text
stringlengths
199
648k
id
stringlengths
47
47
dump
stringclasses
1 value
url
stringlengths
14
419
file_path
stringlengths
139
140
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
50
235k
score
float64
2.52
5.34
int_score
int64
3
5
Meet the Moon and the Comic Book Star Moon over My Town Community members of all ages are invited to contribute photographs — taken with cell phones, film cameras, or more sophisticated equipment — of the Moon. The images are collected over the course of a month or more and posted in chronological order. The collection forms a library display featuring the Moon's changing appearance in your local sky over the course of a month or more. This community engagement activity can be offered before, during, or after offering Explore! Marvel Moon programs at your site. Children, ages 8–13, embark on an exploration of Earth's and the Moon's shared history in this 30 -minute introductory activity for the Explore! Marvel Moon module. They work in groups to determine the order of geologic events — such as the formation of the Moon and when the bright crater of Tycho formed — and arrange images depicting those events in the correct order. The children are introduced to NASA lunar scientists, who are currently investigating the Moon's history, through comic-book style visualizations of their real-life work. Finally, the children share their own histories by drawing, comic-book style, a past connection with the Moon in their own lives. In this 1-hour activity, children, ages 8 to 13, portray our Moon's remarkable beginnings through a giant impact. Children color images of the latest scientific data depicting the Moon’s formation to create their own comic strips of our Moon's birth. The children use different-colored balls of Play-Doh® to model the impact between Earth and a small planet 4.5 billion years ago. "Debris" from both "planets" is rolled into a small ball to model how our Moon formed through the process of accretion of smaller particles. Recipe for a Moon The Moon is made of cheese... no! Rice Krispies treats! Children ages 8 to 13 discover that the Moon, like Earth, is made up of layers of different materials through this 45-minute activity. They work in teams to make models of the interiors of the Moon and Earth. Common food items are used to construct the cores, mantles, and crusts of both planetary objects. Growing up Moon Children, ages 8 to 13, visit a sequence of stations to discover how the dark and light areas and craters we see on the Moon's face today record major events of its lifetime. "While they may visit the stations in any order, the stations trace the Moon's 4.5-biliion-year history from "infancy" to the imagined future. The children tie together major events in the Moon's geologic history as a series of comic panels in their Marvel Moon comic books.At each station, the children identify the lunar features that were produced during that era on a Moon map. Allow 2 hours for seven stations. This indoor activity can be combined with the outdoor night viewing, Moon in Action and, if desired, the brief demonstration Mirror Moon. Infant Moon: Moon Mix! This station investigates the Moon’s infancy, 4.5 billion years ago, when the Moon was still probably hot enough from its formation for at least its surface to be melted.Children model how an ocean of molten rock — magma — produced the Moon's oldest rocks. Dense materialsin the molten mixture sank, while the least dense materials floated to the top and cooled to form the light-colored areas we see on the Moon today. Children create a simple model of this process by mixing household materials of different densities in a bottle and allowing to them to settle into separate layers. They decide which materials make the best model for the infant Moon. Kid Moon: Splat! Children model ancient lunar impacts using water balloons. By measuring the diameter of the crater area, children discover that the Moon’s largest impact basins were created by huge asteroids! The huge basins formed on the young Moon, but through processes investigated in Moon Ooze, they later became filled in by the dark maria now visible on the Moon. Teen Moon: Moon Ooze Children model how the Moon's volcanic period reshaped its earlier features. The children consider that the broad, shallow impact basins — which had formed earlier while it was a "kid Moon" — contained cracks through which magma seeped up. A plate in which slits have been cut is used to represent an impact basin and a dish of red-colored water is used to represent the pockets of magma within the Moon’s upper layers. When the model impact basin is pressed into the "magma," " lava" fills in the low areas through the same process that produced the dark patches, or maria, on the Moon. Children may examine a type of Earth rock (named basalt) that is also found on the Moon and that would have been shaped by the processes explored here. This station investigates the Moon's "teen years," when it was one to three billion years old. Moon's Long History: Impact Paintings Pairs of children model how scientists use craters to determine the ages of lunar surface. One child keeps time while the other creates a painting for the other to interpret. Cotton balls coated in different colors of paint are thrown at paper to simulate asteroids striking the lunar surface over time. The children take turns in the time-keeping/painting roles to decipher a mystery: In what order did the "impacts" occur? Which painting has more "impacts"? They learn that scientists can estimate the age of a lunar surface by counting its craters — much like counting candles on a birthday cake! Grown-up Moon: What Do You See in Today's Moon? Children use their imaginations to discover an object orcharacter in the Moon! They first read or listen to a cultural story describing a shape identified in the Moon's surface features. Then, they consider how the features formed over the Moon's 4.5-billion-year history and investigate Earth rocks that are similar. Children may examine the types of Earth rocks (named anorthosite, basalt, and breccia) that are also found on the Moon and that would have been shaped by the processes explored here. Finally, they draw their own object or character that they see when they look at the Moon. Future Moon: The Footsteps of Explorers Children drop impactors onto layers of graham crackers! The process models how impacts throughout the Moon's history have broken rocks down into a mixture of dust, rocks, and boulders that covers the lunar surface. They consider how the dust will continue to hold a record of human exploration — in the form of astronaut bootprints — for countless years in the future. Children may examine a type of Earth soil ("lunar soil simulant") that is similar to what is found on the Moon's surface and that would have been shaped by the processes explored here. The children create their own records of exploration by making rubbings of their shoes to decorate the library or take home. Rocks Tell Us the Moon's Story How do we know about the Moon's long history? The rocks themselves record it. Children can see snapshots of the Moon's history and hold an important artifact of American history with a Lunar Sample Disk. Earth rocks and soil of similar types as the lunar samples may be provided and explored with hands, eyes, noses, and tools! This activity may stand alone, but it is recommended as a station in Growing up Moon. Moon in Action In this 30-minute activity, children, ages 7 and up, and their families go outside on a clear evening and view the sky to see the Moon for themselves. Using sky charts and other resources, and possibly in partnership with a local astronomical society, children navigate the Moon’s impact craters, flat plains (maria), and mountains with the naked eye and binoculars or telescopes. In this 10-minute investigation, children ages 8 to 13 investigate the source of the Moon's light. They consider a ball, wrapped in aluminum foil, and experiment with a flashlight to make it appear bright. The children compare the foil-wrapped ball to a Moon globe and discover that the Moon reflects very little of the light the falls on it, but still appears bright. The children construct their own globe of the Moon to take home with them by gluing a map template onto a tennis-ball. This activity is most effective when conducted in a dark area, such as outdoors at night during Moon in Action or in a darkened room in conjunction with Earth's Bright Neighbor. What If There Was No Moon? Earth’s Bright Neighbor Children ages 8 to 13 select from a variety of fruits to construct a scale model of the Moon, Earth, and Sun. After determining the correct sizes and distances for their models, they remove the Moon. They consider what it would be like if the nearby Moon were no longer reflecting the Sun’s light in the nighttime or daytime sky. Allow 30 minutes for this activity. Loony Lunar Phases Children ages 8 to 11 discover the Moon’s influence on our culture through this 30-minute, light-hearted investigation of lunar phases. The children hear a story, song, or (silly or serious) poem that celebrates the Moon’s different phases. They recreate the shapes of the lunar phases using the frosting from Oreo® cookies, and then they place them in correct order to reveal the repeating pattern. As they eat the cookies, they consider how our culture would differ without the Moon changing shape in the sky over time. They use words inspired by the Moon to write a short poem. Lunar Phases: A Dance Under the Sun Children ages 10 to 13 perform the lunar phases outdoors, using a Styrofoam ball, sunlight, and the motions of their bodies to model the Moon's phases. Older children (12 to 13) predict future Moon phases. Allow 20–30 minutes for this activity. Spin! Day and Night The Moon is the reason for our 24-hour day! In this 45-minute activity, children ages 10 to 13 explore Earth's rotation and the Moon's role. In part A, children use their bodies to model the Earth's daily motions in this kinesthetic exploration. The motion of the Earth about its axis (rotation) is related to the appearance of the sky over the course of the day. In part B, children consider the role of the Moon in slowing Earth's rotation over time; if the Moon didn't exist, Earth might be spinning more quickly, giving us an eight-hour day! Steady Partner, Steady Seasons Our Moon acts like training wheels for the Earth, allowing for a stable cycle of seasons. In part A, children ages 11 to 13 model how Earth's tilt creates the seasons. They use their bodies to review the Earth's daily motions before investigating the reason for Earth's seasons in this kinesthetic exploration. The motion of the Earth about its axis (rotation) and in orbit around the Sun (revolution) is related to the appearance of the sky over the course of the day and year. In part B, children model that if its tilt was not stabilized by Moon, Earth's axis would slowly wobble between straight up (0° tilt) to nearly on its side (80° tilt). The resulting seasonal extremes would be unfavorable for life. Allow 1 hour for this activity. Lunar Phases: A Dance under the Sun Children ages 10 to 13 perform the lunar phases outdoors, using a Styrofoam ball, sunlight, and the motions of their bodies to model the Moon's phases. Intermediate children (ages 10 to 11) note the names of the phases by singing Phrases for Phases, which is sung to the tune of The Ants Go Marching. Older children (12 to 13) predict future Moon phases. Allow 20-30 minutes for this activity. Dance of the Moon and Oceans In part A, children ages 10 to 13 discover how the Moon's gravitational pull causes the level of the ocean to rise and fall twice a day along most coastlines. Six children represent the oceans, solid Earth, Moon, and Sun and move their bodies to show the interactions of these elements. In part B, they consider what the Earth's tides might have been like if there were no Moon. They model the smaller tides that would be produced solely by the Sun. Allow 30 minutes for this activity. Children ages 8 to 13 are faced with a challenge to determine the truth about the Moon’s influence on Earth. They think like a scientist — with reasoning skills and a healthy amount of skeptism — to sort puzzle pieces containing statements about the Moon into two images. The "Far-out Far Side" has incorrect statements about the Moon (urban myths), and "True-Blue Blue Moon" has true facts about the Moon’s influence on Earth and life. Allow 30 minutes for this activity. In this 10-minute investigation, children ages 10 to 13 use a penny and a quarter to model that the Moon does indeed spin on its axis as it orbits the Earth. They find that the Moon keeps the same face toward the Earth, but receives illumination from the Sun on all sides in turn. My Take on the Moon Children ages 8 to 13 engage their communities about the Moon's formation, changes over time, gravitational connection to Earth, or influence on our culture and urban legends. In this 30-minute activity, they describe — comic-book style — an aspect of the Moon they explored through Explore! Marvel Moon activities. The children create zines: small, self-published magazines inexpensively duplicated on standard letter paper and folded into eight-page booklets. The zines are added to the library's collection and made available for lending. August 16, 2012
<urn:uuid:46e5083d-69d8-4cfd-bca1-2ded7cd35bc3>
CC-MAIN-2016-26
http://www.lpi.usra.edu/education/explore/marvelMoon/activities/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398628.62/warc/CC-MAIN-20160624154958-00161-ip-10-164-35-72.ec2.internal.warc.gz
en
0.939545
2,839
3.296875
3
Microsoft has released a quick fix for a vulnerability in older versions of its Internet Explorer browser that is actively being used by attackers to take over computers. The vulnerability affects IE versions 6, 7 and 8. The latest versions of the browser, 9 and 10, are not affected. The company occasionally issues quick fixes as a temporary protective measure while a permanent security update is developed if a vulnerability is considered particularly dangerous. Microsoft issued an advisory on Saturday warning of the problem, which involves how IE accesses "an object in memory that has been deleted or has not been properly allocated." The problem corrupts the browser's memory, allowing attackers to execute their own code. The vulnerability can be exploited by manipulating a website in order to attack vulnerable browsers, one of the most dangerous types of attacks known as a drive-by download. Victims merely need to visit the tampered site in order for their computer to become infected. To be successful, the hacker would have to lure the person to the harmful website, which is usually done by sending a malicious link via email. Security vendor Symantec described such a scenario as a "watering hole" attack, where victims are profiled and then lured to the malicious site. Last week, one of the websites discovered to have been rigged to delivered an attack was that of the Council on Foreign Relations, a reknowned foreign policy think tank. The attack delivers a piece of malware nicknamed Bifrose, a malware family first detected around 2004. Bifrose is a "backdoor" that allows an attacker to steal files from a computer. Symantec wrote that the attacks using the IE vulnerability appear to be limited and concentrated in North America, indicating a targeted attack campaign. Since the attacks already under way before the vulnerability was discovered, Symantec said it "suggests a high level of sophistication requiring access to resources and skills which would normally be outside most hackers capabilities." Send news tips and comments to [email protected]. Follow me on Twitter: @jeremy_kirk
<urn:uuid:748a43fd-4944-492f-be3c-7dfcbc25a749>
CC-MAIN-2016-26
http://www.cso.com.au/article/445425/microsoft_issues_fix_it_ie_vulnerability/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396459.32/warc/CC-MAIN-20160624154956-00137-ip-10-164-35-72.ec2.internal.warc.gz
en
0.95325
419
2.59375
3
For centuries, trading caravans made epic journeys across the Saharan sands to reach the markets of the legendary city of Timbuktu, where they traded salt, gold, slaves, textiles—and books. By the mid-fifteenth century, Timbuktu had become a major center of Islamic literary culture and scholarship. The city's libraries were repositories of all the world's learning, housing not only works by Arab and Islamic writers but also volumes from the classical Greek and Roman worlds and studies by contemporary scholars.The astonishing manuscripts of Timbuktu form the lavish visual heart of this book. Beautifully graphic, occasionally decorated, these exquisite artifacts reveal great craftsmanship as well as learning. All were written in the Arabic script, but not all are in Arabic, for they also feature a range of local African languages.Aside from scholarly works, the surviving manuscripts include a wealth of correspondence between rulers, advisers, and merchants on subjects as various as taxation, commerce, marriage, divorce, adoption, breastfeeding, and prostitution, providing a vivid insight into the ordinary life and values of the day. Back to top Rent The Hidden Treasures of Timbuktu 1st edition today, or search our site for other textbooks by Alida Jay Boye. Every textbook comes with a 21-day "Any Reason" guarantee. Published by Thames & Hudson. Need help ASAP? We have you covered with 24/7 instant online tutoring. Connect with one of our Classics tutors now.
<urn:uuid:2b9a9c60-498f-4ea5-b66c-6025a9b605ed>
CC-MAIN-2016-26
http://www.chegg.com/textbooks/the-hidden-treasures-of-timbuktu-1st-edition-9780500514214-0500514216
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783408828.55/warc/CC-MAIN-20160624155008-00027-ip-10-164-35-72.ec2.internal.warc.gz
en
0.950956
308
3.203125
3
Diseases of Swine (8th edition)/Chapter 17 Porcine parvovirus (PPV) causes reproductive failure of swine characterized by embryonic and fetal infection and death, usually in the absence of outward maternal clinical signs. The disease develops mainly when seronegative dams are exposed oronasally to the virus anytime during about the first half of gestation, and conceptuses are subsequently infected transplacentally before they become immunocompetent. There is no definitive evidence that infection of swine other than during gestation is of any clinical or economic significance. The virus is ubiquitous among swine throughout the world and is enzootic in most herds that have been tested. Diagnostic surveys have indicated that PPV is the major infectious cause of embryonic and fetal death (Cartwright and Huck 1967; Mengeling 1978b; Thacker and Leman 1978; Vannier and Tillon 1979; Mengeling et al. 1991). PPV is classified in the genus Parvovirus (Latin parvus = small) of the family Parvoviridae (Siegl 1976; Bachmann et al. 1979). All isolates of PPV that have been compared have been found antigenically similar if not identical (Cartwright et al. 1969; Johnson and Collings 1969; Morimoto et al. 1972a; Johnson et al. 1976; Ruckerbauer et al. 1978). PPV is also antigenically related to several other members of the genus (Cotmore et al. 1983; Mengeling et al. 1986, 1988). However, its identity can be established by relatively stringent serologic tests such as serum neutralization (SN) and hemagglutination inhibition (HI). Biophysical and Biochemical Properties The biophysical and biochemical properties of PPV have been extensively studied (Siegl 1976; Molitor et al. 1983; Berns 1984) and are summarized as follows. A mature virion has cubic symmetry, two or three capsid proteins, a diameter of approximately 20 nm, 32 capsomeres, no envelope or essential lipids, and a weight of 5.3 × 106 daltons. The viral genome is single-stranded deoxyribonucleic acid (DNA) with a molecular weight of 1.4 × 106 (i.e., about 26.5% of the weight of the complete virion). Buoyant densities (g/mL in cesium chloride) of complete infectious virions, incomplete "empty" virions, and extracted virion DNA are 1.38-1.395, 1.30-1.315, and 1.724 respectively. Viral infectivity, hemagglutinating activity, and antigenicity are remarkably resistant to heat, a wide range of hydrogen ion concentrations, and enzymes. Replication of PPV in vitro is cytocidal and characterized by "rounding up," pyknosis, and lysis of cells (Fig. 17.1A). Many of the cell fragments often remain attached, eventually giving the affected culture a ragged appearance. Intranuclear inclusions develop (Cartwright et al. 1969) but they are often sparsely distributed (Rondhuis and Straver 1972). Infected cultures may hemadsorb slightly (Cartwright et al. 1969) (Fig. 17.1B). Cytopathic changes are extensive when cell culture-adapted virus is propagated under appropriate conditions. However, on initial isolation several serial passages of the virus (Cartwright et al. 1969) or, better, the infected culture may be necessary before the effects are recognized. The use of immunofluorescence (IF) microscopy greatly increases the likelihood of detecting minimally infected cultures (Lucas and Napthine 1971; Mengeling 1975). Primary and secondary cultures of fetal or neonatal porcine kidney cells are most often used for propagation and titration of PPV, although other kinds of cultures are also susceptible (Pirtle 1974). Replication is enhanced by infection of mitotically active cultures (Mayr et al. 1968; Cartwright et al. 1969; Bachmann 1972; Hallauer et al. 1972). Many cells in such cultures are in the S phase (i.e., the DNA synthesis phase) of their cell cycle, wherein the DNA polymerases of cell origin needed for viral replication are available (Tennant 1971; Siegl and Gautschi 1973a, b). If either fetal or adult bovine serum is incorporated in the nutrient medium of cell cultures used to propagate PPV, it should be pretested for viral inhibitors (Coackley and Smith 1972; Johnson 1973; Pini 1975). The same may apply to sera of several other species (Joo et al. 1976d). Because replication of PPV is affected by mitotic activity, the effect of the serum on the cells is also especially important. In addition, cultures should be pretested for PPV contamination (Lucas and Napthine 1971; Mengeling 1975). Cultures are sometimes unknowingly prepared from infected tissues of fetal (Mengeling 1975) and postnatal (Huygelen and Peetermans 1967; Bachmann 1969; Cartwright et al. 1969; Hafez and Liess 1979) pigs. Moreover, PPV can be accidentally introduced into cultures in several ways (Hallauer et al. 1971), including the use of contaminated trypsin (Croghan and Matchett 1973; Croghan et al. 1973). If contamination is detected before all cells are infected, the virus can be eliminated by repeatedly subculturing the cells in the presence of nutrient medium containing PPV antiserum (Mengeling 1978a). Several investigators have used IF microscopy to follow the development of PPV in cell culture (Cartwright et al. 1969; Lucas and Napthine 1971; Mengeling 1972; Siegl et al. 1972; Bachmann and Danner 1976). In general, the sequence of events is as follows. Viral antigen is detected in the cytoplasm of cells soon after infection if the inoculum contains a high titer of virus and viral antigen. Most, if not all, of this early cytoplasmic fluorescence is the result of antigen phagocytized from the inoculum (Mengeling 1972; Mengeling and Cutlip 1975). By sequential examinations, such antigen can be demonstrated first on the external surface of the cytoplasmic membrane and later within the cytoplasm, often relatively concentrated in a juxtanuclear location. The first unequivocal evidence of viral replication is the appearance of nascent viral antigen in the nucleus (Fig. 17.2A). In at least some infected cells, nascent antigen next appears in the cytoplasm in sufficient quantity that both cytoplasm and nucleus are brightly fluorescent. Infected cells commonly seen in the lung of fetuses that develop a high titer of antibody for PPV probably represent this stage of replication (see Fig. 17.8C). Affected cells subsequently round up, become pyknotic, and disintegrate with release of virus and viral antigen (Fig. 17.2B). Other cells in the culture that are not at the appropriate stage to support viral replication continue to phagocytize and accumulate viral antigen in their cytoplasm (Fig. 17.2C). A second wave of viral replication can be induced if these cells are stimulated to enter the S phase of the cell cycle as, for example, by the addition of fresh culture medium. PPV agglutinates human, monkey, guinea pig, cat, chicken, rat, and mouse erythrocytes. Erythrocytes of other kinds of animals that have been tested are relatively or completely insensitive, or the results have been equivocal (Darbyshire and Roberts 1968; Mayr et al. 1968; Cartwright et al. 1969; Hallauer et al. 1972; Mengeling 1972; Morimoto et al. 1972a). Several parameters of the hemagglutination (HA) test—such as the temperature of incubation (Mayr et al. 1968; Mengeling 1972), the species of erythrocyte used, and in the case of chicken erythrocytes the genetic composition (Cartwright et al. 1969; Pini 1975; Ruckerbauer et al. 1978) and age (Morimoto et al. 1972a) of the donor—may quantitatively affect results. The HA test is most commonly conducted at room temperature, at approximately neutral pH, and with guinea pig erythrocytes. Higher HA titers have been recorded when the diluent used in the test was veronal buffer rather than phosphate-buffered saline (Ruckerbauer et al. 1978). Elution of virus (the hemagglutinin is part of the virion) can be induced by suspending erythrocytes in alkaline buffer, pH 9 (Hallauer et al. 1972). Infectivity titrations are conducted in a standard manner except that, because cytopathic changes at terminal dilutions are often vague, endpoints of infectivity are often determined either by examining cell cultures for intranuclear inclusions after appropriate staining or by examining cell culture medium for viral hemagglutinin (Cartwright et al. 1969). A titration procedure wherein infected cells are made evident by IF microscopy (Mengeling 1972) and a plaque assay (Kawamura et al. 1988) also have been described. Tests The HI test is frequently used for detection and quantitation of humoral antibody for PPV. Antibody sometimes can be detected as early as 5 days after swine are exposed to live virus, and it may persist for years (Johnson et al. 1976). Sera examined by the HI test are usually pretreated by heat inactivation (56˚C, 30 minutes) and by adsorption with erythrocytes (to remove naturally occurring hemagglutinins) and kaolin (to remove or reduce nonantibody inhibitors of HA) (Mengeling 1972; Morimoto et al. 1972a). Trypsin also has been used to remove nonantibody inhibitors of HA (Cartwright et al. 1969). Parameters of the HI test have been studied in detail (Kim 1974; Joo et al. 1976c). The SN test is occasionally used for detection and quantitation of humoral antibody for PPV. Neutralization of infectivity is usually confirmed by the absence or reduction either of intranuclear inclusions or fluorescent cells in cultures or of viral hemagglutinin in the culture medium (Mengeling 1972; Johnson 1973; Joo et al. 1975). The SN test has been reported to be more sensitive than the HI test (Johnson and Collings 1971; Joo et al. 1975). A microtechnique for application of the SN test has been described (Joo et al. 1975). Immunodiffusion (Joo et al. 1978), a modified direct complement-fixation test (Ruckerbauer et al. 1978), and enzyme-linked immunosorbent assay (Hohdatsu et al. 1988; Westenbrink et al. 1989) also have been used successfully to detect antibody for PPV. Porcine parvovirus is ubiquitous among swine throughout the world. In major swine-producing areas such as the midwestern United States, infection is enzootic in most herds, and with few exceptions sows are immune. In addition, a large proportion of gilts are naturally infected with PPV before they conceive, and as a result they develop an active immunity that probably persists throughout life. Collectively, the seroepidemiological data indicate that exposure to PPV is common. They also emphasize the high risk of infection and reproductive disease among gilts that have not developed immunity before conception. The most common routes of infection for postnatal and prenatal pigs are oronasal and transplacental respectively. Pigs nursing immune dams absorb a high titer of antibody for PPV from colostrum. These titers decrease progressively with time by dilution as pigs grow as well as by biological degradation. They usually reach subdetectable levels in 3-6 months if sera are examined by the HI test (Etoh et al. 1979; Paul et al. 1982). Sometimes passively acquired antibody persists for a longer interval. Moreover, levels of antibody too low to be detected by the HI test may be detected by the SN test (Johnson et al. 1976). The primary significance of passively acquired antibody is that it interferes with the development of active immunity. High levels of such antibody can prevent infection, and lower levels can minimize dissemination from infected pigs (Suzuki and Fujisaki 1976; Paul et al. 1980). Consequently, some groups of gilts are not fully susceptible to infection and dissemination of virus until either shortly before conception or during early gestation. Contaminated premises are probably major reservoirs of PPV. The virus is thermostable, is resistant to many common disinfectants (Brown 1981), and may remain infectious for months in secretions and excretions from acutely infected pigs. It was shown experimentally that although pigs transmitted PPV for only about 2 weeks after exposure, the pens in which they were initially kept remained infectious for at least 4 months (Mengeling and Paul 1986). The ubiquity of PPV also raises the possibility that some pigs are persistently infected and at least periodically shed virus. However, shedding beyond the interval of acute infection has not been demonstrated (Johnson et al. 1976). The possibility of immunotolerant carriers of PPV as a result of early in utero infection has been suggested (Johnson 1973). When gilts were infected with PPV before day 55 of gestation, their pigs were born infected but without antibody. Virus was isolated from kidneys, testicles, and seminal fluid of such pigs killed at various times after birth up to the time they were 8 months of age; at which time the experiment was terminated (Johnson and Collings 1971). Results of another study, wherein dams were infected early in gestation and their pigs were born infected but without antibody, also suggest an acquired immunotolerance (Cartwright et al. 1971). A possible example of an infected, immunotolerant, sexually active boar was reported (Johnson et al. 1976). Boars may play a significant role in dissemination of PPV at a critical time. During acute infection the virus is shed by various routes, including semen, and the isolation of PPV from semen of naturally infected boars has been reported (Cartwright and Huck 1967; Cartwright et al. 1969; McAdaragh and Anderson 1975). Semen may be contaminated externally, as for example with viruscontaining feces, or within the male reproductive tract. The virus was isolated from a testicle of a boar 5 days after it was injected into the boarÕs prepuce (Lucas et al. 1974) and from testicles of boars killed 5 and 8 days after they were infected oronasally (Mengeling, unpublished data_1976). Virus was also isolated from scrotal lymph nodes of boars killed 5, 8, 15, 21, and 35 days after oronasal exposure. After day 8, isolation was accomplished by cocultivating lymph node fragments with fetal porcine kidney cells (Mengeling, unpublished data_ 1976). Irrespective of their immune status, boars can also function as a vehicle for mechanical dissemination of PPV among susceptible females. Acute infection of postnatal pigs, including pregnant dams that subsequently develop reproductive failure, is usually subclinical (Johnson and Collings 1969; Cutlip and Mengeling 1975a; Fujisaki et al. 1975; Johnson et al. 1976; Joo et al. 1976a; Mengeling and Cutlip 1976). However, in young pigs and probably in older breeding stock as well, the virus replicates extensively and is found in many tissues and organs with a high mitotic index. Viral antigen is especially concentrated in lymphoid tissues (Cutlip and Mengeling 1975a; Fujisaki et al. 1975) (Fig. 17.3A, B). Many pigs, irrespective of age or sex, have a transient, usually mild, leukopenia sometime within 10 days after initial exposure to the virus (Johnson and Collings 1969, 1971; Joo et al. 1976a; Mengeling and Cutlip 1976). PPV and other structurally similar viruses have been identified in the feces of pigs with diarrhea (Dea et al. 1985; Yasuhara et al. 1989). However, there is no experimental evidence to suggest that PPV either replicates extensively in the intestinal crypt epithelium or causes enteric disease as do parvoviruses of several other species (Cutlip and Mengeling 1975a; Brown et al. 1980). PPV also has been isolated from pigs with lesions described as vesiclelike. The etiologic role of PPV in such lesions has not been clearly defined (Kresse et al. 1985). The major and usually only clinical response to infection with PPV is maternal reproductive failure. Pathologic sequelae depend mainly on when exposure occurs during gestation. Dams may return to estrus, fail to farrow despite being anestrus, farrow few pigs per litter, or farrow a large proportion of mummified fetuses. All can reflect embryonic or fetal death or both. The only outward sign may be a decrease in maternal abdominal girth when fetuses die at midgestation or later and their associated fluids are resorbed. Other manifestations of maternal reproductive failure, namely, infertility, abortion, stillbirth, neonatal death, and reduced neonatal vitality, also have been ascribed to infection with PPV (Cartwright and Huck 1967; Johnson 1969; Morimoto et al. 1972b; Narita et al. 1975; Forman et al. 1977). These are normally only a minor component of the disease. The presence of mummified fetuses in a litter can prolong both gestation (Narita et al. 1975) and the farrowing interval (Mengeling et al. 1975). Either may result in stillbirth of apparently normal littermates, whether or not they are infected. Dams are susceptible to PPV-induced reproductive failure if infected anytime during about the first half of gestation. This interval of maternal susceptibility is indicated by the collective results of several experimental studies (Joo et al. 1976a; Mengeling and Cutlip 1976; Mengeling 1979; Mengeling et al. 1980a), by in-depth epidemiological investigations (Donaldson-Wood et al. 1977; Gillick 1977), and by estimates of the time of death of fetuses collected during epidemiological surveys (Mengeling 1978b; Mengeling et al. 1991). Consequences of maternal infection during this interval are embryonic and fetal death followed by resorption and mummification respectively. Transplacental infection also follows maternal exposure after midgestation, but fetuses usually survive without obvious clinical effects in utero. The likely reason is that transplacental infection often requires 10–14 days (Mengeling et al. 1978, 1980a) or longer (Joo et al. 1976a), and by 70 days of gestation most fetuses are able to develop a protective immunologic response to the virus. In general, fetuses experimentally infected by transuterine inoculation of the virus have died when infected before day 70 of gestation, but they have survived and produced antibody when infected later in gestation (Redman et al. 1974; Bachmann et al. 1975; Cutlip and Mengeling 1975b; Mengeling and Cutlip 1975). A strain of PPV of slightly greater virulence also has been reported (Choi et al. 1987). The usual consequences of infection at different stages of gestation are summarized in Table 17.1. When only part of a litter is infected transplacentally, as is often the case, one or more littermates are frequently infected by subsequent intrauterine spread of virus. The same would apply if initial infection were through contaminated semen. As a result, any combination or all of the sequelae indicated in Table 17.1 can develop in the same litter. Intrauterine dissemination is probably less common when early embryos are infected because they are quickly resorbed after death, effectively removing the intrauterine reservoir of virus (Mengeling et al. 1980a). In such cases there is no evidence at farrowing for the cause of fewer pigs per litter. |Interval of Gestation(days)a| |Infection of Dam||Infection of Conceptusb||Description of Conceptus||Consequences of Infection| |≤56||10–30||Embryo||Death and resorption| |30–70||Fetus||Death and mummification| |>56||70–term||Fetus||Immune response and usually survival in utero| aIntervals are approximations. bAssuming transplacental infections 10–14 days after maternal exposure. The effect, if any, of PPV on the ovum before ovulation is unknown. The virus adheres tenaciously to the external surface of the zona pellucida of the fertilized porcine ovum (Wrathall and Mengeling 1979a, b), and although it apparently cannot penetrate this layer, speculation is that it could pose a threat to the embryo after hatching (Wrathall and Mengeling 1979a). Despite strong circumstantial evidence (Cartwright et al. 1971), a direct causal role of PPV-contaminated semen in reproductive failure has not been established unequivocally (Lucas et al. 1974). The zona pellucida could protect the early embryo while local immunity is developing. Conversely, the virus may cause uterine changes incompatible with gestation (Wrathall and Mengeling 1979c). In any event, a female infected through semen provides a focus of infection for others. With the possible exception of the uterine changes alluded to in the preceding paragraph, PPV-induced reproductive failure is caused by the direct effect of the virus on the conceptus. In the absence of an immune response, the virus replicates extensively throughout these tissues. By the time the conceptus dies, most of its cells contain large quantities of intracytoplasmic viral antigen that can be demonstrated by IF microscopy. The relative lack of nuclear fluorescence at the time of death, compared to earlier stages of the disease, indicates that when the conceptus is severely affected, mitotic activity and the associated conditions necessary for viral replication are suppressed more than phagocytic activity. Death of the conceptus probably results from the collective damage by the virus to a variety of tissues and organs, including the placenta (Cutlip and Mengeling 1975b). However, in the absence of an immune response, changes in almost any vital organ are probably sufficient to eventually cause death. One of the most striking features of viral distribution is the extensive involvement of endothelium. This seems to preclude further development of the vascular network of the conceptus. Preparation for cellular mitosis (i.e., the S phase) results in concomitant viral replication and cell death. Damage to the fetal circulatory system is indicated by edema, hemorrhage, and the accumulation of large amounts of serosanguineous fluids in body cavities. Necrosis of the endothelium is microscopically evident (Lenghaus et al. 1978). The mechanism of transplacental infection has been investigated by using IF microscopy to identify infected cells in maternal and fetal tissues at progressively longer intervals after maternal oronasal exposure (Mengeling et al. 1978). Examination of tissues contiguous with the maternal-fetal junction revealed viral antigen in endothelial and mesenchymal cells of the chorion, with increasing involvement of these tissues at progressively later stages of gestation. Viral antigen was never detected unequivocally in either uterine epithelium or trophectoderm. Consequently, there was no evidence for maternalfetal transfer of the virus by replicating through these tissues. However, this route cannot be excluded, since only a small part of the total area of contact was examined. Transfer of the virus within macrophages has been considered (Paul et al. 1979). Whatever the route, maternal viremia seems a likely prerequisite for transplacental infection (Joo et al. 1976a; Mengeling and Cutlip 1976). Neither macroscopic nor microscopic lesions have been reported for nonpregnant pigs (Cutlip and Mengeling 1975a; Brown et al. 1980). It is conceivable that cellular infiltrations subsequently described for fetuses could be induced by infection during the perinatal interval. Macroscopic lesions have not been reported in pregnant dams; however, microscopic lesions have been seen in tissues of gilts killed after their fetuses were infected by transuterine inoculation of virus. Gilts that were seronegative when their fetuses were infected at 70 days of gestation had focal accumulations of mononuclear cells adjacent to the endometrium and in deeper layers of the lamina propria when they were killed 12 and 21 days later. In addition, there were perivascular cuffs of plasma cells and lymphocytes in the brain, spinal cord, and choroid of the eye (Hogg et al. 1977). When fetuses were infected earlier in gestation (35, 50, and 60 days) and their dams were killed 7 and 11 days later, the lesions were similar. However, uterine lesions were more severe and also included extensive cuffing of myometrial and endometrial vessels with mononuclear cells (Lenghaus et al. 1978). Only focal accumulations of lymphocytes were seen in uteruses of gilts that were seropositive when their fetuses were infected (Cutlip and Mengeling 1975b). Macroscopic changes of embryos are death followed by resorption of fluids (Fig. 17.4) and then soft tissues (Fig. 17.5). Virus and viral antigen are widely distributed in tissues of infected embryos and their placentas (Mengeling et al. 1980a), and it is probable that microscopic lesions of necrosis and vascular damage, subsequently described for fetuses, also develop in advanced embryos. There are numerous macroscopic changes in fetuses infected before they become immunocompetent (Fig. 17.6). These include a variable degree of stunting and sometimes an obvious loss of condition before other external changes are apparent; occasionally, an increased prominence of blood vessels over the surface of the fetus due to congestion and leakage of blood into contiguous tissues; congestion, edema, and hemorrhage with accumulation of serosanguineous fluids in body cavities; hemorrhagic discoloration becoming progressively darker after death; and dehydration (mummification). Many of these changes also apply to the placenta. Microscopic lesions consist primarily of extensive cellular necrosis in a wide variety of tissues and organs (Joo et al. 1977; Lenghaus et al. 1978) (Fig. 17.7A). Inflammation (Joo et al. 1977) and intranuclear inclusions (Lenghaus et al. 1978) also have been described. In contrast, macroscopic changes have not been reported for fetuses infected after they become immunocompetent for PPV. Microscopic lesions are primarily endothelial hypertrophy (Hogg et al. 1977) and mononuclear cell infiltrations consistent with an immune response (Hogg et al. 1977; Joo et al. 1977). Meningoencephalitis characterized by perivascular cuffing with proliferating adventitial cells, histiocytes, and a few plasma cells was seen in the gray and white matter of the cerebrum and in the leptomeninges of PPV-infected stillborn pigs. These lesions were believed to be pathognomonic for PPV infection (Narita et al. 1975). Similar lesions have been observed in PPV-infected, live fetuses collected late in gestation (Hogg et al. 1977; Joo et al. 1977) (Fig. 17.7B). Both general types of microscopic lesions (i.e., necrosis and mononuclear cell infiltration) may develop in fetuses infected near midgestation (Lenghaus et al. 1978) when the immune response is insufficient to provide protection. PPV should be considered in a differential diagnosis of reproductive failure of swine whenever there is evidence of embryonic or fetal death or both. The pathologic sequelae of maternal infection during gestation have been described (see the section on clinical signs). If gilts but not sows are affected, maternal illness is not seen during gestation, there are few or no abortions or fetal developmental anomalies, and other evidence suggests an infectious disease, then a tentative diagnosis of PPV-induced reproductive failure can be made. The relative lack of maternal illness, abortions, and fetal developmental anomalies differentiates PPV from most other infectious causes of reproductive failure. However, a definitive diagnosis requires laboratory support. Several mummified fetuses (<16 cm in length) or lungs from such fetuses, if sufficiently developed, should be submitted to the diagnostic laboratory. Larger mummified fetuses (i.e., more than about 70 days of gestational age) (Marrable and Ashdown 1967), stillborn pigs, and neonatal pigs are not recommended for submission unless they are the only samples available. If infected, their tissues will usually contain antibody that interferes with laboratory tests for either virus or viral antigen. If females fail to farrow despite being anestrus and are sent to an abattoir, their uteruses should be collected and examined for affected fetuses. Sometimes only remnants of fetal tissues remain when fetuses die early in the middle third of gestation. Nevertheless, these are adequate samples if tested for viral antigen by IF microscopy (Mengeling and Cutlip 1975; Mengeling 1978b). The absence of affected fetuses or fetal remnants does not exclude PPV-induced reproductive failure. When all embryos of a litter die and are completely resorbed after the first few weeks of gestation, the dam may remain endocrinologically pregnant and not return to estrus until after the expected time of farrowing (Rodeffer et al. 1975). Identification of viral antigen by IF microscopy is a reliable and sensitive diagnostic procedure. Sections of fetal tissues are prepared with a cryostat microtome and are then reacted with standardized reagents (Mengeling et al. 1975; Mengeling 1978b). The test can be completed within a few hours. In the absence of a fetal antibody response, antigen is seen throughout fetal tissues (Fig. 17.8A, B); even when antibody is present, infected cells usually can be detected in fetal lung (Fig. 17.8C). Detection of viral hemagglutinin also has been recommended as a diagnostic technique (Joo et al. 1976b; Joo and Johnson 1977a). Tissues are triturated in diluent and then sedimented by centrifugation. The supernatant fluid is tested for agglutinating activity for guinea pig erythrocytes. This test requires a minimum of laboratory equipment and is effective in the absence of antibody. Virus isolation is less suitable as a routine diagnostic procedure than either of the aforementioned tests. Infectivity is slowly but progressively lost after fetal death (Mengeling and Cutlip 1975); as a result, isolation of virus from mummified fetuses that have died as a result of infection is sometimes unsuccessful (Mengeling 1978b). Moreover, the procedure is time-consuming, and contamination is a constant threat because of the stability of PPV in the laboratory (Cartwright et al. 1969) and because cell cultures are sometimes unknowingly prepared from infected tissues (Huygelen and Peetermans 1967; Bachmann 1969; Cartwright et al. 1969; Mengeling 1975; Hafez and Liess 1979). IF microscopy is often used to determine whether PPV has been isolated in cell culture (Cartwright 1970; Johnson 1973; Mengeling 1978b). In general, serologic procedures are recommended for diagnosis only when tissues from mummified fetuses are not available for testing as previously described. Results with maternal sera are of value if antibody is not detected, thus excluding PPV as a cause, and if samples collected at intervals reveal seroconversion for PPV coincident with reproductive failure (Morimoto et al. 1972b; Mengeling et al. 1975; Rodeffer et al. 1975). Because PPV is ubiquitous, the presence of antibody in a single sample is otherwise meaningless. However, a determination of relative amounts of antibody present as immunoglobulin M and G can indicate the recency of infection (Kim 1974; Joo et al. 1978). Detection of antibody in sera of fetuses and stillborn pigs and in sera collected from neonatal pigs before they nurse is evidence of in utero infection, since maternal antibody does not cross the maternal-fetal junction (Johnson and Collings 1969, 1971; Cartwright et al. 1971; Mengeling 1972; Chaniago et al. 1978). When serum is not available, body fluids collected from fetuses or their viscera that have been kept in a plastic bag overnight at 4˚C have been used successfully to demonstrate antibody (Cropper et al. 1976; Joo et al. 1976b). TREATMENT AND PREVENTION There is no treatment for PPV-induced reproductive failure. Gilts should be either naturally infected with PPV or vaccinated for PPV before they are bred. To promote natural infection, a common practice is to arrange contact between seronegative gilts and seropositive sows, with the expectation that one or more of the sows will be shedding virus. Moving gilts to a potentially contaminated area, either currently or recently inhabited by seropositive swine, also can be recommended. Once infection is started, the virus spreads rapidly among fully susceptible swine. Just how effective these procedures are in increasing the incidence of natural infection is unknown. For whatever reasons, infection is common, and probably well over one-half of all gilts in areas where PPV is enzootic are infected before they are bred for the first time (Mengeling 1972). The use of vaccine is the only way to ensure that gilts develop active immunity before conception. Both inactivated (Suzuki and Fujisaki 1976; Ide et al. 1977; Joo and Johnson 1977b; Mengeling 1977; Fujisaki 1978; Fujisaki et al. 1978b; Mengeling et al. 1979, 1980b) and modified live-virus (MLV) vaccines (Paul and Mengeling 1980; Fujisaki and Murikami 1982) have been developed. An inactivated vaccine has been tested under field conditions (Fujisaki 1978; Fujisaki et al. 1978a), and both types of vaccines were effective when tested under controlled laboratory conditions (Mengeling et al. 1979, 1980b; Paul and Mengeling 1980). Vaccines should be administered several weeks before conception to provide immunity throughout the susceptible period of gestation but after the disappearance of passively acquired colostral antibody, which could interfere with the development of active immunity (Paul and Mengeling 1986). These limits may define a very brief interval for effective vaccination of gilts that are bred before 7 months of age. Although inactivated vaccine provides maximum safety, there is experimental evidence that PPV can be sufficiently attenuated so that it is unlikely to cause reproductive failure even if inadvertently administered during gestation (Paul and Mengeling 1980). The apparent safety of MLV vaccine may be due to its reduced ability to replicate in tissues of the intact host and cause the level of viremia needed for transplacental infection (Paul and Mengeling 1984). Moreover, it has been shown by transuterine inoculation of both virulent and attenuated virus that a much larger dose of attenuated virus is required to establish infection of fetuses (Mengeling et al. 1984). Duration of immunity following vaccination is unknown; however, in one study antibody titers were maintained for at least 4 months after administration of an inactivated vaccine (Joo and Johnson 1977b). Low levels of antibody found to be protective allow speculation that, once the immune system has been primed with PPV, subsequent exposure to virulent virus during gestation is unlikely to result in transplacental infection even if antibody from vaccination is no longer detected (Mengeling et al. 1979). Vaccination is recommended also for seronegative sows and boars. Seronegative sows are usually found only in PPV-free herds; in such cases, inactivated vaccine is indicated. Experience has shown that few herds can be expected to remain free of PPV even if access is carefully controlled. Introduction of PPV into a totally susceptible herd can be disastrous (Donaldson-Wood et al. 1977). Vaccination of boars should reduce their involvement in dissemination of the virus. Vaccines are used extensively in the United States and in several other countries where PPV has been recognized as an economically important cause of reproductive failure. All federally licensed vaccines marketed in the United States are inactivated. Bachmann, P. A. 1969. Vorkommen und Verbreitung von Picodna (Parvo)-Virus beim Schwein. Zentralbl Veterinärmed (B) 16:341-345. ___. 1972. Porcine parvovirus infection in vitro: A study model for the replication of parvoviruses. I. Replication at different temperatures. Proc Soc Exp Biol Med 140:1369-1374. Bachmann, P. A., and Danner, K. 1976. Porcine parvovirus infection in vitro: A study model for the replication of parvoviruses. II. Kinetics of virus and antigen production. Zentralbl Veterinärmed (B) 23:355-363. Bachmann, P. A.; Sheffy, B. E.; and Vaughan, J. T. 1975. Experimental in utero infection of fetal pigs with a porcine parvovirus. Infect Immun 12:455-460. Bachmann, P. A.; Hoggan, M. D.; Kurstak, E.; Melnick, J. L.; Pereira, H. G.; Tattersall, P.; and Vago, C. 1979. Parvoviridae: Second report. Intervirology 11:248-254. Berns, K. I. 1984. The Parvoviruses. New York: Plenum. Biront, P., and Bonte, P. 1983. Porcine parvovirus (P.P.V.) infection in boars. I. Possibility of a genital localization in the boar after oronasal infection. Zentralbl Veterinärmed 30:541-545. Brown, T. T., Jr. 1981. Laboratory evaluation of selected disinfectants as virucidal agents against porcine parvovirus, pseudorabies virus, and transmissible gastroenteritis virus. Am J Vet Res 42:1033-1036. Brown, T. T., Jr.; Paul, P. S.; and Mengeling, W. L. 1980. Response of conventionally raised weanling pigs to experimental infection with a virulent strain of porcine parvovirus. Am J Vet Res 41:1221-1224. Cartwright, S. F. 1970. Tests available for the detection of some virus infections of pigs and their interpretation. Vet Annu 11:77-82. Cartwright, S. F., and Huck, R. A. 1967. Viruses isolated in association with herd infertility, abortions and stillbirths in pigs. Vet Rec 81:196-197. Cartwright, S. F.; Lucas, M.; and Huck, R. A. 1969. A small haemagglutinating porcine DNA virus. I. Isolation and properties. J Comp Pathol 79:371-377. ___. 1971. A small haemagglutinating porcine DNA virus. II. Biological and serological studies. J Comp Pathol 81:145-155. Chaniago, T. D.; Watson, D. L.; Owen, R. A.; and Johnson, R. H. 1978. Immunoglobulins in blood serum of foetal pigs. Aust Vet J 54:30-33. Choi, C. S.; Molitor, T. W.; Joo, H. S.; and Gunther, R. 1987. Pathogenicity of a skin isolate of porcine parvovirus in swine fetuses. Vet Microbiol 15:19-29. Coackley, W., and Smith, V. W. 1972. Porcine parvoviruses in Western Australia. Aust Vet J 48:536. Cotmore, S. F.; Sturzenbecker, L. J.; and Tattersall, P. 1983. The autonomous parvovirus MVM encodes two nonstructural proteins in addition to its capsid polypeptides. Virology 129:333-343. Croghan, D. L., and Matchett, A. 1973. b-propiolactone sterilization of commercial trypsin. Appl Microbiol 26:832. Croghan, D. L.; Matchett, A.; and Koski, T. A. 1973. Isolation of porcine parvovirus from commercial trypsin. Appl Microbiol 26:431-433. Cropper, M.; Dunne, H. W.; Leman, A. D.; Starkey, A. L.; and Hoefling, D. C. 1976. Prevalence of antibodies to porcine enteroviruses and porcine parvovirus in body fluids of fetal pigs from small vs. large litters. J Am Vet Med Assoc 168:233-235. Cutlip, R. C., and Mengeling, W. L. 1975a. Experimentally induced infection of neonatal swine with porcine parvovirus. Am J Vet Res 36:1179-1182. ___. 1975b. Pathogenesis of in utero infection of eightand ten-week-old porcine fetuses with porcine parvovirus. Am J Vet Res 36:1751-1754. Darbyshire, J. H., and Roberts, D. H. 1968. Some respiratory virus and mycoplasma infections of animals. J Clin Pathol 21(Suppl 2):61-92. Dea, S.; Elazhary, M. A. S. Y.; Martineau, G. P.; and Vaillancourt, J. 1985. Parvovirus-like particles associated with diarrhea in unweaned piglets. Can J Comp Med 49:343-345. Donaldson-Wood, C. R.; Joo, H. S.; and Johnson, R. H. 1977. The effect on reproductive performance of porcine parvovirus infection in a susceptible pig herd. Vet Rec 100:237-239. Etoh, M.; Morishita, E.; and Watanabe, Y. 1979. Transitional antibodies and spontaneous infection in porcine parvovirus infection. Jpn J Swine Husb Res 16:237-239. Forman, A. J.; Lenghaus, C.; Hogg, G. G.; and Hale, C. J. 1977. Association of a parvovirus with an outbreak of foetal death and mummification in pigs. Aust Vet J 53:326-329. Fujisaki, Y. 1978. Incidence and control of stillbirth caused by porcine parvovirus in Japan. Proc Int Congr Pig Vet Soc 5:KA 14. Fujisaki, Y., and Murikami, Y. 1982. Immunity to infection with porcine parvovirus in pigs inoculated with attenuated HT-strain. Natl Inst Anim Health (Tokyo) 22:36-37. Fujisaki, Y.; Morimoto, T.; Sugimori, T.; and Suziki, H. 1975. Experimental infection of pigs with porcine parvovirus. Natl Inst Anim Health Q (Tokyo) 22:205-206. Fujisaki, Y.; Ichihara, T.; Sasaki, N.; Shimizu, F.; Murakami, Y.; Sugimori, T.; and Sasahara, J. 1978a. Field trials on inactivated porcine parvovirus vaccine for prevention of viral stillbirth among swine. Natl Inst Anim Health Q (Tokyo) 18:184-185. Fujisaki, Y.; Watanabe, Y.; Kodama, K.; Hamada, H.; Murakami, Y.; Sugimori, T.; and Sasahara, J. 1978b. Protection of swine with inactivated porcine parvovirus vaccine from fetal infection. Natl Inst Anim Health Q (Tokyo) 18:185. Gillick, J. C. 1977. An outbreak of swine foetal mummification associated with porcine parvovirus. Aust Vet J 53:105-106. Hafez, S. M., and Liess, B. 1979. Isolation of parvovirus from kidney cell cultures of gnotobiotic piglets. Zentralbl Veterinärmed (B) 26:820-827. Hallauer, C.; Kronauer, G.; and Siegl, G. 1971. Parvovirus as contaminants of permanent human cell lines. I. Virus isolations from 1960-1970. Arch Gesamte Virusforsch 35:80-90. Hallauer, C.; Siegl, G.; and Kronauer, G. 1972. Parvoviruses as contaminants of permanent human cell lines. III. Biological properties of the isolated viruses. Arch Gesamte Virusforsch 38:369-382. Hogg, G. G.; Lenghaus, C.; and Forman, A. J. 1977. Experimental porcine parvovirus infection of foetal pigs resulting in abortion, histological lesions and antibody formation. J Comp Pathol 87:539-549. Hohdatsu, T.; Baba, K.; Ide, S.; Tsuchimoto, M.; Nagano, H.; Yamagami, T.; Yamagishi, H.; Fujisaki, Y.; and Matumoto, M. 1988. Detection of antibodies against porcine parvovirus in swine sera by enzyme-linked immunosorbent assay. Vet Microbiol 17:11-19. Huygelen, C., and Peetermans, J. 1967. Isolation of a hemagglutinating picornavirus from a primary swine kidney cell culture. Arch Gesamte Virusforsch 20:260-262. Ide, S.; Yamagishi, K.; Yoshimura, M.; Maniwa, E.; Yasuda, H.; and Igarashi, J. 1977. Reaction of pigs to injection with a bivalent vaccine of Japanese B encephalitis virus and porcine parvovirus. J Jpn Vet Med Assoc 30:322-325. Johnson, R. H. 1969. A search for Parvoviridae (Picornaviridae). Vet Rec 84:19-20. ___. 1973. Isolation of swine parvovirus in Queensland. Aust Vet J 49:257-259. Johnson, R. H., and Collings, D. F. 1969. Experimental infection of piglets and pregnant gilts with a parvovirus. Vet Rec 85:446-447. ___. 1971. Transplacental infection of piglets with a porcine parvovirus. Res Vet Sci 12:570-572. Johnson, R. H.; Donaldson-Wood, C. R.; Joo, H. S.; and Allender, U. 1976. Observations on the epidemiology of porcine parvovirus. Aust Vet J 52:80-84. Joo, H. S., and Johnson, R. H. 1977a. Observations on rapid diagnosis of porcine parvovirus in mummified foetuses. Aust Vet J 53:106-107. ___. 1977b. Serological responses in pigs vaccinated with inactivated porcine parvovirus. Aust Vet J 53:550-552. Joo, H. S.; Donaldson-Wood, C. R.; and Johnson, R. H. 1975. A microneutralization test for the assay of porcine parvovirus antibody. Arch Virol 47:337-341. ___. 1976a. Observations on the pathogenesis of porcine parvovirus infection. Arch Virol 51:123-129. ___. 1976b. Rapid diagnostic techniques for detection of porcine parvovirus infection in mummified foetuses. Aust Vet J 52:51. ___. 1976c. A standardised haemagglutination inhibition test for porcine parvovirus antibody. Aust Vet J 52:422-424. Joo, H. S.; Donaldson-Wood, C. R.; Johnson, R. H.; and Watson, D. L. 1976d. Antibody to porcine, feline and rat parvoviruses in various animal species. Res Vet Sci 21:112-113. Joo, H. S.; Donaldson-Wood, C. R.; Johnson, R. H.; and Campbell, R. S. F. 1977. Pathogenesis of porcine parvovirus infection: Pathology and immunofluorescence in the foetus. J Comp Pathol 87:383-391. Joo, H. S.; Johnson, R. H.; and Watson, D. L. 1978. Serological procedures to determine time of infection of pigs with porcine parvovirus. Aust Vet J 54:125-127. Kawamura, H.; Fujita, T.; and Imada, T. 1988. Plaque formation and replication of porcine parvovirus in embryonic swine kidney cell line, ESK cells. Jpn J Vet Sci 50:803-808. Kim, Y. H. 1974. Studies on hemagglutination and hemagglutination- inhibition reaction of porcine parvovirus. Bull AZABU Vet Coll 27:61-65. Kresse, J. I.; Taylor, W. D.; Stewart, W. C.; and Eernisse, K. A. 1985. Parvovirus infection in pigs with necrotic and vesicle- like lesions. Vet Microbiol 10:525-531. Lenghaus, C.; Forman, A. J.; and Hale, C. J. 1978. Experimental infection of 35, 50 and 60 day old pig foetuses with porcine parvovirus. Aust Vet J 54:418-422. Lucas, M. H., and Napthine, P. 1971. Fluorescent antibody technique in the study of three porcine viruses: Transmissible gastroenteritis virus, vomiting and wasting disease virus, and the parvovirus 59e/63. J Comp Pathol 81:111-117. Lucas, M. H.; Cartwright, S. F.; and Wrathall, A. E. 1974. Genital infection of pigs with porcine parvovirus. J Comp Pathol 84:347-350. Marrable, A. W., and Ashdown, R. R. 1967. Quantitative observations on pig embryos of known ages. J Agric Sci 69:443-447. Mayr, A.; Bachmann, P. A.; Siegl, G.; Mahnel, H.; and Sheffy, B. E. 1968. Characterization of a small porcine DNA virus. Arch Gesamte Virusforsch 25:38-51. McAdaragh, J. P., and Anderson, G. A. 1975. Transmission of viruses through boar semen. In Proc 18th Annu Meet Am Assoc Vet Lab Diagn, pp. 69-76. Mengeling, W. L. 1972. Porcine parvovirus: Properties and prevalence of a strain isolated in the United States. Am J Vet Res 33:2239-2248. ___. 1975. Porcine parvovirus: Frequency of naturally occurring transplacental infection and viral contamination of fetal porcine kidney cell cultures. Am J Vet Res 36:41-44. ___. 1977. Diagnosing porcine parvovirus-induced reproductive failure. In Proc 20th Annu Meet Am Assoc Vet Lab Diagn, pp. 237-244. ___. 1978a. Elimination of porcine parvovirus from infected cell cultures by inclusion of homologous antiserum in the nutrient medium. Am J Vet Res 39:323-324. ___. 1978b. Prevalence of porcine parvovirus-induced reproductive failure: An abattoir study. J Am Vet Med Assoc 172:1291-1294. ___. 1979. Prenatal infection following maternal exposure to porcine parvovirus on either the seventh or fourteenth day of gestation. Can J Comp Med 43:106-109. Mengeling, W. L., and Cutlip, R. C. 1975. Pathogenesis of in utero infection: Experimental infection of 5-week-old porcine fetuses with porcine parvovirus. Am J Vet Res 36:1173-1177. ___. 1976. Reproductive disease experimentally induced by exposing pregnant gilts to porcine parvovirus. Am J Vet Res 37:1393-1400. Mengeling, W. L., and Paul, P. S. 1986. The relative importance of swine and contaminated premises as reservoirs of porcine parvovirus. J Am Vet Med Assoc 188:1293-1295. Mengeling, W. L.; Cutlip, R. C.; Wilson, R. A.; Parks, J. B.; and Marshall, R. F. 1975. Fetal mummification associated with porcine parvovirus infection. J Am Vet Med Assoc 166:993-995. Mengeling, W. L.; Cutlip, R. C.; and Barnett, D. 1978. Porcine parvovirus: Pathogenesis, prevalence, and prophylaxis. Proc Int Congr Pig Vet Soc 5:KA 15. Mengeling, W. L.; Brown, T. T., Jr.; Paul, P. S.; and Guntekunst, D. E. 1979. Efficacy of an inactivated virus vaccine for prevention of porcine parvovirus-induced reproductive failure. Am J Vet Res 40:204-207. Mengeling, W. L.; Paul, P. S.; and Brown, T. T., Jr. 1980a. Transplacental infection and embryonic death following maternal exposure to porcine parvovirus near the time of conception. Arch Virol 65:55-62. Mengeling, W. L.; Paul, P. S.; Gutekunst, D. E.; Pirtle, E. C.; and Brown, T. T., Jr. 1980b. Vaccination for reproductive failure caused by porcine parvovirus. Proc Int Congr Pig Vet Soc 6:61. Mengeling, W. L.; Pejsak, Z.; and Paul, P. S. 1984. Biological assay of attenuated strain NADL-2 and virulent strain NADL-8 of porcine parvovirus. Am J Vet Res 45:2403-2407. Mengeling, W. L.; Paul, P. S.; Bunn, T. O.; and Ridpath, J. F. 1986. Antigenic relationships among autonomous parvoviruses. J Gen Virol 67:2839-2844. Mengeling, W. L.; Ridpath, J. F.; and Vorwald, A. C. 1988. Size and antigenic comparisons among the structural proteins of selected autonomous parvoviruses. J Gen Virol 69:825-837. Mengeling, W. L.; Lager, K. M.; Zimmerman, J. K.; Samarikermani, N.; and Beran, G. W. 1991. A current assessment of the relative role of porcine parvovirus as a cause of fetal porcine death. J Vet Diagn Invest 3:33-35. Molitor, T. W.; Joo, H. S.; and Collect, M. S. 1983. Porcine parvovirus: Virus purification and structural and antigenic properties of virion polypeptides. J Virol 45:842-854. Morimoto, T.; Fujisaki, Y.; Ito, Y.; and Tanaka, Y. 1972a. Biological and physiochemical properties of porcine parvovirus recovered from stillborn piglets. Natl Inst Anim Health Q (Tokyo) 12:137-144. Morimoto, T.; Kurogi, H.; Miura, Y.; Sugimori, T.; and Fujisaki, Y. 1972b. Isolation of Japanese encephalitis virus and a hemagglutinating DNA virus from the brain of stillborn piglets. Natl Inst Anim Health Q (Tokyo) 12:127-136. Narita, M.; Inui, S.; Kawakami, Y.; Kitamura, K.; and Maeda, A. 1975. Histopathological changes of the brain in swine fetuses naturally infected with porcine parvovirus. Natl Inst Anim Health Q (Tokyo) 15:24-28. Paul, P. S., and Mengeling, W. L. 1980. Evaluation of a modified live virus vaccine for the prevention of porcine parvovirus- induced reproductive disease in pigs. Am J Vet Res 41:2007-2011. ___. 1984. Oronasal and intramuscular vaccination of swine with a modified live porcine parvovirus vaccine: Multiplication and transmission of vaccine virus. Am J Vet Res 45:2481-2485. ___. 1986. Vaccination of swine with inactivated porcine parvovirus vaccine in the presence of passive immunity. J Am Vet Med Assoc 188:410-413. Paul, P. S.; Mengeling, W. L.; and Brown, T. T., Jr. 1979. Replication of porcine parvovirus in peripheral blood lymphocytes, monocytes, and peritoneal macrophages. Infect Immun 25:1003-1007. ___. 1980. Effect of vaccinal and passive immunity on experimental infection of pigs with porcine parvovirus. Am J Vet Res 41:1368-1371. Paul, P. S.; Mengeling, W. L.; and Pirtle, E. C. 1982. Duration and biological half-life of passively acquired colostral antibodies to porcine parvovirus. Am J Vet Res 43:1376-1379. Pini, A. 1975. Porcine parvovirus in pig herds in southern Africa. J S Afr Vet Assoc 46:241-244. Pirtle, E. C. 1974. Titration of two porcine respiratory viruses in mammalian cell cultures by direct fluorescent antibody staining. Am J Vet Res 35:249-250. Redman, D. R.; Bohl, E. H.; and Ferguson, L. C. 1974. Porcine parvovirus: Natural and experimental infections of the porcine fetus and prevalence in mature swine. Infect Immun 10:718-723. Rodeffer, H. E.; Leman, A. D.; Dunne, H. W.; Cropper, M.; and Sprecher, D. J. 1975. Reproductive failure in swine associated with maternal seroconversion for porcine parvovirus. J Am Vet Med Assoc 166:991-995. Rondhuis, P. R., and Straver, P. J. 1972. Enige kenmerken van een klien, hemagglutinerend DNA-virus, geisoleer uit een verworpen varkensfoetus. Tijdschr Diergeneeskd 97:1257-1267. Ruckerbauer, G. M.; Dulac, G. C.; and Boulanger, P. 1978. Demonstration of parvovirus in Canadian swine and antigenic relationships with isolates from other countries. Can J Comp Med 42:278-285. Siegl, G. 1976. The Parvoviruses, 1st ed. Vienna, Austria: Springer-Verlag. Siegl, G., and Gautschi, M. 1973a. The multiplication of parvovirus Lu III in a synchronized culture system. I. Optimum conditions for virus replication. Arch Gesamte Virusforsch 40:105-118. ___. 1973b. The multiplication of parvovirus Lu III in a synchronized culture system. II. Biochemical characteristics of virus replication. Arch Gesamte Virusforsch 40:119-127. Siegl, G.; Hallauer, C.; and Novak, A. 1972. Parvoviruses as contaminants of permanent human cell lines. IV. Multiplication of KBSH-virus in KB-cells. Arch Gesamte Virusforsch 36:351. Suzuki, H., and Fujisaki, Y. 1976. Immunizing effects of inactivated porcine parvovirus vaccine on piglets. Natl Inst Anim Health Q (Tokyo) 16:81. Tennant, R. W. 1971. Inhibition of mitosis and macromolecular synthesis in rat embryo cells by Kilhan rat virus. J Virol 8:402-408. Thacker, B., and Leman, A. D. 1978. Evaluation of gravid uteri at slaughter for porcine parvovirus infection. Proc Int Congr Pig Vet Soc 5:M-49. Thacker, B. J.; Joo, H. S.; Winkelman, N. L.; Leman, A. D.; and Barnes, D. M. 1987. Clinical, virologic, and histopathologic observations of induced porcine parvovirus infection in boars. Am J Vet Res 48:763-767. Vannier, P., and Tillon, J. P. 1979. Diagnostic de certitude de l'infection a parvovirus dans les trouble de la reproduction de l'espèce porcine. Rec Med Vet 155:151-158. Westenbrink, F.; Veldius, M. A.; and Brinkhof, J. M. A. 1989. An enzyme-linked assay for detection of antibodies to porcine parvovirus. J Virol Methods 23:169-178. Wrathall, A. E., and Mengeling, W. L. 1979a. Effect of porcine parvovirus on development of fertilized pig eggs in vitro. Br Vet J 135:249-254. ___. 1979b. Effect of transferring parvovirus-infected fertilized pig eggs into seronegative gilts. B Vet J 135:255-261. ___. 1979c. Effect of inseminating seropositive gilts with semen containing porcine parvovirus. Br Vet 135:420-425. Yasuhara, H.; Matsui, O.; Hirahara, T.; Ohgtani, T.; Tanaka, M. L.; Kodama, K.; Nakai, M; and Sasaki, N. 1989. Characterization of parvovirus isolated from diarrheic feces of a pig. Jpn J Vet Sci 51:337-344.
<urn:uuid:be237473-df2f-4ab9-8402-7164f931bff8>
CC-MAIN-2016-26
https://en.wikisource.org/wiki/Diseases_of_Swine_(8th_edition)/Chapters_17
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396106.25/warc/CC-MAIN-20160624154956-00193-ip-10-164-35-72.ec2.internal.warc.gz
en
0.859742
13,678
3.109375
3
Wagon wheels make good décor or landscape items and are often used in rustic or Western-themed projects. Wagon wheels are also used in horse-drawn transportation, but these require metalworking skills to fit and mount the steel tire. However, building a wagon wheel for decorative use is a less demanding, but still challenging woodworking project requiring a turning lathe, band saw and other tools. Use a lathe to turn the hub of the wagon wheel. Decorative wagon wheels can be built of any wood and to any size necessary for the project. The hub of a moderate-sized wheel, 14 to 20 inches in diameter, can be about 5 or 6 inches long and about 4 inches in diameter. Drill a hole through the middle to accommodate the axle. Drill tenon holes, spaces to glue the fitted ends of the spokes into, along the center line of the outside of the hub for the spokes. Once finished, the hub will be a roughly 4-inch round cylinder about 6 inches long with a hole through the center of the long dimension for an axle. Cut the spokes. The size of the wagon wheel determines the length of the spokes. Usual dimensions are about an 1.5 to 2 inches in width and 3/4 inch thick. Cut tenons on each end of the spoke. Cut the felloes. Felloes are the curved wooden portion of the rim of the wheel. The series of felloes, when laid out, should form the complete circle of the outside of the wheel. Lay out 2-inch boards in a manner that approximates the outer diameter of the wheel on a workbench. Anchor a string at what would be the center point of the wheel and use a string and pencil to mark out the inside and outside diameter of the felloes. Use a band saw to cut the felloes. Drill tenon holes in the inside of the felloes. Assemble the wheel from the inside out. Dry fit all pieces before gluing in place. Fit the spokes into the tenon holes in the hub before fitting the felloes to the spokes. If everything fits well, glue the project together. Use a band clamp to pull the project together while the glue dries. Paint or stain the wagon wheel. Apply finishes that impart a rustic look if that fits the décor. Use exterior quality paints if the wheel will be used outdoors.
<urn:uuid:a834ba58-62a3-4f91-9d0e-6ecda7820502>
CC-MAIN-2016-26
http://www.gardenguides.com/135549-make-wagon-wheel.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399117.38/warc/CC-MAIN-20160624154959-00028-ip-10-164-35-72.ec2.internal.warc.gz
en
0.894671
488
2.828125
3
Country By Country Analysis Of Years Left Until Science-demanded Zero Greenhouse Gas Emissions By Dr Gideon Polya 11 June, 2011 The authoritative Australian Climate Commission, advised by an expert Scientific Advisory panel composed of 9 leading Australian climate scientists, recently released a report entitled “The Critical Decade. Climate science, risks and responses”. The report stated (p53) that “The budget approach [to tackling climate change] directly links the projected rise in temperature to the aggregated global emissions in Gt [Gigatonnes or billions of tonnes] CO2 [carbon dioxide] or Gt C [carbon] for a specified period, usually 2000 to 2050 or 2100. For example, humanity can emit not more than 1 trillion [1,000 billion] tonnes of CO2 between 2000 and 2050 to have a probability of about 75% of limiting temperature rise to 2 degrees C [Centigrade] [noting that this is EU policy].” . Decent people accept that “all men are created equal” and on that basis one can calculate how much of this terminal 1 trillion tonnes CO2 “budget” can be allotted to each person on Earth, and how much to each country. Further, on the same basis of “the equality of all men”, we can estimate how many years each country has left to get to zero emissions i.e. to use up its “fair share” of carbon pollution at it current rate of pollution. The average world population over the next 40 years will be about 8 billion, so we can estimate the share of the pollution budget for each human being at 1,000 billion tonnes CO2/ 8 billion persons = 125 tonnes CO2 per person. We can then consider the maximum amount of “fair shares” carbon pollution that can be produced by each country in order to have a 75% chance of avoiding a 2 degree C temperature rise. Thus Australia has a population of 22 million people and accordingly Australia 's share of the terminal GHG pollution budget is 125 tonnes CO2 per person x 22 million persons = 2,750 million tonnes (Mt) CO2. . In 2009 Australia 's GHG pollution was 600 Mt CO2-e (CO2 equivalent i.e. taking into account other greenhouse gases such as methane, CH4, and nitrous oxide, N2O) ) and at that rate Australia will use up its share in 2,750 Mt /(600 Mt per year) = 4.6 years. However in 2009 Australia 's Domestic plus Exported GHG pollution was 600 (Domestic) + 784 (coal exports) + 31 (LNG exports) = 1,415 Mt CO2-e, this leaving only 2,750/1,415 = 1.9 years for Australia to get to zero GHG pollution. Of course there is no way that Australia will meet its “all men are created equal” global obligations and cease polluting after achieving its “fair share” of the terminal 1 trillion tonne CO2 global GHG pollution “budget” in 2 years' time because it is fundamentally committed to coal and gas use and exports. Thus about 92% of Australia 's electricity derives from fossil fuel combustion, Australia is the world's biggest coal exporter and a major liquid natural gas (LNG) exporter. The only major change adumbrated by the Gillard Labor Government is a coal to gas transition for electric power generation, this ignoring the reality that this will mean a doubling of greenhouse gas generation from the electricity sector because methane (CH4) is 85% of natural gas, leaks at about 3.3% and is 105 times worse than CO2 as a greenhouse gas on a 20 year timeframe and taking aerosol impacts into account. When we consider Australia 's Exported GHG pollution the situation becomes much worse. Thus the Australian Bureau of Agricultural and Resource Economics (ABARE) has projected that Australia's black coal export will increase at an average rate of 2.4% per year over the next 20 years and that liquid natural gas (LNG) exports will increase at 9% per year over the same period. Further, it is estimated that Australian exports of dried brown coal will reach 20 Mt by 2020, this corresponding to about 59 Mt CO2-e after combustion. Accordingly, by 2020 and based on Liberal-National Party Coalition Opposition and Labor Government (aka Lib-Lab) promises of “5% off Domestic GHG pollution by 2020” and ABARE projections, Australian Domestic plus Exported GHG pollution will be 509 Mt CO2-e (Domestic) + 1,018 Mt CO2-e (coal exports) + 80 Mt CO2-e (LNG exports) + 59 Mt CO2-e (brown coal exports) = 1,666 Mt CO2-e i.e. 118% of that in 2009. Thus Australian policy flies in the face of science and “all men are created equal” which demand that Australia should cease pollution at current rates by late 2012. Instead Australia officially projects to increase its annual pollution by 2020 by about 18%. How does Australia 's refusal to decrease GHG pollution compare with the conduct of other countries? Set out below is the time at current pollution rates for every country in the World to use up its “fair share of the 1 trillion tonne CO2 terminal GHG pollution budget. Years to the required “fair shares” total cessation of GHG pollution at current rates of pollution = 125 tonnes CO2-e per person/ (tonnes CO2-e per person per year) . The annual per capita GHG pollution for each country in 2000 (tonnes CO2-e per person per year) was used (the data for Uruguay was the 2005 per capita data without the land use contribution included). It should be noted that per capita consumption, fossil fuel use, livestock production and deforestation variously contribute to annual per capita GHG pollution. . Countries that must cease GHG pollution within 10 years. Belize (1.3 years), Qatar (2.3), Guyana (2.4), Malaysia (3.4), United Arab Emirates (3.4), Kuwait (4.1), Papua New Guinea (4.3), Brunei (4.8), Australia (4.8), Antigua & Barbuda (4.9), Zambia (5.1), Canada (5.1), Bahrain (5.2), United States (5.5), Trinidad & Tobago (6.4), Luxembourg (5.9), Panama (6.3), New Zealand (6.5), Estonia (6.9), Botswana (7.0), Ireland (7.4), Saudi Arabia (7.6), Venezuela (7.9), Indonesia (8.4), Equatorial Guinea (8.6), Belgium (8.7), Turkmenistan (8.8), Singapore (8.9), Czech Republic (9.0), Liberia (9.0), Netherlands (9.3), Russia (9.3), Nicaragua (9.3), Finland (9.5), Oman (9.7), Palau (9.8), Brazil (9.8), Uruguay (9.8), Denmark (10.0). Countries that must cease GHG pollution within 20 years. Germany (10.2 years), Mongolia (10.6), Israel (10.6), Nauru (10.7), Norway (11.0), South Korea (11.3), Kazakhstan (11.4), United Kingdom of Great Britain and Northern Ireland (11.4), Libya (11.6), Greece (11.6), Japan (11.7), Myanmar (11.7), Taiwan (11.8), Cyprus (12.1), Slovenia (12.3), Cambodia (12.3), Austria (12.5), Iceland (12.5), Peru (12.6), Paraguay (12.6), Ukraine (12.6), Poland (13.0), South Africa (13.2), Argentina (13.4), Slovakia (13.4), Spain (13.6), Italy (13.6), Central African Republic (13.9), France (14.4), Suriname (14.5), Belarus (14.5), Gabon (14.9), Ecuador (15.2), Bolivia (15.4), Cameroon (16.4), Iran (16.4), Côte d'Ivoire (16.7), Sweden (16.7), Seychelles (16.9), Guatemala (16.9), Bulgaria (16.9), Serbia & Montenegro (16.9), Hungary (16.9), Congo, Democratic Republic (formerly Zaire) (16.9), Uzbekistan (17.1), ) Portugal (17.4), Switzerland (17.6), Azerbaijan (18.4), Angola (18.7), Bahamas (18.9), Benin (19.2), Zimbabwe (19.2), Laos (19.5), Mexico (19.5), Nepal (19.8), Colombia (19.8), Namibia (19.8), Chile (19.8). Countries that must cease GHG pollution within 30 years. Malta (20.5 years), Congo, Republic (20.8), Madagascar (20.8), Croatia (21.2), Jamaica (21.2), Macedonia (21.6), Barbados (21.6), Latvia (21.9), Mauritania (22.3), Turkey (22.3), Romania (22.7), Lithuania (23.1), Costa Rica (23.1), Lebanon (23.6), North Korea (24.0), Thailand (24.5), Jordan (25.5), Honduras (26.6), Sudan (27.2), Bosnia & Herzegovina (27.8), Algeria (29.8), Iraq (29.8), Sierra Leone (29.8). Countries that must cease GHG pollution within 40 years. Syria (31.3 years), China (32.1), Tunisia (33.8), Dominican Republic (35.7), St Kitts & Nevis (37.9), Nigeria (37.9), Fiji (37.9), Guinea (39.1), Mauritius (39.1). Countries that must cease GHG pollution within 50 years. Cuba (40.3 years), Togo (40.3), Vanuatu (41.7), Philippines (41.7), Malawi (41.7), Mali (43.1), Chad (43.1), Sri Lanka (44.6), Uganda (46.3), Dominica (46.3), St Lucia (46.3), Egypt (48.1), Niue (48.1), Ghana (48.1), Moldova (50.0), Grenada (50.0). Countries that must cease GHG pollution within 50-210 years. El Salvador (52.1 years), Guinea-Bissau (52.1), Tanzania (52.1), Djibouti (52.1), Pakistan (54.3), Samoa (54.3), Tonga (54.3), Morocco (56.8), Senegal (56.8), Albania (56.8), Georgia (56.8), Armenia (59.5), St Vincent & Grenadines (62.5), Kenya (62.5), Maldives (65.8), Kyrgyzstan (65.8), Burkina Faso (65.8), India (69.4), Cook Islands (69.4), Bhutan (73.5), Yemen (78.1), Tajikistan (78.1), Mozambique (78.1), Rwanda (78.1), Burundi (78.1), Lesotho (83.3), Swaziland (83.3), Eritrea (89.3), Haiti (89.3), Solomon Islands (113.6), Vietnam (113.6), Cape Verde (113.6), Niger (113.6), Ethiopia (113.6), São Tomé and Príncipe (125.0), Afghanistan (138.9), The Gambia (138.9), Bangladesh (138.9), Comoros (178.6), Kiribati (208.3). I must reiterate that there is no way that Australia will meet its global “fair shares” obligations because it is fundamentally committed to oil use and to coal and gas use and exports. Thus about 92% of Australia 's electricity derives from fossil fuel combustion, Australia is the world's biggest coal exporter and a major liquid natural gas (LNG) exporter. In addition and most importantly, Australia is politically correct racist (PC racist) – while it endlessly preaches the equality of man, in practice it simply does not accept that “all men are created equal”. Australia commenced the genocide of the Indigenous inhabitants at inception in 1788, the Indigenous population falling from about 1 million in 1788 to about 0.1 million a century later through violence, dispossession and introduced disease. The Aboriginal Genocide continued into the 20th century with extreme deprivation of Aborigines and a policy of forced removal of about 100,000 Aboriginal children from their mothers that only ceased in the 1970s shortly after the 1967 referendum that finally enabled Aboriginal people to be counted in the national census and to be subject to Commonwealth laws, rather than just state laws. 9,000 Indigenous Australians die avoidably every year out of an Aboriginal population of 0.5 million in an ongoing Aboriginal Genocide. While the White Australia Policy was removed in 1974, Australia offensively discriminates against non-Europeans coming to Australia . While the 1975 Racial Discrimination Act abolished racism at the Federal level, the Australian Government excluded Northern Territory Indigenous Australians, Afghan refugees fleeing the Afghan Holocaust and Afghan Genocide and Tamils refugees fleeing from the Tamil Holocaust and Tamil Genocide from the protection of this Act. Australia has been involved in all post-1950 US Asian Wars (war-related deaths 26 million, war-related refugees 20 million) and the US War on Terror that is in horrible reality a cowardly and racist war on Arab, Muslim, African, Asian, and non-European women and children (war-related deaths 12 million, Muslim refugees about 20 million). Australia has been involved in 24 genocides since 1788 of which 10 are ongoing, notably the Iraqi Genocide (4.6 million war-related deaths, 1990-2011), the Afghan Genocide (5.0 million war-related deaths, 2001-2011), the ongoing Aboriginal Genocide and worsening Climate Genocide. . Indeed the current racist Labor Government of Apartheid Australia recently banned cattle sales to Indonesia after revelations that cattle were being whipped and beaten before slaughter. Yet this same racist Labor Government locks up thousands of refugee men , women and children (a humanitarian catastrophe it has helped generate) in remote, abusive concentration camps without charge or trial and is now is proposing to “traffic” asylum seekers arriving by boat to Malaysia (a country in which 30,000 refugees have been tortured by abusive imprisonment, beating and scarifying caning). Australia fulminates against “people smugglers” who try to find safe haven for several thousand mainly Muslim refugees who seek out their services but is itself proposing to engage in “people trafficking”, “people swapping” and “people trading” against the wishes of the victims, this being akin to Australia's past involvements in Kanaka slave trading in the Pacific, Indian indentured labor (5 year slaves ) in Fiji and effective slave labor of Indigenous Australians that only ended several decades ago. Likewise, the annual death rate is 2.4% for Indigenous Australians in the Northern Territory as compared to 0.4% (what it should be) and 2.5% for Australian sheep in Australian paddocks. . Of course Apartheid Australia is not the only climate criminal country. Thus 38 other countries are like Australia in having to cease GHG pollution within 10 years and 8 countries are worse than Australia (variously because of massive deforestation or economic dependence on fossil fuels). Thus years left at current pollution rates until “fair shares” zero emissions is 27.8 (Asia and Sub-Saharan Africa), 21.9 (Middle East and North Africa), 19.8 (Central America and Caribbean) and 18.4 (the World) as compared to 11.8 (Europe), 11.3 (South America), 5.4 (North America) and 5.2 ( Oceania ). However continental Australia has massive agricultural, forestry, mineral and renewable energy resources – it has choices. Indeed it is estimated that 260,000 GWh per year of the 325,000 GWh per year of electrical energy Australia will need by 2020 could be supplied by wind power on a 24/7 baseload basis through various energy storage options and for as little as $144 billion. . Both Dr James Lovelock FRS (Gaia hypothesis) and Professor Kevin Anderson ( Director, Tyndall Centre for Climate Change Research, University of Manchester, UK) have recently estimated that only about 0.5 billion people will survive this century due to unaddressed, man-made global warming. Noting that the world population is expected to reach 9.5 billion by 2050, these estimates translate to a Climate Genocide involving deaths of 10 billion people this century, this including 6 billion under-5 year old infants, 3 billion Muslims in a terminal Muslim Holocaust, 2 billion Indians, 1.3 billion non-Arab Africans, 0.5 billion Bengalis, 0.3 billion Pakistanis and 0.3 billion Bangladeshis. Already 18 million people die avoidably every year in Developing countries (minus China ) due to deprivation and deprivation-exacerbated disease and man-made global warming is already clearly worsening this global avoidable mortality holocaust. However 10 billion avoidable deaths due to global warming this century will yield an average global annual avoidable death rate of 100 million per year. . Where does your country come in this “years left until zero emssions” analysis? We are badly running out of time. The World must take action against the more notorious climate criminal, climate racist, and climate terrorist countries such as climate criminal Apartheid Australia through Sanctions, Boycotts, Sporting Boycotts (as were successfully applied to Apartheid South Africa through exclusion from the Olympic Games and other events), Green Tariffs, International Court of Justice litigations and International Criminal Court prosecutions. Indeed I have made a formal complaint to the International Criminal Court about Australia 's involvement in the worsening Climate Genocide and other ongoing genocidal atrocities. . . Australian Climate Commission, “The Critical Decade. Climate science, risks and responses”, 2011: http://climatecommission.gov.au/topics/the-critical-decade/ . . List of countries by population”, Wikipedia: http://en.wikipedia.org/wiki/List_of_countries_by_population . . “List of countries by greenhouse gas pollution per capita”, Wikipedia: http://en.wikipedia.org/wiki/List_of_countries_by_greenhouse_gas_emissions_per_capita . . Gideon Polya, “Australian Anzac & Armenian Genocide, Australia 's secret genocide history”, MWC News, 25 April 2011: http://aljazeera-news.net/focus/analysis/10256-australian-anzac-a-armenian-genocide.html . . Gideon Polya. “The Awful Truth”, National Indigenous Times, 14 June 2007: http://www.nit.com.au/news/story.aspx?id=11552 . . Gideon Polya, “ Activists & pro-gas Oz Government's Carbon Tax-ETS-Ignore Agriculture (CTETSIA) climate inaction plan ”, Bellaciao, 4 March 2011: http://bellaciao.org/en/spip.php?article20616 . . “Climate Genocide”: https://sites.google.com/site/climategenocide/ . . Gideon Polya, “ 9 January 2010 Formal Complaint by Dr Gideon Polya to the International Criminal Court (ICC) re US Alliance Palestinian, Iraqi, Afghan, Muslim, Aboriginal, Biofuel and Climate Genocides ”: https://sites.google.com/site/climategenocide/9-january-2010 . Dr Gideon Polya currently teaches science students at a major Australian university. He published some 130 works in a 5 decade scientific career, most recently a huge pharmacological reference text "Biochemical Targets of Plant Bioactive Compounds" (CRC Press/Taylor & Francis, New York & London , 2003). He has recently published “Body Count. Global avoidable mortality since 1950” (G.M. Polya, Melbourne, 2007: http://globalbodycount.blogspot.com/ ); see also his contributions “Australian complicity in Iraq mass mortality” in “Lies, Deep Fries & Statistics” (edited by Robyn Williams, ABC Books, Sydney, 2007): http://www.abc.net.au/rn/science/ockham/stories/s1445960.htm ) and “Ongoing Palestinian Genocide” in “The Plight of the Palestinians (edited by William Cook, Palgrave Macmillan, London, 2010: http://mwcnews.net/focus/analysis/4047-the-plight-of-the-palestinians.html ). He has just published a revised and updated 2008 version of his 1998 book “Jane Austen and the Black Hole of British History” (see: http://janeaustenand.blogspot.com/ ) as biofuel-, globalization- and climate-driven global food price increases threaten a greater famine catastrophe than the man-made famine in British-ruled India that killed 6-7 million Indians in the “forgotten” World War 2 Bengal Famine (see recent BBC broadcast involving Dr Polya, Economics Nobel Laureate Professor Amartya Sen and others: http://www.open2.net/thingsweforgot/ bengalfamine_programme.html ). When words fail one can say it in pictures - for images of Gideon Polya's huge paintings for the Planet, Peace, Mother and Child see: http://sites.google.com/site/artforpeaceplanetmotherchild/ and http://www.flickr.com/photos/gideonpolya/ . Comments are not moderated. Please be responsible and civil in your postings and stay within the topic discussed in the article too. If you find inappropriate comments, just Flag (Report) them and they will move into moderation que.
<urn:uuid:e948b90c-ebf8-4d6e-ae9f-386aa1af4637>
CC-MAIN-2016-26
http://www.countercurrents.org/polya110611.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402479.21/warc/CC-MAIN-20160624155002-00155-ip-10-164-35-72.ec2.internal.warc.gz
en
0.872712
4,789
3.171875
3
The ‘Guan He Kou’ is carrying sawn timber from the Congo Basin, where widespread illegal logging is destroying the forest and driving gorillas and chimpanzees towards extinction. The rainforest is also home to millions of indigenous people who depend on the forest for their survival. Greenpeace International’s Forest Campaigner, Belinda Fletcher, said: ‘Stolen rainforest timber is flooding into ports in Italy and across Europe almost daily. It ends up on construction sites and is being sold in high street stores.(1) If this criminal activity is not stopped, the world’s rainforests look set to disappear in our lifetime and the only forest elephants, lowland gorillas and chimpanzees left will be in zoos.” The ship’s timber cargo was logged by a Cameroonian timber company, Société Industrielle de Mbang (SIM), which is partly financed by Italian capital.(2) The rainforests of the Congo Basin are rapidly being decimated by the logging industry, which is notoriously corrupt in the region. During field investigations to Cameroon in 2005, Greenpeace discovered that SIM is illegally logging outside the boundaries of its cutting permit. It also gathered extensive evidence that SIM buys timber from other companies heavily involved in illegal logging.(3) Last year, Cameroon exported approximately €400 million worth of timber to countries across Europe. Italy is one of its main customers buying sawn wood, logs, veneer and mouldings. Other key importers are Spain, France, Belgium, the Netherlands, Ireland and Germany.(4) When it leaves Italy, the ‘Guan He Kou’ and her cargo will go to Spain. Life on Earth depends on ancient forests for its survival but only 20 percent of the world’s original forest remains intact. These last forests are threatened by the international demand for cheap timber, yet there are no laws in Europe to allow the authorities to seize shipments of illegally logged timber products, or to oblige companies to make sure their timber is not from illegal or destructive sources. Greenpeace is calling on European governments to outlaw all imports of illegal timber and to promote environmentally and socially responsible forest management worldwide. Illegal logging and related trade is expected to be on the agenda of the Agriculture Council of the EU on the 24-25th October. Greenpeace is an independent, campaigning organization, which uses non-violent, creative communication tools to put the spotlight on global environmental problems, and to drive towards solutions essential for a green and peaceful future. Other contacts: Belinda Fletcher, Greenpeace International Forest Campaigner on +44 207 865 8225 VVPR info: Images of today’s action and Africa’s ‘Great Ape’ rainforest are available on request. Photos: John Novis on (M) +31 6 5381 9121Video: Maarten van Rouveroy on +31 (0) 20 718 2208 or (M) +31 646 197 322 (1) Consumers can guarantee that the timber products come from well-managed sources, by buying products carrying the logo of the Forest Stewardship Council™ (FSC®). (2) Shareholders of SIM include the Italian timber companies Piarottolegno and Dassi. (3) In 2005, Greenpeace field investigators visited SIM’s cutting permit (Vente de Coupe 08-10-73) in the Mbam & Kim department in the Centre province of Cameroon. They documented large scale illegal logging activities by SIM outside the legal boundaries of its allocated permit. Greenpeace estimates that SIM has logged at least 850 hectares illegally in this area. Investigators also found that the SIM/TIB sawmill is sourcing timber from two permits held by other Cameroonian companies, FIAM and Topaze, whose permits are widely considered to be illegal in Cameroon. For more information see: http://www.greenpeace.org/international/en/publications/reports/simillegalcameroon/ (4) Rupert Oliver & Emily Fripp, Changing International Markets For Timber: What African Producers Can do, African Timber Trade Forums, Producer Country Draft Cameroon, May-July 2005, section 1.2.
<urn:uuid:b6b66b26-3ee1-4099-9f31-f4e18f7161eb>
CC-MAIN-2016-26
http://www.greenpeace.org/international/en/press/releases/action-on-illegal-logging-ital/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395166.84/warc/CC-MAIN-20160624154955-00163-ip-10-164-35-72.ec2.internal.warc.gz
en
0.923132
860
3.15625
3
Research from the Atlanta Federal Reserve shows how the proportion of young people ages 16 to 24 in the work force has collapsed. If this was simply a phenomenon of the recent crisis, then perhaps it wouldn't be too surprising given the paucity of jobs these days. But there's more to it: Ever since 2000, fewer and fewer young people have been working. See for yourself; even between recessions the green line below has been falling: Federal Reserve of Atlanta: Moreover, the most recent recession has seen youth participation rates decline at a rate similar to that seen in the early 2000s. In contrast, the labor force participation by individuals over 24 years of age has varied much less, implying that the decline in youth labor force participation has been a major contributor to the reduction in the overall rate of labor force participation (see the above chart). It also appears that the decline in youth participation is most dramatic among teenagers, and for that group it is an equally sized decline for both males and females (see the next two charts). So, first of all, as stated above, the decline in labor participation from America's young accounts for the majority of the decline in overall labor market participation. So it's not that older workers are dropping out of the rat race, it's that the younger people are. The Economist's Free Exchange thinks this could be partly a good thing -- falling labor market participation is a function of more young people focusing on education. Maybe, but at the same time it might just be that, for some reason, they find less reason to work, or have less "fire in the belly." Free Exchange: That makes the decline seem a little less troubling. At least those not able to find work in the labour market are actively investing in human capital. But this also suggests that young people are developing far less work experience in early adulthood than did previous generations—a factor which could make it more difficult for them to find work when they finally leave school, and which may influence things like levels of student indebtedness in the meantime.
<urn:uuid:c7b4c810-5195-4d31-8241-9ccc27dcf3e8>
CC-MAIN-2016-26
http://www.businessinsider.com/young-people-arent-working-anymore-2010-1
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397562.76/warc/CC-MAIN-20160624154957-00111-ip-10-164-35-72.ec2.internal.warc.gz
en
0.971446
417
2.71875
3
Dodd-Frank Creates Obstacles, Restricts Growth Just over one year ago, President Obama signed the Dodd-Frank Wall Street Reform and Consumer Protection Act into law. Dodd-Frank, a response to the 2008 financial collapse, was intended to increase oversight of massive financial institutions, such as large banks and stock brokers, and to monitor consumer transactions, such as payday loans and mortgages. It was meant to address the concern that U.S. financial institutions had grown “too big to fail” and would need to be “bailed out” by the government to prevent a banking system collapse. However, Dodd-Frank gives the federal government increased power to control not only large banks, but also small banks and businesses. Ironically, financial-sector concentration has continued to increase. Rep. Ed Royce (R-Calif.), a member of the House Financial Services Committee, notes that before the banking crisis, the top 10 banks in the United States held 55 percent of banking sector total assets; today, they hold 77 percent. Though Dodd-Frank is still in the implementation phase, it is becoming clearer that this complex legislation imposes regulatory burdens that will stifle efforts to grow businesses, but will not result in beneficial financial reforms. What Does Dodd-Frank Do? At least 10 federal agencies will be tasked with ensuring compliance with roughly 300 new rules created by Dodd-Frank, says the Congressional Research Service. Several new agencies were created. One of them, the Consumer Financial Protection Bureau (CFPB), opened its doors recently. The head of the CFPB will be appointed for a five-year term. Once confirmed by the House and Senate, he or she will have free rein to spend $500 million without interference from Congress, since the CFPB is funded by the Federal Reserve, rather than congressional appropriations. Costs to Financial Institutions. Banks will be required to file paperwork reporting their compliance with all mandates of Dodd-Frank to the various oversight agencies. For example, banks must confirm the ability of prospective borrowers to repay loans and report their confirmation to the monitoring agencies. This provision is designed to eliminate “no document” and “liar” loans, but it will increase paperwork costs. The cost will vary among firms, but David L. Schnadig, managing partner with the Cortec Group, estimates it will cost his firm $75,000 to $100,000 annually. Dodd-Frank also limits bank debit card swipe fees. Banks previously charged merchants an average of $0.44 to process a debit card transaction. Banks will now be allowed to charge only $0.21 plus 0.05 percent of the transaction. They are expected to make up the lost revenue elsewhere, through increased fees for checking accounts or higher interest on loans. The Orderly Liquidation Authority (OLA), located in the Federal Deposit Insurance Corporation (FDIC), will give the largest firms a comparative advantage. Rep. Royce notes that OLA intervention will be more likely for large banks that pose a threat to the economy, while small banks are likely to bear the burden of any crisis on their own. This means that larger institutions will benefit from implicit government support, while smaller institutions are perceived as “too small to save.” Small financial services firms must also comply with Dodd-Frank. It requires recording of “all oral and written communications provided or received concerning quotes, solicitations, bids, offers, instructions, trading and prices, that lead to the execution of transactions in a commodity interest or cash commodity, whether communicated by telephone, voicemail, facsimile, instant messaging, chat rooms, electronic mail, mobile device or other digital or electronic media.” The Commodity Futures Trading Commission estimates that the cost of complying with Dodd-Frank will be $16,750 to $61,750 per firm initially, and $12,600 annually once they have records systems in place. Costs to Small Businesses. A major concern is that small businesses will be unable to obtain financing as a result of Dodd-Frank. When there are more restrictions on the loans banks can make, fewer loans are made. In fact, loans to small businesses have tumbled to a five-year low [see the figure]: - Lending to small businesses has decreased annually since 2008. - Small business lending fell during the 2010 fiscal year. - Loans to small businesses in 2011 are at the lowest level since 2006. Because the law governs everything from traditional small business loans to personal credit cards and home equity loans, access to capital for small businesses will be restricted. As Rep. Jason Altmire (D-Pa.) notes: - The last Federal Reserve Survey on Small Business Finance found nearly half of all small firms used personal credit cards to finance their enterprise. - In another survey, one in five entrepreneurs reported using a home equity loan for business purposes. These small businesses, which employ over half of private sector employees and are responsible for more than six out of 10 new jobs, will face increased costs and limited access to capital as a result of Dodd-Frank. Reform and regulation of powerful financial institutions may be needed, but Dodd Frank creates obstacles for small banks and businesses, while failing to actually provide checks against massive financial firms. Karlyn Gorski is a research assistant with the National Center for Policy Analysis.
<urn:uuid:5fda98aa-3ad6-4772-8f4f-e9fdefa5e393>
CC-MAIN-2016-26
http://www.ncpa.org/pub/ba755
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391519.0/warc/CC-MAIN-20160624154951-00069-ip-10-164-35-72.ec2.internal.warc.gz
en
0.956655
1,096
2.609375
3
When is home bias not home bias? Home bias describes the tendency of investors to overweight in their domestic stock markets over international markets. In theory, home bias is poor asset allocation. By putting too many eggs in a geographic basket, a shock to a local market will cause greater damage to a portfolio than one that is more evenly weighted in many different markets. The underlying premise of home bias, however, is that the companies listed on domestic stock exchanges earn revenue primarily in local markets. Traditionally, this has been the case. But I would not be the first to note that large multinational corporations now work, in some cases, completely independently of the economies where their headquarters are domiciled. How can it be that Apple earns billions in profits and has tens of billions of dollars on hand (over $40 billion) when the American economy suffers so greatly? It is because, in part, the free flow of capital has allowed many businesses to work outside the traditional confines of a local economy. A company listed on a domestic exchange is now not necessarily tied to a local economy. Where a company lists as publicly traded may be a function of regulatory or jurisdictional ease rather than source of earnings. For example, Bespoke Investment Group wrote recently that approximately 30% of the revenue of companies compromising of the S & P 500 derived revenues outside the U.S. The tech sector averaged over 53% of revenues outside of the U.S. while materials average a little over 40% (…and you thought only Canada was selling its resources to the world). Thus, playing the tech sector listed locally may not mean a home bias per se if over half the revenue is earned elsewhere in the world. The traditional assumption that companies listed on local exchanges are tied to local economies leads to several curious results: - Investors, especially American investors, are moving money out of local exchanges and investing in emerging markets; USA today reports that Americans have poured over $43 billion this year into emerging market funds. If we presume, in part, this movement is due to declining confidence in the U.S. economy, have investors missed the fact that some publicly traded companies saw the same thing and already have moved operations abroad but continue to trade in a jurisdiction with relatively high investor protection and protection of seizure of property by the state (two uncertainties when investing in emerging markets)? In some cases, is home bias actually welcomed? - Large cap companies trading on mature exchanges tend to provide some semblance of stability over companies trading in emerging markets. By moving money to international markets, is an investor actually increasing their risk in a time of uncertainty when a home bias in stocks with more than modest international operations may provide some international upside without the same amount of risk? The tradition home bias argument continues to hold true for smaller exchanges (see TSX) or in sectors tied to local economies (see telecos). But, in a world where capital flows freely, one can’t look at the home bias using traditional analysis.
<urn:uuid:0c08bec4-d2b5-43f7-9201-f3dc21bcbefe>
CC-MAIN-2016-26
http://www.thickenmywallet.com/blog/wp/2010/11/03/when-is-home-bias-not-home-bias/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402516.86/warc/CC-MAIN-20160624155002-00103-ip-10-164-35-72.ec2.internal.warc.gz
en
0.946942
605
2.515625
3
Henry Purcell (//; c. 10 September 1659[Note 1] – 21 November 1695) was an English composer. Although incorporating Italian and French stylistic elements into his compositions, Purcell's legacy was a uniquely English form of Baroque music. He is generally considered to be one of the greatest English composers; no other native-born English composer approached his fame until Edward Elgar, Ralph Vaughan Williams, and Benjamin Britten in the 20th century. Early life and career Purcell was born in St Ann's Lane, Old Pye Street Westminster – the area of London later known as Devil's Acre – in 1659. Henry Purcell Senior, whose older brother Thomas Purcell (d. 1682) was also a musician, was a gentleman of the Chapel Royal and sang at the coronation of King Charles II of England. Henry the elder had three sons: Edward, Henry and Daniel. Daniel Purcell (d. 1717), the youngest of the brothers, was also a prolific composer who wrote the music for much of the final act of The Indian Queen after Henry Purcell's death. Henry Purcell's family lived just a few hundred yards west of Westminster Abbey from 1659 onwards. After his father's death in 1664, Purcell was placed under the guardianship of his uncle Thomas who showed him great affection and kindness. Thomas was himself a gentleman of His Majesty's Chapel, and arranged for Henry to be admitted as a chorister. Henry studied first under Captain Henry Cooke (d. 1672), Master of the Children, and afterwards under Pelham Humfrey (d. 1674), Cooke's successor. Henry was a chorister in the Chapel Royal until his voice broke in 1673, when he became assistant to the organ-builder John Hingston, who held the post of keeper of wind instruments to the King. Purcell is said to have been composing at nine years old, but the earliest work that can be certainly identified as his is an ode for the King's birthday, written in 1670. (The dates for his compositions are often uncertain, despite considerable research.) It is assumed that the three-part song Sweet tyranness, I now resign was written by him as a child. After Humfrey's death, Purcell continued his studies under Dr John Blow. He attended Westminster School and in 1676 was appointed copyist at Westminster Abbey. Henry Purcell's earliest anthem Lord, who can tell was composed in 1678. It is a psalm that is prescribed for Christmas Day and also to be read at morning prayer on the fourth day of the month. In 1679, he wrote songs for John Playford's Choice Ayres, Songs and Dialogues and an anthem, the name of which is unknown, for the Chapel Royal. From an extant letter written by Thomas Purcell we learn that this anthem was composed for the exceptionally fine voice of the Rev. John Gostling, then at Canterbury, but afterwards a gentleman of His Majesty's Chapel. Purcell wrote several anthems at different times for Gostling's extraordinary basso profondo voice, which is known to have had a range of at least two full octaves, from D below the bass staff to the D above it. The dates of very few of these sacred compositions are known; perhaps the most notable example is the anthem They that go down to the sea in ships. In gratitude for the providential escape of King Charles II from shipwreck, Gostling, who had been of the royal party, put together some verses from the Psalms in the form of an anthem and requested Purcell to set them to music. The challenging work opens with a passage which traverses the full extent of Gostling's range, beginning on the upper D and descending two octaves to the lower. Later career and death In 1679, Blow, who had been appointed organist of Westminster Abbey in 1669, resigned his office in favour of his pupil. Purcell now devoted himself almost entirely to the composition of sacred music, and for six years severed his connection with the theatre. However, during the early part of the year, probably before taking up his new office, he had produced two important works for the stage, the music for Nathaniel Lee's Theodosius, and Thomas d'Urfey's Virtuous Wife. Between 1680 and 1688 Purcell wrote music for seven plays. The composition of his chamber opera Dido and Aeneas, which forms a very important landmark in the history of English dramatic music, has been attributed to this period, and its earliest production may well have predated the documented one of 1689. It was written to a libretto furnished by Nahum Tate, and performed in 1689 in cooperation with Josias Priest, a dancing master and the choreographer for the Dorset Garden Theatre. Priest's wife kept a boarding school for young gentlewomen, first in Leicester Fields and afterwards at Chelsea, where the opera was performed. It is occasionally considered the first genuine English opera, though that title is usually given to Blow's Venus and Adonis: as in Blow's work, the action does not progress in spoken dialogue but in Italian-style recitative. Both works run to less than one hour. At the time, Dido and Aeneas never found its way to the theatre, though it appears to have been very popular in private circles. It is believed to have been extensively copied, but only one song was printed by Purcell's widow in Orpheus Britannicus, and the complete work remained in manuscript until 1840, when it was printed by the Musical Antiquarian Society under the editorship of Sir George Macfarren. The composition of Dido and Aeneas gave Purcell his first chance to write a sustained musical setting of a dramatic text. It was his only opportunity to compose a work in which the music carried the entire drama. The story of Dido and Aeneas derives from the original source in Virgil's epic the Aeneid. Soon after Purcell's marriage, in 1682, on the death of Edward Lowe, he was appointed organist of the Chapel Royal, an office which he was able to hold simultaneously with his position at Westminster Abbey. His eldest son was born in this same year, but he was short-lived. His first printed composition, Twelve Sonatas, was published in 1683. For some years after this, he was busy in the production of sacred music, odes addressed to the king and royal family, and other similar works. In 1685, he wrote two of his finest anthems, I was glad and My heart is inditing, for the coronation of King James II. In 1690 he composed a setting of the birthday ode for Queen Mary, Arise, my muse and four years later wrote one of his most elaborate, important and magnificent works – a setting for another birthday ode for the Queen, written by Nahum Tate, entitled Come Ye Sons of Art. In 1687, he resumed his connection with the theatre by furnishing the music for Dryden's tragedy, Tyrannick Love. In this year, Purcell also composed a march and passepied called Quick-step, which became so popular that Lord Wharton adapted the latter to the fatal verses of Lillibullero; and in or before January 1688, Purcell composed his anthem Blessed are they that fear the Lord by express command of the King. A few months later, he wrote the music for D'Urfey's play, The Fool's Preferment. In 1690, he composed the music for Betterton's adaptation of Fletcher and Massinger's Prophetess (afterwards called Dioclesian) and Dryden's Amphitryon. During the first ten years of his mastership, Purcell composed much- precisely how much we can only guess. In 1691, he wrote the music for what is sometimes considered his dramatic masterpiece, King Arthur, or The British Worthy . In 1692, he composed The Fairy-Queen (an adaptation of Shakespeare's A Midsummer Night's Dream), the score of which (his longest for theatre) was rediscovered in 1901 and published by the Purcell Society. The Indian Queen followed in 1695, in which year he also wrote songs for Dryden and Davenant's version of Shakespeare's The Tempest (recently, this has been disputed by music scholars), probably including "Full fathom five" and "Come unto these yellow sands". The Indian Queen was adapted from a tragedy by Dryden and Sir Robert Howard. In these semi-operas (another term for which at the time was "dramatic opera"), the main characters of the plays do not sing but speak their lines: the action moves in dialogue rather than recitative. The related songs are sung "for" them by singers, who have minor dramatic roles. Purcell's Te Deum and Jubilate Deo were written for Saint Cecilia's Day, 1694, the first English Te Deum ever composed with orchestral accompaniment. This work was annually performed at St Paul's Cathedral until 1712, after which it was performed alternately with Handel's Utrecht Te Deum and Jubilate until 1743, when both works were replaced by Handel's Dettingen Te Deum. He composed an anthem and two elegies for Queen Mary II's funeral. Besides the operas and semi-operas already mentioned, Purcell wrote the music and songs for Thomas d'Urfey's The Comical History of Don Quixote, Bonduca, The Indian Queen and others, a vast quantity of sacred music, and numerous odes, cantatas, and other miscellaneous pieces. The quantity of his instrumental chamber music is minimal after his early career, and his keyboard music consists of an even more minimal number of harpsichord suites and organ pieces. In 1693, Purcell composed music for two comedies: The Old Bachelor, and The Double Dealer. Purcell also composed for five other plays within the same year. In July 1695, Purcell composed an ode for the Duke of Gloucester for his sixth birthday. The ode is titled Who can from joy refrain? Purcell's four-part sonatas were issued in 1697. In the final six years of his life, Purcell wrote music for forty-two plays. Purcell died in 1695 at his home in Marsham Street, at the height of his career. He is believed to have been 35 or 36 years old at the time. The cause of his death is unclear: one theory is that he caught a chill after returning home late from the theatre one night to find that his wife had locked him out. Another is that he succumbed to tuberculosis. The beginning of Purcell's will reads: - In the name of God Amen. I, Henry Purcell, of the City of Westminster, gentleman, being dangerously ill as to the constitution of my body, but in good and perfect mind and memory (thanks be to God) do by these presents publish and declare this to be my last Will and Testament. And I do hereby give and bequeath unto my loving wife, Frances Purcell, all my estate both real and personal of what nature and kind soever... Purcell is buried adjacent to the organ in Westminster Abbey. The music that he had earlier composed for Queen Mary's funeral was performed during his as well. Purcell was universally mourned as "a very great master of music." Following his death, the officials at Westminster honoured him by unanimously voting that he be buried with no expense in the north aisle of the Abbey. His epitaph reads: "Here lyes Henry Purcell Esq., who left this life and is gone to that blessed place where only his harmony can be exceeded." Purcell fathered six children by his wife Frances, four of whom died in infancy. His wife, as well as his son Edward (1689–1740) and daughter Frances, survived him. Frances the elder died in 1706, having published a number of her husband's works, including the now famous collection called Orpheus Britannicus, in two volumes, printed in 1698 and 1702, respectively. Edward was appointed organist of St Clement Eastcheap, London, in 1711 and was succeeded by his son Edward Henry Purcell (d. 1765). Both men were buried in St Clement's near the organ gallery. Influence and reputation After his death, Purcell was honoured by many of his contemporaries, including his old friend John Blow, who wrote An Ode, on the Death of Mr. Henry Purcell (Mark how the lark and linnet sing) with text by his old collaborator, John Dryden. William Croft's 1724 setting for the Burial Service, was written in the style of "the great Master". Croft preserved Purcell's setting of "Thou knowest Lord" (Z 58) in his service, for reasons "obvious to any artist"; it has been sung at every British state funeral ever since. More recently, the English poet Gerard Manley Hopkins wrote a famous sonnet entitled simply "Henry Purcell", with a headnote reading: "The poet wishes well to the divine genius of Purcell and praises him that, whereas other musicians have given utterance to the moods of man's mind, he has, beyond that, uttered in notes the very make and species of man as created both in him and in all men generally." Purcell also had a strong influence on the composers of the English musical renaissance of the early 20th century, most notably Benjamin Britten, who created and performed a realisation of Dido and Aeneas and whose The Young Person's Guide to the Orchestra is based on a theme from Purcell's Abdelazar. Stylistically, the aria "I know a bank" from Britten's opera A Midsummer Night's Dream is clearly inspired by Purcell's aria "Sweeter than Roses", which Purcell originally wrote as part of incidental music to Richard Norton's Pausanias, the Betrayer of His Country. Purcell is honoured together with Johann Sebastian Bach and George Frideric Handel with a feast day on the liturgical calendar of the Episcopal Church (USA) on 28 July. In a 1940 interview Ignaz Friedman stated that he considered Purcell as great as Bach and Beethoven. In Victoria Street, Westminster, England, there is a bronze monument to Purcell, sculpted by Glynn Williams and erected in 1994. Purcell's works have been catalogued by Franklin Zimmerman, who gave them a number preceded by Z. A Purcell Club was founded in London in 1836 for promoting the performance of his music, but was dissolved in 1863. In 1876 a Purcell Society was founded, which published new editions of his works. A modern-day Purcell Club has been created, and provides guided tours and concerts in support of Westminster Abbey. So strong was his reputation that a popular wedding processional was incorrectly attributed to Purcell for many years. The so-called Purcell's Trumpet Voluntary was in fact written around 1700 by a British composer named Jeremiah Clarke as the Prince of Denmark's March. Michael Nyman, at the request of the director, built the score of Peter Greenaway's 1982 film, The Draughtsman's Contract on ostinati by Purcell from various sources, one misattributed. He credited Purcell as a "music consultant." Another of Purcell's ostinati, the Cold Genius aria from King Arthur, was used in Nyman's Memorial. In popular culture The 1973 Rolling Stone review of Jethro Tull's A Passion Play compared the musical style of the album with the one of Purcell. In 2009 Pete Townshend of The Who, an English rock band that established itself in the 1960s, identified Purcell's harmonies as an influence on the band's music (in songs such as "Won't Get Fooled Again" (1971), "I Can See for Miles" (1967) and the very Purcellian intro to "Pinball Wizard"). The processional section from Purcell's Music for the Funeral of Queen Mary was adapted for the synthesiser by Wendy Carlos to serve as the theme music for the 1971 film A Clockwork Orange; the music is also featured in the final scene of the 1995 film The Young Poisoner's Handbook. Noted cult New Wave artist Klaus Nomi regularly performed "The Cold Song" from King Arthur during his career, including a version on his debut self-titled album, Klaus Nomi, from 1981; his last public performance before his untimely death was an interpretation of the piece done with a full orchestra in December 1982 in Munich. Purcell wrote the song for a bass, but numerous countertenors have performed the piece in homage to Nomi. Sting recorded it on his 2009 album If on a Winter's Night.... In the 21st century, the soundtrack of the 2005 film version of Pride and Prejudice features a dance titled "A Postcard to Henry Purcell." This is a version by composer Dario Marianelli of Purcell's Abdelazar theme. In the German-language 2004 movie, Der Untergang, the music of Dido's Lament is used repeatedly as the end of the Third Reich culminates. The 2012 film Moonrise Kingdom contains Benjamin Britten's version of the Rondeau in Purcell's Abdelazar created for his 1946 The Young Person's Guide to the Orchestra. In 2013, the Pet Shop Boys released their single Love Is a Bourgeois Construct incorporating one of the same ground basses from King Arthur used by Nyman in his Draughtsman's Contract score. Olivia Chaney performs her adaptation of “There’s Not a Swain” on her CD “The Longest River.” Performed by Sylvia Kind |Problems playing these files? See media help.| - According to Holman and Thompson (Grove Music Online, see References) there is uncertainty regarding the year and day of birth. No record of baptism has been found. The year 1659 is based on Purcell's memorial tablet in Westminster Abbey and the frontispiece of his Sonnata's of III. Parts (London, 1683). The day 10 September is based on vague inscriptions in the manuscript GB-Cfm 88. It may also be relevant that he was appointed to his first salaried post on 10 September 1677, which would have been his eighteenth birthday. - Wells, J.C., Longman Pronunciation Dictionary. Harlow, Essex: Longman. ISBN 0-582-36467-1 - Holman and Thompson (Grove Music Online, see References). - "The Encyclopaedia Britannica : a dictionary of arts, sciences, literature and general information". archive.org. - Zimmerman, Franklin. Henry Purcell 1659–1695 His Life and Times. (New York City: St. Martin’s Press Inc., 1967), 34. - Westrup, J. A. Purcell. (London: J. M. Dent & Sons Ltd., 1975), 8. - Burden, Michael. The Purcell Companion. (Portland, Oregon: Amadeus Press, 1995), 55. - Burden, Michael. The Purcell Companion. (Portland, Oregon: Amadeus Press, 1995), 58. - Zimmerman, Franklin. Henry Purcell 1659–1695 His Life and Times. (New York City: St. Martin’s Press Inc., 1967), 29. - Zimmerman, Franklin. Henry Purcell 1659–1695 His Life and Times. (New York City: St. Martin’s Press Inc., 1967), 65. - Runciman, John F. (1909). Purcell. London: George Bell & Sons. OCLC 5690003. - Harris, Ellen T. Henry Purcell's Dido and Aeneas. (Oxford: Clarendon Press, 1987), 6. - Hutchings, Arthur. Purcell. (London: British Broadcasting Corporation, 1982), 54. - Harris, Ellen T. Henry Purcell's Dido and Aeneas. (Oxford: Clarendon Press, 1987), 11. - Hutchings, Arthur. Purcell. (London: British Broadcasting Corporation, 1982), 85. - Westrup, J. A. Purcell. (London: J. M. Dent & Sons Ltd., 1975), 41. - The London Gazette: . 25 October 1683. Retrieved 21 December 2007. - The London Gazette: . 1 November 1683. Retrieved 21 December 2007. Announcements of the publication of Purcell's Sonata, first for subscribers, then for general purchase - The London Gazette: . 8 May 1684. Retrieved 21 December 2007. - The London Gazette: . 19 January 1684. Retrieved 21 December 2007. Announcements of the publication of Purcell's Ode for St Cecilia's Day, first performed, 22 November 1683 - Tore Frantzvåg Steenslid (2004). "Arise, my muse". steenslid.com. Retrieved 3 December 2013. - Westrup, J .A. Purcell. (London: J. M. Dent & Sons Ltd., 1975), 77. - Muller 1990[page needed] - Hutchings, Arthur. Purcell. (London: British Broadcasting Corporation, 1982), 55. - Westrup, J. A. Purcell. (London: J. M. Dent & Sons Ltd., 1975), 75. - "Henry Purcell - The Tempest, Z.631 (semi-opera) - Classical Archives". classicalarchives.com. - Westrup, J. A. Purcell. (London: J. M. Dent & Sons Ltd., 1975), 80. - Westrup, J. A. Purcell. (London: J. M. Dent & Sons Ltd., 1975), 82–83. - Westrup, J. A. Purcell. (London: J. M. Dent & Sons Ltd., 1975), 81. - Westrup, J. A. Purcell. (London: J. M. Dent & Sons Ltd., 1975), 83. - Often mis-cited as Dean's Yard; Frederick Bridge in his brief biography of 1920, Twelve Good Composers, uses rental information/rate sheets to clear this up. - Zimmerman, Franklin. Henry Purcell 1659–1695 His Life and Times. (New York City: St. Martin’s Press Inc., 1967), 266. - Westrup, J. A. Purcell. (London: J. M. Dent & Sons Ltd., 1975), 85. - Zimmerman, Franklin. Henry Purcell 1659–1695 His Life and Times. (New York City: St. Martin’s Press Inc., 1967), 267. - Westrup, J. A. Purcell. (London: J. M. Dent & Sons Ltd., 1975), 86. - Melvin P. Unger, Historical Dictionary of Choral Music, Scarecrow Press 2010, ISBN 978-0-8108-5751-3 (p.93) - Holy Women, Holy Men: Celebrating the Saints. Church Publishing, 2010. - "Jethro Tull Press: Rolling Stone, 30 August 1973". tullpress.com. - Radio Times, 24–30 October 2009, previewing Baroque and Roll (BBC Radio 4, 27 October 2009). - Jim Paterson. "Henry Purcell - an overview of the classical composer". mfiles.co.uk. - "The Delicate Intensity of Olivia Chaney". WNYC. - Burden, Michael, ed. The Purcell Companion, Faber and Faber, London, 1994. - Burden, Michael, Purcell Remembered, Faber and Faber, London, 1995. - Burden, Michael, ed. Performing the Music of Henry Purcell, Clarendon Press, Oxford, 1996. - Burden, Michael, ed. Henry Purcell's Operas; The Complete Texts, Oxford University Press, Oxford, 2000. - Dent, Edward J. Foundations of English Opera, Cambridge University Press, Cambridge, 1928. - Duffy, Maureen, Henry Purcell, Fourth Estate Ltd, London, 1994. - Herissone, Rebecca (ed.), The Ashgate Research Companion to Henry Purcell, Farnham, Surrey: Ashgate, 2012 - Holman, Peter and Robert Thompson. "Henry Purcell (ii)," Grove Music Online, ed. L. Macy (accessed 17 March 2006), grovemusic.com (subscription access). - Holman, Peter, Henry Purcell, Oxford University Press, Oxford, 1994. - Holst, Imogen, ed. Henry Purcell 1659–1695: Essays on His Music, Oxford University Press, London, 1959. - Keates, Jonathan, Purcell, Chatto & Windus, London, 1995 - King, Robert, Henry Purcell, Thames & Hudson, London, 1994 - Moore, R. E., Henry Purcell and the Restoration Theatre, Greenwood Press, Westport CT, 1961. - Muller, Julia, Words and Music in Henry Purcell's First Semi-Opera, Dioclesian, Edwin Mellen Press, New York, 1990. - Orrey, Leslie and Rodney Milnes, Opera: A Concise History, World of Art, Thames & Hudson. ISBN 0-500-20217-6. - Price, Curtis A., Henry Purcell and the London Stage,Cambridge University Press, Cambridge, 1984. - Shay, Robert, and Robert Thompson, Purcell Manuscripts: The Principal Musical Sources Cambridge University Press, Cambridge, 2000. - Westrup, Jack A., Purcell, Dent & Sons, London 1980 - Zimmerman, Franklin B., Henry Purcell, 1659–1695, His Life and Times, University of Pennsylvania Press, Philadelphia PA, 1983 - This article incorporates text from a publication now in the public domain: Chisholm, Hugh, ed. (1911). "article name needed". Encyclopædia Britannica (11th ed.). Cambridge University Press. |Wikiquote has quotations related to: Henry Purcell| |Wikimedia Commons has media related to Henry Purcell.| - Purcell by John F. Runciman, a biography forming part of Bell's Miniature Series of Musicians published in 1909, from Project Gutenberg - Purcell's London by Brian Robins - The Purcell Society - Free scores by Henry Purcell in the Choral Public Domain Library (ChoralWiki) - Works by or about Henry Purcell in libraries (WorldCat catalog) - Free scores by Henry Purcell at the International Music Score Library Project - Henry Purcell material in the BBC Radio 3 archives - The Mutopia Project has compositions by Henry Purcell - Short biography, audio samples and images of Purcell - Monument to Purcell - Dido's Lament – Research leading to a narrative account of how Henry Purcell's opera Dido and Aeneas was created. - Henry Purcell at AllMusic - National Trust catalogue entry for manuscript music, copied by Philip Hayes directly from Purcell's original manuscripts - Select digitized images from Old English Songs, containing works by Purcell, housed at the University of Kentucky Libraries Special Collections Research Center
<urn:uuid:be06c201-aa0e-4870-8749-cb9d713b414d>
CC-MAIN-2016-26
http://www.digplanet.com/wiki/Henry_Purcell
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396106.25/warc/CC-MAIN-20160624154956-00145-ip-10-164-35-72.ec2.internal.warc.gz
en
0.94817
5,772
3.78125
4
Definition of Cystine Cystine: An amino acid that is particularly notable because it is the least soluble of all of the naturally occurring amino acids and because it precipitates out of solution in the genetic disease cystinuria to form stones in the urinary tract. Cystine is the chief sulfur-containing compound in protein. Cystine is generated by the union of two cysteine molecules and so is sometimes called dicysteine. It is abbreviated Cys-Cys. See also: Cystinuria.Source: MedTerms™ Medical Dictionary Last Editorial Review: 8/28/2013 Find out what women really need.
<urn:uuid:ab7894f0-2cb9-4230-918f-84c59299d666>
CC-MAIN-2016-26
http://www.rxlist.com/script/main/art.asp?articlekey=7733
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396945.81/warc/CC-MAIN-20160624154956-00114-ip-10-164-35-72.ec2.internal.warc.gz
en
0.912671
136
3.15625
3
On Sept. 17, 1969 — nearly 47 years ago — Daniel Patrick Moynihan, a high-ranking aide to President Richard M. Nixon, dispatched an internal memo to one of his White House colleagues warning of the ominous consequences of climate change. He predicted that the Earth would get so warm and sea levels so high, that it could be “Goodbye New York, Goodbye Washington.” Carbon dioxide in the atmosphere “has the effect of a pane of glass in a greenhouse,” and its unrelenting rise should “seize the imagination of persons normally indifferent to projects of apocalyptic change,” Moynihan wrote to John Ehrlichman, Nixon’s special assistant for domestic affairs. “The C02 content is normally in a stable cycle, but recently man has begun to introduce instability through the burning of fossil fuels.” For those who today recognize the dire consequences of climate change — as the issue has finally achieved a high profile — it might come as a surprise to learn about this early awareness. It shouldn’t. While Nixon and his aides certainly were prescient, they weren’t the only ones — though presidents during those earlier times didn’t do much beyond talk about it. As early as 1903 — when Republican Theodore Roosevelt was president — “scientists were aware of (Swedish scientist Svante Arrhenius’s) theory that CO2 emissions could bring global warming,” says Spencer Weart, a climate historian and author of “The Discovery of Global Warming.” But “it was regarded as speculative, and it had no policy implications since warming was not expected until centuries later, if at all, and was assumed to be benign,” he says. Nixon’s predecessor, Lyndon B. Johnson, knew of the dangers of climate change and spoke of them in a special message to Congress shortly after his 1965 inauguration. “Air pollution is no longer confined to isolated places,” he said. “This generation has altered the composition of the atmosphere on a global scale through radioactive materials and a steady increase in carbon dioxide from the burning of fossil fuels.” Moreover, a report written by his science advisory committee later that year confirmed the climate threat, describing atmospheric carbon dioxide from fossil fuels as “the invisible pollutant,” and foretelling many of the effects of today, including the melting of the Antarctic ice cap, increasing ocean acidity, and sea level rise. “The climate changes that may be produced by the increased CO2 content could be deleterious from the point of view of human beings,’’ the report said. Indeed, history suggests that concerns about the environment, including climate change, were the province of presidents from both parties; it was a bipartisan issue long before the notion of protecting the environment became identified solely with liberal Democrats, and anathema to conservative Republicans. In fact, “conservation was a cornerstone of GOP doctrine for more than a century,” says Norman J. Ornstein, a resident scholar at the American Enterprise Institute. “The Republican Party was the party of conservation and the environment. Teddy Roosevelt really established that marker for his party. His hunting notwithstanding, he promoted a reverence for nature and preserving public lands. It was a hallmark of progressivism and conservatism.” Theodore Roosevelt’s First Annual Message (as the State of the Union address was then known) outlined his aims to conserve and preserve forests, including the use of forests as wildlife preserves. In 1903, he issued an executive order that established a federally-protected wildlife refuge — the forerunner of the present National Wildlife Refuge System — that set aside Pelican Island on Indian River, Fla., as a preserve and breeding ground for native birds, the first of 53 wildlife sanctuaries he created during his presidency. In 1916, Democratic President Woodrow Wilson signed legislation creating the National Park Service. The Service cares for and safeguards a system that covers 409 areas –- more than 84 million acres — and includes national parks, monuments, battlefields, military parks, historical parks, historic sites, lakeshores, seashores, recreation areas, scenic rivers and trails, and the White House. But Nixon “was probably our greatest environmental president up to now,” says Stephen Hess, a senior fellow emeritus at the Brookings Institution, who served four presidents, including Republicans Dwight David Eisenhower, Nixon, Gerald Ford and Democrat Jimmy Carter. “He was a very environmentally aggressive president, although that’s not what people tend to remember about him.” Nixon signed into law the National Environmental Policy Act, which among other things, required environmental impact statements for major new building projects and developments. He also approved the creation of the Environmental Protection Agency (EPA) and the National Oceanic and Atmospheric Administration (NOAA). He approved extending the Clean Air Act, which gave EPA the authority to regulate air quality. Later, Nixon also approved the Clean Water Act, the Pesticide Control Act, the Marine Mammal Protection Act, and the Endangered Species Act, which replaced and strengthened earlier protections for endangered species initiated during the Johnson Administration. “In that regard, you could say he [Nixon] put in place the machinery that ultimately would deal with global warming,” Hess says. When Democrat Jimmy Carter became president, the energy crisis was burgeoning, gasoline was in short supply, and he spoke of a “crisis of confidence” among Americans in major speech on July 15, 1979 devoted to a discussion about the nation’s dependence on energy and foreign oil. Also, he was the first president to install solar panels on the White House roof. Although they were used to heat water, they were largely symbolic. One of the first things that his successor, Republican Ronald Reagan did upon assuming the presidency, was to remove them. “The Carter administration’s energy concerns revolved around national energy independence, especially in response to the 1973 oil embargo and the second energy crisis in 1979,” says historian Weart. “Renewables were desired mainly because of U.S. vulnerability to oil shortages. If they kept back global warming, that was just a side benefit. There was also a feeling in the 1970s that conservation and solar power represented a ‘small is beautiful’ democratic approach, as opposed to corporate Big Oil and Big Coal.” Weart adds: “It was Reagan who removed the panels — his people despised what they saw as leftist hippy environmentalism.” Thus began the Republican backlash to the environment, which continues today. Reagan appointed Anne Gorsuch to head the EPA, a lawyer who believed the agency was over-regulating business. She cut its budget by 22 percent and reduced enforcement against polluters. Ultimately, she resigned amidst a scandal over mismanagement of the program to clean up hazardous waste dumps. Reagan also named James G. Watt to run the Interior Department, an administrator who was seen by his critics as someone who favored development over preservation. At the same time, the Reagan administration did agree to sign the Montreal Protocol, the international treaty which helped to heal the hole in the ozone layer. His successor, George H.W. Bush, signed the 1990 amendments strengthening the Clean Air Act — sections of which are being used as the basis for most of America’s current climate policy. Democratic President Bill Clinton was pressured to take action on climate change by his vice president, Al Gore, well known for his views on global warming. Yet Clinton knew that “Republicans in Congress would have sunk any legislation, and Clinton had other priorities,” Weart says. “He was unwilling to spend his limited political capital on an issue that would not become acute during his term in office.” Two more sets of solar panels have found their way onto the White House in recent years. In 2003, Republican George W. Bush, while silent on climate change and the environment, nevertheless installed a nine-kilowatt rooftop solar photovoltaic system, as well as two solar thermal systems that heat water. And President Obama installed solar panels on the residence in 2013. Beyond that, however, President Obama has made protecting the environment and combating climate change a significant cornerstone of his presidential legacy. Among other things, he played a major role in helping to secure a global agreement to reduce carbon emissions. He initiated the Clean Power Plan that — if it survives a court challenge — will substantially lessen carbon emissions from power plants. He rejected construction of the Keystone XL oil pipeline. He has set aside millions of acres of public land and waters for conservation protection. And he has promoted energy from renewable sources such as solar and wind. “Obama is our first truly proactive president,” on the environment and climate change, Weart says. “He takes an above-the-fray, long-term view of his responsibilities to the nation and the world.” Marlene Cimons is a freelance writer who specializes in health, science and the environment.
<urn:uuid:04013272-dec7-40be-a2fa-22a3d0a9ab0e>
CC-MAIN-2016-26
http://thinkprogress.org/climate/2016/02/15/3749652/climate-presidential-history/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395546.12/warc/CC-MAIN-20160624154955-00016-ip-10-164-35-72.ec2.internal.warc.gz
en
0.971817
1,877
3.5625
4
Why war? Rome had suffered the greatest defeat in its long history and, as a consequence of that defeat, withdrew to beyond the Rhine. From the point of view of the Germanic tribes a vast success and good prospects now of a peaceful future. But history turned out differently. Conflict between the Romans and the Germanic tribes continued and shaped the events of the following centuries to a considerable degree. After the Romans had withdrawn to defend their borders, it was the Germanic tribes who attacked the Romans and involved them in long-lasting conflict. Why? What motivated Germanic groupings to launch attacks again and again on the Roman Empire and to seek conflict with an obviously superior enemy? The subject of CONFLICT leads us to the site of the Varus Battle and far beyond it. It opens perspectives as far as the 5th century, to a time when the first Germanic kingdoms were coming into being on Roman territory. In the end the Germanic tribes were successful in their struggle against Rome and inherited their onetime world empire. How could that happen, if “the barbarians from the North” were inferior to the Romans in every respect? The cliché ideas of the wild and unruly Germanic tribes which we have nowadays, just as the Romans did, are misleading; if they had simply been “barbarians”, they would certainly not have had a chance against the Romans in the long run. With a large number of outstanding exhibits, the exhibition will trace the path of the Germanic tribes to the summit of power in ancient Europe and present the reasons for their success. Why warfare was their recipe for success can be grasped only when one understands essential features of Germanic society. The many impressive finds assembled for this exhibition will answer the central question: Why war?
<urn:uuid:e4a3babc-b38c-48dc-91d6-1be8abd4906c>
CC-MAIN-2016-26
http://www.imperium-konflikt-mythos.de/ausstellung/konflikt/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393442.26/warc/CC-MAIN-20160624154953-00101-ip-10-164-35-72.ec2.internal.warc.gz
en
0.982447
365
3.46875
3
April is Autism Awareness Month and in celebration and to increase awareness, April 1st and 2nd are Light It Up Blue days. During the Light It Up Blue days, citiies, communities and families are committed to 'Light It Up Blue' to encourage support and participate in the fight for the cure. According to the Autism Speaks website, 'Today, it is estimated that one in every 110 children is diagnosed with autism, making it more common than childhood cancer, juvenile diabetes and pediatric AIDS combined. An estimated 1.5 million individuals in the U.S. and tens of millions worldwide are affected by autism. Government statistics suggest the prevalence rate of autism is increasing 10-17 percent annually. There is not established explanation for this increase, although improved diagnosis and environmental influences are two reasons often considered. Studies suggest boys are more likely than girls to develop autism and receive the diagnosis three to four times more frequently. Current estimates are that in the United States alone, one out of 70 boys is diagnosed with autism.' At this point, there is no cure for autism nor is there a clear indication as to the cause. Foundations such as, Autism Speaks, have been created to raise funds, awareness, and to promote policies to support individuals and families affected by Autism. To learn more about autism and the support effors visit Autism Speaks. To support the cause on April 1st and 2nd, you can: - Wear Blue - Wear or display an Autism Speaks puzzle piece - Make your exterior home and/or office lights blue - Display the Autism pictures/banners on your Social Media profiles - Donate to the Cause Some ways that people are celebrating are: - The Christ the Redeemer statue overlooking Rio de Janeiro, Brazil, turn its lights blue in celebration of World Autism Awareness Day and Autism Speaks’ global Light It Up Blue campaign. - The Empire State Building and Rockerfeller Center in NY will have a special blue lighting the evening of April 1, 2011. - City Hall in Baltimore had a blue lighting ceremony on March 31, 2011 in celebration of Autism Awareness Month. To sign the pledge and learn about events in your area, Visit - www.lightitupblue.org
<urn:uuid:51c6c03c-f33a-4752-a9a4-edb4c83cb1b7>
CC-MAIN-2016-26
http://www.examiner.com/article/light-it-up-blue
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393442.26/warc/CC-MAIN-20160624154953-00123-ip-10-164-35-72.ec2.internal.warc.gz
en
0.951495
460
3.078125
3
The 1790 Census of Orangeburgh District Orangeburgh District was created in 1769 as one of the seven original districts of South Carolina. It covered a huge part of the state, encompassing 4,540 of South Carolina’s 31,189 square miles. When the first Federal census was taken in 1790 the district was divided into a north part and a south part, each covered by one enumerator. The dividing line between the two areas followed no designated jurisdictional lines but ran along the North Fork of the Edisto River (where the North and South Fork came together) to the village of Orangeburg. From there it crossed the North Edisto and followed the road that ran to Ninety Six between the North and South Forks of the Edisto. So, if your ancestor appeared in the 1790 census of Orangeburgh District, how can you tell more specifically where he lived? This is the first in a series of postings I will be doing about household locations in the 1790 census, similar to those I am doing for other early enumerations. I have assigned household numbers for this first census, similar to what I’ve used for the 1800 through 1820 and 1840 Orangeburgh District enumerations. I have not yet published a listing of the 1790 census with the household numbers but plan to do so once I identify the areas that later became Barnwell and Lexington Districts. Bear with me; this is a big task but I have to start somewhere! The household locations shown on the drawing below are based on plats that were located relative to the 1845 survey shown on my blog entry of February 20, 2012. Other survey plats in the neighborhood confirm the locations of these but have not been included in the drawing to keep it easier to read. Note: Polk Swamp was originally called Poke Swamp, through at least 1825 when Mill’s Atlas was published. The name evolved to Polk Swamp by the early twentieth century (Bowman 1921 15 minute quadrangle topographic map). Tags: Polk Swamp
<urn:uuid:1e6cdb2c-496c-43ed-962f-b37decf8c656>
CC-MAIN-2016-26
http://orangeburghplats.com/the-1790-census-of-orangeburgh-district/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783394605.61/warc/CC-MAIN-20160624154954-00109-ip-10-164-35-72.ec2.internal.warc.gz
en
0.969465
418
2.796875
3
Barna, Arpad; and Dan Porat. Introduction to Microcomputers and Microprocessors. John Wiley and Sons, NY 1976; 108 pages, diagrams, index. Condition: Good+ overall, blue hardcover, no dustjacket; ex-university library label on lower front cover, pocket and stamps inside rear cover. Binding is sound and secure, pages clean and unmarked. Keywords: Introduction to Microcomputers and Microprocessors, assemblers loaders data structures, microcomputers in the 1970s, computer programming in the 1970s, Machine-Language Instructions, Assembly-Language Instructions Categories: Hardware, Microcomputers, Programming and Programming Languages, Assembly and Machine Language Item no. M620
<urn:uuid:3ee74058-e89d-4599-99d1-2a3954f0dce6>
CC-MAIN-2016-26
http://www.oldcomputerbooks.com/pages/books/M620/arpad-barna-dan-porat/introduction-to-microcomputers-and-microprocessors
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403502.46/warc/CC-MAIN-20160624155003-00068-ip-10-164-35-72.ec2.internal.warc.gz
en
0.771733
153
2.578125
3
Product: When Winter Comes Category: Winter Thematic Unit (Integrating Literature in the Classroom) - Winter Books for Kids Student Level: toddler, preschool, kindergarten, elementary When Winter Comes by Nancy Van Laan, Susan Gaber (Illustrator) A perfect choice picture book for a winter teaching unit. Colorful illustrations and rhyming text alternate questions with answers. For instance, the answer to the question about catepillars is given as: Inside their cocoons, so tightly wound, waiting for spring to bring green to the ground. There is also a question and answer for flowers, songbirds, field mice, deer, and fish.
<urn:uuid:b23de032-2bd6-43d6-9f93-ea632c746969>
CC-MAIN-2016-26
http://www.apples4theteacher.com/holidays/winter/kids-books/when-winter-comes.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397696.49/warc/CC-MAIN-20160624154957-00108-ip-10-164-35-72.ec2.internal.warc.gz
en
0.841064
142
3.609375
4
Colon Cancer Ancestors Found Researchers Trace Gene Mutation Back to an English Couple Who Were Colonists Jan. 4, 2008 -- Colon cancer's family tree may date back to Pilgrim days, and that lineage may help save lives in the U.S. today. University of Utah researchers have tracked a gene mutation linked to colon cancer risk back to an English couple that sailed to colonial America before 1640. The couple -- whose names aren't published in the researchers' report -- were born in England in the 1590s, married in 1615, and arrived in America with at least two children "some time before 1640," write Deborah Neklason, PhD, and colleagues. Many generations later, that couple has thousands of descendants. For instance, more than 5,200 people living in Utah today are related to that couple, and many more North American families may share that heritage. The gene glitch in question makes polyps -- colorectal growths that may or may not become cancerous -- more likely at a younger age, before colon cancer typically starts. Neklason's team suggests that " genetic testing should be considered" for people with a family history of 10 or more colon polyps. An aggressive education and clinical intervention program among the couple's Utah descendants may have prevented seven colon cancers, according to Neklason. "Preventing seven cancers may not sound like much," Neklason says in a University of Utah news release. "But that's seven colon cancers that didn't devastate this family." Neklason's report appears in Clinical Gastroenterology and Hepatology. No matter where your family comes from, cancer experts recommend starting colorectal cancer screening at age 50, or sooner for high-risk patients
<urn:uuid:b4b2a1ce-273f-48ca-bbbd-340ddd67e7d0>
CC-MAIN-2016-26
http://www.webmd.com/colorectal-cancer/news/20080104/colon-cancer-ancestors-found
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399428.8/warc/CC-MAIN-20160624154959-00193-ip-10-164-35-72.ec2.internal.warc.gz
en
0.945311
368
3.265625
3
*Note: The Interactive Constitution is being developed over the course of the next two years. So far, Amendments 1-15 have Interactive content, and we are working on bringing you Interactive content for this Amendment. In the meanwhile, the interpretation below is supplied by the Annenberg Classroom. Amendment XXVI gives young adults between the age of eighteen and twenty-one the right to vote. The measure is another in a line of constitutional changes that expanded the right to vote to more citizens. At the time of the ratification of the Constitution in 1788, most states limited voting to white, male citizens who were over the age of 21. It took 82 years for African American slaves to gain a constitutional right to vote, 132 years for women’s suffrage and 183 years for those 18 to 21 years old to join the voting population. The impetus for this change was the passage of amendments to the Voting Rights Act in 1970 that set 18 as the minimum voting age for both federal and state elections. But when the Supreme Court ruled in Oregon v. Mitchell that the law applied only to federal, not state elections, Congress adopted Amendment XXVI and states quickly ratified it on July 1, 1971.
<urn:uuid:607ddd64-c504-49c3-84a0-180117102f52>
CC-MAIN-2016-26
http://constitutioncenter.org/interactive-constitution/amendments/amendment-xxvi
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396100.16/warc/CC-MAIN-20160624154956-00057-ip-10-164-35-72.ec2.internal.warc.gz
en
0.958233
244
3.9375
4
Another term for equiangular spiral. - Kollerstrom took us on a journey through sacred geometry, symmetry, fractals, latent pentagrams and logarithmic spirals, illustrated with aerial shots of his favourite crop circles. - He also investigated caustic curves and in particular he studied these associated curves of the parabola, the logarithmic spiral and epicycloids around 1692. - He exhibited the logarithmic spiral as the stereographic projection of a loxodrome on a sphere, a projection he proved to be conformal. For editors and proofreaders Line breaks: loga|rith¦mic spiral Definition of logarithmic spiral in: What do you find interesting about this word or phrase? Comments that don't adhere to our Community Guidelines may be moderated or removed.
<urn:uuid:c4d15c8e-852e-4e49-a0b8-351da1a436b8>
CC-MAIN-2016-26
http://www.oxforddictionaries.com/definition/english/logarithmic-spiral
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783400572.45/warc/CC-MAIN-20160624155000-00028-ip-10-164-35-72.ec2.internal.warc.gz
en
0.910585
180
2.96875
3
Believe it or not, most kids never report getting bullied. Not to their parents and not to their school. So what's a parent to do? Take control of the situation before it gets to be a problem by becoming your child's bully coach! STEP ONE: Kids don't report getting bullied for lots of reasons but the biggest reason may be the saddest: targets of bullying almost always blame themselves. Parents should bring up the subject of bullying by making it crystal clear that NO ONE deserves to be bullied, no matter how imperfect or flawed they may be. Not even bullies deserve to be bullied. One of the best ways to teach your child not to blame themselves is to point out a universal truth: bullies do what they do because it makes them feel good. And anyone who takes pleasure out of being mean to another person deserves our pity. Because taking joy from hurting someone else is as low as you can go as a human being, and anyone who does that must be very, very damaged on the inside. Casting the bully in the light of someone people should feel sorry for lets a child begin to think of the bully as the one who has a major problem, not them. This realization does two things: first, it helps kids to stop responding in an angry or upset way, which is the kind of reaction bullies thrive on, and secondly, it makes room in your child's brain to start viewing the bullying in a dispassionate, intellectual way. Reaching this stage of the game is literally half the battle. STEP TWO: Remind your child how important it is to be aware of the power of their "native tongue," regardless of what language they speak. Body language is the only language that's already hard-wired into our brains at birth, and without the ability to gauge another person's words within the context of their body language, their meaning can easily get misinterpreted. That's why kids need to be reminded that what they say isn't anywhere near as important as the way they say it. When standing up to a bully, appearances count for everything. The statement, "You think you're cool but you're just a bully!" won't deter a bully if the speaker has hunched shoulders, fails to make eye contact, or is using a whiny tone of voice. Bullies can spot the kind of body language that telegraphs, "I'm not feeling sure of myself!" at 500 paces. On the other hand, a child who stands just a little to close to the bully, with their shoulders squared, and making strong eye contact while saying, "Watch it!" is going to make a much stronger impression on the bully, even though their actual words may not be particularly eloquent. STEP THREE: When kids come up with their own ideas for deflating bullies, they're not only more likely to remember them, they're more likely to implement them, too. Now that your child understands how important body language is, help them come up with their own snappy comebacks by making a game out of it. Start by brainstorming together with a "no holds barred" approach. Encourage them to suggest as many responses as they can before you start winnowing down the unsuitable ones. The ones that make the grade are safe to use, aren't terribly hurtful, and are easy to recall. (The truth is that the exact words don't matter nearly as much as the way your child is delivering them.) If your child has trouble getting started, it's OK to suggest simple responses such as, "So?" When a target just keeps repeating, "So?" while looking bored, it's demoralizing for the bully because now they're the one who's starting to look pretty uncool. STEP FOUR: Practice role-playing games with your child by taking the role of the target while your child takes the role of the bully. This approach has two advantages: First, kids feel reluctant to take the role of the target when they aren't very good at it yet. And second, the best way to learn something is to teach it to someone else. Make sure you let your child know that you're depending on them to point out any mistakes you might make, whether it's forgetting to make eye contact, whining, or slouching. By being the kind of target who makes every mistake in the book, you're affording your child many opportunities for learning how not to respond to a bully. When your child has "mastered" what not to do, and has a few comebacks of their own for responding to the bully, then you can safely switch roles. Remember: nothing improves a child's hearing like praise! Be generous with complimenting everything your child does right. STEP FIVE: Sometimes a bullying situation has gone on so long that your child simply doesn't have enough self- confidence to confront the bully without help from an adult. That's why it's an excellent idea to teach your child the 5 W's of reporting bullying: who, what, when, where, and most importantly, witnesses. When schools can corroborate a student's claims of being bullied by independently and discreetly interviewing bystanders who saw what happened, it's no longer a question of expecting the school to take your child's word against the bully's. Letting the truth come out benefits all concerned: the school's reputation for fairness is enhanced, targets develop more self-confidence, and bullies learn that it's really not cool to bully others. Bullying is universal. Even worse, bullies don't disappear after their school years, they simply reappear in the workplace. It's like the old Chinese proverb: Give a man a fish and you feed him for a day. Teach him how to fish and you feed him for a lifetime. By teaching children how to deal with a bully, we're protecting them for a lifetime. •Jackie Humans' expertise on the topic of bullying is based on her own experience with being bullied as a child, both at home and at school, her experience with raising a child diagnosed with Asperger Syndrome and her work with Child Abuse Prevention Services (CAPS). She is a well-known speaker and program leader to parents and students, grades K though 12, on subjects such as bully prevention, Internet safety, sexual harassment, date rape and child abuse. Dr. Humans is also a recent graduate of the Workplace Bullying Institute, the only organization in the United States that trains individuals how to present anti-bullying programs for bullying in the workplace. She is the author of "How to ZAP a Bully!" For more information, visit JackieHumans.com.
<urn:uuid:12b25831-6f53-4e6b-b08d-d953b0b2c5c9>
CC-MAIN-2016-26
http://www.dailyherald.com/article/20110518/news/705189991/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391519.0/warc/CC-MAIN-20160624154951-00183-ip-10-164-35-72.ec2.internal.warc.gz
en
0.973577
1,364
2.921875
3
What to Learn Help to Remember What to Learn |Solve systems of linear equations, in two The intersection of the graph of two linear equations is the point(s) of intersection between the two lines. NOTE: The fastest and easiest method of graphing is using the slope-intercept method (y=mx+b). There are 3 types of solutions to systems of linear relations: Note: If there are no solutions, the system is inconsistent. If there is at leason one solutions, the system is either independent or dependent. Linear Systems Interactive Activity Focus attention on the y = mx + b form for LINE ONE and LINE TWO. Process for a system of 2 linear equations using the variables c and d: Process for a system of 2 linear equations using the variables x and y: Sample solution: In this case the system of 2 equations can be added to eliminate y. Process for a system of 2 linear equations using two variables: - Pick a variable to eliminate. Take a close look as one choice will likely make the solution simpler. - Decide what the common multiple is for the coefficients of the two variables. - For 4x and 8x, the common multiple will be 8x. - For 2a and 3a, the common multiple will be 6a. - Determine the factor needed to multiply by to make a new equation that will have the common multiple for the variable selected. - Create new equation(s) my multiplying by the factor(s) determined. - Add or subtract the new system of equations to eliminate one of the variables. - Isolate the remaining variable in the sum. - Use the isolated value to determine the value of the second variable. - Check your work. - Report the answer as an ordered pair (x, y) Sample solution 1 (One Step) In this case multiply the first equation by 2. Subtract second equation from this new equation this new equation to eliminate x. Sample solution 2 (Two Step) In this case multiply the first equation by 2 and the second equation by 3. Subtract the fourth equation from the third equation to eliminate a. Parts of this work has been adapted from a Math 20 Pure learning resource originally produced and owned by Alberta Education.
<urn:uuid:5ed7ce53-a74c-461d-b116-b12f332ac8f7>
CC-MAIN-2016-26
http://staff.argyll.epsb.ca/jreed/math20p/relations/linearEqualities2.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399425.79/warc/CC-MAIN-20160624154959-00147-ip-10-164-35-72.ec2.internal.warc.gz
en
0.887807
478
3.765625
4
Last month, I wrote about creativity and pointed out two ways to spark your creativity — relax, and look at things in a fresh way. As I was researching that editorial, I kept coming across another creativity booster: fun. The notion of having fun, of playing, at work might seem dangerous to chemical engineers, given our need to ensure the constant safety and security of facilities that handle some pretty hazardous materials. Indeed, next month Pete Lodal explains how to implement process safety by taking the FUN out of it. But creativity is essential in engineering. The American Engineers’ Council for Professional Development (the predecessor of the Accreditation Board for Engineering and Technology) defined engineering as: “the creative application of scientific principles to design or develop structures, machines, apparatus, or manufacturing processes … as respects an intended function, economics of operation, or safety to life and property.” There are many ways to nurture our creativity, and play is an important one. The National Institute for Play is a nonprofit corporation that “unlocks the human potential through play in all stages of life using science to discover all that play has to teach us about transforming our world.” Its founder, Stuart Brown (who trained in general and internal medicine, psychiatry, and clinical research), points out that play can lower stress levels and boost optimism, and that animal studies have shown that engaging in play opens up new neural connections in the brain, leading to greater creativity. Lest the boss look down on you for wanting to have a little fun, remind him or her that play benefits the employer as well. In the report “Play as a Competitive Advantage,” published by JWTIntelligence, Brown says, “The advantage of a playful person or a playful company process is that they’re much more nimble. They’re really able to enter a competitive scene with lightness and with an ability to respond wisely to the challenges,” including unexpected economic or market changes. Tim Brown, CEO of innovation and design firm IDEO, emphasizes in a TED Talk that the timing of play is important. Designers, he says, go through two very distinctive modes of operation: divergence, “a sort of generative mode, where we’re exploring many ideas,” and convergence, where a solution is identified and developed. “It’s probably in the divergent mode that we most need playfulness. Perhaps in convergent mode we need to be more serious. … Being able to move between those modes is really quite important.” As engineers, we spend much of our time on convergent thinking — logical reasoning and analysis that enable us to converge on an answer to a problem and then implement a solution. But this needs to be preceded by divergent thinking — where we allow our thoughts to diverge, to explore many possible solutions and generate the creative ideas that our convergent selves will analyze, refine, and implement. It seems obvious to me that to be better engineers, we need to make time to play and have fun at work. Join me in celebrating January 28 as National Fun at Work Day (in the U.S.). Dozens of websites offer suggestions on how to have fun at work, and a chapter in the JWTIntelligence report spotlights companies that have integrated play into their business models. With AIChE’s focus on being the global home of chemical engineers, I’ll also celebrate April 1 — International Fun at Work Day. Cindy Mascone is Editor-in-Chief of Chemical Engineering Progress, AIChE’s member magazine. She has more than 25 years of experience as a technical editor and writer, including four years as the head of her own freelance consulting business, Engineered Writing. Previously, she worked for the U.S. Environmental Protection Agency in the Office of Air Quality Planning and Standards. She holds a BS in chemical engineering and engineering and public policy from Carnegie Mellon Univ., and has been an active member of AIChE and Society of Women Engineers.Read more Would you like to reuse content from CEP Magazine? It’s easy to request permission to reuse content. Simply click here to connect instantly to licensing services, where you can choose from a list of options regarding how you would like to reuse the desired content and complete the transaction.
<urn:uuid:d8500d7a-5d1e-4b8a-b239-8113b03d8e07>
CC-MAIN-2016-26
http://www.aiche.org/resources/publications/cep/2014/january/cep-editorial-chemes-just-need-have-fun
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396875.58/warc/CC-MAIN-20160624154956-00042-ip-10-164-35-72.ec2.internal.warc.gz
en
0.955506
920
2.515625
3
China's rice output is No 1 in the world, accounting for 33 percent. China currently produces approximately 500 million tons of rice annually. With its population expected to grow to 1.6 billion by 2020, 630 million tons of rice will be needed. China is investing more than 20 billion yuan (US$3 billion) in genetically modified crops and research. Officials said that by 2020, the country could be a leader in genetically modified foods, cloning, large-scale transgenic technology and new breed promotion. Rice and corn are the foods nearest commercialization. Chinese technologies in genes transfer rice also have a leading role and one type of genetically modified corn, developed by Fan Yunliu, a fellow of the China Agricultural Science Institute, has huge market potential. The Chinese government is considering putting genetically modified corn and rice into commercial production. If planted, the growing of genetically modified rice would benefit 110 million farmers, adding $100 to the net income of each household. China has launched a big project to cultivate new genetically modified plants with the purpose of obtaining a series of projects with application value and autonomous intellectual property rights. This project is to develop new genetically modified genes that produce increased yields of high quality plants that are pest-resistant. China has also decided to spend $9.5 billion by 2013 to reinforce 21,300 small and medium-sized water reservoirs as well as restore some 25,000 reservoirs, additionally. China will breed its own high-yield seeds and set up large seed companies to help ensure the country's food security in coming decades. The State Council, China's cabinet, said in a statement that the world's largest grain producer aims to breed new seeds using China's own biotechnology and set up large seed-breeding bases by 2020. Scientists said the move may work against the expansion plans of foreign companies such as DuPont (DD.N) that have taken a large share of China's corn seed market. "The country will focus development on hybrid rice and corn -- particularly corn, where Pioneer already has a large share of the market and domestic seed firms are failing to compete," said one Chinese seed-breeding scientist. "The government's concerns are grain security and how to boost farmers' incomes. Scientists said genetically modified (GMO) seeds would not be a priority for Beijing for at least five years. Public debate over the safety of GMO food coupled with a long approval process meant China may not rush to use GMO seeds widely in the near term. "(Development of) non-GMO seeds will still play a key role in boosting grain production in the coming five years," Huang Dafang, a researcher with the Biotechnology Research Institute of the Chinese Academy of Agricultural Science. So China will roll out genetically modified rice and corn after 2013 from domestic seeds on a large scale. Large-scale production of two insect-resistant rices will occur in 2011 in Hubei province, one of the major rice production regions in China. Two varieties, called Huahui 1 and Bt Shanyou 63, received clearance and should be launched within the next two years. Both contain “Bt” proteins from the Bacillus thuringiensis bacterium to protect them against the rice stem borer, the most serious rice pest in China If you liked this article, please give it a quick review on ycombinator or StumbleUpon. Thanks
<urn:uuid:cc3e6a9f-cd9e-4268-9af5-01095ecec462>
CC-MAIN-2016-26
http://nextbigfuture.com/2011/03/china-will-roll-out-genetically.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395560.69/warc/CC-MAIN-20160624154955-00076-ip-10-164-35-72.ec2.internal.warc.gz
en
0.948065
693
2.921875
3
Contact : Elizabeth Dubot, 06.61.00.18.20 An international campaign is being launched to target one of the world's leading airlines Air France-KLM, who are also the principal transporter of primates destined for research laboratories. The campaigners have given Air France-KLM until March 21st, 2011 to change their policy and to announce that it has ended the transport of animals for the research industry. http://airsouffrance.fr/ All over the world animal protection organisations opposed to animal experimentation are preparing to join a new campaign against the transport of laboratory animals. Air France-KLM has been the focus of many animal protection groups for a long time but, thanks to the various networks on Internet, alliances have been created around a common campaign. Encouraged by recent successes against British Airways, Pakistan International Airlines, El Al and Amerijet International, anti-vivisection campaigners are now calling on Air France-KLM to join the roughly fifty airline companies that have already made the ethical choice not to actively support animal experimentation by transporting animals destined for research laboratories. Each year, of tens of thousands of primates are transported throughout the world. Air France-KLM is currently the principal transporter from Mauritius, the Caribbean and Asia to Europe and the USA. Many primates are ripped from their natural environment and are used for highly invasive experiments, often in research on the diseases of the brain. However, a human neuro-degenerative disease, largely influenced by our lifestyle and the hundreds of toxic substances present in our blood, cannot be recreated in another species of animal. One does not need to be a scientist to understand that these experiments are not effective and cannot be accurately related to human beings. There are many examples that testify to the unreliability of the animal model when applying the results to human beings. For example, despite the fact that chimpanzees share 98,7% of their DNA with human beings, they've proved to be poor models for biomedical research. There are also many major differences between the infections and viral diseases of non-human primates and those of the human beings, especially as these diseases are artificially induced in the animal subjects, and this makes the results incomparable with those of the diseases which develop naturally in the human body. Primates do not develop the symptoms of AIDS when they are infected with HIV and they are naturally immune to common malaria. In addition, primate experimentation has not made it possible to understand the infection of the virus of hepatitis C. Primates also do not develop the same forms of cancer as human beings. Certain researchers base on biological coincidences inter-species to make it clear that the animal model would resemble the man sufficiently: however “to resemble” is not a sufficiently scientific verb when referring to safety testing of toxic substances for human consumption and development of new therapies for human illness. Primates of Vietnamese origin have even been shown to provide exactly the opposite results to certain stimuli than those provided by their cousins who originated in Mauritius. According to a study carried out by British Union Against Vivisection (BUAV), eight out of ten macaques captured in the wild die before even reaching the laboratory. They can be killed during their trapping but it is especially common that they die as a result of stress caused by their captivity. The flights which animals are subjected to are also extremely stressful and the animals often receive inadequate care during stopovers. A voyage can last up to 60 hours. The Coalition Anti Vivisection France, supported by groups from the Netherlands, Italy, Great Britain, Ireland, Israel and the United States, calls on Air France-KLM to cease the transport of animals intended for the laboratories. The airline company has until March 21st, 2011 to announce its decision to the CAVF. Starting from this date, and in the case of absence of a positive response, the campaign will be officially launched with public demonstrations, media actions and an information campaign directed at their customers. The open letter has been published on the site of the Coalition Anti Vivisection France (http://cav.asso.fr/en/20110308_lettre-ouverte-air-france.html) and was sent by name to: Jean-Cyril Spinetta, chairman of the board of Air France and KLM Air France Leo Mr. van Wijk, vice-president of the board of directors of KLM Air France Pierre-Henri Gourgeon, managing director of Air France and KLM Air France Peter F. Hartmann, royal chairman of KLM Dutch Airlines The Coalition Anti Vivisection France (CAVF) is an association covered by the law of 1901, and whose goal is to denounce the irrelevance and cruelty of animal experimentation and to promote an ethical science, which is modern and effective. Their Internet site: http://cav.asso.fr/en Air Souffrance is a campaign targeting the airline companies who transport animals destined for laboratories. It is comprised of many groups and individuals united in one common objective: http://airsouffrance.fr/en annoncer qu'elle renonce à participer au commerce de cobayes. http://airsouffrance.fr In January 2010, a survey conducted by infiltrators in Primate Products, showed photographs of monkeys undergoing experiments. The director, Don Bradford, confirmed that these images were taken inside Primate Products, and that these primates were still alive. A captive monkey.
<urn:uuid:c1f5ef68-89de-4ae0-bfb0-7eea427cc1a1>
CC-MAIN-2016-26
http://www.airsouffrance.fr/en/air-france/20110314_press-release.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397865.91/warc/CC-MAIN-20160624154957-00189-ip-10-164-35-72.ec2.internal.warc.gz
en
0.949932
1,126
2.5625
3
Preparation Material for the Home-Study Teacher Summary of Daily Home-Study Lessons The following summary of the events, doctrines, and principles students learned about as they studied Doctrine and Covenants 129–131; 132:1–33 (unit 28) is not intended to be taught as part of your lesson. The lesson you teach concentrates on only a few of these doctrines and principles. Follow the promptings of the Holy Spirit as you consider the needs of your students. As students studied some of the teachings of the Prophet Joseph Smith, they learned that true messengers sent from Heavenly Father will not deceive us. They also discovered doctrines pertaining to the members of the Godhead. Students learned that the relationships we can have in heaven are the same as those we enjoy on earth, but they will include eternal glory. Day 2 (Doctrine and Covenants 130:12–21) In this lesson students learned the following principles: Only God knows the exact time of the Second Coming. The knowledge and intelligence that we gain in this life will rise with us in the resurrection. If we want to obtain a blessing from God, then we must obey the law upon which it is predicated. Day 3 (Doctrine and Covenants 131) As students studied Doctrine and Covenants 131, they discovered that in order to obtain the highest degree of the celestial kingdom, we must enter into the new and everlasting covenant of marriage. Students also learned the meaning of the phrase “more sure word of prophecy” and learned about the nature of our spirits. Day 4 (Doctrine and Covenants 132:1–33) In this lesson students learned that when a covenant is made through priesthood authority and is sealed by the Holy Spirit of Promise, it will last forever. They also learned that if a man and a woman abide in the new and everlasting covenant of marriage, then they will have an eternal increase of posterity. Students studied Doctrine and Covenants 132:1–33 in their day 4 lesson. Today’s lesson can help them better understand all of Doctrine and Covenants 132 and the principle of plural marriage. Students will also increase their understanding about why plural marriage was practiced in the past. Note: Students learned two scripture mastery passages in this unit: Doctrine and Covenants 130:22–23 and Doctrine and Covenants 131:1–4. At the beginning of this lesson, consider inviting half of the class to explain what they have learned from the first passage and the other half of the class to explain what they have learned from the second. Suggestions for Teaching The Lord sets forth the conditions of the new and everlasting covenant and reveals the principle of plural marriage Before class, write the following questions on the board: Why is eternal marriage important to you? What will you do, beginning today, to prepare yourself to enter the temple and be married for time and all eternity? What blessings can come in this life to those who obey God’s law to be sealed in the temple? Invite students to ponder these questions as they study Doctrine and Covenants 132 today. Explain that while the Prophet Joseph Smith was working on the inspired translation of the Old Testament in 1831, he read about some of the ancient prophets practicing plural marriage (also called polygamy). Under this practice, one man is married to more than one living wife. The Prophet studied the scriptures, pondered what he learned, and eventually took his questions about plural marriage to Heavenly Father in prayer. Write Genesis 16:1–3 on the board. Explain that these verses describe the actions of Sarai and Abram, later known as Sarah and Abraham. Invite a student to read these verses aloud. Ask the class to follow along and think about any questions they might have about this event in Abram and Sarai’s life. Invite students to read Doctrine and Covenants 132:1 silently, looking for what the Prophet Joseph Smith asked as he studied passages in the Old Testament concerning the practice of plural marriage. Ask students to report what they find. (You may want to explain that the word concubine is a term used to describe women in the Old Testament who, in the time and culture in which they lived, were lawfully married to a man but had a lower social and legal status than a wife. Concubines were not part of the practice of plural marriage in our dispensation.) Write the following question on the board: Why would the Lord command righteous men and women to obey the principle of plural marriage at certain times? Explain that in their study of Doctrine and Covenants 132, students can find answers to the question on the board and other questions they may have concerning plural marriage. Invite them to write down the truths they discover during their study today. Invite a few students to take turns reading aloud from Doctrine and Covenants 132:34–36. Ask the class to follow along, looking for why Abraham and Sarah began to practice plural marriage. According to verse 34, why did Sarah give Abraham another wife? What does this teach us about the principle of plural marriage? (As students respond, write the following principle on the board: Plural marriage is approved of the Lord only when He commands it. To help students understand this principle, you may want to ask them to read Jacob 2:27, 30. You might also suggest that they write this reference in their scriptures near Doctrine and Covenants 132:34.) Invite a student to read Doctrine and Covenants 132:37–38 aloud. Ask the class to follow along, looking for phrases that describe instances when the Lord commanded the practice of plural marriage. Ask students to report what they find. Summarize Doctrine and Covenants 132:39, 41–43 by explaining that the Lord affirmed that when people practice the principle of plural marriage according to His commandment, they are not guilty of the sin of adultery. However, if anyone practices plural marriage under any circumstances that the Lord does not command, they are guilty of adultery. (Note that the word destroyed in verse 41 indicates that those who violate their sacred covenants will be separated from God and from His covenant people [compare Acts 3:22–23; 1 Nephi 22:20].) Invite students to read Doctrine and Covenants 132:40 silently, looking for what the Lord said He was going to do. Ask students to report what they find. Explain that “all things” refers to the laws and ordinances of the gospel that had been revealed in previous dispensations. Write the following principle on the board: The commandment to live the law of plural marriage in the latter days was part of the restoration of all things. (See also Acts 3:20–21.) Invite a student to read Doctrine and Covenants 132:45, 48 aloud. What do we learn from these verses about plural marriage? (As students respond, write the following principle on the board: Plural marriage can be authorized only through the priesthood keys given to the President of the Church.) Explain that early in this dispensation, as part of the restoration of all things, the Lord commanded some of the early Saints to practice plural marriage through the priesthood keys held by the Prophet Joseph Smith and subsequent Presidents of the Church—Brigham Young, John Taylor, and Wilford Woodruff. In 1890, President Woodruff, acting with those same priesthood keys, received revelation that the practice of plural marriage should end (see Official Declaration 1). The Lord counsels Joseph and Emma Smith concerning plural marriage Explain that the Prophet Joseph Smith was reluctant to begin the practice of plural marriage. He stated that he did not begin the practice until he was warned that he would be destroyed if he did not obey (see “Plural Marriage,” Historical Record, May 1887, 222). Because of a lack of historical documentation, we know very little about his early efforts to comply with the commandment. However, by 1841 the Prophet obeyed the commandment, and over the next three years he married additional wives in accordance with the Lord’s commands. The Prophet Joseph Smith’s obedience to the Lord’s commandment to practice plural marriage was a trial of faith for him and his wife Emma, whom he loved dearly. Summarize Doctrine and Covenants 132:49–56 by explaining that the Lord counseled Joseph and Emma Smith and promised them blessings if they would obey the principle of plural marriage. Explain that in 1841, the Prophet Joseph Smith began to teach other faithful men and women the principle of plural marriage. Although these faithful Church members initially were hesitant and frustrated about the command, they received individual confirmations through the Holy Ghost and accepted the principle of plural marriage. Read Doctrine and Covenants 132:63 aloud, beginning with the phrase “for they are given unto him.” Before you read, explain that this verse helps us understand one reason why the Lord commanded Joseph Smith and others to practice plural marriage. Ask the class to follow along, looking for that specific purpose. After you read, write the following principle on the board: The Lord has at times instituted plural marriage to provide further opportunities for His people to raise up children unto Him. (You may want to refer again to Jacob 2:30.) What does it mean to “multiply and replenish the earth”? (To have children.) How does having children allow parents to be part of the continuing work of Heavenly Father? Refer to the question you wrote on the board near the beginning of the lesson: Why would the Lord command righteous men and women to obey the principle of plural marriage at certain times? You may want to invite students to summarize for the class what they have learned from their study of Doctrine and Covenants 132 and Jacob 2:27, 30 that helps them answer this question. Conclude by sharing your testimony of the Prophet Joseph Smith and that he received and obeyed revelation from God (see D&C 132:37). Next Unit (Doctrine and Covenants 133–135) Ask students what they would do if they had to choose between going to their death or fleeing those who sought to kill them. What if choosing to face death could save the lives of your family, friends, and hundreds of others? Would you do it? The Prophet Joseph Smith willingly chose to face death, saying, “I am going like a lamb to the slaughter; but I am calm as a summer’s morning” (D&C 135:4). Students will read about the martyrdom of the Prophet Joseph Smith in the next unit.
<urn:uuid:b0362ba3-f2e9-45f7-ba2e-83c0c5783f0f>
CC-MAIN-2016-26
https://www.lds.org/manual/doctrine-and-covenants-and-church-history-seminary-teacher-manual-2014/section-6/home-study-lesson-doctrine-and-covenants-129-132-unit-28?lang=eng
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396887.54/warc/CC-MAIN-20160624154956-00197-ip-10-164-35-72.ec2.internal.warc.gz
en
0.963979
2,188
2.890625
3
Southern Region Viewing Area LOCATION and PHOTOS * Barnes, T.G., and S.W. Francis. 2004. Wildflowers and ferns of Kentucky. University Press of Kentucky. Rock Bridge Trail Forest: Daniel Boone National Forest District: Cumberland Ranger District Description: Rock Bridge Trail is a 1.4-mile loop trail that traverses a variety of habitats from xeric uplands to mesic streamside. The area is at the southeast corner of the Red River Gorge Geological Area famous for its cliffs and vistas. Upland sites have forests of pitch and shortleaf pine and various oaks with a variety of ericaceous shrubs such as blueberries and mountain laurel beneath. It is common to find catbriar and sawbriar thickets off the trail. Upland sites are usually rocky with thin sandy soils. Vegetation in this harsher environment is usually woody, but some herbaceous species are present. More mesic forests include yellow-poplar, eastern hemlock, eastern white pine, sugar maple, beech, and black birch. Shrubs found in this moister environment include spicebush, pawpaw, and mountain pepperbush. Herbaceous species are common in the mesic areas throughout the growing season. Sandstone and conglomerate cliffs are abundant in the Rock Bridge area and the trail works its way over and along cliffs in the descent from upland to streamside. Wildflower viewing: While wildflowers can be found along this trail any time during the growing season (late March/early April to frost in mid-October), the most spectacular show is in spring. Upland site species include pink lady's-slipper, dwarf iris, trailing arbutus, teaberry, and spotted wintergreen. In late spring/early summer, mountain laurel, great laurel, several blueberries (Vaccinium pallidum, V. stamineum, V. corymbosum), and a huckleberry (Gaylussacia baccata) provide their floral colors. One might find a persimmon in flower as well. Trailing arbutus and partridgeberry are frequently found along cliffs. Where moisture is more abundant in places along the base of the cliffs, sweet white violet (Viola blanda) is often present. In the mesic forest area, one can find large white trillium, red trillium, false rue anemone, bellwort, large-flowered chickweed, foamflower, wild ginger, Canada violet, spurred violet, hepatica, and purple phacelia. Near an old house site along Rock Bridge creek, one may see a carpet of blue phlox, and golden Alexanders. In some years, a large patch of pawpaws in the area is in bloom. Also in this general area there is a natural arch by the stream. Along the creek, there is usually a good showing of yellowroot (Xanthorhiza simplicissima) with its delicate yellow-tinge purple star-shaped flowers. Numerous grasses (native bluegrasses, genus Poa), woodrushes (Luzula) and sedges (Carex) are also present. In a few places, Viola cucullata, the marsh blue violet can be found at the edge of or in small streams. During summer and early fall, joe pye-weeds, tall meadow rue, goldenrods, and cardinal flower are found in a boggy area near the old homesite. Several hawkweeds (Hieracium venosum, H. paniculatum, H. gronovii), greater tickseed (Coreopsis major), false dandelion, rabbit tobacco (Antennaria plantaginifolia) and native lespedezas (Lespedeza virginica, L. repens) can be found in the drier upland areas. Safety First: Primarily of concern is the presence of high cliffs. The trail through/over the cliffs is generally good and includes hand cut stone steps from the CCC days, although footing is rough in some places. Off the trail, encountering cliff is a distinct possibility and care should be taken to watch footing especially near cliffs. There are sections of the trail that are usually wet and even muddy so hiking boots are recommended. Both timber rattlesnakes (uncommon) and copperheads are poisonous snakes in the area. Mosquitoes and black flies are frequently encountered during summer. Poison ivy is abundant in a few areas along the trail. Long pants are recommended. Branches and logs may be encountered across the trail in places. Even though the areas along the creek are cool, summers tend to be warm and humid and the climb out can be strenuous for some people. Anyone taking this trail is encouraged to take water. Directions: From Lexington, Kentucky, take I-64 East to the Bert T. Combs Mountain Parkway exit (Exit 98) just outside of Winchester. Take the Mountain Parkway to the Pine Ridge exit (Exit 40). Turn right at the bottom of the ramp to head north on KY 15. Travel roughly 0.8 miles, and then turn right onto KY 715. Travel about 0.5 mile, crossing the Mountain Parkway. At the end of the 0.5 miles, turn right onto Rock Bridge Road. Follow this about 4.5 miles to the parking lot at the very end. There are signs leading to the trail from the parking lot. It is generally better to start the trail from the right side of the parking lot as the other end of the trail has steps that help the climb up. Ownership and Management: U.S. Forest Service, Daniel Boone National Forest, Cumberland Ranger District. Nearest Town: Pine Ridge [Slade], Kentucky.
<urn:uuid:efdbf78f-c220-4554-853d-f9a8cee579c3>
CC-MAIN-2016-26
http://www.fs.fed.us/wildflowers/regions/southern/RockBridgeTrail/index.shtml
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397865.91/warc/CC-MAIN-20160624154957-00098-ip-10-164-35-72.ec2.internal.warc.gz
en
0.927979
1,215
2.609375
3
Astronomers using NASA's Hubble Space Telescope have observed for the first time the atmosphere of a planet beyond our solar system evaporating into space. This artist's illustration shows a dramatic close-up of the scorched extrasolar planet HD 209458b in its orbit only 4 million miles from its yellow, Sun-like star. The planet is a type of extrasolar planet known as a "hot Jupiter." The planet's outer atmosphere is extended and heated so much by the searing heat from the nearby star that it starts to escape the planet's gravity. This huge envelope of evaporating hydrogen (shown in blue) resembles a comet with a tail trailing behind the planet. Astronomers estimate the amount of hydrogen gas escaping HD 209458b to be at least 10,000 tons per second, but possibly much more. Much of the planet may eventually disappear, leaving only a dense core. Object Names: HD 209458, HD 209458b Image Type: Artwork To access available information and downloadable versions of images in this news release, click on any of the images below:
<urn:uuid:b3e49adf-4a74-4d91-8ab2-8cf67dc7a37a>
CC-MAIN-2016-26
http://hubblesite.org/newscenter/archive/releases/2003/08/image/a/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393997.50/warc/CC-MAIN-20160624154953-00047-ip-10-164-35-72.ec2.internal.warc.gz
en
0.893596
221
3.765625
4
e-Cigarettes vs Cigarettes (cont.) Charles Patrick Davis, MD, PhD Dr. Charles "Pat" Davis, MD, PhD, is a board certified Emergency Medicine doctor who currently practices as a consultant and staff member for hospitals. He has a PhD in Microbiology (UT at Austin), and the MD (Univ. Texas Medical Branch, Galveston). He is a Clinical Professor (retired) in the Division of Emergency Medicine, UT Health Science Center at San Antonio, and has been the Chief of Emergency Medicine at UT Medical Branch and at UTHSCSA with over 250 publications. William C. Shiel Jr., MD, FACP, FACR Dr. Shiel received a Bachelor of Science degree with honors from the University of Notre Dame. There he was involved in research in radiation biology and received the Huisking Scholarship. After graduating from St. Louis University School of Medicine, he completed his Internal Medicine residency and Rheumatology fellowship at the University of California, Irvine. He is board-certified in Internal Medicine and Rheumatology. In this Article - What are e-cigarettes (e cigarettes)? - Do e-cigarettes contain nicotine? - Are e-cigarettes safe to use, and what are the side effects? - Do e-cigarettes expel secondhand smoke? - Do e-cigarettes help with smoking cessation? - Are e-cigarettes addictive? - How many people use e-cigarettes? - Find a local Doctor in your town Do e-cigarettes expel secondhand smoke? Not much is known about the secondhand "vapor" that is expelled from users, including levels of nicotine, nitrosamines, and other components that are yet to be identified. Nevertheless, many people would prefer not to be in a restaurant or other place of business and be exposed to vapors that contain addictive nicotine, and possibly other products that have a potential for harm. Do e-cigarettes help with smoking cessation? Although e-cigarettes have been touted as a way for tobacco smokers to kick their cigarette habit, e-cigarettes in one study were only about as effective as nicotine patches. Are e-cigarettes addictive? There is some concern that e-cigarettes are being marketed to attract younger non-smokers with "flavored" liquids such as bubblegum, piña colada, vanilla, and others. Because most e-cigarettes contain nicotine, it is possible that people can become addicted to them. Some doctors are concerned that if they become addicted to the nicotine in the e-cigarettes, it may be an easy step up to smoking tobacco which is associated with so very many health consequences. How many people use e-cigarettes? Since this product was first developed in 2004 in China as a tobacco cessation device, it has grown rapidly so that in 2013 the estimated market is about 1.5 billion as compared to 100 billion for tobacco sales. However, the sale of this product is growing rapidly worldwide. The CDC suggests that as more people utilize e-cigarettes, the dramatic increase in nicotine poisoning in children will continue if nothing is done to prevent young children gaining access to nicotine – containing liquids. Medically reviewed by James E. Gerace, MD; American Board of Internal Medicine with subspecialty in Pulmonary Disease Businessweek.com. E-Cigarettes: A $1.5 Billion Industry Braces for FDA Regulation. CDC.gov. New CDC study finds dramatic increase in e-cigarette-related calls to poison centers. FDA.gov. Electronic Cigarettes (e-Cigarettes). Get tips, treatments, & motivation.
<urn:uuid:be8fb23b-ae01-4793-8168-8e797216778a>
CC-MAIN-2016-26
http://www.rxlist.com/e-cigarettes_vs_cigarettes/page2.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396887.54/warc/CC-MAIN-20160624154956-00172-ip-10-164-35-72.ec2.internal.warc.gz
en
0.942895
750
2.625
3
RYMANOW, town in Rzeszow province, S.E. Poland. It is assumed that the town developed out of a colony of prisoners of war who settled there in the 15th century. The Jewish community was formed soon after the town was founded. Most of the Jews were merchants of wines imported from Hungary. About 1594 the Council of Four Lands (see *Councils of the Lands) debated the matter, and as a result, the community was warned by Meir b. Gedaliah of *Lublin to be careful about libation wine. At first the council intended to forbid the Jews entirely to deal in such wine, but since it was their main occupation a decision was made finally to issue just a warning. In connection with their commerce the Jews of Rymanow had to visit Krasno, a town in the same province, which had the privilege of excluding Jews (de non tolerandis Judaeis). This led to tensions between them and the townsmen of Krasno. In the 17th and 18th centuries the municipality of Krasno allowed its townsmen to rob and even put to death any Jew from Rymanow who attended the fair at Krasno. At the beginning of the 17th century, the Jews of Rymanow were prosecuted by the bishop of Przemysl for the alleged profaning of Christian festivals; the bishop won the suit. In 1765 there were 1,015 Jews in Rymanow (42.8% of the total population). At the beginning of the 19th century, as a result of the activity of R. Hirsch Mesharet, mentioned in 1838 by the head of the police in Lvov as having great influence on the Jews of Galicia, Rymanow became an important Ḥasidic center. It was the seat of the Ẓaddikim Menahem Mendel *Rymanower and his disciple Ẓevi Hirsch *Rymanower. The dwelling of the Ḥasidic rabbi, and the synagogue, erected in the 16th or 17th century, were the finest buildings in the town. At the end of the 19th century, Jewish communal life in Rymanow expanded. This continued when Rymanow reverted to independent Poland after World War I. Controversies arose, however, especially [Shimshon Leib Kirshenboim] After the outbreak of World War II, when the Germans occupied Rymanow at the end of September 1939, they issued an order for almost all the Jews in Rymanow to move within 24 hours to the Soviet-occupied area on the east bank of the River San. Only a small number were permitted to remain in the city. Many of those who went to the Soviet area were deported in the summer of 1940 to the Soviet interior. Those remaining in Rymanow were compelled by the Germans to pay fines, and subjected to confiscation of property and forced labor. On Aug. 1, 1942, all Jewish males aged 14 to 35 were deported to the Plaszow labor camp, where many met their deaths. On Aug. 13, 1942, the remainder of the Jewish community was deported to the *Belzec death camp. Yad Vashem Archives. Source: Encyclopaedia Judaica. © 2008 The Gale Group. All Rights Reserved.
<urn:uuid:d0f808b7-3d9d-484d-a8cf-31ce2908ee98>
CC-MAIN-2016-26
http://www.jewishvirtuallibrary.org/jsource/judaica/ejud_0002_0017_0_17201.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399428.8/warc/CC-MAIN-20160624154959-00015-ip-10-164-35-72.ec2.internal.warc.gz
en
0.97434
697
3.125
3
Ocean thermal energy conversion ||This article does not have any sources. (December 2011)| Ocean thermal energy conversion (OTEC) is a way of getting useful energy from the world's oceans. The sun shines on the oceans of the world and in the hot parts near the equator the water at the sea's surface can be quite warm, sometimes as high as 30°C. Many oceans are very deep and the water at depths of 1,000 meters can be around 5 °C. If a pipe is put down into the ocean we can bring the cold water to the surface where we also have warm water available. The difference in temperature between the warm surface water and the cold deep water may only be around 15 °C. But we can build a machine called a heat engine, which can use this difference to generate power that can be used by people that live in that place. A machine which can do this is called an OTEC machine which stands for ocean thermal energy conversion. Because the difference in temperature is small we will need to get large quantities of warm and cold water to go through the machine to get a useful amount of work, but large quantities are available in the ocean. It has been estimated that OTEC could give amounts of energy that are 10 to 100 times greater than the other ocean energy source, wave power. The first OTEC machine was built in Cuba in 1930 and made 22 kW of electricity. The largest machine built so far generated 250 kW in 1999 and was made by the US. Plans to build even bigger machines of around 10 MW have been made. OTEC can also supply quantities of cold water as a by-product. This can be used for refrigeration and can help crops and fish grow. OTEC can also produce large amounts of salt-free water, which can be useful on mid-ocean islands as drinking water.
<urn:uuid:16d8a99f-a19d-4f56-813e-e520ee94303a>
CC-MAIN-2016-26
https://simple.wikipedia.org/wiki/Ocean_thermal_energy_conversion
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393146.70/warc/CC-MAIN-20160624154953-00127-ip-10-164-35-72.ec2.internal.warc.gz
en
0.965349
383
3.9375
4
Wii homes surgical skills New Scientists Tech are reporting that two “developers” from a hospital are designing Wii software that will accurately simulate surgical procedures. A training platform based on the console, which costs about $250, might be more practical for trainee surgeons in the developing world than traditional virtual training tools, which typically cost a great deal more. To test how the Wii affected surgical skill, the researchers asked eight trainee doctors to play it for an hour before performing a virtual surgery. They used a training tool called ProMIS, which simulates a patient’s body in 3D and tracks the surgeon’s movements as they operate. They fed the movements to an algorithm which scores the virtual surgeon on a range of factors. Wii-playing residents scored 48 per cent higher on tool control and performance than those without the Wii warm-up.
<urn:uuid:c322d13b-a860-481d-92aa-d95dedb83ab9>
CC-MAIN-2016-26
http://www.nintendofuse.com/2008/01/17/wii-hones-surgical-skills/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398869.97/warc/CC-MAIN-20160624154958-00024-ip-10-164-35-72.ec2.internal.warc.gz
en
0.95483
177
2.546875
3
Recent research has improved our understanding of the fundamental processes involved in windthrow. The tree stability and wind risk project provides management tools, advice and knowledge to reduce wind damage to British forests. The threat of wind damage is widely recognised to be a serious constraint to the management of British forests. Major storms have caused volumes of timber in excess of 1m m3 to be damaged at least five times in the last 50 years. The risk of windthrow is a major determinant of rotation length in upland areas and thinning programmes are constrained in over 50% of regions because of wind damage. Wind damage is believed to cost countries in the European Union approximately 15 million Euros per year, and on occasions substantially more. For example, storms in Northern Europe in December 1999 overturned more than 300 million m3 of timber and in January 2005 overturned more than 85 million m3 of timber. Past tree stability research in Britain was influential in the choice of rotation lengths and thinning practice. It has also influenced the choice of operational techniques, such as the move towards use of mounding as an establishment technique for afforestation and restocking, and the abandonment of late mechanical thinning on vulnerable sites. The fundamental processes involved in windthrow include the interaction of trees and wind, the interaction of roots and soil, and the interaction of wind and topography. Over recent years a major success has been achieved through the synthesis of tree stability and wind climate knowledge into a computer-based model, ForestGALES, to guide forest managers on the risks of wind to conifer plantations. We are working towards the goal of modifying ForestGALES to enable it to calculate the risk of wind damage to 'alternative silvicultural systems' and mixed species stands. The main current research objectives are: - To understand the interaction between wind, topography and trees and the effect of temporal variability in extreme wind occurrence - To improve the representation of the British wind climate in ForestGALES - To examine the interactions between the physiological development of roots and soil properties - To develop improved relationships between anchorage and tree dimensions, separated between species, soil group and rooting depth - To develop a new wind risk model which deals with the risk to individual trees. This will allow calculation of the risk to species mixtures and where alternative silvicultural systems are used. Funders and partners This research is predominantly funded by the Forestry Commission. The European Commission funded work in the ECOSLOPES project on tree stability, and the potential for soil loss, on complex terrain. Another EC project, EFORWOOD, examined wind as an abiotic risk within a Sustainability Impact Assessment of the Forestry - Wood Chain. Windthrow scenario modelling and a development of a research version of ForestGALES were funded as part of the EC Interreg North Sea Region STORMRISK project. - The principles of using woods for shelter (PDF-1934K) Forestry Commission Information Note 81 - Designing Forest Edges To Improve Wind Stability Forest Commission Technical Paper 16 - Cultivation Of Soils For Forestry Forestry Commission Bulletin 119 - Climate Change: Impacts On UK Forests Forestry Commission Bulletin 125 - Forests And Wind: Management To Minimise Damage Forestry Commission Bulletin 114 The "wind risk" work area is part of the Assessing Resilience programme 2015-2019.
<urn:uuid:a9b453f4-dcc7-4858-a70d-8317ebe09e4a>
CC-MAIN-2016-26
http://www.forestry.gov.uk/FR/INFD-639A92
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783400572.45/warc/CC-MAIN-20160624155000-00098-ip-10-164-35-72.ec2.internal.warc.gz
en
0.912616
698
3.375
3
Translation of hypoxia in Spanish: - Example sentences - Increased hypoxia in local tissues, marked oedema of the toes, or development of venous hypertension may be involved. - This is not easy, as too little fluid will cause hypoperfusion whereas too much will lead to oedema that will cause tissue hypoxia. - These hemorrhagic and hemolytic events would result in tissue hypoxia that would, in turn, stimulate erythropoiesis. What do you find interesting about this word or phrase? Comments that don't adhere to our Community Guidelines may be moderated or removed.
<urn:uuid:f0d18f08-ae9b-4a26-bade-7e85f067b4ad>
CC-MAIN-2016-26
http://www.oxforddictionaries.com/us/translate/english-spanish/hypoxia
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403508.34/warc/CC-MAIN-20160624155003-00152-ip-10-164-35-72.ec2.internal.warc.gz
en
0.914963
134
2.6875
3
Suicides among youth have been a significant problem in many countries, but those happening in some Asian countries are a particular cause for concern. In the last few years several studies have shown that adolescents and young people in China, Japan and other Asian countries confront a large number of psychological problems that may lead them to commit suicide. Will these countries be able to curb those suicides that are becoming a mirror of societies in crisis? In Japan, suicide is the leading cause of death among adolescents. The number of adolescents’ suicides in Japan exceeds 30,000 every year. At 24 suicides per 100,000 people of all ages, Japan has double the rate in the U.S. and three times that in the United Kingdom, representing the highest rate among developed countries. The most vulnerable group for suicide attempts and mortality are those between 15-24 years old. Most of those who attempt suicide, both males and females, have an underlying psychiatric disorder. Among those, many of them have been diagnosed with a Borderline Personality Disorder (BPD). Bullying at school, stressful lifestyles and economic problems are increasingly becoming important triggers for adolescents’ suicides in Japan. In China, suicide is the 5th leading cause of death, and the leading cause of death among young people. It is estimated that 287,000 people –or one every two minutes- commit suicide every year in China. Ten times that number attempt it but are unsuccessful, according to the Chinese Center for Disease Control and Prevention. In 1987, Emile Durkheim, a French sociologist, was among the first to notice that there is a higher suicide rate among those individuals who are not socially integrated and don’t have family and social support. His observations may apply to many Chinese students who attempt suicide, who come from the interior to the country’s main cities and lack the support of their friends and families. There are several causes for adolescent suicides. In many cases, those who commit suicide are afraid of performing badly in their exams. Some experts believe that in China the one-child policy could also explain the rise in young people’s suicides. Because adolescents grow up with no siblings, they are not used to dealing with difficult interpersonal problems. In many cases, they are under the combined pressures of work, study and personal problems. Despite the extraordinary performance of the Chinese economy in recent times, many young people are unable to find jobs (or jobs according to their qualifications and experience) and enter into depression, which lies behind the high number of suicides. Many graduates are unable to find jobs, even a year later or more after they graduated. In rural areas, where people are poorer than in the cities, there is the additional problem that most young people don’t have good access to already scarce mental health services. In addition, in rural areas there is abundant use of pesticides, which are used by many people to commit suicide. According to statistics from the World Health Organization (WHO) pesticides are used by 58 percent by people who commit suicide in rural areas in China. The high numbers of suicides among adolescents are also related to the extreme pressure from their families to perform well in school and excel in their studies. In addition to those pressures, adolescents experience feelings of isolation and loneliness which make them prone to attempt suicide. Is it possible to lower the high rates of adolescents’ suicides, given the complexity of the problem? I believe it is possible if parents, teachers and friends can pick up signs of distress among the young. Certain characteristics –such as depression, conduct disorders and situational crises- are associated with increased risk of suicide. Young people may have some particular behaviors that indicate their intention to commit suicide. Among those behaviors are changes of appearance and conduct toward their friends. Others may also be making some final arrangements such as giving away priced possessions or making suicidal threats through direct or indirect statements. Because children and adolescents spend a substantial amount of time at school under the supervision of school personnel, school staff should be trained on the importance of risk factors and warning signs of suicidal behavior. Teachers should give special classes discussing the problem of adolescents’ suicides, alerting students to the need to look for help when they feel stressful and feel unable to cope with their personal problems. At the same time, there should be increased communication among parents, teachers and school staff. A good approach would be the creation of “Crises Prevention Teams” (CPT) made up of representatives from the students, the parents and the school administration that should be in charge of following students whose behavior raise concern. In addition, students should have easy access to effective medical and mental health resources. Through a combined and comprehensive set of actions, what is threatening to become a serious public health problem can be effectively controlled. Dr. Cesar Chelala is an international public health consultant and the author of “Health of Adolescents and Youth in the Americas”. He is also a winner of an Overseas Press Club of America award.
<urn:uuid:1f2264b3-c599-4a88-a110-bb8ca0888857>
CC-MAIN-2016-26
http://www.counterpunch.org/2014/08/15/preventing-adolescents-suicides/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391634.7/warc/CC-MAIN-20160624154951-00134-ip-10-164-35-72.ec2.internal.warc.gz
en
0.963629
1,015
2.953125
3
Saint Ravidas was a revered religious person of the medieval period. During his lifetime he composed numerous verses in praise of God. The Guru Granth Sahib, the holy book of Sikhism, contains 41 of his hymns. They stress on the love for god, universe, nature, Guru and utterance of the name of the Lord. Saint Ravidas was born in the year 1399, in a cobbler’s family. Though he carried on his father’s profession, he distributed most of his income towards the welfare of the poor. He led a simple and pious life. Even when gifted with rich presents by the royalty, he declined to accept them, showing preference towards the devotion of God. He was one of the noted disciples of Swami Ramanand, a pioneer of the Bhakti movement. His total devotion towards god won him many followers from both the Hindu and the Muslim religions. He greatly detested the caste system and strove to spread the message of humanity far and wide. His preaching won him followers from the rich and the poor alike, irrespective of their caste and creed.
<urn:uuid:a0a24890-f610-40e7-b307-4f92d0a40ff5>
CC-MAIN-2016-26
http://www.india9.com/i9show/Saint-Ravidas-59768.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391519.0/warc/CC-MAIN-20160624154951-00029-ip-10-164-35-72.ec2.internal.warc.gz
en
0.980856
232
3.328125
3
Tabernacle of Moses Bible Map and Floor Plan TABERNACLE OF MOSES MEASUREMENTS: The measurements of the structure of the Tabernacle of Moses were originally given by God in cubits. There has never been a standard cubit known to man. A cubit is generally thought to be the distance from the elbow to the finger tip. Now you think about that for a while, and tell me how standard that could possibly be. That particular fact is interesting in itself. The glory of God cannot be known. Most scholars assign from 18 inches to 25 inches in length to the cubit. This allows a great deal of flexibility when one considers that the long side of the court of the tabernacle enclosure/fence measured 100 linear cubits. That converts to between 150 to 208 feet. If the exact linear measurements were important for us to know, God would have given them to us for this present time. Tabernacle of Moses Replica in Timna Park At Timna Park, 20 miles north of Eilat in the Arabah, a life-size replica of the biblical tabernacle has been constructed. See image to right > While no original materials (e.g., gold, silver, bronze) have been used, the replica tabernacle is accurate in every other way based upon the biblical description. INSIDE THE TABERNACLE OF MOSES: Entering through the "door" of many colors into the Holy Place and facing the Most Holy Place, we receive the full light and brightness of the tabernacle. The two sides to our right and left are constructed of shittim wood boards standing one against another. They are covered with gold, softly reflecting in golden hue the bedazzling colors inside. Looking up, the visible ceiling is one layer of linen strips of: fine linen (white), blue, scarlet, and purple. Atop the linen of many colors, hidden from our sight, are three additional layers of animal coverings. They are in ascending order goats' hair, ram skins dyed red, and badgers' skins. Directly in front of us is the inner veil of many colors of fine linen (white), blue, scarlet, and purple. It has golden threaded cherubims woven throughout. It is rent from head to foot. To our right is the golden table of shewbread with twelve loaves of unleavened bread upon it in two stacks of six. To our left over against the golden table of shewbread is the candlestick of pure beaten gold with its seven bowls of oil aflame. Ahead and before the ark of covenant is the golden altar of burning incense, the wafting smoke a sweet savor unto the Lord. Covering the ark of covenant is the mercy seat. It is of two cherubims of pure beaten gold facing one to another with wings stretched forth on high. "And there will I meet with thee, and I will commune with thee from above the mercy seat, from between the two cherubims which are upon the ark of the testimony, of all things which I will give thee in commandment unto the children of Israel." (Ex 25:22) Free Tabernacle of Moses Bible Map Share this page with your friends on your Social Networking sites with one easy click! Did You Find This Page Helpful? Then please visit our Resources Page and buy one of our many books or CDs. All proceeds go toward helping more people learn God's Word. Thank you and God Bless!
<urn:uuid:6fbbd071-a870-4316-b52d-ac68d106365f>
CC-MAIN-2016-26
http://gods-word-first.org/bible-maps/tabernacle.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783404826.94/warc/CC-MAIN-20160624155004-00144-ip-10-164-35-72.ec2.internal.warc.gz
en
0.935278
747
2.640625
3
three mins of Bell ringing The Tintinabulum is a bell whose purpose is to announce something. These bells were originally hidden within Churches, but Bells are all over the place, and they formed an important part in British History. During the Second World War, after Germany began its bombing campaign with the Blitz the Government not only had to order blackouts...meaning, absolutely no production of light from the entire country in order to hide from the enemy, but they also had to order silence, that is to say the ceasation of all church bells and otherwise. The Bells were only to be rung on two occasions. First in the event of a land based invasion of England by the Germans, the Bells were to ring out nation wide as a warning to everyone. The other was to be in Celebration of Liberation much later in the war when the Germans were pushed back from whence they came. During the war campaign all kinds of metals were smelted for the production of military equipment....but Bells were safe guarded by Law...whereas on the Continent, a large proportion of the Germanic War Effort was supported by the systematic distruction of Continental Bells Rumour has it...that in a similar capacity to the introduction of China, when the Olympic opening ceremony began with a gazillion drums...the opening of the British Hosted event is likely to begin with a three min nation wide sounding of all Church Bells Since the war it appears Germany has been replenishing its stock
<urn:uuid:4c9e30c5-4942-4689-af5c-f65e3858146a>
CC-MAIN-2016-26
http://www.matt-hughes.com/forums/showpost.php?p=180737&postcount=1
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397562.76/warc/CC-MAIN-20160624154957-00000-ip-10-164-35-72.ec2.internal.warc.gz
en
0.983869
309
3.21875
3
On April 2 the National Archives released online census records for 1940 and the site received more than 22 million hits in the first three hours, which temporarily crashed the website. Individual records from a decennial census are made available every 10 years, as soon as the government’s legally mandated 72-year waiting period ends. The nearly 4 million images of handwritten census pages provide information on person’s names, ages, addresses, marital status and number of children. The website is at http://1940census.archives.gov/ and you need to first identify the enumeration district before you can find the names and addresses you are seeking. The Davis Family Library also has individual family census records for 1790 to 1930 for Vermont on microfilm and the Genealogy Research Guide can provide more detailed information for researching family history.
<urn:uuid:badd66e2-8016-4c1b-9c76-73ce77b68707>
CC-MAIN-2016-26
http://sites.middlebury.edu/lis/2012/04/03/1940-census-records-now-available-online/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783408840.13/warc/CC-MAIN-20160624155008-00070-ip-10-164-35-72.ec2.internal.warc.gz
en
0.935708
167
2.515625
3
Arctic Tundra May Contribute to Warmer World News story originally written on May 27, 2009 A study published in the May 28 issue of the journal Nature has helped define the potentially significant contribution of permafrost thaw to atmospheric concentrations of carbon, which have already reached unprecedented levels. "In earlier work we estimated that widespread permafrost thaw could potentially release 0.8-1.1 gigatons of carbon per year," said Ted Schuur an ecologist at the University of Florida and the lead author of the study. "Before this study, we didn't know how fast that carbon could potentially be released from permafrost, and how this feedback to climate would change over time." A large amount of organic carbon in the tundra is stored in the soil and permafrost. This pool of carbon, deposited over thousands of years, remains locked in the perennially frozen ground. In recent years this area began to thaw, providing increased access to plants and microbes that could shift the carbon from the land to the atmosphere. An understanding of the rate of carbon release is necessary to estimate the strength of positive feedback to climate change, a likely consequence of permafrost thaw. Scientists use the term positive feedback to describe the snowball effect described here: a warmer climate permits permafrost thaw, releasing more carbon into the atmosphere, which will further increase global surface temperature. From 2004 to 2006, Schuur and his team used radiocarbon dating, a technique typically used to determine the age of artifacts, to track the movement of "old" organic carbon accumulated within the soils and permafrost at an Alaskan site. The ability to distinguish old carbon from newer carbon allowed the researchers to track current metabolism of old carbon in an area where permafrost thaw is increasing. Surprisingly, this research revealed that during the initial stages of permafrost thaw, plant growth and photosynthesis, which remove carbon from the atmosphere, increase. This increase offsets the release of old carbon from thawing. However, sustained thaw eventually releases more carbon than plants can uptake, overwhelming their compensatory capacities. To put this in a global context, if the average global temperature continues to rise, current calculations predict that positive feedback from permafrost thaw could annually add as much carbon to the atmosphere as another significant source, land use change. The Alaskan site where Schuur and colleagues carried out their research was monitored over the past two decades, with permafrost temperature measurements beginning before the permafrost began to thaw. This detailed record coupled with Schuur's study of ecosystem carbon exchange and old carbon release provide a comprehensive picture of the dynamics of carbon exchange in response to permafrost thaw. "Records from this site exist on a decadal time scale, meaning we are able to more accurately account for the slow pace of change within the system. Overall, this research documents the long-term plant and soil changes that occur as permafrost thaws, thus providing a basis for making long term predictions about ecosystem carbon balance with increased confidence," Schuur reported. Text above is courtesy of the National Science Foundation
<urn:uuid:53968266-aa17-41b4-a87d-2d62dc09527c>
CC-MAIN-2016-26
https://www.windows2universe.org/headline_universe/olpa/tundra_27may09.html&edu=high
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396945.81/warc/CC-MAIN-20160624154956-00176-ip-10-164-35-72.ec2.internal.warc.gz
en
0.926391
653
3.859375
4
Snake-like robot and steady-hand system could assist surgeonsTheAllINeed.com (NC&T/JHU) The tools include a snake-like robot that could enable surgeons, operating in the narrow throat region, to make incisions and tie sutures with greater dexterity and precision. Another robot, the steady-hand, may curb a surgeon's natural tremor and allow the doctor to inject drugs into tiny blood vessels in the eye, dissolving clots that can damage vision. These and other projects are being built by teams in the National Science Foundation Engineering Research Center for Computer- Integrated Surgical Systems and Technology, based at Johns Hopkins. Launched in 1998 with funding from the NSF, the center aims to transform and improve the way many medical procedures are performed. Working closely with physicians from the Johns Hopkins School of Medicine, the center's engineers and computer scientists are building robotic assistants intended to enhance a surgeon's skills. They are devising detailed visual displays to guide a doctor before and during a difficult medical procedure and planning digital workstations that would give the physician instant access to an enormous amount of medical information about the patient. Because most of the new medical tools are linked to computers, their work can easily be recorded. Later, these records would be checked against data describing how well a patient responded to the treatment. From this review, doctors could learn which techniques and procedures were most effective. "We could produce the equivalent of a flight-data recorder for the operating room," said Russell H. Taylor, a professor of computer science and director of the center. |The snake-like robot designed by Johns Hopkins engineers features two thin rods tipped with tentaclelike tools capable of moving with six degrees of freedom. (Photo: Will Kirk)| During surgery, a doctor would sit at a robotic workstation and peer into eyepieces that display a three- dimensional view of the operating site. The doctor would then maneuver the controls to guide the movement of the robot. The prototype is made of nonmagnetic metals so that it can be used safely near magnetic imaging equipment. The tools' movements are nimble because sophisticated software can make up to 100 adjustments per second. The steady-hand system, also devised by a Johns Hopkins team, was built to help with another challenging task: microsurgery. At this scale, even the best surgeons display some tremor in their hands. Yet the slightest uncontrolled movements can be troublesome during surgery on microscopic structures, such as tiny blood vessels in the eye. To address this problem, the steady-hand robot can grasp a needle and move it carefully in tandem with the surgeon in a technique called cooperative manipulation. In tests of the device, the researchers have successfully injected a liquid into a chicken embryo's blood vessels, resembling structures in the human eye. "The steady-hand could allow a surgeon to make very precise and accurate micro-movements without tremor," Taylor said. Before they are used on human patients, both the snake-like robot and the steady-hand system will require perhaps five more years of lab testing and prototype advancement. Still, Taylor believes both have a good chance of eventually joining more traditional tools in hospital operating rooms. "What makes this work particularly rewarding," he said, "is that we have the opportunity to do cutting-edge engineering that can help people in a very direct way." This site is no longer updated. Click this link to have updated engineering news and articles. About the Author ©2006 All rights reserved
<urn:uuid:9610002e-44fa-45a5-b972-226d4e63d4f6>
CC-MAIN-2016-26
http://www.theallineed.com/engineering/07010306.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397865.91/warc/CC-MAIN-20160624154957-00129-ip-10-164-35-72.ec2.internal.warc.gz
en
0.955071
717
3.390625
3
Second Archbishop of Baltimore, b. near Port Tobacco, Charles County, Maryland, 15 Oct., 1746; d. at Georgetown, D.C., 18 June, 1817. He was a descendant of Captain James Neale, the founder of the family in America, who settled in Maryland as early as 1642. At twelve Leonard was sent to the Jesuit College at St. Omers in French Flanders. Thence he went to Bruges, and later to Liège, where he was ordained a Jesuit priest. On the suppression of the Society of Jesus, Father Neale, together with the English Jesuits, repaired to England, where he engaged in pastoral work for four years, but in response to his petition for a foreign mission, he was assigned to Demarara, in British Guiana, South America, where he laboured from 1779-83. Discouraged by the slow improvement of the people and with health impaired by the climate, he set sail for America in January, 1783, arriving in Maryland in April, associating himself with his former Jesuit brethren of the Society of Jesus, among them the Rev. John Carroll. During the yellow fever epidemic in Philadelphia, in 1793, the two priests of that city were stricken and Father Neale gladly took their place. For nearly six years he remained there, acting as vicar-general to the then Bishop Carroll of Baltimore. During the second visitation of the yellow fever to Philadelphia in 1797-8, he was overtaken by the dread disease. In 1798 Bishop Carroll called Father Neale from Philadelphia to succeed Rev. Dr. Dubourg in the presidency of the college at Georgetown. He acted in the dual capacity of president and tutor for several years and under his guidance the institution was developed from an academy into a college in 1801. The venerable Bishop Carroll had some time previous to this applied to Rome to name Father Neale as his co-adjutor. He was consecrated by Bishop Carroll in 1800, but remained as President of Georgetown until 1806 when he was succeeded by the Rev. Father Molyneux. Upon the death of Archbishop Carroll on 3 December, 1815, Bishop Neale succeeded him and received the pallium from Pius VII the following year. Already nearly seventy years old he lived most of the time at Georgetown in quiet and retirement, but when is his duties as the highest dignitary of the Church in the United States called him to Baltimore, he was remarkably energetic for one of his age and feeble health. While in Philadelphia Father Neale had made the acquaintance of Miss Alice Lalor, through whose aid he started a small school conducted by three ladies, which was destined to be the seed of a great religious order of female teachers in America. This school was broken up by the ravages of yellow fever, but the project was revived by Bishop Neale who requested Miss Lalor with another lady from Philadelphia to come to Georgetown. They assciated themselves with the Order of St. Clare, or Poor Clares. In 1805, on the death of their Abbess, the Poor Clares returned to Europe, selling their convent property to Bishop Neale, who conveyed it to Miss Lalor and her associates, whom he permitted to enter into simple vows in 1813. After his accession to the See of Baltimore, the archbishop petitioned Pius VII for the regular establishment of a monastery of the Order of the Visitation of the Blessed Virgin Mary at Georgetown, which request was readily granted. His health failing, Archbishop Neale applied to Rome to have Bishop Cheverus of Boston associated with him in governing the Diocese of Baltimore with the right of succession. But Bishop Cheverus objected, proposing instead that a coadjutor be appointed with the right of succession. To this the archbishop agreed, and Rev. Ambrose Ambrose Maréchal was selected by Archbishop Neale, who proposed his name to the Holy See. By a brief of Pius VII, dated 24 July, 1817, Father Ambrose Maréchal was appointed coadjutor with right of succession, under the title of Bishop of Strauropolis in partibus infidelium, but before the arrival of the brief the venerable archbishop had already died. The Catholic Encyclopedia is the most comprehensive resource on Catholic teaching, history, and information ever gathered in all of human history. This easy-to-search online version was originally printed between 1907 and 1912 in fifteen hard copy volumes. Designed to present its readers with the full body of Catholic teaching, the Encyclopedia contains not only precise statements of what the Church has defined, but also an impartial record of different views of acknowledged authority on all disputed questions, national, political or factional. In the determination of the truth the most recent and acknowledged scientific methods are employed, and the results of the latest research in theology, philosophy, history, apologetics, archaeology, and other sciences are given careful consideration. No one who is interested in human history, past and present, can ignore the Catholic Church, either as an institution which has been the central figure in the civilized world for nearly two thousand years, decisively affecting its destinies, religious, literary, scientific, social and political, or as an existing power whose influence and activity extend to every part of the globe. In the past century the Church has grown both extensively and intensively among English-speaking peoples. Their living interests demand that they should have the means of informing themselves about this vast institution, which, whether they are Catholics or not, affects their fortunes and their destiny. Copyright © Catholic Encyclopedia. Robert Appleton Company New York, NY. Volume 1: 1907; Volume 2: 1907; Volume 3: 1908; Volume 4: 1908; Volume 5: 1909; Volume 6: 1909; Volume 7: 1910; Volume 8: 1910; Volume 9: 1910; Volume 10: 1911; Volume 11: - 1911; Volume 12: - 1911; Volume 13: - 1912; Volume 14: 1912; Volume 15: 1912 Catholic Online Catholic Encyclopedia Digital version Compiled and Copyright © Catholic Online
<urn:uuid:931c60d2-263f-4d0b-abf0-a6d28fff3920>
CC-MAIN-2016-26
http://www.catholic.org/encyclopedia/view.php?id=8366
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396455.95/warc/CC-MAIN-20160624154956-00072-ip-10-164-35-72.ec2.internal.warc.gz
en
0.976014
1,241
2.703125
3
Long Before Social Networking, Community Cookbooks Ruled The Stove But over a century before pinboards were virtual and bookmarking had nothing to do with actual books, people shared their domestic prowess through community cookbooks. And these cookbooks (some historic covers are featured above in our slide show) were so much more than just a catalog of recipes — they were fundraisers, political pamphlets, and historical accounts of the communities they served. Most began as a way to raise funds for a common goal. In America, the first of these charity cookbooks was A Poetical Cookbook by Maria J. Moss, which was published and sold in 1864 to subsidize medical costs for Union soldiers injured in the Civil War. "She compiled the recipes on her own, then she thought, 'Let's see if we can use it to make some money to help the wounded soldiers,'" Andrew Smith, professor of Food Studies at The New School in New York City, tells The Salt. Many community organizations learned from Moss's success, and began creating fundraising cookbooks of their own. In fact, the concept became so popular that more than 3,000 charity cookbooks were published between 1864 and 1922, according to Feeding America, an historic cookbook project of Michigan State University. At first, most of these cookbooks were created by religious groups. "If the church needed to have a steeple constructed or it needed a new building, they would ask the women of the congregation," says Smith. These cookbooks were compiled by religious congregations across the country from the First Presbyterian Church in Dayton, Ohio to the Council of Jewish Women in Portland, Oregon. Cookbooks are still compiled by churches today, though modern adaptations include web recipe collection forms and special categories for vegan and gluten-free meals. However, church ladies weren't the only ones to communicate through cookbooks. In 1886, a group of politically progressive women in Massachusetts compiled The Woman Suffrage Cookbook, to be sold at the Boston Festival and Bazaar. It was created to raise funds for their municipal suffrage campaign, but also as a means to spread the group's agenda. "It was an innocuous way to spread their message. It was just a cookbook at a festival ... it made it OK for people who wouldn't have engaged with their cause otherwise," says Emily Contois, public health nutritionist and food blogger. Contois points out that provocative recipe titles like Mrs. Mary F. Curtiss' Rebel Soup and Miss M.A. Hill's Mother's Election Cake announced the politics of the women represented in the cookbook, many of whom were doctors, lawyers, teachers, and authors. And more than just the recipe names were progressive, says Contois. Some of the women submitted recipes recorded in the modern approach — ingredients listed on top and instructions listed below — 10 years before recipe standardization pioneer Fannie Farmer published the first version of her influential cookbook. Contois and Smith both say that these old cookbooks have inspired a new genre of culinary literature: Personal stories intertwined with recipes. This template is now seen everywhere from June Hersh's Recipes Remembered, which shares the stories of Jewish Holocaust survivors and their pre-war recipes to The Homesick Texan Cookbook, which records the memories and recipes of popular blogger Lisa Fain, who transplanted to New York City from the Lone Star State. With community cookbooks, Smith says, "you get an insight into history that isn't there from any other source, it's not in newspapers, it just hasn't survived." And that historical value, might be more important to modern cookbook buyers than any recipe inside. So what began as practical household how-to guides, are now more likely to be a coffee table conversation starter than a reference in the kitchen.
<urn:uuid:a393ba37-ccbc-45b7-9299-a664d9364e86>
CC-MAIN-2016-26
http://wvasfm.org/post/long-social-networking-community-cookbooks-ruled-stove
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396945.81/warc/CC-MAIN-20160624154956-00094-ip-10-164-35-72.ec2.internal.warc.gz
en
0.976515
780
3
3
Priscilla Freeman Jacobs Related Entries: American Indian Education Longtime Chief of the Waccamaw-Siouan by Dr. Patricia B. Lerch, in collaboration with Priscilla Freeman Jacobs Reprinted with permission from the Tar Heel Junior Historian. Fall 2005. Updated by the Government & Heritage Library, May 2014. Tar Heel Junior Historian Association, NC Museum of History Priscilla Freeman Jacobs (b. 1940) led the Waccamaw-Siouan, a state-recognized American Indian tribe, from 1986 through early 2005. During that time, she represented her tribe at many civic affairs and presented educational programs about the traditions and culture of her people. When the position of chief came open following the death of her father Clifton Freeman (1919–1985), Jacobs’s brothers encouraged her to accept this leadership role, since she had worked alongside their father for many years. Thus she became the first woman in the twentieth century to hold the position of chief in her tribe. Jacobs grew up in a traditional Indian family in the Ricefield area of the modern Waccamaw-Siouan community, which is situated on the edge of the Green Swamp about thirty-seven miles from Wilmington. For five generations, the men of her family made a living in the “woods work” of logging and forestry. The women kept house, tended the gardens, and helped their menfolk raise cows, pigs, and chickens to feed their families. The rural lifestyle promoted the values of co-operation, hard work, respect for elders, and obedience. Jacobs was educated in the American Indian schools that her grandfather W. J. Freeman and great-uncle R. T. Freeman convinced Columbus County officials to open during their years as tribal chiefs (1920s–1960s). The Indian schools taught basic literacy, mathematics, history, and respect for Indian heritage. After graduation from the Waccamaw Indian School, she completed a secretarial course at Miller Mott Business College of Wilmington and put her skills to work in her father’s logging business. In 1961 she married Welton Jacobs, who is also Waccamaw-Siouan. They have two children, four grandchildren, and three great-grandchildren. Priscilla Jacobs’s inauguration as chief was held at Frontier Fort near Wilmington in 1986. She followed in the footsteps of her grandfather, great-uncle, and father when she accepted this duty. And preserving Indian heritage involved many sacrifices and hours of hard work. When still a small child, Jacobs listened to community elders assembled at her grandfather’s house on Sunday afternoons discussing issues of Indian education. Although some counties in North Carolina did fund separate schools for Indians, Priscilla’s county did not. Many Indians wanted separate schools in order to educate their children about their heritage. Priscilla’s grandfathers—W. J. Freeman and Alec Patrick— and great-uncle R. T. Freeman and others worked hard to attain these schools for their children. By 1949 they sought federal support and asked the U.S. Congress to pass the Waccamaw Bill, which would grant them federal acknowledgment as an Indian tribe. Jacobs, who was only nine years old at the time, journeyed to Washington, D.C., with the community delegation to present the case to Congress. The Congress favored terminating federal responsibilities to tribes in 1950, so the bill did not pass into law as hoped. In these formative years, Jacobs became aware of the wider Indian world and issues facing Indian people. When her father, Clifton Freeman, became chief in 1964, he worked to secure jobs, improve roads, and network with Indians throughout the United States. She traveled with her father to meetings around the country, learning about the important challenges facing Indian people. Long before she became chief, Jacobs labored hard for her people. She played a central role in bringing the popular Indian powwow to her community (around 1969). She taught the children Indian dances and educated them about their history. At first, powwows were small family affairs held on church grounds or at Lake Waccamaw, but they grew larger as time passed. With her father’s support, Priscilla approached International Paper Company asking for a donation of five acres of land that could serve as a center of tribal life, and her request was granted. Since 1974, powwows have been held on the tribal grounds next to the day care, office, and ball field. (Today, the Waccamaw-Siouan tribe owns thirty acres in Buckhead.) In 1971 the state formed the N.C. Commission of Indian Affairs as a government office devoted to helping American Indians. Jacobs was the first secretary of the commission’s board of directors; later she worked for the commission as a community developer. With her father, she represented her tribe at meetings of the Coalition for Eastern Native Americans, an organization active between 1971 and 1973 that offered assistance to tribes in the East. She participated in the N.C. Indian Unity Conference and offered many educational programs for Indians throughout the state. To help her community develop economically, she joined her father and others from the tribe in forming the Waccamaw-Siouan Development Association (WSDA). WSDA continues to work on projects of education, economic development, and culture. Jacobs is also a spiritual person. In fact, her leadership combines both her social-political role with her spiritual life. She was one of the first women in her tribe to become a pastor, and her ministry has included television broadcasts and leadership in various small churches. She has been a pioneer for women of her generation by breaking out of stereotypical roles to pursue goals for her community in the wider American Indian world. At the time of the publication of this article, Dr. Patricia B. Lerch was a professor in the Department of Anthropology at the University of North Carolina at Wilmington. In 2004 the University of Alabama Press published her book Waccamaw Legacy: Contemporary Indians Fight for Survival. She has worked with the Waccamaw-Siouan as a researcher, while the tribe has fought for recognition. Waccamaw Siouan Tribe: http://www.waccamaw-siouan.com/ Samuels, Forrest. 2009. "Lake Waccamaw." Flickr user fsamuels. Online at http://www.flickr.com/photos/fsamuels/3920785168/. Accessed 5/2011. 1 January 2005 | Jacobs, Priscilla Freeman; Lerch, Patricia B.
<urn:uuid:ee81d9b1-76b0-44ca-918a-018dc50b34f7>
CC-MAIN-2016-26
http://www.ncpedia.org/node/574/backlinks
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396029.85/warc/CC-MAIN-20160624154956-00095-ip-10-164-35-72.ec2.internal.warc.gz
en
0.974672
1,371
3.1875
3
After 244 days in space since its launch April 22 from Cape Canaveral, Fla., the X-37B orbital test vehicle landing marks the Air Force's latest step in experimental test missions to improve the service's space capabilities, officials said here Dec. 6. Air Force Researchers Showcase Integrated Virtual Training Capabilities ORLANDO, Florida (AFNS) -- Researchers from the Air Force Research Laboratory's 711th Human Performance Wing Human Effectiveness directorate's Warfighter Readiness Research division showcased their integrated training capabilities at the 2010 Interservice/Industry Training, Simulation and Education Conference in Orlando, Fla. X-37B Orbital Test Vehicle Lands at Vandenberg AFB The U.S. Air Force's first unmanned re-entry spacecraft landed here Dec. 3 at 1:16 a.m. The X-37B, named Orbital Test Vehicle 1, which launched April 22 from Cape Canaveral, Fla., conducted on-orbit experiments for more than 220 days during its maiden voyage. It fired its orbital maneuver engine in low-earth orbit to perform an autonomous reentry before landing. Preparations Underway for First Landing of X-37B Space professionals are preparing for the first landing of the X-37B Orbital Test Vehicle here. Members of the 30th Space Wing will monitor the de-orbit and landing of the Air Force's first X-37B. While the exact landing date and time will depend on technical and weather considerations, it is expected to occur between Dec. 3 and Dec. 6. X-51 Waverider Makes Historic Hypersonic Flight 5/26/2010 - EDWARDS AIR FORCE BASE, Calif (AFNS) -- An X-51A Waverider flight-test vehicle successfully made the longest supersonic combustion ramjet-powered hypersonic flight May 26 off the southern California Pacific coast. The more than 200 second burn by the X-51's Pratt & Whitney Rocketdyne-built air breathing scramjet engine accelerated the vehicle to Mach 5. The previous longest scramjet burn in a flight test was 12 seconds in a NASA X-43. First Minotaur IV Lite Launches from Vandenberg 4/23/2010 - VANDENBERG AIR FORCE BASE, Calif. (AFNS) -- Members from the 30th Space Wing here launched the first Minotaur IV Lite launch vehicle at 4 p.m. April 22 here. The rocket carried the Defense Advanced Research Projects Agency's Falcon Hypersonic Technology Vehicle 2. Air Force Officials Launch Atlas V Carrying X-37B Orbital Test Vehicle 4/23/2010 - CAPE CANAVERAL AIR FORCE STATION, Fla. (AFNS) -- Members of the 45th Space Wing here launched a United Launch Alliance-built Atlas V Evolved Expendable Launch Vehicle carrying an X-37B Orbital Test Vehicle at 7:52 p.m. EDT April 22 here.
<urn:uuid:bbf1fff1-3cc1-44d3-a35e-3d59d2af8b22>
CC-MAIN-2016-26
http://www.sciencenewsline.com/summary/2010120810070000.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396106.71/warc/CC-MAIN-20160624154956-00053-ip-10-164-35-72.ec2.internal.warc.gz
en
0.868951
600
2.59375
3
Animals teach farm safety in a one-of-a-kind, audio CD series – created to educate children on farm dangers. Vickie Harbert of Farm Safety USA, which produced the four-CD series, says family and friends have been injured and killed in farming accidents, which motivated her to produce the series to educate kids and adults worldwide. The Fun Farm targets children and teens. In a serious, yet fun way, the farm animals remind them of dangers and what they can do to avoid injury and death during harvest season and all year long. "Animals talk in Dr. Doolittle and on Mr. Ed; why not on an audio CD educating children about farm safety?" asks Harbert. The CD series includes 25 adventure stories in all, with an interactive quiz at the end of each show. "Most accidents are avoidable by safety education," says Harbert, "and this series will help save lives and limbs." She believes the series would not only benefit farm families, but farm implement manufacturers and suppliers, as well as FFA, 4-H Clubs and other educational institutions teaching agriculture. Nationwide, more than 300 children die on farms every year, according to the National Institute for Occupational Safety and Health. Children between the ages of 9 and 15 are most at risk. The bulk of those injuries, experts say, are preventable. "In order to help children, teens and adults learn and practice farm safety, you must get their attention in a clever, entertaining fashion," says Shari Burgus, Education director at Farm Safety 4 Just Kids in Urbandale, Iowa. "These 25 Fun Farm safety adventures are pure entertainment for the whole family while reminding them of the many dangers and precautions to help all farm members stay safe on the farm." For more information about the "Fun Farm" audio series, please visit http://www.farmsafetyusa.com Next Tip: Temple’s Top Animal Handling Tips
<urn:uuid:f228f6cb-fa8c-4d2a-a37e-b3cda3a16269>
CC-MAIN-2016-26
http://beefmagazine.com/print/americancowman/youth-spotlight/cd_farm_safety_children
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393997.50/warc/CC-MAIN-20160624154953-00069-ip-10-164-35-72.ec2.internal.warc.gz
en
0.950645
407
2.890625
3
HISTORY OF TOSZEK CASTLE It is not known exactly when, on the highest hill in the area, the first wooden gord of defensive nature was built. It is likely to happen in the early-Piast period, between the X and XI century. Some written sources confirm the existence of the gord in Toszek as the seat of a castellany in 1222 when the castellany and the castellan Jacob is mentioned. Some historians claim that the castellany gord in Toszek was raised in the XII century. Saint Peter's church was mentioned in a papal bull in 1201, so it is highly likely that the gord had existed earlier. We can not exclude the fact that the castellany could have existed even earlier in the reign of Bolesław III Wrymouth. During the period of „fragmentation” the castellany gord in Toszek belonged to the successive Silesian dukes from the Opolska line, then the Bytomsko-Kozielska line, and Cieszyńska and Oświęcimska lines. One of the most significant residents was princess Judyta, wife of the duke of Opole Mieszko II the Fat, who, after her husband's death in 1246, lived in Toszek for some time. Bolesław the duke of Toszek from the Kozielsko – Bytomska line became very successful in Europe. In about 1315, he became an archbishop of Ostrzychom and the Primate of Hungary, with help of his sister Maria , who was married to Hungarian king Karol Robert. The castle reached the highest importance in the long reign of Przemysław the duke of Toszek (from the Oświęcimska line) in the XV century. Duke Przemysław not only rebuilt the castle out of stone after the Hussite raids, but also made it his permanent residence built in stone. After the death of duke Przemysław in 1484, the castle belonged again to the Opolska line of Piast, but only for a short time. After the heirless death of Jan II Dobry in 1532 the castle, with both Duchy of Opole and Racibórz, was owned by the Habsburg family (as a feudal tenure of the Czech kings). The Habsburg Family left the castle in pledge to Fryderyk von Rendern in 1557 and next to his son Jerzy Fryderyk Redern who bought it along with Toszek and Pyskowice. Atfer the fire in 1570, the Rendern Family rebuilt the castle in Renaissance Style and added to the rebuilt gate by building housing premises. The Rendern family reigned in Toszek castle till the death of Jerzy II Rendern in 1637. His sister Margaret von Kolovrat, who became the owner, married her daughter to the influential Earl Casper Colonna whose family came from Tyrol. In this way, the castle fell into the hands of Colonna Family which ruled it between 1638 and 1707. Thanks to Casper Colonna, the castle owes the next period of splendour to the major rebuilt made by an architect Giovanni Seregna from Milan between 1650 and 1666. This rebuilt commemorates the foundation inscription over the gate building: CASPAR COMES COLONNA 1666. As a consequence of the reconstruction, the castle which was formerly meant for defence was converted into a magnate's mansion, which others could not compare with in this part of Upper Silesia. However, in 1707, the Colonna Family sold the castle to baron Johann Dietrich von Peterswald and then, he sold it to count Francis Charles Kottuliński. After the Kottuliński Family /1718 – 1759/ the castle was in the Posadowski’s Family hands /1759 – 1791/ next in 1791, baron Adolf von Eichendorff of Łubowice and the father of romantic writer Joseph von Eichendorf, bought it. The castle belonged to the Eichendorff Family for only six years, but for the future poet the earliest years of his life were spent there, when experiences are culminated to later bear fruit. He mentions “the castle on the hill of silence” which is assumed to be the castle in Toszek because the poet stayed there many times in his childhood. Critiques | Translate Nicou (141162) 2014-03-16 1:08 quelle vue de ce château sueprbe iamge et compo avec la grille d'entrée cette tour ronde et les tons le rendu sur les pierres splendide. emka (96525) 2014-03-16 1:19 Nigdy nie slyszałam o Toaszku, a jka fajnie wyglada. Na Śląsku to jest sporo zamków i w dodatku niezryjnowanych. Na Mazowszu to z tym jest bardzo słabo. Ciekawe zdjęcie z twojego archiwum. mesutilgim (95050) 2014-03-16 1:24 Hello Georg,my neighbour today Nice capture from Toszek. Very good timing with the sunrays from left, which creates a nice 3D effect. Many interesting notes makes your entry a perfect TE entry. TFS and have a nice weekend papagolf21 (100962) 2014-03-16 1:25 Voilà une très belle prise de vue bénéficiant d'un éclairage de toute beauté. Très belle lumière latérale. Le sujet est fort bien mis en valeur. Fis2 (96799) 2014-03-16 2:34 Fajne mury, robia wrazenie. Super kolorki i swiatlo. U mnie chlodno i pada :( snunney (98265) 2014-03-16 3:03 The point of view is excellent with castle placed off-centre and the path making a good lead-line. Even more delightful is the lighting, which brings out the colours and detail in the attractive architecture very well indeed. Thanks for sharing. ngk (2413) 2014-03-16 3:16 Beautiful presentation from this castle with great sharpness and excellent light management. Have a nice week. Subhogen (4067) 2014-03-16 3:39 Excellent view of the old castle. I like the POV and the wonderful details you have captured on the castle wall. Sharpness and colours are superb as well. Thanks for sharing a fine photo. luciola (2942) 2014-03-16 4:30 Ciekawy obiekt i nawet zadbany. Sergiom (78623) 2014-03-16 5:18 J'aime beaucoup la texture que tu as donné à l'image en post production. C'est tellement net que l'on pourrait compter les pierres des murs une à une. J'aime beaucoup la lumière sur la tour ronde. tedesse (25135) 2014-03-16 5:49 Pieknie pokazany fragment murow w zespole zamkowym w Toszku. Super kolory i doskonala ostrosc. jhm (152246) 2014-03-16 6:09 Thank you very much for interesting notes. Our Belgian queen Mathilde d'Udekem d'Acoz, her parent come out of Poland, lived on an castle in Poland The colours make these picture very attractive. Indeed a lovely post-card of this wonderful building. Perspective and depth are perfect taken. Excellent composition, nice captured. Very well done, TFS. Have a nice Sunday, subhendu_bagchi (26089) 2014-03-16 8:19 a beautiful castle and you presented it superbly indeed. Great colours and fine depth. Superb capture. Tfs. Kamilutka (8105) 2014-03-16 8:24 czy to HDR? Jesi tak to bardzo ladnie zrobiony, taki jaki lubie. Bez przesady ale z delikatnym makijazem. Swietnie uzyskane kolory i pieknie pokazny zameczek. Dobry POV na to zdjecie! Sonata11 (33795) 2014-03-16 13:17 bardzo ladny zamek. Przyjemnie popatrzec na sra architektura, ktora ma swoja dusze. Podoba mi sie. Serdecznie pozdrawiam, Silvio1953 (142131) 2014-03-16 13:30 Ciao Georg, great view of fantastic castle, good PP work, wonderful colors, splendid light and excellent clarity, very well done my friend, ciao Silvio saxo042 (37874) 2014-03-17 0:56 A very long and interesting note. Also a very good picture with determined lines and angles. Many sharp details and very attractive colours. ChrisJ (113273) 2014-03-17 16:09 I like the sunlight on the semicircular tower at right and to a lesser extent the facade of the attractive old stone building at right. The red clay pot contrasts well against the blue grey street to give a marvellous warm cold colour contrast. A nice blue sky. Might have cloned out the power line, but it's no biggie. Tfs! photoray (13981) 2014-03-17 16:55 The rock textures are attention getting, and varying warm colors with this Gothic Toszek Schloss. It's not the size but the rocks. Thanks for sharing, ikeharel (70743) 2014-03-18 8:09 The old gate and the unique edifice are in great clear view on details, Georg, light was very favorable and gave a special glow upon. An interesting note about, and a fine shot uphill's, intriguing archi.-style to photograpgers, you well collected. COSTANTINO (64766) 2014-03-20 7:27 fantastic capture of this castle with a history of many years ago the light is delightful excellent contrast with the blue sky have a nice evening pierrefonds (65878) 2014-03-21 18:33 The tight frame is putting the castle in evidence. The point of view is allowing me to distinguish the details and the colours of the architecture of the Toszek castle. It is clear and sharp. Have a nice day. andywo (4725) 2014-04-01 11:48 Podoba mi sie to zamczysko. Zdjecie ma swoj ciekawy klimat. Doskonala prezentacja!
<urn:uuid:87329a37-e6ca-480a-a46b-4b4c01d2eb1e>
CC-MAIN-2016-26
http://www.trekearth.com/gallery/Europe/Poland/West/Slaskie/Toszek/photo1455042.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397695.90/warc/CC-MAIN-20160624154957-00125-ip-10-164-35-72.ec2.internal.warc.gz
en
0.784359
2,469
2.921875
3
Framework for Independent Living The Framework for Independent Living (FIL) is a standards-based resource for the development of independent living skills. This framework is not intended to serve as a complete curriculum, but rather as a guide which provides structure for districts to use in finalizing their own curriculum. This framework will allow a teacher to use a systematic program of instruction that helps a student to progress from basic skills to his/her highest level of independence. The FIL provides educators with a standards-based resource that informs instruction to grow learners' capacities to engage as active life participants. The FIL is a dynamic tool that enables systematic instructional planning for student achievement of benchmark performance at developmentally appropriate learning levels. The FIL blends academics and functional skill areas, focusing on transitional outcomes and bridging school experiences with adult life. The FIL also places heavy emphasis on learners' development of self-advocacy and self-determination skills. The Framework for Independent Living allows educators to customize learning programs to meet students' individual needs, from grades K-12. The Framework for Independent Living embraces seven essential learning domains. Each learning domain is organized around instructional strands that scaffold performance benchmarks in a developmental sequence. It contains not only Horizontal Progression, but also Vertical Alignment of skill development. All instructional strands in the FIL are referenced to Pennsylvania Academic Standards and/or Pennsylvania Alternative Academic Standards. Thus, student instruction is geared toward appropriate learning levels within each strand. The FIL provides a suggested set of goals to assist educators in planning for classroom instruction, RR and IEP preparation. The FIL recognizes that achievement of children and young adults exhibits varying levels of strengths within and between each learning domain. Essential Learning Domains include: - Self Advocacy/Self-Determination - Social Skills/Behavior Continuum - Job Readiness Continuum - Human Development Continuum - Daily Living Skills Continuum - Functional Literacy - Functional Mathematics Contact Dr. Nanci A. Sullivan (nanci.sullivan@aiu3net; 412-394-5956) for more information or to request an on-site presentation on the Framework for Independent Living.
<urn:uuid:67ad9a8e-26f1-4b0e-ab62-ceec17caec46>
CC-MAIN-2016-26
http://www.aiu3.net/Level3.aspx?id=3602
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403826.29/warc/CC-MAIN-20160624155003-00013-ip-10-164-35-72.ec2.internal.warc.gz
en
0.904844
437
3.4375
3
1 Answer | Add Yours The “Dedication” to Lord Byron’s Don Juan might be summarized as follows: - Byron opens the dedication by mocking Robert Southey, as well as William Wordsworth and Samuel Taylor Coleridge, for having abandoned their earlier liberal political beliefs (1-16) and for having declined in skill as poets (17-64). He suggests that they have been motivated partly by desire to win official approval and financial reward. - He contrasts Southey, Wordsworth, and Coleridge with John Milton, the great revolutionary poet of the seventeenth century, who remained committed to his original radical political principles even when it was disadvantageous to do so (64-88). - He mocks Viscount Castlereagh, an important political figure of the time, whom Byron detested (89-128), depicting him as an enemy to freedom everywhere. - He returns to his mockery of Southey (129-36), accusing him of political hypocrisy and self-serving flattery. The dedication thus establishes Byron’s commitment to liberal, lofty political principles as well as to composition of a kind of poetry that reflects a commitment to those principles and also commitment to lofty artistic goals we well. Byron considers Southey (and, to a lesser degree, Wordsworth and Coleridge) old men who have lost touch with the political ideals and poetic aspirations that once made them great. He depicts Southey, in particular (whom he disliked personally) as a sell-out and time-server: Meantime, Sir Laureate, I proceed to dedicate In honest, simple verse, this song to you; And if in flattering strains I do not predicate, ’Tis that I still retain my “bluff and blue.” (129-32) “Bluff and blue” were colors associated with the Whigs, the more liberal of the two political parties in England (Tories being the conservatives). We’ve answered 328,203 questions. We can answer yours, too.Ask a question
<urn:uuid:1e7241bf-a82d-4918-86ad-38e26635b0d3>
CC-MAIN-2016-26
http://www.enotes.com/homework-help/need-summary-dedication-from-lord-byrons-don-juan-279209
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402516.86/warc/CC-MAIN-20160624155002-00065-ip-10-164-35-72.ec2.internal.warc.gz
en
0.96458
439
2.75
3
One of the most hazardous of underwater jobs is diving shipwrecks. Divers explore shipwrecks to retrieve objects of historical significance or to help in recovery efforts. The work is so hazardous that much of it is carried out by unmanned robots. The typical underwater robot uses propellers to get around, but that form of propulsion isn't ideal. The reason propellers aren’t ideal is because they stir up silt from the bottom of the ocean and obscure visibility. Another problem with typical underwater robots is that many of them require tethers for control and power. A new robot called U-CAT has been developed that uses a novel propulsion method and requires no tether. U-CAT is small enough to fit into very compact spaces. It also has no tether and uses flippers for propulsion. The flippers move in a manner very similar to sea turtles and allow the robot to turn and hover in place without knocking up lots of silt from the ocean bottom. The robot has a camera allowing it to record what it sees for inspection. The first tests of the U-CAT robot will be conducted in the Baltic Sea.
<urn:uuid:d7a7da66-a6ea-40a0-9300-f5ad519cb90b>
CC-MAIN-2016-26
http://www.slashgear.com/robot-dives-underwater-wrecks-by-mimicking-sea-turtle-movement-29307135/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391634.7/warc/CC-MAIN-20160624154951-00074-ip-10-164-35-72.ec2.internal.warc.gz
en
0.950516
234
3.625
4
New Data Indicate Lower Number of HIV/AIDS Cases in Papua New Guinea, Rapid Spread of Epidemic in Rural Areas August 10, 2007 Data recently collected in Papua New Guinea indicate that fewer people are living with HIV/AIDS than previously estimated but that the disease is spreading more rapidly in rural areas, Health Minister Peter Barter said on Thursday, the AAP/Sydney Morning Herald reports. The new estimates -- which were collected by government health agencies with the help of overseas partners, such as AusAID -- indicate that HIV prevalence among people ages 15 to 49 is 1.28%, compared with the previous estimates of 2% (AAP/Sydney Morning Herald, 8/9). "These changes in the epidemic call for the government and its partners to mobilize all resources to minimize the impact of the HIV epidemic on people's lives in both rural and urban areas," Barter said, adding, "We need to focus our interventions to young people, particularly female youth. Young people are the backbone of the nation's workforce and economy." Barter called on residents to practice prevention methods -- such as using condoms, practicing abstinence and being faithful to one partner. The target of Papua New Guinea's National Strategic Plan for HIV/AIDS is to reduce HIV prevalence in the general population to 1% by 2010 (AAP/Sydney Morning Herald, 8/9). This article was provided by Henry J. Kaiser Family Foundation. It is a part of the publication Kaiser Daily HIV/AIDS Report. Visit the Kaiser Family Foundation's website to find out more about their activities, publications and services.
<urn:uuid:da2ca1e0-2696-4cc9-869d-186d6727c842>
CC-MAIN-2016-26
http://www.thebody.com/content/art42655.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783394987.40/warc/CC-MAIN-20160624154954-00191-ip-10-164-35-72.ec2.internal.warc.gz
en
0.947468
326
2.8125
3
When the Cassini-Huygens probe landed on the surface of Saturn's largest moon, Titan, last year, it found no evidence of the ethane ocean long thought to cover the satellite's surface. Instead, scientists observed dune structures that could be dust-like combinations of ethane and smog particles, according to a new study in the current issue of Nature. Titan's dense atmosphere is composed mostly of nitrogen with a small amount of methane. This methane is broken up by the Sun's ultraviolet light to produce a dense orange-brown smog that hides the satellite's surface. Scientists thought that ethane, one of the products of these reactions with the Sun, was abundant enough to have condensed and rained down to form a kilometer-deep ocean across the entire surface of the satellite. But observations of the surface suggest that it is instead covered by dunes, which Donald Hunten of the University of Arizona thinks could be made of a combination of ethane and smog particles. Titan's ethane can't condense into liquid rain because "the smog particles grab the ethane before it has a chance to form drops," Hunten said. The resulting particles deposit on the moon's surface and pile up to form dunes that might be as deep as several kilometers, Hunten says. The particles would be more like dust than sand though, so Hunten has dubbed them "smust" (a combination of "smog" and "dust"). Hunten based his proposal for this mechanism on the observed behavior of ethane in Jupiter's atmosphere, where at certain levels, it condenses onto smog particles. "Basically, I used Jupiter as the laboratory to show that the ethane is sticking to the particles," Hunten told Space.com. "I think there's a very deep deposit of them on the ground [of Titan], but we can't confirm that with observations," he added. To confirm Hunten's theory, laboratory experiments would have to be conducted to show that ethane does indeed condense onto the smog particles. - Cassini Scans Titan for Subsurface Ocean, Methane Ice - SPACE.com Special Report: Cassini-Huygens at Saturn and Titan - Researcher Touts Saturn's Titan As New Exploration Goal - Images: Imagining Saturn and Titan
<urn:uuid:371274b0-6393-480f-8b1a-1dac012cf5bc>
CC-MAIN-2016-26
http://www.space.com/2989-titans-surface-dusty-dunes.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396875.58/warc/CC-MAIN-20160624154956-00119-ip-10-164-35-72.ec2.internal.warc.gz
en
0.93998
486
3.828125
4
What's New for 2010 MeSH® Overview of Vocabulary Development and Changes for 2010 MeSH - 422 Descriptors added - 52 Descriptor terms replaced with more up-to-date terminology - 20 Descriptors deleted Totals by Type of Terminology - 25,588 Descriptors - 83 Qualifiers - 186,686 Supplementary Concept Records (SCRs) Please consult the 2010 online Introduction to MeSH for more details. Lists of new and changed vocabulary are available at these links: - MeSH Vocabulary Changes - New Descriptors - 2010 - Changed Descriptors - 2010 - Deleted Descriptors - 2010 - New Descriptors by Tree Subcategory - 2010 In addition, files of MeSH 2010 vocabulary are also available for downloading. Major Tree Revisions For 2010 MeSH, the Category B (Organisms Tree) was reorganized to include specific taxonomic descriptors for the third domain of life (Eukaryota). The descriptor Protozoa, formerly under Invertebrates, was deleted because it has become an outmoded phylogenetic concept. The vast majority of new descriptors treed under Eukaryota comprise most of the organisms that were previously treed under the old Protozoa. The 20th century classification of Protozoa emphasized modes of nutrition and locomotion; 21st century classification is based on ultrastructure, biochemistry, and genetics. Most of the organism descriptors that were treed under Protozoa are now treed under Eukaryota, some under different taxonomic names. Note these organisms are no longer treed under Animals and will not get the check tag Animals; they are simply eukaryotes. Common usage of the word "protozoan" still exists in the literature, though it is diminishing; for now we are going to retain the other MeSH descriptors with the word "Protozoan." Thus the headings Protozoan Infections, Protozoan Genes, and Protozoan Proteins, etc. have not changed. Influenza A Virus, H1N1 Subtype for the causative agent of what is colloquially called "swine flu." It has entry terms H1N1 Virus and Swine-Origin Influenza A H1N1 Virus. The disease coordinate for H1N1 in humans is Influenza, Human. There are no references to "swine flu" in MeSH due to its ambiguous meaning (analogous to "bird flu"). For more indexing details, see 2009 H1N1 Flu ("Swine Flu") Terminology. Under an agreement with the NIH Office of Rare Diseases and Research (ORDR), the list of rare disease terms maintained by that office is being merged into the MeSH vocabulary. During the initial review process of 10,379 ORDR terms, 1,332 ORDR terms were deleted because they were abbreviations of fewer than five letters and therefore would have created ambiguity if included in MeSH. A total of 274 ORDR terms were merged with existing descriptors in MeSH 2010. This increase is in addition to the 440 ORDR terms that were identified as being already in MeSH 2010 descriptors. An additional 372 ORDR terms were identified during this review process to be merged with MeSH 2011 descriptors. The remainder are targeted to be Supplementary Concept Records (Class 3) in MeSH 2011. Each of these rare disease SCR records will be mapped to (Heading Mapped to) at least one current MeSH disease term to help future searches and indexing. For example, ORDR disease term Myotonia Congenita matches the existing MeSH descriptor Myotonia Congenita (D009224). The ORDR related term Thomsen Disease is an Entry Term for Myotonia Congenita. See Figure 1; note the ORDR terms are identified by the label Thesaurus with a value of ORD (2010). This particular concept will have additional edits targeted for the 2011 MeSH. Figure 1: Myotonia Congenita, MeSH Browser 2010, Expanded Concept View Showing ORD as a New Thesaurus Value. Schulman JL. What's New for 2010 MeSH®. NLM Tech Bull. 2009 Nov-Dec;(371):e15.
<urn:uuid:a76edef4-3e7e-44d7-b086-98cbdb8ef94f>
CC-MAIN-2016-26
https://www.nlm.nih.gov/pubs/techbull/nd09/nd09_mesh.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783408840.13/warc/CC-MAIN-20160624155008-00173-ip-10-164-35-72.ec2.internal.warc.gz
en
0.911851
907
2.75
3
Tall as a 15-story building, with a mighty trunk, crooked branches and a kingly canopy of leaves, the London plane tree, Platanus x acerifolia, is prized by horticulturists and city planners as a “supertree,” immune to urban grime and smog. However, can it survive a -development-hungry Chinese Communist Party (CCP)? In Nanjing, a southeastern city of 8 million people, the answer seems — for now — to be yes. In a nation where homes and farmland are routinely chewed up for the sake of high rises and factories, a grassroots campaign by Nanjing residents this spring to save hundreds of the trees, known in China as the wutong, from a subway expansion might seem like a nonstarter. However, the effort, organized mostly online, has led to a surprising compromise from local government officials. It was not a shining example of democracy in action. However, neither were ordinary citizens left fuming about power-drunk bureaucrats deaf to anyone below. Maybe that is because some Nanjing officials consider the CCP’s credo of “supervision by the people” to be more than mere words. Or maybe it is because trees, in the scheme of development, provide an easy compromise. Giants in the arboreal world, the wutong were introduced in China by the French in the late 1800s or early 1900s to adorn their settlement in Shanghai, Nanjing officials say. In 1928 and 1929, Nanjing planted more than 20,000 saplings along Zhongshan Avenue, a road leading to the mausoleum of the anti-imperialist leader Sun Yat-sen (孫逸仙), revered as the founding father of modern China. Many more were reportedly planted after the Communists took power in 1949. The trees grew fast and provided shade during Nanjing’s scorching summers. And they became not just a symbol of Nanjing’s graceful beauty, but of its civic philosophy. Its urban plan touts the city’s integration with mountains, rivers and trees. “The people of Nanjing grew up together with these trees,” said He Jinxue, the daily operations director for the city’s urban construction commission. “There is so much emotional attachment to them.” That did not shield them from the onslaught of development. In 1993, more than 3,000 were felled virtually overnight to make way for the Shanghai-Nanjing Expressway. Nearly 200 more were removed to build Nanjing Subway Line Two in 2006. Then, this year, came Subway Line Three, calling for more than 1,000 trees — mostly wutong — to be beheaded, uprooted and plunked down elsewhere to make space for six above-ground stations in the city center. Nanjing’s two existing subway lines, each carrying 1 million commuters a day, are not nearly enough, He said, adding that more than 10 new lines are planned, he said. However, once workers had reduced a first batch of 49 wutong to trunks and a few feet of branches, the Chinese equivalents of Twitter rustled with more than 10,000 outraged messages. A schoolteacher organized students to tie green ribbons around some untouched trees. Several celebrities weighed in, including Huang Jianxiang (黃健翔), a freelance television host and sports commentator whose Sina Weibo microblog is followed by more than 5 million people. So did a Taiwanese lawmaker, Chinese Nationalist Party (KMT) Legislator Chiu Yi (邱毅), because the KMT used Nanjing its headquarters until it was vanquished by the Communists in 1949.
<urn:uuid:04ec9b0d-da43-44b6-a300-87c5bdf0ea72>
CC-MAIN-2016-26
http://www.taipeitimes.com/News/world/archives/2011/06/06/2003505119
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396875.58/warc/CC-MAIN-20160624154956-00152-ip-10-164-35-72.ec2.internal.warc.gz
en
0.967345
789
2.8125
3
Choose one of our special categories to view or subscribe Health Highlights: July 30, 2012 Here are some of the latest health and medical news developments, compiled by the editors of HealthDay: Devices Not Enough to Save Children Left in Overheated Cars: Report Devices aimed at preventing kids from dying in overheated cars may not work well enough to keep children from harm, a new review finds. Parents shouldn't rely on special seats and other devices to stop them from accidently leaving children in cars, David Strickland, administrator for the U.S. National Highway Traffic Safety Administration (NHTSA), said in a Monday press briefing, NBC News reported. "While these devices are very well-intended, none of them are a full or complete solution for making sure a parent never leaves a baby behind in a hot car," Strickland said. According to NHTSA, about 38 children die each year of heat stroke after being left in cars. The new report reviewed 18 commercial products, including pads that sense if a child is in a car seat; devices that can tell if a seatbelt is buckled and alarms that remind parents to check. "The devices were inconsistent and unreliable in their performance," the researchers wrote in their report. "They often required adjusting of the position of the child within the child restraint, the distance to activation varied across trials and scenarios, and they experienced continual synching/unsynching during use." The report also notes that "devices which integrate into a child restraint would not be applicable in scenarios where the child is playing and gets locked in the vehicle (30 percent of fatalities) or in a scenario where the parent/caregiver intentionally leaves the child in the vehicle (17 percent of fatalities)." According to Strickland, parents can help ensure tragic heat stroke accidents in cars don't happen by using a few simple precautions. These include leaving a child's toy in the front seat as a reminder, putting a purse or briefcase in back seat so that the driver is forced to look in the back before exiting the car, or setting an alarm on the cellphone to remind yourself to check on a child's whereabouts. Ugandans Urged to Avoid Physical Contact as Ebola Kills 14 As a lethal outbreak of Ebola spreads in Uganda, President Yoweri Museveni urged citizens to avoid physical contact to limit the spread of the disease. According to BBC News, 14 people, including one in the capital city of Kampala, have died from Ebola since the outbreak began three weeks ago in the western part of the country. Ebola is one of the most virulent and lethal infectious diseases in the world and is spread person to person. Museveni said health officials are trying to identify and quarantine those people who've had contact with victims. He said people should avoid everyday contacts such as shaking hands, kissing or having sex to avoid passing the disease on. Burials of people known to have died from Ebola should also be handled by health workers, Museveni said. According to the BBC, Uganda has faced three Ebola outbreaks over the past 12 years, with the deadliest occurring in 2000 when 425 people were infected and more than half died. Recall Issued for Kitty Treats A voluntary recall has been issued for a brand of chicken treats for cats because of possible contamination with high levels of propylene glycol, according to the U.S. Food and Drug Administration. The recall was issued by Los Angeles-based treat maker Arthur Dogswell LLC late Friday, NBC News reported. It applies to the Catswell Brand VitaKitty Chicken Breast with Flaxseed and Vitamins treats, and comes on the heels of recent reports of more than 1,800 dogs getting sick after eating chicken jerky treats that were made in China. Slightly more than 1,000 cartons of the treats will be pulled off the market, NBC News reported. The high levels of propylene glycol could cause anemia and oxidative damage in cats, although no illnesses have been reported, the company said. Dogswell spokesman Brad Armistead told NBC News late Friday that the company hopes to return the products to the marketplace in the near future. "We have voluntarily withdrawn a small number of chicken products for cats. This is an isolated situation and does not affect any other products for cats or dogs," Armistead said in a statement. "We are committed to providing safe and healthy products to our customers and their pet companions." The FDA has repeatedly said it has tested pet treats in the United States for the presence of many toxins, including propylene glycol, but agency officials said they found no levels high enough to urge a product recall, NBC News reported. Cat owners who bought the VitaKitty products should return them to the place of purchase for a full refund, the company said. If the product was purchased online, consumers should contact the Internet retailer to pursue a specific return and refund. Copyright © 2012 HealthDay. All rights reserved.
<urn:uuid:37fa60da-025b-4b0b-a07a-0a4db4dec443>
CC-MAIN-2016-26
http://www.summitmedicalgroup.com/healthday/article/667162/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397795.31/warc/CC-MAIN-20160624154957-00034-ip-10-164-35-72.ec2.internal.warc.gz
en
0.967343
1,029
2.71875
3
Smartphone apps help users save 88 minutes of their time in a day or 22 days a year, a new study has found. study by market research firm Harris Interactive, based on the responses of 2,120 adults, found that 97 percent of smartphone owners use at least one app on their device. On average, those smartphone users estimate app usage amounts to 88 minutes of time saved a day or 22 days of free time a year. apps were the most frequently used apps, followed by text and social networking apps. Additionally, smartphone users said they used apps for games, Web browsing, weather, maps or Global Positioning System (GPS) and calendar functions, 'BusinessNewsDaily' reported. apps were the most frequently used, people saved more time using text applications than any other type of app. Text apps saved users an average of 53 minutes a day, compared with 35 minutes a day for email Twenty per cent of workers who use email apps said they were extremely productive when using those apps. powerful as our survey results prove the smartphone to be, the exciting reality is today's mobile technology innovation has only scratched the surface of its potential to propel success, both in personal life and in business," said Gil Bouhnick, vice president of Mobility at ClickSoftware, which conducted the research. Smartphone users also admitted their devices were not simply for personal use. One in five users of GPS and email applications said they used those apps mainly for work, while one in three said they used them equally for work and Even though users are spending all that time on their smartphones, most people do not think they are getting the most out of their devices, the researchers found. Eighty-two percent of respondents said they are not using all the features on their smartphones.
<urn:uuid:5479b890-38ac-4523-a41d-78abb916f3f1>
CC-MAIN-2016-26
http://gadgets.ndtv.com/apps/news/smartphone-apps-help-save-22-days-of-your-time-per-year-371724
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395160.19/warc/CC-MAIN-20160624154955-00013-ip-10-164-35-72.ec2.internal.warc.gz
en
0.949857
383
2.609375
3
Have you ever wondered how your dog has never become dehydrated? I mean, without a lululemon water bottle that has perfectly measured markings so they know *exactly* how much water they’re getting everyday, how can you be sure your dog hasn’t been on the brink of death this whole time? I’m going to tell you why and it’s not, despite your claims to the contrary, because your dog is smarter than your neighbor’s child. I had noted that I would do a post like this a few weeks ago when a colleague of mine chided me to get it done because his clients wouldn’t listen to him about fluid intake. Namely, he’s a high-intensity guy who trains clients in a controlled environment (~65* F, humidity controlled), but his clients are probably wearing tennis skirts and drinking water like they’re crossing the Sahara. So let’s start there. Have you ever wondered why 8 glasses of 8 ounces of water per day has been recommended? Well, the truth is that there’s not good evidence for this claim as a concept, as evidenced by a research review published in the Journal of the American Society of Nephrology. Researchers concluded “There is no clear evidence of benefit from drinking increased amounts of water.” The notion of consuming 64oz of water per day dates back to the 1945, where what is now the Institute of Medicine recommended drinking once milliliter of water per calorie of food consumed. Based on average consumption estimations at the time, this worked out to almost 64oz of water per day. The problem was that they didn’t account for the fact that food gives you tons of water and counts toward your water intake. Take a look: You’ll notice in the diagram above that water intake from food accounts for nearly as much water as water from fluid intake. So if you’re getting adequate nutrition, you’re getting a lot of water. How do you make up the water differences in your daily life? You get thirsty and, despite what you’ve heard, thirst does not mean you’re already dehydrated. On the contrary, thirst begins when the concentration of blood (an accurate indicator of our state of hydration, because remember blood is filled with other things) has risen by less than two percent, whereas most experts would define dehydration as beginning when that concentration has risen by at least five percent. This is why your dog isn’t dead in the backyard after trying to get that squirrel obsessively and why you, despite years of never paying attention to your hydration status before you started exercising, are reading this. Drink when you’re thirsty and you’re covered. Fluid during exercise Exercise is a slightly different animal. Take a look at the diagram above and you’ll see significant increases in fluid output in the form of sweat. This is because sweating is our main mechanism of cooling, as evaporation of the sweat is wickedly efficient at keeping us from dying. This is important because the human organism handles drops is body temperature far better than it handles increases in body temperature. So not only are you sweating like a pig, but you’re breathing more heavily, which forces more water out of you as vapor, further cooling your body. Under these circumstances, more water is necessary, but not as much as you think. In fact, too much water with all of that sweating leads to a condition called hyponatremia, which is where the blood is diluted to the point where electrolyte concentration falls to the point where the normal osmotic balance at the brain is altered. As a result the brain swells and you could end up with fun outcomes like death. Another name for this? “Water Intoxication.” It’s basically why “oral rehydration” products like Gatorade were invented. But this is if you’re sweating like a pig in an environment that is hot and humid…basically worst case scenario stuff. What if you’re training in one of our studios? If you’re in my studio, you might not sweat at all as I keep fans blowing and the temperature at 67* F. If you train at Rosedale, it’s likely to be higher but not hot room yoga levels. So if we account for water loss through vapor, which is about 3-4 mL per minute given our example, then you’d exhale 90 to 120 mL of water during a half our session that needs replacing. That’s 3 to 4 ounces, folks. Paltry stuff. If you doubled that 8 ounces, you’d likely account for most of the sweat lost during that time given controlled conditions. Drink to thirst the rest of the day; your body is smarter than you. - Your body is smarter than you and thirst is an accurate indicator of water demands. - During strenuous activity in the heat where intense sweating is occuring, a fluid intake of up to 250mL (~8 ounces) every 15 minutes is recommended, but not more than 1000mL. At that point, an oral rehydration supplement would be appropriate. - If you’re training at Efficient Exercise, or in any other climate controlled environment, much less water, to the tune of 8 ounces per 30 minutes, is appropriate. Skyler Tanner is an Efficient Exercise Master Trainer and holds his MS in Exercise Science. He enjoys teaching others about the power of proper exercise and how it positively affects functional mobility and the biomarkers of aging.
<urn:uuid:c834b4f5-d0a8-4c20-b782-a7579d078e96>
CC-MAIN-2016-26
http://efficientexercise.com/water-intake-clients-dont-need-much-think/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397744.64/warc/CC-MAIN-20160624154957-00140-ip-10-164-35-72.ec2.internal.warc.gz
en
0.958743
1,170
2.53125
3
By Elvis R. Sverko A few weeks ago, I posted part 1 of Creativity Using CAD and talked about being innovative when creating models in CAD. Today, we’ll expand on that notion. CAD can be an engineering tool as much as an artistic display. And when I say that it can be both, I mean that it is both at the same time. It can be used by engineers, architects, or other designers to do design work. But at the same time, when they use CAD, the models (or drawings) need to be presented in a way so that others can understand it, and maybe even appreciate it as if it were a piece of art (ie, when presenting the design to potential clients). CAD is both very exacting and artistic. Just like math is both. And just like math, it is ‘very hard creative work’ according to Paul Lockhart ( “A Mathematician’s Lament” , Mathematical Association of America). Lockhart also adds that in order to excel and enjoy math, you need to ‘amuse yourself with your imagination’, and at times be ‘creatively frustrated’. That sounds just like CAD to me. When being frustrated with CAD, is usually when you need to be creative with CAD. Take for instance when using AutoCAD and you are trying to evenly distribute objects along a path. If you’re not an AutoCAD expert, before AutoCAD 2012, you probably tried to use some math formulas to figure out locations and orientations of these arrayed objects. (Or you just guessed, which I hope you didn’t.) But even if you were well versed in AutoCAD, if may take your imagination to realize which tools to use to accomplish this task. You first needed to create a block (if you didn’t have one already) that you wanted to array along the path, which you also had to create. Next, using the MEASURE tool, you selected the object representing the path. After you select this object, at the ‘Specify length of segment’ command, you type “B” for block and press Enter. You next enter the name of the block you wish to array along the path. Next, you have the option to align the block with the object. And finally, after entering the length of segment (ie, the distance between each block object along the path), the arrayed path is populated. Each object along the path is an individual object, and not associated. If any changes were needed, you had to delete them all and start over. Users had a need, and used their creativity to make it happen. But let the sun shine now. Autodesk saw the need, and with AutoCAD 2012, they got creative and added the Path Array command! Now you can easily create associative arrays along a path, and modify them via the Array contextual tab, which allows you to modify the number of items along the path, the distance between them, the base point, and various other options to edit individual items in the array. So, continue to use your imagination and creativity when you feel frustrated that there isn’t a simple solution to your task at hand. The days will get brighter. And the makers of the CAD software you use are listening and responding. “You can’t use up creativity. The more you use, the more you have.” – Maya Angelou
<urn:uuid:52284c8a-db50-414a-8c5c-62d618f3dab2>
CC-MAIN-2016-26
http://blogs.rand.com/ascent/2012/02/creativity-using-cad-part-2-array-of-sunshine.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395166.84/warc/CC-MAIN-20160624154955-00193-ip-10-164-35-72.ec2.internal.warc.gz
en
0.956614
729
2.609375
3
The sugars in doughnuts have been identified as a risk factor for gum inflammation and cavities. Learn what those dental words mean. Get dental news feeds delivered directly to your desktop! more... Most people, kids included, have experienced the "weekend warrior" syndrome, where you think your body is invincible to injury and that you do not need protective gear such as helmets for your head and pads for your knees, shins and elbows. In particular, teeth are often forgotten. Although the dental profession unanimously supports the use of mouthguards in a variety of athletic and recreational activities, consumers remain resistant to and ill-informed of the importance and advantages of wearing a mouthguard during their weekend activities. "There are three reasons most people don't wear mouthguards: cost, the ‘headache factor‘ and image," says David Kumamoto, DDS, FAGD. "What people fail to realize is how many serious injuries such as concussions, jaw fractures and neck injuries are prevented by mouthguards." It is estimated that mouthguards prevent more than 200,000 injuries each year. Although orofacial injuries are traditionally associated with contact sports such as football and hockey, findings show that soccer players are more likely than football players to sustain an orofacial injury and basketball players have a risk up to 15 times that of football players. These statistics do not include the number of people participating in leisure sports such as flag football and pick-up basketball games with friends. And, more people currently participate in organized soccer than those participating in competitive football, where mouthguards and face masks are mandatory. "Pick-up games prove more of a risk than supervised sports because there are no officials to enforce game rules," says Dr. Kumamoto. "But even supervised sports have their share of serious injuries due to the lack of protective equipment. Sudden falls and accidental collisions during a game or athletic activity can cause dental injuries." "Of the three types of mouthguards that are currently available, a custom-made mouthguard by your dentist offers the best protection, fit and comfort level because it is made from a cast to fit your teeth," says Dr. Kumamoto. "Mouth-formed guards are available at sporting goods stores and are less expensive than custom-made guards, however the fit is not as good and it will not last as long. A stock mouthguard, the least expensive choice, offers the least protection since little can be done to adjust the fit. However, even the least expensive mouthguard is better than none." The Academy of General Dentistry recommends that players participating in basketball, softball, wrestling, soccer, lacrosse, rugby, in-line skating and martial arts, whether for an athletic competition or leisure activity, wear mouthguards while competing. Reviewed: January 2012 Home | InfoBites | Find a Dentist | Your Family's Oral Health | Newsroom | RSS About AGD | Contact AGD | Privacy Statement | Terms and Conditions © 1996-2016 Academy of General Dentistry. All
<urn:uuid:8ac68c31-6fb4-4a72-9aec-94aa9b240cdd>
CC-MAIN-2016-26
http://www.knowyourteeth.com/infobites/abc/article/?abc=m&iid=331&aid=1326
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398628.62/warc/CC-MAIN-20160624154958-00032-ip-10-164-35-72.ec2.internal.warc.gz
en
0.966301
626
2.640625
3
No one would expect a baby bird to take flight immediately after hatching, yet paleontologists who have examined the first known pterosaur embryo think that’s exactly what the fledgling reptiles once did. The fossilized embryo, cradled in a two-inch egg, was found by a farmer in Liaoning Province, China, who handed it off to Zhonghe Zhou and Xiaolin Wang at the Chinese Academy of Sciences in Beijing. The fossil dates to 121 million years ago. When the two researchers first caught sight of the embryo’s sturdy upper arm bone and extremely long fourth finger, they “immediately recognized it as belonging to a pterosaur,” Zhou recalls. A pterosaur egg is no surprise, because the animals were reptiles. However, this embryo is unusually advanced; the membranes of its five-inch wings had already developed, as had the bones. Such mature features suggest that, like modern chickens, ducks, and turkeys, pterosaurs probably could fend for themselves soon after hatching. “It seems to have had all the gear needed to fly as soon as it came out of the egg,” says David Unwin, a pterosaur expert at the Museum of Natural History in Berlin. “I’m absolutely gobsmacked.”
<urn:uuid:0687abc0-07a9-4d26-9187-5b9831f5ffda>
CC-MAIN-2016-26
http://discovermagazine.com/2005/jan/early-birds-caught-wind
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783408828.55/warc/CC-MAIN-20160624155008-00062-ip-10-164-35-72.ec2.internal.warc.gz
en
0.976752
276
3.6875
4
After three decades on the market, Autodesk's software has radically transformed modern architecture, science, and art. In downtown San Francisco, Autodesk exhibits a rotating gallery showing off twenty of its most impressive design feats. On a recent tour, Gizmodo saw the stunning range of the program's capabilities. Engineers use it to plan the most the world's major buildings, and scientists use it to make scale models of molecules. For an artist, it's a way to finally design a giant dinosaur made of LEGO. Here's a look at a few highlights of the Autodesk Gallery at One Market Street, where tours start every Wednesday at 12:30pm. There isn't an instruction booklet big enough to explain how to turn a pile of 62,500 LEGO blocks into an 8.5-foot tall dinosaur sculpture. Instead, LEGO combined its Digital Designer software with AutoCAD to develop and test 3D models of the lambeosaurus. The company ensured its structural stability, then starting popping together the pieces. When it's completed in 2014, the Shanghai Tower will be the largest building in all of China—a towering 128 stories tall. But at that height, the structure is subject to Shanghai's famously tremendous winds that, if unchecked, could cause the tower to sway and potentially buckle. So, rather than build numerous small-scale models of the three potential designs and subject them to wind tunnel testing—a labor, cost, and time-intensive exercise—the team erected each in AutoCAD and virtually tested their wind resistance in a computational fluid dynamics model. This allowed the architects to reduce wind resistance in the tower's final design by 24 percent, before a physical model was ever made. The 1:85 scale model entered a wind tunnel test, validating the virtual results of the renderings. The new headquarters for the Masdar corporation, an energy company located in Abu Dhabi, is being heralded as a breakthrough in energy efficiency. To optimize the building's design, the Masdar designers used AutoCAD software to configure everything—its orientation on the lot, the roof design, the shape of the solar panel array, and the shape of the cooling inlets located at the base of the main support columns. As a result, the Masdar building will consume 70 percent less water than a similarly sized structure, and it will actually produce three percent more energy than it consumes—making it the first positive energy building in the Middle East. When the new eastern span of the San Francisco Bay Bridge was in its design phase, skeptics worried that the world's largest self-anchored suspension bridge, couldn't handle the strain of morning commute traffic. To prove that the project could be accomplished, the California DoT created and disseminated realistic models of the proposed span and construction process. The idea was to gain public support and to plan how to minimize delays during lane closures. This technique was so successful that the DoT did the same for the recent Doyle Drive renovation. 3D Camera Booth Sure, you can scan physical objects into the virtual realm using laser range finders and such, but where is the fun in that? And what else are you going to use those three dozen spare cameras for? This device takes a series of photos of the subject, overlapping them slightly. This data is then fed into AutoCAD 123 Make where it is stitched together into a 3D model. Users can then export the model to a 3D printer or a CNC machine to cut the shapes from cardboard. Then it's just a matter of assembly. The finished result: a bust of AutoDesk CEO Carl Bass' kid complete with sound-activated light-up eyes.
<urn:uuid:745e7277-ac71-4934-b014-a9e97e840d77>
CC-MAIN-2016-26
http://gizmodo.com/5923664/where-to-see-the-seven-coolest-things-you-can-design-with-autocad?tag=tour
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397428.37/warc/CC-MAIN-20160624154957-00066-ip-10-164-35-72.ec2.internal.warc.gz
en
0.944345
747
2.84375
3
As I've already mentioned, genetic anthropologist Stephen Oppenheimer has pointed to a very similar gap in the genetic evidence, which led him to propose a major bottleneck event stemming from the eruption of Mount Toba. While the timing of the Toba eruption makes Oppenheimer's interpretation problematic, the genetic evidence he cites does indeed suggest that something very unusual must have happened in South Asia very early on, at what might well have been a critical turning point in human history. With all this in mind, let's return to the genetic map I presented two posts ago: (Click on the above to enlarge the image.) The map, representing a phylogenetic tree based on mtDNA (mitochondrial DNA, representing female lineages only) is from a recently published article, Correcting for Purifying Selection: An Improved Human Mitochondrial Molecular Clock, by Pedro Soares et al., June 2009. (Among the co-authors, by the way, is Stephen Oppenheimer.) What makes this tree especially interesting is, first of all, the effort by the authors to correct for the effects of natural selection, and secondly, the introduction of timing estimates based on what the authors claim to be a new and improved molecular "clock." The number displayed next to each node represents their estimate for the origin of that node, in thousands of years. Thus, for example, the origin of M is given as 60.6, i.e., 60.6 thousand years ago. Each node is color coded according to its most common geographical occurrence, as indicated in the key at the upper right. What's unusual here is the fact that the M haplogroups for South Asia (in violet) are presented farther to the right, and slightly lower, than the M haplogroups for East Asia (in blue), implying that the South Asian haplogroups appeared at a later date than those for East Asia. And sure enough, the date for South Asian M is 49.4, while that for East Asian M is 60.6. If the Out of Africa migration proceeded in an orderly, predictable fashion, from west to east, we would expect to find the oldest haplogroups in South, not East, Asia. So once again we must ask: what gives? The first point to be made regarding the new research is the fact that the dates they've come up with "render an out of-Africa dispersal prior to the Toba eruption in Sumatra at ~74 kya less likely." Given that Oppenheimer is one of the co-authors, this is a particularly significant conclusion. Nevertheless, the inconsistency between South and East Asia must be accounted for: In the context of the southern-coastal-route model, it should be noted that although the distribution of haplogroup M has also been used to support the southern route model, the age of haplogroup M in India, at 49.4 (39.0; 60.2) kya, is significantly lower than in East Asia, at 60.6 (47.3; 74.3) kya . . . At face value, this could suggest an origin of haplogroup M in East Asia and a later migration back into South Asia, suggesting that it may have been a ‘‘pre-M’’ lineage that initially crossed South Asia. . . Southeast Asia may [therefore] be the point of origin of haplogroup M . . . Alternatively, if M dispersed with N and R through South Asia, M may have been caught up in a subsequent bottleneck and founder effect so that its age signals the time of re-expansion rather than first arrival (p. 752 -- my emphasis). There will, of course, be a great many refinements and no doubt revisions of all the many phylogenetic trees that are now being published. Nevertheless it seems clear, not only from these results, but others already published, that the gap I've noted, based largely on cultural evidence, is reflected in the genetic evidence as well. While such a gap might at first seem to be a stumbling block in our understanding of the earliest migrations of modern humans out of Africa, it is also, as I see it, a tremendously important clue, which could explain a great many other mysteries, some of which are so obvious as to have been taken for granted by the great majority of investigators. (to be continued . . . )
<urn:uuid:cbcd9bff-62f4-493b-922e-6b32c2a22fde>
CC-MAIN-2016-26
http://music000001.blogspot.com/2009/12/262-baseline-scenarios-38-gap.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396538.42/warc/CC-MAIN-20160624154956-00093-ip-10-164-35-72.ec2.internal.warc.gz
en
0.960083
906
3.453125
3
The recent multiple homicide in a small Victorian township, coming barely a month after a mass shooting in rural New South Wales, may give the impression that firearm-related murders in rural Australia are rampant. It would be easy to attribute this to higher density of gun ownership in country areas relative to cities, particularly where farming is a dominant industry and firearms are “tools of the trade”. But understanding gun violence is not that simple. Firearm homicide in Australia is an uncommon event, with around 35 deaths per year on average. That works out to between one and two out of every ten assault-related deaths. Interestingly, a disproportionate number of firearm homicides tend to occur in New South Wales, where analyses have also shown that shooting offences occur more often in metropolitan than rural areas. Unfortunately, detailed geographic crime statistics are not routinely released. This makes it difficult to identify and compare the number of urban and rural firearm homicides, as well as homicides using other methods. Who can legally own a gun in Australia? Often, high-profile firearm homicides – regardless of location – lead to calls for more gun laws. Equally often, this is coupled with discussion of how we do not want Australia to become like the US. But before making such arguments, it is important to consider existing gun laws in Australia. A person cannot legally possess or use a firearm unless they are properly licensed, with licensing controlled by police. All jurisdictions share “minimum standards” for licensing. A person who wishes to obtain a firearms licence must be aged 18 years or over and have passed an approved firearms safety training course. They must also pass a thorough police background check. Prospective licence holders are required to prove that they have a “genuine reason” for owning firearms. Reasons include target shooting, hunting, collecting and primary production. Self-defence is explicitly excluded from the list of reasons. A licence applicant must be deemed a “fit and proper person” by police. For example, if someone has a history of violent behaviour or drug misuse, this will disqualify them from being issued a firearms licence. This incorporates sound evidence from criminology and psychology that past behaviour is a strong predictor of future behaviour. There are many conditions that apply to firearms licences. Breaching those can lead to licence cancellation by police. For example, it is mandatory that when firearms are not in use they are securely stored in a safe that is not easily penetrable, and which cannot be easily moved. Storage is subject to inspection by police. Also, legislative provisions ensure that if a firearms licence holder commits an act of domestic violence, for instance, then their licence will be automatically revoked. What works to reduce gun violence? A significant policy challenge is that firearm misuse cannot be adequately explained by firearm availability. The number of legally owned firearms in most Australian states and territories has risen over the past decade, while firearm homicides as well as other types of firearm crime have continued to decline. Most firearm homicide perpetrators are not licensed to possess firearms. With a strict management system for legal firearms ownership already in place, Australia needs to look at innovative ways to best address unlawful firearms use. Fortunately, there is a growing body of evidence about promising strategies. These initiatives include intensive engagement between police and communities who are especially affected by gun violence, community partnerships with a focus on juvenile offending, enhanced supervision of non-lethal gun violence offenders who are on probation, policing focused on high-risk individuals and situations (such as disadvantaged youths with connections to the illicit drug trade), and broad-based strategies to reduce social exclusion. Why the spate of rural homicides? Two multiple-fatality shooting incidents in rural Australia, in a short space of time, is an extremely unusual occurrence by any measure. Police and coronial investigations may shed light on contributing factors. But for now, even though we know about “how”, little is known about “why”. From a theoretical standpoint, violence towards others has been conceptualised as a maladaptive response to strain. It would be naïve to ignore the unique stressors that many of Australia’s rural communities face and how that may contribute to violence. Strains range from economic downturn and industry collapse, to natural disasters such as drought, to community fragmentation, social isolation, financial hardship and lack of services. Tellingly, these stressors also feature in a different form of violence: suicide. And when it comes to suicide, rural communities have much higher rates than urban locations. Firearms get a lot of attention. But if we truly seek to prevent lethal violence, whether urban or rural, towards others or the self, and using a firearm or some other method, we need to remember that violence never occurs in a vacuum.
<urn:uuid:0c220d7f-7ae5-4fab-a122-ee002edf18ce>
CC-MAIN-2016-26
http://theconversation.com/does-rural-australia-have-a-gun-problem-33364
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391519.2/warc/CC-MAIN-20160624154951-00170-ip-10-164-35-72.ec2.internal.warc.gz
en
0.951689
972
2.71875
3
About This Issue Frankly, I can't recall that I have ever stopped to think about how colonial Catholic music and ritual had developed. I love music of all kinds, have a spouse who is a music teacher, and I think I have an historical orientation; but I had never even reflected in an historical developmental way on this dimension of the American Catholic experience. Even if your own context is not quite the same as mine, I think you will find that freshness and insight in our lead article by Robert R. Grimes, S.J. of Fordham University, who lucidly takes us through the history in which the emergence of this music is embedded. James Garneau, of the Pontifical College Josephinum, explores the public and personal relationship of Richard Cardinal Cushing and J. Edgar Hoover, as seen in the pages of the FBI file that was kept on the cardinal. The results are quite interesting. Raymond H. Potvin of the Catholic University of America offers a mature and wise description and reflection of Franco-American parishes of New England, past, present and future. His article contains insights for the experiences of other groups and national parishes. Nine book reviews cover a wide range of recent scholarship, and our reviewers perform their task with substance, vigor and courtesy. By all means, read Co-editor Margaret McGuinness's "One Picture Is Worth 1,000 Words," which explains our front and back covers. They come from Stained Glass in Philadelphia, and for it, I simply want to add my own public congratulations to Saint Joseph's University Press. The book is a unique achievement. Its execution is magnificent. Bravo! Rodger Van Allen, Co-editor
<urn:uuid:200d44cd-06b1-4471-95a7-4d115e7cfc5e>
CC-MAIN-2016-26
http://www1.villanova.edu/villanova/publications/acs/backissues/summer2003.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398075.47/warc/CC-MAIN-20160624154958-00052-ip-10-164-35-72.ec2.internal.warc.gz
en
0.963927
348
2.5625
3
Simple ways to make learning easy for the kid: Learn and write: Make the kid pronounce the word and then try to repeat the spellings. Let your kid practice by repeating it five times seeing on the book and five times again without the book. Now make the kid write the word 5-8 times and spell it. This is a very effective way of making the learning useful for the kid. Rhyme: Kids love rhyme and this can be used for fun learning too. Always a strict teaching session can become really boring and monotonous. So, a playful memorizing session is fun and builds interest of the kid towards learning. Computer learning: Kids always want to sit on the computer and play games. Make this interest useful to make your kid learn spellings. Ask the kid to type on Microsoft basic word page and see his/her interest to rectify the mistakes. Colourful alphabets: Make the kid learn spellings easily by decorating the study table with colourful alphabets. Help the kid frame the word with these alphabets and learn the spellings. Try these ways to make the kid learn spellings easy and filled with fun.
<urn:uuid:eec35f2e-a494-4cba-a7e5-251a25878be1>
CC-MAIN-2016-26
http://www.boldsky.com/pregnancy-parenting/kids/2011/make-kid-learn-spellings-281111.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395346.72/warc/CC-MAIN-20160624154955-00194-ip-10-164-35-72.ec2.internal.warc.gz
en
0.90044
246
3.75
4
Unix for Beginners Unix Shell Programming Unix Useful References Unix Useful Resources Copyright © 2014 by tutorialspoint sysfs() - Unix, Linux System Call sysfs - get file system type information int sysfs(int option, const char *fsname); int sysfs(int option, unsigned int fs_index, char *buf); int sysfs(int option); sysfs() returns information about the file system types currently present in the kernel. The specific form of the sysfs() call and the information returned depends on the option in effect: The numbering of the file-system type indexes begins with zero. Translate the file-system identifier string fsname into a file-system type index. Translate the file-system type index fs_index into a null-terminated file-system identifier string. This string will be written to the buffer pointed to by buf. Make sure that buf has enough space to accept the string. Return the total number of file system types currently present in the sysfs() returns the file-system index for option 1, zero for option 2, and the number of currently configured file systems for option 3. On error, -1 is returned, and errno is set appropriately. Either fsname or buf is outside your accessible address space. fsname is not a valid file-system type identifier; fs_index is out-of-bounds; option is invalid. On Linux with the proc filesystem mounted on /proc, the same information can be derived from There is no libc or glibc support. There is no way to guess how large buf should be.
<urn:uuid:75e10516-0170-4e4c-8739-ec1bda0b6e58>
CC-MAIN-2016-26
http://www.tutorialspoint.com/unix_system_calls/sysfs.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403508.34/warc/CC-MAIN-20160624155003-00035-ip-10-164-35-72.ec2.internal.warc.gz
en
0.721667
362
3.015625
3
As the internet has become a vital part of people's daily lives, web development has become one of the most in-demand skills. Companies today are looking for web developers to build and maintain websites to meet the wants and needs of their online customers. You can learn how to code for the web without going through the traditional college degree route. There are great free resources online. We've gathered the best ones to guide you on your journey. The best way to learn web development is by building something that interests you. As you develop coding skills, you will understand what is possible and that will inspire you to create your own project. By applying your skills on an interesting project, you will enjoy the learning process more and learn at a faster pace. So start working on your own project as soon as possible while continuing to gain more skills by following this roadmap. Learning how to code is similar to learning a new language. The best language students don't just take courses, they also immerse themselves in the new culture by spending a lot of time with native speakers. In the same way, we encourage you to immerse yourself in web development by building a site that showcases your creativity and personality. Remember, if it's interesting to you, it will be easier and faster to learn. HTML and CSS are the foundational languages of the internet. Every web page is written in HTML. It tells the web browser how to organize and structure the web page. CSS controls the visual layout of websites. These resources cover the basics of HTML and CSS so you can build your first web page. These interactive tutorials from Codecademy cover the basic building blocks of web development. You'll use HTML to create a social networking profile and CSS to design buttons and a resume. Shay Howe's guide to HTML and CSS is one of the best because of his clear writing style. Also, he uses great examples to help you understand the common terms, syntax, and principles. If you like to learn with video, you will enjoy these screencasts by Tuts+ Premium. Taught by veteran web developer Jeffrey Way, the video course includes a section about finding a code editor, a very important tool for writing code. HTML Dog is a favorite site of many beginning web developers because it teaches you the best practices. These tutorials use HTML5, the latest version of HTML with new, exciting features. Here are the CSS Tutorials of HTML Dog. Along with the fundamentals, they cover new aspects of CSS3, the latest standard for CSS. This video course is sponsored by the Microsoft Developer Network. You can download the entire source code to follow along with the videos. To manipulate data on your website, you need to learn a programming language. HTML and CSS are not programming languages so they are insufficient for the task. We recommend starting with PHP. For beginners, PHP is a good language to start with because it has a low learning curve and it is easy to setup. These resources will help you learn the fundamentals so you can add more functionality to your website. This PHP course from W3Schools teaches you the PHP syntax of common programming activities. We recommend just going through the basic chapters. You can complete the advanced chapters later after you gain a few more weeks of experience. Also, skip the installation section because you'll learn how to do that in a video course below. Installation can be tricky and it's easier to learn with video. Codecademy's PHP tutorials are great resources for learning PHP because of their interactive nature. Note that if a tutorial is unresponsive when you submit your answer, you may have to reload the page. Occasionally the site gets stuck in an infinite loop. This series of screencasts by phpacademy covers many useful PHP concepts. One clarification: the order to do the videos is by rows not columns. So the first video is "Setting Up a Web Server," the second video is "Echo/Print" (not "If Statements"), the third video is "Variables," and then the fourth video is "If Statements." Zend Developer Zone has helped many web developers get started with this PHP guide for beginners. You'll learn importance concepts such as dealing with external files, keeping track of visitors, and securing your website. To close this chapter, here are some more video tutorials. They will mostly be review because you've already learned most of the syntax and principles in the videos. But that's okay because repetition helps you remember what you learned. MySQL is a free, popular database used by sites such as Wikipedia and YouTube. A database stores data like usernames and email addresses for future use. Here are some great resources for learning how to code in MySQL. In this tutorial, you'll learn how to install, set up, and use MySQL on your computer. Also, you'll learn more about databases and why they are useful for building websites. Created by Chua Hock Chuan, an associate professor at Nanyang Technological University, this guide contains many examples that illustrate the features of MySQL. At the end of the guide, you'll apply what you learned in a real-life situation, building a database system for a small car rental company. These tutorials from SQLZOO will help you internalize the syntax and concepts from the above links. You'll tackle problems that are solved by writing MySQL queries. It's time to combine MySQL with PHP! These videos show you how to connect to a MySQL database with PHP. Also, you'll learn how to install and use phpMyAdmin, a program for managing your database tables. Skip the fifth video because it is out of date. KillerPHP has practical articles and videos to help you to learn database theory and MySQL. They also go over using MySQL with PHP and phpMyAdmin. To review, we recommend going through this short MySQL/PHP tutorial by W3Schools. You'll review the common MySQL statements and their proper integration in PHP. A framework is a tool that helps you to build complex web applications faster by automating common tasks. Also, it provides an organized structure for your code to make it easier to maintain. Frameworks are built using object-oriented programming. Understanding this type of programming is essential to fully leverage the power of frameworks. This chapter has links to object-oriented programming resources and top PHP frameworks. This long article from Nettuts+ is a great intro for learning the benefits of object-oriented programming. It has a lot of code examples to help you comprehend the basic principles. KillerPHP's object-oriented programming tutorial for beginners includes supplementary videos and a zip file with the source code. You'll learn how to use object-oriented programming to write less code and make your website easier to maintain. If you have no experience with frameworks, CodeIgniter is a good one to start with. It may not have all the features of more powerful frameworks but it is easier to learn. CodeIgniter has great documentation and a simple installation process. Yii has a steeper learning curve than CodeIgniter but it has more features. Also, Yii imposes a rigid structure, which some developers find helpful because it keeps your code very organized. However, others find the structure too stifling. Lavarel is a new framework but it has already attracted many fans. It is arguably the most cutting edge PHP framework. Laravel has a wide range of features that web developers find useful including authentication and testing. It takes advantage of newer versions of PHP, has good documentation and a fast growing user base, and is relatively easy to install and set up. Code School's Try jQuery course is a fun, interactive way to learn jQuery. You'll watch videos to learn particular concepts and then apply what you learn by writing code in the browser. This video course from Tuts+ Premium is an excellent introduction to jQuery. The course even has a section about using jQuery and PHP together to improve the usability of your website. Here is Codecademy's jQuery course. It teaches you how to use jQuery to move HTML elements around, create animations, and increase the interactivity of your site with visitor actions like mouse clicks. By now, you've probably realized that building a website with many useful features requires a lot of code. It's easy to get lost in the complexity of all those lines of code and do something that causes your website to malfunction. Git is free software that allows you to create regular backups of your code. If you change something and your website doesn't work anymore, Git can go back to a version of your code that did work. Learn how to use this great software by going through the links below. Learn the fundamentals of Git with this article from Nettuts+. It goes over the Git commands for backing up your code as well as other useful commands for activities like merging code and configuring settings. This interactive tutorial from Code School lets you try out Git commands on your browser to see how they work. You'll also learn basic commands for storing your code remotely on GitHub. This tutorial looks at Git from a conceptual perspective. You'll get a deeper understanding of what actually happens "under the hood" when you use Git commands. Atlassian's Git tutorials are beneficial to web developers because they include diagrams that show the flow of information within Git. Here is another tutorial with diagrams. It takes a different visual approach from Atlassian's tutorials above. You may find it more helpful, or at the very least, it should be a good resource for reviewing what you learned. Bitbucket is a great site because it allows you to store your code repositories from Git remotely and privately. Also, it's free whereas GitHub charges you. Ruby is the programming language behind one of the best frameworks, Ruby on Rails. However, the learning curve for Ruby and Ruby on Rails is pretty steep. By going through the previous chapters first, you gained a strong foundation for overcoming the learning curve. Here are some links to get you started programming in Ruby. TryRuby is a fun, little tutorial from Code School that shows you basic Ruby syntax. You'll learn how Ruby deals with strings, numbers, and arrays. Also, you'll become familiar with useful methods. Chris Pine's Ruby guide goes over basic programming concepts step by step as it applies to Ruby. It covers variables and flow control as well as interesting Ruby features, blocks and procs. Practice coding in Ruby with these interactive tutorials from Codecademy. You'll learn how to create loops and arrays. Also, Ruby is an object-oriented language so you'll see how the language uses objects and classes to organize information. RubyMonk is a set of Ruby courses for programmers of different levels of skills. It uses an interactive platform to deliver information and assess your knowledge so you can write code in your browser and quickly get feedback. This guide contains 52 exercises to train your mind to think like a competent Ruby developer. It may take you a while to go through every exercise but when you finish the guide, you will have a strong understanding of Ruby and be prepared to tackle Ruby on Rails in the next chapter below. Pound for pound, Ruby on Rails is arguably the best framework for web developers. However, it's not easy to learn for beginners. But if you've made it this far, you should be prepared to deal with the difficulties of learning the framework. Here is a list of resources to begin learning Ruby on Rails. With a name like Rails for Zombies, you can expect this Code School course to be pretty different from your average course. Using Zombies to keep things interesting, Rails for Zombies consists of five videos and exercises where you'll program in your browser. Installing and setting up a new development environment on your computer can be a pain. Fortunately, there's an installation package called RailsInstaller that makes installing Rails and other necessary components a breeze. There are Windows or Mac versions depending on your computer. In Jumpstart Lab's tutorial for beginning Rails developers, you'll learn basic Rails concepts while building a simple blog platform. The tutorial covers the MVC pattern, routing, migrations, and RESTful design. The content of this course comes from a University of Texas for-credit course. Created by Richard Schneeman, an adjunct professor, it includes class lectures, exercises, and quizzes to give you a solid knowledge base for building web applications with Rails and databases. This is a pretty big tutorial book. The print version is 600 pages. As you can imagine, it covers a lot of principles and concepts. At the end, you'll end up building a functional Twitter clone. Congratulations for making it this far! You're definitely not a beginner anymore. You've become an intermediate level web developer. With your experience, you should have a good idea of how to proceed with your website. But if you need more inspiration, here are some more resources to propel your web development journey forward. Meetup is a social networking website that facilitates group meetings in real life. We recommend finding a web developer group in your area with Meetup. You can learn a lot from other web developers. They can teach, inspire, and motivate you. Also, building websites is more enjoyable when you share your ideas with like-minded people. Git is not just good for backing up your code. It is also an effective tool for collaborating with other coders. GitHub uses Git to host code of open source projects. You can practice your skills and give back to the web development community by contributing to these projects. This tutorial from Nettuts+ gives you practical tips for getting started. These are the official guides for Ruby on Rails. They teach you how to implement common tasks required by web applications. Go through the guides to discover the potential of Rails to upgrade your website. If you want to go deeper with jQuery, check out this video course about jQuery UI. This jQuery library contains user interface interactions, widgets, and effects to increase the usability and interactivity on your website. For example, once you learn how to use it, jQuery UI allows you to quickly add a slider, draggable element, or autocomplete feature to your site.
<urn:uuid:df018cff-268b-4dd2-a30d-f60f4c77c8f4>
CC-MAIN-2016-26
http://www.webdesigndegreecenter.org/learn-to-code/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783392527.68/warc/CC-MAIN-20160624154952-00093-ip-10-164-35-72.ec2.internal.warc.gz
en
0.931758
2,907
2.875
3
Books & Music Food & Wine Health & Fitness Hobbies & Crafts Home & Garden News & Politics Religion & Spirituality Travel & Culture TV & Movies Water is critical for healthy life. Overall, your body is 70% water. Your brain is 73% water. It needs that water to function properly. Even a reduction of just 1% or 2% of your body weight in water can have a serious impact on your health. If you're out exercising, walking in the hot sun, or just not drinking the eight glasses a day that most doctors recommend, you are putting yourself at risk of dehydration. Your body really needs that water to do its daily tasks! Again, every part of you has water in it - your muscles, your bones, and your blood. When that water becomes scarce, your body begins to suffer. Common signs of dehydration include: - dry skin - being light-headed There are also the standard signs that most people recognize - having a dry mouth and a general feeling of "being thirsty". Unfortunately, one should not rely on the "feeling thirsty" sign to know when to drink more water. Because of the way the human body works, by the time you're "feeling" thirsty you're already at a low water state! You can't go without water all day and then only drink when you're really thirsty. You have to drink slowly and regularly throughout the day. Keep a water bottle in your car if you're going on a long drive. Keep a pitcher of water at your desk at work. If you're drinking alcohol, even though it's a liquid, it is actually dehydrating you. Alcohol is a diuretic, meaning it causes you to need to urinate. This flushes water out of your system more quickly than normal. If you are drinking, make sure you have a glass of water available too, and drink it along with the wine or other alcohol. That water drinking can even help to ward off a hangover! So, to summarize, you want to aim to drink regularly throughout the day. Do not wait until a meal to drink some water, and do not wait until you feel thirsty. If you're active, or it's hot, then you need to pay extra attention to getting enough liquid into you. You'll find your health improves once you pay attention to this! Lisa Shea's Library of Low Carb Books | Related Articles | Editor's Picks Articles | Top Ten Articles | Previous Features | Site Map Content copyright © 2015 by Lisa Shea. All rights reserved. This content was written by Lisa Shea. If you wish to use this content in any manner, you need written permission. Contact Lisa Shea for details. Website copyright © 2015 Minerva WebWorks LLC. All rights reserved.
<urn:uuid:937536c9-f5f8-47dd-9f34-cded87bf38d7>
CC-MAIN-2016-26
http://www.bellaonline.com/articles/art41104.asp
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403502.46/warc/CC-MAIN-20160624155003-00036-ip-10-164-35-72.ec2.internal.warc.gz
en
0.954193
578
2.59375
3
Organic Tests Better For Soil and Human Health For years now, one of the points made by defenders of conventional agriculture (agriculture that makes heavy use of industrial methods and materials) is that organic farms don’t actually make food that’s healthier. Of course, this argument ignores the core argument that organic farming is environmentally more healthy than industrial agriculture, but still, conventional agriculture’s defenders have had a point: Organic farmers often try to sell their produce by claiming that it’s more healthy than produce grown on industrial farms, but they haven’t had much evidence to back up those claims. This week, that’s changed – at least as far as strawberries are concerned. The results of a study just published compared strawberries grown on organic farms and strawberries grown using conventional methods. The researchers found that the soil was more biologically diverse on organic farms, and that the strawberries grown organically – without the supertoxic pesticide methyl bromide – were richer in antioxidants as well. Eating foods high in antioxidants has been identified as a factor in better human health. The organic strawberries also had a longer shelf life, and were judged to be superior in taste.
<urn:uuid:5beb0924-fab9-493c-93c1-678701eed31a>
CC-MAIN-2016-26
http://irregulartimes.com/2010/09/04/organic-tests-better-for-soil-and-human-health/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397428.37/warc/CC-MAIN-20160624154957-00175-ip-10-164-35-72.ec2.internal.warc.gz
en
0.971291
243
2.9375
3
In our professional software development, we have focused on finding ways to help developers work more effectively. Despite the range of programming languages available today, we are still limited by them. It makes sense to extend the existing languages to create more domain-oriented ones, which allow writing programs on a higher level and in a manner that is more natural to each domain. With an instrument that allows creating language constructs as simple as creating classes or methods is in a conventional language, you can significantly change the way you develop software. This new style of programming, when you create specialized languages, use them to develop software, and extend them when and how required, is called Language Oriented Programming (LOP). MPS Story Meta Programming System started in 2003 as a research project. In 2004, its underlying concepts were described in the Language Oriented Programming article.
<urn:uuid:8875a8fc-deda-4437-9cbe-352eee6b2a5d>
CC-MAIN-2016-26
http://www.bibsonomy.org/user/draganigajic/dsl
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397428.37/warc/CC-MAIN-20160624154957-00053-ip-10-164-35-72.ec2.internal.warc.gz
en
0.947549
168
3.25
3
The spreading of light beyond its proper boundaries to form a fog round the edges of a bright image in a photograph or on a television screen. - If these are indeed the causes of halation, then I see no reason why halation should not also take place in a paper emulsion. - The Sabatier edge effects, which appear as white lines between areas of distinctly different densities, were proven (by Stevens and Norrish in 1937) to be the result of diffusion halation. - This gives normal contrast range with highlight halation. Words that rhyme with halationablation, aeration, agnation, Alsatian, Amerasian, Asian, aviation, cetacean, citation, conation, creation, Croatian, counterdemonstration, counterproliferation, crustacean, curation, Dalmatian, delation, dilation, donation, duration, elation, fixation, Galatian, geolocation, glocalization, gyration, Haitian, Horatian, ideation, illation, lavation, legation, libation, location, lunation, mutation, natation, nation, negation, notation, nutation, oblation, oration, ovation, potation, relation, rogation, rotation, Sarmatian, sedation, Serbo-Croatian, station, staycation, taxation, Thracian, vacation, vexation, vocation, zonation For editors and proofreaders Line breaks: hal|ation Definition of halation in: What do you find interesting about this word or phrase? Comments that don't adhere to our Community Guidelines may be moderated or removed.
<urn:uuid:4955fac1-87f2-4f17-b596-6b0510eb90a4>
CC-MAIN-2016-26
http://www.oxforddictionaries.com/definition/english/halation
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395992.75/warc/CC-MAIN-20160624154955-00083-ip-10-164-35-72.ec2.internal.warc.gz
en
0.900148
353
3.03125
3
Definitions for magneto-electric generator This page provides all possible meanings and translations of the word magneto-electric generator The Standard Electrical Dictionary A current generator operating by maintaining a potential difference at its terminals, by reactions in a field of force, which field is established by a permanent magnet. The cut, Fig. 230, shows the general principle of construction of a direct current generator. The armature is rotated between the poles of a permanent magnet. Any of the regular types of dynamo armature can be used. From its commutator the current is taken by brushes. The numerical value of magneto-electric generator in Chaldean Numerology is: 8 The numerical value of magneto-electric generator in Pythagorean Numerology is: 1 Find a translation for the magneto-electric generator definition in other languages: Select another language: Discuss these magneto-electric generator definitions with the community: Word of the Day Would you like us to send you a FREE new word definition delivered to your inbox daily? Use the citation below to add this definition to your bibliography: "magneto-electric generator." Definitions.net. STANDS4 LLC, 2016. Web. 27 Jun 2016. <http://www.definitions.net/definition/magneto-electric generator>.
<urn:uuid:9ab802da-6a13-4d0b-ac51-5b782abaf300>
CC-MAIN-2016-26
http://www.definitions.net/definition/magneto-electric%20generator
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396106.71/warc/CC-MAIN-20160624154956-00111-ip-10-164-35-72.ec2.internal.warc.gz
en
0.794621
277
3.234375
3
LEICESTER, England (AP) - Scientists say they have found the 500-year-old remains of England's King Richard III under a parking lot in the city of Leicester. University of Leicester researchers say it is "beyond reasonable doubt" that a battle-scarred skeleton unearthed last year is the king, who died at the Battle of Bosworth Field in 1485. Osteologist Jo Appleby says a study of the bones provides "a highly convincing case for identification of Richard III." And DNA from the skeleton matches a sample taken from a distant living relative. The last English monarch to die in battle, Richard was depicted in a play by William Shakespeare as a hunchbacked usurper who left a trail of bodies - including those of his two princely nephews, murdered in the Tower of London - on his way to the throne. Many historians say that villainous image is unfair.
<urn:uuid:31f2f38a-437e-43ea-8949-8e3cbb997bf7>
CC-MAIN-2016-26
http://www.wkyt.com/news/headlines/Experts-Weve-found-Englands-King-Richard-III-189624371.html?site=full
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783392099.27/warc/CC-MAIN-20160624154952-00039-ip-10-164-35-72.ec2.internal.warc.gz
en
0.952767
187
2.78125
3
BJT vs SCR Both BJT (Bipolar Junction Transistor) and SCR (Silicon Controlled Rectifier) are semiconductor devices with alternating P type and N type semiconductor layers. They are used in many switching applications due to many reasons such as efficiency, low cost, and small size. Both of them are three terminal devices, and they provide a good control range of current with a small controlling current. Both these devices have application dependant advantages. Bipolar Junction Transistor (BJT) BJT is a type of transistor, and it consists of two PN junctions (a junction made by connecting a p type semiconductor and n type semiconductor). These two junctions are formed by connecting three semiconductor pieces in the order of P-N-P or N-P-N. There for two types of BJTs known as PNP and NPN. Three electrodes are connected to these three semiconductor parts, and the middle lead is called ‘base’. Other two junctions are ‘emitter’ and ‘collector’. In BJT, large collector emitter (Ic) current is controlled by the small base emitter current (IB) and this property is exploited to design amplifiers or switches. There for it can be considered as a current driven device. BJT is mostly used in amplifier circuits. Silicon Controlled Rectifier (SCR) SCR is a type of thyristor, and widely used in current rectification applications. SCR is made of four alternating semiconductor layers (in the form of P-N-P-N) and therefore consists of three PN junctions. In analysis, this is considered as a tightly coupled pair of BJTs (one PNP and other in NPN configuration). The outermost P and N type semiconductor layers are called anode and cathode respectively. Electrode connected to inner P type semiconductor layer is known as the ‘gate’. In operation, SCR acts conducting when a pulse is provided to the gate. It operates in either ‘on’ or ‘off’ state. Once the gate is triggered with a pulse, SCR goes to the ‘on’ state and keep conducting until the forward current become less than the threshold value known as ‘holding current’. SCR is a power device, and most of the times it is used in applications, where high currents and voltages are involved. The most used SCR application is controlling (rectifying) alternating currents. Difference between BJT and SCR 1. BJT has only three layer of semiconductor, whereas SCR has four layers of them. 2. Three terminals of BJT are known as emitter, collector, and base, whereas SCR has terminals known as anode, cathode, and gate 3. SCR is considered as tightly coupled pair of transistors in analysis.
<urn:uuid:dc89d0bf-84b4-463f-bf21-2006c5ba43ab>
CC-MAIN-2016-26
http://www.differencebetween.com/difference-between-bjt-and-vs-scr/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396147.66/warc/CC-MAIN-20160624154956-00018-ip-10-164-35-72.ec2.internal.warc.gz
en
0.960729
616
3.84375
4
wings, flight organs of the bird, the bat, and the insect. Birds' wings are pectoral appendages that are basically the same in skeletal structure as the forelimbs of all higher vertebrates, including the human arm. Bird bones are specialized for strength and lightness, and the wing bones are further modified to act as a sturdy anchor for the wing feathers and for the powerful muscles and tendons necessary for flight. The main inner part of the bird's wing is like an airplane wing, concave below and convex above, and supplies lift. The secondary flight feathers also function in lifting; they are attached to a "forearm" bone, the ulna. The ulna locks with a parallel bone, the radius, in flight. The wingtip, or primary, feathers attach to the fused "hand" bones; their circular movement in flight provides the thrust to pull the bird forward. The primaries can be spread and maneuvered to control speed and direction. A mobile "thumb," bearing one or more feathers called alulae that lie along the front edge of the wing, can also be lifted to direct airstreams over the wing when its angle is too great (as in climbing) for the air to flow smoothly around it. There is much variation in the size, shape, and strength of wings and in the number and arrangement of their feathers. Soaring birds, such as the eagle and the pelican, have long, broad wings; in gliding and diving birds, like the gull and the albatross, wings are long and narrow; and in hoverers and darters, like the hummingbird and the swallow, wings are narrow and the primaries especially long to facilitate a rapid, erratic flight. The ostrich's vestigial wings are used for balance in running, and the wings of aquatic birds such as the penguin and the puffin are flipperlike for underwater swimming. The wings of bats are really membranes extending from the "arm,""hand," and "finger" bones to the ankles; the elongated finger bones form a frame to support the folds of skin. Insects' wings are not modified limbs but special lateral outgrowths of the cuticle of the thorax comprising a light membrane strengthened by thick-walled veins. The number, kind, and venation of the wings are bases for classification. The Columbia Electronic Encyclopedia, 6th ed. Copyright © 2012, Columbia University Press. All rights reserved.
<urn:uuid:dc809fa6-f923-4c8f-b433-7721924cb68d>
CC-MAIN-2016-26
http://www.factmonster.com/encyclopedia/science/wings.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783392099.27/warc/CC-MAIN-20160624154952-00069-ip-10-164-35-72.ec2.internal.warc.gz
en
0.948733
503
3.75
4
They look like everyone else: Adult specimens have a coppery colored head and neck. They are not large snakes, generally about 50 cm long (1.5 ft), but specimens up to 1 m long (3 ft) have been encountered. The body is thin by pit viper standards. There are five clearly defined subspecies. All subspecies have distinctive light and dark brown or reddish banding. A. c. mokasen, A. c. contortrix and A. c. phaeogaster have bands that tend to narrow dorsally, giving them an hourglass shape, whereas A. c. laticinctus and A. c. pictigaster generally have bands of uniform width. Intergrading occurs in areas where the subspecies geographic ranges overlap, so pattern variations are commonplace. A. c. pictigaster is known especially for its distinctively patterned underside, with white and black banding. Sneak Attack!: Like all pit vipers, the copperhead is an ambush predator: it takes up a promising position and waits for suitable prey to arrive. Roughly 90% of its diet consists of small rodents, such as mice and voles. Mama Mia: The copperhead breeds in late summer, but not every year: sometimes a female will produce young for several years running, then not breed at all for a time. They give birth to live young about 20 cm long: a typical litter is 4 to 7, but it can be as few as one or as many as 20. Their size apart, the young are similar to the adults, but lighter in color, and with a yellow-marked tip to the tail, which is used to lure lizards and frogs. Stay Out of the Pool: Commonly, the average person will assume any reddish or brownish snake is a copperhead. This is far from the case. Many harmless snakes, such as the brown snake (genus Storeria), or water snake (genus Nerodia) are frequently mistaken for copperheads. Copperheads are primarily a terrestrial species, and though quite capable swimmers, they are rarely found swimming. Windows to the soul: The easiest way to tell venomous snakes from non-venomous in North America is by the shape of their pupils. All venomous snakes in North America, with the exception of the coral snake, are pit vipers and have a vertical type pupil, like a cat's eye. All non-venomous snakes in North America have a round pupil like a human. Once Bitten, Twice Shy: The best way to avoid being bitten when in the outdoors in copperhead country is to be aware of their typical behavior and habitats and take appropriate precautions. Like most North American vipers, copperheads prefer to avoid humans and, given the opportunity, will leave the area without biting; however, unlike the rattlesnake, they are unable to make an audible warning of their presence. Scared Stiff: Copperheads often tend to "freeze" instead of slithering away; thus, many bites come from people unknowingly stepping on or near them. This tendency to freeze likely evolved because of the extreme effectiveness of their camouflage. When laying on dead leaves or red clay they can be almost impossible to notice. They will frequently stay still even when approached closely, and will only generally strike if physically harassed or trod upon. Look Carefully: Small hiding places such as niches in rock walls, woodpiles, etc., should be examined before hands or feet are placed in them, and one should stand on or bend over a fallen log to look for a snake instead of blindly jumping over. Favorite habitats include rocky hillsides above wooded streams. In the south, copperheads are nocturnal during the hot summer months, but are commonly active during the day during the spring and fall. A pair of stout leather hiking boots might blunt the strike of a snake. Heavy tramping of feet will cause vibrations in the ground that can alert snakes to peoples' presence, giving them time to quietly escape. The majority of snakebite incidents are the result of attempting to handle the snake or attacking it with an object. 911!: If bitten, one should not apply a tourniquet or suck blood from the bite the victim should be kept calm and be transported to a hospital as quickly as possible. A tourniquet will increase tissue damage in the area of the bite and may even create the need to amputate a bitten limb that may have otherwise been saved. Never cut where the bite is. All text is available under the terms of the GNU Free Documentation License
<urn:uuid:fc57e123-edbb-4183-aae5-e7860fff562d>
CC-MAIN-2016-26
http://sheppardsoftware.com/content/animals/animals/reptiles/copperhead.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783408840.13/warc/CC-MAIN-20160624155008-00142-ip-10-164-35-72.ec2.internal.warc.gz
en
0.92965
1,022
3.15625
3
The halteres could also help the athletes while they were mid-bound, even though the trajectory of a jumper's center of mass is determined at the instant of launch. "When you are landing" without halteres, Minetti explained, "your center of mass is close to your lower trunk. But with the hands [and halteres] back you could put your feet more forward." That makes a difference in the long jump, because what counts is where the feet hit the ground. Furthermore, by enabling competitors to bring their upper-body muscles into play during launch, halteres would have permitted jumpers to propel themselves off the ground with more initial forceat least enough to compensate for the extra weight they bore. Finally, even the legs can provide more power when working against halteres. "It's much more effective to contract against a load than [to contract muscles] against no load," said Minetti. The ancient Greek philosopher Aristotle recognized this and commented on it in writing about halteres. The combination of all these small advantages means that the hand-held weights could have contributed an additional seven inches (17 centimeters) to a natural jump of ten feet (three meters), the researchers reported in the November 14 issue of the British science journal Nature. Best Feet Forward Long-jump competitors are thought to have first exploited the quirks of physics to boost their performance in 708 B.C., during the 18th Olympic Games, said Minetti. Those Games were the first to include the standing long jump as one of five events in the pentathlon. Some historians have speculated that airborne athletes may have actually thrown their halteres backward before they themselves hit the ground. "If they did," Minetti said, "flight could be prolonged even more" than his calculations suggest. He is wary, however, of assuming that this technique was practiced. While lead halteres would have been sturdy enough to sustain a hard impact, he said, stone weights might have broken under the force. Given the careful craftsmanship that went into carving some stone halteres, athletes probably would have been loath to risk breaking them, Minetti said. Even if halteres were permitted today, he noted, they wouldn't necessarily propel long-jumpers farther. The long-jump event in modern Olympic Games involves a running start, which makes the biomechanics different than those Minetti and Ardigó so carefully modeled. Should the standing long jumphalteres and allbe reintroduced into the Olympics? Said Minetti: "I would like it to be, in a way." SOURCES AND RELATED WEB SITES
<urn:uuid:880a0fee-88d1-4ffa-9809-4a19ae9dc987>
CC-MAIN-2016-26
http://news.nationalgeographic.com/news/2002/11/1114_021114_GreekAthletes_2.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397842.93/warc/CC-MAIN-20160624154957-00149-ip-10-164-35-72.ec2.internal.warc.gz
en
0.972382
549
3.546875
4
James Perloff — henrymakow.com Oct 26, 2013 I grew up in Lexington, Massachusetts, where on April 19, 1775, a force of British redcoats, on their way to Concord to confiscate rebel munitions, encountered a small force of militiamen. Suddenly, “the shot heard round the world” was fired. In the ensuing skirmish, eight colonists were killed, and nine wounded. The British suffered one wounded. This was a causus bellum for the American Revolution. But, was “the shot heard round the world” a false flag like 9-11, a pretext for war? As explained in detail my online article The Secrets Buried at Lexington Green, Americans were deceived. It was proclaimed everywhere that the British had committed an unprovoked massacre in Lexington. The truth is individuals in concealed locations fired on the British first.
<urn:uuid:3f7e992a-ce1a-474d-9f55-572c7f17fbfd>
CC-MAIN-2016-26
http://www.thetruthseeker.co.uk/?p=83011
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403825.35/warc/CC-MAIN-20160624155003-00069-ip-10-164-35-72.ec2.internal.warc.gz
en
0.965873
185
2.640625
3
Power transformers are at the heart of the substation. They step down the voltage from 735,000 volts (735 kV) to 120,000 volts (120 kV), the subtransmission level at which it is carried to regional substations. Surge arresters are protective devices located on either side of power transformers. They’re connected at the top to a line conductor and at the bottom to the ground. Surge arresters protect the transformers and other electrical gear from voltage surges caused by lightning or substation switching operations.
<urn:uuid:55ee18f6-ece3-4f2e-bce6-0c5908f42346>
CC-MAIN-2016-26
http://www.hydroquebec.com/learning/transport/construction-poste/pop_up_poste3.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395992.75/warc/CC-MAIN-20160624154955-00055-ip-10-164-35-72.ec2.internal.warc.gz
en
0.925059
114
2.609375
3
At the end of 2015, the U.S. Centers for Disease Control announced that diagnoses of HIV in the United States declined significantly over the last decade. On the surface, it was good news: rates of new diagnoses for the general population dropped 19 percent between 2005 and 2014. With some populations hard hit by HIV, we saw even greater improvements: new diagnoses are down 42 percent among Black women over the past decade, down 35 percent among heterosexuals, and down 65 percent among people who inject drugs. White gay and bisexual men experienced an 18 percent decline in new diagnoses. But Black and Latino gay and bisexual men actually saw increases in HIV diagnoses of 22 percent and 24 percent, respectively, over the same time period. New diagnoses for 13-24 year old Black men who have sex with men (MSM) were up 87 percent from 2005 to 2014. Even though there are about six White gay and bisexual men for every Black gay or bisexual man in the U.S., in 2014 about 10,000 Black MSM of all ages were diagnosed with HIV, compared with about 8,000 White MSM. As we marked National Black AIDS Awareness Day on February 7, it’s worth digging into the reasons for these disparities. First, given the moral narratives often associated with HIV, it’s important to understand that higher rates of HIV among Black MSM are not due to higher rates of risk behaviors. Black gay and bisexual men have fewer sexual partners than White gay and bisexual men, and are less likely to use substances before sexual activity that might disinhibit their behavior and lead to taking greater sexual health risks. The factors that make Black gay and bisexual men more vulnerable to HIV infection than White gay and bisexual men have built up over decades and are directly related to lower rates of health insurance and access to health care. They include higher rates of undiagnosed and untreated sexually transmitted infections that can facilitate HIV infection, higher rates of undiagnosed HIV infection, and lower rates of antiretroviral treatment adherence if diagnosed with HIV. As a result, there is a greater per capita pool of non-virally suppressed HIV-positive men in Black gay male social and sexual networks. There are three things we should do to reduce HIV burden among Black gay and bisexual men. First, we need to improve health care for them. A study published last year in the American Journal of Public Health found that 29 percent of a sample of 544 Black MSM experienced stigma related to race and/or sexual orientation in health care, and 48 percent expressed mistrust toward the medical establishment. Even as we applaud the expansion of health care access brought about by the Affordable Care Act—which disproportionately helps Blacks and Latinos, LGBT people, and people living with HIV—we must ensure that health care providers are trained to provide culturally competent and affirming care to Black gay and bisexual men. This includes discussing pre-exposure prophylaxis (PrEP) for HIV prevention and encouraging Black gay men to consider this option to help them prevent HIV infection. Such training is offered by The National LGBT Health Education Center through webinars, online educational workshops, and site visits. Second, we need a renewed focus on educating young people about HIV. There is a lack of comprehensive sexuality education in schools; only 22 states and the District of Columbia require that sexuality education be taught in public schools. Even in liberal cities like Boston and New York City, sex education has started only recently, within the last few years, and in many parts of the country there is no sex education at all. Eight states, most in the South, have laws prohibiting any mention of homosexuality or same-sex behavior that is not condemnatory. In many school systems principals have a great deal of autonomy, so there is significant variation from school to school in terms of whether or not young people learn how to protect themselves against sexually transmitted infections (STIs) and HIV. So gay and bisexual adolescents, particularly young Black and Latino men, who need to understand how they can protect their sexual health simply aren’t getting the information they need. Third, we must support efforts to expand Medicaid eligibility in the South. Of three million Americans who are too poor to afford subsidized insurance but not poor enough to qualify for Medicaid, 89 percent live in the South. Several conservative states have recently expanded Medicaid, including North Dakota and Louisiana. Virginia is again considering the expansion. Efforts to promote expansion of Medicaid eligibility up to 138 percent of the poverty line will disproportionately benefit Black Americans, half of whom live in the South, and could help Black gay and bisexual men and Black heterosexuals access the preventive health care they need and deserve.
<urn:uuid:cd8ff270-a330-4759-b44f-2df0cc11d942>
CC-MAIN-2016-26
http://healthaffairs.org/blog/2016/02/18/new-hiv-diagnoses-have-declined-but-not-for-black-gay-and-bisexual-men/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399522.99/warc/CC-MAIN-20160624154959-00048-ip-10-164-35-72.ec2.internal.warc.gz
en
0.95054
947
2.859375
3
Bartolomé Estéban Murillo (1618-1682) was a Spanish Baroque painter of religious and secular subjects, born in Seville. Related categories 1 Artble: Bartolomé Esteban Murillo Features a biography, style and technique regarding the Baroque artist. Includes a list of his famous works with proper date, size and medium. Catholic Encyclopedia: Bartolome Esteban Murillo Artist's biography with bibliography. CGFA: Bartolomé Esteban Murillo Image gallery and artist's biography from MS Encarta '97. Find A Grave - Bartolomé Esteban Murillo Location and pictures of his grave. Brief biography is also available. Murillo at the Prado Museum. Image gallery of the artist's works from the famous museum. Olga's Gallery: Bartolomé Esteban Murillo Comprehensive collection of artist's works with a biography and historical comments. Web Gallery of Art: Murillo, Bartolomé Esteban Collection of images and artist's biography. WebMuseum: Murillo, Bartolomé Esteban Wikipedia - Bartolomé Esteban Murillo Encyclopedia article covering his artistic contribution and historical perspectives. Last update:June 6, 2013 at 16:56:42 UTC
<urn:uuid:1d843a14-6e6c-4045-90d8-f0a8e9e82d1f>
CC-MAIN-2016-26
http://www.dmoz.org/Arts/Art_History/Artists/M/Murillo%2C_Bartolom%C3%A9_Esteban/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398209.20/warc/CC-MAIN-20160624154958-00087-ip-10-164-35-72.ec2.internal.warc.gz
en
0.801722
288
2.578125
3
Author: Jonathan Harrington Hardback: ISBN: 9781405141697 Pages: 424 Price: U.S. $ 124.95 Paperback: ISBN: 9781405199575 Pages: 424 Price: U.S. $ 69.95 An accessible introduction to the phonetic analysis of speech corpora, this workbook-style text provides an extensive set of exercises to help readers develop the necessary skills to design and carry out experiments in speech research. * Offers the first step-by-step treatment of advanced techniques in experimental phonetics using speech corpora and downloadable software, including the R programming language * Introduces methods of analyzing phonetically-labelled speech corpora, with the goal of testing hypotheses that often arise in experimental phonetics and laboratory phonology * Incorporates an extensive set of exercises and answers to reinforce the techniques introduced * Accessibly written with easy-to-follow computer commands and spectrograms of speech * Companion website at www.wiley.com/go/harrington, which includes illustrations, video tutorials, appendices, and downloadable speech corpora for testing purposes. * Discusses techniques in digital speech processing and in structuring and querying annotations from speech corpora * Includes substantial coverage of analysis, including measuring gestural synchronization using EMA, the acoustics of vowels, consonant overlap using EPG, spectral analysis of fricatives and obstruents, and the probabilistic classification of acoustic speech data
<urn:uuid:69fe17a8-fce3-45e8-b851-c65a43839a56>
CC-MAIN-2016-26
http://www.linguistlist.org/issues/21/21-1782.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395039.24/warc/CC-MAIN-20160624154955-00020-ip-10-164-35-72.ec2.internal.warc.gz
en
0.868792
301
2.9375
3
Information Science which is primarily concerned with the analysis, collection, classification, manipulation, storage, retrieval and dissemination of information helped so much in the areas of information preservation. The need to preserve information led to the discovery of libraries. There would have been information chaos had man not come to the discovery of managing information. The word “library” came from a Greek word “liber” meaning, book. Library therefore means a collection of sources of information such as books, audio visuals, etc which are usually kept in a house. Education which is the bedrock of any nation is dependent on information which can be sourced from the libraries. It is unfortunate that these institutions have been left for so long unattended to, thus jeopardizing information acquisition and its subsequent dissemination. Public libraries in most African countries, which could be a source of invaluable knowledge to users especially students, have over the years suffered total neglect by government at various levels. It is surprising to hear about the huge sums of money allocated to the education sector each year but there is always nothing to show for these allocations. Because these libraries are owned and funded by the government and their uses, free for all people, adequate attention has not been given to public libraries over the years. Most public libraries do not provide the needed conducive reading environment and are not accessible to their users. Out of sheer ignorance on the parts of some countries’ Educational Ministries they do not see the library as an integral part of learning; hence most libraries today in most of these African countries are nothing more than museums for antiquities, where you readily see books of the 17th, 18th and 19th centuries. The criteria for selecting those who are saddled with the responsibility of manning the education ministries are a wonder to so many well-meaning people of Africa and beyond. When people who are qualified to hold such sensitive positions are put in place, things will look different in terms of overhauling, rebuilding, rehabilitating and re-equipping these libraries with up-to-date books and even computerize them. However, it is evident that public libraries which have the functions of acquiring and organizing information materials are in themselves lacking in these areas due to negligence. Libraries, as part of the institutions that emerged to keep track of information, need continuous updating so as to keep interactions and even the business of information acquisition and dissemination booming. It is not surprising that Africa which is the base of civilization is still trotting backwards in these areas information technology. It should be remembered that the earlier we began seeing things in the right perspective, the better it would be for us. When we understand that nothing is truly impossible, our desire for excellence will be achieved. Also, encouraging private participation by way of giving support to private and other special libraries that are open to the general public, can as well be an added advantage.
<urn:uuid:7fbcff89-dd61-49a7-9734-d5862777e3de>
CC-MAIN-2016-26
http://www.aozt.info/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397111.67/warc/CC-MAIN-20160624154957-00197-ip-10-164-35-72.ec2.internal.warc.gz
en
0.964749
577
2.703125
3
Within our society bullying has taken on epidemic proportions, with thousands of children and young people reporting that they have been bullied. Recent research by BulliesOut found that 66% of young people reported they had been bullied. Eighty-six percent of bullying issues were reported to have occured at school. BulliesOut (established in May 2006) provides help, support and information to individuals, schools, youth and community settings affected by bullying. In a short time, the charity's work has expanded significantly and has designed its core programmes in direct response to the needs expressed by schools, stakeholders, children and young people themselves BulliesOut are working towards creating environments whereby young people who are being bullied, or witness bullying, feel empowered to speak out, thus creating a 'culture of telling'. To enable us to do this we are focusing on actively working with individuals, schools, youth and community settings as well as having an infomative presence online. Between 5 - 6.30pm daily, we have trained mentors of all ages online to speak with those concerned about bullying. No problem is too big or too small. Over the past 3 years, hundreds of young people and parents have received information and support from our dedicated mentors. 'Here For You' Online Mentors and further information about the work we do can be found at www.bulliesout.com
<urn:uuid:c2e32caf-bbb9-4986-bf32-29eb00b2f12a>
CC-MAIN-2016-26
http://www.aboutmyarea.co.uk/site/charity.asp?area=1689&c=24
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399117.38/warc/CC-MAIN-20160624154959-00156-ip-10-164-35-72.ec2.internal.warc.gz
en
0.979588
276
2.703125
3
Roget's Int'l Thesaurus Fowler's King's English The King James Bible Brewer's Phrase & Fable Frazer's Golden Bough Shelf of Fiction The Drama to 1642, Part Two > Ben Jonsons character and friendships INDEX OF ALL CHAPTERS The Cambridge History of English and American Literature in 18 Volumes Volume VI. The Drama to 1642, Part Two. § 1. Ben Jonsons character and friendships. BEN JONSON the man is better known to us than any of his literary contemporaries. Drummonds record of his conversations has preserved an unkindly but vivid picture of his manners and opinions; and, indeed, his egoism made everything that he wrote partly a portrait of himself. Almost every contemporary reference to him has added something personal and characteristic. We hear of his quarrels, his drinking-bouts, his maladies and his imprisonments, as well as of his learning and his theories of literary art. We know him as the huge galleon of Fullers account, built far higher for learning, solid but slow in his performances, engaging in those memorable wit combats at the Mermaid tavern with that English man-of-war, Shakespeare, who took advantage of all winds by the quickness of his wit and invention; and, again, as the autocrat of those later lyric feasts of Herricks reminiscence, where each verse of his outdid the meat, outdid the frolic wine. His humours, his dissipations, his prejudices make distinct and human for us the main interests of his life. Huge of body, bibulous and brawling, he yet loved Latin as heartily as canary, and could write the tenderest epitaph as well as the grossest epigram. Laborious and pertinacious, he rode his hobbies hard, confusing his scholarship with pedantry and his verse with theory; but few have ever served learning and poetry with so whole-hearted a devotion. Since the days of Fuller, Jonsons personality and work have rarely been discussed or even mentioned without reference to his beloved master Shakespeare. The myth of his devouring jealousy of Shakespeare, supported by Chalmers and Malone, was demolished by Gifford nearly a century ago. But the facts about which the dispute was waged may be again recalled, because of the light that they throw on Jonsons character and friendships. That he criticised Shakespeare is known from the remark to Drummond that Shakespeare wanted art and from the well known passage in It also seems likely, from a reference in The Returne from Pernassus, that, in the famous war of the theatres, Shakespeare and Jonson were on opposite sides. In addition, there are scattered about the works of Jonson various remarks directed against Shakespeares playsespecially, the ridicule of chronicle history plays, like in the prologue to Every Man in His Humour, the remark on tales, tempests, and such like drolleries in and the petulant gird at Ode to Himself. In each of these instances, Jonson is defending one of his own plays and censuring a dramatic fashion contrary to his own practice and hostile, in his opinion, to the best interests of the drama. While it would be absurd to regard Jonson as representative of a dramatic theory and practice at all points opposed to Shakespeare, we shall find his plays representative of carefully considered views which imply a close criticism of much in Shakespeare and the contemporary drama. His criticism of Shakespeare was based on a definite literary creed and methods, and not on jealousy or personal feeling. On the contrary, we have abundant tradition of his close friendship with Shakespeare, and we have the appreciative as well as discriminating passage in together with the generous eulogy prefixed to the folio, to testify to Jonsons admiration of his friends plays, as not of an age, but for all time. No other of Shakespeares contemporaries has left so splendid and so enthusiastic an eulogy of the master. Of Sidney, Spenser, Drayton, Beaumont and Donne, Jonson has likewise left us words of sharp censure and of ardent praise. With regard to Beaumont, Donne, Fletcher, Chapman, Bacon and others, as in the case of Shakespeare, he has mingled praise of their work with protestations of personal affection. With Marston, to whom, for a time, he was most bitterly hostile, he came to a full reconciliation. In all his relations with his literary rivals, we see a man, vain, assertive, arrogant, quick to censure, strong in his loves and hates and always ready for a fight, but also one whose quarrels often ended in friendships, and who was loved and admired by the worthiest of his time. His boasting and carping could not conceal his sturdy honesty of intellect and heart and his generous admiration for high merit in either art or conduct. . Part II, act IV, sc. 3. . Cf. Jusserand, J. J., Ben Jonsons Views of Shakespeares Art, in Works of Shakespeare, 1907, vol. X, pp. 297321. INDEX OF ALL CHAPTERS
<urn:uuid:76c4fa73-58bf-49b8-b04b-17367466f9bf>
CC-MAIN-2016-26
http://www.bartleby.com/216/0101.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395992.75/warc/CC-MAIN-20160624154955-00180-ip-10-164-35-72.ec2.internal.warc.gz
en
0.960042
1,102
2.78125
3
On Day 1 of the newest round of the United Nations’ climate change negotiations, the French foreign minister warned delegates that any agreement to lower emissions would have to avoid needing approval from the United States Congress. “We know the politics in the U.S.,” Laurent Fabius told African delegates, the AP reported. “Whether we like it or not, if it comes to the Congress, they will refuse.” The United Nations is seeking to develop an agreement that will keep global warming to below the scientifically recognized two-degree limit to avoid cataclysmic climate change. Two weeks of negotiations began Monday, and the final agreement is scheduled for a December meeting in Paris. The threat — almost guaranteed — of congressional refusal to ratify the United States’ participation in an international climate agreement might not be as meaningful as some would think. A successful, legal agreement to keep global warming to below two degrees could take a number forms, David Waskow, director of the World Resource Institute’s International Climate Initiative, told ThinkProgress. Under U.S. law, any international treaty must be ratified by Congress. International agreements that bind or prohibit the United States from actions not otherwise mandated by law must also be ratified by Congress. But there have been hundreds of executive agreements that do not trigger Congressional action, Waskow said. “It doesn’t have to be something that is strictly considered a protocol or treaty,” Waskow said, speaking from Bonn. “There are other ways to achieve a legal agreement.” However, a strict and binding limitation on carbon emissions — which some negotiators are hoping for — would need to be ratified by Congress. The current Republican-controlled Congress has adamantly rejected federal action to address the causes — or even reality — of anthropogenic climate change. Administrative action, including the proposed Clean Power Plan expected this summer, has been met with legislative and legal challenges. Republican members of the 2015 Congress broadly reject the science backing climate change. In the House, 53 percent — 131 members — of the Republican caucus deny the occurrence of human-caused global warming; 70 percent — 38 members — of the Senate do. This position is at odds with most of the rest of the world. Even big fossil fuel companies have called for action on carbon. At the U.N.’s welcome address Monday, Fabius, who will host the December talks in Paris, said that he has heard from many people that addressing climate change is a critical and important issue. “We absolutely have to succeed in Paris,” Fabius said. “I am impressed by the mobilization on this subject and the immense will to succeed.” One Maldives delegate said his group still wants a binding carbon emission target, but was upbeat about finding consensus, the Guardian reported. “I think it’s important that we get everyone on board. We are still looking into options,” Amjad Abdulla said.
<urn:uuid:ab5515e9-4a46-445a-b587-313955dabdc5>
CC-MAIN-2016-26
http://thinkprogress.org/climate/2015/06/02/3665081/un-seeks-to-avoid-congressional-approval-climate/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395546.12/warc/CC-MAIN-20160624154955-00138-ip-10-164-35-72.ec2.internal.warc.gz
en
0.956191
618
2.703125
3
How to grow and prepare beets A gardener and a chef team up to show you how to grow beets and then use them in a delicious salad. Southerners have known the goodness of many different kinds of greens for generations. Since I (Anne) grew up “up North,” spinach was the only type of greens I was acquainted with. One that is grown mainly for its bulbous root over most of the country is the beet. And yet, historically, beets were originally grown for their tops. (If you use heirloom seed, you might be disappointed in the size of the root. Check descriptions carefully when purchasing seed if you want to have large bulbous roots.) How to grow beets from seed Beet seed is actually a hard capsule that contains several seeds. If you soak the seed for 24 hours, you will get quicker germination. Beets need a soft growing area so their roots will mature correctly. Prepare a seed bed deeply in a well-drained area. Add plenty of compost to improve either clay or sandy soils. Sow the beet seeds 1/2 to 3/4 inches deep, three inches apart, in rows two to three feet apart. Keep the soil moist but not wet. The most critical thing to do when growing beets is to snip off all but one beet plant seedling so the bulb will have room to grow. Since beet seed is actually several seeds in a cluster, you have to thin the seedlings by cutting off all but the strongest plant in each planting hole. Do not pull them; you can damage the roots of the plant you want to save. Begin thinning when seedlings are about four to five inches tall, and eat the thinnings. Thin to three to four inches if you plan to harvest young, small, or cylindrical-shaped roots, or six-inch spacing for larger roots. Beets tolerate temperatures to 40 degrees F. (4 C), so plant them early in the spring. You can also plant them for a late fall crop. I love beets and usually eat them boiled or pickled. Chef Linda’s beet salad recipe coming up next is new, different, and delicious. Recipe: Roasted Beets on Baby Greens with Feta & Raspberry Vinaigrette My (Linda's) first recollection of beets was from a narrow antique serving dish on the dining room table of my grandmother’s home in Mobile, Ala. The only recipe that she made back then was Harvard Beets, with an orange sauce. The beets were good, but that was pretty much what you saw on the tables of Southern homes, either Harvard Beets, sliced beets, or pickled beets. These days there are not only many different ways to prepare beets but different colors of beets as well. Today, I’m giving you a recipe for a red beet salad, but if you want to use orange beets, you sure can. Use what you have. I hope that you enjoy this recipe. For the recipe for delicious beet greens, please e-mail me through my website and I’ll be happy to send the recipe. 2 medium beets or 1 large beet per person 6 cups baby salad greens 1 (8-ounce) container Feta cheese Orange juice and zest Preheat the oven to 350 degrees F. Clean the beets and spray them with cooking spray. Wrap in foil. Place in an ovenproof dish and bake beets for 45 to 60 minutes, depending on the size. When beets are done or tender, remove from the oven to cool. The peel should slip right off, but if not, then use a knife to peel. Cut each beet into 4 wedges, but don’t cut all the way through so that it will stand on the plate. Prepare 4 salad plates with 1-1/2 cups baby greens per plate. Place a beet (or two) on each plate in the center of the greens. Crumble feta cheese and distribute among the four plates. Drizzle the beets lightly with orange juice, and then drizzle with raspberry vinaigrette. Zest some orange over the top of each plate. Serves 4. 1/3 cup seedless raspberry jam or preserves 4 teaspoons rice wine vinegar 4 teaspoons cider vinegar 1 tablespoon white wine vinegar 1 teaspoon Country Dijon mustard 1/4 cup vegetable oil In a small bowl, mix the preserves, vinegars, and mustard. Slowly drizzle the oil into the dressing while whisking. Store any unused vinaigrette in the fridge. Linda Weiss and Anne Moore, who blog at Diggin' It about food and gardening (click here to read their previous posts), are friends who met while Linda was the food editor and Anne was the garden editor for South Carolina Homes & Gardens magazine. They now write articles for the ETV GardenSMART television show website, where Anne is the horticulture editor, gardening consultant, and e-newsletter editor. Anne has written for magazines and newspapers. She is a member of and a recipient of a Silver Award for magazine writing from the Garden Writers Association. Linda is a personal chef. She attended Le Cordon Bleu of Paris’ catering program. She has appeared as a guest chef on numerous television shows, has been a culinary educator for 10 years, and a food writer for a number of magazines. She is a professional member of The James Beard Foundation and the Southern Foodways Alliance. She has written a cookbook, "Memories From Home, Cooking with Family and Friends."
<urn:uuid:062aa1f1-43a1-4616-a1f3-5c7d2ae78ef8>
CC-MAIN-2016-26
http://www.csmonitor.com/The-Culture/Gardening/diggin-it/2011/0307/How-to-grow-and-prepare-beets
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397565.80/warc/CC-MAIN-20160624154957-00080-ip-10-164-35-72.ec2.internal.warc.gz
en
0.943061
1,174
2.578125
3
Distress: Helping a Friend Although everyone feels stressed at times, excessive stress can manifest itself in a number of ways. Signs of Distress - Trouble sleeping. - Physical aches and pains and/or lack of energy. - Loss of interest in activities that were previously enjoyed. - Depressed or lethargic mood. - Lack of motivation. - Excessive tension or worry. - Restlessness, hyperactivity, pressured speech. - Excessive alcohol use or substance use. - Decline in academic performance, drop in class attendance. - Social withdrawal. - Changes in eating patterns. - Self-injury (cutting, scratching, burning). - Unusual or exaggerated response to events (overly suspicious, overly agitated, easily startled). How to Help Talk in private. Give the person your undivided attention. A few minutes of listening might help the person make a decision about next steps. Listen carefully and with sensitivity. Listen in an open-minded and nonjudgmental way. Be honest and direct, but nonjudgmental. Ask what's troubling your friend, and share what you've observed and why it concerns you. For example: "I've noticed you've been missing class a lot lately and you aren't answering your phone or text messages like you used to. I'm worried about you." Distress often comes from conflicting feelings or demands. Acknowledge this and paraphrase what the other person is saying. For example: "It sounds like you want to please your family, but you aren't sure that what they want for you is what you really want to do." Make a referral. Direct and/or accompany the person to the Student Counseling Center to make an appointment. Follow up. Let the person know you'll be checking in to see how things turned out. A crisis is a highly unpleasant emotional state, during which a person's typical coping strategies are no longer working. The nature of a crisis can be personal and subjective and its severity can range from mild to life-threatening. A crisis should always be taken seriously and responded to quickly. Signs of a Crisis - Extreme agitation or panic. - References to or threats of suicide or other types of self-harm. - Threats of assault, both verbal and physical. - Highly disruptive behavior such as physical or verbal hostility, violence, destruction of property. - Inability to communicate (slurred or garbled speech, disjointed thoughts). - Disorientation, confusion, loss of contact with reality. What You Can Do Immediately call for assistance. In particular, ask for help if the individual is at imminent risk of harming his/herself or someone else. During business hours. Contact the Student Counseling Center by calling or coming directly to the center. There are counselors available to assist in crisis situations. After business hours. If it is after regular business hours and the individual is at risk of harming his/herself or someone else, contact the UT Dallas Police at 972-883-2222. You may also call the UTD Talk line at 972-883-8255 for support from an on-call counselor. Don't take it upon yourself to approach someone who is highly agitated or violent. For your safety as well as others and the person in distress, rely on the help of trained professionals. To learn more, read Suicide: Helping a Friend. Recognize Your Limits Your own safety and wellbeing are as important as that of the person in distress. Recognizing the limits of what you can and can't do to help is a crucial part of the process. - Be genuinely concerned and supportive. - Be honest with yourself about how much time and effort you can afford to spend helping. - Be aware of your own needs and seek support for yourself. - Maintain and respect healthy boundaries. - Realize you can't control how the person is going to respond. - Understand you can't decide for them whether or not the person wants help or wants to change. A Final Reminder When responding to a person in need, you don't have to be alone. When in doubt about how to handle a crisis situation, contact a responsible person with whom to share your concerns, such as a counselor, parent, coach, faculty member, police or staff person. Feel free to contact the Student Counseling Center directly to seek advice about how to handle the situation. If after hours, call the UT Dallas Police at 972-883-2222 or call 911.
<urn:uuid:9b0609d8-aba7-4d15-96f5-00c85d5185d8>
CC-MAIN-2016-26
http://www.utdallas.edu/counseling/distress/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397795.31/warc/CC-MAIN-20160624154957-00029-ip-10-164-35-72.ec2.internal.warc.gz
en
0.941303
956
3.234375
3
Regulators want to see a "common regulatory framework" for products used in mines, oil platforms and chemical plants Regulators of products used in mines, oil platforms and chemical plants from Australia, Brazil, the European Union, the Russian Federation, and the United States agree that products used in these dangerous facilities need a common regulatory framework and that countries can reach this objective in the medium term. The regulators were speaking at a meeting organized jointly by the United Nations Economic Commission for Europe (UNECE) and by the IECEx (International Electrotechnical Commission System for Certification to Standards relating to Equipment for use in Explosive Atmospheres) on 7 - 8 September 2011 in Split, Croatia. In the words of the policy-makers, “global harmonisation promoted and adopted at UNECE is beneficial”, in particular because it “allows for reduced government liability without increasing risk to workers, and consequently enables authorities to allocate more resources to field work” and it is “fully consistent with international obligations under the WTO agreement”. More in detail, the sector of concern is, “equipment used in environments with an explosive atmosphere”. This term indicates all equipment used in such high-risk environments as mines, refineries and chemical plants, as well as offshore facilities and vessels. The equipment used there must be sufficiently safe to offer protection to workers, the natural environment and the communities living close by. However, care also must be taken to avoid repeated testing that does not afford any extra safety but merely adds to costs. Through its Working Party on Regulatory Cooperation and Standardization Policies, UNECE has drawn up a regulatory model that provides for adequate risk mitigation, and does not create excessive costs or red tape for business. The model is based on international standards and the certification scheme under the IECEx, as well as best practice relating to the organization of inspections and market surveillance activities developed by the WP. 6. The UNECE model is available to all United Nations member States. Countries that have no “normative framework” in the explosive-equipment sector can use this model as a blueprint for legislation. If they already have such a framework, they could consider converging towards the international model. Once the model has been adopted as national legislation, goods will be exchanged after certification in the exporting market. The model covers a large spectrum of products: in fact, every appliance used in such an environment may need to be certified as safe, depending on the regulations in force. These appliances may be very simple, such as light switches or helmets equipped with a light bulb, or very complex, such as telephones, instrumentation measurement systems, or excavators. The model will be further promoted to countries from other regions. The first such event will be held in Dubai, 20-21 March 2012. The occasion will be an International Conference, jointly organized by the UNECE, the IECEx and the Emirates Authorities for Standardization and Metrology. For more information, please see: http://live.unece.org/trade/wp6/SectoralInitiatives/EquipmentForExplosiveEnvironment/SIEEE.html
<urn:uuid:c879350c-4f60-4c43-91f9-71b4cca79d79>
CC-MAIN-2016-26
http://www.unece.org/index.php?id=26114&type=111
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397695.90/warc/CC-MAIN-20160624154957-00000-ip-10-164-35-72.ec2.internal.warc.gz
en
0.945877
650
2.53125
3
- How certain are you of your diagnosis? - Are the P waves preceding beats #6 and #7 conducting? - Challenge Question: How many different-shaped beats are there on this tracing? |Figure-1: Long lead II rhythm strip showing a changing rhythm. Can you explain what is happening? NOTE — Enlarge by clicking on the Figure.| - To do this — Mentally block out the first 7 beats on this tracing. If ALL you had to worry about was the last 6 beats in Figure-1 (ie, beats #8-thru-13) — How would you interpret the rhythm in Figure-2? |Figure-2: The first 7 beats from Figure-1 have been blocked out. How would you interpret the arrhythmia represented by beats #8-thru-13?| - Now mentally block out the last 8 beats on this tracing. If all you had to worry about were the initial 5 beats — How would you interpret the arrhythmia in Figure-3? |Figure-3: The last 8 beats (#6-thru-13) from Figure-1 have been blocked out. How would you interpret the arrhythmia represented by beats #1-thru-5?| - Return to Figure-1. Now focus on the more difficult part of the tracing = beats #5-thru-8. Can you figure out what is going on in Figure-4? |Figure-4: Beats #1-thru-4 and #9-thru-13 from Figure-1 have been blocked out. Can you figure out what is happening with the remaining beats #5-to-8?| - What kind of beat is beat #8? (See Answer to Figure-2). - What kind of beat is beat #5? (See Answer to Figure-3). - Would you expect the P wave preceding beat #6 to be able to conduct normally? If not — Why not? - Think of beats #5 and #8 as “parent beats”. If these parent beats (#5 and #8) were to mate (ie, combine) and “have children” — What would you expect the children to look like? - Note that the PR interval preceding beat #6 is shorter than the PR interval preceding other sinus-conducted beats (beats #8-thru-13 in Figure-1). It is too short to conduct normally. - Note also that although the QRS complex of beat #6 is entirely upright — it is not nearly as wide as the other upright (ventricular) beats (beats #1-thru-5 in Figure-1). Beat #6 is a Fusion Beat. - Panel A in Figure-5 — schematically shows the pathway of normal conduction (SA Node–to–AV Node – to bundle branches). This results in a sinus-conducted beat (S) with a normal PR interval and a narrow QRS complex. - In contrast, Panel B — begins in the ventricles (V). This results in a wide QRS complex without preceding atrial activity. - The phenomenon of Fusion is represented in Panel C — in which there is simultaneous (or near simultaneous) occurrence of a supraventricular and ventricular complex. Depolarization wavefronts meet before they are able to complete their path, and the ECG appearance of the resultant fusion beat takes on characteristics of both the supraventricular and ventricular complex (F). |Figure-5: Illustration of the concept of fusion beats. Panel A — Sinus-conducted beat (S). Panel B — Ventricular beat (V). Panel C — Fusion beats (F1 and F2).| - Clinically — the reason recognition of fusion beats is important, is that it proves anomalous complexes in a tracing must be of ventricular etiology! - Close inspection just before widened beat #5 reveals a subtle-but-definite small hump at the onset of the R wave of this beat. This small hump is almost certainly one more P wave (BLUE arrow) — that occurs right on time (ie, at the appropriate P-P interval distance just before the last RED arrow). No sinus P waves are seen before this blue arrow ... |Figure-6: Long lead II rhythm strip taken from Figure-1. We have labeled the regularly-occurring sinus P waves that are clearly seen with RED arrows. The BLUE arrow indicates yet one more on-time P wave that deforms the initial part of beat #5.| - The appearance of beats #6 and #7 in Figure-6 is as might be anticipated considering the PR interval that precedes each of these fusion beats. That is, the very short PR interval preceding beat #6 would not be expected to allow sufficient time for deep penetration of the supraventricular impulse (P wave) into the ventricles. Thus, beat #6 much more closely resembles the beats of ventricular etiology. - In contrast — the PR interval preceding beat #7 is almost normal. As a result, this supraventricular impulse (P wave) should have had time to travel relatively far down the conduction system before fusion occurred (explaining why the beat more closely resembles the morphology of supraventricular beats). - KEY POINT — Clinically, recognition that beats #6 and #7 in this tracing are fusion beats confirms the ventricular etiology of beats #1-thru-5. - PEARL — One looks for fusion beats not only by examining the QRS complex — but also by close inspection of each T wave! - Careful inspection of beat #5 reveals that its R wave is not quite as tall and its T wave not quite as deep as the other ventricular beats. Note also that the very initial portion of the upstroke of this R wave is deformed. A P wave is hiding here — and accounts for the slight degree of fusion that this beat manifests (BLUE arrow in Figure-6). - Beats #8 and #9 are also fusion beats. Careful comparison of these beats with beats #10-thru-13 reveals that they have a slightly narrower QRS complex and, a T wave that is smaller and less peaked.
<urn:uuid:a78f70fc-e962-463b-b7e7-75dfc2ba7d96>
CC-MAIN-2016-26
http://ecg-interpretation.blogspot.ca/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399425.79/warc/CC-MAIN-20160624154959-00140-ip-10-164-35-72.ec2.internal.warc.gz
en
0.923159
1,312
3.546875
4
|Publication number||US4981141 A| |Application number||US 07/310,660| |Publication date||1 Jan 1991| |Filing date||15 Feb 1989| |Priority date||15 Feb 1989| |Publication number||07310660, 310660, US 4981141 A, US 4981141A, US-A-4981141, US4981141 A, US4981141A| |Original Assignee||Jacob Segalowitz| |Export Citation||BiBTeX, EndNote, RefMan| |Patent Citations (17), Referenced by (192), Classifications (14), Legal Events (5)| |External Links: USPTO, USPTO Assignment, Espacenet| 1. Field of the Invention This invention relates to medical instrumentation and, more particularly, to electrocardiographic and cardiocirculatory monitoring equipment. 2. Prior Art Every muscle can perform only one movement; the shortening of its fibers by contraction. This also applies to the heart muscle. Every action of a muscle has associated with it an electrical activity which changes in the course of the contraction. The electrical signal thus associated with the muscle action is transmitted through various tissues and ultimately reaches the surface of the body. There such electrical signals can be detected by electrodes applied to the skin. Thus, such signals that are being detected by the electrodes can be recorded with the aid of suitable electrocardiographic equipment or can be observed in/or recorded with a monitor/recording unit. The record thus obtained is called an electrocardiogram or a rhythm-monitoring strip. As early as 1855 action currents from the heart were recorded, as measurements were being made of a beating frog heart. The first actual recording of a frog electrocardiogram was made by A. D. Waller in 1887. The first recording of a human heart electrical action signal (hereinafter the "heart-signal") was made by A. D. Waller in 1889. Modern electrocardiograph, however, started with Einthoven, who invented the string galvanometer (and is credited with the bipolar lead triangle setting for recordings of standard limb leads I, II, III) and applied it to recording small voltages of short duration, which is the category into which heart-signals fall. His recording techniques have not been improved upon very much since they were first published many years ago. Here it should be noted that the term "lead" as used herein is being used in the medical sense and not the electronic sense (i.e., "lead" is a spatial position at which the heart-signal is viewed, not a wire). After Einthoven's work, the entire field of research stagnated for nearly 30 years until the introduction by Wilson of upper and lower extremities' local leads and the zero electrode used in unipolar recordings. The entire 12-lead system is fed by unipolar and bipolar signals. Unipolar leads are divided into unipolar extremity or limb leads and unipolar precordial or chest leads. In unipolar limb leads the three extremity leads are; aVR--the unipolar right arm lead, (R designating the right arm); aVL--unipolar left arm lead (L designating left arm); and, aVF--unipolar left leg lead, in all of which the "a" stands for "augmented". The unipolar chest leads are designated by the letter V followed by a subscript numeral which represents the exact location on the chest. In a standard setting there are six precordial leads V1-V6. In standard limb bipolar leads, lead I is the potential difference between the arms, i.e. left arm potential minus right arm potential. Lead II is the potential difference between the left leg potential and the right arm potential. Lead III is the potential difference between the left leg and the left arm. If the leads are diagrammed on the body they inscribe, essentially, an equilateral triangle. The electrocardiograph generates the lead voltages from the potentials applied to it from the bipolar electrodes. The term "lead" as used in electrocardiography means "view" of the heart's electrical impulse. That "view" varies between leads. The electrocardiograph is widely used by the medical profession. The standard electrocardiograph requires at least 10 wires to be attached to the body of the patient at one end, and to the electrocardiograph at the other end to detect heart-signals and transform them into a 12 lead electrocardiogram evaluation. This involves attaching six electrodes to the chest or precordial area to obtain recordings of leads V1-V6 as well as attaching 4 electrodes, the arms and legs of the patient to obtain recordings of leads I, II, III, AVR, AVL, AVF. Only three electrodes and three terminal wires are applied to the chest for heart rhythm monitoring. After the ten electrodes are attached to the patient, ten specific wires must be connected between each specific electrocardiograph terminal and the related electrode of predetermined position. Many and frequent difficulties exist and cumbersome operation of the conventional system arises because of the following factors: 1. Terminal wires from the electrocardiograph have to be connected to the distal electrodes in a pre-determined order. (Defined limb and side to defined wire, as well as specific precordial points to defined precordial wires.) In practice there are relatively frequent errors of connection between a specifically positioned electrode and the specifically associated wire from the electrocardiograph. 2. Often, the 10 terminal wires become intertangled with each other and it takes precious time to get them untangled. 3. When the electrocardiograph is to be operated by an Intensive Coronary Care Mobile Unit, which operates in relatively abnormal conditions, often speed of utilization of the system is crucial since life-threatening situations are involved. In this environment the existing electrocardiographic system exhibits low efficiency and low effectiveness. 4. Since the terminal wires are re-used, if they have any manufacturing defects inherent in them or develop such defects with use throughout their long extent (defects often difficult to detect), operation of the system, (the electrocardiograph or monitor), is unsatisfactory. 5. During surgical procedures the patient is monitored for arrhythmias. Often the wires which extend beneath or beside the sterile field become disconnected from the electrodes during the procedure and it is difficult, out of the sterile surgical field, to reconnect the necessary wires. It is also time consuming and interruptive of the procedure. 6. During hospitalization, rhythm-monitored patients occasionally are permitted to ambulate within the department area. Often the patient disconnects the wires connected from the bedside monitor to the electrodes in order to take a walk or visit the restroom in the area. During this period no rhythm monitoring is possible. Therefore, it is an object of this invention to overcome the problems previously experienced in connection with application of electrocardiographs in the taking of electrocardiograms and in connection with the rhythm monitoring of patients. It is a further object of this invention to provide electrocardiographic and rhythm monitoring systems in which the physical wires between the patient and the electrocardiograph or monitor are eliminated. A novel, wireless, two-sectioned system having a plurality of microchipped, self-contained and self-powered heart-signal sensing, amplifying, encoding and R-F transmitting, detecting electrodes and a receiving, demodulating and decoding base unit capable of developing in real time, signal-averaging electrocardiography for a 12-lead digital and/or analog interpretive electrocardiogram and/or for rhythm monitoring (on any Holter system) with 3-electrode digital and/or analog interpretive display or recording and/or for obtaining a 12-lead ECG from only three electrodes positioned on the chest for use with existing monitors and display devices. The electrocardiac activity information detected and transmitted by the system conforms to all professional standards and levels of accuracy for vector progression, duration, intensity and form characteristics, specifically with respect to the following features: 3. P wave 4. P-R interval 5. QRS interval 6. QRS complex 7. ST segment 8. T wave 9. U wave 10. Q-T duration The system will function within a nominal range of 150 feet between the electrode system and the base unit and will be suitable for operation with a single-channel or multi-channel electrocardiograph, monitor or Holter, fixed, A-C operated or portable, battery operated or any combination thereof. The receiving-demodulating-decoding base unit used with the system can be connected to existing, stand-alone electrocardiographs or, by reason of its miniature size, can be integrated into new generations of such machines. Interference between multiple systems operating in the same facility is prevented by choosing different center frequencies for the different systems. The electrodes may be circular with concentric outer ring and center skin contacts, the outer ring being the reference potential contact to the body of the patient. Alternatively, an elongated electrode with separated contacts may be used, one being the signal or pick-up contact and the other being the reference or zero potential contact. While reference has been made herein to an R-F system of coupling between body electrodes and the base unit, it should be understood that, with the proper operating environment, ultrasonic or laser technologies may be used. The left arm, right arm and left leg limb signals are fed in unipolar fashion to a bridge or "Wilson" network in the base unit to derive a reference signal for application to the right leg reference or "indifferent" electrode. That reference signal is used to modulate an F-M transmitter at the base unit. At the right leg electrode, a battery operated receiver detects, de-codes and amplifies the "indifferent" or reference signal and applies it to the right leg through a two-contact electrode to complete the signal path in the system. Alternatively, a balanced, mixed combination of the left arm, right arm and left leg signals is radiated from the base unit to the right leg R-F receiver electrode which applies such combination signal to the right leg. Referring to bipolar lead recordings, the electrodes function in the same wireless fashion, with the switchable characteristic of each electrode permitting identification of the location of that electrode so that the proper combination of limb signals is utilized in the ECG to develop I, II, and II leads. Similarly, the precordial electrodes V1-V6, according to this invention, are coupled, in wireless fashion, to appropriate, respective channels in the base station for processing and use. This invention and its advances over the prior art can best be understood by reading the Specification which follows in conjunction with the drawings herein, in which: FIG. 1 is a block diagram of a wireless electrocardiograph system, according to the present invention; FIG. 1A is a graphical representation of the distribution of additional electrodes in the system of FIG. 1. FIG. 2 is a schematic diagram of a concentric electrode for use in the present invention; FIG. 3 is a schematic diagram of a "Wilson" network or bridge for developing an "indifferent" signal; FIG. 4 is a schematic diagram of an alternative circuit for developing a right leg signal; FIG. 5 is an elevational view of the concentric electrode of FIG. 2; FIG. 6 is an elevational view of an alternative form of electrode; and, FIG. 7 is a block diagram of an electrode with switchable code and transmitter frequency. In FIG. 1, the human body is represented by a stick figure as far as the location of limb electrodes of the system is concerned. Electrode 10 is connected to the left arm, electrode 12 is connected to the right arm, electrode 14 is connected to the right leg and electrode 16 is connected to the left leg. Each of these electrodes may be the concentric type shown in FIG. 2 with the outer conductive strip being used to establish a localized zero or reference potential and the center connector being the source of signal for transmission or the point of application of the signal in the receiving mode. The outer ring may be referred to as an "indifferent" electrode of a localized nature. In the precordial area the electrode of FIG. 6 may be used. The output signal from electrode 10 is fed to amplifier 18 which feeds encoder-modulator 20. The signal thus derived is used to modulate transmitter 22 which is connected to antenna 24 from which the modulated RF signal is radiated. Amplifier 18 may comprise a micro-chip-type RC 4560 which has a dual stage operational amplifier. Encoder modulator 20 may comprise a CM 8555 IPA, or equivalent, in combination with a 40H393 chip. If digital encoding is utilized a single transmitting frequency may be used for all transmitters. However, if analog modulation by the signal from electrode 10 is utilized, encoder modulator 20 may act merely as a modulator and each of the transmitters may be set at a different center frequency. Transmitter 22, and corresponding transmitters in other channels, may comprise a 930F5 micro-chip which includes a Colpitts oscillator. The audio frequency range which must be reproduced by the system is 0.05 Hz to 125 Hz. The F-M swing of the carrier frequency is 40% of the carrier frequency. As shown, the output of amplifier 18 may also be fed through an additional amplifier 19 to an LED 21 which will give a light pulse each time a heart-signal is received at electrode 10. This heart-signal indicator may be provided at each electrode, if desired. The heart-signal from electrode 12 is fed to an amplifier 26, which, again, is a high gain, low noise amplifier and the output of amplifier 26 is fed to encoder modulator 28 and, thence, to transmitter 30. The output of transmitter 30 is fed to antenna 32 for radiation. The heart-signal from left leg electrode 16 is fed to amplifier 34 and, the output of that amplifier 34 is fed to encoder-modulator 36 for modulating F-M transmitter 38. The output of transmitter 38 is fed to antenna 40 for radiation. The signal radiated by antenna 24 is intercepted by antenna 42 and fed to receiver demodulator 44, the output of which is fed to decoder 46 and, thence, to buffer amplifier 48. The signal from antenna 32 is intercepted by antenna 50 and fed to receiver-demodulator 52 the output of which is fed to decoder 54 and, thence, to buffer amplifier 48. Similarly, the signal from antenna 40 is received by antenna 56 and that signal is demodulated in receiver-demodulator 58 which feeds its output signal to decoder 60 for application to buffer amplifier bank 48. It should be understood that in buffer amplifier bank 48 there is a series of amplifiers, one for each limb signal channel. The signals from buffer amplifier 48 are fed to what is known as a "Wilson" network. This is essentially a bridge, the make up of which can be seen in FIG. 3. The left arm, right arm and left leg signals are coupled to the "Wilson" network to produce what is known as an "indifferent" or reference potential which appears at terminal CT. In this embodiment the signal at CT is not used but it is used in the embodiment of FIG. 4. Instead, here, the right arm, left arm and left leg signals are fed to a balancing attenuator 65 and, thence, to a mixer amplifier 66 where the mixed signal is amplified by a low noise, high gain amplifier 66 and results in the modulation by encoder-modulator 68 of transmitter 70 which is coupled for RF purposes to antenna 72 and the RF signal, thus modulated, is radiated by antenna 72. The radiated reference signal is picked up by receiving antenna 74 such antenna being coupled to receiver demodulator 76 which develops a signal in the audible or sub-audible frequency range. Such signal, if it is encoded, may then be decoded by decoder 78 and the resulting signal may be applied to amplifier 80 which is coupled to the active element of electrode 14 carried by the right leg. This establishes the so-called "zero" potential on the "indifferent" or reference electrode 14. Such a "zero" signal is necessary for operation of a system involving the use of unipolar limb leads. The signals from the same electrodes are used to produce the bipolar limb leads previously described. The transmitters in the system, if purely analog techniques are involved, may be set at center frequencies of, for example, 72.080 MHz and at multiples of 160 KHz around that center frequency. The transmitters operate simultaneously but with 160 KHz separation there is no problem with intermodulation at the respective receivers. Operation at much higher frequencies, for example in the 400 MHz band, results in a requirement for a much shorter antenna but increases power requirements, thus putting a heavier load on the very small battery which can be mounted with the micro-chips in connection with the electrodes utilized in the system, as shown in FIG. 5. This analysis applies equally to electrodes used to detect signals for unipolar or bipolar leads. With a digitally encoded system, the center frequency may also be changed between systems to reduce the possibility of interference between systems operating in proximity to each other. As for the heart-signals at the precordial electrodes, such as electrode 82 and electrode 84, the transmitters are as shown in connection with the limb signal transmitters, just described. Again the frequencies are set differently, each from the other but, at higher frequencies, this is not a problem. Also, because the field strength of the signals from the various electrodes associated with transmitters is low, there is considerable freedom in choosing a frequency which is free of local interference. There are generally six precordial electrodes and, therefore, in this system there are six precordial channels, each having the transmitting and receiving structures of corresponding elements in the unipolar limb signal channels. For example, the signal from electrode 82 and its associated transmitter is received by antenna 86 and is fed to receiver-demodulator 88 where a signal in the audible or sub-audible frequency range is obtained and fed to decoder 90 for any decoding that is necessary to reproduce the heart-signal. The heart-signal thus derived is applied to buffer amplifier bank 92. Similarly, the heart-signal detected at electrode 84 is transmitted by the associated transmitter and is received by antenna 94, following which it is detected and demodulated by receiver demodulator 96 and, if necessary, it is decoded by decoder 98 and fed to buffer amplifier 92. Buffer amplifier 92 is a bank of amplifiers, one for each precordial signal channel. The unipolar limb signals and the precordial signals are fed, without loss of integrity, to lead selector 100 which is of the conventional type found in electrocardiographs and which permit selection of each of the channels individually. The output of lead selector 100 is fed to filter-amplifier 102, following which the signal is fed to the electrocardiographic analog or digital cardiographic display. The analog recording pen is represented by needle 104. The galvanometric mechanism is represented by element 106. Alternately, three of the signals shown entering lead selector 100 may be fed directly to a monitor 107 or to a Holter system for developing a 12-lead electrocardiogram from the signals sensed by three electrodes placed only on the chest area. Turning to FIG. 2, signal contact element 112 is electrically conductive in nature and has a conductor 113 associated therewith for coupling to the micro-chip amplifier, encoder-modulator, transmitter element of FIG. 1, or to external equipment. Contact 112 may be of aluminum, for example. Contact 114 is the "indifferent" or reference contact for electrode 110. The spacing "S" between contact 114 and contact 112 may approximate 11/2 to 2 inches. Of course, concentric ring contact 114 is electrically conductive in nature. In some cases it may not be a closed circle but may merely be an arc of a circle. Contacts 112 and 114 are carried on a plastic film material 116, for example. If contacts 114 and 112 are too widely separated the accuracy of the graphic reproduction of the heart-signal will be diminished. In FIG. 3 the so-called "Wilson" network is shown. The purpose of this network is to establish a "zero" area of the field from the heart dipole which is creating the field being studied. As can be seen from FIG. 3, the right arm, left arm and left leg potentials are combined through three equal resistors, 120, 122 and 124 to establish a "zero" or reference point which is generally referred to as the "central terminal". The size of resistors 120, 122 and 124 is in excess of 5000 ohms with the general range being 5000-15,000 ohms. The central terminal ("CT") potential is not actually "zero". Theoretically, the potential of the CT terminal is the mid-dipole potential of the heart-signal generator if the field is homogenous and if the dipole generating the signal lies exactly in the center of an equilateral triangle, the angles of which are formed by the three electrode points LA, RA, LL. Resistors 126, 128 and 130 have the same resistance and form an electrical equilateral triangle simulating the Einthoven triangle of the electrocardiographic art. According to the embodiment of FIG. 4, the CT potential is, after amplification by amplifier 129, transmitted by transmitter 70 through antenna 72 to receiver-demodulator 76 and its associated components for application to the right leg electrode 14, shown in FIG. 1. Unipolar leads are presently the only ones used in the precordial positions, shown in FIG. 1A. It was formerly believed that a limb could serve for the "indifferent" or reference connection because it was relatively so distant from the precordial electrode. It soon became apparent, however, that this was not the case, that the arm or leg was not truly "indifferent" and it altered the results in varying degrees depending on which limb was connected to the negative terminal of the electrocardiograph. Thus, the need for establishing a central terminal, as described hereinbefore. Associated with each of the limb and precordial electrodes is a power supply 111 (conventionally a battery) which provides to the micro-chips operating voltage of the necessary sign and magnitude. At the base station side IC operating voltage of the necessary sign and magnitude is provided by power supply 115 which may be battery or A.C. based. From FIG. 5, it is apparent that each electrode patch 110 carries its own power supply 150 as well as the necessary micro-chips 152, which are powered by power supply 150, and an antenna 154. An LED 21 may also be provided which lights with each heart beat. Tab 161 is an insulating member which, when pulled, connects power supply 150 to the micro-chips and turns "on" the associated electrode. This is true for the receiving electrode 14 on the right leg as well as for the various transmitting electrodes. FIG. 6 shows an alternative form of electrode structure 158 which is particularly useful for precordial application. The necessary separation of signal electrode 160 and zero reference electrode 162 is achieved in the limited space available on the chest. This strip electrode structure carries a micro-chip amplifier, encoder-modulator and transmitter module 164 (with battery) and connectors 163, 165 for signal input. To limit the number of electrodes with different operating parameters which must be kept in inventory and employed in setting up the system for a given patient, each electrode may have a multiple-position switch which changes the frequency or digital encoding of the signal from the electrode so that it matches that parameter for the site at which it is to be used on the patient. The electrodes may be color coded to indicate where they should be placed on the body. They may also include frequency or code switches to permit one electrode type to be usable in various body locations. FIG. 7 illustrates, in block form, this capability. In FIG. 7, heart-signals from any of the 10 electrodes is coupled to amplifier 170, as shown in FIG. 1. The output of amplifier 170 is fed to encoder/modulator 172 which includes a quad NAND gate section, as is found, for example, in a type TSC-323 integrated circuit. DIP switch 174 permits selection of a 3-digit code, if digital encoding is used. On the other hand, if analog encoding is to be used, a frequency-change switch 176 is provided on transmitter 178. The oscillators described in connection with FIG. 1 (which are used here) are tunable by changing the applied voltage. Such voltage change is accomplished by switch 176. Thus, by either method, the number of different types of electrodes that must be inventoried can be reduced. The base station decoders or receiver-demodulator may be fixed and the electrode encoding means may be adjusted to correspond to the code or frequency of a target signal channel at the base station. The appropriately encoded signal, or the signal at the desired frequency is fed to antenna 180. This system is adapted to work with Holter systems in which 12-lead electrocardiograms are derived from three-electrode information. This fact is illustrated by element 109 in FIG. 1. While a particular embodiment has been shown and described, it will be apparent to those skilled in the art that variations and modifications may be made in that embodiment without departing from the spirit and scope of this invention. It is the purpose of the appended Claims to cover any and all such variations and modifications. |Cited Patent||Filing date||Publication date||Applicant||Title| |US2298125 *||18 Dec 1940||6 Oct 1942||Diagnostic aid| |US2660165 *||16 Jun 1950||24 Nov 1953||Sanborn Company||Electrical calibration system| |US3757778 *||13 Jan 1971||11 Sep 1973||Comprehensive Health Testing L||Electrocardiograph lead distribution and contact testing apparatus| |US3848582 *||10 Jul 1972||19 Nov 1974||Medical Res Labor Inc||Portable electrocardiographic signal apparatus| |US3858576 *||23 May 1973||7 Jan 1975||Sachs Elektronik Kg Hugo||Portable electrocardioscope| |US3882277 *||20 Apr 1972||6 May 1975||American Optical Corp||Electrocardiographic telemetry and telephone transmission link system| |US3908641 *||7 Jun 1974||30 Sep 1975||Birtcher Corp||Electrocardiograph with improved stylus control circuits| |US4121573 *||13 Jan 1976||24 Oct 1978||Goebel Fixture Co.||Wireless cardiac monitoring system and electrode-transmitter therefor| |US4356486 *||24 Mar 1980||26 Oct 1982||Medimetric Company||Telemetering system for operating room and the like| |US4593284 *||14 Mar 1984||3 Jun 1986||Medtronic, Inc.||Analog and digital signal transmitter| |US4606352 *||13 Jul 1984||19 Aug 1986||Purdue Research Foundation||Personal electrocardiogram monitor| |US4622979 *||2 Mar 1984||18 Nov 1986||Cardiac Monitoring, Inc.||User-worn apparatus for monitoring and recording electrocardiographic data and method of operation| |US4658831 *||18 Jun 1984||21 Apr 1987||Pacific Communications, Inc.||Telemetry system and method for transmission of ECG signals with heart pacer signals and loose lead detection| |US4742831 *||21 Nov 1985||10 May 1988||Siemens-Pacesetter, Inc.||Selection and isolation apparatus for use with ECG device| |US4784162 *||23 Sep 1986||15 Nov 1988||Advanced Medical Technologies||Portable, multi-channel, physiological data monitoring system| |US4827943 *||15 Oct 1987||9 May 1989||Advanced Medical Technologies, Inc.||Portable, multi-channel, physiological data monitoring system| |WO1987006447A1 *||21 Apr 1987||5 Nov 1987||Drago Cernjavic||Electrocardiograph| |Citing Patent||Filing date||Publication date||Applicant||Title| |US5036869 *||23 Mar 1990||6 Aug 1991||Nihon Kohden Corporation||Medical wireless telemeter| |US5217020 *||28 May 1991||8 Jun 1993||Hewlett-Packard Company||Biophysiological data acquisition including lead combination| |US5307818 *||7 Jul 1992||3 May 1994||Jacob Segalowitz||Wireless electrocardiographic and monitoring system and wireless electrode assemblies for same| |US5318533 *||21 Feb 1992||7 Jun 1994||Scimed Life Systems, Inc.||Balloon catheter inflation device including apparatus for monitoring and wireless transmission of inflation data, and system| |US5327888 *||5 Jun 1992||12 Jul 1994||Physiometrix, Inc.||Precordial electrode strip and apparatus and method using the same| |US5392784 *||20 Aug 1993||28 Feb 1995||Hewlett-Packard Company||Virtual right leg drive and augmented right leg drive circuits for common mode voltage reduction in ECG and EEG measurements| |US5458123 *||29 Apr 1994||17 Oct 1995||Siemens Medical Systems, Inc.||System for monitoring patient location and data| |US5458124 *||8 Feb 1994||17 Oct 1995||Stanko; Bruce E.||Electrocardiographic signal monitoring system| |US5503158 *||22 Aug 1994||2 Apr 1996||Cardiocare, Inc.||Ambulatory electrocardiogram monitor| |US5551953 *||31 Oct 1994||3 Sep 1996||Alza Corporation||Electrotransport system with remote telemetry link| |US5577510 *||18 Aug 1995||26 Nov 1996||Chittum; William R.||Portable and programmable biofeedback system with switching circuit for voice-message recording and playback| |US5579001 *||20 Oct 1994||26 Nov 1996||Hewlett-Packard Co.||Paging-based backchannel in a medical telemetry system| |US5658316 *||3 Jul 1995||19 Aug 1997||Automatic Defibrillator, Inc.||Portable defibrillator with disposable power pack| |US5694940 *||19 Dec 1995||9 Dec 1997||Siemens Medical Systems, Inc.||Apparatus and method for providing dual output signals in a telemetry transmitter| |US5752976 *||23 Jun 1995||19 May 1998||Medtronic, Inc.||World wide patient location and data telemetry system for implantable medical devices| |US5855550 *||13 Nov 1996||5 Jan 1999||Lai; Joseph||Method and system for remotely monitoring multiple medical parameters| |US5871451 *||30 Jun 1997||16 Feb 1999||Siemens Medical Systems, Inc.||Apparatus and method for providing dual output signals in a telemetry transmitter| |US5913826 *||12 Jun 1996||22 Jun 1999||K-One Technologies||Wideband external pulse cardiac monitor| |US6083248 *||24 Nov 1998||4 Jul 2000||Medtronic, Inc.||World wide patient location and data telemetry system for implantable medical devices| |US6208889||2 Apr 1999||27 Mar 2001||Peter G. Gorman||Biomedical response exercise equipment which avoids interference effects| |US6259939 *||21 Apr 1999||10 Jul 2001||R. Z. Comparative Diagnostics Ltd.||Electrocardiography electrodes holder including electrocardiograph electronics| |US6264614||31 Aug 1999||24 Jul 2001||Data Critical Corporation||System and method for generating and transferring medical data| |US6319200||5 Jan 1999||20 Nov 2001||Criticare Systems, Inc.||Method and system for remotely monitoring multiple medical parameters| |US6332094||7 Jun 2000||18 Dec 2001||Peter Gregory Gorman||Personal monitor and method using identification to minimize interference| |US6364834||5 Jan 1999||2 Apr 2002||Criticare Systems, Inc.||Method and system for remotely monitoring multiple medical parameters in an integrated medical monitoring system| |US6385473||15 Apr 1999||7 May 2002||Nexan Limited||Physiological sensor device| |US6416471||15 Apr 1999||9 Jul 2002||Nexan Limited||Portable remote patient telemonitoring system| |US6434420||21 Mar 2000||13 Aug 2002||Integrated Biosensing Technologies||Biopotential electrode sensory component| |US6434421||21 Mar 2000||13 Aug 2002||Integrated Biosensing Technologies||Biopotential sensor electrode| |US6438413||21 Mar 2000||20 Aug 2002||Integrated Biosensing Technologies||Biopotential sensor electrode system| |US6441747||18 Apr 2000||27 Aug 2002||Motorola, Inc.||Wireless system protocol for telemetry monitoring| |US6450953||15 Apr 1999||17 Sep 2002||Nexan Limited||Portable signal transfer unit| |US6454708||9 Jun 2000||24 Sep 2002||Nexan Limited||Portable remote patient telemonitoring system using a memory card or smart card| |US6494829||15 Apr 1999||17 Dec 2002||Nexan Limited||Physiological sensor array| |US6496705||18 Apr 2000||17 Dec 2002||Motorola Inc.||Programmable wireless electrode system for medical monitoring| |US6577893||15 Jun 2001||10 Jun 2003||Motorola, Inc.||Wireless medical diagnosis and monitoring equipment| |US6611705||17 Jul 2001||26 Aug 2003||Motorola, Inc.||Wireless electrocardiograph system and method| |US6685633||12 Jan 2001||3 Feb 2004||Ge Medical Systems Information Technologies, Inc.||System and method for generating and transferring data| |US6685634||28 Jan 2003||3 Feb 2004||William R. Fry||Portable physiological monitor including body-part-encircling GPS antenna| |US6728576||31 Oct 2001||27 Apr 2004||Medtronic, Inc.||Non-contact EKG| |US6733447||19 Nov 2001||11 May 2004||Criticare Systems, Inc.||Method and system for remotely monitoring multiple medical parameters| |US6897788||17 Apr 2002||24 May 2005||Motorola, Inc.||Wireless system protocol for telemetry monitoring| |US6908307||3 Feb 2003||21 Jun 2005||Schick Technologies||Dental camera utilizing multiple lenses| |US6972411||10 Dec 2002||6 Dec 2005||Schick Technologies, Inc.||Method of event detection for intraoral image sensor| |US6987965||22 Oct 2002||17 Jan 2006||Motorola, Inc.||Programmable wireless electrode system for medical monitoring| |US7042337||9 May 2006||Hill-Rom Services, Inc.||Communication and data entry device| |US7072443||10 Dec 2002||4 Jul 2006||Schick Technologies, Inc.||Intraoral image sensor| |US7136703||16 Apr 2002||14 Nov 2006||Pacesetter, Inc.||Programmer and surface ECG system with wireless communication| |US7171166||21 Oct 2005||30 Jan 2007||Motorola Inc.||Programmable wireless electrode system for medical monitoring| |US7193219||1 May 2006||20 Mar 2007||Schick Technologies, Inc.||Intraoral image sensor| |US7197357||30 Nov 2001||27 Mar 2007||Life Sync Corporation||Wireless ECG system| |US7242306||12 Apr 2004||10 Jul 2007||Hill-Rom Services, Inc.||Article locating and tracking apparatus and method| |US7248933||8 May 2002||24 Jul 2007||Hill-Rom Services, Inc.||Article locating and tracking system| |US7272428||16 May 2003||18 Sep 2007||Motorola, Inc.||Wireless electrocardiograph system and method| |US7403808||11 Mar 2005||22 Jul 2008||Lifesync Corporation||Wireless ECG system| |US7450024||28 Jun 2007||11 Nov 2008||Hill-Rom Services, Inc.||Article locating and tracking apparatus and method| |US7595723||7 Jun 2006||29 Sep 2009||Edwards Lifesciences Corporation||Wireless communication protocol for a medical sensor system| |US7658196||25 Apr 2007||9 Feb 2010||Ethicon Endo-Surgery, Inc.||System and method for determining implanted device orientation| |US7734476||29 Sep 2003||8 Jun 2010||Hill-Rom Services, Inc.||Universal communications, monitoring, tracking, and control system for a healthcare facility| |US7775215||7 Mar 2006||17 Aug 2010||Ethicon Endo-Surgery, Inc.||System and method for determining implanted device positioning and obtaining pressure data| |US7775966||17 Aug 2010||Ethicon Endo-Surgery, Inc.||Non-invasive pressure measurement in a fluid adjustable restrictive device| |US7786562||10 Jun 2005||31 Aug 2010||Volkan Ozguz||Stackable semiconductor chip layer comprising prefabricated trench interconnect vias| |US7844342||30 Nov 2010||Ethicon Endo-Surgery, Inc.||Powering implantable restriction systems using light| |US7860557||13 Apr 2005||28 Dec 2010||Lifesync Corporation||Radiolucent chest assembly| |US7927270||29 Jan 2007||19 Apr 2011||Ethicon Endo-Surgery, Inc.||External mechanical pressure sensor for gastric band pressure measurements| |US7933642||16 May 2003||26 Apr 2011||Rud Istvan||Wireless ECG system| |US8016744||13 Sep 2011||Ethicon Endo-Surgery, Inc.||External pressure-based gastric band adjustment system and method| |US8016745||6 Apr 2006||13 Sep 2011||Ethicon Endo-Surgery, Inc.||Monitoring of a food intake restriction device| |US8034065||11 Oct 2011||Ethicon Endo-Surgery, Inc.||Controlling pressure in adjustable restriction devices| |US8057492||15 Nov 2011||Ethicon Endo-Surgery, Inc.||Automatically adjusting band system with MEMS pump| |US8066629||12 Feb 2007||29 Nov 2011||Ethicon Endo-Surgery, Inc.||Apparatus for adjustment and sensing of gastric band pressure| |US8100870||14 Dec 2007||24 Jan 2012||Ethicon Endo-Surgery, Inc.||Adjustable height gastric restriction devices and methods| |US8111152||23 Mar 2009||7 Feb 2012||Noninvasive Medical Technologies, Inc.||Relative positioning system and method| |US8114345||8 Feb 2008||14 Feb 2012||Ethicon Endo-Surgery, Inc.||System and method of sterilizing an implantable medical device| |US8134460||23 Mar 2009||13 Mar 2012||Noninvasive Medical Technologies, Inc.||Relative positioning system method| |US8142452||27 Dec 2007||27 Mar 2012||Ethicon Endo-Surgery, Inc.||Controlling pressure in adjustable restriction devices| |US8150502||6 Feb 2007||3 Apr 2012||The Board Of Trustees Of The Leland Stanford Junior University||Non-invasive cardiac monitor and methods of using continuously recorded cardiac data| |US8152710||28 Feb 2008||10 Apr 2012||Ethicon Endo-Surgery, Inc.||Physiological parameter analysis for an implantable restriction device and a data logger| |US8160682||6 Feb 2007||17 Apr 2012||The Board Of Trustees Of The Leland Stanford Junior University||Non-invasive cardiac monitor and methods of using continuously recorded cardiac data| |US8187162||29 May 2012||Ethicon Endo-Surgery, Inc.||Reorientation port| |US8187163||10 Dec 2007||29 May 2012||Ethicon Endo-Surgery, Inc.||Methods for implanting a gastric restriction device| |US8192350||5 Jun 2012||Ethicon Endo-Surgery, Inc.||Methods and devices for measuring impedance in a gastric restriction system| |US8221439||17 Jul 2012||Ethicon Endo-Surgery, Inc.||Powering implantable restriction systems using kinetic motion| |US8233995||31 Jul 2012||Ethicon Endo-Surgery, Inc.||System and method of aligning an implantable antenna| |US8244335 *||14 Aug 2012||The Board Of Trustees Of The Leland Stanford Junior University||Non-invasive cardiac monitor and methods of using continuously recorded cardiac data| |US8255041||3 Feb 2011||28 Aug 2012||Lifesync Corporation||Wireless ECG system| |US8260432||4 Sep 2012||Boston Scientific Neuromodulation Corporation||Moldable charger with shape-sensing means for an implantable pulse generator| |US8301232 *||30 Oct 2012||Alivecor, Inc.||Wireless, ultrasonic personal health monitoring system| |US8337389||25 Dec 2012||Ethicon Endo-Surgery, Inc.||Methods and devices for diagnosing performance of a gastric restriction system| |US8377079||27 Dec 2007||19 Feb 2013||Ethicon Endo-Surgery, Inc.||Constant force mechanisms for regulating restriction devices| |US8428746||23 Apr 2013||Boston Scientific Neuromodulation Corporation||Moldable charger with shape-sensing means for an implantable pulse generator| |US8509882||8 Jun 2010||13 Aug 2013||Alivecor, Inc.||Heart monitoring system usable with a smartphone or computer| |US8538503||31 Jul 2012||17 Sep 2013||Irhythm Technologies, Inc.||Device features and design elements for long-term adhesion| |US8560046||12 May 2011||15 Oct 2013||Irhythm Technologies, Inc.||Device features and design elements for long-term adhesion| |US8591395||28 Jan 2008||26 Nov 2013||Ethicon Endo-Surgery, Inc.||Gastric restriction device data handling devices and methods| |US8591532||12 Feb 2008||26 Nov 2013||Ethicon Endo-Sugery, Inc.||Automatically adjusting band system| |US8668643||20 Dec 2006||11 Mar 2014||Mr Holdings (Hk) Limited||Patient-worn medical monitoring device| |US8688189||17 May 2005||1 Apr 2014||Adnan Shennib||Programmable ECG sensor patch| |US8692717||23 Mar 2009||8 Apr 2014||Noninvasive Medical Technologies, Inc.||Antenna for thoracic radio interrogation| |US8700137||30 Aug 2013||15 Apr 2014||Alivecor, Inc.||Cardiac performance monitoring system for use with mobile communications devices| |US8771184||4 May 2007||8 Jul 2014||Body Science Llc||Wireless medical diagnosis and monitoring equipment| |US8836345 *||15 Oct 2008||16 Sep 2014||Impedimed Limited||Impedance determination| |US8870742||28 Feb 2008||28 Oct 2014||Ethicon Endo-Surgery, Inc.||GUI for an implantable restriction device and a data logger| |US8874185 *||30 Nov 2012||28 Oct 2014||Ambu A/S||Method for determining electrical biopotentials| |US8903477 *||29 Jul 2007||2 Dec 2014||Lior Berkner||Device for mobile electrocardiogram recording| |US9026202||14 Apr 2014||5 May 2015||Alivecor, Inc.||Cardiac performance monitoring system for use with mobile communications devices| |US9078578||2 Jul 2013||14 Jul 2015||General Electric Company||System and method for optimizing electrocardiography study performance| |US9149228||7 Mar 2014||6 Oct 2015||Shenzhen Mindray Bio-Medical Electronics Co. Ltd.||Patient-worn medical monitoring device| |US9149235||20 Dec 2013||6 Oct 2015||Impedimed Limited||Oedema detection| |US9173670||7 Apr 2014||3 Nov 2015||Irhythm Technologies, Inc.||Skin abrader| |US9220430||7 Jan 2014||29 Dec 2015||Alivecor, Inc.||Methods and systems for electrode placement| |US9241649||8 May 2013||26 Jan 2016||Irhythm Technologies, Inc.||Device features and design elements for long-term adhesion| |US9247911||10 Jul 2014||2 Feb 2016||Alivecor, Inc.||Devices and methods for real-time denoising of electrocardiograms| |US9254092||17 Mar 2014||9 Feb 2016||Alivecor, Inc.||Systems and methods for processing and analyzing medical data| |US9254095||8 Nov 2013||9 Feb 2016||Alivecor||Electrocardiogram signal detection| |US9351654||16 Apr 2014||31 May 2016||Alivecor, Inc.||Two electrode apparatus and methods for twelve lead ECG| |US20020109621 *||17 Apr 2002||15 Aug 2002||Motorola, Inc.||Wireless system protocol for telemetry monitoring| |US20020180605 *||16 Jul 2002||5 Dec 2002||Ozguz Volkan H.||Wearable biomonitor with flexible thinned integrated circuit| |US20020183979 *||8 May 2002||5 Dec 2002||Wildman Timothy D.||Article locating and tracking system| |US20030040305 *||22 Oct 2002||27 Feb 2003||Motorola, Inc.||Programmable wireless electrode system for medical monitoring| |US20030105403 *||30 Nov 2001||5 Jun 2003||Gmp Companies, Inc.||Wireless ECG System| |US20030176801 *||14 Mar 2003||18 Sep 2003||Inovise Medical, Inc.||Audio/ECG sensor/coupler with integrated signal processing| |US20030199777 *||16 May 2003||23 Oct 2003||Motorola, Inc.||Wireless electrocardiograph system and method| |US20040066898 *||10 Dec 2002||8 Apr 2004||Schick Technologies, Inc.||Intraoral image sensor| |US20040073127 *||16 May 2003||15 Apr 2004||Gmp Companies, Inc.||Wireless ECG system| |US20040109233 *||10 Dec 2002||10 Jun 2004||Allard Louis B.||Polarization controller| |US20040193449 *||29 Sep 2003||30 Sep 2004||Wildman Timothy D.||Universal communications, monitoring, tracking, and control system for a healthcare facility| |US20050035862 *||12 Apr 2004||17 Feb 2005||Wildman Timothy D.||Article locating and tracking apparatus and method| |US20050107681 *||23 Jul 2004||19 May 2005||Griffiths David M.||Wireless patient monitoring device for magnetic resonance imaging| |US20050177052 *||11 Mar 2005||11 Aug 2005||Gmp Wireless Medicine, Inc.||Wireless ECG system| |US20050251002 *||13 Apr 2005||10 Nov 2005||Gmp/Wireless Medicine, Inc.||Vital signs monitoring assembly having elastomeric connectors| |US20050251003 *||13 Apr 2005||10 Nov 2005||Gmp/Wireless Medicine, Inc.||Disposable chest assembly| |US20050251004 *||13 Apr 2005||10 Nov 2005||Gmp/Wireless Medicine, Inc.||Radiolucent chest assembly| |US20050277288 *||10 Jun 2005||15 Dec 2005||Volkan Ozguz||Stackable semiconductor chip layer comprising prefabricated trench interconnect vias| |US20050277841 *||10 Jun 2004||15 Dec 2005||Adnan Shennib||Disposable fetal monitor patch| |US20060030781 *||5 Aug 2004||9 Feb 2006||Adnan Shennib||Emergency heart sensor patch| |US20060030782 *||5 Aug 2004||9 Feb 2006||Adnan Shennib||Heart disease detection patch| |US20060193436 *||1 May 2006||31 Aug 2006||Schick Technologies, Inc.||Intraoral image sensor| |US20060264767 *||17 May 2005||23 Nov 2006||Cardiovu, Inc.||Programmable ECG sensor patch| |US20070080801 *||18 Oct 2004||12 Apr 2007||Weismiller Matthew W||Universal communications, monitoring, tracking, and control system for a healthcare facility| |US20070106167 *||20 Dec 2006||10 May 2007||Datascope Investment Corp.||Patient-worn medical monitoring device| |US20070109117 *||7 Jun 2006||17 May 2007||Edwards Lifesciences Corporation||Wireless communication protocol for a medical sensor system| |US20070112274 *||2 Dec 2005||17 May 2007||Edwards Lifesciences Corporation||Wireless communication system for pressure monitoring| |US20070191728 *||10 Feb 2006||16 Aug 2007||Adnan Shennib||Intrapartum monitor patch| |US20070225611 *||6 Feb 2007||27 Sep 2007||Kumar Uday N||Non-invasive cardiac monitor and methods of using continuously recorded cardiac data| |US20070249946 *||6 Feb 2007||25 Oct 2007||Kumar Uday N||Non-invasive cardiac monitor and methods of using continuously recorded cardiac data| |US20070255153 *||6 Feb 2007||1 Nov 2007||Kumar Uday N||Non-invasive cardiac monitor and methods of using continuously recorded cardiac data| |US20070255184 *||10 Feb 2006||1 Nov 2007||Adnan Shennib||Disposable labor detection patch| |US20080015406 *||29 Jan 2007||17 Jan 2008||Dlugos Daniel F||External Mechanical Pressure Sensor for Gastric Band Pressure Measurements| |US20080249806 *||28 Feb 2008||9 Oct 2008||Ethicon Endo-Surgery, Inc||Data Analysis for an Implantable Restriction Device and a Data Logger| |US20080250341 *||28 Feb 2008||9 Oct 2008||Ethicon Endo-Surgery, Inc.||Gui With Trend Analysis for an Implantable Restriction Device and a Data Logger| |US20090149874 *||10 Dec 2007||11 Jun 2009||Ethicon Endo-Surgery. Inc.||Methods for implanting a gastric restriction device| |US20090171375 *||27 Dec 2007||2 Jul 2009||Ethicon Endo-Surgery, Inc.||Controlling pressure in adjustable restriction devices| |US20090171379 *||27 Dec 2007||2 Jul 2009||Ethicon Endo-Surgery, Inc.||Fluid logic for regulating restriction devices| |US20090192534 *||30 Jul 2009||Ethicon Endo-Surgery, Inc.||Sensor trigger| |US20090202387 *||8 Feb 2008||13 Aug 2009||Ethicon Endo-Surgery, Inc.||System and method of sterilizing an implantable medical device| |US20090204131 *||12 Feb 2008||13 Aug 2009||Ethicon Endo-Surgery, Inc.||Automatically adjusting band system with mems pump| |US20090204141 *||7 Feb 2008||13 Aug 2009||Ethicon Endo-Surgery, Inc.||Powering implantable restriction systems using kinetic motion| |US20090204179 *||7 Feb 2008||13 Aug 2009||Ethicon Endo-Surgery, Inc.||Powering implantable restriction systems using temperature| |US20090216255 *||26 Feb 2008||27 Aug 2009||Ethicon Endo-Surgery, Inc.||Controlling pressure in adjustable restriction devices| |US20090222065 *||28 Feb 2008||3 Sep 2009||Ethicon Endo-Surgery, Inc.||Physiological Parameter Analysis for an Implantable Restriction Device and a Data Logger| |US20090228028 *||6 Mar 2008||10 Sep 2009||Ethicon Endo-Surgery, Inc.||Reorientation port| |US20090228063 *||6 Mar 2008||10 Sep 2009||Ethicon Endo-Surgery, Inc.||System and method of communicating with an implantable antenna| |US20090237234 *||23 Mar 2009||24 Sep 2009||Noninvasive Medical Technologies, Inc.||Relative positioning system and method| |US20090237235 *||23 Mar 2009||24 Sep 2009||Noninvasive Medical, Technologies, Inc.||Relative positioning system method| |US20090240132 *||23 Mar 2009||24 Sep 2009||Noninvasive Medical Technologies, Inc.||Antenna for thoracic radio interrogation| |US20090240133 *||23 Mar 2009||24 Sep 2009||Noninvasive Medical Technologies, Inc.||Apparatus and method for non-invasive, in-vivo, thoracic radio interrogation| |US20090240134 *||23 Mar 2009||24 Sep 2009||Andrew Pal||Method of processing thoracic reflected radio interrogation signals| |US20100069735 *||29 Jul 2007||18 Mar 2010||Lior Berkner||Device for mobile electrocardiogram recording| |US20100291735 *||18 Nov 2010||Volkan Ozguz||Stackable semiconductor chip layer comprising prefabricated trench interconnect vias| |US20100331917 *||30 Jun 2009||30 Dec 2010||Boston Scientific Neuromodulation Corporation||Moldable charger with support members for charging an implantable pulse generator| |US20100331918 *||30 Jun 2009||30 Dec 2010||Boston Scientific Neuromodulation Corporation||Moldable charger with curable material for charging an implantable pulse generator| |US20100331919 *||30 Jun 2009||30 Dec 2010||Boston Scientific Neuromodulation Corporation||Moldable charger having hinged sections for charging an implantable pulse generator| |US20100331920 *||30 Jun 2009||30 Dec 2010||Boston Scientific Neuromodulation Corporation||Moldable charger with shape-sensing means for an implantable pulse generator| |US20110025348 *||15 Oct 2008||3 Feb 2011||Impedimed Limited||Impedance determination| |US20110160604 *||30 Jun 2011||Rud Istvan||Wireless ecg system| |US20120172689 *||14 Mar 2012||5 Jul 2012||David Albert||Wireless, ultrasonic personal health monitoring system| |US20130131481 *||30 Nov 2012||23 May 2013||Finn Albert Sonnenborg||Electrode and a Method for Determining Electrical Biopotentials| |US20150002177 *||12 Sep 2014||1 Jan 2015||Impedimed Limited||Impedance determination| |USRE42934||15 Nov 2011||Medtronic, Inc.||World wide patient location and data telemetry system for implantable medical devices| |EP0602459A2||1 Dec 1993||22 Jun 1994||Siemens Medical Systems, Inc.||System for monitoring patient location and data| |EP0611124A2 *||7 Feb 1994||17 Aug 1994||Data Critical Corporation||Paging transmission system| |EP0617914A1 *||16 Mar 1994||5 Oct 1994||Siemens Medical Systems, Inc.||Apparatus and method for providing dual output signals in a telemetry transmitter| |EP1290658A2 *||17 Apr 2001||12 Mar 2003||Motorola, Inc.||Wireless system protocol for telemetry monitoring| |WO1994001039A1 *||7 Jul 1993||20 Jan 1994||Jacob Segalowitz||Wireless electrocardiographic system and wireless electrode assemblies| |WO2001073394A2 *||23 Mar 2001||4 Oct 2001||Kinderlife Instruments, Inc.||Method and apparatus for determining physiological characteristics| |WO2001073394A3 *||23 Mar 2001||14 Mar 2002||Kinderlife Instr Inc||Method and apparatus for determining physiological characteristics| |WO2001078831A2 *||17 Apr 2001||25 Oct 2001||Motorolabunc.||Wireless system protocol for telemetry monitoring| |WO2001078831A3 *||17 Apr 2001||23 May 2002||Motorolabunc||Wireless system protocol for telemetry monitoring| |WO2002022010A1||12 Sep 2001||21 Mar 2002||Nexan Limited||Disposable vital signs monitoring sensor band with removable alignment sheet| |WO2008036396A2 *||21 Sep 2007||27 Mar 2008||Noninvasive Medical Technologies, Inc.||Apparatus and method for non-invasive thoracic radio interrogation| |WO2008036396A3 *||21 Sep 2007||10 Jul 2008||Robert Friedman||Apparatus and method for non-invasive thoracic radio interrogation| |U.S. Classification||600/509, 600/523, 128/903| |International Classification||A61B5/0408, A61B5/00| |Cooperative Classification||Y10S128/903, A61B5/04028, A61B2560/0412, A61B2560/0468, A61B5/04085, A61B5/0006| |European Classification||A61B5/00B3B, A61B5/0402K, A61B5/0408D| |1 Jul 1994||FPAY||Fee payment| Year of fee payment: 4 |30 Jun 1998||FPAY||Fee payment| Year of fee payment: 8 |16 Jul 2002||REMI||Maintenance fee reminder mailed| |2 Jan 2003||LAPS||Lapse for failure to pay maintenance fees| |25 Feb 2003||FP||Expired due to failure to pay maintenance fee| Effective date: 20030101
<urn:uuid:19d37c14-6ec8-4dd7-b599-37a11b58966b>
CC-MAIN-2016-26
http://www.google.com.au/patents/US4981141
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397636.15/warc/CC-MAIN-20160624154957-00037-ip-10-164-35-72.ec2.internal.warc.gz
en
0.813415
12,767
2.828125
3
USCYBERCOM and the Fifth Domain of War Heavy military funding of transformative technology is a recent phenomenon in human history. But it’s enough to clear a forecast for how cyber wartime may play out in the future. Back in the old days, mil-tech came about through independent, craft-based work. Individuals would invent first and seek patronage later. Galileo, for example, attempted to promote the telescope as a military instrument to the Republic of Venice. The venture proved unsuccessful, but the wealthy and powerful Medici family did support his efforts to use the revolutionary new technology for astronomical studies. The development of gunpowder-based weapons also demonstrates the move from a patronage-based system to rational planning and funding in military research. Gunpowder was used in 7th century China in search for an elixir of immortality, but wouldn’t be employed in Western warfare for seven more centuries. Gunpowder had little impact on how battles were waged until 15th-century artillery and 16th-century firearms reshaped the organization of troops on the field — first from the feared tercio formations of the Spanish Empire, then from their eventual replacement by regiments. Such armed regiments not only brought more fire to bear, but were themselves less vulnerable to artillery. Repeating rifles, smokeless powder, long-range artillery and high explosives wouldn’t become the norm until World War I, when an inflexion point in military-funded technology indisputably became an indispensable feature of conventional warfare. Believe it or not, some armies actually used cavalry in the beginning of WWI. The advent of the machine gun changed all that. It forced a reversal of the traditional advantage of swift-moving offensive tactics to the necessity of trench warfare. Thanks to the high attrition and strategic stalemate of the military doctrine of the era, national militaries would later turn to scientists and engineers for even newer technologies. Poison gas, nitrates and advanced explosives. No wonder WWI is remembered as “the chemists’ war.” And it gave rise to more than chemistry-based technology. The application of scientific methods to weapons development impacted many other fields, particularly wireless communication. It set opposing sides on a race to develop more potent chemicals and device countermeasures. That’s when the Air Force became an independent service branch from the Army and established its own research and development system, becoming what is today one of the most technologically advanced organizations in the world. The Second World War, however, would far outdo the first in military funding for scientific research. Physics, electronics, radar, cryptography, meteorology, rocket science, aerospace engineering, materials science and biological sciences developed. And let’s not forget the secret nuclear research in the United States Manhattan Project that ultimately brought WWII to an abrupt end. Ever since, military leaders have viewed advancing technology as a critical element for military success… on through the cold war and the “space race” to now. The Ongoing Cyber Draft Today, we could be seeing a historic parallel between the establishment of the Air Force and the 2009 establishment of USCYBERCOM, a military command center for cyberspace operations that’s receiving heavy funding both “on the radar” and “off the radar”. But here’s another historic parallel… You may recall that the U.S. was completely unprepared for World War II, until the attack on Pearl Harbor forced U.S. military and private enterprise to scramble their resources together and cooperate en masse. The U.S. emerged from the Great Depression — during which the military was so undersupplied that troops performed drills with toy guns and wooden tanks — as a military superpower. President Roosevelt was ridiculed when he called for the production of 50,000 planes in one year. But by 1944, three years after Pearl Harbor, the country was producing 96,000 a year. As the “arsenal of democracy,” the U.S. became a chief exporter of Allied weapons and war materials — including to the very undemocratic Soviet Union. Luckily, the unique geography of the United States meant that factories weren’t under threat of enemy bombardment. Civilian employment jumped by 20%, and the gross national product — or all the goods and services produced in the country — doubled from 1939-1945. Companies and individuals made fortunes. Our “Pearl Harbor moment” is happening now, even if not everyone realizes it. It’s the unanticipated attacks on U.S. digital infrastructure. But there’s a key difference between 1942 and 2013. Now, belligerents aren’t immediately obvious. Unlike a bombing raid, attacks in the world of cyberspace are generally clandestine. The battle lines are easily be blurred, as sovereign nations, countless regimes and rogue actors have begun to take sides and act either independently or in concert with one another. This has made for an extremely complex defense problem. A Secret History of Cyber Warfare Here’s what we’re up against nowadays… In 2007, Russian hackers completely incapacitated Estonia’s national infrastructure because of tensions between the Estonian and Russian governments. For nearly three weeks, Estonia’s financial system and government resources were disrupted as more than a million “enslaved” botnet computers from 175 countries were hijacked for a coordinated attack. This cyberattack not only turned Estonia’s IT industry into the country’s digital militia, but it also made developed nations sit up and take notice. Of course, it’s easy to think of Estonia’s infrastructure as small and that America easily has enough IT resources to handle a cyberattack, but that’s not necessarily the case. The U.S. itself is no stranger to waging war in the cyberrealm. The Stuxnet worm, the most sophisticated piece of malware ever designed, is believed to have originally been created by the U.S. and Israel to deter Iran from progressing in their nuclear capabilities. Unfortunately, Stuxnet has, in some respects, backfired. The computer worm broke out of Iran’s nuclear facilities, perhaps through an infected laptop that was connected to the Internet. The software, designed to propagate virally, spread beyond its intended target and across the Internet at large, infecting private computers and networks. Since then, it has spawned imitators who have exploited its code base for new attacks. Let it not be said that there will not be collateral damage in the new domain of war! But the largest target of all may be the U.S. itself. In May of this year, U.S. intelligence sources confirmed a cyberintrusion into one of the most sensitive databases of the nation’s physical infrastructure — the U.S. Army Corps of Engineers’ National Inventory of Dams (NID). This single database details all the vulnerabilities of every major dam in the country — about 8,100 dams across our nation’s waterways. Now imagine a cyberattack on the network of a single major dam. Such an event could easily compromise the network and allow for malicious code to be planted inside — code that could later open the floodgates or lock them in place. Within minutes, the valley below could flood, with unimaginable consequences, including loss of property and life. While the intrusion at the NID was discovered in May, intelligence reports show that the database was actually penetrated in January, five months before it was discovered. Further investigation suggests that this intrusion came from unauthorized users based in China. Of course, this raises new fears. Officials are now concerned that China may be preparing to conduct a future cyberattack on the national electrical power grid. Some nations may even enlist the help of criminal organizations to carry out their cyberattacks. President Obama’s former cybersecurity coordinator, Howard Schmidt, recently said there was evidence that foreign governments were even taking kickbacks from local cybercriminals that target U.S. corporations — it’s a “quid pro pro for letting them operate.” Now a foreign state can opportunistically soften up its targets, with little use of traditional military resources, under a guise of deniability. The best thing you can do? Load up on companies with cyber security technology. Cause you’re gonna’ need it!
<urn:uuid:54542f3b-d11e-4004-9a95-a71280a7089e>
CC-MAIN-2016-26
http://dailyreckoning.com/writing-the-next-chapter-of-mil-tech-history/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783392159.3/warc/CC-MAIN-20160624154952-00004-ip-10-164-35-72.ec2.internal.warc.gz
en
0.954628
1,729
2.78125
3
Name ThemLanguage brain teasers are those that involve the English language. You need to think about and manipulate words and letters. What do these groups of words have in common? 1. Man true, hairy 2. Son nick, yard rich 3. Son will, row wood 4. Grant, us list you 5. More fill, lard mill 6. Ding hard, wren war HintThink of a hairy, true, man. AnswerIf you read the words in each group from right to left, each group sounds out the name of a US President, with commas separating the first and last names. 1. Harry Tru-man 2. Rich-ard Nix-on 3. Wood-row Wil-son 4. U-lyss-es Grant 5. Mil-lard Fill-more 6. War-ren Har-ding See another brain teaser just like this one... Or, just get a random brain teaser If you become a registered user you can vote on this brain teaser, keep track of which ones you have seen, and even make your own. Back to Top
<urn:uuid:c49aae14-ef31-41b6-8f20-2c7cf4331ed1>
CC-MAIN-2016-26
http://www.braingle.com/brainteasers/teaser.php?id=23908&comm=0
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396949.33/warc/CC-MAIN-20160624154956-00176-ip-10-164-35-72.ec2.internal.warc.gz
en
0.846105
241
2.921875
3
If you have gum disease, you may be at a higher risk for heart attacks and strokes. The bacteria that cause gum disease can spread through your bloodstream and lead to the formation of blood clots. These clots can then cause heart attacks and strokes. More than 75 percent of Americans over age 35 have some form of gum disease, and are at increased risk for heart disease. Lower your risk for heart disease by taking good care of your mouth: - Brush your teeth twice a day with fluoride toothpaste - Floss every day - Limit sugary snacks and drinks - Visit your dentist regularly for check-ups and cleaning See your dentist if you have: - Painful gums - Bleeding, swollen or tender gums - Bad breath that won't go away - Sores in your mouth
<urn:uuid:10394c3f-fe41-46e3-b2cd-69a89b37b23d>
CC-MAIN-2016-26
http://msdh.ms.gov/msdhsite/_static/41,3742,151,299.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395346.6/warc/CC-MAIN-20160624154955-00173-ip-10-164-35-72.ec2.internal.warc.gz
en
0.934022
171
3.015625
3
History of Trenton, Tennessee The City of Trenton, which is the county seat of Gibson County, was incorporated on December14, 1847. The present courthouse was completed in 1901 and was listed on the National Register in 1976. Trenton is the location of the world's largest collection of Porcelain Veilleuse-Theiere (night - light teapots). This unusual collection was assembled by Doctor Frederick C. Freed, a native of Trenton. The collection is housed in the Trenton City Hall and is open 24 hours a day, seven days a week. The teapots provide a theme around which Trenton organizes its week long Trenton Teapot Festival, which is held annually beginning the last weekend of April and lasts through the first week in May. Trenton is blessed with a tremendous school district that excels in academics, sports, and extra-curricular activities and provides our children with a safe place to learn. All schools are accredited by the Southern Association of Secondary Schools and Colleges. Economically Trenton is a blend of agriculture and industry. Trenton features three industrial sites encompassing over 133 acres for existing and prospective industry. The citizens of Trenton believe they have the best of all worlds. It is a community where families can grow, prosper, and worship together while taking pride in the community's education, recreation, and industry. Taken from: http://www.rootsweb.com/~tngibson/ Trenton - Originally known as Gibson-Port, Trenton is the oldest town in the county and was chosen county seat in 1825. Incorporated on December 17, 1847, Trenton celebrates November 2, 1825 as her birthday. The present day courthouse was built in 1899 and is considered one of the most handsome the state. The first court - known at that time as Court of Pleas and Quarter Sessions - met and was organized January 5, 1824, in the Luke Bigg's home four miles northeast of Trenton. The post office, originally established in 1824 as Gibson County Court House, was changed to Trenton in 1825. The Western Union was the first newspaper; today's weekly is The Herald Gazette. * * * * * *
<urn:uuid:715be612-b457-432e-8b4a-5b091d7fa3ad>
CC-MAIN-2016-26
http://trentontn.net/city/city-history/history-of-trenton
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396100.16/warc/CC-MAIN-20160624154956-00065-ip-10-164-35-72.ec2.internal.warc.gz
en
0.968901
459
2.625
3
Last modified: 2013-07-19 by ian macdonald Keywords: ceara | fortaleza | castle | tower | saltire (blue) | Links: FOTW homepage | search | disclaimer and copyright | write us | mirrors image by Joseph McMillan Source: Official city website Joseph McMillan, 6 February 2001 The municipality of Fortaleza (2,447,409 inhabitants in 2010, therefore the 5th biggest Brazilian town by its population; 313 sq. km) is the capital of Ceará. Fortaleza was officially founded as a "vila" on 13 April 1726, and upgraded to a "cidade" in 1823 by Emperor Peter I. The place was originally occupied by the Dutch, who settled in Ceará in 1637, were expelled by the Indians in 1644, but came back in 1649. Matias Beck ordered the building of Fort Schoonenborch, named for Walter van Schoonenborch, President of the Pernambuco Council and one of the funders of the Chartered West India Company. In 1654, the Portuguese Álvaro de Azevedo Barreto eventually expelled the Dutch and the fort was renamed Fortaleza de Nossa Senhora da Assunção. The settlement that development near the fort was named Fortaleza. The symbols of Fortaleza are prescribed by Municipal Law No. 1,316 of 11 November 1958, after the bill tabled by Municipal Councillor Agamemnon Frota Leitão. "The flag is a white rectangle crossed by blue diagonal stripes of the same blue shade as the flag of Brazil. The municipal coat of arms shall be placed at the intersection of the two diagonals." The flag shall have the same dimensions as the national flag and be hoisted "in working hours and vacation time on Palace Iracema [the seat of the Government of Ceará], the Town Hall, the municipal buildings and the Municipal Court of Accounting." The flag was designed by the abolitionist Isaac Correia do Amaral. The original project of coat of arms is credited to the local politician and writer Tristão de Alencar Araripe (1821-1908), also the designer of the equally simple, first coat of arms of Ceará. The arms are officially described as "Field azure (Portuguese [shield shape]), a mural crown or, a castle or over waves proper. Motto: 'Fortitudine' , sable (black color) on a scroll argent (white). The shield surrounded by two branches of tobacco and cotton fructed proper." In 1908, the politician, historian and chronicler João Brígido dos Santos (1829-1901) vehemently rejected the motto as misappropriate, claiming that "fortitudine" means in Latin only practical courage, and should be replaced by "fortitudo", expressing courage as the abstract virtue of spiritual courage. He was right but the motto was never updated. Ivan Sache, 15 January 2012
<urn:uuid:219a6025-a6f3-4384-8fc5-4ac74ef5eab9>
CC-MAIN-2016-26
http://www.crwflags.com/fotw/flags/br-ce-ft.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783404826.94/warc/CC-MAIN-20160624155004-00109-ip-10-164-35-72.ec2.internal.warc.gz
en
0.939684
659
2.625
3
April 9th must have been World Court day in the news. CNN confirmed an April 6th decision by President Clinton to use U.S. forces to extradite Pol Pot out of Cambodia for trial before the World Court at The Hague, located in Holland. On April 9th the World Court intervened in a death penalty case for the first time, ordering a stay of execution in a Virginia case and touching off a struggle between the State Department and the State of Virginia over the issue. As the profile of the U.N.'s highest judicial body increases, so does the specter of an international criminal court, no longer acting as a toothless referee between nations, but executing its own brand of justice against individual persons. According to CNN and The New York Times President Clinton issued a written order for the Departments of State, Justice and Defense to prepare plans for extraditing Pol Pot out of Cambodia and transferring him to an unknown location until he could be tried before the World Court. According to The Times, prosecutors at the International Tribunals at The Hague have agreed to try Pol Pot for "crimes against humanity" provided the U.N. Security Council would give them a mandate to do so. (CNN - Clinton Orders Plans for Arrest of Pol Pot, 4-9-98). These plans were not to bear fruit, however, as Pol Pot's suspiciously timed death less than a week later closed the book on that possibility. Pol Pot's reputation as the heinous and barbaric Cambodian leader eclipses the precedent that would have been set if the U.S. had proceeded to abduct him from Cambodia, his nation of birth and citizenship, and turn him over to the International Tribunal. Such action would have contradicted everything America's common-law based legal system is supposed to stand for. However, such an action would have enhanced the World Court's image and propped up its moral and legal authority, objectives that may have been well served when Clinton's order was made public. Americans are happy to see monsters like Pol Pot hauled off to a kangaroo court at The Hague without realizing that precedent is being set that will affect people of all nationalities, even Americans. Precedents are the building blocks of world government. Now enters the second April 9th propaganda coup. The World Court issued a first ever stay of execution in a Virginia state criminal case. Angel Francisco Breard, a Paraguayan national, was scheduled to die for killing an Arlington woman in 1992. Paraguay appealed to the court to stop the execution based on the 1963 Vienna Convention which requires consular assistance be provided to foreign nationals charged with a crime. The Paraguayan consulate was not informed when Breard was arrested, however, Breard was provided with two American lawyers who handled his case at taxpayer expense. In court Breard confessed to killing the woman and was sentenced to death for the murder. "The court orders the United States to take all measures at its disposal to ensure that Angel Francisco Breard is not executed pending the final decision of the court," the World Court said in a unanimous decision. (World Court Tries to Stay Va. Execution, Associated Press, 4-9-98). Virginia's governor said he would only abide by U.S. court decisions, but Secretary of State Madeline K. Albright pressured him to comply with the World Court's order on the grounds that other countries might not allow Americans access to consular officials. Normally, the U.S. ignores the World Court, as it did when the court condemned President George Bush for unlawful use of force when he invaded Panama. The U.S. also ignored an international war crimes tribunal that indicted Bush for war crimes committed during the Gulf War. But this case, the unprecedented involvement of the World Court in a state criminal case, produced an altogether different response. Professing concern for the rights of Americans overseas, Secretary Albright urged Virginia to honor the World Court's ruling. Through her spokesman she stated her concern "that nothing that happens in this complicated legal situation undermines the important value that American citizens get...(by being) able to meet with consular officers overseas.... We have to bear in mind, in many parts of the world, the justice systems are rather fragmentary and unfair in many occasions." ( CNN - Albright Intervenes over Paraguayan's Execution, 4-13-98). More laughable than Albright's inference that American justice is not unfair is the pretense that reciprocity is the motive behind her stand on the World Court's decision. Secretary Albright is a gunboat diplomat and a consummate internationalist insider. She is a member of the Council on Foreign Relations (CFR), as is Bill Clinton and most of his administration. The CFR is dedicated to the establishment of world government, and the legitimacy of the World Court is important in furthering that end. This is why Secretary Albright used this opportunity to urge Virginia to obey the World Court's order. It was her opportunity to establish the precedent of a state legal proceeding subject to the U.N.'s highest tribunal which would, in turn, create the appearance of a more credible World Court. Secretary Albright has no authority over the State of Virginia and the U.S. Supreme Court refused to enforce the World Court's order. Virginia executed Breard as planned. Even though Clinton's plan to arrest Pol Pot and Albright's effort to enforce a World Court edict appears to have failed, there is increasing evidence that the U.S. administration is deferring more and more to supranational authority. The purpose is both to increase the power of world governing institutions while decreasing the strength and influence of national governments, generally, and the United States in particular. The U.S. military and foreign policy establishments exist more and more for the sole purpose of carrying out the internationalist agenda, even while domestic politics serve only to divide and demoralize a confused American public. In every domestic scandal and foreign "peacekeeping" mission Americans may read the end of their traditional freedoms and their introduction into a global socialistic corporate dictatorship where their enslavement will be completed. It is toward this end that President Clinton, Secretary Albright and the rest of his administration are working. They work not for the American public, but against them in selling out the United States to the international elite. Last December former British Prime Minister Margaret Thatcher made the following remark in Washington: "Today's international policy makers'... short-term goal is to subordinate American and other national sovereignties to multilateral authorities [World Court, WTO, etc]; their long-term goal, one suspects, is to establish the UN as a kind of embryo world government." (Letter from Dennis L. Cuddy to The New American, 4-27-98). These "policymakers" work within the United States government, are paid by American taxpayers and consistently formulate policies that are inimical to American interests. On the economic level the U.S. Congress subordinated its authority to the World Trade Organization when it voted in favor of GATT. During a committee hearing on the treaty Rep. Newt Gingrich stated, "I am just saying that we need to be honest about the fact that we are transferring from the United States at a practical level significant authority to a new organization. This is a transformational moment. I would feel better if the people who favor this would just be honest about the scale of change.... This is not just another trade agreement. This is adopting something which twice, once in the 1940's and once in the 1950's, the U.S. Congress rejected....I think we have to be very careful, because it is a very big transfer of power. Now, yes, we could in theory take the power back....But the fact is we are not likely to disrupt the entire world trading system (by pulling out). And, therefore, we ought to be very careful, because we are not likely to take it back." ( The Road to Socialism and the New World Order by Dennis L. Cuddy, Ph.D). President Clinton has also set one precedent after another in subordinating the U.S. military to the United Nations Security Council while disregarding Congress. President Bush began in the Gulf War what President Clinton is completing in subsequent U.N. adventures in Haiti, Bosnia and Iraq. At a February 6th news conference during the most recent Iraqi "crisis" Clinton was asked if removing Saddam from power would be a military option. Clinton replied, "That is not what the United Nations has authorized us to do." At an earlier speech at the National Defense University President Clinton praised American servicemen who were "helping to write the international rules of the road for the 21st century," that is, demonstrating that since America's armed forces were now controlled by the U.N., so must all armed forces. He then praised U.N. subordinated American servicemen who were "protecting those who've joined the family of nations and isolating those who do not", the "family of nations" being those countries that are firmly controlled by the international elite. ( Saddam Versus "World Law", The New American, 3-16-97). On March 3rd Senator John McCain was asked on MSNBC, "How do you, John McCain, as a member of the Senate, go along with ceding U.S. authority to the U.N. regarding Iraq?" McCain replied, "I worry about it a lot. It reminds me of the black helicopter crowd that claimed we have lost our national sovereignty.... I wouldn't have allowed this kind of scenario to transpire." (Letter from Dennis L. Cuddy, cited above). Richard Gardner, CFR member and President Carter's ambassador to Italy wrote an infamous article entitled, "The Hard Road to World Order," printed in the CFR's Foreign Affairs (April 1974), where he said, "The 'house of world order' will have to be built from the bottom up rather than from the top down..., but an end run around national sovereignty, eroding it piece by piece, will accomplish much more than the old-fashioned frontal assault." (The Road to Socialism, cited above). This "end run" consists of a gradual transition to a world government through a series of precedent-setting events. This transition is nearly completed in the military sphere as the U.S. armed forces are swallowed up into NATO and placed under U.N. operational control. This transition is completed in the economic sphere as the U.S. economy is swallowed up by NAFTA and the World Trade Organization. And now our common-law based legal system is edged even closer, through a series of precedent-setting events, to being subordinated to the World Court at The Hague. The complete integration of these three spheres into the internationalist system spells world government for the United States, regardless of whether or not the Washington circus continues. It is a position from which Americans are theoretically able, but most certainly unwilling to extricate themselves. The consequences of losing our national sovereignty may only be seen in the character of the emerging supranational institutions. The current Bosnian and Rwandan Tribunals have been given a temporary mandate by the U.N. to handle specific "war crimes" and "crimes against humanity." There is, however, a permanent International Criminal Court (ICC) in the making that will also operate without the encumbrance of a Bill of Rights and a common law tradition. Since no international criminal code exists, the current Tribunals make up law as they go along. Having no court precedents to guide it, each case is an opportunity to create new precedents that will in turn create law. Defendants brought before the court are charged with "crimes against humanity" or similar vagaries, the definition of which rests with the court. The creation of international criminal law and the "fixing of penalties" are the primary function of the current Tribunals, not the vindication of individual justice. It is a practice that will be institutionalized with the creation of the new ICC. ( Template for World "Justice", The New American, 10-13-97). Judge Gabrielle McDonald of the Hague Tribunal, speaking at the August 11th session of the ICC's Preparatory Committee, urged that the ICC's authorizing statute "should be one of principle and not of detail.... [It should] be a flexible statute based on principles which may be developed by the Court as circumstances require while still providing sufficient guidance to establish an international framework within which the Court can work." She also urged that the ICC must be able to employ "an element of compulsion" in order "to redress gross violations of human rights and international law...." ( ibid.). Most of the eleven judges on the current Tribunals are from countries outside of the common law tradition. Some of them come from Islamic or communist countries where judges work in consort with prosecutors. The basic rights that common law countries take for granted -- the right to a trial by a jury of one's peers, the right to confront one's accusers, to examine the evidence, to remain silent, and the presumption of innocence -- these and other common law rights do not exist in U.N. Tribunals. In fact, Dr. Srdja Trifkovic, a former commentator for Radio Free Europe, described the Hague Tribunals as "the New World Order's posthumous tribute to Felix Dzherzhinsky," founder of the Soviet KGB. (ibid.). The establishment of an international criminal code will expand the World Court's function from an non-binding arbitrator of international disputes to a criminal court empowered with the "element of compulsion." This phrase is lawyers' jargon for "jurisdiction over individuals", with binding authority to order their national governments to surrender them to The Hague for trial. The legal precedent for the extradition and trial of individuals by the World Court is now being established in Bosnia and Rwanda. Precedent-building continues as Secretary Albright seeks to establish World Court jurisdiction in the United States and President Clinton seeks to use America's military as a global sheriff executing arrest warrants issued by the World Court. By the time we see Americans being hauled off to the kangaroo court in The Hague on obscure charges, the "house of world order" will have been completed. Disclaimer: APFN is not responsible for the accuracy of material on 'The Winds' and does not necessarily endorse the views expressed within their web pages. This page is in the public domain.
<urn:uuid:dd88c99a-77d4-4076-af46-5c9b4fc0541f>
CC-MAIN-2016-26
http://www.apfn.org/THEWINDS/archive/government/world_court04-98.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402746.23/warc/CC-MAIN-20160624155002-00137-ip-10-164-35-72.ec2.internal.warc.gz
en
0.9587
2,968
2.515625
3
In Noah's Children, Sara Stein introduces us to whittling with wood and her project to learn how to carve pairs of animals and people who will inhabit her biblical Noah's ark. She uses this handiwork metaphorically to take us outdoors to recall past childhood adventures and experiences with animals. In this imaginative way, she tells us how childhood freedom to connect with plants and animals in the wild can buttress later competencies in childhood and adolescence including creativity, joyfulness, altruism ("the hallmark of motherhood") and relationships measured against consistent moral standards. Stein focuses on how these subtle, sensory perceptions of the outdoors emerge from 200,000 years of biological ancestry (e.g., Australopithecus afarensis; the symbolic mind; language) and related physical predispositions (e.g., a child's early preference for the color red; the desire to cuddle with soft, round, furry, wide-eyed The author looks through the eyes of children (both boys and girls), her reflections of childhood, and informed observations from primate and fossil records to help us understand how children play, explore, expand, build, and rule their world like the Monstera genus vine near Tortuguero. She emphasizes how children get parents to respond to them, and how they reach out to parents to help them understand needs for growth, place, connections, and stability within bounded life spaces. The author critiques some models of human development, but goes on to carve out an argument against some current child-rearing practices, formal schooling, and specific technological changes that have had unwanted environmental, developmental, and ultimately cultural consequences. Through out Noah's Children she explains why we need to fill out our understanding of the outdoors, wild animals, their connections with and ecological impact on children, especially for their physical, social, psychological identities and formative moral development. The author believes apparent disruptions within the ecosystems have disturbed and alienated children which can lead by adolescence to overt frustration, anger, and distrust of adults as role models, mentors, and pathfinders. Here she places the responsibility squarely on parents and concerned adults to nurture, articulate and lay out clear ecological, ethical, and authentic role pathways for children -- paths which offer realistic incentives and transcendent rewards for becoming more mature, responsible adults. This fascinating book brings enjoyment to read, nostalgia to experience, a tear here, a chuckle and sobering fact there. When all is said and done, the author presents a broader look at nature in the wild as necessary to understanding ultimately moral questions to consider for life in the 21st century. What human rights AND animals rights should become ethics to live by daily? What can we achieve and how can we attain the level of consensus needed to follow these ideals, if we rarely meet face-to-face to discuss our beliefs, parenting, and management practices for the maintenance of all species' lives? How can we reinforce children's momentous experiences for learning outside the classroom yet retain the openness, freedom, joy, energy, and desire to participate in the ecology now and in the near future? This book is recommended to any one wishing to learn, parent, teach, care for and consider these questions. What are the consequences, pro and con, for how we answer them?
<urn:uuid:c5e10026-7a9d-471b-8c9d-99e31afc0a65>
CC-MAIN-2016-26
http://www.curledup.com/noah.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399425.79/warc/CC-MAIN-20160624154959-00087-ip-10-164-35-72.ec2.internal.warc.gz
en
0.925779
712
3.203125
3
Foster creativity and prepare students for the real world with Lenovo PCs and premier software applications Armed with the right technology tools, every student can become an artist, engineer, musician, scientist or writer. That’s the promise of 1:1 learning, and you can deliver on it with rugged and reliable Lenovo PCs, and premier applications such as Adobe Digital School Collection, Microsoft Office, SAS Curriculum Pathways and the Britannica Online School Edition. These tools will let your students explore, create and showcase what they are learning through professional-looking videos, data-rich graphics and more. Adobe Digital School Collection With the Digital School Collection you can incorporate 21st century skills into the classroom using Adobe’s complete set of easy-to-master applications. The solution offers document management and portfolio creation tools for enhancing learning experiences in language arts, history, music and the sciences. SAS Curriculum Pathways An online resource for your students and teachers, SAS Curriculum Pathways provides standards-based content in core disciplines for high schools, community colleges, virtual schools and other environments. The package provides you with interactive materials that target higher-order thinking skills and is differentiated for varied learning styles; topics mapped to state standards for high schools; and research-validated best practices for instruction. About 80 percent of businesses operate Microsoft Office, making the software suite essential for students preparing for college and beyond. But Microsoft’s applications help drive success in the classroom, too. With Microsoft Office 2010’s Word, Excel and PowerPoint applications, your students can craft professional-looking documents, charts and presentations that demonstrate their understanding of content and concepts. What’s more, Microsoft’s OneNote software allows students and teachers to store and share information and documents in a single, easy-to-access location — enabling collaboration and keeping everyone in sync and up to date. Britannica Online School Edition Designed for all levels of learning, the Britannica Online School Edition offers your students a gateway to the vast resources of Encyclopædia Britannica. It gives teachers and students instant access to complete encyclopedias and supplemental materials that ensure consistency with classroom topics and age-appropriate language. Students can perform integrated searching of 98,000 articles and multimedia features. Teachers can use high-quality online learning materials, developed by curriculum experts, to prepare effective 1:1 learning projects and activities.
<urn:uuid:c240b822-8972-43cb-8654-0e641a24d9bb>
CC-MAIN-2016-26
http://www.lenovo.com/education/nz/en/k12/learning/applications.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397744.64/warc/CC-MAIN-20160624154957-00079-ip-10-164-35-72.ec2.internal.warc.gz
en
0.884502
496
2.75
3