text
stringlengths 277
230k
| id
stringlengths 47
47
| metadata
dict |
---|---|---|
Shrine of Our Lady of Madhu
The Shrine of Our Lady of Madhu is considered the holiest Catholic shrine in Sri Lanka, possessing a history that goes back for more than 400 years. Situated in the Mannar district, this Roman Catholic shrine to the Virgin Mary is a major centre of worship and pilgrimage for the country’s Tamil and Sinhalese Catholic population. The image of Our Lady of Madhu was granted a canonical coronation by Pope Pius XI in 1924.
Story Behind the Sacred Shrine
After the Dutch invasion of Sri Lanka, the persecution of the Catholic Church in 1670 forced a number of Catholic families to flee from their homes in the coastal town of Manthai; despite their haste to escape, they carried the statue of Mary from their local church with them. Meanwhile, around 700 Catholics migrated south from Jaffna into the Vanni forests. The two communities came across each other in Madhu, where they decided to build a new shrine using the statue of Mary that the Catholic families had rescued.
Once the persecution of the Catholics had ended, the small community at Madhu discovered that their shrine was attracting pilgrims from all around the island. The church that stands with the shrine today was built in 1872, to include a spacious presbytery, a chapel of the Blessed Sacrament, and a grotto of Our Lady of Lourdes. | <urn:uuid:7bada09a-0b88-4cbf-a09c-f3b0e1c6e83b> | {
"dump": "CC-MAIN-2022-49",
"url": "https://www.lovesrilanka.org/shrine-of-our-lady-of-madhu/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710662.60/warc/CC-MAIN-20221128203656-20221128233656-00125.warc.gz",
"language": "en",
"language_score": 0.9737662076950073,
"token_count": 286,
"score": 2.875,
"int_score": 3
} |
Duke University, at Durham, N. C.; coeducational; opened 1838, chartered 1841 as Union Institute in Randolph County. Reorganized 1852 as Normal College, it became Trinity College (Methodist) in 1859 and moved to Durham in 1892. It was renamed in 1924 for James B. Duke, who gave it financial assistance. One of the most selective institutions in the country, Duke offers its 11,000 students a wide range of programs including business, engineering, law, and medicine. It is especially well known for literary studies. Research facilities include the Duke Marine Laboratory, the North Carolina Supercomputing Center (affiliated), the Primate Center, and the Institute of the Arts.
The Columbia Electronic Encyclopedia, 6th ed. Copyright © 2012, Columbia University Press. All rights reserved.
More on Duke University from Fact Monster:
See more Encyclopedia articles on: Colleges, U.S. | <urn:uuid:7beefb6b-e942-4280-938d-a32ab5f9f1fd> | {
"dump": "CC-MAIN-2015-11",
"url": "http://www.factmonster.com/encyclopedia/society/duke-university.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462982.10/warc/CC-MAIN-20150226074102-00101-ip-10-28-5-156.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9491743445396423,
"token_count": 189,
"score": 2.515625,
"int_score": 3
} |
Performing or speaking in front of large crowds can be extremely terrifying. We call this feeling “stage fright.” Even though it might sound insignificant, the idea has interested many people inspiring them to think about the reasons why it happens and how we can possibly prevent it from taking over our brains.
In a TEDEd video by Mikael Cho titled The science of stage fright (and how to overcome it), Cho describes public speaking as: “A fate some deem worse than death.”
As explained in the video, the fight or flight response is a major factor of the anxiety that hits a person as soon as they walk on stage. This is usually seen in animals when they are approached by something intimidating. When a person is up in front of a crowd, that response is telling him or her to either deal with it and make it through or to run for his or her life.
The video goes on to explain that when a person’s body experiences stage fright, their hypothalamus triggers their pituitary gland to emit the hormone ACTH (Adrenocorticotropic hormone), making their adrenal glands launch adrenaline to their blood. Then, their back and shoulders will tense up, and their arms and legs start to shake. It is common to start sweating and blood pressure will rise. The digestive system shuts down so that they are getting a necessary amount of nutrients and oxygen to muscles and fundamental organs. The pupils dilate and it is difficult to see anything close, like notes. However, it is very easy to see far away, forcing the person on stage to look straight at the terrifying crowd in front of you.
What we are trying to understand is how to get rid of this phenomenon. The fundamental steps for getting over stage fright are perspective and practice. First, remember that this is not all in your head. It is a completely normal, hormonal, full-body response. Also, genetics can be a huge factor in social anxiety. Keep in mind that this is natural, so focus on what you can control. This is when practice comes into play. It is important to practice in a similar environment to where the performance will be because it will make it a more comfortable and normal-feeling situation.
“I get stage fright as a dancer,” said freshman Maya Garard. “All I do is just focus on having fun and enjoying the moment.”
Knowing the reasons for this overwhelming anxiety should help with performing in the future because it will be easier to trick the brain into thinking it is not as bad. Putting your arms behind your head and taking a deep breath is a good thing to do before going on stage. Ultimately, there is no way to overcome stage fright, only ways to adapt to it. | <urn:uuid:f93f753a-c83c-4a34-9a62-b80b3566965c> | {
"dump": "CC-MAIN-2017-34",
"url": "https://thekingspage.com/2016/09/27/how-to-handle-stage-fright/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886108268.39/warc/CC-MAIN-20170821114342-20170821134342-00412.warc.gz",
"language": "en",
"language_score": 0.9675357341766357,
"token_count": 564,
"score": 3.25,
"int_score": 3
} |
2.947 civil servants will be elected next year in Costa Rica, during the upcoming municipal elections. But, are the citizens aware of what’s going on in every district? Do they know the main issues their district is facing or the way the budget been spent?
To answer these questions Abriendo Datos Costa Rica, School of Data and Social Tic organized a Data Expedition in Costa Rica. As a result 57 people from civil society (journalists, analysts, programers, designers,…) worked in teams during eight hours with the data.
The database that was used in the expedition can be accessed here. We built it with data from the Supreme Electoral Tribunal, the National Institute of Statistics and the General Contoller of Finances.
What did the participants find?
The participants worked in ten different groups and each one tried to answer one specific question. This were some of the findings:
- One of the teams thought as an exercise: If we were to allocate money to elderly population in poverty, in which districts we would invest it? Analyzing the data, they concluded that in 17% of the districts a tenth of the population was elderly people in poverty. This was a good example of how to use data to make informed decisions.
- Another group asked: Which are the best districts to live in if you are a woman? The participants classified the districts according to their gender gap index and found that the ones with more gender inequality had a female occupation rate two times lower that the districts with less gender inequality.
- One team found that the district with more electoral participation in local elections had one of the worst budget spending. Why isn’t the local government spending on its population?
- Some other teams analyzed the districts with more disabled people or with more usage of technology.
During the activity the team of facilitators tried to explain the difference between correlation and causation, which was one of the most common mistakes the attendants were making when analyzing the data.
For this training we provided a database ready to use to the participants. But in the future it might be interesting to show them where where can they find public databases and more datasets to enrich their analysis.
Overall the best part of the experience was to see so many people interested in learning about how to use data, working in teams and answering questions that affect their daily lives. As Julio Cortés, one of the participants, said, the idea behind these activities is to help building a more informed society. So, we’ll definitely be planning new activities in the next months to encourage the usage of open data!
More pictures of the event here. | <urn:uuid:e2524055-7dbb-4c5e-a380-677c9dfafcbd> | {
"dump": "CC-MAIN-2017-39",
"url": "http://opendata-aha.net/analyzing-regional-data-data-expedition-in-costa-rica/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818687740.4/warc/CC-MAIN-20170921101029-20170921121029-00361.warc.gz",
"language": "en",
"language_score": 0.9650173783302307,
"token_count": 536,
"score": 2.796875,
"int_score": 3
} |
Bacterial artificial chromosomes (BACs) can handle propagating huge fragments of DNA and also have become a great tool for learning genome biology. based on Regier and and stay premier hereditary systems for research in many areas of biology, our preliminary reliance upon both of these microorganisms may have biased a few of our sights of pet evolution and advancement. For example, the genomes of and so are uncommon for the reason that these are fairly little relatively, which contributed to your choice to sequence their genomes undoubtedly. However, many reports suggest that both of these species may not be representative of usual extant bilaterians. For example, genes certainly are a family of extremely conserved cell-cell signaling substances whose founding member will there be are seven (7), and within are five (5) family . On the other hand, the individual genome contains nineteen (19) genes, which initially might suggest an expansion of the grouped family in the vertebrate lineage. However, newer analyses of family in lophotrochozoans as well as the phylogenetically basal cnidarian provides uncovered thirteen (13) ancestral subfamilies [6; 7; 8]. This highly suggests that the tiny variety of and is because of gene loss. Even more extensive proof gene CDDO reduction for both of these model types was supplied by the selecting of a number of important hereditary pathways in Cnidaria that are absent in and . The relevant issue of when these loss happened in the progression of Ecdysozoa continues to be generally unanswered, which is quite feasible that at least a few of these loss represent situations of independent reduction inside the nematode and insect lineages. Furthermore to gene reduction, the genomes of and so are peculiar for the reason that they may actually have got undergone compaction, as evidenced with the CDDO shortening and lack of introns, and an over-all reduction in intergenic length [10; 11]. Understanding when these genomic adjustments happened and what function they performed in the progression of extant pets requires genomic series from a broader group of species. Latest improvements in bioinformatics and sequencing possess allowed genomic research of a far more different group of pets, and never have to concentrate on established super model tiffany livingston types with minimal genome size exclusively. Indeed, as the genomes of many ecdysozoans have already been sequenced, a large proportion participate CDDO in two clades: Insecta, with much bias toward holometabolous pests, dipterans [3 especially; 12; 13; 14; 15; 16; 17; 18], and Nematoda [2; 4; 19]. As a result, our knowledge of genome progression within Ecdysozoa will advantage significantly from obtaining genomic series from additional types representing a broader taxonomic sampling . As a complete just to illustrate, the phylogenomic evaluation of 2.6 Mb RAB7B of series from 62 single-copy genes of 75 arthropods was necessary to solve the deep phylogenetic history of the key arthropod lineages . Since arthropods aren’t only species-rich, but morphologically and developmentally different also, these are critically very important to the analysis of progression and advancement (evo-devo). A good deal is well known about advancement because of its effective hereditary tools and huge research community. Compared we know much less about the introduction of various other arthropodsthus even more taxonomic sampling is essential to greatly help us understand the pushes underlying rays of the group . To this final end, the sea amphipod, relates to financially essential pets such as for example shrimps carefully, crabs, and lobsters, and its own phylogenetic position allows important comparisons to reconstruct ancestral features within Pancrustacea and insects [21; 25]. In order to create a better hereditary program for evo-devo research, and to start to address problems of genome progression within arthropods and, even more broadly, in Ecdysozoa, we’ve produced a bacterial artificial chromosomes (BAC) collection for and invite for faithful propagation of huge DNA fragments. These libraries may then be utilized for molecular and genomic research such as for example positional cloning or evaluating gene buildings and synteny across different types . Furthermore, BACs certainly are a practical tool for the original physical and hereditary mapping of genomic locations without entire genome sequencing. Hence, BAC libraries are a fantastic means of learning genome level queries, for those thinking about comparative studies of specific genomic locations particularly. Highlighting their effectiveness, BAC libraries have been constructed for a huge selection of species which range from bacterias to plant life to pets. Right here the building is reported by us and preliminary characterization of the BAC collection. Debate and Outcomes We’ve built a BAC collection for the amphipod crustacean, that includes 129,024 clones with the average put size of 140 kb. The genome size of is normally estimated to become 3.6 Gb (N.H.P.and Aziz Aboobaker, unpublished data), and then the insurance of our collection is estimated to become near five genome equivalents. The BAC clones had been selected robotically, grown, and kept in 384-well. | <urn:uuid:e4006e8d-2fcb-45ec-b736-03a2ce34e32b> | {
"dump": "CC-MAIN-2021-31",
"url": "http://pyr-41.com/bacterial-artificial-chromosomes-bacs-can-handle-propagating-huge-fragments-of-dna/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154277.15/warc/CC-MAIN-20210801221329-20210802011329-00248.warc.gz",
"language": "en",
"language_score": 0.944439709186554,
"token_count": 1063,
"score": 3.0625,
"int_score": 3
} |
Credit & Copyright: Eric Frappa, Saint-Etienne Planetarium, FranceExplanation: Where did Comet Hyakutake come from? The orbits of the Earth and this brightening comet are shown in the above diagram. The blue disk is bounded by the circular orbit of the Earth about the central Sun. The comet's path outlines the green shape. The shape of the comet's orbit is close to a parabola. The comet has come in from the outer Solar System, will pass near the Earth in late March, and pass near the Sun in late April. Comet Hyakutake will appear bright in late March because it is so close to the Earth, and will again appear bright in late April because it is so close to the Sun. In late March, the comet will be "north" of the Earth and so only visible in the Northern hemisphere. Information about how to see Comet Hyakutake is available from many University astronomy departments and planetaria.
Scale of the Universe Debate in April 1996
NASA Web Site Statements, Warnings, and Disclaimers
NASA Official: Jay Norris. Specific rights apply.
A service of: LHEA at NASA / GSFC
& Michigan Tech. U.
Based on Astronomy Picture Of the Day
Publications with keywords: comet - comet Hyakutake - orbit
Publications with words: comet - comet Hyakutake - orbit | <urn:uuid:8ab7745f-3593-40fd-a9e3-276cf76efc4a> | {
"dump": "CC-MAIN-2019-39",
"url": "http://www.astronet.ru/db/xware/msg/1161819",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514572879.28/warc/CC-MAIN-20190916155946-20190916181946-00080.warc.gz",
"language": "en",
"language_score": 0.889861524105072,
"token_count": 291,
"score": 4.125,
"int_score": 4
} |
Grenada Enrichment and Transition Center houses the Grenada School District programs of Alternative
Education and GED Programs. Principal Dr. Tina Herrington states, "As our teachers and staff serve GED and Alternative School students, we aspire to help foster their academic and social success. Our goals include projecting a positive image for our students and community and enabling our students to progress toward their personal goals. Our students receive behavior interventions, counseling, and PBIS(Positive Behavior Intervention and Support) for good behavior. We strive to enable our GED students to obtain their GED and our Alternative School students to return to their home school by achieving good attendance with no major referrals."
The GED Program is designed for students at least 16 years old and two or more grade levels below their appropriate placement. Class work in social studies, science, literature, writing, and mathematics is geared toward preparing students for the GED test. Practice tests are generally given three times during the school year. Students scoring an overall average of 45 on the practice test are deemed eligible to take the GED test.
Students recommended for this program are given the opportunity to evaluate their behavior for modification, improve relationships with students and teachers, and improve attendance habits. Alternative Education has allowed many students to modify their behavior and to improve academically. | <urn:uuid:740cb1c9-5f2e-4555-b98e-8169fb1527f3> | {
"dump": "CC-MAIN-2019-18",
"url": "http://www.gsd.k12.ms.us/altlyt.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578530161.4/warc/CC-MAIN-20190421020506-20190421042506-00322.warc.gz",
"language": "en",
"language_score": 0.9517382979393005,
"token_count": 265,
"score": 2.75,
"int_score": 3
} |
Too much salt can lead to high blood pressure and increase your risk for heart disease and stroke, two of the leading causes of death and disability in the United States. This podcast discusses the importance of watching the consumption of salt in your diet. Created: 10/27/2011 by MMWR.
Date Released: 10/27/2011. Series Name: A Minute of Health with CDC.
A MINUTE OF HEALTH WITH CDC
Watch Your Salt
Dietary Sodium Intake Compared with Recommended Intake — United States 2005–2008
Recorded: October 25, 2011; posted: October 27, 2011
This program is presented by the Centers for Disease Control and Prevention.
Counting calories is good, but it's not the only thing you need to watch in your diet. Too much salt can lead to high blood pressure and increase your risk for heart disease and stroke, two of the leading causes of death and disability in the United States. Certain groups — older-aged people; African Americans; and those with high blood pressure, diabetes, and kidney disease — need to be even more careful about how much salt they consume. To lower your sodium intake, cut down on processed and restaurant foods and eat more freshly prepared foods. Ask your health care provider for more information on a low-sodium diet.
Thank you for joining us on A Minute of Health with CDC.
For the most accurate health information, visit www.cdc.gov or call 1-800-CDC-INFO. | <urn:uuid:f7d6e0e4-dab6-4c98-8df4-13a263dac97e> | {
"dump": "CC-MAIN-2014-10",
"url": "http://www2c.cdc.gov/podcasts/player.asp?f=8621519",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999651907/warc/CC-MAIN-20140305060731-00039-ip-10-183-142-35.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9427402019500732,
"token_count": 305,
"score": 3,
"int_score": 3
} |
In Ugandan villages near national parks, shifting elephant migration routes have become a real danger. So the Uganda Wildlife Authority has been holding seminars in rural communities and giving people new - and non-lethal - methods to deter the elephants: vuvuzelas. Armed with the plastic trumpets, villagers are defending their homesteads.
Although natural elephant corridors have existed for centuries in Uganda, in recent years growth in both human and elephant populations have led to an increased rate of elephant attacks on farms and homesteads.
In the search of non-lethal counter measures, the Uganda Wildlife Authority (UWA) has discovered the vuvuzela as a particularly effective tool in deterring wandering elephants.
This long plastic trumpet, often found at sporting events throughout the continent, emits a loud booming sound that irritates the elephant into retreating.
Now, UWA rangers and scouts are handing out vuvuzelas to community members in certain areas of Murchison Falls National Park. At an outreach meeting in Northern Uganda, one UWA ranger explains to residents why “scare shooting” - or firing A-K47s in the air - is no longer an effective method to deter these giant creatures.
“We use commonly the A-K47. And after using this over the years animals have got used to that sound which is produced by the A-K47," stated Ranger Moses. "And so even if you shoot, it may look at you, flap its ears and continue with whatever it wants. Now we have tried to back it up with vuvuzela, which we have supplied to some of these people we have called scouts, because their ears are very sensitive to noise and it gets irritated with much noise so that thing just scares them away… that is why we come up with the noise.”
Common non-lethal methods for deterring elephants include setting up beehives, stringing ropes covered in chili oil across village lines and digging long trenches.
However, Gessa Simblicious, a spokesman for the UWA, said that because Uganda has wide ranging diversity in ecosystems, one solution will not work for everyone.
“Of course some of these interventions have challenges…We have some areas that are so rocky its very hard to dig trenches, we also have a number of wetlands surrounding some of these protected areas like Murchison Falls National Park. So it’s very hard to put these interventions deep under the water or in wetlands," explained Simblicious. "Some places are actually adjacent roads. You can’t block off a road…so all these are a bit prone areas that are so porous.”
The UWA said the vuvuzela works well because it has the effect of irritating the elephant without intimidating it. This is an important factor as elephants that feel intimidated or threatened are more likely to attack. No such incidences have been noted with the vuvuzela deterrent systems.
Although there may come a time when elephants adapt to the vuvuzela the same way they adapted to gunfire, for now it is an effective, violence free approach, creating an amusing solution to a very real problem. | <urn:uuid:4eca9c95-5528-4132-bfb5-5fd3aeae8a5b> | {
"dump": "CC-MAIN-2018-34",
"url": "https://www.voanews.com/a/uganda-trumpets-vuvuzelas-as-new-tool-to-deter-elephant-attacks/2696856.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221211933.43/warc/CC-MAIN-20180817065045-20180817085045-00655.warc.gz",
"language": "en",
"language_score": 0.9578301906585693,
"token_count": 653,
"score": 3.09375,
"int_score": 3
} |
1. azo dyes formed by coupling a diazonium salt with a substituted aromatic amine, and
2. anthraquinone dyes formed by condensing a nitroanthraquinone compound with an aromatic amine.
|3755291||PROCESS FOR IMPROVING THE DRY STATE TINCTORIAL STRENGTH OF A WATER SOLUBLE AZO DYE||1973-08-28||Demler et al.||260/200|
|3356443||Mixture of naphtholazobenzene and naphtholazotoluene and its production in granular form||1967-12-05||Dziomba||260/208|
|3071815||Process for producing free flowing oil soluble fusible organic dyestuffs||1963-01-08||MacKinnon||260/208|
|3016384||Process for the manufacture of color pigments in finely divided form||1962-01-09||Caliezi||260/314.5|
It is well known that many organic dyestuffs and dye intermediates precipitate from solution as amorphous solids, gums, or tars, rather than in crystalline form. In such cases it is often necessary to induce crystallization of the compound or to inhibit formation of the gummy or tarry product. With difficulty crystallizable compounds, it is sometimes necessary to resort to a combination of treatments including seeding with particles, mechanical agitation and shock. Routinely, an azo dyestuff may be extracted with a solvent which does not appreciably dissolve the crystallizand but which may dissolve out certain impurities, give an interface effect or cause polymorphic transformation. Treatment may include digestion with boiling solvent under reflux or extraction in a Soxhlet type apparatus followed by appropriate supercooling, or in long shaking with the poor solvent in the cold. Sometimes contact with the poor solvent for several days at room temperature is effective. Alternatively the solution may be subjected to a rubbing or shaking action for several hours. Crystallization sets in, probably due to the formation of nuclei. Typically bentonite, kieselguhr, silica gel or charcoal may be added to aid crystallization.
The manner in which a dyestuff is formed and the refining process by which the product formed is crystallized and purified may result in the product having varied physical properties. Variations in physical properties can render a dye crystallized by one procedure excellent for a specific use and the same dye crystallized in another manner, far less satisfactory for the purpose.
Disperse Azo dyes are formed directly from water-soluble reactants which result in an essentially water-insoluble dye. The anthraquinone dyes are formed in an organic solvent in which the dye may be soluble. Where the dye is soluble in the organic solvent, the reaction mass is `drowned` in a liquid medium in which the dye is insoluble, such as in water, a salt solution or an acid solution. The specific composition of the liquid medium is not as important as its properties, which are that the liquid medium be miscible with the solvent and that the solute be relatively insoluble in it.
However, before crystals can grow, it is known that there must exist in the solution a number of minute bodies called "centers of crystallization" or "nuclei", but how a crystal nucleus is formed is not known with any degree of certainty. Different systems require different degrees of supersolubility or super-cooling before nucleation will occur, and often the conditions required by one particular system vary according to its state.
Probably the best method for inducing crystallization is to inoculate or seed the supersaturated solution with small regular-sized particles consisting of the material to be crystallized. The seeds should be dispersed uniformly throughout the solution by means of gentle agitation. (Chemical Engineering Practice, Cremer & David, Vol. 6 pg. 405). In the instant invention, the solution is seeded with inert particles of a water-wettable polytetrafluoroethylene resin, which unexpectedly gives better results than seeding with particles of material to be crystallized. Seeding with inert particles effectively nucleates the solution to yield a dye in which the resin is occluded, and at the same time, obviates the time-consuming process steps conventionally utilized to induce crystallization of organic dyestuffs and dye intermediates which crystallize with difficulty.
It has been discovered that solutions of organic dyes and dye intermediates which crystallize with difficulty, if at all, may be induced to crystallize as fine crystals in the presence of finely divided solid PTFE particles present in an aqueous phase.
It is therefore a general object of this invention to provide a new and improved process for crystallizing organic dye and dye intermediates which are not easily crystallized.
More particularly, it has been discovered that disperse dyes and disperse dye intermediates may be crystallized as a reaction product in the presence of finely divided water-wettable particles of PTFE resin, more easily than they can be crystallized without the use of these particles. In many instances, crystals of azo and anthraquinone dyes may be precipitated in the presence of PTFE particles more easily, and exhibit better quality, than if the crystals are precipitated by seeding in any known manner.
It is therefore another general object of this invention to provide a process for crystallizing an organic disperse dye or disperse dye intermediate in the presence of water and microscopic, solid, water-wettable particles of PTFE resin.
It is also another general object of this invention to provide an organic disperse dye in finely divided crystalline form or in a crystalline form which may subsequently be more easily mechanically comminuted, having occluded in each of the majority of the crystals precipitated, at least one particle of a water-wettable polytetrafluoroethylene resin which is essentially inert with respect to the dyestuff and the solvent from which it is crystallized.
It is a specific object of this invention to provide a process which will accelerate the crystallization from solution of difficultly crystallizable organic dyestuffs and dye intermediates.
It is a more specific object of this invention to provide a disperse azo dye, disperse anthraquinone dye, or their dye intermediates nucleated with finely divided water-wettable particles of PTFE resin at least one of which particles remains occluded within each of a majority of crystals of the disperse dye or intermediate without substantially affecting the desirable properties of the crystals.
It is still another specific object of this invention to provide crystals of a disperse dye, in the majority of which at least one PTFE particle is occluded, which crystals may be subsequently mechanically comminuted to micron or submicron size with a substantially lessened dusting problem.
These and other objects, features and advantages of this process and the crystals grown thereby, will become apparent to those skilled in the art from the following description of preferred forms thereof and the examples set forth herein.
According to the process of this invention, an organic dye or dye intermediate may be crystallized from solution in the presence of water-wettable, finely divided particles of PTFE resin such as are present in an aqueous colloidal dispersion of PTFE. The process is particularly applicable to precipitating crystals of difficulty crystallizable organic dyes and intermediates which are insoluble or difficultly soluble in water.
It also has particular utility for crystallizing a reaction product held in solution in a non-aqueous medium, whether or not the non-aqueous medium is soluble in water. The process is most conveniently used in those instances where the reaction product is an organic dye which is soluble in a non-aqueous medium but insoluble in water, and the non-aqueous medium is compatible or miscible with water to a sufficient extent to permit the dye to be precipitated from solution. Though, hereinafter reference will be made to a `dye` it will be understood that intermediates of the `dye` may also be similarly treated. Generally, since intermediates are relatively easily crystallizable, since they are comparatively simpler compounds and have relatively low molecular weights, this process is less likely to have as great value as in the production of dyes. However, it may be used, even where crystals are relatively easily obtained, with conventional seeding, in those instances where particular properties, such as smaller and more uniform crystal size, are desirable, and these properties are obtained by seeding with PTFE particles.
In each embodiment of the instant invention, only finely-divided water-wettable PTFE resin particles are used, such as water-wettable fibrillatable PTFE in the form of finely divided, solid particles commercially available as a colloidal aqueous suspensoid or dispersion concentrated to about 60% by weight of polymer, having particles about 0.05 to about 0.5 micron in size, with average diameters of about 0.2 micron. U.S. Pat. No. 2,559,752 discloses a process for forming an aqueous dispersion of colloidal water-wettable particles of PTFE resin. Another type of fibrillatable PTFE generally referred to as "fine powder", obtained by coagulation of the dispersion, is less effective as a seeding agent because it is not water-wettable. A notable fact is that addition of an aqueous dispersion of colloidal PTFE particles to an organic solvent which is water-immiscible, results in agglomeration of the PTFE particles on the surface, and provides no benefit relative to crystallization. Most notably, finely divided forms of other particulate polyhalocarbons and polyolefins are ineffective as seeding agents to effect the quicker precipitation of crystals of organic dyestuffs or dye intermediates, as compared with precipitation in a conventional manner.
Particular embodiments of the invention described herein are directed to disperse dyes which include colors of the azo, azomethine, nitroarene and anthraquinone chemical classes. Disperse dyes account for almost all the dyeing of cellulose acetate and polyethylene terephthalate textile fibers. They are also used in dyeing nylon, where the uniform coloration of the fiber is of value. Disperse dyes, in common, show insignificant water solubility and must be finely divided as they are known to dye the fiber by a mechanism involving a very dilute dispersion in water as an intermediate step, followed by solution in the fiber. Especially important are the disperse azo and anthraquinone dyes. Among the disperse azo dyes, this process is particularly useful for precipitation of monoazo and disazo reaction products; among the anthraquinones, the more complex derivatives of the aminoanthraquinones are more difficultly crystallizable and therefore can profitably utilize this process.
Though some dyes precipitate from solution when seeded with PTFE particles much faster than with bentonite (say) it is not presently known how to predict the improvement in rate, or the factors which influence such improvement. Best results are generally obtained with water-wettable fibrillatable PTFE resin particles. Less surprising, but useful results are obtained with water-wettable finely divided suspensoids of polymeric fluorinated ethylene propylene resins.
Crystals precipitated from solution in the presence of PTFE particles are not only obtained more easily but are generally smaller in particle size than those obtained by conventional seeding. Again, quite unexpectedly, the amount of seed particles of PTFE required to obtain quicker precipitation is less than the amount of foreign conventional seed particles used, and, less than the amount of seed particles of the same material normally used.
Even where relatively large crystals, in the range from about 50 microns to about 150 microns, are precipitated from solution, it is found that the crystals may be ground, more easily, than conventionally seeded crystals, in commonly used comminuting equipment such as top feed mills.
Seeding difficultly crystallizable disperse dyes with PTFE particles results in no noticeable detrimental effects in the dyeing properties of the disperse dyes obtained, and they may be treated in the usual manner with dispersing agents commonly used in their application.
The following examples are only illustrative of the invention, it being understood that numerous other dyes and dye intermediates may be crystallized in an analogous manner. All `parts` referred to are parts by weight, unless specified otherwise.
A. A monoazo disperse dye represented by the structural formula: ##SPC1##
wherein R1 is a halogen,
R2 is alkylene having from 1 to 4 carbon atoms, and,
R3 is lower alkyl having 1 to 5 carbon atoms,
is prepared by coupling an appropriate halogen-containing diazonium salt with an equimolar ratio of a substituted aromatic amine in an aqueous medium in a known manner under conventional conditions. The resultant azo dye "tarred out", that is, resulted in a tarry or gum-like substance, and did not precipitate as a solid. Methanol treatment, that is, redissolving the tarred-out dye in methanol and reprecipitation in cold water, is required to obtain a solid press cake.
B. The same reaction as described in part A hereinabove is carried out under the same conventional conditions, except that 1 per cent by weight, based on the theoretical yield of dye, of a 60% dispersion of PTFE resin (commercially available as T-30 *Teflon) (*Trademark of Dupont Co.), is added to the solution of the coupling component before the solution of diazonium salt is added. Solid dye precipitates essentially immediately in finely divided crystals. The size of individual crystals is in the range from about 30 μ to about 105 μ and the mass may be conveniently filtered. Agglomerates of crystals are also obtained which are easily broken up by grinding in a top-feed mill with suitable dispersing agents, etc., such as are conventionally used to prepare a dye for use.
The crystals so obtained are unique in that the majority of individual crystals have occluded therewithin at least one primary particle of PTFE. This is evidenced by dissolving a mass of the crystals in a suitable solvent and recovering the PTFE particles from the solution. Before the crystals are dissolved there is no visible trace of the presence of PTFE particles. Crystals formed by utilizing PTFE particles as nuclei are remarkable in that they are generally smaller and geometrically better defined than crystals of the same dyes or intermediates nucleated conventionally. Moreover, when ground in a top-feed mill or the like, crystals of this invention are surprisingly less dusty and generally require less time to be ground to a predetermined size, as compared to conventionally obtained crystals.
As has been stated hereinabove, this invention has particular merit in the production of difficultly crystallizable dyes and intermediates; but it is also useful with relatively easily crystallizable organic compounds in which small crystal size, easy grinding and a much reduced proclivity to dust when ground, are desirable.
A. A monoazo disperse dye represented by the structural formula; ##SPC2##
wherein R1, R2 and R3 have the same connotation as in Example 1 hereinabove, is prepared by coupling an appropriate halogen-containing diazonium salt with an equimolar ratio of a substituted aromatic amine, in an aqueous medium, in a conventional manner. The dye tarred-out and did not solidify even on a prolonged standing. Methanol treatment is required to obtain a solid press cake.
B. The same reaction as described in part A hereinabove is carried out under the same conventional conditions, except that 1 per cent by weight of solids, based on the theoretical yield of dye, of a 60% dispersion of PTFE resin (commercially available As T-30 *Teflon) (*Trademark), is added to the solution of the coupling component before the solution of diazonium salt is added. Solid dye is precipitated in a tarry form which crystallizes after standing for about two days. The size of individual crystals is in the range from about 30 μ to about 105 μ . Agglomerates of crystals are also obtained. Though crystal formation is slow, crystals formed are small, being less than about 125 μ in size. Of equal importance is that a methanol treatment is sidestepped.
A. A monoazo disperse dye represented by the structural formula: ##SPC3##
wherein R1, R2 and R3 have the same connotation as in example 1 hereinabove, is prepared by coupling an appropriate diazonium salt with an equimolar ratio of halogen-containing aromatic amine, in an aqueous medium, in a conventional manner. The dye tarred out forming "blobs" of such viscosity that stirring had to be discontinued.
B. The same reaction as described in part A hereinabove is carried out under the same conventional conditions, except that 1 per initially, by weight of solids, based on the theoretical yeild of dye, of Bentonite is added to the solution of the coupling component before the solution of diazonium salt is added. Stirring is maintained and at the end of one day a semisolid mass is formed with signs of incipient crystallization.
C. The same reaction as described in part A hereinabove is carried out under the same conventional conditions, except that 1 per cent by weight of solids, based on the theoretical yield of dye, of T-30*Teflon (*Trademark) is added to the solution of the coupling component before the solution of diazonium salt is added. The dye is precipitated as a mass of crystals in less than 1.5 hours. Individual crystals ranged from 30 μ to about 105 μ and agglomerates of crystals are obtained which are easily comminuted.
D. The same reaction as described in part A hereinabove is carried out under the same conventional conditions, except that 1 per cent by weight of solids, based on the theoretical yield of dye, of finely divided pure crystals of the same dye to be precipitated (obtained from a previous preparation) is added to the solution of the coupling component before the solution of diazonium salt is added. Solid dye precipitated after 5 hours of constant stirring. Individual crystals were generally larger than those obtained in part C immediately hereinabove, and agglomerates of crystals are more difficult to grind into fine powder.
A. A disazo disperse dye represented by the structural formula: ##SPC4##
wherein R2 is a lower alkylene having from 1 to 5 carbon atoms is prepared by coupling aminozao benzene in equimolar ratio with an amine represented by the structural formula: ##SPC5##
wherein R2 is the same as above, in a known manner, under conventional conditions. The resultant disazodye is formed as a tar, intitially, but hardens on stirring overnight. No crystals are observed to be formed.
B. The same reaction as described in part A hereinabove is carried out under the same conventional conditions, except that 1 per cent by weight of solids, based on the theoretical yield of dye, of a 60% dispersion of PTFE resin (commercially available as T-30 *Teflon) (*Trademark), is added to the solution of the dinitrile prior to the addition of the diazotized aminoazo benzene. Solid dye precipitates essentially immediately in finely divided crystalline form, without the formation of tarry product. As in prior examples, hereinbefore, the crystals obtained are found to have PTFE particles occluded herein.
A. An anthraquinone disperse dye represented by the structural formula: ##SPC6##
wherein R3 has the same connotation as in Example 1 hereinabove, is prepared by condensing a mixture of dihydroxy-dinitro isomers of 1,8-dihydroxy-1, 5-dinitro-anthraquinone with a substituted aniline represented by the structural formula: ##SPC7##
in a Cellosolve solvent in a known manner and under conventional conditions. After completion of the reaction, the reaction mixture is cooled and poured slowly, with stirring, into 2 N HCl to precipitate crystals of the dye. But the dye does not readily precipitate in crystalline form.
B. The same reaction as described in part A hereinabove is carried out under the same conventional conditions, except that 1 per cent by weight of solids, based on the theoretical yield of dye, of a 60% dispersion of PTFE resin (commercially available as T-30 *Teflon) (*Trademark), is added to the 2 N HCl solution prior to drowning the batch. The anthraquinone dye is readily precipitated in crystalline form with a primary crystal particle size in the range from about 30 μ to about 125 μ . Agglomerates of crystals are easily ground as are the primary crystals themeslves.
A. An alkoxylated intermediate, useful as a coupling component in a monoazo disperse dye, may be prepared conventionally, for example, by ethoxylating 2-methoxy-5-acetamino aniline in acetic acid at about 0°-5°c. Sufficient ethylene oxide is added until the diazo test is negative. The product obtained, after excess acetic acid is driven off, is an oily mass. This oily mass is repeatedly washed with diethyl ether before a crystalline product is obtained. The reaction may be set forth as follows: ##SPC8##
The crystalline coupling component may then be coupled with a diazotized dinitrochloroaniline to yield a difficulty crystallizable disperse dye, in a known manner. The dye may thereafter be acetylated as disclosed in U.S. Pat. No. 3,179,405.
B. The same sequence of reactions set forth in part A immediately hereinabove is carried out under the same conditions except that about 1% by weight of PTFE resin solids present as an aqueous colloidal dispersion of T-30 Telfon resin, is added to the reaction mass containing 2-methoxy-5-acetamino aniline. Instead of an oily reaction product, a crystalline product is obtained.
Alternatively, the PTFE solids may be added in subsequent steps only, but it will be apparent that greatest benefit of the nucleating PTFE solids will be had with an early addition. It may be preferred to add additional PTFE solids to each step to obtain enhanced crystallization, both with respect to speed of crystallization and uniformity of small geometrically well-defined crystals.
A. An amine intermediate, such as is commonly used to prepare an authraquinone dye, is represented by the structural formula: ##SPC9##
wherein R3 is lower alkyl having from 1 to 5 carbon atoms, is conventionally prepared in the following manner: an acylphenone is nitrated in mixed acid to form nitroacylphenone. The nitroacetophenone is reduced either catalytically under pressure, or in a Meerwein-Ponndorf reaction to yield the nitrophenyl alkyl carbinol. The carbinol obtained is then reduced with iron powder to form the amine. In the foregoing conventional preparation both the carbinol and amine are obtained as oily products, so termed because they are less viscous and less dense than a tar or gum formed in other examples referred to herein.
B. The same sequence of reactions set forth in part A immediately hereinabove is carried out under the same conditions except that about 1% by weight of PTFE resin solids present as an aqueous colloidal dispersion of T-30 Teflon resin, is added to the reaction mass containing nitroacylphenone. Instead of an oily product, a crystalline, nitrophenyl alkyl carbinol is obtained. The crystalline product is easier to work with and allows physical characteristics, which may be indicative of the quality of the product, to be readily observed.
Alternatively, the PTFE solids may be added in the subsequent reduction step, which as stated hereinabove, conventionally yields a difficultly crystallizable amine. In the presence of finely divided PTFE a crystalline amine is produced which is easily recovered and handled.
Where the PTFE resin is added in a prior reaction, to obtain a crystalline reaction product with PTFE particles occluded in the crystals, the subsequent processing of the product is facilitated due to the presence of PTFE solids. For example, if PTFE solids are added in the Meerwein-Ponndorf reaction, and the crystals so obtained used in the subsequent reduction to the amine, improved crystallization is noted though no additional PTFE is added.
In the foregoing examples about 1% by weight PTFE solids, based on the theoretical reaction yield of solids, is used. It will be apparent that there is nothing critical about the amount of PTFE solids used for nucleation provided there are sufficient nucleating solids present to effect the desired improved crystallization. From the submicron primary particle size of PTFE solids in a typical suspensoid of water-wettable particles it will be apparent that even trace amounts of PTFE in the range of about 50 parts per million (on a weight basis) may provide noticeable improvement in crystallization. Generally, however, it will be found that an amount in the range from about 0.1 percent to about 3 percent by weight, based on theoretical yield of solids, will suffice. Even larger amounts may be used, but such large amounts provide no additional benefit, and serve only to introduce a significant amount of inert solids into the dye.
Best results are obtained with water-wettable PTFE which is used herein to illustrate the invention. Other water-wettable fully halogenated polyhaloolefinic resins in finely divided, submicron or micron, particle sizes may also be used. By the term "fully halogenated" is meant that all substitutable hydrogen atoms in a polyolefinic resin have been substituted with halogen, preferably selected from fluorine and chlorine.
Modifications, changes, and improvements to the preferred forms of the invention herein disclosed, described and illustrated may occur to those skilled in the art who come to understand the principles of its operation and the function of finely divided polyhaloolefinic resins as nucleating agents. Accordingly, the scope of the patent to be issued herein should not be limited to the particular embodiment of the invention set forth herein, but rather should be limited by the advance by which the process and the organic crystals formed thereby has promoted the art of obtaining the crystals from solutions containing them. | <urn:uuid:89525874-8590-40bc-a5cf-82966a4cabc8> | {
"dump": "CC-MAIN-2015-06",
"url": "http://www.freepatentsonline.com/3944540.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422115899686.93/warc/CC-MAIN-20150124161139-00129-ip-10-180-212-252.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9373741149902344,
"token_count": 5746,
"score": 2.515625,
"int_score": 3
} |
A natural resource that covers 71% of the Earth’s surface and makes up to 60% of our bodies, water contributes to life around the world, including providing food, income, and wellbeing. Yet, the global water crisis is commonly misunderstood! This World Water Day, Food for the Hungry experts in water, sanitation, and health (WASH) have joined together to help you dispel some common myths about clean water, and give you a better understanding of the work we do with water around the world.
1. Myth: People who drink dirty water are already immune to its effects.
FALSE. Water can be contaminated by a wide variety of disease-causing microbial agents including bacteria, viruses, protozoa, and worms. While the human body can become resistant to some of these agents, many of them will overwhelm anyone’s immune system. Whether you live in Canada, Argentina, Nairobi, or Cape Town, you’re susceptible. Just 100 years ago before the advent of water treatment systems, outbreaks of cholera, typhoid fever, and other serious waterborne diseases regularly occurred throughout North America and Europe. This made hundreds of thousands of people, sick and sometimes killed tens of thousands of people. Children are even more vulnerable. Unfortunately, regular exposure to dirty water did nothing to prevent the spread of these deadly diseases. Parasites and diarrheal diseases rob young bodies of important nutrients and impede physical and cognitive development with effects that last a lifetime.
2. Myth: In poor countries, it is the lack of water that kills you.
NOT ALWAYS TRUE. Many waterborne diseases are not due to a lack of water, but due to the consumption of unsafe water. This predicament is not limited to poor countries. Many countries, including the Canada, must continue to work to ensure the drinking water supply is uncontaminated. Contaminated water sources cause diarrhea. Diarrhea then causes dehydration to varying degrees. Cholera, a waterborne disease caused by human water contamination containing the vibrio bacteria, is the extreme case where the body massively and quickly dehydrates, often leading to death.
3. Myth: Any water is better than no water.
FALSE. The Millennium Development Goals aimed to ensure that everyone had access to an improved water source. At the time, “improved” meant that the source was protected but not necessarily free of contamination. For instance, a nearby spring could be cleaner than a downstream river where others wash their animals or clothes, but still contaminated with disease. As a result, the UN’s Sustainable Development Goals now aim to ensure that everyone has access to an improved and safe water source. As mentioned above, it’s not just about access to water but sustainable access to clean water.
FALSE. We think of the earth as a water-rich environment and we are conditioned to think so by being able to turn on our taps and getting as much as we need at any time. Unfortunately, the truth is that fresh water is a rare resource across much of the earth. In fact, 785 million people worldwide lack access to an improved water source. In many countries in Africa, Asia, and Latin America, the water collection process spans hours. Usually, girls and women bear the brunt of walking miles to the next clean water source. On average, they walk 6 kilometers every day to fetch water! In turn, this has a direct effect on their ability to attend and remain in school and engage in income-generating work.
5. Myth: Water is free in poor countries.
JUST THE OPPOSITE! Due to the scarcity of fresh, safe water, especially in impoverished countries, the cost of water is much higher as a percentage of income. Because building water systems for free is an unsustainable solution, internal and external actors like FH work with local engineers, local water management committees, and local leaders (including women!) to ensure that functioning water systems are easily accessed by those who need it the most—and people are charged a fair price for the service.
6. Myth: People shouldn’t live in places where there is not enough water to support them.
UNREALISTIC. Personal mobility is not a luxury that everyone has. Often, many people are forced to live in places where there are diminishing resources have diminished because they can’t go anywhere else. Even in the United States, we don’t always intentionally move to clean water sources when we think about moving to a new city. Ultimately, fresh, accessible water is a rare resource. It’s a myth that people can simply identify and move to where there is fresh, clean water. Water availability and accessibility can also shift dramatically over time, even short periods of time.
7. Myth: Having clean water is more important in preventing waterborne diseases than having sanitation facilities and good hygiene practices.
FALSE. Most waterborne diseases are caused by the ingestion of fecal waste, with human waste by far being the most dangerous. Drinking clean water is one way to break the transmission route but there are several other ways that waste can be transmitted and ingested. Clean water and sanitation go hand in hand. Even the simple act of teaching handwashing can go a long way in reducing disease.
8. Myth: Rainwater is safe to drink because it hasn’t been contaminated yet.
FALSE. According to the Centers for Disease Control, rainwater is not as pure as we assume it is. Rainwater can carry varying contaminants from the surfaces on which it lands. In fact, rainwater can carry bacteria, parasites, viruses, and chemicals that make humans sick. It has even led to disease outbreaks such as cholera after certain humanitarian disasters. In many countries where FH works, households use rainwater for day to day activities, including farm activities and animal husbandry.
Did any of these myths about clean water surprise you? The global water crisis and getting access to clean water pose serious challenges to more than 785 million people worldwide. That’s about 1 in 10 people! This World Water Day, your donation can change that! Go to www.fhcanada.org/water to find out how. Will you give generously to fund clean water projects around the world?
This post was written by FH’s WASH experts, Taiwo Adesina and Rod Beadle. Taiwo is the Senior Relief Specialist on FH’s relief and humanitarian affairs team. Rod is Food for the Hungry’s Senior WASH and Response Advisor. | <urn:uuid:3ecedfbb-f88b-41aa-b65d-00d95fcb263e> | {
"dump": "CC-MAIN-2022-49",
"url": "https://blog.fhcanada.org/2021/03/8-myths-about-clean-water-around-world.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710409.16/warc/CC-MAIN-20221127141808-20221127171808-00087.warc.gz",
"language": "en",
"language_score": 0.9546635746955872,
"token_count": 1346,
"score": 3.625,
"int_score": 4
} |
Solving the “last mile” problem would be “low hanging fruit” for autonomous vehicles — like self-driving buses or commuter vans — that can pick up and drop off commuters, says Dr. Junfeng Jiao Director of the Urban Information Lab at UT School of Architecture’s Community and Regional Planning department.
Bloomberg Philanthropies’ Aspen Institute conducted the recent cities survey and released the results on Monday. Bloomberg Philanthropies examined the cities that are piloting autonomous vehicle programs or working on legislation to enable self-driving vehicles. “The most common anticipated role for [autonomous vehicles] is bridging existing gaps at the edges of transit systems, a crucial link that planners call the ‘last mile,’” the researchers write. “Almost every city indicated interest in using AVs for last-mile solutions, and for a majority of cities it was the highest priority.” | <urn:uuid:7e680055-446f-48de-9e5d-2724c4e31400> | {
"dump": "CC-MAIN-2019-30",
"url": "https://mobility21.cmu.edu/self-driving-transit-will-fix-the-absolute-worst-part-of-a-commute/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195526888.75/warc/CC-MAIN-20190721040545-20190721062545-00327.warc.gz",
"language": "en",
"language_score": 0.9284034371376038,
"token_count": 192,
"score": 2.59375,
"int_score": 3
} |
Editor's note: This post is co-authored by Fran Siracusa, co-founder of and educational technologist for Calliope Global.
As citizens of the world, students in today's classrooms seek global contexts for learning. Opportunities for networked and international collaborations are bringing both the world to classrooms and classrooms to the world. With a focus on international standards of instruction, globally-minded programs inspire students to be curious through investigation and reflective in analysis of thought. These pathways lead to the development of cultural literacy by allowing students to examine issues of global significance through interconnected sharing of experience and exchange of ideas. Collaborative learning spaces empower students to work with each other and with students in classrooms of the world to assume multiple perspectives, explore alternative solutions, and thoughtfully solve problems.
By examining the landscape of the classroom, educators can design collaborative learning spaces that will support the teaching and learning of skills needed for the interconnected world of today and tomorrow. By seamlessly connecting pedagogy, technology, and space, teachers can create spaces that promote social learning and maximum engagement. These collaborative classrooms are alive with action -- teaching, learning, innovating, creating, making, and exploring. Innovative learning spaces can encourage both individual and collective voices, and, through use of emerging technologies, they inspire students to become skillful curators of their digital worlds. Though there cannot be a single universal blueprint for designing a collaborative learning space, teachers can use the goal of global collaboration to inspire classroom design that allows for connected sharing and learning.
While there are many design ideas that could help drive this transformation, we suggest the following three as a starting point.
1. Involve Students in the Process From the Beginning
The design of a collaborative learning space begins with a dialogue between all stakeholders. Everyone, including teachers and students, are part of the conversation and the design experience from the start. With a focus on purpose, together they can create plans for a classroom that will invite active participation and inquiry. This establishes a framework that evolves the role of the classroom teacher from distant lecturer to engaged facilitator of learning. As partners in the design process, the teacher and the students can together take a holistic approach to define the goals of a collaborative learning space by answering the question: "How will learning look in our classroom?" Curricular content can be integrated into the design process, and digital tools can allow for creativity and critical thinking. The Bubbli app allows users to create 360-degree spherical photos called bubbles. Students can capture entire scenes of classrooms, including floors, ceilings, walls, and everything in between, and then they can add audio. Social tools allow for bubbles to be directly shared with the world and organized into albums. Albums can turn groups of bubbles into interactive stories and can serve as digital artifacts to add to digital portfolios of student learning.
2. Make Every Space a Space for Learning
In the process of designing a collaborative learning space, all available areas should be considered spaces for learning. Hallways can become meeting spaces for small groups, glass and windows can be transformed into writing spaces, and classroom walls can allow groups to visually map out thinking. By removing the conventional teacher desk, teachers and students will better understand their evolving roles as co-constructors of knowledge. Without a front of the room, every seat is the best seat in the class, and students are always at the center of learning. Flexible seating allows for spaces to transform depending on the purpose of the lesson. Varied seating options, too, such as stools, rocking chairs, beanbag chairs, and floor seating, give students choice and variability throughout the day.
3. Connect Physical and Virtual Learning Spaces
The design of a learning space can act as a catalyst to promote collaboration and innovation. Seamless integration of technology into classroom furniture and lessons can empower students to create personalized paths to learning. You can design a collaboration station by moving a flat-edged table to a wall. Chairs surrounding the table will invite student groups to work and collaborate here. An Apple TV added to a mounted flat-screen television lets you mirror devices during project sessions. Physical spaces can then be connected to virtual spaces through creativity and productivity apps. Classrooms can create international learning teams with students of the world, and then use apps -- such as Nearpod, Padlet, Kahoot!, Google Drive, and Periscope -- in global collaborations and projects. Videoconferencing platforms like Google Hangouts and Skype in the Classroom allow students to connect to the world through conversations and sharing their stories.
Collaborative learning spaces have the power to transform learning and teaching. The landscape of a connected classroom unites pedagogy, space, and standards of instruction. By connecting to global classrooms in meaningful and authentic ways, there can be endless opportunities for collaboration and engagement, and, in effect, the world becomes the learning space of the classroom. | <urn:uuid:a254403f-6edd-45c4-bbe5-951e7279b3e7> | {
"dump": "CC-MAIN-2019-26",
"url": "https://www.edutopia.org/blog/collaborative-learning-spaces-connect-to-world-jennifer-williams-fran-siracusa?utm_source=facebook&utm_medium=socialflow&utm_campaign=RSS&utm_content=FaceBook",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627997508.21/warc/CC-MAIN-20190616002634-20190616024634-00014.warc.gz",
"language": "en",
"language_score": 0.9371644258499146,
"token_count": 991,
"score": 3.5625,
"int_score": 4
} |
Click on coloured text: Biographies, Paternal Family Trees, Places, Dates, General, Work in Progress.
Hover over the Photos and Paintings for larger images.
Hover over the Burger top left for the Menu.
Biography of Henry VIII King England and Ireland 1491-1547
On 28 Jun 1491 Henry VIII was born to Henry VII King England and Ireland 1457-1509 (34) and Elizabeth York Queen Consort England 1466-1503 (25) at Palace of Placentia, Greenwich, Kent . He was created as Duke Cornwall .
On 18 Feb 1504 Henry VIII (12) was created as Prince Wales and Earl Chester (8C 1504) . John Mordaunt 1st Baron Mordaunt 1480-1562 (24) was created as Knight of the Bath . Richard Empson 1450-1510 (54) was knighted.
In 1509 William Compton 1482-1528 (27) was appointed as Groom of the Stool to Henry VIII King England and Ireland 1491-1547 (17) .
Letters and Papers Foreign and Domestic Henry VIII Volume 1 1509-1514
Henry VII (52)
At his manor of Richmond March 24 Hen. VII., the King (52) makes his last will, commending his soul to the Redeemer with the words he has used since his first "years of discretion," Domine Jesu Christe, qui me ex nichilo creasti, fecisti, redemisti et predestinasti ad hoc quod sum, Tu scis quid de me facere vis, fac de me secundum voluntatem Tuam cum misericordia, trusting in the grace of His Blessed Mother in whom, after Him, has been all his (testator's) trust, by whom in all his adversities he has had special comfort, and to whom he now makes his prayer (recited), as also to all the company of Heaven and especially his "accustumed avoures" St. Michael, St. John Baptist, St. John Evangelist, St. George, St. Anthony, St. Edward, St. Vincent, St. Anne, St. Mary Magdalene and St. Barbara, to defend him at the hour of death and be intercessors for the remission of his sins and salvation of his soul.
Desires to be buried at Westminster , where he was crowned, where lie buried many of his progenitors, especially his granddame Katharine wife to Henry V and daughter to Charles of France , and whereto he means shortly to translate the remains of Henry IV in the chapel which he has begun to build (giving full directions for the placing and making of his tomb and finishing of the said chapel according to the plan which he has "in picture delivered" to the prior of St. Bartholomew's beside Smithfield, master of the works for the same); and he has delivered beforehand to the abbot, &c., of Westminster, 5,000l., by indenture dated Richmond, 13 April 23 Hen VII, towards the cost.
His executors shall cause 10,000 masses in honor of the Trinity, the Five Wounds, the Five Joys of Our Lady, the Nine Orders of Angels, the Patriarchs, the Twelve Apostles and All Saints (numbers to each object specified) to be said within one month after his decease, at 6d. each, making in all 250l, and shall distribute 2,000l. in alms; and to ensure payment he has left 2,250l. with the abbot, &c., of West-minster, by indenture dated _ (blank) day of _ (blank) in the _ (blank) year of his reign.
His debts are then to be paid and reparation for wrongs made by his executors at the discretion of the following persons, by whom all complaints shall be tenderly weighed, viz, the abp of Canterbury (59) , Richard bp of Winchester (61) , the bps of London and Rochester (39) , Thomas Earl of Surrey (66) , Treasurer General, George Earl of Shrewsbury (41) , Steward of the House, Sir Charles Somerset Lord Herbert (49) , Chamberlain, the two Chief Justices, Mr. John Yong (44) , Master of the Rolls, Sir Thos. Lovell (30) , Treasurer of the House, Mr. Thomas Routhall, secretary, Sir Ric Emson (59) , Chancellor of the Duchy, Edm. Dudley (47) , the King's attorney at the time of his decease, and his confessor, the Provincial of the Friars Observants, and Mr. William Atwater, dean of the Chapel, or at least six of them and three of his executors.
His executors shall see that the officers of the Household and Wardrobe discharge any debts which may be due for charges of the same.
Lands to the yearly value of above 1,000 mks have been "amortised" for fulfilment of certain covenants (described) with the abbey of Westminster.
For the completion of the hospital which he has begun to build at the Savoie place beside Charingcrosse, and towards which 10,000 mks in ready money has been delivered to the dean and chapter of St. Paul's, by indenture dated _ (blank), his executors shall deliver any more money which may be necessary; and they shall also make (if he has not done it in his lifetime) two similar hospitals in the suburbs of York and Coventry.
Certain cathedrals, abbeys, &c., named in a schedule hereto annexed [not annexed now] have undertaken to make for him orisons, prayers and suffrages "while the world shall endure," in return for which he has made them large confirmations, licences and other grants; and he now wishes 6s. 8d. each to be delivered soon after his decease to the rulers of such cathedrals, &c., 3s. 4d. to every canon and monk, being priest, within the same and 20d. to every canon, monk, vicar and minister not being priest. His executors shall bestow 2,000l. upon the repair of the highways and bridges from Windsor to Richmond manor and thence to St. George's church beside Southwark , and thence to Greenwich manor, and thence to Canterbury.
To divers lords, as well of his blood as other, and also to knights, squires and other subjects, he has, for their good service, made grants of lands, offices and annuities, which he straitly charges his son, the Prince (17) , and other heirs to respect; as also the enfeoffments of the Duchy of Lancaster made by Parliaments of 7 and 19 Hen. VII. for the fulfilment of his will.
Bequests for finishing of the church of the New College in Cambridge and the church of Westminster, for the houses of Friars Observants, for the altar within the King's grate (i.e. of his tomb), for the high altar within the King's chapel, for the image of the King to be made and set upon St. Edward's shrine, for the College of Windsor, for the monastery of Westminster, for the image of the King to be set at St. Thomas's shrine at Canterbury, and for chalices and pixes of a certain fashion to be given to all the houses of Friars and every parish church not suitably provided with such.
Bequest of a dote of 50,000l. for the marriage of Lady Mary (13) the King's daughter with Charles Prince of Spain (9) , as contracted at Richmond _ (blank) Dec. 24 Hen. VIII., or (if that fail) her marriage with any prince out of the realm by "consent of our said son the Prince (17) , his Council and our said executors."
On 21 Apr 1509 Henry VII King England and Ireland 1457-1509 (52) died of tuberculosis at Richmond Palace, Richmond, Surrey . His son Henry VIII (17) succeeded as VIII King England and Ireland: Tudor .
21 Apr 1509
Thomas Wriothesley Garter King of Arms -1534 (21)
made a drawing of the death of Henry VII (he wasn't present). The drawing shows those present and in some cases provides their arms by which they can be identified. From top left clockwise:
Richard Foxe Bishop 1448-1528 (61)
Two tonsured clerics
George Hastings 1st Earl Huntingdon 1487-1544 (22)
Richard Weston of Sutton Place 1465-1541 (44)
Richard Clement of Ingham Mote 1482-1538 (27)
Matthew Baker Governor Jersey -1513
John Sharpe of Coggleshall in Essex -1518
Physician holding urine bottle
William Fitzwilliam 1st Earl Southampton 1490-1542 (19) closing the King's eyes.There is doubt as to whether the person shown is William Fitzwilliam 1st Earl Southampton 1490-1542 (19) given his age of around nineteen at the King's death. He appears to be holding a Staff of Office although sources state he wasn't appointed Gentleman Usher, in which role he would have a Staff of Office, until Henry VIII's Coronation in Jun 1509.
The Arms below him are Quarterly 1 Lozengy argent & gules (FitzWilliam); 2 Arms of John Neville 1st Marquess Montagu 1431-1471 3 Quartered 1 possibly Plantagent with white border ie Holland 2 and 3 Tibetot, 4 Unknown, overall a star for difference indicating third son. William Fitzwilliam 1st Earl Southampton 1490-1542 (19) was his father's third son, and his mother was Lucy Neville 1468-1534 (41) daughter of John Neville 1st Marquess Montagu 1431-1471 . It appears correct that the person represented is William Fitzwilliam 1st Earl Southampton 1490-1542 (19) . William Fitzwilliam 1st Earl Southampton 1490-1542 (19) was the childhood companion of Henry VIII (17) .
Physician holding urine bottle
24 Jun 1509
Henry VIII (17)
King England and Ireland: Tudor
. Catherine of Aragon (23)
Queen Consort England
Edward Stafford 3rd Duke Buckingham 1478-1521 (31) , Thomas Boleyn 1st Earl Wiltshire, 1st Earl Ormonde 1477-1539 (32) and Thomas Howard 2nd Duke Norfolk 1443-1524 (66) attended. Henry Clifford 1st Earl Cumberland 1493-1542 (16) was knighted. Robert Dymoke 1461-1544 (48) attended as the Kings's Champion. Robert Radclyffe 1st Earl Sussex 1483-1542 (26) was created Knight of the Bath and served as Lord Sewer.
Henry VIII (19)
celebrated the birth of his son by holding a magnificent tournament at
.The challengers included
Henry VIII (19)
who fought as Cuere Loyall, Henry Courtenay 1st Marquess Exeter 1496-1539 (15)
as Bon Vouloir,
Edward Neville 1471-1538 (40)
as Joyeulx Penser,
Thomas Knyvet 1485-1512 (26)
as Valiant Desyr and
Thomas Tyrrell -1551
On Day 1 of the tournament the Answerers included: William Parr 1st Baron Parr Horton 1483-1547 (28) , Henry Grey 4th Earl Kent 1495-1562 (16) , Thomas Cheney 1485-1558 (26) , Richard Blount and Robert Morton .
On Day 2 of the tournament the Answerers included: Richard Tempest of Bracewell 1480-1537 (31) , Thomas Lucy , Henry Guildford 1489-1532 (22) , Charles Brandon 1st Duke Suffolk 1484-1545 (27) , Thomas Boleyn 1st Earl Wiltshire, 1st Earl Ormonde 1477-1539 (34) , Richard Grey , Leonard Grey 1st Viscount Grane 1479-1541 (32) , Thomas Howard 3rd Duke Norfolk 1473-1554 (38) , Edmund Howard 1478-1539 (33) and Henry Stafford 1st Earl Wiltshire 1479-1523 (32) .
On 16 Aug 1513 Henry VIII (22) fought at Thérouanne during the Battle of the Spurs . Henry's army included George Talbot 4th Earl Shrewsbury, 4th Earl Waterford 1468-1538 (45) (commanded), Thomas Grey 2nd Marquess Dorset 1477-1530 (36) , Thomas Brooke 8th Baron Cobham -1529 , Henry Bourchier 2nd Earl Essex, 3rd Count Eu -1540 , John Vere 15th Earl Oxford 1471-1540 (42) and Anthony Wingfield 1487-1552 (25) . John "Tilbury Jack" Arundell 1495-1561 (18) , William Compton 1482-1528 (31) , John Hussey 1st Baron Hussey Sleaford 1465-1537 (48) and William Hussey 1472-1531 (40) was knighted by Henry VII King England and Ireland 1457-1509 . Thomas West 8th Baron De La Warr, 5th Baron West 1457-1525 (56) and Andrew Windsor 1st Baron Windsor 1467-1543 (46) was created as Knight Banneret .
On 25 Dec 1513 John Sharpe of Coggleshall in Essex -1518 was knighted by Henry VIII King England and Ireland 1491-1547 (22) .
In 1515 William Coffin MP 1495-1538 (20) was appointed as Gentleman of the Privy Chamber to Henry VIII King England and Ireland 1491-1547 (23) .
In 1516 Philip Boteler 1492-1545 (23) was appointed as Knight of the Body to Henry VIII King England and Ireland 1491-1547 (24) .
In 1516 Edward Neville 1471-1538 (45) was appointed as Master of the Hounds to Henry VIII King England and Ireland 1491-1547 (24) .
In 1516 Edward Neville 1471-1538 (45) was appointed as Gentleman of the Privy Chamber to Henry VIII King England and Ireland 1491-1547 (24) .
On 18 Feb 1516 Mary Tudor I Queen England and Ireland 1516-1558 was born to Henry VIII (24) and Catherine of Aragon (30) at Palace of Placentia, Greenwich, Kent . Margaret Bourchier 1st Baroness Bryan 1468-1552 (48) was created 1st Baron Bryan .
On 15 Jun 1519 Henry Fitzroy Tudor 1st Duke Richmond and Somerset 1519-1536 was born illegitimately to Henry VIII (27) and Elizabeth "Bessie" Blount Baroness Clinton, Baroness Tailboys 1502-1539 (17) at Augustinian Priory of St Lawrence, Ingatestone, Blackmore, Essex .
Henry VIII (28)
Field of the Cloth of Gold
Thomas Grey 2nd Marquess Dorset 1477-1530 (42) carried the Sword of State.
John Stokesley Bishop London 1475-1539 (45) attended as Henry VIII's chaplain.
Edmund Braye 1st Baron Braye 1484-1539 (36) , Gruffydd ap Rhys ap Thomas Deheubarth 1478-1521 (42) , Anthony Poyntz 1480-1533 (40) , William Coffin MP 1495-1538 (25) , William "Great" Courtenay 1477-1535 (43) , Robert Radclyffe 1st Earl Sussex 1483-1542 (37) , William Paston 1479-1554 (41) , William Denys 1470-1533 (50) , Richard Cecil 1495-1553 (25) , William Parr 1st Baron Parr Horton 1483-1547 (37) , Ralph Neville 4th Earl Westmoreland 1498-1549 (22) , John Mordaunt 1st Baron Mordaunt 1480-1562 (40) , Henry Guildford 1489-1532 (31) , Marmaduke Constable 1480-1545 (40) , William Compton 1482-1528 (38) , William Blount 4th Baron Mountjoy 1478-1534 (42) , Thomas Cheney 1485-1558 (35) , Henry Willoughby 1451-1528 (69) , John Rodney 1461-1528 (59) , John Marney 2nd Baron Marney 1484-1525 (35) , William Sidney 1482-1554 (38) , John Vere 14th Earl Oxford 1499-1526 (20) , John Vere 15th Earl Oxford 1471-1540 (49) , Edmund Walsingham 1480-1550 (40) , Thomas West 8th Baron De La Warr, 5th Baron West 1457-1525 (63) , Robert Willoughby 2nd Baron Willoughby Broke, 10th Baron Latimer 1472-1521 (48) , Anthony Wingfield 1487-1552 (32) and Thomas Brooke 8th Baron Cobham -1529 attended.
William Carey 1500-1528 (20) jousted. Margaret Dymoke 1500-1545 (20) attended.
William Sandys 1st Baron Sandys Vyne 1470-1540 (50) organised.
Jane Parker Viscountess Rochford 1505-1542 (15) attended.
Thomas Wriothesley Garter King of Arms -1534 (32) was present.
17 May 1521
Edward Stafford 3rd Duke Buckingham 1478-1521 (43)
for no specific reason other than his having a significant amount of Plantagenet blood and was, therefore, considered a threat by
Henry VIII (29)
. He was posthumously attainted by Act of Parliament on 31 July 1523, disinheriting his children.
He was buried at St Peter's Church, Britford, Wiltshire .
On May 1522 Henry VIII (30) met with Charles Habsburg-Spain V Holy Roman Emperor 1500-1558 (22) at Dover, Kent . William Blount 4th Baron Mountjoy 1478-1534 (44) , William Compton 1482-1528 (40) , John Marney 2nd Baron Marney 1484-1525 (37) and John Vere 15th Earl Oxford 1471-1540 (51) were present. Henry VIII Meeting with Charles V Holy Roman Emperor
In 1525 William Fitzwilliam 1st Earl Southampton 1490-1542 (35) was appointed as Treasurer of the Royal Household to Henry VIII King England and Ireland 1491-1547 (33) .
Around 1525 Unknown Artist .Netherlands.Portrait of Henry VIII King England and Ireland 1491-1547 (33) .
18 Jun 1525
Henry Fitzroy (6)
, Henry VIII's illegitimate son, was created
Duke of Richmond and Somerset
Earl Lincoln (7C 1525)
by his father
Henry VIII (33)
Henry Clifford 1st Earl Cumberland 1493-1542 (32) was created 1st Earl Cumberland , Warden of the West Marches and Governor Carlisle Castle .
Henry Courtenay 1st Marquess Exeter 1496-1539 (29) was created 1st Marquess Exeter (1C 1525) .
Thomas Manners 1st Earl Rutland 1492-1543 (33) was created 1st Earl Rutland (3C 1525) .
Henry Percy 5th Earl Northumberland 1478-1527 (47) carried the Sword of State. Thomas More Chancellor Speaker 1478-1535 (47) read the patents of nobility. Charles Brandon 1st Duke Suffolk 1484-1545 (41) , Thomas Grey 2nd Marquess Dorset 1477-1530 (47) ,
Thomas Howard 3rd Duke Norfolk 1473-1554 (52) , William Fitzalan 18th Earl Arundel 1476-1544 (49) and John Vere 14th Earl Oxford 1499-1526 (25) attended.
Around 18 Jun 1525 Henry Clifford 2nd Earl Cumberland 1517-1570 (8) and Eleanor Brandon 1519-1547 (6) were married (he was her half third-cousin) at Bridewell Palace .
In 1526 William Sandys 1st Baron Sandys Vyne 1470-1540 (56) was appointed as Lord Chamberlain of the Household to Henry VIII King England and Ireland 1491-1547 (34) .
On 04 Mar 1526 Henry Carey 1st Baron Hunsdon 1526-1596 was born to William Carey 1500-1528 (26) and Mary Boleyn 1499-1543 (27) .There is speculation among historians that his father may actually have been Henry VIII (34) who was known to have had an affair with Mary Boleyn 1499-1543 (27) although the precise dates are unknown.
On 19 Oct 1526 William Willoughby 11th Baron Willoughby Eresby 1482-1526 (44) died at Parham, Suffolk . He was buried at All Saints Church, Mettingham, Bungay, Suffolk . His daughter Catherine Willoughby Duchess Suffolk 1519-1580 (7) succeeded as 12th Baron Willoughby Eresby . Catherine Willoughby Duchess Suffolk 1519-1580 (7) became a ward of Henry VIII (35) .
Before 1528 Thomas Morgan 1482-1538 (45) was appointed Esquire to the Body to Henry VIII King England and Ireland 1491-1547 (36)
On 01 Mar 1528 Henry VIII (36) sold the wardship of Catherine Willoughby Duchess Suffolk 1519-1580 (8) to Charles Brandon 1st Duke Suffolk 1484-1545 (44) who subsequently married her.
In Oct 1529 Thomas More Chancellor Speaker 1478-1535 (51) was appointed Lord Chancellor by Henry VIII King England and Ireland 1491-1547 (38)
08 Dec 1529
Henry VIII King England and Ireland 1491-1547 (38)
created two new Earldoms ...
Thomas Boleyn 1st Earl Wiltshire, 1st Earl Ormonde 1477-1539 (52) was created 1st Earl Wiltshire (6C 1529) , 1st Earl Ormonde (6C 1529) , 1st Viscount Rochford . Elizabeth Howard Countess Wiltshire, Countess Ormonde 1480-1538 (49) by marriage Countess Wiltshire (6C 1529) , Earl Ormonde (6C 1529) .
George Hastings 1st Earl Huntingdon 1487-1544 (42) was created 1st Earl Huntingdon (7C 1529) . Anne Stafford Countess Huntingdon 1483-1544 (46) by marriage Countess Huntingdon (7C 1529) .
In 1530 the Prior of Llanthony Priory, Llanthony, Vale Ewyas, Monmouthshire, South-East Wales sent cheese, carp and baked lamphreys to Henry VIII (38) at Windsor, Berkshire
01 Sep 1532
Anne Boleyn Queen Consort England 1501-1536 (31)
Henry VIII (41)
performing the investiture at
Windsor Castle, Windsor, Berkshire
Thomas Boleyn 1st Earl Wiltshire, 1st Earl Ormonde 1477-1539 (55) , Charles Brandon 1st Duke Suffolk 1484-1545 (48) , Thomas Howard 3rd Duke Norfolk 1473-1554 (59) , Eleanor Paston Baroness Ros Helmsley 1495-1551 (37) , Jean Dinteville , Edward Lee Archbishop York 1482-1544 (50) , John Stokesley Bishop London 1475-1539 (57) were present.
Stephen Gardiner Bishop Winchester 1483-1555 (49) read the Patent of Creation.
Mary Howard Duchess Richmond and Somerset 1519-1557 (13) carried Anne's (31) train replacing her mother Elizabeth Stafford Duchess Norfolk 1497-1558 (35) who had been banished from Court. Anne (31) she were cousins.
In 1533 Henry VIII (41) granted William Fitzwilliam 1st Earl Southampton 1490-1542 (43) to inpark 600 acres of meadow, pasture and wood and build fortifications at Cowdray House, Cowdray, Midhurst, Sussex .
On 25 Jan 1533 Henry VIII (41) and Anne Boleyn Queen Consort England 1501-1536 (32) were married by Rowland Leigh Bishop Coventry and Lichfield (46) at Whitehall Palace . Anne Savage Baroness Berkeley 1515-1564 (17) , Thomas Heneage 1480-1553 (53) and Henry Norreys 1482-1536 (51) witnessed.
In Mar 1533 Parliament enacted the Statute in Restraint of Appeals by which Henry VIII (41) forbade all appeals to the Pope in Rome on religious or other matters, making the King the final legal authority in all such matters in England, Wales, and other English possessions.Considered to be a cornerstone of the English Reformation.
In Mar 1534 Parliament enacted the First Act of Succession . The Act made Mary Tudor I Queen England and Ireland 1516-1558 (18) illegitimate and Elizabeth Tudor I Queen England and Ireland 1533-1603 the heir to King Henry VIII (42) .The Act also required all subjects, if commanded, to swear an oath to recognize this Act as well as the king's supremacy.
22 Jun 1535
Thomas Audley 1st Baron Audley Waldon 1488-1544 (47)
presided over the
of John Fisher Bishop of Rochester 1469-1535 (65)
and Thomas More Chancellor Speaker 1478-1535 (57)
both of whom refused to take the Oath Of Supremacy.The judges including Anne Boleyn's father
William Boleyn 1451-1505
Thomas Boleyn 1st Earl Wiltshire, 1st Earl Ormonde 1477-1539 (58)
Thomas Cromwell 1st Earl Essex 1485-1540 (50)
Richard Rich 1st Baron Rich Leez 1497-1567 (38)
as a witness who testified that Thomas More Chancellor Speaker 1478-1535 (57)
had denied that the King was the legitimate head of the Church.However, Richard Southwell 1503-1564 (32)
to the contrary.
The jury took, somewhat unsurprisingly, only fifteen minutes to conclude Thomas More Chancellor Speaker 1478-1535 (57) was guilty. He was sentenced to be hanged, drawn and quartered; the King (43) commuted this to beheading.
In 1536 the North rose against religious policies of Henry VIII (44) . Thomas Audley 1st Baron Audley Waldon 1488-1544 (48) condemned the traitors. John Neville 3rd Baron Latimer Snape 1493-1543 (42) was implicated. Thomas Howard 3rd Duke Norfolk 1473-1554 (63) , Henry Howard 1516-1547 (20) and Edmund Knyvet 1508-1551 (28) undertook the suppression of the rebels.
On 24 Jan 1536 Henry VIII (44) held a tournament at the Palace of Placentia, Greenwich, Kent some two weeks after Catherine of Aragon's death. Henry VIII (44) was badly injured causing him to suffer with a wound in his leg thereafter.It is reported the injury caused a change in Henry's character thereafter becoming increasingly despotic.
On 29 Jan 1536 Catherine of Aragon was buried at Peterborough Cathedral, Peterborough, Cambridgeshire at a service for a Princess rather than Queen. Eleanor Brandon 1519-1547 (17) was Chief Mourner. Henry VIII (44) refused their daughter Henry VIII (44) permission to attend. On the same day Anne Boleyn Queen Consort England 1501-1536 (35) miscarried a boy; regarded as the start of Anne's demise.
19 May 1536
Anne Boleyn Queen Consort England 1501-1536 (35)
Tower Green, Tower of London, Tower Hill, City of London
. Unusually a sword was used. Her execution was witnessed by
Charles Brandon 1st Duke Suffolk 1484-1545 (52)
Catherine Carey 1524-1569 (12)
Henry Fitzroy Tudor 1st Duke Richmond and Somerset 1519-1536 (16)
Anne's last words, as reported by Edward Hall, were as follows:
Good Christian People, I am come hither to die, for according to the law, and by the law I am judged to die, and therefore I will speak nothing against it. I am come hither to accuse no man, nor to speak any thing of that, whereof I am accused and condemned to die, but I pray God save the king and send him long to reign over you, for a gentler nor a more merciful prince was there never; and to me was he ever a good, a gentle and sovereign lord. And if any person will meddle of my cause, I require them to judge the best. And thus I take my leave of the world and of you all, and I heartily desire you all to pray for me. O Lord, have mercy on me, to God I commend my soul.
To Christ I commend my soul, Jesu receive my soul.
She was buried at St Peter ad Vincula Church, Tower of London, Tower Hill, City of London
was an attempt to overthrow
Henry VIII (47)
and replace him with Henry Courtenay 1st Marquess Exeter 1496-1539 (42)
, grandson of Edward VI, Henry's first cousin. Thomas Audley 1st Baron Audley Waldon 1488-1544 (50)
John Vere 15th Earl Oxford 1471-1540 (67)
sat in judgement.
Thomas Fiennes 9th Baron Dacre Gilsland 1515-1541 (23)
The Exeter Conspiracy was an attack by Henry VIII (47) on Cardinal Reginald Pole 1500-1558 (38) . He, Cardinal Pole, was safe in Rome. Instead Henry destroyed mnost of the Pole family in England.
On Sep 1538 Henry VIII (47) ordered Thomas of Becket's shrine at Canterbury Cathedral, Canterbury, Kent to be destroyed. Both an attack on the Catholic Church, and a means to generate revenue; Thomas' shrine was covered in precious metals and stones. Two huges chests, each requiring six men to carry, were required to remove the treasure.
16 Nov 1538
Henry VIII (47)
Thomas of Becket's reputation, removing his canonisation at the same time.
Henry enacted legislation as follows:
ITEM, for as moche as it appereth now clerely, that Thomas Becket , sometyme Archbyshop of Canterburie , stubburnly to withstand the holsome lawes establyshed agaynste the enormities of the clergie, by the kynges highness mooste noble progenitour, kynge HENRY the Seconde , for the common welthe, reste, and tranquillitie of this realme, of his frowarde mynde fledde the realme into Fraunce, and to the bishop of Rome, mayntenour of those enormities, to procure the abrogation of the sayd lawes, whereby arose moch trouble in this said realme, and that his dethe, which they untruely called martyrdome, happened upon a reskewe by him made, and that, as it is written, he gave opprobrious wordes to the gentyllmen, whiche than counsayled hym to leave his stubbernesse, and to avoyde the commocion of the people, rysen up for that rescue. And he not only callyd the one of them bawde, but also toke Tracy by the bosome, and violently shoke and plucked hym in suche maner, that he had almoste overthrowen hym to the pavement of the Churche; so that upon this fray one of their company, perceivynge the same, strake hym, and so in the thronge Becket was slayne. And further that his canonization was made onely by the bysshop of Rome, bycause he had ben a champion of maynteyne his usurped auctoritie, and a bearer of the iniquitie of the clergie, for these and for other great and urgent causes, longe to recyte, the Kynge’s Maiestie, by the advyse of his counsayle, hath thought expedient to declare to his lovynge subjectes, that notwithstandynge the sayde canonization, there appereth nothynge in his lyfe and exteriour conversation, wherby he shuld be callyd a sainct, but rather estemed to have ben a rebell and traytour to his prynce. Therefore his Grace strayghtly chargeth and commandeth that from henseforth the sayde Thomas Becket shall not be estemed, named, reputed, nor called a sayncte, but bysshop Becket; and that his ymages and pictures, through the hole realme, shall be putte downe, and avoyded out of all churches, chapelles, and other places; and that from henseforthe, the dayes used to be festivall in his name shall not be observed, nor the service, office, antiphoners, colletes, and prayers, in his name redde, but rased and put out of all the bokes.”
1540 Hans Holbein The Younger 1497-1543 (43) .Miniature portrait of Henry VIII King England and Ireland 1491-1547 (48) .
On 06 Jan 1540 Henry VIII (48) and Anne of Cleves (24) were married by Thomas Cranmer Archbishop Canterbury 1489-1556 (50) at Palace of Placentia, Greenwich, Kent . Anne of Cleves (24) was crowned Queen Consort England .
On 01 Nov 1541 Henry VIII (50) received a warrant for Catherine's arrest from Archbishop Cranmer at Chapel Royal, Hampton Court Palace, Richmond, Surrey .
On 13 Feb 1542 Catherine Howard (19) and Jane Parker Viscountess Rochford 1505-1542 (37) were beheaded at Tower Green . Henry Howard 1516-1547 (26) attended. They were both buried at St Peter ad Vincula Church, Tower of London, Tower Hill, City of London .
On 20 Jul 1542 Henry VIII King England and Ireland 1491-1547 (51) purchased the premises at Stanmore, with a windmill, lands in Great and Little Stanmore and Harrow, others in Essex, and also the "premises in the parish of St Sepulchre in the ward of Faryngton Without" from Geoffrey Chamber of Stanmore in Middlesex -1550.
On 12 Jul 1543 Henry VIII (52) and Catherine Parr (30) were married at Hampton Court Palace . Catherine Parr Queen Consort England 1512-1548 (30) was crowned Queen Consort England . Margaret Douglas Countess Lennox 1515-1578 (27) attended.
23 Dec 1543
Henry VIII (52)
new wife's (31)
brother and uncle at ceremony in the
Presence Chamber, Hampton Court Palace, Richmond, Surrey
Henry Grey 1st Duke Suffolk 1517-1554 (26)
Edward Stanley 3rd Earl Derby 1509-1572 (34)
were present. Christopher Barker Garter King of Arms -1550
read the Patents.
William Parr 1st Baron Parr Horton 1483-1547 (60) was created 1st Baron Parr Horton . William was sixty with five daughters. He died four years later at which time the Barony became extinct.
William Parr 1st Marquess Northampton 1512-1571 (31) was created 1st Earl Essex (7C 1543) . His estranged wife Anne Bourchier 7th Baroness Bourchier 1517-1571 (26) was daughter of the last Earl of Essex of the Fifth Creation . A somewhat curious choice given his wife had eloped the year previous year with John Lyngfield, the prior of St. James's Church, in Tanbridge, Surrey, by whom she had an illegitimate child.
On 24 Apr 1545 Henry Wriothesley , the future 2nd Earl Southamption, was christened at St Andrew's Church, Holborn, Middlesex . His godparents were Henry VIII (53) , Henry's daughter Mary Tudor (29) and Charles Brandon 1st Duke Suffolk (61) .
30 Dec 1546
Henry VIII (55)
made his last revision to his will signed using the Dry Stamp that was used increasingly commonly. The will confirmed the succession as
Edward VI King England and Ireland 1537-1553 (9)
Mary Tudor I Queen England and Ireland 1516-1558 (30)
Elizabeth Tudor I Queen England and Ireland 1533-1603 (13)
The will appointed sixteen executors: Anthony Browne 1500-1548 (46) , Thomas Cranmer Archbishop Canterbury 1489-1556 (57) , Anthony Denny 1501-1549 (45) , John Dudley 1st Duke Northumberland 1504-1553 (42) , William Herbert 1st Earl Pembroke 1501-1570 (45) , Edward Montagu 1485-1557 (61) , Edward North 1st Baron North 1496-1564 (50) , William Paget 1st Baron Paget Beaudasert 1506-1563 (40) , William Paulet 1st Marquess Winchester 1483-1572 (63) , John Russell 1st Earl Bedford 1485-1555 (61) , Edward Seymour 1st Duke Somerset 1500-1552 (46) , Cuthbert Tunstall Bishop of Durham 1474-1559 (72) and Thomas Wriothesley 1st Earl Southampton 1505-1550 (41) .
On 16 Feb 1547 Thomas Wriothesley 1st Earl Southampton 1505-1550 (41) was created 1st Earl Southampton (2C 1547) in accordance with Henry VIII 's will for which he was nominated executor.Jane Cheney Countess Southampton by marriage Countess Southampton (2C 1547) .
On 16 Feb 1547 Henry VIII was buried in the Henry VIII Vault, Quire, St George's Chapel, Windsor Castle, Windsor, Berkshire . John Gage Lord Chamberlain 1479-1556 (67) attended.
03 Aug 1553
Mary Tudor I Queen England and Ireland 1516-1558 (37)
made her formal entrance into London.
The Diary of Henry Machyn, Citizen and Merchant-Taylor of London, 1550-1563, describes the event:
The third day of August, the Queen came riding to London and so to the Tower. She made her entrance at Aldgate , which was hanged with a great number of streamers hanging about the said gate; and all the streets into Leadenhall and unto the Tower were laid with gravel, and all the crafts of London stood in a row, with their banners and streamers hanging over their heads. Her Grace came, preceded by the Mayor of London carrying the mace and the Earl of Arundel carrying the sword, and all the trumpets blowing. After the Queen came the Lady Elizabeth (19) , and after her the Duchess of Norfolk (56) , and after her the Marchioness of Exeter and other ladies. And after them the aldermen, and then the guard with bows and javelins, and all the rest who departed from Aldgate in green and white, and red and white, and blue and green, to the number of three thousand horses and spears and javelins.
Strype’s Complete History of England describes Mary's entrance to the Tower:
There met her as humble supplicants the Duke of Norfolk (80) , who had been a prisoner ever since his son the Earl of Surrey (80) was put to death by King Henry the ; Edward Courtenay (26) , son of the Marquis of Exeter who was executed in the year 1538; Gardiner (70) , deprived of his Bishopric of Winchester about two years before; and the Dowager Duchess of Somerset (56) . They presented themselves on their knees, and Gardiner in the name of them all, made a congratulatory speech to the Queen, who kindly raised them one after another, saluted them, saying they were her own proper prisoners and ordered their immediate discharge. The next day she restored Courtenay (26) to the honor of his family. Gardiner (70) not only obtained his bishopric again but on the 23rd of August following was made Lord Chancellor, even though he had formerly subscribed to the Sentence of Divorce against the Queen’s mother and had written in defense of King Henry’s proceedings.
30 Aug 1654
John Evelyn's Diary 1654 Aug
. Taking leave of my friends, who had now feasted me more than a month, I, with my wife, etc., set our faces toward home, and got this evening to
, passing by a stately palace (Thorpe) of St. John's (one deep in the blood of our good king), built out of the ruins of the Bishop's palace and cloister. The church is exceeding fair, full of monuments of great antiquity. Here lies Queen Catherine
, the unhappy wife of
, and the no less unfortunate
Mary, Queen of Scots
. On the steeple, we viewed the fens of Lincolnshire, now much inclosed and drained with infinite expense, and by many sluices, cuts, mounds, and ingenious mills, and the like inventions; at which the city and country about it consisting of a poor and very lazy sort of people, were much displeased.
Peterborough is a handsome town, and hath another well-built church.
A History of the County of Leicestershire: Volume 5 Gartree Hundred Horninghold
lies seven miles north-east of Market Harborough, Leicestershire and four miles south-west of Uppingham. The parish, which is 1,217 a. in area, extends over the Middle Lias clays which underlie the hills on the borders of Rutland. The soil is chiefly clay and largely devoted to pasture. The road from Hallaton to Uppingham, on which the village stands, crosses the parish from west to east; it is joined at the east end of the village by a road from Great Easton. There are two field tracks, one to Blaston, and one which crosses the road from Hallaton to Allexton and continues to Keythorpe.
Before the Conquest Horninghold was one of a group of estates apparently held by four thegns, Osulf, Osmund, Roulf, and Levrick. In 1086 the vill was said to be held by Robert de Todeni, lord of Belvoir, though it may have been given before this date to Robert's priory of Belvoir, which had been founded in 1076. At the beginning of the 12th century it was farmed by William D'Aubigny . Horninghold formed part of the original endowment of the priory and remained in its possession until the Dissolution. It was confirmed to the priory at various times during the Middle Ages.
At the Dissolution the manor passed to the Crown, and in 1545 Henry VIII licensed Edward Elrington and Humphrey Metcalfe , to whom he had previously sold it, to alienate the manor and the rest of the former priory's property in the parish to John Beaumont and Henry Alycock. There was a lease of the manor outstanding for 41 years from 1531 which had been made by Belvoir Priory to Anthony Bewell, the priory's bailiff. On Beaumont's forfeiture the manor once more passed to the Crown, and in 1553 it was purchased for £566 by Edward Griffin , the Attorney-General, whose family owned the nearby manor of Gumley. In 1590 William Turpin of Knaptoft -1617 , whose father had owned land in Horninghold, purchased the manor from Edward Griffin's heir. Turpin was knighted in 1603 and died in 1617; his widow held the manor until her death about the end of 1633, and was succeeded by her daughter Elizabeth , who married Sir John Pretyman of Loddington (64) .
The estate was settled upon their eldest son John and his wife Margaret on their marriage in 1649. John Pretyman died in 1658 leaving his widow as owner of the estate, which she brought to her second husband Sir John Heath, the second son of Sir Robert Heath of Brasted Place (Kent) and M.P. for Clitheroe (Lancs.) from 1661 to 1679. She died in 1676 and the available evidence suggests that Horninghold manor did not descend to her daughter and heir. It appears to have been sold by Heath to Sir Edward Hungerford (43) , who was in possession by 1676 and presented to the living. Thereafter the manorial descent is lost. Sir Edward Hungerford died in 1711, but it is by no means certain that he could or would have retained the manor of Horninghold for more than a few years, for his extravagance was notorious and he is said to have disposed of more than thirty manors during his lifetime.
Richard Jerningham -1526 was appointed as Gentleman of the Privy Chamber to Henry VIII King England and Ireland 1491-1547 .
. in chief . The augmentation was granted by Henry VIII King England and Ireland 1491-1547 at the time of his creation as Earl of Rutland in recognition of his descent in the maternal line from Richard 3rd Duke York 1411-1460 .
Thomas Paston 1515-1550 was appointed Gentleman of the Privy Chamber to Henry VIII King England and Ireland 1491-1547 .
Thomas Heneage 1480-1553 was appointed as Groom of the Stool to Henry VIII King England and Ireland 1491-1547 .
Paternal Family Tree: Tudor
Maternal Family Tree: Sueva Orsini 1360-1430
Descendants Family Trees:
Kings Wessex: Great x 19 Grand Son of Aethelwulf King Wessex -858
Kings Gwynedd: Great x 10 Grand Son of Gruffudd ap Cynan King Gwynedd 1055-1137
Kings Seisyllwg: Great x 15 Grand Son of Hywel "Dda aka Good" King Seisyllwg, King Deheubarth 880-950
Kings Powys: Great x 10 Grand Son of Maredudd ap Bleddyn King Powys 1047-1132
Kings England: Son of Henry VII King England and Ireland 1457-1509
Kings Scotland: Great x 12 Grand Son of Malcolm III King Scotland 1031-1093
Kings Franks: Great x 10 Grand Son of Louis VII King Franks 1120-1180
Kings France: Great x 2 Grand Son of Charles "Beloved, Mad" VI King France 1368-1422
Father: Henry VII King England and Ireland 1457-1509 Great x 3 Grandson of Edward III King England 1312-1377
GrandFather: Edmund Tudor 1st Earl Richmond 1430-1456 Great x 5 Grandson of Edward "Longshanks" I King England 1239-1307
Great GrandFather: Owen Tudor 1400-1461 Great x 4 Grandson of Edward "Longshanks" I King England 1239-1307
Great x 2 GrandFather: Maredudd Tudor 1360-1406 Great x 3 Grandson of Edward "Longshanks" I King England 1239-1307
Great x 3 GrandFather: Tudur ap Goronwy Tudor -1367
Great x 3 GrandMother: Marged verch Thomas -1340 Great x 2 Granddaughter of Edward "Longshanks" I King England 1239-1307
Great x 3 GrandMother: Joanna Bourbon Queen Consort France 1338-1378 Great x 3 Granddaughter of Henry III King England 1207-1272
Great x 2 GrandMother: Isabeau Wittelsbach Queen Consort France 1370-1435 Great x 6 Granddaughter of Henry "Curtmantle" II King England 1133-1189
Great x 3 GrandFather: Stephen "Magnificient, Fop" Wittelsbach III Duke Bavaria 1337-1413 Great x 5 Grandson of Henry "Curtmantle" II King England 1133-1189
Great x 3 GrandMother: Taddea Visconti Duchess Bavaria 1351-1381
GrandMother: Margaret Beaufort Countess Richmond 1443-1509 Great x 2 Granddaughter of Edward III King England 1312-1377
Great GrandFather: John Beaufort 1st Duke Somerset 1403-1444 Great Grandson of Edward III King England 1312-1377
Great x 2 GrandFather: John Beaufort 1st Marquess Somerset, 1st Marquess Dorset 1373-1410 Grandson of Edward III King England 1312-1377
Great x 3 GrandFather: John of Gaunt 1st Duke Lancaster 1340-1399 Son of Edward III King England 1312-1377
Great x 3 GrandMother: Katherine Roet Duchess Lancaster 1350-1403
Great x 2 GrandMother: Margaret Holland Duchess Clarence 1385-1439 Great x 2 Granddaughter of Edward "Longshanks" I King England 1239-1307
Great x 3 GrandFather: Thomas Holland 2nd Earl Kent 1350-1397 1350-1397 Great Grandson of Edward "Longshanks" I King England 1239-1307
Great GrandMother: Margaret Beauchamp Duchess Somerset 1410-1482 Great x 6 Granddaughter of John "Lackland" I King England 1166-1216
Great x 2 GrandFather: Roger Beauchamp 3rd Baron Beauchamp Bletsoe 1362-1413 Great x 6 Grandson of Henry "Beauclearc" I King England 1068-1135
Great x 3 GrandFather: Roger Beauchamp 2nd Baron Beauchamp Bletsoe 1361-1406 Great x 5 Grandson of Henry "Beauclearc" I King England 1068-1135
Great x 3 GrandMother: Joanne Clopton Baroness Beauchamp Bletsoe 1352-1382
Great x 2 GrandMother: Edith Stourton Baroness Beauchamp Bletsoe 1390-1441 Great x 5 Granddaughter of John "Lackland" I King England 1166-1216
Great x 3 GrandFather: John Stourton 1334- Great x 4 Grandson of John "Lackland" I King England 1166-1216
Mother: Elizabeth York Queen Consort England 1466-1503 Daughter of Edward IV King England 1442-1483
GrandFather: Edward IV King England 1442-1483 Great x 2 Grandson of Edward III King England 1312-1377
Great GrandFather: Richard 3rd Duke York 1411-1460 Great Grandson of Edward III King England 1312-1377
Great x 2 GrandFather: Richard York 1st Earl Cambridge 1385-1415 Grandson of Edward III King England 1312-1377
Great x 3 GrandFather: Edmund of Langley 1st Duke York 1341-1402 Son of Edward III King England 1312-1377
Great x 2 GrandMother: Anne Mortimer Countess Cambridge 1390-1411 Great x 2 Granddaughter of Edward III King England 1312-1377
Great x 3 GrandFather: Roger Mortimer 4th Earl March, 6th Earl Ulster 1374-1398 Great Grandson of Edward III King England 1312-1377
Great x 3 GrandMother: Eleanor Holland Countess March, Countess Ulster 1370-1405 Great x 2 Granddaughter of Edward "Longshanks" I King England 1239-1307
Great GrandMother: Cecily "Rose of Raby" Neville Duchess York 1415-1495 Great Granddaughter of Edward III King England 1312-1377
Great x 2 GrandFather: Ralph Neville 1st Earl Westmoreland 1364-1425 Great x 5 Grandson of Henry "Curtmantle" II King England 1133-1189
Great x 3 GrandFather: John Neville 3rd Baron Neville Raby 1337-1388 Great x 4 Grandson of Henry "Curtmantle" II King England 1133-1189
Great x 3 GrandMother: Maud Percy Baroness Neville Raby Great x 5 Granddaughter of Henry "Curtmantle" II King England 1133-1189
Great x 2 GrandMother: Joan Beaufort Countess Westmoreland 1379-1440 Granddaughter of Edward III King England 1312-1377
Great x 3 GrandFather: John of Gaunt 1st Duke Lancaster 1340-1399 Son of Edward III King England 1312-1377
Great x 3 GrandMother: Katherine Roet Duchess Lancaster 1350-1403
GrandMother: Elizabeth Woodville Queen Consort England 1437-1492 Great x 6 Granddaughter of Henry III King England 1207-1272
Great GrandFather: Richard Woodville 1st Earl Rivers 1405-1469
Great x 2 GrandFather: Richard Woodville 1385-1441
Great x 3 GrandFather: John Woodville 1341-1403
Great x 2 GrandMother: Joan Bittelsgate 1390-1448
Great x 3 GrandFather: Thomas Bittelsgate 1350-
Great GrandMother: Jacquetta of Luxembourg Duchess Bedford 1415-1472 Great x 5 Granddaughter of Henry III King England 1207-1272
Great x 2 GrandFather: Peter Luxembourg I Count Saint-Pol 1390-1433 Great x 4 Grandson of Henry III King England 1207-1272
Great x 3 GrandFather: John Luxembourg 1370-1397 Great x 3 Grandson of Henry III King England 1207-1272
Great x 3 GrandMother: Margaret Brienne 1365-
Great x 3 GrandMother: Sueva Orsini 1360-1430 Great x 4 Granddaughter of John "Lackland" I King England 1166-1216 | <urn:uuid:35b94972-a12b-4490-8a89-90c36f9c4a79> | {
"dump": "CC-MAIN-2021-04",
"url": "http://www.twentytrees.co.uk/Wales/Person/Henry_VIII_King_England_and_Ireland_1491-1547.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703514046.20/warc/CC-MAIN-20210117235743-20210118025743-00459.warc.gz",
"language": "en",
"language_score": 0.9140337109565735,
"token_count": 11781,
"score": 2.75,
"int_score": 3
} |
Owyhee River Kayaking Expeditionary Trip
The Owyhee River is one of the West's best-kept secrets with canyons unique to this continent. Some refer to them as the "Sistine Chapel" of all canyon lands. Rarely visited, and strictly regulated by the Bureau of Land Management, ROW Adventures is one of the very few outfitters licensed and permitted to run the entire Owyhee River (bridging the states of Nevada, Idaho and Oregon). We have been running the Owyhee since 1980 and offer kayaking trips on the East Fork and South Fork of the Upper Owyhee. During May and early June, these trips may be combined with other raft trips or kayak trips to make 17-days of kayaking and rafting - making it the longest, most remote river trip in the lower 48 states.
Natural and Cultural History: This Owyhee kayak trip will flow through dramatic, multi-colored canyons, reminiscent of places like Bryce and Zion National Parks in southern Utah. Vertical faces of rock, 300 to 1000 feet high, tower above the river. Within the canyon walls mountain juniper grows, as well as sagebrush, willow, hackberry and numerous grasses. Three species of endangered plants are located along the rivers, including the Owyhee River Stickseed, Anderson's buttercup and Inch-High Lupine. In May the desert is in full bloom and dozens of plants are flowering, making a rainbow of color.
There is a great variety of bird life in the canyon. Golden eagles, numerous hawks, falcons, Canada geese, teals, and songbirds are abundant. In all we've spotted over 60 bird species on our trips. We may also see beaver, otter, coyote, deer, muskrat, antelope and desert big horn sheep.
Native Americans have lived in this canyon for at least 9000 years. Numerous petroglyphs and other evidence are found along the river's banks. Recorded history of the region began in 1812 with the first explorations by white men.
The name Owyhee evolved out of a scouting expedition led by Donald McKenzie in 1818. Two Hawaiian Islanders accompanying the party disappeared in the Owyhee River area and by the 1830's the river had become known as the "Owyhee," a derivation of the word Hawaii.
In 1979 the U.S. National Park Service recommended a 192-mile segment of the Owyhee River, from the Duck Valley Indian Reservation in Idaho, to the Owyhee Reservoir in Oregon, be included in the National Wild and Scenic Rivers System. When this was signed into law, the portion of the river east of the Idaho-Oregon boundary was excluded, due to pressure from local mining and grazing interests. The Omnibus Public Lands Management Act of 2009 has now included these areas and ROW Adventures is one of few who are licensed and permitted to kayak in this area. | <urn:uuid:09456528-8ee7-4515-b661-c147fab40296> | {
"dump": "CC-MAIN-2014-10",
"url": "http://www.rowadventures.com/owyhee-river-kayaking-trips.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999654390/warc/CC-MAIN-20140305060734-00023-ip-10-183-142-35.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9549049139022827,
"token_count": 612,
"score": 2.5625,
"int_score": 3
} |
National Park Service Releases Report to Congress on Preservation of Revolutionary War and War of 1812 Sites
WASHINGTON, DC – Most American’s have some knowledge about this Nation’s two wars for Independence, the Revolutionary War and the War of 1812. The Revolutionary War, fought from 1775 to 1784, to gain American Independence from Britain is better known. The War of 1812, fought from 1811 to 1815, to secure American Independence from Britain and promote expansion, is more obscure. But what has become of the battlefields and other areas associated with those conflicts? The National Park Service has the honor of preserving numerous battlefields and areas that are important in understanding each of these conflicts. Many more are preserved by states and local governments or other public or private entities.
As the 225th Anniversary of the Revolutionary War approached in 2000, members of the United States Congress were concerned that the “historical integrity of many Revolutionary War sites and War of 1812 sites” were at risk. In order to determine the significance of the sites and to asses long and short term threats to their integrity, Congress passed The Revolutionary War and War of 1812 Historic Preservation Study Act of 1996 (P.L. 104-333, Section 603; 16 USC Ia-5 Notes).
After years of extensive research and collaboration by all entities involved in preservation of these many important and invaluable sites, the resulting “Report to Congress on the Historic Preservation of Revolutionary War and War of 1812 Sites in the United States” was completed and presented to Congress. “This comprehensive study is an outstanding achievement and will help assure the protection of the many important Revolutionary War and War of 1812 areas nationwide,” said Mary A. Bomar, Director of the National Park Service. “I am proud that the National Park Service produced this landmark study, and that we preserve and protect many of the areas highlighted in the report.”
The Report to Congress on the Historic Preservation of Revolutionary War and War of 1812 Sites in the United States is available by accessing the following link at: http://www.nps.gov/history/hps/abpp/Rev1812Study.htm . It is the most comprehensive list of Revolutionary War and War of 1812 sites taken on by the federal government. The report reflects the results of years of study and was successful in identifying the sites of almost 3,000 events associated with the two wars, including 60 sites within the National Park System. The study is perhaps the broadest federal effort ever undertaken to determine the status of Revolutionary War and War of 1812 resources. “While there is so much literature on the history of these wars, this report will stand out for the contribution it makes to understanding of the location and condition of these sites,” said Robert K. Sutton, Chief Historian, National Park Service.
Through partnerships and a tireless commitment to history and the future, the resources that reflect the roots of American freedom, sacrifice, and sovereignty can be saved for future generations through prompt and focused action today.
The Revolutionary War and War of 1812 are preserved in the National Park System in areas as diverse as Independence Hall in Pennsylvania, Fort McHenry National Monument in Maryland, King’s Mountain National Military Park in South Carolina, Fort Stanwix National Monument in New York, Perry’s Victory and International Peace Memorial in Ohio, George Rogers Clark National Historical Park in Indiana, and Minute Man National Historical Park in Massachusetts.
The National Park Service has developed a web site to highlight many of the sites preserved by the NPS as well as State and local governments and public and private entities. By logging onto the Preserving Revolutionary War and War of 1812 Sites website at: http://nps.gov/pub_aff/rev1812/intro.htm, people can learn of the many special places preserved throughout this nation. In addition to a list of sites, the web site includes information and web links to books and documents related to the revolutionary War and War of 1812. | <urn:uuid:f8216b34-95bf-4a0c-b78e-4bf66aa5af3b> | {
"dump": "CC-MAIN-2016-44",
"url": "http://www.outdoorcentral.com/2008/06/16/national-park-service-releases-report-to-congress-on-preservation-of-revolutionary-war-and-war-of-1812-sites/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988717959.91/warc/CC-MAIN-20161020183837-00121-ip-10-142-188-19.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9383585453033447,
"token_count": 827,
"score": 3.390625,
"int_score": 3
} |
Henry VIII made his last speech to Parliament on December 24, 1545. He was concerned about religious discord in his empire and the effect it was having on the people. Edward Hall (author of Hall's Chronicle) wrote down the speech as he heard it:
Now, since I find such kindness on your part towards me, I cannot choose but to love and favor you, affirming that no prince in the world more favors his subjects than I do you, and no subjects or commons more love and obey their sovereign lord than I see you do me, for whose defense my treasure shall not be hidden, nor if necessity requires it will my person be not risked. But although I with you and you with me are in this perfect love and concord, this friendly amity cannot continue unless both you, my lords temporal, and you, my lords spiritual, and you, my loving subjects, study and take pains to amend one thing which is surely amiss and far out of order, which I most heartily require you to do, which is that charity and concord is not amongst you, but discord and dissension bears rule in every place. St Paul wrote to the Corinthians, in the 12th chapter: ‘Charity is gentle, Charity is not envious, Charity is not proud,’ and so on in that chapter. Behold then what love and charity is amongst you when one calls another heretic and anabaptist and he calls him back papist, hypocrite, and pharisee. Are these tokens of charity amongst you? No, no, I assure you that this lack of charity amongst yourselves will be the hindrance and assuaging of the fervent love between us, as I said before, unless this is healed and clearly made whole. I must judge the fault and occasion of this discord to be partly the negligence of you, the fathers and preachers of the spirituality. For if I know a man who lives in adultery I must judge him to be a lecherous and carnal person; if I see a man boast and brag about himself I cannot but deem him a proud man. I see and hear daily that you of the clergy preach against each other without charity or discretion. Some are too stiff in their old ‘Mumpsimus’, others are are too busy and curious in their new ‘Sumpsimus’. Thus almost all men are in variety and discord, and few or none truly and sincerely preach the word of God as they ought to do. Shall I now judge you to be charitable persons who do this? No, no, I cannot do so. Alas, how can the poor souls live in concord when you preachers sow amongst them in your sermons debate and discord? They look to you for light and you bring them darkness. Amend these crimes, I exhort you, and set forth God’s word truly, both by true preaching and giving a good example, or else, I, whom God has appointed his vicar and high minister here, will see these divisions extinct, and these enormities corrected, according to my true duty, or else I am an unprofitable servant and an untrue officer’. . .
Peter Marshall traces the history of the phrase Henry VIII uses: "Some are too stiff in their old ‘Mumpsimus’, others are are too busy and curious in their new ‘Sumpsimus’." and finds that Desiderius Erasmus was the source. In 1516, Erasmus referred in a letter to an anecdote about "a certain priest" who refused to change the words he prayed when he offered Mass, even though he was told there was a misprint. Where his Missal read "mumpsimus" it should have read "sumpsimus". Erasmus was reacting against those who rejected his corrections of the Vulgate text of the Holy Bible, his Novum Instrumentum. Reformers in England particularly liked the metaphor, using it to attack not just "a certain priest" but all Catholic priests as ignorant and lazy--even though Bishop John Fisher, with the aid of Henry VIII's grandmother Margaret Beaufort--had been working to educate priests better.
But when Henry VIII added to the intrepration of the metaphor, as Marshall calls it, was the attack against those who insist on their "sumpsimus" as being "too busy and curious". Nevertheless, Marshall concludes: "As informed contemporaries would have recognised, the king’s bon mot was not quite so even-handed as it would first appear: sumpsimus is, at worst, pedantry, while mumpsimus is just plain wrong."
What was included in Henry VIII's "mumpsimus"? Certainly not the belief in the Real Presence of Jesus Christ in the Holy Eucharist. Some forms of "sumpsimus" rejected that, but Henry VIII always defended it. Probably not "the priesthood of all believers"--Henry VIII knew that the Sacrifice of the Mass required a sacramental priesthood, ordained and anointed just as he thought he was as king. Probably not some of crucial Lutheran theories of salvation and authority: sola scriptura, sola fidei, sola gratia. Certainly the spiritual and ecclesiastical authority and supremacy of the Holy Roman Pontiff. Henry VIII clearly rejected that part of the old "mumpsimus"!
As Peter Marshall concludes, Henry VIII's last parliamentary speech and its bon mot illustrate the problem: "It would perhaps be difficult to find a more perfect encapsulation of the idiosyncratic religious outlook of Henry VIII and of the complexities and ambiguities of the reforming processes he initiated; processes which, in 1545,he was trying, and failing, to bring under control."
How about this for a summation: "Happy Christmas and try to read my mind on what I believe!"
Illustration credit. This portrait from 1545 depicts Henry VIII, his heir Prince Edward, and Edward's late mother, Jane Seymour. Henry VIII was married to Katherine Parr at the time. | <urn:uuid:1c164a33-f3dc-4bc3-bb5a-5c4600840d53> | {
"dump": "CC-MAIN-2018-09",
"url": "http://supremacyandsurvival.blogspot.com/2016/12/mumpsimus-and-sumpsimus-henry-viii-on.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891813059.39/warc/CC-MAIN-20180220165417-20180220185417-00370.warc.gz",
"language": "en",
"language_score": 0.9712122678756714,
"token_count": 1242,
"score": 2.609375,
"int_score": 3
} |
Mirrored page from. Vakras.com for further research.
The internet should never be the primary source for information, and should always be used with extreme caution. This page has come into existence because I stumbled upon an internet site dedicated to the griffin (alernately: “gryphon”, “gryps”). On that site the author stated that the griffin was adopted by Greeks from the Scythians in the 6th century BC… and the reasoning proffered as a means of supporting this hypothesis was that the author of that page had never encountered the griffin’s role in any Greek myth. This page contains griffins from the Greek world that are one thousand years older than the Scythian-adoption claim made on that site. The earliest depictions of griffins occur on the Greek island of Thera and date to the 17th century BC or earlier. These frescoes were painted some time before the volcano erupted. The date of the eruption of the volcano at Thera has now been dated to 1623 BC (refer: http://topics.nytimes.com/top/news/science/topics/ice/index.html?query=SANTORINI&field=geo&match=exact ; http://en.wikipedia.org/wiki/Thera_eruption
Below (left) portion of griffin wing from a fresco from Avaris, capital of the Hyksos
Below (right) portion of griffin from a fresco fromThera
Scans from AVARIS the capital of the Hyksos. Recent excavations at Tell el-Dab’aby Manfred Bietak, published by the British Museum Press. isbn 0 7 141 09681 Above left, portion of wing from fresco fragments, Avaris, Egypt. Above right, griffin on pre-eruption fresco Thera.Bietak’s book is the publication of his excavation results at Avaris, Egypt. (Amazon Link)
Representations, identical in style to those found on Thera of the griffin – which first appear before the 17th century BC – are those which appear on Minoan signet rings. The example below is a gold ring from Tholos Tomb B at Archanes Krete. It dates to c. 1450-1300 BC (probably earlier). Illus. 68, J & E Sakellarakis, Crete Archanes isbn 9602132345. It shows a griffin accompanying, as in Thera, a goddess.
The griffin accompanying the goddess is a theme which is continued by the Mycenaeans and appears on frescoes found at Mycenae.
Above is a fragment of a wall painting showing a warrior goddess, probably Athena, in the Cult Centre of Mycenae (c. 1300 BC?). Illus. 104, Schofield, The Mycenaeans isbn 9780714120904. The griffin faces backward. This style (with backward facing creatures) was taken to the Levantine coast by the Mycenaean settlers there, the Philistines. The goddess here is not only accompanied by a griffin but wears a boar’s tusk helmet. These helmets appear on another fresco from Thera which (dates before the volcanic eruption). It is these helmets which were worn by the Greeks, and described by Homer, when they besieged Troy.
Below a griffin’s head from a Mycenaean period fresco from Pylos
Plate XXX, B, Greece in the Bronze Age, by Emily Vermeule, published by the University of Chicago Press. isbn 0 226 85354 3
Fragment of a Griffin head from the “Queens Megaron”, Pylos (Greece). 15th(?) century BC.
The three scans of fresco paintings of griffins are all executed in the same style. The one from Thera dates to before 1623 BC, prior to the eruption of the volcano. The one from Avaris, the capital of Hyksos-ruled Egypt, also dates to c. 1600 BC. The griffin is only introduced into Egypt during the Hyksos period. The style of painting is the same as at Aegean Thera. It continued on the Greek mainland after the eruption of the volcano at Thera, but disappeared from Egypt with the expulsion of the Hyksos.
Griffin from Mycenae, dated to before c. 1300 BC.This image is scanned from: Plate XXXVII, A, Greece in the Bronze Age, by Emily Vermeule, published by the University of Chicago Press. isbn 0 226 85354 3
page 128, illus. 119 The Arts in Prehistoric Greece, by Sinclair Hood, published by Pelican History of Art (series). isbn 0 14 056142 0
“An exquisite gold seal found by Carl Blegen in a tomb at Pylos showing a winged griffin (c. 1420 BC).”This image and quote come from: page 79, In Search of the Trojan War, by Michael Wood, published by BBC. isbn 0 563 20579 2
These are some of the most impressive ivory griffins found on Greek soil and are dated to the 14th century BC.The drawing of the cylindrical pyxis “rolled out” is by Piet de Jong.
This image is scanned from: page 132, Minoan and Mycenaean Art, by Reynold Higgins, published by Thames & Hudson. isbn 0 500 20303 2 B&N link Amazon link
page 123, illus. 112, A & B, The Arts in Prehistoric Greece, by Sinclair Hood, published by Pelican History of Art (series). isbn 0 14 056142 0 B&N link Amazon link
(Also appears in Plate XXXVI, B & C, Greece in the Bronze Age, by Emily Vermeule, published by the University of Chicago Press. isbn 0 226 85354 3)
A NOTE ON WHAT PASSES FOR WESTERN SCHOLARSHIP:
The lid to the ivory pyxis is reproduced on page 40 (illus. 44) of A concise history of ANCIENT GREECE to the close of the classical era by Peter Green, published by T&H, isbn 0500450145. Though no Near Eastern examples of the griffin predate this Athenian one, and although all representations of griffins that predate this one are found only on Greek soil, Green writes:
“Mycenaean contacts with the the Orient are shown by the pyxis lid, with its winged griffin, carved from a cross-section of a tusk: from a tomb at Athens (c. 1400 BC).
This ivory carving of a griffin was found at Meggido, in the Levant. It is dated to c. 13th century BC. It is in the same style as the earlier griffins from Greece, and is found in an area which had extensive trade contacts with the Aegean, (Mycenaean-Greek) world. It is staggering to me that this griffin is often attributed to Levantine makers, even though the wing spirals and technique is that of Mycenaean Greeks (whose ivory-carving workshops have been identified archaeologically), and that it is found in an area which has shown archaeological association with “sea-people” (Aegean) settlements in the Levant.
The Elamite Griffin.
Scanned from Figure 35, p. 165 The Lost World of Elam: Re-creation of a Vanished Civilization, by Walther Hinz, published by Sidgwick & Jackson. isbn 0 283 97863 5 (Amazon link) Hinz comments on “…the universally lively imagination evinced by these Elamites… they portrayed imaginary hybrids and bizarre monsters. One of these hybrids is the gryphon (Figure 35)… The gryphon is an original Elamite invention, and while remaining unknown in Mesopotamia, was adopted as a symbol in Egypt.” p. 164
This griffin is the “blue-glazed griffin” recovered in fragments from the ziggurat at Choga Zanbil (Choga Zambil). The Archaeology of Elam: Formation of an Ancient Iranian State. D. T. Potts. published by Cambridge. isbn 0 521 56496 4 (p.226 & p.188. Amazon link)
According to Hinz this ziggurat was founded by Untashnapirisha in the mid 13th century BC (pp.166-167)
Which means that the griffin had been in existence for approximately 400 years in the Aegean before it arrived in Elamite Susa, and is therefore not “an original Elamite invention” as is claimed by Hinz! Its introduction into Egypt was during the Hyksos period.
In the Wikipedia entry on the griffin, the Aegean griffins are entirely omitted, hence creating the impression that the origin of the griffin lies instead in the Near East. What is depicted is a griffiin from Marlik,Iran (pictured below), which dates to between the 12th – 13th centuries BC (c. 1250-1150 BC). The griffins of the Aegean predate the Marlik griffin by 400 years. The Wikipedia page can be found here: http://en.wikipedia.org/wiki/Griffin (Unfortunately I took no screenshot of the Wikipedia page – which had been altered by the time I revisited it.) This image is scanned from: Art of the Ancient Near East, by Pierre Amiet, published by Abrams. ISBN 0810906384 (Amazon link)
The latest incarnation of the Wikipedia page on the griffin endeavours to further misinform anyone who seeks information on the griffin. Below are screenshots of the latest claim (22/7/2008) found there:
The lengths taken to establish and secure a Near Eastern origin of the griffin, despite incontrovertible evidence to the contrary by the Wikipedia, indicates that an agenda other than one intended to inform motivates its editors. What is presented as information on the Wikipedia is, unless corroboration of what is presented on it as “fact” elsewhere, likely to be the fantasy of one of its anonymous editors. What needs to be pointed out is that the creature on the Lagash vase is quadrupedal; it has ventral scales on its underside – these are found only on snakes, not lizards, thus though it is quadrupedal it is not a lizard; it has a snake/lizard head, and not the bird/eagle/vulture beak of a griffin; it has hands with opposable thumbs on its upper limbs and it has bird talons, not the clawed paws of a griffin, for its lower limbs. This is not a griffin! The Lagash vase depicts a quadrupedal taloned and winged horned snake beast. What the guardians on the Lagash vase are intended to depict are the “horned serpent” and/or mushussu-dragon of mesopotamian myth – not a griffin.
The griffin has since travelled the world. This is from a park in Coburg, Melbourne Australia & dated to AD 1922. | <urn:uuid:261c34bd-aa52-4e1e-8d73-d252941dc8dd> | {
"dump": "CC-MAIN-2018-51",
"url": "http://www.stijnvandenhoven.com/new/griffin/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376826892.78/warc/CC-MAIN-20181215152912-20181215174912-00045.warc.gz",
"language": "en",
"language_score": 0.9310933351516724,
"token_count": 2423,
"score": 2.984375,
"int_score": 3
} |
A river is a natural stream of water that flows to another water body such as a lake, ocean or another river. Rivers can be found on every continent but there are at least 18 countries that don’t have any river at all. Russia has the most number of rivers with around 100,000 while the United States has the oldest one which is ironically called the New River.
The world’s longest river is the Nile River at 6,853 kilometers long, followed by the Amazon River at 6400 kilometers in length. The third is the Yangtze River with a length of 6,300 kilometers while the Caño Cristales river in Colombia is referred to as the world’s most beautiful river because of its stunning multiple colors.
Check out our article detailing the “Top 10 Most Beautiful Coral Reefs in the World”
Whenever snow melts quickly or there is an exceptionally heavy downpour, it can result in an ephemeral river. The river’s temporary quick flow can be found in desert areas where flash flooding occurs on a very irregular basis. For most of the year, these rivers’ beds remain dry because the water table is below the surface and therefore, base flow does not happen.
Although they are rare, episodic rivers are formed from run-off channels and found in areas with very dry climates. They may have some permanent areas, and they usually only flow fervently after very heavy rain. In the desert, episodic rivers are very important sources of water. They can also be thought of as seasonal or occasional rivers, and they are known as episodic because they only exist after an episode of a heavy downpour of rain.
Any river that flows through a very dry region is called an exotic river. Most commonly, exotic rivers flow through the desert and are found in places such as Saudi Arabia and the countries that surround it.
The Tigris and Euphrates rivers are perfect examples of exotic rivers, and they flow from the Persian Gulf into northern Iraq. Essentially, a river is called exotic because it stands out on the landscape, so a river that sits in the middle of an otherwise dry, barren region such as a desert is always called an exotic river.
These are rivers that have a semi-permanent nature and are known because of their seasonal flow. During wet periods when runoff is related to both heavy rain or a temporary rise of the water table, the rivers will flow fully. In the summertime, which is considered a dry period, the river bed may be dry because of a falling water table and reduced rainfall.
A mature river is not very steep and has a slow flow when compared to youthful rivers. Youthful rivers have several tributaries feeding into it, and they have less of a sediment deposit than youthful rivers. Examples include the River Thames, the St. Lawrence River, and the Ohio River.
Old rivers have a low gradient and they depend on floodplains. The Nile, Euphrates, and Ganges rivers are perfect examples of old rivers.
Periodic rivers have dry spells throughout the year, especially if they are located in very dry climates where the precipitation is less frequent than the amount of evaporation. Also called nonperennial rivers, they usually flow best right after a heavy rain.
Permanent rivers are those which have water all year around. These are also called perennial rivers, and the water comes mostly from groundwater. Also contributing to the water flow is surface water runoff. The only time these rivers do not have water is during periods of extreme drought, which is seldom.
With a steep gradient and only a few tributaries, youthful rivers flow swiftly and quickly. Examples include the U.S. rivers of Trinity and Brazos and the Ebro River in Spain.
How Rivers are Classified
Biotic classification refers to each river’s ecosystem type, and it includes everything from the purest and cleanest rivers to the most contaminated ones. Biotic classification is broken down into three different zones, described below.
- Crenon zone – This is the area right near the source of the river. In other words, it is the zone where the river gets its start. It is broken down into two main zones – the eucrenon, which encompasses the spring zone; and the hypocrenon, also known as the headstream zone. The Crenon zone has flow speeds that are slower than speeds found in the Rhithron zone, and it has lower oxygen levels and colder temperatures as well.
- Rhithron zone – This is the upstream area of the river, characterized by quicker and more intense flowing speeds. The Rhithron zone has very cool temperatures and a higher oxygen level than the Potamon zone.
- Potamon zone – The Potamon zone is the downstream area of the river. It has slower flowing speeds and is usually warmer than other areas of the river. It also consists of a lower oxygen content and a very sandy river bed.
Experts use the biotic classification system to identify recovery time from and sensitivity to the surrounding habitat’s environmental disturbances. In this example, wetlands are not very sensitive to disturbance but need longer recovery times from environmental disturbances.
Microhabitats, on the other hand, have fast recovery times but are also extremely sensitive to any type of disturbance.
Chronological classifications go by the river’s age, which experts can study by researching its patterns of erosion. They can be classified further into these three types of rivers:
- Mature rivers – Mature rivers have grades that are not very steep, and they have several tributaries, along with a fast discharge speed.
- Old rivers – You can identify old rivers with their floodplains.
- Rejuvenated rivers – These rivers have various gradients, and they are raised by tectonic movement.
- Young rivers – Young rivers flow quickly, have deep instead of wide channels, and no tributaries.
Strahler Stream Order
This classification was developed in 1952 and is based on a number – called the Strahler number – that shows how difficult it is to branch numbers. The numbers range from the first order to the twelfth order.
For example, headwaters belong to the first order, while the Amazon River belongs to the last one. Experts claim that approximately 80% of the world’s rivers belong in the first and second orders. The larger the number, the slower and bigger the river.
Very small streams that have a year-round flow, but no tributaries are classified as first-order streams using the Strahler Stream Order. If two second-order streams flow into one another, a third-order stream is formed, and so on.
Topographic classification involves the shape, physical makeup, and specific features of the river, and all rivers fall into one of the three separate categories that are described below.
- Alluvial rivers –
- Alluvial rivers have floodplains, which is land found next to the river that is flooded quite often; and channels, or river routes, that are formed in sediment that is consolidated loosely.
- Because of flooding, alluvial rivers maintain a primary route filled with water and they form side channels, wetlands, and oxbow lakes. When the water in this type of river rises, the banks are eroded, and the resulting sediment is deposited into the sandbars or floodplains, usually in the middle of the river.
- Alluvial rivers contain habitats that range from shallow to deep pools and very turbulent waters, and they are further broken down into types that include braided, straight, meandering, wandering, and anastomose.
- Bedrock rivers –
- Bedrock rivers are formed when water cuts through new levels of sediment, resulting in the bedrock below.
- They are more commonly found in areas where the earth’s surface has experienced an upward shift – including uplands and mountainous regions.
- Bedrock rivers have a lot of alluvium, or loose sediment and soil. This alluvium moves with the water and shapes and erodes the river while moving along.
- The Colorado River in the United States is a perfect example of a bedrock river.
- Mixed bedrock-alluvial rivers.
- Just as the name implies, these rivers have a characteristic that falls into both of the above categories.
- They usually flow through different bedrock layers and areas with alluvial deposits.
Rivers contribute to healthy ecosystems and provide fresh water, but they can also be important aspects of a recreational activity.
If you’re boating or whitewater rafting, becoming familiar with the whitewater classification is crucial, and the International Scale of River Difficulty has determined six different whitewater classifications, described below.
- Class I: easy river to navigate with fast flow and small waves
- Class II: good for novices and has medium-sized waves, though the rivers can be wide
- Class III: intermediate difficulty level; has irregular waves that are able to turn over a canoe
- Class IV: advanced difficulty level; powerful holes, waves, and restricted passages; this is the type of water that calls for fast boat handling, and there is a risk of injury to swimmers nearby
- Class V: requires an expert because of violent waves and complex passageways; the rapids also continue for long periods of time before you reach calmer pools
- Class VI: extreme difficulty; considered extremely dangerous; these are the types of rapids that come with a high risk of error and are so difficult to maneuver that to be rescued may be impossible
Glossary of River Terms
Alluvial: When something is alluvial, such as a river, it is deposited by running water.
Banks: The sides of a river; or the stream that the water normally flows between.
Bed: The very bottom of a river or other type of water is called the bed.
Brackish: When water is brackish, it is saltier than river water, yet not as salty as seawater.
Channel: This is an area with flowing water and which is confined by banks.
Channeled: When something is channeled, it is grooved or cut deeply.
Delta: A large silty area at the mouth of a river and which then splits into two or more different slow-flowing channels with muddy banks. They are often triangular in shape, and they are the basis for new land to be developed.
Effluent: Effluent is wastewater flowing from a commercial or industrial facility, such as a sewage plant or a factory of some type.
Estuary: The spot where a river meets an ocean or a sea; for example, the spot where fresh water from the river meets salt water from the ocean.
Headwaters: Streams or rivers which are the source of other streams or rivers.
Hydrologic Cycle: Also called the Water Cycle, this term refers to water’s journey as it goes from the land to the sky and back again.
Meander: If something meanders, it follows a winding path.
Mouth: The very end of a river; the point at which a river spills into a large body of water.
Oxbow Lake: This term refers to a stagnant lake developed alongside a winding river. It occurs when a river changes its path due to the erosion of soil because it leaves an abandoned stream channel that is cut off from the rest of the river.
Rill: A very small channel of water. A rill is caused by runoff water that resulted in the erosion of soil.
Riparian: This is a term used to describe an area right next to a body of water; for example, a river, stream, or lake.
River: A large, flowing body of water that usually flows into a larger body of water, such as a sea or an ocean.
Riverbed: The bottom of a river or any other large body of water.
Riverine: This term refers to anything that is formed by, is similar to, or is related to a river.
Runoff: This is simply water than runs into a river or other large body of water, and which is normally caused by drains, sewage lines, or uncontrolled streams. Runoff water can include water from melted snow, storms, or even agricultural irrigation.
Salinity: Salinity refers to the amount of salt found in a body of water.
Sediment: Small pieces of rock or soil that is transported by the wind or even water.
Silt: This is extremely small pieces of soil or rocks, usually no more than 60 micrometers in diameter.
Siltation: The accumulation or deposit of silt, or small pieces of rocks and soil.
Source: The very beginning of a river or stream.
Tributary: A tributary is a river or stream which flows into another stream, lake, or river.
Trunk: The trunk is the main course of a river.
Water Cycle: This is the natural cycle that involves evaporation caused by the sun’s energy, the resulting water vapor condensation, and the next step, which is returning to Earth as rain, sleet, and snow. It is also called the Hydrologic Cycle.
Waterfall: A sudden drop in a river as it moves over a rock cliff. This can happen many different ways, including when the river passes from a hard-rock layer to a soft-rock layer, resulting in the water eroding away the softer form of rock.
Watershed: A piece of land that drains water into a specific lake, stream, or river.
Interesting Facts About Rivers
River of the Dead
There is a river in South Korea called the Imjin River that is also known as the “river of the dead,” because large numbers of dead North Koreans have been seen flowing down the river.
The Massiveness of the Amazon River
If the biggest eight rivers are measured by the volume of water, the Amazon River is larger than all of the other rivers combined.
Expensive River Photographs
A photograph of the Rhein River, named the Rhein II, was auctioned off for $4.3 million.
Safety and Danger Working Together
Juarez, Mexico, is one of the most dangerous cities in the world, but it sits right across the river from El Paso, Texas, which is one of the safest cities in the entire country.
Reversing River Flow?
The Chicago River’s flow direction was actually changed by engineers in the early 1900s, and it remains flowing in that direction today.
Countries without Rivers
There is a total of 17 countries that have no rivers. This includes the country of Saudi Arabia.
In the beginning, diamonds were not actually mined, but instead, they were found at the bottom or alongside of various rivers in India.
Underneath London, you can find almost 20 different hidden rivers.
Tombs in Rivers
At the bottom of the Delaware River sits more than 26,000 tombstones.
Everything Old Is New Again
A river called the New River is actually the oldest river in the United States. It runs through North Carolina, Virginia, and West Virginia. Many experts believe that only the Nile River is older than this one.
The Very Polluted Hudson River
The pollution in the Hudson River is so bad that evolution actually takes place in order to handle all of the toxins found there.
The Mekong River in Thailand is unique because each year, hundreds of fireballs erupt from the surface of the water. Known as the Naga Fireballs, the locals believe a mythical creature called Naga spits fire from the water in order to produce this effect.
Lightning Does Strike Twice
The Catatumbo River in Venezuela gets over 250 lightning strikes per hour. This occurs 10 hours a day for up to 160 days per year. No one can explain why, but it has been happening for centuries.
The Real Effect of Earthquakes
In the early 1800s, the New Madrid earthquake was so powerful that it cracked sidewalks in Washington, D.C., caused church bells to ring in Boston, and even reversed the flow of the Mississippi River.
Swimming Across the River
A man named Martin Strel from Slovenia has swum many different rivers, including the Mississippi River in the United States, the Danube River in Europe, the Amazon River in South America, and the Yangtze River in China.
There is evidence that roughly 2-1/2 miles underneath the Amazon is a hidden river that is as long as the Amazon – over 3,700 miles – and several hundreds of times wider.
Full Moon Effects
For three weeks a year, the full moon results in a tidal wave rolling up the Amazon River once a day and once a night. As a result, waves that are roughly 2-1/2 miles high are found continuously and can be surfed for up to eight miles.
Setting a River on Fire
At least 13 times, the Cuyahoga River in Cleveland has been set on fire.
Two Rivers Coming Together
When two rivers meet, the point at which they meet is called a confluence.
The Long and Short of it
The shortest river in the world is the Roe River, which runs between the Missouri River and Giant Springs, which is near Great Falls, Montana. It is approximately 200 feet long. The longest river in the world is the Nile, which runs for approximately 4,000 miles.
The Largest Rivers in the World
The eight largest rivers in the world are the Mississippi, St. Lawrence, Ohio, Columbia, Yukon, Missouri, Tennessee, and the Mobile.
How Are Rivers Formed?
- Springs and streams, known as headwaters, flow down to form large springs or streams. Stream beds lie between the banks of a river.
- Large streams are known as rivers, while smaller ones are known as rivulets, brooks, tributaries, brooks, and creeks.
- A river’s water source comes from the precipitation of groundwaters and through the release of water which is stored in natural reservoirs such as glaciers.
- All rivers have a starting point, and gravity is important when it comes to the direction that the river flows. In humid areas, this starting point usually comes from springs; however, other starting points include lakes, marshes, and melting glaciers.
- Rain is considered the main source of river water. Rainwater from the hills trickles down the slopes and flows into the riverbed. It usually flows in an evenly distributed manner and is called runoff.
- If the water flow travels a certain distance, it starts to flow in parallel rills and gains momentum with each step. Soon the rills unite and form a stream. After the rills unite with the stream, a brook is formed. Brooks flow into valleys and eventually becomes a river.
- Rivers are extremely important because they have been sources of water, food, and transport since prehistoric times. They supply water to farms that are being cultivated and are the main source of freshwater in the world. In addition, they can even sustain their own food chain.
There are millions of stars that surround our planet; they are tiny twinkling lights that can be seen in our night sky. It is beautiful looking up into the night sky in a deserted area where you can...
When you mention lobster, the word bottom feeder naturally comes up. The association being that lobsters feed on dead things on the ocean floor. This type of thinking is only somewhat true. So are... | <urn:uuid:dd8af7b0-4067-4ec1-ba9b-a0876a8d0eaf> | {
"dump": "CC-MAIN-2021-17",
"url": "https://nayturr.com/types-of-rivers/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038066981.0/warc/CC-MAIN-20210416130611-20210416160611-00523.warc.gz",
"language": "en",
"language_score": 0.954185426235199,
"token_count": 4069,
"score": 3.359375,
"int_score": 3
} |
Cyanotype process - Summary
The cyanotype or blue-print was one of the first photographic printing processes (in some early texts it is called the 'ferroprussiate process') and remains one of the simplest. Its main characteristic, as the name suggests is that it produces blue prints, usually a deep blue colour, although the lighter tones may be slightly more cyan. The colour varies slightly on different papers and with different methods of production, and occasionally cyanotypes were toned to give purplish or brown.
Cyanotypes are prints made on ordinary paper with a matte surface. Photographic images are contact printed from a negative, although a positive working cyanotype process was often used for the production of copies of large plans and engineering drawings (blueprints.) The term cyanotype is sometimes chosen to distinguish the negative image-making process from the technical positive working blue-print.
© Peter Marshall
Under suitable storage conditions, cyanotypes have proven to be extremely stable.
Cyanotype process - Current use
Widely used for teaching alternative photographic processes, and also used by some art photographers. As always, its drawback is the blue colour. | <urn:uuid:e95baa3a-8e49-4dfb-b721-4a523720a1d7> | {
"dump": "CC-MAIN-2020-10",
"url": "http://www.luminous-lint.com/app/technique/cyanotypes/HO/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875144708.87/warc/CC-MAIN-20200220070221-20200220100221-00523.warc.gz",
"language": "en",
"language_score": 0.9517511129379272,
"token_count": 235,
"score": 3.421875,
"int_score": 3
} |
CHICOPEE, Mass. (WWLP) – Thunderstorm damage in Longmeadow was not caused by a tornado.
That determination was made by the National Weather Service Boston office in Norton, MA.
According to Frank Nocera, a meteorologist at NWS Boston, they reviewed radar data and damage photos to determine that straight-line winds were the likely cause.
More specifically a “wet microburst” was most likely the phenomenon to bring such strong winds.
A microburst forms when you have a strong thunderstorm with some drier air intruding higher in the storm.
That drier air works to dry some of the rain that had been lifted higher into the storm. As that water dries and evaporates it cools the air. That cooler air falls and accelerates down.
That air then hits the ground at great speed and is forced outward in a straight line once it reaches the ground.
Winds in a microburst can reach up to 150 mph over a small area up to 2 miles. Some microbursts can cause more damage than weak tornadoes.
This is why you should take severe thunderstorms and severe thunderstorm warnings seriously. | <urn:uuid:c9a6db13-492e-4f37-9caf-f77d99b3051f> | {
"dump": "CC-MAIN-2019-39",
"url": "https://www.wwlp.com/weather/weather-news/nws-straight-line-winds-not-a-tornado-the-cause-for-longmeadow-storm-damage/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573284.48/warc/CC-MAIN-20190918110932-20190918132932-00370.warc.gz",
"language": "en",
"language_score": 0.9504866003990173,
"token_count": 245,
"score": 2.59375,
"int_score": 3
} |
|Let There Be LUX|
|Lynn Yarris, [email protected]|
With femtosecond spectroscopy, scientists are able to study the motion of atoms in molecules during physical, chemical, and biological reactions. With attosecond spectroscopy, they could study the motion of electrons in those atoms during such reactions. Femtosecond and, ultimately, attosecond spectroscopic studies with x-rays are among the many intriguing promises of a large new accelerator facility that scientists at Lawrence Berkeley National Laboratory (Berkeley Lab) have conceptualized, called LUX, for linac-based ultrafast x-ray source.
"LUX is a concept to produce ultrashort x-ray pulses in a highly refined manner for experiments across all fields of the physical, chemical and biological sciences," says Steve Leone, a chemist with Berkeley Lab's Chemical Sciences Division.
Leone and John Corlett, a physicist with Berkeley Lab's Accelerator and Fusion Research Division (AFRD), are two of the leaders spearheading a plan under which Berkeley Lab would design and build LUX as a U.S. Department of Energy national user facility.
The facility would be optimized to produce substantial fluxes of x-rays at pulse lengths ranging from 50 to 200 femtoseconds, with a goal of even shorter pulse lengths in the future. It would benefit many of the researchers now using the bright beams of x-ray and ultraviolet light at the Advanced Light Source (ALS), as well as those who expect to use the nanofabrication capabilities at the forthcoming Molecular Foundry.
"There is a tremendous grass-roots effort growing in ultrafast x-ray science," says Leone, an expert in the study of chemical reaction dynamics, who oversees operation of the chemical dynamics beamline at the ALS. "The experimental interest is both national and international, and LUX will provide the best opportunity to achieve many of the most critical experimental goals."
For molecules and atoms, time is measured in femtosecond increments. A femtosecond is one millionth of a billionth of a second, which is to one second what one second is to about 30 million years. The development of pulsed lasers that flash femtosecond blinks of visible, infrared or ultraviolet light has enabled scientists to take stop-action photo snapshots which can record the dynamics of chemical bond-breaking during molecular reactions.
However, to get analogous photos of the structural changes that take place during these reactions requires x-rays. Otherwise, clear spectroscopic features of atoms are not observable, and structural details of molecules are blurred.
"Lasers perform all of the ultrafast experiments we know of today,
but they can't -- and aren't likely to ever -- produce the substantial
fluxes of x-rays needed for the diffraction experiments that can give
us structural information," says Leone. "LUX is designed to
make femtosecond x-ray diffraction experiments possible."
The primary component of the proposed LUX facility would be a 2.5 GeV (billion electron volt) recirculating superconducting linac, or linear accelerator. This linac would feature a photocathode gun, an injector linac, and a 50-meter-long main linac, with four outward spiraling recirculating rings, plus multiple beam lines and experimental end-stations that would be coupled to lasers. The entire facility would occupy an area of about 150 by 50 meters, bigger than a football field. Construction would take about six years; the estimated total cost of the project is $380 million in 2003 dollars.
"LUX is the latest in Berkeley Lab's history of ultrafast x-ray source developments," says Corlett, who leads the Beam Electrodynamics Group at Berkeley Lab's Center for Beam Physics. Corlett was involved in an earlier experiment in which femtosecond x-ray pulses were generated at the Beam Test Facility off the ALS's 50 MeV linac, and in more recent work in which femtosecond x-ray pulses were obtained off the ALS's primary electron beam. In these previous efforts, however, the x-ray pulses produced were low in flux and tunability.
"A recirculating linac is potentially a brighter source of x-rays than a synchrotron and provides an electron bunch repetition rate that is well suited to pump-probe dynamics experiments," Corlett says. "With LUX, we will use short electron bunch lengths to produce ultrashort x-ray pulses that have high flux per pulse. This will give us spatially and temporally coherent radiation in the soft x-ray regime."
While LUX will be optimized for the production of 50 to 200 femtosecond x-ray pulse-lengths, Leone and Corlett say the prospects for shortening those pulse-lengths are excellent. This would enable LUX to drop down into the realm of the attosecond, a span of time almost incomprehensibly brief. There are more attoseconds in one minute than there have been minutes in the entire history of the universe.
Attoseconds are the time scale of electron motions -- it takes an electron about 24 attoseconds to orbit a hydrogen nucleus. With attosecond x-ray spectroscopy capabilities, it is possible that scientists could steer the motion of electrons and control not only chemical reactions but even the emission of light.
Says Leone, "The x-ray region is where attosecond time dynamics will be achieved. This should have a major impact on the study of electronic dynamics."
Funding for LUX has so far come from within Berkeley Lab, under its Laboratory Directed Research and Development program. The concept of LUX has been presented to members of DOE's Basic Energy Sciences Advisory Committee, where it was well received. Corlett says that at least two to three more years of R&D are needed before a formal project proposal is submitted to DOE.
More about LUX, a recirculating linac user facility | <urn:uuid:249063b1-ccc9-4370-ba9b-0e43942d3f21> | {
"dump": "CC-MAIN-2016-40",
"url": "http://www2.lbl.gov/Science-Articles/Archive/AFRD-LUX.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738661213.28/warc/CC-MAIN-20160924173741-00097-ip-10-143-35-109.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9439873695373535,
"token_count": 1255,
"score": 3.15625,
"int_score": 3
} |
Is an Olympic champion weightlifter fit? To lift weights, definitely. But ever seen one running 10 laps around the track?
Is a world class-marathon runner fit? To run long distances, absolutely. But ever seen one trying to clean more than 50 kilograms?
So I think we agree that for elite athletes fitness is specifically geared towards the tasks in competition, basically being the best in that specific task.
Still we are often speaking about fitness in general terms: somebody can be generally fit or not. True, but this applies to the average healthy person who does not want to win the marathon or become Olympic champion, but wants to have an above average endurance, an above average strength level and so on
Some people aren’t generally fit at all: lying in a hospital bed, coming back from an injury, being morbidly overweight or malnourished. But then we are often looking at pathology or at least sub-optimal functioning, affecting people’s coping with daily life activities.
In my concept we should sharply distinguish three levels of fitness.
1. the specific fitness athletes need to compete at world class level. Mainly a narrow kind of fitness targeted at maximizing specific physical qualities. Improvement of this kind of fitness should be in the hands of the coach (fit to win).
2. generalized fitness: all-round fitness that helps a person to easily cope with a wide range of physical demands in normal life, improve health, prevent early chronic disease and increase the quality of life. Examples: walking the stairs for a couple of floors, lifting a heavy box, go for an active holiday like hiking, being able to do without a car, preventing osteoporosis, playing games with your kids or friends, etc. This kind of fitness could be acquired best with the help of a fitness instructor in a gym or outdoors. Swing kettle bells, run the roads, go to boot camp, or do Pilatus, do TRX, cross fit or circuit training, and do core stability as much as you like (fit to compete or to exercise).
3. low level fitness: again mainly specific targeted at improving limiting factors, strengthen specific muscle groups after surgery, cardiac rehabilitation after a myocardial infarct or bypass. Sometimes people need to improve on a range of qualities, because their situation declines overall. The best person to guide this process is the physical therapist or athletic trainer (fit for daily life).
One of the issues we are dealing with in elite sports is the intrusion of general fitness-trends and concepts into elite sports. In my opinion, we should be more careful with that. I would like to state that there is a very limited application of these ideas coming from the world of fitness and physical therapy for world class athletes.
I am thinking of core stability exercises, TRX, Pilatus, movement screens, kettle bell, cross-fit, boot camp, etc. And don’t get me wrong sometimes I do this with my athletes, as a variation or for fun.
I know I am not going to make a lot of friends saying this (but I already have many friends anyhow). The knowledge and limitations that are necessary for patients or people with physical limitations do not linearly apply to world-class athletes! Their demands, their potentials, their needs and their limitations differ greatly.
You have to understand that there is a large difference in getting people ready to:
1. walk to the track instead of taking the car,
2. to teach them to run,
3. to win an Olympic medal in the 100 meters.
Apart from exceptions I would not do core stability on a regular base with an Olympic medalist just as I would not do 200 kilogram squat with an osteoporosis patient. I would not go Nordic walking with a world record holder in sprints just as I would not try to run hard tempo training with a cardiac patient.
Physical therapists try to convince me that core stability is very important to prevent injuries or to improve performance. But research already proved this not to be the case.
Being able to stand on one leg is as irrelevant for a 22 meter shot-putter or 6 meter pole-vaulter as doing a somersault or turn cartwheel. General screening in my opinion makes no sense at all, that is to say ……for elite athletes.
For me, straight leg raise as a singular test has a no predictive value for hamstring injuries or for high level performance.
Here is an example from real life: who pulls a hamstring in athletics? Not the marathon runner, not the 5 or 10 km runner, not even the 800 or 1500 meter runner, seldom a 400 meter runner, but most hamstring pulls appear at running at near maximum velocity, like 100 meter or 200 meter. I don’t think doing a Cooper test (12 minute run) will tell me anything about the risk of hamstring injury, the velocity is simple too low. I also feel that sit-and-reach also does not show anything. In my experience with lots of Olympic finalists in sprints at least a few things do not tell me the risk of an hamstring injury. They are:
– hamstring length, like in straight leg raise
– hamstring strength compared to quads, measured isometrically (this measurement is angle- specific)
– hamstring strength compared to quads, measured isokinetically (this measurement is velocity-specific)
Yes, one can find differences in quad hamstring/ratios there, but mainly after a hamstring strain from the past, the result of a former strain, not a cause!
Here are the questions one has to ask oneself in the general screening of athletes:
– is the measured limitation directly relevant for performance?
– can it be changed by exercising or training anyhow?
– how much time/effort/money would that cost?
– would that time/effort/money not be better spent more efficiently?
What is the reason for coaches embracing general fitness concepts? Simply: coaches are operating in a complex and diffuse environment, nobody knows the absolute truth and there are many ways leading to Rome. And many coaches feel that having simple linear protocol will help guide them on the way to high performance. Just start with A and next B and go all the end to Z. If A go to 1, if B go to 2, if C go to 3, etc. Yes, you just spelled the alphabet, but did you just write the book of elite performance? Just accept that the road to high performance is long and winding and not always clear to us. Most people who will tell you how to get there, have never been there!.
Your favorite fitness guru will come up with a singular solution for all fitness problems, independent of the level. Unfortunately this simple solution might not be useful.
One of my favourite authors H.L.Mencken wrote: “for every complex problem, there is a simple solution, and it is wrong”. I rather prefer to be doubtful and right, than to be certain and to be wrong.
Most elite athletes will be the exceptions to the general rules anyway.
One of the female sprinters I coached for years was right-out clumsy, she could not catch a ball, make a somersault, or jump over a hurdle. Even worse, handing over or getting a baton was a disaster, so were the common drills for sprinters. Only after many years she managed perform them decently. Did these drills help to improve her running technique? No they didn’t. Bottom line: she wasn’t good at anything just at sprinting, and believe it or not, she was very, very good at that. Her running technique was textbook material (and became textbook material too). That made me wonder about the role and function of general or even specific skills in elite sports.
My idea: if an athlete comes to me and wants to sprint, I make him/her sprint and see what is the case, what is good and what are the limiting factors and then I take it from there, a top down-approach.
Whereas the general trend is to do general testing; see what the limitations are in these general movement patterns and then hope that the sprinting will improve. Yes, hope since there is not a single piece of proof that this bottom-up approach actually works, not in real life, nor in research.
Conclusion: coaches of elite sports should be more critical about all kinds of fitness trends marketed by the fitness industry. | <urn:uuid:ab6debe5-07f4-4c87-9090-7524df1aed7b> | {
"dump": "CC-MAIN-2020-24",
"url": "https://helpingthebesttogetbetter.com/?p=266",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347396300.22/warc/CC-MAIN-20200527235451-20200528025451-00323.warc.gz",
"language": "en",
"language_score": 0.9548691511154175,
"token_count": 1752,
"score": 2.515625,
"int_score": 3
} |
American, born France, 1881–1968
“I am interested in ideas, not merely in visual products.”
Marcel Duchamp was born into a family of artists. He began painting at the age of fifteen, and by the 1910s he was experimenting with both Fauvism and Cubism. In 1913 Duchamp made his first “assisted readymade” by mounting an overturned bicycle wheel on a stool. In 1915 Duchamp moved to New York, where he scandalized again with the exhibition of another readymade, the urinal titled Fountain. While visiting Paris in 1919, he became acquainted with Dada artists, whose provocative tactics he took back to New York.
Let Duchamp inspire your students to:
- Create readymade art by selecting an object, drawing a diagram of how they would display it, and writing a label that explains why it is a work of art.
- Alter a postcard of an iconic work of art with markers, then mount it and write a new title.
- Convey movement in two dimensions by drawing multiple copies of a figure, then arrange them as if they are moving across a page.
- Work in small groups to create a Dada film.
- Cut words out of a magazine, put them in a bag, then remove the words one at a time and glue them down on paper to create a Dada poem.
Book for students:
Mimi’s Dada Catifesto, Shelley Jackson
Who Says It’s Art?, San Francisco Museum of Modern Art
Creating a Readymade Exhibition, San Francisco Museum of Modern Art
Student Guide: Dada, National Gallery of Art
Duchamp, Man Ray, Picabia Resource Pack, Tate Modern
Find out more from The Museum of Modern Art:
Chance Words: Make a Dadaist Poem
Rotary Demisphere (Precision Optics), gallery label text, publication excerpts | <urn:uuid:d135cef3-f46c-4090-ac9d-e1bdb63f928d> | {
"dump": "CC-MAIN-2016-50",
"url": "https://www.high.org/en/Educators/Teacher-Resources/Picasso-To-Warhol-Teacher-Resources/Meet-the-Masters/Marcel-Duchamp.aspx",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698543030.95/warc/CC-MAIN-20161202170903-00109-ip-10-31-129-80.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9320977330207825,
"token_count": 405,
"score": 3.46875,
"int_score": 3
} |
To use the targeted universalism framework, we first need to establish a goal. The goal must be a broadly-shared understanding of a common problem. Once the problem is commonly-held, the collective defines their aspiration. In this case, I would define the problem as: not everyone has enough to eat. Food access depends on a person’s wealth, their dietary needs, and their location.
understanding the problem
If a person, or a person’s family has enough money, they can afford high quality food. If a person’s family has less available wealth, they may have to eat lower-quality food. They may need to accept whatever food they can get for free. It’s not universal. Get it?? That’s half of the plan’s name! The other half comes later.
Food offered at food banks (or even at discount stores) works for some people, but not everyone. People who can’t digest gluten or lactose may find their options limited. Same with people who are vegan, vegetarian, or don’t eat specific animals for religious reasons. People who don’t like the taste or texture of a certain food. For people with money, these are all valid reasons to reject food. But when a person doesn’t have money, society tells them to accept what they can get.
Now imagine a person who lives far from a nearby town or grocery store. Or a person who uses a wheelchair or scooter in a city with uneven or dangerous sidewalks. Or a person who must use a bus to travel on pre-set routes. I recently read the story of Dashrath Manjhi. His wife needed medical help but the Gelhour hills separated them from the nearest town. The small mountain range forced him to travel 40 miles around them to the medical center. By the time he returned with a doctor, his wife had died. In his pain, he spent the next 22 years carving a road through the mountain to connect his village to the town. This experience is not universal! Providing universal access to food means we must account for a person’s geography as well.
setting the collective aspiration
The Targeted Universalism primer describes how to establish a collective. In building the table, they recommend forming a group like the one we use in an advice process. The participants should include, from the start:- People most affected by the problem. Go out of your way to include people who are often excluded from these types of decisions. Include them in a way that honors them as individuals with their own power and choice whether to take part. I’ll summarize:
- people who receive benefits from the proposed change.
- people tasked with implementing the change.
- people tasked with documentation.
- people with an expert understanding of the issues.
Since we’re talking about food access, I would look to people covered by the limitations described earlier. I would include:
- people whose first or primary language isn’t english.
- people with physical disabilities.
- people of different races and cultures.
- people who know how to cook, and people who don’t.
- people who sell groceries.
- people who own farms, and people who work farms.
I expect the collective will grow and change over time as we engage more people in this work.
This collective would definitely come up with more limits to their food access than I have. But for this step I’ll use the three factors I named above: wealth, dietary needs, and location.
My universal goal would be:
Everyone should have access to food that is free. The food should be nutritious and appropriate to them. The food should be accessible within a 15 minutes walk.
I’ll get around to Step 2 at some point. | <urn:uuid:64eaf1b1-d5cf-41c6-ac9d-9ac522464220> | {
"dump": "CC-MAIN-2020-29",
"url": "http://bethefuture.space/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657147031.78/warc/CC-MAIN-20200713225620-20200714015620-00391.warc.gz",
"language": "en",
"language_score": 0.9664024710655212,
"token_count": 793,
"score": 3.1875,
"int_score": 3
} |
WE ARE WHAT WE THROW AWAY. Anthropology is called the science of humankind. It studies all facets of society and culture. These studies include tools, techniques, traditions, language, beliefs, values, and the impact of humans on other humans. It is the study of humans, past and present.
Archaeologists learn from the past through studying artifacts, and often these objects are found at sites where past civilizations have discarded materials. Bones and tools are found where ancient hunting parties have left their waste, tax returns have been found with pots in studies of discards sites in Babylon and clues about the everyday life of Mayan civilizations can be pieced together by discovering ancient garbage.
Garbage can tell much about ancient civilizations but also about man today. The study of anthropology can help us discover patterns of behaviours.
Certainly we should be looking at the pattern in many “great but now fallen” civilizations that began with abundant resources followed by population growth and over-consumption with faulty or lack of infrastructure to manage population and over-consumption leading to the collapse of the societies. We may not want to be so actively repeating mistakes.
Our garbage is a wealth of information about our society. Since 1973, the University of Arizona, has been studying contemporary garbage as part of its archeology program. William Rathje established THE GARBAGE PROJECT, and in the decades this project has been operating these researchers have hand sorted, measured and sifted through tons of garbage at landfill sites located across North America including Toronto and sites in the Florida everglades and the deserts in California. They have also studies and sampled garbage from residential cans. This research included hand sorting, measuring and cataloguing types of garbage, brands and packaging, as well as interviews with households on behaviours and attitudes.
The results produced from this research have been both thought-provoking and at times controversial. There are a great many assumptions made about garbage without the data to back it up. For instance locally, our solid waste reviews do not use waste audits data from our own landfills (Sechelt and Pender Harbour), instead we use data supplied by consultants Gartner Lee ( aka AECOM) for other communities and make assumptions that the waste we generate is the same. Accurate volumes and tonnage of waste created and recycled for analysis are also a problem on the coast and totals of private business recycling is not factored in to data in the recycling review. The GARBAGE PROJECT measures volumes and weight of materials.
THE GARBAGE PROJECT has produced is very interesting results, including consumer behavior often differs from their actual behaviours. The response about the contents of the garbage can told a different answer to phone surveys or questionnaires. People often attempted to make themselves look better in answered surveys with responses that they were great recyclers, they did not buy packaged food and resisted sweets when the garbage can told another story. William Rathje and crews also found that while many communities were focused on packaging as the evil demon and speaking of bans, that packaging was not taking up major room in landfills, and in fact over the years packaging had been reduced more than food and material waste. Disposal diapers and packaging actually take up a bout 2% of landfill space.
The real volumes in the landfill were paper and his digs found newspapers intact from twenty years earlier. Rathje’s research also highlighted the materials such as construction waste that were taking massive landfill space that were not on community’s radar for reduction. They discovered that construction and demolition debris make up 20% of landfill volume. Many so-called biodegradable products did not break down in a landfill situation and Rathje’s crew has found mummified vegetables also in the landfills from decades of waste. His research into our garbage cans also pointed out given bigger containers the consumer will make efforts to fill them.
William Rathje has written a book about his garbagology research called “ RUBBISH”. He does believe our garbage management problems are solvable ,but not with many of the approaches we are using.
In my job with Gibsons Recycling, I also have the benefit of hands-on experience in handling people’s recycling and discards. As someone with a marketing and advertising background, I see how much one can learn about people from their discards. I am not talking about social security numbers but behaviours and attitudes. I know how much material is reusable that is being discarded on a regular basis, and this was a reason we opened The ZERO WASTE STORE to rescue these materials. I gladly confess that our home is furnished from the waste stream.
Tossing or discarding what we don’t want can be a very anonymous act, we hide our thoughtless behaviors in a green bag or that can at the curb and that causes the imbalance of what we say we do and what we actually do. I have observed that people actually apologize or make excuses for what they discard when there is a one-on-one scenario. We feel guilty but we do it. We do not want to be judged by what we throw away so we hide our excesses.
Purging is a behaviour that creates waste. Opening up bags of garbage I see evidence of getting rid of stuff to cleanup, purging connections of materials associated with relationships and history. It is an aggressive action to rid stuff that bothers us. We purge to tidy our lives and have order. We throw out to change ourselves and our environment but our garbage tells the real story. | <urn:uuid:de866fd5-3fe0-4b35-a7d9-868e7e2897d5> | {
"dump": "CC-MAIN-2021-49",
"url": "https://sustainablecoastbc.ca/features/columns/transitioning/51-uncategorised/520-the-garbage-project",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964359082.78/warc/CC-MAIN-20211201022332-20211201052332-00527.warc.gz",
"language": "en",
"language_score": 0.9671434760093689,
"token_count": 1143,
"score": 3.203125,
"int_score": 3
} |
Heart–Brain Neurodynamics: The Making of Emotions
By Rollin McCraty, Ph.D.
The Making of Emotions
As pervasive as they are in human experience, emotions have long remained an enigma to science. This comprehensive monograph explores recent scientific advances that clarify central controversies in the study of emotion, including the relationship between intellect and emotion, and the historical debate on the source of emotional experience. A discussion of the critical role of ascending input from the body to the brain in the generation of emotions culminates in a detailed presentation of a new model of emotion in which the brain functions as a complex pattern-matching system. From this perspective it is shown that the heart is a key component of the emotional system, thus providing a physiological basis for the long-acknowledged link between the heart and our emotional life.
Heart-Brain Neurodynamics: The Making of Emotions:
Content includes: Mental and Emotional Systems and Coherence, Source of Emotional Experience, Current Perspectives on the Nature of Emotions, Role of Familiarization in Emotional Processing, Arousal and Making of Emotions.
Customers who downloaded the Heart-Brain Neurodynamics e-Booklet frequently purchase: | <urn:uuid:8d9553eb-96e4-405c-a1bd-7e64acf959b3> | {
"dump": "CC-MAIN-2021-04",
"url": "https://store.heartmath.org/e-Books/heart-brain-neurodynamics.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703519395.23/warc/CC-MAIN-20210119135001-20210119165001-00797.warc.gz",
"language": "en",
"language_score": 0.8816779255867004,
"token_count": 256,
"score": 2.53125,
"int_score": 3
} |
So, obviously, grapes offer an amazing flavor. They also offer wonderful juice and wine. But, beyond taste, what’s the scoop? Glad you asked.
For nutritive benefits, grapes have been well-studied and documented. Over 100 research studies on grapes (or products made from them, like red wine) have shown many of their health benefits to come from a category of phytonutrients called polyphenols. Three types of polyphenols seem most important: (1) flavonoids, (2) phenolic acids, and (3) resveratro.
Flavonoids are phytonutrients that give the vibrant purple color to grapes, grape juice and red wine; the stronger the color, the higher the concentration of flavonoids. These flavonoid compounds include quercitin, as well as a second flavonoid-type compound called resveratrol. If you’re familiar with FRS-brand sports drinks and foods, you know that their main energy-ingredient is quercitin. Both compounds, quercitin and resveratrol appear to decrease the risk of heart disease by 1) Reducing platelet clumping and harmful blood clots and 2) Protecting LDL cholesterol from the free radical damage that initiates LDL’s artery-damaging action.
It’s these benefits that likely allow grapes to protect societies that eat both a combo of high fat foods and a lot of grapes and/or wine (Mediterranean and French societies). Let’s take an in-depth look:
In a study in which blood samples were drawn from 20 healthy volunteers both before and after they drank grape juice, researchers found several beneficial effects from their juice consumption.
First, nitric oxide levels were raised. Nitric Oxide is a compound produced in the body that helps reduce the formation of clots in blood vessels. Second, a decrease occurred in platelet aggregation, or blood clotting, by red blood cells. Lastly, researchers saw an increase in levels of alpha-tocopherol, an antioxidant compound that is a member of the vitamin E family, and this increase was accompanied by a 50% increase in plasma antioxidant activity.
These finding confirmed conclusions of earlier studies which had found that grape juice protected LDL cholesterol from oxidation (once it’s oxidized, it becomes dangerous as it’s able to form plagues in the arteries) by increasing antioxidant levels in the blood stream.
What’s more, investigators have found that phenolic compounds in grape skins inhibit protein tyrosine kinases, a group of enzymes that play a key role in cell regulation. These compounds also suppress the production of a protein that causes blood vessels to constrict, thus reducing the flow of oxygen to the heart. This protein, called endothelin-1, is thought to be a key contributing agent in the development of heart disease. Maybe these compounds can help cyclist’s arteries to stay dilated and elastic, thereby increasing oxygen flow during intense training?!?
Then, there’s resveratrol.
Resveratrol is a natural phenol that inhibits the production of the potent blood vessel constrictor, endothelin-1 (ET-1). It appears to work at the genetic level, preventing a gene that directs the production of ET-1. In fact, resveratrol prevents any increases of ET-1, at least in part, by significantly reducing free radical formation.
Next, resveratrol helps keep the heart muscle flexible and healthy. A team of researchers at the Northeastern Ohio Universities College of Medicine have shown that resveratrol not only inhibits production of endothelin-1, but also directly affects heart muscle cells to maintain heart health. Their research shows that resveratrol inhibits angiotensin II, a hormone that is secreted in response to high blood pressure and heart failure. Angiotensin II has a negative effect on heart health in that it signals cardiac fibroblasts, heart muscle cells that secrete collagen. It’s their production and the excessive amount of collagen that causes the heart muscle to stiffen and lose its ability to pump blood efficiently – not what an athlete wants!
And, there’s more. Resveratrol also prevents the cardiac fibroblasts that are already present from changing into myofibroblasts, the type of cardiac fibroblast that produces the most collagen.
Beyond the heart, resveratrol may reduce cancer risk, especially estrogen-linked cancers, improve lung function as an anti-inflammatory agent, and an anti-aging agent.
Grapes’ saponins also support a cyclist’s heart. Saponins, plant protective agents found in the skin, are phytonutrients that help lower cholesterol. They are believed to bind to and prevent the absorption of cholesterol and are also known to settle down inflammation pathways, an effect that could have implications in not only heart disease, but cancer and chronic diseases. Some good news for wine drinkers: The saponins dissolve into the wine during its fermentation process.
For the sake of our post, I’ll stop with these heart-health benefits…but, the list of healthy reasons to enjoy grapes goes on and on. If you want a strong heart in life and on the road, water, or trail, include grapes and grape-products in your diet. Eat them in meals and snacks for daily nutrition, and try grape juice within my homebrew (http://www.apexnutritionllc.com/freetools.html) and as raisins for training nutrition (you’ll get 15 grams of carbs in just 2 Tablespoons of grapes). The more we choose natural foods to nourish our bodies, the better we’ll feel in adventures.
Give your body what it needs for great energy and health every day and during training with the right Foods, Drinks and Supplements. If you would like my help with it, I offer comprehensive plans as Instant Downloads and as Custom Clients starting at just $20. And, as a FuelRightBlog reader, get a further discount with coupon code: password-frblog username-reader. I’d love to work with you!
Fuel Your Adventure. Nourish Your Body.
Download Your Fuel Right Race Light Plan Today!
My experience working with Kelli @ Apex Nutrition has been nothing but positive. Through the use of Kelli’s services, I have been able to make some key changes to the way I eat on a daily basis and I have lost several pounds as a result. In addition to making better daily nutrition choices, Kelli
I started my coaching plan with Kelli to improve my overall nutrition and fueling at the beginning of my training season, and what a journey. In a period of 10 months I not only lost about 30 lb and 4 percent of body fat, but also with her extremely valuable weekly feedback I could keep
As an age group triathlete, I started working with Kelli after my coach’s recommendation. I had caught the “Tri Bug” about 2 years back and I had already dropped around 40 pounds just by training. But still I had a long way to go in order to become a faster and complete athlete. Eating and
After coming off a stress fracture, I was looking to get back into ultra-running shape and contacted Kelli. I got way more than I expected! A great nutrition coach who not only helped me understand food as fuel, but she provided great detailed guidance on my nutritional needs, including everything from my off/light training days
Without a doubt Kelli has improved my cycling in a big way this season. Managed to loose 7kg of weight whilst still maintaining all the strength and power output I had previously, equating to around a 10% increase in power to weight ratio in a period of 3 months. Wow! And not only that I | <urn:uuid:f2a569e9-4fc8-4f50-998f-3c650d8bb120> | {
"dump": "CC-MAIN-2016-22",
"url": "http://www.apexnutritionllc.com/fuelrightblog/2011/07/11/not-another-case-of-the-mondays-grapes-for-health-and-energy/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049270527.3/warc/CC-MAIN-20160524002110-00164-ip-10-185-217-139.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.951997697353363,
"token_count": 1646,
"score": 2.734375,
"int_score": 3
} |
How to write a paper for school in mla format mla format is commonly required of middle school, high school and college students it is a very professional way to format a paper, and, even if not required, is a nice, scholarly touch mla. Below is the standard format of a research paper utilizing mla style make sure to check with your instructor if he/she has any other specific requirements. This is a sample outline of a thesis research paper it is used by the scholars and students to ensure that they have followed the standard mla format and style for their thesis. Writing in paper in mla format sela mcguire january 10, 2016 information is and research preceding it deals with specific rules, there is an mla format an mla format.
How to write a research paper mla format - use this platform to receive your valid paper handled on time all sorts of academic writings & custom papers work with our writers to get the excellent review following the requirements. Here is a sample paper in mla format that has both the cover page and the outline pages the format of the research paper mla format cover page mla format works cited mla format generator mla format sample paper mla sample paper w/ cover & outline pages frequently asked questions and answers. Trying to write a paper in mla format buy mla papers online from ultius and have a professional english major take care of it for you. If you need specifically mla format term paper, it's not a problem for our specialists for further information, contact us via phone.
Why is this an “a” paper this student-generated research paper demonstrates the following: clear focus (evident in thesis and relevant information/details. Use our included template to easily write your research paper proposal basic format is given and each step is gone over for you. Source: hacker/sommers (boston: bedford/st martin’s, 2010) this sample follows the style guidelines in the mla handbook for writers of research papers, 7th ed (2009. Mla is the formatting style of the modern language association it is used in areas such as english studies, comparative literature and foreign language.
Professional academic help starting at $699 per pageorder is too expensive split your payment apart - mla formatting for term papers. 466 how to cite a research paper using mla format students get all sorts of assignments to do and each comes with a different set of requirements. Mla (modern language association) style is most commonly used to write papers and cite sources within the liberal arts and humanities this resource, updated to reflect the mla handbook (8th ed), offers examples for the general format of mla research papers, in-text citations, endnotes/footnotes, and the works cited page. Below given is an explicit academic manual on research paper formatting be sure you read it if you have 5 levels of headings in your mla style paper.
Mla handbook for writers of research papers (7th edition) what is mla mla is a reference tool used in subject areas for the humanities it provides extensive guidelines on how to formulate a topic, format a research. If you know little about the mla format term paper you are to write, don’t lose your heart let advancedwriterscom offer you a hand and deliver a first-class model. Scientific style and format (cse style) the sense of style turabian: a manual for writers list of style guide abbreviations modern language association of america the mla handbook for writers of research papers new york: mla, 1977 7th ed new york mla, 2009.
The structure, format, content, and style of a journal-style scientific paper | table of contents perhaps more important than the first, is that this format allows the paper to be read at several different levels for example, many people skim titles to find out what information is available on a subject others may read only titles and abstracts. Introduction the modern language association (mla) specifies a standard format for essays and research papers written in an academic setting: one-inch page margins double-spaced paragraphs a header with author's last name and page number. Regular citations are generally placed in this mla citation format: last name of the author, first name of the purposes, there are specific guidelines to follow the section that follows will answer the following questions: how to format an mla paper, how to create papers, and how to write in mla format if you’re trying to according to the. Research paper: how to write a bibliography research paper: how to write a bibliography includes learn how to properly cite different resources in the bibliography of a research paper, and how to format those citations, for sources ranging from textbooks to blog posts includes numerous examples and explanations for all.
Mla style research paper mla style research paper writing tipshow to format a research paper using either mla or apa guidelines how to format your research paper two or three words of the paper title. A guide to create citations for bibliographies and works cited in reference papers skip to main content dixie research guides citation guide how to cite books, ebooks, chapters search this guide search citation guide: how to cite books, ebooks, chapters author/editor/publisher mla formatting basic mla rules how to. Mla format is modern language association writing style commonly used for papers and documents and provides basic guidelines for writing, citation and referencing it also shows how to use english language well and to avoid troubles with plagiarism in one's works though all mla principles are strictly pointed in mla manuals, the format of. Buy a custom mla format essay, mla style research paper, term paper, thesis or dissertation professional mla format paper writing service highly qualified freelance writers prices start from $10/page.
27-11-2012 the fundamentals of mla formatting for research papers. As you write your paper in mla format, you will be referencing things you found in your research and will need to indicate exactly where you found the information. Click here click here click here click here click here mla (modern language association) style is most commonly used to write papers and offers examples for the general format of mla research papers, in. | <urn:uuid:854659c8-773d-4599-8c48-9b08f419d407> | {
"dump": "CC-MAIN-2018-43",
"url": "http://pocourseworkabwx.canon7d.info/mla-format-research-papers.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583516123.97/warc/CC-MAIN-20181023090235-20181023111735-00300.warc.gz",
"language": "en",
"language_score": 0.8888347148895264,
"token_count": 1293,
"score": 3.234375,
"int_score": 3
} |
Region: Dutch Country Roads
Named for a settlement of mechanics who repaired and made wagons in the early 1800s, Mechanicsburg's continued growth was also attributed to the Cumberland Valley Railroad. Completing its line in 1837, Mechanicsburg was designated as a water station where workers could restock the locomotive's wood and pump water. The train became the town's link to the world of business and industry. At one time, there were twenty-five trains chugging through the town daily carrying travelers, coal, feathers, fruit, ice, mail and newspapers. During the Civil War, the railroad was an invaluable method of transporting troops and supplies. Residents saw the first of the Civil War in 1862 when Confederate prisoners passed through town on the CVRR. One year later, on June 27, 1863, Gen. Albert Jenkins and his troops marched to town and demanded rations for his men and grain for the horses. | <urn:uuid:6635e5c9-94d9-401e-b1db-925dfbe1b1c1> | {
"dump": "CC-MAIN-2020-16",
"url": "https://www.visitpa.com/region/dutch-country-roads/mechanicsburg",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370494349.3/warc/CC-MAIN-20200329140021-20200329170021-00187.warc.gz",
"language": "en",
"language_score": 0.9825764298439026,
"token_count": 189,
"score": 3.421875,
"int_score": 3
} |
The Internet Protocol (IP) is the most popular implementation of a hierarchical network-addressing scheme. IP is the network protocol the Internet uses. As information flows down the layers of the OSI model, the data is encapsulated at each layer within packets. The IP determines the form of the IP packet header (which includes addressing and other control information), but does not concern itself with the actual data. It accepts whatever is passed down from the higher layers
There are three classes of IP addresses (Class A, B, and C) that an organization can receive from the American Registry for Internet Numbers (ARIN) or from the organization's ISP)
Home - Table Of Contents - Contact Us
CertiGuide to A+ (A+ 4 Real) (http://www.CertiGuide.com/apfr/) on CertiGuide.com
Version 1.0 - Version Date: March 29, 2005
Adapted with permission from a work created by Tcat Houser et al.
CertiGuide.com Version © Copyright 2005 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site. | <urn:uuid:9163f11c-37ee-4ba4-a964-990685a46db9> | {
"dump": "CC-MAIN-2015-48",
"url": "http://www.certiguide.com/apfr/cg_apfr_IPAddressing.htm",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398446300.49/warc/CC-MAIN-20151124205406-00122-ip-10-71-132-137.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.8476241827011108,
"token_count": 239,
"score": 3.734375,
"int_score": 4
} |
Discuss the functions and roles of trade union
Discuss the functions and roles of Trade Union in Industrial Relations in Malaysia.
Expected delivery within 24 Hoursrs
View the CNN Pipeline news clip "Terri Schiavo's Parents" located on the Materials tab of your student Web site for Week Eight. State your stance on the Terri Schiavo case, and identify the moral value judgment that influenced you to choose you
How did 19thth amendment change economy?
Discuss the differences in psychopharmacological effects between alcohol and marijuana, specifying potential short and long-term consequences of each.
The purpose of this activity is twofold. First, it will help you hone your library research skills so you can locate books and journal articles to support your written work.
Choose a subject in your discipline, chosen field, and/or career. The topic should be educational and intended to teach the subject matter to K-12, Higher Education, Business and/or Government setting.
Do you see any responsibilities attached to the First Amendment?
Write an application that counts the total number of vowels contained in the String "Event Handlers is dedicated to making your event a most memorable one." Save your file as CountVowels.java.
If neither Thompson nor Morris had any experience in the cattle-trading business, would the result in this case have been different?
Achieving Excellence in the Management of Human Service Organizations?
Specific aspects of the Athenian Acropolis and its Parthenon, and explain their significance to ancient Greek culture.
Start Excelling in your courses, Ask an Expert and get answers for your homework and assignments!! | <urn:uuid:a8f5eac0-6270-4ba3-b0d0-6607ec9312ca> | {
"dump": "CC-MAIN-2018-43",
"url": "http://www.tutorsglobe.com/question/discuss-the-functions-and-roles-of-trade-union-5118079.aspx",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512395.23/warc/CC-MAIN-20181019103957-20181019125457-00096.warc.gz",
"language": "en",
"language_score": 0.919914960861206,
"token_count": 338,
"score": 2.828125,
"int_score": 3
} |
Did you know that worst medications for kidneys could be lurking in your medicine cabinet right now? We’ve discovered the most common medications that could be causing your kidneys dome serious damage so make sure your meds are NOT on this list!
Little do people know that there are medications on the market that can actually cause kidney damage. Even though many of these medications can be life-saving, many are known to be life-taking as well.
The worst medications for kidneys can severely damage the kidneys are called nephrotoxic medications. They can cause immediate toxicity to the kidneys and make up for 25 percent of acute kidney ailments.
10 Worst Medications for Kidneys
To help you avoid being exposed to these types of medications, below are a list of the 10 most common ones that can cause damage to your kidneys.
NSAID medications, otherwise known as nonsteroidal anti-inflammatory drugs, can be incredibly dangerous to your kidneys and can induce a number of kidney damage along with other conditions, such as menstrual pain, rheumatoid arthritis, fever, and inflammation in the body. Common NSAIDS include: Motrin, Aleve, naproxen, ibuprofen, and Advil.
It can restrict blood flow to the kidneys, causing extensive kidney damage and failure in some cases. People who suffer from liver disease, heart failure, or current kidney problems are at a higher risk if given NSAIDS. However, to reduce the side effects of taking this medication, work on lowering doses and only take it for a short amount of time.
Diuretics are used to assist your body in getting rid of extra water and salt. This form of medication is primarily used to help treat blood pressure, edema, and glaucoma. It comes in three main diuretics types: loop diuretics, potassium-sparing diuretics, and thiazide diuretics.
However, the medication can affect the water in the body, which can deteriorate kidney function. Before using, talk to your doctor to see if this medication will be the best fit for you.
Jardiance, otherwise known as empagliflozin, is a new type of diabetes medication that is known to cause kidney complications. Along with other nephrotoxic drugs, Jardiance can cause even more complications as well.
Foscarnet is rarely used but is used as an antiviral for immunocompromised hospitalized patients. However, nevertheless, it is a nephrotoxic drug that can cause injury to your kidneys when used.
Zoledronate is a common drug to help treat osteoporosis but can cause both kidney failure and tubular cell toxicity. Zometa can be given as an IV infusion for cancer bone metastases and holds a well-known risk of kidney failure.
This is an antibiotic used specifically for the treatment of MRSA, aka methicillin resistant staphylococcus aureus, infections. This drug can lead to serious kidney damage and may even cause them to swell.
If you are taking this antibiotic, your levels will be monitored very closely to ensure you do not sustain any damage to your kidneys.
7.) ACE Inhibitors
ACE inhibitor medications can be hard to classify because they can be both good and bad for your kidneys. Even though they are known to be kidney protective medication for diabetes, they can sometimes result in a decline in kidney function when first introduced to the body.
If you are getting treated with ACE inhibitors for either heart failure or blood pressure, make sure you are started on low doses first, while getting routine blood tests to make sure your kidneys are functioning properly.
8.) Iodinated Radiocontrast
This may seem like a hard and complicated medication, but iodinated radiocontrast merely refers to diagnostic tests that involve dyes.
Among the most commonly known conditions of damage, this medication is contrast-induced kidney damage from iodinated radiocontrast. It is also a common kidney injury in patients that are hospitalized after 28 hours of an IV contrast injection.
9.) Aminoglycoside Antibiotics
Even at very low doses, this antibiotic is known for a majority of kidney injury or failure. People who suffer from chronic kidney disease or have taken this form of antibiotic are most at risk.
Although all of these medications are currently used in hospitals around the world, it’s important you know what may or may not be harmful to your health.
10.) HIV Medications & Antiretrovirals
A number HIV medications and antiretrovirals are commonly associated with kidney disease risk and chronic renal problems.
However, both Viread (tenofovir) and Retataz (atazanavir) have proven to cause acute tubular necrosis. This is a kidney disorder that damages the tubule cells of the kidneys, which can lead to kidney failure.
Please SHARE this Top 10 worst medications for kidneys list with your friends and family. | <urn:uuid:4e82e939-ec2c-4971-bce3-ef4389a6fcd1> | {
"dump": "CC-MAIN-2020-40",
"url": "https://edrugsearch.com/worst-medications-for-kidneys/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400214347.17/warc/CC-MAIN-20200924065412-20200924095412-00630.warc.gz",
"language": "en",
"language_score": 0.9381952881813049,
"token_count": 1030,
"score": 2.515625,
"int_score": 3
} |
The how-to guide will mark the latest federal effort to provide an equitable education for ELLs, the largest-growing segment of the United States' public school population.
Recently in Federal Policy Category
September 22, 2015
September 21, 2015
A new report from the Urban Institute and Migration Policy Institute details social-emotional, health-related and financial hardships that children with deported or detained immigrant parents face.
September 21, 2015
The tool kit is a companion to joint guidance the departments released in January to remind schools of their federal obligations to the nation's nearly 5 million English-learners.
August 27, 2015
The complaint alleges that thousands of children are denied adequate special education services because their parents don't speak or read English.
August 13, 2015
Advocacy groups say the change could make it more difficult for thousands of school-aged U.S. citizens born to immigrant parents enroll in school.
July 08, 2015
The projected decline follows a surge in 2014 during which tens of thousands of children from Honduras, Guatemala, and El Salvador sought to enter the United States along the country's southern border.
June 18, 2015
Florida got flexibility on English Language Learners and accountability. Now at least seven other states are also asking for similar for those students.
April 22, 2015
Decades of neglect and inaction continues to plague federally funded schools for American Indian children, despite scathing watchdog reports and exhortations from tribal leaders and federal officials to repair and replace dilapidated facilities.
March 25, 2015
The goal is to "look at English learners as a national asset and investment in contrast to thinking of English learners as a problem or challenge coming to our school districts," said Libia Gil, the head of the department's office of English-language acquisition.
March 24, 2015
The Education Commission of the States report lists proposed changes in five policy areas, including finance, educator quality, and parent engagement. | <urn:uuid:de37ea2f-dda2-40cd-bbf6-30e8ef1e2300> | {
"dump": "CC-MAIN-2016-18",
"url": "http://blogs.edweek.org/edweek/learning-the-language/federal-policy/?tagID=0&blogID=36&categoryID=456&rblog=0&page=3",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860110356.23/warc/CC-MAIN-20160428161510-00110-ip-10-239-7-51.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9572086930274963,
"token_count": 398,
"score": 2.78125,
"int_score": 3
} |
The legendary knight Zadora (supposed ancestor of the Polish Lanckoroński family) lies happy in his grave, contemplating with satisfaction the array of illustrious future generations (literally) springing from his loins.
Gregory Clark, who studies family mobility in various countries over the centuries, wants to puncture some mythical contemporary assumptions and expectations.
Studies of social mobility using surnames suggest two things. Social mobility rates are much lower than conventionally estimated. And social mobility rates estimated in this way vary little across societies and time periods. Sweden is no more mobile than contemporary England and the USA, or even than medieval England. Social mobility rates seem to be independent of social institutions (see the other studies on China, India, Japan and the USA now linked here). ...
Conventional estimates of social mobility, which look at just single aspects of social status such as income, are contaminated by noise. If we measure mobility on one aspect of status such as income, it will seem rapid.
But this is because income is a very noisy measure of the underlying status of families. The status of families is a combination of their education, occupation, income, wealth, health, and residence. They will often trade off income for some other aspect of status such as occupation. A child can be as socially successful as a low paid philosophy professor as a high paid car salesman. Thus if we measure just one aspect of status such as income we are going to confuse the random fluctuations of income across generations, influenced by such things as career choices between business and philosophy, with true generalised social mobility.
If these estimates of social mobility were anywhere near correct as indicating true underlying rates of social mobility, then we would not find that the aristocrats of 1700 in Sweden are still overrepresented in all elite occupations of Sweden. Further, the more equal is income in a society, the less signal will income give of the true social status of families. In a society such as Sweden, where the difference in income between bus drivers and philosophy professors is modest, income tells us little about the social status of families. It is contaminated much more by random noise. Thus it will appear if we measure social status just by income that mobility is much greater in Sweden than in the USA, because in the USA income is a much better indicator of the true overall status of families.
Many commentators automatically assume that low intergenerational mobility rates represent a social tragedy. I do not understand this reflexive wailing and beating of breasts in response to the finding of slow mobility rates. The fact that the social competence of children is highly predictable once we know the status of their parents, grandparents and great-grandparents is not a threat to the American Way of Life and the ideals of the open society.
One ray of sunshine for those with a passion for upward mobility ought to be the reflection that History has not always been kind to families of talent and distinction. One key factor in the spectacular story of American development and success is the fact that America has provided a refuge and a second chance at opportunity to History’s losers. From the cavaliers who were defeated in England’s 17th century Civil War to my own Lithuanian ancestors dispossessed and occupied by Russia, the New World offered escape from ruin at home and (over time, at least) another chance. | <urn:uuid:819b3217-b0bb-418c-aaa3-8418df420171> | {
"dump": "CC-MAIN-2014-10",
"url": "http://neveryetmelted.com/2013/02/13/social-mobility-lower-everywhere-than-generally-believed/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999673298/warc/CC-MAIN-20140305060753-00099-ip-10-183-142-35.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9592149257659912,
"token_count": 676,
"score": 2.59375,
"int_score": 3
} |
Today's Writing Prompt is inspired by twelfth-grader Rebecca Lamaire, who won a Gold Medal in the Scholastic Art and Writing Awards for her untitled painting.
In this painting, I see mountains covered in snow like the Alps in Switzerland. I also see a garden of yellow flowers. Between the two different environments, there is a paper plane flying in the sky. When looking at this painting, I think of how different flowers and snow are, but also similar because they make the world a more beautiful place.
My caption for this image would be:
"If I could fly anywhere in the world, I would fly to a place where peace exists between two different worlds because peace is beautiful."
What do you see in this painting? What does it remind you of? What emotions does it make you feel? Come up with a creative caption and share it in the Comments so other people can see your awesome art interpretation and caption-making talents! | <urn:uuid:a794297b-0d44-4703-b437-822b44e68278> | {
"dump": "CC-MAIN-2014-23",
"url": "http://blog.scholastic.com/ink_splot_26/2012/01/create-a-caption-no-title.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510274987.43/warc/CC-MAIN-20140728011754-00423-ip-10-146-231-18.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.961940586566925,
"token_count": 196,
"score": 2.671875,
"int_score": 3
} |
Plantar fasciitis is a painful condition involving the thick band of tissue (fascia) on the bottom of the foot. The fascia connects the heel bone to the toes and creates the arch of the foot, working like a rubber band between the heel and the bones in the ball of the foot. A fascia that is short forms a high arch; if it is long, it creates a low arch or flat foot. A pad of fat in your heel covers the fascia to absorb the shock of walking.
When the fascia is overstretched or overused, the tissue becomes irritated and inflamed, causing excruciating pain and difficulty walking. It was commonly thought heel spurs caused plantar fasciitis, but researchers found this is not the case. Heel spurs occur in people with or without plantar fasciitis.
One of the most common orthopedic foot complaints, plantar fasciitis occurs in men and women, but most often affects active men ages 40–70. You are more likely to experience it if you already have arch problems or flat feet, or if you are obese or gain weight suddenly. Other causes include a tight Achilles tendon or wearing shoes with poor arch support or soft soles. Performing aerobic sports such as ballet, long-distance running or dance aerobics places you at risk. Those in occupations that require walking or standing on hard surfaces all day are at risk.
As we age, the plantar fascia becomes less elastic and the fat pad on the heel becomes thinner and unable to absorb as much shock. The extra shock damages the fascia and causes it to swell, tear or bruise.
The most common symptoms are sharp or dull pain and stiffness in the bottom of the heel. The bottom of the foot may also ache or burn. Pain is usually worse when you take your first steps in the morning, after standing or sitting for a while, when climbing stairs and after intense activity. The pain may develop over time or occur suddenly after intense activity.
Left untreated, plantar fasciitis may cause chronic heel pain, hindering regular activities. If you change the way you walk to minimize the pain, you may develop foot, knee, hip or back problems. Your health care provider may refer you to a podiatrist or an orthopedist who specializes in sports injuries.
Your specialist will perform a physical exam to assess your foot for tenderness on the bottom and the heel, flat feet or high arches, mild swelling or redness, or stiffness or tightness of the arch. X-rays can rule out problems such as a stress fracture or pinched nerve.
Initial treatment includes using acetaminophen (Tylenol), ibuprofen (Advil, Motrin) or naproxen (Aleve) to reduce pain and inflammation, along with resting as much as possible for a least a week. Physical therapy may be recommended, with exercises to stretch the plantar fascia and Achilles tendon and strengthen lower leg muscles to stabilize your ankle and heel. Your provider may show you how to apply athletic taping to support the bottom of your foot or may recommend wearing a splint that stretches your calf and arch while you sleep; off-the-shelf heel cups, cushions or custom-fitted arch supports can help distribute pressure to your feet more evenly.
Most people who have plantar fasciitis recover with conservative treatments in just a few months. When conservative measures don’t work, you may need steroid injections, shock wave therapy or surgery. Injecting a steroid into the tender area of the heel can provide temporary pain relief. Multiple injections are not recommended because they can weaken your plantar fascia and cause it to rupture, as well as shrink the fat pad on your heel. Extracorporeal shock wave therapy directs sound waves at the area of pain to stimulate healing. It may cause bruises, swelling, pain, numbness or tingling and has not been shown to be consistently effective. Few people need surgery to detach the plantar fascia from the heel bone. It is generally an option only when the pain is severe and all else fails, as it can weaken the arch.
Plantar fasciitis self-care tips:
- Maintain a healthy weight to minimize stress on your feet.
- Wear supportive shoes. Avoid high heels. Buy shoes with a low to moderate heel, good arch support and shock absorbency. Don’t go barefoot, especially on hard surfaces.
- Replace athletic shoes before they stop supporting and cushioning your feet. If you’re a runner, buy new shoes after 500 miles of use.
- Try a low-impact sport such as swimming or bicycling instead of walking or jogging.
- Apply a cloth-covered ice pack over the painful area for 15 to 20 minutes three or four times a day or after activity.
- Regular ice massage reduces pain and inflammation. Freeze a water-filled paper cup or full bottle of water and roll it over the site for five to seven minutes.
- Stretch your plantar fascia, Achilles tendon and calf muscles with simple exercises. (See the American Orthopaedic Foot & Ankle Society website.)
The content of this article is for informational purposes only. It is not intended to be a substitute for professional medical advice, diagnosis or treatment. Always seek the advice of your physician or other qualified health care provider with any questions you may have regarding a medical condition.
Since Cheval Blanc, an extraordinary, newly designed and refurbished 72-room hotel owned by Louis Vuitton Moet Hennessey, launched in September 2021, it has been the talk of the town. Le Tout-Paris remarks about its WOW factor … and the hard-to-get reservations for the 30 seats at Plenitude, the intimate, first-floor gastronomic outlet headed by chef Arnaud Donckele, who earned three Michelin stars at Cheval Blanc Saint Tropez. Reservations are also recommended for Limbar, the ground-floor bakery/café/tea shop/bar where we watched Pastry Chef Maxime Frédéric preparing desserts and an absolute must-have for dinner at Le Tout-Paris, the 7th-floor, all-day brasserie. This brightly colored space, with its raised seating and Fauve-like floor tiles and the adjacent Milanese restaurant, Langosteria, both have access to terraces facing the Seine River, with amazing views encompassing Notre Dame to the Eiffel Tower.
Located in the South Pacific, The Islands of Tahiti are just eight hours by air from California. Surrounded by pristine, crystal-clear blue waters, the 118 islands and atolls offer natural beauty, authentic island culture and unique French Polynesian style. The Islands of Tahiti are world-renowned for white-sand beaches, stunning turquoise lagoons and varied landscapes ranging from coral atolls to volcanic mountain peaks. Privacy comes naturally in The Islands of Tahiti and offers visitors the space to relax and reconnect and to be Embraced By Mana. Mana is the life force and spirit that connects all things in The Islands of Tahiti.
Nevada-based The Spa at Green Valley by Well & Being and The Spa at Red Rock by Well & Being celebrate the start of 2022 with new health, wellness and spa treatments available through March 31. Both spas offer an array of treatments for guests wanting to relax and unwind before 2022 kicks into full gear.
To allow visitors to safely and responsibly enjoy their trip to Barbados, the island announced streamlined port entry protocols. Barbados’ Ministry of Health and Wellness released the following protocols for all travelers planning on coming to the island.
IHG® Business Edge: Working Together with SMEs for a smarter way to manage travel
Mar Del Cabo launched a new luxury beach fishing experience with an interactive paella workshop for guests. The Los Cabos-based hotel offers guests an immersive experience that takes them through the journey of creating paella, starting with a fishing session.
COJE Management Group raised the bar when it comes to cuisine and cocktails. The Boston-based group, founded by Chris Jamison and Mark Malatesta, offers guests the ultimate dining experience with old-world hospitality and an array of cuisines for every guest to enjoy. With culinary director Tom Berry incorporating the cuisines he encountered during his travels to South America, Cuba, Japan, Southeast Asia and France, each restaurant has distinguished itself as a must for anyone visiting Boston and each is designed exclusively in-house using inspiration from different regions and countries around the world.
Go ahead, take a nice, deep breath. Because a Seabourn voyage is all about this moment you’ve come so far in life to embrace. It’s not an escape, it’s an arrival. | <urn:uuid:e87d92c2-0637-49af-b679-0ef3fee3b804> | {
"dump": "CC-MAIN-2022-05",
"url": "https://www.globaltravelerusa.com/plantar-fasciitis/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320301863.7/warc/CC-MAIN-20220120130236-20220120160236-00615.warc.gz",
"language": "en",
"language_score": 0.911587655544281,
"token_count": 1862,
"score": 3.265625,
"int_score": 3
} |
Three able men are shoveling chum out into the water to attract the menace terrorizing their beaches. Suddenly an image begins to take form beneath the water, circling the small fishing vessel. They assess they are looking at a 25-foot, three ton tiger shark. Police Chief Martin Brody exclaims, “You’re gonna need a bigger boat!” A patently obvious observation? Granted…remember the theater breaking out in nervous laughter when Schneider blurted it out in 1975? But with Shark Week behind us, it’s also an apt allegory for personal capacity building.
Capacity building typically refers to an organization’s ability to offer new services that add value for those it serves. You have to have the capacity before you attempt to take your services to a higher level. For example, it doesn’t make sense to increase your student body by 300% if you don’t have the staff and room to accommodate three times as many learners. Sure you’d have more revenue from increased enrollments, but you wouldn’t be able to meet everyone’s needs and expectations. You have to have the capacity to handle your goals once you realize them.
The concept of capacity building holds true for each of us individually. It makes no sense to pursue goals that you aren’t personally ready to handle…because once you arrive at your desired destination, the reality will hit hard that you can’t handle what you thought you wanted. Be careful what you wish for, but more importantly, when you know what you want to go after in life, be sure you have built your inner capacity so you can fully engage and enjoy it! When your ship comes in…do you want to meet it at the docks with a station wagon or an eighteen wheel moving van?
Educators, think of it like instructional scaffolding. We don’t expect students to sink or swim as they work to master new skills and concepts. We provide support for them to build on their strengths and successes as they take risks, make mistakes and learn. The same holds true for us as adults, whether on the job or at home. To build personal capacity we need to be able to push ourselves to take risks, learn and grow. Sounds simple, but what is required?
- Push yourself beyond where you are – if you’re too comfortable where you currently live or work, you’re not going to grow
- Identify new small challenges – nothing earth-shattering; something you can attain using your current skills
- Commit your personal strengths to meet your challenge – you’re making it a priority to take risks to grow
- Invest your time and energy to make it happen – stretch yourself to meet and surpass the challenge you’ve set
- Monitor your progress – be self-aware, learn as you go and make adjustments as needed
- Be persistent – push yourself and refuse to give up to develop resilience and tenacity
- Be flexible – consider multiple ways to meet your challenge from different perspectives
- Hit your target – give yourself credit for progress and know when you meet your challenge
- Appreciate your new capacity – recognize how meeting your challenge helped you grow
- Build on little victories – identify new challenges that will push you to grow and build more capacity so that you will eventually realize your goals
If Quint’s boat had the proper capacity to deal with his nemesis, “Jaws” could have ended much differently. No one wants to find themselves sitting in a vessel too small when facing challenges or opportunities!
So how about you? You have a say in how your story will read. Start today, purposefully developing your personal capacity, no matter what vessel you are navigating! | <urn:uuid:be5b998e-7d8f-4e79-9d3a-8f26cd3c50fb> | {
"dump": "CC-MAIN-2016-44",
"url": "https://mrmck.wordpress.com/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988717954.1/warc/CC-MAIN-20161020183837-00233-ip-10-171-6-4.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9533267021179199,
"token_count": 773,
"score": 2.640625,
"int_score": 3
} |
Depending on component technology, many options exist for automated mass soldering today. But wave soldering was the first – and, for several decades, only – practical method for quickly soldering large numbers of components to printed circuit boards (“PCBs,” also known as printed wiring boards or “PWBs” because their tracks or traces replaced actual wires previously needed to connect components).
Understanding Soldering: From Vacuum Tubes to Miniature Solid State
For the first decade of my life, our home telephone did not have buttons or even a dial. We picked up the receiver and asked a human to make the call. (Our home number was 399J.) Today, my phone is vastly more powerful and flexible than the mainframe computer on which I learned programming.
My first soldering job involved soldering wires to arrays of sockets. Components that looked like incandescent lightbulbs plugged into the sockets to make things like AM radios. There were a lot of people doing soldering in that factory and, as far as I can remember, no soldering machines.
One of the first units of the solid state mainframe computer (the IBM System/360) that changed the world arrived at my undergraduate university in time for my sophomore year. Commands and data were input with punch cards. Tape reels stored the data. Computer usage was by appointment only (and charged by the minute). We dropped off our cards and returned at the appointed time to retrieve the printouts from one of the dozens of techs required just to keep the system running. And this was the machine that would change the world!
I bought my first “pocket” calculator in 1972 for $350 (equivalent to a bit more than $2,000 today). It could perform the basic four functions (and nothing more) yet seemed worth every penny of its now absurd cost. My local drugstore was selling more powerful calculators for less than $6 not long ago.
Forty-odd years ago, I worked at a company that made the first word processors. They were the size of a closet, stored data on 10” floppy discs and cost as much as a Mercedes 450S. About five years later, personal computers not much larger than a mechanical typewriter handled word processing better than the original dedicated machines but cost about 80% less.
Around 1998, an electronics engineering professor of an esteemed university told me in all seriousness that the Pentium 4 processor was so advanced that there would never be applications requiring more power. That chip became obsolete within about 18 months.
In recent years, I have encountered synthetic humans so thoroughly lifelike that they are used for training surgeons. Pocket-size devices are close to performing real-time translation between very different languages. GPS has worked so well for so long that an entire generation has grown up without needing to use a map. And those incandescent lightbulbs that looked a lot like the vacuum tubes that I was soldering 60 years ago disappeared from stores about a decade ago, replaced for the most part by LED electronics.
In my lifetime, then, the world has reached the point where we would have a hard time getting by without electricity and electronics. It only takes a brief failure of the electric grid to prove we are utterly dependent on the movement of electrons.
The transformation in technology has been amazing and we quite rightly marvel at the remarkable components and assemblies that make this life possible. But the remarkable components are useless without solder – the same material used at least since Edison – to complete the circuit. Soldering is not as thrilling as new product development but it’s the very heart of electronics. And, even though we’ve soldered electronics since the 1800’s, the most common problems in electronics still involve getting solder everywhere it’s needed and only where it’s needed without damaging components.
Soldering is often described as an art. And that’s where the problems begin because soldering is all about science. Most soldering problems are easily preventable with understanding of the physical forces that control solder’s behavior.
Much has been written about solder and soldering by some very smart people who, unfortunately, use complicated terminology and mathematics that can be hard to follow. But we’re here to help.
This is the first in a series of articles intended to take the mystery out of all aspects of soldering, beginning with the first successful method of large-scale production soldering.
You can read Jim Smith’s 8 soldering tips.
Even though it became the most common form of mass soldering before most of us were born and has been in constant use ever since, many people still find wave soldering remains confusing and hard to manage. So, let’s eliminate the mystery.
What is Wave Soldering?
The basic principle of wave soldering is fairly simple. After components are placed on the PCB with their leads inserted in holes (“through-holes”) drilled or punched through the PCB, the assembly is placed on a conveyor. The conveyor moves the assembly across a tank (often called the “pot”) of liquid solder. The solder is pumped through a chimney to form a ridge that flows across the bottom of the PCB to form connections between the component leads and PCB circuitry. Although the principle is simple, however, the process requires control of many variables, each of which has the potential to cause serious defects.
Wave soldering has been used to solder surface mount devices (“SMDs”) but the technology is best suited to “through-hole” assemblies (components with leads inserted in holes drilled through the circuit board).
How Wave Soldering Began
Electronics before the 1950s were not like what we know today. The key components, known as vacuum tubes, looked like incandescent light bulbs but contained electrodes instead of filaments. The tubes were plugged into sockets mounted on a supporting plate. Wires soldered by hand to tabs on the sockets provided the electrical circuitry.
The components and assemblies looked like this:
The arrival of solid state components and printed circuit boards (PCBs) in the 1950’s dramatically simplified electronics assembly.
The early PCBs were all single-sided (the “printed” circuitry was on one side only).
Metal tracks (also known as “traces”) on the PCB laminate replaced the vacuum tube wiring. (For many years, PCBs were commonly known as printed wiring boards or “PWBs” because the circuitry functioned like wires. The “printed” part is less obvious but reflected the method of creating the metal circuitry. Modern PCB circuitry starts with copper covering the entire board and removes the unnecessary metal. Originally, however, metal was deposited as a form of lithography used by commercial printers, truly printing the circuitry.) The component leads were inserted in holes drilled or punched through the board and metal. Solder connected the leads to the metal and completed the electrical circuit.
In contrast to the elegant patterns found on modern PCBs, early circuitry was laid out using tape and razor blades with often ungainly results like this:
Over time, when the tracks became narrower to allow more circuitry to fit in the same are, donuts of extra metal were left around the through-holes so solder could connect the circuitry to the component lead. These donuts (which, in truth, were not always round) were originally known as “lands” but gradually “pads” became more widely used.
PCBs would become much more complex over time. Adding metal inside the holes (“plated through-holes”) allowed using both sides of the board for printed circuitry (“double-sided PCBs”). Laminating boards together (“multilayer PCBs”) allowed the addition of internal tracks. Pure through-hole assemblies increasingly gave way to “hybrid” assemblies that combined through-hole and SMDs. And some circuit “boards” are flexible ribbons rather than rigid plates. Each new generation of PCBs presented new challenges and requirements for more complex wave soldering machines. But wave soldering began with these simple PCBs and was just as primitive.
The first printed circuit assemblies were soldered the same way as wired vacuum tube assemblies – by hand. But with all the solder points on a single flat plane, new ways of thinking about process were inevitable. Soldering all the leads simultaneously rather than individually made sense. The question was: how? And the first answer was “dip” soldering.
First Effort: Dip Soldering
Dip soldering placed the fluxed assembly flat on a pool of liquid solder. And it was not hugely successful. Besides being dirty, hot, smelly, and rather dangerous, the labor savings were modest and the solder results – opens (no solder), partial connections, webbing, spikes and shorts – were consistently inconsistent. The process was quickly abandoned except for a few primarily mechanical assemblies.
Second Effort: Drag Soldering
“Drag” soldering (an automated form of dip soldering) came next. Instead of a muscular human to do the heavy work, a conveyor moved the assembly onto, across and out of a solder pool. This was fairly efficient and much more popular with operators who no longer had to risk burns or inhale fumes.
Third Effort: Wave Soldering
There were problems, however. In particular, sagging as the hot solder softened the PCB resulted in inconsistent contact (and inconsistent solder connections) between the assembly and solder bath. Entrapped flux globs often showed up in connections which should have been filled with solder. (“Rosin connection” still shows up in many industry lists of defects, though the probably largely disappeared years ago with the shrinking of solder joints and reductions in the concentration of rosin. Many fluxes no longer even contain rosin.) Solder oxides tended to form webs across the soldered side of the PCB.
And then someone remembered a closely guarded U.S. military secret of WWII. Proximity fuses set off explosives in weapons like bombs when the devices are within range of their targets. America had proximity fuses and the other side didn’t. The proximity fuses were so effective that authorities regarded them as more important to the war effort than the atomic bomb.
Much of the soldering for fuses had to be carried out by hand. But the connections required for a few subassemblies were all located on a flat surface which made machine soldering possible. A process of passing these subassemblies over flowing solder was more efficient, practical and possible. In other words, they used a primitive wave soldering process.
Like the proximity fuses, the manufacturing process was also highly classified until around 1948. It was then declassified with little fanfare and even less interest. In a world of tubes and wiring, there were few applications suited to flow soldering.
The new solid state circuitry was different. The wires and other items that clustered inside the vacuum tube chassis were gone. All the points to be soldered lay on the same flat surface with nothing to interfere with solder as it flowed across the bottom of the PCB. Now wave soldering made sense.
The Forces That Determine Perfect Wave Soldering
To state the obvious, any form of soldering must put sufficient solder everywhere it’s needed – and none where it can cause problems (shorts, balls, spikes and the like). That’s the minimum requirement.
We would like to go beyond the minimum as much as possible, though. We would like full 360° solder connections without any gaps in the opening between leads and pads. With plated through-holes, the objective should be complete vertical fill of plated holes. While standards mostly allow for less than ideal, understanding and working with the forces that control solder flow makes 100% perfect more likely.
Those forces include:
1. Stable and Complete Contact…
…between the solder wave, PCB and component leads.
This has several aspects. First, there must be heat to drive off solvents and activate flux (to deoxidize surfaces to be soldered) before the assembly enters the solder wave. This heat is provided by heaters under the conveyor. Next, in the simple case of single-sided PCBs (i.e., no plating in through-holes and, therefore, no requirement for solder to flow up the hole), the solder temperature must be high enough that the solder does not freeze before the assembly has separated from the wave. Finally, for assemblies with plated through-holes, the temperature on the top side of the PCB must be greater than the melting temperature of solder to prevent solder from freezing before achieving complete vertical fill of the hole.
For decades, preheaters were only located under the conveyor. The other source of heat (the solder bath) is also under the conveyor. For heavy PCBs or components with large thermal mass, solder remained liquid long enough to fill through-holes only if the conveyor speed was very slow and/or the solder temperature was higher than necessary. Longer time over the heating elements could scorch the PCB while excessive solder temperature generated more dross, degraded machine components faster and caused sagging or delamination of the PCB.
For almost all modern assemblies, heaters above the assembly as well as below are vital. The greater the amount of energy provided by the top preheaters, the less heat is necessary on the bottom. Except for components with very heat sensitive bodies (long ago, bodies made of polyethylene were not uncommon), heating the top of the PCB to 300°F or (occasionally) more before the wave works well. Even with low melting temperature components, placing heat shields over the parts typically provides adequate protection.
The term “cold solder” is common in North American electronics. In most cases, the “cold” solder is actually the result of failure to remove oxides (non-wetting, in other words) not lack of heat. (The equivalent term in Britain has always been the more accurate “dry” joint.) Incomplete vertical fill of a plated hole because the solder froze is the one phenomenon that can properly be called “cold solder.” And the solution is top-side preheaters.
3. Speed of Separation of the PCB from the Solder Wave
Slower separation provides more opportunity for excess solder to drain back into the solder bath.
4. Solder Surface Tension
Surface tension causes solder to snap back, preventing excess solder, especially bridges. Oxidation of the liquid solder as the assembly leaves the wave reduces the surface tension and causes excess solder. (Solder “icicles” rarely result from inadequate solder heat. Most “icicles” result from oxides encasing the liquid solder and killing the surface tension that causes solder to pull back. The “icicle” terminology is erroneous because the spike holds its shape despite the solder being liquid. Without the surface oxide, surface tension would pull the solder back.)
5. Interatomic Attraction
Failure to completely deoxidize leads before they enter the wave results in two defects.
First, solder will not wet to an oxidized surface. Electricity is the flow of electrons from atom to atom in a conductor. Metals in which electrons move most easily are the best electrical conductors. However, those metals do not like being in their pure state with easily moved electrons; they want to combine (i.e., react) with other element(s) to form compounds that lock electrons in place. Where the pure metal had reactive energy, the compound is stable (often referred to as “passive”).
For all practical purposes, solder is pure metal where it contacts a component surface. (The liquid solder oxidizes but the oxides, being lighter, is pushed aside by the denser metal.) When solder is applied to pure metal, the desire of the two metals to combine draws the solder over the metal surface until the attractive force (“interatomic attraction”) is exactly offset by the solder’s surface tension. Interatomic attraction is the force responsible for solder wetting the metal surface. (Wetting results in a new compound known as an intermetallic bond between the solder and metal.) If the metal has oxidized, however, the need to share electrons vanishes. Without interatomic attraction, wetting does not occur. In fact, surface tension causes the solder to be repelled by the oxidized surface.
Interatomic attraction prevents a second defect: lifted parts. The wave exerts upward pressure on through-hole parts. If the leads are deoxidized, however, interatomic attraction between the leads and solder will pull the component back to the PCB surface. Machine operators without understanding solderability and deoxidation, often resulted to placing weights on components to prevent lifting. At least one company went so far as to shrink wrap the PCA before wave soldering, tearing the plastic film off after soldering. (No, this is not acceptable practice. Aside from failing to deal with the root cause of the defect – solderability –mechanical and static damage were inevitable.)
6. Area of Metal Surfaces Where They Emerge from the Wave
Long leads and large pads are easy to recognize as collection points for excess solder. However, that solder sees as a mass of metal may not be recognized by the human brain. In particular, consider a through-hole dual inline package (two rows of leads on the long edges). Unless the leads are unusually far apart, the solder “sees” the row of leads as a single line of metal. Orientation of the part relative to the wave has enormous consequences.
If the component is aligned parallel to the wave, an elastic membrane (we can also think of it as a solid web or stretchy sheet) forms between the leads and wave. The membrane stretches like a taffy pull as the assembly moves farther from the wave. Eventually, the membrane breaks. Most of the solder draws back to the wave because of surface tension (see item 3 above) but the rest snaps to the leads (surface tension again). Because the leads are close together, however, just a small amount of excess solder can join the leads and create a bridge (i.e., short).
If the I.C. is perpendicular to the wave, however, each lead comes out of the wave in sequence and the solder flows down the row rather than clinging to each lead until the final lead. When the last lead emerges from the wave, the solder membrane is more like a thin elastic band rather than a sheet. When the band snaps, only a small quantity of solder clings to the lead and bridging is prevented.
(The orientation rule changes for rectangular components such as quad packs that have leads on four sides. They should be rotated 45°.)
If bridging continues even with proper component alignment and machine operation, adding a non-functional pad at the trailing edge of the leads can draw extra solder and prevent bridging. The term for the non-functional pad is “solder thieve” because it takes away solder.
Alignment is critical but don’t forget the last sentence of item 3: oxidation of the solder’s surface kills the surface tension that breaks bridges and prevents spikes.
The First Wave Soldering Machine
The first wave soldering could not have been simpler. Plates (“ baffles”) were placed in a tank of melted solder (the “pot”). Solder pumped up between the baffles formed a narrow wave with the solder flowing quickly and equally over the front and back plates (i.e. a “symmetrical wave”), in essence a dam except with flow to the back as well as the front. The assembly was dipped in a pan of flux then placed on a flat conveyor. As the conveyor moved the fluxed assembly over the wave, solder flowed across the bottom of the PCB. All going well, the result was solder connections between leads and pads across the entire board.
This wave soldered transistor radio from 1958 shows typical results. The exposed copper areas result from inconsistent height across the width of the wave. The large pads, traces and leads retained a lot of solder and only the wide spacing between between conductors prevented massive bridging. Soldering irons were still needed to clear bridges and spikes and add solder where necessary but the amount of labor was small compared to what had been needed before printed circuits.
The skinny symmetrical wave performed adequately for crude circuitry but, as component technology evolved rapidly and designers needed to pack more components into less space, skinny symmetrical wave’s deficiencies became impossible to ignore. In addition to stabilizing the wave profile, it was necessary to reduce the speed at which the assembly emerged from the wave so solder would have more opportunity to drain into the bath rather than clinging to the circuitry.
The Second Generation: Still Symmetrical
Although it may seem that conveyor speed would determine the speed at which the assembly separate from the solder, that is not the case. With a symmetrical wave, the speed at which solder falls away from the wave crest is so great that conveyor speed is almost irrelevant. Therefore, two machine modifications were introduced, neither of which involved reducing conveyor speed:
First, the distance between the baffles was increased to flatten the wave and slow movement of solder on the wave crest. Second, the conveyor was tilted (6° was common) so the assembly would leave the wave at the relatively flat crest where solder flowed most slowly.
In-line fluxing replaced manual fluxing although the flux was applied in a liquid wave that flooded the PCB. The excessive flux increased materials costs, of course, but cleaning heavy concentrations of rosin after soldering cost far more. The liquid wave would ultimately be replaced, first by foam fluxers then spray.
(Rosin’s function is often believed to be removal of oxides from surfaces to be soldered. But that is not the case. Although rosin, which is derived from the sap of pine trees, does contain a little organic acid, that acid is too mild to remove any meaningful oxides. More robust acids are added to perform deoxidation. Rosin coats the deoxidized surface, forming a barrier that prevents oxygen from reaching – and reoxidizing – the deoxidized metal. Where liquid is required for easier application, solvent is added to the rosin/acid combination. As we will discuss shortly, heavily concentrated rosin flux was useful only during the third generation of wave soldering. For virtually all uses today – and certainly for hand soldering – more than slight amounts of rosin provide no benefit and result in expensive attempts to remove the residues after soldering. Many modern fluxes replace the rosin with other materials like glycols and glycerin that are less messy and can be removed with water.)
Heaters were introduced to drive off solvents, activate the flux and gradually increase PCB temperature so the circuitry would not experience thermal shock (abrupt changes in dimensions of the PCB when subjected to the high solder temperature).
When the assembly entered the solder wave, pressure of the wave displaced much of the flux. Most flux that survived passage through the wave was flushed away during exit from the wave.
To ensure complete contact between the solder and circuitry without solder flowing over the top of the PCB, the wave height was set to come about halfway up the thickness of the PCB.
The assembly emerged from the wave into atmospheric oxygen, so the surface of the solder oxidized and surface tension was lost. (Remember the importance of surface tension – the desire of the solder to draw back into a ball –in prevention of bridging.)
Mixing oil (peanut oil, originally) into the wave was briefly attempted on the theory that the constant flow of oil would produce a continuous coating between the solder and oxygen. The actual result was less successful. The amount of oil varied tremendously across the width of the wave, ranging from completely absent (failing to prevent bridges) to so great that it prevented solder from making contact (causing opens). Making matters worse, the oil was dirty, smelled, and added to materials cost. The experiment did not last long, although the approach was briefly revived later during experiments with wave soldering surface mount components.
Circuit assemblies grew increasingly complex with more components in less and less space. Ultimately, even the combination of flatter wave and angled conveyor could not prevent serious excess solder issues. Every wave solder machine was followed by teams of touchup operators to fix the defects.
The Third Generation: The Wave Becomes Asymmetrical
The next evolution (patented by Electrovert in 1975) was engineering genius. Making the front baffle shorter than the rear baffle and adding a curved forward-facing plate resulted in a flat wave where all solder flow occurs over the front baffle. Although the top of the wave is slightly above the top of the rear baffle, surface tension keeps the solder from flowing over the back. When properly configured, the top of the wave is perfectly motionless – until the assembly enters the wave.
As the assembly enters the wave, the genius behind the wave design becomes evident. If the wave and conveyor heights have been set properly, about half the thickness of the PCB enters the solder wave and solder begins to move across the top of the wave at the same speed as the PCB. Solder displaced by the PCB begins to flow over the rear baffle. Since the assembly and surface solder are moving at the same horizontal speed, the only separation between the PCB and solder is vertical. If the conveyor is moving at 6 ft/min, the speed at which the PCA separates from the solder is only 0.264 ft/min. The critical speed of separation is only a small fraction of the conveyor’s total speed – ample time for excess solder to drain off.
At the same time, something of great importance is happening with respect to the flux (which was now being applied as a foam rather than solid wave). As with the symmetrical wave, most but not all of the flux solids are washed away by the forward flowing solder at the front of the wave. Instead of being washed away as happened with the symmetrical wave, however, the flux that survives stays on the flat solder surface and forms a barrier between the solder and oxygen (i.e., air.) The flux barrier protects solder from oxidizing. Being free of oxides, the solder maintains its high surface tension as the PCB separates from the wave and breaks the web that might otherwise cause bridging.
This is the time when heavy concentrations of rosin in flux proved useful. More rosin going into the wave improved the chances of rosin after the wave. Liquid fluxes containing high concentrations of rosin continue to be sold but they are remnants of this era in wave soldering. Except for wave soldering assemblies that have no SMDs on the wave side of the PCB, so much rosin provides no benefits but the messier assemblies require expensive post-soldering cleaning.
The flat, asymmetrical wave achieved both objectives of slow separation from the solder and a barrier to oxygen. Provided all multileaded devices were correctly oriented to enter the wave head-on rather than sideways (not always possible, especially with edge connectors), wave soldering nirvana had been reached. Perfect soldering was easy and life was great.
Then surface mount devices (SMDs) arrived and life got complicated.
The Fourth Generation: SMDs and Chip Waves
At first, surface mount parts were restricted to the top of the PCB. The surface mount parts were placed and soldered before insertion and wave soldering of through-hole components. That was easy. Inevitably, though, designers began placing surface mount parts on both sides of the PCB. The combination of SMDs and through-hole components became known as “hybrid assembles.” And PCAs created significant new problems.
You can read about the 8 common errors in SMT.
First, the SMDs needed to be fastened to the PCB as it passed through the wave. So, glue was applied to the PCB at the points where the component body would be located. Then the components were placed. The equipment to apply glue was costly and required constant maintenance. The glue cost money and needed curing, which meant adding even more equipment (typically heaters or UV, depending on the type of glue) and increased processing time. And, perhaps worst of all, achieving the proper balance between too little glue (parts would disappear into the solder) and too much (contamination of pads and other surfaces to be soldered) proved to be quite difficult and that difficulty only increased as the parts kept shrinking.
Adding to the complexity, fluid dynamics differ between through-hole and SMD assemblies. With a pure through-hole assembly, there are no obstacles to prevent the solder from making complete contact with all the component leads. The through-hole lead plows into the solder wave like the prow of a boat. Then interatomic attraction draws the solder around the deoxidized lead and up a plated barrel. SMDs, on the other hand, have bodies that cause solder to flow over the trailing edge like a waterfall that may not contact leads at the back of the component. As with through-hole packages, alignment matters.
Technology places limits on what even the best layout engineer can achieve, however. Although properly aligned, some small parts inevitably had to be placed behind larger parts resulting block solder from reaching the smaller components.
Solder skips also occurred because of trapped air or flux. The high rosin concentration fluxes that had been so helpful in preventing excess solder became liabilities with the introduction of SMDs.
Unsoldered connections (opens) were common and, even worse, difficult to detect both visually and by test. (Even without solder, sufficient mechanical contact might exist between the component and pad to fool electrical tests.)
Solder skips became the dominant issue in wave soldering and resulted in the introduction of a new, turbulent (“chip”) wave before the original asymmetrical wave. The turbulence forced the solder to move aggressively in three dimensions, pushing aside flux and overcoming the shadowing effects of component bodies.
Emerging from the chip wave, all the intended connections are indeed soldered. However, a new problem arises. The turbulence causes rapid separation of the assembly from the wave and sweeps away the flux. (Around this time, the foam fluxer gave way to spray nozzles that could better control the volume and coverage of flux.) The assembly leaves the first wave covered with bridges. The function of the asymmetrical wave (now more commonly called the “second wave”) changed from making solder connections to removing the bridges produced by the first wave. (The second wave also provided additional heat to help complete solder fill of plated holes.) But the chip wave meant there could be no flux solids when assemblies left the second wave. So, bridging once again became a serious problem.
There are not many ways to help flux survive reach the exit point of the second wave but substituting matte solder mask for semi–gloss or gloss solder mask often makes a small but meaningful difference. The improvement won’t be dramatic but even a little help is always better than none.
The wave solder machine manufacturers tried a couple of ideas to solve the resurrected excess solder problems, generally without success. The idea of mixing oil from the symmetrical wave era was tried again but disappeared rather quickly because of the same issues (dirty, smelly, costly and prone to blocking solder connections) oil had caused years earlier.
Hot air knives (heated air blown at high pressure at the point of separation between PCA and solder) were tried as well. Again, the results were not good. Blowing away excess solder tended to remove needed solder, as well. Not infrequently, the entire component would disappear.
Finally, the industry decided to replace normal oxygen-containing air with an inert gas – nitrogen. Nitrogen is not truly inert but reacts with very few other elements, none of which are found in the typical electronics plant. So, for the purposes of electronics assembly, nitrogen is “insert.” And nitrogen is plentiful; it makes up roughly 78% of the air around us (oxygen accounts for about 21%). The logic is inescapable but actually achieving sufficiently low oxygen levels to make a meaningful difference (around 500 parts per million, which is only 0.05%) presents several engineering challenges.
Oxygen is denser than nitrogen. Consequently, nitrogen must be injected constantly at high volume or oxygen will simply resume its place. (A sealed chamber would not require nitrogen replacement but would not allow for conveyance of the assemblies, either.) The best option is generally a very long tunnel with nitrogen infusion in the center and air flow out the ends.
Although nitrogen use has become very common, it’s purpose often remains poorly understood. The general belief is that nitrogen’s role is dross reduction. However, while dross formation is reduced, that alone is not normally sufficient to cover the cost of gas and sophisticated equipment. Far more importantly, nitrogen compensates for the missing flux. If sufficient oxygen can be displaced, prevention of excess solder in a dual wave system can perform as well as the single asymmetrical wave system in the pure through-hole era.
One quirk of nitrogen does deserve comment. If the oxygen level drops to around 0.02% or less, solder tends to drop to the wave rather than gradually peeling back. The solder can act like a stone dropped in water and splash back up to the circuitry. In other words, oxygen in general causes soldering problems but almost complete absence creates entirely new issues.
The Fifth Generation: Selective Pallets
Gluing SMDs fell out of fashion within a very few years. The usual practice today is solder paste reflow (generally through ovens) for both sides of the PCB. The assembly is placed in a fixture (“pallet”) that covers the SMDs on the solder wave side. Openings in the pallet allow insertion of the through-hole parts for wave soldering. During passage through the wave, the exposed leads are soldered while the SMDs previously soldered to the bottom of the PCB are protected.
Pallets make wave soldering of hybrid assemblies possible but there are serious liabilities. The most obvious is extra handling because the assemblies must be placed in pallets at the start of the conveyor and removed at the end. (Handling a hot pallet is no one’s idea of fun.) Extra handling also increases throughput time (reduces output). Moreover, the pallets themselves are expensive and tend to wear out quickly because of contact with the solder and constant temperature cycling. Different types of PCAs require their own pallets. Flux residues must be removed. Latches break.
And then there are soldering issues, of which there are many including no solder (skips), excess solder (bridges, webbing, solder balls), and insufficient vertical fill of plated through-holes. Skips result primarily from solder surface tension that prevents consistent contact with leads located next to the walls surrounding the openings for through-hole leads. Increasing chip pressure can force the solder into tight spaces and up to the edges of through-hole openings but adds the risk of solder flowing into the SMD pockets. The rapid solder flow with the chip wave also means rapid separation of parts from solder that causes bridges. Given the greater ability of in-circuit test to catch bridges than shorts, the chances of these defects reaching a customer are not great but clearing bridges is an expensive manual operation.
Wave soldering hybrid assemblies will always result in defects. However, a few ways to reduce defects do exist, including:
- Make the openings as large as possible. (In other words, minimize the area covering SMDs.) Design pays an important role in enabling this but, as always, technology and circuitry requirements constrain even the best designers.
- Make the pallet plate as thin as possible. However, the thickness is dictated by the highest profile surface mount components. (The pallet plate must be thick enough that enough to cover the component after routing out the pocket that will contain the part.)
- Chamfer the edges of the through-hole openings.
- Cut channels in the pallet perpendicular to the solder wave, reducing resistance to solder flow.
- Keep individual through-hole leads as far as possible from walls of the openings.
- Make pads near the pallet openings larger to increase the probability of contact with solder.
THE BOTTOM LINE
Nothing beats a single asymmetrical solder wave (generally with top-side preheaters as well as the standard heaters beneath the conveyor) for pure through-hole assemblies. With proper design, flux and conveyor speed, defect-free soldering is achievable without nitrogen or much effort. Unfortunately, the days of pure through-hole assembly are pretty much behind us. Like it or not, through-hole components generally are accompanied by surface mount components on both sides of the PCB.
Wave soldering hybrid assemblies almost always requires use of selective soldering pallets. For simple assemblies with lots of clearance between through-hole and surface mount parts (ideally with components grouped by type rather than spread randomly across the PCB), pallets can work rather well, albeit with more handling and cleaning required. But, increasingly, wave soldering hybrid assemblies (with pallets or not) makes less sense than soldering through-hole parts by hand or mini-wave selective solder. I will discuss these other approaches in future columns. | <urn:uuid:57185071-bd42-43e0-8c10-2d866fc2c80e> | {
"dump": "CC-MAIN-2022-49",
"url": "https://www.protoexpress.com/blog/making-sense-wave-soldering/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710902.80/warc/CC-MAIN-20221202114800-20221202144800-00689.warc.gz",
"language": "en",
"language_score": 0.9590878486633301,
"token_count": 7826,
"score": 3.328125,
"int_score": 3
} |
How does All Quiet on the Western Front differ from a traditional coming-of-age novel, which charts the protagonist’s growth as an individual?
Erich Remarque’s All Quiet on the Western Front describes the young German soldier Paul Bäumer’s experiences in World War I, from his training to his death in battle. However, rather than show us how Paul grows as an individual, developing his own ideas and value system, the novel instead shows how Paul—along with his fellow soldiers—survives the war by doing precisely the opposite. The horrors of battle force the soldiers to develop animalistic instincts and a pack-like bond. There is no place for individuals in war, and therefore no place for a traditional coming-of-age tale.
The opening pages of All Quiet on the Western Front emphasize how war dissolves individual men into a single, collective identity. Most fictional autobiographies are narrated in the first-person singular, as the protagonist recounts his or her development from a child into an adult subject. However, Paul begins his tale by speaking not about himself but about his unit, using the third-person plural pronoun “we.” From the beginning, Paul is assimilated into the mass—a mass, moreover, that has been reduced to bodily functions and animal appetites. The third-person plural resonates throughout this first chapter as the soldiers operate as a single unit, motivated by the same communal desires: “we were growing impatient,” “we got excited,” “we were in just the right mood.” The emotions that drive this group arise not from elevated sentiments but rather from the most fundamental animal needs. What unite the soldiers, the reader discovers, are not the head and the heart, but the stomach and the intestines—full bellies and general latrines.
In order to survive the horrors of war, Paul must perform a type of human sacrifice, eradicating his feelings and sensibilities so that all that remains is, as he puts it, a “human animal.” In Chapter Seven, Paul describes how he must distance himself from his emotions and rely solely on automatic, animal instincts. In war, that which makes a person human can cost a soldier his sanity, if not his life. As Paul puts it, emotions—the qualities that make up individual human experience—are “ornamental enough during peacetime.” A soldier must not only discard his immediate emotional reactions to survive, but he must also sever his ties to the past and plans for the future. The war becomes the focal point of his universe, and his identity before or after becomes an irrelevant distraction. The only things that matter on the battlefield are the immediate physical stimuli: blood, hunger, bullets, and pain.
The soldiers are not only animal-like in the way that they reject human emotions and live completely in the present: The violent ways they struggle for power through the exercise of brute force also make them beastly. In explaining how a seemingly subservient postman like Himmelstoss could turn into such a bully as a drill-sergeant, Paul’s friend and fellow soldier, Kat, points out that the army’s power structure brings out the animals hidden within human beings. Human civilization is just a veneer, Kat argues, and humans have more in common with the animal kingdom than they would like to admit. When he participates in viciously swarming the unsuspecting Himmelstoss, Paul himself illustrates Kat’s point by engaging in behavior more appropriate to a savage herd animal than to a rational human individual.
If, as Kat argues, it is the structure of the army that is responsible for bringing out the soldiers’ collective-minded, animal side, then perhaps armistice will enable these men to recapture their individual humanities. Yet for Paul, the prospect of armistice does not seem to promise a return to the human community. Paul imagines that any return to civilized society will be a profoundly alienating experience, one in which “men will not understand” him and in which veterans of his generation will become “superfluous.” His war experience has excluded Paul from the general civilian community, and now the only form of community he can rely on is the animalism of his fellow soldiers. As Paul voices his fear that his generation will fail to “adapt” to the civilized world, his use of Darwinian language draws a final link between the human and animal kingdoms, suggesting that war not only turns the soldier from a human individual into an animal, but that by doing so it ineradicably alters the individual’s ability to relate to other humans. | <urn:uuid:0f348d06-db92-4f46-9cc7-4d815db775dc> | {
"dump": "CC-MAIN-2018-22",
"url": "http://www.sparknotes.com/lit/allquiet/a-plus-essay/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794864837.40/warc/CC-MAIN-20180522170703-20180522190703-00037.warc.gz",
"language": "en",
"language_score": 0.9703489542007446,
"token_count": 968,
"score": 3.03125,
"int_score": 3
} |
If ever we needed a wake-up call on the state of American children’s health, consider the growing proliferation of Type 2 diabetes in our youth, as detailed in a study recently published in The New England Journal of Medicine. These findings, which warn of many children and adolescents’ alarming future of poor health, are yet another reminder of the serious challenges we face in health care today.
Failure to invest in prevention of this disease for our youngest citizens is a decision to subject them to medical complications, a poorer quality of life and even, in some cases, premature death. The price we all pay by falling short on prevention is sure to be measured beyond simple dollar figures.
When children face other life-threatening situations, like guns in schools or aggressive bullying, our leaders push for immediate action. Why then can we not agree that protecting our children from preventable diseases is an urgent priority?
The U.S. rates of childhood obesity are staggering. So it’s no coincidence that we now find Type 2 diabetes — closely linked to obesity — is escalating at unforeseen rates in the same population, demanding the attention given to any other preventable threat to our youth.
Approximately 215,000 Americans younger than 20 years of age were living with diabetes in 2010, according to the Centers for Disease Control and Prevention, and an additional 3,600 are diagnosed with Type 2 diabetes each year. These numbers are even more sobering in vulnerable, low-income and minority communities.
At first glance, these may seem to be only statistics. But it is important that we focus on the real meaning of this data. The study in The New England Journal of Medicine highlights another dilemma in this troubling picture: the lack of effective pediatric treatment options to manage Type 2 diabetes.
The study compared three treatment options in a group of children and adolescents recently diagnosed with Type 2 diabetes. Surprisingly, all three treatments were almost equally ineffective. In 47 percent, researchers were unable to control and manage the group’s condition. Almost half the kids failed to benefit from the conventional treatments available today.
These implications are astounding. If our youth don’t respond to oral medications and lifestyle changes, they will need more aggressive treatment within only a few years of diagnosis.
In addition, the risk of associated serious complications — heart disease, blindness, kidney failure and amputations — only increases with its duration. So our young people are more likely to suffer from debilitating complications for much of their lives.
The costs of paying for Type 2 diabetes are profound. The U.S. health care system sees an estimated $218 billion annually in costs associated with diabetes. This number will only increase if we must now factor in a youth population experiencing a lifetime suffering from Type 2 diabetes as complications that most likely would increase over a longer period.
There is no doubt that solving this problem is complicated, requiring a serious long-term commitment to protect the health of our children. At its core must be a decision to invest in the preventive efforts that we know can stem the growth of avoidable conditions like Type 2 diabetes.
Though Congress will need to make tough choices to ensure U.S. fiscal soundness, it is shortsighted and irresponsible to use prevention funding to foot the bill. By further slashing this money, we likely will put ourselves back on the path of spending more and getting less from our health care system.
Our health care costs already far exceed costs of other industrialized nations, according to the Commonwealth Fund, but fall short on comparative quality. This dynamic is due, in part, to our inability to prevent and manage chronic diseases.
The ripple effect here is tremendous. In addition to these children’s diminished quality of life, our economy will suffer because of a workforce that is less healthy and less productive.
Consequently, diabetes and other preventable chronic diseases affect all of us — contrary to the view of some in Congress. The Prevention and Public Health Fund offered the country’s first mandatory funding stream dedicated to keeping people from getting sick rather than treating them after the fact.
Falsely labeled as a “slush fund” by House Republicans, who just voted to repeal the program, this money will save lives and with them, we can invest in evidenced-based public health strategies to stop conditions like Type 2 diabetes in their tracks. It is critical that we better understand how to prevent the onset of this disease in our kids and the connection it shares with our nation’s obesity epidemic.
Only then will we be able to improve the health of our youth.
Former Senate Majority Leader Tom Daschle (D-S.D.) is now a senior policy adviser at DLA Piper, whose clients include Novo Nordisk, a health care company that focuses on diabetes care. | <urn:uuid:b3dda927-81f6-4c48-9d5d-4fd5792f23ac> | {
"dump": "CC-MAIN-2014-42",
"url": "http://dyn.politico.com/printstory.cfm?uuid=10EFD1C1-9830-4D45-A09A-F21B3A7BC343",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414119645866.1/warc/CC-MAIN-20141024030045-00068-ip-10-16-133-185.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9452255368232727,
"token_count": 973,
"score": 2.765625,
"int_score": 3
} |
Today is Model Monday. For more information see the warm up in an earlier lesson here.
I want to give students a very basic reminder to help them improve their sentence quality -focusing today on opening our sentences with common subordinating conjunctions.
Specifically, I'll introduce my students to AAAWWUBBIS ala Jeff Anderson's Mechanically Inclined. (A book worth purchasing!) AAAWWUBBIS stands for after, although, as, when, while, until, because, before, if, since.
Copy the following sentences:
1. After practice ended, we had ice cream.
2. Since it's cold outside, we decided to stay indoors.
3. If you are finished with your work, you may read your library book.
Below these write:
What I notice about these sentences:
After their discussion time, I will ask students to share what they noticed and I'll steer them toward what I want them to notice. What I want students to notice is that these sentences do not follow the typical subject or noun -predicate structure many of my students are accustomed to using in their writing. Each sentence opens with an AAAWWUBBIS which pretty much guarantees the need for a comma at the end of the opening clause. That clause is attached to the beginning of an independent clause/sentence to improve the sentence.
There are loads of practice and information about the AAAWWWUBBIS idea online. Here is a one sheet helper. For more -quality - search AAAWWUBBIS and Jeff Anderson.
Basically, I want students to vary their sentences as a result of this practice, so I will ask students to, write their own three sentences using any of the AAAWWUBBIS words, but imitating the pattern of each of the three above. After writing time, students will share these at their table and choose one per table to share with the class.
We will build from here with in class writing and journal tasks and the next Model Monday.
Our last class was about allowing students to see what is out there and find a topic that speaks to them.
Today, I want students to use a bit of tunnel vision and focus on the area they have discovered. They are permitted to "google it" or go back to the sites used in the last class.
The goal today is to establish the angle they want to attack their topic from. I'll ask students, "What is your purpose/ goal in reference to the topic? This is an argument piece, so what will your argument and support look like? How much support do you need? We'll talk about this last question in reference to what we have practiced all year. Three is the magic number - less is too little and more is just over kill (Can cause some reasons to appear weak.)
Again, I will ask that they take notes in their journal, so to help them focus, I'll list the goals on the SMART board-
1. Consider - What is my purpose? - what do I want to do with the topic?
2. What is my point/argument? What new ideas or "spin" can I discover? (write this out)
3. What support do I have or need? (write this out)
To wrap up class today, I'll ask students (again) to share with a neighbor, but not the same person they shared ideas with yesterday. I want them to give opinions and suggestions as they discuss where they are in the process.
I'll also note that for those who are a little stuck, this is homework. I want concrete ideas flowing for class tomorrow. | <urn:uuid:394fc0f6-c079-414a-8d72-e433bf63261b> | {
"dump": "CC-MAIN-2020-50",
"url": "https://betterlesson.com/lesson/599623/research-part-2?from=breadcrumb_lesson",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141195967.34/warc/CC-MAIN-20201129004335-20201129034335-00208.warc.gz",
"language": "en",
"language_score": 0.971407949924469,
"token_count": 749,
"score": 3.296875,
"int_score": 3
} |
Take These Tips On Maintaining Balance
And Keep Yourself Upright And Grounded.
We’re all likely to fall at some point, no matter how old we are. But it is possible to lower your risk of falling and, more important, reduce your chances of seriously injuring yourself when you do fall down. How? By being more physically active.
You may still fall down occasionally, even if you’re in good shape and have great balance. It might not seem right that being on the move actually increases your risk of falling, while at the same time makes you less likely to injure yourself. But it does make sense: Sitting around all the time, even if you’re doing it because you’re afraid of falling, makes you more likely to be seriously injured when you do fall.
6 Tips To Help Prevent Falls
1 Get moving. Being active on a daily basis may be the most important thing you do to keep from falling. You’ll want to include daily strengthening, balance, and flexibility exercises, and stay as healthy as you can.
2 Pretend you’re a stork. The exercises you do to improve your balance can be as simple as standing on one leg at a time. First, hold on to something stable with one or both hands, and then stay upright without holding on to anything. When you feel comfortable like this, try the same thing again with your eyes closed instead of open. You’ll have better balance if you also work on the strength of your legs and core. A good, inexpensive way to do this is with planks, lunges, and other exercises that use your body weight as resistance.
3 Add padding to your hips. If you’re prone to falls, wearing hip pads can soften your landings and can lower your risk of fracturing your hips when you do fall. Because hip fractures can easily shorten your life, do whatever you can to prevent them.
4 Take simple precautions. Reduce your risk of falling by making sure there’s enough light in your house, especially at night. You’ll also want to be sure that your shoes fit well, that your vision is as good as it can be (with better glasses or cataract removal, if you need it), and that you rest when you’re tired. It is also very important to get rid of any floor clutter or uneven rugs.
5 Consider your feet. Anything that affects how well you walk can make you fall. Bunions, calluses, and deformed toes all increase your risk of falling. Don’t wear wobbly high-heeled shoes if you want to stay on your feet. It is very important that you inspect your feet daily for problem areas, especially if you’ve lost some feeling in them.
6 Try not to rush. If you rush to make it to the bathroom, you might fall. The more times you have to get up at night to urinate, the more likely you are to fall. Try not to drink so much fluid that you have to race to the bathroom as you age (and wear Depend underwear if you have trouble making it in time).
By Sheri Colberg, PhD | <urn:uuid:53574eed-3042-4b92-b71e-b983254ec2ff> | {
"dump": "CC-MAIN-2017-30",
"url": "http://cdiabetes.com/fall2014/stay-active-age-help-prevent-falls/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549427750.52/warc/CC-MAIN-20170727082427-20170727102427-00043.warc.gz",
"language": "en",
"language_score": 0.958544909954071,
"token_count": 665,
"score": 2.90625,
"int_score": 3
} |
Unusual & Old Fashioned Fruit Trees
The Crab Apple
Apple trees are normally thought of as ornamental trees only, but they
do produce a worthwhile crop of fruits, that although small and tart
compared to a normal apple, are very useful in the kitchen.
Once they have fully ripened Crab Apple jelly is easy to make because
the fruit is high in Pectin which is necessary to set jams and jellies.
Up until the Middle Ages Crab Apples were also used to make an early
type of vinegar that was used in pickling, before grapes were imported.
ways to cook with Crab Apples involved spiking them with a knife and
heating them in a pan with spiced vinegar and sugar. Then the apples
were stored in jars, with some of the solution, until wanted and served
up with game and red meats. Although tart, the addition of one or two
chopped Crab apples to ordinary fruit pies and flans will add a little
more bite to the preparation.
are many varieties of Crab Apples sold in Garden Centres for both their
blossom and colourful Autumn fruits that can be red or yellow. Other
gardeners grow them because they are an excellent pollinator for most
other desert and cooking apple trees due in part to their long flowering
period. In gardens where they are planted, insects, particularly bees,
are drawn to their blossom in the Spring in huge numbers, so the trees
also improve general pollination of flowers in the garden.
with many fruit trees they can be found in small column varieties that
can be grown in pots on patios, and others up to full size 20 or 30 foot
trees. They are easy to grow and will fruit well with little attention
as long as they have moisture in the ground when the fruit is
as Crab Apples are properly called, can be found on sale at any Garden
Centre with other fruit trees. Varieties include the yellow fruiting
Golden Hornet and red species Robusta. Most Crabs have white blossom,
but there are some, such as the Cashmere Crab, that have pink blossom
and red leaves for added colour. | <urn:uuid:5911ed50-8a67-4486-925f-db3143339b39> | {
"dump": "CC-MAIN-2023-40",
"url": "http://the-site.name/trees/crabs.htm",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510297.25/warc/CC-MAIN-20230927103312-20230927133312-00490.warc.gz",
"language": "en",
"language_score": 0.9554752111434937,
"token_count": 496,
"score": 2.8125,
"int_score": 3
} |
The word game “Doublet” was invented by Lewis Carroll (1832-1898), the author of children’s classics “Alice in Wonderland”, Lewis Carroll was also a mathematician, who was known to his fellow mathematicians as Charles L. Dodgson. Aside from children’s classics, he had also written a number mathematics books.
The game Doublets is also known by other names such as Word Chains, Word Ladders, and Stepwords. After its first appearance in the magazine Vanity Fair, it became a popular word game. This game is a word transformation puzzle. As mentioned by Lewis Carroll himself, the rules of the puzzle are simple. Two words of similar length are given. The objective is to transform the first word into the second word by forming successive words of the same length having changing only one letter at a time. The greater challenge is to do the transformation in the least number of words. This word game became a favorite when the magazine Vanity Fair ran a contest of the Game of Doublets. | <urn:uuid:1ecfba7f-1c80-42cb-b16d-132f86bd89a1> | {
"dump": "CC-MAIN-2018-47",
"url": "http://blog.dialectzone.org/thanksgiving-coloring-page-doublet-game/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039743960.44/warc/CC-MAIN-20181118011216-20181118033216-00447.warc.gz",
"language": "en",
"language_score": 0.9856891632080078,
"token_count": 214,
"score": 3.625,
"int_score": 4
} |
How to Fall Slower Than Gravity (eBook)
by Paul J. Nahin (Author)
- 320 Pages
An engaging collection of intriguing problems that shows you how to think like a mathematical physicist
Paul Nahin is a master at explaining odd phenomena through straightforward mathematics. In this collection of twenty-six intriguing problems, he explores how mathematical physicists think. Always entertaining, the problems range from ancient catapult conundrums to the puzzling physics of a very peculiar kind of glass called NASTYGLASS—and from dodging trucks to why raindrops fall slower than the rate of gravity. The questions raised may seem impossible to answer at first and may require an unexpected twist in reasoning, but sometimes their solutions are surprisingly simple. Nahin’s goal, however, is always to guide readers—who will need only to have studied advanced high school math and physics—in expanding their mathematical thinking to make sense of the curiosities of the physical world.
The problems are in the first part of the book and the solutions are in the second, so that readers may challenge themselves to solve the questions on their own before looking at the explanations. The problems show how mathematics—including algebra, trigonometry, geometry, and calculus—can be united with physical laws to solve both real and theoretical problems. Historical anecdotes woven throughout the book bring alive the circumstances and people involved in some amazing discoveries and achievements.
More than a puzzle book, this work will immerse you in the delights of scientific history while honing your math skills.
- Released: November 27, 2018
- Language: English
- Publisher: Princeton University Press
- ISBN-10: 0691185026
- ISBN-13: 9780691185026 | <urn:uuid:2ef82151-dfea-441a-b4cd-b795c9e07383> | {
"dump": "CC-MAIN-2021-17",
"url": "https://www.bookshout.com/ebooks/how-to-fall-slower-than-gravity",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038879305.68/warc/CC-MAIN-20210419080654-20210419110654-00493.warc.gz",
"language": "en",
"language_score": 0.926050066947937,
"token_count": 354,
"score": 2.640625,
"int_score": 3
} |
A silverware spoiler: People used to hate the fork. When first introduced in Italy, and then in France and England, it did not go over well.
And we're not talking about the kind of eh, I'm-not-going-to-use-that-weird-thing kind of dislike; we're talking straight TOOL OF THE DEVIL abhorrence.
The whole history of the fork started off pretty benign - at least from what we can tell. The Greeks used a fork-like tool to keep their kill from twisting around while they carved it. The thing had two spears extending toward the table that secured meat and then slid easily from the flesh. A similarly styled instrument also popped up in royal courts in the Middle East in the 7th century, but this time it was used for actual eating. Because the fork was straight from handle to tine, picking up food required a stab and lift motion. Something like peas were absolutely out of the question, but we'll get to that later.
The fork drama really started when a Byzantine-born princess married the doge of Venice in 1005. She ate with a set of golden forks she brought with her, and the Italians were not pleased. "Food was a gift from God, and to use an artificial means of conveying it to the mouth implied that this heavenly gift was unfit to be touched by human hands," explains the book Feeding Desire. The plague caught up with her shortly thereafter, and Venice clergymen claimed her use of the two-pronged (horned!) utensil of vanity prompted the punishment from God.
This tool-of-the-devil branding effectively buried the flatware. "The fork was fraught with such negative meaning when first introduced in Europe that it didn't resurface for several centuries," says Darra Goldstein, Editor-in-Chief of the food and culture journal Gastronomica. But by the 1500s, Italians finally got behind what looked like a straight, small, pointy tuning fork. Forward-thinking travellers brought the innovative implement back to France and England, but instead of excitement over a clean-handed future, the fork was met with much scepticism. The French thought that, at just a few inches in length, it was too effeminate to use. And the English, like the early Italians, felt that God had deemed it unnecessary.
Luckily, in the war with affectation and the Almighty, the fork won.
By the mid-1600s, wealthy Brits had deemed the fork fashionable, and included the third utensil on their table. At first forks were crafted out of whatever materials were locally available like iron or bronze. But because the fork was an indication of status, moneyed citizens shelled out for mouth-shovels with bling. Materials like mother of pearl, amber, and jade were introduced.
But even though forks got fancier, they weren't actually any better at picking up grub.
It was food fashion that eventually shaped a better fork. In the 17th century, peas (seriously) were all the rage among the French nobility. But eating them was tricky. Imagine how hard it would be to swallow a plate-full using metal toothpicks attached to a fancy stick. You couldn't scoop the peas up because there was a wide food-swallowing hole between the fork's two tines. And spearing was obviously time consuming. So the tech evolved. Silversmiths closed the gap by adding an extra tine or two in the middle. They also made the whole instrument bigger and pushed the plate-hitting part upwards, allowing the spears to now scoop as well as stab. Et voilà! A fork fit for food.
But it wasn't until commercial electroplating began in 1840 with the discovery of cyanide solutions that the not so humble fork hit the masses. Solid silver was much more expensive than something just plated with it. Before then, most simply couldn't afford access to the utensil.
By the 20th century, fork design started swinging the way of utility and ergonomics over decoration. (Ornate handles just weren't comfortable in the hand.) Danish silversmith Georg Jensen, who focused on function instead of frills, popularised streamlined silverware. Stainless steel also appeared in the flatware game, which didn't require the same kind of elbow grease to keep sparkly.
Without the time, attention, and status, the fork became a common object. Centuries of tweaks have landed the fork squarely in the category of things we don't even think about-a measure of a truly successful design.
Rachel Swaby is a freelance writer living in San Francisco. Check her out on Twitter. | <urn:uuid:47ae9b45-fea2-46cf-bf50-f2a13a15e5f2> | {
"dump": "CC-MAIN-2018-34",
"url": "https://www.gizmodo.com.au/2011/07/the-devil-didnt-invent-the-fork/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221211146.17/warc/CC-MAIN-20180816171947-20180816191947-00572.warc.gz",
"language": "en",
"language_score": 0.9754112958908081,
"token_count": 975,
"score": 2.765625,
"int_score": 3
} |
The world, as we know it, has shrunk to be termed as a global village. English language has become one of the principal assets in the international communication; in fact, it is called the International Language. Furthermore, it is the most dominant language of diplomacy, business and science, economy, technology and Internet. The knowledge of the English language opens the door of opportunities.
Thousands of Muslims around the world attend institutions that do not prepare them for the modern day world. Students are taught in either the Arabic language or their native tongue, which leaves their graduates with minimum opportunities for furthering their education or joining the English language dominated workforce. As a result, they have a weak or, in most cases, absolutely no foundation in the English language.
Unfortunately, learning English from the traditional materials means exposing Muslim students to the presentation of Judeo-Christian culture and un-Islamic practices. However, if we do not keep abreast with the modern standards of education, we will be left far behind in the world arena and hence will have no significant role to play towards the betterment of the Muslim nation as a whole.
Dr. Bilal Philips understands the crucial position the English language plays in the modern day global society and challenges faced by the Muslim community when acquiring the language from the traditional materials. Thus, he presents to the Muslim world "Halaal English"; the study of the English language free from un-Islamic practices and corrupted ideas. | <urn:uuid:01a594a4-6aa6-4981-9904-a3c6be9e6209> | {
"dump": "CC-MAIN-2017-30",
"url": "http://iou-help.com/background/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423774.37/warc/CC-MAIN-20170721122327-20170721142327-00517.warc.gz",
"language": "en",
"language_score": 0.9436658024787903,
"token_count": 292,
"score": 2.71875,
"int_score": 3
} |
The workshop to the same basic form of a composition session:
- Group building
- Presentation of Materials
- Setting the Task
The preparation prior to the workshop I gathered a range on material about rocks, toads, rituals, creation myths in the form of stories, poems, maps, essays, pictures and artifacts,
Compositions are dependent on people working as a group, accepting and building on each other’s offers so we start with introducing or reviewing the basic principles of improvisation, and encouraging people to work collaboratively.
Group Ball Throwing Warm up.
Everyone gets in a circle. Start by having one ball thrown round the circle each person marking who throws to them and whom they throw too. Start with everyone holding one hand in the air and when they get passed the ball they take their arm down. They throw the ball a few times to become familiar with the pattern. If they drop the ball they should be told “don’t think of it as a failure, don’t echo it, simply go pick the ball up and carry on. Don’t say sorry, either as a catcher or a thrower”.
/ Once they have improved catching and throwing add another ball, each time they improve significantly add another ball. We got three going.
The group is then asked to walk about the space receiving a ball from and throwing to the same people as before. They can throw or pass according to the distance they are from each other at the time. / Sometimes they are close enough to just pass the ball hand to hand. Add more balls/ Add another ball when they they are experienced enough.
Blocking - Peer Pressure Persuasion.
This exercise introduces accepting and blocking. Two players enthusiastically try and persuade a third to do something - Go out for a meal, to the theatre, a holiday- and they say “No’ and justify why.
Two people. A makes an offer. B says “Yes and…”
This is the most fundamental rule of improvisation ad devising. Look at this very simple exchange:
A ”Do you fancy a night out?” This is what we call an offer. It’s an invitation to do something.
B “Yes that would be great” Is accepting the offer. “And we could go bowling” This is making a further offer building on the first. Creating a scene like this means it’s always moving forward.
Discussion on Accepting and Blocking
We had a discussion about the difference between the “Yes and…” the accepting game and the “No…” blocking game. We concluded that we use just as much imagination saying no and justifying it as saying “Yes and.” The difference was “Yes and…” felt more positive, people became more energized; it takes you on a journey. So making a story happens when you stay positive. Stay out of conflict with each other for as long as possible. Just give some time before you add conflict. Conflict is when the something unusual happens in your everyday world. Stories usually start by showing us the everyday world of the character before something unusual happens. The everyday world we call ‘The platform’ the first unusual thing we call a tilt.
Start positive - establish the platform before you tilt. I suggested they think of your partner as a genius and his or her offer as a gift.
Giving Presents (AN OFFER IS A GIFT)
To encourage them to be positive they gave mimed presents to each other. I wanted them to be delighted with them and to say things like: “this is perfect, just what I wanted” Wow how did you know?” They moved around the room exchanging presents. Giving things they genuinely thought their partner would want. Then I asked them to give them mimed wrapped presents and this time the recipient was to define what it was not the giver. The joy you find in the present should be positive to make the giver feel good about what they’ve given you. They have given you the perfect present. Both these present giving games are about making your partner feel good. This is the second golden rule of improvisation.
We then played a game about the imagination.
This is Not a Chair
Everyone sat ion chairs in a circle and an empty chair was in the middl. I told them “This is not a chair…” and invited them to come into the centre if or when they had an idea to use it as if was something other than a chair. It’s perfectly fine to sit where they are if they don’t think of anything but I guessed that the group together was likely to think of more than fifty things between them. There was a pause and then someone stepped forward and used it as a zimmer frame. It started slowly, when it got to ten it sped up, they reached fifty in about eight minutes. It became a lawn mower, a pram, a supermarket trolley; then someone picked it became a hat, followed by a guitar, guitar, a backpack, then someone crawled under it, it became a POW escape tunnel, a MRI scanner. We talked about the collective imagination within the group; it exceeds that of any one individual and prompted individuals to think of ideas they wouldn’t have come up with on their own. It’s essential to trust that the collective imaginative power will support you.
In pairs they were given a single piece of paper and coloured pens. They were to illustrate a story I told them. They were to both work on the same picture, but were not to talk or communicate with each other, other that through the drawing. A started and on a signal B took over. Back and forth with drawing time of five, ten very occasionally fifteen seconds between. They were then to title the picture alternating between the two of them adding one letter at a time.
The Silent Tableaux
We came together as full group (15 people). Stood in a circle. I said we were now going to create a sculpture without talking. One person was to go into the centre and make a shape. It doesn’t matter if the shape represents something of not, but I did ask that it has a human quality of standing or walking or some gesture or activity. Once we had the first person in a frozen shape, another was to enter and create a shape that they think relates to or belongs to the first one. Then a third person enters, an them maybe a fourth. The group standing in the circle was to then move round the sculpture and see it from different viewpoints. They were to them think of a title but not to share the thought. We returned to the circle nd people spoke their titles out loud.
Notes on the Game: We talked about the statue through it’s different stages, what everyone felt it represented. “Someone standing in front of mirror” “An arrogant bully” “trying on a new outfit” etc. Then the second sculpture with two people, very few people changed there minds and simply justified the first idea with the second there was more consensus “ the shop assistant showing approval” “The Kings dresser.” One or two people changed their point of view changing from bully to “a high class tailors” By the third sculpture everyone was in total agreement it was trying on clothes in a shop with an assistant and friend”
Discussion reviewing what we have done so far and “the other identity in the room”
All the exercises and discussions up to this point were about accepting, building on those ideas, making adjustments to accommodate what your partner offers. There were also things about work as group, searching for census; that an idea can emerge out of the group that no one individual initiated. We talked about the group as “another identity in the room” another personality we can listen to and follow.
What we have done so far is about how we need to work together. That every session should begin with similar exercises that confirms and develops skills to work creatively as a group and with each other. Now we will look at some performance techniques that might inform the composition
Once we begin to know how to work together the facilitator of the composition workshop should give the participants a theatre language and techniques pertinent to the task they will set to devise a presentation.
As the composition task is to be directly about the rocks I thought it would be useful to do some mime work about resistance, leading to The clay man
In pairs, facing each other one foot in front of the other, reach both arms out in front so the palms of you and your partner’s hands are flat against each other, fingers pointing upward. When I ask you to start to add a gentle pressure so you are pushing against your partners hands. Slowly increase the pressure until you reach a point where one of you can’t offer any more force. Find the point of the maximum strength of the weakest person, and hold tht pressure - this is not a competition. Push. Relax. Try again and this time the strongest of you allows the other to win at the point you feel you are at the weakest members full potential. Let them win.
Same exercise but this time your hands are a bricks width apart 3”inces in old money. Push but keep the gap consistently the same. Try and win, allow yourself to be beaten, find the strength to win again. Show your partner your conviction to beat them and the struggle to defeat tem as you agree to loose. Give your partner what you feel they want. When they appear to want to win let them or lose, let them. If you are really exerting honest strength you will feel more exhausted by this exercise thn the previous.
Take a one-minute rest or shake out.
Sit quietly on your own and molding take some imagined clay in your hands: Imagine it sitting in you hands, feel its weight. Shave some sense memory of pushing and start molding it into something. Try and see the clay between your hands. Try and feel the resistance of the clay, it has a certain tension. The thicker the piece of clay the harder it is to manipulate or bend it, you need to exert more effort, greater pressure, just as you did with the pushing, Keep manipulating the clay, watch the clay take shape. Once I start to see a believable tension in their hands I asked them to keep modeling but look at your hands, they have taken on the tension of clay. It is now in your fingers. Watch the effect on your hands. Take the tension into your wrists, which are thicker than your finger so needs greater tension. Then move the elbow, then the shoulder. Moving just the arms make sure the- finger, wrists, elbows, and shoulders all have their different states of tension. Remember these are all relatively light to bending at the waist.
Molding partners – Everyone got into pairs. One then molded the other, starting with the hands and wrists, moving up to the elbow, shoulder, head and neck; finally the torso and legs. The sculptor moved the joint whilst the model resisted. Between them, with the sculptor asking for more or less resistance, they found a convincing quality of clay for each joint. The sculptors then walked round the ‘gallery’ of models. There was consensus that they looked amazingly like sculpted figures. ”They are alive but still” “They are all caught in a movement or gesture” “These could be works of art”
We now come to the composition
The main group broke into three smaller groups of five.. I explained that the key to composition work is to do a lot in a little time. When time limits are imposed and we not given time to think or talk too much wonderful work often emerges; what surfaces does not come out analysing ideas, but from your impulses, your dreams, your emotions. We call this “Exquisite Pressure” and it’s achieved by creating an environment where forces lean on the participants in a way that enables more, not less, creativity. Exquisite pressure comes from an attitude of necessity and respect for the people with whom you are working, for the amount of time you have, for the room you work in, for what you’re doing with all of these,
Choosing from the material
I described very briefly the material I had gathered to be the stimulus for there composition. I didn’t allow them to read any of material; they should just collectively come to an agreement about which one to work on. I told them they will have no more than a minute to choose.
- A collection of different Frog and Prince Stories including Brothers Grimm; An Anglo Scottish border version called “The well at the end of the world” ”The Well at the end of the world” and The Frog Prince, a poem by Stevie Smith
- An Iroquois creation myth involving a frog
- An essay about frogs and toads in relation to Climate Change
- An essay on Symbolism & psychopharmacology - Frogs toads transformation, poison, hallucination, transcendence.
- An article about Toadstones - jewels that are supposed to be lodged in the toads skulls.
- Articles about ritual, especially Well Dressing - perhaps with a view of creating a ritual to “dress the Toad”.
- Sophia - a different interpretation of the fall of Adam and Eve, in which the serpent is the hero, for offering wisdom to woman.
Group 1 Chose: The Iroquois Creation myth
Group 2 chose: Climate Change
Group 3chose: Sophia - the wisdom given to women.
We create exquisite pressure by giving just the right amount of ingredients for the assignment (not too few, not too many) and determining the complexity of the assignment. There should be levels of difficulty with which you begin and to which you graduate. But in all cases, the challenge needs to be great enough, the stakes high enough for the group to enter into a state of spontaneous play.
So todays Task
- Should be loosely based on the material I give them.
- It should incorporate the object I will give you (I gave them all a stone frog)
- It should incorporate one or more of the exercises we’ve done today
- The presentation should be less than two minutes
- Some section of the presentation should involve the audience.
Before I handed out the material I remind the group not to spend their time sitting and discussing and planning. From the start they should be on their feet. You can tell when a group is stuck- they are invariably sitting in a circle. Looking at their pieces of paper, all talking at once or not at all as they try to “come up with ideas”; but when a group is engaged they look like kids in a playground. I suggested they pick out phrases, or images or a short section, or story they find in the material and go with something short, simple, clear. They don’t have tor read the whole thing, it doesn’t need to be accurate or illustrate verbatim. Take a single idea and get on your feet, and see what happens with everyone listening to the group. Let your ideas go or incorporate them - don’t fight over choices. If a leader emerges at one point, let them, then you may take a lead, sometimes it should feel that no-one is leading it’s just happening. This will only happen in the doing, most unlikely will it happen in the talking. Get into improvisation mode as soon as possible. Create something. Repeat it maybe making adjustments, introducing something ne. Do it again.
They have three minutes reading talking
Now on your feet - you have ten minutes.
Every group had something to slow in ten minutes, One group finished early, I told them to use the entire time to repeat, polish, adjust, and improve. There was a playful atmosphere, the pressure wasn’t stressful it was fun, relaxed.
Presentations are disposable, they are akin to a painter’s sketchbook, they are ideas, half formulated plans, prompts. They can be developed or incorporated with other sketches at another time. They can be disposed of. But we will always record them because they may be useful later on, we can’t know, we don’t judge. Out of one two hour composition workshop we may end up with two minutes theatre or ten, or half -ideas we want to explore later. You cannot judge the success of a composition session by what you think is useful and what is not. What is not can so often be the germ of a fundamental idea that becomes the key to the play. We won’t know till its happening. | <urn:uuid:986ddbd2-ef37-475c-b6fe-ab9a44c7a67a> | {
"dump": "CC-MAIN-2019-09",
"url": "http://www.communityplays.com/blog",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247513222.88/warc/CC-MAIN-20190222033812-20190222055812-00384.warc.gz",
"language": "en",
"language_score": 0.9684374332427979,
"token_count": 3496,
"score": 3,
"int_score": 3
} |
Intelligence in the American Revolutionary War
||This article includes a list of references, related reading or external links, but its sources remain unclear because it lacks inline citations. (March 2013)|
Intelligence in the American Revolutionary War was essentially monitored and sanctioned by the Continental Congress to provide military intelligence to the Continental Army to aid them in fighting the British during the American Revolutionary War. Congress created a Secret Committee for domestic intelligence, a Committee of Secret Correspondence for foreign intelligence, and a committee on spies, for tracking spies within the Patriot movement.
- 1 Organization
- 2 Techniques
- 3 Personalities
- 3.1 George Washington
- 3.2 Washington's intelligence officers
- 3.3 Paul Revere and the Mechanics
- 3.4 Agents
- 4 See also
- 5 References
- 6 Further reading
- 7 External links
The Second Continental Congress created a Secret Committee by a resolution on September 18, 1775. The Committee was not, however, a true intelligence agency, since the Committee of Secret Correspondence with which it often worked was mainly concerned with obtaining military supplies in secret and distributing them, and selling gunpowder to privateers chartered by the Congress. The Committee also took over and administered on a uniform basis the secret contracts for arms and gunpowder previously negotiated by certain members of the Congress without the formal sanction of that body. The Committee kept its transactions secret and destroyed many of its records to ensure the confidentiality of its work.
The Secret Committee employed agents overseas, often in cooperation with the Committee of Secret Correspondence. It gathered intelligence about secret Loyalist ammunition stores and arranged to seize them. The Committee also sent missions to seize British supplies in the southern colonies. It arranged the purchase of military stores through intermediaries to conceal the fact that Congress was the true purchaser. They then used foreign flags to attempt to protect the vessels from the British fleet.
The members of the Continental Congress appointed to the Committee included some of the most influential and responsible members of Congress: Benjamin Franklin, Robert Morris, Robert Livingston, John Dickinson, Thomas Willing, Thomas McKean, John Langdon, and Samuel Ward.
Committee of (Secret) Correspondence
Recognizing the need for foreign intelligence and foreign alliances, the Second Continental Congress created the Committee of Correspondence (soon renamed the Committee of Secret Correspondence) by a resolution of November 29, 1775:
RESOLVED, That a committee of five would be appointed for the sole purpose of corresponding with our friends in Great Britain, and other parts of the world, and that they lay their correspondence before Congress when directed;
RESOLVED, That this Congress will make provision to defray all such expenses as they may arise by carrying on such correspondence, and for the payment of such agents as the said Committee may send on this service.
The original Committee members—America's first foreign intelligence agency—were Benjamin Franklin, Benjamin Harrison, and Thomas Johnson. Subsequent appointees included James Lovell, a teacher who had been arrested by the British after the battle of Bunker Hill on charges of spying. He had later been exchanged for a British prisoner and was elected to the Continental Congress. On the Committee, he became the Congress' expert on codes and ciphers and has been called the father of American cryptanalysis.
The committee employed secret agents abroad, conducted covert operations, devised codes and ciphers, funded propaganda activities, authorized the opening of private mail, acquired foreign publications for use in analysis, established a courier system, and developed a maritime capability apart from that of the Continental Navy, and engaged in regular communications with Britons and Scots who sympathized with the American cause. It met secretly in December 1775 with a French intelligence agent who visited Philadelphia under cover as a Flemish merchant.
On April 17, 1777, the Committee of Secret Correspondence was renamed the Committee of Foreign Affairs but kept with its intelligence function. Matters of diplomacy were conducted by other committees or by the Congress as a whole. On January 10, 1781, the Department of Foreign Affairs—the forerunner of the Department of State—was created and tasked with "obtaining the most extensive and useful information relative to foreign affairs", the head of which was empowered to correspond "with all other persons from whom he may expect to receive useful information."
Committee on Spies
On June 5, 1776, the Congress appointed John Adams, Thomas Jefferson, Edward Rutledge, James Wilson, and Robert Livingston "to consider what is proper to be done with persons giving intelligence to the enemy or supplying them with provisions." They were charged with revising the Articles of War in regard to espionage directed against the American forces. The problem was an urgent one: Dr. Benjamin Church, chief physician of the Continental Army, had already been seized and imprisoned as a British agent, but there was no civilian espionage act, and George Washington thought the existing military law did not provide punishment severe enough to afford a deterrent. On November 7, 1775, the death penalty was added for espionage to the Articles of War, but the clause was not applied retroactively, and Dr. Church escaped execution.
On August 21, 1776, the Committee's report was considered by the Congress, which enacted the first espionage act:
RESOLVED, That all persons not members of, nor owing allegiance to, any of the United States of America, as described in a resolution to the Congress of the 29th of June last, who shall be found lurking as spies in or about the fortification or encampments of the armies of the United States, or of any of them, shall suffer death, according to the law and usage of nations, by sentence of a court martial, or such other punishment as such court martial may direct.
It was resolved further that the act "be printed at the end of the rules and articles of war." On February 27, 1778, the law was broadened to include any "inhabitants of these states" whose intelligence activities aided the enemy in capturing or killing revolutionary forces.
Secrecy and protection
The Committee of Secret Correspondence insisted that matters pertaining to the funding and instruction of intelligence agents be held within the Committee. In calling for the Committee members to "lay their proceedings before Congress," the Congress, by resolution, authorized "withholding the names of the persons they have employed, or with whom they have corresponded." On May 20, 1776, when the Committee's proceedings—with the sensitive names removed—were finally read in the Congress, it was "under the injunction of secrecy." The Continental Congress, recognizing the need for secrecy in regard to foreign intelligence, foreign alliances and military matters, maintained "Secret Journals," apart from its public journals, to record its decisions in such matters.
On November 9, 1775, the Continental Congress adopted its own oath of secrecy, one more stringent than the oaths of secrecy it would require of others in sensitive employment:
- "RESOLVED, That every member of this Congress considers himself under the ties of virtue, honour and love of his country, not to divulge, directly or indirectly, any matter or thing agitated or debated in Congress, before the same shaft have been determined, without the leave of the Congress: nor any matter or thing determined in Congress, which a majority of the Congress shall order to be kept secret, And that if any member shall violate this agreement, he shall be expelled this Congress, and deemed an enemy to the liberties of America, and liable to be treated as such, and that every member signify his consent to this agreement by signing the same."
On June 12, 1776, the Continental Congress adopted the first secrecy agreement for employees of the new government. The required oath read:
- "I do solemnly swear, that I will not directly or indirectly divulge any manner or thing which shall come to my knowledge as (clerk, secretary) of the board of War and Ordnance for the United Colonies. . . So help me God."
The Continental Congress, sensitive to the vulnerability of its covert allies, respected their desire for strict secrecy. Even after France's declaration of war against England, the fact of French involvement prior to that time remained a state secret. When Thomas Paine, in a series of letters to the press in 1777, divulged details of the secret aid from the files of the Committee of Foreign Affairs (formerly, the Committee of Secret Correspondence), France's Minister to the United States, Conrad Alexandre Gerard, protested to the president of the Congress that Paine's indiscreet assertions "bring into question the dignity and reputation of the King, my master, and that of the United States." Congress dismissed Paine, and by public resolution denied having received such aid, resolving that "His Most Christian Majesty, the great and generous ally of the United States, did not preface his alliance with any supplies whatever sent to America."
In 1779, George Washington and John Jay, the president of the Continental Congress and a close associate of the Commander in Chief's on intelligence matters, disagreed about the effect disclosure of some intelligence would have on sources and methods. Washington wanted to publicize certain encouraging information that he judged would give "a certain spring to our affairs" and bolster public morale. Jay replied that the intelligence "is unfortunately of such a Nature, or rather so circumstanced, as to render Secrecy necessary." Jay prevailed.
Robert Townsend, an important American agent in the British-occupied city of New York, used the guise of being a merchant, as did Silas Deane when he was sent to France by the Committee of Secret Correspondence. Townsend was usually referred to by his cover name of "Culper, Junior." When Major Benjamin Tallmadge, who directed Townsend's espionage work, insisted that he disengage himself from his cover business to devote more time to intelligence gathering, General Washington overruled him: "it is not my opinion that Culper Junior should be advised to give up his present employment. I would imagine that with a little industry he will be able to carry on his intelligence with greater security to himself and greater advantages to us, under the cover of his usual business. . .. it prevents also those suspicions which would become natural should he throw himself out of the line of his present employment." Townsend also was the silent partner of a coffee house frequented by British officers, an ideal place for hearing loose talk that was of value to the American cause.
Major John Clark's agents in and around British-controlled Philadelphia used several covers (farmer, peddler, and smuggler, among others) so effectively that only one or two operatives may have been detained. The agents traveled freely in and out of Philadelphia and passed intelligence to Washington about British troops, fortifications, and supplies, and of a planned surprise attack.
Enoch Crosby, a counterintelligence officer, posed as an itinerant shoemaker (his civilian trade) to travel through southern New York state while infiltrating Loyalist cells. After the Tories started to suspect him when he kept "escaping" from the Americans, Crosby's superiors moved him to Albany, New York, where he resumed his undercover espionage.
John Honeyman, an Irish weaver who had offered to spy for the Americans, used several covers (butcher, Tory, British agent) to collect intelligence on British military activities in New Jersey. He participated in a deception operation that left the Hessians in Trenton unprepared for Washington's attack across the Delaware River on December 26, 1776.
In January 1778, Nancy Morgan Hart, who was tall, muscular, and cross-eyed, disguised herself as a "touched" or emotionally disturbed man, and entered Augusta, Georgia, to obtain intelligence on British defenses. Her mission was a success. Later, when a group of Tories attacked her home to gain revenge, she captured them all and was witness to their execution.
In June 1778, General Washington instructed Henry "Light Horse Harry" Lee to send an agent into the British fort at Stony Point, New York, to gather intelligence on the exact size of the garrison and the progress it was making in building defenses. Captain Allan McLane took the assignment. Dressing himself as a country bumpkin and utilizing the cover of escorting a Mrs. Smith into the fort to see her sons, McLane spent two weeks collecting intelligence within the British fort and returned safely.
While serving in Paris as an agent of the Committee of Secret Correspondence, Silas Deane is known to have used a heat-developing invisible ink—a compound of cobalt chloride, glycerine and water—for some of his intelligence reports back to America. Even more useful to him later was a "sympathetic stain" created for secret communications by James Jay, a physician and the brother of John Jay. Dr. Jay, who had been knighted by George III, used the "stain" for reporting military information from London to America. Later he supplied quantities of the stain to George Washington at home and to Silas Deane in Paris.
The stain required one chemical for writing the message and a second to develop it, affording greater security than the ink used by Deane earlier. Once, in a letter to John Jay, Robert Morris spoke of an innocuous letter from "Timothy Jones" (Deane) and the "concealed beauties therein," noting "the cursory examinations of a sea captain would never discover them, but transferred from his hand to the penetrating eye of a Jay, the diamonds stand confessed at once."
Washington instructed his agents in the use of the "sympathetic stain," noting in connection with "Culper Junior" that the ink "will not only render his communications less exposed to detection, but relieve the fears of such persons as may be entrusted in its conveyance." Washington suggested that reports could be written in the invisible ink "on the blank leaves of a pamphlet. . . a common pocket book, or on the blank leaves at each end of registers, almanacks, or any publication or book of small value."
Washington especially recommended that agents conceal their reports by using the ink in correspondence: "A much better way is to write a letter in the Tory stile with some mixture of family matters and between the lines and on the remaining part of the sheet communicate with the Stain the intended intelligence."
Even though the Patriots took great care to write sensitive messages in invisible ink, or in code or cipher, it is estimated that the British intercepted and decrypted over half of America's secret correspondence during the war.
Codes and ciphers
American Revolutionary leaders used various methods of cryptography to conceal diplomatic, military, and personal messages.
John Jay and Arthur Lee devised dictionary codes in which numbers referred to the page and line in an agreed-upon dictionary edition where the plaintext (unencrypted message) could be found.
In 1775, Charles Dumas designed the first diplomatic cipher that the Continental Congress and Benjamin Franklin used to communicate with agents and ministers in Europe. Dumas's system substituted numbers for letters in the order in which they appeared in a preselected paragraph of French prose containing 682 symbols. This method was more secure than the standard alphanumeric substitution system, in which a through z are replaced with 1 through 26, because each letter in the plain text could be replaced with more than one number.
The Culper Spy Ring used a numerical substitution code developed by Major Benjamin Tallmadge, the network's leader. The Ring began using the code after the British captured some papers indicating that some Americans around New York were using "sympathetic stain." Tallmadge took several hundred words from a dictionary and several dozen names of people or places and assigned each a number from 1 to 763. For example, 38 meant attack, 192 stood for fort, George Washington was identified as 711, and New York was replaced by 727. An American agent posing as a deliveryman transmitted the messages to other members of the Ring. One of them, Anna Strong, signaled the message's location with a code involving laundry hung out to dry. A black petticoat indicated that a message was ready to be picked up, and the number of handkerchiefs identified the cove on Long Island Sound where the agents would meet. By the end of the war, several prominent Americans—among them Robert Morris, John Jay, Robert Livingston, and John Adams—were using other versions of numerical substitution codes.
The Patriots had two notable successes in breaking British ciphers. In 1775, Elbridge Gerry and the team of Elisha Porter and the Rev. Samuel West, working separately at Washington's direction, decrypted a letter that implicated Dr. Benjamin Church, the Continental Army's chief surgeon, in espionage for the British.
In 1781, James Lovell, who designed cipher systems used by several prominent Americans, determined the encryption method that British commanders used to communicate with each other. When a dispatch from Lord Cornwallis in Yorktown, Virginia, to General Henry Clinton in New York was intercepted, Lovell's cryptanalysis enabled Washington to gauge how desperate Cornwallis's situation was and to time his attack on the British lines. Soon after, another decrypt by Lovell provided warning to the French fleet off Yorktown that a British relief expedition was approaching. The French scared off the British flotilla, sealing victory for the Americans.
The Continental Congress regularly received quantities of intercepted British and Tory mail. On November 20, 1775, it received some intercepted letters from Cork, Ireland, and appointed a committee made up of John Adams, Benjamin Franklin, Thomas Johnson, Robert Livingston, Edward Rutledge, James Wilson and George Wythe "to select such parts of them as may be proper to publish." The Congress later ordered a thousand copies of the portions selected by the Committee to be printed and distributed. A month later, when another batch of intercepted mail was received, a second committee was appointed to examine it. Based on its report, the Congress resolved that "the contents of the intercepted letters this day read, and the steps which Congress may take in consequence of said intelligence thereby given, be kept secret until further orders." By early 1776, abuses were noted in the practice, and Congress resolved that only the councils or committees of safety of each colony, and their designees, could henceforth open the mail or detain any letters from the post.
When Moses Harris reported that the British had recruited him as a courier for their Secret Service, General Washington proposed that General Schuyler "contrive a means of opening them without breaking the seals, take copies of the contents, and then let them go on. By these means we should become masters of the whole plot." From that point on, Washington was privy to British intelligence pouches between New York and Canada.
Dr. James Jay used the advanced technology of his time in creating the invaluable "sympathetic stain" used for secret communications. Perhaps the American Patriots' most advanced application of technology was in David Bushnell's Turtle, a one-man submarine created for affixing watchwork-timed explosive charges to the bottom of enemy ships.
The "turtle," now credited with being the first use of the submarine in warfare, was an oaken chamber about five-and-a-half feet (1.6 m) wide and seven feet (2.1 m) high. It was propelled by a front-mounted, pedal-powered propeller at a speed of up to three miles per hour (5 km/h), had a barometer to read depth, a pump to raise or lower the submarine through the water, and provision for both lead and water ballast.
When Bushnell learned that the candle used to illuminate instruments inside the "turtle" consumed the oxygen in its air supply, he turned to Benjamin Franklin for help. The solution: the phosphorescent weed, foxfire. Heavy tides thwarted the first sabotage operation. A copper-clad hull which could not be penetrated by the submarine's auger foiled the second. (The "turtle" did blow up a nearby schooner, however.) The secret weapon would almost certainly have achieved success against a warship if it had not gone to the bottom of the Hudson River when the mother ship to which it was moored was sunk by the British in October 1776.
An early device developed for concealing intelligence reports when traveling by water was a simple weighted bottle that could be dropped overboard if there was a threat of capture. This was replaced by a wafer-thin leaden container in which a message was sealed. It would sink in water, and melt in fire, and could be used by agents on land or water. It had one drawback—lead poisoning if it was swallowed. It was replaced by a silver, bullet-shaped container that could be unscrewed to hold a message and which would not poison a courier who might be forced to swallow it.
Intelligence analysis and estimates
On May 29, 1775, the Continental Congress received the first of many intelligence estimates prepared in response to questions it posed to military commanders. The report estimated the size of the enemy force to be encountered in an attack on New York, the number of Continental troops needed to meet it, and the kind of force needed to defend the other New England colonies.
An example of George Washington's interest in intelligence analysis and estimates can be found in instructions he wrote to General Putnam in August 1777:
"Deserters and people of that class always speak of number. . . indeed, scarce any person can form a judgement unless he sees the troops paraded and can count the divisions. But, if you can by any means obtain a list of the regiments left upon the island, we can compute the number of men within a few hundreds, over or under." On another occasion, in thanking James Lovell for a piece of intelligence, Washington wrote: "it is by comparing a variety of information, we are frequently enabled to investigate facts, which were so intricate or hidden, that no single clue could have led to the knowledge of them. . . intelligence becomes interesting which but from its connection and collateral circumstances, would not be important."
Colonel David Henley, Washington's intelligence chief for a short period in 1778, received these instructions when he wrote to Washington for guidance: "Besides communicating your information as it arises. . . you might make out a table or something in the way of columns, under which you might range, their magazines of forage, grain and the like, the different corps and regiments, the Works, where thrown up, their connexion, kind and extent, the officers commanding, with the numbers of guns &ca. &ca. This table should comprehend in one view all that can be learned from deserters, spies and persons who may come out from the enemy's boundaries." (It was common practice to interrogate travelers from such British strongholds as New York, Boston and Philadelphia.)
George Washington was a skilled manager of intelligence. He utilized agents behind enemy lines, recruited both Tory and Patriot sources, interrogated travelers for intelligence information, and launched scores of agents on both intelligence and counterintelligence missions. He was adept at deception operations and tradecraft and was a skilled propagandist. He also practiced sound operational security.
As an intelligence manager, Washington insisted that the terms of an agent's employment and his instructions be precise and in writing. He emphasized his desire for receiving written, rather than verbal, reports. He demanded repeatedly that intelligence reports be expedited, reminding his officers of those bits of intelligence he had received which had become valueless because of delay in getting them to him. He also recognized the need for developing many different sources so that their reports could be cross-checked, and so that the compromise of one source would not cut off the flow of intelligence from an important area.
Washington sought and obtained a "secret service fund" from the Continental Congress, and expressed preference for specie, preferably gold: "I have always found a difficulty in procuring intelligence by means of paper money, and I perceive it increases." In accounting for the sums in his journals, he did not identify the recipients: "The names of persons who are employed within the Enemy's lines or who may fall within their power cannot be inserted."
He instructed his generals to "leave no stone unturned, nor do not stick to expense" in gathering intelligence, and urged that those employed for intelligence purposes be those "upon whose firmness and fidelity we may safely rely."
Washington's intelligence officers
Washington retained full and final authority over Continental Army intelligence activities, but he delegated significant field responsibility to trusted officers. Although he regularly urged all his officers to be more active in collecting intelligence, Washington relied chiefly on his aides and specially designated officers to assist him in conducting intelligence operations. The first to assume this role appears to have been Joseph Reed, who fulfilled the duties of "Secretary, Adjutant General and Quarter Master, besides doing a thousand other little Things which fell incidentally." A later successor to Reed was Alexander Hamilton, who is known to have been deeply involved with the Commander-in-Chief's intelligence operations, including developing reports received in secret writing and investigating a suspected double agent.
When Elias Boudinot was appointed Commissary General of Prisoners, responsible for screening captured soldiers and for dealing with the British concerning American patriots whom they held prisoner, Washington recognized that the post offered "better opportunities than most other officers in the army, to obtain knowledge of the Enemy's Situation, motions and... designs," and added to Boudinot's responsibilities "the procuring of intelligence." In 1778, Washington selected Brigadier General Charles Scott of Virginia as his "intelligence chief." When personal considerations made it necessary for Scott to step down, Washington appointed Colonel David Henley to the post temporarily, and then assigned it to Major Benjamin Tallmadge. Tallmadge combined reconnaissance with clandestine visits into British territory to recruit agents, and he attained distinction for his conduct of the Culper Ring operating out of New York.
In 1776, George Washington picked Thomas Knowlton to command the Continental Army's first intelligence unit, known as "Knowlton's Rangers." Intelligence failure during the battle of Long Island convinced Washington that he needed an elite detachment dedicated to reconnaissance that reported directly to him. Knowlton, who had served in a similar unit during the French and Indian War, led 130 men and 20 officers—all hand-picked volunteers—on a variety of secret missions that were too dangerous for regular troops to conduct. The date 1776 on the seal of the Army's intelligence service today refers to the formation of Knowlton's Rangers.
Other intelligence officers who served with distinction during the War of Independence included Captain Eli Leavenworth, Major Alexander Clough, Colonel Elias Dayton, Major John Clark, Major Allan McLane, Captain Charles Craig and General Thomas Mifflin.
Paul Revere and the Mechanics
The first Patriot intelligence network on record was a secret group in Boston known as the Mechanics, which meant skilled workers. The group, also known as the Liberty Boys, apparently grew out of the old Sons of Liberty organization that had successfully opposed the Stamp Act. The Mechanics organized resistance to British authority and gathered intelligence. In the words of one of its members, Paul Revere, "in the Fall of 1774 and winter of 1775, I was one of upwards of thirty, chiefly mechanics, who formed ourselves into a Committee for the purpose of watching British soldiers and gaining every intelligence on the movements of the Tories." According to Revere, "We frequently took turns, two and two, to watch the (British) soldiers by patrolling the streets all night."
In addition, the Mechanics sabotaged and stole British military equipment in Boston. Their security practices, however, were amateurish. They met in the same place regularly (the Green Dragon Tavern), and one of their leaders (Dr. Benjamin Church) was a British agent.
Through their intelligence sources, the Mechanics were able to see through the cover story the British had devised to mask their march on Lexington and Concord. Dr. Joseph Warren, chairman of the Committee of Safety, charged Revere with the task of warning Samuel Adams and John Hancock at Lexington, Massachusetts, that they were the probable targets of the enemy operation. Revere arranged for the warning lanterns to be hung in Old North Church to alert patriot forces at Charlestown, and then set off on his famous ride. He completed his primary mission of notifying Adams and Hancock. Then Revere, along with Dr. Samuel Prescott and William Dawes, rode on to alert Concord, only to be apprehended by the British en route. Dawes got away, and Dr. Prescott managed to escape soon afterward and to alert the Patriots at Concord. Revere was interrogated and subsequently released, after which he returned to Lexington to warn Hancock and Adams of the proximity of British forces.
Revere then turned to another mission, retrieving from the local tavern a trunk belonging to Hancock and filled with incriminating papers. With John Lowell, Revere went to the tavern and, as he put it, during "a continual roar of Musquetry... we made off with the Trunk."
Paul Revere had served as a courier prior to his "midnight ride" and continued to do so during the early years of the war. One of his earlier missions was perhaps as important as the Lexington ride. In December 1774, Revere rode to the Oyster River in New Hampshire with a report that the British, under General Thomas Gage, intended to seize Fort William and Mary. Armed with this intelligence, Major John Sullivan of the colonial militia led a force of four hundred men in an attack on the fort. The one hundred barrels of gunpowder taken in the raid were ultimately used by the Patriots to cover their retreat from Bunker Hill.
Nathan Hale is probably the best known but least successful American agent in the War of Independence. He embarked on his espionage mission into British-held New York as a volunteer, impelled by a strong sense of patriotism and duty. Before leaving on the mission he reportedly told a fellow officer: "I am not influenced by the expectation of promotion or pecuniary award; I wish to be useful, and every kind of service necessary to the public good becomes honorable by being necessary. If the exigencies of my country demand a peculiar service, its claims to perform that service are imperious."
But dedication was not enough. Captain Hale had no training experience, no contacts in New York, no channels of communication, and no cover story to explain his absence from camp—only his Yale diploma supported his contention that he was a "Dutch schoolmaster." He was captured while trying to slip out of New York, was convicted as a spy and went to the gallows on September 22, 1776. Witnesses to the execution reported the dying words that gained him immortality (a paraphrase of a line from Joseph Addison's play Cato): "I only regret that I have but one life to lose for my country." After he was accused of being a spy he stated his name, rank, and his reason for being there. He gave a soldier a letter to his family, which he ripped up. He asked to see a bible and was denied the right.
The same day that Nathan Hale was executed in New York, British authorities arrested another Patriot and charged him with being a spy. Haym Salomon was a recent Jewish immigrant who worked as a stay-behind agent after Washington evacuated New York City in September 1776. Salomon was arrested in a round-up of suspected Patriot sympathizers and was confined to Sugar House Prison. He spoke several European languages and was soon released to the custody of General von Heister, commander of Hessian mercenaries, who needed someone who could serve as a German language interpreter in the Hessian commissary department. While in German custody, Salomon induced a number of the German troops to resign or desert.
Eventually paroled, Salomon did not flee to Philadelphia as had many of his New York business associates. He continued to serve as an undercover agent and used his personal finances to assist American patriots held prisoner in New York. He was arrested again in August 1778, accused this time of being an accomplice in a plot to burn the British fleet and to destroy His Majesty's warehouses in the city. Salomon was condemned to death for sabotage, but he bribed his guard while awaiting execution and escaped to Philadelphia. There he came into the open in the role for which he is best known, as an important financier of the Revolution.
Less than a year after Nathan Hale was executed, another American agent went to the gallows in New York. On June 13, 1777, General Washington wrote the President of Congress: "You will observe by the New York paper, the execution of Abm. (Abraham) Patten. His family deserves the generous Notice of Congress. He conducted himself with great fidelity to our Cause rendering Services and has fallen a Sacrifice in promoting her interest. Perhaps a public act of generosity, considering the character he was in, might not be so eligible as a private donation."
"Most accurate and explicit intelligence" resulted from the work of Abraham Woodhull on Long Island and Robert Townsend in British-occupied New York City. Their operation, known as the Culper Ring from the operational names used by Woodhull (Culper, Sr.) and Townsend (Culper, Jr.), effectively used such intelligence tradecraft as codes, ciphers and secret ink for communications; a series of couriers and whaleboats to transmit reporting; at least one secret safe house, and numerous sources. The network was particularly effective in picking up valuable information from careless conversation wherever the British and their sympathizers gathered.
One female member of the Culper Ring, known only by her codename "355," was arrested shortly after Benedict Arnold's defection in 1780 and evidently died in captivity. Details of her background are unknown, but 355 (the number meant "lady" in the Culper code) may have come from a prominent Tory family with access to British commanders and probably reported on their activities and personalities. She was one of several females around the debonaire Major André, who enjoyed the company of young, attractive, and intelligent women. Abraham Woodhull, 355's recruiter, praised her espionage work, saying that she was "one who hath been ever serviceable to this correspondence." Arnold questioned all of André's associates after his execution in October 1780 and grew suspicious when the pregnant 355 refused to identify her paramour. She was incarcerated on the squalid prison ship Jersey, moored in the East River. There she gave birth to a son and then died without disclosing that she had a common-law husband–Robert Townsend, after whom the child was named.
One controversial American agent in New York was the King's Printer, James Rivington. His coffee house, a favorite gathering place for the British, was a principal source of information for Culper, Jr. (Townsend), who was a silent partner in the endeavor. George Washington Parke Custis suggests that Rivington's motive for aiding the patriot cause was purely monetary. Custis notes that Rivington, nevertheless, "proved faithful to his bargain, and often would provide intelligence of great importance gleaned in convivial moments at Sir William's or Sir Henry's table, be in the American camp before the convivialists had slept off the effects of their wine. The King's printer would probably have been the last man suspected, for during the whole of his connection with the secret service his Royal Gazette piled abuse of every sort upon the cause of the American general and the cause of America." Rivington's greatest espionage achievement was acquiring the Royal Navy's signal book in 1781. That intelligence helped the French fleet repel a British flotilla trying to relieve General Cornwallis at Yorktown.
Hercules Mulligan was a textile importer and ran a clothing shop that was also frequented by British officers in occupied New York. The Irish immigrant was a genial host, and animated conversation typified a visit to his emporium. Mulligan was the first to alert Washington to two British plans to capture the American Commander-in-Chief and to a planned incursion into Pennsylvania. Besides being an American agent, Mulligan also was a British counterintelligence failure. Before he went underground as an agent, he had been an active member of the Sons of Liberty and the New York Committees of Correspondence and Observation, local Patriot intelligence groups. Mulligan had participated in acts of rebellion, and his name had appeared on Patriot broadsides distributed in New York as late as 1776. But every time he fell under suspicion, the popular Irishman used his gift of "blarney" to talk his way out of it. The British evidently never learned that Alexander Hamilton, Washington's aide-de-camp, had lived in the Mulligan home while attending King's College, and had recruited Mulligan and possibly Mulligan's brother, a banker and merchant who handled British accounts, for espionage. Mulligan was assisted by his slave, Cato, who performed dangerous assignments as a courier.
Lieutenant Lewis J. Costigin, walked the streets of New York freely in his Continental Army uniform as he collected intelligence. Costigin had originally been sent to New York as a prisoner and was eventually paroled under oath not to attempt escape or communicate intelligence. In September 1778, he was designated for prisoner exchange and freed of his parole oath. But he did not leave New York, and until January 1779 he roamed the city in his American uniform, gathering intelligence on British commanders, troop deployments, shipping, and logistics while giving the impression of still being a paroled prisoner.
On May 15, 1780, General Washington instructed General Heath to send intelligence agents into Canada. He asked that they be those "upon whose firmness and fidelity we may safely rely," and that they collect "exact" information about Halifax in support of a French requirement for information on the British defense works there. Washington suggested that qualified draftsmen be sent. James Bowdoin, who later became the first president of the American Academy of Arts and Science, fulfilled the intelligence mission, providing detailed plans of Halifax harbor, including specific military works and even water depths.
In August 1782, General Washington created the Badge of Military Merit, to be issued "whenever any singularly meritorious action is performed... not only instances of unusual gallantry, but also of extraordinary fidelity and essential service in any way." Through the award, said Washington, "the road to glory in a Patriot army and a free country is thus open to all." The following June, the honor was bestowed on Sergeant Daniel Bissell, who had "deserted" from the Continental Army, infiltrated New York, posed as a Tory, and joined Benedict Arnold's "American Legion." For over a year, Bissell gathered information on British fortifications, making a detailed study of British methods of operation, before escaping to American lines.
Dominique L'Eclise, a Canadian who served as an intelligence agent for General Schuyler, had been detected and imprisoned and had all his property confiscated. After being informed by General Washington of the agent's plight, the Continental Congress on October 23, 1778, granted $600 to pay L'Eclise's debts and $60, plus one ration a day "during the pleasure of Congress," as compensation for his contribution to the American cause.
Family legend contributes the colorful but uncorroborated story of Lydia Darragh and her listening post for eavesdropping on the British. Officers of the British force occupying Philadelphia chose to use a large upstairs room in the Darragh house for conferences. When they did, Mrs. Darragh would slip into an adjoining closet and take notes on the enemy's military plans. Her husband, William, would transcribe the intelligence in a form of shorthand on tiny slips of paper that Lydia would then position on a button mold before covering it with fabric. The message-bearing buttons were then sewn onto the coat of her fourteen-year-old son, John, who would then be sent to visit his elder brother, Lieutenant Charles Darragh, of the American forces outside the city. Charles would snip off the buttons and transcribe the shorthand notes into readable form for presentation to his officers.
Lydia Darragh is said to have concealed other intelligence in a sewing-needle packet which she carried in her purse when she passed through British lines. Some espionage historians have questioned the credibility of the best-known story of Darragh's espionage: that she supposedly overheard British commanders planning a surprise night attack against Washington's army at Whitemarsh on December 4, 1777. The cover story she purportedly used to leave Philadelphia—she was filling a flour sack at a nearby mill outside the British lines because there was a flour shortage in the city—is implausible because there was no shortage and a lone woman would not have been allowed to roam around at nightcitation needed, least of all in the area between the armies.
- This article is adapted from Intelligence in the War of Independence, a publication of the Central Intelligence Agency in the public domain.
- Baker, Mark A. "Spies of Revolutionary Connecticut, From Benedict Arnold to Nathan Hale." 2014. ISBN 978-1-62619-407-6 General history of Connecticut espionage during the American Revolution.
- Nagy, John A. Invisible Ink - Spycraft of the American Revolution. 2011. ISBN 1594161410. General history on espionage during the American Revolution.
- Nagy, John A. Spies in the Continental Capital: Espionage Across Pennsylvania During the American Revolution. 2011. ISBN 159416133X.
- Nagy, John A. Dr. Benjamin Church, Spy: A Case of Espionage on the Eve of the American Revolution. 2013. ISBN 978-1-59416-184-1.
- Paul R. Misencik. The Original American Spies: Seven Covert Agents Of The Revolutionary War. North Carolina-McFarland Publishing, 2013.
- Rose, Alexander. Washington's Spies: The Story of America's First Spy Ring. 2007. ISBN 0553383299. Focuses on the Culper Ring.
- Download the public domain text of "The Spy" by James Fenimore Cooper
- United States Central Intelligence Agency, "Intelligence in the War of Independence"
- Spy Letters of the American Revolution - William L. Clements Library
- Bibliography of Intelligence and Espionage in the American Revolutionary War[dead link] compiled by the United States Army Center of Military History | <urn:uuid:c095fb5a-3d5a-4545-9e47-8c21d1b434e4> | {
"dump": "CC-MAIN-2015-11",
"url": "https://en.wikipedia.org/wiki/Intelligence_in_the_American_Revolutionary_War",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462313.6/warc/CC-MAIN-20150226074102-00109-ip-10-28-5-156.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9669204354286194,
"token_count": 8770,
"score": 3.296875,
"int_score": 3
} |
How can one small voice cut through the cacophony of modern metropolitan life? A recently published study, combined with some earlier work, suggests that contrary to what you might assume, the secret to city communication isn’t shouting.
Urban background noise is heavily weighted toward the lower sound frequencies of 20 to 200 Hz—think diesel engines (50-60 Hz). That’s not to say there aren’t a lot of higher frequency noises in the concrete jungle but, compared to say, the rain forest’s tenor voice, cities sing baritone… and with enough projection to reach the last row of the balcony. Depending on the location and the time of day, your city may be belting out it’s theme song at anywhere from ~45-90 decibels (dB). Ever try to tweet over a lawn mower (and I don’t mean with your smart phone)?
People who haven’t yet experienced any hearing loss can detect activity in the 20 to 20,000Hz range. The faintest sounds we’re likely to hear register at about 0 dB. By 120 db we begin to experience discomfort or even pain. Now, as someone who loves to listen to nearly every kind of music, laughter in all its forms, Japanese prayer bells playing with a breeze, and rain bouncing on a tin roof, I’d be the first to agree that the human ear is a marvel. But compared to many of our fellow Earthlings, it’s… well, it’s pitiful. My wire fox terrier puts me to shame, easily picking up sounds from 40-60,000 Hz. The super-sensitive hearing of a bat, used for echolocation, ranges from 20-120,000 Hz.
According to the ever-useful Birder’s Handbook, we have more auditory commonality with birds, whose ability to discriminate between frequencies and degrees of loudness is on a par with our own. So perhaps we would be well served to take a page from the songbird songbook when trying to be heard in our rapidly urbanizing modern life. Researchers at the Universities of Copenhagen and Aberystwyth found that great tits (Parus major) living in urban habitats sing at a significantly higher frequency than their rural relatives. This finding coincides with previous studies reporting the same phenomenon for house finches (Carpodacus mexicanus), song sparrows (Melospiza melodia), white-crowned sparrows (Zonotrichia leucophrys), dark-eyed juncos (Junco hyemalis), and common blackbirds (Turdus merula).
Of course, going all Bee-Gees isn’t the only way a guy can get some attention from the talent scouts. A 2007 study from the University of Sheffield found that European robins (Erithacus rubecula) living downtown changed their performance times, from doo-wopping during the day to crooning almost exclusively after sundown when the din dies down a bit. In Berlin, nightingales (Luscinia megarhynchos) take the less subtle approach and just turn up the volume, at least on weekdays. But there’s a price to be paid for setting the amps to 11—a greater metabolic demand and more attention from predators. By broadcasting on a different frequency, some city songbirds have stumbled onto a low-risk solution to a major challenge of city life.
There’s incentive for avian adaptation (let’s not call it selling out) to make it onto the airwaves. You see, in the bird world the divas are all, um… divos. No, they don’t wear red plastic wedding cake hats and ill-fitting 1980s MTV fashion—that’s Devo. Let me put it another way: boy birds are the rock stars, girl birds are the groupies. Males warble (or learn to shred the guitar, or maybe groove a bass line) to get noticed by the ladies. If a gal likes a guy’s song she’ll hook up with him and probably become his baby-mama. But there’s a lot of competition out there and before you can score, you’ve gotta get heard.
Hey, singing falsetto to some chick may not be the most macho thing a fellow can do, but it beats spending Saturday night getting drunk at the karaoke bar with your buddies and going home alone. | <urn:uuid:1a1c1c64-c3ac-44fd-aad5-d8326bd0c3ca> | {
"dump": "CC-MAIN-2014-52",
"url": "http://nextdoornature.org/2012/03/04/village-voice/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802766292.96/warc/CC-MAIN-20141217075246-00029-ip-10-231-17-201.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9179861545562744,
"token_count": 943,
"score": 2.578125,
"int_score": 3
} |
Thanksgiving is the holiday that reminds all of as eaters to be grateful, especially for the season’s bounty provided by farmers, farm laborers, chefs, and food service workers. But, unfortunately, we also waste an astonishing amount of food.
Each year, consumers purchase over 700 million pounds of turkey, according to the National Turkey Federation. The U.S. Department of Agriculture (USDA) projects that 35 percent of the meat purchased does not get eaten–ending up in landfills, along with sweet potatoes, green beans, pumpkin pie, and other holiday fare.
Around the globe, roughly one-third of the food produced for human consumption gets lost or wasted. This amounts to about 1.3 billion tons per year–which is enough to feed the nearly 1 billion people who are hungry today. A report by the Barilla Center for Food & Nutrition found that 110 kg of edible food is wasted in households in the United States, 108 kg in Italy, 99 kg in France, 82 kg in Germany, and 72 kg in Sweden.
While food waste presents some serious moral challenges, it’s also an environmental issue. The U.N. Environment Programme reports that the food wasted annually is responsible for adding 3.3 billion tons of greenhouse gasses to the planet’s atmosphere.
Thankfully, organizations like the World Resources Institute (WRI), the Natural Resources Defense Council (NRDC), Feedback, and the coalition of funders and organizations called ReFED are fighting to put an end to food waste by measuring food loss and setting goals to prevent it. WRI, for example, launched the first-ever Accounting and Reporting Standard for food loss and waste this year, and they are champions of the Sustainable Development Goal that aims to cut per capita global food waste in half. And ReFED produced this video highlighting food waste in the U.S.
This Thanksgiving, one of the best ways to be grateful for what you have is to avoid wasting it. Here are tips for a waste-free holiday.
It’s easy to avoid buying and preparing too much food if you make a plan for your feast. Get an exact headcount of how many guests you will have and then coordinate what dishes will be served. According to the NRDC, you should consider the fact that there will be plenty of dishes available to eat, so each person may not need a full portion size of every dish. Use a portion calculator, and then “try knocking the number to ¾ of the actual number of people you expect. If it’s a recipe you use often, take notes after the party to remind yourself how appropriate your multiplication was,” says Dana Gunders, senior scientist at the NRDC.
USE WHAT YOU HAVE.
Once you know your numbers and your dishes, take a look in your refrigerator or pantry to see what ingredients you already have before heading to the store. Sometimes, cans or jars hide in the very back of your storage area, where you forget about them. If this happens to you often, consider using Fridgely, an app that lets you record and track what’s in your fridge.
When you find a long lost food item, use your judgment regarding “sell by” or “best by” dates, as they are just guidelines. Products may still be good long after their expiration date. Author and food waste expert Jonathan Bloom suggests, “look, smell, and if it comes to it, taste it before you throw it away.”
After taking stock of your ingredients, make a shopping list using the proportions you’ve calculated and only buy what you need. The U.S. Environmental Protection Agency (EPA) recommends marking quantities on your list, so you remember exactly how much to buy.
RESCUE DISCARDED “WASTE.”
We throw away many food items that are perfectly good just because they are traditionally considered to be garbage. Turkey giblets, bones, stale bread, and vegetable scraps all have value beyond the compost pile. The EPA suggests repurposing these items to prevent waste and save money. Stale bread makes great croutons or stuffing, vegetable tops and bones can be turned into highly nutritious, flavorful soup stock, and turkey giblets add flavor to gravy.
ALLOW GUESTS TO SERVE THEMSELVES.
Instead of scooping out huge portions of dishes, let guests gauge their hunger levels and serve themselves the amount they want to eat. A buffet or family-style meal will help minimize plate waste. Guests should be mindful of taking just what they want, because it’s always better to come back for seconds than to leave uneaten food on a plate. Using smaller plates for the meal can help control portion sizes.
STORE FOOD PROPERLY AFTER THE MEAL.
It’s tempting to sit and relax for hours after eating, but leaving food out can lead to bacterial contamination. The USDA’s Food Safety and Inspection Service (FSIS) warns that the “danger zone” for food is from 40°F to 140°F. Bacteria like Salmonella and E. coli grow most rapidly in this temperature range, so you should never leave food at room temperature for more than two hours. After everyone finishes eating, clean up your feast quickly and then enjoy the rest of your evening.
LOVE YOUR LEFTOVERS.
As you’re packing up the meal, figure out the best way to deal with the leftovers. Store some of the food in your own fridge to repurpose in interesting new recipes. Cooking with leftovers makes dinner a simple and quick affair. Plus, provide plenty of reusable containers for guests to take some of the feast home with them. Gunders suggests using old yogurt containers to send with guests, or ask each person to bring a container for themselves.
DONATE TO FEED THE HUNGRY.
If you still end up with too much food, you can locate a local food bank and donate your excess food to those in need. Also check out organizations such as D.C. Central Kitchen and City Harvest, which use donated food to cook meals for those in need. | <urn:uuid:bcab0ce0-d5a9-4848-aa8c-13d3f236ebbc> | {
"dump": "CC-MAIN-2021-31",
"url": "https://foodtank.com/news/2016/11/seven-tips-to-a-food-waste-free-thanksgiving/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154420.77/warc/CC-MAIN-20210803030201-20210803060201-00517.warc.gz",
"language": "en",
"language_score": 0.9375452399253845,
"token_count": 1286,
"score": 3.546875,
"int_score": 4
} |
The Boeing 767 is a mid- to large-size, long-range, wide-body twin-engine jet airliner built by Boeing Commercial Airplanes. It was the manufacturer's first wide-body twinjet and its first airliner with a two crew glass cockpit with colour displays and new electronics replaced the role of the Flight Engineer by enabling the pilot and co-pilot to monitor aircraft systems directly. Despite the promise of reduced crew costs, United Airlines initially demanded a conventional three-person cockpit, citing concerns about the risks associated with introducing a new aircraft. A three-crew cockpit remained as an option and was fitted to the first production models. Ansett Australia ordered 767 aircraft with three-crew cockpits due to union demands; it was the only airline to operate 767 aircraft so configured. Development of the 767 occurred in tandem with a narrow-body twinjet, the 757, resulting in shared design features which allow pilots to obtain a common type rating to operate both aircraft.
In February 1990, the first 767 equipped with Rolls-Royce RB211 turbofans, a 767-300, was delivered to British Airways. Six months later, the carrier temporarily grounded its entire 767 fleet after discovering cracks in the engine pylons of several aircraft. The cracks were related to the extra weight of the RB211 engines, which are 2,205 pounds (1,000kg) heavier than other 767 engines. During the grounding, interim repairs were conducted to alleviate stress on engine pylon components, and a parts redesign in 1991 prevented further cracks. Boeing also performed a structural reassessment, resulting in production changes and modifications to the engine pylons of all 767 aircraft in service
United Airlines first placed the 767 in commercial service in 1982. The aircraft was initially flown on domestic and transcontinental routes, during which it demonstrated the reliability of its twinjet design. In 1985, the 767 became the first twin-engined airliner to receive regulatory approval for extended overseas flights. The aircraft was then used to expand non-stop service on medium- to long-haul intercontinental routes. In 1986, Boeing initiated studies for a higher capacity 767, ultimately leading to the development of the 777, a larger wide body twinjet. In the 1990s, the 767 became the most frequently used airliner for transatlantic flights between North America and Europe.
The 767 is the first twinjet wide-body type to reach 1,000 aircraft delivered and the 777 ranks as one of Boeing's best selling models, with 1,061 aircraft built to February 2014. The most popular variant is the 767-300ER, with 582 delivered; Delta Air Lines is the largest operator, with 94 aircraft. British Airways has 21 767-300 aircraft in the fleet, mostly used on the trans-Atlantic routes as well as some European destinations. Because of rising fuel costs, airlines have acquired the type as a comparatively fuel-efficient alternative to other wide body jets and have increasingly deployed the aircraft on long-haul transoceanic routes. | <urn:uuid:ccefc7b6-d487-46a3-aa27-c827af64e034> | {
"dump": "CC-MAIN-2019-43",
"url": "http://concordespeakers.com/other-aircraft-we-ve-flown/12-other-aircraft/41-boeing-767",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986659097.10/warc/CC-MAIN-20191015131723-20191015155223-00015.warc.gz",
"language": "en",
"language_score": 0.9585888981819153,
"token_count": 623,
"score": 2.9375,
"int_score": 3
} |
Lloyd Owens spoke next. His presentation was Pasture Management Strategies to Minimize Nutrient Losses in Surface Runoff and Subsurface Flow. Lloyd introduced his talk by saying, “With the ever increasing public concern about our environment and the desire of agricultural producers to be environmentally responsible, environmental impacts of livestock in pastoral systems is receiving increased focus.” The objectives of his research are to study multiple pasture management systems with different levels of nitrogen fertilization to determine sediment and nutrient losses in surface runoff, and nutrient losses in subsurface flow.
Three general pasture systems are being studied:
A. Continuous, unimproved grazing
1. Cattle with access to stream 2. Cattle fenced away from stream
B. Rotational, “medium-fertility” pasture system
1. Weekly rotation in summer 2. Wintered in one paddock 3. Different N levels and N sources
C. Rotational, “high-fertility” pasture system
1. Weekly rotation in summer 2. Rotated in winter 3. N fertilizer; then grass-legume mixture
Studies on sediment loss from pastures were short to long term. With continuous, unimproved grazing management, these were the lengths of time each scenario was studied:
Cattle with access to stream
No grazing (3 years) April 1974 – March 1977
Summer-only grazing (3 years) April 1977 – March 1980
All-year grazing (7 years) April 1980 – March 1987
Cattle fenced away from stream
All-year grazing (6 years) April 1987 – March 1993
Vacant periods (16 years) April 1993 – March 2009 (Cattle removed from mid-Feb through April)
Sediment loss on the continuously grazed unimproved pasture ranged from 0.2 ton per acre when left ungrazed for 3 years to just under 1.2 tons per acre when grazed year-around. Summer-only grazing and all-year grazing with cattle fenced away from stream had the same soil loss of 0.6 ton per acre. Cattle removed during the late winter - early spring thaw period and also fenced away from the stream showed a soil loss of only 0.3 ton per acre. Not only does this reduce soil loss, but it is also good to allow the grass in the pasture to green-up without the stress of grazing brought to bear right away.
Looking at sediment loss on the treatments for the rotational, “medium-fertility” pasture system, 3 management scenarios/periods were studied:
Summer rotation/winter feeding in one paddock only (sacrifice area).(Period 1 — 12 years)
- Nov 1974 – Oct 1986
Summer rotation only (Period 2 — 3 years)
- Nov 1986 – Oct 1989
No grazing; hay was made (Period 3 — 5 years)
- Nov 1989 – Oct 1994
Summer rotation pasture with winter feeding had the highest soil losses of all 3 scenarios. This is to be expected as the winter feeding caused a lot of soil surface to be exposed to sheet and rill erosion due livestock traffic while the soils were wet or thawing in the sacrifice area (apt term when on sloping ground). Soil losses ranged from yearly soil losses of less than 0.1 ton per acre to a high of 2.5 tons per acre from exposed soil in 1982, most soil lost during the dormant season. Summer-only rotational pasture had minor yearly soil losses of less than 0.1 ton per acre. Hayed pasture had virtually no soil loss.
Rotational, “high-fertility” pasture system had minimal sediment loss and this included winter rotation-al occupancy. Well-fertilized grass being rotationally grazed formed an excellent ground cover.
Surface runoff nutrient loss and pasture systems data were looked at next. With the continuous, unimproved grazing management with the stream fenced off or not, nitrogen and phosphorus levels in the water were very low simply because availability of nutrients were not there except from voided feces and urine from the grazing animals. The weighted concentration levels of nitrate-N and soluble-P seen under the various scenarios described above were between 0.1 ppm (most often) to 0.3 ppm for N and between 0.01 ppm (most often) and 0.03 ppm for P in storm flows. It appears fencing off the cattle from the stream was not worth the trouble, especially since it became a haven for multiflora rose. In the case of P, the highest weighted concentration came from ungrazed pasture. Grass tea leachate from runoff water running through a grass thatch. Base flow levels of nitrate-N varied a bit more between treatments but were still very low for all.
For the rotational, “medium-fertility” pasture system, these were the treatments:
N fertilizer at 50 lbs/Ac annually (5 years)
– May 1974-Apr 1979
N fertilizer at 150 lbs/Ac annually (11 years)
– May 1979-Apr 1990
Rotational grazing vs Haying with 0 N/Ac (7 years)
– May 1990-Apr 1997
NH4NO3 vs (NH4)2SO4 as N source – 100 lbs/Ac (4 years)
– May 2001-Apr 2005
Continuous grazing vs management intensive grazing – urea as N source – 100 lbs/Ac (4 years)
– May 2005-Apr 2009
Total N loss from the medium fertility pasture system never exceeded 16 pounds per acre per year for all the years studied. Most years the loss was less than 2 pounds per acre. Nitrate-N was a small part of the total N lost from the system. The range in nitrate-N concentrations detected in surface runoff is wide and largely reflects the timing of runoff event with when the pasture was fertilized with N. Run-off P losses were significant in this system.
The rotational, “high-fertility” pasture system received these treatments:
200 lbs N/Ac annually (5 years) —- May 1975 – Apr 1980
Summer rotational grazing – orchardgrass
Winter rotational grazing/feeding – tall fescue
0 lbs N/Ac (19 years) —- May 1980 – Apr 1999
- legumes interseeded into grass
200 lbs N/Ac; hay made in summer areas (4 years)
50 lbs N/Ac in winter grazing areas (4 years)
- May 1999 – Apr 2003
200 lbs N/Ac with summer grazing (6 years)
- May 2003 – Apr 2009
(Winter grazing areas removed from pasture study – 2005)
Nitrate losses were higher in the high fertility pasture system as one might expect, but for the most part nitrate losses were below 10 ppm for most runoff events. Runoff N was highest within 10 days of N fertilizer being applied. Legumes interseeded in the grass without N fertilizer had the lowest nitrate losses on all treatments. The highest loss of total N from the high fertility pasture system was less than 32 pounds per acre and occurred in only one year. Most years had total N losses of less than 10 pounds per acre. Again, nitrate-N made up a small portion of the total N lost.
Runoff P levels were slightly lower than P runoff levels found in the medium fertility pasture system. However, treatments are not easily compared. The additional N fertilizer produced a better pasture sod so less P is likely to be lost to runoff. Soluble-P losses in surface runoff for “medium-fertility” and “high-fertility” systems were:
Most of the soluble-P is loss in surface runoff.
Strong correlation between amount of soluble-P lost and the amount of runoff.
Highest concentrations were in events that occurred soon after P fertilizer application.
The third issue looked at was subsurface nutrient loss and pasture systems. For the continuous, unimproved pasture systems nitrate-N and soluble-P concentrations are low in the base flow (ground-water (spring) flow only) of a pasture stream.
For the rotational, “medium-fertility” pasture system soluble-P concentrations are very low, usually less than 0.10 ppm in base flow. The winter feeding area of that system had nitrate-N concentrations above 10 ppm in the base flow and this took awhile to dissipate below 10 ppm after the winter feeding was discontinued as the manure mineralized and was lost to groundwater by leaching.
Subsurface losses of nitrate-N occurred mostly during the dormant season - \~75% of the yearly losses. This loss spikes in March and April and is high also in November and December before freeze-up.
For the rotational, “high-fertility” pasture system, soluble-P concentrations are very low, usually less than 0.10 ppm in the base flow. Summertime losses of nitrate-N to groundwater were less than 10 ppm. Winter time losses of nitrate-N to groundwater were often near 10 ppm most years, spiking to 18 ppm in 1980. Towards the end of the experiment on this system, both winter and summer nitrate-N concentrations in the groundwater were at their lowest for the entire time the experiment ran.
Conclusions and recommendations are:
I. Soil Loss
A. Pasture systems that are not overgrazed, either unimproved or improved, will be within soil loss tolerance limits.
B. Pasture systems are good systems for controlling soil loss and sediment entering streams, ponds, reservoirs, etc.
C. Practices that will help reduce or prevent the potential for soil loss are:
1. Fencing livestock away from streams, and 2. Using limited rotation of a herd during winter feeding as contrasted with constant occupancy in a small pasture (sacrifice area).
II. Surface Runoff
A. The most likely times for high NO3-N concentrations to occur in runoff are within a few days following N fertilizer application.
B. Therefore, fertilizer applications should not be made on saturated soils and/or when runoff is likely to occur within the next runoff event.
C. P fertilizer should be applied to pastures only in response to soil tests indicating a need.
D. Unimproved pastures, if not overgrazed, usually have better surface runoff water quality than ungrazed wooded areas.
III. Subsurface Flow
A. In fertilized pastures, much more N will be lost in the groundwater than surface runoff.
B. It can take several years to see the full impact of surface management practices on ground- water quality.
C. Nitrogen application levels should not exceed 100 pounds per acre annually taking into account manure, purchased fertilizer, and legume contributions (also hay that has been brought in for feed).
D. Another strategy is to use legumes as the primary source of N for pastures with N fertilization restricted to strategic applications to overcome summer slump or to stockpile in the autumn.
The bottom line is that these results show that grazing systems on medium textured soils, when well-managed, are among the best in main stream agriculture from a water quality and soil erosion standpoint. | <urn:uuid:38d60c32-4af2-4df0-8b93-4fad32a6bd30> | {
"dump": "CC-MAIN-2019-04",
"url": "http://grazingguide.net/research/nepc201108a.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583657557.2/warc/CC-MAIN-20190116175238-20190116201238-00619.warc.gz",
"language": "en",
"language_score": 0.9610833525657654,
"token_count": 2333,
"score": 3.390625,
"int_score": 3
} |
It’s been a hard few weeks ever since Trump rescinded on the bathroom rights for transgender students in public schools. The decision is clearly a big blow to transgender students and the transgender community as a whole, insinuating that transgender students’ safety is not important enough to protect.
This is why Keshet, Jewish LGBTQ education and advocacy organization, launched their campaign, “Kavod Achshav (Dignity Now) – For the Sake of Dignity: A Campaign for Trans Youth” in partnership with national Jewish organizations serving youth. The campaign’s statement says it all:
“We are living in a time of tremendous vulnerability for trans, non-binary, and gender non-conforming people, whose rights and basic human dignity are under attack. No one is more vulnerable to these threats than trans youth who are still nine times more likely to attempt suicide than cisgender youth.
We must ensure that trans youth are treated with respect and dignity, are safe from bullying, bigotry, and violence, and are fully embraced in our homes, classrooms, synagogues, and public spaces.”
So, what’s the campaign all about? It’s about action, whether you’re a parent, a teacher, a friend, or a sibling of someone who is transgender–or someone who identifies as transgender themselves. There are a variety of lesson plans and materials parents and educators can use, as well personal essays (like this one from a mom of a transgender daughter). There are also signs to download and display, and a social media campaign with the hashtag#TransJewsBelongHere.
Keshet Executive Director Idit Klein also added that the campaign is about making sure discrimination as a whole isn’t being accepted–even if it means disagreeing with the President:
“When the highest office in the land sends the message to trans kids – ‘you are not worthy of our protection’ – every Jewish community leader needs to tell trans kids, ‘You are worthy. You are wanted. You will be safe in our community.’
We must declare that we are called upon to treat all human beings with dignity and respect, not despite our Jewish tradition but because of it.” | <urn:uuid:769d53d4-1210-46c8-a958-46d77d9a2b3f> | {
"dump": "CC-MAIN-2021-31",
"url": "https://www.kveller.com/major-campaign-launches-to-support-jewish-transgender-kids-teens/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154471.78/warc/CC-MAIN-20210803191307-20210803221307-00104.warc.gz",
"language": "en",
"language_score": 0.9530925154685974,
"token_count": 466,
"score": 2.71875,
"int_score": 3
} |
Despite having one of the most robust commitments to free speech found at any private university, Yale maintains a number of policies that threaten students’ expressive rights.
Per Yale’s vague definition, racial harassment occurs any time an individual “is subjected to arbitrary, capricious, or discriminatory treatment on the basis of race or ethnic origin.” This subjective, uncertain standard is very different from the Supreme Court’s definition of student-on-student hostile environment harassment in the educational setting as conduct that is “so severe, pervasive, and objectively offensive, and that so undermines and detracts from the victims’ educational experience, that the victim-students are effectively denied equal access to an institution’s resources and opportunities.” Davis v. Monroe County Board of Education, 526 U.S. 629, 651 (1999). Yale’s policy subjects speech and conduct that falls well short of the Davis standard to the possibility of disciplinary action. Simply requiring that conduct be “arbitrary, capricious, or discriminatory” lacks the objective, “reasonable person” component announced by the Supreme Court in Davis. Students are also likely to be confused by the “arbitrary” and “capricious” language, as these terms are hardly self-defining, making it difficult for students to follow the policy. Relatedly, the language has the potential to invite subjective application by administrators, as the vague terms go undefined in the policy.
Yale’s Information Technology Appropriate Use Policy prohibits “display of offensive, sexual material in the workplace.” Such displays could become unlawful if they were a part of a pattern of conduct constituting harassment. However, as written, this example is overbroad, as it also includes protected speech by First Amendment standards, like the display of a sexual joke or cartoon that is subjectively found by an individual to be offensive.
The university’s Undergraduate Regulations also contain several provisions that threaten student speech. Those regulations give the university broad power to discipline any conduct that “may imperil the integrity and values of the Yale community or the well-being of its members.” Such a broad provision is ripe for abuse — and in fact, it was used in 2010 to discipline members of a Yale fraternity for a satirical chant.
The Undergraduate Regulations also contain several overly broad and conflicting definitions of sexual harassment that are likely to confuse students. Under its list of disciplinary offenses, Yale defines sexual harassment as “nonconsensual sexual advances, requests for sexual favors, or other verbal or physical conduct of a sexual nature.” This exceedingly broad definition falls far short of the Supreme Court’s Davis standard and gives Yale discretion to punish unwelcome “verbal conduct” — i.e., speech — regardless of whether it rises to the level of a hostile environment.
On a separate page defining sexual misconduct offenses, Yale defines sexual harassment differently, as conduct of a sexual nature that “has the purpose or effect of unreasonably interfering with an individual’s work or academic performance or creating an intimidating or hostile academic or work environment.” While this definition is not as broad as the previous one, it still does not require that conduct be severe, pervasive, and objectively offensive — in fact, it does not even require that conduct actually have a harassing effect on the victim, so long as that was the speaker’s purpose.
Material by FIRE staff
- Speech Codes at Private Colleges Debated at ‘PolicyMic,’ Peter Bonilla, June 28, 2011
- Speech Code of the Month: Yale University, Samantha Harris, June 1, 2011
- Yale Student: OCR is Pressuring Schools to Abandon Commitment to Freedom of Speech, Ari Cohn, May 20, 2011
- What Passes for Justice in Yale Fraternity Case, Robert Shibley, May 18, 2011
- The State of Free Speech on Campus: Yale University, Samantha Harris, June 15, 2009 | <urn:uuid:4c469eab-8f0f-4fcb-b2f8-98d3f623a211> | {
"dump": "CC-MAIN-2019-47",
"url": "https://www.thefire.org/resources/spotlight/yale-university-school-feature/speech-codes/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496665809.73/warc/CC-MAIN-20191112230002-20191113014002-00179.warc.gz",
"language": "en",
"language_score": 0.9414954781532288,
"token_count": 827,
"score": 2.640625,
"int_score": 3
} |
Brunella Cléa May 22, 2020 Worksheets
Different worksheets are available for different areas of study at home. If you know what your child will be learning for the year, you can already find worksheets for homeschooling on that particular topic.
Check the basic layout of the worksheet before buying it. Is the layout cramped or well spaced? How good are the visuals on the page? Can they keep the attention of little children? What is the quality of the content on the worksheets? The text for example, should not contain long sentences. This can make it difficult for the child to read. The language should also be simple so that children can understand what is written. Other things to look for are the quality of paper used and the packaging of the worksheets.
In today’s age where kids are glued to digital devices, let them disconnect and benefit from the beauty of a stimulating activity. Engage them to learn something valuable. Transform their learning experience with the simple, fun and creative worksheets for kids.
However, while they can be a helpful tool and seem like an attractive alternative to a home-school, they do have a number of limitations. They cover practically all subjects under the sun. Different home-school worksheets are available that are suitable for all types of curriculum, and they can help enhance what you are teaching.
Worksheets are slowly becoming an important tool of learning for little children. Nowadays, worksheets are planned and created by many companies, publishers and schools. Since there are so many worksheets available in the market, it may be difficult for parents to know which the appropriate and right worksheet is for their child.
Because there are so many sources of worksheets on the internet, you’re never sure what you’re going to find at a particular site. Choose worksheets that are neat and organized without too many problems jumbled on to each page. The concept of neatness needs to be taught to your child as they do math. If your child doesn’t learn this, be prepared for many careless mistakes later on in his math work.
Tag Cloudsolving equations by adding or subtracting worksheet ratio problems 6th grade abc worksheets grade 9 math exam review y8 math games 8th grade lessons algebra solver free integers worksheet standards for mathematical practice multiplication by 2 grade 1 adding and subtracting worksheets single digit addition worksheets converting fractions into decimals worksheet adding one digit numbers worksheets adding and subtracting algebra worksheets 6th grade fraction worksheets tutoring programs 5th grade work standard graph paper size trigonometry worksheets kinder math sheets algebra 2 sample problems math folder games | <urn:uuid:4e6b2f26-3654-4c4c-9df5-fb4a295830ca> | {
"dump": "CC-MAIN-2020-24",
"url": "https://www.clamcamvideo.com/388cfc15v/xF15843cK/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347406365.40/warc/CC-MAIN-20200529183529-20200529213529-00176.warc.gz",
"language": "en",
"language_score": 0.9433183073997498,
"token_count": 569,
"score": 2.90625,
"int_score": 3
} |
Money seems to burn a hole in my son's pockets, so we require him to set goals: one long-term and one short-term. For his short-term savings, he might choose a LEGO set or novelty book.
When he has saved enough money, we take him to buy the item. However, we often find that by the time he has the cash, he no longer wants to spend it!
If he has the money but changes his mind, we don't allow him to spend it on something else. Instead, he puts the money into his long-term savings and works toward a new goal.
He's also saving 10 percent of his allowance for his "summer fund." He calculates how much money he can save, and then selects one item to buy on the last day of school. One year, he purchased an expensive radio-controlled vehicle. He knew he would not have achieved this if he hadn't worked at saving diligently all year.
This article appeared in the January/February 2012 issue of
Thriving Family magazine. Copyright © 2011 by Alexandra Lutz. Used by permission. ThrivingFamily.com.
~ See more articles for parents of tweens. ~ | <urn:uuid:aaa1d8f9-2080-4b0b-bd4e-9090dbb549c8> | {
"dump": "CC-MAIN-2017-09",
"url": "http://www.thrivingfamily.com/family/stages/tween%20ages/2012/saving-and-spending.aspx",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00452-ip-10-171-10-108.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9868771433830261,
"token_count": 248,
"score": 2.671875,
"int_score": 3
} |
By Parker Abercrombie and Art Ludwig, author of Water Storage: Tanks, Cisterns, Aquifers, And Ponds for Domestic Supply, Fire And Emergency Use. Buy the book at the end of this story. Includes How to Make Ferrocement Water Tanks.
An ideal off-grid water storage system would draw water from an abundant, clean, year round spring or creek. There would always be enough water supply to meet water scarcity, and there would be no concerns about extra water for fire protection or emergencies. But since few of us are blessed in this way, nearly all water storage systems include some form of storage, most commonly a water tank. Even if you get your water from a municipal water system, you may want to store water at your home for fire protection or emergency preparedness. Water storage can be used to:
cover peaks in demand
- smooth out variations in supply
- provide water security in case of supply interruptions or disaster
- save your home from fire
- meet legal requirements
- improve water quality
- provide thermal storage and freeze protection
- enable a smaller pipe to serve for a distant source
We’re going to consider each of these reasons to store water, then take a detailed look at water tanks, and a brief look at other ways to store water.
Cover Peaks in Demand
The most common function of water storage is to cover short-term use flows that are greater than the flow of the water source. For example, a tiny, one gallon-per-minute spring supplies 1440 gallons a day. This is several times more than most homes use in a day. However, almost every fixture in the home consumes water at a faster rate than 1 gallon per minute (gpm) while it is turned on. Even a low-flow shower head uses about 1.5 gpm.
By using water stored in a tank, you can supply water to the shower faster than it is flowing from the spring. On completing the shower, the water will be coming in faster than it is going out, and the tank level will rise back up.
If you had a 10,000 gal tank, you could run a 100 gpm fire hose creating the kind of blast used to bowl over hostile crowds on the stored water from this tiny spring, for an hour and a half! Hopefully the fire would be out by then, as the tank would take several days to refill.
Smooth Out Variations in Supply
In some circumstances, your storage needs will be affected by variations in the water supply. For instance, if the supply is rainwater, you will need enough storage to make it through the intervals between rainfalls. A six-month, rainless dry season requires a heck of a lot more storage than the most common kind of variable supply a well pump that cycles on and off.
If you have a well that taps stored groundwater, a tank will save wear and tear on your pump, because the pump won’t have to switch on and off every time you open a tap.
Provide Water Security in Case of Supply Interruptions or Disaster
In many places, the water supply chain from source to tap is long and made of many delicate links. If a cow steps on the supply line, a pump breaks, a wire works loose, the electricity goes out, the city misplaces your check, or there is a natural disaster, your water flow could stop. By locating your storage as few chain links away as possible from your use point, a large measure of security is added.
Save Your Home from Fire
Designing a system to be effective for combating fire can change its specifications radically. To put out a fire, your stored water needs to be available at a flow rate many times greater than normal.
Meet Legal Requirements
Sometimes you may be required to install water storage simply to meet a legal requirement. On the other hand, you may be able to trade increased water storage for slack on a different legal requirement. For example, if you provide a large amount of water with good pressure that is reserved for fire emergency, a sprinkler system, and/or a hydrant, the fire department might allow you to build a narrower driveway with a smaller turnaround further from the house than they would otherwise�thereby saving you a fortune.
Improve Water Quality
The water coming out of a properly designed tank can be of significantly higher quality than the water that goes into it. This is mostly due to attrition and settling. Add an ozonator, and a tank becomes a substantial treatment step.
Provide Thermal Storage and Freeze Protection
Water has higher specific heat stores more thermal energy per unit of weight than any other common material. A large thermal mass of water stored within a solar greenhouse or home can help to keep it cooler in the day and warmer at night.
Also, as water changes to ice, it radiates a tremendous amount of stored energy. Imagine how much gas it would take to melt a water tank-sized ice cube; when water freezes, it releases this same amount of energy. This is why irrigating for frost protection is effective. The stored energy in water can prevent a water tank or nearby components from freezing (though in the coldest climates this may not be sufficient).
Evaporation consumes even more energy, which is why swamp coolers and cooling towers are effective.
Water is also an effective heat transfer medium.
Finally, in rare instances it can be economical to use elevated water storage as a battery, from which electricity is extracted by running it through a hydroelectric turbine.
Enable a Smaller Pipe to Serve for a Distant Source
If the flow of your source exceeds the peak demand, you can connect to it directly without storage. However, if the source is distant, it may be cheaper to run a small pipe to nearby storage, and a big pipe from there to the use point. The small pipe would be sized to the average use, the big pipe to the peak use. The savings in materials and labor from running a smaller pipe over most of the distance can often pay for the storage and then some.
Ways to Store Water
If you want to store water, here’s your options:
Source direct (no storage)a rarely applicable but desirable option if you have a clean source higher in elevation and flow than the water uses.
Store water in soil inexpensive supplemental irrigation storage in soil (not advisable in landslide areas).
Store water in aquifers free bulk storage safe from evaporative loss, but only accessible by pump and subject to contamination and extraction by other users.
Store water in ponds inexpensive bulk storage of water, most appropriate where rainfall exceeds evaporation and the majority of water need is for non-potable uses.
Store water in tanks most expensive but most flexibility in location and best protection and control of the stored water.
Water Tanks 101
Tanks are the most common way to store water. A well-designed tank offers nearly complete control of storage conditions, including:
- security against leakage
- protection from mosquitoes and vermin
- shade so algae will not grow
- minimal or no evaporation
- valve-controlled inlets and outlets
Water tanks come in all different shapes, sizes, and materials. Most tanks will have:
- an inlet
- an outlet
- service access
- a drain
- an overflow mechanism
- air venting
- provision for sunscreen
Water tanks also can have a host of optional features.
Before installing your water tank you will need to decide where to put it, whether it will be above or below ground, how big it will be, and what material it will be made of. You may also need to meet regulatory requirements.
Situating Water Tanks
The location of your water tank will largely determine:
- which parts of your land can be supplied with tank water by gravity
- the amount of pressure at every point in the system
- the length and cost of pipe runs, control wire runs, and line-of-sight for radio links
- how visually obtrusive your tank will be
- the vulnerability of the tank and pipes to hazards such as falling trees, rocks, and landslides
- the size of tank it is feasible to build
- ease of construction and service access
To situate a water tank, you need to consider:
If you have a hill, put the tank at an elevation on it that yields adequate pressure. (230 ft elevation produces 100 PSI, the maximum recommended pressure for home.)
In places where there is no hill handy, you can:
- make a water tower (to artificially increase the elevation)
- use a small pressure tank (to pressurize water as it is needed and have no water when the power goes out)
- use a huge pressure tank (to store pressurized water at low elevation)
- put a tank on your roof (and live with low pressure, like most people worldwide)
Stability of Soil and Slope
You don’t want your tank to sink into the ground, or slide down the hill. The load per unit of area from water tanks is actually quite low. A person walking can easily place much higher point loads on the soil. On the other hand, no one has feet as big as a water tank. It’s the aggregate load from a water tank all that area being pushed on at the same time that can push your building pad down into the gully.
However, undisturbed native soil is sufficiently strong to support even large tanks. In the case of a tank on a slope, where you don’t have a natural flat spot, put the tank on cut (newly exposed, undisturbed soil), rather than fill (freshly dumped, loose soil). For a really large tank or any tank on fill, it’s a good idea to consult with an engineer.
Aesthetics, Sacred Spots
Water tanks can be big, and although they can be beautiful, they are more often ugly. When locating a water tank, either:
- put it where it doesn’t matter
- conceal it well
- make it beautiful
Ideally, you want your tank downstream from whatever hazards and weak links lie between you and your water source. Rivers that flood, gullies that wash out, landslides, falling trees and rolling boulders it’s best if as few of these hazards as possible are between you and your tank.
Burying your water tank makes it less obtrusive, cooler, and more secure, as well as providing good protection from frost and sunlight. However, you probably won’t be able to install a gravity drain, so you’ll need a pump to get the water out and cleaning is more difficult. The design of buried storage is more structurally challenging, and inspection, repair, and replacement are more difficult. The buried tank will need to be protected from surface water leaking in, and protected from children and pets falling in and drowning.
Sizing Water Tanks
The size of your storage is one of the main factors that will determine under what circumstances you will find yourself short of water, and for how long. Will demand outstrip supply every morning? When there is a fire? A day after the well pump goes out? It will also do a lot to determine what your system costs.
Sizing your tank is a matter of figuring out what degree of water security you want, then finding the tank volume that makes the most of your water supply within your budget and other limiting factors. This is a good time to remember the reason(s) you want storage, as they will drive the calculation of tank size:
- You want more water security than a direct connection to the source can provide.
- The yield of the source cannot directly provide for peak demand.
- The yield of the source is less than that required for firefighting.
- The source is less secure than water stored in a tank (e.g., if the source requires pumping water, while water stored in a tank doesn’t).
- The pipeline distance to the source is so far that it is more economical to use a smaller size pipe and a tank, than a pipe large enough to carry the peak flow all the way from the source to the users.
The biggest variable by far is how much water security you’re aiming for. In general, the more storage you have, the better your water security. Without storage, the security the percentage of time you’ve got water is equal to the security of the source. The more storage you’ve got, the longer an interruption to the source supply you can cover with stored water.
Is it possible to have too much storage? Yes. Too much storage can lead to freezing or water age problems. More likely, it simply constitutes a waste of the Earth’s valuable resources. Because of the high up-front cost of storage, it is rare to see anyone except the super-wealthy install too much storage volume.
Sizing a Tank For Demand Peaks which Exceed Flow
Although water needs are usually expressed as a value-per-person for a 24-hour day, in actuality just about all of this water will be used during a period of 10 to 12 hours. Over half of the entire day’s water use may happen between dinner time and bedtime, or in the morning, depending on the culture. Water provided by the source during low-demand periods (e.g., overnight) can be stored for use during high-demand periods.
Sizing a Tank When You Have Limited Water Supply with Scheduled Use
This approach is the inverse of the approach above. It may be appropriate if the water supply is limited and there are known lengths of time without water use. Instead of sizing the tank to cover use, you size the tank to cover production of the source during the longest time without water use. If you store all the water that is produced during the longest time without usage, you’ll have maximized your limited supply.
Sizing a Tank to Cover Use During Interruptions in Supply
Most systems have at least a day’s worth of storage to cover supply interruptions due to servicing, a fault within the system, or a disaster such as an earthquake or power outage. To size your tank for supply interruption, consider what is likely to jeopardize your supply and for how long.
Sizing a Tank When Production Is Intermittent
If your water production is intermittent (for instance, from harvesting rainwater), your tank should cover the maximum cumulative deficit between production and consumption.
Sizing a Tank for Firefighting
If your system is part of a project that requires permits, there are likely specific legal requirements for the system’s firefighting capabilities which you will have to research and fulfill. These probably include much more storage, bigger pipes and higher pressure than you could otherwise imagine.
Size and Structural Integrity
As tanks get bigger, the structural engineering issues get much bigger. Tanks of a thousand gallons are no great challenge. A 10,000 gal (40 m3) tank requires serious consideration of the loads that will be operating on it. Any tank over 30,000 gal (110 m3) should be professionally engineered.
The tank shape determines how the material will resist the applied force and thus how easy it will be to resist a given load. This is something that you should consider carefully if you are making or modifying a tank.
There are plenty of choices for water tank materials, each with advantages and disadvantages. Common materials include galvanized steel, various plastics, fiberglass, concrete, ferrocement, brick, and rock and mortar. However, a few circumstances are unequivocally hazardous and to be avoided:
PVC exposed to sunlight PVC breaks down in sunlight, reacting to form carcinogens, which leach into the water. It is a plumbing code violation to have potable water in un-shaded PVC for this reason. You can see physical evidence of the change on the outside of the pipe; it darkens, becomes chalky and brittle. The reaction progresses from the outside in. To the extent PVC should be used at all, it should be buried or indoors. If you have PVC that has already degraded, you should replace it.
Pre-1997 PVC which was made with more toxic plasticizers.
Flexible PVC water bed bladders or trash cans which contain a high level of toxic plasticizers.
Pre-1980 tank coatings including coal tar and lead-based paint These were great for corrosion resistance but oops! they poison the water.
Lead pipe and pre-1987 lead-soldered copper pipe Solders and flux currently contain less than 2% lead. Before 1987 they typically were half lead. Lead pipe can be recognized by its softness.
Western red cedar The same stuff that smells good and keeps it from rotting is toxic when ingested.
Fly ash in concrete especially when exposed to acidic water.
Often the worst hazards are not the base material, but solvents, additives, mold-release agents, fungicides, etc.
Many, if not most, water tanks are installed with little or no regulator involvement, but rules and enforcement can vary quite a bit depending on where you are. You’ll need to inquire locally to find out what you’ll be subject to.
Water storage may be subject to zoning, building department, fire department, and health department rules. If you have a homeowners association, it may regulate water tanks, perhaps just because they are a structure. Your insurance company may have rules or incentives relating to water storage as a fire safety resource, a flooding hazard, or simply as another asset to insure.
Some of the rules you may encounter will be consistent with your own interests, and some will run counter to them. You may run into rules concerning:
You may or may not be allowed to build a water tank within the building setbacks from your property lines the zoning department can tell you.
In some neighborhoods, rules may prohibit above ground tanks. A beautiful ferrocement tank with an attractive shape and color, or one that looks just like a boulder, may be able to overcome anti-tank prejudice.
It will generally be the building department that enforces plumbing code requirements about pipe sizes, materials, placement, etc. Tanks over a certain size may require a permit 5000 gal/ 18.9 m3 in our county. Large, constructed tanks may require a permit with an engineer’s stamp on the structural plans. Some of the tank-specific requirements we’ve heard of:
Lockable lid to guard against malicious contamination and drowning hazard
Sealing lid to guard against entry of roof runoff and creatures
Overflow with mosquito trap
Soil report for the structural soundness of the soil that supports the tank
The fire department may require that a hydrant be attached to the tank, with a certain-sized connection (4 in our area). They may require a set-aside or reserve of a specific size (2000 gal/ 9.5 m3 in our area) that can only be accessed via their hydrant not a bad idea, if you want them to be able to save your house. This can be accomplished by putting the hydrant outlet at the bottom and the domestic supply outlet higher up.
The health department may have their own rules, or defer to the building department. The vector control department may want to ensure that your water storage does not breed mosquitoes.
Ideas for Really Cheap Storage
If economy is an overriding consideration, here are some suggestions for really cheap storage:
Salvage 30 or 55 gallon drums can often be scrounged for little or nothing. The bungs often have 3/4 pipe threads, facilitating attachment of inexpensive plumbing, for example small diameter polyethylene tubing. Drums can also be drilled, tapped, threaded, or fitted with bulkhead fittings to make inlets and outlets in any position.
Tote bins used for palletized, bulk transport of liquids. They can be made into passable small tanks, if they’ve contained something non-hazardous. They are usually 275 gal (1 m3) HDPE containers.
Above-ground swimming pools are the cheapest, funkiest storage going. Not a long-term solution, but you can’t beat the cost. The plastic walls are usually PVC.
Ponds can be relatively inexpensive for large volumes of water.
Aquifers usually don’t cost anything and can store vast amounts of water.
For More Information
For information on all types of water storage, worked examples of how to size water tanks, and extensive information on tank materials, see Water Storage, Oasis Design Press 2005. http://www.waterstorage.ws.
For more stories from off-grid.net search here
Our Our fastest solar ovenBake, roast or steam a meal for two people in minutes, reaching up to 550°F (290°C). GoSun Sport sets the bar for portable solar stoves.
Buy our book - OFF THE GRID - a tour of American off-grid places and people written by Nick Rosen, editor of the off-grid.net web site
Leave a Reply | <urn:uuid:1dc0e6d6-94f4-4d69-8b3b-e7814803ff6b> | {
"dump": "CC-MAIN-2019-09",
"url": "https://www.off-grid.net/water-storage-for-off-grid-living/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247481992.39/warc/CC-MAIN-20190217111746-20190217133746-00542.warc.gz",
"language": "en",
"language_score": 0.9432782530784607,
"token_count": 4385,
"score": 2.953125,
"int_score": 3
} |
The Freedom Quilting Bee: Folk Art And The Civil Rights Movement
By Nancy Callahan
In December of 1965, the year of the Selma-to-Montgomery march, a white Episcopal priest driving through a desperately poor, primarily black section of Wilcox County found himself at a great bend of the Alabama River. He noticed a cabin clothesline from which were hanging three magnificent quilts unlike any he had ever seen. They were of strong, bold colors in original, op-art patterns—the same art style then fashionable in New York City and other cultural centers. An idea was born and within weeks took on life, in the form of the Freedom Quilting Bee, a handcraft cooperative of black women artisans who would become acclaimed throughout the nation.
Softcover, 280 pages, 6" x 9". | <urn:uuid:f7bb276b-a53f-4a87-bf59-791624ab6a36> | {
"dump": "CC-MAIN-2022-40",
"url": "https://shop.artsbma.org/products/the-freedom-quilting-bee-folk-art-and-the-civil-rights-movement",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335257.60/warc/CC-MAIN-20220928145118-20220928175118-00330.warc.gz",
"language": "en",
"language_score": 0.9693287014961243,
"token_count": 168,
"score": 2.609375,
"int_score": 3
} |
Italy’s air quality has improved since the country went into coronavirus lockdown, the European Environment Agency (EEA) said Wednesday, a trend seen elsewhere in Europe as well.
In Milan, Italy’s economic capital, the concentration of nitrogen dioxide (NO2), a gas emitted mainly from vehicles and power stations and which can cause inflammation of the respiratory system, has fallen by 24 percent in the last four weeks, compared with the preceeding four weeks, the EEA said.The week starting on March 16 alone saw a 21 percent reduction compared with the same week one year earlier.
In Rome, NO2 levels have fallen between 26 and 35 percent for the same four weeks, and in Bergamo, Italy’s hardest hit city, the reduction was 47 percent.
The lockdown in Italy began in certain northern areas on February 23 before it was extended nationwide on March 9. As of 1100 GMT Wednesday, Italy had recorded more 69,000 cases with 6,820 deaths.
EEA said its “data confirm large decreases in air pollutant concentrations… largely due to reduced traffic and other activities, especially in major cities under lockdown measures.”
Other parts of Europe have seen similar effects, in Spain for example where NO2 concentration has fallen by 55 percent in Barcelona and 41 percent in Madrid, on a 12-month comparison.
In the Spanish capital, average NO2 concentration has fallen by 56 percent from one week to the next.NO2 levels have halved in some other parts of the continent.
But the French air quality monitoring agency cautioned that the lockdown had not led to marked declines in so-called PM2.5 and PM10 particles, the smallest and most harmful air pollutants, owing to increased home heating and continued agricultural activity.
And the EEA insisted that the reductions in emissions do not solve the issue of climate change.
“The current crisis and its multiple impacts on our society work against what we are trying to achieve, which is a just and well-managed transition towards a resilient and sustainable society,” the agency’s director Hans Bruyninckx said in the statement.
In an comment to AFP last week the director said that “making Europe climate neutral requires continuous emission reductions over a long period.” | <urn:uuid:25b801f5-bb83-40a5-afd5-db151fb25cb0> | {
"dump": "CC-MAIN-2020-45",
"url": "https://www.daily-sun.com/post/472028/Air-pollution-in-Italy-falls-since-start-of-lockdown",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107876768.45/warc/CC-MAIN-20201021151342-20201021181342-00440.warc.gz",
"language": "en",
"language_score": 0.9558988213539124,
"token_count": 469,
"score": 2.53125,
"int_score": 3
} |
Due to insufficient rains and drought the receding backwaters at Krishnaraja Sagar Reservoir has exposed vast areas of dry lands, which at normal times would remain submerged under flowing Cauvery river.
This has turned into a boon for farmers residing on the banks of Krishnaraja Reservoir. Taking the advantage of the exposed dry lands the farmers have started harvesting short term crops stretching over quite a few acres, right behind the dam. Acres of land has turned into a green carpet making one wonder whether a river ever flowed there.
Farmers of Kannambadi, Anandvoor and surrounding villages are growing crops like Sesame (Yellu), field bean (Thadnikalu), watermelon, Jowar and other crops which can be harvested within a span of two to three months. Some farmers had already begun harvesting dried field bean to prepare seeds for the next sowing session.
The river bed silt is naturally rich in soil nutrients, doesn't need any fertilizers or chemicals, says farmers. Being already a wet land there is less dependency on water. In case, water is needed the farmers collect water from the river in pot and sprinkle over crops. The farmers claimed that lands once belonged to their ancestors which was submerged after the construction of the Dam.
Farmer couple Vijaya and Lokesh said "We physically removed stones and pebbles lying on the dry riverbed and later sowed seeds. Already we have harvested good quantity of jower, field bean. We are making seeds of few grams, which will be helpful for the next sowing in our agriculture land.”
Farmer Sreenivasan said: “We do not find any difficulty to cultivate the river bed and harvest crops. It was nearly a decade ago, when the water level had dropped similarly we had harvested crops in the same manner.” | <urn:uuid:64a67e39-fcb5-4bbd-a84f-7c26837cd453> | {
"dump": "CC-MAIN-2017-51",
"url": "http://odysseyonapen.blogspot.in/2013/05/farmers-harvest-short-term-crops-on.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948542031.37/warc/CC-MAIN-20171214074533-20171214094533-00108.warc.gz",
"language": "en",
"language_score": 0.9632520079612732,
"token_count": 383,
"score": 2.546875,
"int_score": 3
} |
Jesus washes the Disciples’ feet
‘Servant’ and ‘King’ make us think of different things. Why is Jesus sometimes called the ‘Servant King’?
Jesus lived in a hot and arid land. Most people travelled from place to place on foot. It was the custom to welcome visitors by washing their feet in cool, clean water. Normally a household servant did this.
When Jesus invited the disciples for supper in the upper room, they were surprised by what happened.
Jesus took off his outer clothing, and wrapped a towel around his waist. After that, he poured water into a basin and began to wash his disciples’ feet, drying them with the towel. John 13.4-5
When he had finished washing their feet, he put on his outer clothes and returned to his place. “Do you understand what I have done for you?” he asked them. “You call me ‘Teacher and Lord’, and rightly so, for that is what I am. Now that I, you Lord and Teacher, have washed your feet, you should wash one another’s feet. I have set you an example that you should do as I have done for you.” John 13.12-15
What do you think Jesus meant when he said “I have set you an example”?.
How can the followers of Jesus care for one another today?
Christ has no body now on earth but yours:
Yours are the only hands with which he can do his work,
Yours are the only feet with which he can go about the world,
Yours are the only eyes through which his compassion can shine forth upon a troubled world.
Christ has no body now on earth but yours.
St Theresa of Avila | <urn:uuid:bd1caf81-b937-4565-baa0-73336f9b4033> | {
"dump": "CC-MAIN-2022-05",
"url": "http://oakhamteam.org.uk/young-people/experience-easter/servant-king/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320300810.66/warc/CC-MAIN-20220118092443-20220118122443-00153.warc.gz",
"language": "en",
"language_score": 0.9888791441917419,
"token_count": 382,
"score": 3.390625,
"int_score": 3
} |
Supreme Court Building
Supreme Court of Canada
Cour suprême du Canada
Links and documents
1938/01/01 to 1940/01/01
Listed on the Canadian Register:
Statement of Significance
Description of Historic Place
The Supreme Court Building is a massive granite building whose design is clearly rooted in the classical tradition. Its main facade is defined by a seven bay central core flanked by two projecting pavilions that echoes the principal public spaces within. The building is crowned by steep Chateau style copper roofs. The designation is confined to the footprint of the building.
The Supreme Court Building was designated as a Classified heritage property because of its strong historical associations, its impressive architectural design and detailing, and its status as a national landmark. At the time of its construction, its siting and design were central to the establishment of the new governmental precinct west of Parliament Hill. Its symbolic prominence has increased over the years with the expansion of the Supreme Court's influence and power. As home of the Supreme Court of Canada and of the Federal Court, it has become a familiar symbol of the justice system in Canada at its highest level.
Ian Doull, Supreme Court of Canada, Ottawa, Ontario, Federal Heritage Building Review Office Building Report 87-034; Supreme Court of Canada, Ottawa, Ontario, Heritage Character Statement, 87-034.
Key elements that define the heritage character of this property include, for example:
-the careful design and execution of a formal progression from the large landscaped forecourt through the impressive entry sequence and into the magnificent interior
-the carefully proportioned, symmetrical design both inside and out, which is enhanced by the use of elegant materials to create a dignified sense of occasion and presence;
-the landscape setting, which carries vestiges of the Beaux-Arts schemes proposed for the entire western precinct by planners in the first decades of the century;
-the balanced approach roads, with the large central green, the formal planters and urns, and the circular plaza with fountain at the rear of the building;
- the exterior of the building, with its two distinct elements: the severe classical granite-clad base and the borrowed "chateau" roof, added by the architect at the government's request to maintain a vocabulary established by the original Parliament buildings;
- in the interior areas, the entry stairs, vestibules and halls, including the Main Hall, and the courtrooms which open off them.
Government of Canada
Treasury Board Heritage Buildings Policy
Classified Federal Heritage Building
Theme - Category and Type
Function - Category and Type
- Courthouse and/or Registry Office
Architect / Designer
Location of Supporting Documentation
National Historic Sites Directorate, Documentation Centre, 5th Floor, Room 89, 25 Eddy Street, Gatineau, Quebec
Cross-Reference to Collection | <urn:uuid:25169639-74c7-40fe-85fb-f36372fd4e8b> | {
"dump": "CC-MAIN-2014-42",
"url": "http://www.historicplaces.ca/en/rep-reg/place-lieu.aspx?id=3564",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414637898226.7/warc/CC-MAIN-20141030025818-00131-ip-10-16-133-185.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.911231517791748,
"token_count": 590,
"score": 3.03125,
"int_score": 3
} |
Greek: Plutarch, Πλούταρχος)
|Birthplace:||Chaeronea, Central Greece, Greece|
|Death:||Died in Delphi, Greece|
|Occupation:||Historian, Biographer, essayist, priest, ambassador, magistrate|
|Managed by:||Private User|
About Plutarch, (Plutarchus
Plutarch, born Plutarchos (Greek: Πλούταρχος) then named, on his becoming a Roman citizen, Lucius Mestrius Plutarchus (Μέστριος Πλούταρχος), c. 46 – 120 CE, was a Greek historian, biographer, essayist, and Middle Platonist known primarily for his Parallel Lives and Moralia. He was born to a prominent family in Chaeronea, Boeotia, a town about twenty miles east of Delphi.
Plutarch was born in 46 CE in the small town of Chaeronea, in the Greek region known as Boeotia. His family was wealthy. The name of Plutarch's father has not been preserved, but it was probably Nikarchus, from the common habit of Greek families to repeat a name in alternate generations. The name of Plutarch's grandfather was Lamprias, as he attested in Moralia and in his Life of Antony. His brothers, Timon and Lamprias, are frequently mentioned in his essays and dialogues, where Timon is spoken of in the most affectionate terms. Rualdus, in his 1624 work Life of Plutarchus, recovered the name of Plutarch's wife, Timoxena, from internal evidence afforded by his writings. A letter is still extant, addressed by Plutarch to his wife, bidding her not give way to excessive grief at the death of their two year old daughter, who was named Timoxena after her mother. Interestingly, he hinted at a belief in reincarnation in that letter of consolation.
The exact number of his sons is not certain, although two of them, Autobulus and second Plutarch, are often mentioned. Plutarch's treatise on the Timaeus of Plato is dedicated to them, and the marriage of his son Autobulus is the occasion of one of the dinner-parties recorded in the 'Table Talk.' Another person, Soklarus, is spoken of in terms which seem to imply that he was Plutarch's son, but this is nowhere definitely stated. His treatise on marriage questions, addressed to Eurydice and Pollianus, seems to speak of her as having been recently an inmate of his house, but without enabling us to form an opinion whether she was his daughter or not.
Plutarch studied mathematics and philosophy at the Academy of Athens under Ammonius from 66 to 67. He had a number of influential friends, including Quintus Sosius Senecio and Fundanus, both important senators, to whom some of his later writings were dedicated. Plutarch travelled widely in the Mediterranean world, including central Greece, Sparta, Corinth, Patrae (Patras), Sardes, Alexandria, and two trips to Rome[b].
At some point, Plutarch took up Roman citizenship. As evinced by his new name, Lucius Mestrius Plutarchus, his sponsor for citizenship was Lucius Mestrius Florus, a Roman of consular status whom Plutarch also used as an historical source for his Life of Otho.
He lived most of his life at Chaeronea, and was initiated into the mysteries of the Greek god Apollo. However, his duties as the senior of the two priests of Apollo at the Oracle of Delphi (where he was responsible for interpreting the auguries of the Pythia) apparently occupied little of his time. He led an active social and civic life while producing an extensive body of writing, much of which is still extant.
For many years Plutarch served as one of the two priests at the temple of Apollo at Delphi, the site of the famous Delphic Oracle, twenty miles from his home. By his writings and lectures Plutarch became a celebrity in the Roman empire, yet he continued to reside where he was born, and actively participated in local affairs, even serving as mayor. At his country estate, guests from all over the empire congregated for serious conversation, presided over by Plutarch in his marble chair. Many of these dialogues were recorded and published, and the 78 essays and other works which have survived are now known collectively as the Moralia.
Work as magistrate and ambassador
In addition to his duties as a priest of the Delphic temple, Plutarch was also a magistrate in Chaeronea and he represented his home on various missions to foreign countries during his early adult years. Plutarch held the office of archon in his native municipality, probably only an annual one which he likely served more than once. He busied himself with all the little matters of the town and undertook the humblest of duties.
According to the 10th century historian George Syncellus, late in Plutarch's life, emperor Hadrian appointed him nominal procurator of Achaea – a position that entitled him to wear the vestments and ornaments of a consul himself.
Plutarch died between the years 119 and 127.
Lives of the Roman emperors
The first biographical works to be written by Plutarch were the Lives of the Roman Emperors from Augustus to Vitellius. Of these, only the Lives of Galba and Otho survive. The Lives of Tiberius and Nero are extant only as fragments, provided by Dasmascius (Life of Tiberius, cf. his Life of Isidore) and Plutarch himself (Life of Nero, cf. Galba 2.1), respectively. These early emperors’ biographies were probably published under the Flavian dynasty or during the reign of Nerva (CE 96-98).
Parallel Lives - Lives of the Noble Greeks and Romans
Plutarch's best-known work is the Parallel Lives, a series of biographies of famous Greeks and Romans, arranged in pairs to illuminate their common moral virtues and vices. The surviving Lives contain 23 pairs, each with one Greek Life and one Roman Life, as well as four unpaired single Lives.
Criticism of Parallel Lives
"It is not histories I am writing, but lives; and in the most glorious deeds there is not always an indication of virtue or vice, indeed a small thing like a phrase or a jest often makes a greater revelation of a character than battles where thousands die." Plutarch (Life of Alexander/Life of Julius Caesar, Parallel Lives, [tr. E.L. Bowie])
Plutarch stretches and occasionally fabricates the similarities between famous Greeks and Romans in order to be able to write their biographies as parallel. The lives of Nicias and Crassus, for example, have nothing in common except that both were rich and both suffered great military defeats at the ends of their lives.
Life of Alexander
Plutarch's Life of Alexander, written as a parallel to that of Julius Caesar, is one of only five extant tertiary sources on the Macedonian conqueror Alexander the Great. It includes anecdotes and descriptions of events that appear in no other source, just as Plutarch's portrait of Numa Pompilius, the putative second king of Rome, holds much that is unique on the early Roman calendar.
Life of Pyrrhus
Plutarch's Life of Pyrrhus is a key text because it is the main historical account on Roman history for the period from 293 to 264 BC, for which neither Dionysius nor Livy have surviving texts.
The remainder of Plutarch's surviving work is collected under the title of the Moralia (loosely translated as Customs and Mores). It is an eclectic collection of seventy-eight essays and transcribed speeches, which includes On Fraternal Affection—a discourse on honour and affection of siblings toward each other, On the Fortune or the Virtue of Alexander the Great—an important adjunct to his Life of the great king, On the Worship of Isis and Osiris (a crucial source of information on Egyptian religious rites), along with more philosophical treatises, such as On the Decline of the Oracles, On the Delays of the Divine Vengeance, On Peace of Mind and lighter fare, such as Odysseus and Gryllus, a humorous dialogue between Homer's Odysseus and one of Circe's enchanted pigs. The Moralia was composed first, while writing the Lives occupied much of the last two decades of Plutarch's own life.
On the Malice of Herodotus
In On the Malice of Herodotus Plutarch criticizes the historian Herodotus for all manner of prejudice and misrepresentation. It has been called the “first instance in literature of the slashing review.” The 19th century English historian George Grote considered this essay a serious attack upon the works of Herodotus, and speaks of the "honourable frankness which Plutarch calls his malignity."
Book IV of the Moralia contains the Roman and Greek Questions. The customs of Romans and Greeks are illuminated in little essays that pose questions such as 'Why were patricians not permitted to live on the Capitoline?' (no. 91) and then suggests answers to them, often several mutually exclusive.
Pseudo-Plutarch is the conventional name given to the unknown authors of a number of pseudepigrapha attributed to Plutarch. Some editions of the Moralia include several works now known to be pseudepigrapha: among these are the Lives of the Ten Orators (biographies of the Ten Orators of ancient Athens, based on Caecilius of Calacte), The Doctrines of the Philosophers, and On Music. One "pseudo-Plutarch" is held responsible for all of these works, though their authorship is of course unknown. The thoughts and opinions recorded are not Plutarch's and come from a slightly later era, though they are all classical in origin.
The Romans loved the Lives, and enough copies were written out over the centuries so that a copy of most of the lives managed to survive to the present day. Some scholars, however, believe that only a third to one-half of Plutarch’s corpus is extant. The lost works of Plutarch are determined by references in his own texts to them and from other authors' references over time. There are traces of twelve more Lives that are now lost.
Plutarch was a Platonist, but was open to the influence of the Peripatetics, and in some details even to Stoicism despite his polemics against their principles. He rejected absolutely only Epicureanism. He attached little importance to theoretical questions and doubted the possibility of ever solving them. He was more interested in moral and religious questions. In opposition to Stoic materialism and Epicurean "atheism" he cherished a pure idea of God that was more in accordance with Plato. He adopted a second principle (Dyad) in order to explain the phenomenal world. This principle he sought, however, not in any indeterminate matter but in the evil world-soul which has from the beginning been bound up with matter, but in the creation was filled with reason and arranged by it. Thus it was transformed into the divine soul of the world, but continued to operate as the source of all evil. He elevated God above the finite world, and thus daemons became for him agents of God's influence on the world. He strongly defends freedom of the will, and the immortality of the soul. | <urn:uuid:2b4a3965-2ad4-47fe-b176-d37265202891> | {
"dump": "CC-MAIN-2015-06",
"url": "http://www.geni.com/people/Plutarch/6000000011267572005",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422122086301.64/warc/CC-MAIN-20150124175446-00169-ip-10-180-212-252.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9762942790985107,
"token_count": 2492,
"score": 3,
"int_score": 3
} |
Freedom in the World 2003 - Sri Lanka
|Publication Date||19 December 2002|
|Cite as||Freedom House, Freedom in the World 2003 - Sri Lanka, 19 December 2002, available at: http://www.refworld.org/docid/473c54572e.html [accessed 2 June 2015]|
Polity: Presidential-parliamentary democracy
Life Expectancy: 72
Religious Groups: Buddhist (70 percent), Hindu (15 percent), Christian (8 percent), Muslim (7 percent)
Ethnic Groups: Sinhalese (74 percent), Tamil (18 percent), other (8 percent)
Political Rights Score: 3
Civil Liberties Score: 4
Status: Partly Free
After winning parliamentary elections held in December 2001 on a pro-peace platform, the United National Front coalition government, led by Prime Minister Ranil Wickremasinghe, negotiated a ceasefire with the Tamil Tiger separatist rebels in February 2002. Talks held in September were judged a success when the Tigers gave up their demand for a separate state, and the two sides continued to negotiate the outlines of a political settlement while addressing issues of disarmament, reconstruction, and the rehabilitation of displaced civilians. The almost complete cessation of armed conflict led to improvements in the human rights climate in the north and east of the country during the year.
Since independence from Britain in 1948, political power in this island nation has alternated between the conservative United National Party (UNP) and the leftist Sri Lanka Freedom Party (SLFP). While the country has made impressive gains in literacy, basic health care, and other social needs, its economic development has been stunted and its social fabric tested by a long-standing civil war that has killed an estimated 64,000 people. The conflict initially pitted several Tamil guerrilla groups against the government, which is dominated by the Sinhalese majority. The war, although triggered by anti-Tamil riots in 1983 that claimed hundreds of lives, came in the context of long-standing Tamil claims of discrimination in education and employment opportunities. By 1986, the Liberation Tigers of Tamil Eelam (LTTE, or Tamil Tigers), which called for an independent Tamil homeland in the Northern and Eastern Provinces, had eliminated most rival Tamil guerrilla groups and was in control of much of the northern Jaffna Peninsula. At the same time, the government was also fighting an insurgency in the south by the leftist People's Liberation Front (JVP). The JVP insurgency, and the brutal methods used by the army to quell it in 1990, killed 60,000 people. As the civil war continued, a LTTE suicide bomber assassinated President Ranasinghe Premadasa in 1993.
In 1994, Chandrika Kumaratunga ended nearly two decades of UNP rule by leading an SLFP-dominated coalition to victory in parliamentary elections and then winning the presidential election. Early in her term, Kumaratunga tried to negotiate a peace agreement with the LTTE. Following a renewal of hostilities by the LTTE, she pursued a military solution while attempting to devolve power to eight semiautonomous regional councils, including one covering the contested north and east, where Tamils would be the majority. Kumaratunga won early presidential elections in 1999, but her coalition failed to win a majority in parliamentary elections held in October 2000. After her government faced a series of no-confidence motions throughout 2001, she dissolved parliament and scheduled snap elections for December. In polling marred by violence and intimidation, the UNP and its allies won 114 out of a possible 225 seats. UNP leader Ranil Wickremasinghe became prime minister, although Kumaratunga remains in office as president. In March, the ruling coalition consolidated its win with a landslide victory in local elections.
In response to a cease-fire offer by the LTTE in December 2001, the new government declared a truce with the rebels, lifted an economic embargo imposed on rebel-held territory, and restarted Norwegian-brokered peace talks. A permanent bilateral ceasefire accord with provisions for international monitoring was signed in February 2002. Shortly before the first round of formal peace talks took place in Thailand in September, the government lifted its ban on the LTTE. In late September, army and rebel representatives met to exchange prisoners of war in another sign of growing confidence in the peace process. Further progress on issues of rehabilitation and military de-escalation was made at negotiations held in October, and by December, the government and Tigers had agreed to share political power in a federal system.
However, progress on ending the civil war has been constrained by growing tensions and political bickering between the president and the UNP-led government. President Kumaratunga made repeated statements throughout the year undermining the peace process, and her power to arbitrarily dismiss parliament casts doubt over the present government's ability to negotiate with the Tigers. In October, the Supreme Court rejected a cabinet proposal that would have stripped the president of her power to dissolve parliament, determining that such legislation would require a two-thirds majority in parliament as well as a national referendum in order to become law.
Political Rights and Civil Liberties
Sri Lankans can change their government through elections based on universal adult suffrage. The 1978 constitution vested strong executive powers in a president who is directly elected for a six-year term and can dissolve parliament. The 225-member parliament is also directly elected for a 6-year term, through a mix of single-seat, simple-plurality districts and proportional representation. While elections are generally free, they are marred by irregularities, violence, and intimidation. The independent Center for Monitoring Election Violence recorded 2,734 incidents of election-related violence during the December 2001 parliamentary election campaign, including 47 murders and more than 1,500 assaults, threats, and other abuses.
Although the constitution provides for freedom of expression, the government has restricted this right in practice, particularly with regard to coverage of the civil war. However, authorities lifted censorship of military-related news in June 2001. The LTTE tightly restricts the media in areas under its control, according to the U.S. State Department's human rights report. In June, an act of parliament removed criminal defamation legislation from the statute books. The government controls the largest newspaper chain, two major television stations, and a radio station; and political coverage in the state-owned media favors the ruling party. While private media criticize governmental policies, journalists practice some self-censorship. Reporters, particularly those who cover human rights issues or police misconduct, continued to face harassment and threats from the police, security forces, government supporters, and the LTTE. In February, a court sentenced two air force officers to prison terms for an attack on a journalist that occurred four years ago. However, the murder of a BBC reporter in October 2000 by unidentified gunmen remains unsolved.
Religious freedom is respected, although the constitution gives special status to Buddhism and there is some discrimination and occasional violence against religious minorities. The LTTE discriminates against Muslims and has attacked Buddhist sites in the past. The U.S. State Department's 2002 Report on International Religious Freedom noted that as part of the ceasefire accord, government security forces had begun the process of vacating Hindu religious properties in the north and east of the country.
Freedom of assembly is generally respected, although both main political parties occasionally disrupt each other's rallies and political events. In July 2001, after students at Jaffna University boycotted classes to protest the arrest of one of their leaders, authorities closed the entire university in a bid to end protests against the security forces. Except in conflict-affected areas, human rights and social welfare nongovernmental organizations generally operate freely.
Trade unions are independent and engage in collective bargaining. Except for civil servants, most workers can hold strikes. However, under the 1989 Essential Services Act, the president can declare a strike in any industry illegal. President Chandrika Kumaratunga has used the act to end several strikes. Employers on tea plantations routinely violate the rights of the mainly Tamil workforce.
While the judiciary is independent, the rule of law is weak. This has allowed security forces to commit abuses with near impunity, often facilitated by sweeping security laws such as the Prevention of Terrorism Act. Successive governments kept all or parts of Sri Lanka under a near continuous state of emergency from 1979 to July 2001. Regulations allowed authorities to hold suspects in preventive detention for up to one year without charge, with a limited right to judicial review.
Human rights groups allege that the security laws contain inadequate safeguards for detainees and facilitate long-standing practices of torture and "disappearances." Despite the cessation of hostilities, some of these regulations remain in place and hundreds of detainees continue to be held without trial, according to a report issued by Human Rights Watch. In November, Amnesty International reiterated its concern about torture "reported both in the context of the armed conflict and in routine police investigations," while a report issued in October by the Hong Kong-based Asian Human Rights Commission alleged that police use of torture was widespread and threatened the rule of law. While there has been little progress in reducing acts of torture, there has been a decline in the number of reported disappearances.
Soldiers, police, and state-organized civilian militias have also committed extrajudicial executions and rapes of LTTE supporters held in custody, as well as of Tamil civilians. A report issued by Amnesty International in January noted a rise in allegations of custodial rape in 2001. However, Amnesty International welcomed a landmark decision by the Supreme Court that granted monetary compensation to a Tamil woman who had been raped by members of the police and security forces in Colombo in June 2001. Although travel restrictions on civilians in the north and east have been lifted as a result of the ceasefire, Tamils continue to face some harassment and other abuses by soldiers and police.
The LTTE directly controls some territory in the northern Vanni jungle and maintains de facto control over many areas in the Eastern Province. The Tigers run a parallel government in the areas under their control, which include their own police and judiciary. The rebels continued to be responsible for summary executions of civilians, disappearances, arbitrary abductions and detentions, torture and the forcible conscription of children. Press reports indicated that the LTTE continued to recruit teenage children in 2002 despite promises to end the practice, while a report issued by the University Teachers for Human Rights group in July alleged that the cease-fire had allowed the Tigers to forcibly conscript children from previously inaccessible government-controlled areas. However, shortly before the first round of peace talks in September, the Tigers released 85 child recruits, according to UNICEF. The Tigers raise money through extortion, kidnapping, theft, and the seizure of Muslim homes, land, and businesses, and have used threats and attacks to close schools, courts, and government agencies in their self-styled Tamil homeland.
The cease-fire negotiated in February held throughout 2002, despite some incidents of violence and complaints of violations on both sides. In July, the 44-member Norwegian-led Sri Lankan Monitoring Mission (SLMM) released information regarding complaints of ceasefire violations received between February and June. Of a total of 380 complaints, 270 were made against the Tigers while 110 were against the government; the Tigers were most frequently accused of kidnapping, abduction, and extortion, while government forces were accused of harassment, occupation of civilian land, and restrictions on movement.
Sporadic violence between the three major ethnic groups remains a concern. Clashes between Hindu and Muslim Tamils that spread across eastern Sri Lanka in June caused 11 deaths and injured more than 50 people. However, in an effort to address continuing tensions between the LTTE and the Muslims, an accord was signed in February between the Tigers and the Sri Lanka Muslim Congress party that explicitly recognized the right of the roughly 65,000 internally displaced Muslim Tamils to return to the north as part of the peace process. In October, the UN High Commissioner for Refugees reported that more than 213,000 people displaced by the civil war (out of a total of roughly 800,000) had returned to their homes in the north and the east.
Women are underrepresented in politics and the civil service. Female employees in the private sector face some sexual harassment as well as discrimination in salary and promotion opportunities. Rape and domestic violence against women remain serious problems, and authorities weakly enforce existing laws.
Sri Lanka received an upward trend arrow due to a lasting bilateral cease-fire and continuing peace talks between the government and the Tamil Tiger guerrillas. | <urn:uuid:c387d0df-36b3-4547-8ae8-495bce11215a> | {
"dump": "CC-MAIN-2015-22",
"url": "http://www.refworld.org/cgi-bin/texis/vtx/rwmain?page=publisher&publisher=FREEHOU&type=&coi=LKA&docid=473c54572e&skip=0",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1433195034286.17/warc/CC-MAIN-20150601214354-00063-ip-10-180-206-219.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9668942093849182,
"token_count": 2553,
"score": 2.703125,
"int_score": 3
} |
2Significant PointsAbout half worked in educational services; most others were employed by health care and social assistance facilities.A master’s degree in speech-language pathology is the standard credential required for licensing in most States.Excellent job opportunities are expected.
3Nature of WorkWork with people who cannot produce speech sounds or cannot produce them clearly;Those with speech rhythm and fluency problems, such as stuttering;People with voice disorders, such as inappropriate pitch or harsh voice;Those with problems understanding and producing language;Those who wish to improve their communication skills by modifying an accent;Those with cognitive communication impairments, such as attention, memory, and problem solving disorders.Those who have swallowing difficulties.
4Work EnvironmentUsually work at a desk or table in clean comfortable surroundings.At the patient’s bedside and assist in positioning the patient.With students in an office or classroom.In the client’s home.
5Education/ TrainingMost speech-language pathologist jobs require a master’s degree.Speech-language pathology courses cover:anatomy,physiology,the development of the areas of the body involved in speech, language, and swallowingthe nature of disordersprinciples of acousticspsychological aspects of communication.Graduate students also learn to evaluate and treat speech, language, and swallowing disorders and receive supervised clinical training in communication disorders.
6Licensure47 States regulated speech-language pathologists through licensure or registration.A passing score on the national examination on speech-language pathology, offered through the Praxis Series of the Educational Testing Service, is required.Other usual requirements include 300 to 375 hours of supervised clinical experience and 9 months of postgraduate professional clinical experience.Forty-one States have continuing education requirements for licensure renewal.Medicaid, Medicare, and private health insurers generally require a practitioner to be licensed to qualify for reimbursement.
7Employment Preschools Elementary Schools Secondary schools Hospitals Offices of other health practitioners, including speech-language pathologistsNursing care facilitiesHome health care servicesIndividual and family services;Outpatient care centers;Child day care centers.A few speech-language pathologists are self-employed in private practice. They contract to provide services in schools, offices of physicians, hospitals, or nursing care facilities, or work as consultants to industry.
8Job OutlookAs the members of the baby boom generation continue to age, the possibility of neurological disorders and associated speech, language, and swallowing impairments increases.Employment in educational services will increase with the growth in elementary and secondary school enrollments, including enrollment of special education students.Greater awareness of the importance of early identification and diagnosis of speech and language disorders in young children will also increase employment.The number of speech-language pathologists in private practice will rise because of the increasing use of contract services by hospitals, schools, and nursing care facilities.
9Job ProspectsThe combination of growth in the occupation and an expected increase in retirements over the coming years should create excellent job opportunities for speech-language pathologists.Opportunities should be particularly favorable for those with the ability to speak a second language, such as Spanish.Job prospects also are expected to be especially favorable for those who are willing to relocate, particularly to areas experiencing difficulty in attracting and hiring speech-language pathologists.
10Earnings Nursing care facilities $70,180 Offices of other health practitioners $63,240General medical and surgical hospitals $61,970Elementary and secondary schools $53,110 | <urn:uuid:3dc95db0-d4fb-44e8-9f77-d17a9700fc50> | {
"dump": "CC-MAIN-2017-17",
"url": "http://slideplayer.com/slide/3587300/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917119838.12/warc/CC-MAIN-20170423031159-00511-ip-10-145-167-34.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9428929090499878,
"token_count": 719,
"score": 2.5625,
"int_score": 3
} |
Written on: June 30, 2015
Just two weeks ago, Texas’ state climatologist linked the floods that killed 15 people in the state to climate change. In California, droughts are devastating crops and creating a drinking water crisis.
Unfortunately, Pennsylvania is a big part of the problem. Our power plants put out the same amount of global warming pollution as Chile. And we have a natural gas problem. Our fracking wells and infrastructure leak methane, which pound for pound, has a 25 times greater impact on climate change than CO2. Together, we could soon change that.
On June 30th we’re holding a town hall with Congressman Brendan Boyle in Jenkintown, PA with health experts and faith leaders to discuss local impacts from climate change and how we can finally slash power plant pollution.
Can you make it?
WHAT: Southeastern PA Climate Change Town Hall Meeting with Congressman Brendan Boyle
WHEN: Tuesday, June 30, 2015 at 6:30 – 8:00 PM
WHERE: Episcopal Church of Our Savior, 821 Homestead Road, Jenkintown PA 19046
WHO: Local officials, public health experts, faith leaders, and you
In the coming months, the EPA will finalize the first ever limits on global warming pollution from power plants. But the coal industry isn’t taking it lying down.
They’ve joined with Majority Leader McConnell to halt any action on climate change—all so they can dig more coal out of the ground despite the threat to our planet.
Learn more about what’s going on from Congressman Boyle, who has been in the midst of fighting climate change in DC.
This Action Alert is from momscleanairforce.org -click on the link to learn more about them! | <urn:uuid:51e13428-ec42-43ca-acdb-9423fe515837> | {
"dump": "CC-MAIN-2021-43",
"url": "https://www.greynun.org/2015/06/action-alert-moms-for-clean-air/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585424.97/warc/CC-MAIN-20211021133500-20211021163500-00670.warc.gz",
"language": "en",
"language_score": 0.9166118502616882,
"token_count": 366,
"score": 2.625,
"int_score": 3
} |
Building on decades of research, a new paper brings us one step closer to a vaccine that targets the neurological hallmarks of Alzheimer’s disease. Prevention may soon be possible.
Memory issues are often the first sign of the condition, which steadily progresses over time.
Alzheimer’s disease is a growing concern as it appears almost exclusively in older adults. As the number of older people rises in the United States, the number of cases will also increase.
Although scientists are still investigating the exact causes of Alzheimer’s disease, they believe that certain neurological markers play a significant role.
The disease seems to involve a buildup of specific proteins in the brain called beta-amyloid and tau. Doctors refer to these abnormal congregations as plaques and neurofibrillary tangles respectively.
Current treatments for Alzheimer’s do not stop disease progression, so the search for effective alternatives is ongoing. Some researchers hope that targeting amyloid buildup might make it possible to stop Alzheimer’s in its tracks.
Many scientists are on the hunt for a vaccine, including Dr. Roger Rosenberg, founding director of the Alzheimer’s Disease Center at UT Southwestern in Dallas, TX.
Earlier studies demonstrated that introducing antibodies to amyloid proteins significantly reduces protein buildup. In the early 2000s, scientists used this knowledge to create a vaccine. However, when they tested the vaccine in humans, it caused inflammation in the brains of
Since then, scientists have focused on developing a way to produce antibodies that bind to Alzheimer’s proteins without triggering the T-cell response that led to brain inflammation.
In Dr. Rosenberg’s latest paper, he describes a new approach. His team started by injecting DNA coding for amyloid into the skin rather than the muscle. The injected cells created a three-molecule chain of beta-amyloid (ab42).
This molecule chain sparked an immune response, generating antibodies that target ab42. The antibodies prevented the buildup of amyloid plaques and also indirectly prevented the buildup of tau.
The current study examined this response in mice and found that the vaccine produced a 40 percent reduction in beta-amyloid and up to a 50 percent reduction in tau. Importantly, there were no adverse immune reactions.
“This study is the culmination of a decade of research that has repeatedly demonstrated that this vaccine can
The results recently
A number of laboratories are using different approaches to develop a vaccine for Alzheimer’s. For instance, some researchers are focused on using a passive immunization technique. They are developing vaccines against tau and amyloid proteins in the laboratory and then injecting them into people with Alzheimer’s.
Dr. Rosenberg has taken a different approach by focusing on active immunotherapy, which involves triggering the body to produce antibodies. This method makes it easier to produce the vaccine and is more cost-effective than passive immunization. Also, triggering the body’s immune response creates a wider range of antibodies, which may potentially be more effective.
As Alzheimer’s generally appears later in life, relatively small delays in its development could make a substantial difference.
“If the onset of the disease could be delayed by even 5 years, that would be enormous for the patients and their families. The number of dementia cases could drop by half.”
Dr. Doris Lambracht-Washington, senior author
In the future, the researchers hope that tests will be available to detect plaques and tangles before symptoms appear. Theoretically, doctors could then provide the individual with an effective vaccine after identifying these early signs. This vaccine would prevent further protein buildup, thereby halting the progression of Alzheimer’s.
As Dr. Rosenberg says, “The longer you wait, the less effect it will probably have. Once those plaques and tangles have formed, it may be too late.”
There is still a long path to tread. First, researchers must trial the vaccine in humans, which will be a long process in itself. Alongside this process, scientists will hopefully continue to make progress in the early detection of Alzheimer’s pathology. | <urn:uuid:c6040a1e-e291-46a3-91d3-aba1c5b85380> | {
"dump": "CC-MAIN-2022-40",
"url": "https://www.medicalnewstoday.com/articles/323734",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335059.43/warc/CC-MAIN-20220928020513-20220928050513-00734.warc.gz",
"language": "en",
"language_score": 0.9380662441253662,
"token_count": 857,
"score": 3.609375,
"int_score": 4
} |
Together with their colleagues from Germany and the Netherlands, scientists at the Moscow Institute of Physics and Technology (MIPT) have found a way to significantly improve computer performance. In their paper published in Nature Photonics, they propose the use of the so-called T-waves, or terahertz radiation as a means of resetting computer memory cells. This process is several thousand times faster than magnetic-field-induced switching.
“We have demonstrated an entirely new way of controlling magnetization, which relies on short electromagnetic pulses at terahertz frequencies. This is an important step towards terahertz electronics. As far as we know, our study is the first to make use of this mechanism to trigger the oscillations of magnetic subsystems,” says Anatoly Zvezdin of Prokhorov General Physics Institute and MIPT, a coauthor of the paper and a USSR State Prize-winning scientist heading MIPT’s Laboratory of Physics of Magnetic Heterostructures and Spintronics for Energy-Saving Information Technologies.
The rapidly increasing amounts of digital data that have to be manipulated, along with the growing complexity of the computation tasks at hand, compel hardware designers to achieve ever higher computational speeds. Many experts believe that classical computation is currently approaching a limit, beyond which no further increase in data processing speed will be practicable. This is motivating scientists all over the world to investigate possibilities of entirely different computer technologies. One of the weak spots in modern computers holding back their evolution is memory: it takes time to complete every set/reset operation for a magnetic memory cell, and reducing the duration of this cycle is a very challenging task.
A group of scientists including Sebastian Baierl of the University of Regensburg, Anatoly Zvezdin, and Alexey Kimel of Radboud University Nijmegen (the Netherlands) and Moscow Technological University (MIREA) proposed that electromagnetic pulses at terahertz frequencies (with wavelengths of about 0.1 millimeters, i.e., between those of microwaves and infrared light) could be used in memory switching instead of external magnetic fields. A more familiar device that makes use of terahertz radiation is the airport body scanner. T-rays can expose weapons or explosives concealed under a person’s clothing, without causing any harm to live tissues.
To find out whether T-rays could be used for convenient memory states switching (storing “magnetic bits” of information), the researchers performed an experiment with thulium orthoferrite (TmFeO?). As a weak ferromagnet, it generates a magnetic field by virtue of the ordered alignment of the magnetic moments, or spins of atoms in the microcrystals (magnetic domains). In order to induce a reorientation of spins, an external magnetic field is necessary.
However, the experiment has shown that it is also possible to control magnetization directly by using terahertz radiation, which excites electronic transitions in thulium ions and alters the magnetic properties of both iron and thulium ions. Furthermore, the effect of T-rays proved to be almost ten times greater than that of the external magnetic field. In other words, the researchers have devised a fast and highly efficient remagnetization technique—a solid foundation for developing ultrafast memory.
The scientists expect their “T-ray switching” to work with other materials as well. Thulium orthoferrite, which was used in the experiment, happens to be convenient for the purposes of demonstration, but the proposed magnetization control scheme itself is applicable to many other magnetic materials.
“There was a Soviet research group that used orthoferrites in their studies, so this was always kind of a priority field for us. This research can be seen as a follow-up on their studies,” says Anatoly Zvezdin.
Tunable radiation source that reaches coveted THz region of spectrum could be used for medical imaging or security applications
Terahertz radiation, the no-man’s land of the electromagnetic spectrum, has long stymied researchers. Optical technologies can finagle light in the shorter-wavelength visible and infrared range, while electromagnetic techniques can manipulate longer-wavelength radiation like microwaves and radio waves. Terahertz radiation, on the other hand, lies in the gap between microwaves and infrared, whether neither traditional way to manipulate waves works effectively. As a result, creating coherent artificial sources of terahertz radiation in order to harness it for human use requires some ingenuity.
Difficulties of generating it aside, terahertz radiation has a wide variety of potential applications, particularly in medical and security fields. Because it’s a non-ionizing form of radiation, it is generally considered safe to use on the human body. For instance, it can distinguish between tissues of different water content or density, making it a potentially valuable tool for identifying tumors. It could also be used to detect explosives or hidden weapons, or to wirelessly transmit data.
In a step towards more widespread use of terahertz radiation, researchers have designed a new device that can convert a DC electric field into a tunable source of terahertz radiation. Their results are published this week in the Journal of Applied Physics, from AIP Publishing.
This device exploits the instabilities in the oscillation of conducting electrons at the device’s surface, a phenomenon known as surface plasmon resonance. To address the terahertz gap, the team created a hybrid semiconductor: a layer of thick conducting material paired with two thin, two-dimensional crystalline layers made from graphene, silicene (a graphene-like material made from silicon instead of carbon), or a two-dimensional electron gas. When a direct current is passed through the hybrid semiconductor, it creates a plasmon instability at a particular wavenumber. This instability induces the emission of terahertz radiation, which can be harnessed with the help of a surface grating that splits the radiation.
By adjusting various parameters — such as the density of conduction electrons in the material or the strength of the DC electric field — it is possible to tune the cutoff wavenumber and, consequently, the frequency of the resulting terahertz radiation.
“[Our work] demonstrates a new approach for efficient energy conversation from a dc electric field to coherent, high-power and electrically tunable terahertz emission by using hybrid semiconductors,” said Andrii Iurov, a researcher with a dual appointment at the University of New Mexico‘s Center for High Technology Materials and the City University of New York. “Additionally, our proposed approach based on hybrid semiconductors can be generalized to include other novel two-dimensional materials, such as hexagonal boron nitride, molybdenum disulfide and tungsten diselenide.”
Other labs have created artificial sources of terahertz radiation, but this design could enable better imaging capabilities than other sources can provide. “Our proposed devices can retain the terahertz frequency like other terahertz sources but with a much shorter wavelength for an improved spatial resolution in imaging application as well as a very wide frequency tuning range from a microwave to a terahertz wave,” said Iurov. | <urn:uuid:5c00174c-cde3-4db9-b762-944e0e781636> | {
"dump": "CC-MAIN-2016-44",
"url": "http://www.learn.ca/tag/terahertz-radiation/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719908.93/warc/CC-MAIN-20161020183839-00345-ip-10-171-6-4.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9171115159988403,
"token_count": 1522,
"score": 2.96875,
"int_score": 3
} |
I am reading an excellent sci-fi novel, The January Dancer, by Michael Flynn. In describing Brigit Ban, one of his characters, Flynn says, “…she was the sort for whom a well- constructed narrative is worth a thousand detailed facts, and on occasion she was known to discard a fact or two to save the narrative.” Great description! Also, important advice for memoirists and family historians.
Whether telling your own story or that of your family you have a mass of facts at your disposal. Creating a book involves choosing which of those facts to include and which don’t make it into the book. Not all facts are equally important.
The objective of a family history or memoir is to trace what is most important in a person’s life. Your book should focus on dramatic moments, turning points, and illustrating the values of the person. So as you decide whether to tell the story chronologically or topically or to blend the two, ask yourself which of the facts and details you have gathered fit into the flow of the story you want to tell and which are digressions which will take your reader away from the main thrust of the story. Some digressions may be important in that they illustrate an important aspect of your subject’s character and therefore belong in the book. Others are outliers, true, but not really important to the flow of the story you want to tell. Your book may be better without them.
Your goal as a writer should be to create as vivid a picture of your character’s life as you can, not to list every bit of factual information you have accumulated through research and planning. Don’t be afraid to emulate Brigit Ban and, “…discard a fact or two to save the narrative.” | <urn:uuid:f12e5388-d985-49b3-8d23-420696b7910e> | {
"dump": "CC-MAIN-2014-23",
"url": "http://www.storiestotellbooks.com/blog/2012/5/13/not-all-facts-are-equally-important.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510268363.15/warc/CC-MAIN-20140728011748-00245-ip-10-146-231-18.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9664605855941772,
"token_count": 371,
"score": 2.84375,
"int_score": 3
} |
Cancer Ribbons - T | Personalized Cause
Cancer ribbons colors and meanings for more than 100 types of cancer. Cancer ribbons page includes a brief explanation of cancer type beginning with the letter T.
Cancer Ribbons / Cancer Awareness Ribbons
There are more than 100 types of cancer. Types of cancer are usually named for the organs or tissues where the cancers form, but they also may be described by the type of cell that formed them.
T-Cell Lymphoma, Cutaneous - see Lymphoma (Mycosis Fungoides and Sèzary Syndrome)
Lymphoma is a broad term for cancer that begins in cells of the lymph system. The two main types are Hodgkin lymphoma and non-Hodgkin lymphoma (NHL). Hodgkin lymphoma can often be cured. The prognosis of NHL depends on the specific type.
Mycosis fungoides and Sézary syndrome are diseases in which lymphocytes (a type of white blood cell) become malignant (cancerous) and affect the skin. Mycosis fungoides and Sézary syndrome are the two most common types of cutaneous T-cell lymphoma (a type of non-Hodgkin lymphoma).
Testicular cancer most often begins in germ cells (cells that make sperm). It is rare and most frequently diagnosed in men 20-34 years old. Most testicular cancers can be cured, even if diagnosed at an advanced stage.
Almost all testicular cancers start in the germ cells. The two main types of testicular germ cell tumors are seminomas and nonseminomas. These 2 types grow and spread differently and are treated differently. Nonseminomas tend to grow and spread more quickly than seminomas. Seminomas are more sensitive to radiation. A testicular tumor that contains both seminoma and nonseminoma cells is treated as a nonseminoma.
Childhood Testicular Cancer - see Unusual Cancers of Childhood
Testicular cancer is a disease in which malignant (cancer) cells form in the tissues of one or both testicles.
There are two types of testicular tumors:
Germ cell tumors
Tumors that start in sperm cells in males. Testicular germ cell tumors may be benign (not cancer) or malignant (cancer). The most common testicular germ cell tumors in young boys are benign teratomas and malignant nonseminomas. Seminomas usually occur in young men and are rare in boys.
Non-germ cell tumors
Tumors that begin in the tissues that surround and support the testicles. These tumors may be benign or malignant.
Throat Cancer (Head and Neck Cancer)
Head and neck cancers include cancers in the larynx, throat, lips, mouth, nose, and salivary glands. Tobacco use, heavy alcohol use, and infection with human papillomavirus (HPV) increase the risk of head and neck cancers.
Nasopharyngeal cancer is a disease in which malignant (cancer) cells form in the tissues of the nasopharynx. The nasopharynx is the upper part of the pharynx (throat) behind the nose. The nostrils lead into the nasopharynx. An opening on each side of the nasopharynx leads into an ear. Nasopharyngeal cancer most commonly starts in the squamous cells that line the nasopharynx.
Oropharyngeal cancer is a disease in which malignant (cancer) cells form in the tissues of the oropharynx. The oropharynx is the middle part of the pharynx (throat), behind the mouth.
Hypopharyngeal cancer is a disease in which malignant (cancer) cells form in the tissues of the hypopharynx. The hypopharynx is the bottom part of the pharynx (throat).
Thymoma and Thymic Carcinoma
Thymomas and thymic carcinomas are rare tumors that form in cells on the thymus. Thymomas grow slowly and rarely spread beyond the thymus. Thymic carcinoma grows faster, often spreads to other parts of the body, and is harder to treat.
Thymoma and thymic carcinoma are diseases in which malignant (cancer) cells form on the outside surface of the thymus. The thymus, a small organ that lies in the upper chest under the breastbone, is part of the lymph system. It makes white blood cells, called lymphocytes, that protect the body against infections.
Thyroid cancer is a disease in which malignant (cancer) cells form in the tissues of the thyroid gland. The thyroid is a gland at the base of the throat near the trachea (windpipe). It is shaped like a butterfly, with a right lobe and a left lobe. The isthmus, a thin piece of tissue, connects the two lobes. A healthy thyroid is a little larger than a quarter. It usually cannot be felt through the skin.
Thyroid cancer can be of four main types, which vary in their aggressiveness. Anaplastic thyroid cancer is hard to cure with current treatments, whereas papillary (the most common), follicular, and medullary thyroid cancer can usually be cured.
Transitional Cell Cancer of the Renal Pelvis and Ureter (Kidney (Renal Cell) Cancer)
Kidney cancer can develop in adults and children. The main types of kidney cancer are renal cell cancer, transitional cell cancer, and Wilms tumor. Certain inherited conditions increase the risk of kidney cancer. Transitional cell cancer of the renal pelvis and ureter is a disease in which malignant (cancer) cells form in the renal pelvis and ureter.
The renal pelvis and ureters are lined with transitional cells. These cells can change shape and stretch without breaking apart. Transitional cell cancer starts in these cells. Transitional cell cancer can form in the renal pelvis, the ureter, or both.
Renal cell cancer is a more common type of kidney cancer. | <urn:uuid:5426755d-ae2a-4576-b500-61f813e0036a> | {
"dump": "CC-MAIN-2018-34",
"url": "https://www.personalizedcause.com/cancer-ribbons-t",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221215487.79/warc/CC-MAIN-20180820003554-20180820023554-00065.warc.gz",
"language": "en",
"language_score": 0.9223513007164001,
"token_count": 1292,
"score": 3.5,
"int_score": 4
} |
There are more than 1,690 streets in the city of Chicago, a surprising number of which are named after Dead White Guys. Many of the men whose names grace our street signs lived incredible lives, did wonderful things, and made their mark on the world. Others . . . not so much. Here are the statesmen, warriors, and pioneers who deserved to be forever immortalized-and those who were best left on history’s cutting room floor.
Those Who Earned It
George Rogers Clark (1752-1818) was a Revolutionary War hero who captured Fort Sackville at Vincennes (now in Indiana) in dramatic fashion.
Extra mileage: Clark had his leg amputated without anesthetic, requesting only that two fifers and two drummers play outside during the two-hour operation.
Captain William Wells (1770-1812) was a soldier who attempted to evacuate 148 people from Fort Dearborn during the War of 1812. A tribe of Potawatomi ambushed the group two miles south of the fort, and Wells was stabbed by a Potawatomi chief.
Extra mileage: His head was cut off and his heart distributed to Potawatomi warriors as a token of their bravery.
Benjamin Rush (1745-1813), a surgeon in the Revolutionary War, signed the Declaration of Independence and is considered the father of American psychiatry. His students established Chicago’s Rush Medical College after his death.
Extra mileage: Spoke out against the habitual use of tobacco. (Then again, he also performed bloodlettings.)
Illustrations: Danny Hellman
Gurdon Saltonstall Hubbard (1802-86), an early Chicago settler, rode, walked, and swam from Chicago to Danville (roughly 170 miles) in 20 hours to bring back a militia to help fight off an Indian raid in 1827.
Extra mileage: The 1871 fire nearly bankrupted Hubbard, an insurance underwriter, but he paid all the claims his company was liable for.
Thomas Addison (1793-1860) was a shy, brilliant British physician whose devotion to studying the adrenal glands was rewarded when his name was attached to a hormonal deficiency, Addison’s disease. His connection to Chicago is unclear.
Extra mileage: Reportedly committed suicide by jumping off a nine-foot parapet in Brighton, England.
Those Who Didn’t
John Wentworth (1815-88), a gluttonous, six-foot-six Chicago mayor who hired spies and instituted chain gangs, once got so tired of bumping his head on low-hanging signs, he hired policemen to take down every one.
Extra mileage: Reportedly drank a pint of whiskey every day. (Other sources dispute that, claiming it was brandy.)
Daniel Elston (1790-1855) was an obscure alderman best known for manufacturing soap and candles.
Extra mileage: Was relieved of his aldermanic duties in 1844 when the city limits were moved, excluding his ward.
Italo Balbo (1896-1940), an Italian aviator, fled to Rome in 1923 after being accused of murdering a priest. In 1933, he led a squadron of 24 “flying boats” on a flight from Rome to Chicago, where he landed on Lake Michigan near the world’s fair.
Extra mileage: Was an avowed fascist. (On the other hand, he spoke out against Benito Mussolini, and during a flight in Libya, was “accidentally” shot down and killed by an Italian cruiser.)
One Who Deserved Better
Antislavery advocate Elijah Parish Lovejoy (1802-37)-who brings us Lovejoy Avenue, a confusing three-block diagonal on the Northwest Side-believed so strongly in freedom of speech that he continued to publish the Alton Observer after three of his printing presses had been thrown into the Mississippi River. In defending the fourth press, he received a fatal blast from a double-barreled shotgun. The press was destroyed anyway. | <urn:uuid:b3dafffe-1754-4671-bf95-46605bb815db> | {
"dump": "CC-MAIN-2021-31",
"url": "https://www.chicagomag.com/chicago-magazine/november-2005/street-creed/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153491.18/warc/CC-MAIN-20210727202227-20210727232227-00087.warc.gz",
"language": "en",
"language_score": 0.9622345566749573,
"token_count": 844,
"score": 3.1875,
"int_score": 3
} |
Juniors build their skills as leaders who Energize, Investigate, and Innovate.
They earn these three prestigious new leadership awards as they explore their own energy, the energy in their places and spaces (buildings), and the energy of getting from here to there (transportation)
Juniors have a new comic story, "Vamos Ya!" to inspire their action (walking school bus anyone?)
Dez, the fashionista spider, is also back to add some wit to the journey as she tries to figure out life "off the grid." "How does this carbon footprint thing work?" she asks. "Do I get eight?"
From their own paper-making experiment to making beads from newspapers and magazines to forming a "perpetual human motion machine," Juniors will find that GET MOVING! is crammed full of energizing stuff to make and do!
The Energize Award
Make an Energy Pledge to reduce their energy use in one or more ways
Try at least two other Energize activities suggested along the journey
Check out how other people are tackling energy issues
The Investigate Award
Learn about energy use in their buildings
Work with their families to make an energy improvement at home
Investigate energy use in a community building and suggest ways to make it more energy-efficient
The Innovate Award
Identify an energy issue in the community, research it, create a plan, and carry it out, all the while reaching out to others to join in, too
Share the news, reflect on what they accomplished, and celebrate it | <urn:uuid:742a7948-2d75-4b1d-bafa-8d7888350c07> | {
"dump": "CC-MAIN-2016-07",
"url": "http://girlscoutsgwm.org/general/page/get-moving",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701161946.96/warc/CC-MAIN-20160205193921-00179-ip-10-236-182-209.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9560284614562988,
"token_count": 322,
"score": 2.625,
"int_score": 3
} |
The objective of this book is to provide a grounding in all the major aspects of computing taken from the stand point of how computing was in the early 1980s. Whilst some of the sections are out of date, they have value in putting modern day computing into perspective. Other sections have value in that the basic principles are still valid. The book has five sections.
[b]Principles of computing[/b] explores the concepts of computing including hardware, software and algorithms; data such as binary coding, floating point numbers and self-checking codes; data structures including strings, arrays, stacks, queues, lists and trees; computer arithmetic and Boolean logic.
[b]Computer hardware[/b] considers logic circuits, computer structure, processor architecture, processor operation, advanced processor features, peripheral devices and processor case studies.
[b]Computer software[/b] takes a look at assembly languages, assemblers, high level languages, high level language case studies, compilers and interpreters, operating systems, operating system case studies and other systems software.
[b]Computer applications[/b] describes the principles of data processing including real-time systems, database systems and flowcharts; files including sorting, merging and searching; databases, data communication, applications case studies, the computing industry and data processing personnel.
[b]Computing in context[/b] puts computing in perspective and looks at the future of computing as seen from 1981.
Show health and safety information
|Subject(s)||Computing, Algorithmic Thinking, Creating Media, Computer Networks, Computer Systems, Data & Information, Design & Development, Effective use of tools, Impact of technology, Programming, Safety & Security|
|Published||1980 - 1989|
|Log in to rate this resource|
- Nelson Thornes | <urn:uuid:ba173b6b-a2e1-47b4-b462-1ed57c14d22d> | {
"dump": "CC-MAIN-2020-24",
"url": "https://www.stem.org.uk/resources/elibrary/resource/34423/computing-science",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590348521325.84/warc/CC-MAIN-20200606222233-20200607012233-00253.warc.gz",
"language": "en",
"language_score": 0.8666689991950989,
"token_count": 366,
"score": 3.46875,
"int_score": 3
} |
Dignity is the virtue that helps us to see and
treat others as unique beings created in God’s image, with
intelligence, will, freedom, and the capacity to love.
help children discover and understand that every person, by the
mere fact of being a person, is worthy of respect
from conception to natural death—regardless of their age, sex, education,
WHY IS IT IMPORTANT TO FORM THIS SENSE OF
• Our society has the mistaken idea that we should follow
our own likes and whims, even if it means trampling
someone else. In the long run, the “me first” attitude
makes it impossible to have true friendships.
• Blindness to
others’ dignity can lead to relationships where people use and
objectify each other.
• In some cases, people can think that
you are worth more and deserve more respect if you
have more material goods. This can lead people to strive
after material things to the point that they lose sight
of spiritual values and of the possibility of finding happiness
in higher ideals and goals.
• There are some rights that
are based on our innate dignity as persons. A society
that is blind to human dignity will be more likely
to accept abortion and euthanasia as a matter of convenience.
THE VIRTUE OF DIGNITY MEANS:
• Treating others with kindness and respect.
Greeting them, saying please and thank you, responding with courtesy,
• Obeying parents and teachers, and treating them with
• Not mocking others, not ignoring people, not talking trash
• Knowing how to listen to others. Not talking
over them or waiting for them to hurry up and
finish so that I can say my piece.
• Reaching out
to help others when I see that they need a
• Knowing how to give in, not needing to get
my way all the time.
• Knowing how to work in
a team, supporting others’ ideas and building off of their
• Knowing how to wait my turn without having to
barge to the front and be first.
• In sports and
in games, having the self-control to respect the rules and
play fair. Not throwing a tantrum if the referee marks
• Taking care of my belongings—and those of others.
• Not borrowing without asking, even from a sibling.
TV shows, movies, videos, or music that could hurt my
• Leaving a place in better condition than when I
found it. Not leaving a trail of messes behind me.
• Respecting the intimacy and the feelings of others. Not prying
into what is not my business, and not revealing personal
information that a friend may have confided in me.
joyful, open, generous, and kind to others. Not making others
pay for my bad moods, and not weighing others down
with a sour face or a bad attitude.
WHAT MAKES IT
DIFFICULT TO LIVE THIS VIRTUE?
• Parents who are afraid to demand
respect from their children, or who passively allow their kids
to talk back, disobey, and show attitude. The lack of
a strong father figure can also make it more difficult
for children to learn attitudes of respect.
• Peer groups in
which some kids have an attitude of disrespect, and whose
example affects the entire group of friends.
• A materialistic
society can lead us to value people for what they
have. Advertisements and media can reinforce this idea that if
you have the latest, biggest, and most expensive things, you
are worth more.
• Movies, music, and TV programs that objectify
women and portray superficial relationships based on sex or appearances.
• A culture in which people do not have a clear
understanding of the value of the soul.
HOW TO PROMOTE
RESPECT AND DIGNITY AT HOME
• As a parent, give a daily
example of kind and respectful dealings with all people. When
it is necessary to correct your children, never lose your
self-control. When parents fly off the handle and can’t control
their emotions, children lose respect for their decisions. Parents must
always be rational and reasonable, especially in disciplinary matters.
well of others, and teach kids how to respect a
person even if he is mistaken in his ideas. Along
the same lines, show your children by your example that
confidential information about other people is not discussed.
• Encourage participation
in activities involving teamwork so that the kids can learn
to listen to others, support others’ ideas, work together, and
conquer their selfishness for a common good.
• Immediately cut short
any mockery, judgments, gossip, or attitudes of superiority in your
• Involve your children in acts of service –
and participate with them in some service activities—so that they
learn how to see others with eyes of compassion and
• Pray with your children, offering up prayers especially for
those who most need spiritual and material help. Through prayer,
teach your children that the defects, needs, and poverty of
others are not to be mocked –they are to be
• Be vigilant over what your kids are watching, listening
to, reading. If they encounter a movie or a show
with unsavory elements, help them to develop a critical eye
and a capacity to judge what goes against the dignity
of the characters (and their own dignity).
“Whoever wants to become
great among you must be your servant, and whoever wants
to be first must be slave of all. For even
the Son of Man did not come to be served,
but to serve, and to give his life as a
ransom for many." (Mk 10:43-45) | <urn:uuid:2d851061-7911-40c7-be6a-04e1e55881c8> | {
"dump": "CC-MAIN-2015-40",
"url": "http://www.regnumchristi.org/english/articulos/articulo.phtml?id=28298&se=363&ca=341&te=874&csearch=341",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443736678574.43/warc/CC-MAIN-20151001215758-00104-ip-10-137-6-227.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9268755316734314,
"token_count": 1237,
"score": 3.46875,
"int_score": 3
} |
Brianna Florer is a sweet, lively 2 year old. She lives in Oklahoma in the United States with her parents, siblings and her grandparents, and celebrated Christmas with them.
Just before Christmas Brianna had a seemingly high temperature, but her parents assumed it was nothing more than a slight cold. But on the Sunday after Christmas, the 2 year old had to be rushed into hospital.
The reason: she starts vomiting blood and her skin turns blue. When the little one had an xray at the hospital the reason quickly became clear. Brianna had swallowed a cell battery.
The girl had to have an operation immediately because the acid from the battery is running out and had already eaten through the child's stomach and one of the main arteries. "They operated on her for two and a half hours but they couldn't stop the bleeding", said her grandfather, Kent Vice. "One minute she's fine and the next she's dead. We had no idea that she's swallowed a battery."
The Lithium cell battery that Brianna had swallowed can be found in many electronic appliances. Not only in remotes, calculators and electric watches, but more and more often in toys and other electronics for children as well.
According to the National Poison Centre in Washington D.C. there was over 11000 incidents of swallowed batteries between 2005 and 2014 alone. 15 children died as a result and 101 now have serious medical problems.
Therefore, it is important to know exactly what complications can amount when a child swallows a battery. Then if it happens it can be treated quickly! According to"Battery Controlled Australia", an association that deals specifically with this topic, one should immediately contact a specialist in any of the following cases:
• If a child has swallowed a battery, then phone the poisons hotline immediately. Every second could save a life and the specialists are not only available 24 hours a day, but also know exactly what to do.
• A child is not eating or drinking and can't vomit. It could be a hole in the windpipe, and could lead to suffocating.
• Caution! Milk does not work against poison! Exactly the opposite - milk often accelerates the absorption of poison into the intestines.
• Batteries, which could be swallowed should always be kept out of reach of children!
• Equipment that includes tiny batteries should always be thoroughly examined. Can a child open the gadget and get to the batteries?
• Throw away flat batteries immediately. Most supermarket offer free battery collection.
Brianna's family have created a fundraiser to help them cover the costs of a burial for the little one.
There is a glimmer of hope however: scientists are trying to develop a method for coating the batteries in a "quantum-coat". Batteries would then not be able to leak into the stomachs of small children or animals, preventing death by poison.
Share this important information with everyone that you know. Don't underestimate the risk involved with swallowing a battery. Everyone should know how they can protect their children from this danger.
Source : Hefty | <urn:uuid:dce900ba-537b-4940-95c4-0b7debda7522> | {
"dump": "CC-MAIN-2017-17",
"url": "http://www.wisethinks.com/2016/01/this-2-year-old-died-agonising-death.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917119361.6/warc/CC-MAIN-20170423031159-00560-ip-10-145-167-34.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9746274948120117,
"token_count": 632,
"score": 2.640625,
"int_score": 3
} |
Questions About Remote Learning?
View This Storyboard as a Slide Show!
Create your own!
Like What You See?
This storyboard was created with
This week's assignment is to make a comic strip. You should work in pairs.
Should we divide the task? I'll be drawing, and you make the story line.
Sure. I'll let you know once I've finished the story so you can start drawing.
Two days later
Did you finish with the story?
Not yet, it's still on progress. But I'm almost done.
Actually I haven't started. I run out of idea.
Actually, I couldn't come up with any idea.
I'm sorry. I was afraid you would get angry.
Can I see the story line?
What? Why didn't you tell me before? We only have two days left.
Okay. I'm sorry for the trouble.
No, I'm not angry to you. Let's think about the story together today.
Over 14 Million
Create My First Storyboard | <urn:uuid:14c6de2f-f352-4e75-902b-843cf96ffbb2> | {
"dump": "CC-MAIN-2020-40",
"url": "https://www.storyboardthat.com/storyboards/lovely23/7s-storyboarad",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400187354.1/warc/CC-MAIN-20200918061627-20200918091627-00458.warc.gz",
"language": "en",
"language_score": 0.9578515291213989,
"token_count": 221,
"score": 3.140625,
"int_score": 3
} |
Did you know that Section of Vertebrate Paleontology curator Matt Lamanna has discovered dinosaur fossils on all seven
continents, including Antarctica?
Dr. Lamanna leads the Antarctic Peninsula Paleontology Project, an international team of scientists investigating the end
of the Mesozoic Era (”Age of Dinosaurs”) in Antarctica, and also leads or co-leads research projects studying dinosaurs in Patagonia (Argentina), the Sahara (Egypt), and the Australian Outback.
Lamanna has named or co-named 15 new species of dinosaurs and fossil birds, including Anzu wyliei and three of the largest land animals known to science—the titanosaurian sauropods Dreadnoughtus schrani, Notocolossus gonzalezparejasi, and Paralititan stromeri. Each of these massive sauropods is estimated to have weighed more
than 40 tons, roughly equivalent to eight adult elephants.
Lamanna has co-authored two papers in the preeminent journal Science and appeared on television programs for PBS (NOVA), the Discovery Channel, the History Channel, A&E, the Science Channel, and more. Recently, he assisted the US Department of Homeland Security in their investigation of a dinosaur fossil that had been illegally smuggled out of China. | <urn:uuid:0762be2d-e79e-4c5a-8821-0e872f2371d0> | {
"dump": "CC-MAIN-2022-27",
"url": "https://carnegiemnh.org/know-section-vertebratepaleontology-curator/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103033816.0/warc/CC-MAIN-20220624213908-20220625003908-00015.warc.gz",
"language": "en",
"language_score": 0.9290257692337036,
"token_count": 277,
"score": 3.15625,
"int_score": 3
} |
Baffin Island: Floe Edge – Exploring Bylot Island
Bylot Island is the fourth largest uninhabited island in the world, all of it being a national park. It’s an incredible experience to go hiking here, especially this early in the short summer Arctic season. First, it takes some climbing over jagged ice blocks to get off the sea ice and onto land. It’s still snow-covered for the most part, except the sunny slopes where the first arctic flowers are already in full bloom – found 4 different species, including the purple saxiflage! We also hiked to old earth dwellings dating hundreds of years, made from rocks and bowhead whale bones. These days, these ruins are home to large colonies of brown lemmings – an arctic specialist mouse-like mammal without long tail. Bylot Island is actually famous for very large lemming colonies and it is here where the massive lemming suicides were observed. Lemmings reproduce very quickly at 7-9 offspring 4-5 times per year and colonies often reach critical points when the food becomes scarce and they all get up and move in search of more, occasionally deciding to swim across open ocean which inadvertently becomes suicidal. | <urn:uuid:051e5aa7-58e9-4717-a97a-73f6d1ae21a6> | {
"dump": "CC-MAIN-2020-05",
"url": "http://travel2unlimited.com/baffin-island-floe-edge-exploring-bylot-island/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250597458.22/warc/CC-MAIN-20200120052454-20200120080454-00330.warc.gz",
"language": "en",
"language_score": 0.9489011168479919,
"token_count": 255,
"score": 2.515625,
"int_score": 3
} |
Idaho Sparkles: New Mineral Named for Geology Professor
Gunterite is a one-of-a-kind mineral found only in an old Colorado mine. And in 2011 it was named for a one-of-a-kind man: Mickey Gunter, a University of Idaho geology professor who dropped out of high school then became the first in his family to attend college. He went on to earn a doctorate and studied with the most respected professor in his chosen field – optical mineralogy – in the world.
Gunter has been honored by the International Mineralogical Association, which voted to name the mineral after him in 2011.
“It’s one of the biggest honors a person could have in their life as a mineralogist,” says Gunter. “It’s a bit overwhelming at the same time.”
The orange-yellow mineral -- Na4(H2V10O28)22H2O -- is the most recently named new mineral to be discovered this year. It comes out of the Sunday Mine in San Miguel, Colorado, a mine that has already produced several new minerals in recent years.
John Hughes, professor of geology at the University of Vermont, helped drive the naming effort and verification process. He says that the Sunday Mine’s composition is rather unusual, with uranium and vanadium veins that have created unique minerals, including his own hughesite and the new gunterite.
“The mineral is quite rare,” says Hughes. “It’s only found in one place.”
Hughes says the honor is long overdue for Gunter. Roughly 25 new minerals are discovered each year, joining about 4,300 minerals already named.
“Mickey is very well-known internationally for his mineralogical research, and he’s worked with the best,” says Hughes. “He’s known for his expertise, and he’s definitely past due for such an honor.”
Gunter had been previously approached for a mineral to be named after him, but at the time he declined. This time, though, he felt that it was his time.
Well-known in the geological world, Gunter has assisted in confirming numerous new minerals using optical mineralogy, which is the study of the interaction of light with minerals. To be confirmed, minerals must go through an intensive verification and description process -- which then goes before the association for a vote -- and then can be named, after another vote by the association.
Gunter’s optical characterizations of minerals also have found use in the zeolite group of minerals and their ability to remove heavy metals and radioactive elements from water; the latter is being employed currently at the nuclear reactors that were damaged in the March 2011 earthquake and tsunami that struck Japan.
Over the past decade, Gunter has become heavily involved in issues dealing with the occurrence of asbestos in its natural setting, compared to its occupational setting. Gunter and doctoral student Brittani Thompson discuss this in an article published in Geoscience World, highlighting the importance of how this form of mineral is defined in these two different settings.
Gunter is in good company with the mineral naming honor; three of his graduate advisers have had minerals named in their honor, and Gunter has emerged as a world leader in optical mineralogy himself.
As an undergraduate student, Gunter was drawn to mineralogy – especially the optical portion of it.
“It’s a unique field,” says Gunter. “When I decided to pursue it in graduate school, I wanted to learn from the best.”
His adviser wrote the book on optical mineralogy, now though, he has co-authored a textbook also used world-wide . He also sits alongside and in the seat of his mentors on the board of directors of the Mineralogical Society of America.
So while Gunter has a new name, Na4(H2V10028)22H20, the more than 5,000 students he has taught during his more than two decades at UI all know him as “Mickey.” In fact, Gunter jokes, when former students hear a mineral was named in his honor, they would have expected it to be “Mickeyite.” | <urn:uuid:d985819e-ecf5-4112-9522-3306c52d0f34> | {
"dump": "CC-MAIN-2016-44",
"url": "https://www.uidaho.edu/sci/geology/news/features/2011/gunterite",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720945.67/warc/CC-MAIN-20161020183840-00139-ip-10-171-6-4.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9803839325904846,
"token_count": 894,
"score": 2.71875,
"int_score": 3
} |
Otter project - monitoring pollution
When I was a child otters had been lost from most of England, poisoned by a range of chemicals that did not degrade and were bio-accumulated to lethal extents by top predators such as otters and birds of prey.
The otter project was originally set up in Cardiff University in the early 1990’s to monitor this pollution by analysing the tissues of otters for chemicals such as polychlorinated biphenyls (PCBs) and organophosphates and so revealing both the degree of contamination, and as the data was added to year by year, the steady falling away of these pollutants.
At the start of the project only a dozen or so otter carcases were sent in, now Cardiff receives over two hundred per year. This is partly due to people knowing about the project, but is mainly due to the return of otters to almost all of England, and this increased population results in more otters being killed on the roads. The increase is down to both less pollution and care being taken to provide suitable habitats for otters.
Over the years many other research projects have made use of the dead otters sent into Cardiff. For example, the genetic distribution within the UK populations reveals regional differences, differences that have been linked to the ‘flavour’ of the scent left by the otters to mark their territories.The animals have also been analysed for the presence of the pervasive parasite Toxoplasmosis gondii.
UAR visited Cardiff University to film an otter dissection and interview Dr Elizabeth Chadwick about some of the research based on the otter carcases Cardiff receives every year from around the UK. Our films reveal just a small part of the work taking place within the otter project.
Find out more: http://www.otterproject.cf.ac.uk/ | <urn:uuid:3367b1c1-a4db-49d4-8447-654b59410118> | {
"dump": "CC-MAIN-2019-09",
"url": "http://www.understandinganimalresearch.org.uk/news/research-medical-benefits/otter-project-monitoring-pollution/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247484648.28/warc/CC-MAIN-20190218033722-20190218055722-00536.warc.gz",
"language": "en",
"language_score": 0.9684549570083618,
"token_count": 385,
"score": 2.796875,
"int_score": 3
} |
Environment / Climate / Range
Marine; reef-associated; non-migratory; depth range 2 - 25 m (Ref. 9710). Tropical; 30°N - 30°S
Size / Weight / Age
Maturity: Lm ? range ? - ? cm
Max length : 20.0 cm TL male/unsexed; (Ref. 48636)
Indo-Pacific: East Africa to the Line Islands; north to the Ryukyu Islands; south to the Great Barrier Reef; including Micronesia and the Galapagos Islands (Ref. 5227).
Occur in coral rich areas of clear lagoon and seaward reefs, and feed exclusively on coral polyps (Ref. 9710). Juvenile usually solitary among branching corals, adults usually paired and home-ranging (Ref. 9710, 48636). Oviparous (Ref. 205). Form pairs during breeding (Ref. 205).
Life cycle and mating behavior
Maturity | Reproduction | Spawning | Eggs | Fecundity | Larvae
Distinct pairing (Ref. 205).
Myers, R.F., 1991. Micronesian reef fishes. Second Ed. Coral Graphics, Barrigada, Guam. 298 p. (Ref. 1602)
IUCN Red List Status (Ref. 96402)
CITES (Ref. 94142)
Threat to humans
Fisheries: minor commercial; aquarium: commercial
ReferencesAquacultureAquaculture profileStrainsGeneticsAllele frequenciesHeritabilityDiseasesProcessingMass conversion
Estimates of some properties based on models
Phylogenetic diversity index (Ref. 82805
= 0.5000 [Uniqueness, from 0.5 = low to 2.0 = high].
Bayesian length-weight: a=0.02239 (0.01097 - 0.04568), b=3.01 (2.84 - 3.18), based on LWR estimates for this Genus-body shape (Ref. 93245
Trophic Level (Ref. 69278
): 3.3 ±0.61 se; Based on food items.
Resilience (Ref. 69278
): High, minimum population doubling time less than 15 months (Preliminary K or Fecundity.).
Vulnerability (Ref. 59153
): Low vulnerability (15 of 100) . | <urn:uuid:d27285a4-b516-4d33-8e68-1d71e78c59cb> | {
"dump": "CC-MAIN-2016-07",
"url": "http://www.fishbase.org/summary/Chaetodon-meyeri.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701145519.33/warc/CC-MAIN-20160205193905-00146-ip-10-236-182-209.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.7001981735229492,
"token_count": 511,
"score": 2.640625,
"int_score": 3
} |
Mountmellick village is located approximately 15 miles northwest of Portlaoise, County Laoise, Republic of Ireland. As with all Irish towns, Mountmellick has grown greatly over the years. The existing plant was designed and installed in the mid 1970s, with further works being added later, the last being a sludge dewatering plant.
The existing plant design consisted of:
- A Wham Mechanical Screen
- An Oxidation Ditch for biological treatment. A 60m long ‘Race Track’ shaped ditch, each lane measuring 7m wide. The total average depth of the ditch was 1.57m with a total volume of 1,340m³.
- Horizontal Brush Aeration System. As was the practice during the 1970s, consisting of 4 horizontal rotors, each 2m in length
- Two final settlement tanks and sludge dewatering works.
- An ‘activated sludge process’for the biological treatment stage.
The design capacity of the works was 5,000PE and the discharge consent was 20mg/l BOD (Biological Oxygen Demand) and 30mg/l SS (Suspended Solids). The brush rotor aeration capacity had proved inadequate and was supplemented by Venturi Aerators. The combined horizontal brush and Venturi Aeration systems were unable to support the process oxygen demand and could not provide the necessary velocity profile in the ditch to ensure the minimum vital mixing requirement of the ditch contents. Consequently, the plant was failing consent.
In addition to the problems associated with the failure of consent, the high power demand to run the aeration system at Mountmellick (i.e. two 7.5kW drives for each horizontal brush rotors and two 13.50kW drives for each Venturi Aerator) also made it expensive to run at existing capacity. However, the need to increase plant capacity from 5000PE to 7000PE meant that the high power supply to the existing plant provided an opportunity to review the whole process performance of the aeration system and deliver a solution to reduce carbon footprint.
KEE Process was contacted by Laois County Council, to discuss how the Triton® aerators and mixers, could overcome the current process load issue facing the Mountmelick plant and explore the option to save power and increase the plant capacity.
After discussions with Laois County Council and their consultants at Nicholas O’Dwyers, KEE visited the site to review the existing plant design and formulate a proposal.
After further liaison and evaluation of the actual dissolved oxygen requirements, it was agreed that the plant upgrade should be carried out in two phases using the KEE Process Triton® dual mode, fine bubble aerator/mixer.
- Phase 1 upgrade – To address the urgent need to increase the process performance of the plant to meet the required environmental discharge consent and also reduce the overall carbon footprint.
- Phase 2 – To increase the capability to upgrade the plant capacity upgrade from 5000PE to 7000PE and reduce maintenance requirements.
Based on the current load and the 20mg/l Biological Oxygen Demand consent for Phase 1, it was necessary to install four 3.7kW Tritons® to provide the supplemental Dissolved Oxygen and all the mixing for the oxidation ditch. These four Tritons® would provide complete mixing of the ditch and generate the optimum horizontal velocity of 0.3m/s to ensure that the suspended solids in the mixed liquor remained in suspension at all times.
Treatment processing target criteria for design upgrade:
Type of wastewater Municipal
Dry Weather Flow (DWF) 1,575m3/day
Full Flow to Treatment (FFT) 3.3 x DWF = 5,184m3/day
Total influent BOD5 load 420kg/day
Total influent nitrogen load 77kg/day
Oxidation ditch approximate volume 1,340m3
Treatment objectives BOD5<20mg/l
Although the stated environmental objectives did not require nitrification, we knew that the NH4-N in the influent would exert an oxygen demand due to the high retention time of 20 hours (at DWF) in the oxidation ditch. The projected AOR (actual oxygen requirement) of 959kg/day accounts for both carbonaceous BOD reduction and Nitrification. For carbonaceous BOD removal only, the AOR would be 773kg/day.
[Note: AOR is the oxygen required under field conditions of temperature, elevation, desired dissolved oxygen operating concentration].
To provide the projected AOR, eight 3.7kW Tritons® were required, in addition to the existing horizontal brush rotors which would need to be retained. This process upgrade assumed that nitrification would be accepted as a future treatment objective. If this had not been the case then the Tritons on their own would have beeen sufficient to provide all the projected Dissolved Oxhgen (DO) and mixing for the 7000PE capacity.
Supply and Installation
Of all the aeration equipment on the market, Triton® aeration units are the easiest to install. There was no need to decommission the existing plant while installation was being carried out. The Tritons® fine bubble aerators were surface mounted and therefore neither the aeration tank or the oxidation ditch needed decommissioning, emptied, refurbished, refilled and re-commissioned. Tritons® can be bridge-mounted, wall-mounted, float-mounted or guiderail-mounted for SBR configuration.
Timing was of the essence to ensure that the treatment objectives were met and therefore the equipment was ordered whilst the installation format was being finalized. At the Mountmellick site Laois County Council and Nicholas O’Dwyer used a novel adaptation to use a ‘float-mount’ option where the floats were anchored to a steel bridge across the ditch with ‘H Frames’ attached to the bridge. This gave the operators the option to have fluctuating water levels as the H frame pivoted the Triton® floats to the bridge. The existing DO probes were used to control the brush aerators through the variable speed drives and, if the DO remained high, the Triton® blowers could be similarly controlled through the DO probes. At least four Tritons® had to be operating in the mixing mode to completely mix the ditch contents and therefore for Phase 1, the control philosophy was designed only to control the Triton® blowers operation to maintain the DO at between 1 and 2 mg/l.
After the Phase 1 installation was completed and within 20 minutes of the four Tritons® being commissioned, the mixed liquor DO concentration started to rise and it was evident that the units were re-suspending solids that had been settled out in the bottom of the ditch previously. Within two days of commissioning, the four Tritons® units were achieving 1-2mg/l DO constantly, with the existing brush rotors only coming on to assist at times of heavy load when the DO concentration started to drop.
Four out of the eight Tritons® for Phase 2 were operated in aeration and mixing mode at all times and the other four Tritons® were installed to operate in mixing and/or aeration mode when required. To ensure an even use, it was also decided that the Triton® operation would be alternated in ‘duty’ and ‘assist’ mode.
For Phase 1 the installed power was reduced from 42kW to 30kW and the treatment objectives were all achieved. Furthermore, the energy efficiency gains and optimisation objectives were achieved by controlling the aeration mode to provide oxygen as and when required whilst the mixing mode was always maintained to ensure the process performance. Thus, an energy saving over 28.5% was achieved and at the same time the environmental objective for effluent quality was met.
Phase 2 was designed to deliver the energy efficiency gains and carbon footprint objectives. The 45kW total installed power for Phase 2 provided a 40% increase in plant capacity whist requiring only a 3kW increase in power.
The carbon footprint can be further reduced if, as required by the consent for discharge, nitrification of the effluent was not pursued.
For more information on KEE Tritons® or any other wastewater treatment equipment and systems, please refer to our website at keegroup.com or call us on 01296 634500. | <urn:uuid:de1d89f4-2196-4559-85b8-ff805796b40c> | {
"dump": "CC-MAIN-2018-43",
"url": "http://keeblog.com/?p=459",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583514879.30/warc/CC-MAIN-20181022071304-20181022092804-00380.warc.gz",
"language": "en",
"language_score": 0.9549601674079895,
"token_count": 1755,
"score": 2.5625,
"int_score": 3
} |
Barack Obama, it is said, will inherit the worst times since the Great Depression. Not to minimize the crisis we are in, but we need a little perspective here.
The Great Depression began with the Great Crash of 1929. By 1931, unemployment had reached 16 percent.
By 1933, 89 percent of stock value had been wiped out, the economy had shrunk by one-third, thousands of banks had closed, a third of the money supply had vanished, and unemployment had reached 25 percent — among heads of households. And in those days, there was no unemployment insurance, no Medicare, no Medicaid, no Social Security, no welfare.
FDR’s answer: vast federal spending, tough new regulations on business and higher taxes — like Herbert Hoover before him, only more so.
The Depression lasted until war orders from the Allies brought U.S. industry back to life. Before 1940, not once did unemployment fall below 14 percent. In May 1939, Treasury Secretary Henry Morgenthau testified:
We are spending more money than we have ever spent before, and it does not work. … I want to see this country prosperous. I want to see people get a job. I want to see people get enough to eat. We have never made good on our promises. … I say after eight years of this administration we have just as much unemployment as when we started … and an enormous debt, to boot.
Politically, the New Deal was a smashing success, with FDR’s landslides in 1932, 1934 and 1936 virtually wiping out the GOP.
Yet economically, the New Deal was a bust, failing utterly to restore prosperity. Despite the indoctrination of generations of schoolchildren in New Deal propaganda, that is the hard truth.
Consider, now, how Ronald Reagan responded to the economic crisis of 1980, the worst since the Depression. In the “stagflation” of that Jimmy Carter era, interest rates had reached 21 percent and inflation 13 percent.
Reagan’s answer was the tight money policy of Fed Chairman Paul Volcker and across-the-board tax cuts of 25 percent, while slashing the highest rates from 70 percent to 28 percent.
While unemployment hit 10 percent in 1982 and Reagan lost 26 House seats, in 1983 the tax cuts kicked in.
From there on out, it was boom times until Reagan rode off into the sunset, having created 20 million new jobs. “The Seven Fat Years,” author Robert Bartley called them.
Reagan had followed the lead of Warren Harding and Cal Coolidge, who had cut Woodrow Wilson’s wartime tax rates of near 70 percent to 25 percent, resulting in “The Roaring ’20s,” a time of unrivaled prosperity.
The JFK tax cuts of the 1960s, also a Reagan model, were equally successful.
Harding, Coolidge, JFK and Reagan all bet on the private sector as the engine of prosperity.
All succeeded. Franklin Roosevelt bet on government. And the New Deal failed. It was World War II that pulled the United States out of the Depression ditch of the 1930s.
Comes now the financial collapse and economic crisis of 2008, inherited by Obama, with 40 percent of all stock values wiped out in a year, foreclosures pandemic, and unemployment near 7 percent and surging.
In crafting his solutions, Obama seems to be brushing aside the Reagan, JFK and Harding-Coolidge models, and channeling FDR and the New Deal Democrats.
Already staring at a $1.2 trillion dollar deficit for the year ending Sept. 30, about 8 percent of the entire U.S. economy, Obama intends to add a stimulus package of $700 billion to $1 trillion, yet another 5 percent to 7 percent of gross domestic product. The resulting deficit would be twice as large as Reagan’s largest, 6 percent of GDP, which was the largest since World War II.
And how is this Niagara of money to be spent?
Hundreds of billions will go out in checks of $500 to $1,000 to wage-earners and individuals who do not even pay taxes. This is much like the George McGovern “demogrant” program of 1972, where every man, woman and child, if memory serves, was to get a $1,000 check from the U.S. government.
Other hundreds of billions will go to shore up state and municipal spending. Other hundreds of billions will go for “infrastructure” projects, another name for earmarks, which is a synonym for pork.
Now, as Obama does not intend to raise taxes, at least now, he is going to have to borrow this near $2 trillion from foreigners or U.S. taxpayers, or the Fed will have to create the money. Undeniably, this will have an impact upon the economy. But what will that impact be?
Where in history, other than World War II, is there evidence that such a mass infusion of spending restored prosperity?
Obama and the Democrats are taking a historic gamble, not only with their careers but with the country. If this monstrous stimulus package, plus the trillions in hot money, do not work; if the two ignite rampant inflation, rather than real growth, we are all out of options. The toolbox is empty.
And what will follow may truly resemble the 1930s.
COPYRIGHT 2009 CREATORS SYNDICATE INC. | <urn:uuid:956cf30c-ec2f-4b1b-b1e9-4690cf4f3cb8> | {
"dump": "CC-MAIN-2015-27",
"url": "http://www.theamericanconservative.com/2009/01/09/look-to-reagan-not-roosevelt/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375099173.16/warc/CC-MAIN-20150627031819-00163-ip-10-179-60-89.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9575356245040894,
"token_count": 1127,
"score": 2.515625,
"int_score": 3
} |
This podcast describes the dangers of smoking during pregnancy for the woman and her unborn baby, and offers information about how to get help to quit smoking for good. Created: 12/14/2007 by National Center for Birth Defects and Developmental Disabilities (NCBDDD).
Date Released: 1/24/2008. Series Name: Birth Defects.
This podcast is presented by the Centers for Disease Control and Prevention. CDC - safer, healthier people.
Most people know that smoking causes cancer, heart disease, and other major health problems. But women who smoke during pregnancy put themselves and their unborn babies at risk for other health problems. The dangers of smoking during pregnancy include premature birth, certain birth defects, and infant death. Even being around cigarette smoke puts a woman and her baby at risk for problems.
There are many health issues associated with smoking and pregnancy. For example, did you know that smoking makes it harder for a woman to get pregnant or that women who smoke during pregnancy are more likely than other women to have a miscarriage?
Smoking during pregnancy causes major health problems for the mom and the baby. For example, smoking is one of the causes of problems with the placenta—the source of the baby's nutrition and oxygen during pregnancy. Smoking during pregnancy can cause a baby to be born too early and have low birth weight, making it more likely the baby will get sick or die.
Smoking during and after pregnancy is one of the causes of Sudden Infant Death Syndrome or SIDS. And babies born to women who smoke are more likely to have a cleft lip or a cleft palate, which are types of birth defects.
Quitting smoking can be hard, but it’s one of the best ways a woman can protect herself and her baby's health. Quitting before getting pregnant is best. But for women who are already pregnant, quitting as early as possible can still help protect against some health problems, such as low birth weight. It’s never too late to quit smoking.
It’s also important to quit smoking for good. Some women might think it’s safe to start smoking again after the baby is born, but these babies aren’t out of harm's way. Babies who are around cigarette smoke have weaker lungs than other babies. They’re more likely to have other health problems, such as infections and more frequent asthma attacks. And as mentioned earlier, being around cigarette smoke is one of the causes of Sudden Infant Death Syndrome or SIDS.
Though quitting for good can be hard, the benefits are worth it—a healthy baby and many more years of good health to enjoy with him or her.
Free help and support are available for pregnant women and others who want to quit for good. Find the Quitline in your state by calling 1-800-QUIT-NOW (1-800-784-8669) or visit www.smokefree.gov.
To access the most accurate and relevant health information that affects you, your family and your community, please visit www.cdc.gov. | <urn:uuid:ef929b2e-431b-4c08-a5be-6e0b75881d5d> | {
"dump": "CC-MAIN-2015-11",
"url": "http://www2c.cdc.gov/podcasts/player.asp?f=7868&s_cid=cs_1011",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936465487.60/warc/CC-MAIN-20150226074105-00295-ip-10-28-5-156.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9683467745780945,
"token_count": 638,
"score": 3.34375,
"int_score": 3
} |
They claim dramatic action is needed to save a generation from dying before their parents. More than a quarter of children are overweight or obese, with obesity rates of 14 per cent in those aged between two and 10 years.
At the same time, levels of inactivity have soared as many children no longer take part in competitive sport at school and playing fields have been closed.The Government has set a target to halt the year-on-year rise in obesity among children under 11 by 2010.
For the first time the Government's watchdog, the National Institute for Health and Clinical Excellence (NICE), has proposed guidelines for preventing and treating obesity in children.Surgery - which costs around £10,000 - would be an option for children who had reached an age of "psychological maturity", thought to be between 14 and 16 years.
Gastric surgery is a risky procedure - even for adults - which needs lifelong monitoring for potential complications.
What types of complications are we talking about subjecting these children to?
Short Term Complications (in the first 3 to 14 days)
- Bleeding Leak
- Abscess and Infection
- Pulmonary Embolus
- Severe Nausea and Vomiting
- Narrowing or ulceration of the connection between the stomach and the small bowel has been reported in one series in about 20% of all patients undergoing gastric bypass.
- Bile Reflux Gastritis occurs when bile flows back into the stomach.
- Fistulas, (an abnormal passage leading from one hollow organ to another) abscess and infection have been seen in gastric bypass operations.
- Dumping Syndrome
- Adhesions, scar tissue caused by healing after surgery
Long Term Complications
- Vitamin and Mineral Deficiencies - Decreases in iron, vitamin B12, and/or Folate levels were detected eight months to eight years (median, two years) after the operation.
- Peripheral neuropathy (disorders resulting from injury to the peripheral nerves) has been reported after operation.
- Osteoporosis and Bone Loss.
- Gastric bypass procedures carry the highest risk of multiple micronutrient deficiencies, that may supervene despite close medical follow-up.
- Patients with a gastric bypass have a greater frequency of microcytosis and anemia, more frequent subnormal serum levels of vitamin B12, and impressive failure to absorb food vitamin B12.
- Gastrointestinal bleeding from a duodenal ulcer four years after having a gastric bypass procedure for obesity
- Symptomatic gallstones requiring cholecystectomy
- Abdominal Wall Hernia
- Pregnancy Complications
Oh, let's not forget the drugs!
Weight loss drugs Xenical and Reductil could also be prescribed for teenagers, and even children under 12 if doctors think their lives are at risk. NICE accepts the drugs are not licensed for use in children but says doctors are legally permitted to do so if it will benefit their patients.
Professor Colin Waine, chairman of the National Obesity Forum, said "We believe there is a small group of obese children at significant risk who could benefit, once a child has finished growing and has achieved maximum height, and where there has been a failure of medical treatment.
"We wish it wasn't necessary but the risks are so great of not helping these children that surgery has to be be an option."This is because these children are at risk of developing type 2 diabetes in later life, they have significant risk factors for premature cardiovascular disease, and they are more at risk of developing cancer." | <urn:uuid:ff02b3d5-9137-4808-a3f8-fc28b85ae678> | {
"dump": "CC-MAIN-2018-26",
"url": "http://weightoftheevidence.blogspot.com/2006/12/uk-solution-to-childhood-obesity.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864776.82/warc/CC-MAIN-20180622182027-20180622202027-00193.warc.gz",
"language": "en",
"language_score": 0.9499394297599792,
"token_count": 749,
"score": 3.296875,
"int_score": 3
} |
What the Bible says about
(From Forerunner Commentary)
The key to understanding Jesus' words lies in understanding how the phrase "kingdom of God" or "kingdom of heaven" is used. We know that the Kingdom of God has a future aspect, when Christ will rule over the nations and His glorified brothers and sisters will reign with Him. There is also a present aspect, as we have already been conveyed into the Kingdom (Colossians 1:13), and now our citizenship is in heaven (Philippians 3:20). We are already part of that heavenly Kingdom. It is a present reality for the firstfruits—though not in its fullness—and in the near future, it will be a worldwide reality.
Yet, there is another way to understand the Kingdom. When Jesus said that "the kingdom of heaven is at hand" (Matthew 4:17)—meaning nearby—He was referring to Himself. When He told the Pharisees that the Kingdom of God was among them, or in their midst (Luke 17:21), He referred to Himself. The king is always the highest representative of a kingdom, so when the king is present, the kingdom is also present.
We can see this in a couple of scriptures: "But if I cast out demons by the Spirit of God, surely the kingdom of God has come upon you" (Matthew 12:28). Here, God's Kingdom is defined as Jesus' exercise of His power. The King, in exerting His authority over unclean spirits, displays the reign or the rule of God. The Kingdom of God is found in the Person of Jesus Christ.
This can also be seen in Mark 9:1-2:
And He said to them, "Assuredly, I say to you that there are some standing here who will not taste death till they see the kingdom of God present with power." Now after six days Jesus took Peter, James, and John, and led them up on a high mountain apart by themselves; and He was transfigured before them.
Jesus tells them they will see the Kingdom of God present with power, and within a week they see Him transfigured. His being revealed to them in glory was a demonstration of the power of God's Kingdom. Even without the glory, what stood among them was still the Kingdom of God. Because He is the King, as the central figure of the Kingdom, wherever He went, the Kingdom was present. In the book of Acts, the message of the Kingdom is inextricably tied to the central Being in that Kingdom (Acts 8:12; 19:8-10; 28:23, 31). To take this a step further, where the King abides in any person or where a person is in Christ, the Kingdom is also present.
We can now apply this principle to Christ's statements. Matthew 11:12 says that from the days of John the Baptist's preaching until that of Jesus—and even to today—Christ and those in whom He dwells suffer violence: physical or verbal assault, affliction, oppression, constraint, and perhaps even martyrdom. This world's forceful and self-willed people "seize" that Kingdom as they would a fortified city, through opposing its citizens in some way.
Similarly, in Luke 16:16, Jesus is saying that the Kingdom of God has been preached, and everyone uses violence against it, signifying opposition in one form or another, to constrain or repress the King and His citizens. As John records, "He came to His own, and His own did not receive Him" (John 1:11).
In other words, the gospel message was not popular. It bore fruit in those who were being called (Isaiah 55:11). Others hoped that the kingdom of Judah would be restored, and they were probably content to wait and watch this Man as He went about—as curiosity-seekers rather than opponents. However, for those who had a vested interest in maintaining the political and religious status quo, the gospel was seen as a threat, and those linked with the Kingdom of Jesus Christ were the object of all manner of resistance and persecution, both before and especially after His death.
Notice, for example, Jesus' words in Matthew 23:13: "But woe to you, scribes and Pharisees, hypocrites! For you shut up the kingdom of heaven against men; for you neither go in yourselves, nor do you allow those who are entering to go in." Some were then in the process of entering the Kingdom, and the resistance and oppression of the scribes and Pharisees were obstacles to that entrance. John 9:22 records that "the Jews had agreed already that if anyone confessed that He was Christ, he would be put out of the synagogue." The scribes and Pharisees, as well as those influenced by them, persecuted those God was drawing into His Kingdom. There was such animosity that the King Himself suffered the most awful violence that has ever been perpetrated: a mob of creatures wantonly crucifying their sinless Creator.
We face a similar circumstance today. Even nominal Christians suffer Muslim persecution in one part of the world, while others are blocked, ridiculed, and constrained by secularists and humanists in another. True Christianity is denounced as being heretical and cultic, and its adherents suffer violence in various ways. This violence does not have to be physical violence. It can be verbal. It can be passive. It can be persecution or opposition in any number of ways.
Wherever the spirit of Satan is present, his children make the way difficult for those who are in Christ or who are being drawn to Him. They reject the royal law of the Kingdom and ridicule God's sovereignty. They sneer at His inspired Word. The violence that the Kingdom suffers will vary by degrees, but it is found wherever the ruler of this world has influence.
This is why Jesus says in John 16:33 that in the world, we will have persecution, but He also says to "be of good cheer." He does not say He will remove persecution right away, but instead, He says that He has overcome the world. He sets limits on how much violence He will allow, and what He does allow He will redeem for His own good will. The violence we suffer will never compare to the violence that He suffered for us. One day soon, though, the violence against the Kingdom will be defeated, and the violent will be given the opportunity to worship the King whom they have pierced (Zechariah 12:10).
David C. Grabbe
Taking the Kingdom by Force
Jesus clearly calls this mysterious occurrence a "vision" (verse 9). It was not reality but a glimpse of what the future held for Jesus Christ.
The word "transfigured" in verse 2 sounds esoteric, but it is merely the passive form of the Greek word metamorphoo, meaning "changed in form" or "transformed." This same word is used in the well-known Romans 12:2, ". . . be transformed by the renewing of your mind. . . ." Unlike Matthew and Mark, Luke uses the phrase egeneto heteron, translated as "was altered" and meaning "became different" (Luke 9:29). In the vision, the three disciples saw Jesus change to the form He will have in God's Kingdom, which He alluded to in Matthew 16:28.
Why did Moses and Elijah appear with Him? This is where the events of Matthew 16 become important. These two servants of God were the most revered among all the Old Testament figures. Moses, the Great Lawgiver, personified the Law, and Elijah, the Archetypal Prophet, the Prophets. Evidently, the vision depicted Moses and Elijah speaking to Jesus in a servant-Master relationship, but the disciples failed to see this vital distinction.
Notice how Peter puts it. "Let's make three tabernacles, one for each of you." The other accounts say he did not really know what he was saying, meaning that he had missed something in his fear, that he spoke without thinking it through (Mark 9:6; Luke 9:33).
What happened as a result of his thoughtless comment? Notice that Matthew writes, "While he was still speaking. . . ." This is a big clue. God, immediately seeing that the disciples did not understand, took steps to make it plain. To paraphrase what God says, "Look! Jesus is MY beloved Son, and He has MY highest approval. Listen to what HE says! He is far greater than Moses and Elijah, the Law and the Prophets."
This is why the transfiguration occurred. God wanted to make it very clear to the disciples that His way of life is based on the life and death and life again of Jesus Christ, not on the Jews' traditional beliefs. He had to stun the disciples so that they would put Jesus and His teachings on a higher level than Judaism—even higher than the teachings of Moses and Elijah.
Whatever Jesus says is far more important to our salvation than the minutiae of Moses' law or the vagaries of prophecy. In many instances, Jesus makes upgrades to Old Testament law, giving a higher, spiritual meaning (for instance, Matthew 5:21-22). Hear Him!
Richard T. Ritenbaugh
Why the Transfiguration?
Jesus walked with His disciples from Bethsaida to the neighborhood of Caesarea Philippi. Six to eight days later, Jesus went up into a high mountain to pray, taking Peter, James, and John with Him and leaving His other nine disciples behind. There He was transfigured before the three. Meanwhile in the valley, the remaining nine disciples failed to cast out a demon from a young boy. Descending the day following His transfiguration, Christ healed the demoniac boy.
The failure of the nine disciples had given the scribes fuel for criticism of both the disciples and Christ. When Christ arrived on the scene, the scribes were being critically disruptive about the failure. The scribes were not known for their questioning as much as for their refuting and disputing. "Questioning" (KJV) or "disputing" (NKJV) in Mark 9:14 is translated from a Greek word that implies confuting, that is, attempting to disprove or deny.
The success of Christ, however, countered the failure of the disciples, shutting the mouths of the critical scribes. His coming upon this scene of dispute, chaos, and darkness must have been an incredible contrast to the honor, power, and glory that He had just experienced on the mountain in the Transfiguration. The sights and sounds that met Him on His return to the sinful world must have disturbed Him.
Martin G. Collins
The Miracles of Jesus Christ: Exorcising a Young Boy (Part One)
Jesus, the Son of God, is greater than Moses, a servant, and He is certainly greater than Elijah. We will do well if we first start with the teachings of Christ and use them to "interpret" the rest. He is the Chief Cornerstone (Isaiah 28:16; Ephesians 2:20). Upon Him, everything hangs.
In Hebrews 3, Paul admonishes us to hold fast to what Jesus taught us (see also Revelation 3:11). If we do, he writes, we also will be sons and daughters in His house. We will no longer be servants, but heirs, actual children of the Father (Romans 8:16-17).
Richard T. Ritenbaugh
Why the Transfiguration?
By far, the most important feature of Revelation 1 is its long description of the Revelator Himself, Jesus Christ. John wants to be sure that his readers—the members of God's church—realize, not only who is revealing the future to the church, but also just how special and important He is to us now. In a way, the apostle is adding a final chapter to his gospel, showing us the awesome glory, power, and eternal nature of our Savior in His present role as High Priest and Head of the church.
When John turns "to see the voice" (verse 12), he beholds "One like the Son of Man" (verse 13) standing amidst seven golden lampstands, later explicitly identified as the seven churches (verse 20). John sees a glorious Being who resembles his dear friend and Master, Jesus of Nazareth, but this Person is far beyond human. He is God, in many respects just as the prophets Daniel and Ezekiel describe Him from their visions (Daniel 10:5-6; Ezekiel 1:26-27).
John had seen something like this in the past, and he recognized who it was immediately: "[Jesus] was transfigured before them, His face shone like the sun, and His clothes became white as the light" (Matthew 17:2). If anything, this vision had an even greater impact on John than the transfiguration did, causing him to fall "at His feet as dead" (Revelation 1:17), again as both Ezekiel and Daniel did (Ezekiel 1:28; Daniel 10:8-9).
Laying His right hand on John (Revelation 1:17), perhaps in healing or in blessing, Jesus tells the aged apostle not to be afraid because "I am the First and the Last. I am He who lives, and was dead, and behold, I am alive forevermore. Amen. And I have the keys of Hades and of Death" (verses 17-18). In less symbolic language, He says, "Relax, I am indeed the Eternal God, but I am also Jesus, your friend, whom you saw die and then rise from the dead. Look! This is what it is like to have eternal life! I now have all power over life and death." Though he remained astonished, what a comfort that must have been to John!
And he passes it on to us so that we, too, might have both comfort and faith in what Jesus commands him to write, the book of Revelation (verse 19). This final book of the canon is not the delusion of a senile old man on a sun-drenched Mediterranean isle, nor the deceptions of another, more sinister spirit whose aim is to distract and corrupt God's people. No, the book of Revelation is a direct communication from our Lord Himself, given in love for His sheep, especially for those whom He calls to face the turmoil and terror of that great day of God.
We have this confidence: that Jesus Christ has ascended to the Father, having fulfilled His every assignment and received all things; that He is "the faithful witness, the firstborn from the dead, and the ruler over the kings of the earth" (verse 5) and more besides; and that He will soon return to earth to set things straight (verse 7). In writing the introduction to his book this way, John has endowed us with the background information and the attitude we need to understand the words of this prophecy and keep what is written in it (verse 3).
Richard T. Ritenbaugh
The All-Important Introduction to Revelation
Find more Bible verses about Transfiguration:
The Berean: Daily Verse and Comment
Sign up for the Berean: Daily Verse and Comment, and have Biblical truth delivered to your inbox. This daily newsletter provides a starting point for personal study, and gives valuable insight into the verses that make up the Word of God. See what over 145,000 subscribers are already receiving each day.
We respect your privacy. Your email address will not be sold, distributed, rented, or in any way given out to a third party. We have nothing to sell. You may easily unsubscribe at any time. | <urn:uuid:440762cc-6453-4f84-a389-f0101de55653> | {
"dump": "CC-MAIN-2021-17",
"url": "https://www.bibletools.org/index.cfm/fuseaction/Topical.show/RTD/cgg/ID/529/Transfiguration.htm",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038088245.37/warc/CC-MAIN-20210416161217-20210416191217-00563.warc.gz",
"language": "en",
"language_score": 0.9685431718826294,
"token_count": 3257,
"score": 2.859375,
"int_score": 3
} |
There's an informal assumption that spinach and other leafy greens lose nutrients the longer they sit on grocery store shelves, and it's actually backwards. A plant physiologist in Texas says supermarket lighting actually boosts the vitamin content in your salad fixings.
Photo by quinn.anya.
Dr. Gene Lester was grocery shopping when he got to wondering what effect continuous store lighting has on the vitamins in produce like lettuce and spinach.
So he devised an experiment back in his lab, exposing two varieties of spinach, flat- and crinkle-leaf, to simulated supermarket conditions - stored in clear sealed plastic at 39 degrees Fahrenheit under continuous fluorescent light - for up to nine days. Then he tested the leaves for their vitamin content, comparing the results with spinach that had been kept in darkness. As he and several colleagues report in The Journal of Agricultural and Food Chemistry, leaves exposed to light had higher levels of all the vitamins except some from the vitamin A family.
It turns out store lighting triggers photosynthesis in leafy greens, boosting its nutritional content even after harvesting. The takeaway message is that storing produce in a dark refrigerator once we get it home may keep it from wilting, but the trade-off may be lower nutritional value.
How do you store your green veggies? Share your tips in the comments. | <urn:uuid:1a19e727-c6ae-4c5f-a761-e94f8725e320> | {
"dump": "CC-MAIN-2014-52",
"url": "http://lifehacker.com/5490451/buy-older-leafy-greens-to-get-more-nutrients/all",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1419447548050.127/warc/CC-MAIN-20141224185908-00074-ip-10-231-17-201.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.948300302028656,
"token_count": 264,
"score": 3,
"int_score": 3
} |
Case example: RSV protection for infants
The respiratory syncytial virus (RSV) is an RNA virus of the family Pneumoviridae. RSV is globally distributed. Particularly among infants, it can cause severe infections of the upper and lower respiratory tract. The reason why RSV causes severe disease in some children but benign symptoms in others is not fully clear. In collaboration with physicians of the clinics for Pediatric Pneumology, Allergology and Neonatology of the MHH (Prof. Dr. med. Gesine Hansen), scientists of the Institute of Experimental Virology (Prof. Dr. rer. nat. Thomas Pietschmann) investigate genetic factors that determine the severity of RSV-infections. Ultimately, they aim to use this information for development of novel diagnostic and preventive measures. | <urn:uuid:1cd2882a-6352-49e2-a463-4f366d09f9cc> | {
"dump": "CC-MAIN-2019-51",
"url": "https://twincore.de/en/translation/translational-case-examples/rsv-protection-for-infants/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540488870.33/warc/CC-MAIN-20191206145958-20191206173958-00011.warc.gz",
"language": "en",
"language_score": 0.8686376810073853,
"token_count": 168,
"score": 3.15625,
"int_score": 3
} |
A pen name, also known as a literary double, is a name used by an author which may be a variant of his or her actual name or may in no way resemble it.
This pseudonym is used sometimes to disguise the writer’s gender or to distance the author from other works. So, for instance, Mary Berton wrote several explicit romances. If Mary wanted to write finance textbooks, she might list her name as M. Berton on those. Both are her name, but the use of an initial instead of Mary not only disguises the gender of the writer but distances the two genre writings.
Here are some authors who have used pen names:
- Mark Twain’s real name was Samuel Langhorne Clemens.
- Theodor Seuss Geisel was Dr. Seuss.
- George Orwell was actually Eric Arthur Blair.
- Stan Lee was really Stanley Martin Lieber.
- Steven King also wrote under the name Richard Bachman.
- Joanne Rowling has used the pen names, J.K. Rowling and Robert Galbraith.
- Agatha Mary Clarissa Christie wrote mysteries with the name Agatha Christie and romance novels as Mary Westmacott.
- George Sand was born Amantine Lucile Aurore Dupin.
- Mary Ann Evans published her works as George Eliot.
Should you use a nom de plume instead of your given name? Well, it depends.
You might choose a pen name if you would like some personal privacy. I’ve opted to write under the name C.E. Flores, which is my actual name but with initials instead of using my first and middle names. I never used my first name on my blog, only my last, for the same reason.
If there are several other authors with your name, you might consider using a pen name or a variant of your own to avoid confusion. For example, you could use your middle name rather than your first name, or add your middle initial to your name. So Robert Carl Brown could write as Carl Brown or Robert C. Brown to distinguish him from other authors also named Robert Brown.
When considering a pen name, do not use the same name as someone famous. Writing as Stephen King might initially increase your sales, but it could cause a whole lot of trouble down the line. Therefore, look for something unique.
You may be tempted to be creative with your Author Biography when writing. After all, it’s not really you. However, don’t give yourself credentials or experiences that are not true. Things like that have a way of being found out and it will damage your credibility as an author long after you’ve forgotten about it. Stick to as close to the truth as possible.
Assignment: Decide on the name you will write as. | <urn:uuid:71cc80fe-570e-4ccb-9ddf-3e426bd55145> | {
"dump": "CC-MAIN-2023-40",
"url": "https://ceflores.com/2020/04/16/blog-to-book-project-pen-names/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511717.69/warc/CC-MAIN-20231005012006-20231005042006-00853.warc.gz",
"language": "en",
"language_score": 0.9437886476516724,
"token_count": 583,
"score": 2.671875,
"int_score": 3
} |
Quentin Roosevelt - probably at 3rd AIC Issoudun
American fighter pilot Quentin Roosevelt, Teddy Roosevelt's youngest son, was shot down and killed more than 90 years ago on Bastille Day, July 14th, 1918, becoming the most famous American casualty of World War I. He was in France for just short of a year. He spent most of that time training and then just a few months at the front. And then over the space of five days he had his first victory and the end of his life. During this time, he and the rest of the 1st Pursuit Group were based in the villages of Touquin, Saints and Mauperthuis, France. And so on July 14, 2008, these same three French villages commemorated the 90th anniversary of the United States Air Service in France during World War I.
"Quentin Roosevelt: A Sketch with Letters" was edited and published by his brother Kermit Roosevelt in 1921 a few years after Quentin died. It is a reproduction of his letters written home as well as letters in tribute to him after his passing made headlines around the world.
Roosevelt was a good looking kid. Looking at photos of him, it is hard to think anything other than he must have been a delightful person to be around. He had a penchant for joy and was documented as being able to chug a bottle of champagne in one gulp and then repeat the task if someone else was paying for the bubbly. His face was etched with some of the same character lines that graced his father's. And they shared the same twinkle in their eyes. Quentin looked young though a bit older than his actual age of 20 years. He wrote about being in the City of Lights as it was going through the war:
"[Paris] is not the Paris that we used to love, the Paris of five years past. The streets are there, but the crowds are different. There are no more young men in the crowds unless in uniform. Everywhere you see women in black, and there is no more cheerful shouting and laughing. Many, many of the women have a haunted look in their eyes, as if they had seen something too terrible for forgetfulness." p.42
Reading through the book, one cannot but be struck by the insight of a well-educated, smart, thoughtful 20 year old young man. And indeed, many praised his intellect, saying that he had the capacity for thought that was like his father's. Author Thomas Fleming posits that Teddy Roosevelt was grooming Quentin as his political successor, even taking Quentin's fiancee Flora on a trip to Canada to give her exposure to the political process. That political mind must have pulled him inexorably to France and to join in a fight he felt the United States was sitting out of for the wrong reasons.
"We are a pretty sordid lot aren't we, to want to sit looking on while England and France fight our battles and pan gold into our pockets? I wondered, as I sat by my fire, whether there are any dreams in our land any more." p.32
He left behind a heart-broken family including his fiancee Flora Whitney who was the heir of not only the wealthy Whitney family, but the Vanderbilts too. The pair had just gotten engaged before Quentin dropped out of Harvard, memorized an eye chart to pass an Army Air Service physical exam and headed over to France.
He wrote letters (and an occasional cablegram) back to his parents from training camp, from Paris, from trains, from hospitals and at many opportunities, numbering and dating them and then signing them "Quent". There was always an origination address. Well, not an address, but a town or locale, probably enough for his parents to locate him on the map. Those who knew him praised him as being a very popular fellow with no pretentions about being an ex-President's son. His instructors at the French Ecole de Tir Aerien (Aerial School of Marksmanship) in Cazaux, far south in the Pyrenees in the direction of Spain, praised his very good piloting skills, his regular landings, and his very good shooting. He trained for a year and shunned any special treatment. He totalled at least one airplane while training at Issoudun, but got away with little damage. His next crash would be different.
Eventually Roosevelt joined the 95th Aero Squadron. The 95th and the 94th Aero Squadron were the first two fighter squadrons in US service.
In between combat sorties, he showed that he was his father's son, charming everyone:
"[Quentin] was just a kid, full of life and good spirits. If he had been less peppy, he might not have got killed. 'We were all billeted out in cottages in this little village of Mauperthuis, the population of which consisted of old ladies, the average age of whom, judging from appearances, was ninety-three - maybe a little more. Well, Quentin was a great favorite, not only among the members of the squadron, but with the old ladies. He spoke French very well indeed, and with this and his cheery ways he got into their good books, or they got into his, whichever way it was. They all called him the noble, or the honorable, or the distinguished, or even the great 'Meestair Roussefel', and he received their greetings very gracefully.'"
Truth is the French were thrilled to have all the Americans there. But Quentin was special - a powerful and egalitarian reminder that the Americans were willing to get anyone killed in the cause of liberty and justice.
"Roosevelt was about the only American name the French country people ever had heard until President Wilson became a world figure, and to have a real Roosevelt amongst them was something for these old ladies to talk about. 'Young Roosevelt would go about from house to house and gossip with all the old ladies. The rest of us sometimes thought they were a bit of a nuisance. If I were trying to write a letter, for instance, and one of them rushed in with a long story to tell in her rapid, colloquial, quite incomprehensible French, I would feel like asking her to leave me alone for a while. But not Roosevelt. He would lay down his pen, put his paper aside, and chat about the weather or whatever the old lady wanted to chat about. It would be: 'Ah, Madame Labrosse, and have you heard yet from the husband of your daughter Blanche ?' ' But no, Meestair Roussefel', I have received no letter it is two weeks, and I fear that..' 'On the contrary,' Roosevelt would say, 'one should not give up the hope. He will arrive soon.' 'Ah, Meestair Roussefel, I of it hope well.'"
Ace of aces Eddie Rickenbacker wrote about Quentin's character and personality:
"Quentin Roosevelt's death was a sad blow to the whole group. As President Roosevelt's son he had rather a difficult task to fit himself in with the democratic style of living which is necessary in the intimate life of an aviation camp. Every one who met him for the first time expected him to have the airs and superciliousness of a spoiled boy. This notion was quickly lost after the first glimpse one had of Quentin. Gay, hearty and absolutely square in everything he said or did, Quentin Roosevelt was one of the most popular fellows in the group. We loved him purely for his own natural self. He was reckless to such a degree that his commanding officers had to caution him repeatedly about the senselessness of his lack of caution. His bravery was so notorious that we all knew he would either achieve some great spectacular success or be killed in the attempt. Even the pilots in his own Flight would beg him to conserve himself and wait for a fair opportunity for a victory. But Quentin would merely laugh away all serious advice. His very next flight over enemy lines would involve him in a fresh predicament from which pure luck on more than a few occasions extricated him."
And then Rickenbacker more about Quentin's death in combat:
"Lieutenant Quentin Roosevelt met his death during an unusually severe dog-fight in the air. He left the [Saints] aerodrome with his formation of five planes and proceeded across the lines east of Chateau-Thierry. The sky was thick with enemy formations as usual. Both our own and the enemy's aeroplanes were largely engaged at that time in strafing trenches and the main highways upon which columns of troops were continually advancing to occupy the lines. One did not have to seek far to find a fight.
Within ten minutes after crossing the trenches the little formation from 95 Squadron took on a Fokker formation of seven machines. They were both at a low altitude and evidently both were intent upon discovering a favorable ground target covered with marching men. The five Americans accepted the Hun challenge for a combat and dropped all other business for the time being.
During the rapid circling about, in which both groups were endeavoring to break up the formation of the antagonist, Quentin discovered the approach of another flight of red-nosed Fokkers, coming from above and behind. He withdrew by himself and flew ahead to meet the newcomers, climbing as he flew. The others were utterly unconscious of his departure, since Quentin flew in the last rear position on one of the wings. It was a cloudy day and the aeroplanes were up near to and occasionally lost in the obscurity of the clouds. Suddenly Lieutenant Buford, the leader of Quentin's formation, saw a Nieuport falling through the clouds from above him. It was out of control as it swept by him. Without realizing whose machine it was, Buford knew that an enemy force was above him. He already had more than his hands full in the present company. Signaling his pilots to follow him, he broke off the contest and re-crossed the lines. Then he discovered the absence of Quentin Roosevelt!
That same night a wireless message came from the Germans saying that Quentin had been shot down by Sergeant Thorn of the Richthofen Circus. Thorn at that time had a record of twenty-four planes to his credit. The additional information was received that Quentin had been buried with military honors. No honors, however, could have compensated our group for the loss of that boy. The news was flashed throughout the world that Quentin Roosevelt was dead!
Occasional press reports came to us that some imaginative reporter had stated that perhaps he was not in reality killed, but was merely a prisoner; thereby selling several more papers while unnecessarily distressing a bereaved family with utterly false hopes. A story came to my attention later which deserves a drastic reply. New York newspapers gave wide publicity to a statement made by a certain non-combatant named Hungerford who claimed to have been employed on the Chateau-Thierry sector of the front at this time. He not only attempted to describe the fight in which Quentin Roosevelt lost his life, but even intimated that had Quentin's comrades not fled, thereby leaving Quentin alone against desperate odds, the whole German formation might have been destroyed. He stated that he saw the fight and that Quentin before his sad death actually shot down two of the enemy planes.
This whole story is absolute piffle. Nobody saw Quentin's last fight except the Huns who shot him down. The fight itself occurred ten miles back of the German lines over Fere-en-Tarden. Quentin did not shoot down two enemy planes nor did his comrades desert him in time of trouble." Fighting the Flying Circus, pp.195-197
Two of the ironies that strike me about Quentin Roosevelt's death were that
1) he died on Bastille Day - July 14, 1918. Bastille Day is highly significant for France's Independence Day. The parallel might be a bit like if the Count de Marquis de Lafayette had died on July 4th. (He didn't, dying instead on May 20, 1834. May 20th is the independence day of Cuba, however. Not sure what that means.)
2) The Second Battle of the Marne kicked off the next day which more or less signaled that the War to End All Wars was finally coming to an end. Quentin missed out on seeing the war won.
Learn more about Quentin Roosevelt:
Quentin Roosevelt Biography
Quentin Roosevelt Event in Chateau-Thierry 2010
Quentin Roosevelt Event in Saints, Touquin, Mauperthius 2008
Quentin Roosevelt Tributes
5 Roosevelt Kids off to War
"American Eagles" - 375 page illustrated history of US Combat Aviation in World War I
Related Links: Quentin Roosevelt | Frank Luke | Eddie Rickenbacker | Raoul Lufbery | "American Eagles" - 345 page illustrated history of US Combat Aviation in World War I | <urn:uuid:65edc696-f87c-4d95-863d-5082e87b247f> | {
"dump": "CC-MAIN-2014-41",
"url": "http://www.usaww1.com/Quentin_Roosevelt.php4",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657124607.22/warc/CC-MAIN-20140914011204-00268-ip-10-196-40-205.us-west-1.compute.internal.warc.gz",
"language": "en",
"language_score": 0.9857620000839233,
"token_count": 2656,
"score": 2.625,
"int_score": 3
} |
Investing can be a highly emotional experience. The people, products and history of storied companies can lead investors to develop an attachment to a particular security. The prospect of gaining or losing a significant amount of money can cause investors to behave in irrational ways. All of the potential highs, lows, and sentiments associated with investing can overshadow the ultimate goal - making money. In an effort to focus on the latter and eliminate the former, the “quantitative” approach to investing seeks to pay attention to the numbers instead of the intangibles.
Enter the “Quants”
Harry Markowitz is generally credited with beginning the quantitative investment movement when he published a “Portfolio Selection” in the Journal of Finance in March of 1952. Markowitz used math to quantify diversification, and is cited as an early adopter of the concept that mathematical models could be applied to investing. Robert Merton, a pioneer in modern financial theory, won a Nobel Prize for his work research into mathematical methods for pricing derivatives. The work of Markowitz and Merton laid the foundation for the quantitative (quant) approach to investing.
Unlike traditional qualitative investment analysts, quants don’t visit companies, meet the management teams or research the products the firms sell in an effort to identify a competitive edge. They often don’t know or care about the qualitative aspects of the companies they invest in, relying purely on math to make investment decisions.
Hedge fund managers embraced the methodology and advances in computing technology that further advanced the field, as complex algorithms could be calculated in the blink of eye. The field flourished during the dotcom boom and bust, as quants largely avoided the frenzy of the tech bust and market crash. While they stumbled in the Great Recession, quant strategies remain in use today, and have gained notable attention for their role in high-frequency trading (HFT) that relies on math to make trading decisions. Quantitative investing is also widely practiced both as a stand-alone discipline and in conjunction with traditional qualitative analysis for both return enhancement and risk mitigation.
Data, Data Everywhere
The rise of the computer era made it possible to crunch enormous volumes of data in extraordinarily short periods of time. This has led to increasingly complex quantitative trading strategies, as traders seek to identify consistent patterns, model those patterns and use them to predict price movements in securities.
The quants implement their strategies using publicly available data. The identification of patterns enables them to set up automatic triggers to buy or sell securities. For example, a trading strategy based on trading volume patterns may have identified a correlation between trading volume and prices. If, for example, the trading volume on a particular stock rises when the stock’s price hits $25 per share and drops when the price hits $30, a quant might set up an automatic buy at $25.50 and automatic sell at $29.50. Similar strategies can be based on earnings, earnings forecasts, earnings surprises and host of other factors. In each case, pure quant traders don’t care about the company’s sales prospects, management team, product quality or any other aspect of its business. They are placing their orders to buy and sell based strictly on the numbers accounted for in the patterns they have identified.
Quantitative analysis can be used to identify patterns that may lend themselves to profitable security trades, but that isn’t its only value.
While making money is a goal every investor can understand, quantitative analysis can also be used to reduce risk. The pursuit of so called “risk-adjusted returns” involves comparing risk measures such as alpha, beta, r-squared, standard deviation and the Sharpe ratio in order to identify the investment that will deliver the highest level of return for given level of risk. The idea is that investors should take no more risk than is necessary to achieve their targeted level of return. So, if the data reveals that two investments are likely to generate similar returns but that one will be significantly more volatile in terms of up and down price swings, the quants (and common sense) would recommend the less risky investment. Again, the quants do not care about who manages the investment, what its balance sheet looks like, what product helps it earn money or any other qualitative factor. They focus entirely on the numbers, and choose the investment that (mathematically speaking) offers the lowest level of risk.
Risk-parity portfolios are an example of quant-based strategies in action. The basic concept involves making asset allocation decisions based on market volatility. When volatility declines, the level of risk taking in the portfolio goes up. When volatility increases, the level of risking taking in the portfolio goes down. To make the example a little more realistic, consider a portfolio that divides its assets between cash and an S&P 500 index fund. Using the Chicago Board Options Exchange Volatility Index (VIX) as a proxy for stock market volatility, when volatility rises, our hypothetical portfolio would shift its assets toward cash. When volatility declines, our portfolio would shift assets to the S&P 500 index fund. Models can be significantly more complex than the one we reference here, perhaps including stocks, bonds, commodities, currencies, and other investments, but the concept remains the same.
Quant trading is a dispassionate decision making process. The patterns and numbers are all that matter. It is an effective buy/sell discipline, as can be executed consistently, unhindered by the emotion that is often associated with financial decisions.
It is also a cost-effective strategy. Since computers do the work, firms that rely on quant strategies do not need to hire large, expensive teams of analysts and portfolio managers. Nor do they need to travel around the country or the world inspecting companies and meeting with management in order to assess potential investments. They simply use computers to analyze the data and execute the trades.
“Lies, damn lies and statistics” is a quote often used to describe the myriad of ways in data can be manipulated. While quantitative analysts seek to identify patterns, the process is by no means fool-proof. The analysis involves culling through vast amounts of data. Choosing the right data is by no means a guarantee, just as patterns that appear to suggest certain outcomes may work perfectly until they don’t. Even when a pattern appears to work, validating the patterns can be a challenge. As every investor knows, there are no sure bets.
Inflection points, such as the stock market downturn of 2008/2009, can be tough on these strategies, as patterns can change suddenly. It’s also important to remember that data doesn’t always tell the whole story. Humans can see a scandal or management change as it is developing, while a purely mathematical approach cannot necessarily do so. Also, a strategy becomes less effective as an increasing number of investors attempt to employ it. So, even patterns that work will become less effective as more and more investors try to profit from it.
The Bottom Line
Many investment strategies use a blend of both quantitative and qualitative strategies. They use quant strategies to identify potential investments and then use qualitative analysis to take their research efforts to the next level in identifying the final investment. They may also use qualitative insight to select investments and quant data for risk management. While both quantitative and qualitative investment strategies have their proponents and their critics, the strategies do not need to be mutually exclusive. | <urn:uuid:55699c6a-b78a-4ccf-92b0-52e40c5c6969> | {
"dump": "CC-MAIN-2016-26",
"url": "http://www.investopedia.com/articles/investing/041114/simple-overview-quantitative-analysis.asp",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402516.86/warc/CC-MAIN-20160624155002-00098-ip-10-164-35-72.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9442161321640015,
"token_count": 1508,
"score": 2.609375,
"int_score": 3
} |
Control Panels for the Food & Beverage Industry
By Garrod Massey
As a control panel shop, we create industry specific panels for a variety of major markets including food and beverage, water and wastewater, life sciences, industrial, oil and gas, packaging and more. These panels can look very different from one another and serve different functions within those markets, but their insides are far from different. Similar to humans and other mammals: vastly different exteriors, with basically the same interior parts and functionality. In this series, we’ll review how these common components of control panels differ by industry. First up, let’s explore the uses of control panels within the food and beverage industry.
Food and Beverage Control Panel Usage
Control panels for the food and beverage industry tend to be one of two things: machinery control panels or conveying control panels. In this industry, machines are used to both create the vessels that will hold the food or beverage product and to fill that vessel with the product.
Machinery control panels operate the machines that help construct or fill those vessels whereas the conveying control panels operate the equipment that transports the vessel between machines to be built, labeled, filled, sealed and packaged for shipping.
Machinery Control Panels for the Food and Beverage Industry
Machinery control panels are generally pretty small as they are specific to and attached to a single machine. Machines in this industry are primarily making the vessel that houses the food or beverage, be that a can, jar, bottle, box, etc.
Dependent on what form the final vessel takes, there are generally between 10 and 20 machines needed to take a can from a giant roll of aluminum to a finished container, ready to be filled with product. For the most part, each machine will only do one specific function. Machine control panels are typically around 48” x 36” in size and they require lots of layers of safety since they have many moving parts that can cause injury to its operator.
These panels generally consist of terminals, circuit protection, programmable logic controllers (PLC), communication equipment, safety relays, motor or servo controllers, pushbuttons, selector switches, and a human-machine interface (HMI). Usually, there will be several auxiliary panels mounted on and around the machines with emergency-stop (estop) buttons for added user safety.
Conveying Control Panels for the Food and Beverage Industry
Conveying control are generally pretty large as they are specific to moving the can from machine to machine. Conveyors in this industry come in all shapes and sizes. There can be several hundred to several thousands of feet of conveyor in a food and beverage facility. To maximize plant efficiency throughout, conveyors must be able to transfer a large amount of product very quickly from machine to machine. Since floor space is finite, conveying systems are able to move product horizontally, vertically, and even upside down. This versatility allows manufacturers to build up instead of out, if that’s what their plant space requires.
Each conveyor in a plant requires a control panel populated with terminals, circuit protection, PLCs, relays, motor controllers, pushbuttons, selectors switches and an HMI.These control panels are often four or five bay panels, meaning they have four to five doors and are typically 12-16’ wide. Some conveying control panels can be as large as eight bays.
A typical conveying panel also comes with 5-10 accessory panels set up 10 to 20 feet apart from one another. These accessory panels are all wired into the main control panel and are used to control the specific part of the line they are placed in front of. Often these are small push button stations or might be a touch screen on a moving swing arm.
E-stop buttons and motor disconnect panels are also placed along the line and wired into the main control panel to provide operators a quick and easy option to shutdown the machine if there is a safety or production concern.
Conveyors in the food and beverage industry often have a variety of monitoring systems to help determine that everything is running appropriately between the machines. These monitoring systems are typically proxes, cameras or lasers that can identify when items are passing certain checkpoints, the frequency at which they’re passing and even perform quality checks. These systems help operators know if a facility is operating at capacity.
Similar technology is also often deployed as a light curtain that will automatically shut off all or a portion of a line if someone gets within a range or enters into an area deemed unsafe to be in while the conveyors are operating.
All of these monitoring systems also get programmed into the control panels we build so all the systems within the facility work together.
In the food and beverage industry, every plant is different because of the difference in the physical space these machines and conveyors are housed in. Though each food and beverage control panel has mostly the same components, the layout and demands of an individual plant can drastically change how we configure the components to work together to meet the customer’s needs. | <urn:uuid:892a3d5b-c6a5-47de-83c5-3756dc3d2fc3> | {
"dump": "CC-MAIN-2019-26",
"url": "https://www.ucec.com/news/foodandbeveragecontrolpanels",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560628000231.40/warc/CC-MAIN-20190626073946-20190626095946-00103.warc.gz",
"language": "en",
"language_score": 0.952350378036499,
"token_count": 1040,
"score": 2.640625,
"int_score": 3
} |
In the museum of the Florida Historical Society, at 7 West Forsyth Street, Jacksonville, there is an old bell of Spanish origin which is one of the very few existing relics of the missions established by the Roman Catholic church in colonial days throughout the territory now embraced by the State of Florida. The bell was cast of an alloy of tin, copper, and silver; it is eighteen inches in height, measures four feet around the base, and bears the inscription SANTA MARIA ORA PROBONIS, with the date ANO 1758, and a raised cross composed of twenty-four eight-pointed stars. It is a remarkably well-preserved specimen of Spanish workmanship.
Williams, Emma Rochelle
"The Society's Relics - I. The Bell of a Florida Spanish Mission,"
Florida Historical Quarterly: Vol. 5:
3, Article 8.
Available at: https://stars.library.ucf.edu/fhq/vol5/iss3/8 | <urn:uuid:d910aadd-6c2b-4bf2-85dd-d91f759884db> | {
"dump": "CC-MAIN-2023-50",
"url": "https://stars.library.ucf.edu/fhq/vol5/iss3/8/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679511159.96/warc/CC-MAIN-20231211112008-20231211142008-00534.warc.gz",
"language": "en",
"language_score": 0.9346843361854553,
"token_count": 204,
"score": 2.71875,
"int_score": 3
} |
Smart coatings are structured coating systems that provide an optimum response to some external stimulus. They react to outside conditions, such as temperature, stress, strain or the environment, in a selective way.
Smart windows are an excellent example of a smart coating behaviour. The panes of glass in the window are coated with a thermochromic material, whose heat reflectivity changes with the temperature of the glass. Thus the window can switch from heat adsorption to heat reflection depending on the ambient temperature. Coating glass with a compound such as V1-xNbx02 permits the metal insulator transition to be varied from 64°C down to -4°C by adding up to 7at% niobium, figure 1. Above this transition temperature, the coating is able to reflect infrared radiation from the sun, thus ensuring that the inside of a commercial building does not overheat in the summer, as an application example. In winter however, the coating transmits infrared, ensuring good thermal efficiency.
Figure 1. Thermochromic coatings can be used to design smart windows (top) due to the variation of metal-insulator transition temperature with x in V1-xNbx02 (bottom).
Another example of smart coatings is a family of wavelength selective coatings that have been used to manufacture ‘heat mirrors’ (figure 1, bottom). A transparent coverplate is coated with either indium-tin-oxide (ITO) or a multilayer TiO2-Ag-TiO2 coating. Both coatings have a high transmission for the predominant wavelengths in sunlight. A 0.3µm ITO coating on glass provides in excess of 80% transmission for wavelengths of 0.4-1.1 µm. An 18nm layer thickness Ti02-Ag-TiO2 multilayer coating has a narrow transmission band of 0.3-0.65µm, but is more efficient at reflecting longer wavelength infrared radiation. Greater than 95% of wavelengths are reflected, compared with 70% at a 2µm wavelength for the ITO coating. By combining such a coated cover plate with a heat absorber it is possible to retain the heat, limiting re-radiation at higher wavelengths.
It should be possible through a combination of these two concepts to produce smart windows that would reflect solar energy in summer, but transmit solar energy in winter, whilst limiting the re-radiation of low grade, long wavelength heat. For a double glazed window this would be possible by coating the outer pane with the vanadium niobate coating, whilst coating the inner pane with indium-tin oxide or the multilayer Ti02-Ag-Ti02 coating.
These two examples illustrate some of the basic concepts of smart coatings. The coatings are not smart in themselves, and they have no built in intelligence as is possible when designing active smart systems consisting of microsensors, a microprocessor and a microactuator, which provide a preprogrammed response. Their smart behaviour results from the scientific combination of intrinsic coating properties. Smartness, as a property, rests with the coating designer. It is through clever coating design that ‘smart coatings’ can adapt to the requirements of their surroundings.
Functionally Graded Materials
In the areas of corrosion and wear resistance, functionally graded materials can be used to fabricate smart, environmentally tolerant coatings. Functionally graded materials acknowledge that different properties are often required at component surfaces or interfaces to those required in the bulk of the component. This can only ideally be achieved through the selection of alternative surfacing or interface materials. However, the choice of a new surface alloy adds further interfaces that again can be optimised. The net result is a multilayered, or continuously graded surface treatment that offers optimised performance. This use of functionally graded structures to provide smart coating concepts is best illustrated by example.
There are many applications where materials are exposed to a combination of corrosion and wear. Due to changes in the local environmental conditions, different degradation mechanisms may occur across the surface of the component and as a function of time. Therefore, no single coating of uniform composition and structure can offer an optimum solution. There will inevitably have to be compromise to resist the range of environmental conditions. The coating of a twin screw extruder barrel used in the food processing industry is an excellent example of variable wear/corrosion conditions because the degradation mechanisms operating on the extruder barrel are invariably dependent on the product, ingredients and relevant process parameters being used. Degradation mechanisms may include corrosion, surface fatigue, abrasive and adhesive wear, with the magnitude of these processes changing both along the length and around the barrel profile, figure 2. To combat this complex attack, a structured coating has been designed, through collaboration between Cranfield University and APV Baker. The coating has been produced by powder metallurgy and HIP, with the structure and composition varying both through the coating thickness and laterally, to accommodate the localised environmental conditions. The outer layer contains tungsten carbide and various chromium carbides in a nickel-chromium alloy matrix. By varying the proportions of tungsten carbide, chromium carbide and the local composition of the nickel-chromium matrix, it is possible to engineer the desired wear and corrosion resistance. The graded inner zone ensures compatibility with the steel substrate.
Figure 2. Typical degradation mechanisms within a twin-screw extruder.
Smart Overlay Coatings
A final example examines the manufacture of smart overlay coatings for industrial gas turbines. This is a newly funded programme under the Link surface engineering initiative, involving Cranfield University, Birmingham University and a consortium of British industry led by Diffusion Alloy Ltd. The concept is the development of functionally graded coatings, using a combination of plasma spraying and chemical vapour deposition (CVD), that can adaptively respond to the mode of corrosion attack within the industrial gas turbine. This is achieved by designing a graded coating system that forms alumina scales for high temperature protection (900-1200°C), but chromia and/or silica scales to combat type II hot corrosion at lower temperatures (650-800°C). It is the mode of corrosion attack, plus the graded coating structure, that permits this adaptive response.
A corrosion map constructed at 750°C, showed that the optimal design required that the coating composition profiles vary through the coating to provide alloys that grow stable alumina scales at the coating surface. Beneath these the composition changes to alloys more resistant to type II corrosion. It is the mode of type 11 corrosion attack that permits this functionally graded coating to exhibit smart concepts.
The use of smart coating concepts in three industrial sectors, as diverse as architectural windows, food processing and industrial gas turbines, has been illustrated. These are not the only examples. The intelligent combination of materials and novel coating processing technologies is being used to manufacture numerous coating systems that embody smart concepts. Multilayer metal-ceramic structures can be devised to provide optimum wear and erosion resistance. The layer thicknesses are engineered such that the ceramic layers do not fracture and the metal layers provide enhanced toughness. New thermal barrier coatings are under development with nano-engineered structures that provide well controlled thermal conductivities, plus strain tolerance. Active and passive sensors and actuators are being manufactured using nano-engineering in conjunction with coating technology.
In the scientific literature there are many materials that offer ‘smart properties’. Such materials require a change in property that can be easily stimulated by changes in the local environment, such as temperature, stress, strain or chemical potential. A few examples include metal-insulator transitions, thermochromic materials, non-linear dielectrics, piezoelectric materials, ferroelectric materials, martensitic phase transition, shape memory alloys, and the use of reversible hydride formation for heat/energy storage. These are but a few examples. Their use in smart coatings requires that only a social or commercial need be identified. | <urn:uuid:334a938e-7dc9-4bf6-ac32-d2fd2d443592> | {
"dump": "CC-MAIN-2020-29",
"url": "https://www.azobuild.com/article.aspx?ArticleID=1382",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655888561.21/warc/CC-MAIN-20200705184325-20200705214325-00392.warc.gz",
"language": "en",
"language_score": 0.9136483073234558,
"token_count": 1640,
"score": 3.34375,
"int_score": 3
} |
Making Every Drop Count: Reducing Water Loss in the Middle East and North Africa Region
September 2, 2014
- The problem of water loss has become an even greater challenge for public utilities throughout the Middle East and North Africa region due to climate change, which threatens natural water supplies and increases the cost of new water resources.
- Malta, with one of the world’s highest population density and lowest renewable water supplies, switched from building more desalination plants to meet rising demand to a more effective strategy focused on water loss.
- The World Bank organized a conference that brought representatives from 30 regional utilities to Malta, to learn how the island implemented its successful campaign to lower water loss.
Water loss, and its operational and financial consequences, is a major concern for urban water utilities in the Mediterranean region. Losses, both physical and commercial, are due to leakages and the failure to bill customers for the full amount of water they use. A combination of these two factors puts the financial viability of water utilities at risk.
In countries already coping with water scarcity, the burden of water loss often leads to rationing and intermittent supply. As climate change exacerbates the problem—threatening the supply of renewable water and increasing the cost of new water resources—reducing losses from leaky pipes and under-billing, is becoming a priority for water utilities in the Mediterranean and throughout the Middle East and North Africa (MENA) region.
Malta, situated at the very center of the Mediterranean, provides a remarkable illustration of how major water resources challenges can be successfully overcome. The island has one of the lowest rates of renewable water supplies in the MENA region, at 100 m3 per capita per year. It also stands in the top ten countries with the highest population density, alongside Gaza, Bahrain, Hong Kong and Singapore.
Several decades ago, Malta became one of the first countries in the region to invest in desalination plants but, in the 1990s, as new plants were being built to meet increasing demand, it became clear that demand for water was fast outstripping its supply.
The Water Services Corporation (WSC), Malta’s national water utility, turned its attention to water loss instead, initiating an aggressive program that achieved significant results. In addition to state-of-the-art concepts and technology for monitoring and reducing leakages, the WSC also put in place a program to optimize energy consumption at its desalination plants, reducing average energy consumption from 6-7 to 4.5 kWh/m3.
The success of the program allowed the WSC to decommission two desalination plants and reduce the level of water extraction from the island’s aquifer to levels not seen since the 1960s.
The success of the program allowed the WSC to de commission two desalination plants and reduce the level of water extraction from the island’s aquifer to levels not seen since the 1960s. The leakage in the water distribution network “was around 4000m3/hr in 1995, yet [has] decreased to below 450m3/hr today”, according to Stephan Riolo, executive director of the network’s infrastructure in Malta.
Malta clearly had lessons to share in reducing water losses and operating desalination plants. As part of their program of support for MENA countries, the World Bank therefore organized a conference on the small Mediterranean island that brought together 30 senior officials from major water utilities in Morocco, Tunisia, Libya, Lebanon, the Palestinian Territories and Yemen.
All the countries that participated are facing similar problems and have keen interest in reducing losses and improving the management of their water supply. Most said that in their experience, however, reducing water losses had proved difficult and complex. Malta’s case was particularly valuable as it shows that countries can achieve successful water loss reduction, as long as it is part of a comprehensive, well-designed program.
The WSC had applied a structured approach based on four pillars: (i) the acknowledgement of the many components of water loss and the interaction between them, (ii) the need to take into consideration, when setting targets, the economically acceptable level of non-revenue water (water supplied but not billed for), (iii) the need to move away from short-term interventions, and (iv) the recognition that water loss lies at the core of assets management.
Participants agreed that replicating the WSC’s success in other MENA countries would require a similarly structured approach, based on long-term strategic planning. This would have to include the following phases: (i) a careful diagnosis of the water loss situation, identifying activities that would generate the largest savings, and setting realistic targets, (ii) a comprehensive program of intervention covering all relevant aspects of water loss (as opposed to “one shot” actions), and (iii) institutional reforms to establish the right framework for maintaining the utility’s economic performance.
There was great interest from all participants to move forward with specific technical assistance, with the WSC transferring its knowledge through peer-to-peer exchanges and a twinning approach. It was agreed that twinning activities between the WSC, Tunisia’s SONEDE utility, and utilities in Gaza, would be supported, in part through a grant from the Center Mediterranean Integration.
Other participants, such as Morocco’s ONEE, Northern Lebanon’s water establishment, and utilities from Sana’a and Aden, also expressed their interest in exchanges with the WSC. Based on this, a comprehensive twinning program between the WSC and MENA utilities will be finalized in the next few months, so as to start exchanges in the field before the end of 2014.
- Development Partners Support the Creation of Global Financing Facility to Advance Women’s and Children’s Health
- 73 Countries and Over 1,000 Businesses Speak Out in Support of a Price on Carbon
- World Bank Group to Nearly Double Funding in Ebola Crisis to $400 Million
- International Food Prices Hit Four-Year Low
- Speech by World Bank Group President Jim Yong Kim at Howard University: “Boosting Shared Prosperity” | <urn:uuid:d04f5de1-a6ef-4396-ae6b-5d5810d55b6a> | {
"dump": "CC-MAIN-2014-49",
"url": "http://www.worldbank.org/en/news/feature/2014/09/02/making-every-drop-count-reducing-water-loss-in-the-middle-east-and-north-africa-region",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931008105.47/warc/CC-MAIN-20141125155648-00130-ip-10-235-23-156.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9528687000274658,
"token_count": 1269,
"score": 3.328125,
"int_score": 3
} |
We Saw in my previous blog that the first idea for Statistical Machine Translation was introduced by Warren Weaver as far back as 1947. As with many innovations, the idea was way ahead of the technological ability to make it happen. But with the growth of super powerful computers, the introduction of the Cloud as a repository for these super-computers, and the provision of these to LSPs at an affordable price permitted the theory of SMT as a solution from translation of languages to become commonplace.
But as with all technological breakthroughs, once the tipping point is reached things grow exponentially. While SMT could provide a translation model – albeit in a limited capacity – scientist began to look at the next iteration of machine translation – Neural Machine Translation.
A generic neural network is a real or virtual computer system that is designed to mirror the brain in its ability to “learn” to analyse bodies of complex data. Neural networks, particularly those with multiple hidden layers (hence the term ‘deep’ – the more layers, the deeper) are remarkably good at learning input->output mappings.
Such systems are composed of input nodes, hidden nodes, and output nodes that can be thought of as loosely analogous to biological neurons, albeit greatly simplified, and the connections between nodes can be thought of as in some way reflecting synapse connections between neurons in the human brain. As stated, the ‘deep’ element of the concept refers to a multi-layered processing network of neuron filters.
In the human process, instructions and information flows from the brain through neurons connected by synapses. In the machine translation equivalent artificial neurons are used to fine-tune and refine input data as it is passed through the translation ‘engine’ with a view to achieving a predicted output. In addition, the process called Deep Learning learns – as does the human brain – from experience and can adjust and remember processes accordingly. Consequently, the more an engine is used the more refined and powerful it becomes. The process becomes a life-long R&D development.
So, in translation, the language engine uses deep neural networks to essentially predict the next word in a sequence. The Neural Network is built using a bi-lingual corpus and is trained on full sentences. (These are referred to a sequences.) This is important, as NMT fully understands what a sentence is, whereas SMT only understands what a phrase is. This shift to training Neural Networks on sequences means that we eradicate almost all the syntactical and grammatical errors frequently found in SMT outputs.
For example, NMT systems make significantly fewer errors when compared to SMT systems:
(NOTE: every graph below 0 is the percentage decrease in error types for NMT systems compared to SMT systems.)
Therefore, NMT provides a demonstrable improvement in machine translation outputs, resolving many of the problems associated with the statistical machine translation (SMT) model. Effectively, in the last two years it has solved many of the translation shortcomings of the SMT system; deficiencies that SMT users have been trying to resolve for the last two decades. NMT-based R&D has been moving with a speed far out-pacing the slow pace of SMT development.
Amazingly, Google managed to condense in to four years the development of its NMT solution. That compares with 15 years it spent on developing and refining statistical machine translation (SMT). This quantum leap in output quality for NMT systems is the result of being able to train the translation models on ‘sequences’ (i.e. full sentences) rather than words, and the use of deep learning to train and refine the neural networks on an ongoing basis.
So, a Neural Network is a mathematical model seeking to imitate how the human brain functions. Obviously, scientists can only do this in a modest way. The human brain consists of approximately 100 billion neurons, and these are highly connected to other neurons creating super-complex relationships. In a Neural Network a neuron is a ‘word’ within a sequence (sentence), and each word is highly connected to words within the same sequence creating a complex web of grammatical and syntactical relationships.
By creating these neutral models with lots of sequences, we can build up an elaborate network of word relationships. We can use this network to predict translations within the context of the training data used to build the translation model.
To determine if a model is good at predicting translations (relative to the training data), we use a mathematical number called Perplexity. We want to build networks with a Perplexity as low as possible. If we achieve this, we can predict good quality translations that contain fewer syntactical and grammatical errors when compared to SMT systems.
These highly efficient models can then provide fast and fluent translations, and at economically affordable prices. Today, over 90% of the daily traffic on the KantanMT platform is processed by our NMT services. Slator.com has reported that the number of LSPs now using NMT has quadrupled since 2018. This gives an indication of the high regard customers have for the efficacy of the NMT platform. The powers of deep learning, the availability of huge amounts of data and the ever-increasing processing power of computers makes it inevitable that this branch of artificial intelligence will be with us for the long haul.
One of the concomitant effects of the introduction and widespread use of viable machine translation solutions within LSPs is the inevitable re-organising of the translation process, and the realignment of existing jobs to fit with the newest technology trends. I will look at this in my next blog and try to predict how job roles might evolve over the coming years.
Aidan Collins, Marketing Manager at KantanMT. | <urn:uuid:408c06f6-c752-41dd-8759-054fb697200f> | {
"dump": "CC-MAIN-2021-17",
"url": "https://kantanmtblog.com/2019/04/09/a-short-introduction-to-the-neural-machine-translation-nmt-model/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038057142.4/warc/CC-MAIN-20210410134715-20210410164715-00460.warc.gz",
"language": "en",
"language_score": 0.9380539655685425,
"token_count": 1178,
"score": 3.171875,
"int_score": 3
} |
THE FOLLOWING WAS ON THE MSN WEBSITE 05/26/06 IN HEALTH NEWS!
FRIDAY, May 26 (HealthDay News) -- A new vaccine that can protect as many as 50 percent of older adults from developing shingles has been approved by the U.S. Food and Drug Administration.
The FDA on Thursday licensed Zostavax, the new vaccine made by Merck & Co., which significantly reduces the risk of shingles (herpes zoster) in people 60 years of age and older.
Shingles is caused by the varicella-zoster virus, the same virus that causes chickenpox. After someone has had chickenpox, the virus lies dormant in nerve tissue. As people get older, the virus can reappear in the form of shingles. It is estimated that shingles affects two in every 10 people in their lifetime.
Shingles appears as clusters of blisters that develop on one side of the body and can cause severe pain that may last for weeks, months or years.
"We believe this vaccine will help reduce the risk of shingles in individuals 60 years of age and older," said Dr. Jesse Goodman, director of the FDA's Center for Biologics Evaluation and Research, at a press conference Friday. "This is the only vaccine that reduces the risk or reactivation of varicella-zoster virus," he added.
The vaccine is unique, said Norman Baylor, director of the FDA's Office of Vaccines Research and Review at the Center for Biologics and Evaluation and Research. "We are seeing the benefit of vaccines to the adult population," he said.
The vaccine isn't designed to prevent new infections but rather to prevent the reemergence of an infection, Baylor said. "This vaccine does not prevent infection. It is essentially boosting an older person's immunity against the virus, in order to prevent the virus from emerging and causing shingles," he said.
"This vaccine will have a significant impact on what is an increasing and painful disease in an increasing elderly population," Baylor added.
The vaccine is not intended for people who have or have had shingles. "The vaccine will not treat shingles," Baylor said. "The whole idea of this vaccine is to prevent people from getting it."
The vaccine also isn't recommended for people whose immune systems are compromised, such as those with HIV/AIDS, or patients receiving immunosuppressant therapy, Baylor said.
One expert thinks every adult over 60 should get the vaccine.
"I am absolutely delighted that it got approved," said Dr. Donald Gilden, professor and chairman of the Department of Neurology at the University of Colorado Health Sciences Center. "It has been tested for 10 years and shown to reduce the incidence of shingles by 50 percent."
Since shingles affects about 1 million people in the United States each year, the vaccine could offer a significant benefit, Gilden said. "It's not going to wipe out shingles," he said, "but it will reduce the incidence of shingles very effectively."
Another expert agrees the vaccine can have a significant impact.
"This is a terrific advance, with major implications in preventing a serious, common, chronic pain condition," said Dr. Anne Louise Oaklander, the director of the Nerve Injury Unit at Massachusetts General Hospital and an associate professor of neurology at Harvard Medical School.
Oaklander said the vaccine offers great benefit with very little risk. "The benefits are potentially enormous," she said, "not only in lessening illness from shingles, but in preventing postherpetic neuralgia, a devastating pain condition that commonly develops in older shingles patients."
The National Institute of Allergy and Infectious Diseases can tell you more about shingles. | <urn:uuid:0e6a487b-28c8-4c61-9670-25192e7b52f7> | {
"dump": "CC-MAIN-2016-22",
"url": "http://s11.invisionfree.com/I_am_a_Survivor/ar/t255.htm",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049277592.65/warc/CC-MAIN-20160524002117-00049-ip-10-185-217-139.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9618284702301025,
"token_count": 794,
"score": 2.78125,
"int_score": 3
} |
Looking over a Neandertal's shoulder07 Jan 2012
A study by Di Vincenzo, Steven Churchill and Giorgio Manzi has fallen into the early drawer of the Journal of Human Evolution: “The Vindija Neanderthal scapular glenoid fossa: Comparative shape analysis suggests evo-devo changes among Neanderthals”
The glenoid fossa is the part of the scapula that articulates with the head of the humerus. It’s the base of the “socket” in the ball-and-socket joint of the shoulder – indeed, “glenoid” comes from the Greek word for “socket”. Roughly shaped like a rounded teardrop, the glenoid is narrower in early hominins and relatively broad in recent people. Neandertals have an intermediate form compared to earlier and later humans.
The main point of the study is that the Vindija glenoid specimen, Vi-209, has a more humanlike form than other Neandertals. Another conclusion based on the comparative sample is that the sample of glenoids from late Neandertals is intermediate between early Neandertals and recent people. Likewise, Upper Paleolithic and Mesolithic-era European specimens are intermediate between late Neandertals and recent people. Here’s a graph with the first and second principal components of the variation; I’ve highlighted these groups.
Therefore, it seems reasonable that heterochronic factors related to the prolonged developmental pattern of our species (Smith et al., 2007a), which contrasts with the faster growth rates of Neanderthals and other archaic hominins (Smith et al., 2007b; but see; Guatelli-Steinberg et al., 2005), led to longer periods of bone deposition along the inferior-lateral edge of the SGF [scapular glenoid fossa]. This could explain the observed variation along PC1 (and/or CV1) for different morphs of the genus Homo, reaching in H. sapiens the greatest extent in width of the SGF and, particularly, of its scapular portion. This is also consistent with the observation by Churchill and Trinkaus (1990) that much of the variability of the glenoid surface is a function of size variation of the joint itself, which can be viewed as forming a single functional matrix sensu Moss and Young (1960). Thus, the overall reduction in developmental rates in the genus Homo (relative to those of other hominoids) across the Pleistocene may account for the general evolutionary trend in SGF shape seen in the fossils, with more marked changes in developmental rates between archaic (including Neanderthals) and early modern humans, producing somewhat more dramatic differences between these groups in joint shape. Green et al. (2010) suggest that some of the differences between Neanderthals and modern humans in shoulder and thoracic morphology (particularly those related to clavicular length) are attributable to differences in the RUNX2/CBFA1 gene. The temporal pattern observed here would suggest that, with respect to SGF shape at least, that some differences are due to overall differences in developmental schedules (rather than specific differences in genes controlling development of the shoulder, such as RUNX2/CBFA1 or HoxC6).By suggesting at least one actual genetic substitution in recent humans, they lend some plausibility to the idea. I am more hesitant to accept the assumption that Neandertals had faster developmental schedules than recent people, although it could be true. This specific assumption is not necessary to support the idea of heterochronic change in the glenoid, which could be caused by much more focused developmental processes. If glenoid shape reflects heterochronic developmental changes, the data suggest that those changes were ongoing in global populations during the Holocene. Indeed, the difference between recent people in the study and Upper Paleolithic Europeans is as great as the difference between late Neandertals and Upper Paleolithic Europeans. The study's recent human sample covers a broad geographic distribution but is relatively small in numbers; a fuller comparison of recent people might uncover a more interesting pattern of change. The scapula has long figured in discussions of Neandertal genetic persistence. Neandertal scapulae often have a sulcus (groove) on the dorsal (back) aspect of the axillary border, and this feature is also found in a high fraction of early Upper Paleolithic skeletons
The morphology of the SGF [scapular glenoid fossa] is unlikely to be under the genetic control of a single locus. Thus, it is more likely that regulatory genes controlling developmental rates overall produce pleiotropic effects throughout the skeleton. The introduction of these and other (non-regulatory) alleles into the Neanderthal populations of the Near East, and their movement by gene flow across Neanderthal demes into southern Europe (well in advance of the actual in-migration of modern humans) could account for mosaic morphology seen in the Vindija G3 Neanderthals, including the Vi-209 scapula. Introgression and subsequent gene flow would not be expected to have affected early Neanderthal populations (those predating the admixture), nor late Neanderthal populations from western (trans-Alpine) Europe, because they were separated by geographic barriers ( [Fabre et al., 2009] and [Degioanni et al., 2011] ), and/or protected from gene flow by distance (as hypothesized by Voisin, 2006).There is as yet no evidence that the Vindija Neandertal genomes have genetic introgression from the African populations from which present non-Africans derive most of their genetic heritage. Green and colleagues
Fabio Di Vincenzo and colleagues analyzed the shape of the outline of the glenoid fossa on the scapula (not to be confused with the glenoid on your skull), from Australopithecus africanus to present day humans. The glenoid fossa is essentially the socket in the ball-and-socket joint of your shoulder. The authors found that there is pretty much a single trend of glenoid shape change from Australopithecus through the evolution of the genus Homo: from the fairly narrow joint in Australopithecus africanus and A. sediba, to the relatively wide joint in recent humans. The overall size and shape of the joint influences/reflects shoulder mobility, so presumably this shape change hints that more front-to-back arm motions became more important through the course of human evolution (authors suggest throwing in humans from the Late Pleistocene onward).I think Cofran takes this in an interesting direction with respect to his own dissertation work on development in earlier hominins. | <urn:uuid:3f752937-71b9-4e65-a734-7946f0205b17> | {
"dump": "CC-MAIN-2017-17",
"url": "http://johnhawks.net/weblog/fossils/neandertals/croatia/vindija-209-glenoid-di-vincenzo-2012.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121267.21/warc/CC-MAIN-20170423031201-00517-ip-10-145-167-34.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9326169490814209,
"token_count": 1412,
"score": 3.234375,
"int_score": 3
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.