text
stringlengths
199
648k
id
stringlengths
47
47
dump
stringclasses
1 value
url
stringlengths
14
419
file_path
stringlengths
139
140
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
50
235k
score
float64
2.52
5.34
int_score
int64
3
5
boake at utkvx.utk.edu Mon Apr 17 16:57:00 EST 1995 In article <3mpu6i$emp at lastactionhero.rs.itd.umich.edu>, David Marshall <dmarshal at umich.edu> writes... Selection is a *general* principle applicable >to any level of biological organization . > Natural selection can occur at all of these levels, but it is >generally accepted that traits are most often explained by selection >at the level of the "individual" organism (thus the phrase "selection >is generally strongest at the level of the individual"). What you have said is OK, but please keep in mind that the original and other subsequent posts were about "adaptation." Adaptation arises as a result of the combined effects of selection and inheritance (genetics). Adaptation is not the same as selection. To the original poster: Don't confuse physiological adapation with evolutionary adaptation. The physiological kind can happen at the level of the individual. The evolutionary kind is not defined at the level of the individual. It might be better to think of evolutionary adaptation of a _trait_; individuals display traits, but evolution requires more than one generation, and thus more than one individual. More information about the Mol-evol
<urn:uuid:ff8576d9-1276-43c7-a76d-e1eec77a4d83>
CC-MAIN-2016-26
http://www.bio.net/bionet/mm/mol-evol/1995-April/002644.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398873.39/warc/CC-MAIN-20160624154958-00016-ip-10-164-35-72.ec2.internal.warc.gz
en
0.886333
288
2.875
3
C Pattern Programs Free : An app for the programming beginners. App contain C codes for generating different patterns (e.g. ASCII arts, pyramid, waves etc.), many other C programs and useful study stuff related to C programming. This app is very helpful for understanding how loops can be used to generate different ASCII art patterns & also for other basic concepts of C with the help of programs. App Features : > Pattern printing programs including : • Symbol patterns • Number patterns • Character patterns • Wave-style patterns > Other useful C programs including : • General utility programs • Conversion (binary to decimal etc.) programs • Matrix programs • Sorting & Searching programs • Data Structure & Algorithms programs • Basic programs > Study stuff • Short introduction to C language. • Comparison of C with other languages. • C operator precedence table. • One liner definitions : general programming terms. > Pattern category filter > Program search Tags: pattern programs
<urn:uuid:fc67704f-2ed2-4c22-9885-2ccbe153da6d>
CC-MAIN-2016-26
http://www.appszoom.com/android_applications/education/c-pattern-programs-free_gdquf.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396959.83/warc/CC-MAIN-20160624154956-00194-ip-10-164-35-72.ec2.internal.warc.gz
en
0.761846
209
2.625
3
TABLE OF CONTENTS A Guide to the Douglas (Stephen Arnold) Collection, 1841 Attorney and Democratic politician Stephen Arnold Douglas (1813-1861) was born in Brandon, Vermont, to Stephen Arnold Douglas and Sarah Fisk. In 1833, he moved to Jacksonville, Illinois, where he studied law and was appointed State Attorney for Morgan County a year later. Douglas was elected to the Illinois State Legislature and became an associate justice of the Illinois Supreme Court in 1841. A year later, he was elected to the U.S. House of Representatives and to the U.S. Senate in 1852. Following a famous contest with Abraham Lincoln, Douglas was reelected in 1858. His adherence to democratic principles influenced his work on the Compromise of 1850 and the Kansas-Nebraska Act. In 1860, Douglas won the Democratic nomination for the U.S. presidency, but lost the election to Republican nominee Abraham Lincoln. Source: “Douglas, Stephen Arnold.” Biographical Directory of the United States Congress. Accessed August 5, 2011. http://bioguide.congress.gov/scripts/biodisplay.pl?index=D000457. The Stephen Arnold Douglas Collection, 1841, consists of a May 1841 legal sworn statement declaring the residence of a defendant in De Witt County, Illinois. This collection is open for research use. Stephen Arnold Douglas Collection, 1841, Dolph Briscoe Center for American History, University of Texas at Austin. This collection was processed by Evan Usler, August 2011.
<urn:uuid:762d18b5-3b4e-4809-9075-43b8e1779d47>
CC-MAIN-2016-26
http://www.lib.utexas.edu/taro/utcah/03043/cah-03043.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397864.87/warc/CC-MAIN-20160624154957-00072-ip-10-164-35-72.ec2.internal.warc.gz
en
0.942356
325
2.640625
3
Project Home Page Surname DNA testing is the newest tool available to genealogists! - Surname tests allow genealogists to verify their father's father's father's (etc.) paternal ancestry. - Surname DNA information can be very powerful when combined with traditional paper trails. The following Surnames are currently included in this project: Gaudet, Gaudette, Godet The Gaudet DNA Project is open to all Gaudet families, of all spelling variations, and from all locations. Accompanying this project is the Gaudet Genealogy web site (http://arslanmb.org/gaudet/gaudet.html), which focuses on the family of Jehan (Jean) Gaudet, who was born in France about 1575 and immigrated to the French colony of Acadia (now Nova Scotia and New Brunswick) in the early 1600s. He is the direct ancestor of most of today’s Gaudet and Gaudette families in Canada and the USA. He is believed (by some researchers) to have been born in Martaize, Poitou, France, but this has not been confirmed by documentary sources. One key goal of this project is to establish strong genetic evidence linking Jehan Gaudet to a known Gaudet family in France whose “paper trail” to the 1500s is well established. Another goal is to determine what unique Y-DNA markers (STR, or short tandem repeat, mutations) are associated with each of the Acadian/Canadian/USA branches of Jehan Gaudet’s descendants. Achieving this latter goal will require a good number of samples across the various branches, but will create a baseline to which a present-day Gaudet descendant can compare his own Y-DNA to determine where he fits in Jehan Gaudet’s family (to complement research with historical records). At this point, four Gaudet descendants have joined the project. A good paper trail links three of them back to Jehan Gaudet of Acadia. The fourth project participant (FTDNA IDs N12125 & 129804) can trace his lineage back to an Acadian exile who settled in Louisiana in the 1760s. We believe strongly that this branch is also descended from Jehan Gaudet of Acadia, but we don’t yet know exactly how they connect. Once we get wider participation in the project (more samples) from other Jehan Gaudet descendants, we will likely be able to place this Louisiana branch (that of IDs N12125/129804) in the Jehan Gaudet descendants tree based on the unique set of STR markers exhibited by this sample. DNA test results show that Jehan Gaudet falls within the haplogroup G (more specifically, G2a2b2a1b1a1a, also known as G-L42). Haplogroups show how all humanity is related from an ancient perspective, while haplotypes are useful from a more recent (historical) genealogical standpoint to establish family relationships. There is a G Haplogroup DNA Project (https://www.familytreedna.com/public/G-YDNA/) that Gaudet DNA Project participants are encouraged to join in order to help establish where Jehan Gaudet’s ancient paternal lineage originated (before France even existed). For those who know nothing about ancestry through DNA, the following simple and easy-to-understand animated tutorials are very useful (copyright © 2009 SMGF): - Introduction to Molecular Genealogy - Y-Chromosome DNA (Y-DNA) - Mitochondrial DNA (mtDNA) Mutations, haplotypes and haplogroups To learn more about DNA, visit the web site of the Sorenson Molecular Genealogy Foundation and read all of the sections under "Y-Chromosome DNA," and "Mitochondrial DNA." To learn about mtDNA in even more detail, visit the Genebase web site for a presentation of "The mtDNA and it's role in ancestry." Last but not least, you can find answers to many of your questions on the following Family Tree DNA pages: "Types of Tests" / "Test Results - Y-DNA" / "Test Results - mtDNA" / "FAQ - Frequently Asked Questions" This Gaudet DNA Project was started to: - Help researchers from common or related families work together to find their shared heritage. - Identify how the participant's families are connected, both genetically and through paper trails. - Identify and confirm genetic lineages of ancestral families. - Ultimately catalog pedigrees and genetic connections of all of the known project families. Participating in a Surname DNA Project provides: - The participant's genetic DNA, which is very close (and sometimes identical) to his earliest known ancestor. - The participant's "deep" ancestry (Haplogroup), which identifies the paternal ancestor's prehistoric origins. - A sense of camaraderie, which is particularly strong for those who share a genetic ancestry - Stimulation to family research and renewed sharing of information - A wider sense of identity and relationship, as we begin to realize how much we are a World Family. - A chance to compare your genetic ancestry with those of your Surname and the spelling variations - Your genetic matches who do not share your common surname - The knowledge to understand our ancestors better - particularly where the records have been lost Click here to order a DNA test in the Gaudet project.
<urn:uuid:f9869d60-ab17-4a1d-aeca-ce901bec400a>
CC-MAIN-2016-26
http://www.worldfamilies.net/surnames/Gaudet/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396106.71/warc/CC-MAIN-20160624154956-00052-ip-10-164-35-72.ec2.internal.warc.gz
en
0.936189
1,172
2.734375
3
Eurossiya: Genesis of an Empire from the Atlantic to the PacificPosted on the 29 May 2012 by Window On Heartland @WindowHeartland The idea of a continental bloc stretching from the Atlantic to the Pacific Ocean is not new. During his stay in Japan, between 1908 and 1912, the father of German geopolitics Karl Haushofer for the first time envisioned a transcontinental bloc from the Rhine to Yangtze, advocating a triple German-Russian-Japanese alliance that became known as the Eurasian Bloc. The signing of the Molotov-Ribbentrop pact on August 23, 1939 and the neutrality agreement between the Soviet Union and Japan in April 1941 seemed to have created the conditions for the establishing of that alliance, since there were discussions about a possible Soviet adhesion to the Tripartite Pact. Nevertheless, the idea of a continental bloc of Germany, Italy, Japan and the Soviet Union that would oppose Britain and the United States soon failed due Hitler’s racial prejudices: contrary to the russophile and eurasist German thinkers, such as Haushofer and Arthur Moeller van den Bruck, the Führer saw in the Soviet Union Germany’s main enemy, thereby giving the Anglo-Saxon Powers a chance to eventually invade Europe and put an end to the Third Reich. After the war, a Belgian veteran of the Waffen-SS, Jean Thiriart, called for the creation of a unified Europe, politically independent from both the United States and the Soviet Union. Nevertheless, when Washington approached Beijing in the 1970s, the ideologist of the European national communitarianism suggested a Euro-Soviet alliance against the Sino-American axis, in order to build a “very large Europe from Reykjavik to Vladivostok,” which he thought was the only way to resist the new American Carthage and billion-strong China. This is what led Thiriart to declare in 1984: “If Moscow wants to make Europe European, I preach total collaboration with the Soviet enterprise. I will then be the first to put a red star on my cap. Soviet Europe, yes, without reservations.” THE EURO-SOVIET EMPIRE ENVISAGED BY THIRIART In the words of Thiriart: “Between Iceland and Vladivostok we can unite 800 million people (at least for the sake of keeping the balance with the 1,200 millions Chinese) and yet find in the Siberian soil all that is needed to satisfy energetic and strategic requirements. I affirm that, from the economic point of view, Siberia is the province of the European empire most necessary to its viability. A great union of highly industrialized and technologically leading Western Europe with Siberian Europe, disposing of almost inexhaustible commodity reserves, will allow the creation of a most powerful republican Empire, with which nobody will but come to an agreement.” Thiriart died in 1992, but his basic ideas about the potentialities of a geopolitical alliance between Europe and Russia are shared by an increasing number of actors in the European political arena, partly as a result of Europe’s increasing dependence on Russian hydrocarbons. With the world’s largest reserves of mineral and energy resources, Russia is currently the world’s largest oil and the second largest gas producer. From its side, with a generated GDP of € 12,268,387 billion in 2010, the European Union is the largest and one of the most diversified economies in the world, accounting for one fifth of global trade. A deeper cooperation between Brussels and Moscow would therefore be beneficial in many areas, such as trade, energy and last, but not least, security. As the main successor of the Soviet Union, the Russian Federation possess, in fact, the largest stockpiles of weapons of mass destruction in the world, including more than 2,000 operational nuclear warheads, and can play a primary role in the fight against terrorism. Although many obstacles remain before a strategic partnership between the European Union as a whole and Russia can be established, the first results of increasing Euro-Russian cooperation have already been produced by the inauguration of the first line of the Nord Stream gas pipeline on November 8, 2011. And perhaps under the cold waters of the Baltic Sea lay not only the pipes of one of the world’s most secure gas pipelines in terms of environmental impact, but also the first geopolitical artery of a rising economic bloc stretching from the Iberian Peninsula to the Bering Sea: Eurossiya. These articles might interest you : According to Wikipedia, Pacific Heights is located in one of the most scenic and park-like settings in Northern California, offering panoramic views of the... Read moreBy Kaiser31083 After more than 2 years of planning and preparation, on December 5th Bertie and James finally made their way to the start of the Talisker Wisky Atlantic... Read moreBy Thevault TV & VIDEO Our rowers, that’s how it feels after having followed Bertie and James for almost a year in their preparation for the roughest rowing race in the world. Read moreBy Thevault TV & VIDEO After their boat Patience had been repaired, Bertie and James started their Atlantic challenge again and left the harbor of La Gomera for the second time on... Read moreBy Thevault TV & VIDEO The Facing the Atlantic boys may be celebrating Christmas this year in the middle of the Atlantic Ocean, but that doesn’t mean they won’t have the Christmas... Read moreBy Thevault TV & VIDEO The Moyer’s Mermaids Calendar 2012 and postcards in support of Facing The Atlantic/Facing The World is now available in the AllStephenMoyer Zazzle Shop for 50%... Read moreBy Thevault TV & VIDEO Through the eyes of three Marines, a long-term soldier, a cynical reporter, and a late enlistee we are given a window into the horrors of the the Pacific... Read moreBy Kaiser31083 MOST POPULAR FROM SOCIETY - Lessons learned from Cyclone Pam; Lambubu School on Malekula gets satellite internet by Dailydigester - Abbott & Costello Explain Unemployment by Adask - Remarkable insights on today’s headlines by Eowyn - VBS season, Child Conversion, and Baptisms by Elizabethprata MOST RECOMMENDED IN SOCIETY - EU Referendum by Nicholas Baines - Praise Young Girls For Being ‘Smart,’ Not ‘Pretty’ by Juliez - Jo Cox by Nicholas Baines - More Orlando gay-club shooting actors: 2 eyewitnesses and a medical examiner by Eowyn
<urn:uuid:330f3d0b-0114-48a5-9e43-cf311aa99752>
CC-MAIN-2016-26
http://en.paperblog.com/eurossiya-genesis-of-an-empire-from-the-atlantic-to-the-pacific-257371/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393463.1/warc/CC-MAIN-20160624154953-00147-ip-10-164-35-72.ec2.internal.warc.gz
en
0.927218
1,402
2.6875
3
Adenanthos sericeus subsp. sphalma - Woollybush Due to its soft silky foliage and orange/red flowers, Adenanthos sericeus is highly regarded and commonly grown as a garden ornamental. It has proved to be hardy in a variety of well-drained soils, plus will tolerate strong salt-laden winds. There are two subspecies, with this one (subsp. sphalma) only found to the east of Esperance at Cape Le Grand and with odd collections to the Israelite Bay region (just west of the Nullarbor). The other subspecies (subsp. sericeus) is from the Albany/ Stirling Range district, but with an odd collection also from Cape Le Grand. The main difference between them is the foliage, with subsp. sphalma having leaves to 3 cm (11/4”) in length (the leaves of subsp. sericeus are a little longer to more than 3 cm). The leaf divisions are mostly fewer with subsp. sphalma having only 6-15, whereas subsp. sericeus can vary from 6-50 divisions. Subsp. sericeus is also recorded growing to 5 metres (16’) in height, whilst subsp. sphalma rarely exceeds 2 metres (6’) in height. Adenanthos sericeus subsp. sphalma is very common in sandy soils, often forming extensive thickets on gently sloping ground overlying granite or gravel/rock/clay, with probable deep (light) seepage. The scarlet flowers can be found in bloom at most times of the year and are much favoured by honeyeating birds, plus the tiny, exclusively nectar eating Honey Possum, would also rely heavily upon them (see here).
<urn:uuid:2d5495d3-91ad-44d2-b12a-65e6c8be4475>
CC-MAIN-2016-26
http://esperancewildflowers.blogspot.com.au/2013/01/adenanthos-sericeus-subsp-sphalma.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396106.71/warc/CC-MAIN-20160624154956-00097-ip-10-164-35-72.ec2.internal.warc.gz
en
0.946746
380
2.671875
3
- Students were introduced to the investigation using a teacher created PowerPoint that utilized information from the Sheep in a Jeep lesson found in Chapter 14 of Picture-Perfect Science Lessons. (see Resources) - Students were read Sheep in a Jeep to jumpstart their thinking about the concepts of force and motion. Students were asked to give a "thumbs-up" when they think they heard an example of a force or a motion. - After reading the selection, a discussion was held to elaborate the main points of force and motion.(slide 4) Afterwards, using a T-Chart to guide student talk, students are asked to name examples of force and motion from the book. (slide 5) We evaluated the answers given or checked to see how we did. (slide 6)
<urn:uuid:f9b86217-4456-4a0e-995d-669d63852db6>
CC-MAIN-2016-26
http://my-ecoach.com/project.php?id=14498&project_step=53477
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393518.22/warc/CC-MAIN-20160624154953-00126-ip-10-164-35-72.ec2.internal.warc.gz
en
0.971166
159
4.15625
4
Essays on the Color Line and the One-Drop Rule by Frank W Sweet June 8, 2004 he decoding of the human genome has enabled molecular anthropologists to track prehistoric as well as recent human migrations. You carry traces of the past in your DNA—markers that identify the populations and sub-populations to which your ancestors belonged. They reveal information about your forebears: how they lived, where they came from. This has nothing to with “race.” Some people, for example, are lactose-tolerant and can digest milk in adulthood without difficulty. Others cannot. Among the former are most Danes, Dutch, Watutsi, and Maasai. Among populations who suffer digestive discomfort if they drink milk as adults are most Sicilians, Greeks, Bantus and the Khoisan (Kalahari Bushmen). It turns out that you are more likely to be lactose-tolerant if your ancestors after the Neolithic agrarian revolution were primarily herders. If your ancestors were mainly cultivators of grains, then you are more likely to be lactose-intolerant. Similar traits reveal whether your ancestors lived at low latitudes, subjected to excess solar ultraviolet radiation, or at high latitudes, with less-than-ideal levels of ultraviolet. Other DNA markers suggest whether your ancestors lived in the thin air of mountain elevations or along the seashore, and still others tell of the diseases to which they were subjected. The New World was first populated by hunters who migrated across Beringia about 20 millennia ago. Rising sea levels when the last ice age ended cut them off from everyone else. Isolated, their immune systems lagged behind the rest of the human species in the ongoing genetic arms race against germs. Columbus and those who followed him suddenly introduced Euro-Afro-Asian germs into the New World. Within a generation, over 90 percent of Native Americans had died of diseases that their immune systems could not recognize.1 Then, over the next three centuries, eleven million Africans and about one-fifth as many Europeans were carried across the Atlantic in sailing ships to repopulate the devastated New World.2 Most Africans came involuntarily (although some were indentured servants) and most Europeans volunteered (although some were sold into slavery). But, whether volunteers or slaves, Africans or Europeans, the immigrants came in their tens of millions and blended with the handful of surviving natives into a mixed population. The blending was nearly total in Central and South America—most Ibero-Americans enjoy demographically proportional genetic admixture from both transatlantic sources. The blending was a bit less thorough in the British West Indies, and even less so in North America.3 Of interest here is the extent of genetic admixing among people from different continents to produce the current inhabitants of North America: how, when, where, and to what extent the admixing happened. Thirty-Nine Ancestry-Informative Markers4 Ancestry-informative markers help to answer such questions by enabling estimates of what fraction of an individual’s genome was inherited from Africa, what fraction came from Europe, and what fraction descended from the pre-Columbian aboriginal population. The table above shows a typical array of 39 DNA markers used to identify the ancestral continent of origin of New-World peoples. Eight columns are of interest, exemplified by the table’s third row. The first column gives the common-use name of the marker. FY-NULL*1 denotes a particular variant of a gene that encodes a protein associated with the Duffy blood group. Column three shows where the marker is located in the genome. The entry 1q23.2 means that this marker is located on the first chromosome (1), on the long arm of the chromosome (q), and 23.2 centimorgans5 from the chromosome’s centromere. Columns five, six, and seven show the marker’s rate of incidence in the native populations of sub-Saharan Africa, Europe, and America. Only one African in a thousand carries the FY-Null marker, while every Native American tested does so, as do 998 out of every thousand Europeans. Columns eight, nine, and ten show the marker’s effectiveness in distinguishing between any two of the three populations. FY-Null is very effective at distinguishing between Africans and either Europeans or Native Americans (0.997 and 0.999, respectively), but useless at distinguishing Europeans from Native Americans (0.001). Twenty-Two Ancestry-Informative Markers The next table shows a smaller array of 22 DNA markers, used by a different research team than the source of the prior table, but also to identify the ancestral continent of origin of New-World peoples.6 That some researchers use more markers than others is a source of discussion in the field. Should you stick to the small handful of extremely reliable and informative markers? Or should you also examine (for any given individual) the greater number of marginally reliable markers, on the grounds that they are cumulatively informative? Say, for instance, that each marker of a set of twenty markers is only 67 percent reliable in distinguishing European from African ancestry. If a person has the European version, he or she may be among the two-thirds of Europeans who have the marker or among the one-third of Africans who also have it. But if all twenty of the individual’s 67-percent-reliable markers point to European ancestry, their unanimity becomes much more persuasive.7 Again, it is important to recognize that such markers in the DNA of today’s inhabitants of the New World cannot identify one’s “race,” not even implicitly. They show only the continent of origin of your ancestors (Africa, Europe, or Native America). Consider, for instance, row 18 of the second table, labeled MC1R314. This is the same marker that is depicted as MC1R-314*1 in row 33 of the first table. About 51 percent of Africans, but only 16 percent of Europeans carry this particular marker in their DNA. In other words, if you have this marker at position 16q24.3 of your sixteenth chromosome, then it is two-out-of-three likely that you inherited it from a sub-Saharan ancestor. As it turns out, MC1R314 is one of the few markers associated with a gene whose function is known. It is one of the half-dozen genes associated with dark skin tone. (TYR at 11q14-21, TYRP1 at 9p23, TYRP2 at 13q31-32, “P” at 15q11.2-12, and OCA2 at 15q13.1 also govern dermal melanization.8) In other words, row 33 of the second table merely says, in essence, that if you are a New-World inhabitant with a dark brown complexion, you probably inherited it from a sub-Saharan ancestor. The point is that the above markers were chosen because they work, nothing more—even those whose function is unknown. The markers were chosen only because they correlate strongly with continent of origin. Another important point is that the above-listed genetic markers are not the ones that you would use in order to track prehistoric migrations. For such a purpose you would choose different of sets markers, depending upon the time frame of interest. For example, the markers that you would use to track the African Diaspora that colonized the planet starting 60 millennia ago are different from those used to follow the tribes who re-colonized uninhabited central Europe after the glaciers retreated 16 millennia ago.9 Skin Tone as Function of Afro-European Admixture10 The main use of ancestry-informative markers today is in medical research. They help determine whether any given disease (HIV, diabetes, obesity, cystic fibrosis, etc.) is more or less prevalent, or has a consistently different outcome, depending upon a person’s continent of ancestry. One way of doing this is with a scatter diagram. Say, for example, that you test a few thousand individuals. You measure each person’s Afro-European admixture percentage using ancestry-informative DNA markers. You also measure each person’s susceptibility to some disease of interest. You then plot each individual on a graph from left-to-right based upon genetic admixture. People of 100 percent European (0 percent African) ancestry are plotted on the left-hand axis. People of 100 percent African (0 percent European) ancestry are plotted on the right-hand axis. Everyone else goes somewhere in between, left-to-right depending on admixture ratio. Each dot is also plotted vertically depending on susceptibility to the disease of interest. Those with no vulnerability to the disease are plotted along the bottom axis. Those who have the strongest susceptibility are plotted along the top axis. Everyone else is plotted in between, bottom-to-top depending on disease susceptibility. This process yields a scatter diagram, a cloud of dots spread across the chart. If the cloud trends upwards and to the right, it shows that the disease in question tends to be more prevalent among those with a strong African admixture component. If it trends downwards to the right, it shows that the disease tends to be more prevalent among those of predominantly European admixture component. If it trends in neither direction, then it shows that there is no connection between Afro-European genetic admixture and that particular disease. Such studies have revealed that diabetes, prostate cancer, and hypertension, for example, are more prevalent among Americans of predominantly African genetic admixture, while dementia and osteoporosis are more frequent among those of mostly European genetic admixture. Dr. Mark D. Shriver The scatter diagram above shows skin tone as function of Afro-European admixture ratio. It is a a typical Afro-European genetic admixture scatter diagram. It was taken from an article produced out of a project headed by Penn State University molecular anthropologist Mark D. Shriver, shown at right. Among the other sixteen team-members and collaborators of this study, who work for colleges and private research laboratories throughout the United States, Canada, and England, is Dr. Rick Kittles, a geneticist at Howard University in Washington DC (see photograph below, at left). The study analyzed DNA samples from 3,000 individuals in 25 locations. In the graph above, the vertical scale does not represent susceptibility to any specific disease. Instead, individuals were plotted bottom-to-top based upon how dark was the person’s complexion (as measured by the reflectance of the inner upper arm). Darker individuals are plotted higher than paler ones. The team’s intent was to see if dermal melanin correlated with percentage of African genetic admixture, and so might be a predictor of, say, skin cancer. The cloud of points displays a visibly distinct slope rising from lower-left to upper-right. This demonstrates that, in general, the more African genetic admixture you have, the darker your skin.11 Dr. Rick A Kittles The graph also depicts another variable, one that is of interest to the historian—endogamous group membership or ethnic self-identity. Each dot in the chart is encoded to show whether the person sampled claimed to be a member of the U.S. White endogamous group (diamond shape, 187 individuals) or of the U.S. Black endogamous group (open circle, 232 individuals). (The x-shaped plots represent a population of British West Indian ethnicity living in London.12) The graph refers to these three groups as European American, African American, and African Caribbean, respectively, and the text explains that this trait was self-assessed and independent of actual genetics. With this added information, three aspects of the scatter diagram suddenly jump out at you. First, there is significant overlap between White and Black Americans regarding Afro-European genetic admixture. Some so-called “Black” Americans have less DNA admixture of African ancestral origin than do some so-called “White” Americans. Second, the admixture range of Black Americans spans the entire chart. While most of the subjects who self-identify as Black (marked as circles) have strong African admixture (are found towards the right), some have little or no African admixture (are found at the left edge). Finally, although the range of genetic admixture in those who self-identify as “White” is narrower than the admixture range of Blacks, it is still significant. Many so-called “White” Americans have as much as 20 percent or more of African genetic admixture. The next graph, “Afro-European Genetic Admixture as a Function of Ethnicity” below, was taken from a different study. It also matches ancestral continent-of-origin genetic admixture for several hundred individuals with their ethnic self-identity or endogamous group membership. Afro-European Genetic Admixture as a Function of Ethnicity13 In the scatter diagram at right, each point (representing one individual) is plotted vertically to depict Afro-European genetic admixture (100 percent European at the top) and horizontally into four groups representing endogamous group membership or ethnicity. The groups, from left to right, are: 147 Americans of the White endogamous group, 264 Americans of the Black endogamous group, 135 subjects from Zaire (formerly Congo), and 159 subjects from Nigeria.14 Three points of interest present themselves upon your examining this graph. First, as in the prior chart, there is genetic admixture overlap between Americans of the Black and White endogamous groups within the range of from zero to thirty percent African genetic admixture. As in the Shriver study of skin tone, some so-called “White” Americans have over twenty percent African genetic admixture and some so-called “Black” Americans have little or none. Indeed, other studies have found that approximately 5.5 percent of members of the U.S. Black community have no detectable African genetic admixture.15 Second, the Black and White groups are not symmetrical. The mean African admixture among White Americans is low—roughly 0.7 percent African and 99.3 percent European admixture.16 To put this in perspective, this would have been the result if every member of the U.S. White endogamous group alive today had a single ancestor of one hundred percent African genetic admixture seven generations ago (around the year 1850). Of course, African alleles are not distributed evenly. Seventy percent of White Americans (like 5.5 percent of Blacks) have no detectable African genetic admixture at all. Among the thirty percent of Whites with African genetic admixture, the admixture ratio averages to about 2.3 percent, the equivalent of having a single ancestor of one hundred percent African genetic admixture from around the year 1880.17 Black Americans, on the other hand, have significant European admixture (averaging about 75 percent African and 25 percent European). Third, the wide admixture spread of the two groups of New-World inhabitants contrasts with the narrow range of admixtures among Old-World inhabitants. A wide spread of genetic admixtures is characteristic of the Western Hemisphere. As evident in the chart, on the one hand, the U.S. White population spans a range of 15-20 percent and the U.S. Black population covers a 30-40-percent range. On the other hand, the Nigerian population covers only a 10-precent spread and the Congolese population spans only a 5-percent range. The Black and White ranges are typical of the New World. Admixture variation among Latin American populations tends to span ranges as broad as that of the U.S. Black endogamous group, but shifted up or down on the chart depending on the particular nation’s colonial ratio of African slaves to European colonists. A plot from Argentina, for example, would resemble a mirror image of the Black scatter diagram, flipped over to start at the top, thereby resembling a slightly stretched version of the White U.S. plot. Scatter diagrams of Puerto Ricans or Dominicans center on the 50-percent line, with decreasing dot densities stretching all the way to both of the 100-percent axes. Haitians produce scatter diagrams resembling those of Black Americans. Old-World populations, in contrast, display much narrower ranges of variation of genetic admixture. A scatter diagram of Danes or Dutch would resemble a flipped mirror-image of the Zairean population, with a mere 5-percent spread from the 100-percent European axis. A diagram of Spain or Portugal would resemble a flipped, slightly stretched version of the Nigerian diagram.18 What is remarkable about the two U.S. endogamous groups is not that each spans a wide range of Afro-European admixture. That many White Americans carry up to 20 percent African genetic admixture may startle the uninformed, but this is typical of New World populations descended from demographically European colonies with few African slaves. And the admixture plot of Black Americans resembles those of the West Indies, where African slaves were a demographic majority. What is remarkable about the two U.S. groups is that they both live within the same society. Such a bimodal distribution of Afro-European admixture is characteristic of no other nation on earth. The separation, of course, is the result of the endogamous U.S. color line. Genetic Admixture is not the Same as Appearance About one-third of White Americans are of between two and twenty percent recent African genetic admixture, as measured by the ancestry-informative markers in their DNA.19 This comes to about 74 million Americans. And yet, day-to-day experience teaches that virtually all White Americans look, well, White. Some may look more Mediterranean and others may look more Nordic, but very few White Americans have a distinctively African appearance. How can one reconcile DNA measurements with common experience?An anecdote may help illustrate the problem. Look again at the chart of Skin Tone as Function of Afro-European Admixture. Consider one of the graph’s outlier points—a “European American” individual plotted as having 11 percent20 African genetic admixture. Dr. Shriver, the project team leader, became curious about this individual for two reasons. First, the person’s African genetic admixture was unusually high for someone who self-identified as a member of the U.S. White endogamous group. Second, the sample had been taken from State College, Pennsylvania, the site of Dr. Shriver’s own campus.21 According to Dr. Shriver: I had the result for two or three years before I even looked up the ID number of the person whom we tested. I looked at who it was and it was me! I checked myself and the rest of my relatives and tracked it through my family. I never considered that there were any African people in my family. There’s no real variation in my family. The admixture must have been pretty far back. It just so happens that we can detect it with the markers we have. My mom especially stood out as being surprised, maybe because I told her it was coming through her father. She still doesn’t believe it about her family! The part of Pennsylvania where my mother’s father came from is where the Underground Railroad ended. There are several towns right here in Southern Pennsylvania where there are very light-skinned African-American communities that are the remnants of the Underground Railroad.22 It seems that Dr. Shriver’s maternal grandfather moved from Pennsylvania to Iowa, then to California, leaving behind in the process most of his ties with his relatives.23 Dr. Shriver, it turns out, (see photograph above) is one of the 74 million White Americans with significant recent African genetic admixture.In a coincidentally similar fashion, Dr. Rick Kittles, Shriver’s collaborator from Howard University in Washington, discovered that he carries the FY-null genetic marker at genome position 1q23.2. This marker is found in 998 out of every thousand Europeans but found in only one out of thousand Africans. Many of Dr. Kittles’s other ancestry-informative markers tell the same unexpected story. Dr. Kittles (see photograph above) is one of the many Black Americans with strong European genetic admixture. And yet, and there is no other way to say this, Dr. Shriver “looks White” and Dr. Kittles definitely “looks Black.” Why is there such a discrepancy between measured genetic admixture and physical appearance?There is an immediate answer to this question, and a deeper answer. The immediate answer is that many different invisible genes identify continent of ancestry. As of the summer of 2004, the private DNA lab DNAPrint Genomics, Inc. uses up to 175 single nucleotide polymorphisms (markers) in order to analyze a client’s ancestral continents of origin.24 On the other hand only a handful of genes encode for the few superficial, externally visible features (skin color, hair curliness, etc.) that Americans see as “racially” significant. Parental genes are randomly recombined with each passing generation. It can happen, through sheer chance, that an individual (like Dr. Shriver) can inherit many invisible African DNA markers, but few or none of the handful of alleles that encode for “racial” appearance. Alternatively, a person (like Dr. Kittles) can inherit those few alleles that encode for visible “racial” appearance but otherwise inherit the invisible but ancestrally informative European admixture markers. Blacks’ Skin Tone as Function of Admixture The deeper answer becomes evident if you plot each of the two U.S. endogamous groups from the skin tone diagram separately. The next graph, “Blacks’ Skin Tone as Function of Admixture,” shows just one portion of the population of the earlier chart—those who self-identified as members of the U.S. Black endogamous group. In this diagram you can see a definite positive correlation (R2=0.211) between skin tone and African admixture. Clearly, if you are considered a Black American, the more African admixture you have, the higher your melanin index. More importantly, the range of skin reflectance as measured by the melanin index of Black Americans is very large, spanning a vertical distance of fifty points from 30 to 80. “Whites’ Skin Tone as Function of Admixture,” below, shows the other U.S. endogamous group from the earlier chart—those who self-identified as White. In this diagram, you can see that there is no correlation, either way (R2=0.001), between skin tone and African admixture. Clearly, if you are considered a White American, your melanin index is unrelated to your degree of African admixture. More importantly, the range of skin reflectance as measured by the melanin index of White Americans is very narrow, spanning a vertical distance of only twenty points from 20 to 40. This is less than half of the range of skin-tone variation found among Black Americans. Whites’ Skin Tone as Function of Admixture The combination of narrow phenotype variation (skin tone) along with a wide range of inter-population (Afro-European) admixture variation among White Americans shows that a selection process has taken place. Few human populations display such a clear mark of selection. Narrow phenotype variation alone does not necessarily indicate selection. Northern Europeans display little skin tone variation, but they lack a wide range of African admixture. Broad genotype variation alone does not necessarily indicate selection. Puerto Ricans average 50-50 Afro-European admixture, but they also display a wide range of skin tones. The late Stephen J. Gould, Harvard biology professor and columnist for Natural History magazine, used to explain this principle with a baseball analogy. Plot a scatter diagram of the batting averages of a thousand amateur or minor-league players and you will find a very large range of variation. A few such players are very bad, a few are very good, and most spread across the entire range of batting averages in-between. Now plot the batting averages of professional athletes in the major leagues. All are very good indeed. More importantly, the range of batting averages among them is tiny. The difference between an outstanding star of the game and a rookie is a matter of mere hundredths of a percentage point. The reason, of course, is because you cannot get into the majors unless you are very good at it. Similarly, wild cows vary greatly in the amount of milk that they produce. The cows in a dairy farm produce more milk on average but, more importantly, their milk production varies very little among themselves (compared to wild cows). The reason? Those cows who do not make the cut become hamburger. And so, why do few if any White Americans display a strongly African appearance (have a high melanin index) despite having detectable African admixture? Because those Americans who “look Black” are assigned involuntarily to the Black endogamous group, whatever their genetic admixture. The scatter diagrams of the two endogamous U.S. groups are not symmetrical because the selection process acts only upon the White group. As revealed in court records, discussed elsewhere, a person of mixed ancestry who “looks European” (like Dr. Shriver or his maternal grandfather) in practice has the option of either adopting a White self-identity, thus joining the White endogamous group or a Black self-identity, thus joining the other group. But a person of mixed ancestry who “looks African” lacks such a choice. U.S. society assigns such a person to membership in the Black endogamous group, like it or not.25 In conclusion, U.S. society has unwittingly applied selection pressure to the color line. The only American families accepted into the White endogamous group have been those whose African admixture just happened not to include the half-dozen alleles for dark skin (or the other physical traits associated with “race”). Since those particular alleles were sifted out of the portion of the White population that originated in biracial families, the relative percentage of the remaining, invisible, African alleles in this population cannot affect skin color. That skin-color does not vary with African genetic admixture among American Whites, despite their measureably recent African admixture, demonstrates and confirms that physical appearance has been an important endogamous group membership criterion throughout U.S. history. It has resulted in genetic selection of the White U.S. population for a European “racial” appearance, regardless of their underlying continent-of-ancestry admixture ratio. 1 Woodrow Wilson Borah and Sherburne Friend Cook, The Aboriginal Population of Central Mexico on the Eve of the Spanish Conquest(Berkeley: University of California, 1963). 2 Hugh Thomas, The Slave Trade: The Story of the Atlantic Slave Trade: 1440-1870(New York: Simon and Schuster, 1997), 793, 804-5. 3 Esteban J. Parra and others, “Estimating African American Admixture Proportions by Use of Population-Specific Alleles,” American Journal of Human Genetics 63 (1998): 1839-51; E.J. Parra and others, “Ancestral Proportions and Admixture Dynamics in Geographically Defined African Americans Living in South Carolina,” American Journal of Physical Anthropology 114 (2001): 18-29; C.L. Pfaff and others, “Population Structure in Admixed Populations: Effect of Admixture Dynamics on the Pattern of Linkage Disequilibrium,” American Journal of Human Genetics 68 (2001): 198-207. 4 A “centimorgan” is a measure of chromosomal distance tied to the likelihood of meiosis recombination. 5 From Mark D. Shriver and others, “Skin Pigmentation, Biogeographical Ancestry, and Admixture Mapping,” Human Genetics 112 (2003): 387-99. 6 For mathematical discussions of this point, see Michael J. Bamshad and others, “Human Population Genetic Structure and Inference of Group Membership,” American Hournal of Human Genetics 72 (2003): 578-89 or Jinliang Wang, “Maximum-Likelihood Estimation of Admixture Proportions From Genetic Data,” Genetics 164 (2003): 747-65. 7 From Jose R. Fernandez and others, “Association of African Genetic Admixture with Resting Metabolic Rate and Obesity Among Women,” Obesity Research 11, no. 7 (2003): 904-11. 8 Richard A. Sturm, Neil F. Box, and Michele Ramsay, “Human Pigmentation Genetics: The Difference is Only Skin Deep,” BioEssays 20 (1998): 712-21. 9 For introductions to markers tracing prehistoric migrations, see: Bryan Sykes, The Seven Daughters of Eve, 1st American ed. (New York: Norton, 2001) or Steve Olson, Mapping Human History: Discovering the Past Through Our Genes (Boston: Houghton Mifflin, 2002). 10 Mark D. Shriver and others, “Skin Pigmentation, Biogeographical Ancestry, and Admixture Mapping,” Human Genetics 112 (2003): 387-99. 11 Dozens of peer-reviewed journal articles on Afro-European genetic admixture mapping using ancestry-informative DNA markers have sprung from the decoding of the human genome. About 50 such articles from medical, genetic, and molecular anthropological journals are available for download from Various Admixture Studies. 12 The 173 individuals of West Indian ethnicity were all British subjects living in London. Some genetic admixture mapping studies lump British West Indians and African-Americans into a single group. This study tallies them separately because doing so reveals the interesting point that there are virtually no “Black” British West Indians with very slight African genetic admixture. British West Indians of known partial African ancestry who look European are considered “White” by British society, which lacks an endogamous color line. 13 Heather E. Collins-Schramm and others, “Markers that Discriminate Between European and African Ancestry Show Limited Variation Within Africa,” Human Genetics 111 (2002): 566-9. 14 Again, some would argue that Nigerians and Zaireans are also “Black” and so should be lumped in with the African-Americans. But this confuses genetic admixture and nationality with membership in one of the two U.S. endogamous groups. Nigerians and Zaireans are of preponderantly African genetic admixture with little European admixture, but they do not become members of either of the two U.S. endogamous socio-political groups unless and until they immigrate to the United States. 15 E.J. Parra and others, “Ancestral Proportions and Admixture Dynamics in Geographically Defined African Americans Living in South Carolina,” American Journal of Physical Anthropology 114 (2001): 18-29, Figure 1. 16 Mark D. Shriver and others, “Skin Pigmentation, Biogeographical Ancestry, and Admixture Mapping,” Human Genetics 112 (2003): 387-99, Table 2. 17 Steve Sailer, “Analysis: Race Now Not Black and White,” (UPI, May 8, 2002). Astonishingly, these DNA-based findings confirm an obscure 1958 study that predicted, on the basis of statistical demographics alone, that about 21 percent of White Americans had Black ancestry within the past four generations. See Robert S. Stuckert, “The African Ancestry of the White American Population,” Ohio Journal of Science 55, no. May (1958): 155-160. For an accessible survey, see Monica L. Haynes, “Passing: How Posing as White Became a Choice for Many Black Americans,” Post-Gazette, October 26 2003, Lifstyle, 1. 18 Interestingly, the slighter broader-than-usual (for the Old World) admixture range of Nigerians and Iberians probably has the same cause. Both of these broader-than-expected scatter diagrams may reflect the faint remaining traces of the population mixing that took place consequent to the Almoravid Empire and its aftermath. The Almoravid Empire (1043-1133) stretched from Senegambia to Barcelona. 19 Steve Sailer, “Analysis: Race Now Not Black and White,” (UPI, May 8, 2002) 20 The Sailer (2002) article, from which the above anecdote was taken, said “23 percent” African admixture, and so this was the number given in an earlier edition of this essay. But the number may have been mistaken. The 11 percent figure, above, is from a conversation between Dr. Shriver and the present author after a lecture in Gainesville, Florida, in November 2003, and matches the number mentioned in Christen Brownlee, “Code of Many Colors,” Science News Online April 9, 2005. See URL http://www.sciencenews.org/articles/20050409/bob9.asp for online access. 21 Steve Sailer, “Analysis: Race Now Not Black and White,” (UPI, May 8, 2002). 22 Dr. Shriver’s comments are from an interview in Sailer (2002). 24 As of June 7, 2004, see the firm’s URL http://www.ancestrybydna.com/ancestry25.asp. 25 As discussed elsewhere, exceptions to this rule are made in U.S. society for some Hispanics and North African Muslims of slight African appearance. |If you liked this essay, leave a tip using bitcoins. Deposit to address: 1GDGfpdvoP5xw5bCJzazCyJoCKbQdJd6jh Frank W. Sweet is the author of Legal History of the Color Line (ISBN 9780939479238), an analysis of the nearly 300 appealed cases that determined Americans’ “racial” identity over the centuries. It is the most thorough study of the legal history of this topic yet published. He was accepted to Ph.D. candidacy in history with a minor in molecular anthropology at the University of Florida in 2003 and has completed all but his dissertation defense. He earned an M.A. in History from American Military University in 2001. He is also the author of several state park historical booklets and published historical essays. He was a member of the editorial board of the magazine Interracial Voice, and is a regular lecturer and panelist at historical and genealogical conferences. To send email, click here. |Other Backintyme sites:||Essays on the U.S. Color Line||Armed Citizens and the Law| |Backintyme Performances||YouTube Channel||--|
<urn:uuid:b67a06f3-9fa5-4fe1-9612-b88f9f48e6b8>
CC-MAIN-2016-26
http://essays.backintyme.com/item/5
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402699.36/warc/CC-MAIN-20160624155002-00201-ip-10-164-35-72.ec2.internal.warc.gz
en
0.930926
7,400
3.03125
3
Please let other users know how useful this tip is by rating it below. Do you have a tip or code of your own you'd... like to share? Submit it here. The ability to define interfaces has been introduced in Visual Basic .NET. VB6 supported interfaces too, but the way they were defined and used tended to raise the eyebrows of experienced object oriented programmers. Interfaces have been the base of any object oriented programming languages. VB.NET and C# support multiple interface inheritance -- i.e., we can implement from more then one interface. Interfaces solve many problems associated with code reuse in object-oriented programming. This code sample explains how to define an interface in VB.NET and how to implement the interface in other classes. There are a few constraints associated with interface; I will discuss those in later articles. Imports System Imports Microsoft.VisualBasic Namespace n Public Interface MyInt Sub Mysub() Function MyFunc() As String End Interface Class mclass Implements MyInt ' Implement the above created interface Shared Sub Main() Dim o As New mclass() o.Mysub() End Sub 'This method maps to Mysub procedure in the interface Myint Sub Mysub() Implements Myint.Mysub msgbox("Hi") End Sub 'This method maps to MyFunc Function in the interface Myint Function MyFunc() As String Implements MyInt.MyFunc 'Do something and return a value End Function End Class End Namespace
<urn:uuid:a0e014cf-f9b3-4a84-8832-f451532c1cd7>
CC-MAIN-2016-26
http://searchwindevelopment.techtarget.com/tip/Defining-interfaces-in-VBNET
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397744.64/warc/CC-MAIN-20160624154957-00038-ip-10-164-35-72.ec2.internal.warc.gz
en
0.815156
317
3
3
3. Capturing the dragon The first aspect of the Jewish reworking of the Leviathan myth is the capture of the dragon. God tells Job that he and he alone can draw Leviathan from the chaos waters. Seven times God promises he will do it: by “hooks”, “snare”, “draw”, “fishhook”, “cord”, “rope”, “hook”. “Can one take it with hooks or pierce its nose with a snare? Can you draw out Leviathan with a fishhook, or press down its tongue with a cord? Can you put a rope in its nose, or pierce its jaw with a hook?” (Job 40:24-41:2) The number seven here has symbolic import. It is the perfection of divine power. Only God can destroy the chaos monster. Drawing the monster from the waters is the first part of its destruction. No lesser divine being can control, let alone, destroy the evil that it represents. “Any hope of capturing it will be disappointed; were not even the gods overwhelmed at the sight of it? No one is so fierce as to dare to stir it up. Who can stand before it? Who can confront it and be safe? --under the whole heaven, who?” (Job 41:9-11) “When it raises itself up the gods are afraid; at the crashing they are beside themselves. Though the sword reaches it, it does not avail, nor does the spear, the dart, or the javelin. It counts iron as straw, and bronze as rotten wood. The arrow cannot make it flee; slingstones, for it, are turned to chaff. Clubs are counted as chaff; it laughs at the rattle of javelins.” (Job 41:25-29) Here, God is drawing on the Babylonian myth of a cosmic struggle between good and evil, where even the gods themselves are dumb struck. In the Babylonian myth of creation, the god of wisdom Ea is “struck dumb with horror and sat stock still” at the rebellion of the chaos monster Tiamat. Ea goes to his grandfather Anshar and tells him the bad news of a demonic horde. “They are massing around her, ready at Tiamat’s side Angry, scheming, never laying down night and day, Making warfare, rumbling, raging, Convening in assembly, that they might start hostilities, Mother Huber, who can form everything, Added countless invincible weapons, gave birth to monster serpents, Pointed of fang, with merciless incisors (?), She filled their bodies with venom for blood. Fierce dragons she clad with glories, Causing them to bear auras like gods, (saying) “Whoever see them shall collapse from weakness! Wherever their bodies make onslaught, they shall not turn back!” She deployed serpents, dragons, and hairy hero-men, Lion monsters, lion men, scorpion men, Mighty demons, fish men, bull men, Bearing unsparing arms, fearing no battle. Her commands were absolute, no one opposed them. Eleven indeed on this wise she created.” This demonic refrain will be repeated four times in the poem to heighten the fear of the gods. Anshar orders Ea and Anu in turn to destroy Tiamat, but both: ‘…stopped, horror-stricken, then turned back…. Her strength is enormous, she is utterly terrifying, She is reinforced with a host, none can come out against her. Her challenge was not reduced, it was so loud (?) against me, I became afraid at her clamor, I turned back.” Even the high God Marduk is dumb struck as he approaches that evil. Tiamat cast her own spell on him and “his tactic turned to confusion, His reason was overthrown, his actions panicky.” No human being such as Job can destroy the evil Leviathan represents. “Look on all who are proud, and bring them low; tread down the wicked where they stand. Hide them all in the dust together; bind their faces in the world below. Then I will also acknowledge to you that your own right hand can give you victory.” (Job 40:12-14) Only God can destroy it.
<urn:uuid:93c5f5c4-1230-476b-968b-33467d349480>
CC-MAIN-2016-26
http://www.online-literature.com/forums/showthread.php?2905-Putting-God-on-Trial-The-Biblical-Book-of-Job/page3
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395546.12/warc/CC-MAIN-20160624154955-00156-ip-10-164-35-72.ec2.internal.warc.gz
en
0.952877
964
2.6875
3
Characteristics of Gifted Children: Articles and Research Library Home || Full Table of Contents || Suggest a Link || Library Help |Carolyn K., Hoagies' Gifted Education Page| |Articles and reports on characteristics of gifted children: perfectionism, sensitivity, social skills and emotional skills, underachievement, and visual-spatial learning.| |Levels:||Elementary, Middle School (6-8), High School (9-12)| |Math Ed Topics:||Psychological/Affective Issues, Gifted| © 1994- The Math Forum at NCTM. All rights reserved.
<urn:uuid:3e6dc42a-49b1-4785-94f0-ac1d2a0dfac2>
CC-MAIN-2016-26
http://mathforum.org/library/view/12799.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391634.7/warc/CC-MAIN-20160624154951-00038-ip-10-164-35-72.ec2.internal.warc.gz
en
0.716096
132
3.359375
3
Chile is a country in South America, occupying a long narrow strip of land between the Andes Mountains and the Pacific Ocean. It is almost 3,000 miles long, yet averages only about 100 miles wide. Northern Chile is home to the world’s driest desert, where the rain stick is believed to have originated. Rain sticks were made from long, hollow cactus tubes that were dried in the sun. Then the spikes were removed and driven back into the cactus like nails. Small pebbles were then placed inside and the ends sealed. A sound like falling rain was made as the rain stick was turned, making it useful in desert ceremonies where it was believed to bring rain. Materials (per rain stick): - 18″ x 2″ cardboard mailing tube (You can find these at office supply stores or wherever commercial paper products are sold in your area.) - 2 – 2″ cardboard circles (I cut them from empty cereal boxes. If your school has a die cutter, this would be a good time to use it!) - 18″ x 8″ brown grocery bag paper - 6″ x 6″ brown grocery bag paper - YES! Paste and stiff glue brush or a good quality glue stick - markers (assorted colors) - 4 – medium size beads - 2 – 12″ pieces twine - 4 – feathers - 3′ x 12″ aluminum foil - masking tape - 1/4 cup pop corn - 2 – rubber bands 1. Glue cardboard circles (centered) onto the squares of brown paper and set aside. 2. Lay out the long strip of aluminum foil and carefully “scrunch” it into a long skinny “snake”, but don’t squeeze it too tight! (See photo below.) 3. Now, twist your foil snake into a loose coil about the length of your tube. 4. Next, slide the coil into your tube and secure with masking tape at each end. 5. Spread some glue around one end of your tube. 6. Place one of the papers (with the cardboard circle facing inward) over the end of your tube and press the edges down. Hold in place with a rubber band until dry. 7. Pour 1/4 cup popcorn or rice into the tube and seal the other end in the same way. (Your rain stick will sound different depending on what you fill it with, so it helps to have a sample of each and let students choose!) 8. Now, draw a colorful pattern onto the 8″ x 18″ brown paper. 9. Then scrunch up and carefully smooth out your paper about 8 times, until it has an evenly bumpy texture to it, resembling the texture of a cactus branch. 10. Spread glue over the back of your paper and roll it around your tube, overlapping itself and covering the loose edges of the paper you used to seal the ends. 11. Wrap a piece of twine twice around each end of your tube and tie in a knot. 12. Add a bead to each end and secure with a knot. 13. Spread a little glue onto the end of each of four feathers and stick them up into each of the beads. Let dry completely.
<urn:uuid:1f225790-b673-42b6-b633-27e1a8756c6c>
CC-MAIN-2016-26
http://www.teachkidsart.net/chilean-rain-sticks/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396224.52/warc/CC-MAIN-20160624154956-00013-ip-10-164-35-72.ec2.internal.warc.gz
en
0.92954
676
3.390625
3
The Department of Health and Human Services has released its Healthy People 2020 recommendations. The full report can be accessed at http://healthypeople.gov “Too many people are not reaching their full potential for health because of preventable conditions,” said Assistant Secretary for Health Howard K. Koh, M.D., M.P.H. “Healthy People is the nation’s roadmap and compass for better health, providing our society a vision for improving both the quantity and quality of life for all Americans.” The Future of Nursing : Leading Change, Advancing Health published on behalf of the Institute of Medicine and the Robert Wood Johnson Foundation, also calls for more nurse leaders throughout healthcare. The November/December 2010 issue of The American Nurse quotes American Nurses Association President Karen Daley, "If we are indeed successful with health care reform, the model of care will not be based on the disease process, but on disease prevention and health promotion." The Vice Chair of the 17-member committee that produced this report, Linda Burnes Bolton DrPH, RN, FAAN who is also an ANA member in California states, "This report shows that nursing has done so much for the nation's health, but the opportunity exists for us to do so much more." Burnes Bolten continues, "Nurses have had many opportunities to lead, but often it's been in limited ways. We not only want nurses to be at the table when decisions are being made, but we want nurses to lead (health care and health care system efforts). And if nurses are allowed to lead, they will come up with innovative ways to bring up health care and make the world a better place." Supporters of efforts to create a National Nurse believe that by making the Chief Nurse Officer of the USPHS more visible to the public and all practicing nurses as our nation's National Nurse will result in a huge window of opportunity to promote a healthier nation. The National Nursing Network Organization Team—Monday, January 03, 2011
<urn:uuid:97daf330-1f3f-42f6-8170-81a05505af07>
CC-MAIN-2016-26
http://nationalnurse.blogspot.com/2011/01/more-on-need-for-visible-nurse-leader.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397795.31/warc/CC-MAIN-20160624154957-00091-ip-10-164-35-72.ec2.internal.warc.gz
en
0.964778
413
2.53125
3
ArcView World file for TIF image (GIS application) The TFW file extension is used for plain text files that store X and Y pixel size, rotational information, and world coordinates for a map that is stored as a TIFF image in a GIS application. A GIS (geographic information system) enables you to envision the geographic aspects of a body of data. Basically, it lets you query or analyze a database and receive the results in the form of some kind of map. TFW files must be saved in the same directory as their accompanying TIFF map images. Such maps are typically used with ESRI’s Arc series of mapping applications, as well as Google Earth and Global Mapper Software. Learn more about TDB files: View questions and answers about working with mapping software.
<urn:uuid:8e5c44cc-d7f0-4fef-b539-ce4df2dbc478>
CC-MAIN-2016-26
http://whatis.techtarget.com/fileformat/TFW-ArcView-World-file-for-TIF-image-GIS-application
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403825.35/warc/CC-MAIN-20160624155003-00112-ip-10-164-35-72.ec2.internal.warc.gz
en
0.905196
168
2.625
3
Numbers or Letters Are numbers or letters better for grid square co-ordinates ? Discuss... League Tables Multi user sudoku Puzzle files Sudoku Dragon on Android Tablets Release 35 features Release 26 features Release 20 features Release 19 features Release 18 features Release 15 features Release 14 features Release 13 features Release 12 features Release 11 features Solving Printed Puzzles Irregular grid 5x5 Sudoku-X Display of possibilities Entering Jigsaw regions In SudokuDragon the rows and columns are given letters (e.g. see page) rather than numbers. All other Sudoku puzzle solvers I have seen use numbers. I can see that there is some point in making the row and column names easy to use but I think the letters are also confusing. Could the program be changed so that the numbers for rows and columns could be numbers - perhaps as an option ? Yes, I find the row and column as letters much better. I always get confused by rows and columns (as well as left and right) so using a Capital letter for rows makes it a lot simpler for me. It's particularly useful to identify a single grid square. Having to say row 3 column 4 is a lot more long winded than just saying square Cd. Copyright © 2005-2016 Sudoku Dragon
<urn:uuid:3c15435f-36a9-46b1-b41f-cc0909d56938>
CC-MAIN-2016-26
http://www.sudokudragon.com/forum/headerletter.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396949.33/warc/CC-MAIN-20160624154956-00088-ip-10-164-35-72.ec2.internal.warc.gz
en
0.909302
261
3.046875
3
Browse this book with Google Preview » [UT Press note: Due to browser limitations, Greek examples were omitted from this online excerpt; they are present in the printed book.] In Patricia Highsmith's claustrophobic and morally ambiguous novel The Talented Mr. Ripley, the eponymous antihero faces a situation in which he has to appear before the same policemen as two different people. In his second interview with them he must play himself rather than the dashing and entitled young man whom he had been impersonating. His solution to this dilemma is a simple one: instead of wearing a literal disguise, he alters his tone of voice, his posture and general deportment, the quality of his clothes, and his speaking style. Except for the addition of a pair of glasses and a slight darkening of his hair color, he is still the same person, as far as the concrete aspects of his physical appearance are concerned. But because he so successfully acts the part of his own timid and insignificant self, the policemen do not even think to compare him to the elegantly casual man they had interviewed the first time around. Tom Ripley has altered what I shall refer to as his visible type or "cast" of character. These are the elements that make up one's typical style, the physical and linguistic mannerisms that mark a speaker as a type conforming to a set of socially familiar categories. Important to the apprehension of type are those visible elements that a speaker engages at the moment of selfperformance, when he most wants to convince another that he is a particular kind of person. The eyewitness experience of the performer is essential to the audience's conviction that he is a certain type: the policemen must see Ripley speak a certain way and watch the droop in his ill-clothed shoulders that finishes his own brief and deferential sentences or, conversely, the languid gesture of a beringed hand that punctuates the phrases of the wealthy man he impersonates. The playwright John Guare may have been aware of the similarities that Paul "Poitier" bore to Ripley when he brought to the stage the graceful impersonator of Six Degrees of Separation. Paul learns to charm upper-class couples into taking him in by altering his speaking style, deportment, and dress to resemble their own. The female protagonist of Wilkie Collins' novel No Name indulges in more concrete physical disguises to gain her ends, as befits her richly layered Victorian character. Nevertheless, her successful deceptions depend just as much on changes in vocal tone, posture, and speaking style, techniques she perfected while working as a small-time actress. Numerous examples of such misleading strategies exist in modern literature, of course. I hope merely to suggest the scope and significance of the ideas explored in this book by recalling a few familiar modern characters whose manipulations of effect depend largely on changes in typical styles rather than on concrete disguises. These characters show how weighty an impact such seemingly ephemeral elements as facial expression, vocal timbre, vocabulary choice, or style of dress can have on the reception of the speaker. The techniques that this book analyzes developed in an ancient setting, the performative nature of which lent even more importance to the visible type the speaker appears to be than modern literary settings might be expected to do. In the predominantly oral culture of ancient Greece, the character of the individual was conceived of as a visible entity, something that could be assessed from witnessing his public actions, daily deportment, and manner of speaking. In fifth-century Athens the centrality of oral arenas to the democratic city-state, including the theater, the courts, and the Assembly, insured that this increasingly literate culture nevertheless continued to be largely oriented around oral practices. This singular circumstance gave rise to a perception among the writers of the period of the overarching differences between oral and written styles and a concern about the dangerously compelling effects of both. During the political upheavals that marked the end of the fifth century in Athens, this contested linguistic territory fostered suspicions that the grand, visualizing style associated with oral performance and the overly precise, polished style associated with written composition could each have their detrimental effects on audiences. As Cicero, Dionysius of Halicarnassus, Demetrius, and Aristotle before them demonstrate in detail, verbal style—the form and arrangement of words—plays an influential role in persuasive and appealing composition. These writers also acknowledge (Aristotle reluctantly) that the speaker's physical appearance, deportment, and the character he projects also contribute to the force of his arguments, all of which may in some sense be understood as aspects of style. Just how this works begs the question of what style is and how conceptions of style may have changed from antiquity to the present. I am concerned here with elucidating earlier ideas about style that made a serious contribution to later stylistic concepts. The philosophically oriented thinking of Plato and Aristotle did much to obscure these ideas, during the rise of rhetoric as a field of study. This book explores the beginnings of an awareness of style in archaic and classical Greek literature and assesses the tendency of poets and early prose writers to treat verbal techniques and visual effects as interrelated. It centers around a number of famous depictions of Helen and Odysseus, two figures who uniquely focus ideas about the impact of the visibly persuasive character type and the impressive oral style. Like Tom Ripley, both figures also reveal the potentially distracting or misleading effects of such versatile self-performers and thus of style itself. Style As A Social Performance The French sociologist Pierre Bourdieu has argued that one cannot understand social practices without understanding the relationship between how the body is socialized and the use of language. For Bourdieu, this linguistic usage is predominantly physical, since it is the body that engages certain verbal habits, themselves learned through socialization. Style, from this perspective, comprises the interaction between word usage and bodily deportment, as both are molded and regulated by class and gender. Bourdieu terms this interaction bodily hexis, the ancient Greek word for habit or typical state of being. In Aristotle, hexeis designate the dispositions that are formed over time by habitual action and that constitute different character types. For Bourdieu, bodily hexis itself is molded by the set of entrenched beliefs and attitudes (the habitus) that delineates the given social group. As Bourdieu puts it, hexis is "political mythology realized, em-bodied, turned into a permanent disposition, a durable way of standing, speaking, walking, and thereby of feeling and thinking." Thus the verbal style of the individual cannot be apprehended apart from its physical enactment. This is itself a product of inculcation—the result of a bodily memory whose visible manifestations (re)produce attitudes and beliefs molded over generations. Bourdieu further points out that these stylistic schemes are value-laden; an honorable type comports himself in a particularly honorable manner, from the steady, regulated way he eats his meals to the firm, rhythmic way he speaks in public. In the second volume of his history of sexuality, Michel Foucault emphasizes that a stylized and visually oriented attitude toward behavior informed the ancient Greek understanding of character type and ethics. Foucault argues that the Greek writers of the classical period display a concern with regimen rather than injunction, aiming at the regulation of pleasures according to what is judged to be suitable behavior in relation to such type markers as age, health, and status of the individual. For the Greek citizen, Foucault argues, the principles that govern such regulation are based on ideas about proportion and timing, a pervasive emphasis on fitting measure that he terms "a stylization of attitudes and an aesthetics of existence.'' The corollary associations (which Foucault does not pursue) between Greek ideas about character and the physical regimens that he terms "techniques of the self" contribute to an awareness of style as an interconnected patterning of verbal conduct, deportment, and daily activity, that is, as the visible organization of character type. Judith Butler has argued for a similar understanding of self-presentation as stylized, most prominently in her elaborations of the "performative" nature of gender identification. Butler's notion of "corporeal style"—consisting of the inflections, deportment, and dress that signal participation in particular social categories—clearly parallels Bourdieu's ideas about bodily hexis. Butler's emphasis on identity as a social performance rather than a natural phenomenon accords with the work of such anthropologists as Michael Herzfeld, who has studied the performance of gender identity in modern Greek communities as a "poetics of social interaction.'' Herzfeld focuses on a social semiotics similar in general outlook to those of Bourdieu and Butler, in which the self is performed by engaging the tropes particular to a given identity category. Performance theory in general has influenced thought about ancient social institutions, as well as studies of the body in antiquity. The methodological perspective that informs this "cultural poetics" tends to embrace both signifying practices in daily life and those schematized by artistic media, a blurring of distinctions that can be problematic for the analysis of literary semiosis. Nevertheless, the recognition that character is formulated by means of the visible engagement in a stylistics of identity supports an approach more useful for addressing how style operates in oral settings. Indeed, all these scholars' observations about self-presentation as a social, regularized, embodied, and therefore visible phenomenon uniquely suit the public, performative context in which ancient ideas about style developed. Rather than focusing on the individual, as a modern phrase like "personal style" implies, the ancient concepts of style were elaborated with a focus on visible behavior within the community, on the categories of character type that organized this behavior, and on the kinds of speech that suited different types in different settings. Thus all styles of self-presentation would have been assessed in relation to normative notions of the fit between character type and typical setting: what was suitable for the bedroom, for example, would not be so for the dinner table. Similarly, the locutions suited to the warrior would not be those suited to the concubine or to the keeper of pigs. These are value-laden, hierarchized distinctions; and whatever power a given speech possesses is conferred from outside, in effect, that is, from the way in which the speech successfully engages in discourses already acknowledged as authoritative (e.g., locutions typical to priests or warriors). Bourdieu himself emphasizes that the scepter (skêptron) of the ancient Greek kings is a visible emblem of linguistic habitus. Handed from speaker to speaker in archaic assemblies, the skeptron thereby confers on successive warriors the authoritative status necessary to public persuasion. We might compare the example that the literary theorist Kenneth Burke makes of Thomas Carlyle, when discussing the distinctive features of an individual's self-presentation. Burke terms these features "stylistic identifications" and quotes Carlyle on the similarly emblematic nature of clothing: "Has not your Red hanging-individual a horsehair wig, squirrel-skins, and a plush gown; whereby all mortals know that he is a JUDGE?—Society, which the more I think of it astonishes me the more, is founded upon Cloth." In his lectures on rhetoric, Aristotle remarks in blander fashion, "It is necessary to consider what indicates an old man as a red cloak does a young man, for the same clothing does not suit [prepei] both.'' Most earlier Greek poets and prose writers judged a speaker's ability primarily on the manner in which he told his story, including his presentation of himself as a particular type, from the formation of his words to the drape of his cloak. Ancient ideas about the visibility of style and character type make use of a physically based scheme that opposes (in general terms) heroic to deformed or degraded statures. In archaic and classical poetry and prose, terms like kosmos, tropos, and schêma most often trace this kind of bodily geometry, triangulating speaking style, visible actions, and deportment, which together can either genuinely indicate a person's type or prove a false indicator of that type. Deportment and stature may betray birth, as Ion notes of Creusa in Euripides' eponymous play. Fancy talk and a nice outfit may, on the other hand, prettily conceal wrong-doing, the trick with which Hecuba charges Helen in the Trojan Women. The tropos or "turn" of a man may denote his visible manner, his verbal style, or even his dress, while a word like ("shape") points most insistently to the disposition of the body and its visible actions, as Simon Goldhill has recently noted. Kosmos is a term that early in archaic poetry suggests the crucial balancing of all these elements in the projection of a winning style. It most centrally denotes a pleasing integration of parts, a fitting adornment that one can see both literally and in the mind's eye. The word kosmos thus embraces the elements that make up what I am referring to (quite untechnically) as the "cast" of character: the interactions among dress, deportment, and verbal strategies that in the act of selfpresentation crystallize as one's typical style. This is the style a person assumes in the moment of performing as a recognized type, where witnesses to her self-enactment can actually visually assess who she is (or who she purports to be). A typical style in this context is thus not so much an individual, unique manner of engaging that projects who one really" is. Rather, since ancient notions of character type are much more schematic and performative, one's typical style is just that—typical, conforming to accepted behavioral patterns and recognizable categories of type. Thus Odysseus' typical style in Homeric depiction adheres to the conventional cast of the versatile, clever type, versions of which he engages very convincingly, even when he is not playing himself. This "typical style," then, is the combination of socially categorized verbal and visual habits that Bourdieu calls bodily hexis. The Greek word tupos eventually came to mean speaking style among the rhetoricians, but its earlier uses embrace broader notions of things visibly familiar, recognizable, or of the same general character. Similarly, Greek terms central to rhetorical theory such as prepon (suitability) and eikos (probability) reveal a concern with regularized patterns of visible type, the roots of which are much older than the treatises in which these concepts figure prominently. Modern scholars have recognized the importance of these concepts to Greek rhetorical theory, probability for its usefulness in forensic arguments about factual details, and suitability for its centrality to stylistic issues. But they have not noticed that both depend precisely on a schematized awareness of social habits and are associated with visibility. What a person is likely to do or what it is fitting that he do can only be assessed by means of witnessing that he is a particular type (i.e., of a given status, stature, disposition) in a particular setting. Notions of probability and suitability thus engage the audience's understanding of typical characters and their likely behavior. Probability itself depends on suitability, and suitability, again, pertains primarily to style, to the deportment, dress, and language that make one recognizable as a given type. Any exploration of notions of style in ancient Greece should thus embrace this broader understanding of its purview. Style Before Aristotle Most previous discussions of ancient conceptions of style address the subject from a much narrower perspective than that outlined above, in part because of assumptions about when the awareness of stylistic effect first developed. Although some recent studies of the origins of Greek rhetoric do consider fifth-century discussions, the few scholars who address stylistic issues most often treat as introductory any material that predates the fourth century. Their analyses begin in earnest with Aristotle's recommendations in the Rhetoric for formulating a persuasive style, which means that his treatment of the topic largely determines how it is defined. Consequently, discussions are usually restricted to style in prose writing, which is regarded as coming into Greek consciousness with the advent of rhetorical theory. Scholars therefore either ignore earlier conceptions of stylistic type or treat them as not rigorously defined enough to be helpful. This way of setting the parameters for the study of style in writing is certainly defensible. A number of studies of early rhetorical theory as a technical discipline have included cogent analyses of the development of prose style. The scope of such studies often depends, however, on the largely uncontested thesis that unless the ancient sources have a technical word for a category of inquiry, no awareness of the topic can be usefully identified and explored.30 Yet most important discussions of the origins of rhetoric, while they frequently engage in this kind of debate, nevertheless look to earlier periods for evidence of an awareness of rhetorical concepts. If scholars agree that it is useful to consider archaic and classical literature before Plato in analyzing the development of rhetorical theory, then surely the same can be argued for stylistic theory before Aristotle. Acknowledging the importance of earlier depictions of persuasive strategies has occasionally led to the recognition of how this material might bear on topics like style. Indeed, Richard Enos has gone so far as to suggest that earlier ideas about language centered around distinctions of style. To my knowledge, however, only Neil O'Sullivan's consideration of Aristophanic conceptions of style has significantly broadened the chronological parameters of the discussion. Sensitivity to stylistic effect can be identified as far back as Homer, along with an attention to persuasive techniques more generally. Dramatic, oratorical, and historical texts reveal a heightened awareness of the impact of style in the late fifth century, which may indeed be influenced by the advent of prose writing. Yet most instances of this awareness revolve around reaction to an individual's style of delivery in oral performance. They thus center on the apprehension of the speaker's adherence to a typical character profile, which usually includes such visual details as dress and deportment. Earlier treatments of oral performance that are no longer extant may well have addressed the topic of style from this broader perspective. As commentators on ancient rhetoric and literary criticism always note, handbooks existed in the fifth century that offered instruction in oratorical technique. None of these have survived, but it is likely that they contained set speeches (i.e., speeches on set themes, about and/or in the voice of paradigmatic mythohistorical figures). They may also have included analyses of different styles of composition and delivery. There is further evidence that such lesser-known intellectual figures as Polus and Antisthenes wrote books on style or "types" (charaktêres) of speakers; both were said to be students of the sophist Gorgias, the famous proponent of an elaborate oral style. It thus appears that before Aristotle defined style as verbal embellishment in prose writing and sought to ignore elements of oral performance, ideas about style did include the visual aspects of a speaker's type. These ideas centered around the eyewitnessing of speakers and were inseparable from an understanding of character as importantly visible and performative. Beginning a discussion of ancient ideas about style with Aristotle would seem to distort the picture quite seriously. As some scholars have recognized in relation to other aspects of rhetorical theory, this narrower focus minimizes the influence of ideas developed during the period in which prose was being invented and the transition from a predominantly oral attitude toward language was underway. Indeed, the later discussions themselves show evidence of this influence. Aristotle and Isocrates both closely connect verbal style (lexis) and delivery (hupokrisis) (Arist. Rhet. 1403b-1404a; Isoc. 5.25-27). This suggests, as Thomas Cole has noted, that they could explain what effect lexis should have in a text only by an analogy to that of hupokrisis in performance. The association of lexis and hupokrisis reveals an understanding of style as somehow bound up in the spoken word, as an oral technique, which Aristotle is attempting to revise for use in the written text. One might even suspect that Aristotle, with his analytical and readerly orientation to his subject matter, was reacting against these more oral and visually oriented conceptions of style. In his view, such visual elements—which he relegates rather tellingly to a "vulgar" (Rhet. 1404a35) category borrowed from theater (hupokrisis)—possess an illegitimate impact in the performance or persuasive setting because of the "corruption" of the audience (Rhet. 1403b35, 1404a8). He notes, however, that the actor Theodorus and the dramatist Euripides both offer useful indications of how to cover up the fact that one is suiting one's speech to subject and audience (Rhet. 1404b20-26). This suspicion of oral performance informs much of what Aristotle has to say about style and character type. It had, moreover, a weighty effect on subsequent theory and scholars' attempts to analyze that theory. Adhering to narrower definitions of style may reflect accurately (if uncritically) Aristotle's own parameters. Yet even analyses of Aristotle's ideas, as well as those of later rhetorical theorists, could usefully pay more attention to the interaction of style and character type, and the importance of appearing to be a certain kind of person in the persuasive setting. Aristotle's vexing and often elliptical treatment of the speaker's self-presentation in the Rhetoric, for example, repeatedly skirts the issue of delivery and stops just short of an admission that character and style are mutually determining. This circumspect treatment of the topic echoes an awareness that Plato sought to raise regarding the pleasures of speech performance. In the Gorgias, for example, Socrates argues that tragedy aims at pleasure and that, stripped of its music and meter, tragic poetry is essentially public oratory (502b-d). This awareness of the distractingly pleasurable (and therefore potentially dangerous) power of oral performance unquestionably predated both Plato and Aristotle. Thucydides and the tragic poets themselves express concern that a crowd-pleasing, sweet-speaking, attractive character might sway an audience to commit unscrupulous and immoral acts. In fifth-century Athens ideas about style did not, then, develop in a morally neutral and uncharged setting. Rather, they surfaced coincident with a growing realization among elites of how much power any sophist or demagogue might accumulate by the display of a winning style in public settings. This style made use of conventional notions of type to forge a speaking style and visible character that would seem familiar and therefore persuasive to citizens. In an oral culture like that of the archaic period and later in a "performance culture" like Athens, the attributes of a person that one could literally witness in his deportment, speech habits, and significant actions would have loomed larger than more abstract conceptions of his character. Style in Literary Representation Most of the oral settings that this study analyses are embedded in literary narratives and are products of a mythohistorical tradition.These literary depictions anticipate many distinctions drawn in later technical discussions, but they do not necessarily adhere to narrower understandings of stylistic type. In his book on Greek prose style, Kenneth Dover makes a useful distinction between lexical style and what he calls "style at the level of invention." This involves broader choices about approach and presentation in written composition than those that could be strictly categorized as lexical. It thus includes elements important to an analysis of style in literary settings that predate Aristotle. A poet or prose writer may depict a character's style by giving him certain figures of speech and phrasing, but his style may also be indicated by certain types of arguments, structuring devices, and techniques of characterization such as slander or, conversely, self-praise. In earlier literature, speeches often borrow effects from ritual contexts, such as the cadences of prayer (or curse) or the elegaic lyricism of lamentation.These portrayals of a character's speaking style sometimes also include visual details such as facial expression, gesture, or dress. Because these verbal and visual cues contribute importantly to the reception of the speaker by the audience internal to the narrative, addressing them should bring us closer to capturing the wide range of stylistic effects in predominantly oral settings. Indeed, it should not be surprising that most of the literary depictions considered here utilize broader, more fluid, and more emblematic categories of stylistic type than those of the fourth-century theorists and later writers. Since this study looks beyond discussions that isolate style as an area of inquiry as such, it is not restricted to or even primarily concerned with vocabulary that seems technical in any narrow sense. Instead, it explores in detail the vocabulary and imagery that poets and prose writers employ in representing verbal and visual elements in speech performance. More precisely, this book considers how internal narrators and characters in performed texts make use of and react to style: what strategies they undertake to insure their good reception; how they characterize what they are doing; when they call attention to this process; and what conclusions about moral worth or status they draw from it. This is, moreover, an essentially literary study. Although it makes use of concepts from sociological and performance theory, for the most part it emphasizes representations rather than reality and understands literature as a refraction (rather than a reflection) of lived life. Its discussions trace the semiotic patterns in literary depictions that pertain to ideas about style and character type and elucidate the ways these depictions arrange significant objects and verbal imagery around the apprehension of style in oral performance. From this perspective, Helen is less a character with a history and "lifelike" personality then a trope for the sensory impact of style, while Odysseus signifies the authorial function in the suitable alternation of stylistic types. In addition, the literary representations on which I focus embed attitudes toward actual performers in settings that highlight schematic differences among types. Homologies are thus repeatedly suggested between the author-performers and those characters in their compositions who serve some sort of authorial function, whether as an active formulator or an object of discourse. In the classical period, such homologies evolved into the use of Homeric characters in particular as types emblematic of different oratorical styles. This highly literate schema would suggest that even the performances of historical figures were assessed in relation to the tropes of oral composition and that whatever constituted the real" features of those performances were organized by the tradition in relation to ideas about visuality and persuasive style. I am thus less concerned with such historical details than with the uses that poets and prose writers make of those figures who stand in for ideas about style. Some of these uses offer little evidence of the actual styles of performers but instead highlight the visual patterns that structure ancient thinking about style and moral type. Nevertheless, because these oral performances are depicted as social phenomena, and thus are organized by social habits and hierarchies, Bourdieu's observations (and to a lesser extent those of Butler and Foucault) offer helpful guidelines for assessing the semiotic patterns that organize the literary representations. The literary imagery clearly treats everyday life as structured by such public performances and embraces larger ideas about self-presentation, about the body as a visible map of social status and about speech as an instrument of power. The Relevance of Helen and Odysseus One of the central paradoxes of style in the ancient setting is that those figures who are depicted as speaking against type, as combining types, or as using types as disguises best crystallize ideas about the interaction of style and character in the speaker's self-presentation. Any transgressions of type or setting that the speaker might commit often result in suspicious or negative reactions from the interlocutor or internal audience. Thus the ways in which gender and class categories contribute to molding typical styles come into focus at these moments of transgression. It is then that a speaker effectively reveals the mechanics of stylized self-performance by combining conventional locutions or alternating familiar stances, which the audience may apprehend as a mismatch between speaker and type. This itself may lead to a recognization that style is mutable and therefore not to be trusted as an accurate measure of moral or social status, let alone identity. In earlier literature this emphasis on visual assessment did not necessarily entail a general devaluation of visible details as distracting or deceitful, although certain female characters in archaic poetry do suggest the dangers that may lie in being distracted by bodily adornment. Especially in Homer, heroes for the most part look as they are: they wear their forceful types like their armor, as a set of visually identifiable attributes. Thus it is the unusual mismatch between how one presents oneself and who one is that arouses concern about typical style as a distracting or misleading cloak for one's character. Changeable and attractive types such as Helen and Odysseus embody this concern. It is only in the literature of the late fifth century, however, that any widespread anxiety can be detected among Athenian writers about the ramifications of the potential for appearances to be deceptive. Before then, internal audiences react to the visual and verbal mannerisms of a speaker's self-presentation as clearly affecting the meaning of his speech, but with only the rare acknowledgment that this style may have been assumed for the occasion. In Greek literature, the figures of Odysseus and Helen increasingly serve to focus anxiety about the potential for distraction or outright deception inherent in this visually oriented means of identifying a speaker as a particular type. I am not proposing that the depictions of these two figures in Greek poetry and prose comprise all that is said about style in any of these periods. This is not true by any means. But their depictions include some of the most essential clues to the development of ideas about style and visible type. They also demonstrate forcefully the connection of these ideas in fifth-century Athens to a concern that the versatile character may also "dress up" in some way and thus dissemble as to his true type to win his (possibly immoral) way. These depictions of Helen and Odysseus thus provide the most useful indicators of how ancient writers thought about visible style and character for a paradoxical reason: the motivations and sometimes even the identities of both tend to be obscure, diffficult to pin down, changeable, and contradictory. They are liars and imitators, effective storytellers, and adept users of costume. Perhaps precisely because the sophist Gorgias and his students champion them, for the dramatic poets, Helen and Odysseus embody doubts about how speaking style, dress, and deportment may distract from the true or precise recounting of events. These doubts arise from the nascent awareness that style itself may be similarly changeable, detachable from the individual like the persona, the "cast" of character type. In the fifth century some of this awareness was most likely the result of exposure to sophistic ideas about effective speaking. Both the idea that virtue (aretê) could be taught and the practice of arguing on both sides of an issue encouraged an understanding of a speaker's character as malleable and manufactured rather than inherent or natural. The dramatists for the most part seem to have agreed with the suspicion nursed by many members of the educated elite that sophistic training made dangerously versatile leaders out of citizens with strong speaking abilities and weak morals. They most often depict both Helen and Odysseus as smooth-talking purveyors of evil-doing (kokourgia,Tro. 966-968) and profligate behavior (panourgia,Phil. 407-409). Responses of the internal audiences to them register discomfort at the possibility that a fine speaking style may mask an inner disorder, that the beautiful (kalos) style may be no more than the special craft of a base (kokos) speaker. These familiar details are not offered not as a prelude to tracing the histories of Helen and Odysseus; this has been analyzed in depth by scholars. I am interested only in those details of their narratives that indicate archaic and classical attitudes toward style. Roland Barthes' distinction between character and figure may help to clarify this focus. According to Barthes, a character is a combination of semes with a proper name (or an "I") and an evolution in narrative time. A figure, in contrast, is an atemporal, impersonal entity composed of symbolic relationships. The signature feature of Helen's figure is a beauty both dangerous and immortal, but she is also depicted as the embodiment of something equally threatening and attractive: an enchanting style of self-presentation. Depictions of her character do not merely show her engaging in this typical style; more importantly, she is emblematic of it. The details of her figure thus indicate a visualizing scheme, a metonymic emblem that points to certain conceptions of style. She eventually comes to signify the sensory impact of style and more particularly the visually enchanting, elaborate style typical of the grand sophistic display. Similarly, in Homer and later writers Odysseus' figure crystallizes the recognition that one's visibly identifiable character may be detachable from who one really is. The speaker adept at donning physical disguises and dissembling verbal styles may thereby appear preeminently suitable to whatever audience he faces. Because this versatile suitability is the central rhetorical feature that Odysseus embodies, I address only those details of his narrative that highlight this aspect of his figure. The Organization of the Book Chapter 1, "Kosmos and the Typical Casts of Character," outlines the central set of associations that shapes ideas about style and character type in the archaic and classical periods. The chapter first reviews the ancient vocabulary that helps to delineate style as a "cast" of character in these periods. Three terms receive the most attention: kosmos, which embraces the kind of visualized ordering of parts that style entails; êthos, a common word for character that sometimes has moral implications; and charaktêr, which I argue denotes more emphatically the visible cast of type demarcated in public self-presentation. Chapter 2, "Oral Performance, Speech Types, and Typical Styles in Homer," looks to Homeric epic for information about how the orality of early Greek literature helped to shape an understanding of the linguistic aspects of bodily hexis in the persuasive setting. I analyze how Homer presents Helen and Odysseus as adept controllers of sense impressions, and thus as shapers of what their audiences actually see. Homer's portraits of these characters in oral performance thus establish some early parameters for the assessment of stylistic concerns such as likeness and suitability, as well as for the way these elements might contribute to misleading an audience regarding one's motivations or one's type. Chapter 3, "Visible Types and Visualizing Styles in Archaic Poetry," considers more extensively how the visible elements of oral performance affect the audience's reaction to the speaker. I first address broader concepts about bodily ornament and moral type and then narrow the inquiry to consider how Homer associates Helen and Odysseus with modes of costuming and disguise that parallel their elusive speaking styles. Because the archaic poets tend to associate stylistic effect especially with the visual delights of the female body, this chapter also considers how poets' depictions of the dangerous pleasures of feminine beauty ultimately contributes to an understanding of style as similarly suspect. If the archaic poets align style with sensory delights, and especially with the titillation of the eye, writers of tragedy focus on the moral difflculties that attend the effective performance of the versatile character. In chapter 4, "Verbal Masquerade and Visual Impact in Tragedy," I examine why dramatists tend to represent Helen and Odysseus as arousing moral recoil in their interlocutors. Because of their use of dissembling and changeable selfpresentations, their very appearance on stage initiates questions about the accuracy of the visual apprehension of type. In drama this concern takes on an added metatheatrical significance, since this is the genre of spectacle and enactment, where the audience can actually witness the performance of type. The rhetorical theorists treat Helen as a figure emblematic of sensual verbal appeal and Odysseus as an adept manipulator of audience perception. The fictional speeches that the sophist Gorgias and his students composed to illustrate certain aspects of their argumentative techniques continue the archaic attention to sensory impact. Chapter 5, "Manipulating the Senses in Rhetorical Set Pieces," explores the ways in which the figures of Helen and Odysseus are used to highlight the effects that showy, versatile speakers have on sense perception. This quasi-physical impact strongly influences what visible type that speaker appears to be. A brief conclusion indicates the importance of the imagery analyzed in the book for later rhetorical theory.
<urn:uuid:ba0d97d6-d300-4179-9b5d-4352fdb09823>
CC-MAIN-2016-26
http://utpress.utexas.edu/index.php/books/worcas
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783394605.61/warc/CC-MAIN-20160624154954-00167-ip-10-164-35-72.ec2.internal.warc.gz
en
0.953836
7,575
2.578125
3
The Persian Grammar Guide is a free online resource for Persian language learners. The grammar guides have been created with the aid and resources available at San Diego State University’s Language Acquisition Resource Center (LARC) in order to allow Persian language learners the opportunity to build on their learning experience through an interactive, comprehensive, and self-paced online resource, filled with descriptions, examples, audio, and activities. You can click through the Alphabet to learn the names and sounds of each letter in the Persian alphabet, then try your hand at spelling some of the basic words introduced throughout the project. The rest of the grammar section is divided into parts of speech. These are comprehensive grammar guides that are meant to aid Persian learners by explaining the rules of the language. They are not lessons in themselves but resources to refer to in order to understand Persian language structure. Each of these sections will include descriptions of the parts of speech in English, as well as the names for them in Persian. You will also look through examples and get the chance to practice what you are learning.
<urn:uuid:8b2d6ec8-096e-4463-b7b1-d3bb673b78b7>
CC-MAIN-2016-26
http://persian.sdsu.edu/index.php
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397795.31/warc/CC-MAIN-20160624154957-00137-ip-10-164-35-72.ec2.internal.warc.gz
en
0.946769
215
2.796875
3
Pioneers, Ploughs, and Politics: New Brunswick Planned Settlements | New Denmark Excerpts from A Hand-Book of Information for Emigrants to New-Brunswick / by M. H. Perley, Esq. – 1857. – 7 pp. of textual records. At the time his handbook was published, Perley was acting as Her Majesty’s emigration officer at Saint John, N.B. Here he outlines how land in New Brunswick can be obtained either by purchase or by working on public roads. He also offers general information on passage tickets, the best time of arrival, demand for labour, clearing of wild land, taxes, and diseases. Perley’s handbook and others like it were distributed overseas to prospective immigrants, most especially to farm labourers and domestic servants. MC80-186, PANB. (pp. A and 84-89). Note: Certain restrictions apply to the use of these images. Please consult our usage policy.
<urn:uuid:51d0c34a-afd7-47ac-baa3-5dc3284a035b>
CC-MAIN-2016-26
http://archives.gnb.ca/Exhibits/PlannedSettlements/ImageList.aspx?culture=en-CA&Link=MC80-186-1of7&t=Introduction&title=Calling+all+Farmers&p=10&of=17
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403826.29/warc/CC-MAIN-20160624155003-00051-ip-10-164-35-72.ec2.internal.warc.gz
en
0.930658
209
2.6875
3
Dr. William Reeves, M.D. Past Director of the CDC’s CFS Research program Not An Easy Process! Diagnosing chronic fatigue syndrome (ME/CFS) is not always easy. Because no laboratory tests are diagnostic for it diagnosing chronic fatigue syndrome (ME/CFS) involves having a physician examine your symptoms and excluding other diseases that could cause them. Your physician will take your personal history, probably asking questions such as: - When did your fatigue start? - How have your energy and activity levels been affected? - Are your symptoms worse after you exercise? - Do you have any problems with sleep? - Do you have any problems with memory or concentration? - Do you have any pain? - What prescription or over the counter medications are you taking? - Do you use drugs or drink alcohol? - Have you been under increased stress lately? Ruling Out Other Diseases Because many CFS symptoms are fairly general a key part of a diagnosis involves ruling out other diseases that could cause them such as mononucleosis, multiple sclerosis, chronic Lyme disease, sleep disorders, severe obesity and reactions to medications. Physicians may use the criteria below to determine if you have it. - Dig Deeper! Check out I’m Fatigued – Do I have chronic fatigue syndrome (ME/CFS)? The 1994 International (“Fukuda”) Definition For Chronic Fatigue Syndrome The Fukuda definition was created for researchers and physicians. Although widely recognized as inadequate the Fukuda definition is nevertheless the most widely used definition of this disease. (See the Canadian Consensus Definition below for an alternative definition designed for physicians). According to the Fukuda definition a person is considered to have ME/CFS if they have: Chronic Fatigue: unexplained, persistent or relapsing chronic fatigue that is not substantially alleviated by rest, and results in substantial reductions in levels of occupational, educational, social, or personal activities; and A Certain Set of Symptoms: four or more of the following symptoms for 6 or more consecutive months - self-reported impairment in short-term memory or concentration - post-exertional malaise (extreme, prolonged exhaustion and exacerbation of symptoms following physical or mental exertion) - unrefreshing sleep - muscle pain - multi-joint pain without joint swelling or redness - sore throat - tender neck lymph nodes - headaches of a new type, pattern, or severity A Detailed Medical History: The CDC recommends physicians give potential CFS patients a thorough physical examination and mental screening including the following tests : Laboratory Tests: urinalysis, total protein, glucose, C-reactive protein, phosphorous, electrolytes, complete blood count (CBC) with leukocyte differential, alkaline phosphatase (ALP), creatinine, blood urea nitrogen (BUN), albumin, ANA and rheumatoid factor, globulin, calcium alanine aminotransferase (ALT) or aspartate transaminase serum (AST), thyroid function tests (TSH and Free T4). Take An Online Test Only a physician can diagnose CFS. The CFIDS Association of America provides, however, an online questionnaire that can help people understand whether or not they may have CFS. - Dig Deeper: For more on the controversy on how to define chronic fatigue syndrome (ME/CFS) see ‘Hitting a Moving Target: Defining Chronic Fatigue Syndrome’ - Dig Deeper: The Canadian Consensus Criteria (CCC) – In contrast to the standard research definition of CFS, the Fukuda Definition, the CCC was written by ME/CFS professionals for physicians. A long document produced in 2003, it provides a more or less complete picture of the disease and is preferred by many doctors and patients. The CCC posits that postexertional malaise and cognitive problems are hallmarks of this disorder. In 2011 it was superseded with the publication of its updated version, the International Consensus Criteria (ICC). - Dig Deeper: The Pediatric Definition – was developed under the auspices of International Association of chronic fatigue syndrome/ ME (IACFS/ME). It describes how the disease appears in children and is very similar to the Canadian Consensus Definition - Dig Deeper: The ‘Empirical Definition‘ was developed in 2005 by a small group of researchers at the Centers for Disease Control. The Empirical Definition introduced emotional criteria, reduced the criteria for fatigue and created an algorithm based on standardized testing physicians and researchers could use to identify chronic fatigue syndrome patients. This definition resulted in greatly increased prevalence rates and has been much criticized ; it has not been adopted by either physicians or researchers. - Dig Deeper: The International Consensus Criteria (2011) – is an updated version of the Canadian Consensus Criteria
<urn:uuid:facda20c-35cf-4349-9701-4c287f2efa3d>
CC-MAIN-2016-26
http://phoenixrising.me/mecfs-basics/a-guide-to-diagnosing-chronic-fatigue-syndrome-mecfs-2
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783392069.78/warc/CC-MAIN-20160624154952-00159-ip-10-164-35-72.ec2.internal.warc.gz
en
0.899972
1,027
3.03125
3
A risk factor is something that increases your likelihood of getting a disease or condition. It is possible to develop low back pain or sciatica with or without the risk factors listed below. However, the more risk factors you have, the greater your likelihood of developing low back pain or sciatica. If you have a number of risk factors, ask your doctor what you can do to reduce your risk. Risk factors include: Overuse of the back muscles during any activity. Scoliosis is an abnormal curvature of the spine that can cause low back pain, especially in adults. Muscles that support the back can become weak with lack of exercise. Work that requires the following motions puts additional stress on the back: - Heavy lifting - Bending or twisting - Exposure to vibrations, such as riding in a car or operating heavy machinery - Injuries from contact sports or falls can result in back pain - High-impact sports, such as distance running Smoking may cause discs in the spine to wear down. Maintaining a healthy weight is important for your overall health. Extra weight can increase pressure on the spinal muscles and discs. When you lift objects with your back muscles instead of the stronger muscles in your legs, you increase your risk of back injury. As you grow older, the discs in your back begin to lose water content and degenerate. This increases the risk of disc problems and back pain, especially after age 40. However, even with some disc degeneration, most people do not have back pain. Stress, anxiety, and negative mood may increase your risk of low back pain. - Reviewer: Laura Lei-Rivera, DPT - Review Date: 12/2015 - - Update Date: 12/20/2014 -
<urn:uuid:3c84c1dd-b256-42b7-a44a-4c34b4004a12>
CC-MAIN-2016-26
http://wesleymc.com/hl/?/19757/Medications-for-Low-Back-Pain-and-Sciatica~Risk-Factors
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402746.23/warc/CC-MAIN-20160624155002-00043-ip-10-164-35-72.ec2.internal.warc.gz
en
0.931721
371
2.828125
3
You are not currently logged in. Access your personal account or get JSTOR access through your library or other institution: Ruffed and Blue Grouse Habitat Use in Southeastern Idaho F. Stauffer and Steven R. Peterson The Journal of Wildlife Management Vol. 49, No. 2 (Apr., 1985), pp. 459-466 Stable URL: http://www.jstor.org/stable/3801552 Page Count: 8 Preview not available Seasonal trends in ruffed (Bonasa umbellus) and blue (Dendragapus obscurus) grouse habitat selection are summarized for all seasons. Ruffed grouse preferred stands dominated by quaking aspen (Populus tremuloides). Ruffed grouse use was associated with stand structures characteristic of early successional stages. Blue grouse preferred high elevation (>2,285 m) open conifer stands in winter. In spring and summer, low elevation (<2,100 m) bigtooth maple (Acer grandidentatum), curlleaf mountainmahogany (Cercocarpus ledifolius), and mixed shrub stands with an open understory and overstory were selected for breeding and brood rearing. Little overlap in habitat use between ruffed and blue grouse was observed; in all seasons, blue grouse selected habitats more open than those used by ruffed grouse. The Journal of Wildlife Management © 1985 Wiley
<urn:uuid:15fb1346-59fe-4809-8448-1771c302d658>
CC-MAIN-2016-26
http://www.jstor.org/stable/3801552
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397865.91/warc/CC-MAIN-20160624154957-00159-ip-10-164-35-72.ec2.internal.warc.gz
en
0.846325
302
2.765625
3
Network With Us Join us on Facebook to get the latest news and updates. The educators you see on ReadWriteThink are working to improve literacy learning for every student. Check out their stories for inspiration. ReadWriteThink couldn't publish all of this great content without literacy experts to write and review for us. If you've got lessons plans, videos, activities, or other ideas you'd like to contribute, we'd love to hear from you. |Contributions on ReadWriteThink.org| Grades K – 2 | Lesson Plan | Recurring Lesson This lesson provides a wealth of ideas for using notes in the classroom to promote authentic writing among children.
<urn:uuid:de9429dd-b880-41c3-96ca-636654972024>
CC-MAIN-2016-26
http://www.readwritethink.org/about/bio/jenifer-katahira-97.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399117.38/warc/CC-MAIN-20160624154959-00006-ip-10-164-35-72.ec2.internal.warc.gz
en
0.851777
139
3.09375
3
History of Valgora (Valgora Supplement) From D&D Wiki History of Valgora Valgora has a vast and complex history, with parts of the far past forgotten to all but a few well-traveled adventurers. The world has seen much, and will see much more. Understanding Valgorian Dates All cultures of Valgora have adopted a universal time system. The system revolves around the planet's position and orbiting of its Sun. Every cycle the planet makes is a year. Each year includes 365 Days, with a leap year every four years that includes one extra day. There are 12 months in a year with a fluctuating amount of days. Each week consists of Seven days. The 12 months of the year are as follows (in order of their yearly occurrence): Kathend, Caex, Aussir, Ner, Throden, Ux, Edar, Loreat, Osind, Wux, Murth and Charir. Each week contains seven days, which, in order of weekly occurance, are as follows: Earenk, Yrev, Unsinti, Vignar, Pok, Kosi, and Zyak. A typical commoner works from breakfast through dinner with a short lunch break from Earenk through Pok and enjoys family time on Kosi and Zyak. Depending on one's religious views, faith-based gatherings can be a daily occurrence or as little as never, and are not bound to the thoughts of days or time. Valgorian Dating System Valgora uses the Dated Year system. There are two ways to classify a year in the Valgorian system: Dated (DY for dated year) and Undated (UY). Undated years are typically before recorded history or used for close guesses. Valgorian Historic Periods The Forgotten Times - 1492-2028 UY Long ago, legend tells of a different world. The lands were spread out as the mighty sea roared between Ghikva and Malsvir, and society was bleak. Not much is known of the time before the tidal change. What is known is sporadic information picked up from the few remaining artifacts that lie in the hidden corners of the world, and at the deepest bottoms of the ocean's floor. The human population was known to be the only major population, if not the only, as no sign of non-human life has yet emerged through historical dig sites. The only solid fact is that society had fell into an immoral lifestyle, and was punished. Not by a Deity of any sort, but by the first known coming of non-human life. The Radiant Dragon Talamon came into being through unknown methods. A creature of great power and good intentions, he was saddened at the loss of heart of the world. Thus, he sought out the few good souls remaining, and took them to a far away continent. He told them to rebuild the world into a better place. The rest of the world, Talamon wiped clean. Using his final breath and prayers, he pull together the lands of the world from the distances of the ocean into the super mass they are now, so that all could live together. Without a mate, he also produced one solitary egg. It is known that through generations, Valgora has always lived under the presence of but one Radiant Dragon, and peace, at least for the most part, has remained since the great tidal change. - DM Note - The "Forgotten Past" era - which is set in a alternate future of Earth in the year 2055, can be played using the D20 Modern System. That setting is available here. The Exploratory years and the Discovery of Hesjing - 6128-8743 DY Around 4,000 years after the great tidal change, the world had forgotten its past. History became myth, and rotted away in rare scrolls in back alley libraries, labeled Novels. Humans lived beside unnumbered other races, and all races had an inborn thirst for adventure and discovery. It was with this discovery that sailors finally began to explore the sea again. Within years, the only other major land, the Island of Hesjing, was discovered. In time, with the advancement of ship-technology, Hesjing's location would become barely a two-hour trip from the nearest points on the mainland, and it nestled roughly between Ghikva and Malsvir's main border. This fact led to it quickly becoming a vast port city, hosting great commerce and the most exotic market in the known world. Hesjing, to this day, has never been deemed as a country in its own right, but has always held home to the reigning City-State rule of its port city Talara. The only other settlements on the island, a farming village and a druidic encampment, found no harm in this and have always willingly been under Talaran law. Eventually, Corsdin, the current living Radiant Dragon, made his way to the piece of land that didn't quite make it all the way back under his ancestor's prayer: the Island of Hesjing. He loved it so much he made its major mountain: Mt. Hurthi, his new home. It is from the place that all of his kind have lived since. Corsdin took great joy in conversing with the residents of the newly formed Talara, and it was with great pride that he appointed its first Urathear, or King, of Talara. After great studies of the people of the Island, he choose Rian Caex, a local blacksmith, as the Urathear of Talara. Rian was a good soul with a wise mind, and since that day, his line has always ruled Talara in the most noble and just of manners. The tidings of War and Modern Day - 8743-8801 DY Sadly, peace is not an immortal thing. In recent years, rumors have begun to amass that Thraun, heir to the throne of Malsvir, wishes to control more land than his father does. He has been amassing an army for many years. As of current, the army is not quite ready for war. However, the knowledge of this has led to fear and paranoia throughout the world, and many communities have begun to train themselves for war as well. Because of this, weapon smiths and armor-smiths have created thousands of new and fascinating equipment with the new found wealth they have earned, as every day commoner's begin to purchase items to defend themselves. Velor, the current living Radiant Dragon, is quite aware of the change in thought, but has not yet spoke about it to anyone. His thoughts are still unknown, as are his intentions. |Valgora Campaign Settingv| |Player's Handbook||Races, Magic, Equipment, Military, Law & Honor, Waste Walker's Handbook, Seafarer's Handbook, Planewalker's Handbook| |World Reference||History, Ghikva, Malsvir, Talara, Notable Dungeons, Notable Towns & Cities, Notable Spans of Wilderness, Cosmology, Organizations, NPCs, Deities, Distant Past| |Dungeon Master's Guide|| Monsters, Adventures, Cartography, Unearthed Arcana| D&DWiki Project: Adding to Valgora, About, Things to Do
<urn:uuid:66f980c3-12c6-4fb9-b009-14a33f11f7a9>
CC-MAIN-2016-26
http://www.dandwiki.com/wiki/History_of_Valgora_(Valgora_Supplement)
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783400031.51/warc/CC-MAIN-20160624155000-00067-ip-10-164-35-72.ec2.internal.warc.gz
en
0.968569
1,528
2.90625
3
Design, setting and participants: Retrospective cross-sectional study of all singleton births at 37–42 weeks’ gestation, excluding those with congenital abnormalities and intrapartum stillbirths, between 1 June 2001 and 31 May 2011 at Southern Health, a large metropolitan maternity service in Melbourne, Australia. Results: Among 44 326 births, there was a significant difference in the stillbirth rate by maternal country of birth (P < 0.001). The rate of stillbirth per 1000 births was 1.48 among Australian-born women, 3.55 among South Asian-born women and 1.06 among South-East–East Asian-born women. Women born in South Asia were 2.4 (95% CI, 1.4–4.0) times more likely to have a late-pregnancy stillbirth than women born in Australia (P < 0.001). There was no significant difference between women born in Australia and women born in South-East–East Asia (P = 0.34). Adjusting for potential confounding factors, South Asian maternal birth remained an independent risk factor for stillbirth (adjusted odds ratio, 2.5; 95% CI, 1.3–5.1; P = 0.009). Conclusion: Women born in South Asia have an increased risk of antepartum stillbirth in late pregnancy, compared with other women. This observation may have implications for the delivery of pregnancy care in Australia. Australia has among the world’s lowest maternal and perinatal mortality rates,1 with the latter more than halving over the past 40 years.2,3 However, as in other high-income countries, a decline in neonatal rather than fetal deaths has mainly contributed to falling rates, leading to calls for more attention to preventing stillbirth.4-7 Identified maternal risk factors for stillbirth, such as obesity, advanced age, social deprivation, smoking, primiparity, pre-existing diabetes, and hypertension,4,7-10 may provide a foundation for intervention strategies.6 A risk factor that has received less attention is maternal ethnicity. One in four Australian births is to a woman who was born overseas.3 The risk of these women having a stillbirth is 13% higher than for Australian-born women.3 The influence of migration on pregnancy outcomes has been reported elsewhere.11,12 Its impact on perinatal mortality is influenced by many confounding factors, including the reason for migration (eg, refugees from war, elective skilled migration), the country of origin and destination, language barriers and access to health care. A consistent finding is that women of South Asian origin have higher rates of perinatal loss than other women.11 In 1983, the risk of stillbirth in women giving birth in London was 60% higher for women born in the Indian subcontinent than for those born in the United Kingdom.13 Recent studies from the UK and the Netherlands showed that women of South Asian origin had an 80% higher risk of stillbirth than white women.14,15 Whether Asian women living in Australia have a higher risk of stillbirth than other women has not been reported. As migration to Australia from the Indian subcontinent has trebled over the past 10 years,16 and 10% of women giving birth in Australia today were born in Asia,3 we aimed to compare rates of late-pregnancy stillbirth in Asian-born and Australian-born women attending our maternity service. We retrospectively analysed birth outcomes for all women with a singleton pregnancy giving birth to a baby without a congenital abnormality at 37–42 weeks’ gestation at three metropolitan public hospitals (Monash Medical Centre, Dandenong Hospital, and Casey Hospital) in Southern Health between 1 June 2001 and 31 May 2011. We limited our analyses to late-pregnancy births to avoid confounding effects of ethnicity and preterm birth17 on stillbirth, and to exclude intrapartum losses, as the causes and risk factors of antepartum and intrapartum stillbirths differ.8 Data were extracted from the Birthing Outcomes System (BOS), an electronic database recording all births at ≥ 20 weeks’ gestation. For each birth, whether liveborn or stillborn, 46 data items are entered into the BOS by the attending midwife, with routine data validation. About half of all women giving birth at Southern Health during the study period were born overseas, in 178 countries. As our primary intent was to assess stillbirth risks in Asian women, we classified women into four regional groups according to their country of birth, as defined by the United Nations:18 Australia, South Asia, East Asia and South-East Asia (Box 1). We excluded all other women from our analyses. Statistical analyses were undertaken using Stata version 11 (StataCorp). Continuous data were assessed for normality and are expressed as means and standard deviations. Categorical data are expressed as counts and proportions. We used analysis of variance to compare parametric continuous variables and the χ2 test for categorical variables. In addition to maternal country of birth, maternal and obstetric variables relevant to stillbirth4,6,7,19 were included in logistic regression analyses: maternal age, parity, body mass index (BMI; data only available from January 2007 onwards), smoking during pregnancy, previous caesarean section, pre-pregnancy diabetes, gestational diabetes, renal disease, thyroid disease, hypertension, gestation at birth, spontaneous prelabour rupture of membranes, and birthweight. Univariable and multivariable logistic regression analyses generated crude and adjusted odds ratios (ORs) for the independent variables. To derive the most parsimonious model, we included the covariates that were significant at the univariable level in the multivariable logistic regression model. We used the likelihood ratio test, Akaike and Bayesian information criteria, and area under the curve statistics to select the final model. During the 10-year period, there were 44 326 singleton births of babies without known congenital abnormalities at 37–42 weeks’ gestation to women born in the regions of interest. Of these births, 28 380 (64.0%) were to Australian-born women, 6471 (14.6%) to South Asian-born women, 7407 (16.7%) to South-East Asian-born women, and 2068 (4.7%) to East Asian-born women. There were 75 antepartum stillbirths (1.69 per 1000 births): 42 to Australian-born women, 23 to South Asian-born women, eight to South-East Asian-born women, and two to East Asian-born women. As there was no significant difference in the stillbirth rate between South-East Asian-born and East Asian-born women (1.08 v 0.97 per 1000; χ2 = 0.02, df = 1, P = 0.89), these groups were combined into a South-East–East Asian-born group for subsequent analyses, accounting for 9475 births (21.4%) and 10 stillbirths. There was a statistically significant difference in the stillbirth rate between Australian-born, South Asian-born, and South-East–East Asian-born women (1.48, 3.55 and 1.06 per 1000, respectively; χ2 = 16.24, df = 2, P < 0.001). South Asian-born women had a stillbirth rate 2.4 times (95% CI, 1.4–4.0) higher than that of Australian-born women (χ2 = 12.12, df = 1, P < 0.001) and 3.4 times (95% CI, 1.6–7.1) higher than that of South-East–East Asian-born women (χ2 = 11.65, df = 1, P < 0.001). There was no significant difference in the stillbirth rates between Australian-born and South-East–East Asian-born women (χ2 = 0.93, df = 1, P = 0.34). The relative risk of stillbirth in South Asian-born women compared with Australian-born women increased progressively with gestation: 1.09 (95% CI, 0.30–3.93; P = 0.89) at 37 weeks, 1.55 (95% CI, 0.48–4.97; P = 0.45) at 38 weeks, 3.08 (95% CI, 1.04–9.21; P = 0.04) at 39 weeks, 3.12 (95% CI, 1.02–9.58; P = 0.04) at 40 weeks, and 4.74 (95% CI, 1.45–15.62; P = 0.01) at 41 weeks (insufficient data at 42 weeks). Compared with South Asian-born women, Australian-born women were more likely to have smoked during pregnancy (OR, 26.5; 95% CI, 20.6–34.3; P < 0.001), had a higher BMI, and were more likely to have hypertension (Box 2). In contrast, South Asian-born women were 2.8 times (95% CI, 2.6–3.2; P < 0.001) more likely than Australian women to develop gestational diabetes. The rate of low-birthweight (< 2500 g) babies was significantly higher among South Asian-born women than Australian-born women (Box 2). Univariable logistic regression identified South Asian maternal birth, maternal age ≥ 40 years, BMI ≥ 36 kg/m2, pre-pregnancy diabetes and birthweight < 2500 g as independent risk factors for antepartum stillbirth (Box 3). Using the most parsimonious model from goodness-of-fit statistics, South Asian maternal birth, birthweight < 2500 g and BMI ≥ 36 kg/m2 were the significant risk factors for stillbirth (Box 4). In this study, we found that South Asian-born women having a baby in a Victorian metropolitan maternity service were more than twice as likely to have a late-pregnancy antepartum stillbirth than either Australian-born or South-East–East Asian-born women attending the same service. The established risk factors for stillbirth in Australia did not explain this increased risk. These results support observations in other Western populations that women of South Asian origin have a higher risk of stillbirth than other women.12-15,20 However, the reasons for this difference remain obscure. Although it is a significant public health issue that some migrant women have significantly different pregnancy outcomes to non-migrant women, migration per se is not a risk factor for stillbirth.11,15,21 This is supported by our observation of similar stillbirth rates among South-East–East Asian-born and Australian-born women. Further, the South Asian women with a higher stillbirth rate in a recent UK study were not migrants but UK-born,14 suggesting that the risk of stillbirth in South Asian women may relate to their ethnicity and not to migration. We found differences between South Asian-born and Australian-born women with regard to several risk factors for stillbirth, but these differences did not explain the increased rate in South Asian-born women. This is important for two reasons. First, targeting modifiable risk factors such as smoking and obesity,7 while certainly important, would not be expected to afford the same returns in South Asian-born women as in Australian-born women. Second, the lack of relationship between South Asian origin and some of the established risk factors suggests that other mechanisms causing stillbirth are at play. The risk of stillbirth in late pregnancy has been found to increase earlier in South Asian women than in white women,14 leading to the suggestion that fetal surveillance or induction of labour should be considered at an earlier gestation in South Asian women.14,15 Our data confirm that the relative risk of stillbirth in South Asian-born women increases with advancing gestation, supporting consideration of an ethnicity-based intervention policy. Another feature of the South Asian-born women in our study is that, on average, they had smaller babies than other women, and a higher rate of low-birthweight (< 2500 g) babies. Small size at birth is a major risk factor for stillbirth.7,9,21 We found a low birthweight was associated with a sevenfold increased risk of stillbirth, although there were no differences in the rates of stillbirth among low-birthweight babies between the three groups of women. Nonetheless, that South Asian-born women had nearly twice the rate of low-birthweight babies than other women merits further investigation. Others have shown that differences in birthweight related to maternal factors such as race22 or stature23 probably do not simply reflect normal physiology but are pathological — the smaller babies born to United States-born black women or women of short stature, compared with the overall population, have increased risks of both stillbirth and neonatal death. This is important because the use of fetal growth charts customised by maternal characteristics, including ethnicity, has recently found increasing favour in clinical practice in the expectation that they will improve the detection of fetal growth restriction.24 However, such charts are based on the premise that differences in birthweight related to maternal attributes are physiological, not pathological. This may well be false.21,23,25 Indeed, if applied to a South Asian population, customised growth charts may impair the detection of fetal growth restriction and so increase the risk of stillbirth.14,22,25 The impact of the routine use of such charts on perinatal outcomes needs careful evaluation before they can be recommended for routine care.7 Our study has some limitations. Our dataset records maternal country of birth rather than ethnicity per se. Given that an increased risk of stillbirth has also been observed in UK-born women of South Asian descent,14 we believe that Australian datasets should collect information on both maternal country of birth and ethnicity, to afford the ability to tease apart their effects on pregnancy outcomes. Assessing ethnicity (in addition to country of birth) as a risk factor for stillbirth will become more important as the number of Australian-born women of South Asian descent increases, as has occurred in the UK.13,14 We urge that consideration be given to revisiting how national data regarding ethnicity and pregnancy outcome are collected. We were also unable to adjust for previous pregnancy complications, such as preterm birth, stillbirth, or growth restriction, or for socioeconomic status or access to care. Social disadvantage and inadequate care are recognised risk factors for stillbirth.9,13,21 However, as with European studies,13-15,20 the women in our study had free access to maternity care. Although we were unable to measure uptake of pregnancy care, lack of access to appropriate care is not a likely explanation for the observed differences. Future research should address socioeconomic characteristics and appropriate use of antenatal care as possible contributors to stillbirth risk across different ethnic groups. Last, we were unable to examine the attributable causes of each stillbirth to explore whether mechanisms of loss differed between ethnic groups. This would be worthwhile. In summary, we found that South Asian-born women had a significantly higher risk of late-pregnancy antepartum stillbirth than other women. This increased risk was not attributable to known risk factors for stillbirth, suggesting other causative mechanisms. In a racially diverse country like Australia, we believe that uncovering those mechanisms will be necessary to secure improvements in perinatal outcomes for all women. 2 Maternal characteristics and pregnancy outcomes, by woman’s region of birth* * Figures are number (%) unless otherwise specified. † BMI data only available from January 2007 onwards (25 326 women). ‡ Hypertensive disorders include pre-pregnancy hypertension, pregnancy-induced hypertension and pre-eclampsia. 3 Prevalence and odds ratios (ORs) of risk factors for late-pregnancy antepartum stillbirth 4 Adjusted odds ratios (ORs) of risk factors for late-pregnancy antepartum stillbirth
<urn:uuid:e70cc565-ce4f-4694-a7b5-8ef6434f3e42>
CC-MAIN-2016-26
https://www.mja.com.au/journal/2012/197/5/ethnicity-and-risk-late-pregnancy-stillbirth
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395548.53/warc/CC-MAIN-20160624154955-00201-ip-10-164-35-72.ec2.internal.warc.gz
en
0.962439
3,325
2.515625
3
Just for Parents Christian Discipleship: Living out the Church’s Social Teaching by Dan Mulhall The theme for Catholic Schools Week 2009 is “Celebrate Service.” This title was chosen, according to Karen Ristau, the president of the National Catholic Educational Association (NCEA) because “Civic engagement is a hallmark of Catholic education.” Catholic schools week is jointly sponsored by the US Conference of Catholic Bishops and by the NCEA. Christian service is such a big part of Catholic education—whether in the Catholic school, a parish program, or when parents teach their children at home—because Christian service is one of the primary ways that Catholics express their faith in Jesus Christ and live as his disciples. The principles behind Christian service are summarized into the body of teaching that is commonly called Catholic Social Teaching (CST). This teaching was collected and published by the Holy See’s Pontifical Council For Justice And Peace in the document The Compendium Of The Social Doctrine Of The Church (June 29, 2004). The US Bishops have also published a document to help us know, understand, and teach the Church’s social teaching. This document is called Sharing Catholic Social Teaching (1999). Catholic Social Teaching is a key part of the Church’s magisterial teaching (Catechism of the Catholic Church, paragraph 2037). It offers a systematic approach for finding solutions to the problems we face in our every day lives. The aim of this social teaching is to change the world through the actions and attitudes of Catholics everywhere: that’s what disciples of Jesus Christ are called to do! Catholic schools and catechetical programs focus on Christian service projects so that students and their parents can experience living out the Corporal or Spiritual Works of Mercy. Living Catholic Social Teaching helps to define both “who we are” and “whose we are.” The Church’s social doctrine developed over the last 120 years to express the tremendous changing that have occurred in the world during that time. This teaching has been explained in ten letters from the pope and gatherings of bishops to provide guidance for Christians to live in the modern world. The ten letters are Rerum Novarum (On Capital and Labor) 1891 Quadragesimo Anno (Reconstruction of the Social Order) 1931 Mater et Magistra (On Christianity and Social Progress) 1961 Pacem in Terris (Justice, Charity, Liberty) 1963 Gaudium et Spes (Pastoral Constitution on the Church in the Modern World) 1965 Populorum Progressio (On the Development of Peoples) 1967 Octogesima Adveniens (Eightieth Anniversary of Rerum Novarum) 1971 Justicia in Mundo (Justice in the World) 1971 Laborem Exercens (On Human Work) 1981 Sollicitudo rei socialis (On Social Concern) 1987 Centesimus Annus (Hundred Anniversary of Rerum Novarum) 1991 The US Bishops in their document Sharing Catholic Social Teaching summarize the CST into seven themes. These themes are - Life and Dignity of the Human Person - Call to Family, Community, and Participation - Rights and Responsibilities - Option for the Poor and Vulnerable - The Dignity of Work and the Rights of Workers - Care for God’s Creation These themes provide an easy shorthand to help us live as disciples. How can you help your students to - Treat everyone with dignity and respect whether they are illegal immigrants, on death row, or your next-door neighbor? - Live Christian lives as members of a community, whether that is in a family, a parish, a small town, or a mega-city? CST supports the rights and responsibilities of these communities and encourages Catholics to participate actively in them. - Recognize that all of God’s creation has rights and responsibilities that must be respected? - Care for those among us who are poor and vulnerable, those who are special in God’s eyes? The Church teaches that we should have a fundamental option in favor of the poor and vulnerable. This message comes from the Sermon on the Mount, Jesus’ teaching in Matthew 25, and the Church’s summary of this teaching found in the Corporal and Spiritual Works of Mercy. Use this worksheet [Joseph, Gr. 3, BAW SC p. 75 to be attached to the word worksheet] to help your students grow in awareness of this responsibility. - Protect the rights of workers so that they can experience work as a privilege, a way for humanity to participate in God’s creative efforts? Work should never become an unacceptable burden and workers have certain rights to what they produce and the means to produce them. - Stand together in solidarity to support all other human beings when they are being mistreated or abused in any way? There are no exceptions to this. This activity [Joseph—Faith First Legacy School, Gr. 6, pp. 235-236 to be attached to link] offers ways for your students to think about how they can stand in solidarity with others. - Love and respect all of God’s creation: animals, nature, even the Earth itself? Taken together, these seven themes of Catholic Social Teaching provide us with clear guidance as to how we are to live as disciples of Jesus. Just remember that the Church’s social teaching is not just a matter of following rules; it is a matter of following Jesus. CATHOLIC SCHOOLS: A CHOICE AND AN OBLIGATION Catholic Schools Week, celebrated each year in January, is a tradition that began in 1974. It celebrates the considerable achievement of the children, parents, teachers and administrators affiliated with the 8,000 Catholic schools throughout the United States. The celebration involves 2.5 million students and 165,000 teachers. So, as we once again recognize Catholic education and all its accomplishments, consider this: Why do you send your child to Catholic school? For many parents, the answer may be as simple as “I went to Catholic school so my children will also.” For others, the question resurfaces each year as you plan for the financial obligations involved. Perhaps you’ve been questioned about your choice by non-Catholic relatives. When we make school choices, we are entrusting our most precious treasure—our children—to those teachers and administrators. We trust them to provide a safe environment for our children. We expect our children to be physically safe and protected from ridicule and bullying. Fear is a major impediment to learning. Did you choose your Catholic school because it respects the dignity of every person and provides safety for your child? No matter how fine a school is, no school can compensate for what is lacking in the family. As parents we are responsible for the spiritual, emotional, moral, intellectual, and physical development of our children. While your Catholic school nurtures this development as well, it cannot and should not replace your obligation. Did you choose your Catholic school because it partners with you in fostering your child’s Education is an important element in every child’s life. Whether your child requires remedial assistance or eagerly searches out enrichment opportunities, you want that child to be in the best school possible. Did you choose your Catholic school because it provides a supportive as well as stimulating learning environment? Without a doubt, religion is an essential part of Catholic schools on many different levels. The powerful influence of living each school day in an atmosphere of gospel values and prayer is invaluable. Life lived in a school community of believers shapes behaviors and attitudes. Examining social studies and current events through the prism of faith adds a critical dimension to learning. Did you choose your Catholic school because of its religious focus? As you evaluate your reasons for choosing Catholic education, here are 5 things you can do to support your child and partner with your - Know your school principal. - Know and communicate with your child’s - Volunteer at your child’s school. - Participate in school programs and family events. - Support the school’s rules Most importantly, support your child’s religious formation by regularly praying and attending Mass as a
<urn:uuid:99359db1-b903-410f-9384-3d84e253b2f7>
CC-MAIN-2016-26
http://www.faithfirst.com/html/specials/csw/csw_jfp.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399428.8/warc/CC-MAIN-20160624154959-00044-ip-10-164-35-72.ec2.internal.warc.gz
en
0.936506
1,755
2.875
3
This study, published in the Journal of Applied Physiology, is the biggest randomized trial to measure revisions in body composition from three different types of exercise in overweight adults who do not have diabetes. Aerobic exercise, commonly know as "cardio", including running, walking, and swimming, has historically been established as a good way to lose weight. Recently, however, recommendations have pointed out that resistance training, such as weight lifting to build and perpetuate muscle mass, could also contribute to weight loss via boosting a person's resting metabolic level. An earlier study conducted by researchers at the University of Minnesota suggested that breast cancer survivors receive more benefits from weight training than from aerobic training. The researchers saw that strength training provided these participants with more help for their physical and emotional state than aerobic training. Previous studies have shown health advantages for resistance training, such as improving glucose control. However, research on the effects of resistance training on fat mass have not had significant conclusions. Leslie H. Willis, MS, an exercise physiologist at Duke Medicine and the study's lead author explained, "Given that approximately two-thirds of adults in the United States are overweight due to excess body fat, we want to offer clear, evidence-based exercise recommendations that will truly help people lose weight and body fat." The current study included 234 obese or overweight adults. Subjects were randomly given one of three exercise groups: aerobic training (nearly 12 miles per week), resistance training (three days per week of weight training, three sets per day, 8-12 repetitions per set), or aerobic and resistance training together (three days a week, three sets per day, 8-12 repetitions per set for resistance training, and around 12 miles per week of cardio). The exercise trainings were observed in order to accurately calculate how well the programs were followed by participants. From the study, 119 volunteers who finished their programs and had complete body composition data were examined to measure the effectiveness of each training program. The aerobic training and the aerobic plus resistance training groups collectively lost more weight than those who completed only resistance training. The group doing only resistance training gained weight because of a boost in lean body mass. Cardio exercise proved to be a more efficient type of exercise for losing body fat. The cardio group underwent an average of 133 minutes per week training and ended up losing weight. The resistance training group, on the other hand, spent around 180 minutes a week exercising without losing a pound. The group participating in both resistance and aerobic training spent double the time training and ended with a blended outcome. The program aided in weight loss and fat mass loss, however, it did not decrease body mass or fat mass with just cardio exercise alone. The combination group showed the largest reduction in waist circumference, which may be explained by the amount of time the subjects exercised. Resting metabolic rate, which decides the amount of calories burned while resting, was not directly calculated during this study. Previous hypotheses suggest that weight training can improve metabolic rates, resulting in weight loss. In this specific study, resistance training did not reduce fat mass or body weight significantly, regardless of any differences in resting metabolic rate. "No one type of exercise will be best for every health benefit. However, it might be time to reconsider the conventional wisdom that resistance training alone can induce changes in body mass or fat mass due to an increase in metabolism, as our study found no change." The investigators said that exercise suggestions are age-specific. For example, older adults with muscle atrophy have been seen to improve with resistance training. Younger, healthy adults who desire to lose weight will benefit more from aerobic training. Cris A. Slentz, PhD, a Duke exercise physiologist and study co-author concluded: "Balancing time commitments against health benefits, our study suggests that aerobic exercise is the best option for reducing fat mass and body mass. It's not that resistance training isn't good for you; it's just not very good at burning fat."
<urn:uuid:b702b041-b808-4b2a-adb2-890d85c9e260>
CC-MAIN-2016-26
http://www.medicalnewstoday.com/articles/254158.php
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399106.96/warc/CC-MAIN-20160624154959-00102-ip-10-164-35-72.ec2.internal.warc.gz
en
0.966326
811
3.171875
3
First detection of Phytophthora tropicalis in the continental United States Name: Phytophthora tropicalis Chromista : Oomycetes In North America, Phytophthora tropicalis has previously only been detected in Hawaii of the United States. Recently it was confirmed on leaves of Pieris japonica and Rhododendron catawbiense taken from a garden center in Virginia Beach, Virginia (VA) in 2004. Researchers at VA Polytechnic Institute and State University also confirmed Phytophthora isolates collected in 2000 and 2001 from irrigation water at a production nursery in Suffolk, VA as well as isolates from soil samples taken from two mixed-hardwood forests in Fairfax County, VA in 2002 to be Phytophthora tropicalis. Issues of Concern: Although damage to the nursery plants in VA were minimal, these findings demonstrate an expanding host range for Phytophthora tropicalis as well as the feasibility of irrigation water used in nurseries to be infested with Phytophthora species. Besides those reported above, Aragaki & Uchida (2001) reported P. tropicalis on Annona cherimola, Anthurium andraeanum, Carica papaya, Dianthus caryophyllus, Hedera helix, Leucospermum sp., Macadamia integrifolia, Radermachera sp., Sechium edule, Solanum melongena (all from Hawaii) and Theobroma cacao (from Brazil). It has also been reported on Artocarpus altilius from Brazil by Cequiera et al. (2005). There was also a report of it from Germany and the Netherlands on Cyclamen persicum (Gerlach & Schubert, 2001). If you have any further information about the distribution or hosts of this species, please let us know. Hong, C.X., Richardson, P.A., and P. Kong. 2006. Phytophthora tropicalis Isolated from Diseased Leaves of Pieris japonica and Rhododendron catawbiense and Found in Irrigation Water and Soil in Virginia. Plant Disease. 90(4): 525. Other references used: Aragaki, M. and J.Y. Uchida. 2001. Morphological distinctions between Phytophthora capsici and P. tropicalis sp. nov. Mycologia. 93: 137-145. Cerquiera, A.O, Luz, E.D.M.N, and J.T. De Souza. 2005. First record of Phytophthora tropicalis causing leaf blight and fruit rot on breadfruit in Brazil. New Disease Reports, Vol. 12. The British Society for Plant Pathology. Available online at: http://www.bspp.org.uk/ndr/jan2006/2005-73.asp Gerlach, W.W.P. and R. Schubert. 2001. A new wilt of cyclamen caused by Phytophthora tropicalis in Germany and the Netherlands. Plant Disease. 85: 334. Warning: The information in this alert has not been confirmed with the appropriate National Plant Protection Organization and is provided solely as an early warning. Please use the above information with caution.
<urn:uuid:779b7d4c-8877-4661-91d8-a83b79c658a8>
CC-MAIN-2016-26
http://www.pestalert.org/viewNewsAlert.cfm?naid=14
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396455.95/warc/CC-MAIN-20160624154956-00162-ip-10-164-35-72.ec2.internal.warc.gz
en
0.846976
694
2.65625
3
Mechanical ventilation in neonates - Eric C Eichenwald, MD Eric C Eichenwald, MD - Professor of Pediatrics - University of Texas Health Science Center The introduction of mechanical ventilation in the 1960s was one of the major new interventions in neonatology, which provided lifesaving support for infants with respiratory failure. Along with other technologic advancements, such as the administration of antepartum corticosteroids and replacement surfactant therapy, mechanical ventilation has led to improved neonatal survival, especially for preterm infants born less than 30 weeks gestation with immature lung function. (See "Incidence and mortality of the preterm infant".) Although mechanical ventilation can be lifesaving, it may cause chronic lung injury resulting in bronchopulmonary dysplasia (BPD), a major complication of prematurity. As a result, continued efforts have been focused upon development of new technology, including the use of early continuous positive airway pressure (CPAP) in preterm infants at risk for neonatal respiratory distress syndrome (RDS) and strategies for neonatal ventilator care to maintain adequate gas exchange but minimize lung damage. (See "Pathogenesis and clinical features of bronchopulmonary dysplasia" and "Prevention and treatment of respiratory distress syndrome in preterm infants", section on 'Nasal continuous positive airway pressure'.) Neonatal ventilator care, including the different types of mechanical ventilation and their advantages and disadvantages, will be reviewed here. Benefits — The principal benefits of neonatal mechanical ventilation during respiratory failure are as follows: ●Improve gas exchange, primarily by lung recruitment to improve ventilation/perfusion (V/Q) matching (see "Physiologic and pathophysiologic consequences of mechanical ventilation", section on 'Reduced shunt') - Cullen AB, Cooke PH, Driska SP, et al. The impact of mechanical ventilation on immature airway smooth muscle: functional, structural, histological, and molecular correlates. Biol Neonate 2006; 90:17. - Donn SM, Sinha SK. Minimising ventilator induced lung injury in preterm infants. Arch Dis Child Fetal Neonatal Ed 2006; 91:F226. - Bernstein G, Mannino FL, Heldt GP, et al. Randomized multicenter trial comparing synchronized and conventional intermittent mandatory ventilation in neonates. J Pediatr 1996; 128:453. - Firme SR, McEvoy CT, Alconcel C, et al. Episodes of hypoxemia during synchronized intermittent mandatory ventilation in ventilator-dependent very low birth weight infants. Pediatr Pulmonol 2005; 40:9. - Donn SM, Nicks JJ, Becker MA. Flow-synchronized ventilation of preterm infants with respiratory distress syndrome. J Perinatol 1994; 14:90. - Baumer JH. International randomised controlled trial of patient triggered ventilation in neonatal respiratory distress syndrome. Arch Dis Child Fetal Neonatal Ed 2000; 82:F5. - Beresford MW, Shaw NJ, Manning D. Randomised controlled trial of patient triggered and conventional fast rate ventilation in neonatal respiratory distress syndrome. Arch Dis Child Fetal Neonatal Ed 2000; 82:F14. - Greenough A, Dimitriou G, Prendergast M, Milner AD. Synchronized mechanical ventilation for respiratory support in newborn infants. Cochrane Database Syst Rev 2008; :CD000456. - Cleary JP, Bernstein G, Mannino FL, Heldt GP. Improved oxygenation during synchronized intermittent mandatory ventilation in neonates with respiratory distress syndrome: a randomized, crossover study. J Pediatr 1995; 126:407. - Ramanathan R, Sardesai S. Lung protective ventilatory strategies in very low birth weight infants. J Perinatol 2008; 28 Suppl 1:S41. - Claure N, Bancalari E. New modes of mechanical ventilation in the preterm newborn: evidence of benefit. Arch Dis Child Fetal Neonatal Ed 2007; 92:F508. - Osorio W, Claure N, D'Ugard C, et al. Effects of pressure support during an acute reduction of synchronized intermittent mandatory ventilation in preterm infants. J Perinatol 2005; 25:412. - Guthrie SO, Lynn C, Lafleur BJ, et al. A crossover analysis of mandatory minute ventilation compared to synchronized intermittent mandatory ventilation in neonates. J Perinatol 2005; 25:643. - Reyes ZC, Claure N, Tauscher MK, et al. Randomized, controlled trial comparing synchronized intermittent mandatory ventilation and synchronized intermittent mandatory ventilation plus pressure support in preterm infants. Pediatrics 2006; 118:1409. - Beck J, Reilly M, Grasselli G, et al. Patient-ventilator interaction during neurally adjusted ventilatory assist in low birth weight infants. Pediatr Res 2009; 65:663. - Lee J, Kim HS, Sohn JA, et al. Randomized crossover study of neurally adjusted ventilatory assist in preterm infants. J Pediatr 2012; 161:808. - Stein H, Firestone K. Application of neurally adjusted ventilatory assist in neonates. Semin Fetal Neonatal Med 2014; 19:60. - Keszler M, Abubakar K. Volume guarantee: stability of tidal volume and incidence of hypocarbia. Pediatr Pulmonol 2004; 38:240. - Bolivar JM, Gerhardt T, Gonzalez A, et al. Mechanisms for episodes of hypoxemia in preterm infants undergoing mechanical ventilation. J Pediatr 1995; 127:767. - Dreyfuss D, Soler P, Basset G, Saumon G. High inflation pressure pulmonary edema. Respective effects of high airway pressure, high tidal volume, and positive end-expiratory pressure. Am Rev Respir Dis 1988; 137:1159. - Hernandez LA, Peevy KJ, Moise AA, Parker JC. Chest wall restriction limits high airway pressure-induced lung injury in young rabbits. J Appl Physiol (1985) 1989; 66:2364. - Dreyfuss D, Saumon G. Ventilator-induced lung injury: lessons from experimental studies. Am J Respir Crit Care Med 1998; 157:294. - Klingenberg C, Wheeler KI, Owen LS, et al. An international survey of volume-targeted neonatal ventilation. Arch Dis Child Fetal Neonatal Ed 2011; 96:F146. - McCallion N, Davis PG, Morley CJ. Volume-targeted versus pressure-limited ventilation in the neonate. Cochrane Database Syst Rev 2005; :CD003666. - Grover A, Field D. Volume-targeted ventilation in the neonate: time to change? Arch Dis Child Fetal Neonatal Ed 2008; 93:F7. - Herrera CM, Gerhardt T, Claure N, et al. Effects of volume-guaranteed synchronized intermittent mandatory ventilation in preterm infants recovering from respiratory failure. Pediatrics 2002; 110:529. - McCallion N, Lau R, Morley CJ, Dargaville PA. Neonatal volume guarantee ventilation: effects of spontaneous breathing, triggered and untriggered inflations. Arch Dis Child Fetal Neonatal Ed 2008; 93:F36. - Wheeler K, Klingenberg C, McCallion N, et al. Volume-targeted versus pressure-limited ventilation in the neonate. Cochrane Database Syst Rev 2010; :CD003666. - Wheeler KI, Klingenberg C, Morley CJ, Davis PG. Volume-targeted versus pressure-limited ventilation for preterm infants: a systematic review and meta-analysis. Neonatology 2011; 100:219. - Davis PG, Morley CJ. Volume control: a logical solution to volutrauma? J Pediatr 2006; 149:290. - Sharma A, Milner AD, Greenough A. Performance of neonatal ventilators in volume targeted ventilation mode. Acta Paediatr 2007; 96:176. - Lista G, Castoldi F, Fontana P, et al. Lung inflammation in preterm infants with respiratory distress syndrome: effects of ventilation with different tidal volumes. Pediatr Pulmonol 2006; 41:357. - Yoder BA, Siler-Khodr T, Winter VT, Coalson JJ. High-frequency oscillatory ventilation: effects on lung function, mechanics, and airway cytokines in the immature baboon model for neonatal chronic lung disease. Am J Respir Crit Care Med 2000; 162:1867. - Cools F, Askie LM, Offringa M, et al. Elective high-frequency oscillatory versus conventional ventilation in preterm infants: a systematic review and meta-analysis of individual patients' data. Lancet 2010; 375:2082. - Elective high-frequency oscillatory ventilation versus conventional ventilation for acute pulmonary dysfunction in preterm infants. Neonatology 2013; 103:7. - Cools F, Henderson-Smart DJ, Offringa M, Askie LM. Elective high frequency oscillatory ventilation versus conventional ventilation for acute pulmonary dysfunction in preterm infants. Cochrane Database Syst Rev 2009; :CD000104. - Cools F, Offringa M, Askie LM. Elective high frequency oscillatory ventilation versus conventional ventilation for acute pulmonary dysfunction in preterm infants. Cochrane Database Syst Rev 2015; :CD000104. - Zivanovic S, Peacock J, Alcazar-Paris M, et al. Late outcomes of a randomized trial of high-frequency oscillation in neonates. N Engl J Med 2014; 370:1121. - Wiswell TE, Graziani LJ, Kornhauser MS, et al. High-frequency jet ventilation in the early management of respiratory distress syndrome is associated with a greater risk for adverse outcomes. Pediatrics 1996; 98:1035. - Rojas-Reyes MX, Orrego-Rojas PA. Rescue high-frequency jet ventilation versus conventional ventilation for severe pulmonary dysfunction in preterm infants. Cochrane Database Syst Rev 2015; 10:CD000437. - Randomized study of high-frequency oscillatory ventilation in infants with severe respiratory distress syndrome. HiFO Study Group. J Pediatr 1993; 122:609. - Keszler M, Donn SM, Bucciarelli RL, et al. Multicenter controlled trial comparing high-frequency jet ventilation and conventional mechanical ventilation in newborn infants with pulmonary interstitial emphysema. J Pediatr 1991; 119:85. - Lemyre B, Davis PG, De Paoli AG, Kirpalani H. Nasal intermittent positive pressure ventilation (NIPPV) versus nasal continuous positive airway pressure (NCPAP) for preterm neonates after extubation. Cochrane Database Syst Rev 2014; :CD003212. - Kirpalani H, Millar D, Lemyre B, et al. A trial comparing noninvasive ventilation strategies in preterm infants. N Engl J Med 2013; 369:611. - Bhandari V. Nasal intermittent positive pressure ventilation in the newborn: review of literature and evidence-based guidelines. J Perinatol 2010; 30:505. - Cummings JJ, Polin RA, Committee on Fetus and Newborn, American Academy of Pediatrics. Noninvasive Respiratory Support. Pediatrics 2016; 137. - Davis PG, Lemyre B, de Paoli AG. Nasal intermittent positive pressure ventilation (NIPPV) versus nasal continuous positive airway pressure (NCPAP) for preterm neonates after extubation. Cochrane Database Syst Rev 2001; :CD003212. - De Paoli AG, Davis PG, Lemyre B. Nasal continuous positive airway pressure versus nasal intermittent positive pressure ventilation for preterm neonates: a systematic review and meta-analysis. Acta Paediatr 2003; 92:70. - Khalaf MN, Brodsky N, Hurley J, Bhandari V. A prospective randomized, controlled trial comparing synchronized nasal intermittent positive pressure ventilation versus nasal continuous positive airway pressure as modes of extubation. Pediatrics 2001; 108:13. - Salvo V, Lista G, Lupo E, et al. Noninvasive ventilation strategies for early treatment of RDS in preterm infants: an RCT. Pediatrics 2015; 135:444. - Indications for ventilation - Types of ventilation - CONVENTIONAL VENTILATION - Types of conventional ventilators - Ventilatory mode: Initiation of breath - - Synchronized (patient-triggered) ventilation - Modality: Pressure-limited or volume-targeted ventilation - - Pressure-limited ventilation - Advantages and disadvantages - - Volume-targeted ventilation - Advantages and disadvantages - - Comparison between pressure- and volume-controlled ventilation - HIGH-FREQUENCY VENTILATION - Elective HFOV versus conventional ventilation - Elective HFJV versus conventional ventilation - Rescue HFV versus conventional ventilation - NONINVASIVE MECHANICAL VENTILATION - OUR APPROACH - INFORMATION FOR PATIENTS - SUMMARY AND RECOMMENDATIONS
<urn:uuid:44e5a422-fa1e-43de-b236-c681fcb7a939>
CC-MAIN-2016-26
http://www.uptodate.com/contents/mechanical-ventilation-in-neonates
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395548.53/warc/CC-MAIN-20160624154955-00140-ip-10-164-35-72.ec2.internal.warc.gz
en
0.716185
2,859
2.859375
3
The Opposing View Using '/' for paths in Perl gives almost no problems on DOS and Windows machines, because the underlying OS accepts / as a synonym for \ (most of the time). But is that true for all OS's and platforms? Like someone already said, it doesn't work on the Mac. The Perl interpreter itself might change / to : before calling the OS, but what about real /'s in file names, like "notes from 4/27/99"? What about :'s in the file name? A solid program should always use the native path separator and do so uniformly and consistantly. If that's not handy, Perl 6 will reportetly offer uniform URL support, so you can use file:// notation on files on any OS, with %xx for funny chars and / for seperators. There might also be a module that deals with paths as a collection of nodes and abstracts the actual syntax. And just because the OS takes / as an alias, or Perl translates for you behind the scenes, what happens to individual programs you invoke? In the COMMAND.COM shell, the / will parse wrong, as we saw on a recient posting. A program might get confused if / and \ are mixed in the same string. Who knows? you're at the mercy of whoever wrote that program! Posts are HTML formatted. Put <p> </p> tags around your paragraphs. Put <code> </code> tags around your code and data! Titles consisting of a single word are discouraged, and in most cases are disallowed outright. Read Where should I post X? if you're not absolutely sure you're posting in the right place. Please read these before you post! — Posts may use any of the Perl Monks Approved HTML tags: You may need to use entities for some characters, as follows. (Exception: Within code tags, you can put the characters literally.) - a, abbr, b, big, blockquote, br, caption, center, col, colgroup, dd, del, div, dl, dt, em, font, h1, h2, h3, h4, h5, h6, hr, i, ins, li, ol, p, pre, readmore, small, span, spoiler, strike, strong, sub, sup, table, tbody, td, tfoot, th, thead, tr, tt, u, ul, wbr Link using PerlMonks shortcuts! What shortcuts can I use for linking? See Writeup Formatting Tips and other pages linked from there for more info. | & || & | | < || < | | > || > | | [ || [ | | ] || ] ||
<urn:uuid:ad09eb5f-05e1-4765-828b-0ef56eedf3f0>
CC-MAIN-2016-26
http://www.perlmonks.org/index.pl?parent=110185;node_id=3333
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783404405.88/warc/CC-MAIN-20160624155004-00046-ip-10-164-35-72.ec2.internal.warc.gz
en
0.880927
583
2.90625
3
This page provides you with Quick Facts from the 2011 Census data releases on various topics. Information available includes facts from both the first and second data releases, including: - Population of Victoria (metropolitan Melbourne and regional Victoria) - Population growth and distribution - Growth in overseas born population - Household types - Labour force participation First release facts What is the usual resident population of Australia? The usual resident population of Australia at the 2011 Census was 21,507,717. This compares to the 2006 and 2001 Australian total population of 19,855,287 and 18,769,249 persons respectively. Which State or Territory in Australia had the largest growth? Of all the States and Territories in Australia, Queensland had the largest growth in usual resident population, growing by 428,207 between the 2006 and 2011 censuses. Which capital city had the greatest amount of population growth and which had the fastest average annual growth rate? Between 2006 and 2011, Melbourne capital city grew by the greatest amount (368,372 persons). The average annual growth rate for that five year period was 1.9%. Perth was the capital city with the fastest average annual growth with a rate of 2.9%. What was the growth in the overseas born population of Australia? Between the 2006 and 2011 censuses, the overseas born population of Australia grew by 878,110. This is much greater than the growth that occurred between 2001 and 2006, when the overseas born population increased by 310,593. What is the usual resident population of Victoria? The usual resident population of Victoria grew by 421,620 persons between the 2006 and 2011 censuses to reach 5,354,042 persons. This is considerably greater than the population growth for Victoria between 2001 and 2006, which was 271,431 persons. How was Victoria's growth split between metropolitan Melbourne, regional cities and the remainder of regional Victoria (the 38 rural and regional local government areas)? Between the 2006 and 2011 censuses, 82.5 per cent of Victoria's population growth was in metropolitan Melbourne (the 31 metropolitan local government areas), 10.0 per cent was in Victoria's ten regional cities, and 7.6 per cent was in the remainder of regional Victoria (the 38 regional and rural local government areas). Metropolitan Melbourne's population increased by 347,632 between 2006 and 2011, compared with 225,422 between 2001 and 2006. Which Local Government Area (LGA) in Victoria has the largest population? In Victoria, the LGA with the largest population was the City of Casey. It grew from 213,561 in 2006, to 251,324 in 2011. How have Melbourne's Growth Area Councils grown between the 2006 and 2011 censuses? Between the 2006 and 2011 censuses, Melbourne's Growth Area councils (City of Casey, Cardinia Shire Council, Hume City Council, Shire of Melton, City of Whittlesea, and Wyndham City Council) grew by 183,726 people. This represented 50 per cent of metropolitan Melbourne's total population growth. The average annual population growth rate of the Growth Area councils was 4.6 per cent between 2006 and 2011, compared to Melbourne's 1.9 per cent. What share of metropolitan Melbourne's total population do the growth areas hold? In 2006, the Growth Area councils represented 20 per cent of metropolitan Melbourne's total population. In 2011, they were home to 23 per cent. What share of regional Victoria's growth was in the ten regional cities? Between 2006 and 2011 censuses, 56.8 per cent of regional Victoria's population growth was in the ten regional cities, compared with 43.2 per cent in the remaining 38 rural and regional local government areas (LGAs) in regional Victoria. What was the population and growth rates of the ten regional cities at the 2011 census? Between 2006 and 2011, all regional cities experienced population growth. In relation to growth rates, with the exception of Ballarat (1.9 per cent), the regional cities had growth rates below the Victorian average of 1.7 per cent per annum between 2006 and 2011. The large regional cities of Greater Geelong (1.3 per cent) and Greater Bendigo (1.5 per cent), along with Wodonga (1.5 per cent) and Greater Shepparton (1.2 per cent), had higher growth rates than the average for regional Victoria generally (1.1 per cent). What is the median age and household income in the regional cities? Compared with the 38 rural and regional LGAs of regional Victoria, regional cities' populations are generally younger and have higher incomes. The median age in regional cities was generally higher than metropolitan Melbourne (36 years) but generally lower than most of the 38 rural and regional LGAs of regional Victoria. Median weekly household incomes in regional cities ranged from a high of $1,075 (Wodonga) to $878 in Mildura. This compares with a median of $945 for regional Victoria and $1,333 for metropolitan Melbourne. What was the growth in Victoria's overseas born population? Between 2006 and 2011, Victoria's overseas born population increased by 232,125 or 19.8 per cent to reach 1,405,334. Most of this growth (88.0 per cent) was in metropolitan Melbourne where the overseas born population increased by 204,191. At the 2011 Census, 196,857 people born overseas stated that they had arrived in Victoria since the start of 2006. What proportion of Victoria's population were born overseas? In 2011, 26.2 per cent of Victorians and 24.6 per cent of Australians were born overseas. These compare to 2010 UN figures for New Zealand (22.4 per cent), Canada (21.3 per cent), United States (13.5 per cent), United Kingdom (10.4 per cent) and Japan (1.7 per cent). Which are the main countries of origin for overseas born populations? At the 2011 census, the main overseas born populations in Victoria were: UK (213,375), India (111,787), China (93,897), New Zealand (80,236), Italy (76,906) and Vietnam (68,297). What is the proportion of children aged 17 or under in Growth Areas? Children aged 17 or under represented 27 per cent of Growth Area population, compared to 22 per cent for metropolitan Melbourne's, and 11 per cent for inner Melbourne. What is the usual resident population of inner Melbourne (Melbourne, Port Phillip and Yarra LGA's, and the Prahran part of the City of Stonnington)? The usual resident population of inner Melbourne increased by 35,251 persons (or 2.5 per cent per annum) between the 2006 and 2011 censuses. This compares with an average growth rate of 1.9 per cent per annum for metropolitan Melbourne (the 31 LGAs) and 1.7 per cent per annum for Victoria as a whole. What is inner Melbourne's share of metropolitan Melbourne's population? In 2006, inner Melbourne had 7.5% of metropolitan Melbourne's population. In 2011, this increased slightly to 7.8%. In inner Melbourne, which age groups have the highest proportion? Inner Melbourne had a very high proportion of people aged between 18 and 34 years (43.8 per cent). The comparable figure for metropolitan Melbourne was 25.7 per cent, and for Victoria 23.8 per cent. Inner Melbourne had a low proportion of both people aged under 18 (11.4 per cent) and those over 65 (9.7 per cent). The comparable figures for metropolitan Melbourne were 22.1 and 13.1 per cent, and for Victoria 22.5 and 14.2 per cent. What proportion of people who live in inner Melbourne are students? Large numbers of students live in inner Melbourne: 14.2 per cent of the inner Melbourne population were enrolled at a tertiary education institution compared with 9.3 per cent for Victoria. How many people living in inner Melbourne were born overseas? A large number of people living in inner Melbourne stated that they were born overseas (35.7 per cent). This compares to metropolitan Melbourne at 31.5 per cent. How have household types changed in metropolitan Melbourne? In 2011, 23.4 per cent of Melbourne's households consisted of one person, 32.0 per cent of two people and 44.7 per cent of three or more. There was relatively little change over the 5-year period since 2006. There has been growth in the numbers of all household types. Couple only households are increasing at a faster rate (2.3 per cent per annum) than family households with children (1.8 per cent per annum) and lone-person households (1.6 per cent per annum). What was Victoria's Aboriginal and Torres Strait Islander population at the 2011 Census? At the 2011 census, Victoria's Aboriginal and Torres Strait Islander population was 37,988 persons, an increase of 7,848 from that at the 2006 census (30,140 persons). This represents a growth rate of 4.7% per annum. At the 2011 census, Victoria's Aboriginal and Torres Strait Islander population was 0.7% of Victoria's total population, compared with 0.6% at the 2006 census. The 2006-2011 growth rate of the Aboriginal and Torres Strait Islander population (4.7% per annum) compares with a growth for Victoria's population as a whole of 1.7% per annum. Victoria's Aboriginal and Torres Strait Islander population was 6.9% of Australia's Aboriginal and Torres Strait Islander population. This compares with 6.6% in 2006. How many Aboriginal and Torres Strait Islanders were under 15 years of age? More than one in three (35.2%) Aboriginal and Torres Strait Islanders in Victoria was under 15 years of age. Just 4.3% of this population was aged 65 and over. Where do Victoria's Aboriginal and Torres Strait Islander population live? At the 2011 census, 46.3% of Victoria's Aboriginal and Torres Strait Islander population lived in metropolitan Melbourne (17,573 persons) compared with 53.7% in regional Victoria (20,415 persons). In 2006, 46.9% of Victoria's Aboriginal and Torres Strait Islander population lived in metropolitan Melbourne (14,122 persons) compared with 53.1% in regional Victoria (16,018 persons). This compares with the total Victorian population of which 73.6% lived in metropolitan Melbourne and 26.2% in regional Victoria. In 2006, 72.8% of the total Victorian population lived in metropolitan Melbourne, and 27.1% in regional Victoria. Between 2006 and 2011, metropolitan Melbourne's Aboriginal and Torres Strait Islander population grew by 3,451 (or 24.4%) compared with regional Victoria's which grew by 4,397 (or 27.5%). Second release facts What was the growth of employed persons in Australia between 2006 and 2011? The number of employed persons in Australia grew by 1.0 million between 2006 and 2011. What was the growth of employed persons in Victoria between 2006 and 2011? The number of employed persons in Victoria grew by 292,000 between 2006 and 2011. Victoria had the largest single increase in the number of employed persons during this period, followed by New South Wales (285,000) and Queensland (254,000). Victoria has the second largest labour market, following New South Wales. Which states had the highest rates of growth? In terms of rate of growth, the resource rich states of Western Australia (4.0%) and Queensland (2.8%) had the highest annual rates of growth, followed by Victoria (2.6%). Where did the bulk of the growth for Victoria occur? The bulk of this growth occurred in Metropolitan Melbourne while a small proportion occurred in regional Victoria. According to the 2011 Census, there are 1.7 million jobs in Metropolitan Melbourne and 500,000 in regional Victoria. What were the main industries for this growth? Much of Victoria's growth during this period occurred in the following industry sectors: Population Services, Business Services, and Property, Construction and Utilities. There were declines in employment in the Manufacturing and Primary Industries sectors. What was the change in Victoria's labour force between 2001 and 2011? Victoria's labour force grew by 430,000 (19.3%) between 2001 and 2011. How has labour force participation rates changed? Labour force participation rates in Victoria have been increasing for people aged over 50 years. For instance, the labour force participation rate of 50-54 year olds has increased from 77% to 82%, and for 60-64 year olds from 38% to 53%, between 2001 and 2011. Part time work accounts for 40% of the increased employment of people aged 50 years and over. There has been a slight decrease in the labour force participation rates of young adults (aged under 25 years). This is probably due to greater attendance in further education which delays entry into the workforce. Which metropolitan Local Government Areas in Victoria (LGAs) had the largest increase in jobs between 2006 and 2011? The five metropolitan LGAs with the largest increase in jobs were: Local Government Area - (Increase in jobs 2006 to 2011) Melbourne (C) - (62,820) Yarra (C) - (9,850) Hume (C) - (7,250) Whittlesea (C) - (7,120) Wyndham (C) - (6,650) Which regional Local Government Areas in Victoria (LGAs) had the largest increase in jobs between 2006 and 2011? The five regional LGAs with the largest increase in jobs were: Local Government Area - (Increase in jobs 2006 to 2011) Geelong (C) - (4,510) Bass Coast (S) - (3,460) Baw Baw (S) - (1,510) Greater Bendigo (C) - (1,240) Surf Coast (S) - (1,160) What was the growth of employment in Melbourne's Growth Area LGAs? Employment in Melbourne's Growth Area LGAs grew by 34,000 jobs between 2006 and 2011. In 2011, the Growth Area LGAs contained 13.5% of metropolitan Melbourne's employment. Overall, the Growth Area LGAs contained 9.6% of Victoria's employment. Hume had the greatest amount of employment growth for the Growth Area LGAs with 7,252 jobs. Melton had the highest annual average growth rate of 7.2% per annum. How many people are employed in Inner Melbourne? In 2011, 491,600 persons worked in Inner Melbourne. Around 41% of Inner Melbourne employment was in Business Services. What was the growth in employment for Inner Melbourne between 2006 and 2011? Between 2006 and 2011, employment in Inner Melbourne grew by 69,800 jobs. The City of Melbourne had the single largest increase of all LGAs in Victoria during this period growing by 62,800 jobs.
<urn:uuid:64f553bb-0a55-4352-aa75-a1081f7ed772>
CC-MAIN-2016-26
http://www.dtpli.vic.gov.au/data-and-research/population/census-2011/quick-facts
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395346.6/warc/CC-MAIN-20160624154955-00125-ip-10-164-35-72.ec2.internal.warc.gz
en
0.947997
3,148
2.828125
3
Shaking the oil addiction hasn’t been easy. Ever since the Arab oil embargo of 1973, the push has been on to find cost-effective alternatives to petroleum-based fuels. Then, when global warming entered the news, implicating the burning of fossil fuels, push came to shove. Unfortunately, decades of research have still not produced a form of clean energy that can compete economically with oil or natural gas without huge government subsidies. “Ultimately, they should be competitive. We’ve already seen the price of solar drop dramatically. It’s still not equal, but it’s moving in that direction,” says the state’s energy secretary, Richard K. Sullivan Jr. Technical advances will lower prices, but increased production will also lower them, through “economies of scale,” Sullivan says. But, until price parity arrives or subsidies end, clean energy projects will continue to be built in Massachusetts and elsewhere. In the last five years, the state has gone from “virtually no solar or wind deployed in the state to today, when, there are about 100 megawatts of each already deployed or currently under development. We’ve made great strides,” said Sullivan, the former mayor of Westfield who became state secretary of energy and environmental affairs in 2011. A megawatt of electricity is enough power for about 800 homes, if it is constant. The current state administration hopes 250 megawatts of solar power will be in place in the state by 2017 and 2,000 megawatts of wind power will be operating by 2020. As references, the Millstone 3 nuclear power plant in Connecticut can produce about 1,150 megawatts, and all of New England needs about 18,000 megawatts on a typical day at this time of year. One of the largest solar power projects in New England, some 18,400 ground-mounted solar panels, came fully online in December in Holyoke. Spread over two sites in the city that were unlikely to be developed for other purposes, the project has the ability to produce 4.5 megawatts of power, which, given the amount of adequate sun each day, will provide about 1.5 percent of the city’s electricity needs. The panels were installed and are owned by Constellation Energy, which will sell the electricity back to the city at less than market rates. However, the project would not have been possible without generous government subsides, said James M. Lavelle, manager of the Holyoke Gas & Electric Department, the city-owned utility. “With the subsidies, these projects are in the money and this will be a positive for our rates. Absent those subsidies, though, then we would not be chasing these projects,” he said. “At least for solar, the power still isn’t sustainable on its own. We’ve seen a dramatic decrease in costs. The costs of panels have come way down. But solar still costs about $4 per watt, compared to $1 for oil,” Lavelle said. Providing incentives to wind farm operators for twenty years, the federal production tax credit is set to expire at the end of this year. A key grant program for solar power businesses expired at the end of 2011. Other state and federal grant and loan programs for alternative energy projects are also in question. Developers of wind and solar projects have been rushing to make use of the subsidies before they disappear. Sullivan has said there are at least 28 municipalities in the state planning to install fields of solar panels on unusable sites like capped landfills. In December, Western Massachusetts Electric Co. completed a 2.3-megawatt, solar farm, made up of 8,200 ground-mounted solar panels, on a former industrial site on Cottage Street in the the Indian Orchard section of Springfield. Western Mass. Electric already has a 1.8-megawatt solar station operating on a former industrial site on Silver Lake Boulevard in Pittsfield. The city of Westfield is considering installing solar panels at its municipal landfill on Twiss Street. MassMutual Financial Group installed solar panels on the roof of its massive State Street headquarters. And, Western New England University, as well as other area colleges and universities, has put solar panels on some of its buildings. One of the largest projects proposed for the Northeast is a 20-megawatt solar farm that would go on 120 acres in Monson. Still in the planning stage, it was proposed by a Chicago-based company, CornerStone Power Development. Not all such projects are welcomed by residents. When a Boston firm proposed erecting 11 wind turbines on top of West Mountain in Brimfield, more than 200 residents packed a selectmen’s meeting to voice opposition to the project. The company eventually backed away from the project, saying studies had found the wind atop the mountain was insufficient. In Amherst, a proposal to build a 4.5 megawatt solar project on the town’s capped landfill was initially opposed by some residents, but eventually approved by Town Meeting. That project could be completed later this year.
<urn:uuid:315b38f7-6f8d-4225-bc09-a47ee3d2831a>
CC-MAIN-2016-26
http://www.masslive.com/business-news/index.ssf/2012/02/alternative_energy_powers_western_massac.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397748.48/warc/CC-MAIN-20160624154957-00021-ip-10-164-35-72.ec2.internal.warc.gz
en
0.956361
1,070
2.953125
3
Metabolic syndrome is the name for a group of risk factors that raise your risk for heart disease and other health problems, such as diabetes and stroke. The term "metabolic" refers to the biochemical processes involved in the body's normal functioning. Risk factors are traits, conditions, or habits that increase your chance of developing a disease. A number of "metabolic" diseases and conditions are associated with severe or morbid obesity including Type 2 Diabetes, hypertension, high cholesterol, non-alcoholic fatty liver disease, and obstructive sleep apnea. The gastrointestinal (GI) tract and small bowel play critical roles in the regulation of blood sugar levels, fat metabolism, and in the control of appetite and body weight. Metabolic syndrome can also lead to coronary heart disease (CHD), a condition in which a waxy substance called plaque (plak) builds up inside the coronary arteries. Plaque hardens and narrows the arteries, reducing blood flow to your heart muscle. This can lead to chest pain, a heart attack, heart damage, or even death. Metabolic Bariatric Surgery and Type 2 Diabetes Metabolic bariatric surgery can dramatically improve or cure diabetes in some obese patients including a group that does not strictly meet the criteria of morbid obesity. Metabolic surgery can normalize blood glucose levels and allow for a discontinuation of insulin therapy. Curing diabetes through metabolic surgery has been a stunning and welcome development for a disease that has historically been considered chronic and irreversible. Recent data suggest that that operations used to treat morbid obesity, diabetes and other metabolic disorders appear to cure these diseases in some patients, not simply by inducing weight loss, but though direct changes to the anatomy. This widely reported development has focused new attention on the treatment of diabetes. Why UCSF for Metabolic Bariatric Surgery The multidisciplinary bariatric program at UCSF offers individualized treatment plans to patients with diabetes and other metabolic conditions. These treatments include laparoscopic gastric bypass, Lap-Band, and sleeve gastrectomy. Using minimally invasive techniques and small abdominal incisions, patients experience less postoperative pain and scarring, a faster recovery and a more rapid return to normal daily activity. Metabolic Risk Factors The five conditions described below are metabolic risk factors. You can have any one of these risk factors by itself, but they tend to occur together. You must have at least three metabolic risk factors to be diagnosed with metabolic syndrome. - A large waistline. This also is called abdominal obesity or "having an apple shape." Excess fat in the abdominal area is a greater risk factor for heart disease than excess fat in other parts of the body, such as on the hips. - A high triglyceride level (or you're on medicine to treat high triglycerides). Triglycerides are a type of fat found in the blood. - A low HDL cholesterol level (or you're on medicine to treat low HDL cholesterol). HDL sometimes is called "good" cholesterol. This is because it helps remove cholesterol from your arteries. A low HDL cholesterol level raises your risk for heart disease. - High blood pressure (or you're on medicine to treat high blood pressure). Blood pressure is the force of blood pushing against the walls of your arteries as your heart pumps blood. If this pressure rises and stays high over time, it can damage your heart and lead to plaque buildup. - High fasting blood sugar (or you're on medicine to treat high blood sugar). Mildly high blood sugar may be an early sign of diabetes. Your risk for heart disease, diabetes, and stroke increases with the number of metabolic risk factors you have. In general, a person who has metabolic syndrome is twice as likely to develop heart disease and five times as likely to develop diabetes as someone who doesn't have metabolic syndrome. Other risk factors, besides those described above, also increase your risk for heart disease. For example, a high LDL cholesterol level and smoking are major risk factors for heart disease, but they aren't part of metabolic syndrome. Having even one risk factor raises your risk for heart disease. You should try to control every risk factor you can to reduce your risk. Insulin resistance is a condition in which the body can't use its insulin properly. Insulin is a hormone that helps move blood sugar into cells where it's used for energy. Insulin resistance can lead to high blood sugar levels, and it's closely linked to overweight and obesity. Genetics (ethnicity and family history) and older age are other factors that may play a role in causing metabolic syndrome. Metabolic syndrome is becoming more common due to a rise in obesity rates among adults. In the future, metabolic syndrome may overtake smoking as the leading risk factor for heart disease. It is possible to prevent or delay metabolic syndrome, mainly with lifestyle changes. A healthy lifestyle is a lifelong commitment. Successfully controlling metabolic syndrome requires long-term effort and teamwork with your health care providers.
<urn:uuid:5988961c-6310-47fc-9194-c40156c186c1>
CC-MAIN-2016-26
http://bariatric.surgery.ucsf.edu/conditions--procedures/metabolic-syndrome.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783394987.40/warc/CC-MAIN-20160624154954-00168-ip-10-164-35-72.ec2.internal.warc.gz
en
0.934356
1,009
3.171875
3
The Blue Waters project will deliver a supercomputer capable of sustained performance of 1 petaflop on a range of real-world science and engineering applications. It is expected to be one of the most powerful supercomputers in the world. Scientists will create breakthroughs in nearly all fields of science using Blue Waters. They will predict the behavior of complex biological systems, understand how the cosmos evolved after the Big Bang, design new materials at the atomic level, predict the behavior of hurricanes and tornadoes, and simulate complex engineered systems like the power distribution system and airplanes and automobiles. Blue Waters will be composed of more than 235 Cray XE6 cabinets based on the recently announced AMD Opteron™ 6200 Series processor (formerly code-named “Interlagos”) and more than 30 cabinets of a future version of the recently announced Cray XK6 supercomputer with NVIDIA® Tesla™ GPU computing capability. Read the Full Story.
<urn:uuid:1f4093fe-5b0b-4528-a447-3a5383203f7f>
CC-MAIN-2016-26
http://insidehpc.com/2012/10/video-petascale-day-celebrates-computing-in-the-quadrillions/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397567.28/warc/CC-MAIN-20160624154957-00004-ip-10-164-35-72.ec2.internal.warc.gz
en
0.894066
192
2.8125
3
Did you know that by the time you grow up, you’ll have 32 teeth in your mouth? You might not realize it now, but taking care of your teeth is one of the most important—and healthy—things you can do for yourself. Your teeth help you chew foods. They also help you speak clearly. (Try singing your favorite song without using your teeth. It’s harder than it sounds.) They even help you look good when you smile. Once your adult teeth come in, you’ll have them for life! That’s why it’s so important to take good care of your teeth now, so they can stay strong and healthy for a long time. Like your bones, your teeth are very strong. But sugary foods and drinks, like candy and soda, can make them soft. Then plaque, a clear film, can stick to your teeth, and can attract bacteria and other bad germs. Over time, the bacteria can break down the hard outer layer of your tooth, causing holes called cavities. Cavities can be painful, and you’ll have to see a dentist to fix them. Sometimes, your gums can get infected, too. This is called gingivitis; it makes your gums red and sore. For kids with bleeding disorders, bleeding from the mouth is quite common. Usually these bleeds are minor, but can look much scarier when the blood gets mixed with your saliva. You might need treatment when a baby tooth falls out or a new permanent tooth comes in, or when you get a cut on your gums or tongue or inside your cheek. If you notice any bleeding in your mouth—especially if it doesn’t seem to stop, or if it stops but starts up again—tell your parents or check with your hemophilia treatment center right away. Here are a few ways you can keep your teeth healthy: Brush at least twice a day Brush in the morning after breakfast and before bedtime. Brush after eating snacks or desserts. Try to brush all of your teeth, even the ones way in the back. Spend at least three minutes brushing each time. Using a timer or playing a recorded song can help you track time. Always use a toothbrush with soft bristles. Swallowing toothpaste might make you sick, so rinse and spit after brushing. Your toothbrush can wear out quickly, so ask your parents for a new one every three months. Don’t forget to floss your teeth Sometimes flossing can cause your gums to bleed slightly. Dental floss is a coated string, or tape, that helps you clean between your teeth. It can take out any food or plaque that may have gotten caught in your teeth during the day, which your toothbrush can’t reach. Make sure you go to the dentist at least twice a year The dentist may also take X-rays, pictures of the inside of your teeth that show cavities or problems below the surface that they can’t see. Dentists can also show you the best way to brush and floss. If you have any questions about your teeth or gums, don’t be afraid to ask. Dentists know a lot about teeth! Follow these suggestions and you, your parents and your dentist will be all smiles! Interested in finding out more about taking care of your teeth and going to the dentist? Then visit www.kidshealth.org, which has tips on teeth just for kids.
<urn:uuid:c52c1322-0a1c-431a-a271-34ffd43006cb>
CC-MAIN-2016-26
http://www.hemaware.org/story/teeth-talk
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783400572.45/warc/CC-MAIN-20160624155000-00072-ip-10-164-35-72.ec2.internal.warc.gz
en
0.9446
728
3.609375
4
(Note: this section is based largely on the following material: the documentation ("A Little bit of history" from the computer program FRACTINT; James Gleick, Chaos, Making of a New Science; and Ian Stewart, Does God Play Dice? - the Mathematics of Chaos). Up until the nineteenth century, the vision of Copernicus and Brahe, Kepler and Newton was that nature - such as the paths of planets, comets, and projectiles - could be described in ellipses, parabolas, and hyperbolas. Mathematics and geometry was based on "well-behaved" formulas that worked well in modeling nature. But beginning in the early 1870s, a 50-year crisis transformed mathematical thinking. Cantor showed how a simple, repeated procedure could turn a line into a dust of scattered points (the so-called Cantor Set). Peano generated a convoluted curve that eventually touches every point on a plane, creating shapes that fall between the usual categories of one-dimensional lines, two-dimensional planes and three-dimensional volumes. Poincare attempted to analyze the stability of the solar system in the 1880s and found that the problem of the interrelation of the many planets resisted conventional methods of calcultion. Instead, he developed a qualitative approach, a "state space" in which each point represented a different planetary orbit, and studied the topology - the shape or connectedness - of whole families of orbits. This revealed that while many initial orbits quickly settled into the familiar curves, there were also strange, "chaotic" orbits that never became periodic and predictable. Also resisting the traditional mathematical models were fluctuating, random phenomena such as the flooding of the Nile, price series in economics, and the jiggling of molecules in Brownian motion in fluids. Does God Play Dice? : The Mathematics of Chaos by Ian Stewart This mesmerizing historical overview of nonlinear science, full of seedy ideas and fascinating expositions (from heartbeat to weather forecast) is well worth reading. One of those "aha !" books that will broaden your understanding of the universe (and the rest), it is very "visual" and..well, a friend of mine said she considered it a "mental thriller" since it touches on the great old questions of determinism and predictability. As for "mathematics" in the title- don't be put off. The book is virtually mathless. accessibility - Nontechnical (Popular science level) Synergetics : an introduction : nonequilibrium phase transitions and self-organization in physics, chemistry, and biology by Hermann Haken (out of print) This is a wonderful interdisciplinary book, covering statistical physics and thermodynamics, chaos, economics, biology,...If you want to know what buzzwords like complexity, self-organization, chaotic behavior and old ones that have gained new lustre, like entropy and information, mean- you should consult this masterful introduction. For pros-other books in the Springer Series on Synergetics are indispensable. For the layman- this one will suffice to trigger your own imagination. accessibility - Intermediate (entry level textbook equivalent)
<urn:uuid:15aa1959-80f8-422e-a673-df9218750966>
CC-MAIN-2016-26
http://www.kheper.net/cosmos/chaos_theory/chaos_theory.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395166.84/warc/CC-MAIN-20160624154955-00020-ip-10-164-35-72.ec2.internal.warc.gz
en
0.929735
649
3.125
3
On this day in 2005, at an auto expo in Geneva, Switzerland, Honda debuts the Civic Concept, a five-door hatchback. The Japan-based automaker launched the first Civic in the early 1970s and the compact, affordably priced car went on to become a best-seller in the U.S. auto market. Soichiro Honda founded the Honda Motor Company in 1948 in Hamamatsu, Japan, located near the village where he was born in 1906. The son of a blacksmith who also repaired bicycles, Honda grew up in humble circumstances and as a teen went to Tokyo to apprentice as an auto mechanic. He later ran his own auto shop and drove race cars before an injury sidelined him. During World War II, Honda built engines for the Japanese military. After the war, he and a partner formed the Honda Motor Company, which grew into a successful motorcycle manufacturer. In 1957, Honda launched its first car in Japan, the N360. (According to The New York Times, this decision “infuriated the bureaucrats of Japan’s powerful Ministry of International Trade and Industry, who ordered [Honda] to keep making motorcycles because they had drawn up plans for Japan to have only a handful of automakers.”) Two years later, the company began to sell its motorcycles from a storefront in Los Angeles–its first American retail outlet. The Honda Civic went on sale in Japan in the summer of 1973. The following year, the company launched a Civic with a fuel-efficient CVCC (Controlled Cortex Combustion Chamber) engine. Starting with the 1975 model year, Civic/CVCC cars were available in the U.S. According to the Times: “The engine used a startling new design, one that burned a leaner mix of gasoline and passed emissions tests–the main barrier to the American market–without using a catalytic converter.” The Civic, along with the Honda Accord (launched in 1976), arrived at a time when Americans, who had experienced soaring gas prices as a result of the 1973 Arab oil embargo, were looking for an alternative to the large, gas-guzzlers rolling off the assembly lines in Detroit. The small, fuel-efficient Hondas soon had a foothold in the U.S. auto market. In 1989, Honda started making Civics at a plant in East Liberty, Ohio. Seven years earlier, in 1982, Honda had become the first Japanese automaker to build cars in America (using domestic and globally sourced parts) when it began producing Accords in Marysville, Ohio. By 1995, a total of 10 million Civics had been produced worldwide. Another milestone in the car’s history came in 2001, when Honda introduced a gas-electric hybrid version of the Civic. Soichiro Honda died of liver failure at the age of 84 on August 5, 1991. At the time of the outspoken auto maverick’s death, the company he founded was Japan’s third-biggest carmaker, after Toyota and Nissan.
<urn:uuid:399965f4-a984-41e5-a221-b226537fd271>
CC-MAIN-2016-26
http://www.history.com/this-day-in-history/honda-unveils-new-civic
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783392159.3/warc/CC-MAIN-20160624154952-00088-ip-10-164-35-72.ec2.internal.warc.gz
en
0.959408
625
3.03125
3
From the election of former Chilean president Allende, socialist-leaning leaders have remoulded the continent to a very different shape from that envisaged by the CIA a generation ago. Death of Allende Salvador Allende, former president of Chile, died in the presidential palace on Sept. 11, 1973, during a coup led by army chief Augusto Pinochet. Allende won the presidency in 1970 and became Latin America’s first democratically elected left-wing leader. The CIA, which played an active part in Chilean politics in the 70s, sought Allende’s overthrow before he took office in 1970, but the US disputes that it was involved in the military coup. A campaign of political repression carried out by US-backed Latin American dictatorships in the 1970s and 1980s that was designed to eliminate tens of thousands of left-wing activists. It was the idea of Chilean dictator Augusto Pinochet, who enlisted Argentina, Bolivia, Paraguay, Uruguay and Brazil in a continent-wide campaign. Last week, in Buenos Aires, 25 people with links to Operation Condor went on trial. The Sandinista Revolution The Sandinista National Liberation Front overthrew Anastasio Somoza’s dictatorship in July 1979 and established a socialist coalition government. The Somoza family had ruled Nicaragua from 1936 to 1979. Somoza allegedly embezzled funds sent to help rebuild the capital, Managua, after an earthquake in 1972. Shortly thereafter the Catholic Church became a vocal critic of Somoza. Right-wing rebel groups formed in opposition to the Sandinistas, the Contras received aid from the US government — for arms and training — until aid was outlawed by Congress. The administration of former US president Ronald Reagan — which had come to power in 1981 — committed to supporting right-wing regimes in Latin America — attempted to fund the groups covertly. The Contras-Sandinista conflict was seen by many as a proxy for the Cold War that reached renewed heights during the Reagan administration. The killing of Archbishop Romero/El Salvador civil war The archbishop of San Salvador, Oscar Romero, had been an outspoken critic of the junta attempting to quell a popular insurrection whose leaders were advocating social and economic reforms. Romero alleged that the junta was guilty of massacres and torture. The archbishop was assassinated on March 24, 1980. Rallies in support of Romero turned bloody when police opened fire on the crowds. This was the spark for the 12-year civil war in El Salvador. The military, supported by the US, targeted union officials, clergy, academics and others; thousands died. A peace agreement was reached between the two groups in 1992. Guatemalan civil war The Central American state endured a long and bloody conflict between government and left-wing rebels. Its roots date back to the mid-1940s when the US helped overthrow the October Revolutionaries — left-wing students and professionals advancing radical social and economic reforms. The CIA-backed coup in 1954 put an end to this reforming zeal. In the 1980s, the junta aimed to eliminate left-wing activists throughout civil society. More than 200,000 died and many more disappeared. In December 1996, ex-rebel leader Rolando Moran and former Guatemalan president Alvaro Arzu signed peace accords. (Cuban leader, 1959-2008) From 1976 until 2008, Castro was an inspiration for a generation of Latin Americans who warmed to his anti-imperialist, socialist agenda. By the mid-2000s, the continent had seen the rise of what became known as the “pink tide” (ie, something less than red-blooded socialism). Castro formed alliances and friendships with many leaders — including late Venezuelan president Hugo Chavez in Venezuela. A BBC report in 2005 estimated that, of 350 million Latin Americans, three out of four lived under left-wing administrations — a dramatic break with the era when the continent was governed by leaders sympathetic to, and supported by, the US. Hugo Chavez was among the first of the late 20th-century Latin American leaders who came to power with a left-wing agenda. Chavez looked to Simon Bolivar — godfather of South American independence — for inspiration for his Latin socialism. He was elected president of Venezuela in 1999 and served until his death last week. Elected president of Brazil in 2002 and re-elected in 2006, the former union leader Luiz Inacio Lula da Silva promised major social reforms and oversaw the emergence of Brazil as an economic powerhouse, which did much to raise millions of people in the country out of poverty. Tabare Vazquez, an oncologist, was elected president of Uruguay in October 2004 and left office in 2010. A member of the Socialist party, he became the country’s first president from a left-wing party. One of his first actions was to announce a US$100-million-a-year project to alleviate extreme poverty. Michelle Bachelet’s election as president of Chile in 2006 was significant for a number of reasons. She was the first female president, she was a social democrat, and her father, General Alberto Bachelet, who served under Allende, had been tortured by, and died during, the Pinochet dictatorship. Evo Morales, was elected president of Bolivia in 2006, is a champion of indigenous rights and a vocal critic of US foreign policy. Morales has committed himself to implementing widespread land reforms that would help the poorest peasant farmers, and to ensuring that the wealth from the country’s gas reserves is distributed more equally. Rafael Correa, who as elected as president of Ecuador in 2006 and then re-elected last month for a second term. Correa is an economist who came to power on the back of his opposition to the IMF’s plans for remedying his country’s economic ills. Instead, he rolled back the IMF’s plans and put an end to privatization of national resources such as water, oil and gas.
<urn:uuid:020507d9-0f46-4f21-8a89-f335ebb3ecc4>
CC-MAIN-2016-26
http://www.taipeitimes.com/News/editorials/print/2013/03/12/2003556859
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397567.28/warc/CC-MAIN-20160624154957-00201-ip-10-164-35-72.ec2.internal.warc.gz
en
0.976094
1,250
3.109375
3
IOWP ONE DAY SEMINAR Glen T. Martin World Unity and Peace Education Department City Montessori School of Lucknow 10 June 2008 "Nine Principles of World Law" Lighting the candles of peace and unity prior to the seminar. This one-day Seminar was entitled "Nine Fundamental Principles of World Law" Slide Show of the Presentation Outline of these "Nine Fundamental Principles" 1. The purpose of world law is to deal with all those global issues that are beyond the scope of nation-states and their unworkable treaty system in the United Nations. 2. World law establishes a peace system by institutionalizing peace into democratic world law and abolishing the system of "sovereign" nation-states that is intrinsically a war system. 3. World law is enforced by civilian based police with no military. The profound differences between all forms of military and civilian based police. 4. A founded system establishes the fundamental principles from the start and supersedes an evolved system in which the most basic principles are always compromised and watered down. The Earth Constitution founds a world order on universal moral principles applying equally to all persons. 5. World law is binding and enforceable over all persons. "International law" is not law at all but largely a set of treaties agreed to by sovereign nation-states. 6. World law establishes world government, effective to deal with our immense suicidal global problems. Global "governance" is not government but a profound lie of the present failed system. 7. Striving for moral ideals outside of effective world law is almost useless. Justice and human rights are merely empty ideals unless they are concretely embodied in enforceable world law. 8. World law institutionalized justice and democracy, for both of these are 90% procedural involving rules for police, courts, and legislatures that protect people's rights throughout the system. 9. Justice, love, and democracy are universal concepts, involving our common humanity. There is no justice unless it is planetary justice. There is no freedom unless it is planetary freedom. There is no peace unless it is planetary peace. Only effective world law under the Earth Constitution can bring this about. The Earth Constitution is the political embodiment of love. Back to Home Page
<urn:uuid:d4d45f11-2207-4270-9ee9-f2cd58f8f40e>
CC-MAIN-2016-26
http://www.radford.edu/~gmartin/iowp.seminar.Lucknow.June08.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396887.54/warc/CC-MAIN-20160624154956-00074-ip-10-164-35-72.ec2.internal.warc.gz
en
0.920841
471
3.40625
3
Seaman’s Fruit is a small variety of citrus, grown in drier temperate zones, especially on the plains and sunnier hillsides of Harbag. It is relatively dry and meaty, but has all the goodness of citruses (later known as vitamin C) that prevents sailors from getting scurvy. It can last many months in a ship’s hold if kept dry. Seaman’s Fruit has a strong orange-like scent and rather bland taste. There are many recipes that makes use of this combination, from soups and salads up to seasoning meat. Distilled, it is thick, almost creamy, with high alcohol content; fine, but expensive. It is rumored to be a mild aphrodisiac (probably just a rumor). Drinking more than a few shots produces headaches, so it is used for toasts and celebrations. A tea with one drop of it is still customary among the old settlers. The large alchymistic industry in the area has tried to use it as well, but it seems to be magically inert. It is mixed into potions and salves to suppress some of the fouler smells. The beverage can increase the duration of some products, it is a basic component for potions of healing here. Know that it keeps the headache-producing qualities. The halfling-sized plant is quite hungry. A capable farmer can use the same field every other year for growing it, most only once per three years. A tree can have dozens of flowers, it is prudent to remove some flowers if the soil or location is not ideal. In the south, they jut shave off all flowers one year, for a full harvest next year. The fruits are best for harvest when they have two inches in size and are soft enough. If they grow any larger, they tend to become mushy and rot quickly.
<urn:uuid:921d0430-beb7-4905-be2f-cbb3bd462fb0>
CC-MAIN-2016-26
http://strolen.com/viewing/Seamans_Fruit
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403826.29/warc/CC-MAIN-20160624155003-00097-ip-10-164-35-72.ec2.internal.warc.gz
en
0.955435
384
2.75
3
Imagine your alarm goes off. You stretch, then race to get ready for the day. How will you pack your family’s lunches? During back-to-school, back-to-work season, get creative with healthful pack and go lunches. - Hand-y. Finger foods are easy to eat: sandwiches, wraps, pita pockets. Go beyond sandwiches: string cheese or hummus with veggie sticks. - Crunch in your lunch. Tuck in crisp raw vegetables (peppers, celery, carrots, zucchini, broccoli), fresh fruit (tangerine, apple, grapes, pear), whole-grain foods (crackers, popcorn, pretzels), and nuts. - Add some fun: baked chips, oatmeal cookies, trail mix. - Heaviest on bottom: Pack juice, whole fruit, yogurt, pudding cups, and other heavy items on the bottom so they don’t crush the other foods. - Chill out. Use an insulated bag with cold packs to keep food cold and safe. Freeze juice or bottled water for double duty: chilling and drinking. (No need to rely on vending machine soda.) - Surprise! For kids, tuck a puzzle, cartoon, or note inside, to say you care. Brought to you by the Healthy Eating and Active Living Coalition of Pierce County Source: 365 Days of Healthy Eating from the American Dietetic Association (Wiley 2004), Roberta Larson Duyff, MS, RD, FADA, CFCS
<urn:uuid:cf700e17-b599-4256-b7bb-d234914559f8>
CC-MAIN-2016-26
http://pcpublichealth1.areavoices.com/2014/08/27/bag-it/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783392099.27/warc/CC-MAIN-20160624154952-00050-ip-10-164-35-72.ec2.internal.warc.gz
en
0.873709
318
2.5625
3
by Joanne Robinson-Kucera, Orange Cove High School The structure of the cell membrane dictates its function. This WebQuest helps students relate the structure of the cell membrane to its function. An essential element of learning about life processes is learning how molecular structure influences function. California biology students must gain an understanding of the cell membrane as a gateway to understanding the functioning of cells. Interactive websites that provide animations of the cell membrane structure and functions serve to augment direct instruction about the cell membrane. Students should have a basic knowledge of cell membrane vocabulary and structure before using this WebQuest. Students are required to participate in interactive activities online, draw a cell membrane, write a paragraph, and answer questions in complete sentences.
<urn:uuid:389707f1-b63b-4d4f-b0ea-89062cd1fa93>
CC-MAIN-2016-26
http://www.questgarden.com/127/22/9/110528115348/t-index.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783394414.43/warc/CC-MAIN-20160624154954-00095-ip-10-164-35-72.ec2.internal.warc.gz
en
0.879602
144
3.75
4
To assess whether or not families and children are supported in their neighborhoods, parents were asked whether they agreed with the following statements: - People in the neighborhood help each other out. - We watch out for each other's children. - There are people I can count on in the neighborhood. - If my child were outside playing and got hurt or scared, there are adults nearby whom I trust to help my child. Families were considered to live in supportive neighborhoods if they answered "definitely agree" or "somewhat agree" to each of the four statements. Overall, parents of 83.2 percent of children reported that they live in supportive neighborhoods. Parents of children in higher-income households are more likely to feel that their neighborhoods are supportive. Among children in households with incomes below 100 percent of the Federal poverty level (FPL), the parents of 70.7 percent reported that their neighborhoods are supportive, compared to 79.0 percent of children in households with incomes between 100 and 199 percent of poverty. Of children with household incomes between 200 and 399 percent of FPL, 86.0 percent lived in supportive neighborhoods, as did 91.2 percent of children with household incomes of 400 percent or more of FPL. The likelihood of parents reporting that children live in supportive neighborhoods also varied by race and ethnicity. Parents of White children were more likely to perceive neighborhoods as supportive, compared to parents in other racial and ethnic groups. Among White children, 88.8 percent were reported to live in supportive neighborhoods, followed by 85.1 percent of children of other races and 80.9 percent of multiracial children. More than 76 percent of Hispanic and 71.0 percent of Black children also lived in supportive neighborhoods.
<urn:uuid:61c2d5f1-a8c8-4207-a460-f807f191ce90>
CC-MAIN-2016-26
http://mchb.hrsa.gov/nsch/07main/national/3childfamneighbor/pages/03sn.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403502.46/warc/CC-MAIN-20160624155003-00011-ip-10-164-35-72.ec2.internal.warc.gz
en
0.988664
352
3.5625
4
Press release 2014-04-28 at 10:00 The Intergovernmental Panel on Climate Change (IPCC) has approved the second part of its Fifth Assessment Report (AR5), titled Climate Change 2014: Impacts, Adaptation, and Vulnerability, at the IPCC meeting in Yokohama, Japan. The key message of the report is that climate change poses serious risks to the well-being of nature and people all over the world. The observed effects of climate change have an impact on people’s health, land and marine ecosystems, water supplies, and people’s livelihoods, from the polar regions to the tropics and from small islands to continents. Poor countries that lack the means to adapt to these changes will suffer the worst. “Despite our efforts, global greenhouse gas emissions continue to increase and the climate will change. We must strengthen Finland’s ability to manage the risks related to climate change and adapt to it,” emphasises Permanent Secretary Jaana Husu-Kallio from the Ministry of Agriculture and Forestry. Professor Tim Carter from the Finnish Environment Institute (SYKE) is one of the lead writers of the now published report. He hopes that decision-makers will take the information produced by researchers seriously: “If adequate measures to reduce emissions are not taken, the fear is that some of the changes resulting from climate change will push us over an edge after which development can no longer be reversed. This kind of threshold could be, for example, the irreversible melting of Greenland’s glaciers.” Europe’s glaciers dwindling and permafrost melting “Climate change impacts Europe in many ways. The ice sheets of the Alps and other mountain ranges are dwindling and an increasing portion of the permafrost is melting. In the northern coniferous forest belt, including Finland, the growth of forests is accelerating, and some species are growing more abundant, while others decline. The risk of forest fires is also increasing in southern Europe,” Tim Carter explains about the regional effects of climate change. In Finland, the effects of climate change may weaken the water quality of water systems, as the ground remains unfrozen for longer periods of time in the autumn and winter. Water protection efforts will have to adapt to increased run-off, erosion, and nutrition loads. This will result in new challenges, particularly in agricultural water protection. The warming of Finland’s climate is already evident in Finnish fauna; birds, for example, are migrating earlier in the spring and later in the autumn. Food shortages expected The estimated future crop yields will not be enough to feed the world in 2015. “The climate has already changed and affected crop yields. The effects observed have been local, and for the most part negative. The most notable effects have had to do with extreme weather events, such as heavy rains, heat waves, and draught.” “Crop yields and food production per capita have generally improved over the last 40 years, due to the development of farming culture and technology, which has resulted in better fertilisers, better crop strains and more efficient production. However, climate change will result in more extreme weather, draught, heat, and heavy rains. In northern areas, global warming will initially also present benefits, such as longer growth periods,” says Senior Researcher Kaija Hakala from MTT Agrifood Research Finland. Severe and wide-ranging global changes Warming, acidification, and decreasing oxygen levels will change marine life. Warming has already resulted in plankton, fish, and invertebrate communities shifting northwards. In northern marine areas, the diversity and biomass of fish populations have increased. Water warming has also altered the distribution of large species of fish found in the open sea. As marine and coastal ecosystems change, their diversity and the products and services derived from them will weaken. Those who depend on coastal areas for their livelihoods, such as fishing communities in the tropics and arctic areas, will suffer. Rising sea levels, coastal flooding and tidal waves cause danger to life and risk of injury, and hinder livelihoods in low-lying coastal areas and in small island nations. These problems will impact poor population groups in particular. In some areas, flooding will also pose problems to urban populations. Agricultural trade will grow more difficult and earnings from it will decrease due to the insufficient availability of drinking and irrigation water and the decreasing productivity of farming. These problems will have a particularly severe impact on poor farmers in dry regions. Extreme weather events will hinder important basic services, such as water, electricity and health and rescue services. Mortality, morbidity and other adverse effects will increase during heat waves, particularly among vulnerable urban population groups and those who work outdoors. Adaptation required in addition to mitigation Countries all over the world have begun to develop climate change adaptation plans and strategies. Finland has been a pioneer in this regard, and Finland’s reformed adaptation strategy is currently being widely circulated for comments. In Europe, the EU’s adaptations strategy has led to adaptation planning being incorporated into, for example, the use and management of coastal areas and water systems and the risk management of natural disasters. “Currently we are adapting mainly to past events when we should be adapting to future threats. However, it is good that governments, companies and communities are gaining experience in adaptation, since this experience can be utilised to better help society, and more ambitiously adapt to changes,” says Chris Field, the Co-chair of IPCC Working Group II. IPCC gathers information to support decision-making The IPCC’s Fifth Assessment Report consists of the now published report along with a report on the state of climate, which was published last September in Stockholm, and a report on climate change mitigation, which will be finalised at a meeting in Berlin from 7 to 11 April. A summary of the individual reports will be completed in autumn 2014. The Intergovernmental Panel on Climate Change was called together by the World Meteorological Organization WMO and the UN’s environmental programme UNEP. The goal of the panel is to support decision-making related to climate policy. Its tasks include assessing scientific knowledge related to climate change and its effects, as well as various climate change mitigation measures. During 2010–2013, some 813 writers took part in drawing up the report, five of them from Finland. Professor Mikael Hildén, Finnish Environment Institute (SYKE) tel. +358 (0)295 251 173 Research Professor Tim Carter (in English), SYKE tel. +358 (0)295 251 094 Senior Researcher Kaija Hakala, MTT Agrifood Research Finland, tel. +358 (0)295 317 169 Permanent Secretary Jaana Husu-Kallio, Ministry of Agriculture and Forestry tel. +358 (0)295 162 184 Finland’s IPCC representatives at the Yokohama meeting: Senior Adviser Pirkko Heikinheimo, Ministry of the Environment tel. +358 (0)295 250 078 Senior Specialist Jaana Kaipainen, Ministry of Agriculture and Forestry tel. +358 (0)295 162 270
<urn:uuid:20a145b0-7e3e-48d7-9693-e38bc4a25cdd>
CC-MAIN-2016-26
http://www.syke.fi/en-US/SYKE_Info/Communications_material/Press_releases/Latest_IPCC_report_Climate_change_poses_(29147)
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403825.35/warc/CC-MAIN-20160624155003-00111-ip-10-164-35-72.ec2.internal.warc.gz
en
0.938104
1,484
3.125
3
Phenylketonuria (PKU) is a genetic disorder that is characterized by an inability of the body to utilize the essential amino acid, phenylalanine. Amino acids are the building blocks for body proteins. ‘Essential’ amino acids can only be obtained from the food we eat as our body does not normally produce them. In ‘classic PKU’, the enzyme that breaks down phenylalanine phenylalanine hydroxylase, is completely or nearly completely deficient. This enzyme normally converts phenylalanine to another amino acid, tyrosine. Without this enzyme, phenylalanine and its’ breakdown chemicals from other enzyme routes, accumulate in the blood and body tissues. Although the term ‘hyperphenylalaninemia’ strictly means elevated blood phenylalanine, it is usually used to describe a group of disorders other than classic PKU. These other disorders may be caused by a partial deficiency of the phenylalanine breakdown enzyme or the lack of another enzyme important to the processing of this amino acid. A normal blood phenylalanine level is about 1 mg/dl. In classic PKU, levels may range from 6 to 80mg/dl, but are usually greater than 30mg/dl. Levels are somewhat less in the other disorders of hyperphenylalaninemia. Chronically high levels of phenylalanine and some of its breakdown products can cause significant brain problems. Classic PKU is the most common cause of high levels of phenylalanine in the blood CAUSE: PKU and the other causes of hyperphenylalaninemia are inherited in a recessive fashion. This means an affected person inherited two traits for the disorder (e.s., one from each parent). A person with one trait for the disorder, is called a ‘carrier’ for PKU. Carriers do not have symptoms of the disorder. SYMPTOMS: Infants with PKU appear normal at birth. Many have blue eyes and fairer hair and skin than other family members. Currently, most symptoms of untreated PKU are avoided by newborn screening, early identification, and management. The following describes untreated PKU symptomscurrently a rarity: About 50% of untreated infants have early symptoms, such as vomiting, irritability, an eczema-like rash, and a musty odor to the urine. Some may also have subtle signs of nervous system function problems, such as increased muscle tone, and more active muscle tendon reflexes. Later, severe brain problems occur, such as mental retardation and seizures. Other commonly noted features in untreated children include: microcephaly (small head), prominent cheek and upper jaw bones with widely spaced teeth, poor development of tooth enamel, and decreased body growth. Other manifestations may include: Failure to thrive, Hyperactivity and unpredictable erratic behavior. Fright reactions, screaming episodes, disorientation, Failure to respond to strong stimuli and convulsion •The objective in diagnosing or treating the disorder is to prevent mental retardation. •Serum phenylalanine levels greater than 4 mg/dl is abnormal, the normal values is 2 mg/dl. Significant brain damage usually occurs when levels are greater than 10 – 15 mg/dl Treatment of PKU is dietary, since the genetic enzyme is intracellular. The dietary management must do the following: •Meet the child’s need from nutrition for optimum growth •Maintain phenylalanine levels within a safe level. •Natural food proteins contain about 15% phenylalanine thus specially prepared milk substitutes must be used. Newborn babies are screened for the blood phenylalanine level at about 3 days of age. This test is one of several newborn screening tests performed before or soon after discharge from the hospital. Usually, a few drops of blood are obtained by a small prick on the heel, placed on a card, and then sent for measurement. If the screening test is abnormal, other tests are needed to confirm or exclude PKU. Newborn screening allows early identification and early implementation of treatment. The goal of PKU treatment is to maintain the blood level of phenylalanine between 2 and 10 mg/dl. Some phenylalanine is needed for normal growth. This requires a diet that has some phenylalanine but in much lower amounts than normal. High protein foods, such as: meat, fish, poultry, eggs, cheese, milk, dried beans, and peas are avoided. Instead, measured amounts of cereals starches, fruits, and vegetables, along with a milk substitute are usually recommended. Phenylalanine free formulas are available for all age groups. In some clinics, a phenylalanine ‘challenge’ may be suggested to evaluate whether or not the child continues to require a low phenylalanine diet. This test identifies those few persons with a transient or ‘variant’ form of the disorder. However, most authorities currently recommend lifelong dietary restriction of phenylalanine for individuals with classic PKU, in order to promote maximal development and cognitive abilities PKU and the Pregnant Woman •Statistics for offspring of untreated women with PKU –92% risk for mental retardation –73% risk for microcephaly –12% risk for congenital heart disease –Ensuring that the heel stick is performed before discharge –Properly record the specimen and send for analysis –After diagnosis, assist with parent education re:proper dietary management –A diet low in phenylalanine –If begun before 3 months of age, can limit damage to CNS –Blood phenylalanine levels should be kept below 15-20mg/dL for life r/t brain myelination continues actively into adulthood
<urn:uuid:ab8c3833-55a8-441b-a156-a8687f709d82>
CC-MAIN-2016-26
http://www.nursing-help.com/2011/04/phenylketonuria-pku-nursing-care-plan.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397865.91/warc/CC-MAIN-20160624154957-00031-ip-10-164-35-72.ec2.internal.warc.gz
en
0.927553
1,205
3.578125
4
The overarching principle behind organizational development is that all employees have a wealth of knowledge and experience that can be harnessed and tapped into to enable the organization to grow. Managers are the organization's primary facilitators of knowledge and experience at their specific level. Growth can only be successfully accomplished when employees are focused upon a shared vision and common goals. With the increasing intensity of global competition, organizations must move forward or be bypassed. With this in mind, organizations wishing to experience growth must ensure that their employees change. Individuals must continue to grow, develop and improve themselves as employees. Organizations are comprised of people; therefore if they are to progress, so must their people. It is important for managers to understand that they play an important role in the development of the employees they direct. They must create an environment that fosters a learning atmosphere. When they do this, they satisfy the basic human need to continue learning. Most people don't want to stagnate, but seek opportunities to continue their personal development, whether on the job or with hobbies and other areas of interest. Research has shown that most individuals will seek new ways to learn whenever they have the opportunity. As managers begin to focus their employees on common goals, there are a number of basic assumptions behind this task. Before managers begin to establish common objectives, they should take the time to review these assumptions with their employees. By doing so, they lay the groundwork of specific expectations that employees can use as a foundation for their goals. These assumptions include: There Is a Better Way Many organizations echo the sentiment, "We've been doing it this way for years-why change if it isn't broken?" If this feeling permeates the organization, it signals a level of stagnation in the face of constant change. There is always a better way of doing things. Research has shown that every time employees review their goals and functions in a group setting they do a superior job of stating them, measuring them and achieving them. This synergy is a clear sign that the organizational unit is growing in terms of its individual members and as a working unit. A common complaint is that employees are overworked and have too many demands placed upon them. The truth is that no one is ever working at 100% capacity. Research indicates that even the best performers are only working at a fraction of their true capacity. There are a number of factors at work here. Some individuals make a conscious choice not to provide the organization with the best of their abilities, for whatever reason. Additionally, many managers are placed in a position where they are applying new leadership principles to old bureaucratic methods with internal resistance present. This resistance often stands in the way of desired levels of effectiveness. In other cases, the speed of change and pace of demands are so overwhelming that managers find it difficult to stop and reorganize effectively. Employees are not strongly motivated to accomplish the goals and objectives established for them by others within the organization. Resistance to authority goes back to childhood, when many resisted their parents and teachers. Most employees feel that the goals established by others underutilize their skills. This resistance is very common in most, if not all, organizations. However, employees will work hard to achieve goals they set for themselves. They feel empowered and assume ownership of their ideas and concepts. When employees assume ownership, they are motivated to succeed, if only because they have been given an opportunity and do not want to fail. They feel bureaucratic constraints are lifted and they are enthusiastic and challenged by the opportunities presented to them. Sense of Accomplishment Employees are happier when they are given the opportunity to accomplish more. Many bridle under older, more bureaucratic rules and procedures that limit their personal ability to perform, grow and develop. Once these constraints are removed, employees have the opportunity to do more than they were allowed in the past. They develop a sense of accomplishment that brings most people pleasure and a feeling of importance. Most individuals have a need to accomplish something worthwhile in their lives, and managers can use this psychological need to their advantage. If managers are successful in this goal, they will see their employees more interested and enthusiastic than before. The challenge lies in increasing the frequency of these opportunities. Editor's Note: This is an excerpt from Problem Solving: Pinpoint Management Skill Development Training Series and click here to learn more.
<urn:uuid:56d416e3-b0a7-4ad9-978a-46f116f84a9f>
CC-MAIN-2016-26
http://www.agprofessional.com/special-sections/business/Focusing-your-employees-on-common-goals-134591423.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397749.89/warc/CC-MAIN-20160624154957-00124-ip-10-164-35-72.ec2.internal.warc.gz
en
0.969993
877
2.53125
3
From ZhiYong Information Tech: Baby Learning Letter applies the interesting karting game and the vivid nursery rhymes to attract the babies' attention. The baby controls the Panda Karting to takes the letters displaying on the road so that they can get the scores and pass the game. They also learn the Letter Song by playing guitar with the Panda. The baby learns the letters from three aspects of the vision, audition and touch. Cute letters: The cute letters and karting attract the babies' attention. Progressive cognition: The baby can quickly learn the letters by using the step-by step method. Simple operation: It can play the game by clicking screen or dragging karting. It also provides the action for each operation. Abundant voice: The multinational standard children's voice and Abundant voice brings the happy learn time for babies.
<urn:uuid:c3d2ecff-94c7-439f-b09e-777f2c840064>
CC-MAIN-2016-26
http://download.cnet.com/Baby-Learns-ABC-French/3000-2102_4-75805980.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397864.87/warc/CC-MAIN-20160624154957-00144-ip-10-164-35-72.ec2.internal.warc.gz
en
0.905957
179
2.5625
3
Society in New England Puritans & Pilgrims The Puritans and the Indians: Turns Out, the Wilderness Isn't So Empty After All The Puritans initially thought of their journey into the New World as an "errand into the wilderness" and it continued to be described as such by many prominent historians for centuries thereafter. Yet for all the novelty of the Puritans as the second group of Europeans to attempt a very precarious settlement on the North American continent, and despite the fact that it probably seemed practically empty to people coming from the densely populated Western Europe, it wasn't empty at all. The notion of Colonial America as a "wilderness" tends to obscure the very real presence of some one hundred thousand Native Americans in multiple tribes within the New England area alone. Mutual Suffering in the Beginning When the Pilgrims arrived on the Massachusetts coast in 1620, it is true that they found a land of very sparse Indian population. But what the Pilgrims assumed had always been unsettled territory was, in fact, a country that had only just been depopulated, as the local Indians had been decimated by a smallpox epidemic introduced by European traders or fishermen. The few Indian survivors of this disease-induced holocaust may have been more willing to cooperate with the newcomers than they would have been if their own societies had remained intact. Without the assistance of Native Americans like Squanto, the Pilgrims' initial settlement would have died out completely, for the settlers lacked basic agricultural know-how. Even with Squanto's invaluable advice on how to fish and plant corn, half of the Plymouth colonists died during the first winter. The surviving Indians began to trade animal furs to the English in exchange for European commodities such as shell beads or disks that were threaded into strings to make the highly prized wampum. Wampum was an Algonquian term meaning "white string of beads"; these strings (or belts) could be used like currency and were considered sacred. They often contained pictograph designs that told a story or symbolized the unity of tribal confederations. The wampum belts were ceremoniously exchanged during serious occasions, such as the signing of a peace treaty. Anglo-indigenous encounters increased as missionaries attempted to infiltrate the tribal structures and convert their members to Christianity. The French had been embarking on these conversion missions long before the English, and the English never enjoyed the success of their French or Spanish counterparts. The missionaries, such as Daniel Gookin, established "praying towns" throughout the region, about fourteen of which housed some 1,100 Indians by 1674. These towns sought to inculcate the Christian Indians with all the values and customs of the English Puritans, with mixed success. In many cases, the converted Indians cultivated the traditional staples of English agriculture erected fences, and raised livestock. Yet many of the residents of the Praying Towns clung to traditional ways, opting for the warmer and more portable wigwams rather than drafty English-style houses. In some cases, they planted apple orchards but drank the cider instead of trading it for profit. Often these supposedly converted Christians actually displayed evidence of a hybridized or syncretic faith, composed of elements both Christian and traditional. Conversion and Warfare The English immigrants sought to convert the Indians to their own religion, but despite their efforts, they actually met with little success in relation to the total Native American population. In places like the inland Wachusett region during the 1640s (which encompasses modern-day Worcester County and the northwestern corner of Middlesex County), both the English and the Indians sought a peaceful coexistence. Protestant missionaries sought to "civilize" the local Nipmuc people, with the well-meaning intention of bringing them into full membership in town society. Yet European colonization led to conflicts that led to war by the close of the century, and in some places, long before that. The Indians of New England had little concept of cross-tribal solidarity; prior to the arrival of the whites, uniting on the basis of a broad indigenous identity was neither necessary nor obvious to these diverse tribes, each of which had developed their own traditions, cultures, and ways of life. Even after the colonists began encroaching on their land and hunting grounds, the Native Americans could not have known that the whites would keep multiplying and steadily occupying more and more land. Indian groups were as likely to join with whites to fight other Indians as they were to form some kind of pan-Indian, anticolonial resistance. For example, in 1637, Narragansett allies assisted a group of soldiers from Connecticut and Massachusetts. The settlers sought revenge for the murder of several of their Connecticut brethren at the hands of the powerful Pequot tribe, which controlled the fur trade in southern New England and exacted tribute from the smaller tribes of the area. The soldiers and their Indian allies surrounded the main Pequot village in Mystic, Connecticut, and burned it to the ground. They killed anyone who tried to escape, taking the lives of over 500 men, women, and children in all. The war that ensued lasted only a few months; it was a genocidal effort that saw the few remaining Pequots sold into slavery in the Caribbean. The ensuing peace treaty at Hartford (1638) stipulated that the Pequot name be stricken from the historical record, thus demonstrating the long-standing appreciation for the power of history. The Pequot War opened the Connecticut River Valley up to white settlement, but also provided other local Indians with a potent warning of the perils of the colonists' expanding power, their ferocious tactics, and their rapidly multiplying numbers. The colonists failed in their effort to erase the Pequots from history. The story of the massacre has been preserved by historians and eyewitness accounts, as well as illustrations of the event. And, in a highly unusual postscript, descendents of the Pequots now run Foxwoods, a very profitable casino in Connecticut that opened in 1992. The casino is the largest in the world, covering the space of some 30 football fields, and it attracts over 40,000 visitors a day; the tribe was granted a monopoly on casino gambling in Connecticut in return for sharing a portion of their proceeds with the state. The resulting windfall—$125,000 dollars an hour; $3 million a day; $1.5 billion a year—made a handful of surviving Pequots enormously wealthy, and they used a portion of the proceeds to erect a museum that tells the tale of their tribal history, culture, and persecution. In 1675, a pan-Indian alliance destroyed inland settlements in order to reassert their autonomy and to reclaim lost territory. The conflict, known as Metacom's or King Philip's War, would delay English colonization for a decade. It was the most violent conflict of the century in New England. The immediate cause of the conflict began with the murder of John Sassamon, a praying Indian who could read and write and who occupied a precarious grey area between the cultural worlds of Native Americans and whites. Many on both sides suspected him of being a spy for the other group. He certainly switched sides often enough; Sassamon had attended Harvard, left Christianity during a period when he was serving Metacom, and then returned to his religion again. He had tried to warn the Plymouth governor of an impending Native American attack when he was killed, but no one is certain about exactly how he died. In retribution for Sassamon's murder, the officials of Plymouth colony executed three Wampanoags whom they held responsible. The case against the accused murderers was actually quite flimsy, but this did not prevent their conviction and subsequent death sentence. At their hanging, the hanging rope of one of the Wampanoags actually snapped and saved him. Instead of viewing this as divine intervention, however, the Puritans simply killed him anyway. In response to its ultimate verdict, King Philip (or Metacom, as he was known to his own people), chief of the Wampanoag tribe, built an alliance among the remaining tribes of central and southern New England, including his own Wampanoags and the Narragansetts, Nipmucks, and Mohegans. One surviving Pequot Indian remembered that Metacom warned them: "Brothers, these people from the unknown world will cut down our groves, spoil our hunting and planting grounds, and drive us and our children from the graves of our fathers, and our council fires, and enslave our women and children."9 Metacom's alliance retaliated against Wampanoags' execution by attacking and burning colonial settlements in both Plymouth and Massachusetts colony; in total, about half of New England's 90 or so towns were affected. Twelve towns in Massachusetts were completely destroyed. A series of mounting reprisals and atrocities followed on both sides; ultimately, as many as 20,000 people were ultimately killed. As evidenced by Metacom's (attributed) speech above, several factors beyond the Sassamon murder set the context for King Philip's War. Metacom's father, Massasoit, had helped the original Pilgrims and was a Plymouth ally. But when he died in 1660, relations soured between the colonial leaders and the Wampanoag sachems, whom the whites treated somewhat high-handedly and even abusively. Whites had been encroaching on Native American land in New England for some time, and unlike most other regions except the Chesapeake, they now outnumbered the Native Americans. At first, Metacom's alliance worked. Settlers fled toward the coast, vacating the lands that had been a central source of the conflict. Then in the summer of 1676, the white settlers counterattacked along with some of their own indigenous allies. They broke the power and momentum of Metacom's united forces. The War's Result and Its Legacy The English were ultimately victorious and forced the Indians to relocate, transferring their lands to the Bay Colony. They destroyed the main Narragansett village in Rhode Island. Metacom was killed and his wife and son were captured and sold into slavery. Tribes in the conflict who did not relocate to Canada, New York, or further west either succumbed to disease, surrendered, or splintered out into a few straggling members. Some were forced to resettle in villages that the white settlers monitored. Even the converted Indians in praying towns were relocated to Deer Island in Boston Harbor. They were told that this relocation was for their protection, but many of them subsequently died from disease and starvation. Long after 1676, sporadic conflicts broke out to the north, in Maine and New Hampshire. For the next fifty years, the English, Indians, and French battled one another intermittently. War and colonization became interlinking concepts in the minds of New Englanders. This was an ominous turning point in the history of New England and the broader legacy of Anglo-Indian relations: as historian Colin G. Calloway put it, "After King Philip's War (1675-76)... Indians and Europeans often expected their relationships to be violent, and so, often, they were."10 The image of Indians as bloodthirsty savages became affixed in the European mind. Views of the Land From the European perspective, a clear demarcation existed between settled land and wilderness, between civilization and nature, and the former was deemed superior and more righteous. In European culture, man earned title to land by transforming it from wilderness and making it work; most Europeans didn't recognize the ways Indians had transformed the land (or the nature of their relationship with the land) and thus believed they had no legitimate claim to it. There were only a handful of exceptions to this general outlook, Roger Williams among them. The rest of the Puritans often conceived of the wilderness as a physical form of hell. Puritan leaders such as John Winthrop did not believe that Indians held any entitlement or claim to the land. To the white settlers, any part of the globe was fair game, so long as it had not been legitimately possessed by another man before they arrived; and even then, it might be gained through warfare. Indians were deemed undeserving of any claims to the land because they did not have cattle or other means of subduing the terrain for cultivation. Because the Europeans considered their system of hierarchical social organization and technology superior to that of the Indians, they claimed precedence for themselves. Native American perspectives No such divide between civilization and nature existed for Indians such as the Algonquians of the Northeast, who saw spiritual properties in the animals and objects that the Europeans deemed inanimate. Algonquians believed that a figure named GlusKap (or GlusKabe) had given the world its present form and was responsible for the evolution of animals into the Indians over time. He battled the forces of social disorder and chaos that existed beyond the indigenous community. These forces—they have multiple potential interpretations, from white settlers to environmental disasters to the forces of evil spirits—sought to engulf the Indian community and its traditions and to monopolize precious resources. For these communities, nature and the spirit world commingled and converged in myriad ways that made the sounds, raindrops, animals, and the landscape come alive; humans were not superior to nature in this belief system, they were simply another part of it. Tribes such as the Nashaways of the Wachusett region of inland Massachusetts passed down such legends and oral storytelling traditions so that future generations could understand and appreciate their traditional beliefs and values. Many tribes also transformed the land to make it more productive, but they did it in different ways than the Europeans. They cut down trees and burned areas of forest to create space for hunting and open fields. They also set fires to eliminate the underbrush (this made it easier to track game and gather nuts and berries) and to replenish the soil. They cultivated crops such as beans, pumpkins, and corn and utilized a technique of planting seeds in regularly spaced mounds. This allowed the plant roots to intertwine below ground, making it harder for birds and wind to uproot younger tendrils. Commonalities and Exceptions There is no question that Indian and English societies approached one another from a considerable social, religious, and cultural divide. For the most part, scholars have attempted to trace the many differences between these two groups by citing characteristics common to each of them, as we have done here. Yet these distinctions should not be carried too far; for all of their differences, and for all of the seemingly obvious similarities among Native Americans and the white settlers, respectively, throughout the colonial period some tribes allied with the whites in battle against other tribes. This did not necessarily mean that certain Indian groups thought they had more in common with the settlers than with other Native Americans, but these alliances indicate that both whites and some Indian groups were at least willing to overlook or put aside their differences to form mutually advantageous relationships. Occasionally whites would disagree among themselves on Indian relations matters. Roger Williams, himself a maverick in the conformist atmosphere of seventeenth-century New England, learned several Indian languages and argued that the king could not grant land which already belonged to the Native Americans. He argued that towns must purchase the land of their future site. Others, such as John Winthrop, recognized the advantages of purchasing rather than seizing land. Yet Winthrop also demanded that such purchases include a provision for Indian submission to English authority and a provision for payment of tribute to the colonists.
<urn:uuid:7c958373-fc7c-40e9-b4ab-7e53da890ec2>
CC-MAIN-2016-26
http://www.shmoop.com/new-england-puritans-pilgrims/society.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395620.9/warc/CC-MAIN-20160624154955-00109-ip-10-164-35-72.ec2.internal.warc.gz
en
0.97365
3,183
3.890625
4
Plücker Coordinates for the Rest of Us - Part 1 by Lionel Brits (15 November 2001) |Return to The Archives| |When I first happened upon articles dealing with Plücker Coordinates I found it hard to interpret the mathematical expressions geometrically and many of the ideas were intimidating. Since I couldn't find any lighter material on the subject I put off familiarizing myself with the concepts for more than a year. I then revisited the articles but still found them full of big words and unfamiliar notation, so I tried to imitate, by my own means, what Plücker coordinates promised: a way of mathematically describing the relative orientations of lines. After spending a few hours trying to make my scribblings on paper look 3D I ended up with expressions that looked suspiciously like those I had seen in the other articles. After a few more hours of scribbling my arrogance got the best of me and I decided to contribute my own article to the white noise that is the world wide web. Lo and behold, you are reading that very article. Good luck.| A Word on Convention For the sake of consistency we will be using the the right-hand coordinate system throughout this discussion.| Also, I chose notations to be reasonably consistent with other sources whenever possible. Defining a Line in 3-Space All we need to define a line in are a point and a direction .| on the line is then a linear combination of with a parameter . We simply refer to this locus of points as the line through a point and with a direction for some parameter . What we also need is a way to determine the relative orientation of two lines. Electromagnetic theory gives us a convenient way to express the orientation of a line in terms of the Biot-Savart law. This law gives us the magnitude and direction of the magnetic field due to a current in a wire some position away moving in some direction :| This formula is however too intimidating for our purposes so we will strip from it everything but the bare essentials. The familiar Right-Hand rule gives us a non-mathematical way of finding the direction of the field : Imagine placing your right hand over the wire so that your fingers curl around the wire and your thumb is extended in the direction of the current; your fingers now curl in the direction of . In the same way we can define a direction around a line. We will follow the convention that when looking along a line in the direction of the line, other lines are either oriented clockwise (CW), counterclockwise (CCW), or intersect or are parallel to the line being viewed. In the following example lines 2 and 3 are moving clockwise around line 1. This is analogous to the direction of the magnetic field around a wire. Since we aren't interested in any physical interpretation we can get by with only the direction of . Let us now in the same way define a field around our line . For the sake of simplicity we shall locate the origin such that it passes through . Information about the line is not lost however if we simply keep track of the point that locates it. The vector value of the at a point is then given by the cross product of and . Now we have a powerful way of finding information about the orientation of lines relative to . Consider a line through point in direction . If we are looking down along the direction of, and is in the same direction as , this line would appear to be pointing in a clockwise direction. On the other hand, if is in the opposite direction as , this line would appear to be pointing in a counterclockwise direction. We can express these cases in terms of the dot product of and . Here receding lines are depicted as and approaching lines as (as darts might appear receding from and approaching you respectively). There is some ambiguity in the case of . It can happen that and are parallel or antiparallel (they form angles of 0° or 180° respectively) or it might be the case that passes through the origin making zero. In either case, the lines are neither parallel nor antiparallel. We ought now to generalize these cases given that does not necessarily pass through the origin. Looking back we have two lines and . The vector value of at the point is now given by: Which is equivalent to The orientation we are interested in we can call , and express it as follows: Which is equivalent to This expression on its own is sufficient for allowing us to express the relative orientations of lines in and is very important in its own right. To summarize: Given two lines and , we define the orientation of with respect to as If , passes in the clockwise direction. If , passes in the counterclockwise direction. If , is either parallel or antiparallel to or intersects . Clocks and Hands and Lines Oh My! |It doesn't end here, however. If you think you have what it takes, take a stroll through the next installment.|
<urn:uuid:68383242-9169-497a-857a-57fd69ffa10e>
CC-MAIN-2016-26
http://flipcode.com/archives/Plcker_Coordinates_for_the_Rest_of_Us-Part_1.shtml
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395620.9/warc/CC-MAIN-20160624154955-00076-ip-10-164-35-72.ec2.internal.warc.gz
en
0.928153
1,055
2.984375
3
|Password Recovery Solutions| The task of picking a strong password is not as easy as it may seem at first. It is believed that the right way of picking a password is picking a long password of randomly generated characters, preferably not letters only. At the same time, it is acknowledged that the vast majority of users do not follow this recommendation, picking easy to typing and remember passwords like "qwerty". It is not a problem to generate a long password; there is a huge number of generators for producing strong passwords - this function is available in literally any password manager (e.g., Aurora Password Manager). However, the use of strong, automatically generated passwords creates a new problem: unable to memorize them, users either write them down, often in the most inappropriate places, or simply forget them, and that often leads to serious problems and the need to use password recovery software (not always successfully). At first, let's think, what length a password should have in general, and what requirements does it have to meet. First of all, it should be understood that the reliability of a system in whole is determined by the weakest of its components. You can generate a prodigiously strong and long password, memorize it and use it, but, for example, if you use it for protecting databases in Microsoft Access of a version older than 2007, that password can be recovered instantly. The length of the password won't do any good for you, simply because the password protection in Microsoft Access before version 2007 was realized absolutely ignorantly and unprofessionally and didn't provide any real protection. Therefore, if the software doesn't have the reliability, a long password won't save you. Unfortunately, very often password protection (and security issues in general) is considered as something of minor importance. The result of that is the outrageously ignorant realization of it. As a case in point, we could consider the IT market's leader (not for a while yet) - Microsoft Corporation, which it took 20 years to finally create a more or less reliable password protection in their lead product Microsoft Office (still not in full and not in all its products). But even if the system is reliable, there are still many ways to obtain the password even if it is strong enough. First, that's the human element (writing a password on paper that's near the computer is just one example). Second, that's spyware all kinds, keyloggers that record all key presses and not only those. If you, while being far from home, visit an internet caf? to use online banking, be aware that the password you enter there can be easily stolen. Moreover, it wouldn't necessarily be the administration's malicious intent - often the security in internet caf? is maintained at a low level, and a spyware application can be installed even by a visitor. And finally there are two universal methods for breaking a password, which are applicable in literally all cases, but which, fortunately, do not guarantee the success (provided that the password is selected properly). The first method is dictionary search. Second - exhaustive search of all possible combinations of characters; this method is also called bruteforce attack. Besides, there are different variations of these methods. For example, when searching by dictionary, it's also possible to check not only whether or not a certain word suits as password but also try checking different modifications of it: word with trailing digits, word with typos, password composed of two words, etc. Different variations and optimizations are also applicable to the exhaustive search. Dictionary search goes quickly enough; however, the success of this method is guaranteed. If a sequence of characters that is not a word (and even a modification of it) is picked for a password, dictionary search will be unable to break your password. As for the exhaustive search of all characters - this method guarantees the success; any password can be broken with this method. This fact lies at the heart of Dan Brown's famous book "Digital Fortress". Like since it is possible to break any password, it means that one could spend a lot of money, build a supercomputer that calculates really, really fast, and that's it - it will crack all passwords like peanuts. Fortunately, that's not true. To put it more precisely, theoretically that's true; however, practically the matter rests on time. How much of time and resources can a malefactor afford to spend on breaking a password? There are three factors that determine the time required for that: first (and most important) - password length, second - password "width", in terms of the characters that can be present in the password: Letters only? Latin characters only or Cyrillic too? Lowercase only, uppercase only or, maybe both? Digits? Other characters? Third factor - search speed. For example, the hardest for breaking password applications are WinRar and Office 2007 (Word, Excel, OneNote, PowerPoint; in Access 2007 things with security are much worse, and in Outlook everything is just as monstrously bad as it was 20 years ago) - in these applications the search speed is very low. On the other hand, the password search speed for a password-protected ZIP archive can be 100,000 times higher! Thus, the same password can turn out reliable enough as well as completely unreliable - depending on where it is used. For example, a password to a ZIP archive, which can be broken within just one hour, when used with WinRar will require over 11 years of calculations. The dependence of time from password length is exponential. That mathematical dependence is known for the fact that at the beginning it grows not very fast, but it grows faster and faster as it goes further. Many worldly paradoxes are based upon that fact; for an example, take a look at the following problem. Would you rather choose get one million dollars at once or get one cent on the first day, two cents on the second day, four on the third and so on, doubling the previous amount every next day for one month (30 days) instead? It would seem, the second option is much less paying - after all, only a week later from the cents you will move on to one dollar, whereas a week is a quarter of the entire time span allowed! On the 15th day - the middle of the allotted term - you're going to have just a bit over three hundred dollars, while in the first case you'd have a million! But keep on calculating - on the twentieth day you're going to have 10 thousands, and on the thirtieth day the amount due to us will be 10 millions! This example is directly related to the bruteforce attack. If the password consists of English characters only, picking a one-character password is nothing - there are only 26 variants. For a two-character one the number of options rises to 676 - also not all too many. Five characters - 11 millions. That will cause some difficulties with the breaking if that is, for example, a password to a Word 2007 document. But in case of simpler variants no problems or special delays will occur. Breaking a password of 9 characters - almost unbearable job in case of Word 2007 or WinRar, and even with the fast variants (like a password to a ZIP archive) breaking such password will take noticeable time. You can take advantage of the online password calculator and estimate how much time it will take to break a password depending on the parameters you provide. The calculator is available at www.LastBit.com/pswcalc.asp Or maybe Dan Brown was right? And cool secret services, having mobilized all their resources, all supercomputers of the world, have become able to break your sacred password? Besides, the progress in the computer industry advances with seven-league strides, the computing power of the computers grows fast and if not now, in some time that will become a reality? No, it is practically impossible to break a good password with the exhaustive search. Here's a digression about physics and mathematics, almost without formulas and absolutely not terrifying. There is a very amusing and unexpected deliberation that limits the possibility of breaking a sufficiently long password by exhaustive search. Suppose the super-mega-computer of the future has been created. It is perfect; its computing power is incredible. Will it be able to break a long password by exhaustively searching all variants? It turns out that no, it won't. Nobody has cancelled the technical progress, and it is very likely that computers of the future will perform much faster than the ones we have these days. But even those computers submit to the laws of physics. And what those laws read is that changing the state of any system inevitably requires energy. When searching passwords, the state of the system will change with each new variant. Even if we take the absolutely smallest possible change, it turns out that, for example, searching for a 28-character password will require as much of energy as the sun has not produced for as long as it has been existing. Certainly, this deliberation is true only if the exhaustive search of all variants is the only way to break the password. So, if you are positive about the reliability of the software, you have protected yourself (for as much it can be done) from spyware and other password theft channels - to protect yourself from the dictionary search and exhaustive search of all characters, for the password you need to pick a sequence of characters that is not a word (or a variation of a word - misspelled word, word with digits, etc.) Besides that, the password is to be sufficiently long, and it is very much desirable to include symbols in it, not only letters and numbers. Different demands will be made to the password depending on what it is going to be used for. You can use Password Calculator for estimating the time required for breaking it. And the most important is that you are to be able to memorize the password without writing it down. There is an easy way to make up easily remembered and yet strong enough passwords. Take some phrase for the base; that can be a line from a song, a quote, a saying - whatever. The point is that you need to be able to remember it; that will be the base for your password. On the next step, from each word of the phrase take, for example, 1-3 letters (depending on the length of the phrase) and form the password. As the result, you will have a long enough set of characters, which is nevertheless easy to remember and restore. For example, would it be easy for you to remember the alroletoro password? Now, how about remembering it written this way: "All roads lead to Rome"? To fortify the password even further, you can separate the letters with a character and/or make up a rule for interlacing uppercase and lowercase characters. Unfortunately, this method can't be recognized as absolutely reliable: if the malefactor knows that you use it, he can take advantage of that knowledge and search common phrases. But anyway that is much better than the traditional passwords used by regular people. Yet another common mistake consists in the fact that many people have one-two-three favorite passwords that they use in all cases of their lives. Here troubles can lie in wait for them. For example, when entering a password at some Web resource, you actually give it to the owner of the resource. In the majority of cases, you don't know who that person is, how careful he is regarding to storing passwords, and how the password management is organized at all. The most evident and frequently used way (although it is not secure) is storing logins and passwords in the database in the open format (if a Web resource features the recovery of a forgotten password and simply prompts for your e-mail and sends the forgotten password to it, that's exactly the case where the method takes place). In this case, your password becomes available to at least the owner of the Web resource, his employees, and employees of the company providing the hosting services. Besides that, the owner of the Web resource can simply sell it out (certainly, along with users' private data, including, in particular, your password), and you have no guarantee that your password doesn't get to someone's dirty hands in the end. When the right approach is used, stored are not the actual users' passwords but some derivatives of those (hash), which allows checking the validity of an entered password but doesn't allow to get hold of it. The problem is extremely current. Besides Web resources, using the same password is undesirable for password protecting documents. For example, you could use the same password for protecting Word documents; moreover, some of the documents are stored in the old format (Word 2003), while others - in the new one. Since password protection in the old format is much weaker than in Word 2007, one can recover the password by using an old document and then open a new document with it, although the password, in the application to the new document, could be sufficiently reliable. There is only one way out of it - to use different passwords for different resources. Unfortunately, it's going to be difficult to make up a new password for each Web resource. A truly reliable way out of this trap is using a password manager; for example, Aurora Password Manager, which provides a convenient plugin, which allows generating reliable passwords and then automatically enters the right password in the authentication form. You will have to remember just one master password that protects the passwords database. You can also use a certain rule for forming passwords. For example, to set a password to a Web resource you could take the first and the last letter of the domain name and add your favorite password to them. In the strict sense, this method is not secure (especially if the rule is obvious enough), but it is still much better than repeating the same password everywhere. In the conclusion, let me give you a few links to helpful resources: http://LastBit.com/pswcalc.asp - Passwords Calculator for estimating the time necessary for breaking a password by searching characters depending on specific parameters. http://LastBit.com/Password-Generator - True random password generator. http://PasswordTools.com - Password Recovery Software for all popular applications. www.Animabilis.com - convenient multi-user password manager. Copyright © 1997-2015 LastBit.com. All rights reserved.
<urn:uuid:7d6cfd57-ad8f-4229-adcf-282f44ea3293>
CC-MAIN-2016-26
http://lastbit.com/picking-the-right-password.asp
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399522.99/warc/CC-MAIN-20160624154959-00102-ip-10-164-35-72.ec2.internal.warc.gz
en
0.94388
2,960
2.640625
3
An optical trap or "optical tweezers" is a device used to apply piconewton sized forces on micron sized objects under a microscope using a highly focused light beam. It can be created by applying a precisely focused laser onto a dielectric material. It allows very detailed manipulations and measurements on several interesting systems in the fields of molecular and cell biology and thus acts as a major tool in biophysics. They are used in biological experiments ranging from cell sorting to the unzipping of DNA. Similar principles are also used in physical applications such as atom cooling. In this experiment, you will measure the Brownian motion of a silica microsphere in aqueous solution, both testing the theory of statistical mechanics and calibrating the ``spring constant" of the trap. Then, using the calibrated trap, you will measure forces in biological systems, such as the actin-myosin molecular motors of vesicle transport in onion cells, the E. coli flagellar motor, or the restoring force of a stretched DNA molecule. Student Wiki: Optical Trapping Lab Guide outline in PDF format
<urn:uuid:380b0f4e-19e6-48f8-94fb-8570f61fa27a>
CC-MAIN-2016-26
http://web.mit.edu/8.13/www/51.shtml
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393332.57/warc/CC-MAIN-20160624154953-00113-ip-10-164-35-72.ec2.internal.warc.gz
en
0.888902
230
3.578125
4
Modeling head tissues Predicting the electromagnetic fields produced by an elementary source model at a given sensor array requires another modeling step, which concerns a large part of the MEG/EEG literature. Indeed, MEG/EEG ‘head modeling’ studies the influence of the head geometry and electromagnetic properties of head tissues on the magnetic fields and electrical potentials measured outside the head. Given a model of neural currents, the physics of MEG/EEG are ruled by the theory of electrodynamics (Feynman, 1964), which reduces in MEG to Maxwell’s equations, and to Ohm’s law in EEG, under quasistatic assumptions. These latter consider that the propagation delay of the electromagnetic waves from brain sources to the MEG/EEG sensors is negligible. The reason is the relative proximity of MEG/EEG sensors to the brain with respect to the expected frequency range of neural sources (up to 1KHz) (Hämäläinen et al., 1993). This is a very important, simplifying assumption, which has immediate consequences on the computational aspects of MEG/EEG head modeling. Indeed, the equations of electro and magnetostatics determine that there exist analytical, closed-form solutions to MEG/EEG head modeling when the head geometry is considered as spherical. Hence, the simplest, and consequently by far most popular model of head geometry in MEG/EEG consists of concentric spherical layers: with one sphere per major category of head tissue (scalp, skull, cerebrospinal fluid and brain). The spherical head geometry has further attractive properties for MEG in particular. Quite remarkably indeed, spherical MEG head models are insensitive to the number of shells and their respective conductivity: a source within a single homogeneous sphere generates the same MEG fields as when located inside a multilayered set of concentric spheres with different conductivities. The reason for this is that conductivity only influences the distribution of secondary, volume currents that circulate within the head volume and which are impressed by the original primary neural currents. The analytic formulation of Maxwell’s equations in the spherical geometry shows that these secondary currents do not generate any magnetic field outside the volume conductor (Sarvas, 1987). Therefore in MEG, only the location of the center of the spherical head geometry matters. The respective conductivity and radius of the spherical layers have no influence on the measured MEG fields. This is not the case in EEG, where both the location, radii and respective conductivity of each spherical shell influence the surface electrical potentials. This relative sensitivity to tissue conductivity values is a general, important difference between EEG and MEG. A spherical head model can be optimally adjusted to the head geometry, or restricted to regions of interest e.g., parieto-occipital regions for visual studies. Geometrical registration to MRI anatomical data improves the adjustment of the best-fitting sphere geometry to an individual head. Another remarkable consequence of the spherical symmetry is that radially oriented brain currents produce no magnetic field outside a spherically symmetric volume conductor. For this reason, MEG signals from currents generated within the gyral crest or sulcal depth are attenuated, with respect to those generated by currents flowing perpendicularly to the sulcal walls. This is another important contrast between MEG and EEG’s respective sensitivity to source orientation (Hillebrand & Barnes, 2002). Finally, the amplitude of magnetic fields decreases faster than electrical potentials’ with the distance from the generators to the sensors. Hence it has been argued that MEG is less sensitive to mesial and subcortical brain structures than EEG. Experimental and modeling efforts have shown however that MEG can detect neural activity from deeper brain regions (Tesche, 1996, Attal et al.., 2009). Though spherical head models are convenient, they are poor approximations of the human head shape, which has some influence on the accuracy of MEG/EEG source estimation (Fuchs, Drenckhahn, Wischmann, & Wagner, 1998). More realistic head geometries have been investigated and all require solving Maxwell’s equations using numerical methods. Boundary Element (BEM) and Finite Element (FEM) methods are generic numerical approaches to the resolution of continuous equations over discrete space. In MEG/EEG, geometric tessellations of the different envelopes forming the head tissues need to be extracted from the individual MRI volume data to yield a realistic approximation of their geometry. Three approaches to MEG/EEG head modeling: (a) Spherical approximation of the geometry of head tissues, with analytical solution to Maxwell’s and Ohm’s equations; (b) Tessellated surface envelopes of head tissues obtained from the segmentation of MRI data; (c) An alternative to (b) using volume meshes – here built from tetrahedra. In both (b) and (c) Maxwell’s and Ohm’s equations need to be solved using numerical methods: BEM and FEM, respectively. In BEM, the conductivity of tissues is supposed to be homogeneous and isotropic within each envelope. Therefore, each tissue envelope is delimited using surface boundaries defined over a triangulation of each of the segmented envelopes obtained from MRI. FEM assumes that tissue conductivity may be anisotropic (such as the skull bone and the white matter), therefore the primary geometric element needs to be an elementary volume, such as a tetrahedron (Marin, Guerin, Baillet, Garnero, & Meunier, 1998). The main obstacle to a routine usage of BEM, and more pregnantly of FEM, is the surface or volume tessellation phase. Because the head geometry is intricate and not always well-defined from conventional MRI due to signal drop-outs and artifacts, automatic segmentation tools sometimes fail to identify some important tissue structures. The skull bone for instance, is invisible on conventional T1-weighted MRI. Some image processing techniques however can estimate the shape of the skull envelope from high-quality T1-weighted MRI data (Dogdas, Shattuck, & Leahy, 2005). However, the skull bone is a highly anisotropic structure, which is difficult to model from MRI data. Recent progress using MRI diffusion-tensor imaging (DTI) helps reveal the orientation of major white fiber bundles, which is also a major source of conductivity anisotropy (Haueisen et al.., 2002). Computation times for BEM and FEM remain extremely long (several hours on a conventional workstation), and are detrimental to rapid access to source localization following data acquisition. Both algorithmic (Huang, Mosher, & Leahy, 1999, Kybic, Clerc, Faugeras, Keriven, & Papadopoulo, 2005) and pragmatic (Ermer, Mosher, Baillet, & Leah, 2001, Darvas, Ermer, Mosher, & Leahy, 2006) solutions to this problem have however been proposed to make realistic head models more operational. They are available in some academic software packages. Finally, let us close this section with an important caveat: Realistic head modeling is bound to the correct estimation of tissues conductivity values. Though solutions for impedance tomography using MRI (Tuch, Wedeen, Dale, George, & Belliveau, 2001) and EEG (Goncalves et al.., 2003) have been suggested, they remain to be matured before entering the daily practice of MEG/EEG. So far, conductivity values from ex-vivo studies are conventionally integrated in most spherical and realistic head models (Geddes & Baker, 1967). Froedtert & The Medical College of Wisconsin MEG Contact Information Research investigators and clinical physicians are encouraged to contact us for further information on how to access our MEG Program and services. - Jeffrey Stout, PhD: Technical Manager - Jean Roccapalumba, CTRS, MBA: Program Manager Department of Neurology Medical College of Wisconsin 9200 W. Wisconsin Ave. Milwaukee, WI 53226 MEG Program Site Map If you are a physician and would like to inquire about or order a MEG study for your patients, please visit Froedtert Hospital MEG web pages for basic information about the procedure and/or contact Linda Allen, RN BSN, our Epilepsy Program Coordinator at (414) 805-3641 to refer your patient to our Program. If you are a patient who is about to undergo an MEG procedure, please also visit Froedtert Hospital MEG web pages for useful information regarding the MEG routine.
<urn:uuid:a6e6bb9c-bcb0-45d8-9a21-ea8d35a3de94>
CC-MAIN-2016-26
http://www.mcw.edu/MEG/AboutMEG/Electromagneticsourceimaging/5Modelingheadtissues.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783404826.94/warc/CC-MAIN-20160624155004-00192-ip-10-164-35-72.ec2.internal.warc.gz
en
0.889967
1,833
2.78125
3
A role model for civic courage, Clara Immerwahr has since the 1970s been inextricably connected with the history of weapons of mass destruction and the social and moral responsibility of scientists. Clara Immerwahr was born on June 21, 1870 on the Polkendorff Farm near Breslau, where she grew up together with her three older siblings, Elli, Rose and Paul, in a wealthy, highly-cultured, open and liberal family, which wore its Jewishness lightly. Her father, Philipp Immerwahr, had studied chemistry and sought to establish a factory, but when this enterprise failed he turned to Polkendoff, where his farming skills and inventive spirit combined to make him wealthy. He married his cousin Anne, née Korn. The family regularly spent the winter months in Breslau, where Philipp’s mother owned a large store selling clothes and dress materials. Together with her sisters, Clara received her early education from a private teacher, but beginning with the winter term of 1877 all three attended a girls’ school established in the house in which their grandmother lived, continuing to receive private tuition on the farm during the summer months. Quick-witted and thirsting for knowledge, Clara was an eager student, particularly interested in natural sciences and easily angered whenever her teachers referred to her “prospective sphere of women’s occupations.” By the time his sisters left school, Paul had already matriculated and was attending university in Berlin, where he ultimately earned his Ph.D. While her sisters wanted only to marry, Clara envied her brother and in her late teens determined to take up a scientific career. When her mother died of cancer in 1890, the farm was handed over to Elli and her husband Siegfried, while Clara and her father moved to Breslau. Here she met Fritz Haber (1868–1934) at a dancing lesson and fell in love with him, but declined his offer of marriage because she wanted to be economically independent. She therefore began studies at a teacher’s seminary, where the principal, Miss Knittel, a well-educated and widely-traveled woman, soon recognized her aptitude and presented her with Jane Marcet’s Conversations on Chemistry. Delighted in Clara’s interest in his own area of specialization, her father helped her with her studies and later also provided financial support for her research. After completing her studies at the seminary Clara worked as a governess, giving private lessons, but at the same time she fought for permission to take the preliminary examination which would enable her to qualify for university entrance. In 1895–1896 women teachers were finally permitted to attend lectures at Breslau University as visitors. In 1898, Clara Immerwahr became the first woman in Germany to pass the difficult Verbandsexamen, a predoctoral qualifying examination designed to raise standards in the training of professional chemists. On December 12, 1900 she was awarded a doctorate in physical chemistry magna cum laude, her dissertation being a study of the solubility of metal salts, conducted under the supervision of Professor Richard Abegg and dedicated to her “dear father.” She thus became the first woman to be awarded a doctorate in chemistry at a German university. On this occasion, she took an oath “never in speech or writing to teach anything that is contrary to my beliefs. To pursue truth and to advance the dignity of science to the heights which it deserves.” A local newspaper reported on this. After working as laboratory assistant to Professor Abegg—at the highest rank attainable by women—Clara Immerwahr worked briefly as a researcher in Clausthal and gave lectures on “Physics and Chemistry in the Household” at various women’s organizations and institutes. She was several times invited to serve as discussant at the oral presentations of doctoral theses. Nevertheless, she began to feel an outsider in the male-dominated university circles. In April 1901 she and Fritz Haber met again. The latter had in the intervening years gained respect and recognition for his research in electrochemistry and thermodynamics and, later, especially made a name for himself as the inventor of large-scale catalytic synthesis of ammonia, which furnished the essential precursor for many important substances, both life-sustaining and destructive, particularly fertilizers and explosives used in mining and warfare. In 1898 he had been appointed professor at the Technological University in Karlsruhe. An ambitious and incorrigible workaholic, he had converted to Christianity in 1893. Clara herself was baptized in 1897, probably also for pragmatic reasons. The couple married in August 1901 and settled in Karlsruhe. Although at first Clara thought she would be able to combine marriage and a career, and indeed continued her research, she soon found the demands of housekeeping for a husband whose ambitions led him to issue frequent dinner invitations to important guests overwhelming. To this was added a difficult pregnancy and the birth on June 1, 1902, of a sickly son, Hermann. Nevertheless, she collaborated with her husband in his research and especially his textbook on the thermodynamics of gas reaction, which he published in 1905 and which he dedicated to his “beloved wife, Mrs. Clara Haber, Ph.D., with thanks for quiet collaboration.” Clara Immerwahr continued to give lectures to women and was infuriated to find that people naturally assumed these had been written by her husband. Fritz Haber’s career, on the other hand, flourished. In 1911 he was appointed head of the recently founded Kaiser Wilhelm Institute of physical chemistry and electrochemistry in Berlin. Along with the directorship he received a professorial chair at the University of Berlin and membership in the prestigious Prussian Academy of Sciences. Despite the antisemitism prevalent at the time, highly talented individuals of Jewish birth could still rise to the top of their professions, though in private their colleagues and fellow citizens regarded them as not fully German. Certain forms of discrimination remained in place, including a ban on Jews receiving commissions in the Prussian-dominated German army. The outbreak of World War I in 1914 gave Haber an opportunity to prove his patriotism. Concentrating all his efforts on developing poison and other gases, he volunteered to work for the Supreme War Staff. He was soon entrusted with the development of war raw materials and with responsibility for the development of ammonia synthesis. In early 1915, he suggested a diabolically simple idea: to release highly toxic chlorine gas so that it would drift across to the enemy trenches, where it would kill, maim and disable without an artillery bombardment. Appalled, Clara Immerwahr came out in open opposition to his work, condemning this “perversion of the ideals of science” as “a sign of barbarity, corrupting the very discipline which ought to bring new insights into life.” Her husband’s enthusiastic dedication to chemical warfare represented the final break. She several times pleaded with him to cease working on gas warfare. His angry response was to accuse her in public of making statements treasonous to the Fatherland. Their marriage had in any case been in crisis. Haber was seldom at home and made his disdain for her scientific endeavors quite clear. He went on frequent trips with his colleagues and even had affairs with other women. In a letter to her friend Professor Abegg she had earlier complained that Fritz’s gain had been her loss. The first poison gas attack took place on April 22, 1915, on the Western front in the Ypres sector of Belgium. Of the seven thousand casualties that day, more than five thousand died. Countless additional attacks resulted in the deaths of at least a hundred thousand soldiers on both sides. Haber was promoted to the rank of captain. Returning in triumph from the front to their home in the elegant Berlin suburb of Dahlem, he attended a party in his honor on May 2, the night before he was due to go to the eastern front to supervise a gas attack. The couple quarreled. In the early hours of May 2 Clara Immerwahr took her husband’s pistol out to the garden and shot herself. Only their son Hermann heard the shot and alerted his father. On the same day Fritz traveled to the eastern front, leaving his son to deal with the situation. (Hermann himself committed suicide in 1945.) On May 8 the Grunewald Zeitung reported on the suicide of the wife of Dr. H. of the Secret Service, “who is currently at the front,” adding that “the reasons for the unhappy woman’s act are not known.” For the rest of his life Haber never discussed any of the events of her death. In 1918 Haber was awarded the Nobel Prize for his pathbreaking work in ammonia synthesis, but when he received the award the great physicist Ernest Rutherford refused to shake his hand. A few months later there were calls for him to be tried as a war criminal. In May 1933, following the Nazi rise to power, Haber was called to dismiss all Jewish members of his staff, but preferred to resign his position and go into exile, finding refuge in England at Cambridge University. Neither the climate nor the work environment was to his liking. He felt rejected as a pariah for his war activities. Emotionally shattered, he decided to go to Italy. En route in January 1934 he died of a heart attack in Basel. Many years later, in 1968, when the University of Karlsruhe honored the centenary of his birth, the commemorative ceremony was interrupted by students who unfurled a banner reading “Celebration for a Murderer/Haber=Father of Gas Warfare.” As for Clara Immerwahr, her legacy began to come to the attention of the German public in the 1970s. Historians and activists began to investigate the remarkable woman who ended her life in protest against the desecration of science. Articles and a full-length biography by Gerit von Leitner publicized her struggles. In 1991 the German Section of International Physicians for the Prevention of Nuclear War awarded its most prestigious award, the Clara Immerwahr Prize. Since November 2000 the University of Dortmund has a mentoring project for women students which is named for her. A model of civic courage, she is the subject of Tony Harrison’s 1992 play Square Rounds. Throughout her tragically short life, Clara remained faithful to her name, Immerwahr—always true. “Potentiale von CU-Elektroden in Lösungen analytisch wichtiger CU-Niederschläge.” In Zeitschrift für anorganische Chemie 24 (1900): 269–279; “Zur Kenntnis der Löslichkeit von Schwermetallniederschlägen auf elektrochemischem Wege.” In Zeitschrift für Elektrochemie (1901): 477–488. von Leitner, Gerit. Der Fall Clara Immerwahr. Ein Leben für eine humane Wissenschaft. München: 1993. Die Hälfte des Lebens, femina doctissima Clara Immerwahr (television documentary). Lexikon Jüdische Frauen. Edited by Jutta Dick and Marina Sassenberg. How to cite this page Dick, Jutta. "Clara Immerwahr." Jewish Women: A Comprehensive Historical Encyclopedia. 1 March 2009. Jewish Women's Archive. (Viewed on June 29, 2016) <http://jwa.org/encyclopedia/article/immerwahr-clara>.
<urn:uuid:37ae7c6f-a26f-4fe6-8ff8-afe4094570ec>
CC-MAIN-2016-26
http://jwa.org/encyclopedia/article/immerwahr-clara
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397864.87/warc/CC-MAIN-20160624154957-00072-ip-10-164-35-72.ec2.internal.warc.gz
en
0.975819
2,472
2.625
3
Can a Healthy Diet Prevent Cataracts? Age-related cataract is a leading cause of blindness in the world today. Currently, the only treatment for cataracts is surgical removal of the cloudy lens, which typically is then replaced with an intraocular lens (IOL) during the cataract surgery. While the exact cause of cataracts is unknown, experts believe that oxidative stress damages certain enzymes and proteins in the eye's natural lens, which causes the lens to become cloudy. And though some research has produced conflicting results, eating a healthy diet rich in antioxidants and certain vitamins has been shown in several studies to be associated with a reduced risk of cataracts or their progression. Diet, Oxidative Stress and Cataracts Oxidative stress results when there is an imbalance between damaging free radicals roaming the body and the antioxidants that keep them in check. Free radicals are atoms or groups of atoms (molecules) that are highly reactive with other atoms and molecules because they have unpaired electrons. A diet that includes plenty of fruits and vegetables may reduce your risk of cataracts later in life. In the body, a free radical usually is an oxygen molecule that self-stabilizes by taking an electron from another molecule, which in turn tries to take an electron from another molecule, and so on. Free radicals damage the body by stealing electrons from the normally healthy cells of organs and other tissues. This process of stealing electrons from healthy cells is called oxidation. In the eye, oxidation affects proteins and fats in the lens to the extent that the lens becomes damaged and cloudy, creating a cataract. Preventing free radical damage with healthy foods, particularly those containing antioxidants, may help slow down this process. - Moderate to severe dry eyes? Find out if Retaine MGD is right for you - Fight age-related blindness with just one soft gel per day - Vitamin costs add up. Get a BenefitsPal™ discount card to save money Free radicals that damage our eyes and the rest of the body may originate from eating unhealthy foods, exposure to pollution or chemicals, smoking and ultraviolet radiation. Some free radicals occur from normal daily metabolism, which means even people who don't have these risk factors need antioxidants found in healthy foods. Healthy Foods and Cataract Prevention People who consistently follow a healthy diet that includes colorful fruits, vegetables and whole grains may show a decreased risk of cataracts. Antioxidant vitamins and phytochemicals found in fruits and vegetables that may reduce the risk of cataracts include vitamins A, C and E, lutein and zeaxanthin. Consumption of fish, which is high in omega-3 fatty acids, also has been linked to potentially reduced risk of cataracts or their progression. Here is a sample of recent research that suggests a healthy diet and specific eye vitamins may help prevent cataracts: - In 2014, researchers in Sweden published the results of a study of the association between all antioxidants in the diet and age-related cataract. More than 30,000 women age 49 and older completed a dietary questionnaire and were observed for age-related cataract development for an average period of 7.7 years. The study authors found that the women whose diet contained the highest total antioxidant capacity (TAC) were significantly less likely to develop cataracts compared with those whose diets were low in antioxidants. The main contributors to dietary TAC in the study population were fruit and vegetables (44.3 percent), whole grains (17.0 percent) and coffee (15.1 percent). - In a study published in Investigative Ophthalmology & Visual Science, researchers in Australia found that a diet high in carbohydrates may increase cataract risk. Evaluation of the eating habits of more than 1,600 adults revealed that individuals in the top 25 percent for total carbohydrate intake had more than three times the risk for cataracts than those in the lowest 25 percent for carbohydrate intake. - A large study of adult women in Iowa, Wisconsin and Oregon published in Archives of Ophthalmology found that eating foods rich in a variety of vitamins and minerals may help delay the development of cataracts. In an earlier study published in the same journal, the same researchers found diets rich in lutein and zeaxanthin are moderately associated with decreased prevalence of cataracts in older women. - A 10-year study of more than 2,400 older adults in Australia published in American Journal of Clinical Nutrition found that higher intakes of vitamin C or the combined intake of multiple antioxidants reduced the risk of cataracts in this population. - A Japanese study published in British Journal of Ophthalmology linked cataract formation to oxidative stress associated with decreased levels of antioxidants in the lenses of affected eyes. - A large study of female health professionals conducted by researchers at Harvard Medical School, Harvard School of Public Health and the Veterans Affairs Boston Healthcare System published in Archives of Ophthalmology found that higher dietary intakes of lutein, zeaxanthin and vitamin E from food and supplements were associated with significantly decreased risk of cataract. However, other studies have failed to show an association between nutritional supplements and reduced risk of cataracts. In two long-term Age-Related Eye Disease studies (AREDS and AREDS2) sponsored by the National Eye Institute, neither study found use of daily multivitamin supplements containing vitamin C, vitamin E and zinc (with or without beta-carotene, lutein and zeaxanthin, and omega-3 fatty acids) prevented or slowed the progression of cataracts. And while all nutrients, antioxidants and phytochemicals associated with cataract prevention in studies can be found in eye vitamins and vision supplements, many experts believe these substances should be acquired from a healthy diet rather than from nutritional supplements. But if you are like most Americans, it's likely that your diet lacks key nutrients because you're not eating enough fruits and vegetables. Therefore, it's wise to consider taking one or more daily nutritional supplements to make sure you are getting all the nutrients you need for optimum eye health. Prior to embarking on a regimen of eye vitamins and other nutritional supplements, consult your optometrist or ophthalmologist. In some cases, taking too much of a specific vitamin or nutrient could be harmful to your health. Shape Up Your Diet for Good Vision So exactly what is a healthy diet? A healthy diet that provides good nutrition for healthy eyes includes five to nine servings of fruits and vegetables every day, at least three servings of 100 percent whole grains each day and two servings of fish each week. The total calories consumed should be just enough to keep you at a healthy weight, based on your individual activity level and metabolism. Dark green and colorful fruits and vegetables are great sources of eye-friendly antioxidants. They also contain folic acid and calcium important nutrients which also may help reduce the risk of cataracts and should be included in a healthy diet. To maintain a healthy diet, it is equally important to avoid fried foods, processed foods and sugary snacks and soft drinks all of which appear to be associated with an increased risk of cataracts, as well as obesity and other health problems. Reducing sodium in your diet also is a good idea, as researchers at the University of Sydney (Australia) have found evidence that high salt intake may increase your risk for cataracts. Giving up greasy fast food, chips, sugary snacks and soft drinks may not be easy. But it's worth it. Once you get used to eating delicious fruits and vegetables, fresh fish and other healthy foods, you won't miss junk foods. And your reward just might be both a healthy body and a lifetime of good vision. NIH study provides clarity on supplements for protection against blinding eye disease. National Eye Institute. Press release issued May 2013. Dietary carbohydrate in relation to cortical and nuclear lens opacities in the Melbourne Visual Impairment Project. Investigative Ophthalmology & Visual Science. June 2010. Healthy diets and subsequent prevalence of nuclear cataract in women. Archives of Ophthalmology. June 2010. Vitamin C supplements and the risk of age-related cataract; a population-based prospective cohort study in women. American Journal of Clinical Nutrition. February 2010. Age-related cataracts and Prdx 6: correlation between severity of lens opacity, age and the level of Prdx 6 expression. British Journal of Ophthalmology. August 2009. Antioxidant nutrient intake and the long-term incidence of age-related cataract: the Blue Mountains Eye Study. American Journal of Clinical Nutrition. June 2008. Associations between age-related nuclear cataract and lutein and zeaxanthin in the diet and serum in the Carotenoids in the Age-Related Eye Disease Study (CAREDS), and ancillary study of the Women's Health Initiative. Archives of Ophthalmology. March 2008. Dietary carotenoids, vitamins C and E, and risk of cataract in women. Archives of Ophthalmology. January 2008. Antioxidant vitamins and zinc reduce risk of vision loss from age-related macular degeneration. National Eye Institute. Press release issued October 2001. [Page updated June 2016]
<urn:uuid:4b0dab1a-1106-4081-9836-f9fbeedb55a0>
CC-MAIN-2016-26
http://www.allaboutvision.com/nutrition/cataracts.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399385.17/warc/CC-MAIN-20160624154959-00164-ip-10-164-35-72.ec2.internal.warc.gz
en
0.946386
1,926
3.109375
3
back to Health & Wellness Mastoiditis Learning Center Mastoiditis is an infection of the mastoid bone of the skull. The mastoid is located just behind the outside ear. If an infection develops in your middle ear and blocks your Eustachian tube, it may subsequently lead to a serious infection in the mastoid... back to top
<urn:uuid:88577694-feed-4c09-89c9-e972b660b4e6>
CC-MAIN-2016-26
https://www.aarpmedicareplans.com/channel/mastoiditis.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403826.29/warc/CC-MAIN-20160624155003-00016-ip-10-164-35-72.ec2.internal.warc.gz
en
0.922046
76
2.90625
3
Note: This message is displayed if (1) your browser is not standards-compliant or (2) you have you disabled CSS. Read our Policies for more information. Internet crimes and online bullying are becoming a raised concern as youth internet usage drastically increases. A study by Crimes Against Children Research Center showed that almost all youth (97%) were using the Internet from home, up from 74% in 2000 and almost half of youth (47%) were using the Internet from cell phones. The study also shows that unwanted sexual solicitations continue to decline from 19% in 2000 to 9% in 2010, however we have seen an increase in online harassment from 6% in 2000 to 11% in 2010. Attorney General Greg Zoeller is working diligently to protect Indiana’s youth in response to the increasing number of teenagers using the Internet, the proliferation of child pornography, and the heightened online activity by predators searching for unsupervised contact with underage victims. On July 1, 2008, a law took effect which prohibits a registered sex offender convicted of certain crimes involving children from knowingly using social networking web sites, instant messaging programs or chat room programs the offender knows include children. The Office of the Indiana Attorney General was an advocate of this new law and helped legislators craft the language for the state statute. First time violators of this law face a potential jail sentence of six months to three years. If the sex offender violates the law again, the charge would be elevated to a Class C felony, which carries a two to eight year sentence. In addition, the Office is collaborating with the National Center for Missing and Exploited Children to offer the NetSmartz Workshop (http://www.netsmartz.org/). This site contains a wealth of tools and resources to help educate youth, parents and educators about Internet safety.
<urn:uuid:bb724c35-5fb8-431c-b955-9cf33a6dd974>
CC-MAIN-2016-26
http://www.in.gov/attorneygeneral/2631.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397749.89/warc/CC-MAIN-20160624154957-00122-ip-10-164-35-72.ec2.internal.warc.gz
en
0.943539
368
2.953125
3
AHEAD of the annual Watercress Festival in Alresford later this month, new research has found that antioxidant-rich watercress, often labelled a super-food, can alleviate the natural stress put on our body by a workout. According to a new study sponsored by Hampshire based Vitacress Salads from scientists at Edinburgh Napier University and a team lead by Dr Gareth Davison at the University of Ulster, eating watercress can prevent some of the damage caused by high intensity exercise and help maximise the benefits of a tough workout. Study leader Dr Mark Fogarty said: “Although we are all aware of how good exercise can be for our bodies, pounding the treadmill, lifting weights, or doing high-levels of training can take its toll. The increased demand on the body for energy can create a build-up of free radicals which can damage our DNA. “What we’ve found is that consuming a relatively small amount of watercress each day can help raise the levels of important antioxidant vitamins which may help protect our bodies, and allow us to enjoy the rewards of keeping fit. It’s an interesting step forward in sports nutrition development and research. “We put participants through short bursts of intense exercise and found that those who had not eaten watercress were found to have more DNA damage than those that did not. What was also fascinating is that the effect of eating watercress was not reliant on an accumulative build-up in our bodies. Those who ate the vegetable just two hours before exercise experienced the same benefits as those who had consumed the vegetable for eight weeks.” He added: “A bag of watercress a day may be influential in aiding the bodies healing process. However, sensible advice when exercising still stands and whether you are consuming watercress or not, you should always stay hydrated and listen to your body when it tells you enough is enough.” British watercress farmers are celebrating the start of the British watercress season with National Watercress Week, which gets underway on Sunday, May 20, at the annual Watercress Festival held in Alresford, Hampshire. For more information on the festival, visit watercress.co.uk.
<urn:uuid:6ce7f7ca-bfed-493b-b927-6c848407a70f>
CC-MAIN-2016-26
http://www.dailyecho.co.uk/news/campaigns/eat_local/9696360.Health_benefits_of_Hampshire_watercress/?ref=rss
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398873.39/warc/CC-MAIN-20160624154958-00146-ip-10-164-35-72.ec2.internal.warc.gz
en
0.962934
462
2.90625
3
[January 12, 2002] Web Services Conversation Language (WSCL) provides an XML schema for defining legal sequences of documents that web-services can exchange. WSCL "allows defining the abstract interfaces of web services, i.e., the business level conversations or public processes supported by a web service. WSCL specifies the XML documents being exchanged, and the allowed sequencing of these document exchanges. WSCL conversation definitions are themselves XML documents, and can therefore be interpreted by web services infrastructures and development tools. WSCL may be used in conjunction with other service description languages like WSDL, e.g., to provide protocol binding information for abstract interfaces and to specify the abstract interfaces a concrete service is supporting." [From the WSCL specification abstract] WSCL version 1.0 is derived from the Conversation Definition Language (CDL) as defined in the HP Service Framework Specification (SFS). The service framework specification "is a layered specification that enables interoperability through the use of XML and formal definitions of interactions amongst services. It also provides mechanisms for dynamically discovering services as well as interacting with them through the exchange of XML documents. The specification has two parts: the first part specifies more horizontal infrastructural services such a messaging, service definition, transactions, management, vocabularies, and discovery of services. The second part focuses on higher level business interactions such as negotiation and contract formation." WSCL description from the 2001-05 specification: In the context of web services, business payload is mostly expressed in XML. Therefore, one possible and often used way to define the business payload is to use XML schemas. Yet defining which XML documents are expected by a web service or are sent back as a response is not enough. We also have to define in which order these documents need to be exchanged, thus specifying a business level conversation. By specifying the conversations supported by a web service, i.e. by defining the documents to be exchanged and the order in which they may be exchanged, we define the external visible behavior of a web service, its abstract interface. Conversations focus on the public processes in which the participants of a web service engage... By clearly distinguishing between the concepts of abstract interface, communication protocol, and concrete service, we enable the loose coupling desired for web services. Protocols can be specified once for very different web services. The abstract interfaces defining the business-level conversations can be specified once for a specific industry and then be bound to different protocols and be used by any number of services with completely different implementations. A single concrete service can implement several abstract interfaces, which can also be implemented by other concrete services hosted on other service providers. There are various possible ways to describe business level conversations. The conversation definition language WSCL has chosen a formal approach, based on XML. WSCL is defined by an XML schema. WSCL 1.0 is a simple conversation definition language 1 . Its purpose is to provide and define the minimal set of concepts necessary to specify conversations. It is expected that WSCL will be extended for more complex web services framework, e.g. to include multi-party conversations, quality of service attributes, transactions, or composition of conversations. A key advantage of formal specification languages such as WSCL is that they pave the way for the creation of service frameworks that will enable service implementers to offload the responsibility for conversation-related tasks to infrastructure. For example, a service developer could create WSCL specifications documenting their service's abstract interface, and make this documentation available to potential users. A software developer can then use WSCL compliant web services servers and tools that would provide such functionality as document type validation, conversation tracking, and message dispatching to the application logic. Ideally, software developers creating and using web services will be supported by tools that allow them to easily and quickly map the interactions outlined in the conversation definition to any existing applications and back-end logic, while separating cleanly between the conversational and the application logic. Without any formal definition of the conversations, such tool support will not be possible. "In the traditional application model, services are tightly coupled with the processes they support. For example, whenever a server's process changes, existing clients that use that process must also be updated. However, electronic commerce is moving towards e- service based interactions, where corporate enterprises use e-services to interact with each other dynamically, and a service in one enterprise could spontaneously decide to engage a service fronted by another enterprise. In this paper, we clarify the relationship between currently developing standards such as the Universal Description Discovery and Integration (UDDI), the Web Services Description Language (WSDL), and the Web Services Conversation Language (WSCL), and propose a conversation controller mechanism that leverages such standards to direct services in their conversations. Using such a mechanism means that services can be written as pools of methods independent of the conversations they will participate in. Even the specific method names can be decided on independently of the conversations. The services can spontaneously discover each other and then engage in complicated interactions without the services themselves having to explicitly support conversational logic. The dynamism and flexibility enabled by this decoupling is the essential difference between applications offered over the web and e- services." [abstract from TR 'HPL-2001-127' cited below] "The prevalent model for web-service communication is that web-services will publish information about the specifications that they support. UDDI facilitates the publication and discovery of web-service information. The current version of WSDL (1.0) is an XML-based format that describes the interfaces and protocol bindings of web service functional endpoints. WSDL also defines the payload that is exchanged using a specific messaging protocol; SOAP is one such possible messaging protocol. Together, UDDI, WSDL, and WSCL enable developers to implement web services capable of spontaneously engaging in dynamic and complex inter-enterprise interactions. However, neither UDDI nor WSDL currently addresses the problem of how a service can specify the sequences of legal message exchanges (interactions) that it supports. The Web Services Conversation Language (WSCL) addresses this issue, providing an XML schema for defining legal sequences of documents that web-services can exchange; it provides a standard way to model the public processes of a service, thus enabling network services to participate in rich interactions. Web services interact by exchanging messages. Each message can be expressed as a structured document (e.g., using XML) that is an instance of some document type (e.g., expressed using XML Schema). A message may be wrapped (nested) in an encompassing document, which can serve as an envelope that adds contextual (delivery or conversation specific) information (e.g., using SOAP). We define a conversation to be a sequence of message exchanges between two or more services. We clarify the relationship between WSCL, UDDI, and WSDL; in particular, we describe how together these three components can be used to create an environment in which services can spontaneously discover each other and then engage in complicated interactions.We define a conversation specification to be a formal description of 'legal' message type-based conversations that a service supports..." [from 'Using WSCL in a UDDI Registry 1.02'] - HP web services - WSCL 1.0 submission to W3C: - Web Services Conversation Language (WSCL) 1.0. By Arindam Banerji, Claudio Bartolini, Dorothea Beringer, Venkatesh Chopella, Kannan Govindarajan, Alan Karp, Harumi Kuno, Mike Lemon, Gregory Pogossiants, Shamik Sharma, and Scott Williams. May 2001. Hewlett-Packard Company. 21 pages. [cache] - WSCL XML Schema Definition and Example WSCL Specification. From the May 2001 specification (Appendices A and B). - Conversations + Interfaces = Business Logic. By Harumi Kuno, Mike Lemon, Alan Karp, Dorothea Beringer (Software Technology Laboratory, HP Laboratories Palo Alto, CA). Reference: HPL-2001-127/20010601. May 23, 2001. 15 pages. See also the overview. [cache] - Using WSCL in a UDDI Registry 1.02. UDDI Working Draft Best Practices Document. May 5, 2001. By Dorothea Beringer, Harumi Kuno, and Mike Lemon (Hewlett-Packard Company). [cache, alt URL] - Service Framework Specification, Part I, Version 2.0. By Arindam Banerji, Claudio Bartolini, Dorothea Beringer, et al. Hewlett-Packard Company. Reference: HPL-2001-138/20010626. June 7, 2001. 199 pages. "The service framework specification is a layered specification that enables interoperability through the use of XML and formal definitions of interactions amongst services. It also provides mechanisms for dynamically discovering services as well as interacting with them through the exchange of XML documents. The specification has two parts: the first part specifies more horizontal infrastructural services such as messaging, service definition, transactions, management, vocabularies, and discovery of services. The second part focuses on higher level business interactions such as negotiation and contract formation." [cache] - Schemas and Example Documents. From the HP Service Framework Specification, Part I, Version 2.0. June 7, 2001. - "Transformational Interactions for P2P E-Commerce." By Harumi Kuno, Mike Lemon, and Alan Karp (Software Technology Laboratory, HP Laboratories Palo Alto, California). HP Reference: HPL-2001-143 (R.1). October 10, 2001. To be published in and presented at IEEE HICSS-35, Hawaii International Conference on System Services, January 2002. "We propose a facilitator service mechanism that can leverage 'reflected' XML-based specifications (borrowed from the web service domain) to direct and enable coordinated sequences of mes-sage exchanges (conversations) between services. We extend the specification of a message exchange with the ability to specify transformations to be applied to both inbound and outbound documents. We call these extended message exchanges transformational interactions. The facilitator service can use these transformational interactions to allow service developers to decouple internal and external interfaces. This means that services can be developed and treated as pools of methods that can be composed dynamically... We extended the Web Service Conversation Language (WSCL) to meet our need for a conversation definition language that includes document transformation specifications. WSCL is an XML-based specification that defines a service interface in terms of a list of interactions (keyed by document type), a list of transitions that describe legal interaction orderings. We extended our usage of WSCL to include mappings of the input and output document types to corresponding document transformations... WSCL addresses the problem of how to enable services from different enterprises to engage in flexible and autonomous, yet potentially quite complex, business interactions. It adopts an approach from the domain of software agents, modelling protocols for business interaction as conversation policies, but extends this approach to exploit the fact that service messages are XML-based business documents and can thus be mapped to XML document types. Each WSCL specification describes a single type of conversation from the perspective of a single participant. A service can participate in multiple types of conversations. Furthermore, a service can engage in multiple simultaneous instances of a given type of conversation. For example, a service that supports the 'secured album' conversation type [from Figure 1] expects a conversation to begin with the receipt of a LoginRQ or a RegRQ document. Once the service has received one of these documents, then the conversation can progress to either a 'logged in' state or a 'registered' state, depending on the type of message the service generates to return to the client. There are three elements to a WSCL specification: Document type descriptions specify the types (schemas) of XML documents that the service can accept and transmit in the course of a conversation; Interactions model the state of the conversation as the document exchanges between conversation participants; Transitions specify the ordering relationships between interactions... Our solution is unique in that we distinguish between the conversational protocols and service-specific interfaces. This allows us to provide an extremely lightweight solution relieving service developers from the burden of implementing conversation-handling logic. In addition, we also introduce transformational interactions that allow facilitator services to leverage document transformations and make possible the automated coordination of complex conversations between peer services that do not support compatible message document types. In the future, we plan to investigate more sophisticated uses of conversation policies. For example, we would like to provide a model for the explicit support of deciding conversation version compatibility. We would also like to explore how to support both nested conversations and multi-party. Finally, we hope to address how to exploit document type relationships when manipulating message documents. For example, we would like to use subtype polymorphism to establish a relationship between a document type accepted as input by an interface specification and a corresponding document type in a conversation specification..." [cache] - [January 12, 2002] "Tying the Application Knot." By Mario Apicella. In InfoWorld (January 10, 2002). "Web services promise to deliver an open, Web-based architecture to connect business processes, which could potentially turn upside down the way we think of, create, and use software... WSCL (Web Services Conversation Language), an interesting set of specifications released in May by Hewlett-Packard, complements the service descriptions of WSDL with essential elements to describe the flow of a business process between partners. WSCL completes a UDDI registry for a company with business process information such as the document formats to exchange, the activities needed to carry on the transaction, and their sequence. However, even with the addition of WSCL, UDDI registries could fall short describing all the roles and interactions that make a cooperative e-business scenario. A competing set of specifications for e-business, called ebXML (E-Business XML), promises a more comprehensive approach to discovering services and partners and defining business scenarios involving multiple parties... New specifications, including WSCL (Web Services Conversation Language) and ebXML (e-business XML), take a more comprehensive approach to describing process flows..." - "CDL: Conversation Definitions: Defining Interfaces of Web Services." By Kannan Govindarajan, Alan Karp, Harumi Kuno, Dorothea Beringer, and Arindam Banerji (Hewlett Packard Company). Presented at the W3C Workshop on Web services, 11-12 April 2001 - San Jose, CA, USA. - A different WSCL: see the XML DTD for the 'Workspaces Coordination Language (WSCL)'; the 'WSCL' DTD was created from the Workflow Process Description Language (WPDL). See "Design and Implementation of an XSL-T and XML-based Workflow System," presented at XML Europe 2001 by Marc Stauch and Dr Robert Tolksdorf.
<urn:uuid:11793aa6-2989-4dfb-8ca6-61efb6e8d902>
CC-MAIN-2016-26
http://xml.coverpages.org/wscl.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397562.76/warc/CC-MAIN-20160624154957-00084-ip-10-164-35-72.ec2.internal.warc.gz
en
0.891001
3,119
2.59375
3
Rattleweed, Loco Weed Common name: Freckled milkvetch, rattleweed, loco weed. Latin name: Astragalus lentiginosus Height: 6-18 inches tall. Description: 3-50 flowers on inflorescence usually many branched ascending or spreading, petals purplish, cream, whitish, or mixed purplish and whitish. The mottled, papery pod/fruit is probably the most characteristic feature of this plant. Leaf: 1–15 cm; leaflets linear to widely ovate. Stems and leaflets are a grey or silvery shade of green. Range: n High Sierra Nevada, s Sierra Nevada, Tehachapi Mountain Area, San Joaquin Valley, San Francisco Bay Area,Inner South Coast Ranges, Great Basin Floristic Province, Desert Habitat: Sagebrush Scrub, Shadscale Scrub, Alkali Sink, Subalpine Forest, Foothill Woodland, Yellow Pine Forest, Valley Grassland, Creosote Bush Scrub, Joshua Tree Woodland. Generally dry, open places. Elevation: -30–3600 m Notes: Photographed Mar 3, 2010, near Short Canyon, on water pipeline road, Mojave Desert, Kern County, Calif. The seeds make a rattling noise in the dried pod which is the basis for one of its common names. Cattle and horses display a decidedly crazy behaviour, "loco" in Spanish, after eating this plant and that is why it is called loco weed. This is a highly variable species depending on locale. Annual or perennial herb that is native to California and is also found outside of California to Washington, Wyoming, Idaho, Colorado, and New Mexico. Photos tips Most digital point-and-shoot cameras have a macro function - usually symbolized by the icon of a little flower. When you turn on that function, you allow your camera to get closer to the subject, looking into a flower for example. Or getting up close and personal with a bug. More on desert photography. Mojave Desert wildflowers This book is the standard by which all other wildflower books are measured. The author, Jon Mark Stewart, has combined super photography with concise information. This book has an entire color page to each wildflower covered, with a discussion of the wildflower. 210 pages with 200 color photos. More... What's Blooming Now - Check the Wildflower Reports SEARCH THIS SITE Wildflower field guide - find the flowers by color Click here to see current desert temperatures! DesertUSA is a comprehensive resource about the North American deserts and Southwest destinations. Learn about desert biomes while you discover how desert plants and animals learn to adapt to the harsh desert environment. Find travel information about national parks, state parks, BLM land, and Southwest cities and towns located in or near the desert regions of the United States. Access maps and information about the Sonoran Desert, Mojave Desert, Great Basin Desert, and Chihuahuan Desert.
<urn:uuid:de6cd8e8-9770-4a19-a522-dd583a797549>
CC-MAIN-2016-26
http://www.desertusa.com/flowers/Freckled-milkvetch.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395560.69/warc/CC-MAIN-20160624154955-00050-ip-10-164-35-72.ec2.internal.warc.gz
en
0.866574
635
2.640625
3
Forced Labor in Burma Should be Stopped Immediately The Burmese government signed an agreement last week with the International Labor Organization to end forced labor in the country by 2015. Three years is far too long to wait. Human rights violations should not be phased out; they should be stopped right away. The Burmese government has the power to stop forced labor immediately: it is the main perpetrator of forced labor in Burma, and a governmental order could, in theory, end this human rights violation tomorrow. The three-year time frame is another reminder that protecting human rights is not a priority of the Burmese government. Forced labor is a scourge in many areas of Burma, but it is especially common in ethnic minority regions because of the high military presence in these areas and the Burmese military’s tradition of supporting itself from the civilian population. Members of the military, with few resources of their own, demand food and other necessities from civilians and force them to provide services to the military. Forced portering, construction, and cooking are some of the common demands from the military. Two reports last week from the Karen Human Rights Group (KHRG) and Kaladan Press documented the crime of forced labor in Karen and Arakan States. KHRG reported that in the last four months the Burmese Army commandeered civilian vehicles to transport supplies, build roads, and clear roads of landmines by driving in front of military convoys. The military also forced civilian laborers to build roads. Kaladan press reported that NaSaKa (Burmese military border force) troops force about 300 people to build roads each day, and press more into cleaning and maintaining barracks. Two recent PHR investigations documented forced labor in Kachin and Chin States. In November 2011, PHR reported in Under Siege in Kachin State, Burma that the Burmese Army used Kachin civilians to guide troops, carry supplies and sweep for mines by walking in front of soldiers. In January 2010, PHR reported in Life Under the Junta that 92% of 621 households surveyed across Chin State reported a household member being forced to work against his or her will for the government or military. In the study in Chin State, PHR found a statistically significant association between household hunger and forced labor. That is, households that experienced forced labor were more likely to have food shortages than households that did not experience forced labor. Last week’s reports from Karen and Arakan states echoed this finding: Rohingya forced laborers in Arakan reported that they were afraid they would run out of food if they were not able to spend time working in their fields. Karen villagers also said that they do not have enough time to conduct their own work when they are forced to work for the military. The ethnic areas of Burma have not yet benefitted from democratic reforms recently initiated in the capital, including a loosening of media controls, release of political prisoners, and acceptance of greater freedoms for political opponents. But many ethnic people are wary of the changes they hear about in Rangoon. In order to rebuild trust with ethnic minorities after 60 years of abuse, the government of Burma needs to make greater efforts to end human rights violations, including forced labor, and hold perpetrators of these crimes accountable. Forced labor continues multiple ethnic areas in Burma, and the Burmese government should stop this illegal practice immediately. The international community should welcome the initial changes that have benefited those living in Burma’s urban centers, but also recognize that people living in ethnic areas have not experienced any of the changes seen in Rangoon and Mandalay—and it should continue to pressure the Burmese government to protect the human rights of all people in Burma.
<urn:uuid:a07c86e1-94c3-4d6e-bb54-786818d87a8b>
CC-MAIN-2016-26
http://physiciansforhumanrights.org/blog/forced-labor-in-burma-should-be-stopped-immediately.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393533.44/warc/CC-MAIN-20160624154953-00045-ip-10-164-35-72.ec2.internal.warc.gz
en
0.968535
767
2.578125
3
HSV-2 & HIV: by Anna Wald, MD(1), Timothy Schacker, MD(2), Lawrence Corey, MD(3) Infections with herpes simplex viruses (HSV) are very common among persons with HIV infection. Despite the frequent co-infection with both viruses, the interactions between HSV and HIV have been not fully elucidated. However, evidence suggests that these interactions occur on epidemiologic, clinical, and cellular levels: Genital herpes and transmission and acquisition of HIV Several studies have found that persons with HIV infection also have high prevalence of HSV-2 infection. However, it remains unclear whether HSV-2 is a marker for high risk sex behavior, or whether it truly facilitates acquisition of HIV infection. Both epidemiologic studies of HIV acquisition and the biology of HSV lesion suggest that the latter is true. At least five studies conducted in various populations suggest that those with HSV-2 infection are more likely to be HIV infected. The increase in risk of HIV infection ranges from 2-fold to 7.5-fold. For example, in a longitudinal study of heterosexual couples in Europe, those susceptible partners who had a history of genital ulcers were 5.2 times as likely to acquire HIV than the susceptible partners who did not have a history of genital ulcers. Two biological aspects of genital herpes support the hypothesis that HSV-2 facilitates HIV acquisition. Genital ulcers cause a mucosal disruption, which may allow entry of HIV. Also, genital herpes lesions attract activated CD4 cells that act as target cells for HIV attachment. Fewer data are available on the relationship between HSV-2 infection and HIV transmission, as transmitters of disease are more difficult to study. However, in an early description of a cluster of HIV infection among women, a man who had HIV infection unknowingly infected 14 of 19 women with whom he had sexual relations. He had a history of recurrent genital herpes. Other studies have also suggested that transmission of HIV is more likely to occur from a person who has genital ulcers. This has been shown both for female to male as well male to female transmission. In 1989, Kreiss and colleagues detected HIV in 4 of 36 ulcers in women; subsequently, HIV has also been detected in ulcers among men. These early studies were done in Kenya where chancroid was the predominant cause of ulcerations. As genital herpes is the most common cause of genital ulcers in the United States, we have investigated whether we can recover HIV from genital herpes lesions in persons with HIV infection. Twelve men with a history of genital herpes were enrolled in this study. The median CD4 count was 186 and the median plasma HIV RNA 41,000 (this study was conducted prior to introduction of protease inhibitors). None of the participants had a history of difficult to treat genital herpes. The 12 clients were followed for 26 episodes of genital herpes; 23 healed without anti-herpes therapy, while 3 healed after administration of acyclovir. Clients were seen within 24 hours of new recurrence and then every other day, and swab samples were obtained from their genital lesions for HIV polymerase chain reaction (PCR) assay. HIV RNA was detected in 25 out of 26 recurrences and in 116 of 170 lesion samples. Three-fourths (75%) of the HIV RNA-positive samples contained 10,000 or more copies of HIV/ml. In addition, the PCR signal was detected only when reverse transcriptase was added to the reaction, suggesting that only virion RNA was present and not proviral DNA. HIV was detected in lesions of people with high and low viral loads, and regardless of concurrent antiretroviral therapy. In one person in whom acyclovir was started on the fifth day of his genital herpes recurrence, the levels of HIV RNA in lesions fell rapidly as the lesions healed. This study supports the hypothesis that persons who have HIV and genital herpes may transmit HIV infection to others more easily than those who are not HSV-2 infected. In addition, it suggests that therapy of genital herpes may curb transmission of HIV to susceptible sexual partners. High rates of HSV shedding in the genital tract of the HIV infected persons Large, chronic, persistent herpes ulcers were among the first opportunistic infections described in homosexual men in 1981. Since that time, advanced HIV infection has been associated with severe genital herpes and the emergence of acyclovir resistance. Because of the unusual severity of genital herpes in some HIV infected persons, persistent herpetic ulcerations are an AIDS-defining diagnosis. Yet in spite of the anecdotal reports of painful and difficult to treat genital herpes in some persons with HIV infection, the natural history of HSV in HIV infected persons has not been well defined. Clinical experience suggests the rate of clinical recurrences (outbreaks) may be increased and that the response to antiviral therapy may be delayed. To assess the impact of HIV infection on the natural history of genital herpes, we followed prospectively a cohort of 68 men with HIV and HSV-2 infection. The men obtained daily swabs for viral culture from the urethra, penile skin, and the perianal area, and maintained a diary of recurrences. The median duration of study participation was 55 days. We found that, overall, the rate of shedding was very high: HSV-2 was isolated on 9.7% of days of cultures. In comparison, HIV seronegative men have a significantly lower rate of shedding: 3.3% of days for men who have sex with men (MSM), and 4.7% for heterosexual men in two separate studies. Shedding was especially high in the perianal area, where virus was isolated on 8.6% of the days. Of interest, the most common site of shedding among MSM men who are HIV-negative is also the perianal area (2.9% of days), while among heterosexual men the most common site is the penile skin (3.3% of days). Most of the increase in the total shedding rate is accounted for by a dramatic increase in the subclinical shedding rate, defined as the presence of the virus on skin in the absence of herpes lesions. The subclinical shedding rate was 7.3% of days among HIV-positive MSM, compared with 2.4% of HIV-negative MSM and 2.2% of HIV-negative heterosexual men. Thus it appears that the viral shedding rate is about three-fold higher in HIV-positive versus HIV-negative men. The shedding rate was especially increased among men who have CD4 counts below 200: the risk of shedding was twice as high among men with CD4 counts less than 200 versus those with higher CD4 counts. Therefore, the increase in the rate of viral shedding appeared closely related to the degree of immunosuppression. In a smaller group of people, we also examined viral shedding using the HSV DNA polymerase chain reaction (PCR) test. This test was developed at the University of Washington and detects minute amounts HSV DNA (1 to 10 copies/sample). Among 14 men who were studied with both viral culture and HSV DNA PCR test, HSV was isolated in culture on 25% of days, but HSV DNA was detected on 48% of the days. In fact, 5 of 14 men had HSV DNA detected on more than 50% of the days. The high rate of positivity by both culture and PCR was especially striking in men with CD4 counts under 200. The HSV DNA PCR assay is also able to estimate the number of viral copies present in each sample. Using this semiquantitative measure, we found that people with a CD4 count under 200 had 10 times the HSV DNA in the swab samples than people with higher CD4 counts had. Therefore, it is clear that persons with HIV-induced immunosuppression not only shed HSV more frequently, but also that the shedding is associated with much more virus on the genital skin. HSV reactivation upregulates HIV replication. Several in-vitro laboratory studies have indicated that certain regulatory HSV proteins (ICPO, ICP27, and VP16) can upregulate HIV replication. In addition, both HSV-2 and HIV can co-infect CD4+ cells suggesting that these viruses may interact frequently in vivo. At the same time, several clinical studies have shown that opportunistic infections, or other means of immune activation (such as Pneumocystis carinii pneumonia, bacterial pneumonia, tuberculosis, or immunizations) can stimulate HIV replication and, at least transiently, increase viral load. Recently, Mole and colleagues have shown that the plasma HIV viral load increases in people with recurrences of genital herpes. It is not known how these increases contribute to overall progression of HIV disease. Intriguing results have also been obtained from clinical trials that suggested that administration of acyclovir is associated with increased survival in HIV infected persons. While not all of the studies found that effect, there is speculation that reactivation of HSV may accelerate progression of HIV disease. To examine this issue, we followed 12 people (whose median CD4 count was 246) who were on stable antiretroviral therapy (prior to introduction of protease inhibitors). Clients with serial plasma HIV viral loads were evaluated, initially without acyclovir, and then while being treated with acyclovir 800 mg tid (three times a day). The median period of observation was 65 prior days prior to acyclovir and 62 days on acyclovir therapy. Plasma HIV RNA was determined on average twice a week during these observations. We found that the HIV RNA decreased from a mean of 25,527 to 16,444 copies/ml, a 35% decrease. Also of interest, the decrease was observed in all 12 people. This study supports the observation that acyclovir may slow the progression of HIV disease by preventing reactivation of HSV. Currently available data suggest that several important interactions occur between HSV and HIV. First, HIV shedding from genital herpes lesions is frequent. Therefore, HSV is likely to facilitate transmission of HIV to uninfected sexual partners. Second, HSV shedding in men with HIV infection is chronic and mostly subclinical. Because men are not aware when they are shedding HSV, they may engage in unsafe sex during HSV reactivation, increasing the risk of transmission of both HSV and HIV. Third, acyclovir therapy appears to decrease plasma HIV RNA. This supports the importance of HSV as an endemic opportunistic infection and suggests that chronic antiherpes therapy may provide benefit in some persons with HIV infection. These studies leave several questions unanswered: Any person interested in participation in studies designed to answer these important questions is invited to call the University of Washington Virology Research Clinic at 206-720-4340 for more information. Timothy Schacker, M.D., Department of Medicine, University of Washington, Seattle, Washington, Lawrence Corey, M.D., Departments of Laboratory and Medicine, University of Washington, Program Infectious Diseases, Fred Hutchinson Cancer Research Center, Seattle, Washington HIV Drug Resistance and the Other Causes of Treatment Failureby Jeffrey T. Schouten MD The key point to emphasize is that HIV can only become resistant to a drug if it is actively replicating (reproducing itself). When HIV viral loads are reported to be "non-detectable," this is very misleading. What a "non-detectable" result really means is that the amount of HIV present in the blood is below the limits of the viral load test to detect HIV. Most clinics in the country use tests which can detect 500 (or more) copies of HIV, per ml of blood. Thus, "non-detectable" means that you have 499 (or less) copies of HIV, per ml of blood. These tests are called "sensitive" viral load tests. There are now several companies which have "ultra-sensitive" viral load tests available, which can detect 20 (or more) copies of HIV, per ml of blood. Thus, a "non-detectable" result from such a test would mean that you have 19 (or less) copies of HIV, per ml of blood. More accurately, the test result should be reported "below the limits of quantification", not "non-detectable". This is not a trivial point, as will be discussed in this article, the chance of HIV developing drug resistance may be very different if your viral load is 490, versus 0 copies; yet, in both situations the current, most widely-used viral load tests would report the result to be "non-detectable." "You'd better get that drug when it's new, because it won't work as well once it's been around for a while." The factors leading to this truism of medicine will explain many of the issues involved in the recent reports that the new anti-HIV drugs control HIV replication for only about half of all HIV-infected persons. Reports by researchers from the University of California at San Francisco presented at the ICAAC meeting in Toronto, in September, 1997, showed that 53% of persons at their HIV clinic did not achieve long-term suppression of HIV replication with combination therapy. This contrasts to the controlled trials of highly active antiretroviral therapy (HAART) which showed that triple drug combinations, including a protease inhibitor (PI), completely suppressed HIV replication for 1-2 years in up to 80-90% of persons studied. Why, then, do only half of persons treated in the "real world" achieve a similar result? Factors Contributing to Treatment Failure Trial Participation Selection Clinical trials are very selective in which people they enroll into the trial. "Inclusion criteria" often exclude persons with significant liver, kidney, of blood disorders. A concrete example of the impact of this selection process is that people with chronic liver disease, such as many HIV-infected injection drug users with chronic hepatitis C infection, often experience worsening of their liver disease when treated with protease inhibitors (PI). Had these people been included in the initial PI trials, the results would not have been so good. Additionally, controlled trials usually enroll persons who are more compliant, more educated, and more motivated to seek out the latest, best treatments. Some of these factors are correlated with better treatment results, than those attained by the broad spectrum of all persons seen in a clinic. Some trials exclude persons who have been treated with PI's or reverse transcriptase inhibitors in the past. This may be done, for example, by a protocol which offers a new protease inhibitor (PI) to people who have failed all other PI's, but also requires that the person be on two reverse transcriptase inhibitors (RTI) which they have never taken before. If a person has been on (and failed) all the RTI's currently available, then they will not be able to participate in that trial. The fact that a drug performs better in a controlled trial than in the "real world" is not unique to anti-HIV drugs, but it has created inflated expectations of the efficacy of the new anti-HIV drugs in the eye of the public, many health care providers, and people living with HIV. Due to the unique ability of HIV to mutate, drug resistance can arise when a person misses even a couple of doses of a drug (i.e. "is not compliant"). Thus, if a person is on a combination of drugs which is completely suppressing all HIV replication in their body, resistance to the drug cannot develop. However, if such a person were to miss a few doses of their medication, then some HIV replication may occur, allowing the opportunity for the virus to become resistant to the drugs that person is taking. It has been estimated that the virus makes a mistake once every 10 times that it copies itself. Many of these mistakes result in a defective virus which is unable to infect other cells. However, every so often, one of these random mutations results in the virus being resistant to a specific drug. So, if the person is taking that drug to which HIV has become resistant, then that particular mutant will grow unchecked and become the dominant virus in the person's system. Because there may be up to a billion copies of HIV in the body, many mutations occur everyday if there is high level of HIV present (a high viral load). Thus, one of the major factors causing treatment failure is mutation of HIV, resulting in HIV not suppressed by a particular drug. This most often occurs due to lack of compliance, but also may be due to cross-resistance from prior drug exposure or infection with a resistant strain of HIV, as will be discussed below. Another factor resulting in treatment failure is inability to absorb the drug that a person is taking. In this situation, even though a drug is being taken properly, it is not getting into the blood at adequate levels to completely suppress HIV replication. Due to the many adverse impacts of HIV and opportunistic infections on the gastrointestinal tract, drug absorption can be a major problem for people with HIV infection. If almost no drug is absorbed into the blood, then HIV replication will go on, but drug-resistant HIV will not develop because there needs to be some drug present for a significant drug-resistant population of HIV to develop. However, if some drug is absorbed, then the HIV may become resistant due to suboptimal drug level. Thus, in the first case, treatment has failed, but not due to HIV drug resistance, while in the latter scenario, HIV drug resistance has resulted from the treatment failure. It is critical to differentiate these two situations. As will be discussed later, resistance to one drug may cause cross-resistance to other drugs in the same class (i.e. PI's). Therefore, in choosing a second drug, it is critical to know whether or not the reason for treatment failure was due to drug resistance. Some drugs are administered in a form which requires the body to change the drug into an active form. This may be done, for example if the active form is not absorbed well or is unstable. This is the case for zidovudine (AZT). The body must convert zidovudine into the active form, before it can inhibit the HIV reverse transcriptase enzyme. If the person's own metabolic activation system is not functioning properly (or is genetically different) for the required metabolic conversion, then the drug will not be effective. As with poor drug absorption, a defect in the activation of the drug could result in very low levels or in higher, but still sub-optimal levels. Thus, you might have treatment failure due to very little active drug in the system or due to drug resistance, resulting from sub-optimal levels of the activated form of the drug. As with drug activation, there are differences in people's own metabolic processes which remove drugs from the body. The rate of absorption and the rate of drug removal determines how much drug is in a person's system and for how long. This is critical for determining the amount and frequency of a drug to take (in order to achieve optimal blood levels) so that HIV suppression is maximized while toxicity is minimized. The most common methods of drug removal from the body are metabolism and/or inactivation in the liver, and excretion by the kidneys into the urine. For some anti-HIV medications, these are very critical processes. The long list of drug interactions with ritonavir is due to the changes caused by that drug in liver metabolism. The result is that some drugs are metabolized much slower and thus reach much higher levels in the blood, while other drugs are metabolized much faster and thus attain very low blood levels. For example, saquinavir levels are raised by ritonavir. Thus, the usefulness of combining these two drugs is that much higher and more effective blood levels of saquinavir (which is poorly absorbed) can be attained if it is administered with ritonavir. Conversely, some drugs may be markedly reduced due to the effect of ritonavir on the liver's metabolic processes. These considerations are important to achieve the desired blood level of an anti-HIV drug. Since the effect may vary from individual to individual, ideally, blood levels of the drugs should be measured to determine if, in fact, the drug is getting into the blood at the desired level. This is what is done in early clinical trials (Phase 1 Trials), but it is not routinely done in clinical practice. Another reason for treatment failure may be due to the direct interaction of two drugs against HIV. Whenever two drugs are used to attack the same bacteria or virus, there may be one of three interactions. The two drugs may work individually, they may augment each other (synergism), or they may inhibit one another (antagonism). So, with synergism, the sum of the two is greater than the individual effect of each added together, whereas with antagonism, the sum of the two is less than the individual effect of each added together. This is why it is important to test drug combinations in clinical trials, because this interaction is not always predictable. A problem today is that because there are so many FDA-approved anti-HIV drugs, it will take many trials and a lot of time to test a new drug in all the possible three, four or five-drug combinations with the currently FDA-approved drugs. Care should be exercised when combining drugs which have not been combined in prior clinical trails. HIV Drug Resistance The most common cause of HIV treatment failure is drug resistance, usually due to a combination of the factors discussed above. However, it is also possible that a person may have HIV which is resistant to a drug they have never taken. This may be due to cross-resistance from another drug in the same class (like another PI) that they have taken, or the strain of HIV that the person was infected with was already resistant to the drug, or the HIV developed resistance prior to any drug exposure by random, spontaneous mutation after infection. Drug resistant usually develops because HIV undergoes a mutation in its genetic material which allows the virus to reproduce in the presence of adequate levels of the drug. In the case of the nucleoside and non-nucleoside reverse transcriptase inhibitors, the genetic mutation causes a change in the structure of the HIV's reverse transcriptase enzyme, which translates the HIV RNA into the host cell's DNA. The result of the mutation is that transcription occurs, even in the presence of the drug, which had previously prevented this process. Similarly, in the case of the protease inhibitors, the genetic mutation results in a change in the HIV-produced protease enzyme which is necessary for assembly of infectious viruses. Testing for drug resistance may be performed by two methods: genotype and phenotype testing. Phenotype testing is a functional test whereby the HIV is isolated from a person's blood, is placed into a test tube and grown in the laboratory to test its ability to grow in the presence of a particular antiretroviral drug. This test takes several weeks to conduct and is very expensive. Genotype testing analyzes the genetic sequence of the HIV when isolated from a person's body. Then mutations in the genetic sequence are looked for, which are known to be associated with HIV resistance to a particular antiretroviral drug. This test costs about $300 and can be done quickly. Currently, neither test is approved by the FDA, and they are not paid for by private or government insurance programs. There is debate among HIV treatment experts about the usefulness of these tests in the clinical treatment of HIV. Currently, many HIV research programs are studying genotype testing. There is now excellent data to show that when a person becomes resistant to saquinavir, ritonavir or indinavir, they are probably resistant to all three of these protease inhibitors. However, some of the data presented at the ICAAC meeting in Toronto in September, 1997 suggested that resistance to nelfinavir may not cause cross-resistance to the other PI's. Other data has suggested that if a person develops a high level of nelfinavir resistance, they will, in fact, also be resistant to the other three PI's. In theory, a person should select a drug in a class (such as PI's) for front line use which has the least possibility of causing cross resistance. Thus, if a person becomes resistant to that first drug, there are some other options available in that class of drugs. Because PI's, nucleoside reverse transcriptase inhibitors and non-nucleoside reverse transcriptase inhibitors all work at a different point to inhibit HIV replication, there is not cross-resistance between the classes of drugs, but rather it is a problem within a class of drugs. One potentially beneficial use of genotype testing would be when a person has failed a triple-drug combination, testing could provide useful information in determining which of the three drugs the person has become resistant to so that all three drugs would not necessarily have to be abandoned. Mutations identified by genotype testing are reported by the location in the genetic sequence of the virus where the change has occurred (the codon). There are a series of known changes in the genetic sequence of HIV which are associated with resistance in the clinical situation. So, a report might note mutations at codons 41, 67, 70, and 215. These are all sites known to result in resistance to zidovudine. There are some serious limitations to genotype testing for drug resistance. Drugs such as ddI and d4T do not show genetic mutations which correlate as clearly with clinical resistance as does zidovudine. The genetic change seen which confers resistance to 3TC may actually be beneficial in that the particular genetic change in HIV associated with 3TC resistance confers increased sensitivity to zidovudine (i.e. it makes HIV more likely to be inhibited by zidovudine). With some drugs, only one or two mutations are necessary to make HIV resistant, while other drugs (such as zidovudine and saquinavir) may require several mutations in HIV to confer complete resistance to these drugs (although one mutation at codon 215 will cause complete resistance to zidovudine). Unfortunately, a report of genotype testing does not give a simple answer to which drugs to use. If that were the case, there would be a stronger call to make the test available to all people living with HIV and for government and private insurers to pay for it. A major limitation of genotype testing is that you need to get a sample of HIV from the patient's blood, and if the viral load is very low this may be difficult. Additionally, there exist in the blood several different populations of HIV, so that some, but not all, of the HIV in your body may be resistant to a drug, but the test may not accurately sample that subpopulation of HIV. The test does not report the number of HIV which contain a specific mutation; it is not a quantitative test. There is a concern that drugs which may be beneficial to a person would be discontinued prematurely (since the presence of a mutation does not mean that the drug is 100% ineffective); or, conversely, drugs which are not helping a person might be continued based on a misleading genotype report showing no mutations present. Another use for genotype testing for resistance might be prior to initiating any anti-HIV therapy, either in a person recently infected, or someone who has been infected for a long time. One study, reported at the 4th Annual Conference on Retroviruses and Opportunistic Infections, in January, 1997, revealed that in a rural Iowa population, 26% of persons never treated with a protease inhibitor had some genetic mutations associated with resistance to all three of the protease inhibitors which were then approved, and 3% of newly-infected persons had resistance to some reverse transcriptase inhibitors. Other studies have shown that resistance occurs more frequently with lower CD4 counts, and higher viral loads. It appears that the later therapy is begun, the less likely you are to obtain complete viral suppress, allowing for resistance to develop. Thus, the immune system may help in the prevention of drug resistance. This is another observation in support of the , "Hit hard, hit early" approach. The most comprehensive discussion of HIV drug resistance can be found in the report issued following the International Workshop on HIV Drug Resistance, Treatment Strategies and Eradication, held in St., Petersburg, Florida, June 25-28, 1997. (The summary and other reports are available on the World Wide Web at: http://www.healthcg.com/hiv/hivresistance/content.html.) The main findings were: the realization of generalized resistance across the class of protease inhibitors (cross-resistance), (although as noted above, whether this applies to nelfinavir is not known at this time) highly active antiretroviral therapy (HAART) can suppress viral load levels to very low levels to minimize the chance of resistance developing, even in persons with very low CD4 counts, as long as they were not treated with a lot of antiretrovirals in the past; resistance assays need to be developed to tell us which drugs to use, but at this time, we do not know how to interpret the data; and, antiretroviral therapy needs to be individualized. This report lists, in tabular form, all the known genetic mutations associated with resistance for all the currently available antiretroviral drugs. One other point emphasized is that once you become resistant to a drug, even if you are off of that drug for one year or longer, the resistant virus is still present and repeat use of that drug will be unsuccessful. ConclusionThere are many factors which can lead to HIV treatment failure. The most important is the development of resistance to the antiretroviral drug (or drugs). The two most important factors to consider are the amount and nature of prior therapy and compliance with a difficult treatment schedule. An inexpensive, accurate laboratory test which can tell which drug is going to work in an individual person would be very helpful in designing treatment plans. The current genotype and phenotype tests do not yet accomplish this goal. However, for some people, a genotype test may be useful to select antiretroviral drugs, particularly when that person has been treated with many antiretroviral drugs in the past. What's New in Kaposi's Sarcoma Research Kaposi's sarcoma (KS) is a cancer of cells lining blood vessels and is commonly seen as a complication of HIV infection. Prior to the HIV era, KS was rarely seen, and when it was seen, it seemed to favor males over 50 years of age who were of Mediterranean or African origin. Otherwise healthy women and children were rarely affected by KS. Since the beginning of the AIDS epidemic, KS has been seen primarily in gay men with HIV infection. KS is also seen in people who have received organ transplants, due to the use of drugs that suppress their immune response to the transplanted organ. Recently, Chang and Moore found sequences of viral DNA in KS lesions (1). This viral DNA was found to belong to new virus belonging to the herpesvirus family. Several investigators have found human herpesvirus-8 (HHV-8) DNA in almost all KS lesions examined (2-5). Other more common viral DNA has also been found in KS lesions; however, no other virus appears as consistently as HHV-8. It is clear that HHV-8 DNA is consistently found in KS lesions and recent studies report finding HHV-8 DNA in saliva, certain white blood cells (B-lymphocytes), semen, prostate tissue, fecal material, and occasionally in normal skin of people with KS (6-8). However, not all of these reports have been confirmed by other investigators, so that controversy remains regarding the prevalence of HHV-8 at various sites. There are two reports from investigators who have been able to grow infectious HHV-8 virus from KS lesions (Foreman) and from white blood cells (Blackbourn) of a healthy blood donor (9, 10). These findings suggest HHV-8 can be transmitted through contact with infected secretions. However, the exact mode of transmission and the efficacy of transmission of HHV-8 remain unknown. HHV-8 is likely to be transmitted via sexual contact. While some epidemiological studies suggest that oral-anal contact may be a risk factor for development of KS (11), such contact would not be expected to be a strong risk factor for transmission of a herpesvirus. Therefore, these findings must be interpreted cautiously. Other risk factors for KS include past history of having an sexually-transmitted disease (STD) other than HIV, a high number of casual sex partners, and a high frequency of sex acts. A report from McCarthy details the case of an HIV-positive mother and vertically (at birth) HIV-infected child who both developed KS (12). This is further support for transmission via infected secretions or blood. There are numerous reports of HHV-8 DNA recovery from circulating white blood cells and one report of viable HHV-8 recovery from blood. There are no reports of HHV-8 DNA recovery or of seroconversion (acquisition of HHV-8 antibody) after receiving blood products. And, it has been shown that those people who become HIV-positive from blood product receipt (e.g., hemophiliacs) are very unlikely to show evidence of HHV-8 infection. However, it remains unknown if blood and/or blood products can transmit HHV-8. Blood tests for HHV-8 antibodies have been developed and are available in some research laboratories. The sensitivity and specificity of these tests are under study and newer methods to detect HHV-8 infection are also under development. The prevalence of HHV-8 seropositivity (presence of the antibody that indicates infection) in different groups has been examined. It appears that HHV-8 seropositivity is greatest (80%) in HIV-positive gay men with KS. HHV-8 seropositivity is 18% in HIV-positive/KS-negative gay males. In contrast, among HIV-positive hemophiliacs and HIV-negative healthy blood donors, none had antibody to HHV-8 (13). Among people presenting to the STD clinic with a positive serologic test for syphilis, 13% had antibody to HHV-8 (14). The strongest evidence for causal role of HHV-8 in the pathogenesis of KS is the temporal association between seroconversion to HHV-8 and the development of KS. In a study of 40 men with HIV and KS, 52% had seroconverted to HHV-8 a median of 33 months prior to development of KS. While the association between HHV-8 infection, immunosuppression, and subsequent development of KS appears strong, much more work needs to be done on HHV-8 epidemiology to gain a clear definition of risk transmission. Thereafter, strategies can be recommended. Laboratory studies suggest that HHV-8 is susceptible to ganciclovir, foscarnet, and cidofovir, and resistant to acyclovir (14). It is unclear if antiviral treatment of HHV-8 infection prior to KS onset can prevent KS or eliminate HHV-8 carriage. The latter seems unlikely, as all other herpesviruses establish life-long latency in the human host. In addition, available effective antivirals can cause significant toxicity and their use as KS prophylaxis may not be appropriate. The treatment of established KS varies from no treatment to systemic multi-drug chemotherapy. Liquid nitrogen has been used on small isolated lesions and local radiation therapy has been used to treat diffuse lesions of the lower extremities. Topical retinoids (vitamin A compounds) are showing promise and are likely to be approved for use soon. In non-HIV immunosuppressed people, withdrawal of some or all of the immunosuppressive drugs sometimes results in clearance of KS. More often, systemic chemotherapy is required and many times response to therapy is incomplete (15). Even when complete clearance is achieved, later recurrence is not uncommon in all forms of KS. It is unknown if long-term clearance of KS could be achieved by antiviral treatment and suppression of HHV-8 infection. Co-treatment of HHV-8 infection and KS is likely to be studied in the future. There is little information on the relationship between the quantity of HHV-8 DNA in blood (and perhaps tumor) and response to treatment. The relationship, if any, between HHV-8, DNA quantity, and treatment response needs further study. Intra-lesional human chorionic gonadotropin (hCG) has been shown to induce KS regression in ten of 12 human KS lesions; HHV-8 DNA levels were not reported. Interferon alpha-2a has also shown promise in treating KS. Much progress has been made in understanding the etiology and pathophysiology of KS. As our research progresses and our understanding of HHV-8-KS increases, better treatment will evolve. The University of Washington has an active research program investigating the basic science, clinical and epidemiological aspects of HHV-8 infection. An antibody test for HHV-8 has been developed for research purposes. The Virology Research Clinic can be contacted at (206)720-4340. Virology Research Clinic 1001 Broadway, Suite 320 Seattle, Washington 98122 Primary Infection Clinic Enrolling for NIH Studiesby Michelle Berrey The Primary Infection Clinic began in September of 1992 with the goal of following the natural history of early/acute HIV, an area about which very little was known at the time. In the past 5 years, partly as a result of our work, knowledge surrounding acute or primary HIV has grown from a suspicion about a viral conversion syndrome to a well-described clinical symptom complex of pharyngitis, fever, and fatigue (1). The variation of symptoms and severity of illness among individuals is marked, and may range from a mild sore throat that lasts only a couple of days, to high fevers, rash, and headache that require hospitalization. The most common symptoms reported in our natural history study at the University of Washington are fever and/or night sweats, sore throat, headaches, muscle aches (similar to those experienced with the flu), fatigue, and rash. Dr. Phillipe Vanhems of France recently compared our data to two primary infection clinics in Geneva, Switzerland and Sydney, Australia. He found reassuring evidence that the same symptoms we see here in individuals seroconverting were seen in both Australia and Switzerland. Other symptoms seen less frequently in all three clinics were oral and genital ulcers, swollen lymph nodes, diarrhea, and anorexia (loss of appetite). Our recent data suggest that individuals with more severe syndromes, i.e., those who present to medical attention, may have a more rapid progression to clinical AIDS (2), suggesting a strong need to identify all such cases early and to offer early treatment. Local HIV/AIDS epidemiologists in the State Department of Health and the Seattle-King County Department of Public Health estimate that we continue to have 600 to 900 seroconversions per year in this state, possibly half of which have a symptomatic seroconversion syndrome (3). We know from our data that only about half of persons with HIV who present to their medical provider with symptoms will be screened for HIV antibody. We hope that reminding the public and providers about primary HIV will increase the number of infections caught early on. Symptoms are not required for enrollment in the Primary Infection Clinic, however. I have outlined our criteria below, but we are happy to perform all screening bloodwork. After an initial behavioral-risk-factor interview, consent forms are signed to allow blood to be studied for antibody, viral load testing (plasma RNA), proviral HIV detection (DNA PCR), CD4+ cell count, and cellular response to the potential HIV infection (cytotoxic T-lymphocytes). During very early HIV infection, the anti-HIV antibody (the antibody that is detected on the standard screening test) may remain negative for 6 weeks after the infecting exposure, so it is important to test for HIV RNA in the plasma, which may be detectable within 10 days after exposure. It takes a week to get the viral load (RNA) back from the lab; at that time we review the results and discuss potential studies for enrollment, which I discuss below. Our contribution to the current understanding of early HIV infection has recently been recognized with a 4-year, multi-site, $6.7 million/year grant from the National Institute of Allergy and Infectious Diseases for the continuation of our studies. The Aaron Diamond AIDS Research Center, the University of California at San Francisco, Johns Hopkins University School of Medicine, the University of Colorado Health Sciences Center, and the University of Alabama at Birmingham will be collaborating with us on the Acute Infection and Early Disease Research Program. We have established a cooperative network with clinics in Minnesota (Tim Schacker); Cincinnati (Judith Feinberg); National Institute of Health (Anthony Fauci); Sydney, Australia (David Cooper); and Geneva, Switzerland (Luc Perrin) to better understand the evolution of the infecting virus, the cellular immune response of the host (particularly the early defect in immune response), emergence of the neutralizing antibodies, and how pharmaceutical intervention may impact all of these. Who can be enrolled? What studies are being offered? The Primary Infection Clinic's natural history study enrolls individuals who meet the above-listed criteria to better define the clinical, virologic, and immunologic characteristics of primary HIV. The study provides free laboratory tests including viral load testing and CD4 counts, and offers optional testing of semen viral load and lymph node biopsies. The study is ongoing and is not limited to a maximum number of participants. We are currently enrolling in a trial of "triple" drugs: AZT (zidovudine), 3TC (lamivudine), and indinavir (Crixivan) to study the effects of early intervention on the mutations of the virus, the viral replication rates, CD4+ cell counts, and other measures of immune system integrity. The study provides free medication for 12 months, as well as free lab tests during the study. The study is limited to persons infected within the last 3 months (with a recent negative EIA or with symptoms suggestive of recent infection), and will include a maximum of 10 enrollees. The International Acute Infection and Early Research Network grant funded by the NIH will also include a pharmaceutical intervention with multiple antiretrovirals. This trial will begin enrollment around the first of 1998. Medications will be provided, as will frequent lab monitoring. Drug treatment during primary HIV has the theoretical benefit of attacking HIV when the virus has perhaps not established a foothold in the body, when the immune system is strongest, and while a relatively homogeneous strain of virus still predominates. However, there is also real concern that we may be using up our "magic bullet" too soon -- that over the long haul early therapy will not always be optimal. And, of course, there are toxicities with all these drugs. The trials performed in our clinic are designed to observe clinical as well as viral and immunologic parameters in early intervention, and will, we hope, reveal some of the predictors that may help us be able to decide very early whether someone would benefit from very early intervention, or whether his or her own immune system will be able to control the virus. To answer questions means we need to see people and enter them into clinical trials. Our approach is to allow individuals to select their therapeutic approach with their primary care providers, although we are certainly available at any time to help with therapeutic decision-making. Through the new Madison Clinic at Harborview we can also provide primary care for those people who do not have a regular provider. Please feel free to contact us at any time with questions at 206-667-5300, or toll-free within the state of Washington at 800-968-1437. You can also reach the clinic via e-mail at [email protected]. Although we hope for the fewest possible seroconversions, it is our hope to have every case of early HIV identified and referred to us.
<urn:uuid:158f85eb-ba53-47b9-a6ae-3cdbeab68712>
CC-MAIN-2016-26
http://www.thebody.com/content/art1802.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396959.83/warc/CC-MAIN-20160624154956-00100-ip-10-164-35-72.ec2.internal.warc.gz
en
0.958224
9,266
2.9375
3
Behind the joy of romping, and the father-son love in this poem, there's a hint of violence. While there is no indication of overt abuse, there are hints of violent tension throughout the poem which contrast strongly with our expectations of a waltz with dad. - Lines 1-2: There's no outright violence here, but these lines establish that Papa is drunk, which is a situation that can lead to violence. - Line 3: The speaker has slipped in the ultimate end to violence (or anything, really) – death. This line is an example of a simile, because the boy hung on "like" death. He's holding on to his father so hard that he's as inescapable as death. In what could be a happy poem about this father and son's relationship, we see death creep in to frighten us right from the start. - Lines 9-10: The father holds the son's hand to lead him in the dance but, because his knuckle is battered, this posture seems, if not violent, at least rough. "Battered" is an intense word to use for a knuckle, and implies some lurking violence. - Lines 11-12: The father doesn't seem like he's being violent intentionally here, but he's accidentally hurting his kid. Maybe the kid is too scared to speak up and say "ow" when his ear scrapes his dad's belt buckle. The belt also reminds us of how belts have often been used to punish children. - Line 13: The use of the word "beat" must be telling us something here, because you can "keep" time just as well as you can beat it, but "beat" carries a more violent connotation. "Beat" fits with the word "battered," which was used to describe the father's knuckles. Throughout this poem, subtle word choices create an undercurrent of violence.
<urn:uuid:b31990bd-9b58-4f44-8982-90c61b7c3e72>
CC-MAIN-2016-26
http://www.shmoop.com/my-papas-waltz/violence-symbol.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402479.21/warc/CC-MAIN-20160624155002-00167-ip-10-164-35-72.ec2.internal.warc.gz
en
0.978453
396
2.578125
3
Print this page. Home / Browse / Category / Government and Politics / State / State Figures / Furbush, William Hines William Hines Furbush was an African-American member of the Arkansas General Assembly and the first sheriff of Lee County. His political career began in the Republican Party at the close of Reconstruction and ended in the Democratic Party just as the political disfranchisement of African Americans in the post-Reconstruction era began. William Furbush was born in Carroll County, Kentucky, in 1839 and was often described as a mulatto. Nothing is known of his parentage or childhood, but judging from his literacy and scripted handwriting, he received an early and formal education. Around 1860, Furbush is known to have operated a photography studio in Delaware, Ohio. In March 1862, he traveled to Union-controlled Helena (Phillips County) on the Kate Adams, where he continued to work as a photographer. In December of that year, he married Susan Dickey in Franklin County, Ohio. In February 1865, he joined the Forty-second Colored Infantry at Columbus, Ohio. At the rank of Commissary Sergeant, he was honorably discharged in January 1866, and later that year, he departed for Liberia on the Golconda, an American Colonization Society (ACS) ship. In the ACS roll books, “Willis H. Furbush” was described as a twenty-seven-year-old photographer of the Presbyterian faith, with a “good” education and traveling with no family. The ACS, a benevolent organization operating under racist pretensions of white progress and black inferiority, offered transportation, land, independence, and freedom for African Americans willing to immigrate to Liberia. Its appeal waned during Reconstruction, as African Americans acquired freedom and political rights, and Furbush left Liberia after eighteen months. By 1870, Furbush was back in Arkansas, living in Phillips County with his wife and two young sons and working as a photographer. He had property and real estate worth $2,500. In 1872, he was elected a Republican representative to the General Assembly for the eleventh district (Phillips and Monroe counties). While in the legislature, Furbush became involved in civil rights issues. In February 1873, he assaulted two waiters after they refused him service in a Little Rock (Pulaski County) restaurant and was fined $75. Two months later, following the passage of Arkansas’s 1873 Civil Rights Act, he and three other African Americans (R. A. Dawson, J. R. Roland, and Lloyd G. Wheeler) were refused service at Wilds Opera House Saloon on Main Street. The trio filed a lawsuit, and on appeal, African-American lawyers Lloyd Wheeler and Mifflin Gibbs won the case against the barkeeper. The verdict of $46.80 marked the only known victory under Arkansas’s 1873 Civil Rights Act. Furbush’s main accomplishment was the establishment of Lee County, with Marianna as the county seat. Phillips County opposed the bill, which would have named the proposed county “Coolidge County” and then, in a second version, “Woodford County.” Both versions were defeated. The persistent Furbush finally pushed it through when the county’s name was changed to honor the South’s “Great Chieftain,” Robert E. Lee, and he was named sheriff of the new Lee County. Within a year, Furbush remarried, after his first marriage to Susan had apparently ended. He married eighteen-year-old schoolteacher Emma S. Owens on April 7, 1874, in Memphis, Tennessee. Furbush served as sheriff from 1873 to 1879, winning reelection twice by cooperating in a fusion political system that combined black Republican voting power with the economic power of white Democrats. Ideally, fusion avoided political violence by dividing uncontested political offices between the parties. Fusion in Lee County was barely off the ground when Republicans, in October 1874, upset by Furbush’s campaign tactics, confronted him in the streets of Marianna. Furbush tussled with at least one black Republican before he was attacked from behind with a knife. Confused and with cuts about his neck and face, Furbush shot and mortally wounded twenty-seven-year-old Tom Wood, the son of George Wood and brother of future Democratic Lee County politician James E. Wood. Furbush survived and formed a posse to reestablish order and capture the “conspirators.” However, tensions between whites and African Americans escalated, and an African-American mob formed reportedly to burn Marianna. The mob disbanded when James Wood and others confronted and stood the mob down. Furbush continued to move closer to the Democratic Party. In 1876, he was dismissed as sheriff by a circuit judge for failure to respond to a writ of habeas corpus and to control a county prisoner. Against some Democrats’ wishes, Democratic governor Augustus H. Garland reinstated him. In the late summer of 1878, he was named the Democratic nominee for state representative for Lee County and gave up his position as sheriff to a “white candidate.” His decision was praised in both the Marianna Index and Arkansas Gazette. The 1878 election season, notorious in Lee and Phillips counties for the intimidation of Republicans and African Americans by Democratic militias, sent Furbush to the General Assembly as a Democrat—perhaps the first African-American Democrat. The legislature in 1879 was rocked by charges of bribery in the House’s election of a new U.S. senator. Furbush, a vocal proponent for the formation of an investigation committee, suddenly found his own character and honesty questioned. Furbush struck back and vigorously defended himself, often clashing with committee chairman, William Meade Fishback. The investigation concluded with a final report but no criminal charges. In March 1879, vindicated of bribery charges, Furbush left for booming Colorado, publicly saying that he might return in a month. However, it seems he fell out of favor with Lee County’s officials, and reports were leaked that he left the state behind on his debts. Following his departure, his wife, Emma, died from yellow fever in her native city of Memphis. Their newborn daughter, Eve, died of dysentery a few days later. In Colorado, Furbush worked as an assayer in the mining town of Bonanza and was reportedly a gambler and barber in Denver. In Bonanza, Furbush narrowly escaped a lynch mob after he killed the town’s constable. He was acquitted at his trial, but the event may have scarred him. In February 1884, the Arkansas Gazette reported Furbush had attempted suicide by morphine. Nearly three years later, in November 1886, Furbush was biding his time in Washington Court House, Ohio, teaching music. Two years later, in 1888, Furbush had returned to Little Rock and reestablished himself as a lawyer and Democratic Party activist. In December 1889, he and E. A. Fulton announced the publication of the National Democrat, a Democratic paper for “colored citizens of Arkansas.” His purpose, to attract black voters to the Democratic Party, was largely unsuccessful. However, he was still a powerful foe of the “lily-white” Republicans, a new racist element in the Republican Party. Furbush likely became frustrated in the early 1890s with the passage, by Democrats, of new election and separate coach laws, which effectively disfranchised black men and made all African Americans second-class citizens. He left Little Rock for South Carolina around this time and later relocated to Savannah, Georgia, in 1900. He made a final move to the National Home for Disabled Veterans in Marion, Indiana, in October 1901. He died there on September 3, 1902, and was interred at the Marion National Cemetery. Furbush’s role in Arkansas politics and African-American history is not well known. Lee County has no public tribute to Furbush, and local history is mixed on his political role there. A positive memory, however, survived within the black community, at least into the 1930s. A Works Progress Administration (WPA) interviewee recalled, “Every slave could vote after freedom. Some colored folks held office. I knew several magistrates and sheriffs. There was one at Helena and one at Marianna. He was a High Sheriff.” For additional information:Apple, Nancy and Suzy Keasler, eds. History of Lee County, Arkansas. Dallas: Curtis Media Group, 1987. Foner, Eric. Freedom’s Lawmakers: A Directory of Black Officeholders during Reconstruction. New York: Oxford University Press, 1993. “Negro Intimidation. Attorney Furbusch Tells What He Knows of the Practices in Pulaski County.” Arkansas Gazette. August 2, 1889, p. 8. Wintory, Blake. “William Hines Furbush: An African American, Carpetbagger, Republican, Fusionist and Democrat.” Arkansas Historical Quarterly. 63 (Summer 2004): 107–165. Blake WintoryLittle Rock, Arkansas Last Updated 7/6/2010 About this Entry: Contact the Encyclopedia / Submit a Comment / Submit a Narrative
<urn:uuid:f7285d57-e664-4cdd-9646-048778a13da2>
CC-MAIN-2016-26
http://www.encyclopediaofarkansas.net/encyclopedia/entry-detail.aspx?entryID=15&type=Category&item=State+Figures&parent=State&grandparent=Government+and+Politics
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783400031.51/warc/CC-MAIN-20160624155000-00105-ip-10-164-35-72.ec2.internal.warc.gz
en
0.974564
1,967
2.734375
3
What caused an earthquake in Virginia? It's not near a plate boundary. Everyone expects earthquakes in California, but no one expects a large (okay, medium) earthquake in Virginia, but that's what happened in August 2011. This earthquake was one of the intraplate earthquakes that do not occur along plate boundaries but within plates. This crack is in the Washington Monument in the District of Columbia, which remains closed while the damage is being repaired. Intraplate earthquakes are the result of stresses caused by plate motions acting in solid slabs of lithosphere. The earthquakes take place along ancient faults or rift zones that have been weakened by activity that may have taken place hundreds of millions of years ago. 2011 Virginia Earthquake In August 2011 the eastern seaboard of the U.S. was rocked by a magnitude 5.8 earthquake. While not huge, most of the residents had never experienced a quake and many didn't know what it was. Some people thought the shaking might have been the result of a terrorist attack. This region is no longer part of an active plate boundary. But if you went back in time to the late Paleozoic, you would find the region being uplifted into the ancestral Appalachian mountains as continent-continent convergence brought Pangaea together. The Piedmont Seismic Zone is an area of several hundred million year-old faults that sometimes reactivate. New Madrid Earthquake In 1812, a magnitude 7.5 earthquake struck near New Madrid, Missouri. The earthquake was strongly felt over approximately 50,000 square miles and altered the course of the Mississippi River. Because very few people lived there at the time, only 20 people died. Many more people live there today (Figure below). A similar earthquake today would undoubtedly kill many people and cause a great deal of property damage. The New Madrid seismic zone is located in the interior of the North American plate (near Missouri, Arkansas, Tennessee, Kentucky, and Illinois), but many earthquakes occur there. Like the Piedmont Seismic Zone, the New Madrid Seismic Zone is a set of reactivated faults. These faults are left from the rifting apart of the supercontinent Rodinia about 750 million years ago. The plates did not rift apart here but left a weakness in the lithosphere that makes the region vulnerable to earthquakes. - Intraplate earthquakes occur because solid slabs of lithosphere traveling on a round planet must make some adjustments. - Intraplate earthquakes strike at ancient fault or rift zones that are reactivated. - Intraplate earthquakes can do a great deal of damage even though they are not usually as large as quakes along plate boundaries. Use this resource to answer the questions that follow. 1. How many earthquakes are there in the United States? 2. What is the second most active fault in the United States? 3. When did the New Madrid earthquake occur? 4. What was the magnitude of the New Madrid earthquake? 5. How many aftershocks occurred? 6. How long is the New Madrid fault? 7. How many people would be affected by another quake? 8. Where is the Ramapo fault? 1. Why do intraplate earthquakes tend to be less frequent and smaller than earthquakes at plate boundaries? 2. Why do intraplate earthquakes take place at all? 3. What causes intraplate earthquakes?
<urn:uuid:8993905b-8c3a-4f45-b63b-e9a72b36b090>
CC-MAIN-2016-26
http://www.ck12.org/book/CK-12-Earth-Science-Concepts-For-High-School/r8/section/6.10/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783394937.4/warc/CC-MAIN-20160624154954-00096-ip-10-164-35-72.ec2.internal.warc.gz
en
0.96211
696
3.828125
4
2015 marks a milestone in American history. One hundred and fifty years ago, Confederate General Robert E. Lee surrendered to General Ulysses S. Grant and ended the Civil War. Shortly thereafter, Orestes Augustus Brownson (1803-1876), a prominent journalist and philosopher, published “The American Republic,” an erudite defense of the Federal Constitution. As noted in our Heritage Foundation “First Principles” essay, today a fresh reading of Brownson’s masterwork can give Americans a deeper understanding of their precious civic birthright, the unique federal order that guarantees their personal and political freedom. Prophetically, Brownson warned that the greatest future threats to the Republic were internal. He called upon his fellow Americans to oppose the relentless centralization of power in Washington; a transformation fueled by a new secular ideology—“humanitarian democracy”—that would war against all prescriptions and traditions, as well as state and local powers, in the name of equality, and seek to crush all genuine diversity, individual distinctions, and subordinate even personal conscience itself on the altar of a fully secularized, and thus absolute, state. The Founders’ genius was in devising a constitutional order that recognized the truth of man’s individuality, his flourishing in freedom, and the sacredness of his person, particularly in his relationship to God: “The American constitution is not founded on political atheism, but recognizes the rights of man, and therefore, the rights of God.” Today, when Americans of all religious faiths have just cause to fear government assaults on religious liberty, the wisdom of Brownson—a devout Catholic—is a bounteous benefit for all. Protect the sacred, he warned, from the profane and thus preserve the moral order: “If they [government officials] could subject religion to the secular order, or completely secularize the church, they would reduce themselves to the secular order alone, and deprive themselves of all aid from religion. To secularize religion is to nullify it.” While a journalist, urgently writing on contemporary topics in his Quarterly Review, many of his opinions, right or wrong, were exclusively relevant to his own time. However, Brownson also developed a sophisticated and consistent philosophical conservatism that imparted a timeless quality to his observations. Those hard hitting commentaries are strikingly relevant to contemporary America. For example: - On immigrants’ duty to assimilate: “It is not attachment to American soil, or sympathy with the American nationality, spirit, genius, or institutions, that brings the great mass of foreigners to our shores. No doubt we derive great advantages from them, but the motive that brings them is not advantage to us or service to our country. They come solely from motives of personal advantage to themselves; to gain a living, to acquire a wealth, or to enjoy a freedom denied them in their own country, or believed to be more easily obtained or better secured here than elsewhere. The country, therefore, does not and cannot feel that it is bound either in justice or in charity to yield up its nationality to them, or to suffer the stream of its national life to be diverted from its original course to accommodate their manners, tastes or prejudices…If I from motives of hospitality open my doors to the stranger, and admit him to the bosom of my family, I have the right to expect him to conform to my domestic arrangements, and not to undertake to censure or interfere with them.” - On crony capitalism: “Louis XI was not weaker against Charles the Bold than is Congress against the Pennsylvania Central Railroad and its connections, or the Union Pacific, built at the expense of the government itself. The great feudal lords had souls, railroad corporations have none.” - On fiscal irresponsibility and debt: ‘The journalists tell us that the country is rich, and we count our millionaires by the thousands, if not by hundreds of thousands; and yet, if called upon suddenly to pay its debts or to redeem its bonds of every sort, it would be found to be hopelessly insolvent, and the reputed wealth of the millionaires would vanish in smoke. Our present wealth is chiefly in evidences of debt, that is, created by mortgages on the future.” - On Communism’s false promises: “Communism, if it could be carried out, would not…as the communists dream, secure to all the advantages of wealth, but would result in the reduction of all to the most abject poverty—the very thing which they are ready to commit any crime or sacrilege in order to escape.” The Civil War was a terrible trial for millions—Brownson himself lost two sons—but the calm courage of the American people prepared them for world leadership: “With larger armies on foot than Napoleon ever commanded, with their line of battle stretching from ocean to ocean, across the whole breadth of the continent, they never, during four long years of alternate victories and defeats—and both unprecedently bloody—or a moment lost their equanimity, or appeared less calm, collected and tranquil, than in ordinary times of peace…Their success proves to all that what, prior to the war, was treated as American arrogance or self-conceit, was only the outspoken confidence in their destiny as a providential people, conscious that to them is reserved the hegemony of the world.” That “hegemony” was moral, not militaristic. Rather it was the success, for the entire world to witness, of America’s providential mission to secure the greatest degree of human liberty under law; a unique experiment in self-government realized through the ingenious Federal Constitution, the priceless gift of America’s Founders. This was a recurrent theme in Brownson’s writings. It was a theme that, over a century later, President Ronald Reagan also expressed in his vision of America as a “Shining City on a Hill.” Brownson’s name recognition may be low, but his ideas and insights have endured.
<urn:uuid:e2dd40cc-ee7b-4fe9-b9fa-27b79f67b87b>
CC-MAIN-2016-26
http://dailysignal.com/2015/03/09/meet-19th-century-american-warned-big-government-religious-liberty-assaults/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397873.63/warc/CC-MAIN-20160624154957-00138-ip-10-164-35-72.ec2.internal.warc.gz
en
0.965556
1,249
2.703125
3
What number that comes before the given number? Kids need to find the number that comes before the given number. By playing the games on numbers that comes before kids can memorize the sequence of counting numbers. To work on the worksheets on numbers that comes just before children need to count numbers backward to find the previous number. Before practicing this worksheet, count the numbers serially to make sure that you know the numbers in order. Then grab a color pencil to make your worksheet looks colorful and try to write the number that comes just before. Kids can recheck the worksheet if the sheet is completed before the allotted time. Time Required to complete write what comes just before: (i) Beginners, preschoolers, primary and elementary kids try to complete the worksheet within 15 minutes. (ii) Kindergarten kids needs to complete this within 10 minutes. (iii) 1st grade children try to complete this worksheet within 5 minutes. Children can practice math games worksheets on writing the numbers just before to increase the skills of counting numbers in order to know the backward number sequence by using the colorful pencil. The number that comes just before 5 is 4 which is shown in the worksheet so that children gets a fair idea about how to write and complete the worksheet on the allotted time.
<urn:uuid:a43a668d-3a26-4a51-8a35-70574fe1828c>
CC-MAIN-2016-26
http://www.math-only-math.com/number-that-comes-before.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403825.35/warc/CC-MAIN-20160624155003-00154-ip-10-164-35-72.ec2.internal.warc.gz
en
0.919029
273
4.25
4
Check each individual plane of the AABB against the other AABB. If a plane intersects the other object's AABB, but its opposing plane does not, you know that that plane is involved in the collision. If both opposing faces intersect the other AABB, then the object is fully within the other along that axis, and the direction of collision is ambiguous/undefined. Practically speaking, these are the same checks used to determine if AABBs collide, so you should be able to determine which faces collide as you do the AABB collision check with little additional cost. Looking at the example, we see that: - The sphere's yz+ plane intersects the prism, but yz- does not. Sphere yz+ collides. In a similar manner, the prism's yz- collides. - Both the prism xy- and xy+ are within the sphere's xy- and xy+. The prism is fully within the sphere in the z direction; collision is ambiguous. - Both the prism xz- and xz+ are within the sphere's xz- and xy+. The prism is fully within the sphere in the y direction; collision is ambiguous. So, in this example, we detect a collision between the sphere yz+ and the prism yz-. The normals of all faces should be obvious (yz+ has (1,0,0), yz- has (-1,0,0), xz- has (0,-1,0) ...) In general, if a quad has the vertices (a, b, c, d) in counter-clockwise order, then your can compute the normal with (b-a).cross(c-b) Note that this problem does present the possibility of multiple collisions: depending on positioning, you can have collisions in all three axes. I think this 'ambiguity' is pretty inherent, and how you resolve it is really up to you. You might just take the average of the individual normals. You could find the area of intersection in each plane, and then choose the normal which corresponds to the largest area, or use the areas to weight the average of normals. You could find the intrusion depth along each axis, and pick the normal corresponding to the shallowest (or deepest) intrusion. Etc, etc.
<urn:uuid:a17be53a-450a-4203-bb46-7257d3bd4ab3>
CC-MAIN-2016-26
http://gamedev.stackexchange.com/questions/26005/aabb-aabb-collision-which-face-do-i-hit/26011
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402746.23/warc/CC-MAIN-20160624155002-00032-ip-10-164-35-72.ec2.internal.warc.gz
en
0.93955
494
3.5
4
In 2011 and 2012, frog collaborated on a research project exploring the nature and value of connections for adolescent girls living in extreme poverty in the developing world. Over the course of the project, we needed to translate the design process into something these female participants would really care about—something meaningful and useful that provided immediate value to their daily lives, with the design goals of the program playing a secondary role. Two key questions emerged from the project: The Collective Action Toolkit (CAT) was developed as a response to these questions. Drawing on frog’s social innovation work and expertise in collaborating on grassroots innovation within start-ups and large-scale organizations, the toolkit repurposes design as an essential set of skills to help community members solve problems. The Collective Action Toolkit was an internal initiative from frog inspired by previous project work with Girl Effect, an organization focused on unleashing the untapped potential of adolescent girls living in poverty. The resources to create the toolkit were provided from within our organization. The Collective Action Toolkit is the result of a six-month iterative process of envisioning, crafting and piloting a toolkit that would create a more accessible model for sharing the power of design. Early activity ideas from the toolkit were tested and evolved with the active participation from 50 adolescent and teenage girls in Kenya, Ethiopia and Bangladesh, as well as input from community leaders and outside experts in gender development issues. We realized early on that we needed to find a new vocabulary for this toolkit. Early drafts of the activities were localized into multiple languages, allowing us to hone in on the types of activities that would be most effective in the toolkit. For example, when teaching activities to girls in Bangladesh, the girls could not understand words such as “brainstorming” or “design.” This led to a hard and fast rule that the word “design” could not appear in the toolkit. We spent months piloting dozens of activities, then organized those activities in different ways and provided them to groups for feedback and refinement. At the same time, we made multiple physical prototypes of the toolkit and considered how it could be reproduced in other languages and most easily distributed. This led us to a simplified vocabulary and accessible materials that would help people create situations where diverse, unique perspectives could be shared safely through constructive conversation and making. Once we had a beta edition of the toolkit, we released it to 450 prospective users at “The Feast Conference” in New York and to 200 people at “Gain: AIGA Design for Social Value Conference” in San Francisco. The feedback from these early users of the toolkit was then incorporated into the first formal release. Our goal at the outset was to encourage problem solving as a form of skill development, with activities that would draw on each participant's strengths and perspectives in pursuit of a common goal. The toolkit's emphasis on action challenges its users to align, describe and evolve solutions that fit their community needs. Regardless of the size of the challenge, the activities in the CAT needed to help groups investigate and generate solutions, pool knowledge and connect to resources-without relying on a trained "designer" to guide the process. So our strategy was to avoid providing any sort of prescriptive design process for users of the toolkit, with just enough structure for groups to explore community issues and play with solutions in a flexible manner. Our design team realized early in the process that in order to create a toolkit that was accessible across cultures, we had to focus on designing activities and processes that could accommodate and plan for shifting dynamics in group interactions. We envisioned our target audience as a local community leader (anyone with the initiative to solve a problem) who wanted to work with a group (at least three other people) to make the solution real. While this may seem like too general an audience, our approach was to determine what group situations would be universal to any problem-solving situation—from the initial agreement on a goal to planning how to act on a solution. We had to steer clear of two traps that designers fall into when working with community groups: A major challenge was that groups generally operate through conversation, without enough “making” to expose group members to hypothetical solutions. “Making things,” whether capturing the discussion in a visual format or translating the group’s ideas into stories to evaluate, forces groups to better align, describe and evolve solutions for their community. However, we couldn’t require users of the CAT to go out and purchase expensive materials, such as sticky notes, to capture their ideas. As a result, we had to go through multiple rounds of refinement for each activity so that each would work with only a pencil and a few pieces of paper. Another major challenge was stress-testing the activities, as we couldn’t forecast all the possible goals a community group might pursue when using the toolkit. So, to stress test the first draft of the CAT activities, the project team selected the following collective goal: How could a group work together to create a community garden? This seemingly small problem touched upon a wide set of issues. Questions that emerged were: What is the best way to encourage healthier eating in a community? How can we best provide clean water for community farming? What approaches should a community take to run a shared garden? As we worked through the early activity ideas for the kit, we discovered additional activities needed to be created. These activities would help group participants discuss open questions, build consensus around potential solutions, and lead to action plans. As we finalized the toolkit activities, we settled on a flexible structure for how they could be used as part of a problem-solving process. This structure was an action map, which was keyed to six categories of activities. Final revisions to the activities included the integration of rules that reinforced effective patterns of group behavior, as well as the inclusion of facilitation tips at the start of each activity area to encourage healthy collaboration habits for individual participants. There were additional challenges around designing for accessibility.The physical form factor of the Collective Action Toolkit is a short book that a user can print on a standard-size sheet of paper or fold down to 8.5 x 5.5 inches and use in a smaller, card-like format. The colors used are associated with groups of activities and are keyed to an “action map” that is shown at the front of the book. While in its highest fidelity, the book was designed for four-color. Extensive testing was done with black-and-white printers and photocopiers to ensure that all content would remain legible in grayscale. The font used is Benton Sans, which was created by Tobias Frere-Jones. The black-and-white sketches in the toolkit were drawn by Kyle Hoyt in Adobe Illustrator, and were crafted to be culture-agnostic across all localized editions. Over 10,000 people have downloaded the toolkit to date, distributing it to family, friends, nonprofits and NGOs, for-profit organizations and even governments. Official translations have been released in Chinese and are forthcoming in Spanish. We have open-sourced this toolkit for adaptation and use by anyone, in any country, via a Creative Commons license. Under this license, unofficial translations are in progress in Italian, German, Pashto, Portuguese, Sinhalese and Tamil. Community leaders have contacted us to let us know that they plan to use the CAT to address community issues in the manner originally intended by our team—from potential use in UNICEF’s innovation labs in Uganda, Kosovo and Zimbabwe to its use in a nonprofit artists colony in Maine that wants to use toolkit activities to foster better remote collaboration. New use cases are also emerging—from using the toolkit as a model for how organizations can work more like start-ups (done at Startup Weekend Shanghai) to its use as a tool for encouraging better collaboration and communication for leaders within organizations (done at a local NGO in Nairobi). In the realm of education, the CAT is being used for community engagement between students, teachers and community groups. Graduate students in SCAD’s Design for Sustainability program are working with classes in three Savannah high schools, showing them how to use the CAT and letting those classes identify problems they are passionate about solving. These high-school students then lead the problem-solving process through toolkit activities. The graduate students have been documenting this project at Design Ethos. The Collective Action Toolkit is available for download at: http://www.frogdesign.com/collective-action-toolkit This case study is supported in part by an award from the National Endowment for the Arts. Looking for additional ways to design for good? This list of organizations and programs is a great place to start. There are many more opportunities out there—so if you know of a resource we should add here let us know! Design for Good The first chapter-organized Design Summit took place May 17–19, 2012 in Phoenix, Arizona. Teams worked on developing long-term solutions for issues related to after-school health and arts programs. aigalosangeles (AIGA Los Angeles) Topic 3: Staying Inspired. #AIGALosAngeles #AIGAwomenlead #womensdesignsalon https://t.co/KJtnZ3Hvcs 2 days ago aigalosangeles (AIGA Los Angeles) Topic #2: Boundaries #AIGALosAngeles aigalosangeles (AIGA Los Angeles) When it comes to business success, integration is key. #WomensDesignSalon #AIGALosAngeles #AIGAdesign kashimmi (Kashia Miller) “Graphic design is the paradise of individuality, eccentricity, heresy, abnormality, hobbies, and humors.” 3 days ago OK-RM creates identity and publication for Manus x Machina at The Met Posted by Owen Pritchard 11 days ago from It's Nice That Hockey Bunnies Logo
<urn:uuid:4ae4b6f1-7c47-4f9d-b20f-60945eba2687>
CC-MAIN-2016-26
http://www.aiga.org/case-study-collective-action-toolkit/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395548.53/warc/CC-MAIN-20160624154955-00117-ip-10-164-35-72.ec2.internal.warc.gz
en
0.948747
2,113
2.75
3
In the ancient language of Sanskrit it was called Jval. Deep in the red clay mine pits of Peru they called it Oro. Mankind has always had a thing for shiny metals... The colors of polished gold, silver and copper are indeed quite beautiful. Imagine yourself gazing into the first hand held mirror of polished gold, thousands of years ago, and seeing a magical reflection of yourself. Among all the metals on earth there is only one that stays Forever shiny and never grows old. Gold... The mellow yellow color of it intrigues us, amazes us, and leaves us wanting more. The word "gold" is actually derived from the old English word for yellow, "geolu". One of the best questions I've ever been asked about gold came from a student in the forth grade, she asked..." Hey mister, why is gold yellow?'" I explained it as best I could. "Gold is yellow because of its cubic close packed atomic structure, which has the quality of reflecting red light at 800 angstroms." She listened to the impromptu physics lesson, with eyes wide and simply said,"Wow, it sure is pretty." Gold comes from deep within the earth. It is deposited in the earth's crust in mineralized hydrothermal veins. Silica, known as quartz, is the primary host rock for gold. As metallic laden silicate waters push toward the surface in the roots of volcanoes and deep faults, gold and other metals precipitate into deposits. This is an on going event of mother nature... even as you read this, gold deposits are being formed on the sea floor, in volcanic vents off the coast of New Zealand. And now we come to the more brutal aspect of gold... mining it. Tunneling into solid rock and digging gravels isn't exactly a glamorous lifestyle. Getting the paydirt in the pan can indeed be a task at hand. Of course there are those lucky days, where the sharp eyed child picks up the half ounce nugget and shows it to Mom because it's a pretty rock. In 1848 William Gulnac picked up one of those pretty rocks while taking a walk up Woods Creek. William found a 75 pound chunk of gold still in its original matrix of quartz. That's the way it was in California's goldrush. The first men into the hills found small fortunes for their day. Their claims paid well, and miners took out hundreds and thousands of dollars, often in a day or week. (It is worth noting here that the cost of a loaf of bread was only a nickel, and these men were earning twenty years wages in the span of one year.) Never in history has so much gold been found in one place as the California goldrush. Ah yes, the fever... grab a pick and shovel and follow me. Just over that mountain is a river of gold. The hills echo with the sound of it, "Gold! Gold! Gold! ... easy to find, heavy to hold." First locate a gold bearing streambed. You're looking for quartz gravels, and a grade steep enough to dash them upon the rocks and liberate their gold. Just downstream from waterfalls is great. Ok, grab that shovel and dig in the bank of the stream. Dig all the way down to solid bedrock and find some crevices. Phew, that's hard work... drink some more water and let's keep going. Get the pan and trowel, and dig a good sample from that crevice and into the pan it goes. Swirl that pan and let's see if we've got some color. Five flakes, two pickers and a clinker, ... great! Now, get the hammer and chisel, and let's get to the bottom of that crevice, that's where those nuggets are. Swing another panload, ...awesome, three more clinkers! Hey, hand me that 14 inch Craftsman screwdriver I threw in the bucket, so I can get some more out from the bottom. Ouch, I hit my hand with the hammer. Ok, here pan this out. Hey! ...two more clinkers and one nice nugget! Hey, you know what? What? ... Life is good, and it's getting better all the time. Hand me an ice cold 7UP out of the box there, will ya? Finding gold is fun... and having a great day with friends, enjoying the water and the sunshine, is life at its best. Buy your kid a shiny new shovel, and head for the hills. Listen carefully, and you will hear an echo from yonder streams... ... Gold ! Gold ! Gold !
<urn:uuid:94aa9e17-c911-46a7-96a3-ee79f080d839>
CC-MAIN-2016-26
http://www.infohub.com/travel-stories/gold-68.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397565.80/warc/CC-MAIN-20160624154957-00072-ip-10-164-35-72.ec2.internal.warc.gz
en
0.961532
955
2.640625
3
According to a new study out of Lund University in Sweden, mindfulness can be just as effective as your typical therapist who practices cognitive behavioral therapy (CBT), which necessitates focusing on negative thoughts and having a discussion, as well as running experiments, on them. The study, led by Professor Jan Sundquist, was held at 16 primary health care centers in southern Sweden. The researchers trained two mindfulness instructors at each health care center during a six-day training course. Participants of the study, who suffered from depression, anxiety, or severe stress, were gathered into groups of 10 for structured group mindfulness treatment. The patients also received a private training program, and were asked to record their exercises and thoughts in a journal. For eight weeks, all 215 of them went through mindfulness therapy, then answered questions about their depression and anxiety. The researchers found that self-reported symptoms of depression and anxiety had decreased during the treatment period. “The study’s results indicate that group mindfulness treatment, conducted by certified instructors in primary health care, is as effective a treatment method as individual CBT for treating depression and anxiety,” Sundquist said in a press release. “This means that group mindfulness treatment should be considered as an alternative to individual psychotherapy, especially at primary health care centers that can’t offer everyone individual therapy.” The notion of mindfulness dates back to ancient Buddhism, and is an essential part of the religion. It involves accepting the present moment and focusing on the sensations, feelings, and thoughts that are happening right now. Being able to reduce the extraneous "noise" from anxiety, worrying, and fear can help people focus on and live in the moment, and also allow them to lessen unnecessary stress. Living in the present, and being “mindful” of simple things like drinking tea or taking walks — the small details in life — can help people with anxiety, Dr. Elizabeth Hoge, a psychiatrist at the Center for Anxiety and Traumatic Stress Disorders, told Harvard Health Publications. “People with anxiety have a problem dealing with distracting thoughts that have too much power. They can’t distinguish between a problem-solving thought and a nagging worry that has no benefit… You might think, ‘I’m late, I might lose my job if I don’t get there on time, and it will be a disaster!’ Mindfulness teaches you to recognize, ‘Oh, there’s that thought again. I’ve been here before. But it’s just that — a thought, and not a part of my core self.” One of the main proponents of mindfulness, Vietnamese Zen Buddhist monk and author Thich Nhat Hahn teaches ordinary people how to focus on breathing and dwelling in the moment — even if times are rough. “The therapeutic power of meditation is very great,” he noted in a 2010 interview with the Huffington Post. “The practices of mindful breathing, sitting meditation and walking meditation release tensions in the body and also in the mind… We humans have lost the wisdom of genuinely resting and relaxing. we worry too much. We don’t allow our bodies to heal, and we don’t allow our minds and hearts to heal. Meditation can help us embrace our worries, our fear, our anger, and that is very healing.” Source: Sundquist J, Lilja A, Palmer K, Memon A, Wang X, Johansson L. “Mindfulness group therapy in primary care patients with depression, anxiety and stress and adjustment disorders: randomized controlled trial.” The British Journal of Psychiatry, 2014.
<urn:uuid:ce97396c-32a7-439a-9a75-5d55e3042a5f>
CC-MAIN-2016-26
http://www.medicaldaily.com/mindfulness-just-effective-cognitive-behavioral-therapy-treating-anxiety-depression-312432
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403825.35/warc/CC-MAIN-20160624155003-00143-ip-10-164-35-72.ec2.internal.warc.gz
en
0.956078
751
3.09375
3
BOSTON — THE CHAN'S GREAT CONTINENT: CHINA IN WESTERN MINDS By Jonathan D. Spence 279 pp., $27.50 When Deng Xiaoping, then leader of the People's Republic of China, visited the US in 1979, Americans couldn't get enough of him. Pictures of the smiling Deng wearing a cowboy hat saturated the airways. Why are we fascinated with things Chinese? Jonathan Spence poses this question in his latest book, "The Chan's Great Continent: China in Western Minds." Spence examines how non-Chinese wrote about China during the past seven centuries. Travelers, missionaries, and diplomats based their writings on actual visits to China. But then, authors such as Voltaire, Flaubert, Steinbeck, and Kafka used these images of China to relate their own literary message. The result has been a dizzying array of stereotypes that tell us more about the Europeans and Americans who believed them than about Chinese culture. Spence, a Yale history professor, is well practiced at taking complex topics and refining them into a compelling narrative. His history text, "The Search for Modern China," became a New York Times bestseller in 1990. Each of the 12 chapters in his latest work was originally delivered as a lecture at Yale University. In some ways, the content of the book is held hostage to this structure. Time constraints limited the amount of information. For instance, the most prolific source of written material on China came from 19th-century Protestant missionaries, yet they are barely mentioned. Also, the lecture series was open to students as well as the general public and had to appeal to both audiences. But the finished product surmounts these challenges with ease and will captivate all levels of China watchers. Spence starts with a discussion of Marco Polo's "The Description of the World." As in subsequent chapters, he provides a checklist of questions: * Did the author speak Chinese? * Did the author visit China? * Why was the author there? * What aspects of Chinese culture did the author notice? * What aspects were not noticed? The biographical sketch allows Spence to speculate as to the traveler's motives. Perhaps Polo sought to contrast Western depravity with Eastern morality. Whatever the original intent, his audience would read the descriptions of China from their own perspective. That's Spence's primary interest: tracing the impact of China books on their readers. In that regard, Polo's book has had quite a long shelf life. Before his own famous trip, Christopher Columbus made marginal notes in his copy of "The Description of the World." Polo's comments on romantic relationships as well as China's potential as a trading partner attracted his attention. Five hundred years later, Eugene O'Neill's play "Marco Millions" fictionalized Polo's memoirs and described Polo as an insensitive man obsessed with accumulating money. The Chinese setting is merely the backdrop for O'Neill's frustration with American culture in the 1920s. In addition to Polo and O'Neill, Spence discusses 23 other authors and traces the development of Western images of Chinese people as exotic, sensual, ruthless, and hapless. Which image represents the true China? Spence does not attempt to separate fact from fiction, but he suggests that reality is in the beliefs of the reader. * Kim Risedorph taught Chinese history at Nebraska Wesleyan University in Lincoln, Neb.
<urn:uuid:cabb077e-95b3-4fdc-9fc0-50ec170231f6>
CC-MAIN-2016-26
http://www.csmonitor.com/1998/0903/090398.feat.feat.9.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395621.98/warc/CC-MAIN-20160624154955-00060-ip-10-164-35-72.ec2.internal.warc.gz
en
0.963258
706
2.578125
3
Haiti earthquake: Food and agriculture key part of the recovery But over the coming weeks and months people will need to be fed and it is crucial that the priority of boosting agricultural production in the country does not get forgotten in the rubble and chaos. FAO is closely monitoring the situation on the ground to get a clearer picture of the immediate impact on food security and food production. It is working in close partnership with the World Food Programme and other UN agencies dealing with emergency food aid and nutrition. As soon as the situation on the ground allows it, FAO will continue to build on its expertise and current work to make sure food production continues in the rest of the country. The next agriculture season starts in March. Destruction of roads, bridges, fishing ports and irrigation infrastructure will all have a serious effect on food production. FAO country team is preparing to asses damages as soon as possible. The priority for FAO's Haitian agronomists and technicians in the immediate aftermath of this terrible catastrophe is to keep Haitian agriculture production going in support of the effort to feed those in the effected areas. More than a half of Haitians - between five and six million people - live in rural areas and around 85 percent of the rural population practice some agriculture and farming which accounts for around 26 percent of Haiti's economic output making agriculture by far the country's biggest employer. Up until now, the majority of the hungry and malnourished live in rural areas. There is a strong possibility of an exodus of homeless people from the earthquake-hit capital to relatives and friends there. Life in Haiti's countryside, with its degraded soils and deforested mountains but its key role in food producion, will prove even more challenging in the wake of the earthquake. It is therefore even more important that the reconstruction of agricultural assets are high priorities in early rehabilitation and reconstruction efforts.
<urn:uuid:4334bc09-2fac-45d8-bd5f-84030535478c>
CC-MAIN-2016-26
http://reliefweb.int/report/haiti/haiti-earthquake-food-and-agriculture-key-part-recovery
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397213.30/warc/CC-MAIN-20160624154957-00121-ip-10-164-35-72.ec2.internal.warc.gz
en
0.948833
382
2.828125
3
Toddlers and preschoolers recognize many words before they can truly read. With that in mind, I created a family name game for my daughter when she was first enjoying words. I printed the names of our four family members (Daddy, Mommy, E, and M) in four different fonts each. I used decorative scissors to trim the names, and then I glued the names to small rectangles of cardstock. I also found one picture for each family member to help visualize the names just for fun. Of course, you could use several pictures. (I laminated all for durability knowing more than one child would use. Though I don't truly homeschool, the laminator has been a great investment!) We used a file folder to create a home for our Family Name Game. File folders are a great way to contain little pieces! When the file folder game's cover says, "The (Family Name)s." I wrote the title on a piece of paper, and M found the letters she needed to make the title. Inside we "wrote" each family member's name with the foam letters. She didn't need too much help, but I sounded out the words, and she told me what letter should be next. We keep the game piece of names and pictures in a zipper baggie. To play, we match name cards under the foam name in the game. The pictures just add some extra fun. I just think it's great exposure for a pre-reader, knowing our last name (and spelling it), as well as to identify us as a family. Since the cards are all laminated, we can use this with E when he gets older, too! If you don't have foam letters, you could use stickers or even go on a letter hunt through magazines or newspapers. I imagine the process of the letter hunt would be great fun for a young one!
<urn:uuid:1a56e922-880a-4a14-b3aa-26fa991c7c21>
CC-MAIN-2016-26
http://livelearnlove226.blogspot.com/2010/04/family-name-game.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398628.62/warc/CC-MAIN-20160624154958-00178-ip-10-164-35-72.ec2.internal.warc.gz
en
0.972542
389
2.96875
3
Nov. 1, 2007: Source – San Francisco Chronicle In an effort to test and examine the real-world viability of plug-in hybrids, the University of California Davis Institute of Transportation Studies will be conducting an experimental program of the high-mileage vehicles next year. One hundred Northern California households will each be given an eight-week loan of a modified Toyota Prius. The Priuses—which have been converted to run on batteries that are twice as powerful as those found in standard production Prius models—will allow the vehicles to primarily travel on electric power. “This is the first large consumer study of plug-in hybrids” said Tom Turrentine, director of the Plug-In Hybrid Center at the Institute. Researchers will interview households every week to gain a better understanding of daily driving experience. “We want to know how people respond to the car,” said Turrentine. “Are they excited because it is cheaper (to operate)? Are they excited because they are saving the world?” The pilot program is slated to be launched in Spring 2008.
<urn:uuid:e51f4413-5f90-4717-9ae0-f4363893b167>
CC-MAIN-2016-26
http://www.hybridcars.com/100-households-test-plugin-hybrids/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395160.19/warc/CC-MAIN-20160624154955-00145-ip-10-164-35-72.ec2.internal.warc.gz
en
0.942433
223
2.53125
3
Homeschool or Christian School Studies in Creation Science Preschool - Adult Resources Academy - a 13 lesson "apologetics power pack," where you will discover why it is vital to provide answers to skeptics and how to give those answers with a solid understanding of what the Bible says about biology, geology, and astronomy. - Additional student workbooks sold separately - Association of Christian Schools International Bio 100 Principles of Biology course at Cedarville University is taught by John E. Silvius who also authors the biology - Lessons / Lecture Notes These are lectures or notes prepared for the course in either PowerPoint presentations or PDF formats. Only some of the lessons are listed below. - Introduction to Bio Online PowerPoint presentation - Science and Scripture - Ways of Knowing Online PowerPoint presentation - Biology and the Nature of Life Online PowerPoint presentation - Organization of Life and Biology Online PowerPoint presentation - What Makes Living Matter 'Living-' Online PowerPoint presentation - Reproduction and Meiosis Presentation in PDF notes - Life Before Birth Online PowerPoint presentation - Origin of Life- It Matters Where You Begin Presentation in PDF notes - Explaining the Diversity of Life" PDF lecture notes - Course Review Presentation in PDF notes - Internet links to accompany specific lectures above for Bio100 - Calvary Curriculum Old and New Testament downloadable curriculm. PDF format lessons for pre/grade-school with quizzes, puzzles, coloring, etc. - Celebrate Creation Curriculum (video series) - ChristianAnswers.Net - Children's Sermons More than 100 short children's lesson - ChristianAnswers.Net Free lesson plans for children complete with handouts - Christian Evidences Study Course by Bert Thompson and Kyle Butt and the Apologetics Press. Three separate courses that are free and available as a series of PDF files; an introductory, intermediate and advanced-level course designed to be taken in sequence. - Creation Curriculum at the Creation Science Store - Creation Exploration - Kid's lessons by the Creation Evidences Museum - Creation / Evolution; Does it Matter What We Believe? - This 170 page manual is designed as a ten session course appropriate for 9th grade through adult levels. This study guide is perfect for a Sunday school or home school course, and is available as a PDF download from the Creation Science Resource. - Creation Science Powerpoint Presentations - Numerous professional presentations suitable for lesson material or formal seminars. Most are prepared in MS Powerpoint format and available for viewing online and/or download. School Online with Andy Carmichael Course series available free online or as PDF files - Creation Science Series of Study Guides for Homeschoolers by Media Angels. A complete science curriculum from a creationist view point using a comprehensive science education program that covers all grades levels, K-3, 4-8, and 9-12. - Creation Anatomy: A Study Guide to the Miracles of the Body! Learn what a remarkable living machine the human body is! Cost $19. - Creation Astronomy: A Study Guide to the Constellations! shows how "the heavens declare the glory of God." This book refutes the Big Bang Theory and gives some of its history. Cost $19. - Creation Geology: A Study Guide to Fossils, Formations and The Flood! study on geology and earth science from a Biblical, creationist perspective. Full of hands-on experiments and activities for each grade level. Cost $19. - Creation Science: A Study Guide to Creation! with over 250 activities, written for all grade levels and integrates all subjects. This book includes outlines, experiments, vocabulary, reading lists, and teaching outline. Cost $17. - Discover Creation Curriculum curriculum package by the Alpha Omega Institute - Download Free Study Guides for many popular creation books by Master Books - Body By Design by Alan L. Gillen (Download study guide) - Champions of Math by John Hudson Tiner (Download study guide) - Champions of Invention by John Hudson Tiner (Download study guide) - Champions of Science by John Hudson Tiner (Download study guide) - Flood by Design by Michael Oard (Download study guide) - Darwin’s Demise by Joe White, Nicholas Comninellis (Download study guide) - The Genesis of Germs by Alan Gillen (Download study guide) - Geology by Design by Carl Froede (Download study guide) - The New Answers Book by Ken Ham (Download study guide) - The New Answers Book 2 by Ken Ham (Download study guide) - One Race, One Blood by Ken Ham and Charles Ware (Download study guide) - Why Wont They listen by Ken Ham (Download study guide) The Wonder of Creation Books (free study guides) - The Archaeology Book by David Down (Download study guide) - The Astronomy Book by Dr. Jonathan Henry (Download study guide) - The Cave Book by Emil Silvestru (Download study guide) - The Ecology Book by Jean lightner, Tom Hennigan (Download study guide) - The Fossil Book by Gary Parker (Download study guide) - The Geology Book by Dr. John D. Morris (Download study guide) - The Ocean Book by Frank Sherwin (Download study guide) - The Weather Book by Michael Oard (Download study guide) - Education by the Answers in Genesis Minstries AWESOME RESOURCE! - Evolution 101 - by Dr. Jolly F. Griggs. 25 lessons free to download and distribute. - Free Nationwide Assistance for Public School Teachers - Creation videos, lessons, and books - It all begins with GenesisLearning to think Biblically about the world Curriculum set by AIG with 34 information-packed and Biblically sound lessons covering Genesis 1-11, this curriculum is ideal for use with ages 10-14 - JonathanPark.com - Learning Zone Homeschool Lessons - My Teaching Aids for "Unmasking Evolution" by Laurence D. Smart - Old Testament Stories MSSS Crafts and Resources for Bible Stories Resource Association Sunday school and Bible - Plan lessons and Activities (Teacher Area) by Creation vs. Evolution II - discussion/debate site by teens, for teens - Resources by The Parent Company - A Science Kit About Science by The Parent Company includes the Parent Guide, Student Guide, Test, Test Answers. - A Science Kit About Design by the Parent Company includes the Parent Guide, Student Guide, Test, Test Answers. - Little Talkers excellent set of Bible stories by Kelly Segraves, which include video/audio files, coloring book, study guide and quiz. - Teaching Helps by Creation Answers.net - Teaching Resources for Parents and Teachers - Great Resources for Teaching about Dinosaurs by Christiananswers.net - Teacher's Resource Center by Creation Safaris - Ultimate Homeschool Expo Fort Myers, Florida - www.ApologeticsCourses.com Trinity Schoool Free Christian Apologetics Online Courses
<urn:uuid:6ae214d8-d925-439a-b9f9-284a5b78379f>
CC-MAIN-2016-26
http://www.nwcreation.net/homeschool.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395620.56/warc/CC-MAIN-20160624154955-00144-ip-10-164-35-72.ec2.internal.warc.gz
en
0.84432
1,472
3.1875
3
Before you decide to use information, you should apply criteria to determine if the information is appropriate. This applies whether or not the information is from the Web, a periodical, a book, or some other source. Is the information reliable or valid? There are some underlying assumptions about the source of information. Usually, information obtained from a government source will be reliable. For example, health related information from the National Institutes of Health may be considered reliable. Statistics concerning criminal justice that originate from the United States Department of Justice Bureau of Justice Statistics may be considered reliable. Keep in mind that Government generates thousands of reports from its many agencies. Conclusions drawn in these reports, such as "Al Qaeda poses no threat," may not be valid. Is the information accurate? Statistical information that originates from a Government source has an underlying presumption of accuracy. If you find statistics cited in a web site from an organization (such as AmeriCares) or a commercial entity (such as Merck Pharmaceutical), and the website does not attribute the source of the statistics (for example, the Food & Drug Administration) do NOT assume the statistics are up-to-date or necessarily accurate. Even if the website cites the information, it should be double-checked for accuracy. There is a big difference between 240,000 and 2,400,000 if we are discussing the number of African Americans incarcerated in the United States. Is the information authoritative? When we look for substantiation for our arguments, we should seek out an authoritative voice. What are the different forms of authority? For one, the credentials that a person holds that indicate expertness. A PhD in Clinical Psychology is an example of one. The institution a person is affiliated with may be another. How many articles or books has the person written that pertain to the subject you are investigating? Does the author have "life experience" that adds credibility to their viewpoint. For example, a former U.S. Secretary of State would obviously be considered "authoritative" if he or she were writing about United States foreign policy. Many of the books in an academic library are published by an academic press, such as New York Uniersity Press, Rutgers University Press, and others. What does this mean to you? Just as certain websites (for example, the New York Times) have an underlying presumption of authority, books published by an academic press also have this presumption. The audience for these books is the students and faculty scholars of colleges and universities. Usually, they are not intended for a general audience. This is different from your typical public library, where most of the books and media are intended for a broad, general audience. Is the information timely? The information we seek may not always have to be the most up-to-date we can find. If we are researching the plays of Shakespeare, information generated over a time line may be fine to use. Keep in mind though, that information often reflects the time in which the author has written. If we are researching the role of women in the writing of Shakespeare, more will have been written post-1960s than before. Unfortunately, because of the times in which the authors were living, the role of women in literature was "off the radar" so to speak, and scholars did not pay particular attention to this area of study. If we are researching appropriate therapies for HIV-AIDS though, it is important to search for and find information that is as up-to-date as possible. Typically, this type of information is found in scholarly journals. When your Professor requires "scholarly" sources, what does he or she mean? Click on the attached document below for a hand guide you can print out for reference. The document is named What are scholarly resources? Scholarly or not? Indeed, that is the question. Print out the handy reference sheet attached below (Scholarly or not to guide you in your evaluation). When you think you have mastered the content, feel free to take this simple test, click here! Standard 3 > 3.1 Articulating and applying initial criteria for evaluating both information and its sources >
<urn:uuid:fd6ca30c-4e6a-4a57-b198-4b133cc9ff7c>
CC-MAIN-2016-26
https://sites.google.com/site/bcinfolit/standard-3/3-1/3-1a
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391766.5/warc/CC-MAIN-20160624154951-00022-ip-10-164-35-72.ec2.internal.warc.gz
en
0.949245
839
2.84375
3
The envisionment-building process is recursive in nature, where at any given moment a reader can move from one stance to another, in no particular order. Envisionment describes the process competent readers go through as they make meaning out of what they read. Each stance provides another set of options panoply of ideas, filling out the reader's depth of experience with the text and offering a fuller understanding of it. readers actively engage in literature in a meaningful, sophisticated manner, connecting text to their own personal experiences, literary experiences, and to the world in which they live. Competent readers are not aware of the stances as they build envisionments, nor should they be. It is necessary for educators to understand the envisionment-building process, as well as each stance, for the sake of instructional design and planning. Here, teachers can utilize their envisionment-building knowledge in order to create rich classroom experiences by asking questions that will stimulate student thinking. Students will benefit tremendously from creating their own envisionments, and from being a member of a literary community. This program showcases the stances in action, where panelists are engaged in natural literary dialogue, recursively moving through all of the stances. Panel members build a rich understanding of the texts at hand, while adding layers of complexity to their For a complete guide to the workshop session activities, download and print our support materials.
<urn:uuid:5921e6c1-6f70-4ab9-b484-cf5df6b03240>
CC-MAIN-2016-26
http://learner.org/workshops/conversations/conversation/stances/index.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783408840.13/warc/CC-MAIN-20160624155008-00044-ip-10-164-35-72.ec2.internal.warc.gz
en
0.912556
306
3.328125
3
NASA's Chandra Finds That Saturn Reflects X-rays From Sun Chandra observations of Saturn (upper panel) show that Saturns atmosphere acts like a mirror that reflects explosive activity on the Sun (lower panel). On January 20, 2004 a large flare erupted on the Sun. The flare lasted for 36 minutes and was detected by radio and optical telescopes, as well as an X-ray telescope (lower panels) aboard GOES-12, one of the National Oceanic and Atmospheric Administrations Geostationary Operational Environmental Satellites. About two hours and 14 minutes later, Saturn was observed by Chandra to brighten in X-rays. This time delay corresponds to the difference in time it takes for X-rays, or any other form of light, to make the trip from the Sun to Saturn and back to Earth as opposed to traveling directly from the Sun to the Earth. This observation demonstrates that the upper atmospheres of the giant planets Saturn and Jupiter act as diffuse mirrors that reflect solar X-rays. Although their atmospheres reflect less than a tenth of a percent of the incident X-rays, Saturn or Jupiter might be used as potential remote-sensing tools to monitor X-ray flaring on portions of the hemisphere of the Sun facing away from near-Earth space weather satellites.
<urn:uuid:df6c6864-ae75-418a-974f-3a35ee187d66>
CC-MAIN-2016-26
http://chandra.harvard.edu/photo/2005/saturn/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783394605.61/warc/CC-MAIN-20160624154954-00090-ip-10-164-35-72.ec2.internal.warc.gz
en
0.916948
266
3.828125
4
Lake Bogoria in Kenya is one of the lesser celebrated of the Rift Valley lakes but it provides as much beauty and inspiration as any of the other dramatic lakes in the region. Lake Bogoria is a saline, alkaline lake and like Lake Nakuru, Lake Elementia, Lake Magadi and Lake Logipi it is home to one of the world's largest populations of lesser flamingoes. Geysers and Hot SpringsThe Lake Bogoria National Reserve includes the Kesubo Swamp to the north and the Siracho Escarpment to the east. The lake is renowned for geysers and hot springs and in a number of places around the lake geysers erupting up to 5 meters can be observed. The geysers are however affected by the fluctuations of the lake. Lake Bogoria has the more true geysers than anywhere else in Africa - with a count of 18. With no visible outlet most the water is lost though evaporation, leaving the water in the lake saline, and because of this not much life can survive in the water save for the abundant crustaceans that are favoured by the flamingoes. The lake has changed a number of times between freshwater and saline over the millennia, and it has been up to 9 meters higher. There is a thought that it could have overflowed towards Lake Baringo in the north. Aside from the flamingoes there are many other birds to see at Lake Bogoria as well as buffalo, zebra, baboon, warthog, caracal, spotted hyena, impala and dik dik. Lake Bogoria and HumansThe Lake Bogoria area was the traditional range of the Endorois people, but they were forcibly removed from the area with the proclamation of the lake as a National Reserve. The Endorois are in the process of challenging their removal at the African Commission on Human and Peoples' Rights, although many believe that any resettlement will spell disaster for the lake ecosystem. There are a number of campsites in the park and a hotel and spa at the park entrance for those needing a little more luxury.
<urn:uuid:8b935480-30fd-4b8a-809d-7b55329f2ec3>
CC-MAIN-2016-26
http://www.kenyasafari.com/lake-bogoria.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783408828.55/warc/CC-MAIN-20160624155008-00152-ip-10-164-35-72.ec2.internal.warc.gz
en
0.961986
432
2.859375
3
After the 1857 uprising which had major implications on who was who in the post maratha supremacy period, unsurprisingly many relatively foreign forces supported the brits. eg. the nizam, supported the brits, and captured phadke etc. Some mercenaries supported the pro-indian team for money, eg. the rohillas. Now, fast forward to 1948 year of independence , the british knew the split between the muslims and predominant hindu population of india, and thus, they designed this religion based electorates which paved way for partition of india, done by Radcliff , the partition finally happened, there are many known sources of the violence that happened in pakistan and was reciprocated by jats in india. Now, since the rule of british, India was basically split into two groups, one of them were highly influential group of people like motilal nehru who basically wanted to do what british did, and had moderate views about nation in general. These people were more interested in advancing their aims then caring for the nation or any other thing.These were the guys that worshipped money .. Religiously they had no particular orientation,and hence their stance was mediocre , one which pleased everyone. Some people in this list are : Motilal nehru, javaharlala nehru etc. Indira and her sons were a bit of deviations ,esp her elder son. Else all are the same. Another group was that of people who valued the ancient indian ways, who wanted india to be what it was before -a golden india, these group had complete disdain for people who they considered responsible for looting indian wealth , ie. the mughals and their decendants,the british ,and earlier islamic marauders . They loathed them, from the bottom of their hearts.Money had nothing to do with it. They purely wanted to restore india to its prosperous position. The people in this group came to be known as extremists. Some people in this list are Bal gangadhar tilak, Lala lajpat rai, Vallabh "iron" Patel(whooped razakars),Subhash Chandra bose,and so on. A third group was inspired by communism and people like bhagat singh etc were from this group. This group is survived by the communist parties in india,although they explicitly only state their inspirations from lenin or marx or other communist writers. These are probably the most decent people in indian politics, although I do not know if communism is what india will benifit from. Now fast forward today the 2010th century, Indian political scene is basically dominated by two major parties,and one rather ofbeat party: - the somewhat central party of Indian national Congress, who basically are in for the business and money more than the betterment of state -resulting into a rather please-everyone attitude, which the minorities find interesting. - the right parties led by Bhartiya Janata Party ,who basically are in for making india what it was, they enormously value the ancient indian culture, these people essentially believe that india was once a great nation,and strive to make it so. Much patriotic than the level headed congress, and somewhat discriminating against minorities becuase they historically abused india and its resources and culture. - The left parties I think they are led by CPI, this is the true common man's party, although they are pretty much against anything that has capitalist motives , hence will inherently cause less development. Who you vote is entirely based on your own choice, each party comes with its own disadvantages and advantages, eg. congress will basically cause development(benifiting itself and its team more than nation in general) but this will cause rich getting richer, poor getting more poor, and also, will increase the corruption. This is how they work, no matter what they promise. Similarly, BJP will try to equalize , in other words remove incentives placed by Congress (do not make a mistake, congress does this for its own benifit, its not for the people), also bjp will try to remove corruption more than congress, because it inherently wants a better india,some capitalists may find this annoying :D.The poor will become poor ,rich richer, and probably the minorities will be more poorer(cause they relied on the incentives of congress,not bjp's fault as such). Lastly, the commies they will probably curb the freedom of capitalists and the gap betn the rich and poor will reduce, ie. the nation will stabalize, but its overall development will reduce. So thats pretty much it. If we evaluate these three parties based on national-objectives, developmental-objectives, people development. then, congress prioritizes as development,nation,people BJP will be nation,development,people , and CPI people,nation,development. The criteria are kind of overlapping in general, like development of a certian individual will cause development of nation fractionally, same with people and so on. Till next time...
<urn:uuid:2b2880f7-989e-4072-a5d0-8917f219c4d1>
CC-MAIN-2016-26
http://currentindianpoliticalscene.blogspot.com/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783400031.51/warc/CC-MAIN-20160624155000-00168-ip-10-164-35-72.ec2.internal.warc.gz
en
0.969533
1,068
2.59375
3
is a rendition written by me of the poem translated as "Hymn to Ninkasi" written around 3,800 years ago by a Sumerian poet, bard or scribe and found on clay tablets. I have tried to translate the emotional response to the poem of the listener, caring more for cadence and scansion, rather than trying to do a literal translation of the words. I believe the actual name of the goddess is Nin and Kasi and Hursag are her titles. I think Kasi means Queen (it still refers to the local ruler in that area today) and, strictly guessing, I think Hursag means "Chief Medical Officer". Her other name is Ninmah, which I think means Mother Nin. There is also a character called Ninti from that era, but I think that means "Little Nin" and refers to someone else that they were comparing to Nin. According to historical records, but not accepted by conventional interpretation of those records today, she was a physical, living person, but not necessarily a human being as we know them (that is, like us). You can find scholastic translations of this poem here was born by the river She breathes in its sweet smelling air. The town that she built is still growing The walls that she built are still there. The lake that is sacred to heaven, To Ninkasi, the queen of the lake, She will soon draw the pure, deep lake water And there of your thirst she will slake. She will slake of your thirst with the water, For ale she is sweetest the giver. She will mix it with bread and with spices And juice from the cane by the river. By the rivers Euphrates and Tigris Where the sugar cane rushes grow tall, The ale from it freely is flowing Ninkasi fermented it all. Ninhursag has baked in her oven, On her floor she has malted the grains With honey and juice from the date plants, She mixes the bappir and strains. She soaks the good malt in a deep pit, The waves rise and then the waves fall She spreads the cooked mash on a reed mat And the noble dogs guard o'er it all. She brews it with honey and with liquor She pours with both hands the sweet broth, From the ale vats it rushes like rivers From the vats with the good foaming froth. Taste, Health and Community With Naturally Fermented Foods and Herbal Healing Beers by Stephen
<urn:uuid:4cf4257a-6054-4c93-9dca-0d2366fe2a38>
CC-MAIN-2016-26
https://sites.google.com/site/yankeeharp/hymntoninkasi
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391519.2/warc/CC-MAIN-20160624154951-00112-ip-10-164-35-72.ec2.internal.warc.gz
en
0.942355
567
2.609375
3
The Phases of the Moon. Click on image for full size How Do the Phases Get Their Names? When the Moon appears smaller than a quarter, we call it a crescent. When the Moon appears larger than a quarter, we call it gibbous. When the moon is getting bigger (phases New to Full) it is waxing. When it is getting smaller (phases Full to New) it is waning. For example, if today the Moon were a waxing crescent, then tomorrow the crescent shape would continue to grow larger, approaching first quarter. After first quarter, the Moon would be a waxing gibbous, and continue growing until it reached full. The Moon would then begin to shrink, becoming first a waning gibbous and eventually reaching third quarter. Following third quarter it becomes a waning crescent, and continues to shrink until it becomes invisible at new Moon. Just in case you can't remember all of this, there are a few handy ways to recognize whether the Moon is growing or shrinking. A crescent moon which looks like a "C" is shrinking (C for collapsing!). If it looks like a "D", then it is growing. This is true for a gibbous Moon as well, but it's a bit trickier to picture. If the edge of the Moon (the real edge of the Moon, not the edge of night on the Moon) is curved like a "C", the gibbous Moon is shrinking. Another way to think of it is that the Moon always grows or shrinks from the right to the left. Shop Windows to the Universe Science Store! The Fall 2009 issue of The Earth Scientist , which includes articles on student research into building design for earthquakes and a classroom lab on the composition of the Earth’s ancient atmosphere, is available in our online store You might also be interested in: What phase was the Moon in on December, 22 1962? How long does it take the Moon to travel from one phase to the next? Suppose that the Moon spun twice on its axis during each orbit around the Earth. How...more You may have heard people refer to a Full Moon in the autumn as the "Harvest Moon" or the "Hunter's Moon". Native Americans in the eastern and northern parts of North America had special names for the...more The Orionid meteor shower is one of several major meteor showers that occur on roughly the same date each year. The Orionids typically "peak" (are at their greatest level of activity) around October 21st....more The Quadrantid meteor shower is one of several major meteor showers that occur on roughly the same date each year. The Quadrantids "peak" (are at their greatest level of activity) in early January. In...more The Lyrid meteor shower is one of several major meteor showers that occur every year. A particular meteor shower happens around the same time each year as Earth's orbit carries it through the same region...more By 30,000 B.C,. Asian hunter-gatherers had crossed the Bering Strait into North America. These people were the first to inhabit this new land and so they are known as the Native Americans of North America....more "The movements of the heavenly bodies are an admirable thing, well known and manifest to all peoples. There are no people, no matter how barbaric and primitive, that do not raise up their eyes, take note,...more
<urn:uuid:50868b47-afad-4b96-989b-5a654593af51>
CC-MAIN-2016-26
https://www.windows2universe.org/the_universe/uts/moon3.html&edu=high
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391519.0/warc/CC-MAIN-20160624154951-00005-ip-10-164-35-72.ec2.internal.warc.gz
en
0.960305
734
3.953125
4
Linux proponents point to the fact that it can be customized for just about any purpose as one of its biggest strengths. On the other hand, this has led to a wide variety of distributions, each with different strengths and weakness than the last. DistroWatch itself is tracking some 733 different distributions of Linux. And one of the most basic things that separates these many distros is the package management system. By and large, distros will use one of three package management systems: * RPM, or the Red Hat Package Manager format, originally developed by Red Hat * DEB, or Debian Package format, release with the initial version of Debian 1.0 * TGZ, the format used by Slackware, among others. At one time, it is actually difficult to find DEB packages of some software. The conversion to the DEB format via the “alien” tool is one of the only options available, unless it was in one of the Debian repositories. With the entrance of Canonical and Ubuntu, packaging software in DEB format is much more common now. Let’s take a look at how a DEB package is constructed. rest here
<urn:uuid:ff237425-e004-44ef-8113-e106dd41e01d>
CC-MAIN-2016-26
http://tuxmachines.org/print/58910?page=7
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396945.81/warc/CC-MAIN-20160624154956-00038-ip-10-164-35-72.ec2.internal.warc.gz
en
0.919798
240
3
3
Common name: Fennel Foeniculum vulgare Mill. APNI* Description: Erect, biennial or annual herb, 1–2.5 m high, strongly liquorice-scented; stems striate, glabrous, glaucous. Leaves 3–4-pinnate, 30–50 cm long, feathery, repeatedly dissected into numerous thread-like segments, 5–10 cm long. Compound umbels 7–15 cm diam.; peduncle to 12 cm long; rays 8–30, to 6 cm long; umbellules 5–15 mm diam., 10–30-flowered; pedicels 1–7 mm long. Petals c. 1 mm long, yellow. Fruit ovoid-oblong, 4–10.5 mm long; mericarps dorsally flattened with 5 prominent equal ribs. Distribution and occurrence: Weed of disturbed sites and waste land, widespread. Native of Eurasia. NSW subdivisions: *NC, *CC, *SC, *NT, *CT, *ST, *NWS, *CWS, *NWP, *NFWP Other Australian states: *Qld *Vic. *Tas. *W.A. *S.A. Cultivars used as a vegetable, for flavouring and medicines. Text by J. M. Powell, except for genera with authors listed Taxon concept: Flora of NSW 3 (1992) APNI* Provides a link to the Australian Plant Name Index (hosted by the Australian National Botanic Gardens) for comprehensive bibliographic data ***The AVH map option provides a detailed interactive Australia wide distribution map drawn from collections held by all major Australian herbaria participating in the Australian Virtual Herbarium project.
<urn:uuid:1e4e5eae-c4e7-47b6-9065-8b242969feeb>
CC-MAIN-2016-26
http://plantnet.rbgsyd.nsw.gov.au/cgi-bin/NSWfl.pl?page=nswfl&lvl=sp&name=Foeniculum%7Evulgare
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393997.50/warc/CC-MAIN-20160624154953-00146-ip-10-164-35-72.ec2.internal.warc.gz
en
0.81388
385
2.796875
3
State health officials are continuing to urge Hoosiers to take precautions to protect themselves from mosquito-borne diseases. To date, West Nile virus has been detected in mosquitoes in 31 counties across the state. In addition, mosquitoes have tested positive for Eastern equine encephalitis in Elkhart County. “Mosquitoes in Indiana can spread several different viruses, including West Nile virus, Eastern equine encephalitis, St. Louis encephalitis, and La Crosse encephalitis,” said Jennifer House, DVM, veterinary epidemiologist at the Indiana State Department of Health. “All of these viruses have the potential to cause serious illnesses.” “Mosquito-transmitted diseases commonly occur in August and September, when mosquitoes are more active because of hot weather conditions, so Hoosiers should take the proper precautions to prevent being bitten.” Dr. House recommends people take the following protective steps: - Avoid places where mosquitoes are biting. - Apply insect repellent containing DEET, picaradin, or oil of lemon eucalyptus to clothes and exposed skin; and - Install or repair screens on windows and doors to keep mosquitoes out of the home; and - When possible, wear pants and long sleeves, especially if walking in woody or marshy areas. - Horse owners should have their horses vaccinated for both WNV and EEE. Dr. House says it is also a good idea to take steps to rid properties of potential mosquito breeding grounds by: - Discarding old tires, tin cans, plastic containers, ceramic pots or other containers that can hold water; - Repairing failed septic systems; - Drilling holes in the bottom of recycling containers left outdoors; - Keeping grass cut short and shrubbery trimmed; - Cleaning clogged roof gutters, particularly if leaves tend to plug up the drains; - Frequently replacing the water in pet bowls; - Flushing ornamental fountains and birdbaths periodically; and - Aerating ornamental pools, or stock them with predatory fish.
<urn:uuid:515d58c1-62d1-414a-bed3-ccfc786d0735>
CC-MAIN-2016-26
http://am1050.com/2010/health-officals-warn-hoosiers-of-increased-mosquito-activity/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783404405.88/warc/CC-MAIN-20160624155004-00101-ip-10-164-35-72.ec2.internal.warc.gz
en
0.911026
435
3.3125
3
Unfortunately, recently declassified documents have established beyond doubt that such torture has been routinely practiced in recent times by United States military and intelligence personnel during the so-called “war on terror,” authorized at the highest levels of our government. Such was first made known to us — and shocked the world — through release of explicit photos of the torture taking place in the Abu Ghraib prison in Iraq, which was soon confirmed by the low-level military personnel who carried it out. Brig. Gen. David Irvine, a former military intelligence officer who worked on The Constitution Project’s Task Force on Detainee Treatment, has stated: “In our previous conflicts there have been brutal acts against captives ... but there is no evidence that ever before has there been the kind of considered and detailed discussions that occurred after Sept. 11, 2001, directly involving a president and his top advisers, on the wisdom, propriety, and legality of inflicting pain and torment on certain prisoners in our custody.” This suggests a disturbing shift in our national culture and values that bears close examination. If we wish to make this an aberration rather than a trend, it can be instructive to ask: “What prevented us through the first 200 years of our history from stooping to this sort of cruelty against our enemies on a regular basis?” And the corollary: “How can we keep this from happening again — and again?” In a recent article in Sojourners magazine, Professor David Gushee offers the following clues: • The prohibition against “cruel and unusual punishment” in the Eighth Amendment to the Constitution. • The high standard of military discipline, honor and accountability originally set by George Washington. • Reaction against British despotism in Revolutionary times that has informed our founding narrative. • U.S. participation in the founding of the United Nations and development of international law and the Geneva Conventions, which can motivate us to lead by example. • The pride we take in being “a city set on a hill” and “a light unto the nations.” • The checks and balances built into our system, based on a realistic recognition of the depths to which human behavior — and our own fallibility — can fall. • A free press and a civil society taking responsibility to call for accountability and reform. • High professional standards of medical and legal ethics, integrity and independent judgment that can motivate medical and legal professionals to refuse to participate in or condone abuse and brutality. • Religious traditions that emphasize human dignity, human rights and solidarity with the whole human community. I would add to these the innate respect for human life and revulsion against killing other human beings that is documented by the research on soldiers reported in the book, On Killing, by U.S. Army psychologist Lt. Col. David Grossman. The 9/11 attacks led to a weakening or disregard of these principles, motivated by fear, the need for security, and the misguided notion that leadership and courage are best shown by “acting tough” rather than being ethical and principled. Unfortunately, since then the blame has been laid to “a few bad apples” while the top government and military officials who authorized these acts of torture have not been called to account or prosecuted for human rights violations and crimes against humanity which they approved, as they deserve to be. And presumably, the military culture and training that dehumanizes other human beings and desensitizes men and women to human pain and suffering still goes on. The result is the high incidence of post-tramatic stress disorder and “moral sickness” — and resulting domestic abuse, drug addiction, homelessness and suicide among our veterans. It is time we return to the above-named ideals on which our nation was founded, recover our heritage of resistance to torture, hold accountable any and all who train for, practice or condone it — and thereby re-ignite the “light unto the nations” that has grown all-too dim. The acknowledgement of guilt, rejection of revenge, willingness to forgive, and recognition of the common humanity between former enemies that is depicted at the close of “The Railway Man” is a good place to start.
<urn:uuid:f218e7b9-1d7f-4074-b9e1-47a57f58e3d5>
CC-MAIN-2016-26
http://www.smokymountainnews.com/outdoors/item/14028-is-torture-an-aberration-or-a-trend
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396887.54/warc/CC-MAIN-20160624154956-00153-ip-10-164-35-72.ec2.internal.warc.gz
en
0.957559
873
2.8125
3
Some say the world will end in fire;Some say in ice.From what I've tasted of desireI hold with those who favor fire.But if it had to perish twice,I think I know enough of hateTo say that for destruction iceIs also greatAnd would suffice.Robert Frost, "Fire and Ice" There is some evidence, maybe enough, to conclude that life was here on Earth at least 3.7 billion years ago. There is some evidence, maybe enough, that the sun will use up its hydrogen in 5 billion years, expanding into a red giant. At any rate, it gets hotter and hotter as it consumes its core, and Earth will be dessicated billions of years before then. What does this mean? Were more than halfway through our story, at least here on Earth....and that, oddly, saddens me, when sitting inside on a rainy April evening, locked into a human universe. More importantly, for all of the living, there is nothing more than now. Worrying about how it all ends is a human conceit. I teach about the natural world, or rather, how we think about the natural world. There are moments when the classroom is humming, particularly when students tend their fish, their wheat plants, their sow bugs, or their slugs. Before I attempt to cram their worlds with models of what exists, they need to know what it means for life to exist. They need to be able to see it, sniff it, touch it, and follow it--for hours, for weeks, for months. The above question, a sophomore biology classic, is not particularly difficult to answer, not particularly difficult to teach, but is not particularly science. Not even close.... If my lambs spent several weeks with fruit flies, crossing this phenotype with that, analyzing the results, and then (maybe) coming up with a reasonable approximation of Mendelian genetics, maybe a question like this makes sense. But they don't--we don't have time. We don't have time, because we have a laundry list of things that need to be covered. So our kids learn how to do Punnett squares. They enjoy doing them--they really don't require a lot of thought, at least not at the level of mastery expected, and the kids think they are doing science. The parents think they are doing science. The Board of Ed thinks they are doing science. The state thinks they're doing science. Arne and Eli and Joel and Bill think they are doing science. They're not. They're doing Punnett squares. Truth be told, much of high school sucks.If it didn't, Punnett squares wouldn't be so appealing. Every now and again I get kids caught in an existentialist trap--what is the meaning of life, the point, the goal, the end, and it's little wonder. I bet no child gets through a day without hearing someone ask what they plan to do with their lives. I bet no child gets through a day without hearing that ""these are the best days of your life, you better enjoy them" from aging adults who have yet to start living. We compound this with tests we pretend matter. Knowledge matters, thinking matters, but most of these tests do not (beyond their extrinsic consequences). Let's play a thought game: if a test existed that could objectively measure happiness ten years after a child took my class, would it matter more (or less) than a test that measures my lambs' collective ability to do a Punnett square? Ah, Dr. Doyle, you are lowering the bar! You are diluting the product! You are condemning your students to a life of poverty and ill-breeding! No, I'm not. The current tests do not encourage me to teach science. They do not encourage my students to learn science. They will not lead to a better informed citizenry pursuing jobs or happiness. We have a lot of life in class, which means we have a lot of death, too. I worried about this--will I trigger more existentialist angst? I'm sure that long after I'm dead and my voice no longer a memory, a few students will remember the moment they witnessed their favorite shrimp in the world happily munching on their favorite hermit crab. These things are not planned, but are bound to happen in a classroom such as ours. I was worried, but I needn't have been. They were enthralled. They were in the moment. And yes, I still worry about what will happen in a few billion years. Except when I don't. Like now. This one will likely get chopped up into a few pieces before I'm through. The photos all taken today under a gloomy sky--the robin's egg is the same as the one seen last week. It is getting duller.
<urn:uuid:76d36057-96b0-425e-a60b-f992944f9366>
CC-MAIN-2016-26
http://doyle-scienceteach.blogspot.com/2011/04/tao-of-now.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783392099.27/warc/CC-MAIN-20160624154952-00150-ip-10-164-35-72.ec2.internal.warc.gz
en
0.973848
1,021
2.546875
3
Analysis: Form and Meter The form of this poem is a Petrarchan sonnet, named after a dead Italian guy (can you guess his name?) who wrote lots of love poems. Petrarchan sonnets—named after the Italian poet Petrarch (pat yourself on the back if you got it right)—are made up of two big parts: the octave (the first eight lines) and the sestet (the last six lines). The rhyme scheme of the octave is almost always the same (ABBAABBA—where the letters correspond to the end rhyme of each line), while the sestet scheme can vary. In this sonnet, it is simple alternating rhymes (CDCDCD). Every sonnet has a turn—a shift in the poem's thinking, also called a volta—and in Petrarchan sonnets, this turn usually occurs at the end of the octave. That's what we see here. It begins to shift in lines seven and eight when Keats discovers Chapman's translation, but really turns at line nine when Keats tells us how that experience made him feel. Sonnets written in English are almost always written in iambic pentameter, and that's what we have here. If you didn't click the link to read all about it (shame on you!), iambic pentameter means lines of ten syllables with alternating unstressed and stressed syllables (or, iambs). The pattern sounds like da-DUM da-DUM da-DUM da-DUM da-DUM. For example: And many goodly states and kingdoms seen. (2) That meter won't be perfect, though; Keats reserves the right to change it when he wants to create an effect. Most often, this means switching the stress in the first two syllables, which we see in the first and last lines ("MUCH have" and "SI-lence"). Those reverse-iamb pairs are called trochees, with the stress of the pair falling on the first syllable, rather than that last. Why would Keats mess with his iambs? Well, he throws on the metrical breaks with these trochees to really punch up words he wants to stress. Interestingly enough, they come at the first and the last lines of the poem, where emphasis is naturally going to be anyway. Since they work against the rhythmic grain of the rest of the poem, we as readers can't help but have our ears (even our inner ears, if we're reading silently) perk up and take note. For the rest of the lines, the poem is actually very consistent in its meter compared to most. That explains Keats' use of abbreviated words to make sure that everything fits into his metrical plan. The only other significant variations occur in lines eleven and twelve. For line eleven to be iambic, we have to force Cortez to be pronounced with a strong stress on the first syllable: or like stout cortez when with eagle eyes. (But it's possible that it would have been pronounced that way back in Keats' day in England—in his poem, Lord Byron pronounced Don Juan "Don JOO-on" to make his rhyme scheme work.) Line twelve also has an extra unstressed syllable—on the word "pa-CIF-ic." Extra unstressed syllables weren't really considered a true break with the rhythm when Keats was writing, though. By and large, Keats is right in lockstop with Petrarch's sonnet plan—and we think that makes a lot of sense. Here he is, celebrating the translation of the classic writings of Homer. So—hey, what better way to celebrate a classic work, and its translation, than by expressing oneself in a classic form, which has also been borrowed from an older, foreign writer. With this poem, then, Keats is propping up three writers in one: Chapman, Homer, and Petrarch.
<urn:uuid:ab01c2d2-7f19-4913-a208-27e45c17d44b>
CC-MAIN-2016-26
http://www.shmoop.com/on-first-looking-into-chapmans-homer/rhyme-form-meter.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396872.10/warc/CC-MAIN-20160624154956-00141-ip-10-164-35-72.ec2.internal.warc.gz
en
0.959104
835
3.59375
4
- Full Description Randomness is a powerful phenomenon that can be harnessed to solve various problems in all areas of computer science. Randomized algorithms are often more efficient, simpler and, surprisingly, also more reliable than their deterministic counterparts. Computing tasks exist that require billions of years of computer work when solved using the fastest known deterministic algorithms, but they can be solved using randomized algorithms in a few minutes with negligible error probabilities. Introducing the fascinating world of randomness, this book systematically teaches the main algorithm design paradigms – foiling an adversary, abundance of witnesses, fingerprinting, amplification, and random sampling, etc. – while also providing a deep insight into the nature of success in randomization. Taking sufficient time to present motivations and to develop the reader's intuition, while being rigorous throughout, this text is a very effective and efficient introduction to this exciting field. - Table of Contents Table of Contents - From the contents: Introduction. - Foiling the Adversary. - Success Amplification and Random Sampling. - Abundance of Witnesses. - Optimization and Random Rounding. - Appendix: Fundamentals of Mathematics. - References. Index. If you think that you've found an error in this book, please let us know by emailing to [email protected] . You will find any confirmed erratum below, so you can check if your concern has already been addressed. No errata are currently published
<urn:uuid:70011b5c-a885-455a-8167-bb527656041c>
CC-MAIN-2016-26
http://www.apress.com/9783540239499
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403508.34/warc/CC-MAIN-20160624155003-00088-ip-10-164-35-72.ec2.internal.warc.gz
en
0.905354
302
2.828125
3
ENVIRONMENTALLY SOUND TECHNOLOGIES in wastewater treatment for the implementation of the UNEP GLOBAL PROGRAMME OF ACTION (GPA) "GUIDANCE ON MUNICIPAL WASTEWATER" in collaboration with Murdoch University Environmental Technology Centre This document has been prepared by UNEP DTIE IETC as a contribution to the UNEP GPA and is based upon the "Recommendations for Decision-making on Municipal Wastewater: Practical Policy Guidance for Implementing the Global Programme of Action for the Protection of the Marine Environment from Land-based Activities (GPA) on Sewage" (Version 10 November 2000). It is recognized that this latter document is under review and will be replaced by "Guidance on Municipal Wastewater: Practical Guidance for Implementing the Global Programme of Action for the Protection of the Marine Environment from Land-based Activities (GPA) on Sewage" that is being prepared. Therefore, the UNEP DTIE IETC document will be subject to revision following adoption of this latter document by the UNEP GPA. Table of Contents |The views reflected in this publication are provided for information and do not necessarily represent the policy of UNEP. Mention of commercial technologies and products does not constitute endorsement or recommendation for use by UNEP.
<urn:uuid:1ab176c1-d097-4c42-adef-d4f8d76ff931>
CC-MAIN-2016-26
http://www.unep.or.jp/ietc/publications/freshwater/sb_summary/index.asp
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783400031.51/warc/CC-MAIN-20160624155000-00117-ip-10-164-35-72.ec2.internal.warc.gz
en
0.832645
299
2.515625
3
a1 Princeton University Beginning in January of 1946, trains filled with Sudeten Germans—forty wagons, thirty passengers per wagon—left Czechoslovakia daily for the American Zone of occupied Germany. By the end of 1946, the Czechoslovak government completed the “organized transfer” of almost 2 million Germans, and it did so in a manner that in many respects fulfilled the mandate of the Potsdam agreement that the resettlement be “orderly and humane.” But a focus on these regularized trainloads of human cargo obscures the extent of the humanitarian disaster facing Germans during the summer months of 1945, immediately after the Nazi capitulation. By the end of 1945, Czech soldiers, security forces, and local militias had already expelled over 700,000 Sudeten Germans to occupied Germany and Austria. As many as 30,000 Germans died on forced marches, in disease-filled concentration camps, in summary executions, and massacres.
<urn:uuid:c2f6891c-3980-44a6-8883-b57916852d1c>
CC-MAIN-2016-26
http://journals.cambridge.org/action/displayAbstract?fromPage=online&aid=2777544
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399522.99/warc/CC-MAIN-20160624154959-00100-ip-10-164-35-72.ec2.internal.warc.gz
en
0.948525
194
3.703125
4
(TITC) - Located on an altitude of 1,000m-1,600m, belonging to 4 districts of Quan Ba, Yen Minh, Meo Vac, Dong Van (Ha Giang Province), the 2,356km² - Dong Van Karst Plateau is one of Viet Nam's special limestone areas, housing prominent imprints that depict the development of the earth’s crust. Up to 80% of the karst formations of Dong Van Plateau are limestone formed by environment conditions and different development stages of nature. A survey conducted by scientists from the Viet Nam Institute of Geosciences and Natural Resources revealed the finding of 13 fossil - geological formations in Dong Van, including Chang Pung, Lut Xia, Si Ka, Bac Bun, Mia Le, Si Phai, Toc Tat, Lung Nam, Bac Son, Dong Dang, Song Hien, Hong Ngai, and Lan Pang. Of which, Chang Pung is the oldest one with date of 540 millions years. In addition, 19 paleontology groups were also discovered in Dong Van, including Brachiopoda (Tay cuon), Tabulata (San ho vach day), Tetracoralla (San ho bon tia), Stromatoporoidea (Lo tang), Trilobita (Bo ba thuy), Polybranchiaspis liaojiaoshanensis (Ca co), Foraminifera (Trung lo), Tentaculies (Vo non), Conodonta (Rang non), Pelecypoda (Chan riu), Gastropoda (Chan bung), Cephalopoda (Chan dau), Bryozoans (Dong vat dang reu), Crinoidea (Hue bien), Sclerotesta (Vo cung), Ancient Crustacean (Giap xac co), Hydrilla verticillata (Thuc vat thuy sinh), Spirulina (Tao), and Chitinozoa. The paleontology groups have helped scientists draw a complete picture of development history in terms of geology of Dong Van Karst Plateau in particular and northeast Viet Nam and south China in general. The tectonic activities created canyons in Dong Van Karst Plateau, particularly in limestone area. Among karst canyons in Dong Van, Tu San is the most beautiful and majestic canyon. From Ma Pi Leng Pass beside Tu San Canyon, tourists can observe the wonderful folds of Devonian limestone. The climate is divided in two distinct seasons, rainy season (from May to October) and dry season (from November to April). The annual average temperature varies between 24 and 28oC. In winter, the temperature is sometimes down to -5oC. The best time to visit Dong Van is the spring. Tourists are hit by wonderful landscapes composed by yellow cai (kale) flowers and pink peach flowers in full blossom, mossy tiled roofs of stilt houses, dark green rocks and blue skies. How to get the karst plateau From Ha Giang City, visitors travel on National Highway 4C for 43km to Quan Ba. Continuing on this highway through Can Ty Pass, pine forests, steep drops, deep ravines, and razor sharp turns, visitors will reach to Dong Van karst plateau. to weather changes and Dong Van's geo-diversity, the karst evolution has created “rock gardens” and “rock forests” of diverse forms in the area, such as Khau Vai rock garden (Meo Vac) where tourist can contemplate the peaks of rocks in the shape of different kinds of flowers, Lung Pu rock garden (Meo Vac) with animal-shaped rocks such as tiger and dragon, Van Chai rock garden (Dong Van) with round flagstones arranged like thousands of black sea lions leaning one another getting some rest on the beach. However, found commonly here are ranges of mountains running one after another to form pyramids heading up to skies. A system of caves and grottos found in the Dong Van Plateau provides a proof of the evolution of karst with Rong Cave in Sang Tung (Dong Van), Kho My Cave in Tung Vai (Quan Ba), En Grotto in Van Chai (Dong Van)... The scientists have also evaluated Dong Van Plateau as having a unique and diverse mountainous geo-ecosystem. Primitive forests here have been rather undamaged, habiting many rare floral species, including Burretiodendron hsienmu (Nghien), Taxus Wallichiana Zucc (Thong do), Amentotaxus hatuyenensis (De tung soc nau), Cephalotaxus hainanensis (Dinh tung), Podocarpus pilgeri Foxw (Thong tre la ngan), Cupressus funebris (Hoang dan ru)… especially over 40 species of orchids. Dong Van Plateau also has a rich diversity of habitat for fauna as scientists have spotted over 50 species of wild animals, birds and reptiles in the site such as Capri conrnis sumatresis (Son duong), Rhinopithecus avunculus (Vooc mui hech), Sus cristatus (Lon rung), Garrulax canorus (Hoa mi)... Dong Van Karst Plateau also contains unique cultural values of 17 ethnic minority groups such as Mong, Dao, Lo Lo, Tay, Nung… Since long time, the ethnic groups in Dong Van has had rich cultural and spiritual life. It is expressed clearly through the cultivation method in the small rock caves or mountain sides. They also use rocks to build houses; hold water and land… To Dong Van, tourists can see the rock gardens dotted with green corn fields and golden rice fields In addition, highland markets as Pho Bang, Dong Van, Lung Cu, Sa Phin… together with traditional festivals, cuisine… also contribute making the picture of Dong Van Karst Plateau more attractive and lively. Archaeological excavations in Dong Van proved this is one of the places where keep traces of prehistoric culture. Archaeologists discovered 2 remains of the Paleolithic Age in Can Ty (Quan Ba) and Pho Bang (Dong Van) and 2 ones of the Neolithic Age in Bach Dich and Yen Minh Town (Yen Minh District). In addition, a pair of antique bronze drums of Lo Lo ethnic people in Dong Van is typical relic of Dong Son culture more than 2,000 years ago. On October 3, 2010, in Lesvos (Greece), Dong Van Karst Plateau was recognized as official member of Global Geo-parks Network (GGN) for its prominent values on landscape, palaeobiology, geology, geomorphology and local culture. Dong Van Karst Plateau has become the first geo-park of Viet Nam and the second one in Southeast Asia (after Langkawi Geo-park in Malaysia). SOME OUTSTANDING DESTINATIONS: - Lung Cu Flag Tower in Lung Cu Commune, Dong Van District, about 20km from Dong Van Town to the north. - Ma Pi Leng Pass – Tu San Canyon in 3 communes of Pai Lung, Pa Vi and Xin Cai (Meo Vac District). - Khau Vai Rock Garden in Khau Vai Commune, Meo Vac District, about 15km from Meo Vac Town to the southeast. - Kho My Cave in Kho My Hamlet, Tung Vai Commune, Quan Ba District, about 20km from Tam Son Town to the west. - Vuong Family Palace in Sa Phin Valley, Sa Phin Commune, Dong Van District, about 24km from Dong Van Town to the southwest. - Lung Cam Tren Culture – Tourism Village in Sung La Valley, Sung La Commune, Dong Van District, about 20km from Dong Van Town to the south. - Khau Vai Love Market in Khau Vai Hamlet, Khau Vai Commune, Meo Vac District, about 30km from Meo Vac Town to the south.- Quan Ba Twin Mountain in Na Khoang Hamlet, Tam Son Town, Quan Ba District, about 7km from Tam Son Town to the south. Thu Giang – Thúy Hằng Specialties: On the market-day on Sunday (Dong Van, Meo Vac fairs...) visitors can enjoy dishes such as men men (steamed ground corn), color steamed glutinous rice, corn bread, chicken, dried beef, Meo colza, bamboo shoots, thang co (a special local soup), smoked bacon and sausages, corn liquor... Visitors can buy traditional products such as brocade, linen, jewelry,... in the cultural villages, traditional craft villages, attractions, fairs ... on the karst plateau. Things to note when visiting the karst plateau: - Dress in a pleasingly tidy manner, smooth lightweight shoes with low sole (or sneakers) and soft stockings, warm clothing as the weather getting colder at night. - Baggage should be neat, not bulky to move easily. - Should be equipped phones with Google map system, using Vina, Viettel, Mobi network. - Prepare personal medicine bag for common diseases by cold weather. - Bring cash because there are very few ATMs in the town center. - Fill up before starting the trips as the gas stations just are gathered in the towns. - If you are planning on staying overnight in the forests, you have to prepare picnic tents, multifunctional cooker... - Ensure safety for children and seniors when car stops along the way - Comply with environmental regulations. - Do not trespass caves and surroundings such as breaking off stalactites... The Karst Plateau Guide For tourist guide services, management and tourism related information on the karst plateau, please contact to Management Board of Dong Van Karst Plateau Global Geopark. Management Board of Dong Van Karst Plateau Global Geopark Group 16 - Tran Phu Ward - Ha Giang City - Ha Giang Province Tel/Fax: (84-219) 3860 393 Email: [email protected]; [email protected] |View in 2016: 14599|
<urn:uuid:285c6fec-57b9-45df-b77f-aa8333b55c90>
CC-MAIN-2016-26
http://www.vietnamtourism.com/disan/en/index.php?catid=18
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397795.31/warc/CC-MAIN-20160624154957-00043-ip-10-164-35-72.ec2.internal.warc.gz
en
0.855887
2,226
2.875
3
Can you solder? Actually building a robot is a lot more involved than building the 'Real Robots' one because it was essentially a kit that came piece by piece with a magazine. £10-15 is a little low for a full robot, BUT, it's enough to build the basic circuitry for the $50 robot (if you can solder). While you're building that you could be saving for other parts. One of the great things about Admins $50 robot tutorial is that you don't specifically need to use fancy materials if you can't get or afford them. All you really need is a little ingenuity, time and patience. As for servos and the likes, you can salvage these from r/c stuff too (in cars they are normally used for steering. The difference between a motor and a hobby servo is that a motor will need a circuit to interface to the microcontroller (the microcontroller can't supply enough power to it) and will more than likely need a gearbox (or really tiny wheels). A servo is a motor with a gearbox and some circuitry to drive the motor already wrapped up in a nice little box. There are other differences but at this point i wouldn't worry too much about it. If you do choose to follow Admins tutorial I would try to stick to servos as this will make it easier. If you can't get the hitec servos recommended just post a question asking if the ones you have seen are suitable (before buying them). You'll need to buy a programmer too, if your computer has a serial or parallel port you could save a bit of money on the programmer by buying/making an older version << thats for the avr microcontrollers and possibly one reason avr uControllers became really popular, i have no idea if you can buy or make a cheap programmer for PiCs or any other chip producer. The problem you're facing now is one that many have faced before: Starting from nothing. It costs money It takes time It requires patience Best of luck
<urn:uuid:5a8eeeab-62a7-4fe9-a512-f4af5f8bfd1d>
CC-MAIN-2016-26
http://www.societyofrobots.com/robotforum/index.php?topic=6418.0
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403825.35/warc/CC-MAIN-20160624155003-00082-ip-10-164-35-72.ec2.internal.warc.gz
en
0.966151
425
2.6875
3
unlink deletes the file(s) or directories specified by unlink(x, recursive = FALSE, force = FALSE) - a character vector with the names of the file(s) or directories to be deleted. Wildcards (normally ‘*’ and ‘?’) are allowed. - logical. Should directories be deleted recursively? - logical. Should permissions be changed (if possible) to allow the file or directory to be removed? path.expand) is done on recursive = FALSE directories are not deleted, not even empty ones. Wildcard expansion is done by the internal code of Sys.glob. Wildcards never match a leading ‘.’ in the filename, and files ‘.’ and ‘..’ will never be considered for deletion. 1 for failure, invisibly. Not deleting a non-existent file is not a failure, nor is being unable to delete a directory if recursive = FALSE. However, missing values in x are regarded as failures. Becker, R. A., Chambers, J. M. and Wilks, A. R. (1988) The New S Language. Wadsworth & Brooks/Cole. Documentation reproduced from R 3.0.2. License: GPL-2.
<urn:uuid:02cecdd2-775a-4aa0-a634-9a3deef2e2dd>
CC-MAIN-2016-26
http://www.inside-r.org/r-doc/base/unlink
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393518.22/warc/CC-MAIN-20160624154953-00073-ip-10-164-35-72.ec2.internal.warc.gz
en
0.852961
279
3.625
4
What is Talk Therapy? Cognitive behavioral therapy (CBT), commonly called talk therapy, is an effective way to manage the symptoms associated with chronic neck and back pain. While cognitive behavioral therapy is not an alternative to surgery and/or medication, it can be used to complement traditional treatment programs. CBT is commonly used to treat mood disorders, chronic pain, anxiety, personality disorders, substance abuse and other mental health issues. CBT was developed by combining different elements of behavior therapy and cognitive therapy. Understanding Talk Therapy (CBT) CBT is based on the theory that negative thinking can have an impact on an individual’s mental health and behavior. Therapists trained in CBT help patients break negative patterns and beliefs that have an adverse impact on their quality of life. It’s important to understand how different thought processes can impact an individual’s behavior. Since it is challenging for an individual to think objectively about his or her personality, a therapist can be a valuable way for an individual to change errors in his or her thinking. Common errors in thinking include overgeneralizing, minimizing positives, magnifying negatives and catastrophizing. With a cognitive behavioral therapist, a patient can learn how to overcome these types of negative thoughts patterns. Cognitive behavioral therapy uses many different techniques to improve the lives of patients. These techniques can include stress inoculation training, exposure therapy, cognitive processing therapy, relaxation training and dialectical behavior acceptance. CBT can be broken down into six different steps: - Skills acquisition - Skills consolidation and application training - Generalization and maintenance - Post-treatment assessment follow-up A CBT-trained therapist will work with a patient to identify troubling conditions or situations in his or her life. This can include issues like chronic pain, medical conditions, grief, divorce, systemic anger and mental illness. After determining the issues a patient may be facing, a therapist will help a patient learn how to control the emotions associated with these issues. This can include changing an individual’s “self talk,” an individual’s interpretation of situations and an individual’s beliefs about himself or herself. By identifying inaccurate or negative thinking, it’s possible for a patient to learn how to challenge these thought processes. By examining internal thought patterns, a patient can learn more about the validity of his or her thoughts and beliefs. In many cases, a patient may discover that his or her view of a situation is based on an inaccurate perception. Choosing a Therapist It’s important to choose a therapist that is certified in CBT techniques. In the United States, certification is offered by the National Association of Cognitive Behavioral Therapists. While CBT can be expensive, it’s may be covered by an individual’s insurance policy. Most patients undergo at least 10 to 20 CBT sessions to treat a mental health-related issue. The number of sessions can vary based on how deeply rooted a set of inaccurate beliefs are in a patient’s personality. While CBT is a powerful tool, it is not an alternative to surgery or medication. Talk with a doctor or healthcare provider before starting any treatment plan.
<urn:uuid:3de9b05c-e899-4b93-ae5b-2f41c0c195ff>
CC-MAIN-2016-26
http://www.backpainrelief.net/talk-therapy/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783392099.27/warc/CC-MAIN-20160624154952-00033-ip-10-164-35-72.ec2.internal.warc.gz
en
0.932326
658
3.546875
4
July 27, 2011 Magnesium Deficiency Linked to Higher Risk of Osteoporosis, Says Doctor ORANGE, Calif., July 27, 2011 /PRNewswire/ -- A magnesium deficiency reduces the absorption and metabolism of calcium and prevents the proper amount of calcium being directed toward building stronger bones. According to Dr. Carolyn Dean, MD, ND, magnesium expert and Medical Director of the nonprofit Nutritional Magnesium Association (http://www.nutritionalmagnesium.org), the effectiveness and benefits of calcium with respect to bone health and the prevention of osteoporosis are greatly impaired in the absence of adequate levels of magnesium in the body. "Magnesium keeps calcium dissolved in the blood. Without the proper balance of magnesium to calcium, about a 1:1 ratio, calcium ends up depositing in your kidneys and can create kidney stones, in your coronary arteries resulting in clogged arteries, and in joint cartilage, rather than in your bones where you need it most. The more calcium you take without the balancing effect of magnesium, the more symptoms of magnesium deficiency and calcium excess you are liable to experience," Dr. Dean says.Soda Pop and Bone Fractures It is important to note that osteoporosis begins in the teen years. Girls achieve 42 percent of their total body bone mass between the ages of 12 and 18, and yet according to Dr. Rodger H. Murphree II, DC, CNS, adolescent girls consume only 14 percent of the Recommended Dietary Allowance (RDA) for calcium, 31 percent of vitamin A, and only 18 percent of the RDA for magnesium. "Adolescence is therefore a crucial time for bone development, and any factors adversely impacting on bone acquisition during this time can potentially have long-standing detrimental effects," comments pediatrician Neville Golden from Albert Einstein College of Medicine in New York. There are several culprits that are causing most women, both young and old, to have a magnesium deficiency. Our typical Western diet is depleted of minerals due to modern farming practices and food processing procedures, and this fact greatly contributes to the general deficiency in magnesium. An additional reason can be attributed to soft drink consumption, which can leach vital minerals, including magnesium, out of the body. In a recent Harvard study, researchers examined the relationship between the soda-drinking habits, activity levels, and history of bone fractures of 460 adolescent girls and found that ninth- and tenth-grade girls who drink soda pop have three to five times the risk of bone fractures compared with those who do not drink carbonated drinks.(1) "Our findings have implications both for the health of teenagers and for the health of women at later ages," says Grace Wyshak of the Harvard School of Public Health and Harvard Medical School. Wyshak conducted two earlier studies on soda pop and bone fractures, one on postmenopausal women, the other on teenagers, and reached the same conclusion. In teenagers, she found that two or more sodas a day are enough to cause bone weakening. Magnesium and Bone Quality In an April 2011 study published in the journal Biological Trace Element Research, the magnesium intake in healthy young adults and its relation to bone quality was evaluated.(2) A total of 484 healthy young women in their early twenties were enrolled into the study, which found that "improving dietary intake of magnesium may positively impact bone quality in this population." "Magnesium is a vital nutrient that works synergistically with both calcium and vitamin D," says Dr. Dean. "Adequate levels of magnesium in the body are essential for the absorption and metabolism not only of vitamin D but of calcium, because magnesium converts vitamin D into its active form so that it can help calcium absorption. Magnesium also stimulates a particular hormone, calcitonin, which helps to preserve bone structure and draws calcium out of the blood and soft tissues back into the bones, impacting the possibility of osteoporosis, some forms of arthritis and kidney stones." A 32-page guide to the benefits of magnesium and how to avoid osteoporosis and strengthen bones naturally is available as a free download at http://www.nutritionalmagnesium.org. For media inquiries, contact Boris Levitsky at (714) 605-1100. About the Nutritional Magnesium Association The nonprofit Nutritional Magnesium Association (NMA) is a trusted authority on the subject of magnesium deficiency and provides timely and useful information so as to improve the lives of all people affected by the widespread magnesium deficiency in our diets and the related health issues associated with this deficiency. Radio, TV, magazines and professional journals interview its members regularly. For more information, go to http://www.nutritionalmagnesium.org. (1) Cromie, W.J. Soda pop increases risk of bone breaks. Harvard Gazette Archives. June 15, 2000. (2) Kim, M. H., J. Y. Yeon, M. K. Choi, and Y. J. Bae. Evaluation of magnesium intake and its relation with bone quality in healthy young Korean women. Biol Trace Elem Res. April 5, 2011. Contact: Boris Levitsky SOURCE Nutritional Magnesium Association
<urn:uuid:caa28e89-aea9-4c17-a745-3c3a4fa9b683>
CC-MAIN-2016-26
http://www.redorbit.com/news/health/2085787/magnesium_deficiency_linked_to_higher_risk_of_osteoporosis_says_doctor/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397842.93/warc/CC-MAIN-20160624154957-00120-ip-10-164-35-72.ec2.internal.warc.gz
en
0.908837
1,066
2.96875
3
society in the world, and dates back to the 1800’s. Rodney Street in Liverpool is commonly known as the “Harley Street of the North”, due to the large number of doctors based there. It originated from the 1780’s and was mostly developed in the 1820’s. During this period it mostly housed the wealthy and former Prime Minister William Ewart was born there. A number of medical consulting rooms reside in Rodney Street, and anything from cosmetic surgeons to dentists practice there. It is still seen as an area for medical expertise to this day. Macquarie Street in Sydney, Australia was once nicknamed “the Harley Street of Sydney”. Like much of the city the name bares that of Lachlan Macquarie, who was the governor of Sydney from 1810 until 1821. He was responsible for much of the early building of the City, including this street. Until around 20 years ago there were a large number of medical practices there, although this has mostly now been taken over by business premises, as the street runs through the City just east of the centre. One famous medical building that does remain though is the Sydney Hospital, which is the oldest hospital in Australia. It has been around since 1788 and at its present site since 1811. It specialises in ophthalmology and hand surgery, but also houses an emergency department. Two other places that have had areas compared with Harley Street (though on much smaller scales) are Darling Street in Enniskillen in Ireland, and Chapel Place in Ramsgate in England. Enniskillen is a town of approximately 13,000 people in the province of Ulster. It is a Georgian town with Victorian influences. Within the town lies Darling Street, which was referred to as, “the Harley Street of Enniskillen” in the 1840’s. This comes from the fact that nine of the eleven doctors surgeries in the town where based in this street.
<urn:uuid:e394e6a9-a7b3-4084-a5da-f30de2602f54>
CC-MAIN-2016-26
http://www.cssdrive.com/index.php/forums/viewthread/8657/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783394937.4/warc/CC-MAIN-20160624154954-00178-ip-10-164-35-72.ec2.internal.warc.gz
en
0.986447
413
2.859375
3
Promoting reading in school-aged children Reading is an important part of your child’s overall health and well-being. Children who don’t learn to read well may have emotional and behavioural problems later in life. The skills your child learns early in life will help him well into adulthood. You can help your child develop good reading skills with these suggestions: - Read to your child - Make reading part of every day. Even just a few minutes will make a difference. It’s also a great way to create a special bond by spending time with your child. - Continue to read out loud to your child even when he can read alone. - Read books that are a bit above your child’s reading level, as long as they are books that he can still understand and enjoy. - Read with your children. Children who are learning to read need to practice. If your child is doing well, regular reading at home is a chance for her to show off. If your child is having trouble, it provides a safe place to practice with someone she trusts. - Be a role model. Your children should see you enjoying reading. If he sees you and other family members reading books, newspapers, and magazines, he’ll learn that reading is important, fun and valuable. - Consider creating a special reading place in your home that is quiet and cozy. Keep books close to this area. - Use rhymes, games and songs. Singing traditional songs and telling stories can all enhance your child’s learning opportunities. This can also be a great way to expose your child to other languages. - Ask the experts for help. Teachers and librarians are good sources of advice for books that are right for your child’s age and reading level. Bookstore staff can be helpful too. - Visit the library, and create one at home. Get your child a library card as soon as you can (even babies can get a library card!) Make library visits part of your routine. If there are more books than toys in the house, your child is more likely to pick up a book when there’s nothing to do. - Limit screen time. Create time for reading by limiting the amount of time your child spends watching television or playing computer and video games. - Give your child some control over who reads and when. It’s important to support your child if he decides to take on a longer book. Take turns reading, perhaps alternating paragraphs or pages. Or you can “act out” the story—your child can read the dialogue, and you can narrate by reading the rest of the text. - Give your child a choice of books. Present a few books that are the right type and length for your child, and let him choose. If you don’t present a few options, he may not make good choices. Children might choose the biggest (or smallest) book, or the one with the most attractive cover. Students who are behind in their reading level may not want to be seen with a book that is “babyish,” so they may choose books that are too hard for them. And sometimes books for older students with low reading levels may be boring. A good strategy is to say, “You choose one, I choose one.” - Keep a record of what your child is reading. Use an incentive chart to help encourage more reading, or keep a reading diary or simple list. In a reading diary, children can also write down their thoughts about the books. Encourage your child to keep her own reading list, which also lets her practice writing. - Practice writing. Reading and writing go together. Children can practice their writing skills by making lists, keeping a journal, making a catalogue of their collections, or writing to friends and family, including e-mailing and texting (with parent supervision). - If your child has trouble reading, choose stories that she can relate to. Look for stories they know or that offer experiences they can relate to or illustrations they recognize. - Focus on meaning. Reading well is about understanding meaning, not just knowing how to say the words. - If your child is stuck on a word, don’t just “sound it out.” Talk about the text and ask questions. - Help your child figure out the word by re-reading the rest of the page, or looking at pictures. - Try not to interrupt unless the mistake affects your child’s ability to understand the text. - At the end of the paragraph or chapter, go back to words your child didn’t know or had trouble sounding out and review them together. - If your child is an impatient reader, choose books that have movement. Books with short chapters or “cliff-hangers” encourage children to keep reading. Use sound effects and different voices to help keep the story interesting. - Have fun with word play. Tell jokes with puns, and play games that involve words, like Scrabble, Boggle and hangman. Do crossword puzzles together. Play “I spy” with letter sounds instead of colours. - Opportunities to read are everywhere. Encourage your child to read street signs, the back of the cereal box, or the sports pages of the daily newspaper. Your child might also enjoy reading non-fiction or comic books. Recipes help children learn to read for detail—leaving out just one ingredient can lead to disaster! Time on the Internet can also involve reading, but it is a good idea to always supervise time spent online. - Monitor text media. Since they involve reading and writing, sending and receiving a text message or e-mail from a friend or relative can be a great way to learn to type and read. However, parents should make sure children are using the technology safely. Older children will need to be reminded that the informal style used for texting is not appropriate for school assignments. When should I call my doctor? Call your doctor if your child: - has trouble paying attention when you read. - was reading well but is now having trouble. - is finding it hard to remember words that she should know. - has any physical symptoms (i.e, pain, poor sleep) as well as struggling with reading. - is having trouble seeing or hearing. - is becoming frustrated or depressed by his struggle to learn to read. Source: Children with School Problems, A Physician’s Manual (2nd edition) Editors: Debra Andrews, MD, FRCPC, and William Mahoney, MD, FRCPC More information from the CPS: Reviewed by the following CPS committees: - Public Education Advisory Committee Last Updated: April 2013
<urn:uuid:53f31cd5-c1b7-4c09-9ee0-9cba7172d500>
CC-MAIN-2016-26
http://www.caringforkids.cps.ca/handouts/promoting_reading_in_school_aged_children
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403825.35/warc/CC-MAIN-20160624155003-00059-ip-10-164-35-72.ec2.internal.warc.gz
en
0.960722
1,406
4.25
4
Identify Primary Noise Sources in the Powerplant and Implement Noise Engineering Controls to Reduce Exposures to Employees Project ID: 6433 Principal Investigator: Theresa Gallagher Research Topic: Public and Employee Safety Priority Area Assignments: 2014 (Renewable Energy and Energy Conservation) Funded Fiscal Years: 2012, 2013 and 2014 Where do we focus our engineering efforts and resources to gain the greatest improvement on employee safety and health in the powerplants with regard to preventing hearing loss? What are the most cost effective engineering solutions that can be implemented to eliminate or reduce the noise levels below the industrial standard for hazardous noise of 85 decibels A weighted? Need and Benefit Hearing loss is the number one workers compensation issue in Reclamation. Over the last 10 years, Reclamation has paid approximately 5.24 million dollars in hearing loss claims. Reclamation and its partners in this proposal encounter this issue on a daily basis. Reducing continuous noise in the powerplants will hopefully eliminate these claims in the future. Noise is often overlooked as a hazard because there are no obvious indicators of acute or chronic exposure. However, noise induced hearing loss (NIHL) is one of the highest workers compensation expenses agencies have for non-traumatic injuries. NIHL is preventable by reducing the noise at the source, providing effective hearing protectors, and/or by limiting frequency and duration of exposure. Most of the existing powerplants are over 40 years old and were constructed before many modern noise control technologies were developed. It is paramount to determine the source and type (frequency and level) of noise in the powerplants prior to evaluating potential mitigation measures. The Occupational Safety and Health Administration requires elimination/reduction of a hazard through engineering controls prior to implementing administrative and personal protective equipment strategies. Bureau of Reclamation Review The following documents were reviewed by experts in fields relating to this project's study and findings. The results were determined to be achieved using valid means. Engineering Controls for Hydroelectric Powerplant Noise Reduction (final, PDF, By Theresa Gallagher and Mr. Jeffrey Komrower Report completed on March 30, 2015
<urn:uuid:56393c50-79f0-4d12-8530-719f2ac5bb00>
CC-MAIN-2016-26
http://www.usbr.gov/research/projects/detail.cfm?id=6433
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399106.96/warc/CC-MAIN-20160624154959-00032-ip-10-164-35-72.ec2.internal.warc.gz
en
0.926884
440
2.640625
3
Themes are the fundamental and often universal ideas explored in a literary work. As Kino seeks to gain wealth and status through the pearl, he transforms from a happy, contented father to a savage criminal, demonstrating the way ambition and greed destroy innocence. Kino’s desire to acquire wealth perverts the pearl’s natural beauty and good luck, transforming it from a symbol of hope to a symbol of human destruction. Furthermore, Kino’s greed leads him to behave violently toward his wife; it also leads to his son’s death and ultimately to Kino’s detachment from his cultural tradition and his society. Kino’s people seem poised for a similar destruction, as the materialism inherent in colonial capitalism implants a love of profit into the simple piety of the native people. The Pearl portrays two contrasting forces that shape human life and determine individual destiny. The novella depicts a world in which, for the most part, humans shape their own destinies. They provide for themselves, follow their own desires, and make their own plans. At the same time, forces beyond human control, such as chance, accident, and the gods, can sweep in at any moment and, for good or ill, completely change the course of an individual’s life. If fate is best represented in the novella by the open sea where pearl divers plunge beneath the waves hoping for divine blessings, human agency is best represented by the village of La Paz, where myriad human desires, plans, and motives come together to form civilization. Kino and Juana’s lives change irreparably the moment the scorpion, a symbol of malignant fate, bites their child. Their lives then change irreparably again the moment Kino finds the pearl, a symbol of beneficent fate. Nevertheless, it is not fate but human agency, in the form of greed, ambition, and violence, that facilitates the novella’s disastrous final outcome, as Kino’s greed and the greed of others lead to a series of conflicts over the pearl. Kino finds himself caught between the forces of fate and the forces of human society, between the destiny handed him by fate and the destiny he seeks to create himself. The doctor who refuses to save Coyotito’s life at the beginning of the novel because Kino lacks the money to pay him represents colonial arrogance and oppression. Snide and condescending, the doctor displays an appallingly limited and self-centered mind-set that is made frightening by his unshakable belief in his own cultural superiority over Kino, and by the power that he holds to save or destroy lives. Steinbeck implicitly accuses the doctor’s entire colonial society of such destructive arrogance, greed, and ambition. The European colonizers that govern Kino and the native people are shown to bring about the destruction of the native society’s innocence, piety, and purity. Motifs are recurring structures, contrasts, and literary devices that can help to develop and inform the text’s major themes. Kino’s physical and spiritual existence is intimately connected with the natural world. He lives in a brush house, and he makes his living as a pearl diver. Not surprisingly, nature imagery is an important element of the novella. Kino observes the world of his garden in the opening scene of Chapter 1 and the world of the ocean in Chapter 2. Kino and Juana’s final journey up the mountain takes place on a dark night full of animal noises and cries. Steinbeck depicts the natural world as a realm that mirrors or parallels the human world. Overall, the work’s nature imagery reflects both the natural world’s idyllic innocence—the innocence Kino possesses at the beginning of the novella—and the natural world’s darker qualities of struggle and flight—the struggle and flight Kino experiences at the novella’s end. The Pearl’s descriptions of the sea, for instance, subtly emphasize the fact that life in the sea is a struggle for survival from which only the strongest emerge alive—a struggle that mirrors the conflict between Kino and the native people against their colonial rulers. Kino’s two interactions with ants—the first in Chapter 1, the second in Chapter 6—create a parallel between Kino’s relationship to nature and the gods’ relationship to Kino (he towers over the ants in the same way that the gods tower over him). Throughout the novel, whenever Kino has a particularly powerful feeling or instinct, he hears a song in his head that corresponds to that feeling. When he is happy with his family in Chapter 1, for instance, he hears the Song of the Family. When he senses malice or dishonesty, he hears the Song of Evil. These songs point to the oral nature of Kino’s cultural tradition. The ancient, familiar songs, presumably handed down from generation to generation, occupy such a central place in how Kino’s people perceive themselves that the songs actually give form to their inner feelings. Kino is much less likely to become aware of the sensation of wariness than he is to hear the Song of Danger in his head. Similarly, he is much less likely to take action because of his own conscious judgment than because he associates the song with a certain kind of urgent behavior in relation to the outside world. The songs also point to Steinbeck’s original conception of The Pearl as a film project; in a motion picture, the songs could be played out loud for the audience to hear and thus function as recurring motifs and melodies that would underscore the story’s themes. Symbols are objects, characters, figures, and colors used to represent abstract ideas or concepts. Because The Pearl is a parable, the meaning of the pearl itself—the novella’s central symbol—is never explicitly defined. Nevertheless, though the nature of the pearl’s symbolism is left to each reader’s interpretation, this symbolism seems to shift over the course of the work. At first, the pearl represents a stroke of divine providence. Kino’s people have a prophecy about a great “Pearl That Might Be,” a perfect pearl that exists as a perfect possibility. Kino and Juana’s discovery of the pearl seems to fulfill this prophecy, and it fills them with hope for Coyotito’s future and for the possibility of a life free from the shackles of colonial oppression. The discovery of the pearl seems a happy accident, one that counterbalances the tragic accident of Coyotito’s scorpion sting. Once the town finds out about the pearl, however, the object begins to make everyone who beholds it, including Kino, greedy. The neighbors call it “the Pearl of the World,” and while that title originally seems to refer to the pearl’s great size and beauty, it also underscores the fact that having the pearl brings the outside world’s destructive influence into Kino’s simple life. As the dealers begin lowballing him, Kino ceases to view the pearl with optimistic delight and instead focuses on its sale with determined ambition. The pearl’s association with good fortune and hope weakens, and the pearl becomes associated more strongly with human plans and desires. Juana and Juan Tomás begin to view the pearl as a threat rather than a blessing. The pearl elicits more and more greed on Kino’s part, as he begins to devote all his energies and possessions to protecting it (recalling the biblical parable of the pearl of great price). It thus comes to symbolize the destructive nature of materialism. The implication is that Kino’s acquisition of material wealth isn’t enough to save him from the colonists’ oppression, even though such wealth is the foundation of the colonists’ capitalist system. In fact, Kino’s shift in focus from his spiritual well-being to his material status seems to represent the colonists’ ultimate triumph. The way the pearl is depicted through the course of the novella mirrors the changes that Kino himself undergoes. At first, the pearl is a simple and beautiful object of nature. Once it becomes entangled with notions of material value, however, it becomes destructive and dangerous. The pearl is an object of natural beauty and goodness that draws out the evil inherent in mankind. The scorpion that stings Coyotito in Chapter 1 symbolizes a seemingly arbitrary evil that, because it has nothing to do with human agency, must come from the gods. Biblically, the scorpion generally represents the destruction of innocence, and the fact that Coyotito is a baby compounds the Christian symbolism of the event. Coyotito is touched by evil, and this natural destruction of innocence repeats itself in the novella in the destruction of Kino’s innocence by his ambition and greed and in the destruction of the natives’ traditional, natural way of life by the colonists. A means of making a living—both pearls and food—that has been passed down for generations, the canoe that Kino uses represents his link to cultural tradition. This culture is deeply spiritual, so it is significant that Kino uses the canoe to find the pearl, which is provided by a divine power that has nothing to do with human agency. It is also significant that Kino’s possession of the pearl leads directly to the canoe’s destruction, in Chapter 5, an event that symbolizes Kino’s devastating decision to break with his cultural heritage because he wishes to pursue material gain. “If this story is a parable, perhaps everyone takes his own meaning from it and reads his own life into it.” A parable is a simple story that relays a moral lesson. Frequently, parables are also allegories, stories in which characters, objects, and events hold fixed symbolic meaning. Steinbeck’s focus on the symbolic role the pearl plays in Kino’s life is constant, as is his focus on the symbolic importance of Kino himself. In general, Steinbeck’s overly simplistic portrayal of events is not realistic, or even believable, and it indicates The Pearl’s place as a parable or fable. Kino is an impoverished native fisherman, but more important is his allegorical role as a man faced with the temptation of wealth beyond his wildest dreams. Because the novella is concerned with Kino’s moral obligation and not his civic obligation, it concludes with Kino’s casting the pearl back into the sea, a renunciation of material wealth that indicates he has learned a moral lesson. It is important that the novella does not conclude with Kino’s arrest or continuing flight from justice, as a realistic novel concerned with civic punishment for ethical transgression might. Despite the apparent gulf between realism and parable, The Pearl attempts to show how the two are linked through the process of storytelling. Steinbeck suggests that a culture’s collective memory eventually fictionalizes all realistic experience into parable form. “As with all retold tales that are in people’s hearts,” he writes in the novella’s epigraph, “there are only good and bad things and black and white things and good and evil things and no in-between anywhere.” Storytelling gradually transforms real occurrences into simplified parables designed to teach a specific lesson. While everyday life may lack a clear lesson or meaning, the human mind is always in the process of ordering and classifying events in order to make sense of experience. It is a human tendency, and therefore a literary tendency, to classify and simplify experience, to turn reality into parable. As codified systems of morals that attempt to distinguish good from evil, religions depend heavily on parables. According to the New Testament, Jesus himself insisted on teaching to his disciples in parable form—in fact, the Christian parable of the pearl of great price, which tells the story of a man who gives up everything he has to win a great pearl, likely helped to inspire The Pearl. Steinbeck realizes that the parable form is a central element in world religion and in the cultural history of humankind. As The Pearl illustrates, the imagined is just as vital to humankind’s understanding of life as the real, and, in the form of the parable, the two are inextricably linked. Although readers may draw a number of messages from The Pearl, a few primary moral lessons do emerge. Some ways of interpreting the allegory of the story include: If the pearl symbolizes goodness, Kino’s struggle to protect the cherished pearl might represent the human struggle to preserve cherished qualities or attributes—moral virtue, innocence, integrity, the soul—from the destructive forces of the outside world. Just as these destructive forces corrupt and conspire to seize Kino’s pearl, they can work against the virtuous inner qualities that the pearl might represent. According to this reading, Coyotito’s death and Kino’s voluntary relinquishment of the pearl at the end of the novel suggest that the destructive forces of the world are too powerful to be overcome. In a way, Kino’s desire to use the pearl to improve his life echoes the traditional narrative of the American dream. He attempts to transform hard work into material wealth, and material wealth into education, comfort, and familial advancement. According to this reading, Kino’s gradual corruption and the story’s tragic conclusion hint at a fundamental flaw in the American dream: it condones sacrifice of virtue for material gain. Additionally, Kino’s gradual disillusionment with the pearl (as he realizes that it won’t make his life better) underscores the fallacy of the American dream itself. Rather than widespread opportunity, Kino finds a world of powerful, greedy men conniving to take his wealth away from him dishonestly. Because Kino belongs to a native tribe that, centuries after the original Spanish colonization of Mexico, is still under the thumb of the Spanish colonial authorities, the story can be read as a parable about the forces of colonization and the destructive effect those forces have on native cultures and peoples. Kino is originally driven to search for the pearl because of the unhelpfulness of the condescending Spanish doctor; after he finds the pearl, he is cheated and hunted by cynical descendants of colonials who hope to exploit and control him. This moral, preached by St. Augustine and many others after him, is found in the New Testament in Paul’s first epistle to Timothy (1 Timothy 6:10). Kino’s investment of spiritual value in a pearl, an object of material wealth, may be misguided from the start. Juana and Juan Tomás both suspect that Kino is wrong to try to get more for the pearl than the dealers offer, and Juana tries several times to discard the pearl, believing it to be the source of her family’s troubles. This reading interprets the pearl as a symbol of destruction and corruption rather than purity. I need to cite sources I used to gather information, and I can't seem to find any identification of author. 6 out of 18 people found this helpful I need to cite sources I used to gather information, and I can't seem to find any identification of author. 1 out of 2 people found this helpful I fail to see how Kino is greedy. Kino's dreams of rifles and new clothes were for his family. He wanted a rifle and a harpoon so that he could obtain food for his family. He wanted new clothes so that his family would be accepted by society. Most of all, he wanted Coyotito to get an education so that Kino and his people would learn the truth- how they've been lied to by the colonists. If Coyotito got an education, he would be able to see how wrong everything was, and through him, Kino. 14 out of 18 people found this helpful
<urn:uuid:c94f992f-c5a1-420c-b24b-22bee0cd0314>
CC-MAIN-2016-26
http://www.sparknotes.com/lit/pearl/themes.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398075.47/warc/CC-MAIN-20160624154958-00060-ip-10-164-35-72.ec2.internal.warc.gz
en
0.95371
3,345
2.859375
3
Text bullying much like cyber bullying is fairly new, due to advancements in technology teens are able to bully others in more create ways. Bullies are no longer limited to verbal or physical bullying. Keep reading for more on how bullies use text messaging to harass others and how to prevent being a victim. Text bullying has become a serious problem among adolescents and teens. It can have devastating consequences, and parents may not even know it’s occurring. Parents can play an important role in preventing text bullying and helping teens who have been the victim of a bullying through text messages. Text bullying is sending mean, embarrassing, untrue, or hurtful message to or about someone using cell phone text messaging. This can also include sexting, or sending sexually suggestive text messages to someone or about someone. Many kids get cell phones when they are in middle school, which is when bullying, including text bullying, is most common. Approximately 9 out of 10 teens have a cell phone, and about 1 in 5 will be victims of a text bully. About 1 in 10 teens engage in text bullying. Bullying via text messaging has become more common than traditional bullying, especially among girls. There are several factors that can make text bullying more damaging than traditional bullying for both the victim and the bully: - It can happen 24 hours a day, even at home, which is usually a refuge from bullying, so it can feel inescapable. - Text bullies are often much meaner because they don’t have to see their victims. - The victims may not know who is sending the text messages, which can be frightening. - Teens may think text bullying is anonymous and that they can’t get caught. They also may use someone else’s phone to send the messages. Text bullying can often be traced, however, and the bully, as well as his or her parents, can face criminal penalties as a result. - Victims often respond by sending mean messages back to the bully, becoming bullies themselves. - Sexting is against the law and can result in child pornography charges for the sender or senders even if they are minors. - Text bullying doesn’t necessarily go away. It may get passed around and it can end up where someone, like a potential boss, will see it in the future. This can harm the victim further, and can be even more damaging for the bully, who may miss out on job opportunities because of the text messages they sent. Text bullying can have many negative repercussions for the victim: - Social withdrawal Bullies also often suffer from depression, and the bully and his or her family may face legal charges for text bullying. Parents may be tempted to take away a teen’s cell phone to prevent text bullies from harassing a victim, or if he or she is already a victim, but this deprives teens of social connections that are very important to them and feels like a punishment for something that isn’t their fault. Fear of losing their cell phones is a major reason why teens don’t report text bullying. There are, however, other ways that parents can help combat the effects of text messages from bullies: - Talk to your kids about text bullying and why it is wrong. Tell them if they ever are the victim that it’s not their fault and they won’t be punished. They should not respond to the bullying, but instead should save it to report to a parent. If the message is sexual or threatening in nature they can report it to the police, who can trace it and take legal action against the bully. - Consider having a cell phone use contract with your teen that forbids text bullying, including forwarding mean messages, even if someone else starts it. Take away the cell phone for a set period of time if the teen text bullies anyone. You can also limit the times when teens can use their cell phones, such as requiring them to turn it off at night, and reserve the right to ask questions about whom the teen is texting and what they are texting about. - If your child does not yet have a cell phone, wait until they are in high school to allow it. - Encourage your child’s school to ban cell phones during school hours. - Teach teens not to accept calls from someone they don’t know. - Encourage teens to think before sending messages, and not to send a message they wouldn’t want everyone else to see since they don’t know if the person they send a message to may forward it to others, or if they are even texting the person they think they are. - Help teens block numbers that are sending mean text messages. - Tell teens not to let anyone else use their phone to send messages. - If the text bullying is serious, contact the cell phone company to get the teen a new phone number and have the teen be very careful about who they give it to. - If the teen knows who the bully is, let the bully’s parents know what they are doing. If the text bullying doesn’t stop, make the parents aware that they may face legal action if it doesn’t stop, and be prepared to consult an attorney if necessary. It is important for teens who are the victims of text bullying to know that they should not blame themselves for it, and that you care about them and think they are worthwhile regardless of what the bully says. Committee for Children, Cyber Bullying and Media Safety, “Dealing with Text Message Bullying” [online] Kathy Brock, ABC News, “Text Bullying” [online] Stop Bullying Now, “Cyberbullying” [online]
<urn:uuid:8f49d9fc-9d58-4583-a23d-5a432a9129d8>
CC-MAIN-2016-26
http://www.bullyingstatistics.org/content/text-bullying.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783400031.51/warc/CC-MAIN-20160624155000-00131-ip-10-164-35-72.ec2.internal.warc.gz
en
0.957113
1,184
3.5
4