text
stringlengths 199
648k
| id
stringlengths 47
47
| dump
stringclasses 1
value | url
stringlengths 14
419
| file_path
stringlengths 139
140
| language
stringclasses 1
value | language_score
float64 0.65
1
| token_count
int64 50
235k
| score
float64 2.52
5.34
| int_score
int64 3
5
|
---|---|---|---|---|---|---|---|---|---|
Reports say that aid agencies have begun what the United Nations said would become the biggest relief effort the world has ever seen, following Sunday's earthquake and tsunamis that struck coastal south Asia.
The UN called on countries to rush aid to victims of the tsunamis that hit ten countries causing over 24,000 deaths.
UN Under Secretary Jan Egeland said the natural disaster could be the costliest in history and "many billions of dollars" might have to be spent.
"Hundreds of thousands have lost everything, and millions face a hazardous future because of polluted drinking water, lack of sanitation and no health services," he said.
The International Red Cross, which reported 23,700 deaths in Asia, said it was concerned that diseases like malaria and cholera could add to the toll.
More than one million have been displaced, the Red Cross said.
UN agencies have also begun relief operations in countries hit by the killer quake.
Though India has not sought international help and plans to meet the emergency needs through is own capacities, United Nations Development Fund and United Nations Children Fund have begun providing assistance to several other countries and plan to step up aid over next few days. Sri Lanka and Indonesia are likely to have greatest need for humanitarian assistance, said UN reports.
UNICEF said hundreds of children were separated from parents in the chaos following sudden flooding and it is trying to establish the extent of the problem and measures needed.
In India, UNICEF said it is supporting relief efforts led by the state and local authorities as well as the central government.
In Tamil Nadu, UNICEF is providing hundreds of thousands of water purification tablets, 1600 community water tanks (500 litres each), 200,000 sachets of oral rehydration salts, medical supplies sufficient to serve 30 health centers, and 30,000 blankets.
Meanwhile, a top UN official said small states were "most vulnerable" to disasters like the tsunami tragedy. He urged the international community to pay special attention to their needs and help them rebuild their economies.
The Under Secretary General of the UN International Meeting on Small Island Developing States, Anwarul K Chowdhury, also called for giving special consideration to issues of climate change, saying the tragedy comes on the heels of several "climatic disasters".
|
<urn:uuid:22928131-bc06-47bb-af98-b922e4ae21d7>
|
CC-MAIN-2016-26
|
http://in.rediff.com/news/2004/dec/28aid.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398209.20/warc/CC-MAIN-20160624154958-00047-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.96043 | 466 | 2.625 | 3 |
It was heartening to attend the recent Partnership for Market Readiness (PMR) forum at the World Bank, where countries renewed their commitments to testing and piloting market-based instruments for greenhouse gas emission reduction. The PMR is country-led and builds on countries’ own mitigation priorities. Focus is placed on improving a country's technical and institutional capacity for using market instruments to scale up climate change mitigation efforts.
The idea of using market-based instruments for pollution control dates back to 1920 when noted economist Arthur C. Pigou argued in his seminal work, “The Economics of Welfare,” that a tax should be applied to a market activity that generates negative externalities to correct the market outcome.
Over the years, pricing carbon or carbon taxes and carbon trading schemes have been accepted as potentially cost-effective means of reducing greenhouse gas emissions. From an economic perspective, carbon taxes are a type of Pigovian tax in that they help to address the problem that emitters of greenhouse gases not facing the full (social) costs of their actions.
While a number of countries have implemented carbon taxes or energy taxes and trading schemes that are related to carbon content, there has been a general lack of political appetite for embracing them wholeheartedly. The main opposition comes from the belief that in a country that imposes a carbon tax or similar energy input tax or trading regime, energy-intensive industries will suffer from a significant increase in production costs compared with their trading partners. It is feared that these industries will become less competitive internationally and lose their market share or, in order to avoid the loss, will migrate to countries with no such taxes.
In a paper titled, “The Effects of Domestic Climate Change Measures on International Competitiveness ,” Hiau Looi Kee and I have tried to disprove this fallacy. We looked at all countries that had some form of carbon or energy tax and found that their overall economic competitiveness, and even the competitiveness of energy intensive sectors, was not compromised because of the tax. This is because most countries that have some form of a carbon tax today actively protect their most competitive sectors from the impact of the tax, either by exempting them or giving them generous allowances. Our study also does not give credence to the hypothesis that industries have been migrating en masse because of stringent carbon policies.
While it may be fair to say that a consensus is emerging in favor of carbon pricing or taxation, for carbon taxes to be effective as emission reduction tools, they should be:
- Imposed purely with the objective of targeted emission reduction, rather than with a view to protect the competitive industries or sectors;
- Uniformly applied across all industries;
- Designed to mitigate any adverse impacts on the poor; and
- Complemented with adequate border provisions to avoid any “carbon” leakage.
|
<urn:uuid:a1ee8f60-9465-40a9-8c80-c84d3c7f98d8>
|
CC-MAIN-2016-26
|
http://blogs.worldbank.org/endpovertyinsouthasia/print/carbon-taxes-effective?page=4
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397795.31/warc/CC-MAIN-20160624154957-00112-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.955412 | 574 | 3.015625 | 3 |
June 8th, 2011 dogboy
On this date in 1675, Puritan colonists’ hanging of three Wampanoag Indians helped trigger a brutal bout of ethnic cleansing, King Philip’s War.
The condemned men’s victim, Wassausmon — known by his Christian, Anglicized name of John Sassamon — was a converted Massachuseuk, briefly a Harvard attendee (1653)*, and eventually a translator for several tribes when dealing with the early settlers. Sassamon fought on the colonists’ side during the Pequot War, which has graced these pages before, and was generally seen as very sympathetic to the colonial cause, at one point becoming a schoolmaster at the inception of the towns of Natick and Ponkapoag.
After his work as a translator, Sassamon returned to the Puritan fold to become a minister in the Plymouth Colony.
Because of his high position in both the white and native worlds, though, he drew some resentment from both sides. It was Sassamon’s sense of loyalty to both sides of the growing tension between the natives and colonists that led to his demise.
King Philip (natively known as Metacomet) became head (Sachem) of the Wampanoag Confederacy in 1662 after his brother’s death.
Though initially trade-friendly with the burgeoning colonies to the north and east, the Wampanoag were also feeling the squeeze from the Iroqouis Confederation gaining power to the west. In 1671, the colonies presented the Wampanoag with an ultimatum: give up their arms and submit to English law, or be forced out.
The colonists had tried this tactic before with the Pequot (hence the Pequot War), Narragansett, and other native tribes with great success. As expected, Philip blinked, and the English moved in.
But the Sachem was predictably unhappy with the relationship. Three years later, he had assembled a band of warriors and was ready to, er, renegotiate.
Sassamon got wind of Philip’s planned attack on Plymouth Colony and warned its governor Josiah Winslow. Two months later, Sassamon was fished out from under the ice of Assawompset Pond.
With one witness claiming that a trio of King Philip’s men had knocked off the translator and dumped the corpse, the Puritans became convinced that Philip was already getting involved in their affairs.
In June 1675, four months after Sassamon’s body was found, a mixed jury of Indians and colonists convicted three Pokanoket Indians of murdering Sassamon, and on June 8, they were hanged.**
The executions helped bring tensions to the breaking point, and Philip decided it was his time.
On June 18, he launched an attack on homesteads in Swansea, and the war was on. The colonists struck back, laying siege to Mount Hope with the thought of gutting the insurgency by capturing its leader. That move failed, and King Philip escaped to recruit more tribes to his cause. Eventually, the forces included five major native tribes fighting colonists and two other major tribes.
Things got ugly fast: the conflict would become one of North America’s bloodiest colonial wars, and touch everyone who lived in the region. In September, the New England Confederation officially declared war on the Native Americans of the area.
After suffering months of casualties, the colonists finally gained a foothold in the conflict in December. By spring, King Philip’s War was in full swing, with atrocities happening on both sides. But the native forces were being worn down, and the colonists began clawing back. Despite rampant destruction of towns across the colonies (including complete abandonment of a dozen or more), the colonists had fortresses to retreat to and boats to resupply them; the natives needed to trade with the colonists to get their arms. The situation was unsustainable, and when Canadian supply lines fell through, King Philip’s adventure was over.
Persistent enemies of many of the raiding tribes, the Plymouth-allied Mohegans took the offensive and broke up Philip’s warrior bands, scattering them across the Northeast. By the following summer, the Narragansett were defeated and dispersed, and the colonists were granting amnesty to natives who surrendered and could document non-participation. (Others were not so lucky.) In July, King Philip himself was isolated and on the run, taking refuge in Mount Hope. It was there that John Alderman, a Native American, shot him on August 12, 1676.
Philip’s body was mutilated: he was quartered and beheaded, and his head was displayed in Plymouth Colony Fort for years to come.
* Harvard, founded in 1636, started its “Indian Harvard” in 1655 which saw a total of five students: Caleb Cheeshahteamuck (Aquinnah Wampanoag) took a degree in 1665 and died of tuberculosis a year later; classmate Joel Iacoombs (Aquinnah Wampanoag) disappeared in a shipwreck off Nantucket before walking; John Wampus (Aquinnah Wampanoag) bailed after a year and went to sea; and Benjamin Larnell and an otherwise unnamed “Eleazer” caught smallpox and died the year they enrolled.
** One account reports that only two of the Indians died on the first drop; the third was spared by his rope breaking, and after confessing the guilt of all three, he was re-executed.
On this day..
- 1743: John Breads, Rye killer - 2016
- 1953: Istvan Sandor, underground Catholic - 2015
- 1989: Stefan Svitek, the last in Czechoslovakia - 2014
- 1866: Anton Probst, "I only wanted the money" - 2013
- 1693: Elizabeth Emerson - 2012
- 1896: Bill Gay, prospector - 2010
- 1405: Richard le Scrope and Thomas de Mowbray, without color of law - 2009
- 1934: Three inept murderers (with a fourth to come) - 2008
Entry Filed under: 17th Century,Assassins,Botched Executions,Capital Punishment,Common Criminals,Crime,Cycle of Violence,Death Penalty,Disfavored Minorities,England,Execution,Guest Writers,Hanged,History,Massachusetts,Murder,Notable for their Victims,Occupation and Colonialism,Other Voices,Public Executions,Racial and Ethnic Minorities,USA
|
<urn:uuid:90b8742d-2bee-4557-8fcc-6adeb41ade9a>
|
CC-MAIN-2016-26
|
http://www.executedtoday.com/2011/06/08/1675-john-sassamon-king-philips-war/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395546.12/warc/CC-MAIN-20160624154955-00056-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.970834 | 1,374 | 3.515625 | 4 |
With temperatures threatening to reach triple digits again in Idaho’s warmest climates, concern mounts over heat-related illnesses and death.
News reports today (Aug. 4) indicate that heat likely played a role in at least 27 deaths in 11 states and the District of Columbia as soaring temperatures set records in the Midwest and East. In Illinois, at least six heat-related deaths were confirmed this week in Cook County (Chicago area), and police believe another six deaths on Wednesday could be heat-related.
A newsletter distributed by the Ada City-County Emergency Management and passed along by Cheryl Rost, ITD Safety & Risk Manager, provides potentially life-saving information about the effects of high temperatures.
“Heat kills by pushing the human body beyond its limits,” according to the Emergency Preparedness Pointers. “During an average summer, approximately 200 people across our country die because of heat-related injuries as a result of high summer temperatures.
“Under normal conditions, the body‘s internal thermostat produces perspiration that evaporates and cools the body, however, in extreme heat, evaporation is slowed and the body must work extra hard to maintain a normal body temperature. Most heat disorders occur because the victim has been overexposed to heat or has overexerted themselves for their age and physical condition.”
The newsletter includes suggestions on activity levels during a heat wave, symptoms of heat emergencies, treatment of heat emergencies and terms related to heat and exertion. For more information, consult the Ada City-County Emergency Management newsletter.
|
<urn:uuid:b204e86f-0122-4281-a475-3a3677503f3b>
|
CC-MAIN-2016-26
|
http://www.itd.idaho.gov/transporter/2006/080406_Trans/080406_Heat.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402479.21/warc/CC-MAIN-20160624155002-00115-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.928769 | 325 | 2.640625 | 3 |
Exhibit ran from January 15-February 20, 2004
Pieces of straw and a razor blade take the
place of paint and brush in the hands of Marian Paskowicz, of Norristown,
Pennsylvania. "Many persons in Poland do straw painting," says the artist,
who came to this country in 1960, "but in the U.S. it is rare only because
artistic persons never have been exposed to it and never have thought of
straw as a real or true art medium." Marian Paskowicz began doing straw art
at the age of sixteen.
The first step is to sketch or trace the subject carefully on paper or art board. The second step is to select the pieces of straw according to the tone and shadings requested by the subject, and to cut the straw accordingly with a sharp razor. Marian uses oat, rye, wheat, millet and barley straw to provide the various shades and textures he needs. Friends and relatives in Poland keep him supplied with the raw material.
The artist carefully inlays and glues each strand on the detailed sketch. He repeats the procedure until the drawing is completely covered with varying shades of straw. He then cuts away the surplus paper and fastens the work to a colored board - black, blue, burgundy. The finished product is sprayed with a protective coating.
The detail in the completed painting is nearly as fine as a painter could do it with a brush. Shading, texture and lighting of the straw give the work a golden glow.
Marian Paskowicz has "painted" a variety of subjects: state capitols throughout the U.S., portraits of U.S. presidents, the most famous vases of ancient cultures, the cathedral of Notre Dame in Paris, Saint Peter's in Rome. Among his masterpieces are counted The Last Supper and (imagine) the whole of the Sistine chapel. This exhibit shows a selection of over four hundred straw Madonnas.
Marian Paskowicz's art form is unique, and the artist is not eager to sell. Each of the hundreds of straw paintings is copyrighted. Marian's ambition is not critical acclaim, fame or wealth. He has an artist's dream, which is also the dream of a man with a generous heart. His dream is someday to have his own museum,where he can display his work for the joy of the audience, and use the proceeds to help the homeless.
This page, maintained by The Marian Library/International Marian Research Institute, Dayton, Ohio 45469-1390, and created by Kris Sommers , was last modified Wednesday, 06/08/2011 15:20:35 EDT by Omar Memon . Please send any comments to [email protected].
URL for this page is http://campus.udayton.edu
|
<urn:uuid:960f4c38-29f2-43e1-86fe-9e6516c0db11>
|
CC-MAIN-2016-26
|
http://campus.udayton.edu/mary/gallery/goldenmadonnas.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783392099.27/warc/CC-MAIN-20160624154952-00157-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.952761 | 587 | 2.78125 | 3 |
Last we knew: The Colorado General Assembly passed the Clean Air-Clean Jobs Act, which required Xcel to cut emissions of nitrogen oxides at its Front Range coal-burning plants by 70 percent to 80 percent from 2008 levels by 2017.
Latest: Xcel filed a plan Friday to comply with the law. In the plan, Xcel announced it will close the coal-burning unit at Valmont by 2017, leaving its natural gas-burning generator in operation.
Next: The Colorado Public Utilities Commission will review the plan and the reactions of "intervenors" in the docket, such as the city of Boulder and Western Resource Advocates. A hearing on the plan will be held at the PUC in late October and early November. A final decision on the plan is expected in mid-December.
What the plan would do
Valmont Station in Boulder: The plant's 186-megawatt coal-burning unit will be shut down by 2017. Xcel's 43-megawatt natural gas generator will remain in operation.
Cherokee Station in Denver: There are now four coal-burning units at the Cherokee plant, which have a combined capacity of 717 megawatts. Two of the units will be shut down in 2011, one in 2017 and one in 2022. As the coal units go offline, they will be replaced with natural gas-burning generators that will have a combined capacity of 883 megawatts by 2022.
Arapahoe Station in Denver: There are now two coal-burning units at Arapahoe. The smaller unit, which has a capacity of 45 megawatts, will be shut down in 2013. The second unit, which has a capacity of 111 megawatts, will be converted to a natural gas generator, also in 2013.
Pawnee Station in Brush, and Hayden Station in Hayden: The 505-megawatt coal-burning generator at Pawnee will remain in operation, but Xcel will add emission controls to cut down on nitrogen oxides and sulfur dioxide pollution. The two coal-burning units at Hayden, which have a combined capacity of 446 megawatts, will also get new emissions-control technology.
The Valmont power plant east of Boulder -- which first began operation in 1924 -- will burn its last trainload of coal by the end of 2017, if a new plan by Xcel Energy is approved by state regulators.
Xcel revealed a comprehensive plan to address emissions of nitrogen oxides from five of its Colorado coal-burning plants Friday afternoon. The plan -- which will cost the company $1.3 billion over 12 years -- lays out how Xcel will comply with the Clean Air-Clean Jobs Act, which was signed into law by Gov. Ritter in April.
The new law, which Xcel supported, is designed to help the Front Range meet stricter federal air quality standards that are expected to be put into place in the near future. The law calls for Xcel to reduce emissions of nitrogen oxides -- which react in the atmosphere to form haze and ozone -- from Front Range coal-burning plants by 70 percent to 80 percent from 2008 levels by 2017.
"Over the next several years, the U.S. Environmental Protection Agency will require the state of Colorado to comply with a series of regulatory mandates unprecedented in the history of the Clean Air Act," Dick Kelley, Xcel Energy's chief executive officer, said in a statement. "We believe our proposal is the best way to meet new environmental requirements in a manner that preserves reliability and minimizes customer costs."
To comply with the law, Xcel evaluated over the summer whether to retire the coal-burning plants, fit them with new pollution-control technologies or re-power them with natural gas. In its final plan -- which the Colorado Public Utilities Commission must ultimately approve -- the company relies on all three strategies.
At Valmont, Xcel will shut down its one remaining coal-fired generator, which has been in operation since 1964 and which has a capacity of 186 megawatts. Xcel will not re-power the coal-burning unit with natural gas, but Xcel's existing 43-megawatt natural gas-burning generator at Valmont -- which was built in 1973 -- will remain in operation. Valmont also houses two 40-megawatt natural gas-burning generators that are owned by Southwest Generation.
Valmont Station employs 57 full-time staff members, but Xcel does not anticipate having to cut any jobs. Some employees will stay on to run the natural gas turbine, said Xcel spokesman Mark Stutz, and others can be moved to different facilities by the time coal burning ends at Valmont in 2017.
In Denver, Xcel plans to stop burning coal at its 717-megawatt Cherokee plant by 2022. The company will replace the coal-burning units with 883 megawatts of natural gas generation. Xcel also plans to close one of its two coal-burning units at its Arapahoe plant in Denver by 2013 and convert the other unit to natural gas.
Finally, Xcel's plan calls for retrofitting its Pawnee and Hayden power plants with "modern" emissions-control technology.
In Boulder, environmentalists, carbon-cutting advocates and the city's climate action plan staff cheered Xcel's general plans for Valmont, but most pointed out that they had not yet waded through the details outlined in the document, which is more than 150 pages long.
"Based on a preliminary review, it appears this filing is both what we had expected and hoped for," said David Driskell, executive director of community planning and sustainability for the city of Boulder.
Amy Guinan, who has helped organize several protests against the Valmont plant, said Friday evening that she was "very excited" about the news.
"I think that it's proof that when a community comes together around an issue and makes their voices heard, they can get something done," she said. "I'm very proud of Boulder for standing up for clean energy and demanding change."
But Guinan also said the work of Boulder residents who called for Valmont to be closed isn't done. She said it's important to make sure that the lost capacity is replaced by renewable sources in the future.
"We need to make sure that this is a transition to clean energy, as opposed to Boulder just saddling some other community with the responsibility of producing our black electrons -- of producing our power from a coal source somewhere else," she said.
Roger Singer, the Sierra Club's regional representative in Boulder, also had reservations about the plan.
"I would say that, overall, I'm happy with the direction that this plan is moving in, but I think there's some room for improvement," he said. "I still think that Xcel could push the timetable of this plan forward. Climate scientists tell us we need to act now to reduce the worst impacts of global warming. It would behoove all Coloradans to see this plan implemented even sooner."
Contact Camera Staff Writer Laura Snider at 303-473-1327 or [email protected].
|
<urn:uuid:fea640f7-ca71-4dc0-a52e-6c79867e3126>
|
CC-MAIN-2016-26
|
http://www.coloradodaily.com/ci_15770346?source=most_viewed
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396147.66/warc/CC-MAIN-20160624154956-00009-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.961179 | 1,459 | 2.546875 | 3 |
at the Carnegie Institution's Department of Global Ecology are
looking to optimize climate change reduction by injecting
sulfates into the stratosphere. George
Ban-Weiss, lead author of the study, along with his team of Carnegie
scientists, have studied how the injection of aerosols of sulfate
into the stratosphere will affect Earth's chemistry and climate, and
which aerosol distribution pattern will bring them closest to their
do this, Ban-Weiss and his team used a global climate
model with different sulfate aerosol concentrations
depending on latitude to run five simulations. They then determined
what distribution of sulfates would bring them closest to climate
goals by using the results from the simulations in an optimization
model. These distributions were then tested in the global climate
model to see how close they came to these goals.
know that sulfate can cool
the Earth because we have observed global temperature
decreases following volcanic eruptions," said Ban-Weiss. "Past
computer model simulations have shown that injecting sulfate
uniformly into the stratosphere could reduce the surface temperature
of the Earth, but the equator would be over cooled and the poles
under cooled. You would also make the Earth drier, and decrease
surface water runoff."
Ban-Weiss' results from his climate models showed that more sulfate
poles rather than tropical regions would result in a
low-carbon climate. But when sulfates were distributed uniformly,
changes in the water cycle were "most effectively diminished."
If the right amount of uniformly distributed aerosols were injected
into the stratosphere, the consequence of climate change could be
decreased by 90 percent and the change in runoff would be decreased
by two-thirds. But when aerosols are distributed latitudinally as a
parabola, temperature change decreased by 94 percent while runoff
changes were only cut in half.
in temperature and the hydrological cycle cannot be simultaneously
minimized because the hydrological cycle is more sensitive to changes
radiation than are surface air temperatures," said
Caldeira, co-author of the study, added that the study was mainly
aimed to develop "a new methodology" for observing the
current climate change problem, and that their model does not include
all process that are essential in reality. Their results are strictly
illustrative and not yet ready to provide a basis for policy
decisions. But he also mentioned that the models of course worked.
optimization model worked well because the complex climate models
indicate that much of the climate system operates as a very linear
system," said Caldeira. "This is surprising when you hear
all the talk of tipping points."
study was published in Environmental
Research Letters this
quote: New research on global warming is contradicting research from 3 months ago (I pulled that out of my ass, but you get the point)
quote: Let's assume that you're someone who accepts that humans are causing a catastrophic global warming. Then let's assume that you're also not a complete idiot:
quote: Pulling CO2 out of the air is too energy intensive to be useful, putting safe particulates into the upper atmosphere seems like an idea worth pursuing.
quote: Ken Caldeira, co-author of the study, added that the study was mainly aimed to develop "a new methodology" for observing the current climate change problem, and that their model does not include all process that are essential in reality . Their results are strictly illustrative and not yet ready to provide a basis for policy decisions. But he also mentioned that the models of course worked .
quote: CO2 is only 3% of the atmosphere
quote: closest to their climate goals
quote: This here says it all. WHAT CLIMATE GOALS? And what about MY climate goals? Maybe they are totally different.
quote: They're going to call it Global Climate Disruption now instead.
quote: Their results are strictly illustrative and not yet ready to provide a basis for policy decisions.
|
<urn:uuid:28f09b28-5a93-4266-a70a-0ed14699baf9>
|
CC-MAIN-2016-26
|
http://www.dailytech.com/Researchers+to+Fight+Global+Warming+by+Shooting+Sulfates+into+Stratosphere/article19647.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397865.91/warc/CC-MAIN-20160624154957-00108-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.961328 | 839 | 3.828125 | 4 |
The Institute for Science and International Security released a report on Wednesday finding that the area of the Yongbyon reactor complex responsible for enriching uranium is now twice as large as it was in the past.
According to the New York Times, the report by the Washington-based, nonproliferation-monitoring group triggers new worries that North Korea is expanding its capacity to produce weapons-grade fuel.
The analysis was based on a comparison of satellite images of the complex taken in March -- before construction began on the expansion -- and on a June image that shows the framework of the addition, which is roughly the same size as the initial centrifuge facility.
Additional proliferation experts agreed with the ISIS analysis that the uranium-enrichment portion of the site appears to have doubled in size, the Times reported.
The expanded facility could produce anywhere from 16 to 68 kilograms of weapons-grade uranium, enough to manufacture two nuclear weapons per year, the ISIS report states.
North Korea asserts that the centrifuge facility produces low-enriched uranium for an onsite experimental light water reactor at the complex. However, it is unclear how extensive the North's enrichment capacity has become and whether the isolated nation has produced weapon-grade uranium -- and, if so, how much, according to the analytical organization.
North Korea has faced sanctions from the United Nations aimed at preventing the North from acquiring specialty metals and centrifuge components from overseas. Pyongyang might have been able to develop ways of producing these materials domestically, according to the newspaper.
The news comes less than two weeks after North Korea's leader Kim Jong Un told the Chinese vice president that he was open to restarting denuclearization discussions, and just a day after the North proposed another round of talks with South Korea with the intent of reopening a shuttered factory complex operated jointly by the two nations.
|
<urn:uuid:fdfb8443-252b-4f93-a368-ac7a3014b76f>
|
CC-MAIN-2016-26
|
http://www.nti.org/gsn/article/north-korean-nuclear-enrichment-facility-expands/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396106.25/warc/CC-MAIN-20160624154956-00200-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.957458 | 373 | 2.515625 | 3 |
Working Group on Integrated Water Resources Management
For documents of previous meetings please click here
The Working Group on Integrated Water Resources Management and the Working Group on Monitoring and Assessment are the two main subsidiary bodies established by the Meeting of the Parties.
The focus of the work of the Working Group on Integrated Water Resources Management is on intersectoral activities to support the implementation of the Convention with regard to the integrated management of transboundary water resources. Activities under this Working Group aim to prevent, control and reduce transboundary impacts and thereby prevent damage to the environment; promote the ecosystem approach in the framework of integrated water resources management; and ensure conservation and, where necessary, restoration of water-related ecosystems. Further goals are to promote the concept of payments for ecosystem services; to prevent accidental water pollution; and to further adaptation to climate change in the transboundary context, including floods and droughts management. The Working Group also seeks to build and/or to strengthen the institutions responsible for the management of transboundary waters; to facilitate the work of joint bodies; and to promote access to information and public participation in decision-making.
The need to consider monitoring and assessment in the broader context of integrated water resources management calls for close collaboration between the two Working Groups through cooperation on a number of joint activities.
Unless otherwise decided by the Meeting of the Parties, the Bureau or the Working Groups themselves, the Working Groups hold one ordinary meeting per year. Annual meetings of the Working Groups constitute an efficient mechanism for governing, coordination and fostering implementation of the Convention. These meetings provide a forum for sharing knowledge and successful experiences among Parties, non-Parties and stakeholders, with a view to supporting and carrying out, inter alia, bilateral and multilateral activities, pilot projects and capacity-building activities.
|
<urn:uuid:2ec87053-f0ee-4083-b3a2-906215801e35>
|
CC-MAIN-2016-26
|
http://www.unece.org/ru/env/water/meetings/documents_wgiwrm.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399117.38/warc/CC-MAIN-20160624154959-00143-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.91101 | 360 | 2.5625 | 3 |
Allocation of limiting resources, such as nutrients, is an important adaptation strategy for plants. Plants may allocate different nutrients within a specific organ or the same nutrient among different organs. In this study, we investigated the allocation strategies of nitrogen (N) and phosphorus (P) in leaves, stems and roots of 126 shrub species from 172 shrubland communities in Northern China using scaling analyses. Results showed that N and P have different scaling relationships among plant organs. The scaling relationships of N concentration across different plant organs tended to be allometric between leaves and non-leaf organs, and isometric between non-leaf organs. Whilst the scaling relationships of P concentration tended to be allometric between roots and non-root organs, and isometric between non-root organs. In arid environments, plant tend to have higher nutrient concentration in leaves at given root or stem nutrient concentration. Evolutionary history affected the scaling relationships of N concentration slightly, but not affected those of P concentration. Despite fairly consistent nutrients allocation strategies existed in independently evolving lineages, evolutionary history and environments still led to variations on these strategies.
|
<urn:uuid:d63342e6-f1e4-47f5-8c8f-4db3334d7b23>
|
CC-MAIN-2016-26
|
http://www.scoop.it/t/plant-gene-seeker-pgs/p/4023890485/2014/07/01/scaling-of-nitrogen-and-phosphorus-across-plant-organs-in-shrubland-biomes-across-northern-china-scientific-reports-nature-publishing-group
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395992.75/warc/CC-MAIN-20160624154955-00101-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.924698 | 220 | 2.671875 | 3 |
Figure 3A (adapted from Komisaruk et al., 2011). Group-based composite view of the clitoral, vaginal, and cervical activation sites, all in the medial paracentral lobule, but regionally differentiated. We interpret this as due to the differential sensory innervation of these genital structures, i.e., clitoris: pudendal nerve, vagina: pelvic nerve,1 and cervix: hypogastric and vagus nerves.
"Femunulus" is a neologism for "female homuculus"
The neuroanatomical definition of homunculus is a "distorted" representation of the sensorimotor body map (and its respective parts) overlaid upon primary somatosensory and primary motor cortices. The figure below illustrates the sensory homunculus, where each body part is placed onto the region of cortex that represents it, and the size of the body part is proportional to its cortical representation (and sensitivity). It's rare to see the genitals represented at all. And if they are present, they are inevitably male genitals.
Homunculus image from Reinhard Blutner.
See the G-Rated [i.e., genital-less] flash explanation of homunculus.
A New Clitoral Homunculus?
To remedy this puritanical and androcentric situation, Swiss scientists at University Hospital in Zurich conducted a highly stimulating study in 15 healthy women to map the somatosensory representation of the clitoris (Michels et al., 2009).
Michels and colleagues began by reviewing the work of Wilder Penfield et al.:
During the last 70 years the description of the sensory homunculus has been virtually a standard reference for various somatotopical studies (Penfield and Boldrey 1937; PDF). This map consists of a detailed description of the functional cortical representation of different body parts obtained via electrical stimulation during open brain surgery. In their findings they relied on reported sensations of different body parts after electrical stimulation of the cortex. Assessment of the exact location was generally difficult and sometimes led to conflicting results. The genital region was especially hard to assess due to difficulties with sense of shame.In contrast to electrical stimulation of the brain, modern mapping studies have used sensory stimulation to map the penis with fMRI (e.g., Kell et al., 2005). But as of 2009, there were no comparable fMRI studies of female genitalia. So how is such a study conducted, methodologically speaking? Electrical stimulation of the dorsal clitoral nerve was compared to electrical stimulation of the hallux (big toe). It was all very clinical, no sexual arousal involved. Here's the experimental protocol (Michels et al., 2009):
Prior to the imaging session, two self-attaching surface disc electrodes (1 × 1 cm) were placed bilaterally next to the clitoris of the subjects so that we were able to stimulate the fibers of the dorsal clitoral nerve. Before the start of the experiment, electrical test stimulation was performed to ensure that subjects could feel the stimulation directly at the clitoris. In addition, the strength of electrical stimulation was adjusted to a subject-specific level, i.e. that stimulation was neither felt [as] painful nor elicited – in case of clitoris stimulation – any sexual arousal. Functional imaging was performed in a block design with alternating rest and stimulation conditions, starting with a rest condition. ... In addition to the clitoris stimulation, we performed in eight of the recorded subjects a second experimental session, in which we applied electrical stimulation of the right hallux using the same type of electrodes, stimulation and scan paradigm.Their neuroimaging results revealed no evidence of clitoral representation on the medial wall (i.e., the paracentral lobule, as shown above in Komisaruk et al.'s Figure 3A and the male homunculus). Instead, electrical stimulation produced significant activations predominantly in bilateral prefrontal areas and the precentral, parietal and postcentral gyri, including S1 and S2. Click here to see Fig. 3 of Michels et al., 2009.
However, that experiment involved electrical stimulation of the dorsal clitoral nerve, which was not sexually arousing. What if the stimulation occurred in a more naturalistic fashion?
Even newer clitoral, vaginal, cervical and nipple homunculi?
Now, Komisaruk et al., (2011) have expanded the somatosensory map of female sexual organs by having the participants engage in self-stimulation of the clitoris, vagina, cervix, and nipple while laying in a 3T scanner. For comparison, the investigators stimulated the thumb and the big toe. Should we be concerned about differential movement artifact (of the head, hand, arm, pelvis) in these varied stimulation conditions? We'll leave that question aside for the moment and examine the experimental protocol, which consisted of 30 sec of rest and 30 sec of the various stimulation modalities, each followed by 30 sec rest (in 5 min blocks):
...Control trials consisted of an experimenter rhythmically tapping a participant's thumb or toe in separate trials to establish reference points on the sensory cortex. Experimental mapping trials consisted of participants self-stimulating, by hand or personal device, using “comfortable” intensity, the clitoris, anterior wall of the vagina, the cervix, or the nipple, in separate, randomized-sequence trials. Clitoral self-stimulation was applied using rhythmical tapping with the right hand. Vaginal self-stimulation (of the anterior wall) was applied using the participant's own stimulator (typically a 15 mm-diameter S-shaped acrylic rounded-top cylinder). Cervical self-stimulation was applied using a similar-diameter, glass or acrylic straight rounded-tip cylinder brought to the study by each participant. Nipple self-stimulation was applied using the right hand to tap the left nipple rhythmically...What's a "comfortable" intensity, and how are we sure the hand and the dildo applied rhythmic tapping of the same frequency and intensity? Looking at Figure 2 below, you'll see that large swaths of lateral sensorimotor cortex were activated on the side contralateral to hand use (i.e., L side of the brain activated by R hand).2 These activations seem to cover most of the sensory and motor homunculi, not just the arm, hand, and finger areas.
Figure 2 (adapted from Komisaruk et al., 2011). Three-axis (coronal, sagittal, and transaxial) views of the group-based responses to participant self-applied (clitoris, vagina, or cervix) stimulation ... The arrows indicate the sensory cortical regions activated by the various stimulated body regions. Clitoral, vaginal, and cervical self-stimulation activated the medial paracentral lobule. Note that the perineal (groin) region just lateral to the midline in the paracentral lobule was also activated... There was marked hand-related activation in the postcentral gyrus, and continuation of activation into the supplementary motor area immediately rostral to the sensory cortical responses... The secondary sensory cortex (SII; at the base of the homunculus) was activated under all the stimulus conditions...
To me, it looks like all the midline activations [including the toe activation, not shown here] bleed into motor areas including supplementary motor cortex, which is involved in both planning and inhibiting movement. We aren't given MNI coordinates to precisely locate the activations in 3D space, but my guess is that the clitoral, vaginal, and cervical regions are more overlapping than Figure 3A would lead you to believe. In fact, there is visible overlap between the vaginal and cervical regions, and the authors say this is due to unavoidable cross-stimulation in the cervical condition. Given the amount of motion artifact that likely occurred, a 4-5 mm difference in the foci of activation may not be entirely reliable in this particular study.3
The most surprising finding was that nipple stimulation largely overlapped with the genital regions:
Unexpectedly, nipple/breast self-stimulation activated not only the (expected) thoracic sensory homuncular region, but also the region of the paracentral lobule that overlaps with the region activated by clitoral, vaginal, or cervical self-stimulation. This finding is consistent with many women's reports that nipple/breast stimulation is erotogenic and can elicit orgasms...The infamous Stuart Brody ["unprotected penile-vaginal sex is the only mature and worthwhile form of sex"] was an author on this paper, and of course he'll use these results as support for his prejudicial and boring view of sex. In my view, this study says nothing about different types of female orgasms and how they might be represented in the brain. There was no explicit mention of whether the women found the self-stimulation arousing at all, but the concluding sentence implies it was perceived as "just pressure." I'd recommend reading Dr Petra as an antidote to Brody.
1 I'm not sure there is one "pelvic nerve" per se in the human female, as opposed to in rats.
2 You'll notice that Figure 3A better illustrates the bilateral nature of the activation, however [which could suggest mirror movement on the L side].
3 I'm not familiar enough with the human peripheral nervous system to say whether separate nerves innervate different female sexual regions with no overlap.
Kell CA, von Kriegstein K, Rösler A, Kleinschmidt A, Laufs H. (2005). The sensory cortical representation of the human penis: revisiting somatotopy in the male homunculus. J Neurosci. 25:5984-7.
Komisaruk, B., Wise, N., Frangos, E., Liu, W., Allen, K., & Brody, S. (2011). Women's Clitoris, Vagina, and Cervix Mapped on the Sensory Cortex: fMRI Evidence. The Journal of Sexual Medicine DOI: 10.1111/j.1743-6109.2011.02388.x
Michels, L., Mehnert, U., Boy, S., Schurch, B., & Kollias, S. (2009). The somatosensory representation of the human clitoris: An fMRI study NeuroImage.
Body mapping on the brain - revised homunculus from New Scientist.
Subscribe to Post Comments [Atom]
|
<urn:uuid:93946301-906c-434f-890b-b99ad8b6bd1e>
|
CC-MAIN-2016-26
|
http://neurocritic.blogspot.com/2011/08/new-sexual-femunculus.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399117.38/warc/CC-MAIN-20160624154959-00040-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.91442 | 2,193 | 2.8125 | 3 |
The beginning of the reign of Fogartach.
Kl. Cellach son of Gerthide becomes king of the Laigin.
724 Fogartach took the kingship again for one year, until he fell in the battle of Cenn Delgthen at the hand of Cináed son of Írgalach.
704 An army was led by Fogartach into Leinster, and the Laigin gave him battle, i.e. the Battle of Clóenad, and the Laigin won the battle and massacred Fogartach's followers, including Bodbcar son of Diarmait Ruanaid. Thus Orthanach sang:
- The battle of Clóenad, a harsh triumph,
in it caltrops (?) were put down,
so that Bodbcar, champion of the fair companies,
was slain by the host.
704 The death of Flann Fína, son of Oswy, king of the Saxons, the famous wise man, pupil of Adamnán; of whom Riaguil of Bennchor sang:
- Today Bruide fights a battle
over the land of his ancestor,
unless it is the wish of the Son of God
that restitution be made.
- Today the son of Oswy was slain
in battle against gray swords,
even though he did penance
and that too late in Iona (?).
- Today the son of Oswy was slain,
who used to have dark drinks;
Christ has heard our prayer
that Bruide would save the hills (?).
703 The Celebration of Easter.
In this year the men of Ireland accepted a single regulation and rule from Adamnán, regarding the celebration of Easter on Sunday, the fourteenth of the moon of April, and regarding the wearing of Peter's tonsure by all the clergy of Ireland; for there had been great disturbance in Ireland until then, that is, many of the Irish clergy were celebrating Easter
p.57on Sunday, the fourteenth of the moon of April, and were wearing the tonsure of Peter the Apostle, following Patrick. Many others, however, were following Colum Cille, celebrating Easter on the fourteenth of the moon of April no matter on which day of the week the fourteenth happened to fall, and wearing the tonsure of Simon Magus. A third group was not in accord with either the followers of Patrick or those of Colum Cille. So the clergy of Ireland used to hold many synods. And this is how those clerics used to come to the synods: with their people, so that there used to be battle challenges, and many slain among them; and many evils came to Ireland on that account, i.e. the great cattle murrain, and the vast famine, and many plagues, and foreigners destroying Ireland. It was like that for a long time, that is, until the time of Adamnán. He was the ninth abbot of Í after Colum Cille.
The Saxons took a great prey from Ireland. Adamnán went to redeem the hostages. And as Bede tells it in Bede's History, most of the bishops of all Europe gathered to condemn Adamnán for celebrating Easter according to Colum Cille, and for wearing the tonsure of Simon Magus (that is, from ear to ear). Bede says that there were many wise men in that synod, and that Adamnán exceeded them all in wisdom and eloquence. Adamnán said that it was not in imitation of Simon Magus that he wore that tonsure, but it was rather in imitation of John the Beloved, pupil of the Savior, and that that was the tonsure he had worn; and that though his Savior was beloved to Peter, John was beloved to the Savior; and that it was on the fourteenth of the moon of April, whatever day of the week it might be, that the apostles celebrated Easter.
Then an old man arose there, and said, Even if it were Colum Cille himself who was present here, we would not part from him until he were under the same rule as we. As for you, too, you will not be left alone until you are under the same rule as we. Adamnán answered him, and said, I will be under the same rule as you. Let yourself be tonsured, then, said the bishops. It is sufficient, said Adamnán, that it be done at my own monastery. No, they said, but at once. Adamnán was tonsured then, and no greater honor has been given to a man than that which was accorded to Adamnán then, and that large booty was surrendered to him, and he proceeded to his own monastery, Í.
His congregation was greatly amazed to see him with that tonsure. He was always urging the congregation to adopt the tonsure, and he could not get their consent. But God permitted the community to sin, that is, to expel that Adamnán who had compassion for Ireland. This is what Bede says; for Bede was with Adamnán while he was in England.
After that Adamnán came to Ireland, and he proclaimed that rule in Ireland, and that single regulation for Easter and the tonsure was not accepted from him until this year.
704 Adamnán died in this year, in the eighty-third year of his age.
716 Fogartach grandson of Cernach again in the kingship; whence was said:
- Fogartach will seek the sovereignty,
that which he lacks, which is above the world;
when he says that he is nothing,
after that he is king within a month.
717 Kl. The disruption of Oenach Taillten by Fogartach, in which the son of Máel Rubae and the son of Dond Slébe fell.
?715 170 Kl. Anastasius Augustus was driven out.
718 A shower of honey rained upon the fort of the Laigin. A shower of wheat, furthermore, rained on Othan Becc. Then Niall Condail son of Fergal was born, whence be was called Niall Frossach 'Niall of the Showers'.
718 The community of Í adopted the tonsure of Peter the Apostle; for until that time they had worn the tonsure of Simon Magus, as Colum Cille had worn it himself.
?716 Kl. Theodosius reigned for one year.
721 Kl. Leo reigned for nine years.
721 Kl. A raid on Mag Breg by Cathal son of Finguine, king of Munster, and Murchad son of Bran, king of the Laigin.
721 A raid on the Laigin by Fergal son of Máel Dúin. In other books of history I find that it was in the third year before, that is, in the tenth year of the reign of Fergal, that this raid on the Laigin was made, and that it was in revenge for it that Murchad brought the son of Finguine with the men of Munster to raid Mag Breg. Whichever of those years it was, though, Fergal made a great raid on the Laigin, that is to say, he burned and roasted and slew them, and he swore he would not cease until the Bóroma which Fínnachta remitted to MoLing was given to him, and until hostages were given to him in recognition of his lordship and of the tribute. The Laigin gave him hostages, and they promised the tribute.
721 It was at this time that Fergal made a prophecy for his sons, Áed Alláin and Niall Condail, and this is how that happened:
They came one day to visit him at Ailech Frigrenn. Áed, the elder son, a prime, clever, cruel and vigorous warrior, came thus to Ailech: with large, well-armed troops around him. But the younger son came thus: calmly and temperately, peacefully, with few attendants, and this is what he said, from his own diffidence and to honor his father: It would be more proper for me, he said, to lodge outside than to stay as a guest with you tonight. What is wrong with you, son, said the father, that you should say that, when the boy who is older than you has three times your attendants, and you do not have the confidence to stay in Ailech tonight as he is staying with his company? I would prefer, said Niall, that he should behave in the same way towards you. Do not go tonight at all, son, said Fergal, and be near your father and mother.
After that the older son, Áed, was brought into the great palace with his company. The young son, Niall, however, was brought to a lovely secluded house. Then they were entertained; and their father wished to test them both, so he came in the last part of the night to the house in which the elder son was staying, and he was listening at that house: it was very foul indeed inside that house. There were buffoons and satirists and horseboys and jugglers and oafs, roaring and bellowing there. Some were drinking, some sleeping, some vomiting, some piping, some whistling. Drummers and harpers were playing; a group was boasting and arguing. Fergal heard them thus. And he came then to visit the secluded house where the younger son was staying; and he listened at that house, and he heard nothing there but thanksgiving to God for all that they had received, and sweet, quiet harp playing, and the singing of praise songs to the Lord.
p.63And the king saw that great fear and love of the Lord were in that house. After that the king came to his own bed, and considered deeply the situation of those two houses.
Early in the morning he entered the great house where the elder son was staying, and he could scarcely pass through the house on account of the vomiting and filth and stench, and the number of dogs that were eating the vomit. And all inside were snoring as if they were dead, except for the king's son himself, and this is how he was sleeping: in his royal bed, as if he were waiting for battle, with a great shield on his left side, and two huge javelins on his right side, a long gold-hilted inlaid sword on his thigh, taking in and letting out great gasps, such as no one should do, however strong or agile.
He was unable to remain inside because of the great foulness of the air in that house, so he came into the house where the younger son was staying, and although he came quietly, the youth saw him, for he was not sleeping, but praying to the Lord. He rose immediately from the royal bed to greet his father, for he was thus: in a silk tunic, with gold and silver borders; and he opened the house for his father, and when his father came inside, he put his arms around his son's neck and gave him a kiss, and they came and sat together on the royal bed; and the son began first to converse with his father. And this is what he said: Father, it seems to us that you have spent this past night sleepless and troubled; you should sleep now in that bed until daybreak.
The father did so, and when daybreak came they rose together, and the son said to his father, Dear father, it would be proper for you to feast with us for a time here, for we still have half of the food and drink that was brought to us from you last night. And he had not finished saying that when servants brought out a huge vessel full of mead, and various foods, and they feasted together silently and peacefully then.
When everyone had risen, the king came out into his own house, and he predicted, in the presence of all, what the fortunes of his two sons yonder would be. He said that the elder son would take the kingship, and that his reign would be strong, heroic, vigorous, terrifying and lustful. The younger son, however, would take the kingship piously and honestly, and his descendants would be famous and royal, and would take the kingship every second time. And that has been fulfilled so far.
Now the daughter of Congal son of Fergus of Fánad was the mother of the older son (that is, Áed Alláin), and she bore that son secretly. And this is the reason why Fergal had the girl secretly. Her father, Congal, dedicated her to the Lord, and she was a nun, and her father had given her much gold and silver and cattle for protecting her chastity. However,
p.65the universal enemy of the human race (that is, the Devil) deceived her; she gave her love to Fergal son of Máel Dúin, and Fergal loved her. Fergal and the daughter of Congal Cennmagar slept together. Fergal was rígdomna of Ireland at that time. Congal was King of Ireland.
The man who was messenger between them told that to Congal. Congal was greatly grief-stricken by that news, that is, that his daughter had been seduced, and he said that the bearer of the tale would not live, unless he procured the proof of that story. So the bearer of the tale was waiting until Fergal and Congal's daughter should be together, and when they were together, the tale-bearer sought Congal, and told him that they were together. Congal came to the house where they were, and when Congal's daughter saw him coming to the house with his attendants for she was clever, crafty, and spiteful, as was her fathershe hid Fergal under the bedclothes, and then sat on the bedclothes herself. A big cat that was inside came and found Fergal and bit at his legs, and the cat swallowed big pieces of Fergal's legs. Fergal put his hand out and took the cat by the an neck, and killed it. Congal searched in the house, but he did not find Fergal there. He went to the bearer of the tale and drowned him in a river. Afterwards he came to see his own daughter, and he asked her forgiveness, since she was a virgin, so that his sin against her might not be upon him. It was at that secret tryst that Áed Alláin was conceived.
Now after Áed Alláin was born, his mother turned him over to two trustworthy women to be drowned, so that her father might not find her out and be angry with her. Now one of these women was of Cenél Conaill, and one was of Cenél Eógain. When the woman of Cenél Eógain took the lovely little baby into her arms, she was filled with love and tenderness for the infant, and she said to her woman companion: Dear sister, it is not right to destroy this baby, but rather to keep it well. The other answered, He is dearer to you than to his own mother, and it is she who has commanded us to drown him, for fear of her father's anger. She became angry, and she set the child on the ground, and they fought each other, one for protecting, the other for drowning him. The woman of Cenél Eógain overcame the other woman, and she clutched her by her Adam's apple until she agreed to everythingnamely, to caring for the child. Thereafter they brought up the child together.
Once, four years later, the mother of the child happened to come into the house where he was, without knowing that he was alive. The little boy was playing there. His mother's mind turned to him, and she asked, How old is that boy over there? Everyone said that he was four years old. She called the trustworthy women over to her, and said to them, The sin I have committed is great, destroying a boy of that age to escape the anger of my father.
Do not grieve at all, said the women. That is that boy yonder, and we have protected him. Then she gave many gifts to the women, and the boy was taken secretly from them to his own father, Fergal.
Now the mother of Niall Condail 'Niall the Worthy' was the daughter of the king of Cianachta, and she was the fairest and most beautiful woman in Ireland in her time. However, she was childless for a long time, until she came to the holy nun Luaithrinn to ask her to pray to the Lord on her behalf to aid her. Luaithrinn did that, and Niall was conceived thereafter in the womb of the daughter of the king of Cianachta, and then he was born; and at that time she was Fergal's queen of Ireland.
All of this aside, when he spoke concerning his sons, as we have recounted, he urged and commanded each and every one of them his men to assemble all their forces the next year to invade the Laigin, to levy the Bóroma upon them, for the Laigin had not fulfilled what they had promised.
722 Kl. From the beginning of the world 5924 years. From the Incarnation of the Lord 722 years.
The Battle of Almu between the Laigin and Uí Néill. This battle was fought on the third of the Ides of December. The cause of this battle was that the Bóroma, which Fínnachta remitted to MoLing, was levied by Fergal, and the Laigin would not tolerate that. The Laigin did not pay it to Loingsech son of Oengus, and they did not pay it to Congal Cennmagar, although they had suffered great harrassment from Congal; nor did they have any greater wish to pay it to Fergal, since they trusted in the words of MoLing, who had promised that the Bóroma would never again be levied from the Laigin. That perturbed Fergalthat is, that the Laigin would not keep their pledges to himso he commanded a vast, irresistible hosting from Leth Cuinn, that is, from Connachta, and Cenél Conaill, and Airgialla, and Mide, in the fourteenth year of his own reign, or in the thirteenth year, as some will have it, to levy the Bóroma.
Now that muster of troops took a long time, for every man of Leth Cuinn, when the order came to him, would say, If Donn Bó comes on the hosting, I shall come. Now this Donn Bó was the son of a widow of the Fir Rois, and he never went away from his mother's house for a day or a night, and there was no one in all Ireland who was more beloved, or fairer of form or figure or build than he. There was no one in all Ireland who was more valorous or more skillful than he, and his were the best amusing poems and royal stories in the world; it was he who was best at training horses, and setting spears, and braiding hair; and he was a man with royal nature in his countenance, of whom was said:
But his mother would not let Donn Bó go with Fergal until Máel son of Failbe son of Erannán son of Crimthann, successor of Colum Cille, was pledged for his return alive, and until he pledged Colum Cille on his behalf, moreover, that Donn Bó would return safe to his own house from the territory of the Laigin.
- More lovely than all boys is dear Donn Bó;
more sweet his song than all utterances of the mouth;
more glorious than all the warriors of Inis Fáil;
Then Fergal set out on his way. There were guides going before him, but the guidance they gave him was not good: into the narrow places of each path, and into the rough places of each path, until they reached Cluain Dóbail 'the Unlucky Meadow in Almu. Áedán, the leper of Cluain Dóbail, was there before them. The army behaved badly: they slaughtered his only cow and roasted it on spits in his presence, and they took his house despite him and burned it; so the leper said that the punishment the Lord would inflict on the Uí Néill would be eternal. The leper went to Fergal's tent, and the kings of Leth Cuinn were all before him in the tent at that time. In their presence the leper complained of his ill-treatment, but the heart of none was moved for him, except the heart of Cú Bretan son of Congus, the king of Fir Rois, and Cú Bretan did not regret that, for except for Cú Bretan son of Congus alone, none of the kings who was in the tent escaped from the battle. It was on that occasion that Cú Bretan said:
Then Fergal said to Donn Bó, Entertain us, Donn Bó, for you are the best musician in Ireland, with flutes and piping, and with harps and poems
- I fear a crimson, bloody battle,
oh Fergal's man, whom I seek out;
sorrowful are the servants of Mary's Son
after the house has been taken in spite of them.
- The leper's cow
has been slaughtered after his ox;
woe to the hand that pierced their cloak skin?,
for the son of Bran did not restrain it, etc.
p.71and talk and royal stories of Ireland, and tomorrow morning we give battle to the Laigin. No, said Donn Bó, I cannot amuse you tonight, and I do not possess one of all those accomplishments to demonstrate tonight; but wherever you are tomorrow, and wherever I shall be, I will entertain you. Let the royal fool Úa Maigléine amuse you tonight.
Úa Maigléine was brought to them then. He set about telling the battles and combats of Leth Cuinn and the Laigin, from the destruction of Tuaim Tenbath (that is, Dind Ríg) in which Cobthach Cóel Breg was killed, up until that time; and they did not sleep much that night because of their great fear of the Laigin, and because of the severity of the weather, for it was the eve of the feast of Finnian, in the winter.
As for the Laigin, they went to Cruachan Cloenta, for the Laigin used not to be defeated if they made their plans there and then proceeded from there to the battle. Afterwards they went to Dind Canand. The following morning the troops of both sides met: nine thousand of the Laigin, and twenty-one thousand of Leth Cuinn. The battle was waged strongly and fiercely on both sides, and everyone took part in the fighting there. The combats of the Laigin and Leth Cuinn warriors would be excessive to relate. It is said that Brigit was seen over the Laigin; Colum Cille, moreover, was seen over the Uí Néill. The battle was won by Murchad son of Bran, and by Áed son of Donnchad son of Colcu, king of Laigin Desgabair. Fergal was slain there. Áed Mend and Dúnchad son of Murchad killed Fergal himself and Bile son of Bain, king of Alba, from whom Corr Bile in Almu gets its name. Moreover, it was Áed Mend who slew Donn Bó. However, Fergal did not fall until after Donn Bó fell. One hundred and sixty mercenaries were slain in that place. The Laigin killed their own numberthat is, nine thousandof the men of Leth Cuinn in that battle, and nine of them went mad, and one hundred of the kings. The Hill of Fergal is there. The Laigin raised shouts of triumph there, whence was said:
- At the end of the day at Almu,
after fighting for the cattle of Brega,
the red-mouthed, sharp-tongued scald-crow cried
triumph around the head of Fergal.
- Murchad parted from a coward.
He advanced champions on the earth;
he turned an edge against Fergal,
with an immense band of warriors to the south of Almu.
- One hundred prosperous kings died (there),
hard, firm, brawny,
along with nine madmen without gentleness,
along with nine thousand armed men.
- Four hundred steady men at Cruachan
with the mercenaries, wounded in the fight,
with three hundred brave men of Cenél Conaill,
The fool Úa Maigléine was taken captive there, and he was asked to give a fool's shout, and he did; that shout was loud and melodious, so that the shout of Úa Maigléine has remained from that time with the fools of Ireland. Afterwards Fergal's head was cut off, and the fool's head was also cut off. The echo of the fool's shout was in the air for three days and three nights. This is the origin of the saying, the shout of Úa Maigléine pursuing the men in the bog.
Then Áed Laigen son of Fidchellach, king of Úí Maine Connacht, was defeated and fled, saying to his sons, Do not leave me, sons; your mother will be better disposed towards you if you take me with you. They will not take you, said the Laigin. It was then that Áed Laigen, king of Úí Maine, was slain.
However, the sons of Áed Laigen, in the company of Áed Alláin son of Fergal, reached Lilcach, where Modichu son of Amargein and the pious Foreigner were. It was then that the Úi Néill and Connachta dug the rampart of the church, and they were in the guise of clergy, and it was thus that they were saved through a miracle of the saints, so that the friendship of the Úí Néill and Connachta is in that church from that time forth; wherefore Áed Ailáin sang:
- We did not find on earth
a place which would be as smooth as Almu;
after the battle we did not reach
a place which would be as bright as Lilcach.
That day was triumphant for the Laigin. Cú Bretan son of Congus, king of Fir Rois, was protected, however, on account of the verses he had made the evening before. The Laigin were in Condail of the Kings that night, drinking wine and mead cheerfully and happily after winning the battle, with each of them telling his exploits, and they were exhilarated and gloriously drunk. Murchad mac Brain said then, I would give a chariot worth four cumals, and my horse, and my trappings, to a warrior who would go into the battlefield and bring us a trophy from it. I will go, said Báethgalach, a Munster warrior. He put on his gear for battle and protection, and he went to the place where Fergal's body was, and he heard something, a proclamation in the air overhead, and it said for all to hear, It has been commanded to you by the King of seven heavens: make music for your lord tonight, for Fergal son of Máel Dúin; although all of your skilled people have fallen here, pipers and trumpeters and harpists, do not let terror or weakness prevent you from playing tonight for Fergal. Then the warrior heard mournful piping and song; and he heard then in the clump of rushes next to him a war chanting that was sweeter than any music. The youth went towards it. Do not come to me, said the head to him. Who are you? asked the warrior. I am the head of Donn Bó, replied the head, and I was pledged last night to entertain the king tonight, so do not harm me. Where is Fergal's body here? asked the warrior. It shines out before you, yonder. Shall I take you with me? asked the warrior. I would like you most of all to take me, said the head, but let Christ be your surety that if you take me, you bring me back to my body again. I shall indeed, said the youth.
And the youth returned to Condail with the head, and he found the Laigin drinking when he arrived the same night. Have you brought a trophy with you? asked Murchad. I have, said the warrior: the head of Donn Bó. Put it on that pillar over there, said Murchad. The whole host recognized it as the head of Donn Bó, and they all said, Alas for you, Donn Bó, your form was comely; entertain us tonight as you did your lord this morning. His face was turned then, and his sorrowful chant rose on high, so that all were crying and lamenting. The same warrior brought the head back to its body, as he had promised, and he placed it on its neck. With that, Donn Bó returned to his mother's house. For these were the three wonders of that battle: Donn Bó's returning alive
p.77to his house according to the words of Colum Cille, and the fool Úa Maigléines shout remaining three days and three nights in the air, and the nine thousand who overthrew the twenty-one thousand. Whence was said:
- The Battle of Almuhigh the origin
great the deed of December;
lofty Murchad of the raids won it,
the son of Bran, with the warriors of Leinster.
- Fergal of Fál was defeated
the son of huge Máel Dúin,
and mills below the battlefield
were grinding with pools of crimson blood.
- Eighty-eight kings, in truth,
nine thousand, without exaggeration,
of Leth Cuinn, renowned gathering,
fell there all together.
- Nine madmen were driven wild by it;
they escaped from them to Fid Gaible;
they changed color after that,
after which the Battle of Almu was decided (?).
These are the names of the kings who were killed in this battle. These are the ones of Sil g-Cuinn.
Now these following are of the southern Uí Néill:
Moreover, 180 died of sickness and cold after the Battle of Almu in which Fergal son of Máel Dúin was slain, etc.
Beginning of the reign of Cináed son of Írgalach, according to some.
Kl. Then Fogartach son of Niall took the name of King of Ireland immediately after Fergal. It was he who was defeated by the Laigin in the battle at Tailtiu. It was one year, or two, according to some, until he was killed by Cináed Lethcháech son of Írgalach.
|
<urn:uuid:b1473e72-4167-47e6-a623-f94436f6a695>
|
CC-MAIN-2016-26
|
http://celt.ucc.ie/published/T100017/text009.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393518.22/warc/CC-MAIN-20160624154953-00115-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.98863 | 6,749 | 3.125 | 3 |
Public health protection is achieved as a result of sanitary surveys of shellfish growing areas to determine their suitability as shellfish sources for human consumption. The principal components of a sanitary survey include: 1) an evaluation of pollution sources that may affect an area, 2) evaluation of hydrographic and meteorological characteristics that may affect distribution of pollutants, and 3) an assessment of water quality.
Each growing area must have a complete sanitary survey every twelve years, a triennial evaluation every three years and an annual review in order to maintain a classification, which allows shellfish harvesting. Minimum requirements for sanitary surveys, triennial evaluations, annual reviews and annual water quality monitoring are established by the ISSC and set forth in the NSSP. Each year water samples are collected at 2,320 stations in 294 growing areas in Massachusetts's coastal waters at a minimum frequency of five times while open to harvesting. Two Marine Fisheries laboratories located in Gloucester and New Bedford test water and shellfish samples for fecal coliform bacteria using a membrane filtration method (mTEC agar) to determine the classification of shellfish growing areas and potential pollution sources.
Shellfish are also tested for various poisonous or deleterious substances based upon an assessment of pollution sources impacting growing areas as determined by the sanitary survey and also as a result of pollution events such as oil and chemical spills. Contaminants periodically recovered from shellfish include: hydrocarbons, heavy metals, pesticides and polychlorinated biphenyl's (PCB's). Action levels and Tolerances have been established by the U.S. Food & Drug Administration (FDA) for various contaminants to protect the public.
Besides protecting the public from shellfish borne fecal pathogens, another major aspect of the shellfish program involves monitoring for naturally occurring marine biotoxins produced by microscopic algae Alexandrium sp. the cause of paralytic shellfish poisoning (PSP) also known as "Red Tide". Consumption of shellfish containing certain levels of PSP toxin can produce severe illness and even death. Shellfish Program personnel collect shellfish from 15 primary or sentinel stations weekly from April through mid-November. Samples are sent to our Gloucester laboratory where bioassays determine the levels of toxin in the shellfish. If toxin is found, both the frequency of sampling and the number of sample sites are increased. Shellfish areas are closed if toxin levels exceed safe limits. In addition to bioassays, the Shellfish Program oversees a pilot phytoplankton monitoring program under a grant from the U.S. FDA, Office of Seafood. "Volunteers" (mostly local shellfish department personnel or others with strong biology backgrounds) trained and equipped with field microscopes and plankton nets by MarineFisheries and FDA, collect and analyzed hundreds of phytoplankton samples. The purpose of this program is to augment the shellfish analysis by providing early warning of potentially toxic blooms besides Alexandrium such as Dinophysis and Psuedonitzchia and to expand the number of sites being monitored along the coast.
Another component of the sanitation program involves maintaining a direct link with the state Department of Public Health (DPH) on all matters related to shellfish safety and public health protection. MarineFisheries provides information regarding harvest area status and assists DPH in tracing the source of shellfish in commerce. We also aid DPH in the regulation of shellfish wet storage by wholesale dealers. Plus, Shellfish Program personnel certified by FDA as Laboratory Evaluation officers, evaluate non-state laboratories that conduct shellfish related analyses.
|
<urn:uuid:caf972a7-51ee-48b4-a667-c6177d762e53>
|
CC-MAIN-2016-26
|
http://www.mass.gov/eea/agencies/dfg/dmf/programs-and-projects/public-health-protection.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399425.79/warc/CC-MAIN-20160624154959-00017-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.930689 | 735 | 3.265625 | 3 |
Induct on the number of edges. If it has one edge it must have 2 nodes, one at each end of the edge.
Assume true for all trees with edges. Then the number of nodes is on such a tree.
Let be a tree with edges. Then it contains a subtree with edges (just delete one of the bottom-most edges and the ONE node at its tip). This tree, , has nodes, but as we deleted ONE node from this means that must have nodes.
As we have that as required.
Is there anything you specifically do not understand in this?...
|
<urn:uuid:ed49a044-f1b0-4cbe-91cf-d78ce3916544>
|
CC-MAIN-2016-26
|
http://mathhelpforum.com/discrete-math/143302-mathematical-induction.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783404826.94/warc/CC-MAIN-20160624155004-00023-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.970693 | 124 | 2.796875 | 3 |
Parental attitudes can significantly influence children’s decisions to invest. The key is the extent to which parents trust society, according to “Social Capital as Good Culture,” a new National Bureau of Economic Research working paper by Luigi Guiso of the European University Institute; Paola Sapienza of the Kellogg School of Management and Luigi Zingales of the University of Chicago.
The economists find that pessimism among parents is passed on to their children as a form of social capital, which is defined as the set of beliefs and values that inspire cooperation in members of a community. Passing on pessimism leads children to avoid investment and prevents them from gaining their own knowledge of society, according to the paper. Allowing pessimistic values to flow from generation to generation until society is stuck at a point the paper deems a “no-trust no-trade equilibrium.”
They tested their model using two different samples: the World Value, a survey to determine the correlation between young people’s rate of learning and average level of trust in their parents, and the German Socio Economic Panel to link parents’ and children’s beliefs.
While it doesn’t specify how to alter a low trust state, it shows that even a temporary shock to society can alter the perceptions passed from one generation to the next. In a shock that lasts three generations, for example, 19% of families eventually stop investing. If the shock lasts five generations, it drops to 8%.
“This ‘temporary’ shock is sufficient to induce almost all family lines to have an optimistic prior and always invest. Most interesting, this effect persists forever even after the shock disappears,” the researchers conclude.
The economists sought to prove that lasting effect by demonstrating that the difference in social capital in Northern and Southern Italy today resulted from a period of independence in cities in Northern Italy more than 500 years ago. Italian literature from the 19th century showed that Northern literature was punctuated by intense optimism and faith in others, while Southern literature displayed a sense of mistrust toward the community. Data from the 1990s shows the sentiments persisted long after the “shock.” Though 42% of Northerners trusted others, only 25% of Southerners felt the same.
The cycle can change within individuals as well, though. The paper found that as a person ages, trust tends to increase as his life experiences meld with his parents’ views. This was based on the finding that parents generally pass conservative versions of their beliefs on to children. It also found that mothers have a stronger influence in passing on personal values and beliefs.
Shifting levels of trust are applicable to second generation Americans also, who often correlate their trust in American society with the level they held in their native countries. This can continue for generations.
“Our model implies also that when transmitting priors, parents should do so in a conservative way, so that the prior they transmit is on average lower than the one they hold,” the researchers conclude. “Furthermore, parents that have stronger beliefs about the trustworthiness of others should transmit less conservative priors.” –Sara Murray
|
<urn:uuid:e7e63074-d484-4c23-aa91-59d5aa8df136>
|
CC-MAIN-2016-26
|
http://blogs.wsj.com/economics/2008/01/16/parents-pessimism-affects-childrens-investing/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783394414.43/warc/CC-MAIN-20160624154954-00043-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.95322 | 647 | 3.203125 | 3 |
Plans to harness the power of the waves off the coast of north Cornwall have been unveiled.
The hub could generate up to 30 megawatts of power
The South West Regional Development Agency (SWRDA) says a Wave Hub 10 miles off the north Cornish coast could generate electricity for 14,000 homes.
The hub could also create about 700 jobs and contribute about £27m a year to the local economy.
But a report by the National Audit Office says renewable energy could see bills rise by 5% over five years.
The SWRDA now has the results of a series of studies into the economic impact and feasibility of the wave project, which aims to be the world's first offshore facility to carry out tests on wave energy devices.
The Wave Hub off the coast of Hayle has already received support in principle from the government's energy minister, Mike O'Brien, who says it has enormous potential.
He said: "The Wave Hub project is an excellent example of a scheme that could bridge the chasm between research and development and full-scale production."
The government wants the UK to be producing 10% of its energy needs from renewable resources by 2010 and the region has been told it must find room for 280 wind turbines to meet energy targets.
The Wave Hub would act as an offshore electrical "socket" connected to the national grid by an underwater cable, and could be positioned off the Cornwall coast in two years time.
The SWRDA has invested £500,000 in the project and says the feasibility studies point to the potential for the region to be the destination of choice for wave energy developers.
Environment manager Dominic Vincent says the Wave Hub could play a crucial role in helping to develop the UK renewable energy sector.
The agency believes it would also give a large financial boost to the local economy and create a "significant" number of jobs.
Mr Vincent said: "This is why we have invested in the project.
"We know how we can build it, where we can build it and wave device developers have told us they want it."
The National Audit Office has released a report on renewable energy which says progress has been slow on the government's 10% target for 2010.
The report says renewable energy is a relatively expensive way to cut emissions of greenhouse gases, and although the target is achievable, it would come at a cost of £1bn a year.
It believes consumers will face a 5% increase in electricity bills by the end of the decade.
|
<urn:uuid:bb2be97b-c094-4a85-8e2a-681a5cf73fe8>
|
CC-MAIN-2016-26
|
http://news.bbc.co.uk/2/hi/uk_news/england/cornwall/4257391.stm
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783400031.51/warc/CC-MAIN-20160624155000-00088-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.955612 | 510 | 2.625 | 3 |
Photo: La Morra
A large manuscript containing 166 late medieval French songs, located today at the Biblioteca Nazionale Universitaria in Torino, Italy, is the most significant evidence of a rich musical culture found in neither France nor Italy, but Cyprus. Yes, the island of Cyprus, which, for nearly three centuries, was ruled by Lusignan kings beginning in the late 12th Century.
The island was conquered by Richard the Lionheart in 1191 and then sold to the Knights Templar who put Guy de Lusignan in charge. During the three hundred year Lusignan family reign, Cyprus became the farthest reach of late medieval French culture.
The Cyprian manuscript found in Torino’s national library can be traced to the early-15th Century, a high point at the Lusignan court of Janus I where there was a sophisticated musical environment associated with Charlotte de Bourbon, the king’s wife. When she arrived on Cyprus, she brought to the island two French musicians, Gilet Velut and Jean Hanelle, both of who became important musical figures at court and may very well have composed some of the pieces the manuscript. And while all of the composers who contributed to the manuscript remain anonymous, it is one of largest and most important sources for late medieval French song.
The Torino manuscript has a wealth of music, including plainchant, mass settings, motets in French and Latin, virelai, ballades, and rondeaux… all music commonly found in the late-medieval era. Yet the French songs are finely crafted and are unique to the manuscript (no copies are found anywhere else).
The manuscript came to life for reasons that are still unknown, but there are a number of theories; the strongest of which claims that the manuscript was copied for an Italian patron with a connection to the Lusignan court on Cyprus and then somehow found itself in Savoy. Although a little sparse, this theory at the very least shows a tangible link between Cyprus, Italy, and Savoy, if somewhat clouded by a haze of mystery and speculation.
The 17th-century French political figure Cardinal Jules Mazarin is the inspiration for our new release of the week. The ensemble Le Jardin Secret has put together a program of French and Italian works inspired by Cardinal Mazarin, a powerful force behind the support of Italian opera at the courts of Louis XIII and XIV. Released on the Coro label, the program contains vocal and instrumental music by primarily well-known composers including Charpentier, Lully, Louis Couperin, Luigi Rossi, and many others.
Here’s a video of ensemble La Morra performing a work from 15th-century England.
|
<urn:uuid:890141d3-f503-4a71-b14a-460e0f70667b>
|
CC-MAIN-2016-26
|
http://indianapublicmedia.org/harmonia/late-medieval-songs-cyprus/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397636.15/warc/CC-MAIN-20160624154957-00194-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.954377 | 569 | 3.1875 | 3 |
Hemorrhagic shock and encephalopathy syndrome
Other Names for this Disease
- Hemorrhagic shock and encephalopathy syndrome
See Disclaimer regarding information on this site. Some links on this page may take you to organizations outside of the National Institutes of Health.
is a rare disease that occurs suddenly in previously healthy children. This condition is characterized by severe shock, coagulopathy, encephalopathy, and liver and kidney dysfunction. Most cases of HSES occur in infants from age 3 to 8 months, although it can also occur in older children. Individuals with HSES have extremely high body temperatures and multiple organ failures. This condition often causes long term neurological problems or death. The cause of the HSES is unknown.hsHemorrhagic shock and encephalopathy syndrome (HSES)
Last updated: 5/19/2009
- Palumbo EJ. Hemorrhagic shock and encephalopathy syndrome. Merck Manual for Healthcare Professionals. March 2009; http://www.merck.com/mmpe/sec19/ch286/ch286c.html. Accessed 5/19/2009.
- The Merck Manuals Online Medical Library provides information on this condition for patients and caregivers.
- The Monarch Initiative brings together data about this condition from humans and other species to help physicians and biomedical researchers. Monarch’s tools are designed to make it easier to compare the signs and symptoms (phenotypes) of different diseases and discover common features. This initiative is a collaboration between several academic institutions across the world and is funded by the National Institutes of Health. Visit the website to explore the biology of this condition.
- PubMed is a searchable database of medical literature and lists journal articles that discuss Hemorrhagic shock and encephalopathy syndrome. Click on the link to view a sample search on this topic.
|
<urn:uuid:1b186755-fc41-40df-b8fe-efa3a9d9df7c>
|
CC-MAIN-2016-26
|
https://rarediseases.info.nih.gov/gard/10030/hemorrhagic-shock-and-encephalopathy-syndrome/resources/1
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397864.87/warc/CC-MAIN-20160624154957-00045-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.893076 | 382 | 3.171875 | 3 |
Runners, cyclists, swimmers and triathletes: It's time to get in gear—another race season is approaching.
The impending race season requires more than ramping up your training routine. A well-balanced fuel plan is just as important and will help you reach your performance goals as well as improve your general health.
However, it's not just what you eat, but how you eat it that can make the biggest difference.
Here are a few important tips for all athletes:
- Eat a balanced diet complete with high-quality carbs, lean protein and healthy fats.
- Include a variety of fruits and vegetables to boost fiber and antioxidant intake—this helps to keep you healthy all season long.
- Eat clean. Avoid processed, preservative-filled foods and be conscious of what you're eating when you go to a restaurant.
- Hydrate—even when the heat breaks, keep your fluid intake high.
Prepare your body for increased mileage and intensified workouts with the items on this superfoods list:
1. Bananas contain quick-digesting carbs that replenish glycogen stores and provide immediate energy. They also boast potassium, an electrolyte lost through sweat. Take a banana with you for a post-training energy boost, or put one in your fuel belt for a mid-workout snack.
2. Avocados have five good reasons to be on the superfoods list for race season: fiber, potassium, Vitamin E, folic acid and B vitamins. This fruit is also high in monounsaturated fats—important for heart health. Add avocado to a sandwich or mix it with garlic, onion and peppers to make guacamole.
3. Berries, including blackberries, raspberries, blueberries and strawberries, are rich in antioxidants and full of fiber to help keep your digestive system moving. Throw a handful into morning oatmeal or mix them with plain Greek yogurt.
4. Eggs rock when it comes to protein content. High-quality protein sources help with protein breakdown, which is initiated by exercise. Eggs are on this superfoods list because they're a complete protein, which means they contain all of the essential amino acids—not common among other protein sources. Top a salad with hard-boiled egg slices or combine scrambled eggs with vegetables for a breakfast burrito.
More: The Sunny Side of Eggs
|
<urn:uuid:e70e5e88-3bc2-4811-a696-004616addef5>
|
CC-MAIN-2016-26
|
http://www.active.com/nutrition/articles/the-superfoods-list-10-choices-for-race-season-success
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403508.34/warc/CC-MAIN-20160624155003-00023-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.947241 | 489 | 2.53125 | 3 |
Did you know you can access the Native Plant Information Network with your web-enabled smartphone?
Plant Identification Terminology: An Illustrated Glossary
Author(s): Harris, J. G. and Harris, M. W.
Publisher: Spring Lake Publishing, Payson, UT
Subject: Plant Identification
Comments: Contains an illustrated glossary of general botanical terms and also specific illustrated glossaries for roots, stems, leaves, surfaces, inflorescences, flowers and fruits.
Last Updated: 2008-08-23
Northeast Midatlantic Southeast Southwest Midwest Rocky Mountain California Northwest Hawaii Canada Mexico Texas
|
<urn:uuid:296ad5e4-c661-424f-82e2-622159f823a3>
|
CC-MAIN-2016-26
|
http://www.wildflower.org/bibliography/show.php?id=1212
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783394605.61/warc/CC-MAIN-20160624154954-00053-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.789491 | 125 | 2.71875 | 3 |
Andrew Fuller (1754-1815): A Brief Overview of His Life & Legacy
Andrew Fuller was an indefatigable Baptist theologian and pastor, an outstanding figure with qualities that make him one of the most attractive figures in Baptist history. Many in his day and after could echo the words of his very close friend William Carey, “I loved him.”
Self-taught when it came to theology, Fuller immersed himself in the works of Baptist and Puritan authors, including John Bunyan and John Gill, John Owen and Jonathan Edwards. Ultimately, though, it was to the Scriptures that he looked for his theological convictions.
His first major work, The Gospel Worthy of All Acceptation, which appeared in 1785 with a second edition in 1801, proved to be an epoch-making book that decisively refuted Hyper-Calvinism and laid the theological foundations for the modern missionary movement. In 1793 he issued an extensive refutation of Socinianism or Unitarianism, The Calvinistic and Socinian Systems examined and Compared, as to their Moral Tendency, which well displays the Christ-centered nature of eighteenth-century Evangelical thought. Fuller also published influential rebuttals of Deism and Sandemanianism, the latter an eighteenth-century form of “easy-believism.”
One other of Fuller’s literary works deserves mention. His Memoirs of the Rev. Samuel Pearce (1800), modeled after Jonathan Edwards’ life of David Brainerd, recounts the life of his close friend, Samuel Pearce of Birmingham, whose walk with God was admired by many in the nineteenth century. Fuller’s own spirituality, which was deeply indebted to the piety of Jonathan Edwards, also played a key role in shaping Baptist life in the years after his death. In addition to these literary projects Fuller was also a conscientious pastor and secretary of the Baptist Missionary Society. As a pastor-theologian, he is a great mentor for Baptists today.
It is clear that Fuller had remarkable stores of physical and mental energy that allowed him to accomplish all that he did. But it was not without cost to his body. In the last fifteen years of his life he was rarely well. He preached for the last time on 2 April 1815 and died 7 May of that year.
The importance of his theological achievements was noted during and after his life. The College of New Jersey (1798) and Yale (1805) both awarded him a DD, though he declined to accept either of them. C.H. Spurgeon did not hesitate to describe Fuller as “the greatest theologian” of his century, while the Southern Baptist historian A. H. Newman said that “his influence on American Baptists” was “incalculable.” Without a doubt, he was the most important theologian of the late eighteenth-century transatlantic Baptist community.
|
<urn:uuid:7689dda1-8b9a-4656-93cd-0d28fde5c8c6>
|
CC-MAIN-2016-26
|
http://www.andrewfullercenter.org/about/andrew-fuller/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396945.81/warc/CC-MAIN-20160624154956-00000-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.982285 | 599 | 2.5625 | 3 |
Summary: RNA-FISH is a FISH technique modified for studying RNA processing, and quantitation, and has also been used to determine allele-specific expression of genes. The RNA FISH technique requires the generation of a labeled probe, hybridization of the probe to a fixed sample, and subsequently, detection of the labeled probe using microscopy.
- RNA FISH on cultured cells in interphase (Epigenome Network of Excellence)
Fluorescence in situ hybridization (FISH) has become a widely used method in genome and molecular genetic studies. The technique is highly versatile and has been adapted to carry out genome-wide screenings, microarray quantifications, cancer cytogenetics analysis, and RNA expression and localization studies. The study of intracellular RNA localization using RNA FISH provides insights into the in situ physical characteristics of transcription and intracellular RNA transport in individual cells. In our lab, we use RNA FISH to detect the localization of Xist RNA, a nuclear non-coding transcript that coats the entire chromosome from which it is transcribed.
Added: Wed Feb 04 2009, Hits: 1017, Reviews: 0
- Single Cell Gene Expression Profiling: Multiplexed Expression Fluorescence in situ Hybridization (FI (Singer Lab, Yeshiva University)
Added: Sat Feb 21 2009, Hits: 1206, Reviews: 0
RNA Fish Protocol
(The Bird Lab, The University of Edinburgh)
Added: Wed Feb 04 2009, Hits: 2504, Reviews: 0
(Reijo Pera Lab, Stanford University)
Added: Wed Feb 04 2009, Hits: 1514, Reviews: 0
Sequential RNA and DNA fluorescence in situ hybridization (FISH)
(Epigenome Network of Excellence)
The most efficient way to map gene loci and their activity is sequential RNA and DNA FISH. This is an important technique to uncover how gene positioning is linked to activity.
Added: Wed May 27 2009, Hits: 785, Reviews: 0
|
<urn:uuid:6a4493dd-5141-4d47-95e3-75eb5370e397>
|
CC-MAIN-2016-26
|
http://www.protocol-online.org/prot/Genetics___Genomics/Cytogenetics/RNA-Fish/index.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395039.24/warc/CC-MAIN-20160624154955-00176-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.837405 | 417 | 3.0625 | 3 |
Along with the changing fall leaves, there's another thing Americans can count on each November -- the flood of electronics sales advertisements in our mailboxes, email spam filters and newspaper pages that presage Black Friday.
The low prices promised in these ads are meant to entice us to buy gadgets we don't really need, or, to replace gadgets that are still working with slightly newer versions.
As I explain in my new movie, The Story of Electronics, product designers and stuff-pushers call this "shortening the replacement cycle." That means, getting us to buy new stuff faster and faster. And with electronics, it's really tempting. It seems every few months a new version of my phone is out with more features.
And do we ever oblige. Industry analysts expect that Americans will spend more than $8.5 billion on consumer electronics this month alone!
But isn't that good for the economy? $8.5 billion dollars making the rounds? What's not to like?
Making all these gadgets takes an enormous environmental and public health toll. Mining the metals trashes the environment in communities from Congo to Indonesia; assembling the gadgets uses huge amounts of water and energy and exposes workers to a host of toxic chemicals; and getting rid of them when we're on to the next, newer, better model creates mountains of old electronics -- what's called e-waste.
In the U.S. we throw away about 400 million electronic gadgets each year -- more than one per person. Only about 20 percent of e-waste in the U.S. is collected for recycling; the rest goes to landfills and incinerators where the toxics leach out to contaminate our air, water and communities.
And the 20 percent destined for recycling isn't all that great either. Investigations have found that 50 to 80 percent of this stuff is shipped overseas to Asia and Africa where it is broken apart by workers to extract the small bits of valuable metals. In addition to those pieces of gold and copper, today's electronics routinely contain toxic chemicals like lead, mercury, PVC, chlorine, and bromines that end up poisoning workers and their communities in the importing country.
The good news is that while the production, consumption and disposal of short-lived, toxics-laden electronics are a really big problem, the solution is pretty simple: Make them Safe, Make them Last, and Take them Back.
MAKE THEM SAFE! We know it's possible to make electronics a whole lot less toxic because some companies are already moving in that direction. And the entire European Union has banned a host of toxic materials from all electronics sold there. If Europe can do it, why can't we?
MAKE THEM LAST! My friend says that the only consumer product with a shorter life span than a cell phone these days is an ice cream cone. Slight exaggeration, but if the current trajectory continues, we'll be there soon.
The average life of a cell phone in the U.S. these days is about 18 months, and the majority are chucked and replaced while they still work. The average laptop lasts longer -- about three to five years -- before being replaced, but that still leaves us throwing away more than 100,000 computers in the U.S. every day. In addition to making them safer, companies need to make electronics more durable, and modular, so we can upgrade or repair components as needed, rather than chuck the whole thing to buy another.
TAKE THEM BACK! Innovations in reducing toxics, design for recyclability and modular components for easier upgrades are all great for new gadgets, but what about the millions stored in all of our basements, closets, drawers and garages? Those are eventually going to be tossed out, leaving local governments to figure out how to deal with them safely. Unless, that is, we get better Product Take Back laws.
Take Back holds manufacturers responsible for their products at the end of their useful life, preventing them from externalizing the cost of recycling or disposing of these hazardous products onto local governments, communities and the environment. Why should taxpayers pay to safely recycle every toxic, poorly designed, short-lived piece of electronic gadgetry that comes through the system? That's like being an enabler in a dysfunctional relationship. It is time we hold electronics manufacturers responsible for their product design decisions.
Everyone has a role to play in solving this problem. You can resist the upgrade, take good care of your electronics, make them last as long as possible and, when you finally have to throw them out, find an E-stewards certified recycler to take it.
Federal and state governments can enact and enforce meaningful laws to protect worker health and the environment and to prohibit hazardous waste exports to developing countries.
Local governments can stop acting as the electronics industry's garbage man by forcing companies to deal with their own mess.
And businesses can invest as much or more in making their products safe and durable as they do in other areas of innovation.
Billions of us want access to the incredible web of information and entertainment that electronics offer. But it's the access we want, not all that toxic garbage.
So let's send the "design-for-the-dump" mentality to the dump where it belongs and start building an electronics industry -- and a global society -- that's designed to last.
|
<urn:uuid:11213019-627c-44a6-8808-f4901c5dcdaa>
|
CC-MAIN-2016-26
|
http://www.huffingtonpost.com/annie-leonard/the-story-of-electronics_b_780978.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402699.36/warc/CC-MAIN-20160624155002-00173-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.950511 | 1,100 | 2.578125 | 3 |
The remains of an ancient gate have pinpointed the location of the biblical city Sha'arayim, say archaeologists working in Israel.
In the Bible young David is described as battling Goliath in the Elah Valley near Sha'arayim. The fortified gate at the Elah Fortress—the second to be found at the site—proves the existence of Sha'arayim, which means "two gates" in Hebrew, said Hebrew University archaeologist Yosef Garfinkel.
In October, Garfinkel revealed a 3,000-year-old pottery shard with text believed to be Hebrew—then hailed by some as the most important archaeological discovery in Israel since the Dead Sea Scrolls. see: Oldest Possibly Hebrew Inscription Found outside Jerusalem
|
<urn:uuid:d1ef085e-7d99-4d30-80bc-c8ef292b84a0>
|
CC-MAIN-2016-26
|
http://www.biblearchaeology.org/post/2008/12/01/David-and-Goliath-City-Found-in-Israel.aspx
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397695.90/warc/CC-MAIN-20160624154957-00054-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.912555 | 156 | 3.015625 | 3 |
A soft drink containing a high percentage of sugar, caffeine, or another stimulant, typically consumed during or after sporting activity or as a way of overcoming tiredness.
- The majority of the players will drink water, some an energy drink.
- That night, participants were being asked to gauge their interest in a new energy drink.
- One-quarter of all boys aged 12 to 18 have at least one energy drink a day.
For editors and proofreaders
Line breaks: en¦ergy drink
Definition of energy drink in:
What do you find interesting about this word or phrase?
Comments that don't adhere to our Community Guidelines may be moderated or removed.
|
<urn:uuid:ac8b4a50-4eaa-42b3-be2e-aeff3a247f16>
|
CC-MAIN-2016-26
|
http://www.oxforddictionaries.com/definition/english/energy-drink
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783400031.51/warc/CC-MAIN-20160624155000-00094-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.942309 | 141 | 2.953125 | 3 |
The Provisional Atlas of the UK's Larger Moths, published in December, is based on the first 11 million moth records collated by the National Moth Recording Scheme and represents a landmark in moth recording.
The Provisional Atlas shows up-to-date distribution maps for all 868 naturally-occurring resident and immigrant macro-moth species in the UK, Isle of Man and Channel Islands. This is the first atlas to cover all the UK’s larger moths and it includes the first distribution maps ever published for c.300 species (the Geometrids), as well as the first new maps for over 20 years for other species. As such it is a major step forward in our knowledge of moth distributions and a ‘must have’ for moth recorders. The maps include historical records (pre 2000) and current records (2000 onwards).
The production of the atlas is a major step towards helping our declining moth fauna and analyses of the data will follow in due course. The maps illustrate under-recorded areas and will enable targeted recording and improved knowledge and conservation.
|
<urn:uuid:490fdda5-e494-42c9-abf2-f0c7dc1cbbcc>
|
CC-MAIN-2016-26
|
http://www.mothscount.org/text/103/provisional_atlas_of_moths.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783408828.55/warc/CC-MAIN-20160624155008-00121-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.944632 | 226 | 2.90625 | 3 |
OSH Answers Fact Sheets
Easy-to-read, question-and-answer fact sheets covering a wide range of workplace health and safety topics, from hazards to diseases to ergonomics to workplace promotion. MORE ABOUT >
What is Clostridium difficile?
Clostridium difficile (also known as C. difficile) is a bacterium associated with diarrhea and intestinal inflammation among patients or residents in health care facilities. The disease is called Clostridium difficile-associated disease (CDAD). The elderly, patients taking antibiotics, or people who have serious health conditions (e.g. immune-compromised patients) may be at risk of contracting Clostridium difficile-associated disease.
Who gets Clostridium difficile-associated disease?
Healthy people are usually not affected by Clostridium difficile. People who have other conditions and use antibiotics are at risk of developing Clostridium difficile diarrhea. The use of antibiotics can change the levels of good microorganisms found in the intestines. When there are fewer good microogranisms, Clostridium difficile can produce toxins that lead to an infection.
What are the symptoms?
The symptoms of Clostridium difficile-associated disease include:
- watery diarrhea
- loss of appetite
- abdominal pain and tenderness
In rare cases, Clostridium difficile can cause death. Commonly, the infection causes diarrhea, which can lead to complications such as dehydration.
How is Clostridium difficile transmitted?
Clostridium difficile is present in feces. It is spread from person to person through hand contact. Clostridium difficile may be transferred to patients via the hands of health care personnel who had contact with contaminated patients or their feces.
People can become infected if they touch objects or surfaces that are contaminated with feces and them touch their mouth.
How can Clostridium difficile transmission be prevented in hospitals and other health care settings?
Frequent hand washing (with soap and water) is an effective way to prevent the spread of the bacteria. Use alcohol-based hand rubs if soap and water is not available.
Health care workers who care for symptomatic patients should use "contact precautions" in addition to routine practices, and follow infection prevention and control guidance as outlined by the Public Health Agency of Canada guidelines:
- Clostridium difficile Infection: Infection Prevention and Control Guidance for Management in Acute Care Settings
- Clostridium difficile Infection: Infection Prevention and Control Guidance for Management in Long-term Care Facilities
For example, the following precautions should be taken:
- Wash hands frequently between entering patients' rooms.
- Use gloves during patient's care.
- Use gowns if contact with the patient or surfaces is expected.
- Dedicate equipment for use with that patient only, or cleaned and disinfected before use with another patient.
- Surfaces in the room should be cleaned at least twice daily and when soiled. Pay particular attention to "high touch" areas (patient bathroom, light switches, hand rails, bedside tables, etc.).
- Continue these precautions until diarrhea has resolved or according to your provincial/territorial/organization's guidelines.
Although every effort is made to ensure the accuracy, currency and completeness of the information, CCOHS does not guarantee, warrant, represent or undertake that the information provided is correct, accurate or current. CCOHS is not liable for any loss, claim, or demand arising directly or indirectly from any use or reliance upon the information.
|
<urn:uuid:098c9be9-a85c-4545-a916-013b836584b7>
|
CC-MAIN-2016-26
|
http://www.ccohs.ca/oshanswers/biol_hazards/clostridium_difficile.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402516.86/warc/CC-MAIN-20160624155002-00166-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.911286 | 768 | 3.890625 | 4 |
The point of pi day? To celebrate pi, of course. That means reading about pi-related mathematical strangenesses, buying pi-related merchandise, and of course, eating pie.
Or in the words of Bill Amend on Twitter: “Pi Day: a day for people of the world to put aside their differences, join hands in a big circle and then calculate the circumference.” To at least 10 decimal places, Bill.
And if, after all that, you still need convincing that we should celebrate pi’s existence, consider this mathematical wonder: 1337 (the number of the ‘leet) multiplied by pi equals: 42 (the answer to Life, the Universe and Everything). QED.
More on TIME.com:
|
<urn:uuid:127201f2-43b3-4318-8632-c67b2871ce24>
|
CC-MAIN-2016-26
|
http://techland.time.com/2011/03/14/celebrate-pi-day-by-the-numbers/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393093.59/warc/CC-MAIN-20160624154953-00002-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.915119 | 156 | 2.6875 | 3 |
According to Edmund Burke, "There is but one law for all the law of humanity, justice, equity " Maybe, in some fundamental sense, but the question in reality becomes complicated when looked at closely. And research into one aspect of fairly recent international efforts to enforce such a "law of humanity" has given rise to a new subdiscipline in the study of international relationsthe study of humanitarian intervention.
Professor Ivan Shearer of the U. S. Naval War College notes that there are at least ten kinds of fairly unremarkable actions that can be termed outside intervention in a nations sovereignty short of out-and-out invasion (see his paper below). Sometimes called Military Operations Other than War, with the faintly droll acronym MOOTW, for the most part these intrusions do not directly involve the use of force against the government concerned and thus are not always notably controversial. Included under this heading would be disaster relief, peacekeeping, hostage rescue, counter-drug operations, humanitarian assistance, and the like.
Another type of foreign intervention for benevolent purposes definitely does occasion controversy. I refer to the kind of action that has come to be included under the rubric of humanitarian intervention, the subject of the conference report and papers which we present below. The Foreign Policy Research Institute and Duke University each hosted gatherings in recent months this year to consider at length questions of legality and morality in humanitarian intervention. American Diplomacy is pleased to share with you, the reader, some of the findings made at those two important conferences.
We come to a crucial definition for the benefit of the nonspecialist like myself: In its most precise meaning humanitarian intervention, as I understand it from the literature Ive seen, is the use of external military force against a sovereign state to stop its government from mistreating its own citizens. Using force to halt violations of human rights would be another way of putting it. Such contentious circumstances, those which involve fundamental issues of human rights vs. national sovereignty, obviously carry considerable potential for dispute and debate. Read on for a scholarly examination of those disagreements and complications.
The published literature on humanitarian intervention is of relatively recent vintage, but is already large and growing fast. For anyone interested, see the links to previously published related articles in American Diplomacy. Check out the search function on the electronic version of Foreign Affairs. Brown University has a Web site on the topic.
But as recently as 1995-1996, dictionaries in the fields of international relations and organizations, and even in multinational peacekeeping, did not include entries on humanitarian intervention as such. It has been only more recently that the phrase has become widely recognized and frequently included in the titles of scholarly studies.
A postscript of possible interest to those interested in the small details of history: American establishment figures Bernard Baruch and Walter Lippmann long vied for recognition as the coiner of the very familiar phrase, the Cold War. It has long meant little to anyone else, however, which of those gentlemen used it first in public.
Who originated the humanitarian intervention phrase in its current meaning? Some sources give credit to Professor Mario Bettati of the University of Paris, along with French politician Bernard Kouchner, one of the founders of Médecins sans Frontières; they are said to have enunciated the concept in the late 1980s. Professor Fernando Tesón published his Humanitarian Intervention: An Inquiry into Law and Morality in 1988. Are there others who could be cited before them? Let me know if you are aware of earlier claimants to the distinction of coining the phrase. Im curious.
|
<urn:uuid:b771cc7c-0f42-4803-aa48-49b52665aa06>
|
CC-MAIN-2016-26
|
http://www.unc.edu/depts/diplomat/archives_roll/2001_07-09/hum_intervention/hum_01_editor.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783404405.88/warc/CC-MAIN-20160624155004-00155-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.956519 | 727 | 2.609375 | 3 |
What is a Virtual School?
Virtual schooling is a relatively new concept that allows your child to attend school from home, with certified teachers and a set curriculum. Three out of four school districts provide a virtual schooling option, and many states run virtual schools that abide by the rules and regulations governing traditional public schools. As with any schooling option, there are pros and cons; and when you’re determining whether or not virtual schooling is right for your child, it’s best to take a look at your child’s personality and learning style.
About Virtual Schools
Virtual schooling is one of the fastest growing education opportunities for students in grades K-12. Currently, about 40 states participate in some form of online learning or virtual schooling, with 30 of those states offering full-time options. Most virtual schools are tuition free and run by a state initiative, though there are private virtual schools that offer a more diverse course curriculum and have some fees associated with them.
There are several advantages involved with online virtual educations. In general, students who attend virtual schools tend to receive high scores on standardized tests; and virtual schools are held to the same accreditation and regulations as traditional public schools. Virtual schools:
- meet state and federal requirements for education standards.
- allow students to learn in a comfortable environment, with the support of a qualified teacher.
- involve parents in their child’s education.
- provide a great option for homebound children, due to handicap or other circumstances.
- lessen the chance of bullying and other uncomfortable social circumstances.
- allow students to attend extracurricular activities and field trips planned by the school.
- provide one-on-one communication and instruction from a teacher.
- allow students to work at their own pace, without being left behind or becoming bored with concepts.
- if run by the state, are free for students in a specific geological area.
While virtual schools offer many pros for students, some of the requirements and standards may be considered cons, such as the:
- attendance requirements.
- minimal amount of social interaction the child will receive, in comparison to a traditional school.
- self-start attitude and attention to detail that the child is required to have.
- computer and other technological requirements, which are supplied by the family.
Some Cautions Regarding Virtual Schools
When considering a virtual school, parents should first speak to their school board about the options their district offers. When choosing and enrolling in a virtual school, make sure the program is accredited and will provide your children with the education required by state and federal laws.
|
<urn:uuid:0a42c137-d88b-49e3-9964-0fecab2742b1>
|
CC-MAIN-2016-26
|
http://www.everydayfamily.com/what-is-a-virtual-school/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783404826.94/warc/CC-MAIN-20160624155004-00100-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.955788 | 534 | 3.140625 | 3 |
by Ron Kurtus (revised 26 August 2014)
Antiparticles are subatomic particles that have the same mass and characteristics of a standard particle, except that they have the opposite electric charge. For example, an antiproton is just like a proton, except that it has a negative (−) electric charge instead of a positive (+) charge.
Antiparticles can be created from high-energy collisions and through radioactive decay. When antiparticles come in contact with their counterpart particles of matter, they often annihilate each other and give off energy in the form of radiation. The PET scan is an application of antiparticles in the area of health care.
Questions you may have include:
- What are the major antiparticles?
- How are they created and destroyed?
- Is there a practical use for antiparticles?
This lesson will answer those questions. Useful tool: Units Conversion
Subatomic antiparticles include the positron, antiquark, antiproton and antineutron, as well as other minor particles such as the antineutrino.
The positron is the antiparticle of an electron.
The electron is considered a fundamental subatomic particle. That means it is not made up of smaller particles. The electron has a negative (−) electrical charge.
A positron is the name of an antielectron. It has the same mass as an electron, except that it has a positive (+) electrical charge.
Another fundamental subatomic particle is the quark. There are two types of quarks, the up quark and down quark.
The up quark has an electrical charge of (+2/3). The anti-up quark has an electrical charge of (-2/3).
The down quark has an electrical charge of (-1/3). The anti-down quark has an electrical charge of (+1/3).
NOTE: When electrical charges were defined, the charge of an electron was assigned as (+1) and that of a proton as (-1). That has already caused confusion in the flow of electricity. But now it is found that quarks have a fraction of that unit charge. Thus, we see a quark has electrical charges of 1/3 and 2/3, which are not very intuitive.
The protons and neutrons that make up the nucleus of an atom were once thought of as fundamental subatomic particles. It has been shown that they are actually made up of quarks.
The proton is made up of two up quarks and one down quark. The electrical charge of the proton is then: (+2/3) + (+2/3) + (-1/3) = (+1).
The antiproton is made up of two up antiquarks and one down antiquark. The electrical charge of the antiproton is then: (-2/3) + (-2/3) + (+1/3) = (-1).
The neutron is made up of one up quark and two down quarks. The resulting electrical charge of the neutron is: (+2/3) + (-1/3) + (-1/3) = (0).
The antineutron is made up of one anti-up quark and two anti-down quarks. The resulting electrical charge of the neutron is: (-2/3) + (+1/3) + (+1/3) = (0).
Formation and destruction
Antiparticles occur in nature or can be created with nuclear accelerators. Collisions between antiparticles and particles of matter result in energy being given off in the form of radiation.
Creation of antiparticles
Radioactive decay of an unstable isotope can create antiparticles in some situations. For example, Carbon-11 is a radioactive isotope of carbon that decays into Boron-11 by giving off a positron.
Antiparticles are formed naturally in space and on the various suns or stars in the Universe as a result of high-energy particle collisions. High-energy cosmic rays from space strike atoms in the atmosphere and create antiparticles. They quickly collide with matter articles and annihilate.
High-powered nuclear accelerators also are used to create extremely small amounts of antiparticles.
Collision of particle and antiparticle
When one antiparticle interacts with an equivalent particle, an enormous amount of energy is given off in the form of electromagnetic radiation or its equivalent photon particles. The totality of the mass of the two particles is converted into electromagnetic energy through Einstein's famous E = mc² equation. The electromagnetic radiation consists of gamma rays, which have a shorter wavelength and higher energy than x-rays.
The radiation consists photons that are moving in opposite directions at the speed of light. They move in the opposite direction to fulfill the Law of Conservation of Momentum, resulting in zero change in momentum. As more antiparticles interact, the photons become considered as a waveform or gamma rays.
Uses of antiparticles
The most common use of antiparticles is in Positron Emission Tomography (PET), which is a medical scan of body areas that can produce 3-dimensional pictures of their functions.
The way this works is that radioactive isotopes, such as Carbon-11 or Oxygen-15 are mixed with in a special solution and injected into the person's blood stream. The solution then collects in an area of interest, such as a suspected cancer tumor.
(See Isotopes in the Chemistry lesson for more information.)
The isotopes have a half-life of several minutes, meaning that 1/2 of them will decay within that time. These specific radioactive isotopes give off a positron when they decay. When the positron collides with an electron in the body, they annihilate each other, and give off high energy gamma rays in opposite directions. By collecting data from detected gamma rays—which are similar to high energy x-rays—a computerized images of the tumor area can be created.
Antiparticles have the same mass and characteristics of a standard subatomic particles, except that they have the opposite electric charge. The positron, antiproton and antineutron are common antiparticles. They are created from high-energy collisions and from radioactive decay.
When antiparticles come in contact with particles of matter, they give off energy in the form of radiation. A PET scan is an application of antiparticles in the area of health care.
Examine the impossible
Resources and references
Antiparticles - HyperPhysics
Antiparticle - Wikipedia
Particle/Anti-Particle Annihilation - Matt Strassler, Physicist
Electron–positron annihilation - Wikipedia
Particle–antiparticle annihilation - Wikipedia
Antimatter - CERN Partical Accelerator
Anitmatter - Wikipedia
The five greatest mysteries of antimatter - New Scientist Magazine
Questions and comments
Do you have any questions, comments, or opinions on this subject? If so, send an email with your feedback. I will try to get back to you as soon as possible.
Click on a button to bookmark or share this page through Twitter, Facebook, email, or other services:
Students and researchers
The Web address of this page is:
Please include it as a link on your website or as a reference in your report, document, or thesis.
Where are you now?
|
<urn:uuid:88689708-ce2a-4103-84e0-46d9ec8130c3>
|
CC-MAIN-2016-26
|
http://www.school-for-champions.com/science/antiparticles.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783392527.68/warc/CC-MAIN-20160624154952-00114-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.914143 | 1,524 | 3.96875 | 4 |
A resignation letter is a kind of a business or formal letter which is written by a person who is resigning from a company or a working organisation on his own free will. These letters are used to give his/her reason for resigning from work and asking for the permission of the employer to resign from the job position he/she was working on. A resignation letter is a formal kind of a letter which is used quite widely. There are many different types of resignation letters which are categorised based upon the position of resigning, reason for resigning etc. The following is a detailed description of the different types of resignation letters:
- Simple resignation letters-a simple resignation letter is one in which the reason for resigning is put simply and no out of the context point or detail is mentioned. These are formal letters which form one of the most widely used resignation letters.
- Short notice resignation letters- short notice resignation letters are those types of resignation letters that are used by a person who wishes to resign from work on a short notice. In these cases, the person has to resign due to some urgent reason and doesnt have the time to give notice prior to the resignation date.
- Professional resignation letters-these types of resignation letters are written in a very professional and strictly formal manner. A professional resignation letter states the reason for resigning, date of resigning, experience at work etc in a precise way.
- No notice resignation letters- a no notice resignation letter is a kind of a resignation letter which is used in the case when the employee immediately resigns from work without any prior notice or information. These types of letters are used in extremely urgent situations where the sender doesnt get an advanced time to ask for permission of the employer.
|
<urn:uuid:a1d9e415-2af2-4311-9c08-c9b7c33485c4>
|
CC-MAIN-2016-26
|
http://www.sampleletters.org.uk/different-type-resignation-letters.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395346.6/warc/CC-MAIN-20160624154955-00199-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.952257 | 351 | 2.875 | 3 |
18.104.22.168 Satellite Cloud Observations
Since the TAR, there has been considerable effort in the development and analysis of satellite data sets for documenting changes in global cloud cover over the past few decades. The most comprehensive cloud climatology is that of the International Satellite Cloud Climatology Project (ISCCP), begun in July 1983. The ISCCP shows an increase in globally averaged total cloud cover of about 2% from 1983 to 1987, followed by a decline of about 4% from 1987 to 2001 (Rossow and Dueñas, 2004). Cess and Udelhofen (2003) documented decreasing ISCCP total cloud cover in all latitude zones between 40°S and 40°N. Norris (2005a) found that both ISCCP and ship synoptic reports show consistent reductions in middle- or high-level cloud cover from the 1980s to the 1990s over low- and mid-latitude oceans. Minnis et al. (2004) also found consistent trends in high-level cloud cover between ISCCP and surface observations over most areas, except for the North Pacific where they differed by almost 2% per decade. In addition, an analysis of Stratospheric Aerosol and Gas Experiment II (SAGE II) data revealed a decline in cloud frequency above 12 km between 1985 and 1998 (Wang et al., 2002b) that is consistent with the decrease in upper-level cloud cover noted in ISCCP and ocean surface observations. The decline in upper-level cloud cover since 1987 may also be consistent with a decrease in reflected shortwave (SW) radiation during this period as measured by the Earth Radiation Budget Satellite (ERBS; see Section 3.4.4). Radiative transfer calculations, which use the ISCCP cloud properties as input, are able to independently reproduce the decadal changes in outgoing LW and reflected SW radiation reported by ERBS (Zhang et al., 2004c).
Analyses of the spatial trends in ISCCP cloud cover reveal changing biases arising from changes in satellite view angle and coverage that affect the global mean anomaly time series (Norris, 2000; Dai et al., 2006). The ISCCP spurious variability may occur primarily in low-level clouds with the least optical thickness (the ISCCP ‘cumulus’ category; Norris, 2005a), due to discontinuities in satellite view angles associated with changes in satellites. Such biases likely contribute to ISCCP’s negative cloud cover trend, although their magnitude and impact on radiative flux calculations using ISCCP cloud data are not yet known. Additional artefacts, including radiometric noise, navigation and rectification errors are present in the ISCCP data (Norris, 2000), but the effects of known and unknown artefacts on ISCCP cloud and flux data have not yet been quantified.
Other satellite data sets show conflicting decadal changes in total cloud cover. For example, analysis of cloud cover changes from the HIRS shows a slight increase in cloud cover between 1985 and 2001 (Wylie et al., 2005). However, spurious changes have also been identified in the HIRS data set, which may affect its estimates of decadal variability. One important source of uncertainty results from the drift in Equatorial Crossing Time (ECT) of polar-orbiting satellite measurements (e.g., HIRS and the Advanced Very High Resolution Radiometer; AVHRR), which aliases the large diurnal cycle of clouds into spurious lower-frequency variations. After correcting for ECT drift and other small calibration errors in AVHRR measurements of cloudiness, Jacobowitz et al. (2003) found essentially no trend in cloud cover for the tropics from 1981 to 2000.
While the variability in surface-observed upper-level cloud cover has been shown to be consistent with that observed by ISCCP (Norris, 2005a), the variability in total cloud cover is not, implying differences between ISCCP and surface-observed low cloud cover. Norris (2005a) shows that even after taking into account the difference between surface and satellite views of low-level clouds, the decadal changes between the ISCCP and surface data sets still disagree. The extent to which this results from differences in spatial and temporal sampling or differences in viewing perspective is unclear.
In summary, while there is some consistency between ISCCP, ERBS, SAGE II and surface observations of a reduction in high cloud cover during the 1990s relative to the 1980s, there are substantial uncertainties in decadal trends in all data sets and at present there is no clear consensus on changes in total cloudiness over decadal time scales.
|
<urn:uuid:f3cca1ae-5232-4b93-9afb-ae7a979ab65e>
|
CC-MAIN-2016-26
|
http://www.ipcc.ch/publications_and_data/ar4/wg1/en/ch3s3-4-3-2.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397749.89/warc/CC-MAIN-20160624154957-00161-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.920902 | 956 | 3.03125 | 3 |
November 15, 2010
NASA Discovers Youngest Black Hole Neighboring Earth
NASA announced on Monday that its Chandra X-ray Observatory has discovered the youngest black hole known to exist in our cosmic neighborhood.
The 30-year-old black hole, known as Supernova 1979C (SN 1979C), is about 51 million light years from Earth and occurred in galaxy M-100. Chandra has revealed a bright source of X-rays that has remained steady during observation from 1995 to 2007. This data suggests that the object is a black hole being fed either by material falling into it from the supernova or a binary companion."If our interpretation is correct, this is the nearest example where the birth of a black hole has been observed," said Daniel Patnaude of the Harvard-Smithsonian Center for Astrophysics in Cambridge, Mass. who led the study.
The scientists believe that SN 1979C formed when a star about 20 times more massive than the sun collapsed.
Many black holes are thought to form because of gamma-ray bursts (GRBs). However, SN 1979C is different because it belongs to a class of supernovas unlikely to be associated with a GRB.
SN1979C was a supernova type 2 linear, which is rare subclass of core-collapse supernova. This type of supernova results from the internal collapse and violent explosion of a massive star. A star must have at least 9 times the mass of the Sun in order to undergo this type of core-collapse.
"Only a small fraction of them probably produce black holes in their center," said Alex Filippenko, an astrophysicist from the University of Berkley.
NASA said at a press conference on Monday that they know of several dozen black holes in our Milky Way galaxy, but they do not know the ages.
NASA said that SN 1979C is the nearest example where the birth of a black hole has been observed.
"This may be the first time the common way of making a black hole has been observed," said co-author Abraham Loeb, also of the Harvard-Smithsonian Center for Astrophysics. "However, it is very difficult to detect this type of black hole birth because decades of X-ray observations are needed to make the case."
It is also a possibility that SN 1979C is a young neutron star with a powerful wind of higher energy particles. This would make SN 1979C the youngest and brightest example of such a "pulsar wind nebula" and the youngest known neutron star. The Crab pulsar is about 950 years old.
"It's very rewarding to see how the commitment of some of the most advanced telescopes in space, like Chandra, can help complete the story," said Jon Morse, head of the Astrophysics Division at NASA's Science Mission Directorate.
Image Credits: X-ray: NASA/CXC/SAO/D.Patnaude et al, Optical: ESO/VLT, Infrared: NASA/JPL/Caltech (more information)
On the Net:
- For more information about NASA's Chandra X-ray Observatory, visit: http://www.nasa.gov/chandra and http://chandra.harvard.edu
|
<urn:uuid:65d9d79e-e0d9-4905-89e8-4e10b1acc337>
|
CC-MAIN-2016-26
|
http://www.redorbit.com/news/space/1950504/nasa_discovers_youngest_black_hole_neighboring_earth/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397748.48/warc/CC-MAIN-20160624154957-00164-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.936505 | 663 | 3.421875 | 3 |
In light of the anniversary of the beginning of the First World War, on the 28 July 1914, a selection of German Expressionist prints and works on paper by Erich Buchholz are on display at the Queensland Art Gallery (QAG) until September 2014.
In the early decades of the twentieth century, a number of German artists began to employ a technique of intensely expressive brushstrokes and strong outlines, often violently distorting representational forms, in order to represent the dramatic tensions arising from conflict within the artist’s psyche and the world at large. Although an ‘expressionist’ art had emerged simultaneously in several northern European centres in the late 19th century, there was no unified style or theoretically defined goals until the term ‘Expressionism’ became associated with a number of artistic groups that flourished in Imperial Germany prior to the outbreak of World War One. Artists associated with Expressionism were unified by a pervasive loss of faith in the prevailing social order and a belief that the existential void this created could be filled with art.
The artistic group Die Brücke (meaning ‘the bridge’) was founded by Erich Heckel (1883–1970), Ernst Ludwig Kirchner (1880–1938) and others in Dresden, c.1905. Following the group’s move to Berlin in 1911, Brücke artists drew increasingly on contemporary social themes in which aspects of city life were used to illustrate the human condition under extreme stress prior to the outbreak of war.
Conversely, the artists who formed Der Blaue Reiter (‘the blue rider’) – active in Munich between 1911 and 1914 – believed art was a means to express individual inner desires, to establish a cult of nature and mysticism. For founding members Vassily Kandinsky (1866–1944) and Franz Marc (1880–1916), this spirituality became the basis for a move towards an increasingly abstract art.
Also on display is a selection of works by German abstractionist Erich Buchholz. Buchholz moved to Berlin in 1915 and studied briefly with Expressionist artist Lovis Corinth (1885–1925), before being conscripted into the German military. Despite his early involvement with Berlin artists renowned for their scathing social commentaries, and the visual similarities with the non-objective abstraction of Suprematism and Constructivism, which arose concurrently in revolutionary Russia, it was the Munich-based group Der Blaue Reiter that most influenced Buchholz’s artistic development. The vivid colour and rhythmic, geometric forms of Franz Marc’s pantheistic paintings and woodcuts, and Vassily Kandinsky’s theories on music and spirituality in art –visually expressed with geometric forms such as triangles, circles and pyramids – led to Buchholz’s creation of a holistic system of geometric abstraction in Germany following World War One.
|
<urn:uuid:b93149c6-af19-4097-98d0-042505f22ce8>
|
CC-MAIN-2016-26
|
http://blog.qag.qld.gov.au/the-expressionists-world-war-one-and-its-aftermath/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395621.98/warc/CC-MAIN-20160624154955-00039-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.943426 | 602 | 3.203125 | 3 |
Medicine Bluffs - Fort Sill, Oklahoma
Posted by: gparkes
N 34° 41.127 W 098° 24.925
14S E 553547 N 3838317
Quick Description: Medicine Bluffs is considered a sacred place to the Indian tribes that frequent the area.
Location: Oklahoma, United States
Date Posted: 12/31/2009 10:28:59 PM
Waymark Code: WM8018
The Medicine Bluffs
A Registered National Historic Site
This Unique Landmark at the eastern end of the Wichita Mountains was noted, described, and explored by all early expeditions and was held in deep reverence by the Indian tribes of this area from time immemorial. The four contiguous porphyry bluffs form a picturesque a mile in length on the south side of Medicine Bluff Creek, a tributary of Cache Creek and Red River. It is evidently the result of an ancient cataclysm in which half of a rock dome was raised along a crack or fault.
When Fort Sill was established in 1869, the Indians named it “The Soldier House at Medicine Bluffs.” The site is rich in legends and history.
You are facing the north side of bluff no. 3, which consists of a sheer cliff 310 feet high, rising abruptly from the creek. A rock cairn erected by medicine men on its summit was still standing when Fort Sill was founded. Here the sick were brought to be healed or disposed of by the Great Spirit, young braves fasted in lonely vigils seeking visions of the supernatural, and warriors presented their shields to the rising sun for power. Legends say that this was also a famous place for Indian suicides. The huge fissure between bluffs no. 2 and 3 was known as the “Medicine Man’s Walk.”
There are several sites, including this one, to visit on Fort Sill. Visitors to the historic sites at Fort Sill should plan on visiting the Fort Sill Museum. There visitors can get a handout with directions to all of the sites.
|
<urn:uuid:bbe0b505-83c5-4c4d-a5fb-5c67b00130c8>
|
CC-MAIN-2016-26
|
http://www.waymarking.com/waymarks/WM8018_Medicine_Bluffs_Fort_Sill_Oklahoma
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395548.53/warc/CC-MAIN-20160624154955-00139-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.958892 | 433 | 2.59375 | 3 |
IT’S recognised the world over – but the Union flag could be one of the most high-profile casualties if Scotland chose to break away from the United Kingdom.
The exuberant flag waving during the extended bank holiday weekend was a very visible display of the royal patriotism that swept large parts of the country during the Queen’s Diamond Jubilee celebrations.
And it was also an incredible international advert for Britain.
Bunting adorned lampposts, windowsills, dog collars and taxis – and will probably remain there until well after the Olympics.
One flagmaker boasted that they had sold 3500 miles worth of Union flag bunting – enough to stretch from London to Athens and back again.
Meanwhile, Scotland, where celebrations were more muted, looked on slightly bewildered at the sea of red, white and blue.
But what would happen to the St Andrew’s blue in the Union flag should Scotland leave the Union?
The question hasn’t exercised our heraldry experts too much until now.
An official from the Court of the Lord Lyon, the heraldic authority for Scotland, said: “It would be speculation at this stage, and we could only cross that bridge if we came to it.”
The Lord Lyon King of Arms is also responsible for State Ceremonial in Scotland.
He makes the rules on who should fly the Lion Rampant, widely adopted by the Tartan Army as one of their banners.
Its correct use, the Lord Lyon will point out, is restricted to only a few Great Officers who officially represent the Sovereign, including the First Minister as Keeper of the Great Seal of Scotland.
The SNP’s position, articulated by Alex Salmond, is that as well as keeping the Lion Rampant and the Queen as monarch, a separate Scotland would have the Saltire, the flag of the patron saint of Scotland, as its official flag.
But would that leave the Union flag drained of the Pantone 300 St Andrew’s blue?
It sounds unthinkable but it could be a serious possibility.
The Union flag – it is only the Union Jack at sea – came into being in 1606, three years after the Union of the Crowns under James VI and I.
Scots complained about England’s St George’s Cross overlaying the diagonal St Andrew’s Cross of
An unofficial Scots Union flag, with St Andrew’s Cross to the fore, was used until the Union of the parliaments in 1707, when Queen Anne and the Privy Council overruled any objections.
Having had a Scottish royal house rise to their throne, English identity was so fragile that initial popular opinion regarded the Union flag as symbolising the takeover of England by the Scots.
The current Union flag design dates from 1801, when another Act of Union merged Great Britain with Ireland.
The red diagonal St Patrick’s Cross was incorporated into the flag – inside the white of the St Andrew’s Cross.
When the Irish Free State was established in 1921, there was speculation that the flag would have to be altered again.
But the St Patrick’s Cross had not been particularly associated with Irish nationalism.
And in recognition of Northern Ireland remaining in the UK – and not least the estimated £2million cost of altering all the official flags – it was decided that the Union flag would stay as it was.
If Scots vote for independence in the 2014 referendum, there’s little doubt the Saltire will be the country’s national flag.
And that means the problem of what to do with the Union flag would be one for English
heraldic experts to solve.
At the College of Arms in London, the part of the Royal Household responsible for heraldry of the realm, they’re not looking to come up with an answer just yet.
But Richmond Herald Clive Cheesman admitted: “The story of the make-up of
the Union flag is so well known that it would be difficult to plough on with it if Scotland were to sever completely with the UK.
“The change would have to be made by sovereign prerogative or by an Act of Parliament.
“But if the departure of Scotland were clean and neat there is a very strong argument in favour of changing it. Many people would feel it would be wrong for the flag to remain unchanged.”
But there would be “an awful lot of headscratching”, according to Cheesman – and the Government, Commonwealth, armed forces and the British public would all have to be consulted.
Cheesman said: “I don’t think you could just strip out the white saltire and the blue of St Andrew’s.
“It could work but a lot of people would object to the changing of such an iconic design.”
|
<urn:uuid:bf8a3ea2-597d-4aff-9697-a1556843161c>
|
CC-MAIN-2016-26
|
http://www.dailyrecord.co.uk/news/uk-world-news/would-the-blue-have-to-be-taken-out-of-union-1128610
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397744.64/warc/CC-MAIN-20160624154957-00101-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.966715 | 1,011 | 2.53125 | 3 |
The Hindu temple contains two shrines, both to men who were once Muslims. As I write last statement this I realize that the two religious categories mentioned here – Hindu and Muslim actually make little sense. The fact remains that neither the word Hindu nor the word Muslim used here describes a set of clear, precise, differentiated, and orthodox ideas of the two religions. Here, in the village of Deoli, deep in the heart of Eastern Maharashtra where I have been traveling for some weeks, one comes face to face with the realization that these definitional categories hide more than they reveal.
More importantly, that by labeling someone as Muslim or Hindu tells us almost nothing about their life, values, experiences and outlook. It may not even tell us that they are followers of even the basic and simple tenets of the religion. And most importantly, it does not tell us how the lived practice of the religion was influenced, physically, emotionally, intellectually and psychologically, by the other religious practices occurring close by. These categories idealize and mislead. They lie.
Muslim modernists have remained uncomfortable with the complexity, fluidity and the indigenous nature of South Asian Islam. It is a discomfort that gives shape to a concerted effort on the part of the orthodox to eradicate any and all variations to the ‘orthodox’ ideas of the religion largely imported from what is seen to be the ‘true’ place of Islam – the Middle East. Oddly, this prioritizing of the alien in fact negates the lived practice of the majority of the world’s Muslims in India, Pakistan, Bangladesh, Indonesia and Malaysia. It takes the popular, the larger, the more complex, the genuinely regional and attempts to cleanse it and reject it. What makes us uniquely South Asian Muslims is precisely what the modernists and reformists reject most vehemently. Their attacks of ‘deviations’ and ‘heretics’, their rejection of the shrines of saints, and regional practices with direct and clear influences of India’s pre-Islamic past e.g the nerchas of the Mapila Muslims of Kerala, are a reflection of these attempts at erasure.
The category of Hindu is even more complex, as it is meant to incorporate into it thousands of years of religious practice, with thousands of different deities and rituals, none of which can effectively be lumped under any one title. In fact, the word Hindu was once associated with all those people who practiced any faith outside the regions main religions like Islam, Christianity, Buddhism, Sikhism and so on. But Hinduism as we know it today, the official, orthodox variety is a product of 19th century reform movements. Pankaj Mishra argued this powerfully in an essay called The Invenstion Of The Hindu argued that there was:
…no such thing as Hinduism before the British invented the hold all category in the early nineteenth century, and made India seem the home of a “world religion” as organised and theologically coherent as Christianity and Islam. The concepts of a “world religion” and “religion” as we know them now, emerged during the late 18th and early 19th century, as objects of academic study, at a time of widespread secularisation in western Europe…But academic study of any kind imposes its own boundaries upon the subject. It actually creates the subject while bringing it within the realm of the intellect. The early European scholars of religion labelled everything; they organized disparate religious practices into one system, and literally brought into being such world religions as Hinduism and Buddhism.
Hinduism’s boundaries, once near infinite, being constricted by, as Ashia Nandy has argued, the values and priorities of Brahmanical, middle-class, westernizing Indians to their uprooting, cultural and geographical. Their reforms were, and remain, a direct criticism of Hinduism as it is lived and practiced across this land. As Nandy states in his essay ‘The Twilight of Certitudes’ in his work Bonfire of Creeds:
The votaries of Hindutva (modern Hindu nationalism) will celebrate the death of Hinduism. For they have all along felt embarassed and humiliated by Hinduism as it is. Hindutva is meant for those whose Hinduism has worn off. It is a ware meant for the supermarket of global mass cuture where all religions are available in their consumable forms, neatly packaged for buyers…To those who live in Hinduism, Hindutva is one of those pathologies that periodically afflict a faith. Hinduism has…handled many such pathologies; it still retains the capacity…to handle one more. (page 129)
Nandy’s argument is very simple: Hindu modernists were deeply anti-Hinduism, going so far as to be embarrassed of its millions of gods and their rather human like frailties and inconsistencies. As Nandy points in another essay called ‘A Report on the Present State of Health of the Gods’ again in Bonfire of Creeds that:
…if you read the literature of Hindutva you will find a systematic, consistent and often direct attack on Hindu gods and goddesses. Most stalwarts of Hindutva have not been interested in Hindu religion and have said so openly. Their tolerance towards the rituals and myths of their faith have even been lower. Many of them have come to Hindutva as a reaction to everyday, vernacular Hinduism.
And this vagueness of religious definition, this ‘fuzziness’ of religious practice and sense of identity, as Kaviraj has argued, did not allow for hard separation of beliefs into categories of religion as those found on British period census forms. Kumar Suresh Singh’s survey of Indian communities showed that hundreds of communities can be classified as having more than one religion. That there were at least 116 communities that are both Hindu and Christian and at least 35 that are Hindu and Muslim. Again, the definitions Muslim and Christian and Hindu remain problematic in this idea i.e. that there are no concrete definitions of these terms to begin with. We can only loosely approximate their meaning and boundaries in identity and cultural terms.
Both Hindu and Muslim modernists share their revulsion of the vernacular practices of their faiths. They both tried to tear down the lived faiths. As Pankaj Mishra points out,
Only a tiny minority of upper-caste Indians had known much about the Bhagavad-Gita or the Vedas until the eighteenth century when they were translated by British scholars and then presented as sacred texts from the paradisiacal age of something called “Hinduism.” in the nineteenth century, movements dedicated to reforming Hinduism and recovering its lost glory grew very rapidly. The inspiration or rhetoric of these neo-Hindu movements might have seemed archaic. In fact, they were largely inspired by the ideas of progress and development that British utilitarians and Christian missionaries aggressively promoted in India.
As I stand here at this shrine to a man who was born a Muslim and later adopt as a Hindu guru, these thoughts run through my head. Miranath was born a Muslim but adopted Viswanath Maharaj, a Brahmin, as his guide and teacher. I am reminded of the story of the great Indian poet Kabir, who too was born a Muslim, but raised, educated and nurtured under a Hindu guru. The temple also contains a shrine to a Muslim friend of Miranath, the saint Dina Shahwali. The devotees who flock here for puja, and the thousands who congregate for the annual mela, are largely Hindus. Their devotion to a man whose identity, ideas of faith and spirituality, trespass boundaries of accepted religions, reflects a cultural continuity that defies the modernist definitions and categorization. They represent a necessary, alive and passionate faith that is not transcribed in books, or sustained through mass campaigns of control and direction.
It is here that one begins to understand that the census like precision of categories such as Muslim or Hindu make little sense and do little to help us understand the ease with which these men, and this community transcended the boundaries between faith. It is as Farina Mir, Associate Professor at the University of Michigan, keeps reminding me, that we can’t begin to understand such trespassing of faiths by assuming the clarity and precision of categories such as Muslim or Hindu. Here, standing outside this unique temple to a Muslim man, in this small village of Deoli on the outskirts of the town of Wardha in Eastern Maharashtra, I am beginning to understand her argument.
|
<urn:uuid:2c74fd2c-abad-4eca-8845-eb1d81b4e6b6>
|
CC-MAIN-2016-26
|
http://www.asimrafiqui.com/blog/the-idea-of-india-project-update-2/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402699.36/warc/CC-MAIN-20160624155002-00093-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.961265 | 1,771 | 2.515625 | 3 |
Happiness is neither virtue nor pleasure nor this thing nor that but simply growth. We are happy when we are growing.
– William Butler Yeats
About William Butler Yeats
Irish author William Butler Yeats, known for his mysticism and Celtic imagery, won a Nobel Prize for his plays but ultimately achieved more renown as a poet. He was born in Dublin in 1865. Co-founder of the Abbey Theater, he served as its resident playwright and worked with actress Maude Gonne, who inspired the romantic longing expressed in many poems. He married at age 52 and co-wrote A Vision with his wife, a book with occult roots that explores the mythology in his poetry. He died in 1939.
|
<urn:uuid:d4dd16ba-9b7a-4bb4-88f5-8e8ff1d52066>
|
CC-MAIN-2016-26
|
http://www.mountainlakesinternational.com/category/quote/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395620.9/warc/CC-MAIN-20160624154955-00103-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.994491 | 144 | 2.921875 | 3 |
Children love to collect things: rocks, Matchbox cars, stickers. So it makes sense that they might be motivated to learn how to read new words if they could collect them. But how? I'd be willing to bet that if you asked your child to read the words written in big bold letters on his cereal box he could do it in a snap--not necessarily because he knew how to sound out the word by himself, but rather because he knew the name of the cereal he likes to eat for breakfast every morning. This fun-filled word hunt will help motivate your child to read by showing him how much he can already recognize in the world around him.
Before your child joins you, decorate a Ziploc bag or a box with a label that says, "Words I Can Read." Shoe boxes and gallon size bags are great to use with this activity because of their large size.
Then send your child on a hunt to collect words he can read around the house. Visit closets to look at shoeboxes, check out the pantry to look for favorite snacks, or look through old children's magazines that would have familiar ads.
Each time your child recognizes a word, cut it out and add it to the bag. Obviously, feel free to hand over a pair of kid-friendly scissors to your child if they are old enough - my oldest is only three. Your child will be amazed by the number of words that he can read on his own and he will be motivated to continue reading words he recognizes and adding to them to his collection.
|
<urn:uuid:57a0907d-20ec-4b01-9397-8393300da31a>
|
CC-MAIN-2016-26
|
http://www.kiwicrate.com/projects/Word-Hunt/747
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395560.14/warc/CC-MAIN-20160624154955-00171-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.978163 | 319 | 3.375 | 3 |
Harp Seals Dying as Ice Shrinks
Warmer temperatures in the North Atlantic over the last several decades have resulted in significantly higher mortality rates of baby harp seals. A new study out of Duke looked at satellite data of ice conditions in the Gulf of St Lawrence, a major breeding region and compared them to yearly reports of dead seal pups that washed up on shore. Lead researcher David Johnston is a scientist at the Duke University Marine Lab:
David Johnston: These animals have evolved to take advantage of the advan tages of ephemeral surfaces like ice.
And they have a very short lactation period. So they give birth to their pups and then 12 to 14 days later they wean them and leave. So you can imagine having a child... and then leaving them 12 to 14 days after. It's really a dramatic strategy for a mammal.
Johnson says the seal pups are left without protection before they learn to swim or hunt. That makes them particularly dependant on the ice during that period. Without the ice, the seal pups simply drown or fall prey to land-based predators. The seasonal ice cover in the region has been eroding by 6-percent each decade since satellite images became available in 1979.
|
<urn:uuid:6920cfd6-d122-4fd7-9bdb-039c7068309d>
|
CC-MAIN-2016-26
|
http://wunc.org/post/harp-seals-dying-ice-shrinks
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395039.24/warc/CC-MAIN-20160624154955-00031-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.959571 | 253 | 3.140625 | 3 |
In Judaism, the word Satan refers to one of god's angels or servants, that tempts people to sin and to or commit evil crimes. The biblical word ha-satan(the devil) comes from Hebrew and means the adversary as mentioned in1 Samuel 29:4:
" וְלֹא-יֵרֵד עִמָּנוּ בַּמִּלְחָמָה, וְלֹא-יִהְיֶה-לָּנוּ לְשָׂטָן בַּמִּלְחָמָה "
"He shall not march down with us to the battle, or else he may become an adversary satan in battle."
Satan possesses no real demonic qualities in the Old Testament writings .In the Torah, the word Satan indicates "accuser or "tempter." Satan is an obstacle in people's way keeping them from completing the responsibilities of tikkun olam ("fixing the world").
God Vs Satan
Throughout the Old Testament, God is presented as all powerful, without equal and in no competition with any other force. The Old Testament makes it very clear that any adversary to God's people was ultimately under the control of God Himself. All angels are spoken of as being decent and the servants of God. Even angels of evil , who may bring destruction upon sinners, are still God's angels carrying out his will and judgments.
Only in Zechariah and the book of Job Satan is mentioned as a distinct being. In Zechariah 3:1 Satan appears as the accuser to bring men's failings to the attention of God:
וַיַּרְאֵנִי, אֶת-יְהוֹשֻׁעַ הַכֹּהֵן הַגָּדוֹל, עֹמֵד, לִפְנֵי מַלְאַךְ יְהוָה; וְהַשָּׂטָן עֹמֵד עַל-יְמִינוֹ, לְשִׂטְנוֹ.
"He further showed me Joshua, the high priest, standing before the angel of the LORD, and Satan standing at his right to accuse him."
The most known reference to Satan as a distinct being can be found in the book of Job. Job opens with a discussion between God and Satan .Job was a God fearing person and Satan asks God for permission to tempt Job to see how loyal to God Job was. God granted Satan permission to do whatever he wanted, so long as he didn't take Job's life, as written:
וַיֹּאמֶר יְהוָה אֶל הַשָּׂטָן, הֲשַׂמְתָּ לִבְּךָ עַל עַבְדִּי אִיּוֹב: כִּי אֵין כָּמֹהוּ בָּאָרֶץ, אִישׁ תָּם וְיָשָׁר יְרֵא אֱלֹהִים וְסָר מֵרָע. וַיַּעַן הַשָּׂטָן אֶת יְהוָה, וַיֹּאמַר: הַחִנָּם, יָרֵא אִיּוֹב אֱלֹהִים. הֲלֹא את (אַתָּה) שַׂכְתָּ בַעֲדוֹ וּבְעַד בֵּיתוֹ, וּבְעַד כָּל אֲשֶׁר לוֹ--מִסָּבִיב: מַעֲשֵׂה יָדָיו בֵּרַכְתָּ, וּמִקְנֵהוּ פָּרַץ בָּאָרֶץ. וְאוּלָם שְׁלַח נָא יָדְךָ, וְגַע בְּכָל אֲשֶׁר לוֹ--אִם לֹא עַל פָּנֶיךָ, יְבָרְכֶךָּ. וַיֹּאמֶר יְהוָה אֶל הַשָּׂטָן, הִנֵּה כָל אֲשֶׁר לוֹ בְּיָדֶךָ--רַק אֵלָיו, אַל תִּשְׁלַח יָדֶךָ; וַיֵּצֵא, הַשָּׂטָן, מֵעִם, פְּנֵי יְהוָה.
"The Lord said to Satan, ‘Have you considered my servant Job? There is no one like him on the earth, a blameless and upright man who fears God and turns away from evil.' Then Satan- answered the Lord, ‘Does Job fear God for nothing? Have you not put a fence around him and his house and all that he has, on every side? You have blessed the work of his hands, and his possessions have increased in the land. But stretch out your hand now, and touch all that he has, and he will curse you to your face.' The Lord said to Satan,- ‘Very well, all that he has is in your power; only do not stretch out your hand against him"(Job 1:8-12)
In many of ancient cultures, like Egypt and the common Christian , Satan had horns and tail, and this would explain where the idea of a horned red Satan figure came from. However, in the Old Testament Satan had no horns nor tail ,because according to Judaism it's consider as Paganism and therefore there is no description of Satan appearance.
main phrases of the post + transcription + translation
Hebrew Transcription Translation
שָׂטָן śāttān Satan
תּוֹרָה tōrāh Pentateuch
אִיּוֹב yyōb' Job
כֹּהֵן kōhēn Priest
מִלְחָמָה milhāma War
אִישׁ îš' Man
תָּם tām Honest
|
<urn:uuid:a36bc405-f52a-4bb3-b8e3-7ff6354c42f8>
|
CC-MAIN-2016-26
|
http://blogs.christianpost.com/hebrew/from-time-immemorial-there-was-evil-ha-satan-540/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398628.62/warc/CC-MAIN-20160624154958-00025-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.833465 | 1,874 | 3.140625 | 3 |
Baarenhof (also known as Bahrenhof and Barenhof; now known as Dworek; coordinates: 54.24977, 18.97937 [54° 14′ 59″ N, 18° 58′ 45″ E]; population in 1852, 76; in 1905, 256; in 2012, 153) is located approximately 12 kilometres (7 miles) north-west of Nowy Dwór Gdański (Tiegenhof) and 24 km. (15 mi.) south-east of the regional capital Gdańsk (Danzig). It was situated south-west of Bärwalde and north-west of Neu Münsterberg.
Baarenhof was established in 1590 when the owner of nearby Bärwalde (now Niedźwiedzica), Szymon (Simon) Bahr (1543-1606), founded the estate of Bahrenhof. Until 1772 Baarenhof was part of the Kingdom of Poland. The First Partition of Poland in 1772 resulted in the creation of a new province in 1773, called West Prussia, in which Baarenhof was located. Baarenhof was situated in the district (Kreis) of Marienburg until the establishment of the Free City of Danzig in 1920. The village came under the control of Nazi Germany during World War II until February 1945, when it was occupied by Soviet forces and returned to Poland. Today it is a village in the administrative district of Gmina Stegna, within Nowy Dwór Gdański County, Pomeranian Voivodeship.
In the 1776 Prussian census there was one Mennonite family living in Baarenhof, the Bestvader family. In 1820, the village had 93 residents, including 16 Mennonites.
Stowarzyszenie Konserwatorów Zabytków. "Dworek." Catalogue of Monuments of Dutch Colonization in Poland. 2005. Web. 30 November 2012. http://holland.org.pl/art.php?kat=obiekt&id=315&lang=en.
Wikipedia. "Dworek, Nowy Dwór Gdański County." Web. 30 November 2012. http://en.wikipedia.org/wiki/Dworek,_Nowy_Dw%C3%B3r_Gda%C5%84ski_County.
Wolf, Hans-Jürgen. "Familienforschung in Westpreußen." Web. 30 November 2012. http://www.westpreussen.de/cms/ct/ortsverzeichnis/details.php?ID=258.
|Author(s)||Richard D Thiessen|
|Date Published||November 2012|
Cite This Article
Thiessen, Richard D. "Baarenhof (Pomeranian Voivodeship, Poland)." Global Anabaptist Mennonite Encyclopedia Online. November 2012. Web. 2 Jul 2016. http://gameo.org/index.php?title=Baarenhof_(Pomeranian_Voivodeship,_Poland)&oldid=124589.
Thiessen, Richard D. (November 2012). Baarenhof (Pomeranian Voivodeship, Poland). Global Anabaptist Mennonite Encyclopedia Online. Retrieved 2 July 2016, from http://gameo.org/index.php?title=Baarenhof_(Pomeranian_Voivodeship,_Poland)&oldid=124589.
©1996-2016 by the Global Anabaptist Mennonite Encyclopedia Online. All rights reserved.
|
<urn:uuid:e850584e-610f-4f1c-8daa-e3f18bacb7de>
|
CC-MAIN-2016-26
|
http://www.gameo.org/index.php?title=Baarenhof_(Pomeranian_Voivodeship,_Poland)
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783404382.73/warc/CC-MAIN-20160624155004-00092-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.859072 | 799 | 2.765625 | 3 |
Diet for Inflammatory Bowel Disease
What You Should Know:
- Inflammatory Bowel Disease (IBD) is a term for two specific and separate diseases: Crohn’s Disease and Ulcerative Colitis. Crohn's disease is a disease of unknown cause that can involve any portion of the digestive tract. Ulcerative colitis is an inflammatory disease of the colon or large intestine, which is often accompanied by bloody diarrhea.
- Sometimes surgery and/or medications are needed to treat these diseases.
- Inflammation in the colon can cause the colon to empty frequently, causing diarrhea.
- Stress or certain foods can exacerbate symptoms.
- There is no need to avoid foods unless they worsen your symptoms. It is best to restrict as few foods as possible to increase the chances that you are getting a balanced, nutritious diet.
- Many people with IBD are at increased risk for nutrient deficiencies and may require a vitamin/mineral supplement.
What You Should Do on a Regular Basis:
- Eat small, frequent meals.
- Consume a high calorie, high protein diet.
- Drink plenty of fluids, especially water.
- Eat a high fiber diet, including:
- 4 servings/day of whole grain breads and cereals (1 serving = ½ cup or 1 slice)
- 5 servings/day of fruits and vegetables (1 serving = ½ cup)
- Limit caffeine, alcohol, sorbitol, nicotine, and carbonated beverages.
- Limit lactose-containing foods (milk, cheese, etc) if you have gas, cramping or diarrhea after eating these foods. Lactaid capsules or products may help.
- Limit gas-producing foods, such as cabbage, broccoli, cauliflower, brussel sprouts, dried peas and lentils, onions, chives, and peppers.
- Reduce stress by practicing regular relaxation techniques.
- Exercise regularly.
- Aim for 20-30 grams of fiber/day.
- Eat a low fat diet. This will help decrease intestinal contractions right after meals.
- Keeping a record of foods eaten and then taking note of when symptoms worsen may help you identify patterns that indicate problem foods.
During an Exacerbation:
Follow a low fiber, low residue diet to relieve abdominal pain and diarrhea. This diet provides less than 10 grams of fiber/day and allows for the bowel to rest. It is only intended for short term use.
Foods to choose:
- White breads (such as French or sourdough)
- Toasted plain bagels or English muffins
- Corn or flour tortillas
- Cream of rice, grits
- Pretzels (salted or unsalted)
- Fat-free saltines, graham crackers
- Plain angel food cake
- Plain baked potatoes without skin
- Plain white rice
- Cold fat-free cereal (example: Corn Chex, Kix, Rice Chex, Rice Krispies, Honeycomb, or Corn Pops) eaten dry
- Plain cooked pasta (not egg noodles)
- Strong, hot tea
- Fruit Juice without pulp
- Tender, well cooked meats, poultry, fish, eggs
- Cooked asparagus, beets, carrots, spinach, green beans, zucchini
Foods to avoid:
- Fresh fruits and vegetables
- Caffeinated beverages.
- Bran, granola, or whole-wheat choices
- Cereals with raisins or other dried fruits or nuts
- Concentrated sweets such as juices, candy and soda
- Brown rice, barley
- Legumes and beans
- Nuts, seeds, kernels
- Dried fruit
- Corn, broccoli, cauliflower, cabbage
- If you are lactose intolerant, avoid milk products
Following an Exacerbation:
- Continue to follow a low residue diet and slowly add back a variety of foods.
- Begin with well-tolerated liquids and advance to soft solids, then solids
- Introduce one or two items every few days and avoid any foods that cause symptoms.
- Add fiber to diet as tolerated. Well-tolerated fiber sources include tender cooked vegetables, canned or cooked fruits, and starches like cooked cereals and whole wheat noodles and tortillas.
- Between flares, eat a wide variety of foods as tolerated. This includes fruits, vegetables, whole grains, lean protein, and low-fat and nonfat dairy products.
|
<urn:uuid:7e9ce539-489d-490d-8f5c-37dec8880308>
|
CC-MAIN-2016-26
|
http://www.stlouischildrens.org/our-services/inflammatory-bowel-disease-ibd-center/education/diet-inflammatory-bowel-disease
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783404405.88/warc/CC-MAIN-20160624155004-00067-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.875417 | 939 | 2.984375 | 3 |
What do flashlights, the British invasion, black cats, and seesaws have to do with computers? In CODE, they show us the ingenious ways we manipulate language and invent new means of communicating with each other. And through CODE, we see how this ingenuity and our very human compulsion to communicate have driven the technological innovations of the past two centuries.
Using everyday objects and familiar language systems such as Braille and Morse code, author Charles Petzold weaves an illuminating narrative for anyone who’s ever wondered about the secret inner life of computers and other smart machines.
It’s a cleverly illustrated and eminently comprehensible story—and along the way, you’ll discover you’ve gained a real context for understanding today’s world of PCs, digital media, and the Internet. No matter what your level of technical savvy, CODE will charm you—and perhaps even awaken the technophile within.
Author: Charles Petzold
5G Mobile and Wireless Communications Technology 2016 US$ 82.00 440 pages
Practical Foundations for Programming Languages 2016 US$ 55.76 514 pages
- Academic > Computer Science > Computer science
- Academic > Computer Science > Electronic data processing
- Academic > Computer Science > Computer programming
- Computers > Programming > Software Development
- Computers > Entertainment & Games
- Computers > Hardware
- Computers > Business Software
- Computers > Data Processing
|
<urn:uuid:fa768ed1-7c84-4510-954b-d0c6aac6e876>
|
CC-MAIN-2016-26
|
http://www.ebooks.com/488807/code/petzold-charles/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396147.66/warc/CC-MAIN-20160624154956-00049-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.810038 | 295 | 2.921875 | 3 |
Forming 1,255 miles of the US-Mexican border between El Paso and the Gulf of Mexico, the Rio Grande/Bravo winds its way through the Chihuahuan Desert and serves as the primary source of water for 5.5 million people. Far-ranging wildlife such as bighorn sheep, elk, black bears and mountain lions, as well as numerous native endangered fish, rely on the river and surrounding land for food and shelter.
But the river’s water is already 150% over-allocated, mostly for agriculture, and the onset of climate change has led to serious drought. What can we do to protect the wildlife, plants and people that rely on the Rio Grande/Bravo?
Enter WWF’s Mark Briggs, a conservation scientist working with a diverse bi-national team—including Big Bend National Park (on the U.S. side of the river), Comisión Nacional de Áreas Naturales Protegidas (CONANP, on the Mexican side of the river), The Coca-Cola Company (a key partner in the region since 2007), and other partners—to restore the Big Bend section of the Rio Grande/Bravo.
“When you think of conservation in the Chihuahuan Desert, the Rio Grande/Bravo and its tributaries in Big Bend rise to the top,” Briggs said.
Because of this, he and other scientists are trying to answer four main questions about the river in order to develop the best restoration program possible for the stretch of water in Big Bend National Park:
- What did the river look like more than a century ago, before major human impact?
- How has the river changed?
- Why has it changed? What are the main drivers?
- What can we realistically do to return the river closer to its initial state, so it can provide benefits for both people and nature?
“Addressing the above questions with our binational partners is crucial and has been the main focus of our work,” Briggs said.
In coordination with our binational partners, WWF and work crews formed of residents from both sides of the river are focusing on 380 miles of river in Big Bend and pinpointing key areas for removing giant cane—an invasive plant whose roots cling to sediment along the river banks. By fighting the cane, we can get the sediment moving downstream and the river and surrounding vegetation back to a natural and healthy state.
The river in Big Bend was historically wide and shallow, which created natural environments that protected riverside towns from floods and provided habitat for wildlife. Due to a combination of factors—wilder weather caused by climate change, reduced water flows due to dams, and an accumulation of sediment thanks to the giant cane—the river is now narrow and deep. This means native plants and animals have a less hospitable home and the people who depend on the Rio Grande/Bravo are increasingly at risk.
By removing the giant cane, WWF and partners hope to reduce the amount of sediment that builds up along the banks, as well as help the river’s flow push the existing sediment downstream. This will enable the river to return to a shallower, wider state.
So far, giant cane has been removed along over 30 miles of both sides of the river, and the results feel promising.
“It is a long-term process,” said Briggs. “But I feel like we’re on the right track. And the fact that we’re seeing positive results by bringing together people and organizations from multiple sectors, from big businesses and riverside communities, and from both countries, is a wonderful thing for a border that often doesn’t get a lot of positive press.”
|
<urn:uuid:d8ef94b5-b7f1-4c36-a80b-629ab4674950>
|
CC-MAIN-2016-26
|
https://www.worldwildlife.org/stories/changing-a-river-s-trajectory
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397695.90/warc/CC-MAIN-20160624154957-00018-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.950277 | 779 | 3.53125 | 4 |
October 3, 2011
With another flu season approaching, it is important to remember that immunizations are NOT just for kids. In fact, according to the Centers for Disease Control and Prevention (CDC) everyone needs immunizations to remain healthy. So what vaccines do adults need? The CDC says your need is determined by “factors such as your age, lifestyle, high-risk conditions, type and locations of travel, and previous immunizations.” Here is a list of vaccines recommended for all adults who do not have a specific contraindication:
- Seasonal influenza (flu) (In general, anyone who is 6 months or older can benefit from the protection of a flu vaccination.)
- Tetanus, diphtheria and pertussis (whooping cough) (for adults up to 64 years, one booster dose)
- Shingles (for adults 60 years and older)
- Pneumococcal disease (for adults 65 years and older and adults with specific health conditions)
- Human papillomavirus (HPV) infection (for women 26 years and younger)
- Other vaccinations you may need include those that protect against hepatitis A, hepatitis B, chickenpox (varicella), and measles, mumps and rubella.
Additional vaccines may be recommended for international travelers.Every Monday, the Johns Hopkins Healthy Monday Project, part of the Johns Hopkins Center for a Livable Future, offers tips for preventing disease and injury, and maintaining a healthy lifestyle. Check back each week for new tips or visit our archive.
|
<urn:uuid:e6fe1fbb-dd04-444e-925d-c2019d3f10cd>
|
CC-MAIN-2016-26
|
http://www.jhsph.edu/news/stories/2011/healthy-monday-2011/10032011_vaccinations.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783400572.45/warc/CC-MAIN-20160624155000-00011-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.923394 | 319 | 3.09375 | 3 |
EC201Lecture35-36.pdf (application/pdf-Objekt) Macroeconomic Regimes in Western ... Economics. Theory of Employment. (a) Structural Unemployment: It is also known as Marxian unemployment or long-term unemployment.
It is due to slower growth of capital stock in the country. The entire labour force cannot be absorbed in productive employment, because there are not enough instruments of production to employ them. (b) Seasonal Unemployment: Seasonal unemployment arises because of the seasonal character of a particular productive activity so that people become unemployed during the slack season. Occupations relating to agriculture, sugar mills, rice mills, ice factories and tourism are seasonal.
Economics. Brief Principles of Macroeconomics. Essentials of Economics. A "second edition" of The general theory. Macroeconomics. 17-A-5.pdf (application/pdf-Objekt) Saving Keynes. Investment and Aggregate Demand. Readers Question: What are the effects of increased investment on aggregate demand in the short term and the long term.
Investment means capital expenditure (e.g. purchasing machines or building bigger factory)Investment is a component of AD. – AD+ C+I+G+X-M.Investment spending takes about 15% of AD; it is not as significant as consumer spending which is 66%. If Investment increases, then ceteris paribus, AD will increase. However, it depends on the economic circumstances. e.g. if there was a situation of falling house prices and lower consumer spending, increased investment may be insufficient to increase AD. In the long term, higher investment may increase productive capacity and increase aggregate supply. Therefore, you could argue, investment enables a more sustainable increase in AD.
Multiplier Effect If there is spare capacity in the economy, an increase in investment could cause a knock on effect throughout the economy. IS/LM model. The IS curve moves to the right, causing higher interest rates (i) and expansion in the "real" economy (real GDP, or Y).
The model was developed by John Hicks in 1937, and later extended by Alvin Hansen, as a mathematical representation of Keynesian macroeconomic theory. Between the 1940s and mid-1970s, it was the leading framework of macroeconomic analysis. While it has been largely absent from macroeconomic research ever since, it is still the backbone of many introductory macroeconomics textbooks. History The IS/LM model was born at the econometric conference held in Oxford during September, 1936.
Roy Harrod, John R. Hicks later agreed that the model missed important points of Keynesian theory, criticizing it as having very limited use beyond "a classroom gadget", and criticizing equilibrium methods generally: "When one turns to questions of policy, looking towards the future instead of the past, the use of equilibrium methods is still more suspect Formation How to Write a Bibliography - Examples in MLA Style. Please note, all entries should be typed double-spaced.
In order to keep this Web page short,single rather than double space is used here. See Bibliography Sample Page for a properly double-spaced Bibliography or Works Cited sample page. Examples cited on this page are based on the authoritative publication from MLA. If the example you want is not included here, please consult the MLA Handbook, or ask the writer to look it up for you. Format for entries: A single space is used after any punctuation mark. When writing a bibliography, remember that the purpose is to communicate to the reader, in a standardized manner, the sources that you have used in sufficient detail to be identified. Hansjörg HERR. Slides JENA. Real wage - Wiki. TIME: We Are All Keynesians Now. (See Cover) The ideas of economists and political philosophers, both when they are right and when they are wrong, are more powerful than is commonly understood.
Indeed the world is ruled by little else. Practical men, who believe themselves to be quite exempt from any intellectual influences, are usually the slaves of some defunct economist. —The General Theory of Employment, Interest and Money. Keynesian Economics. Keynesian economics is a theory of total spending in the economy (called aggregate demand) and its effects on output and inflation.
Although the term has been used (and abused) to describe many things over the years, six principal tenets seem central to Keynesianism. The first three describe how the economy works. 1. A Keynesian believes that aggregate demand is influenced by a host of economic decisions—both public and private—and sometimes behaves erratically. The public decisions include, most prominently, those on monetary and fiscal (i.e., spending and tax) policies. Keynesian economics - Wiki. The theories forming the basis of Keynesian economics were first presented by the British economist John Maynard Keynes in his book, The General Theory of Employment, Interest and Money, published in 1936, during the Great Depression.
Keynes contrasted his approach to the aggregate supply-focused 'classical' economics that preceded his book. The interpretations of Keynes that followed are contentious and several schools of economic thought claim his legacy. Keynesian economists often argue that private sector decisions sometimes lead to inefficient macroeconomic outcomes which require active policy responses by the public sector, in particular, monetary policy actions by the central bank and fiscal policy actions by the government, in order to stabilize output over the business cycle. Keynesian economics advocates a mixed economy – predominantly private sector, but with a role for government intervention during recessions. Overview Theory Concept Excessive saving
Keynes, Wage and Price 'Stickiness,' and Deflation. The General Theory and the Current Crisis: A Primer on Keynes’ Economics Intro | Pt.
I | Pt. II | Pt. III | Pt. IV.
|
<urn:uuid:c034d1e6-8d38-4a68-bf49-1cc306b4c584>
|
CC-MAIN-2016-26
|
http://www.pearltrees.com/t/macro/id3147379
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402699.36/warc/CC-MAIN-20160624155002-00044-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.941116 | 1,190 | 2.640625 | 3 |
Repository - Bank of Resources
Alexandria is Canada's first national repository for educational objects. It is the actualization of a vision to make digital educational materials readily available to students, researchers and educators across the country and beyond.
CAREO is a project supported by Alberta Learning and CANARIE that has as its
primary goal the creation of a searchable, Web-based collection of multidisciplinary
teaching materials for educators across the province and beyond.
Object Economy (EOE)
A global community for web based learning tools in Java.
FREE (Federal Resources for
FREE makes it easy to find learning resources from more than 35 federal organizations.
Resources include teaching ideas, learning activities, photos, maps, primary
documents, data, paintings, sound recordings, and more on thousands of topics.
Gateway To Educational Materials
The Gateway to Educational MaterialsSM is a Consortium effort to provide educators
with quick and easy access to thousands of educational resources found on various
federal, state, university, non-profit, and commercial Internet sites.
The Global Campus is a virtual collection of educational materials available
on the World Wide Web. The Global Campus offers a way in which these materials
can be shared and utilized worldwide by users with minimal computer expertise.
Multimedia Educational Resource for learning and online teaching.
It is a free and open resource designed primarily for faculty and students of
Electronic Staff Development Library
The S e SDL is a web-based resource centre designed to encourage the sharing
and reuse of staff development materials. The main focus of the materials is
the use of communications and information technology (C&IT) in teaching
and learning .
Smete Digital Library
SMETE.ORG is a dynamic online library and portal of services by the SMETE Open
Federation for teachers and students. Here you can access a wealth of teaching
and learning materials as well as join this expanding community of science,
math, engineering and technology explorers of all ages.
|
<urn:uuid:42264be3-4279-431a-85c8-feffff74fe11>
|
CC-MAIN-2016-26
|
http://vcampus.uom.ac.mu/lor/link.php?menu=7
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398628.62/warc/CC-MAIN-20160624154958-00120-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.889832 | 414 | 2.640625 | 3 |
|Thursday, May 25, 2000,
Kashmir: a lasting solution
SINCE Partition in 1947, Jammu and Kashmir has become the bone of contention and a cause for ceaseless confrontation between India and Pakistan. To grab the whole of Kashmir forcibly, Pakistans military, in the garb of raiders, attacked and annexed nearly two-fifth of the area of the state in 1948.
During the past 53 years of its existence Pakistan has never endeavoured to maintain cordial relations with India and has made numerous unsuccessful attempts to annex Kashmir by hook or by crook. The rulers of Pakistan, whether they were elected Prime Ministers or military dictators, have kept the Kashmir problem on the top to their agenda. To divert the attention of the people from their internal problems and domestic woes, they led Pakistan to fight two major wars with India in 1965 and 1971.
Pakistan is still continuing to wage a proxy war in Kashmir for the last over 10 years which has turned the so-called paradise on earth into a hell. The dispute, even after a lapse of half a century, remains unresolved.
|The UN resolutions are lying shelved in
its archives. The Simla Agreement, concluded at the end
of the 1971 war, could not go beyond releasing 90,000
prisoners of war of Pakistan.
The bilateral dialogue and negotiations, carried out during all these years in terms of the Simla Agreement, could not produce any result. Even the recent goodwill gestures of India, including bus diplomacy, could not elicit any favourable response. The spirit of the Lahore Declaration was betrayed, killed and buried unashamedly in Kargil.
The rulers in both countries have failed to feel the pulse of the people. In fact, the people on both sides of the border have a strong desire for peace and amity. The partition of the country was maliciously conceived by the British on the basis of their divide and rule policy. The majority of Muslim families which migrated to Pakistan have their kith and kin still living in India. They are suffering the pangs of separation for the past five decades.
The people of Pakistan are from the same stock as that of the people living in India. They have the same lifestyle, customs and social traditions. They speak the same language and have the same type of tastes and food habits. They wear the same type of dress. Therefore, with a view of restoring peace and tranquillity between the two neighbours, the people on both sides of the border, may be allowed free movement, including that of the State of Jammu and Kashmir, by removing visa restrictions. Similarly, trade may also be encouraged unrestricted.
These steps, if taken, can demolish the walls of Partition. This can be the only lasting solution for peace in Kashmir, and shall pave the way for ultimate unification. If the Germans can unite by demolishing the Berlin Wall, then why cant India and Pakistan? Let the people on both sides of the border rise to the occasion and force their governments to evolve such policies as may restore permanent peace in the subcontinent.
G. K. MALHOTRA
Universities & market forces
This has reference to the news item Lord Paul heads UK varsity (The Tribune, May 10, page 11) and in which Lord Swraj Paul, while addressing a select gathering, very rightly said that higher education was no longer an option, rather it was a necessity. He is reported to have remarked that no society can prosper unless it provides its people this fundamental entitlement, and it is obligatory on the part of higher education institutions to help the people to achieve the objective.
Ironically and in sharp contrast to this, the affairs of higher education are dictated here by those who have neither an understanding nor the interest of higher education high on their list of priorities. While it is right and proper for the general public to be informed on issues of finance and accountability where public sector institutions are concerned and the public accountability of our higher education institutions is an appropriate concern of us all, but at the same time the independence and integrity of these institutions is also important.
However, the public needs to be informed that institutions of higher education cannot be made to work properly when these have been starved of essential funds for long. The ill-informed and uncalled for interference in any universitys affairs can only damage the effective functioning of the institution .
Take for instance the way in which the issue of staff-student ratio in certain subject areas has been linked with the filling of posts in some subjects, questioning the very right of these subjects to exist at all, for if they do not flourish within the university then what is their future? The study of ancient languages, the histories and cultures of pre-literate societies are central elements in the enrichment and understanding of all societies. If these are to be erased from our collective memory on the mere pretext of a temporary fall in the number of students choosing those subjects, society will be much poorer for it.
To use the students number as the criterion for the very survival of a subject area is a dangerous ground, indeed. In a system which allows a free choice to students of their degree subjects, there are inevitably going to be annual fluctuations in numbers choosing a particular subject. What if the numbers of those choosing medicine or chemistry should fall? Should the staff be declared redundant.
To allow the operation of the market forces to guide the functioning of the university sector will lead to disaster. Universities are about far more than responding to the demands of the market. They are about innovation and creativity. If education is allowed to become a commodity a purely mechanistic approach to learning will be encouraged among students which will be to the detriment of society as a whole.
Education, unfortunately, has remained marginal on our national agenda. It is high time the media took the initiative to generate a public debate by inviting active academics to suggest remedies for saving educational institutions from their imminent collapse.
I. M. JOSHI
English in schools
Obviously, the Haryana government has taken a wise decision in connection with making English a compulsory subject from class 1. Thus Haryana is following in the footsteps of its elder brother, Punjab, which made English a compulsory subject about two years back.
After going through a news item published in The Tribune dated May 20 BJP unhappy with Chautala over English, one feels the intention of the President of the Haryana unit of the BJP, Mr O.P. Grover, is against the welfare of Haryanavis. Moreover, English is obligatory for higher studies.
Now the question is: Do we really need English? Of course, whether one likes it or not, the fact is that English has emerged as an international language.
RAM KUMAR JANGRA
|| Punjab | Haryana | Jammu & Kashmir | Himachal Pradesh | Regional Briefs | Nation | Editorial |
| Business | Sport | World | Mailbag | Chandigarh Tribune | In Spotlight |
50 years of Independence | Tercentenary Celebrations |
| 120 Years of Trust | Calendar | Weather | Archive | Subscribe | Suggestion | E-mail |
|
<urn:uuid:e0267947-a7db-4d32-b5ee-9da880ec568c>
|
CC-MAIN-2016-26
|
http://www.tribuneindia.com/2000/20000525/mailbag.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393442.26/warc/CC-MAIN-20160624154953-00000-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.95083 | 1,461 | 3.328125 | 3 |
When people travel to other countries, they are at increased risk for travel-related infections.
for searching the Internet and other reference sources
What Are Travel-related Infections?
When travelers go abroad, they may be exposed to many bacterial, viral, parasitic, and fungal infections that they would not come into contact with in the United States. With different climates, sanitation, and hygiene practices (such as bathing and urinating in the same water source), some diseases that are rarely or never seen in the United States are common in other parts of the world. The risk of infectious disease is greatest in tropical and subtropical countries because warm, moist climates offer an ideal environment for the survival and growth of certain organisms. Visiting developing regions of the world, particularly Africa (especially sub-Saharan Africa), southeast Asia, and Central and South America, also puts travelers at higher risk for travel-related infections. One of the most common ailments is "traveler's diarrhea" (dye-uh-REE-uh), which can be caused by a variety of bacterial, parasitic, and viral infections. According to the U.S. Centers for Disease Control and Prevention (CDC), between 20 and 50 percent of travelers experience diarrhea.
How Are Travel-related Infections Spread?
Some travel-related infections are spread through the bites of insects, such as mosquitoes (which carry malaria, mah-LAIR-e-uh, and yellow fever) or flies (for example, the tsetse, SET-see, fly can carry trypanosomiasis, trih-pan-o-so-MY-uh-sis). Other diseases, including schistosomiasis (shis-tuh-so-MY-uh-sis), can be contracted from swimming, wading, or bathing in contaminated water. Eating or drinking contaminated food or water is another common way of contracting disease, especially traveler's diarrhea.
What Are Some Common
Malaria is a disease that is transmitted through a mosquito bite and affects 300 to 500 million people worldwide each year, according to the World Health Organization (WHO). When an infected mosquito bites a human, the Plasmodium (plaz-MO-dee-um) parasite causes fever and symptoms similar to those of the flu, such as extreme tiredness, muscle aches, nausea (NAW-zee-uh), and chills. If left untreated, malaria can cause seizures * , kidney * failure, and death. Medications can treat malaria and prevent disease in travelers.
Cholera (KAH-luh-ruh) is a gastrointestinal * disease that causes watery diarrhea, vomiting, and other symptoms. Without treatment, it can lead to dehydration * and even death. People develop cholera by eating food or drinking water that has been contaminated with the cholera bacterium, Vibrio cholerae (VIH-bree-o KAH-luh-ray). Eating contaminated shellfish or coming into contact with the feces * of an infected person also could infect someone. A person with cholera is treated to replace fluids lost through vomiting or diarrhea; some antibiotics may reduce the severity and length of the illness.
* seizures (SEE-zhurs) are sudden bursts of disorganized electrical activity that interrupt the normal functioning of the brain, often leading to uncontrolled movements in the body and sometimes a temporary change in consciousness.
* kidney is one of the pair of organs that filter blood and remove waste products and excess water from the body in the form of urine.
* gastrointestinal (gas-tro-in-TES-tih-nuhl) means having to do with the organs of the digestive system, the system that processes food. It includes the mouth, esophagus, stomach, intestines, colon, and rectum and other organs involved in digestion, including the liver and pancreas.
* dehydration (dee-hi-DRAY-shun) is a condition in which the body is depleted of water, usually caused by excessive and unreplaced loss of body fluids, such as through sweating, vomiting, or diarrhea.
* feces (FEE-seez) is the excreted waste from the gastrointestinal tract.
Dengue (DENG-gay) fever is caused by a virus from the Flavivirus (FLAY-vih-vy-rus) group transmitted to humans via the bite of an infected mosquito. According to the CDC, up to 100 million people worldwide develop symptoms of dengue fever each year, such as fever, severe headaches, joint pain, and rashes. Dengue hemorrhagic (heh-muh-RAH-jik) fever is a severe form of dengue that is associated with bruising easily, bleeding from the nose or gums, and bleeding internally, in addition to the other symptoms of dengue fever. No medication can treat either form of the illness. Doctors recommend that people who have dengue fever drink plenty of fluids to avoid dehydration and take acetaminophen (uh-see-teh-MIH-noh-fen) for pain relief.
A bite from an infected mosquito can transmit filariasis (fih-luh-RYE-uh-sis), a parasitic disease that affects the lymphatic system * . When the infected mosquito feeds, tiny worms pass from it to the person, where they travel to and grow in the lymph vessels. Someone with this disease may not have noticeable symptoms, but filariasis can lead to permanent damage to the kidneys and lymphatic system. It also can progress to a condition called elephantiasis (eh-luh-fan-TIE-uh-sis), in which fluid builds up in parts of the body and causes swelling and disfigurement. The condition can be treated with medication.
Viral hepatitis (heh-puh-TIE-tis) is a viral infection of the liver * that leads to inflammation of the organ. Infections caused by the hepatitis B and C viruses are contracted sexually or through contact with contaminated blood or other body fluids, but hepatitis A virus is more contagious and is the hepatitis virus that more commonly infects travelers. It can spread through person-to-person contact or through contaminated water and food, especially shellfish and raw vegetables and fruits. A person with hepatitis may have symptoms similar to those of the flu, such as fever, chills, and weakness. People with hepatitis A may need extra fluids and rest, but most recover without medication.
Travelers who are bitten by an infected sand fly can develop leishmaniasis (leesh-muh-NYE-uh-sis), a disease caused by Leishmania (leesh-MAH-nee-uh) parasites that can affect the skin or the internal organs. People with the skin disease often have skin sores, which may spread to cause facial disfigurement. Those with the internal form of the disease experience fever and an enlarged spleen * or liver and may need to be hospitalized.
Fleas that bite rodents infected with the bacterium Yersinia pestis (yer-SIN-e-uh PES-tis) can transmit plague (PLAYG) to humans. Two to 6 days after becoming infected with plague, a person may have swollen and tender lymph nodes * , fever, cough, chills, and belly pain. The plague can lead to severe respiratory illness, shock * , and death if a person is not treated with antibiotics.
* lymphatic (lim-FAH-tik) system is a system that contains lymph nodes and a network of channels that carry fluid and cells of the immune system through the body.
* liver is a large organ located beneath the ribs on the right side of the body. The liver performs numerous digestive and chemical functions essential for health.
* spleen is an organ in the upper left part of the abdomen that stores and filters blood. As part of the immune system, the spleen also plays a role in fighting infection.
* lymph (LIMF) nodes are small, bean-shaped masses of tissue that contain immune system cells that fight harmful microorganisms. Lymph nodes may swell during infections.
* shock is a serious condition in which blood pressure is very low and not enough blood flows to the body's organs and tissues. Untreated, shock may result in death.
* paralysis (pah-RAH-luh-sis) is the loss or impairment of the ability to move some part of the body.
* coma (KO-ma) is an unconscious state in which a person cannot be awakened and cannot move, see, speak, or hear.
Although rabies (RAY-beez) in humans is rare in the United States, people who travel to other countries may be at higher risk for infection. The virus that causes rabies, from the Rhabdoviridae (rab-doh-VEER-ih-day) family, is transmitted to humans through a bite from an infected animal, and without treatment rabies can cause paralysis * , seizures, coma * , and death. A person who has been bitten by an animal suspected of having rabies can receive injections of the rabies vaccine to prevent the infection from developing.
Schistosomiasis is a disease caused by parasitic Schistosoma (shis-tuh-SO-mah) worms that infect humans when they come into contact with contaminated water. The worms must spend part of their life cycle growing in freshwater snails before they enter and infest humans. Common symptoms include rash, fever, muscle aches, and chills. Years later, if left untreated, schistosomiasis can lead to permanent liver damage or damage to the urinary tract * .
According to the CDC, typhoid (TIE-foyd) fever affects up to 16 million people worldwide each year, although only about 400 cases occur in the United States (and the majority of those contract it while traveling abroad). A person who has contact with water or food contaminated with Salmonella typhi (sal-muh-NEH-luh TIE-fee) bacteria may develop symptoms such as fever, weakness, rash, stomach pain, or headache. Typhoid fever is treatable with antibiotics.
Typhus (TY-fis) is transmitted by the bites of fleas or lice infected with Rickettsiae (rih-KET-see-eye) bacteria. Symptoms of typhus include an extremely high fever, rash, nausea, joint pain, and headache. Patients often become very sick, and without treatment the disease can be life threatening. However, it is treatable with antibiotics.
Viral hemorrhagic fevers
Viral hemorrhagic (heh-muh-RAH-jik) fevers (VHF) are a group of rare but potentially life-threatening viral illnesses that cause symptoms ranging from fever, extreme tiredness, and dizziness to bleeding from the eyes and ears, kidney failure, and seizures. Humans contract VHF after exposure to people or animals that have been infected with one of a variety of viruses. Examples of VHF include Ebola virus infection and Lassa fever.
The yellow fever virus (from the flavivirus group) is transmitted to humans by a mosquito bite. Within a week of being infected, a person may experience fever, muscle aches, nausea, or vomiting. Most people recover within 3 to 4 days, but according to WHO about 15 percent of people with yellow fever go on to develop a more serious form of the disease that can cause bleeding, kidney failure, and death. An effective vaccine is available for yellow fever and is often recommended for travelers who will be visiting areas where the disease is found.
* urinary (YOOR-ih-nair-e) tract is the system of organs and channels that makes urine and removes it from the body. It consists of the urethra, bladder, ureters, and kidneys.
African trypanosomiasis is a parasitic illness commonly known as sleeping sickness. The Trypanosoma (trih-pan-o-SO-mah) parasite is transmitted to humans through a bite from the tsetse fly, after which a person may develop a skin sore, high fever, extreme tiredness, swollen lymph nodes, and swelling around the eyes. The disease is called sleeping sickness because people who have an advanced form of it can have an uncontrollable urge to sleep. If untreated, trypanosomiasis can cause the brain and membranes around the brain to swell and become inflamed. The disease can be treated with hospitalization and medication.
How Can Travelers Protect Themselves
Travelers can take precautions to reduce their risk of contracting a disease while abroad. Experts offer the following tips for staying healthy:
Do not swim, wade, or bathe in freshwater sources, the ocean near beaches that are contaminated with human feces, or pools that are not chlorinated.
- Use only bottled water or water that has been boiled for drinking and brushing teeth.
- Avoid drinks with ice in them, as the ice may be from unsafe water. Canned or bottled beverages are the safest drinks. Carefully wiping the top of the can or bottle before drinking from it may remove disease-causing agents.
- Do not eat raw foods, particularly meat and salad. Avoid raw fruits and vegetables unless you peel them yourself.
- Avoid shellfish and other fish, which can be toxic at certain times of the year even if they have been cooked.
- Do not buy foods from street vendors.
- Avoid unpasteurized milk (milk that has not been processed with heat to kill parasites and bacteria) and dairy products.
- Prevent insect bites by wearing long sleeves and long pants in light colors so the insects can be seen easily.
- Use repellent and sleep under mosquito netting.
- Stay inside at times when biting insects are most active, mostly dawn and dusk.
Certain vaccinations * can help protect against infectious diseases that are common in different geographic areas. Depending on the destination and the length of the planned trip, travelers may receive immunizations for hepatitis, meningococcal infection, typhoid fever, or yellow fever, as well as any vaccinations in the regular immunization schedule that the person may have missed or may need to renew, such as those for diphtheria and tetanus. If someone plans to travel abroad, it is important to discuss travel plans with a doctor so that any necessary vaccinations can be given.
* vaccinations (vak-sih-NAY-shunz), also called immunizations, are the giving of doses of vaccines, which are preparations of killed or weakened germs, or a part of a germ or product it produces, to prevent or lessen the severity of a disease.
U.S. Centers for Disease Control and Prevention (CDC), 1600 Clifton
Road, Atlanta, GA 30333. The CDC maintains the Travelers' Health
Information pages at its website. The Travelers' Health section
offers information about many travel-related infections, where they are
found, and the latest research on how to prevent them.
|
<urn:uuid:96eda7a5-4834-475e-ad34-c39dda87f7c5>
|
CC-MAIN-2016-26
|
http://www.humanillnesses.com/Infectious-Diseases-Sk-Z/Travel-related-Infections.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396887.54/warc/CC-MAIN-20160624154956-00049-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.92658 | 3,132 | 3.53125 | 4 |
1 Answer | Add Yours
Let's start by rewriting the equation in standard form.
Factor out the 9 and 4, then complete the square, by adding 1 inside each set of parenthesis. In other words we added 9x1 and 4x1
`9(x-1)^2+4(y-1)^2=36` Divide both sides by 36 we get
Since the number under the y is larger that means we have an ellipse with a vertical major axis.
The center of the ellipse is at (1,1).
The vertices on the major axis are (1,1+3) and (1,1-3) => (1,4) and (1,-2).
The vertices on the minor axis are (1+2,1) and (1-2,1) => (3,1) and (-1,1)
Sorry the program we are using can't be used to graph ellipse. Hope the above info was helpful.
B) Domain [-1,3] and range [-2,4]
C) It is not a function, since if fails the vertical line test.
We’ve answered 328,224 questions. We can answer yours, too.Ask a question
|
<urn:uuid:dd74d6ec-eac6-412c-b5ac-8314c072bf71>
|
CC-MAIN-2016-26
|
http://www.enotes.com/homework-help/sketch-following-functions-relations-supply-domain-336789
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402746.23/warc/CC-MAIN-20160624155002-00035-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.880631 | 270 | 3.40625 | 3 |
The Coping Power Program (CPP) is a cognitive-based intervention delivered to aggressive children and their parents during the children’s transition to middle school. The program aims to increase competence, study skills, social skills, and self-control in aggressive children as well as to improve parental involvement in their child’s education.
Target Population/Program Components
The program has a component aimed at the parents of children in intervention classrooms. The child component of CPP lasts 16 months and includes 22 fifth grade sessions and 12 sixth grade sessions. The parent component is administered over 16 sessions, which provides the parents with instruction on parenting skills, including rule setting, appropriate punishment, stress management, and family communication.
The parent component concentrates on parenting and stress-management skills, while the child component involves the use of school-based focus groups and emphasizes anger management and social problem–solving skills. Parents also meet with CPP staff to help them understand and prepare for future adolescence-related and general education issues, and to give them the tools necessary for a smooth transition to middle school.
The Coping Power Program is a multicomponent intervention based heavily on cognitive–behavioral therapy, which emphasizes increasing and exercising parenting skills and the child’s social skills. The child component of CPP draws from anger management programs that concentrate on decision-making, attributions, and peer pressure.
The Coping Power Program (CPP) was initially developed in the United States; the studies reporting outcome effects after one year (studies 1 and 2) both showed promising, although sometimes inconsistent, effects particularly in study 2. However, an evaluation 5 years after the beginning of the intervention in the Netherlands (study 3) showed no effects, although the study did include a smaller sample size. While the preponderance of evidence suggests promising outcomes, there were some inconsistent findings, which should be considered prior to implementation.
Lochman and Wells (2003) found that the CPP groups had significantly lower scores of self-reported delinquency when compared with the control condition.
Overall the treatment group had significantly lower self-reported substance use than the control group. In particular the authors note that older and moderate-risk children in the treatment group report significantly lower substance use than the control group. However, there was no significant difference between younger high-risk treatment children and the control group.
The treatment group significantly improved their aggressive behavior in school scores as reported by the teacher compared with the control group. This result was seen across treatment conditions.
Lochman and Wells (2004) found that there were no significant differences between the experimental and control groups on measures of overt delinquency (minor assault, felony assault, robbery). However, the experimental group had significant lower covert delinquency (minor theft, felony theft, fraud, destruction of property) than the control group.
The boys in the experimental group had significantly lower substance use scores than the control group on the parent measure scale. Using the child self-report measure, however, there were no significant differences.
The experimental group had significantly better teacher ratings of aggressive behavior than the control group.
Zonnevylle–Bender and colleagues (2007) found that there were no significant differences between treatment and control groups on the delinquency scale.
The treatment group had significantly lower lifetime use of marijuana, compared with the control group, with 13 percent of the treatment group and 35 percent of the control group reporting having lifetime marijuana use. However, there were no significant differences between groups on usage within the last month.
There were no significant differences between treatment and control groups in lifetime or past-month alcohol use.
The treatment group had significantly lower use of cigarettes in the last month, compared with the control group, with 17 percent of the treatment and 42 percent of the control group reporting cigarette smoking in the last month. There were, however, no significant differences on lifetime use of cigarettes.
The Lochman and Wells 2003 study evaluated the effectiveness of the Coping Power Program (CPP) among aggressive children identified in the fourth grade, with the intervention taking place in the fifth and sixth grades. This study examined results at the 1-year follow-up looking in particular at delinquency, substance use, and school behavior outcomes. After the researchers identified moderate- to high-risk aggressive children and received parental consent, 245 children were randomized into intervention and control conditions. The children were spread out through 60 fifth grade classrooms in 17 elementary schools. There were four randomized groups with 59 subjects in the Coping Power–only condition, 61 in the Coping Power and classroom intervention condition, 62 in the classroom-only condition, and 63 subjects in the control condition. There were no significant differences among the groups in terms of aggressive behavior, demographic factors, or teacher-assessed cognitive functioning. The sample had a 2-to-1 boy-to-girl ratio and was predominantly African American (about 75 percent) and white. The classroom intervention, known as Coping With the Middle School Transitions, includes a teacher component in which they meet with Coping Power staff members for five 2-hour sessions. These sessions were used to discuss problem solving around the issue of aggression and to present the CPP format.
The delinquency outcomes were assessed with child self-report surveys based on questions from the National Youth Survey. The substance abuse outcomes were also measured with child self-report, while aggressive behavior in a school setting was measured using the Teacher Observation of Classroom Adaptation—Revised. Results collected at the 1-year follow-up were tested with analysis of variance (aka ANOVA) and analysis of covariance (or ANCOVA), using generalized linear models.
Lochman and Wells (2004) reported the results of their 15-month evaluation of the CPP. In winter 1997, baseline assessment took place of fourth and fifth grade boys with treatment delivered in the spring and during the following academic year. The final sample had two experimental conditions: a CPP with parent intervention (n=60) and CPP for children only (n=60). There were 63 children in the control group. In addition to these three groups of aggressive children, a normative sample of 63 children was also used. The child component consisted of 8 sessions in the first year and 25 in the second year, with each session lasting between 40 and 60 minutes. The parent component consisted of 16 group sessions over the intervention period. There were no significant differences among the three at-risk groups. The total sample was made up of 55 percent fourth graders and 45 percent fifth graders and was 61 percent African American and 28 percent white.
Child measures were taken 1 year after the intervention, while parent measures were taken 6 months postintervention. The National Youth Survey (NYS) provided outcome measures for delinquency, which were separated into overt (minor assault, felony assault, robbery) and covert (minor theft, felony theft, fraud, destruction of property). The NYS also provided the outcomes for the child self-report of substance use. Additionally a parent report of the child’s substance use was used, as well as a teacher assessment of the child’s behavioral improvement. Results were tested with either ANOVAs, ANCOVAs, or multiple analysis of covariance (MANOVAs), using the generalized linear model.
The Zonnevylle–Bender and colleagues (2007) study examined the effects of the CPP program on children with disruptive behavior disorder in the city of Utrecht in the Netherlands. Children were randomized to the treatment and care as usual control group. Children were recruited from psychiatric outpatient clinics over a period of 3 years. To be eligible for inclusion in the study, they had to be between 8 and 13 years old. They additionally had to be living within a family structure, meet an IQ threshold, and have been diagnosed with disruptive behavior disorder. Final sample sizes for participants in the study were 30 in the treatment group and 31 in the control group. There were no significant baseline differences between groups. All subjects were white; 87 percent of the treatment group and 90 percent of the control group were male. At the beginning of the study, the average age of the treatment group was 9.9 years; it was 10.3 years for the control group. The CPP treatment never lasted more than 9 months; it included 23 weekly sessions with children and 25 parent sessions.
Measures were taken 5 years after treatment began. Substance use was assessed using a self-report instrument adapted from the California Student Survey, while delinquency was assessed using the National Youth Survey questionnaire. The authors used one-factor ANOVAs to test results from delinquency self-report, while the substance use measures were tested with Pearson’s chi-squared analyses.
There is no cost information available for this program.
The Coping Power Program Web site notes that active support is required from school administrators and teachers for successful replication. Elementary and middle schools wishing to adopt the program should ensure that they have at least one full-time, master’s-level counselor or other staff with related functions and similar qualifications. Additionally, Child Component group sessions take place during school, last 50 minutes and usually include five children. For more information, visit the Coping Power Program Web site at http://www.copingpower.com/
Evidence-Base (Studies Reviewed)
These sources were used in the development of the program profile:Study 1Lochman, John E., and Karen C. Wells. 2003. “Effectiveness
of the Coping Power Program and of Classroom Intervention With Aggressive
Children: Outcomes at a 1-Year Follow-Up.” Behavior
Therapy 34:439–515.Study 2Lochman, John E., and Karen C. Wells. 2004. “The Coping Power Program for Preadolescent
Aggressive Boys and Their Parents: Outcome Effects at the 1-Year Follow-Up.” Journal of Consulting and Clinical
Psychology 72(4):571–78.Study 3Zonnevylle–Bender, Marjo J.S., Walter Matthys, Nicolle
M.H. van de Wiel, and John E. Lochman. 2007. “Prevention Effects of Treatment
of Disruptive Behavior Disorder in Middle Childhood on Substance Use and
Delinquent Behavior.” Journal of the
American Academy of Child and Adolescent Psychiatry 46(1):33–39.
These sources were used in the development of the program profile:Boxmeyer, Caroline Lewczyk, John E. Lochman, Nicole Powell, Anna Yaros, and Mary Wojnaroski. 2007. “A Case Study of the Coping Power Program for Angry and Aggressive Youth.” Journal of Contemporary Psychotherapy 37:167–74.Cabiya, José J., Lymaries Padilla–Cotto, Karelyn González, Jovette Sanchez–Cestero, Alfonso Martínez–Taboas, and Sean Sayers. 2008. “Effectiveness of a Cognitive–Behavioral Intervention for Puerto Rican Children.” Interamerican Journal of Psychology 42(2):195–202.Ellis, Mesha L., Michael A. Lindsey, Edward D. Barker, Caroline L. Boxmeyer, and John E. Lochman. 2013. “Predictors of Engagement in a School-Based Family Preventive Intervention for Youth Experiencing Behavioral Difficulties.” Prevention Science 14:457–67.Lochman, John E., Caroline Lewczyk Boxmeyer, Nicolle Powell, Lixin Qu, Karen C. Wells, and Michael Windle. 2009. “Dissemination of the Coping Power Program: Importance of Intensity of Counselor Training.” Journal of Consulting and Clinical Psychology 77(3):397–409.Lochman, John E., Nicole Powell, Caroline Lewczyk Boxmeyer, Lixin Qu, Karen C. Wells, and Michael Windle. 2009. “Implementation of a School-Based Prevention Program: Effects of Counselor and School Characteristics.” Professional Psychology: Research and Practice 40(5):476–82.Lochman, John E., and Karen C. Wells. 2002. “The Coping Power Program at the Middle-School Transition: Universal and Indicated Prevention Effects.” Psychology of Addictive Behaviors 16(4S):S40–54.Lochman, John E., Karen C. Wells, Lixin Qu, and Lei Chen. 2013. “Three Year Follow-up of Coping Power Intervention Effects: Evidence of Neighborhood Moderation?” Prevention Science 14:364–76.van de Wiel, Nicolle M.H., Walter Matthys, Peggy T. Cohen–Kettenis, and Herman van Engeland. 2003. “Application of the Utrecht Coping Power Program and Care as Usual to Children With Disruptive Behavior Disorders in Outpatient Clinics: A Comparative Study of Cost and Course of Treatment.” Behavior Therapy 34:421–36.van de Wiel, Nicolle M.H., Walter Matthys, Peggy T. Cohen–Kettenis, Gerald H. Maassen, John E. Lochman, and Herman van Engeland. 2007. “The Effectiveness of an Experimental Treatment When Compared to Care as Usual Depends on the Type of Care as Usual.” Behavior Modification 31(3):298–312.
|
<urn:uuid:9477597f-993c-4a3a-8203-fec6eaf1aaf4>
|
CC-MAIN-2016-26
|
http://www.crimesolutions.gov/ProgramDetails.aspx?ID=241
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391634.7/warc/CC-MAIN-20160624154951-00153-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.944158 | 2,799 | 3.171875 | 3 |
A Guide to the Andrew Jackson Hamilton Papers, 1847-1913
Andrew Jackson Hamilton (1815-1875), governor of Texas, was born in Huntsville, Alabama, on January 28, 1815. He moved to Texas in 1846 and practiced law in La Grange before moving to and settling in Austin. He married Mary Bowen, also of Alabama. Governor Peter H. Bell of Texas appointed Hamilton acting attorney general in 1849. From 1851 to 1853, Hamilton represented Travis County in the state House of Representatives. In 1859, Hamilton was voted into the United States House of Representatives. After returning to Texas in 1861, he won a special election to the state Senate.
Hamilton was appointed military governor of Texas by President Abraham Lincoln in 1862 and provisional governor by Andrew Johnson in 1865, a position he held for one year. He was a proponent of black suffrage and assisted in the organization of the Southern Loyalists' Convention in Philadelphia in 1866. For a short while, Hamilton moved to New Orleans and worked as a bankruptcy judge, but in 1867 he returned to Texas as an associate justice on the state Supreme Court. After proving to be a prominent figure in the Texas Constitutional Convention of 1868–1869, as well as serving on the Republican National Executive Committee, Hamilton changed his views and began to oppose the plan to turn West Texas into a separate, Unionist state and withdrew his support for black suffrage. Because of this viewpoint change, Hamilton became one of the state's leading moderate Republicans and ran (though unsuccessfully) against radical Edmund J. Davis in the 1869 governor's race. Hamilton never sought public office again after losing this election. He died of tuberculosis on April 11, 1875, and was buried in Oakwood Cemetery, Austin.
Source: "Hamilton, Andrew Jackson."Handbook of Texas Online. Accessed May 19, 2010. http://www.tshaonline.org/handbook/online/articles/HH/fha33.html.
Correspondence, speeches, legal records, scrapbook, a proclamation, and a commission comprise the Andrew Jackson Hamilton Papers, 1847-1913, which document Hamilton’s political and legal career in Texas. The papers include speeches given by Hamilton in his position as a state Representative, as a state Senator, and as military and provisional governor. Additionally, the papers relate to secession, Reconstruction, and black suffrage. Due to the fragility of the originals, transcripts of the correspondence and speeches are provided for patron use.
The collection is open for research.
Due to the fragility of the originals, transcripts of the correspondence and speeches are provided for patron use.
Andrew Jackson Hamilton Papers, 1847-1913, Dolph Briscoe Center for American History, The University of Texas at Austin.
This collection processed by Frances Rodgers, March 1975, Angela Olivera, May 1986.
Basic processing and cataloging of this collection was supported with funds from the National Historical Publications and Records Commission (NHPRC) for the Briscoe Center’s "History Revealed: Bringing Collections to Light" project, 2009-2011.
Detailed Description of the Papers
|
<urn:uuid:662c807b-3536-40ad-bead-133f5cbbf430>
|
CC-MAIN-2016-26
|
http://www.lib.utexas.edu/taro/utcah/01452/01452-P.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395546.12/warc/CC-MAIN-20160624154955-00108-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.954123 | 649 | 3.5625 | 4 |
U. COLORADO (US)—While the common perception of asteroids is that they are giant rocks lumbering about in orbit, a new study shows they actually are constantly changing “little worlds” that can give birth to smaller asteroids that split off to start their own lives as they circle around the sun.
Astronomers have known that small asteroids get “spun up” to fast rotation rates by sunlight falling on them, much like propellers in the wind.
The new results show when asteroids spin fast enough, they can undergo “rotational fission,” splitting into two pieces which then begin orbiting each other. Such “binary asteroids” are fairly common in the solar system.
The study, reported this week in Nature, shows that many of these binary asteroids do not remain bound to each other but escape, forming two asteroids in orbit around the sun when there previously was just one.
The researchers studied 35 so-called “asteroid pairs,” separate asteroids in orbit around the sun that have come close to each other at some point in the past million years—usually within a few miles, or kilometers—at very low relative speeds.
They measured the relative brightness of each asteroid pair, which correlates to its size, and determined the spin rates of the asteroid pairs using a technique known as photometry.
“It was clear to us then that just computing orbits of the paired asteroids was not sufficient to understand their origin,” says study leader Petr Pravec of the Astronomical Institute in the Czech Republic. “We had to study the properties of the bodies. We used photometric techniques that allowed us to determine their rotation rates and study their relative sizes.”
The research team showed that all of the asteroid pairs in the study had a specific relationship between the larger and smaller members, with the smallest one always less than 60 percent of the size of its companion asteroid. The measurement fits precisely with a theory developed in 2007 by study coauthor Daniel Scheeres, a aerospace engineering sciences professor at the University of Colorado at Boulder.
Scheeres’ theory predicts that if a binary asteroid forms by rotational fission, the two can only escape from each other if the smaller one is less than 60 percent of the size of the larger asteroid.
When one of the asteroids in the pair is small enough, it can “make a break for it” and escape the orbital dance, essentially moving away to start its own “asteroid family,” he says. During rotational fission, the asteroids separate gently from each other at relatively low velocities.
“This is perhaps the clearest observational evidence that asteroids aren’t just large rocks in orbit about the sun that keep the same shape over time,” says Scheeres. “Instead, they are little worlds that may be constantly changing as they grow older, sometimes giving birth to smaller asteroids that then start their own life in orbit around the sun.”
While asteroid pairs were first discovered in 2008 by paper coauthor David Vokrouhlicky of Charles University in Prague, their formation process remained a mystery prior to the new Nature study.
When the binary asteroid forms, the orbit of the two asteroids around each other is initially chaotic, Scheeres explains.
“The smaller guy steals rotational energy from the bigger guy, causing the bigger guy to rotate more slowly and the size of the orbit of the two bodies to expand. If the second asteroid is small enough, there is enough excess energy for the pair to escape from each other and go into their own orbits around the sun.”
Several telescopes around the world were used for the study, with the most thorough observations made with the 1-meter telescope at Wise Observatory in the Negev Desert in Israel and the Danish 1.54-meter telescope at La Silla, Chile.
“This study makes the clear connection between asteroids spinning up and breaking into pieces, showing that asteroids are not static, monolithic bodies,” says Vokrouhlicky.
New asteroids spotted
The asteroids that populate the solar system are primarily concentrated in the main asteroid belt between Mars and Jupiter some 200 million miles from the sun, but extend all the way down into the inner solar system, which are known as the near-Earth asteroids.
There are likely about a million asteroids larger than 0.6 miles, or 1 kilometer, in diameter orbiting the sun. Last month, NASA’s WISE spacecraft spotted 25,000 never-before-seen asteroids in just six months.
Astronomers believe most asteroids are not solid chunks of rock, but rather piles of debris that come in shapes ranging from snowmen and dog bones to potatoes and bananas, with each asteroid essentially glued together by gravitational forces.
Sun gets involved
“Sunlight striking an asteroid less than 10 kilometers across can change its rotation over millions of years, a slow motion version of how a windmill reacts to the wind,” says Scheeres. “This causes the smaller asteroid to rotate more rapidly until it can undergo rotational fission. It’s not hard for these asteroid pairs to be pushed over the edge.”
Study coauthor Seth Jacobson, a CU-Boulder doctoral student, says the most surprising part of the study was showing that sunlight played the key role in “birthing” asteroids.
“There was a time when most astronomers referred to asteroids as vermin,” says Jacobson. “But the more we learn about them, the more exciting they are. They are not just big chunks of rock, but have the dynamic ability to evolve.”
The asteroids in the study ranged from about 1 kilometer to about 10 kilometers or about 0.6 miles to 6 miles in diameter, said Jacobson. He says one of the biggest questions is what lies beneath the surfaces of asteroids. “This is something we just don’t know yet,” he adds.
The next frontier
Asteroids have become a hot topic, says Scheeres. The Japanese spacecraft Hayabusa made two landings on the asteroid Itokawa in 2005 before its recent return to Earth—the first spacecraft ever to visit an asteroid and return to the planet. Scientists are hopeful the spacecraft recovered at least some particles from the asteroid, which may give them more information about the origin and evolution of the solar system roughly 4.6 billion years ago.
U.S. President Barack Obama this year announced his vision for planetary exploration that involves skipping future manned moon landings in favor of sending astronauts to a near-Earth asteroid in the next two decades. Obama and others see a successful manned asteroid landing as a stepping stone to eventually landing humans on Mars.
“Asteroids are important to understanding life on Earth,” says Pravec. He pointed to the Chicxulub asteroid believed to have plowed into the Yucatan Peninsula 65 million years ago and caused dinosaurs to go extinct, essentially resetting the evolutionary clock on Earth.
Some asteroids have even been found to contain amino acids—the building blocks of life—causing some scientists to speculate that life on Earth could have come from asteroids pelting the planet.
Researchers from institutions in North Carolina, California, Massachusetts, Chile, Israel, Slovakia, the Ukraine, Spain, and France contributed to the work.
More news from CU-Boulder: www.colorado.edu/news/
|
<urn:uuid:2ebc1cf6-e522-4f5b-9725-de5fbe4199b0>
|
CC-MAIN-2016-26
|
http://www.futurity.org/baby-asteroids-make-a-break-for-it/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396949.33/warc/CC-MAIN-20160624154956-00172-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.947572 | 1,547 | 4.21875 | 4 |
El Paso, TX
The large fruited Sweet Peppers come in red, yellow, orange, brown, and purple. Green Peppers are simply unripe fruits and are much inferior in flavor.
- Ease of Growing
- Grown as
- Days to Maturity
- 73-78 (Spring/Summer), 65-80 (Fall/Winter)
- Growing Habit
- Very Tender
Very tender, they can't stand cold weather or frost.
- Spring Transplant
- Growing Season
- Cultivar Type
- Growing Conditions
- Warm, Hot
Peppers originated in the tropical highlands of Central and South America and grow best with warm (70 to 80˚ F) days, cool (55 to 65˚ F) nights and high humidity. If the soil gets above 85˚ F you can cool the soil by applying mulch and watering frequently with cold water.
- Outdoor Growing Temp
- 60°F - 95°F
- Min Outdoor Soil Temp
Peppers originated in the tropical highlands of Central and South America and grow best with warm (70 to 80˚ F) days, cool (55 to 65˚ F) nights and high humidity. If the soil gets above 85˚ F in summer it can slow growth.
- Start Indoors
- Start Outdoors
- Sun: min. 6 hours daily (Warm, Hot)
Full sun. In very hot climates they may benefit from light shade.
Pepper plants are somewhat drought tolerant (especially Hot Peppers), but lack of water can affect fruiting, so they should be kept moist for best production. Drip irrigation works well with Peppers.
Sweet Peppers are particularly vulnerable to water stress when fruiting, so keep the soil evenly moist. If not given enough water, the fruits can develop a slightly bitter flavor (and may get Blossom End Rot).
Don't leave water on the leaves overnight as this encourages disease.
- Needs summer shade
- Small Gardens?
- Yes, but will need a large one, like a half wine barrel
Choose a container at least 16" in diameter. A container with drainage holes is a necessity in order to successfully grow peppers. Cover the holes with weed cloth, newspaper or any other similar material and then fill with potting soil. Peppers love warm weather and will not thrive if temperatures are either too cold or too hot. Place peppers in full sun in warm climates, but be sure they have access to shade in hot temperatures. Keep well-watered. Stake to keep fruit off the ground, mulch for disease and weed control.
- Attracts beneficial insects?
- Fruit Size
- Plant Height
- Plant Diameter
- Hardiness Zone
- Disease Resistance
- Taste Profile
Crisp, thick flesh with a mild pleasant flavor.
|
<urn:uuid:25b381a6-1408-47eb-a7de-0b9573c491a2>
|
CC-MAIN-2016-26
|
http://www.smartgardener.com/plants/1513-peppers-ruby-king/overview
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783408840.13/warc/CC-MAIN-20160624155008-00061-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.866146 | 592 | 3.109375 | 3 |
The Gnostics and Their Remains, by Charles William King, , at sacred-texts.com
The symbols, forming the proper subject of the present enquiry, embodied in their origin the deepest mysteries of Brahminical theosophy; they were eagerly accepted by the subtile genius of the Alexandrine school and applied to the hidden wisdom of Egypt; and lastly, in their captivating and illusory promise of enlightenment, the few bright spirits of the Middle Ages sought for something better than the childish fables, engendered by monkery upon the primal Buddhistic stock, which then constituted the Faith: and these holy figurations still continue to flourish, but only as the insignia and mummery of what, at best a mere charitable, is perhaps only a convivial association. In the same way Apollo's golden Pentagon, which of yore blazed on high above the Delphic shrine, in the Middle Ages the badge of the proudest Order of Chivalry, and a sure defence from peril of lightning and fire, has come at last to be degraded into the mere sign of a German pothouse!
A Master-Mason of the very highest degree lately informed me that he had detected the Signs now in use, engraved amongst the sculptures in the Cave-temples of Elephanta; and, what is still more important, that, although the Brahmins are Masons, yet if a European makes the Sign to them, they immediately put their hands up before their eyes, as if to shut out the sight of the profanation of things holy. But this curious fact can be explained with the utmost certainty. The Dionysiac Mysteries, the most popular of all in Greece, were believed to have been introduced direct from Syria, and necessarily brought along with them all the signs and rites of their birth-place. The painted vases of the period of the Decadence, of the fourth and third centuries before our sera, take for their favourite subject scenes from the celebration of these Mysteries, and in these pictures, mystic
[paragraph continues] Siglæ perpetually recur, amongst which the Fylfot shines conspicuous. But in truth, all the ancient Mysteries came from the East, as their names, the Phrygian, the Mithraic, the Iliac, declare, and these Mysteries existed publicly almost to the close of the Roman Empire, and how much further down into mediæval times they existed as secret and prohibited things, it is impossible to decide.
From the very nature of things we may be certain that their signs and symbols, after the esoteric doctrines were forgotten, passed into the repertory of all "who used curious arts," the alchymists, astrologers, and wizards of the Dark Ages, and then became the property of Rosicrucians, who truly were the parent stock, and not a recent brand (as is now pretended) of the present Freemasons. *
A most important contribution to the history of Masons’ marks has (1877) been obtained through the researches of Sig. Arnoaldi Veli amongst the Gallic cemeteries around Bologna. Many of the vases there exhumed bear Siglæ upon their bases, more rarely upon their sides, which are unmistakably of the same nature, and, what is more curious, are constructed on the same principle as those used by the regular stone-mason at this very day.
Those in Class A (see Veli's Scavi presso Bologna) may be considered as of the highest authority, because they are the actual stamps of the potter, impressed upon the clay before baking. That they distinguished individuals, and were not merely religious symbols, but stood for the proper names of people unacquainted with writing may be inferred not only from the established custom of antiquity in this respect, but from the much more frequent occurrence of the class, of which he gives examples in list B. These are scratched upon the bases after baking, and therefore must have been added by the
buyers, not by the makers. The great variety in the forms of these latter siglæ sufficiently proves that they were the "marks" of private persons, not of clans or tribes. Class C, of similar "marks" engraved upon articles of metal, lead irresistibly to the same conclusion. It must, however, be observed that although these characters cannot be distinguished at first sight from the modern Masons’ Marks of which I have given specimens in the large Plate, it appears upon examination that no care has been taken to make them end in an odd number of points--the guiding rule with the modern craft.
To come from the Cisalpine to the Western Gauls, some evidence of the same practice is deducible from their coins. The large billon pieces, evident copies of Alexander's tetradrachms, found so plentifully in the Channel Islands, often bear a figure, upon the cheek of the Hercules’ head, and repeated in the field of the reverse. What can these symbols, placed so prominently to catch the eye, have been intended for, but to inform the world what particular tribe of the confederation using one national type had issued the coin thus distinguished? There is some analogy to this in the Greek series, where distant cities use the type of Athens, or Corinth, but make it their own by placing some appropriate symbol in the field. We need not, however, carry out this theory to the same fanciful length as does the Baron Donop, who, struck by the evident resemblance of these figures to the Hindoo Caste marks, builds upon it a complete history of the migration of the Aryans into Jersey; and points out the Puranic deities to whom each of such symbols is to be referred. Of these figures, again, a great variety, and much better executed, are to be seen in the field of the pretty hemi-drachms of Solimara; which, as well as those above mentioned, belong to the times immediately preceding Cæsar's conquest of Gaul--a date clearly ascertained from that of the Roman denarii often forming part of the same deposits. Of the continued use of these "Marks" under the Roman rule in Gaul some vestiges are still to be discovered. The "Pile Cinq-Mars" which cuts so ludicrous a figure in Rabelais' description of Garagantua's horse, is a lofty quadrangular column, ending in a point, in the most compact
and skilfully executed brickwork, apparently built within the first century of the Empire. Upon each face, towards the top, are wrought in bricks of different colour from the main structure various devices of the same sort as those of the coins. These can be nothing else than the "armorial bearings," of the several cities or tribes that had combined together for the erection of so costly a monument; which we may safely suppose intended for one of those "plurima simulacra" of Mercury which Cæsar noticed in Gaul, and which forms the intermediate link between the upright stones (menhirs) roughly cut into a phallic shape at top, of the uncivilised aborigines; and the grand Colossus of Zenodorus, to which native taste had advanced by the time of Nero.
A lucky accident has thrown in my way another, and much more curious proof of the use of these "marks" by the more barbarous part of the Celts at a much later period. That the decoration of the skin which gave the name to the "Picts" consisted in stigmata in the literal sense of the word, and not in mere dyeing with woad (like the early Britons), is made out by Claudian's definite expression,
"The Book of Kells" is a MS., written some time in the ninth century. In one of the facsimiles of its pages published by the Palæographical Society, amongst the ornamentation of one vast initial letter, the most conspicuous is the figure of a naked man, writhing himself amongst its most intricate convolutions. This man's body is entirely covered with "marks" of various forms; and from the circumstances under which the drawing was made we can safely assume that we have here preserved to us the portrait of a true Pict, taken from the life. The four centuries that had elapsed since Claudian wrote were not likely to have changed the customs of a country so remote, and in which the small amount of civilisation derivable from its Romanised neighbours must have gone backwards in proportion as they relapsed into their pristine barbarism. This pictured Pict may also lead us to conclude that the sigil
seen upon the cheek of the Jersey Hercules was actually tattooed upon that of the Gaul who issued the coin.
Out of deference to the popular belief in the Masonic Brand mark, I shall wind up this section with a few observations upon that most time-honoured method of distinguishing those initiated into any mystic community. To give precedence to the Patron Saint of Freemasons, St. John the Divine, his making the followers of the Beast receive his Mark "upon the forehead and the palm of the hand," is a clear allusion to the Mithraical practice, of which Augustine (as already quoted) speaks, in mentioning "a certain Demon, that will have his own image purchased with blood." Ptolemy Philopator, whom Plutarch describes as "passing his sober hours in the celebration of Mysteries, and in beating a tambourine about the palace," submitted also to receive the Dionysiac brand-marks; which were, no doubt, those symbols so plentifully introduced into the vase-paintings of Bacchanalian rites. "Brand-marks," however, is an incorrect name for such insignia, for they were imprinted on the skin, not by fire, but by the milder process of Tattooing, as we learn incidentally from Vegetius (I. cap. 8), and also that it was the regular practice in the Roman army, in his day, the close of the fourth century. He advises that the recruit be not tattooed with the devices of the standards (Punctis signorum inscribendus est) until he has been proved by exercises as to whether he be strong enough for the service. That these tattoo marks were the distinctive badges painted on the shields of the different legions, may be inferred from their insertion in the epitaphs of individuals of each corps.
428:* The Jews have a tradition that the boards of the Tabernacle were marked with Hebrew letters, as a guide for their adjustment in the setting up of that migratory Temple. Writing, therefore, becomes one of the thirty-two works interdicted to every religious Jew upon the Sabbath day. It is a singular coincidence that the stones of the Wall of Servius Tullius at Rome are inscribed with Mason's marks that much resemble Phœnician letters.
|
<urn:uuid:18ab184e-9fde-4582-93ca-71a6b861c604>
|
CC-MAIN-2016-26
|
http://sacred-texts.com/gno/gar/gar70.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783400572.45/warc/CC-MAIN-20160624155000-00158-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.96865 | 2,265 | 2.765625 | 3 |
Hello DEN Community and welcome to a series of blog posts designated to invoke your thoughts, ideas, and reflections concerning assessment in education. Over the next few weeks several Leadership Council members have offered to share their thoughts on this popular topic in order to start the conversation. We can’t wait to read your reflections and respond to your comments as we all learn together!
What is assessment?
-written by Trudi Lawless, FL LC
Someone sent out this question on Twitter recently and the question made me pause. Having been a teacher for over 10 years now, I’ve done a lot of assessing; at least I thought I had. After some thought on the subject, I replied: “Assessment is the process of determining if ‘the package’ has been received in good order”. I think that sums it up for me. Did I do what I needed to do, as a teacher, so that the learning I intended, took place. There’s been a lot of discussion on this topic recently and I’d like to put my vote in for Performance Assessment. I think our generation is in the throes of a paradigm shift and it feels like an earthquake sometimes. The times they are a changing. This has always been true, but our students are just different than any other generation’s students. They have been immersed in a deluge of technology and information. Performance Assessment gives the learning context and relevance. This video sums all this up. Enjoy.
|
<urn:uuid:34948189-5b22-40f0-b152-a03bc3127831>
|
CC-MAIN-2016-26
|
http://blog.discoveryeducation.com/blog/2011/08/11/assessment-thoughts-from-your-lc-members-part-1/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783392527.68/warc/CC-MAIN-20160624154952-00188-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.973209 | 307 | 2.546875 | 3 |
What is an insecticide?
An insecticide is one type of pesticide that is used to control insects by repelling, killing, or preventing reproduction. There are different forms of insecticides which target different stages of the life cycle, including: ovicides (used against eggs), larvicides (used against insect larvae) and adulticides (the most common kind of insecticide, used against fully developed adult insects). Insecticides are used in all fields of medicine, agriculture, industry, and household for various reasons to control all forms of flying and crawling insect pests.
Classes of Insecticides
There are several different ways of classifying insecticides:
- Systemic insecticides are sprayed on and absorbed by plants. Insects then ingest the insecticide while feeding on the plants.
- Contact insecticides are meant to kill insects on contact. Contact insecticides most often take the form of aerosol sprays.
- Natural insecticides are derived from plants materials. Some examples of natural insecticides include nicotine and pyrethrum.
- Inorganic insecticides are often derived from metals or arsenic-containing compounds. Some may be man-made or synthetic. Examples of inorganic insecticides include boric acid, diatomaceous earth, and silica gel.
- Organic insecticides are derived from living materials such as plant oils and fatty acids, and are thought to be the most environmentally sound among insecticides, causing no harm to humans, animals, or the earth. Organic insecticides make up the majority of pesticides available for use today.
Every insecticide has one or more "active ingredients". An active ingredient is the element in the insecticide solution that gives it its repelling or killing power. The active ingredient is always listed on the label, and at DoMyOwnPestControl.com, you can find the active ingredient of every product listed at the very top of the product page. Read more on active ingredients.
Mode of Action
Every active ingredient has a different mode of action. The mode of action is the way that the insecticide kills or repels the target pest. For example, Deltamethrin (the active ingredient in Delta Dust) kills by acting as a high-power poison to the insect's central nervous system. Once poisoned, the insect's nerve cells become excited, causing paralysis and eventual death. Hydramethylnon (the active ingredient in Maxforce Ant & Insect Bait) is one among a group of pesticides known "metabolic inhibitors". While the majority of insecticides attack the insect's central nervous system to cause nerve excitation, metabolic inhibitors like hydramethylnon attack the insect's metabolic systems, resulting in decreased energy, lethargy, and the inability to perform basic life-sustaining functions such as feeding and grooming. You can find out just how different insecticides work and determine their mode of action by searching for the active ingredient on DoMyOwnPestControl.com or the world wide web.
Insecticide Toxicity - "Follow the Label"
It's true that insecticides are generally poisonous to humans. However, there is a surefire safe way to use pesticides so that they will not harm you, your children, or your pets-- that is to follow the label. "Follow the label" is a phrase you will often find quoted by pest control professionals and others teaching about insecticide use. This is more than good advice; it is the law. Every insecticide on the legal market must first be approved by a government agency called the Environmental Protection Agency (or EPA) before it is sold. Extensive studies are conducted to guarantee that an insecticide is both effective against the target pest and safe for humans to use in and around their homes when directions on the label are adhered to.
Insecticides are available in various "formulations". A formulation is simply the form of a specific product that you use. Some insecticide formulations include dusts, gels, granules, liquids, aerosols, wettable powders, concentrates, and pre-mixed solutions. An insecticide formulation consists of the active ingredient plus various additives (such as emulsifiers, solvents, or other materials added to the product for ease-of-use and safety).
Any given active ingredient can often be purchased in more than one formulation. For example, the active ingredient Deltamethrin is available as a granule (DeltaGard G Granules), a suspension concentrate (Suspend SC), a dust (Delta Dust), and an aerosol (D-Force HPX). Same active ingredient, four different products. Knowing the characteristics of a given formulation will help you to choose the right product for your needs and use that product more effectively.
2 of 2 people found this article informative and helpful.
|
<urn:uuid:ab275804-7323-4365-a35c-4766055cfcd0>
|
CC-MAIN-2016-26
|
http://www.domyownpestcontrol.com/insecticides-101-a-287.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395166.84/warc/CC-MAIN-20160624154955-00161-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.924992 | 979 | 3.28125 | 3 |
On May 20, 2013, a huge tornado wreaked havoc on Moore, Oklahoma, tearing right through the town. It was rated an EF5, the highest possible, with 340 km/hr (210 mile/hour) winds. Two dozen people lost their lives, hundreds were injured, and thousands of buildings sustained damage—from minor problems to complete razing.
Two weeks later, from high above, the Terra Earth-observing satellite peered down at the region and took this picture showing just how laser-focused the tornado was:
The image shows an area about 15 kilometers (9 miles) wide. It’s false color, combining visible and infrared light to highlight various aspects of the terrain. Red shows vegetation (which is highly reflective in the infrared), blue water, and bluish-gray roads and buildings. The track of the tornado is obvious; the color is due to the lack of vegetation which was ripped up by the fierce winds. The path extends down and to the left, beyond the frame of this image (though you can see the whole thing in the full-size image); the tornado was ultimately on the ground for a length of 27 kilometers (17 miles).
The tornado path can be seen easily from the ground, of course, but an overview like this helps pinpoint the size and scope of the event. Also, not every tornado goes through a populated area where the eventual path can be easily mapped. Data like this, combined with “ground truth” and other satellite observations, help meteorologists understand the formation and behavior of tornadoes and other violent weather events. [As an aside, the European Proba-V satellite recently started observing the Earth, specifically looking at vegetation patterns.]
The personal scope of this event is difficult to understand if you’ve never experienced it; I’ll admit I haven’t, though I’ve had my share of terrifying moments in various hurricanes. But I’m glad we have so many means to study tornadoes, including satellites capable of observations like this. We may never be able to control the weather, or prevent tornadoes from forming, but in disasters like this, seconds count. The more lead-time we can give people that it’s headed their way (and the better we can communicate to them), the better.
|
<urn:uuid:1c8397b0-5924-4c20-b3b8-77fecc0d1b09>
|
CC-MAIN-2016-26
|
http://www.slate.com/blogs/bad_astronomy/2013/06/09/satellite_view_of_a_tornado_the_moore_ok_devastation_seen_from_space.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783404826.94/warc/CC-MAIN-20160624155004-00065-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.952622 | 474 | 3.5625 | 4 |
The Jupiter 2 was a United States spaceship launched by Alpha Control on October 16, 1997 on a five-year mission to a planet in the Alpha Centauri system. At the time of its launch, the Jupiter 2 was considered "the most sophisticated piece of hardware yet devised by the mind of man".
The ship was manned by the Robinson family: John, Maureen, Judy, Penny, and Will, along with pilot Major Don West and an Enviornmental Control Robot. The mission was sabotaged by stowaway Zachary Smith, and the crew became lost in space. ("The Reluctant Stowaway")
The Jupiter 2 was two stories high, with both floors connected via an elevator. Each level was operationally self-contained. ("The Reluctant Stowaway")
There was presumably also a Jupiter 1 (perhaps as an inside joke, in Irwin Allen's film "Five Weeks In A Balloon", which was produced just prior to Lost In Space, as the balloon's name was the Jupiter).
In the original pilot, the ship was called the Gemini 12, but this was changed to the Jupiter 2 ostensibly to avoid confusion or identification with NASA's manned space program. A possibly apocryphal story involves Irwin Allen showing the design of the ship to NASA, who then promptly told him what was wrong with it technically and then he changed the name in a fit of pique.
The original design for the ship had no lower living deck and the crashed ship was to have a large hole in the back hull opposite of the operator controls.
The ship is equipped with a sonic washer to handle routine cleaning jobs such as laundry. But in keeping with the morals and television code of the time, there are no bathrooms, showers, or toilets shown or indicated.
In the episode "Space Creature", the ship is shown to have a third deck below the living quarters that contains the ship's power core.
As is common in mass media science fiction, LIS often uses "fuel" and "propellant" interchangeably. The Jupiter 2 uses "deutronium" as a fuel, a liquid obtained from "concentrating certain radioactive ores" according to Prof. Robinson. The production team was probably thinking of deuterium, an isotope of hydrogen,specifically in the form of heavy water (deuterium oxide) used in fission reactors to slow neutrons, since deuterium itself is a gas under normal conditions. In "The Girl from the Green Dimension" the fuel reserves are accidently jetisoned by Dr. Smith and are shown as collections of cylinders floating in space. The substance used to propel the Jupiter 2 is never revealed.
|
<urn:uuid:e7409e74-f908-41a7-acae-6c90dc897647>
|
CC-MAIN-2016-26
|
http://irwinallen.wikia.com/wiki/Jupiter_2
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395620.56/warc/CC-MAIN-20160624154955-00106-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.966283 | 547 | 2.71875 | 3 |
Light Switch Wiring Video
First step in any wiring project is to turn off the circuit breaker for that circuit. The wiring for a normal light switch consists of three wires. Two black wires and a grounding wire. The grounding screw on the light switch will be green.
The black wires can connect to either of the two screws on the side of the switch. Loop the wire onto the switch screw correctly so as the screw is tightened, the loop in the wire will close tighter.
Connect the bare copper grounding wire to the green grounding screw on the side of the light switch.
Once you have checked your connections, turn the circuit breaker on and flip the switch.
|
<urn:uuid:c10420aa-3f17-42d1-aa06-b48e9d4e8def>
|
CC-MAIN-2016-26
|
http://www.askthebuilder.com/light-switch-wiring-video/?awt_l=I5gvY&awt_m=JsnH79Ht3bNiL5
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395620.56/warc/CC-MAIN-20160624154955-00042-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.882558 | 135 | 3.5625 | 4 |
Wolf for Africa
The Egyptian jackal has been recognised as a large and rare subspecies of the golden jackal, though even the great Victorian, Thomas Huxley, thought the skull resembled the grey wolf. With all of the useful advances in genetics it was possible to assign it to the wolf species (Canis lupus) instead of the golden Jackal (C. aureus.)
The map below shows only two current wolf sub-species. The Indian wolf (C. lupus pallipes) and the Himalayan wolf (C. lupus chanco) seem most closely related to our Canis laureus lupaster. There is also a cousin in Ethiopia, as well as 30 genetically similar sub-species worldwide. It seems that this "new" wolf is in fact from an ancient lineage that colonised Africa before the northern radiation of present-day wolves to Europe, Asia and North America.
Map of distribution ranges and samples; Credit: PLoS ONE
(Above) The distribution area of the golden jackal in Africa and Eurasia is shaded dark grey. The samples analysed are shown as symbols: squares = C.a. lupaster and stars = C. aureus.
The number next to the symbols equals the number of samples from each site. The approximate border of the distribution areas of C. lupus pallipes and C. lupus chanco are delineated by black and slashed lines respectively.
There is only one wolf previously ascribed to Africa. The endangered Ethiopian wolf is not a C.lupus sub-species, being listed as Canis simensis. Eli Knispel Rueness and all of his colleagues studied this rare animal which lives alongside the golden jackal. It was this research that led to the location of larger, more slender golden jackals. They indeed turned out to be the new species. The fact that they live 2500km south-east of the other Egyptian wolves extends the grey wolf's range considerably.
Genetically they were close to identical, meaning there has been little isolation, at least in the past. Current situations in the region mean that conservation is imperative. These animals, both in Egypt and Ethiopia, could be the last of their race. At the very least, we can now look forward to a new name.
Perhaps it will simply switch its middle name from aureus to lupus, but that seems paltry after such an ancient history of survival. Perhaps someone will provide a magnificent moniker such as Canis lupus africanis, symbolising our struggle with dog nomenclature and its own bitter fight for survival against the odds!
|
<urn:uuid:d09df448-f1d3-4bbc-862d-c554dc09fbc9>
|
CC-MAIN-2016-26
|
http://www.earthtimes.org/green-blogs/green-living/wolf-africa-canis-lupus-21-May-12/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399117.38/warc/CC-MAIN-20160624154959-00052-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.950588 | 545 | 3.65625 | 4 |
OAKLAND, Calif. — A woman's risk of developing a type of diabetes typically caused by pregnancy can be identified up to seven years prior to becoming pregnant, according to a new study by Kaiser Permanente.
The study, part of Kaiser Permanente's ongoing research to understand, prevent and treat gestational diabetes mellitus, found that routinely assessing blood sugar and body weight measures can provide women with insight on their risk of developing GDM.
By examining data taken from 580 ethnically diverse women who took part in a multiphasic health checkup at Kaiser Permanente Northern California between 1984 and 1996, researchers at the Kaiser Permanente Division of Research found that the risk of GDM directly increased when a number of adverse risk factors commonly associated with diabetes and heart disease (i.e., high blood sugar, hypertension and being overweight) were present before pregnancy.
What's more, the study authors found that adverse levels of blood sugar and body weight were associated with a 4.6 times increased risk of GDM, compared with women with normal levels.
"Our study indicates that a woman's cardio-metabolic risk profile for factors routinely assessed at medical visits, such as blood sugar, high blood pressure, cholesterol and body weight, can help clinicians identify high-risk women to target for primary prevention or early management of GDM," said lead author Monique Hedderson, a research scientist at the Kaiser Permanente Division of Research.
|
<urn:uuid:27e56f8f-337e-4a3b-9a7d-48f4473f2dc3>
|
CC-MAIN-2016-26
|
http://www.drugstorenews.com/article/gdm-risk-can-be-assessed-prior-pregnancy?ad=health-wellness
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397795.31/warc/CC-MAIN-20160624154957-00180-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.944306 | 296 | 2.734375 | 3 |
Details about Presidential Leadership in Political Time:
Explains the typical political problems that presidents confront in political time, as well as the likely effects of their working through them. This title draws out parallels in the politics of leadership between Andrew Jackson and Franklin Roosevelt and between James Polk and John Kennedy.
Back to top
Rent Presidential Leadership in Political Time 1st edition today, or search our site for other textbooks by Stephen Skowronek. Every textbook comes with a 21-day "Any Reason" guarantee. Published by University Press of Kansas.
Need help ASAP? We have you covered with 24/7 instant online tutoring. Connect with one of our tutors now.
|
<urn:uuid:d2b9c2c1-9a57-40aa-bb59-69fba08f05f3>
|
CC-MAIN-2016-26
|
http://www.chegg.com/textbooks/presidential-leadership-in-political-time-1st-edition-9780700615759-070061575x
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397749.89/warc/CC-MAIN-20160624154957-00055-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.95325 | 137 | 2.765625 | 3 |
What's the Latest Development?
A new aspirin designed at a New York medical center has proven effective at controlling a host of cancers while leaving the body's healthy cells unharmed. In laboratory tests, the aspirin controlled the spread of colon, pancreatic, lung, prostate, breast, and leukemia cancers. What makes the aspirin so potent? "One arm of the hybrid aspirin releases nitric oxide (NO), which helps protect the stomach lining. The other releases hydrogen sulfide (H2S), which the researchers have previously shown enhances aspirin's cancer-fighting ability."
What's the Big Idea?
Aspirin has long been the go to solution for minor aches and pains. In the 1980s, it was discovered that regular doses of aspirin could help prevent instances of heart attack and stroke by preventing blood clots. More recently, doctors have discovered its anti-cancer properties. Dr. Khosrow Kashfi, the principal investigator behind the new aspirin study, says daily doses of normal aspirin reduces instances of colon cancer by 50 percent and that the new hybrid aspirin is 100,000 times more effective, meaning less medicine is needed to achieve the same result.
Photo credit: shutterstock.com
|
<urn:uuid:0ca41dff-d133-46d2-9f56-2de88476c828>
|
CC-MAIN-2016-26
|
http://bigthink.com/ideafeed/designer-aspirin-curbs-cancer-growth
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395620.9/warc/CC-MAIN-20160624154955-00080-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.93231 | 244 | 2.859375 | 3 |
• Friedman is a free market capitalist.
• Definition of liberal as described by Friedman has changed over time.
• Friedman explains that the term liberal formerly was associated with free markets, and now it is associated with government assistance.
Chapter 1, The Relation between Economic Freedom and Political Freedom
• Friedman asserts that economic freedom is necessary for political freedom.
• Economic freedom, as described by Friedman, is the ability for individuals to make decisions for themselves and enter into contracts voluntarily.
• Friedman believes that government is needed for the "rules of the game" and to interpret and enforce the rules.
Chapter 2, The Role of Government in a Free Society
• Friedman explains there is a limited time and place for government intervention in a free society.
• Friedman believes that government should establish the rules and then be an "umpire" to interpret the rules.
Chapter 3, The Control of Money
• The Federal Reserve Act...
This section contains 573 words
(approx. 2 pages at 300 words per page)
|
<urn:uuid:8b0ecf08-b9a2-4d2b-8164-17634c0d0a94>
|
CC-MAIN-2016-26
|
http://www.bookrags.com/lessonplan/capitalism-and-freedom/abstracts.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402746.23/warc/CC-MAIN-20160624155002-00131-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.922621 | 211 | 2.84375 | 3 |
Alasdair MacIntyre, who is probably the greatest living philosopher, concludes his 1981 masterwork After Virtue by saying, “We are waiting not for a Godot, but for another—doubtless very different—St. Benedict.” In that book MacIntyre argues that a correct understanding of morality is based neither on Kant’s deontology, nor on Mill’s utilitarianism, nor yet on social contractarianism—the three moral systems that dominate contemporary moral discourse. Rather, a correct understanding of morality is based on Aristotelian concepts—primarily the idea that human nature implies a natural telos, or end, with actions being morally right or wrong depending on whether they are properly ordered to that end, and the virtues being consciously developed habits of choosing right actions and avoiding wrong ones. Although this understanding of morality was lost at the beginning of the modern era, living a good human life nevertheless depends on its recovery.
Because achieving the human telos is essentially a shared project among human beings living in community, and because the wider society and the liberal democratic state have no conception of this project, MacIntyre concludes that “what matters at this stage is the construction of local forms of community within which civility and the intellectual and moral life can be sustained through the new dark ages which are already upon us.” Just as, at the fall of the Roman Empire, St. Benedict founded the monasteries that helped preserve Western civilization, so, too, today we need someone to show us how to form small communities that will do the same for us—hence MacIntyre’s reference to St. Benedict. As he elaborated these views, MacIntyre went on to convert, first to a Thomistic understanding of Aristotle and then to Roman Catholicism.
MacIntyre is one of my intellectual heroes. I agree with the central arguments of After Virtue , and I have learned more about morals from MacIntyre than from any other human being alive. It pains me, therefore, to have to disagree with him about anything. As Aristotle said of Plato, however, if we are to be true lovers of wisdom, we must honor the truth more than our friends, and so destroy even that which touches us most closely if truth so demands. I am referring, in this case, to MacIntyre’s views on capitalism—views he reiterated most recently in a lecture last summer at Cambridge University. His immediate topic was the financial crisis of 2007–2008, but he based his discussion on his views about capitalism generally. Early in his life MacIntyre was a Marxist, and although his views subsequently evolved dramatically, he often has said that he continues to accept much of Marx’s critique of capitalism. These views of his are, I shall argue, false, dangerous, and unrelated to an Aristotelian moral philosophy.
The foundation of MacIntyre’s argument about the financial crisis is—believe it or not—Marx’s theory of surplus value. Following classical Marxist theory, MacIntyre defines surplus value as “the difference between what the labor of productive workers earns in wages and what capitalists receive for the products of that labor”—that is, the difference between the value of the goods produced by a firm and the amount paid in the aggregate to its workers. Capitalists appropriate this difference and so exploit labor. Of course, capitalists want to maximize their profits and so keep workers’ wages as low as possible. “But, insofar as they succeed, they create a recurrent problem for themselves. For workers are also consumers, and capitalism requires consumers with purchasing power to buy the products that are brought to market. So there is a tension between the need to keep wages low and the need to keep consumption high.”
According to MacIntyre, the capitalists temporarily solved this problem by what he calls “the infliction of debt.” That is, the capitalists marketed to consumers various forms of credit—such as credit cards, home mortgages, and student loans—that allowed consumers to buy the capitalists’ goods now, thus transferring future consumption to the present and creating a false prosperity. “So,” he concludes, “for the moment, for a very considerable moment, the problems arising from the appropriation of surplus value were resolved.”
To extend credit to consumers, however, financial professionals had to invent and market the needed financial products. In so doing, they transferred to others risks “that exposed to ruin millions of people who were quite unaware that they had been thus exposed.” Indeed, the moneymen are in the business of “transfer[ring] as much risk as possible to others” without “explain[ing] to others the nature and extent of the risk that they are taking on.” This is not a mere abuse of the system, but its very essence. In other words, the financial sector is inherently dishonest the way burglary is inherently dishonest. New regulations will not help. Regulated burglary may be better than unregulated burglary, but it is still burglary, and it is still wrong. For MacIntyre something analogous is true for many activities of the financial sector.
If MacIntyre were even close to right about any of this, we would need a revolution, and MacIntyre understands this very clearly. As to the nature of that revolution, sometimes he has been coy, saying that, in waiting for the new St. Benedict, we are waiting for “new and unpredictable possibilities of renewal.” In the lecture at Cambridge, however, he was more definite, describing as examples of the small communities he favors a diesel-engine business founded by two individuals, the collectivist agricultural arrangements of seventeenth-century Guaraní Indians, some of the early Israeli kibbutzim, and the small farmers of Donegal, Ireland, who established a collective to sustain their Irish-speaking community.
Similarly, in the preface to the 1995 edition of his 1953 book Marxism and Christianity , MacIntyre mentions “relatively small-scale and local communities” such as certain ancient cities, medieval communes, and “modern cooperative farming and fishing enterprises.” In these communities “social relationships are informed by a shared allegiance to the goods internal to communal practices, so that the uses of power and wealth are subordinated to the achievement of those goods,” and members of such communities may “pursue their own goods rationally and critically.” This is not clear from the text of After Virtue , but the “local forms of community within which civility and the intellectual and moral life can be sustained” that MacIntyre mentions in that book turn out to be economic communities. We’re waiting not so much for St. Benedict but for St. Vladimir, a baptized Lenin.
Much has gone wrong here, both in economics and in philosophy, and the best place to begin is with Marx’s theory of surplus value. Although Marx regarded this as one of his greatest theoretical results, virtually no one working in economics thinks this theory is correct. The reason is straightforward: The total value of the firm’s product is obviously the combination of all the inputs—not just the labor of human beings but also the raw materials, plant and equipment, intellectual inputs (such as patents and technology), and other factors of production. Marx recognized this but thought capital goods used in production were merely the embodiment of past labor. Even if we were to accept this dubious theory, however, most people would say that the owners of such forms of embodied labor—what we normally call private property—are entitled to the value the use of their property generates. Aquinas, who expressly defends private property as being in conformity with the natural law (indeed, the idea of private property is presupposed by the commandment of the Decalogue against stealing), certainly would have said this, and Leo XIII, in Rerum Novarum (1891), was explicit in his defense of private property, including productive private property, against Marxist attacks.
Workers thus are entitled, not to the full value of the products they produce, but only to the portion of that value due to their efforts—to how much their labor increases the value of other inputs. Under competitive labor conditions—roughly, when there are many employers and many employees, all free to bargain with each other over what wages they will pay and accept—the prevailing wage in a market will equal the increase in value that labor produces. Similarly, under competitive conditions in capital markets, the return on capital will equal the increase in value that the use of capital generates. Competitive markets thus do not exploit labor. On the contrary, they ensure that both labor and capital are rewarded according to their roles in producing goods and services. Marx’s theory of surplus value is simply a fallacy and has long been recognized as such.
Without the theory of surplus value, the rest of MacIntyre’s argument about the financial crisis crumbles, but it is still remarkable for his warrantless and sometimes outlandish assumptions about modern economies. For instance, take the fantasy that capitalists keep wages low to maximize their profits but then endanger the system because they also are reducing the spending power of consumers. There are no fewer than three serious mistakes here.
First, although MacIntyre believes that there is “an entirely one-sided dependence” of labor on capital, in reality capitalists have no ability to keep wages low. In modern economies, wages are set in a very competitive market. There are huge numbers of employers and employees, and employees are well informed about wage rates and voluntarily change jobs frequently. Employers thus are unable to set wages unilaterally because they face effective competition from other employers who will bid wages up to the competitive level. Toyota, for example, can no more set the wages it pays workers in its plants than it can set the price it charges consumers for its cars; it is constrained in the latter case by competition from Honda, GM, and Ford, and in the former case by competition from thousands of other employers. In economic jargon, Toyota has no market power , whether on the car market or on the employment market. Capitalists thus do not determine the wages of laborers. Rather, employers compete with each other to bid up wages. The competitive market for labor does not exploit workers; it protects them from exploitation.
Second, even if a particular employer did perchance have market power on the employment market and so could lower wages, contrary to what MacIntyre says, doing so clearly would be in that employer’s interest. The employer might lose a little in lost sales but would gain much more in lowered labor costs. This is because the employer would capture the entire benefit of reducing its workers’ wages, but the decrease in the workers’ purchasing power would affect the sales of all firms selling to those workers. In other words, all the benefits would flow to the wage-cutting firm, but the costs would be dispersed over a wide range of firms. The bind MacIntyre imagines results not if some firms have market power on the employment market but only if all or most do, which is simply absurd. Or, perhaps, MacIntyre is asking us to believe that all the capitalists are involved in a conspiracy to keep wages low—the largest, most successful price-fixing conspiracy in history, and one that somehow has been overlooked by the Antitrust Division of the Department of Justice.
Third, MacIntyre speaks, as Marxists employing class-based analyses generally do, as if there were one group of people (“the capitalists”) and another group of people (“the workers”) who have opposing interests. This would make sense if, for a large majority of people, their capital were either almost entirely human capital (that is, the potential for performing valuable labor) or almost entirely nonhuman capital (that is, productive property). But this is not true, for, contrary to MacIntyre’s assertions, capitalism has produced a greater equality of income and wealth across society than the human race has known at any time since it overcame its prehistoric, universal poverty. As a result, most people today have a significant mix of human and nonhuman capital. Indeed, over the course of a lifetime, many “workers” in capitalist economies can accumulate capital equal to several years’ wages—a feat that would have been unthinkable in the ancient cities or medieval communes MacIntyre admires.
Furthermore, nowadays almost all large firms are public companies whose shares trade on organized markets such as the New York Stock Exchange or NASDAQ. For most such companies a large majority of their shares (commonly 70 percent or more) are owned, not by wealthy individuals but by such institutional investors as unions, pension funds, and mutual funds. These institutions invest the retirement and other savings of millions of American workers. For example, the California Public Employees Retirement System invests hundreds of billions of dollars on behalf of about 1.6 million employees of the state of California and its counties and municipalities. In other words, we’re all capitalists now. Indeed, the University of Notre Dame, where MacIntyre works, offers its employees the opportunity to invest their retirement savings in mutual funds. I assume MacIntyre lives up to his principles and eschews this opportunity, keeping his savings in cash under a mattress or in Krugerrands in a coffee can, but most of his fellow academics are wage-lowering, debt-inflicting capitalists.
If consumer credit products are not tools in a conspiracy to prop up the capitalist system, why do we have such things? The answer is that a capitalist economy makes financial products available for exactly the same reason it makes iPods, air travel, and sushi available: People want these things and are willing to pay for them. It’s a fact about human beings that, with the accumulation of skills and experience, our earning power increases over time, making it likely that we will earn more per year in our later working years than in our earlier ones. Without consumer credit markets, consumers would have to consume less when they’re young and more when they’re old. Perfectly reasonably, most people prefer a more uniform level of consumption across their lifetimes. Thus, a young couple with good prospects may want to borrow money to provide a spacious home for their children and not cram them into a tiny rental while waiting until the kids are grown and gone before they can afford a big house. Consumer credit thus responds to the reasonable desires of consumers, allowing them to trade future consumption for current consumption.
As to MacIntyre’s theory about the “infliction of debt,” no one is forced to borrow money in a capitalist economy. Debt could only be inflicted if the banks somehow tricked the hapless workers into taking on debt they could not reasonably hope to repay. Of course, no rational lender ever intentionally lends to someone who is unable to repay; that’s a sure way to lose money. All accounts of the financial crisis that involve lenders doing such things founder on this fundamental point. For a while, some people put about the idea that lenders were able to make bad loans and then transfer them to investors by securitizing them. This is a myth. All kinds of loans were securitized for decades without creating such a problem, and all kinds of securitizations, including those of subprime mortgages in the years before the financial crisis, were structured to ensure that loan originators retained substantial risk on the loans they securitized. That’s why, when the financial crisis hit, all the loan originators suffered huge losses and many of them went bankrupt.
Even MacIntyre’s account of how the banks tricked consumers into taking on too much debt cannot stand up to elementary scrutiny. In his view, the banks tricked consumers by not explaining to them the risks they were taking on. But the key event in the financial crisis was the bursting of a bubble in the housing market—that is, a sudden and sharp drop in housing prices. This made many houses worth less than the outstanding balance on the mortgage, which makes refinancing impossible and encourages default. Did the banks know housing prices might crash? While some of them eventually suspected there might be a crash, most never did. We know this because, if they had, the banks could have sold short the relevant mortgage-backed securities and so made, not lost, money when the bubble burst. Because most major financial firms lost money, they clearly did not foresee the crash.
Indeed, before the bubble in the housing market burst, most knowledgeable people, including Alan Greenspan and Ben Bernanke, thought the risk of a bubble in that market was remote. They had good reason for this because, for as long as people had kept reliable statistics, nothing like the sharp decline in U.S. housing prices that we saw in 2007 and 2008 had ever occurred. Lenders may have had slightly better information about the relevant risk than did borrowers in the sense that the lenders knew more precisely how remote the risk seemed based on historical data, but MacIntyre’s story of banks who knew the risks and passed them off on unsuspecting consumers is a fairy tale.
Moreover, imagine what would have happened if, as MacIntyre would have it, the banks had explained to borrowers the nature of the risk they were taking on. As anyone who has ever taken out a mortgage knows, there are countless forms to sign, many of which are disclosure forms explaining various risks. Suppose that lenders were required to add yet another form, this one explaining that the house the borrower was buying might decline in value—might even decline in value by 20 percent in one year, even though such a decline would be unprecedented. How many home buyers would have walked away from the deal after reading that disclosure form? Obviously, almost none. Lenders could have provided the exact disclosure MacIntyre wants, and it would have made no difference at all.
More generally, MacIntyre’s idea that financial professionals make their living passing off risks on unsuspecting counterparties is fanciful. Financial transactions transfer risks, but in general financial institutions make money, not by passing off risk onto others, but by either intermediating financial relationships or accepting risks that they can bear more efficiently than can their counterparties. For example, commercial banks take deposits from consumers in the form of checking and savings accounts and lend money to consumers and businesses in the form of mortgages and commercial loans. The banks thus intermediate between people who want to save and people who want to invest—an important social function. Moreover, because the deposits have to be returned on demand, but the loans generally are repaid only after many years, commercial banks are borrowing short term and lending long term. They thus accept interest-rate risk from their depositors and credit risk from their borrowers. Because banks have expertise in computing these risks, they can bear them more efficiently than can other parties. In this way commercial banks serve the common good by reducing the cost of capital, which makes it easier for individuals and businesses to invest in projects that increase the total stock of goods and services for everyone.
Capitalism efficiently delivers goods and services, but it is not a perfect system—far from it. To be sure, capitalism has costs of various kinds. It is a key insight of modern economics, however, that all solutions to a given problem have costs, and we delude ourselves if we think we can find a perfect (in the sense of costless) solution. Despite its costs, capitalism has raised up from poverty hundreds of millions of human beings, fed, housed, and clothed them vastly better than their ancestors, lengthened their lives and preserved them from disease—and all in ways that people living in early ages could not possibly have imagined. When people respond to the financial incentives capitalism creates, they often are not doing much to improve their souls, but the capitalist system has done more—much more—to improve the material conditions of mankind than all the corporal works of mercy performed by all the Christian saints throughout the ages. For this reason a foundational attack on capitalism is an attack on the material well-being of the human race and especially an attack on the poor, who have been most helped by capitalism.
MacIntyre concedes that “capitalism has been able to generate material prosperity at a higher level and for more people than any other economic system in human history.” He thinks this is irrelevant, however, because, even if it makes everyone better off materially, capitalism is still systematically unjust. His primary argument for this is Marx’s surplus theory of value, which, as we have seen, is quite untenable. MacIntyre also has two philosophical arguments, however, and both are related to his Aristotelian moral philosophy.
First, MacIntyre argues that capitalism is immoral because it systematically teaches people to regard as a virtue the vice of greed. Capitalism does this by educating people to regard themselves primarily as consumers so that “what constitutes success in life becomes a matter of the successful acquisition of consumer goods, and thereby the acquisitiveness which is so often a character trait necessary for success in capital accumulation is further sanctioned.” Indeed, “the drive to have more and more becomes treated as a central virtue.”
We may waive the latent contradiction in this accusation (no one can both consume too much by buying things and save too much by accumulating capital) because the more serious problem is merely to determine what MacIntyre means. He cannot mean that capitalism is the cause of greed, for greed is a universal human failing known in all cultures.
As MacIntyre himself notes, the Greeks knew the “drive to have more and more” as pleonexia , and both the Old and New Testaments condemn it. In the Middle Ages Aquinas knew that some people mistakenly believe the final end for man consists in riches, and Dante, who rails against avarice throughout the Divine Comedy , describes, in the Convivio , the precise phenomenon MacIntyre associates with capitalism: “We see little children setting their desire first of all on an apple, and then growing older desiring to possess a little bird, and then still later desiring to possess fine clothes, then a horse, and then a woman, and then modest wealth, then greater riches, and then still more” because “acquisition causes human desires to become progressively inflated.” Moralists in non-Western cultures say similar things. Perhaps MacIntyre means that people living in capitalist economies are greedier than other people, but this would be very difficult to verify empirically.
So what does MacIntyre mean when he says capitalism teaches that success in life means acquiring more and more possessions? Clearly, even in capitalist societies, almost no one actually says such things, and most people sincerely believe the opposite. MacIntyre thus seems to mean that, regardless of what people say or even believe, capitalism presupposes such a view. In fact, however, capitalism implies nothing about the end of human life. Capitalism is a system of legal rules, most of them concerning private property, the enforceability of contracts, and minimal governmental intervention into economic transactions, and it is manifestly compatible with a great many views about what the final end for man may be.
Capitalism does, indeed, facilitate the accumulation of wealth, and so someone believing man’s life consists in the abundance of his possessions would favor a capitalist system. That does not mean, however, that capitalism presupposes such a view or even encourages it. For example, suppose (as I believe is correct) that human beings, as rational creatures, are individually responsible for ascertaining the true final end of human life and for ordering their actions to this end. In this case a capitalist system may seem appealing because it guarantees human beings freedom to order their lives as they judge best. The philosophical justification for capitalism is not pleonexia, but freedom.
The connection of capitalism and freedom brings us to MacIntyre’s final philosophical argument against capitalism. As an Aristotelian, MacIntyre holds that the true final end can be pursued only by human beings acting together in a community. For this reason, “the best type of human life, that in which the tradition of the virtues is most adequately embodied, is lived by those engaged in constructing and sustaining forms of community directed towards the shared achievement of those common goods without which the ultimate human good cannot be achieved,” such as “families and households, schools, clinics, and local forms of political community.” As an Aristotelian I agree and note that such communities not only are possible within capitalist systems but are also obviously supported by them. I even agree with MacIntyre that communities supporting the shared pursuit of the human good may include noncapitalist economic communities such as communes and cooperatives. The problem comes when MacIntyre insists that these noncapitalist economic communities are not only permissible but also required. He is insisting that one way of sharing the pursuit of the good is the only way of doing so.
This is sheer dogmatism. The final end for human beings can be adequately pursued only in community with other human beings, but it does not follow that every community in which human beings participate must be dedicated to that end. Everyone participates in many different communities—nuclear family, extended family, school, business firm, church, military unit, government, etc. As long as enough of these are cooperative endeavors aimed at the human good, there is no need that all be such, provided only that none aims at an end incompatible with the true human good. Of course, MacIntyre thinks that the capitalist economy aims at such an end (that is, the pure accumulation of wealth), but he is wrong about that. A person can participate in the capitalist economy to provide a sufficiency of goods for himself and those under his care so that he and they may conveniently engage in other activities (many of them communal) that are more directly concerned with the final end for human beings.
There is thus no necessary connection between cooperative economic communities and the pursuit of the human good. Moreover, insisting on this connection imperils human freedom. All human projects of significant scale, including the economic communities MacIntyre favors, require the cooperation of many individuals. Throughout history such cooperation usually has been secured by coercion and, ultimately, the use of force. The genius of capitalism is that, by relying on markets, it allows human beings—even vast numbers of human beings—to coordinate their economic activities voluntarily—that is, freely . By giving people economic incentives to work together, capitalism allows amazingly adroit cooperation on the grandest scale.
MacIntyre’s small economic cooperatives are fine for people who voluntarily choose to participate in them, but they necessarily limit human freedom. What happens, in MacIntyre’s cooperative farming or fishing enterprise, to the young person who doesn’t want to do the work the cooperative’s governing committee assigns to him? What happens to a young Alasdair MacIntyre who wants to study Greek philosophy rather than grow potatoes, or to a young Yo-Yo Ma who wants to practice the cello rather than work a fishing boat? These are not fanciful cases. In England in the 1940s, to implement its economic plans, the Labour government needed to move workers out of some industries and into others, and under the Control of Engagements Order that is exactly what it did: The government ordered people to work in the mines under penalty of law. In the end, implementing command-and-control economic systems, whether large or small, requires tyranny.
MacIntyre is a great philosopher, and the mistakes of great philosophers are always instructive. MacIntyre thinks noncapitalist economic systems are necessary to living the good life because he already has dismissed capitalist systems as immorally aiming at the endless accumulation of wealth. But why does he think capitalism does this? There is a deep reason. MacIntyre, following Aristotle, presupposes that all communities or systems are ordered to some purpose or other. For most communities or systems, this is correct. The nuclear family is ordered to the procreation and rearing of children, the church to the eternal salvation of souls, and so on.
MacIntyre thus assumes that there must be a purpose to capitalism, and because capitalism is so well adapted to producing endless wealth, he concludes that the production of such wealth must be capitalism’s purpose. If I had to assign a purpose to capitalism, I would say the same. In fact, however, not all communities and systems have purposes in this way. Some communities and systems exist not to further a given purpose but to create the conditions necessary for individuals or groups to pursue any of various, even conflicting, purposes. The laws of war, for example, exist to structure a relationship between parties with the most sharply conflicting purposes. Capitalism is such a system, too, as are many other institutions of liberal democracies. The market exists, not to advance any particular purpose, but to facilitate the advancement by individuals of their various, even conflicting, purposes. It is precisely because capitalism is such a system that it can—and does—protect individual freedom.
Finally, although capitalism is not directed to a particular purpose, this does not mean capitalism is morally neutral. As with all human institutions, capitalism has moral presuppositions, just not the ones MacIntyre identifies. The key moral presupposition of capitalism is, in fact, that each person is entitled to the value he creates, whether through his labor or his property. As Milton Friedman pointed out, this principle is so natural that Marx himself presupposes it in the theory of surplus value. For if, as Marx says, capital exploits labor by appropriating part of the value labor creates, this can be unjust only if labor is entitled to the value it creates. The suppressed premise here is exactly the capitalist principle that everyone is entitled to the value he creates. MacIntyre, no less than Marx, implicitly adopts this principle in espousing the surplus theory of value. He may be waiting for St. Vladimir, but MacIntyre is a capitalist unawares.
Robert T. Miller teaches at Villanova University School of Law and is the associate director of Villanova’s Ryan Center for the Study of Free Institutions and the Public Good.
|
<urn:uuid:2d406f5e-abbe-423d-806b-524bcb82b970>
|
CC-MAIN-2016-26
|
http://www.firstthings.com/article/2011/02/waiting-for-st-vladimir
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393146.70/warc/CC-MAIN-20160624154953-00126-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.967839 | 6,241 | 2.671875 | 3 |
At the turn of the century, photographs regularly appeared in newspapers. Technical advances in printing allowed halftones to be printed in 1897. Before then, an image had to be engraved into metal by hand.
On Feb. 22, 1900, photos appeared in The Picayune for the first time. They were of the Convent of the Rosary on St. Charles Avenue, now the Academy of the Sacred Heart, and the wedding of Gov. J.C.W. Beckham of Kentucky and Jean Raphael Fuqua of New Orleans.
Edouard Belin’s Belinograph of 1913 scanned prints and transmitted them over ordinary phone lines. It formed the basis for the AT&T Wirephoto service, which began in 1921.
In 1940, Picayune photographers would release trained pigeons that carried film in aluminum tubes strapped to their legs from the scenes they were shooting back to the newspaper.
As cameras and printing improved, wire photos were added to papers, and color reproduction became routine in the 1980s.
The AP Leafax 35 was introduced in 1988. It was the first real method for photojournalists to transmit images digitally from the field to the newspaper.
On May 11, 1988, the Cabildo caught fire. The next morning, the paper published its first color deadline photo, months before a planned conversion to color on every section front. It wasn’t until August 1988 that the conversion was completed.
Today, news photographers produce video as well as still photos. The first Times-Picayune video appeared on nola.com in 2007.
Tomorrow, 1900: The Robert Charles riots in New Orleans.
|
<urn:uuid:fe81f80f-b6e4-4f13-b1cf-9b1721f8b7d1>
|
CC-MAIN-2016-26
|
http://www.nola.com/175years/index.ssf/2011/10/1899_photographs_debut_in_news.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396945.81/warc/CC-MAIN-20160624154956-00179-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.966234 | 336 | 3.28125 | 3 |
Life is not a journey to the grave with the intention of arriving safely in a pretty and well preserved body, but rather to skid in broadside, thoroughly used up, totally worn out, and loudly proclaiming --WOW!--- What a ride!!!
Some days you're the windshield and some days you're the bug.
Our modern, virtually unqualified, enthusiasm for liberty forgets that liberty can only be “the space between the walls,” the walls of morality and law based on morality. It is sensible to argue about how far apart the walls should be set, but it is cultural suicide to demand all space and no walls.
One of the greatest statesmen and thinkers of the American experience was George Washington. A man who rejected the offer to become a king in the new land that he courageously extracted from the King of England’s rule, he preserved for us some measure of his intellect and integrity. It is best that we savor his words on occasion.
Noah Webster, 1828; “Literary power and statesmanship were combined in George Washington, the greatest political leader of his time and also the greatest intellectual and moral force of the Revolutionary period. Everybody knows Washington as a quiet member of the Virginia Assembly, of the two Continental Congresses, and of the Constitutional Convention. Few people realize that he was also the most voluminous American writer of his period, and that his principles of government have had more influence on the development of the American Commonwealth than those of any other man.”
George Washington, 1792; “I am sure there never was a people, who had more reason to acknowledge a divine interposition in their affairs, than those of the United States; and I should be pained to believe, that they have forgotten that agency, which was so often manifested during our revolution, or that they failed to consider the omnipotence of that God, who is alone able to protect them.”
George Washington, 1790; “Knowledge is in every country the surest basis of public happiness. In one in which the measures of government receive their impression so immediately from the sense of the [people] as in ours, it is……essential.”
George Washington, 1796: “Towards the preservation of our government…it is requisite…that you resist with care the spirit of innovation upon its principles, however specious the pretexts. One method of assault may be to effect, in the forms of the Constitution, alterations which will impair the energy of the system, and thus to undermine what cannot be directly overthrown.”
George Washington, from his farewell address; “Of all the dispositions and habits which lead to political prosperity, religion and morality are indispensable supports. In vain would that man claim the tribute of patriotism, who should labor to subvert these great pillars of human happiness, these firmest props of the duties of men and citizens…Let it simply be asked, where is the security for property, for reputation, for life, if the sense of religious obligation desert the oaths which are the instruments of investigation in courts of justice? And let us with caution indulge the supposition that morality can be maintained without religion. Whatever may be conceded to the influence of refined education…reason and experience both forbid us to expect that national morality can prevail in exclusion of religious principle,”
If we ever forget that we're one nation under God, then we will be a nation gone under.
Of the four wars in my lifetime, none came about because the U.S. was too strong. --Ronald Reagan
From an email I received:
A 15 yr. old SCHOOL KID IN ARIZONA :
New Pledge of Allegiance !
Since the Pledge of Allegiance and The Lord's Prayer are not allowed in
public schools anymore Because the word "God" is mentioned....
A kid in Arizona wrote the attached essay :
NEW School prayer :
Now I sit me down in school
Where praying is against the rule
For this great nation under God
Finds mention of Him very odd.
If Scripture now the class recites,
It violates the Bill of Rights.
And anytime my head I bow
Becomes a Federal matter now.
Our hair can be purple, orange or green,
That's no offense; it's a freedom scene.
The law is specific, the law is precise.
Prayers spoken aloud are a serious vice.
For praying in a public hall
Might offend someone with no faith at all.
In silence alone we must meditate,
God's name is prohibited by the state.
We're allowed to cuss and dress like freaks,
And pierce our noses, tongues and cheeks.
They've outlawed guns, but FIRST the Bible.
To quote the Good Book makes me liable.
We can elect a pregnant Senior Queen,
And the 'unwed daddy,' our Senior King.
It's "inappropriate" to teach right from wrong,
We're taught that such "judgments" do not belong.
We can get our condoms and birth controls,
Study witchcraft, vampires and totem poles.
But the Ten Commandments are not allowed,
No word of God must reach this crowd.
It's scary here I must confess,
When chaos reigns the school's a mess.
So, Lord, this silent plea I make:
Should I be shot; My soul please take!
"To educate a man in mind and not in morals is to educate a menace to society."
"Compromise, hell! That's what has happened to us all down the line - and that's the very cause of our woes. If freedom is right and tyranny is wrong, why should those who believe in freedom treat it as if it were a roll of bologna to be bartered a slice at a time?"
|
<urn:uuid:41311060-a204-4e9f-9ab1-688a42eed961>
|
CC-MAIN-2016-26
|
http://www.ralphwatts.com/Quotes.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395546.12/warc/CC-MAIN-20160624154955-00174-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.953597 | 1,221 | 2.703125 | 3 |
This publication monitors current and developing climate variations and is
issued as conditions warrant. Questions should be directed as follows:
The Climate Prediction Center (CPC) prvides climate products and services consisting of
operational prediciton of climate variations, monitoring of the climate system and development of databases
for determining current global and regional climate anomalies and trends, and analysis of their origins
and linkages to the complete climate system. These services cover climate time-scales ranging from weeks to seasons, extending into the stratosphere.
Services and products are distributed to users in teh government, the research community, private industry, and the public, both in this country and abroad. The CPC supports and stimulates the use of climate data for applications in agriculture, energy, transpotation, water resources, and health.
To support these services, the CPC engages in diagnostic research and studies of observations and forecast model output to improve the prediction, monitoring, and analysis of the physical climate system.
CLIMATE CONDITIONS DURING THE 1995 ATLANTIC HURRICANE SEASON
As of October 31, the 1995 Atlantic hurricane season featured 19 tropical storms (Fig. 1 bottom). This is the second largest number
of tropical storms observed in any hurricane season (June-November) since 1871, and the second
largest number of hurricanes observed in one season since 1886, according to the National Hurricane
Center (NCDC, 1981). On average, 9-10 tropical storms are observed over the North Atlantic
between June and November, with 5-6 of these systems typically becoming hurricanes. A comparison
with other active hurricane seasons (Table 1) shows that although 1995 was a very active year, many
of the listed tropical storm parameters were equaled or surpassed in prior years. A notable exception
was the 115 Named Storm Days (NSD) through the end of October, which exceeded all previous
years since 1950.
The active 1995 hurricane season follows four consecutive years (1991-1994) of extremely
low Atlantic tropical storm and hurricane activity (Table 2, Figs. 1 and 2). For example, the 19
tropical storms observed in 1995 is more than twice the total observed during each of the 1991-1994
seasons (6-8 events). Additionally, the 11 Atlantic hurricanes during 1995 far exceeds the 3-4
hurricanes observed each year during 1991-1994.
While the 1995 Atlantic hurricane season was extremely active and was preceded by four
relatively quiet years, tropical activity during each of the past five years was within the range of
observed climate variability. This special climate summary is not intended to address issues such as
hurricane and climate modeling, long-term trends, and global warming. The reader is referred to
previously listed contacts at NOAA's Geophysical Fluid Dynamics Lab (GFDL), and the December
11, 1995 seminar and multimedia presentation on hurricanes planned by the U.S. Global Change
Research Program (USGCRP).
Contributing Factors to the Active 1995 Hurricane Season
There are many factors which affect tropical storm and hurricane activity over the North
Atlantic. Some of these factors show surprisingly strong long-range predictive signals for Atlantic
basin seasonal tropical cyclone activity up to 11 months in advance (Gray et al., 1992; Gray et al.,
1994a). Research by Dr. William Gray and colleagues at Colorado State University has identified
three prominent factors associated with this predictive skill: (1) the stratospheric Quasi-Biennial
Oscillation (QBO); (2) the El Nino-Southern Oscillation (ENSO) cycle; and (3) West African
Dr. Gray and colleagues indicated in November 1994 (Gray et al., 1994b) that the above three
factors would be in a phase favorable for above normal Atlantic tropical activity this year, by
contributing to: (a) suppressed vertical wind shear across the subtropical North Atlantic between
10 N-20 N, and (b) a tendency for stronger easterly low-pressure waves (at approximately 15N)
which typically move across western Africa and propagate westward over the subtropical North
These easterly waves are in many cases the very systems which eventually intensify into
tropical storms. However, the potential for this intensification is controlled by the vertical wind shear;
strong vertical shear acts to inhibit intensification, while weak vertical shear acts to aid intensification.
Under favorable conditions of weak vertical wind shear, the intensification potential of these low
pressure disturbances into tropical storms and eventually hurricanes is further aided by large-scale
patterns of abnormally warm ocean water and below normal surface pressure over the subtropical
During the 1995 Atlantic hurricane season, atmospheric and oceanic conditions were
extremely favorable for enhanced tropical storm and hurricane activity (Figs. 3, 4, 5, & 6). In particular,
minimal vertical wind shear was observed during the season throughout the entire region from
western Africa to the Gulf of Mexico and the Caribbean Sea (Figs. 3 bottom, and 4 top).
Additionally, below normal sea-level pressure (Fig. 5 bottom) and above normal sea-surface
temperatures (Fig. 6) were observed throughout the western and central subtropical North Atlantic
during August and September, particularly in the vicinity of the Caribbean Sea and the Gulf of
Mexico. These conditions, combined with a series of intense easterly waves originating over north-
central Africa, provided the primary ingredients for a highly active hurricane season throughout the
subtropical North Atlantic basin.
These atmospheric conditions during 1995 were in strong contrast to those noted during the
1991-1994 hurricane seasons. For example, during the 1994 hurricane season the subtropical North
Atlantic was dominated by enhanced vertical wind shear (Figs. 3 middle, and 4 bottom) and above
normal sea-level pressure (Fig. 5 middle). Similar conditions were also noted during the 1991, 1992,
and 1993 hurricane seasons (not shown).
Possible Causes of the Increased Atlantic Hurricane Activity during 1995 over the 1991-1994
The most important identifiable phenomenon associated with year-to-year climate variability
is the global oceanic and atmospheric oscillation known as the El Nino/ Southern Oscillation (ENSO).
During the warm phase of this oscillation (commonly referred to as the El Nino), above normal sea
surface temperatures are observed throughout the central and east-central equatorial Pacific. Due to
this increase in ocean temperatures, the normal patterns of tropical cloudiness and precipitation are
disrupted, which in turn affects the atmospheric wind and pressure patterns throughout the Northern
Hemisphere. The resulting wind and pressure patterns often act to substantially inhibit Atlantic
In particular, the mid-1991 through early 1995 period was dominated by one of the most
prolonged Pacific warm (ENSO) episodes on record. Important manifestations of this episode
included extremely persistent patterns of enhanced vertical wind shear and above normal air pressure
over much of the subtropical North Atlantic. These conditions resulted in the marked decrease of
tropical storm and hurricane activity over the North Atlantic previously noted during the 1991-1994
Atmospheric and oceanic conditions throughout the tropical Pacific began a rapid return to
normal in March 1995. This evolution marked an end to the prolonged El Nino conditions which
dominated the past four years. It also signaled the demise of the patterns of enhanced vertical wind
shear and above normal air pressure that dominated the subtropical North Atlantic during the past
four hurricane seasons.
As noted above, there are two other important factors which tend to be correlated with an
active Atlantic hurricane season well in advance, although their dynamical links are not well
understood. The first is the westerly phase of the stratospheric Quasi-Biennial Oscillation. This
westerly phase reached peak amplitude during the past few months and may have contributed to low
vertical wind shear throughout the subtropical North Atlantic this year.
The second is above normal rainfall over the African Gulf of Guinea during August-November
of the previous year. These surplus rains favor enhanced soil moisture, which is thought to contribute
to the development of the next year's spring and summer West African rainy season, and subsequently
to stronger easterly low-pressure waves over West Africa. During August-November 1994, rainfall
was above normal over the African Gulf of Guinea (CAC, 1994), indicating a positive influence on
Atlantic tropical cyclone activity this year. In contrast, the much below normal precipitation observed
over West Africa during many of the last 25 years is thought to have exerted an overall suppressing
influence on Atlantic tropical cyclone activity during the period.
The National Hurricane Center will continue to monitor tropical cyclone activity during the
remainder of the 1995 Atlantic hurricane season. For additional information, refer to the updated
forecast (Gray et al., 1995a) and preliminary forecast verification (Gray et al., 1995b) of the 1995
Atlantic hurricane season by Dr. William Gray and colleagues.
CAC, 1994: Special Climate Summary #94/2, Wettest Rainy Season in 30 Years Across African
- Sahel. United States Department of Commerce, National Oceanic and Atmospheric
- Administration, National Weather Service, National Meteorological Center,
- Climate Analysis
Center, Camp Springs, MD, 6 pp.
Gray, W. M., C. W. Landsea, P. W. Mielke, Jr., and K. J. Berry, 1992: Predicting
- Atlantic Seasonal
Hurricane Activity 6-11 Months in Advance. Wea. Forecasting, 7, 440-455.
Gray, W. M., C. W. Landsea, P. W. Mielke, Jr., and K. J. Berry, 1994a: Predicting Atlantic Basin
- Seasonal Tropical Storm Activity by June 1. Wea. Forecasting, 9, 103-115.
Gray, W. M., C. W. Landsea, P. W. Mielke, Jr., and K. J. Berry, 1994b: Extended Range
- Forecasting of Atlantic Seasonal Hurricane Activity for 1995, as of 30 November 1994.
- Department of Atmospheric Sciences, Colorado State University, Fort Collins, CO, 9 pp.
Gray, W. M., C. W. Landsea, P. W. Mielke, Jr., and K. J. Berry, 1995a: Early August Updated
- Forecast of Atlantic Seasonal Hurricane Activity for 1995, as of 9 August 1995. Department
- of Atmospheric Sciences, Colorado State University, Fort Collins, CO, 26 pp.
Gray, W. M., C. W. Landsea, P. W. Mielke, Jr., and K. J. Berry, 1995b: Early Analysis (as of
- October 19) of the 1995 Atlantic Tropical Cyclone Activity and Verification of Author's
- Seasonal Predictors. Department of Atmospheric Sciences, Colorado State University,
- Fort Collins, CO, 10 pp.
NCDC, 1981: Tropical Cyclones of the North Atlantic Ocean, 1871-1980. United States
- Department of Commerce (DOC), National Oceanic and Atmospheric Administration
- (NOAA), National Weather Service (NWS), Environmental Data and Information Service,
- Environmental Research Laboratories, Asheville, NC, and the DOC/NOAA/NWS/National
- Meteorological Center, National Hurricane Center, Coral Gables, FL, 180 pp.
|
<urn:uuid:f40e212f-45a9-46fd-be7c-3a3319a8bf7d>
|
CC-MAIN-2016-26
|
http://www.cpc.ncep.noaa.gov/products/special_summaries/95_10/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403508.34/warc/CC-MAIN-20160624155003-00013-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.917577 | 2,404 | 2.875 | 3 |
Unlocking the blockchain enigma
Most simply and accurately described as a digital ledger, the technology, still in its infancy, cannot be ignored
The cryptocurrency known as bitcoin and the digital ledger upon which its transactions are recorded, the blockchain, are now being taken seriously by more than just e-pirates. Photograph: Chris Ratcliffe/Bloomberg
“Don’t file this piece until you’re confident you could walk into any bar in the world and explain the blockchain clearly to a complete stranger.” The editor’s final remarks upon commissioning the following words were a little disconcerting. But the idea of getting to work in a bar was attractive.
Unfortunately a comprehensive guide to the blockchain isn’t technically possible. This isn’t a cop out. The technology is still in its infancy. So no one knows for certain what is coming next.
What is certain, however, is that the cryptocurrency known as bitcoin and the digital ledger upon which its transactions are recorded, the blockchain, are now being taken seriously by more than just e-pirates.
The blockchain has been described in a variety of ways: a trust machine, a downloadable movie being created in real time, or more simply and accurately, as a digital ledger. One of the best explanations of why anyone should care came from American entrepreneur and former child actor Brock Pierce. At a talk he gave in 2014 hosted by Wired magazine, Pierce likened it to the internet. To paraphrase: “While the internet has transformed communications, the blockchain has the potential to transform the value chain. It is the internet of value.”
Of course he would say that. Apart from starring in The Mighty Ducks, as a grown-up Pierce has helped establish a number of digital currencies. But those with no vested interest in the technology are also coming out of the crypto-closet.
Yes, but what is it?Essentially, the blockchain refers to a shared, public digital ledger where information of any kind can be recorded and stored securely.
Anyone who wants to can inspect it but no single user controls it. Similar to how information is verified and maintained on Wikipedia by its users, participants in a blockchain system work collectively to maintain the ledger and make sure it is up to date. Any amendment can only take place by general agreement and is subject to whatever rules and regulations applied to that particular blockchain. So while the “internet of value” is a fair analogy, despite being referred to in the singular, there are many blockchains as opposed to one “internet”.
The blockchain and cryptocurrencyThe blockchain can securely store any kind of information but, thus far, it has principally been used as a digital currency platform.
With conventional currency, the security of one’s savings is guaranteed by whichever financial institution one chooses to bank with, all of which are overseen by a central regulatory authority. In the case of cryptocurrencies – bitcoin, litecoin, ethereum, or any of the hundreds of others that have emerged since the pseudonymous Satoshi Nakamoto first released the technology back in 2009 – the cryptography, or complex mathematical coding, supporting blockchain technology is the central bank or arbitrary governor of the financial system.
How does it work?Any information added to a blockchain is converted into a piece of code, known as a hash, (a series of letters and numbers). The hash is the language of the blockchain. All data recorded on any ledger is translated into hashes.
The details of a transaction or record are stored together as blocks of hashes and each block is permanently linked to its predecessor, hence the name, “blockchain”. Visually it could be likened to a tree where each branch can be traced back to the plant’s roots.
All information pertaining to a transaction conducted is logged – time, date, number of participants, transaction amount. However, the identity of the parties involved can remain anonymous. This is why it has been a popular method of payment for illicit activity online.
While adding information to a blockchain is straightforward, it is virtually impossible to go back and edit or delete previously recorded data. This is the principle reason why this technology is now being taken seriously. It has the potential to become the world’s most secure information storage facility.
Each node or connection point in a network owns a full copy of the blockchain. Transactions are verified by so-called “bitcoin miners” who maintain the ledger in return for a fee. The mathematical principles underpinning the technology ensure these nodes automatically and continuously agree about the current state of the ledger and every transaction in it.
Why are we still talking about bitcoin?As a further clarification, bitcoin is but one “brand” of cryptocurrency on the blockchain. It is the most widely adopted, mainly because it was the first and, according to some commentators, was designed in the same philanthropic spirit as open-source projects such as Linux or Mozilla. There are hundreds of other cryptocurrencies, and each has its own raison d’être.
Anyone with a computer can potentially be a “miner” and there are both individuals and private companies participating in this new industry. The bitcoin currency has 21 million units of exchange. When it was first launched in 2009, 50 bitcoins were released every 10 minutes. Currently, 25 bitcoins are rewarded for mining a successful block. This reward number – by virtue of bitcoin blockchain’s code design, which is based on an asymptotic curve – will be split in half to 12.5 later this year, then 6.25, then 3.125, etc. Supply will diminish in the long term up until the last block is mined. This is a specific characteristic of bitcoin. Other cryptocurrencies are tailored differently – perhaps to match the needs of a particular industry or simply based on the design preferences of the creator.
Mining is, for all intents and purposes, a type of lottery. The more lottery tickets – or in this case, computer processing power – you have, the more successful your mining is likely to be. While it’s true anyone with a computer can theoretically mine for bitcoin, a bog standard laptop is the digital equivalent of one lotto line in competition with companies buying up hundreds of thousands of lottery tickets for each and every draw. Miners are motivated to keep the blockchain consistent and unalterable by this reward scheme.
What are the potential threats to the security of the blockchain?Ask any convert and they will say there aren’t any due to the ingenuity of its mathematical foundations. The more people trying to outsmart it, the more difficult the mathematical equation underpinning the technology becomes. Anyone old enough to remember the movie Ghostbusters II might recall how the evil force, known as Vigo, feeds upon negative human emotion. The more negative people feel, the stronger he gets. While this analogy is both juvenile and tenuous at best, it (kind of) serves as an illustration for the methodology behind blockchain security.
Nevertheless, dramatic market value fluctuations as well as theft from people’s digital “wallets”, have occurred. So cryptocurrencies are still susceptible to some of the same flaws inherent in our current method of exchange.
There is another potential threat, which even the most zealous supporters of the blockchain will acknowledge. A “51% attack” refers to any single entity contributing the majority of a network’s mining hashrate, in order to gain total control of the network and thus be able to manipulate a blockchain. Anyone with a vested interest in a particular blockchain, however, is not likely to do this because they would be undermining the market, and their own interests in it, that the blockchain in question was built upon.
|
<urn:uuid:1d993f80-1070-40c7-9d9d-3b980d78a264>
|
CC-MAIN-2016-26
|
http://www.irishtimes.com/business/unlocking-the-blockchain-enigma-1.2532451
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783408828.55/warc/CC-MAIN-20160624155008-00069-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.960713 | 1,581 | 2.71875 | 3 |
Alexander I also called Alexander I Karađorđević or Alexander the Unifier Serbian, Croatian, Serbo-Croatian: Aleksandar I Karađorđević, Cyrillic script: Александар I Карађорђевић) (Cetinje, Principality of Montenegro, December 4/December 16 1888 – Marseille, France, October 9, 1934) of the Royal House of Karađorđević (Karageorgevich) was the first king of Yugoslavia (1929–34) and before that the second monarch of the Kingdom of Serbs, Croats and Slovenes (1921–1929). He had acted as regent of Serbia since June 24, 1914. Before succeeding his father as king, he distinguished himself in military service and was supreme commander of the Serbian army during World War I. Throughout his reign, Alexander exercised wide ranging powers. From 1918 until 1929 his power was shared with an elected assembly. However, faced with separatist movements in Croatia and Macedonia, he assumed dictatorial authority in 1929. He changed the name of the kingdom to Yugoslavia, attempting to suppress provincial and separatist sentiment by creating a strong unitary state with a single national identity. He is often described as a Fascist. Opposition politicians were arrested as insurgency and counter-insurgency destabilized the state. One of Alexander's principal concerns was to retain the favor of the great powers. In October 1934 he was visiting France, an important ally, when dissidents assassinated him. Caught on camera, the footage is of considerable historical interest.
The logic of Yugoslavia was that a unified Balkan state could maximize resources and defend itself from potential external threats. However, the state was from the outset dominated by the Serbian dream of reviving their medieval dominance in the region at the expense of the autonomy of other ethnicities. What was meant to be a union became a takeover. Alexander's own dictatorial style and centralization of power provided a pattern that later rulers followed, including Josip Broz Tito who ruled with an iron fist from 1945 until 1980. After his death, Yugoslavia began to implode. Some argue that Yugoslavia's disintegration discredits the Federal option for holding different nationalities in balance. However, it can be countered that what went wrong in Yugoslavia, from the very beginning of Alexander's reign to the end of Tito's rule, was failure to achieve a fair and reasonable balance between provincial autonomy and the federal center, or to establish an effective power-sharing, consociational democracy. If Alexander had turned to negotiation to work out a compromise between local and central authority, Yugoslavia may have survived intact. Many of Alexander's advisers were committed to the notion of Greater Serbia; his personal instincts may have favored compromise and improved inter-ethnic relations. Alexander was too concerned with his own position to act in the best interests of his subjects. The move by former Yugoslav republics to join the European Union shows that they are not adverse to belonging to a "union" based on cooperative principles, social justice and respect for diversity.
Alexander Karađorđević was born in Cetinje in Principality of Montenegro in December 1888. His father was King Peter I of Serbia and his mother the former Princess Zorka of Montenegro, a daughter of King Nicholas of Montenegro. In Belgrade on June 8, 1922 he married HRH Princess Maria of Romania, who was a daughter of Queen Maria, the Queen Consort of Romania. They had three sons: Crown Prince Peter, Princes Tomislav and Andrej.
He spent his childhood in Montenegro, and was educated in Geneva. In 1910 he nearly died from stomach typhus and left with stomach problems for rest of his life. He continued his schooling at the Corps de pages imperial in Saint Petersburg, Russia, but had to quit due to his brother's renunciation, and then in Belgrade. Prince Alexander was not the first in line for the throne but his elder brother, Crown Prince George (Đorđe) was considered unstable by most political forces in Serbia and after two notable scandals (one of which occurred in 1909 when he kicked his servant, who consequently died), Prince George was forced to renounce his claim to the throne.
After centuries of Ottoman domination, various Balkan provinces began to emerge as independent states in the late nineteenth century. In 1878, the Congress of Berlin recognized Serbia and Montenegro although it placed Bosnia and Herzegovina under Austria-Hungary. Croatia and Slovenia were already within the Austro-Hungaraian empire. Croatia and Slovenia were demanding independence; some Croats, as were some Serbs, were advocating the creation of a large South Slav state. This would help protect the Balkans from outside powers; at this point Italy was perceived to have ambitions in the region. Serbia lost her traditional ally, Russia after the Russian Revolution of 1917.
When the Austro-Hungarian empire was dissolved following World War I, Croatia, Slovenia and Bosnia-Herzegovina and when, after the First Balkan War (1912-1913) Macedonia was liberated from Ottoman rule, all these Balkan states were ready to unite as the Kingdom of the Slovenes, Croats, and Serbs. For Serbs especially, this was regarded as a revival of the medieval Serbian empire that had once dominated the Balkans.
They united under the rule of the Serbian prince, Peter. Peter ruled from December 1, 1918 – August 16, 1921, when Alexander succeeded him. The new state was born and created despite competing political visions; the Croats wanted strong provincial governments and a weak federal government; Serbs wanted a strong unitary state, effectively a Greater Serbia. The reality was that the Kingdom would be dominated by Serbs. Power was shared between the king and an elected assembly but the latter only considered legislation that had already been drafted and had no role in foreign affairs.
In the First Balkan War in 1912, as commander of the First Army, Crown Prince Alexander fought victorious battles in Kumanovo and Bitola, and later in 1913, during the Second Balkan War, the battle of Bregalnica. In the aftermath of the Second Balkan War Prince Alexander took sides in the complicated power struggle over how Macedonia should be administered. In this Alexander bested Col. Dragutin Dimitrijević or "Apis" and in the wake of this Alexander's father, King Peter, agreed to hand over royal powers to his son. On June 24, 1914 Alexander became Regent of Serbia.
At the outbreak of World War I he was the nominal supreme commander of the Serbian army—true command was in hands of Chief of Staff of Supreme Headquarters—position held by Stepa Stepanović (during the mobilization), Radomir Putnik (1914-1915), Petar Bojović (1916-1917) and Živojin Mišić (1918). The Serbian army distinguished itself in the battles at Cer and at the Drina (the Battle of Kolubara) in 1914 , scoring victories against the invading Austro-Hungarian forces and evicting them from the country.
In 1915 the Serbian army with the aged King Peter and Crown Prince Alexander suffered many losses being attacked from all directions by the alliance of Germany, Austria-Hungary and Bulgaria. It withdrew through the gorges of Montenegro and northern Albania to the Greek island of Corfu, where it was reorganized. After the army was regrouped and reinforced, it achieved a decisive victory on the Macedonian Front, at Kajmakcalan. The Serbian army carried out a major part in the final Allied breakthrough in the autumn of 1918.
On December 1, 1918, in a prearranged set piece, Alexander, as Regent, received a delegation of the People's Council of the State of Slovenes, Croats and Serbs, an address was read out by one of the delegation, and Alexander made an address in acceptance. This was considered to be the birth of the Kingdom of Serbs, Croats and Slovenes.
In 1921, on the death of his father, Alexander inherited the throne of the Kingdom of Serbs, Croats and Slovenes, which from its inception was colloquially known both in the Kingdom and the rest of Europe alike as Yugoslavia. Tension continued between Serbs and Croats within the political process. In 1928, the Croat Ustaše party was formed, which campaigned for independence. The Croatian Peasant Party under Stjepan Radić boycotted parliament for several years. However, on June 20, 1928 after Radić actually won a plurality of seats but was blocked from forming the government, he was shot and mortally wounded by a Serb deputy, Puniša Račić while attending the Assembly.
On January 6, 1929, in response to the political crisis triggered by Radić's death (he died on August 8), King Alexander abolished the Constitution, prorogued the Parliament and introduced a personal dictatorship (the so-called "January 6 Dictatorship," Šestojanuarska diktatura). He also changed the name of the country to Kingdom of Yugoslavia and reorganized the internal divisions from the 33 oblasts to nine new banovinas on October 3. These were named after rivers in an attempt o "wipe out the memory of ethnic divisions." Alexander is typically described as a dictator although he relied heavily on Petar Živković, whom he appointed as Prime Minister. It was even rumored that the two men were lovers. Glenny says that Alexander was prone to temper tantrums and was well aware of the profound challenge that Serb-Croat relations presented. Glenny says that Alexander thought the privileging of Serbs justified since in his view it was Serbs who had made the kingdom possible by their successes in the Balkans Wars; "Yugoslavia, he was convinced, owed its existence to the heroism of the Serbian army in the Balkan Wars." Yet, in contrast to the shallow Greater Serbian counselors who surrounded him," he "developed an appreciation and even and admiration for the Croats and Slovenes during the late 1920s and early 1930s." The name Yugoslavia like those of the new districts was meant to nurture a new, single national identity.
In the same month, he tried to banish by decree the use of Serbian Cyrillic to promote the exclusive use of Latin alphabet in Yugoslavia.
In 1931, Alexander decreed a new Constitution which transferred executive power to the King. Elections were to be by universal male suffrage. The provision for a secret ballot was dropped and pressure on public employees to vote for the governing party was to be a feature of all elections held under Alexander's constitution. Furthermore, the King would appoint half the upper house directly, and legislation could become law with the approval of one of the houses alone if it were also approved by the King. Payne argues that Alexander's attempt to create a unified state and to elevate the state over all other identities was inspired by Fascism but that he "failed to develop an ideology or political organization" as did other Fascist leaders. Alexander was especially keen to impress on the European powers that Yugoslavia was "stable," since when Yugoslavia appeared to be unstable this "invariably provoked diplomatic flurries in and between Paris, London, Rome and Berlin." The situation continued to deteriorate, however, as Croats began a "bombing and shooting campaign" and Alexander responded by "arresting leading members of most political parties in Croatia."
On account of the deaths of three members of his family on a Tuesday, Alexander refused to undertake any public functions on that day. On Tuesday October 9, 1934, however, he had no choice, as he was arriving in Marseille to start a state visit to the Third French Republic, to strengthen the two countries' alliance in the Little Entente. While being driven in a car through the streets along with French Foreign Minister Louis Barthou, a gunman, Vlado Chernozemski, stepped from the street and shot the King and the chauffeur. The Minister was accidentally shot by a French policeman and died later.
It was one of the first assassinations captured on film; the shooting occurred straight in front of the cameraman, who was only feet away at the time. The cameraman captured not merely the assassination but the immediate aftermath; the body of the chauffeur (who had been killed instantly) became jammed against the brakes of the car, allowing the cameraman to continue filming from within inches of the King for a number of minutes afterwards.
The assassin, Vlado Chernozemski — driver of the leader of the Internal Macedonian Revolutionary Organization (IMRO) Ivan Mihailov and an experienced marksman—was cut down by the sword of a mounted French policeman, then beaten by the crowd. By the time he was removed from the scene, he was already dead. The IMRO was a Bulgarian political organization that fought for annexing Macedonia to Bulgaria using terrorist means. According to the UKTV History program Infamous Assassinations-King Alexander, the organization worked in alliance with the Ustaše fascist, under the secret sponsorship of Italian dictator Benito Mussolini.
The film record of Alexander I's assassination remains one of the most notable pieces of newsreel in existence, alongside the film of Tsar Nicholas II of Russia's coronation, the funerals of Queen Victoria of the United Kingdom and Emperor Franz Josef of Austria, and the assassination of John F. Kennedy. Glenny discusses the possibility of Italian complicity in the assassination. Many Croats had found asylum in Italy where Ante Pavelić was running the paramilitary wing of the Ustaše which made common cause with the Macedonian Revolutionary Organization. On the other hand, Alexander had entered secret talks with Mussolini due to French pressure to mend relations with Italy. However, he broke off contact in December 1933 when he discovered an assassination plot. While there is no "conclusive evidence of Italian government involvement, Rome had made no attempt to curb Ustaše terrorism."
King Alexander I was buried in the Memorial Church of St. George, which had been built by his father. As his son Peter II was still a minor, Alexander's first cousin Prince Pavle Karadjordjevic took the regency of the Kingdom of Yugoslavia.
Payne says that Alexander's assassination resulted in a return to a milder political climate in Yugoslavia and that by 1939 the "regime had returned to a kind of political pluralism." However, the policy of suppressing the national identities of the various ethnic groups that constituted Yugoslavia continued under the post-World War II communist dictator, Josip Broz Tito. Unfortunately, Yugoslavia imploded following Tito's death, when one by one all provinces emerged as independent states after much bloodshed and Serbian refusal to surrender the dream of a Greater Serbia. The failure of such multicultural states as Yugoslavia has led some, among others, Samuel P Huntington to argue that multicultural states are weak and undesirable, that only states with a strong dominant culture can thrive. "History shows" wrote Huntington, that no country so constituted can long endure as a coherent society." Others argue that Yugoslavia's disintegration discredits the Federal option for holding different nationalities in balance. Others, however, point to Switzerland as an enduring and successful example of a multicultural state, arguing that what went wrong in Yugoslavia was failure to achieve a fair and reasonable balance between provincial autonomy and the federal center, or to establish an effective power-sharing, consociationalism democracy.
Alexander's style of kingly dictatorship may have influenced the Romanian king, Carol II who issued a new constitution that concentrated power in his own hand in 1938. Alexander did not give democracy a chance; he was too anxious to maintain his own authority at the center. Glenny says that on the one hand he was "gifted with real political intelligence" but on the other "his psychological insecurity guaranteed the regular commission of errors." Živković "knew how to exploit his weakness" and his appointment as Prime Minister "was greeted with undisguised dismay not only by Croats but in Serbia, Slovenia, Bosnia and Montenegro." It was widely whispered that with a man such as Živković in charge "there was little prospect of the king solving Yugoslavia's political crises." Instead of negotiation and compromise, the king responded with the heavy hand of oppression. Alexander's intent may well have been to maintain stability and a strong, united state but his acts were those of a tyrant. His own intent may have been towards improved relations between the different nationalities but he chose advisers whose acts were motivated by their dreams of Greater Serbia. In the end, however, Alexander was too concerned with his own position to act in the best interests of his subjects.
|Alexander I of Yugoslavia||Father:
Peter I of Yugoslavia
Alexander Karađorđević, Prince of Serbia
Zorka of Montenegro
Nicholas I of Montenegro
Mirko Petrović Njegoš
|House of Karađorđević
Born: December 16 1888; Died: October 9 1934
as King of Serbs, Croats, and Slovenes
|King of the Serbs, Croats, and Slovenes
August 16, 1921 - January 6, 1929
Proclaimed King of Yugoslavia
|New Title||King of Yugoslavia
January 6, 1929 - October 9, 1934
All links retrieved March 3, 2016.
New World Encyclopedia writers and editors rewrote and completed the Wikipedia article in accordance with New World Encyclopedia standards. This article abides by terms of the Creative Commons CC-by-sa 3.0 License (CC-by-sa), which may be used and disseminated with proper attribution. Credit is due under the terms of this license that can reference both the New World Encyclopedia contributors and the selfless volunteer contributors of the Wikimedia Foundation. To cite this article click here for a list of acceptable citing formats.The history of earlier contributions by wikipedians is accessible to researchers here:
Note: Some restrictions may apply to use of individual images which are separately licensed.
|
<urn:uuid:98f115e9-3c6f-4998-94ee-90596cd634a5>
|
CC-MAIN-2016-26
|
http://www.newworldencyclopedia.org/entry/Alexander_I_of_Yugoslavia
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397213.30/warc/CC-MAIN-20160624154957-00177-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.976158 | 3,781 | 3.390625 | 3 |
“Sit. Speak. Good boy. Now go find a snake that can swallow a 76-pound deer.”
Trainers at Auburn University in Alabama have put Labradors on the scent of Burmese pythons—those Asian snakes that are running amok in the Florida Everglades. In recent years, the Sunshine State has tried to curb the population’s numbers, but pythons are “notoriously hard to find and very secretive,” as one biology professor puts it. That’s where EcoDogs could come in.
Todd Steury, a conservation professor who co-founded the EcoDog program, describes an EcoDog as “a bomb-detection dog that’s trained to find something other than bombs.” This might be scat (read: animal poop full of biological information), destructive fungi or, as of 2010, snakes big enough that they attempt to eat alligators whole. “Pythons don’t belong in South Florida,” Steury says. “And they eat everything. I literally do mean everything. The only inhabitant of Everglades National Park they haven’t found inside a python is a Florida panther.” That may be hyperbole, but the snakes have been linked to declines in native-fauna sightings.
The inevitable question is, of course, are the dogs in danger of being eaten by these voracious creatures? Steury says the trainers take extra steps to minimize that concern and notes that a python big enough to attempt such a meal is rare indeed, despite stories of 16-footers that become ingrained in our pop-culture memories.
The dogs are bred at Auburn University and maintained by the veterinarian school, where they are all given basic obedience and detection training. Before being put on python patrol, a dog is first introduced to the scent, captured by rubbing coffee filters on the snakes. The dogs are taught to associate tracking that scent with a toy, their reward, before finally being trained to “fringe.” When fringing, a technique also used with delicate newborn fawns, the dogs follow a smell toward its source but stop before they get to the source itself.
Without dogs, seekers are left to “put together these teams of humans who stand elbow-to-elbow and move through the environment, kicking up grass and hoping to find pythons,” Steury says. “The thing is, these snakes are so good at hiding, you could be standing on top of one and not even know it. So that’s where these dogs are really useful.” The EcoDogs’ inaugural trip to Florida took place over six months during 2010 and 2011. Whether there will be a second still depends on financing and Florida officials deciding how they want to tackle their python problem.
Meanwhile, let us all bow before the incredible feat of nature that is the canine nose. Venerable sniffer, we salute you.
MORE: Top 10 Invasive Species
|
<urn:uuid:1adc89f4-9663-415f-916f-649888758f52>
|
CC-MAIN-2016-26
|
http://newsfeed.time.com/2012/04/03/on-the-scale-trail-training-dogs-to-find-pythons-in-the-everglades/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402516.86/warc/CC-MAIN-20160624155002-00126-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.954698 | 630 | 2.734375 | 3 |
Minimally Invasive Treatment May Soon Be Possible For People With Mitral Regurgitation Disorder
Every year 70,000 people worldwide are denied life-saving open heart surgery for a life threatening condition called mitral regurgitation, a disorder of the heart in which the mitral valve does not close properly when the heart pumps out blood.
The mitral valve acts as the heart’s gatekeeper. It regulates the flow of blood between the two chambers of the left side of the heart. When the valve’s two leaflets fail to close completely, blood regurgitates into the left atrium (hence the condition’s name), decreasing blood flow to the rest of the body. To compensate, the heart pumps harder, an action that may eventually lead to heart failure.
Israeli company MitrAssist is working on an implant which would be placed on top of the native valve and then anchored securely to work in unison with the body’s own valve. “Our ‘valve-in-valve’ approach is designed to prevent leakage and restore normal blood flow,” MitrAssist’s CEO, Gil Naor tells NoCamels. “Our valve works with the body rather than against it.”
- Researchers Stumble Upon The Heart’s Self-Healing Ability
- Israeli Dates Protect Against Cardiovascular Disease, Study Shows
According to the company, there are ways to slow down the course of MR, but there is no way to completely prevent or cure it. Between 600K-900K people each year suffer a leakage severe enough to compromise their quality of life yet not severe enough to undergo surgery, the company says.
It’ll get worse before it gets better
The irony is that the only “solution” these people have is to wait for their situation to deteriorate, at which time they may become candidates for current surgical options: valve repair or replacement. However, the company’s product, dubbed MitraFix, “has minimal impact on the heart’s physiology, treats all types of MR unlike mitral repair, and does not trigger patient deterioration like replacement,” says Naor, who emphasizes that MitraFix is not a replacement, but rather, an enhancement to the body’s natural function.
Since it is longer than the body’s own valve, MitraFix effectively closes the remaining gap between the native valve’s leaflets to restore normal valve functioning. “We give hope to people who right now don’t have much of a chance of undergoing surgery because it’s too dangerous due to their medical condition or age,” says Naor.
Naor is not without a personal agenda. The company’s CEO has recently learned that he himself suffers from MR. With his own health on the line, plus an estimated market of $1.2 billion by 2014, the 20-year biomedical engineering veteran created what he believes to be the “next frontier” in treating structural heart disease.
Shooting for $5 million in financing
However, there’s still a long way to go before people suffering from MR will reap the benefits of MitraFix, as the first clinical study of the device won’t start before 2016.
Of the $600,000 MitrAssist has raised, $500,000 came from The Trendlines Group, with the rest from angel investors, including doctors from around the world. By targeting potential strategic partners and venture capital firms, the Company anticipates closing an additional $5 million Series A financing round by the end of this year.
MitrAssist began as a company focused on mitral valve regurgitation, but Naor is looking ahead. He started to research other valves in the body – and other diseases or conditions — where he can apply this exciting technology.
Photo by MitrAssist
|
<urn:uuid:44e32e19-42df-422d-ace8-a8a51130fb9a>
|
CC-MAIN-2016-26
|
http://nocamels.com/2013/05/open-heart-surgery-may-soon-be-possible-for-people-with-mitral-regurgitation-disorder/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393997.50/warc/CC-MAIN-20160624154953-00039-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.940725 | 811 | 3.046875 | 3 |
Szold, Henrietta (zōld) [key], 1860–1945, American Zionist leader, editor, and translator, b. Baltimore. After graduating from high school in 1877 she taught (1878–92) in private schools, organizing some of the first night school classes for immigrants. She was a founder (1888) of the Jewish Publication Society of America and served as its general editor until 1916. In 1912 she founded Hadassah, the Women's Zionist Organization of America, of which she was president from 1912 to 1926. In 1920 she moved to Palestine, directing the organization's medical service and relief work. She is particularly esteemed for her leadership (1933–45) of the Youth Aliyah, an organization that rehabilitated thousands of children during World War II. She also translated many works from French, German, and Hebrew.
See biography by I. Fineman (1960).
The Columbia Electronic Encyclopedia, 6th ed. Copyright © 2012, Columbia University Press. All rights reserved.
|
<urn:uuid:17d8687f-34cb-425e-a165-5dd98db4e7e2>
|
CC-MAIN-2016-26
|
http://www.factmonster.com/encyclopedia/people/szold-henrietta.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402746.23/warc/CC-MAIN-20160624155002-00091-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.959919 | 207 | 2.546875 | 3 |
Engineering and Construction
History >> Ancient Rome
The Romans were excellent engineers and builders. Many of the buildings and engineering projects they designed are still around today and some are still being used. Here are some of the projects that the Romans excelled in:
Roman Roads were important to the economy and the military of the Romans. They allowed for easier commerce between towns and cities and also allowed the Roman Legions to move quickly around the expanding empire.
The roads were designed to last despite the environment. They were built using many layers of masonry including concrete. These durable roads are still used today. They were also built with a hump making water flow to the edges. This kept the roads from flooding and allowed them to be used in rainy weather.
The Colosseum in Rome is a great example of Roman engineering and construction. The Colosseum was a large outdoor stadium that could seat around 50,000 people for various forms of entertainment such as gladiator games, mock battles, and dramas. The huge Colosseum is free standing and built with multiple arches to give it strength. Much of it still stands today, although earthquakes have knocked portions of it down. It is 615 feet long and 510 feet wide and took around 131,000 cubic yards of stone to make.
Aqueducts were long channels that the Romans built to carry water into the cities. Many of the Roman aqueducts were below ground. The water that was carried into the cities was used for drinking water, baths, and sewers. It was generally carried to a public fountain where people could then use buckets to get their water. Roman plumbing became so advanced that many of the large wealthy houses had running water.
The Romans built long durable bridges. Many of their bridges still stand today. They used stone and concrete to build their bridges and used the arch as the basic architectural feature to make them strong. The largest Roman bridge ever built was the Trajan bridge over the river Danube. It was over 3700 feet long and 62 feet high.
The Trajan Bridge
Roman engineering had a large influence on Roman architecture. Arches were used a lot due to their strength. The Romans also used domes as they enabled them to build large ceilings with wide open spaces.
Fun Facts about Roman Engineering
- The Romans built over 400,000 km of roads including 29 highways that lead to the city of Rome.
- The Latin word for road is via. The plural of via is viae. Roman roads generally had the name via in them, like the Via Appia or the Via Flaminia.
- All the aqueducts in the city of Rome together totaled around 500 miles in length.
- The Romans were among the first civilizations to harness water power.
- It is estimated that the Romans built over 900 bridges in their empire.
Take a ten question quiz at the Ancient Roman Engineering questions
For more about Ancient Rome:
History >> Ancient Rome
|
<urn:uuid:fb32adf4-40cf-4b17-b798-c4361dc8f093>
|
CC-MAIN-2016-26
|
http://www.ducksters.com/history/ancient_roman_engineering.php
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393332.57/warc/CC-MAIN-20160624154953-00069-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.981675 | 607 | 3.71875 | 4 |
La Marmora (lä märˈmōrä) [key], distinguished Italian noble family. Its best-known member was Alfonso Ferrero, marchese della Marmora, 1804–78, general and political leader. He fought for Sardinia against Austria in the wars of 1848–49 and 1859, completely reorganized the Sardinian army, and led (1855–56) the Sardinian expeditionary force in the Crimean War. He was twice premier (1859, 1865–66). His conduct of Italian operations in the Austro-Prussian War (1866) was unsatisfactory, and he resigned after the Italian rout at Custozza.
The Columbia Electronic Encyclopedia, 6th ed. Copyright © 2012, Columbia University Press. All rights reserved.
|
<urn:uuid:0598cc0c-903c-412c-b9dc-ef1b6f20f451>
|
CC-MAIN-2016-26
|
http://www.factmonster.com/encyclopedia/people/la-marmora.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397428.37/warc/CC-MAIN-20160624154957-00117-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.945057 | 167 | 2.765625 | 3 |
British author Charlotte Moore wrote about life with her two autistic sons in "George and Sam: Two Boys, One Family, and Autism,"published in 2007. In an upcoming edition of the book, Moore expands her family's story to give readers a glimpse into going through adolescence with autism.
In a study published February 17 in the American Journal of Psychiatry, a research team led by Dr. Joseph Piven at the University of North Carolina identified different developmental trajectories of white matter in the brains of infants who subsequently developed autism compared with infants who did not. Images taken at six months, one year and two years of age showed 12 of 15 major brain pathways developed differently in 28 infants who later exhibited autism, generally characterized by a “slowing” of white matter growth, compared with the 64 other infants who did not. “These results offer promise that we may one day be able to identify infants at risk for autism before the behavioral symptoms are present,” said study co-author Geri Dawson, Chief Science Officer for Autism Speaks.
According to a National Institute of Mental Health (NIMH) study published on February 2 in the American Journal of Human Genetics, investigators have tracked the activity, across the lifespan, of an environmentally responsive regulatory mechanism that turns genes on and off in the brain's executive hub. Genes associated with schizophrenia and autism belong to a small subset of genes that methylate inversely compared with most other genes. Intensive methylation, which is an epigenitic process, occurs prenatally, and the lead author of the study, Dr. Barbara Lipska, hypothesizes that "Regulation of these genes may be particularly sensitive to environmental influences during this critical early life period." The study also found that methylation levels differed in 85% of the X chromosome sites measured, which might offer an explanation as to why autism and schizophrenia occur at substantially different rates between genders.
The Des Moines Register today profiled Jeff Paprocki, an autistic adult with severe behavior challenges including self-injury. Jeff currently lives in a hospital psychiatric ward due to a shortage of community service providers that can support his needs.
The Chicago Tribune reports that a 15-year-old boy with Asperger's syndrome was shot and killed this morning in his home, after cutting a police office with a knife. The teen, Stephon Watts, had a history of aggressive behavior, according to police. The boy's mother has stated that the family was advised by social service professionals to call the police during incidents of violent behavior. A news conference is scheduled for later today to provide further information on the incident.
A handbook on adult guardianship law in the state of Maryland has been updated for the first time in over a decade and is available online in both PDF and interactive formats. The handbook is a collaboration between The Law & Health Care Program at the University of Maryland Francis King Carey School of Law (UM Carey Law) and the Delivery of Legal Services Section Council of the Maryland State Bar Association (MSBA). This updated version was revised by Virginia Rowthorn, JD, Managing Director of the Law & Health Care Program at UM Carey Law , and Ellen Callegary, JD, a prominent elder law and disability lawyer in Maryland.
The New York Times on Thursday examined how upcoming changes to the newest version of the "Diagnostics and Statistics Manual of Mental Disorders" (DSM-V) may impact diagnostic criteria for autism spectrum disorders, and as a consequence, access to services. The "DSM" is the resource utilized by doctors and mental health professionals in diagnosing conditions and coding them for insurance reimbursement. The new version is due to be published in 2013.
Researchers at The Children's Hospital of Philadelphia's Center for Child Injury Prevention Studies examined factors predicting which teens with ASD were likely to become drivers in a study published this month in The Journal of Developmental and Behavioral Pediatrics. Their conclusions point to a need to address driving in Transition Plans. "Although a significant proportion of teens with higher functioning autism spectrum disorders were driving or learning to drive, the fact that most driving teens' individualized education plans did not include driving goals suggests an area of opportunity for improvement in transition planning. Driving teens were more frequently in regular education settings with college aspirations, which could help schools identify potential drivers," the article notes.
In a BBC interview, a woman with ASD, Alex Jordan, discusses how she feels like a prisoner in her own home due to her inability to cross the street. Jordan, who lives in Dorset, has been stuck by cars seven times in the past year.
A study reported in the January Archives of Pediatrics and Adolescent Medicine found that the increased use of respite and home/community aid services was associated with a decrease in the risk of psychiatric hospitalizations for children, adolescents, and young adults with ASD. In their conclusion, researchers noted that, "Respite care is not universally available through Medicaid. It may represent a critical type of service for supporting families in addressing challenging child behaviors. States should increase the availability of respite care for Medicaid-enrolled children with autism spectrum disorders."
As a parent, you are a legal guardian. You're responsible for your child's welfare, education and health. As the parent of a child with autism, of course, you're also responsible for therapies...
As the founder of the Asperger Syndrome Training & Employment Partnership (ASTEP), I hear from many parents about the struggles their adult children have obtaining ...
Imagine yourself to be a rookie cop, two years “on the road,” patrolling an average-sized town in America.
Imagine that you had a tremendous gift, one that could inspire a nation, raise autism awareness ...
These days, when one hears “Healthcare,” political strife is often the first thing that comes to mind.
These days autism appears to be the disorder du jour and headlines about the newest autism breakthroughs are everywhere. Sometimes filled with jargon or unfamiliar references,...
We have previewed and commented on the "How-To" videos below. Some of these are simple; others are fairly complex. Refer to these yourself, or use them with your adult child or student to help teach and generalize skills. Please note that some videos may contain skills which require support or training. You must determine which are appropriate for you, your adult child, or your student to use safely. Also note that as these videos come from other websites, they may contain pop-up ads. Click on an icon to see category index. Click here for full index.
Search the Autism After 16 website using the form above. You may alter your search settings on the search results page.
|
<urn:uuid:4e44efb3-ee2f-4799-a106-6d7234c7c74d>
|
CC-MAIN-2016-26
|
http://autismafter16.com/news/archive?page=0%2C6
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395679.92/warc/CC-MAIN-20160624154955-00192-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.960109 | 1,359 | 2.90625 | 3 |
When you read the word quinoa in a recipe do you know what that refers to? If you do not, you are not alone. Quinoa is a traditional Native American food which has lately come back in fashion to eat due to its natural and health properties. Quinoa is an amino acid-rich (protein) seed that has a fluffy, creamy, slightly crunchy texture and a somewhat nutty flavor when cooked. Most commonly considered a grain, quinoa is actually a relative of leafy green vegetables like spinach and Swiss chard. It is a recently rediscovered ancient "grain" once considered "the gold of the Incas."
Quinoa was used as the food for the Inca warriors, as they noticed that the "grain" increased their stamina. That is due to the fact that quinoa is infused with complete protein which means that it includes all nine essential amino acids. It is also filled with other health building nutrients and is incredibly useful for those who suffer from migraine headaches, diabetes and atherosclerosis.
Many new recipes include quinoa as an ingredient, from basic quinoa with peas and corn as an easy, filling, healthy meal to more complex meals such as chicken and quinoa salad with radacchio. Do not be put off by a recipe that contains this natural ingredient, as quinoa is infused with nutrients and is one of the most healthy and natural ingredients out there.
Cooking is simple, with many recipes calling for quinoa to be prepared just like rice. You can season it or add vegetables to make it the perfect accompaniment to any meal, or cook with meats as a main course. Quinoa also makes the perfect healthy breakfast, mixing it with honey, almonds or berries. Find recipes for quinoa at quinoa.net.
|
<urn:uuid:adbb91d8-5c19-4f55-8f81-7d120bfab70f>
|
CC-MAIN-2016-26
|
http://www.justluxe.com/community/healthy-cooking-with-quinoa_a_1770038.php
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398873.39/warc/CC-MAIN-20160624154958-00186-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.973877 | 360 | 2.625 | 3 |
Biological Magnetic Resonance Data Bank
A Repository for Data from NMR Spectroscopy on Proteins, Peptides, Nucleic Acids, and other Biomolecules
Genomics, Proteomics, Metabolomics, Structural Genomics, Structural Proteomics
Introduction to "Omics"
The growing field called Metabolomics detects and quantifies the low molecular weight molecules, known as metabolites (constituents of the metabolome), produced by active, living cells under different conditions and times in their life cycles. NMR is playing an important role in metabolomics because of its ability to observe mixtures of small molecules in living cells or in cell extracts.
Genomics is a science that attempts to describe a living organism in terms of the sequence of its genome (its constituent genetic material). Genomics uses the techniques of molecular biology and bioinformatics to analyze the sequences attributed to structural genes, regulatory sequences, and even noncoding sequences. Genomics is closely related to, and sometimes considered a branch of, Genetics: the study of genes and heredity.
Proteomics focuses on identifying when and where proteins are expressed in a cell so as to establish their physiological roles in an organism.
Structural Genomics is a worldwide effort aimed at determining the three-dimensional structures of gene products in an efficient and high-throughput mode. When the focus is on proteins, this effort may be called Structural Proteomics. Whereas a structural biologist may work to thoroughly understand the structure and function of one, or maybe a few proteins, structural genomics efforts focus on determining the structures of large numbers of proteins without prior regard to function. Several structural proteomics groups pursue the structures of proteins that are "unique", generally ones that have less than 30% sequence identity to a protein with a known structure in the Protein Data Bank. The objective here is to enlarge our understanding of sequence-fold relationships so that we are better able to predict structures from sequences. Other structural proteomics centers have the goals of determining structures of all proteins from a given organism or all structures of a particular class or family of proteins.
The Protein Data Bank (PDB) is the international repository for biomolecular structure data. To find more information about protein targets studied by structural genomics efforts, including the target progress, protocols, structures, annotations, models, and DNA clones, visit the PSI Structural Genomics Knowledgebase.
TargetTrack, originally TargetDB, is a protein target and protocol registration database that was developed and hosted at Rutgers University to register and track information for the NIH P50 funded structural genomics centers. The database has since grown to include data contributed internationally and has merged with the Proteing Expression database PepcDB into a single resource. It is funded by the US National Institutes of Health (NIH) through its Protein Structure Initiative (PSI).
Why Structural Genomics is Important to the BMRB
Structural genomics efforts are producing a wealth of experimental data from NMR studies that are linked to high-quality three-dimensional structures of proteins. The "rules" of the international structural genomics effort mandate that all data be deposited in a timely fashion. This includes coordinates of three-dimensional structures deposited at PDB and for NMR structures, chemical shifts, coupling constants, and other relevant data at BMRB. In addition, some of the structural genomics centers are depositing the original NMR spectra as time-domain data sets in BMRB. These data sets will allow structures to be recalculated by others who may wish to practice their skills or test novel methods for structure determination from NMR data. Data from structural genomics centers are valuable to BMRB because they are enlarging the set of NMR parameters and three-dimensional structures determined under comparable conditions.
NMR chemical shift data already are being used to determine secondary structure in proteins and to set limits on a protein's conformation. As BMRB's pool of assigned NMR data associated with structures increases, it will become easier to determine structures of proteins from sparse data sets. These data will be important for determining structures of larger proteins for which it is difficult to obtain full data sets.
To make the pool of data most useful, it is important for the NMR community as a whole to deposit their data and for these data to be in a standard, usable format.
The mission of BMRB is to collect, archive and disseminate the quantitative data derived from NMR spectroscopic investigations. The high throughput mode of structural Genomics investigations means that those projects are major contributors to BMRB. BMRB has developed standards for formatting and data definitions specified for Structural Genomics.
|
<urn:uuid:07c77913-75a5-4864-a7fe-2be900e51bca>
|
CC-MAIN-2016-26
|
http://bmrb.protein.osaka-u.ac.jp/structgen/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399522.99/warc/CC-MAIN-20160624154959-00039-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.927503 | 968 | 2.640625 | 3 |
What is Science? (revisited)
What is science?
The 2004 Encyclopedia Britannica says science is “any system of knowledge that is concerned with the physical world and its phenomena and that entails unbiased observations and systematic experimentation. In general, a science involves a pursuit of knowledge covering general truths or the operations of fundamental laws.”
“A healthy science is a science that seeks the truth.” Paul Nelson, Ph. D., philosophy of biology.
Linus Pauling, winner of 2 Nobel prizes wrote, “Science is the search for the truth.”
“But science can only be created by those who are thoroughly imbued with the aspiration toward truth and understanding.” Albert Einstein
The truth need not be an absolute truth. Truth in the sense that Drs. Pauling, Einstein & Nelson are speaking is the reality in which we find ourselves. We exist. Science is to help us understand that existence and how it came to be.
As I like to say- science is our search for the truth, i.e. the reality, to our existence via our never-ending quest for knowledge.
So how do we do that? We use our senses. We make observations. We try to figure things out, i.e. we try to understand what we observe and/ or sense. This “thing” we are trying to understand could be an object, event, structure or phenomena. (I used to think that we were the only animals on this planet that did so, i.e. tried to understand the things around us, but with first-hand observations of what indigenous wild-life do preceding an impending natural disaster common to that area, it appears that some other animals have already come to an understanding. But anyway…)
We formulate an idea as to how it works and we devise a way to test that idea. If successful we have others check our work. If they like it, it gets published. However not getting published is not a falsification or refutation of the idea or the data.
How do we test an idea? We break it down into something that is measure-able. In industry this is done via DMAIC- Define (the customer’s requirements), (Figure out how to) Measure (them); Analyze (the requirements and measuring systems); Improve (the process to reach the goal); Control (the process).
In science we define what it is we are observing. Rocks, life, populations or individual organisms, planets, stars, motion, falling, abruptly stopping, etc.
Can this observation be measured? If not how can we qualify our inference or conclusion? (This is where we figure out a way to test our inference.)
Analyze all work to date for errors and/ or improvements.
Initiate or improve a process to reach the desired goal. In science the desired goal would be to understand what it is we are observing, i.e. what we had previously defined.
Then you control that process. Documentation at each step is key throughout the process and will facilitate the controlling of said process.
Once you have completed the above and feel you have an understanding, you have others who are qualified check your work. That is why documentation is key.
From the NCSE linked to U Berkley website on Evolution:
“Science is a particular way of understanding the natural world. It extends the intrinsic curiosity with which we are born. It allows us to connect the past with the present,… (references a picture)”
“Science is based on the premise that our senses, and extensions of those senses through the use of instruments, can give us accurate information about the Universe. Science follows very specific "rules" and its results are always subject to testing and, if necessary, revision. Even with such constraints science does not exclude, and often benefits from, creativity and imagination (with a good bit of logic thrown in).”
What anti-IDists try to do is to either re-define science to only include “natural” processes, as if intelligent causes are non-natural, or try to tie ID to the supernatural. They think that if ID is tied to the supernatural then it has violated some arbitrary rule of science. Either that or they try to hold ID to some other arbitrary rules of science, never thinking that the reigning paradigm has no chance of meeting those same standards.
The origin of nature could not have occured via natural processes as natural processes only exist in nature.
However even though misguided that tactic is of no relevance:
In any case, as Thomas Kuhn pointed out, debate about methodological rules of science often forms part of the practice of science, especially during times
when established paradigms are being challenged. Those who reject the "teach the controversy" model on the grounds that ID violates the current rules of scientific practice only beg the question. The present regime of methodological rules cannot prevent the controversy for the simple reason that those rules may themselves be one of the subjects of scientific controversy.-- page xxv of Darwinism, Design and Public Education
It should also be noted that just because something is conceivable, that does not also make it possible. IOW just because the “collision theory” is the best conceivable naturalistic explanation for the formation of the Earth-Moon system, does not mean that such a scenario is even possible.
More on the rules of science:
In 1981 there was a Court case (McLean v. Arkansas) involving Creation. In it Michael Ruse testified for a theory to be scientific it must be:
guided by natural law
explanatory by natural law
testable against the empirical world
tentative in its conclusions
The contradictions are numerous:
Is the origin of life explained by natural law? No. Is all of life’s diversity owing its collective common ancestry to some unknown population of single-celled organisms via common descent/ descent with modification explained by natural law? No. Is the origin of nature explained by natural law? No. The origin of nature, by definition, could not have been guided by natural law. And yes, what about the origins of those natural laws?
How do we falsify the notion that the evolution of cetaceans from land animals proceeded via natural selection acting on random variations caused by random genetic mutations?
”As a result of such contradictions *, most contemporary philosophers of science have come to regard the question “What distinguishes science from nonscience?” as both intractable and uninteresting. Instead, philosophers of science have increasingly realized that the real issue is not whether a theory is “scientific” according to some abstract definition but whether a theory is true- that is, based on evidence. As Laudan explains, “If we would stand up and be counted on the side of reason, we ought to drop terms like ‘pseudo-science’…they…do only emotive work for us.” As Martin Eger summarized,”[d]emarcation arguments have collapsed. Philosophers of science don’t hold them anymore. They may still enjoy acceptance in the popular world, but that is a different world." “-- Ibid pg. 77 *discussing the contradictions in Ruse’s 1981 falsifiability criteria.
The bottom line is the evidence from which IDists infer ID exists in the physical world and is observable. IOW it is the same DNA, life, Earth, solar system, etc., that all scientists and non-scientists observe, research or hear about. I will discuss the evidence below.
On science & the supernatural:
”It is often said that science must avoid any conclusions which smack of the supernatural. But this seems to me to be both bad logic and bad science. Science is not a game in which arbitrary rules are used to decide what explanations are to be permitted. Rather, it is an effort to make true statements about physical reality. It was only about sixty years ago that the expansion of the universe was first observed. This fact immediately suggested a singular event-that at some time in the distant past the universe began expanding from an extremely small size.
To many people this inference was loaded with overtones of a supernatural event-the creation, the beginning of the universe. The prominent physicist A.S. Eddington probably spoke for many physicists in voicing his disgust with such a notion:
“Philosophically, the notion of an abrupt beginning to the present order of Nature is repugnant to me, as I think it must be to most; and even those who would welcome a proof of the intervention of a Creator will probably consider that a single winding-up at some remote epoch is not really the kind of relation between God and his world that brings satisfaction to the mind”.” (Dr. Behe)
Even though what Dr. Behe is saying makes it obvious that a priori exclusion is not the scientific way, it hides the fact that all “first-cause” scenarios require something non or super natural. If it is true that everything which has a beginning requires a cause, then seeing science has told us the universe, i.e. nature, had a beginning, it also had a cause. Nature by definition could not have originated via natural processes because natural processes exist only in nature.
It also shows that there is still more work to be done even once an initial cause/state has been determined.
The point being, of course, is that it all “turtles-down” to something beyond nature/ beyond the universe. Even positing multi-verses does not get around the origins issues. And just as Ockham’s Razor would favor one designed universe over a universe constructed from unintelligent, blind/ undirected processes, Ockham’s Razor would favor one designed universe over a multi-verse, and also metaphysical, explanation.
What the above demonstrates is that one cannot define ID out of science without doing the same to any anti-ID position.
Science Asks Three Basic Questions:
The astronaut picking up rocks on the moon, the nuclear physicist bombarding atoms, the marine biologist describing a newly discovered species, the paleontologist digging in promising strata, are all seeking to find out, “What’s there?”
How does it work?
A geologist comparing the effects of time on moon rocks to the effects of time on earth rocks, the nuclear physicist observing the behavior of particles, the marine biologist observing whales swimming, and the paleontologist studying the locomotion of an extinct dinosaur, “How does it work?”
How did it come to be this way?
Each of these scientists tries to reconstruct the histories of their objects of study. Whether these objects are rocks, elementary particles, marine organisms, or fossils, scientists are asking, “How did it come to be this way?”
We exist. The verse we live in exists and since it is the only observable verse we have labeled it the universe. If the multi-verse hypothesis is held to the same standards as ID it has to be able to tell us, at a minimum, how many verses there are, where those verses exist and what number we live in. But anyway, we exist. What are the options to our existence? IOW how did the universe (and us) come to be this way?
1) Unintelligent, blind/ undirected (non-goal oriented) processes
2) Intelligent, directed (goal oriented) processes
3) A combination of 1 & 2
(If other options exist I would love to hear about them so they too can be discussed.)
Only option 1 excludes the design inference.
The motives of IDists are clear- we want to know the truth, i.e. the reality, behind our existence. If that reality, i.e. the evidence, leads us to the metaphysical then so be it. We explain the evidence and we don’t have to explain the metaphysical to do so.
The great scientist Max Planck said the following during his Nobel Prize acceptance speech:
"All matter originates and exists only by virtue of a force which brings the particles of an atom to vibration and holds this minute solar system of the atom together . . . . We must assume behind this force the existence of a conscious and intelligent mind."
Years of scientific research were the root cause of that statement.
|
<urn:uuid:bab95350-3878-43be-8759-8a88fd018d39>
|
CC-MAIN-2016-26
|
http://intelligentreasoning.blogspot.com/2008/12/what-is-science-revisited.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396459.32/warc/CC-MAIN-20160624154956-00190-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.950245 | 2,585 | 2.703125 | 3 |
Elegy Written in a Country Churchyard Introduction
In A Nutshell
Thomas Gray invariably plays second fiddle to the more famous eighteenth-century British poet Alexander Pope in the literary history books, which is kind of a bummer, because Gray was a really interesting guy. Sure, he wrote relatively few poems, and of those few, most readers and critics agree that "Elegy Written in a Country Churchyard" is far and away the best, but the question is, why did he write so few poems? What was holding him back? How could the guy who wrote the haunting, beautiful "Elegy" also write the relatively stilted and formal "Sonnet on the Death of Richard West" (1775)?
There are so many unanswered questions about Thomas Gray! If Shmoop had a time machine, we'd want to transport ourselves back to the late 1700s to try to get the Shmoop scoop on Gray. What made this guy tick?
Here's what we do know: his home life wasn't so great. His father went kinda crazy on occasion, and abused his mother. Not a very happy environment to grow up in! But that's the good thing about being a relatively well-to-do young man in the 1700s: you get sent to boarding school from a very young age, so you get to escape from the yelling and abuse at home. At Eton, Gray met his BFF, Richard West (whose early death inspired the poem, "Sonnet on the Death of Richard West") and he also made friends with Horace Walpole, who grew up to write the totally awesome, completely insane The Castle of Otranto, the novel that practically launched the literary Gothic movement (a.k.a. the literary ancestors of modern horror flicks).
But what else do we know about Gray? Not much, really—he wrote a lot of letters, but didn't share much personal gossip. Gray tended to start poems and never finish them, or else he'd finish them but never publish them. He was offered the prestigious post of British Poet Laureate in 1757, but he turned it down. It seems as though he might have lacked confidence in himself as a poet.
He only published the "Elegy Written in a Country Churchyard" because, after sending a few copies to his friends for their private enjoyment, some hack publishers got hold of it and tried to print a knock-off version without his permission. (Copyright laws weren't very strict in those days, so they'd have gotten away with it.) And yet the "Elegy Written in a Country Churchyard" is hands-down one of the most beautiful poems written in the eighteenth century, and it certainly had a major impact on later writers, especially Romantic-era poets like William Wordsworth, Samuel Taylor Coleridge, and John Keats, among others.
The "Elegy" asks us to honor the lives of common, everyday people—not just rich, famous folks. This idea of glorifying mundane, everyday things becomes central to the philosophies of British Romantics. That's part of why Gray's "Elegy" often gets interpreted as a kind of turning point from the more formal poetry of the 18th century, with its emphasis on rich and famous people, to the more loose, free-form poetry of the Romantics, which focused more on everyday folks.
The "Elegy" was probably inspired in part by Gray's sadness at the death of his friend Richard West. It's not just about death, but how people are remembered after they're dead (if that's a theme that interests you, you should check out "Afterwards" by Thomas Hardy). Gray muses about what happens after people die, and in the final stanzas of the poem, he admits his own fear of dying. It's a powerful and evocative poem. Even if the "Elegy Written in a Country Churchyard" were the only poem Gray ever wrote, Gray would deserve a place of pride in the literary history books, even alongside heavy hitters like Alexander Pope.
Why Should I Care?
Ever lost somebody that you cared about? No? Well, then you've probably at least experienced the loss of someone who moved far away. Still no? Well, not to bum you out, but chances are that you will—someday. And when that happens, you might find Thomas Gray's "Elegy Written in a Country Churchyard" to be just what the doctor ordered.
Gray's "Elegy" isn't just about death, and it isn't just doom and gloom. It's about the fear of being forgotten after you're gone. Gray looks at the graves of common folks, and instead of just shrugging and figuring that their lives weren't worth remembering, he takes the time to think about what made them tick. And apparently this poem hit a chord with the eighteenth-century readers. It has been translated into many different languages and reprinted many times, and different lines of the poem have been quoted so often that they almost sound cliché now.
So, even if you've never experienced the loss of someone close to you, you should give the "Elegy" a shot. It's a poem that managed to walk that fine line: with its moving meditations on the value of human life—even after death—it's both deeply personal and also universal.
|
<urn:uuid:e4de5cca-6b05-4c32-8833-3f8c3f7c27e0>
|
CC-MAIN-2016-26
|
http://www.shmoop.com/elegy-country-churchyard/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399385.17/warc/CC-MAIN-20160624154959-00042-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.980586 | 1,106 | 2.65625 | 3 |
One of the more unique events related to the Emancipation Proclamation sesquicentennial involves a retrial for former First Lady Mary Todd Lincoln, who was infamously consigned to an asylum in 1875 by her son Robert Todd Lincoln. Last week, the Illinois Supreme Court Historical Society organized the first of two retrials for Mrs. Lincoln in front of a sold-out audience. An actor portraying Mary Lincoln arrived at the courtroom via horse and carriage, wearing a cloak and a billowing petticoat. The facts presented at the mock trial remained the same as those presented at the original, but the organizers implemented modern interpretations of the law and expert testimony both for and against Mrs. Lincoln (an important distinction from the original trial). The mock jury weighed the evidence and testimony, and found in favor of Mrs. Lincoln.
While this jury easily sided with Mrs. Lincoln, historians have been grappling with the evidence presented at the original trial, and with the verdict itself. The case not only involved the question of Mrs. Lincoln’s sanity, but was also central to understanding the culture of justice in the 19th century. While some historians contend that Mrs. Lincoln was truly insane and that the trial was necessary, others consider the proceedings those of a kangaroo court. Jean Baker, author of Mary Todd Lincoln: A Biography, firmly sides with the latter. When contacted by e-mail for comment, she pointed out: “By any standard, even those relating to women in the 19th century, the evidence at the trial was stacked against Mary Lincoln.”
Disputed events such as these are perfect opportunities for us to revisit them and get the general public involved in the discussion. If the original jury easily found Mrs. Lincoln insane, how does the new verdict reflect our changing attitudes toward justice? According to Baker, the verdict reflects societal change “on insanity and gender, specifically how women were treated in the justice system and the failure to give Mary Lincoln a fair trial.” But according to Catherine Clinton, author of Mrs. Lincoln: A Life, even by 19th-century standards of justice, Mrs. Lincoln was treated egregiously. In a phone interview, Clinton declared, “You didn’t need a 21st-century perspective of justice. Under the laws at the time, Mrs. Lincoln was denied counsel. There is not better illustration of railroading, as the phrase goes.”
Already, the mock trial has proven to be an opportunity to promote the profile of history in public culture. As Baker stated, “There is no better way to teach history than to focus on particular episodes that permit all of us to understand the importance of evidence, the way we respond to it, and the fungible nature of historical judgments, the latter never more clear than in a trial.“ Indeed, mock trials can make the study of history more exciting for students by giving them a chance to form connections between past and contemporary issues. This point is aptly emphasized by Clinton, who pointed out that “we as historians need to make these dead issues come alive.”
For information about the next mock trial, and the Mary Todd Lincoln project, please visit the event’s website. Special thanks to Jean Baker, Bennett-Harwood Professor of History at Goucher College, and Catherine Clinton, chaired professor of U.S. history at Queen’s University Belfast, for supplying their expert commentary on the event.
|
<urn:uuid:b616580d-2e03-4205-8559-85e68203afd4>
|
CC-MAIN-2016-26
|
http://blog.historians.org/2012/10/runaway-jury-mary-todd-lincoln-redeemed-at-retrial/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396945.81/warc/CC-MAIN-20160624154956-00027-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.958059 | 709 | 3.046875 | 3 |
by Peter Menkin
In the last month of 2009, former President Jimmy Carter spoke before The Parliament of World Religions as part of The Elder Project. He again has spoken out against discrimination against women, as he sees it, as a once Southern Baptist, a Christian, and as former President of the United States. This is in character for President Carter, known for good Christian works, winner of a Nobel Prize, and who continues in his concern for the American Nation and the world. He is a national figure, world figure, and Christian figure.
In his Farewell Address to the American people, 1988, he said, "As I return home to the South where I was born and raised, I am looking forward to the opportunity to reflect and further to assess -- I hope with accuracy -- the circumstances of our times."
He has previously spoken for women's rights, but not so much as a Christian and man of God. One political-secular moment in 1977 was in a speech on Women's Equality Day. He said about the history of their struggle, "Standing behind me is a woman, Ms. Hallinan, who in 1917 stood outside the gates of the White House when Woodrow Wilson was President, simply holding a sign in her hand that was photographed, saying, 'How long will it be before women can have freedom?'" He speaks for women's rights even today, again.
The Sunday School teacher President Carter starts part of his argument with a Bible quote:
The Holy Bible tells us that "There is neither Jew nor Greek, there is neither bond nor free, there is neither male nor female: for ye are all one in Christ Jesus." (Galatians 3:28)
Every generic religious text encourages believers to respect essential human dignity, yet some selected scriptures are interpreted to justify the derogation or inferiority of women and girls, our fellow human beings.
Then he goes to the secular with a jarring set of particulars. Here they are:
Globally, at least one in three women and girls is beaten or sexually abused in her lifetime. (U.N. Commission on the Status of Women, February, 2000)
Our Carter Center has been deeply involved in the Republic of Congo. In war zones where order has broken down, horrific and sometimes lethal rape has become a tactic of warfare practiced by all sides.
In a study in 2000, the U.N. estimated that at least 60 million girls who should be alive are "missing" from various populations, mostly in Asia, as a result of sex-selective abortions, infanticide or neglect.
According to UNICEF, an estimated one million children, mostly girls, enter the sex trade each year and the U.N. estimates that 4 million women and girls are trafficked annually.
In some Islamic nations, women are restricted in their movements, punished for permitting the exposure of an arm or ankle, deprived of education, prohibited from driving a car or competing with men for a job. If a woman is raped, she is often most severely punished as the guilty party in the crime.
The same discriminatory thinking lies behind the continuing gender gap in pay and explains why so few women hold political office, even in most Western democracies.
Noting also that in his 65 years of Bible teaching he's learned some important facts of the history of religion, and as a result of his reflection and serious concern for women's rights even chose to leave his Church (Southern Baptist). His remark about the equality of humans in Jesus as found in the Bible is the significant religious turning point of scripture manifesting his change of heart towards his own Church, and how he sees women treated by religion in general. This is that Bible argument he cites: "all one in Christ Jesus."
Though herself not so much a religious figure or thinker, even a person noted as a Christian, the feminist Jan Nedeau writing in Change.org (Women's Rights) comments from a personal and also writer's perspective:
I was raised Catholic. And, on occasion, I still go to church because it is a place where I can connect with my spirituality. I was lucky that I learned about religion in a very tolerant place - in San Francisco - where I really connected with religion through the spiritual exercises of St. Ignatius... I participated in a very progressive church - one that welcomed all people and didn't preach the marginalization of women or homosexuals. Clearly, this is the exception to the rule.
Knowing the blatant discrimination toward women by religious institutions elsewhere always bothered me and I too have questioned from time to time whether I should separate from the Catholic Church based on the experience that Carter describes. It cannot be denied that there are many faiths that use religion as a "justification of discrimination against women and girls on grounds of religion or tradition, as if it were prescribed by a Higher Authority" and he is right - it is truly unacceptable.
A critic of male dominance regarding the Bible, President Carter wrote in 2009 for The British newspaper "The Observer:"
So my decision to sever my ties with the Southern Baptist Convention, after six decades, was painful and difficult. It was, however, an unavoidable decision when the convention's leaders, quoting a few carefully selected Bible verses and claiming that Eve was created second to Adam and was responsible for original sin, ordained that women must be "subservient" to their husbands and prohibited from serving as deacons, pastors or chaplains in the military service. This was in conflict with my belief - confirmed in the holy scriptures - that we are all equal in the eyes of God.
This writer supposes that in his speech at The Carter Center as one of The Elders in the organization by the same name, that his campaign for women's equality which spread to his religious and spiritual beliefs finds an hypocrisy and unfairness by men towards women throughout the history of the Bible. More, he asks that there be a new respect for women founded on the old models of reverence found in the Bible. See his reference to Mary below after his observations on the Old Testament. This writer thinks this is his Biblical statement on "gender equality," or what is commonly referred to as sexual relationshipsrelationships between the sexes.
Most Bible scholars acknowledge that the Holy Scriptures were written when male dominance prevailed in every aspect of life. Men could have multiple sex partners (King Solomon had 300 wives and 700 concubines), but adulterous behavior by a woman could be punished by stoning to death - then, in the time of Christ and, in some societies, 2009 years later.
I realize that devout Christians can find adequate scripture to justify either side in this debate, but there is one incontrovertible fact concerning the relationship between Jesus Christ and women: he never condoned sexual discrimination or the implied subservience of women. The exaltation and later reverence for Mary, as Jesus' mother, is an even more vivid indication of the special status of women in Christian theology.
Before going further, here is who The Elders are known as: The Elders are an independent group of eminent global leaders, brought together by Nelson Mandela, who offer their influence and experience to support peace building, help address major causes of human suffering and promote the shared interests of humanity.
As he has said to The Elders, The multiple evils of human suffering, women's suffering, and the shared interest of humanity is for Jimmy Carter found in his relationship with God. He says, and he is a religious leader himself:
The truth is that male religious leaders have had and still have an option to interpret holy teachings either to exalt or subjugate women. They have, for their own selfish ends, overwhelmingly chosen the latter.
Does former President Jimmy Carter speak for Jesus Christ? One writer whose work appears on Beliefnet and in "On Faith" in "The Washington Post," says of Jimmy Carter and his changing religious heart and theology of the Bible and women. Rabbi Brad Hirschfieldon "Beliefnet:"
By making statements equating his own understanding of religion with the will of "Jesus Christ, the Apostle Paul, Moses and the prophets, Muhammad, and founders of other great religions", Jimmy Carter continues his well-established tradition of making outrageous statements to justify legitimate concerns. The sad part is that his approach reflects precisely the kind of spiritual arrogance which nurtures the ability of any group to oppress others in the name of that which they believe.
No differently than the very people he most opposes, Carter arrogantly assumes that he can isolate those portions of a tradition which reflect the "proper" understanding of its teachings. He cherry picks his way through not only the faith he follows, but presumes to do so for others as well. I guess he just knows best.
Of course that attitude of knowing best is the basis of all oppression committed by people in the name of religion.
Though the remarks by Jimmy Carter spoken at The Carter Center may not be those remarks exactly as referred to by the Rabbi, the thrust is there. About the choice of Biblical interpretation by Southern Baptists and other religious Christian denominations, he names Biblical figures by their names as teachers who support his view:
Their continuing choice provides the foundation or justification for much of the pervasive persecution and abuse of women throughout the world. This is in clear violation not just of the Universal Declaration of Human Rights but also the teachings of Jesus Christ, the Apostle Paul, Moses and the prophets, Muhammad, and founders of other great religions - all of whom have called for proper and equitable treatment of all the children of God. It is time we had the courage to challenge these views and set a new course that demands equal rights for women and men, girls and boys.
At their most repugnant, the belief that women are inferior human beings in the eyes of God gives excuses to the brutal husband who beats his wife, the soldier who rapes a woman, the employer who has a lower pay scale for women employees, or parents who decide to abort a female embryo. It also costs many millions of girls and women control over their own bodies and lives, and continues to deny them fair and equal access to education, health care, employment, and influence within their own communities.
Rabbi Hirschfield says about this statement by Jimmy Carter, as concept, in "On Faith" found in "The Washington Post:"
This debate, if it is to have any real impact, must be shifted from one in which we argue about who understands God best, to one about the sacredness of choice, the independence of the spirit and modesty to admit that none of us has the only true understanding of God's will. This needs to be about the creation of spiritual options so that as many people as possible can find a place within whatever faith they choose, not about taking away the options of others to practice in ways we make not like.
Many pundits and columnists agree with the former President and state their own case and make their own statement when commenting on his. Nicholas Kristof in "The New York Times" writes of recent:
It is not that warlords in Congo cite Scripture to justify their mass rapes (although the last warlord I met there called himself a pastor and wore a button reading "rebels for Christ"). It's not that brides are burned in India as part of a Hindu ritual. And there's no verse in the Koran that instructs Afghan thugs to throw acid in the faces of girls who dare to go to school.
Yet these kinds of abuses along with more banal injustices, like slapping a girlfriend or paying women less for their work arise out of a social context in which women are, often, second-class citizens. That's a context that religions have helped shape, and not pushed hard to change.
There is some of the debate and statement; yet Jimmy Carter gets his due and none can really take it away. After all, it is based on a man's religious sensibility and interpretation, a man who is a world famous and honored Christian, a Christian leader and admirable Christian at that. His speech before The Carter Center wasn't the first on the theme of discrimination by religion towards women. It won't be his last.
Peter Menkin, an aspiring poet, lives in Mill Valley, CA USA where he writes poetry. He is an Oblate of Immaculate Heart Hermitage, Big Sur, CA and that means he is a Camaldoli Benedictine. He is 64 years of age as of 2010.
Copyright Peter Menkin
Article Source: http://www.faithwriters.com
If you died today, are you absolutely certain that you would go to heaven? You can be! Click here and TRUST JESUS NOW
Read more articles by Peter Menkin
Like reading Christian Articles? Check out some more options. Read articles in Main Site Articles, Most Read Articles or our highly acclaimed Challenge Articles. Read Great New Release Christian Books for FREE in our Free Reads for Reviews Program.
Or enter a keyword for a topic in the search box to search our articles.
The opinions expressed by authors do not necessarily reflect the opinion of FaithWriters.com.
Hire a Christian Writer, Christian Writer Wanted, Christian Writer Needed, Christian Content Needed
Find a Christian Editor, Hire a Christian Editor, Christian Editor, Find a Christian Writer
|
<urn:uuid:d6aa1829-8905-4865-9bdf-ced8f0efda58>
|
CC-MAIN-2016-26
|
http://articles.faithwriters.com/reprint-article-details.php?article=12756
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395620.56/warc/CC-MAIN-20160624154955-00143-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.972214 | 2,723 | 2.875 | 3 |
Organic is a labeling term that indicates that the food or other agricultural product has been produced through approved methods that integrate cultural, biological, and mechanical practices that foster cycling of resources, promote ecological balance, and conserve biodiversity. Synthetic fertilizers, sewage sludge, irradiation, and genetic engineering may not be used.
“The decision to pursue organic certification is not a decision to take lightly,” said Jenn Halpin, director of the Dickinson College Farm. “The fact that we moved forward shows a true and lasting commitment by Dickinson College to everyone who enjoys our organic produce and to students who will continue to benefit from the farm as a living laboratory.”
The USDA requires that anyone producing organic agricultural products be certified by a USDA-accredited official in order to sell, label or represent products as “organic.” Pennsylvania Certified Organic (PCO) is a USDA-accredited program that certifies operations based in Pennsylvania, Delaware, Maryland, New Jersey, New York, Ohio, North Carolina, Virginia, West Virginia and the District of Columbia.
To be certified organic, a producer must develop, implement and maintain an organic system plan. That’s where PCO comes in, providing the information needed to develop a plan. Once the plan is approved and implemented PCO sends a qualified organic inspector to perform an onsite evaluation. PCO determines whether the operation meets the requirements of organic certification, and, if it does, the operation must update its organic system plan and be inspected annually.
For more information, visit the Pennsylvania Certified Organic website
|
<urn:uuid:da12f4fa-990c-40d2-9ab2-78569ef804a8>
|
CC-MAIN-2016-26
|
http://blogs.dickinson.edu/farm/about/usda-certified-organic/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396027.60/warc/CC-MAIN-20160624154956-00132-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.918132 | 321 | 2.828125 | 3 |
court tennis, indoor racket and net game of ancient origin. It is believed to have originated (about the 14th cent.) in medieval France and is the forerunner of most modern racket games. In its early days the sport was known as royal tennis because of the interest it held for French and English royalty. Enjoying varying degrees of popularity over the years, the sport was first played in the United States in 1876. Court tennis is played on an indoor, concrete court 110 ft by 38 ft (33.53 m by 11.58 m), which is surrounded by four walls 30 ft (9.14 m) high. A player hits the ball—made of tightly wound cloth—with a 16-oz (.45-kg), 27-in. (68.5-cm) racket over the center net and plays the surface of the floor, the walls, and the ceiling to put the ball out of reach of the opponent. The scoring is intricate, and hitting the ball into wall openings also wins points.
The Columbia Electronic Encyclopedia, 6th ed. Copyright © 2012, Columbia University Press. All rights reserved.
|
<urn:uuid:b155b3a3-fdd3-41df-a466-08a870eb74cf>
|
CC-MAIN-2016-26
|
http://www.factmonster.com/encyclopedia/sports/court-tennis.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397562.76/warc/CC-MAIN-20160624154957-00051-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.9704 | 228 | 3.4375 | 3 |
The United Nations Environment Programme (UNEP) and the Television Trust for the Environment (tve) are calling on film-makers across the planet to submit their ideas – vivid, poignant, iconoclastic, and inspiring – for a global competition of one-minute films on the environment aimed at the YouTube generation. UNEP is challenging film-makers in two categories: food waste and climate change.
tvebiomovies, now in its fourth successful year,is inviting proposals from aspiring and established film-makers of all ages in five languages: Arabic, French, Russian, Spanish, and English. Past films have been viewed over five million times on YouTube.
Tell your friends, colleagues, relatives and neighbors to submit a proposal, make a video and help create the future we want.
The deadline for proposals is of August 30th. A judging panel will then pick the four best film ideas to be awarded $300 to go into production. Once the most promising proposals have been accepted, film-makers have until 23 October to produce their environmental magnum opus before uploading onto the tvebiomovies 2013 website.
Finally the shortlisted films which attract the most YouTube views by December 19th will each receive a $1,500 prize, as well as being screened at the United Nations COP 19 conference on climate change in Warsaw this November.
To submit a proposal, log on to www.tvebiomovies.org and decide whether climate change or food waste sparks your creativity. Proposals must be submitted by 23.00 GMT 30 August 2013.
|
<urn:uuid:5421fbda-d811-4be3-983b-727878b8a0d8>
|
CC-MAIN-2016-26
|
http://www.un.org.za/unep-global-film-challenge-on-environment/?cat=1
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783394605.61/warc/CC-MAIN-20160624154954-00094-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.937877 | 319 | 2.578125 | 3 |
Now, Glove to 'Air-Write' Your Texts
Washington: Researchers have developed a new innovative "air-writing" glove system that allows users to write texts and emails in the air with their hand.
When the wearer of the gloves draws letters in the air with their hand, the system can identify which letters are being drawn.
Those letters are converted into digital text, which could then be input into an email, text message, or any other type of mobile app, 'Gizmag' reported.
The glove developed by a team of computer scientists at Germany's Karlsruhe Institute of Technology is equipped with accelerometers and gyroscopes that detect hand movements.
The system then identifies which letters are being drawn and converts them into digital text, which can then be wirelessly entered into an email, text message or other mobile apps.
Once it is determined that letters are indeed being drawn, the computer then sets about identifying the individual letters.
The programme incorporates statistical models of the unique signal patterns for every letter in the alphabet, and can account for differences in individual writing styles.
It can also recognise approximately 8,000 words, along with complete sentences.
Christoph Amma, who developed the technology, now hopes to miniaturise the sensors to the point that the glove could be replaced by something less impractical to everyday use, such as a wrist band.
Amma also envisions the hardware being incorporated into a smartphone - in that way, a single hand-held device like a cellphone could be used both to detect hand movements, and to process the data.
|
<urn:uuid:eb6b975e-a65c-40bb-be5b-5afbb1d0d237>
|
CC-MAIN-2016-26
|
http://www.indiatimes.com/technology/gadgets/now-glove-to-airwrite-your-texts-64567.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403502.46/warc/CC-MAIN-20160624155003-00195-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.925951 | 325 | 2.78125 | 3 |
How Subgrantees, Crime Victim Assistance Coalitions, and Victim Service Providers Can Use Crime Mapping
Crime victim services subgrantees, coalitions, and providers can use GIS to study crime rates and resources in specific areas to improve allocation of resources, such as placing victim advocates in community centers, police departments, or courts. When gaps in services are identified, grant writers can incorporate this data into applications for federal, state, local, and foundation funding, thus documenting the scope of the problem for proposal reviewers.
GIS technology uses a process called buffering to create a barrier or zone around an area to be investigated or analyzed. For example, victims of domestic violence need many different services and are often dependent on public transportation in urban areas. In this instance, coalitions and service providers may want to buffer12 the area surrounding bus routes to determine how accessible police departments, shelters, courts, and social services are to victims of domestic violence. Networking13 is another process used to calculate optimum travel distances from all service locations or to determine optimum minimum distances between service locations.
Sexual assault coalitions can develop maps of assault locations, offering a broader look at where assaults occur or where victims reside. Child abuse coalitions can map the location of registered child molesters and overlay this information with data on the locations of schools and playgrounds to ensure supervision of offenders and protection of children (see exhibits 3 and 8).
State coalitions for crime victim assistance and providers of victim services can use GIS to identify underserved victims of crime, such as victims of physical assault, burglary, robbery, drunk driving, arson, and hate crime, and victims who are family members of homicide victims. This information can be shared among several groups working to plan for and serve these populations. This powerful tool allows the various coalitions to jointly assess and analyze crime on a larger scale by producing maps that can be shared and allow for joint strategic planning to develop a seamless delivery system for crime victims.
Mapping Victim Services
When creating a mapping system for crime victim services, different types of data can be integrated and different types of maps can be created. This information can be broken down into four categoriesvictim services, criminal justice, health and social services, and generic.
Examples of victim services data include
Examples of criminal justice data include
Examples of health and social services data include
Examples of generic data include
|
<urn:uuid:2d0b07a0-3390-4605-8229-0aabd3517fab>
|
CC-MAIN-2016-26
|
https://www.ncjrs.gov/ovc_archives/reports/geoinfosys2003/cm3f.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399425.79/warc/CC-MAIN-20160624154959-00087-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.922834 | 487 | 2.75 | 3 |
Hence we know that
For to be equal to 17, 17 must be equal to one of the factors, let's say , because 17=17*1 is the only factorisation for 17.
So it means that the others factors are equal to 1, that is to say . Thus since all the other powers are 0. (this is an extra part lol)
Let's go back to the problem.
This can be factorised :
But the only prime number that divides 16 is 2. Therefore .
Thus , which is impossible because the left hand side is an odd number and the right hand side is an even number.
|
<urn:uuid:dbf35dab-3b01-4922-a6e6-f2d7d177d6a0>
|
CC-MAIN-2016-26
|
http://mathhelpforum.com/number-theory/44024-sigma-function-help.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395560.69/warc/CC-MAIN-20160624154955-00137-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.936877 | 131 | 2.828125 | 3 |
The childhood background of Lyman Brewer in Ludlow, Massachusetts is almost a blank slate. Born in 1786, he was the tenth child of Lt. Isaac Brewer who may have served in the American Revolution. One of Lyman's brothers eventually became a large landowner in the Springfield area. Otherwise, we only know that Lyman moved to Norwich, Connecticut at some point before his 1812 marriage to Harriet Tyler, daughter of the Rev. John Tyler of Norwich.
As a young man Lyman established himself in the mercantile trade which thrived at the time with shipments received from the Caribbean. One account lists the delivery of cargo by schooner to Lyman Brewer in 1812 just before the war with Great Britain. By 1825 it appears that Lyman had changed careers as he co-founded the Norwich Savings Society and became the first cashier of Thames Bank. He held this post until he died in 1857, "leaving a name that was a synonym for integrity and benevolence", as told in a biographical review published in 1898. Harriet Brewer survived her husband until November 3, 1880, reaching the age of 92. The Norwich house they occupied for 60 years continued to serve succeeding generations of the Brewers even after Harriet's death.
A complete listing of the couple's eleven children has not yet come to light, but a large extended family of Brewers evolved in Norwich during the early part of the century. They may have had a reputation as distinguished citizens, but there may have also been some less favorable traits among them. A biography of one descendant, the poet Harold Witter Bynner, recounts the following about the family of his mother Annie Brewer, Lyman's granddaughter:
The Brewers were old, Protestant, highly respectable Connecticut clergymen, schoolteachers, and, more recently, thriving bankers and businessmen. They appeared to be like the straight, tall elm trees of New England—native and solid—and counted in their past a Chauncy who was the second president of Harvard College, a Bishop John Tyler of Norwich, and even the august Bushnells of Hartford, one of the most prominent Connecticut families. They were proud of their independence of spirit and showed a stern frankness in analyzing their own faults and those of others. These people were—and remained, in the poet’s mother—headstrong, proper, and demanding; people who, in their public roles, seemed to have a drive toward respectability, power, and independence, but these qualities never quite came together in their private, intimate selves. One relative is referred to as having misbehaved, appropriately out West, and Annie’s father is supposed to have made home life quite miserable with his private drinking. There is also a family tradition of debilitating stomach illnesses and neuralgic headaches—both of which were inherited by Harold and his mother. If the Bynners went in for excessive self-expression, the Brewers sought to hold it back. (Kraft, 1977)
William (1813 – ?)
Louisa J. (? - ?)
Charles (1824 - ?)
Alfred Lee (1831 - 1899)
Frederick (1834 - ?)
Questions for further research:
1. Why did Lyman leave Ludlow, Massachusetts for Norwich, Connecticut?
2. Did the Brewers provide education for their daughters as well as sons?
3. Were Lyman and Harriet Brewer active in the well-known Connecticut movement to abolish slavery?
4. Did any of the Brewer sons serve the Union in battle during the Civil War?
The sources for this biographical sketch:
History of New London County, Connecticut, by D. Hamilton Hurd, 1882
History of Norwich, Connecticut, by Frances M. Caulkins, 1876
Return to The Brewer Line Home Page
|
<urn:uuid:64585f06-4c1f-497f-82f0-fdd183f4efdb>
|
CC-MAIN-2016-26
|
http://brewer.homestead.com/files/Lyman_Brewer.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783394605.61/warc/CC-MAIN-20160624154954-00004-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.96879 | 783 | 2.59375 | 3 |
South African Journal of Science
versión On-line ISSN 1996-7489
STIDHAM, T.A.. A lovebird (Psittaciformes: Agapornis) from the Plio-Pleistocene Kromdraai B locality, South Africa. S. Afr. j. sci. [online]. 2009, vol.105, n.3-4, pp. 155-157. ISSN 1996-7489.
The previous report of the presence of lovebirds (Agapornis) at the Plio-Pleistocene Kromdraai B fossil locality is confirmed by the identification of a humerus from Member 3. That fossil specimen differs from extant lovebird species in morphology, and its slightly smaller size indicates that it likely represents an extinct taxon. This lovebird specimen is likely from the early Pleistocene (younger than 1.95 Myr) and appears to have been deposited around the same time as the fossil hominid specimens that have been uncovered at the site. The modern preference of lovebirds for a wide variety of wooded and forested habitats adds support to the mammalian-based idea that the palaeohabitat around Kromdraai B where Australopithecus robustus lived in the early Pleistocene was a mosaic that included wooded or forested habitats.
Palabras clave : parrot; lovebird; Kromdraai B; hominid.
|
<urn:uuid:35cec958-5ebc-493f-b6bd-d918845ef0e6>
|
CC-MAIN-2016-26
|
http://www.scielo.org.za/scielo.php?script=sci_abstract&pid=S0038-23532009000200019&lng=es&nrm=iso&tlng=en
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393997.50/warc/CC-MAIN-20160624154953-00060-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.844904 | 304 | 2.71875 | 3 |
If you have searched for a male ancestor who lived in the early to mid-1900s and did not find the information you needed, World War I and World War II Draft Registration records may hold invaluable data about your family member. These draft registration records are the result of requirements imposed by the Selective Service Act of 1917, passed during the administration of Woodrow Wilson. The act provided for a “liability for military service of all male citizens” and authorized a selective draft of males between 21 and 31 years of age. Later, the age requirement was changed to include individuals between 18 and 45 years of age. Local draft boards were composed of leading civilians in each community, and these individuals administered the requirements of the Selective Service Act. The new draft law was challenged, however, by individuals who asserted that it violated the Thirteenth Amendment's prohibition against slavery and involuntary servitude, but the U. S. Supreme Court unanimously upheld the constitutionality of the act in the Selective Draft Law Cases on January 7, 1918. The Court’s decision said the Constitution gave Congress the power to declare war and to raise and support its armies. Interestingly, The Selective Service Act contained a unique provision that a draftee could no longer pay to have someone serve for him, something that had occurred during the Civil War.
Since many thousands of males were required to provide personal information on the required draft registration forms, a number of personal details about a family member can be gleaned from a review of the form. Although most registration forms were completed by a member of the draft board or other representative, each form contains the actual signature or mark (X) of the registrant. Something as simple as viewing a family member’s handwritten signature or mark may have special meaning to a family researcher who never had an opportunity to meet the individual or to see a picture of the person.
Basic identifying information required on the form included the name of the registrant, his mailing address, and the name of his next of kin. For a researcher who has little or no family data available, the name of the family member’s next of kin may be just the bit of information needed to reveal yet another generation of family members’ identities. Other details found on a draft registration form include a registrant’s physical characteristics - whether he was tall, medium, or short, his physical build (large, medium, or small), and the color of his hair and eyes. The answer to another question asked provides the name and address of a man's employer. If the registrant was disabled or suffered a physical deformity, a brief description of his impairment is included, too.
Although copies of World War I and World War II Draft Registration records are available directly from the U.S. Military Archives, one of the easiest ways to view the records is by accessing the Ancestry.com website. Images of the documents can be viewed there and saved onto the researcher's computer or kept for later viewing in Ancestry's handy online "shoebox" function. Also, draft registration information, as well as some images, can be found at the free website maintained by the LDS Church at www.familysearch.org. Also, military records documenting service in the Revolutionary War, War of 1812, and the Civil War, are available from the National Archives and from library resources in most large cities. Old military pension applications for soldiers and for their widows also are available through the National Archives, although the researcher should remember that pensions based on service in early wars were not paid until Congress passed laws to do so after the Civil War. More often than not, a simple Google search that includes the serviceman’s name, the branch of service in which he served (if known) and the war in which he saw service, is enough to begin a research journey that may produce a wealth of unknown family history.
|
<urn:uuid:7856f066-1617-4e58-bd2d-242864a8c525>
|
CC-MAIN-2016-26
|
http://mymississippimemories.blogspot.com/2013_07_01_archive.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397111.67/warc/CC-MAIN-20160624154957-00059-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.968547 | 796 | 3.953125 | 4 |
Unemployment in September 2007
October 09, 2007
The number of unemployed persons (7.2 million) and the unemployment rate (4.7 percent) were essentially unchanged in September.
A year earlier, the number of unemployed persons was 6.9 million and the jobless rate was 4.6 percent.
Over the month, the unemployment rates for adult men (4.2 percent), adult women (4.0 percent), teenagers (16.0 percent), whites (4.2 percent), blacks (8.1 percent) and Hispanics (5.7 percent) showed little or no change.
Bureau of Labor Statistics, U.S. Department of Labor, The Economics Daily, Unemployment in September 2007 on the Internet at http://www.bls.gov/opub/ted/2007/oct/wk2/art01.htm (visited June 25, 2016).
Recent editions of Spotlight on Statistics
Employment and Wages in Healthcare Occupations
Healthcare occupations are a significant percentage of U.S. employment. Some of the largest and highest paying occupations are in healthcare. This Spotlight examines employment and wages for healthcare occupations.
Fifty years of looking at changes in peoples lives
Longitudinal surveys help us understand long-term changes, such as how events that happened when a person was in high school affect labor market success as an adult.
- A look at pay at the top, the bottom, and in between
The Spotlight examines how earnings and wages have changed over time and how they differ within a geographic area, industry, or occupation.
|
<urn:uuid:94ea54c1-cbb8-4056-9a3c-20bbaa25833a>
|
CC-MAIN-2016-26
|
http://www.bls.gov/opub/ted/2007/oct/wk2/art01.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393332.57/warc/CC-MAIN-20160624154953-00008-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.937049 | 323 | 2.609375 | 3 |
Cepheids as Cosmology Tools
This graph illustrates the Cepheid period-luminosity relationship, which scientists use to calculate the size, age and expansion rate of the universe. The data shown are from NASA's Spitzer Space Telescope, which has made one of the most precise measurements yet of the universe's expansion rate by recalculating the distance to pulsating stars called Cepheids.
Cepheids are essential tools in cosmological-distance calculations thanks to what astronomers call their period-luminosity relationship. The timing, or period, of a Cepheid's pulses correlates with its inherit brightness, or luminosity, as shown on this graph. A longer pulse rate corresponds to a more luminous star. Once astronomers know how luminous a Cepheid is, they can compare that value to how bright it appears on the sky: the farther the object, the dimmer it will appear. By using a series of Cepheids and even farther objects of a different type, astronomers can determine the size of our universe.
Spitzer observed 10 Cepheids in the Milky Way (yellow dots) and 80 in one of our nearest satellite galaxies, the Large Magellanic Cloud (circled dots). At the infrared wavelengths used by the cameras operating on Spitzer, the dimming effects of dust on visible light are virtually non-existent. Moreover the scatter in the points about the period-luminosity relation is so small that single stars can be used to determine distances many times more precisely than from the ground and in the optical part of the spectrum. These two advantages alone have allowed researchers to use the Spitzer observations of Cepheids to securely recalibrate the size, age and expansion rate of the universe.
Image credit: NASA/JPL-Caltech/Carnegie
|
<urn:uuid:d48b1383-a669-4d8b-9626-7a7dc94ae807>
|
CC-MAIN-2016-26
|
http://www.nasa.gov/mission_pages/spitzer/multimedia/pia15819.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393332.57/warc/CC-MAIN-20160624154953-00047-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.887824 | 375 | 4.375 | 4 |
Many College Students Unaware of Their Hearing Loss
One-Quarter of College Students May Have Hearing Loss and Not Know It, Researchers Say
March 17, 2011 -- Many college students think they can hear just fine, but new research suggests that up to one-fourth of them may actually have evidence of early hearing loss. The new finding appears in the International Journal of Audiology.
Researchers made this discovery while recruiting college students with normal hearing for a study that looked at the whether the use of personal music players can cause temporary hearing loss. Several of the students who reported normal hearing during telephone interviews showed signs of hearing loss when tested.
“We were very surprised, especially because we used extremely liberal criteria for normal hearing,” says study author Colleen Le Prell, PhD, an associate professor in the department of speech, language, and hearing sciences at the University of Florida in Gainesville.
One-quarter of 56 students at the University of Florida in Gainesville who reported normal hearing during initial phone interviews actually measured 15 decibels or more of hearing loss at one or more test frequencies. This degree of hearing loss is enough to disrupt learning, Le Prell says.
“This suggests that we need to be careful about classroom acoustics and that students with this degree of hearing loss should sit up close; and we should take steps to reduce background noise in classrooms,” she says.
Students completed a health survey and a questionnaire about their exposure to loud noise and underwent hearing tests in a sound booth at all of the sound frequencies used in a traditional full-hearing test.
Of the participants who demonstrated hearing loss, 7% had 25 decibels or more of hearing loss, which is “mild hearing loss.” Hearing loss occurred in both the range of frequencies identified as “speech frequencies” because they aid in speech discrimination, as well as the higher frequencies.
Do Personal Music Players Contribute to Hearing Loss?
The highest levels of “high frequency” hearing loss occurred among male students who reported using personal music players such as iPods and MP3 players, the study showed. However, more research is needed with a larger group of participants to determine the role of personal music players in hearing loss, Le Prell says.
|
<urn:uuid:2e919485-147e-4a73-802a-ebf66dab1646>
|
CC-MAIN-2016-26
|
http://teens.webmd.com/news/20110317/many-college-students-unaware-hearing-loss
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393518.22/warc/CC-MAIN-20160624154953-00194-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.959285 | 466 | 3.34375 | 3 |
The Moorish King and the Cross
The Moorish occupation of Spain lasted, in varying extents, from 711 until 1492. The time in between saw a continually fluctuating map of the Iberian peninsula, as a struggle for control was waged by the Christians and the Muslims.
On March 3, 1231, a Moorish king by the name of Zeyt-Abu-Zeyt, along with his entire family, converted to Christianity. The reason for this change was the subject of many accounts written at the time, including one by the official historian for Spain’s King Ferdinand III.
A certain priest, Don Gines Perez Chirinos de Cuenca, travelled into the Moorish territory of Murcia and preached the Gospel amongst the people there. Inevitably, he was captured and taken to King Zeyt-Abu Zeyt. The king was curious about the Catholic Mass and ordered Fr. Chirinos to perform one. The priest explained that he did not have the necessary articles to fulfill such a request. So, the King had some of his men go to neighboring Cuenca and obtain them from a church there.
At some point after he had begun the Mass, Fr. Chirinos realized that he did not have a Cross and stopped the Mass. The King questioned him as to why he had stopped and he replied as to the need for a Cross. The King then asked if that was not what was being brought in at that moment. In the presence of all assembled there, two angels were seen bringing it in and placing it on the altar, where it then remained. At the moment of consecration, the King saw a Baby in place of the Host, who looked at the King endearingly.
Each year, a festival is held in May in honor of the event. In 1998, Pope John Paul II granted it the privilege of being the fifth city in the world to celebrate the Perpetual Jubilee (one holy year every seven in perpetuity).
Sources: “The Eucharistic Miracles of the World,” a Vatican international exhibition, as reported by The Real Presence Eucharistic Adoration Association, http://www.therealpresence.org/eucharst/mir/english_pdf/Caravaca.pdf, and the Wikipedia entry for the city of Caravaca de la Cruz, http://www.therealpresence.org/eucharst/mir/english_pdf/Caravaca.pdf.
|
<urn:uuid:6d2a02c5-9247-41b0-8243-0ed911a9f37a>
|
CC-MAIN-2016-26
|
http://thehumblecatholic.com/the-moorish-king-and-the-cross/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783404405.88/warc/CC-MAIN-20160624155004-00189-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.973499 | 522 | 3.1875 | 3 |
graph theory problem
The friendship graph is defined as follows: the vertices are people,
and we draw an edge between two people if they are friends. There are two kinds of people in the world: normal and strange. A normal person has an even number of friends, and a strange person has an odd number of friends.
(a) Prove that there are at least two people in the world with the same number of friends.
(b) Use the first theorem of graph theory to prove that there are an even
number of strange people in the world.
(c) If there are exactly two strange people in the world, prove that there is a path connecting them in the friendship graph.
Alright so the first theorem of graph theory is that SUM(deg(v))=2|E| where v=# vertices in the graph and E=# of edges in the graph
a) not too sure how to prove this....
b) Would this be an appropriate proof:
According to the first theorem of graph theory, the SUM(deg(v))=2|E|. Since the the people who are "strange" have an odd number of friends, that means the degree of those vertices are odd. Since adding an odd number of odd numbers together results in an odd number, and adding an even number of odd numbers together results in an even number. In order for the equation SUM(deg(v))=2|E| to hold, the SUM(deg(v)) must be divisible by two, and therefore the SUM(deg(v)) must be even. Therefore there must be an even number of "strange" people in the world.
c) I don't know what to do for this part but I know I need to use this theorem:
If Gi is a connected component of G then degGi(u)=degG(u) for any u in vi.
(a) depends on what kind of world you live in. If there's only one person in the world the statement is false. So let's suppose there are at least two (and finitely many) people in the world. That is, our graph has vertices. For every vertex , there are possible values of : namely . Assume, for contradiction, that no two vertices have the same degree. Then, since there are vertices and possibilities for a degree, we can number the vertices such that the first vertex has degree 0, the second vertex has degree 1, the third vertex has degree 2,..., the -th vertex has degree . But now we see there is no graph with these degrees of vertices: since the first vertex has degree 0, the -th vertex can have degree at most , a contradiction.
(b) You have this correct. I wanted to add "Vertices of even degree don't play no role as to parity of SUM(deg(v))" but I guess it is too obvious.
(c) Suppose there are exactly two vertices of odd degree in and there's no path connecting them. Then the connected component of containing the vertex doesn't contain . So is a graph that contains exactly one vertex of odd degree (this is where we applied the theorem you mentioned). But this contradicts part (b).
thanks so much for the help!!
|
<urn:uuid:8c2f862f-060a-4bee-bebf-40b94726b236>
|
CC-MAIN-2016-26
|
http://mathhelpforum.com/discrete-math/110042-graph-theory-problem-print.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395166.84/warc/CC-MAIN-20160624154955-00050-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.957656 | 684 | 3.53125 | 4 |
Don't throw out those used coffee grounds: Your plants need 'em.
Composting is a low-maintenance way to minimize personal kitchen waste, create cheap, nutrient-rich fertilizer, and contribute to the health and productivity of a personal or community garden. Compost is a great gift for plants: It naturally helps replenish the nutrients drawn out of the soil by their roots. Good thing, then, that the same stuff we use to perk ourselves up in the morning can do the same for soil.
Used coffee grounds are rich in nitrogen, which is one of the three main nutrient components—along with potassium and phosphorus—in any successful fertilizer. (For you soil geeks, here's why: Nitrogen allows plants to convert sunlight into energy; phosphorus helps that energy get transmitted throughout the plant through its root system and cells; potassium helps the plant retain moisture, which aids photosynthesis.) When managing the "ingredients" in a compost pile, it's important to have proper balance: Nitrogen-rich material (greens) needs to be appropriately tempered by carbon-rich material (browns).
Coffee grounds are considered "green" matter, or nitrogen-supplying to the compost system. They help create and maintain heat inside the pile by giving bacteria a hospitable growth environment; they also can help manage the pile's overall moisture content. When paired with "browns" like leaves, twigs, even coffee filters, coffee is the perfect catalyst for healthy decomposition, which can speed up the composting process and give you better fertilizer faster. Worms love the stuff: They'll munch your day-old coffee happily, turning it into black gold by digesting it and producing nutrient-rich castings. (Just don't spread the grounds themselves straight on your trees and tulips: They can cause more harm than good if they haven't been fully composted yet.)
If you don't brew coffee at home but do have plants to tend to, you can probably source some grounds through a local café: Many shops offer bags of used-but-compost-clean grounds and paper filters for customers and other garden nuts. It reduces their waste, while helping your tomato plants thrive. (Feel free to tip your baristas in produce come harvest time; money isn't the only kind of green we appreciate.)
Side note: Those "compostable" paper cups that you see more and more at coffee shops are also appropriate "browns," but they're only eco-friendly if you actually compost them. Throwing them away means they will likely end up in a landfill, and the anaerobic environment at the dump stalls decomposition, so even corn cups take eons to break down.
Once your compost is completely broken down into a dense, healthy humus, you can use it to fortify sad-looking tree pits in your neighborhood, plant a window-box herb garden, or donate to a local community or school garden.
Who says you should cut back on caffeine? You're actually doing the world a favor! So keep brewing, and start composting.
About the author: Erin Meister trains baristas and inspires coffee-driven people for Counter Culture Coffee. She's a confident barista, an audacious eater, and a smiling runner, but she remains a Nervous Cook.
|
<urn:uuid:9efa908f-6205-4316-a06f-76da849bbdaf>
|
CC-MAIN-2016-26
|
http://drinks.seriouseats.com/2013/04/how-to-use-coffee-in-compost-why-coffee-is-good-for-compost.html?ref=excerpt_readmore
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393332.57/warc/CC-MAIN-20160624154953-00010-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.936453 | 681 | 3.046875 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.