered "up" during this time. If the maintenance is started a minute too soon and an outage is detected, then no poll will be made to restore the service until after the outage window has closed.
One of the most powerful features of the OpenNMS poller is its downtime models. The goal of the poller is to verify service levels, and everyone involved would like to see those be as high as possible. By default, the poller will poll every five minutes. If that polling rate was static, then the shortest an outage could be would be five minutes: one poll to note the outage and the next to note it was restored. In these days of service levels in the "99.99%" range, a five minute outage can be devastating. You might as well guarantee "100%" availability since any outage will break your service level agreement.
To help combat this, OpenNMS uses adaptive polling. Once an outage is detected, polling is temporarily increased to try and detect, as soon as possible, when the service is restored.
<downtime interval="30000" begin="0" end="300000"/> <!-- 30s, 0, 5m --> <downtime interval="300000" begin="300000" end="43200000"/> <!-- 5m, 5m, 12h --> <downtime interval="600000" begin="43200000" end="432000000"/> <!-- 10m, 12h, 5d --> <downtime begin="432000000" delete="true"/> <!-- anything after 5 days delete -->
What this downtime model will do is the following: from the moment the outage begins (time 0) until five minutes later (time 300,000 ms), the poller will poll every 30 seconds (30,000 ms). After five minutes, it is assumed that any service level that would be greatly affected by a five minute outage has been broken, so from five minutes (300,000 ms) into the outage until the first 12 hours of the outage (43,200,000 ms) polling resumes its five minute (300,000 ms) interval.
If the outage is older than 12 hours, it must not be important and/or it is difficult to fix, so from when the outage is 12 hours old until it is 5 days (432,000,000 ms) old, the interval is reduced to poll once every ten minutes (600,000 ms).
If a service has been down for longer than five days, it is deleted (well, marked as "forced unmanaged") and no longer polled. Note that this is optional, you can continue to poll a down service for as long as you would like. For the last downtime interval in the model, just leave the "end" time off in order to extend polling indefinitely.
For each service in a poller package, there must be a corresponding monitor. In the capsd configuration, this was included on the service line itself, but since there is the potential for a particular service to exist many times in the poller configuration file, this bit of bookkeeping was put, once, at the end of the file.
<monitor service="DominoIIOP" class-name="org.opennms.netmgt.poller.DominoIIOPMonitor"/> <monitor service="ICMP" class-name="org.opennms.netmgt.poller.IcmpMonitor"/> <monitor service="Citrix" class-name="org.opennms.netmgt.poller.CitrixMonitor"/> <monitor service="LDAP" class-name="org.opennms.netmgt.poller.LdapMonitor"/> <monitor service="HTTP" class-name="org.opennms.netmgt.poller.HttpMonitor"/> <monitor service="HTTP-8080" class-name="org.opennms.netmgt.poller.HttpMonitor"/> <monitor service="HTTP-8000" class-name="org.opennms.netmgt.poller.HttpMonitor"/> <monitor service="HTTPS" class-name="org.opennms.netmgt.poller.HttpsMonitor"/> <monitor service="SMTP" class-name="org.opennms.netmgt.poller.SmtpMonitor"/> <monitor service="DHCP" class-name="org.opennms.netmgt.poller.DhcpMonitor"/> <monitor service="DNS" class-name="org.opennms.netmgt.poller.DnsMonitor" /> <monitor service="FTP" class-name="org.opennms.netmgt.poller.FtpMonitor"/> <monitor service="SNMP" class-name="org.opennms.netmgt.poller.SnmpMonitor"/> <monitor service="Oracle" class-name="org.opennms.netmgt.poller.TcpMonitor"/> <monitor service="Postgres" class-name="org.opennms.netmgt.poller.TcpMonitor"/> <monitor service="MySQL" class-name="org.opennms.netmgt.poller.TcpMonitor"/> <monitor service="Sybase" class-name="org.opennms.netmgt.poller.TcpMonitor"/> <monitor service="Informix" class-name="org.opennms.netmgt.poller.TcpMonitor"/> <monitor service="SQLServer" class-name="org.opennms.netmgt.poller.TcpMonitor"/> <monitor service="SSH" class-name="org.opennms.netmgt.poller.TcpMonitor"/> <monitor service="IMAP" class-name="org.opennms.netmgt.poller.ImapMonitor"/> <monitor service="POP3" class-name="org.opennms.netmgt.poller.Pop3Monitor"/>
You should not need to modify this section unless you manually add your own pollers.
Documentation for Specific Pollers
Some documentation has been written for:
It is hoped that this How-To has proved useful. Please direct corrections and comments to the author. | <urn:uuid:784beba4-b8fe-4d17-8247-079025306ea2> | {
"date": "2014-10-31T22:01:39",
"dump": "CC-MAIN-2014-42",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414637900397.29/warc/CC-MAIN-20141030025820-00019-ip-10-16-133-185.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8665663003921509,
"score": 2.8125,
"token_count": 4271,
"url": "http://www.opennms.org/w/index.php?title=Polling_Configuration_How-To&oldid=12548"
} |
What is the CNN Effect?
The CNN effect is a theory that 24-hour news networks, such as CNN, influence the general political and economic climate. Because media outlets provide ongoing coverage of a particular event or subject matter, the attention of viewers is narrowly focused for potentially prolonged periods of time. This increased attention can affect the market values of companies and sectors that find themselves in focus.
- The CNN effect observed that real-time coverage of breaking news and world events prompts a stronger reaction from investors and consumers than would have happened otherwise.
- The CNN effect can be seen to cause overreactions in the market, but the same constant supply of information has also helped the markets in many ways.
- The CNN effect is a specific instance of a media effect and the cable news channel it is named for has since been eclipsed by the Internet and social media as the key source for real-time information.
Understanding the CNN Effect
The CNN effect can cause individuals and organizations to react more aggressively towards the subject matter being examined. For example, regular coverage of turmoil in the banking sector may result in investors withdrawing from bank stocks or even moving their deposits out of banks being mentioned. This in turn would heighten the turmoil, perhaps feeding into the news cycle again and potentially triggering a wider financial crisis.
The effect that media outlets have on consumer and investor behavior has been examined since the CNN effect came to prominence during the 1980s. For example, by focusing on natural disasters, news outlets may influence consumers and investors to react more drastically to what is unfolding. This can manifest as a rush for basic supplies in the region affected and a market sell-off of stocks that have exposure to that region and its infrastructure. While this can be viewed as a criticism, media outlets also shed light on the inner workings of governments and businesses, which may increase accountability.
The CNN Effect Post-Television
The CNN effect is really about the speed at which cable news was able to spread information and how that news seemingly made events far away matter to people that otherwise would not have noticed. Well-informed people prior to cable news would still experience a delay in information as a news story from Asia, for example, took time to appear in the newspaper. This information lag actually helped to prevent stock panics based on international events as there was every reason to believe that the situation had changed since the column was written.
Cable news came along and offered near real-time footage and further compounded this rapid reporting with a large dose of sensationalism. Now a typhoon in Asia could be seen making landfall and North America would react more rapidly to the fears of floods or the perceived severity of power outages and the impact on companies in the region.
However, as fast as cable news is, it has been overtaken by social media. Now cable news channels spend time monitoring the same social media channels that regular people follow because there is a torrent of real-time data from all over the world. The CNN effect—the theory that real-time information and prolonged focus on a particular event has a market impact—is still valid, but it may now be accurate to rename it the Twitter effect, rather than tying it back to a cable news channel. Increasingly, we are in a world of cord-cutters, so cable news is far from the dominant medium. | <urn:uuid:6a3d5019-057f-4adc-9407-eb5e9176abf2> | {
"date": "2019-10-13T21:03:20",
"dump": "CC-MAIN-2019-43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986647517.11/warc/CC-MAIN-20191013195541-20191013222541-00056.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9709909558296204,
"score": 3.515625,
"token_count": 678,
"url": "https://www.investopedia.com/terms/c/cnneffect.asp"
} |
Synergistic impact of water level fluctuation and invasion of Glyceria on Typha in a freshwater marsh of Lake Ontario
(2006) 84: 63-69
The effects of multiple stressors on the native Typha marsh community (mainly Typha latifolia) were examined using historical records of water levels, human census population, and field vegetation maps. Percent cover of the major plant species was estimated in a GIS, and the percent cover of Typha was related to changes in water level, human population growth, and percent cover of exotic Glyceria maxima and invasive Phragmites australis. Water level fluctuation was the major natural disturbance and it alone accounted for 88% of the variation in Typha. After partitioning out the effect of water level, both human population growth and the presence of exotic species were still significantly related to the decline of native Typha. We suggest that multiple stressors interact with each other to influence changes in native Typha community and cause greater detrimental impact. An important implication of our results is that projected water level decline due to climate change may not necessarily favor the restoration of a desirable native marsh because of the presence of other disturbances such as exotic and invasive species and altered nutrient regime. | <urn:uuid:a8ba3f1c-d6aa-4d8a-b021-b6f55f57aa74> | {
"date": "2018-07-16T01:05:25",
"dump": "CC-MAIN-2018-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589029.26/warc/CC-MAIN-20180716002413-20180716022413-00136.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9425298571586609,
"score": 2.578125,
"token_count": 252,
"url": "http://greatlakeswetlands.ca/publications/synergistic-impact-of-water-level-fluctuation-and-invasion-of-glyceria-on-typha-in-a-freshwater-marsh-of-lake-ontario/"
} |
Children who have never had chicken pox can be vaccinated at 12 months and 4 to 6 years of age. Adolescents and adults who have never had chickenpox can also get the vaccine. The vaccine has proven very effective in preventing severe chickenpox. The CDC Advisory Committee on Immunization Practices, the American Academy of Pediatrics, and the American Academy of Family Physicians recommend that all children be vaccinated for chickenpox.
Many states now require vaccination prior to entry into preschool or public schools.
Chickenpox is a highly contagious disease that usually occurs during childhood. By adulthood, more than 90 percent of Americans have had chickenpox.
The disease is caused by the varicella-zoster virus (VZV). Transmission occurs from person-to-person by direct contact or through the air by coughing or sneezing.
Until 1995, chickenpox infection was a common occurrence, and almost everyone had been infected by the time he or she reached adulthood. However, the introduction of the chickenpox vaccine in 1995 has caused a decline in the incidence of chickenpox in all ages, particularly in ages one through four years. The varicella vaccine can help prevent this disease, and two doses of the vaccine are recommended for children, adolescents, and adults.
Symptoms are usually mild among children, but may be life-threatening to adults and people of any age with impaired immune systems. The following are the most common symptoms of chickenpox. However, each individual may experience symptoms differently. Symptoms may include:
The initial symptoms of chickenpox may resemble other infections. Once the skin rash and blisters occur, it is usually obvious to a doctor that this is a case of chickenpox. If a person who has been vaccinated against the disease is exposed, then he may get a milder illness with a less severe rash and mild or no fever. Always consult your doctor for diagnosis.
Chickenpox is spread by exposure to the saliva or other respiratory secretions of an infected person. It can also be spread by being exposed to the fluid from the blistering rash. Once exposed, the incubation period is typically 14 to 16 days, but it may take as few as 10 and as many as 21 days for the chickenpox to develop. Chickenpox is contagious for one to two days before the appearance of the rash and until the blisters have all dried and become scabs. The blisters usually dry and become scabs within four to five days of the onset of the rash. Children should stay home and away from other children until all of the blisters have scabbed over.
Family members who have never had chickenpox have a 90 percent chance of becoming infected when another family member in the household is infected.
The rash of chickenpox is unique and therefore the diagnosis can usually be made on the appearance of the rash and a history of exposure.
Specific treatment for chickenpox will be determined by your doctor based on:
Treatment for chickenpox may include:
Children should not scratch the blisters because it could lead to secondary bacterial infections. Keep fingernails short to decrease the likelihood of scratching.
Most people who have had chickenpox will be immune to the disease for the rest of their lives. However, the virus remains dormant in nerve tissue and may reactivate, resulting in herpes zoster (shingles) later in life. Very rarely a second case of chickenpox does occur. Blood tests can confirm immunity to chickenpox in people who are unsure if they have had the disease.
Complications can occur from chickenpox. Those most susceptible to severe cases of chickenpox are adults and people with impaired immune systems. Complications may include:
Click here to view the
Online Resources of Infectious Diseases | <urn:uuid:8c3115c2-faee-48f1-9054-38a507d236ee> | {
"date": "2015-03-28T18:59:39",
"dump": "CC-MAIN-2015-14",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131297689.58/warc/CC-MAIN-20150323172137-00162-ip-10-168-14-71.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9693484902381897,
"score": 4.15625,
"token_count": 757,
"url": "http://www.nyhq.org/diw/Content.asp?PageID=DIW000619&More=WTN"
} |
Tablature (or Tabulature), tab or tabs is a form of musical notation, which tells players where to place their fingers on a particular instrument rather than which pitches to play.
The first known existence in Europe is around 1300. In Asia there exist much older tablature notation
Guitar tabs consists of a series of horizontal lines forming a staff (or stave) similar to standard notation. Each line represents one of the instrument’s strings therefore standard guitar tab has a six-line staff and bass guitar tab has four lines. The top line of the tablature represents the highest pitched string of the guitar. By writing tablature with the lowest pitched notes on the bottom line and the highest pitched notes on the top line of the tablature follows the same basic structure and layout of Western Standard Notation.
Learning how to play the guitar and read guitar tabs is something that will not take up a lot of your time. It can be a great tool if you are just learning to play.
If you don’t have the time or patience to learn to read standard notation, which can take years of practice……or if you don’t have a teacher to take guitar lessons from, then you will find this a quick way to learn to play the guitar.
Guitar Players Center will make learning how to read guitar tabs easy to understand.
Tablature can not convey precise information about timing and duration. The system counts on you to listen to the piece of music so that you are familiar with the rhythmic structure of the piece and the timing of the individual notes.
Standard music notation can take years to learn in entirety. In most cases a teacher most likely would show you how to read the notation, not necessarily understand the theory behind it. What I mean to say is, for instance, a person may be able to actually learn to read Chinese, but that doesn’t mean you understand what your saying. Standard music notation is a universal language that all musicians from anywhere in the world would understand. The best thing about reading standard music notation is that you don’t need to listen to the piece of music before you play it.
For rock, blues and most everything else, most of the lesson sites have excellent tab written by people who are professional music trans-posers and well known musicians, which, needless to say is the best way to go as far as accuracy issues go.
Visit JamPlay. For Guitar Players at any level. Fortunately you can buy tab from them and buy video guitar lessons too. As I mentioned earlier the tabs presented are transposed by well educated and well known musicians and are accurate to a tee.
GPC is A Site Committed to Distinguishing Itself from the Pack by providing our readers with real world unbiased, no holds barred guitar lessons and guitar tabs. For more information about Online Guitar Lessons and basic guitar tabs, feel free to read more of our articles. | <urn:uuid:48a88ed7-7797-41fc-ba47-334e8898a41a> | {
"date": "2017-01-21T10:42:25",
"dump": "CC-MAIN-2017-04",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281069.89/warc/CC-MAIN-20170116095121-00110-ip-10-171-10-70.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9595337510108948,
"score": 3.34375,
"token_count": 602,
"url": "http://guitarplayerscenter.com/guitar-tab/what-is-guitar-tablature-tabs-tab-and-how-to-read-it/"
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.