text
stringlengths
199
648k
id
stringlengths
47
47
dump
stringclasses
1 value
url
stringlengths
14
419
file_path
stringlengths
139
140
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
50
235k
score
float64
2.52
5.34
int_score
int64
3
5
Initiation, propagation, retardation, inhibition and termination steps are the constituent steps in a chain mechanism. Initiation step is the step, in which radicals are formed from the molecule. Propagation step is the step, in which new radicals are formed in the presence of radicals formed in initiation step. Retardation step is the step, reduces the net rate of formation of product but chain reaction will not be terminated. Inhibition is the step decreases the rate of product formation from the substrate. Termination step means, in this step radical combined and end the chin mechanism.
<urn:uuid:b08c00db-7bf0-4321-9547-52bbf58f3284>
CC-MAIN-2016-26
http://www.chegg.com/homework-help/physical-chemistry-8th-edition-chapter-23-solutions-9780716787594
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395546.12/warc/CC-MAIN-20160624154955-00159-ip-10-164-35-72.ec2.internal.warc.gz
en
0.909837
121
3.140625
3
July 19, 2011 Save The Environment And Your Health By Eating Less Meat Eat less meat and cheese, both for your health and for the environment, according to a report released by the Environmental Working Group (EWG). EWG calculates that if every American goes without meat and cheese for just one day out of the week, it would be the same as the country driving 91 billion fewer miles a year.The report brings together statistics from various previous studies that say eating meat can be an important source of protein and vitamins when eaten in moderation. "The goal is to really make this information accessible to consumers," Kari Hamerschlag, an agriculture analyst with EWG, told the Huffington Post. "On the health side, we really pulled together all of the information and tried to make it as clear as possible that there's not just one reason to limit meat consumption; there are a whole host of reasons." Data from the United Nations Food and Agriculture Organization suggests that Americans consume nearly 60% more meat than their European counterparts, and four times more than in many developing countries, reports the Huffington Post. The EWG report claims a myriad of health effects from eating meat. For example, they cited a 2009 report from the National Cancer Institute that found that people who ate the most red meat, which can contain high levels of cholesterol-rising saturated fat, were 27% more likely to die of heart disease. In addition, the same report found that serious meat eaters were 20% more likely to die from cancer than those who consumed the least amount of meat. A statement issued by the American Meat Institute, a trade association representing companies that process most of the red meat and turkey in the U.S., says that the report oversimplifies many of the health issues and that "the total body of evidence clearly demonstrates that meat is a healthy part of a balanced diet," according to the Huffington Post. On the environmental side, the report is the most recent in a long list of reports that calculates the greenhouse gases emitted from food production. USA Today reports that Lamb, which is consumed about 1% of the time by Americans, produced the highest pounds of carbon dioxide (39.2 lbs) per pound of meat. Beef came in second with 27 pounds of carbon dioxide, with cheese right behind it at 13.5%. ""¦ it takes about 10 pounds of milk to make 1 pound of cheese," says Hamerschlag. However, according to the Environmental Protection Agency, only 3.4% of all greenhouse gases are the results of animal agriculture. "By changing the focus of eating habits, people think it doesn't matter whether they drive a Hummer or a Prius, it's whether they eat a burger or not." USA Today reports that Frank Mitloehner, who studies animal-environmental interactions at the University of California-Davis, disagrees with the EWG numbers. He says that the scientific life cycle assessments of meat production "haven't been conducted." EWG is not asking people to become vegetarians. Instead, Hamerschlag says, "We're just urging people to be more conscious about what they eat." The EWG report advocates once-a-week meat free meals that calls for "Meatless Mondays," and when eating meat, to opt for meat that comes from grass-fed, certified organic and pasture-raised animals. "I'm not a vegetarian myself," says Marion Nestle, professor of nutrition at New York University, "but people don't need to eat as much meat as they're eating." The Huffington Post reports that the American Institute for Cancer Research and the American Dietetic Association recommend limiting consumption of red meat to about 18 ounces a week, which is a little more than a pound. On the Net: - Environmental Working Group Statement - United Nations Food and Agriculture Organization - National Cancer Institute - American Meat Institute - Environmental Protection Agency - University of California-Davis - American Institute for Cancer Research - American Dietetic Association
<urn:uuid:d3a9b036-5fa5-4da7-af11-1602b234c1a7>
CC-MAIN-2016-26
http://www.redorbit.com/news/health/2081023/save_the_environment_and_your_health_by_eating_less_meat/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783392099.27/warc/CC-MAIN-20160624154952-00197-ip-10-164-35-72.ec2.internal.warc.gz
en
0.959998
823
2.796875
3
Caves and Age How radioactive dating confuses the situation Caves are a common feature of karst landscapes—the rugged sort formed in rocks that dissolve easily such as limestone (mainly calcium carbonate), forming underground passages and drainages. Caves have always been considered the perfect archive, preserving the past, unlike most other environments. And they offer evolutionary scientists an array of items aching to be radiometrically dated. These include the inspiring stone decorations called speleothems—such as stalactites (on the ceiling), stalagmites (on the floor) and flowstone. These formed when water enriched by dissolved carbon dioxide (CO2)—making it acidic—dissolved the alkaline calcium carbonate (CaCO3) in one place and released the mineral in another.1 Evolutionists claim speleothems formed over hundreds of thousands of years. But in my own evolutionary days, I had never considered an important consequence of such an age: the tiny water droplet, which built that stalagmite, had to keep arriving at precisely the same spot on the floor of the cave for 100,000 years! Well, I knew—and all karstologists know—that the surface of limestone terrains above caves changes dramatically in short periods of time. And any change at the surface also changes the location of the water droplets inside the cave. However, the stalagmites do not indicate any changes. So the conclusion is simple: they cannot be that old. And that fact indicates the old-age belief is fallacious. Speleothems are amenable to the uranium-thorium (234U/230Th) method of dating, and caves are assumed to be much less prone to variations of all sorts. Sometimes the ‘measured’ ages of speleothems can be tested by radiocarbon ages of artefacts and fossils found in caves. Speleothems are believed to preserve accurate records of ancient climates—or paleoclimates. This is because they preserve oxygen and carbon isotope ratios from the past, and that allows scientists to make paleoclimate reconstructions. Radiometric dating however often disagrees with the observed growth rates of speleothems and their complex formation processes,2 and this confuses attempts to make sense of speleothem interpretations. As for paleoclimate reconstructions, one must understand well how any variation in climate could have affected the isotopic ratios and accurately relate these to the speleothem record. Speleothems and ice cover On the use of climate variations, karstological wisdom maintains that during the Ice Age the water infiltrating into caves either stopped or significantly diminished. At this time, ice covered much of the ground and even where it didn’t, beyond the ice sheets, permafrost was extensive. With less water it is expected that the growth of speleothems would be arrested or much diminished. This is a soundly-based understanding of how past environments would affect speleothem development. Yet, this karstological wisdom is contradicted by most of the speleothems studied from areas that are known to have been affected by the ice cover! The reason is all to do with the dates that have been assigned by radioactive dating. Because of the ‘dates’, evolutionists concluded that speleothems grew fast when they should not have grown, and did not grow when they should have! Rather than discard the dates, most evolutionary scientists prefer to discard all ‘unorthodox’ speleothems, and use only the few that match their grand scheme of things. Vancouver Island karst Some of the contradictory results have come from the karst on Vancouver Island, Canada, which has provided only a few datable speleothems. The reason for the paucity of specimens is that the island was covered by up to 2 km (6,500 ft) of ice during the Fraser Glaciation, the most intense episode of glaciation during the Ice Age. Understandably, the speleothems did not grow when ice covered the landscape, and after the ice melted, the caves are too young to have a large number of speleothems. In fact all North American karst terrains that have been covered by ice have similar characteristics. Also, massive amounts of meltwater, running beneath the ice sheet, repeatedly flooded Vancouver Island caves. This is revealed by the frequent and large rounded boulders inside many caves, some transported by moving water from a considerable distance. This would have destroyed any speleothems and prevented new ones from forming. Thus, in North America, only caves south of the ice cover during the Ice Age are rich in speleothems. The Vancouver Island speleothems have yielded radiometric ages of between 12 and 18 thousand years.3,4 That creates a problem and causes confusion. According to various geological evidences, the island was covered by ice, so the speleothems should not have grown at this time. But rather than question the radio-isotopic dates (and hence the methodology involved), some scientists have proposed that the 2-km—(6,500-ft—) thick ice cover melted and grew back in a few thousand years, even though there is no evidence for this melting and they cannot explain how it could have happened! Of course, a simpler explanation is that the radiometric dating is incorrect and that the speleothems grew only after the ice had melted. Another contradictory result was uncovered by scientists studying a speleothem from Arch Cave on Vancouver Island. They nonchalantly stated that the cave was “chosen for its proximity to the ocean so as to reflect a global climate history, and for its abundance of accessible cave deposits that were distant enough from the cave entrance and ground surface to mitigate any seasonal temperature effects.” In other words, they envisaged that speleothem growth on the ancient shore lines on the east coast of Vancouver Island would allow meaningful global correlation as the world’s sea level oscillated during the Ice Age—rising and falling as ice was locked on continents or melted. Based on the measured oxygen and carbon isotopes (18O and 13C) they reconstructed the paleoclimate from the speleothem, which was radiometrically dated at 12,500 years. Yet, the geological evidence indicates the island was covered by ice at that time, so there should have been no speleothems growing at all. Not only the island, but the nearby Strait of Georgia was completely plugged by ice, with glacial scouring still visible on the bottom. In spite of this, maintaining their unshakable confidence in radiometric dating, the scientists conveniently ignored these geological facts and claimed the speleothems grew beneath the ice cover. But if there really was this much ice cover at the time that the speleothems grew, the water infiltrating into the caves would not reflect the atmospheric composition at the time (as rainwater infiltrating into caves does today). Rather it would reflect an unreliable mixture of water from the melted ice layers. That would render any paleoclimate reconstruction from speleothems meaningless. Under such circumstances the ‘global climate history’ cannot be reconstructed and cannot be directly correlated with data from the caves. In other words, by uncritically accepting the radioactive date without question, the researchers have ended up with a scheme that contradicts the geological evidence and undermines the basis for making paleoclimate reconstructions in the first place. Clearing the confusion On the other hand, when we apply some scientific skepticism to the spurious dates, we uncover a rather simple and consistent scenario that is in perfect accordance with the Genesis record. This allows us to understand the proper sequence of events, with the effects of Noah’s Flood being the key. The caves on Vancouver Island formed after the Flood and during the Ice Age.5 As creationist geologists have so simply documented, the Ice Age was a consequence of the warmer oceans and cooler land that existed on the earth immediately after the Flood.6 Only when the ice from the Ice Age had retreated did speleothems start growing inside those caves, and these have recorded the post-glacial climate variations over the last 4,000 years. References and notes - Lewis, D., Rapid stalactite growth in Siberia, Creation 32(1):40–42, 2009; creation.com/stalactite. Return to text. - Silvestru, E., Caves for all seasons, Creation 25(3):44–49, 2003; creation.com/all-seasons. Return to text. - Latham, A.G., Schwarcz, H.P. and Ford, D.C., Secular variation in the Earth’s magnetic field from 18.5 to 15.0 ka BP, as recorded in a Vancouver Island stalagmite, Canadian Journal of Earth Sciences 24:1235–1241, 1987. Return to text. - Marshall, D., Bassam, G., Countess, R. and Gabities, J., Preliminary paleoclimate reconstruction based on a 12,500 year old speleothem from Vancouver Island, Canada: Stable isotopes and U–Th disequilibrium dating, Quaternary Science Reviews XXX:1–7, 2009. Return to text. - Silvestru, E., Geology and Cave Formation: A Post-Flood Story, DVD. Return to text. - Evolutionary ideas of the ice age involve cooling of the whole earth, but cold seas won’t evaporate much, hence fewer clouds, so less snow, so no source of the ice sheets. But the “fountains of the great deep” (Genesis 7:11) would have warmed the ocean, and cooled the land when volcanic ash blocked sunlight. See the Creation Answers Book, ch.16; creation.com/cab. For more technical detail, see Oard, M.J., An Ice Age Caused by the Genesis Flood, Institute for Creation Research, El Cajon, California, 1990. Return to text. (Also available in German.) Beautifully written. I have tried to make sense of previous articles on Vancouver's speleothems without success. This one is clear without being patronising. You continue to use this kind of fallacious argument that how ONE of a thing formed means they ALL formed that way. Why? Just because one formed quickly doesn't mean ALL formed quickly. It's quite simple. "that the surface of limestone terrains above caves changes dramatically in short periods of time. And any change at the surface also changes the location of the water droplets inside the cave. " No it doesn't. Surface changes don't change the location of the cracks in the cave "roof." This is one example that is looked at in detail. It is enough to show that millions of years are not needed to form caves. The cracks may not change, but the surface drainage would change and that would affect the way water flowed through the rocks. I find it interesting that you conveniently left out one important factor in the formation of speleothems in caves: " The bedrock also needs to be relatively close or at the surface." I consistently find that your articles leave out bits of known information like that. Why? Yes, the bedrock does need to be relatively close to the surface. That is why the article says that caves on Vancouver Island formed after the Flood and during the Ice Age. At that time the overlying rocks had been eroded away by the receding waters of the Flood and the bedrock was near the surface. Caves also formed very late in the Flood, again for the same reason. Great article. It reminded me of a recent trip to Kartchner Caverns in Arizona, USA. After the full field trip explaining how a special formation in particular called "straws" took a thousand years per inch to grow from the ceiling of the cave, the trip was then concluded and we were exiting into a man made concrete tunnel. I looked up and to my surprise I saw a fully formed approx 6 inch "straw" formation growing down from the concrete tunnel. I stopped one of the tour guides and quietly asked him "so, if the straws took a thousand years per inch and this tunnel is only 10 years old, how is that here?" His reply was priceless: "Well, this tunnel presents ideal conditions for them to grow". Since I relied on the tour guide to give me a ride back to the tourist center, I chose not to ask him why he thought the cave we had just left never had ideal conditions, but a man made tunnel did. Great article. I started reading wondering whether it would be too technical, but the language and explanations are so clear that one wonders why evolutionists are so far off the mark.
<urn:uuid:20877db4-49df-4de5-bdc5-5e15bbc0b65a>
CC-MAIN-2016-26
http://creation.com/caves-and-age
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396224.52/warc/CC-MAIN-20160624154956-00136-ip-10-164-35-72.ec2.internal.warc.gz
en
0.950939
2,682
4
4
Every year on 21 March, the world commemorates the anniversary of the 1960 Sharpeville massacre, where dozens of peaceful demonstrators were shot by police in apartheid South Africa for protesting racially discriminatory laws. This year's International Day for the Elimination of Racial Discrimination focuses on "Racism and Sport". The theme was chosen by the UN Human Rights Office to highlight the problem of racism in sports, which remains a disturbing occurrence in many parts of the world, as well as to raise awareness of the role sports can play in combating racism and racial discrimination. "There is no place for racism and intolerance in sport… Sport is meant to foster social cohesion, bring different cultures together in a celebration of healthy competition, and to overcome the diffidence and even contempt that all too often divide countries and communities in the political and social arenas." — said UN Human Rights Chief, Navi Pillay. At a special event in Geneva, the UN Human Rights Office will highlight the issues raised by the persistent racism at sporting events. Professional footballer, Kevin-Prince Boateng, from AC Milan, Edgar Davids, ex-Dutch international and currently head coach at Barnet Football Club and Patrick Vieira, ex-French international, currently an executive with Manchester City, senior officials from the Union of European Football Associations and the Federation of International Football Associations and other experts will share their views on racism in football . Racism in sport, both by fans and competitors is an on going concern of the UN Human Rights Office. In September 2012, the Human Rights Council noted that, “Despite the immense potential of sport in promoting tolerance, racism in sport is still a serious problem.” Referencing the Olympic spirit requiring “human understanding, tolerance, fair play and solidarity, the Council urged an intensified “fight against racism in sport.” The event in Geneva 21 March will focus on football and the damage inflicted on the sport by racism but also its potential as a positive force to combat discrimination. Use social media to speak up against racial discrimination! Join the conversation using #FightRacism and share your views and experiences with others. Find much more, and very detailed information, on discrimination via these links on the website of the UN Human Rights Office. Discrimination is a priority of the United Nations Human Rights Office: read our feature stories about this issue and the anti discrimination programmes of the Office. The Brussels based United Nations Regional Information Centre for Western Europe - UNRIC provides information on UN activities to the countries of the region. It also provides liaison with institutions of the European Union in the field of information. Its outreach activities extend to all segments of society and joint campaigns, projects and events are organized with partners including the EU, governments, the media, NGOs, schools and local authorities. United Nations Regional Information Centre for Western Europe (UNRIC Brussels) Residence Palace, Rue de la Loi/Wetstraat 155, Block C2,7th and 8th floor, Brussels 1040, Belgium Tel.: +32 2 788 8484 / Fax: 32 2 788 8485
<urn:uuid:9cb28f7b-3cd0-4787-ada2-bbcc4fb2f42b>
CC-MAIN-2016-26
https://www.unric.org/en/latest-un-buzz/28318-no-place-for-racism-and-intolerance-in-sport
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396027.60/warc/CC-MAIN-20160624154956-00145-ip-10-164-35-72.ec2.internal.warc.gz
en
0.918631
638
2.90625
3
on 19 July 2005 the FCC released Notice of Proposed and Order (NPRM), .... When acted upon as written and posted in the Federal Register ... this page will no longer be necessary. Looks like 23 February 07 is the day that Morse code is no longer a requirement for Amateur Radio licensing....... Just a note...... 23 February 07 is now history......... Just leaving the page here for a bit of nostalgia. (13 March 2007) .... These notes are from My experience's of administrating the CW examination as a member of a VE team...... even before the FCC turned it over to the Amateur community in mid- eighties. --- all NOVICE Class 5 WPM examinations were administered by a General Class or higher prior to that. TIPS FOR TESTING scroll down a little ... DONT WAIT FOR THE FCC TO REMOVE THIS REQUIREMENT.....Get the code "under Your belt" MORSE CODE a little background It is a relative simple matter for anyone to broadcast a message using voice and the English language. The only requirement is that the individual sending the message should speak into a microphone connected to a transmitter. At the receiving end, the procedure is just as simple, the individual desiring to understand the transmitted message needs only to tune a receiver to the broadcasting station and listen to the spoken words as they are reproduced by the receiver. The transmission of messages by code however, requires a special skill on the part of both the sender and the receiver. WHY USE CODE TRANSMISSION IF VOICE TRANSMISSION IS SO MUCH SIMPLER? 1. Radio communication by code requires less elaborate, less costly and less bulky equipment than does voice radio communication. 2. Code transmission will penetrate radio and atmospheric interference more readily than will phone transmission. Code transmission will usually be intelligently received under conditions that render voice transmission and reception impossible. The spoken word with it's inflections, intonation and a tremendous variety of sounds is infinitely more complex than is the single piercing note of a radio telegraph signal. 3. The radio telegraph code constitutes an invaluable method of sending secret messages or security information with a greater amount of safety. 4. A transmitted code signal requires much less frequency space than does a radio telephone signal. Approximately 6 KHZ for an AM signal and 15 KHZ for the wideband FM signal. The typical CW signal is 1.5 KHZ. 5. Amateur radio operators use "Q" signals which have common meaning in languages other than English. This permits the exchange of basic information in CW between operators regardless of their English speaking ability. The Morse code is made up of letters as is most spoken languages. The code letters consist of sounds of short and long duration which are called DOTS & DASHES. (sounded like DITS & DAHS) These sounds are usually high pitched tones of about 500 to 800 Hertz or approximately the sound of a high C on a piano. The long sound (DAH) is three times as long in duration as the short sound (DIT). Each letter of the alphabet, each number and each punctuation mark is composed of a different combination of these long and short sounds. Since Morse code consists of sound combinations it is very similar to music. A person listening to the National Anthem hears only the melody and not the individual notes of the music. Morse code is quickly mastered by listening for the "melody" of the letter sound rather than counting the individual dits and dahs. Now for the Examination NUMBER NUMBERS NUMBERS ... KNOW THE NUMBERS It's difficult to have ten questions about a five minute QSO without four or five of them requiring numbers. (Call Signs, RST, Antenna Height, number of tubes, power, age, years a ham....etc) Expect to have a CALL Sign with a DAH DIT DIT DAH DIT ( / ) ... FCC exams are required to have all 26 letters, zero thru 9 numbers, at least 4 punctuation marks including the slant bar & procedural SK. Learn the common configurations for CALLSIGNS like 1x2, 1x3, 2x1, 2x2 & 2x3 ... That way there will be no surprises if something like WN7OPQ/6 is heard. The exam is a typical QSO that will last for a little over five minutes. Before the exam there will be a one minute warm-up to insure that everyone can hear the message. You will be given a paper to copy both the practice warm-up minute and the QSO . The QSO will start with a series of six "V"s and end with the procedural sign SK. A passing score is achieved by answering 7 out of the ten questions correctly or 25 characters in a row. (Not counting the V's or Warmup)... Numbers and punctuation marks count 2 and letters count 1. What is the Call of the receiving station? What is the location of the receiving station? What is the Call of the Transmitting station? What is the location of the transmitting operator? What was the name of the receiving operator? What was the RST report given by the transmitting operator? What was the radio being used by the transmitting operator? What did the transmitting operator say His power output was? What type of antenna did the transmitting operator utilize? What was the height of the antenna? What was the weather described as? How long had the transmitting operator been a Ham? What was the reason given for ending the contact? ADDITIONAL HELP: Learn the names of as many type of radios as possible... especially the more common ones like KENWOOD, ICOM, YAESU, TEN-TEC, SWAN, NATIONAL, HALLICRAFTERS, SBE & HEATHKIT. Learn the names of the common antenna configurations..... like DIPOLE, DELTA LOOP, WINDOM, ZEP, BAZOOKA, YAGI, BEAM, INVERTED VEE, LONGWIRE & ROMBIC THAT WAY IF YOU COPY A PORTION OF THE RADIO NAME OR ANTENNA TYPE IT WILL BE EASIER TO FILL IN THE BLANK. Be "up" for the examination both mentally & physically. A good night's rest and something on the stomach is important. Comfortable attire - (pinching shoes or a tight collar is a distraction) Get to the examination location early. (get familiar with the testing facilities ..this takes the apprehension "edge" off) Whenever the examination is announced - secure a seat close to the sound. When given the opportunity - copy all of the "warm-up" or practice run. CW exams start with a series of six Vs and end with the procedural sign AR or SK Call signs (If you miss part at first, they will also be in the closing).. The first call given is the RECEIVING operator followed by DE .. and then the Call of the TRANSMITTING operator Names of the operators (receiving operator usually near the first of message) .... Expect short names like JOE, JIM, JACK, BILL rarely a SAMANTHA or CLEMENTINE but often a MARY, JILL, BETH When you hear UR RST or SIGs is/are --- know there will be three numbers coming next. Most likely the first will be a 5 and the last a 9 (know what RST is ....and that the first number is never over 5).... remember, it's possible to get a RST report like .... 599 W/QSB (with fading).. ....QSB....QRM ..... QRN are the only ones I have ever seen on a 5 WPM exam. If you miss a Character----FORGET IT (for now) -- mark your copy with a "-" or just a space where the letter should be. These "holes" can be filled in later.... see below. QTH - look for City & State (rarely DX locations on 5WPM exam) Sometimes just the CITY or the STATE is given.... and the question usually asks for the CITY or STATE even if both CITY & STATE are given. When you hear weather or WX it's usually a two word description following. (WINDY and WARM......... COLD and FREEZING .....DAMP and RAINY) Sometimes followed by "TEMPERATURE IS __ DEGREES" Type of radio (rig) --sometimes descriptive like OLD TUBE or QRP but most often the name of a manufacturer.... KENWOOD, ICOM or YAESU (TEN-TEC, SWAN, NATIONAL, HALLICRAFTERS, SBE, HOMEBREW & HEATHKIT). ... be familiar with names of Rig types Antenna used. Know the names of several configurations. DIPOLE, DELTA LOOP, WINDOM, ZEP, BAZOOKA, YAGI, BEAM, INVERTED VEE, LONGWIRE & ROMBIC By knowing the configuration names of the antennas it helps to fill in the "holes" in Your copy. Comment like "BEEN A HAM 30 YEARS" or "AM IN 12TH GRADE" Listen for why QRT........ "I MUST QRT FOR WORK".... "QRT FOR BED" Listen for Callsigns again The CW message is over: Listen for directions from the VE Scan your copy - fill in the" holes" of the letters missed. (GROC_R) most likely GROCER (EN_INEER) likely ENGINEER .... GET THE IDEA?.... This filling in of the "holes" helps in getting 1 minute of straight copy (25 characters in a row)..... a person must be able to communicate at 5 words per minute...... a copy of CHICA-O and later adding the G still means that the person got the meaning of the communication. See if QTH corresponds to the callsigns (KL7XXX should be Alaska--WH6XXX in Hawaii & etc).... KNOW the Call sign areas Read over ALL the questions BEFORE printing any answers. Usually the questions follow the copy (first in message --- first on test generally the same sequence - but there are exceptions) Answer all of the "SURE" ones FIRST. (Hopefully 7 or more).... Look at the "doubtful" ones. Are any a "toss-up" between 2 responses? Like is it a four or a six? If its in a Callsign ..... see if You answered Florida for a location ... Florida is in 4 land Look for "tell-tell" letters in your copy--if a couple of letters match to what You have knowledge of , MARK IT. (DI_O__ is likely DIPOLE.... even if the copy is just D_____ and it's about an antenna it's probably DIPOLE if the copy is just _a___ and it's about a radio it's probably YAESU If there is one "I have no idea" it's worth a guess. If it's a callsign remember the FCC requires ALL numbers be used in the exam. Count the numbers You have copied.... If You are missing a ZERO or any other number, put it in the Callsign that doesn't have a number in Your copy. If an Op says His age is 78, it's likely He's not a go-go dancer. If an Op says STUDENT don't expect a number over 20 for age. As a last resort----- EDUCATED GUESS...... any omitted answers are already incorrect. If You don't have anything copied for antenna .... dipole, vertical, beam & longwire showup most often. NEVER OMIT AN ANSWER ...... put down an educated guess. Nothing copied for the rig? ... Kenwood, Yaesu or Icom .... certainly better than leaving it blank. All of this is NO substitute for CW skill however, but it's a sure thing to help overcome the exam apprehension and to secure a passing score. 7 out of 10 right On the 5 WPM examination the requirement is 25 characters in a row. (Not counting the practice run or the series of "V"s) Numbers and punctuation marks count as two characters After July 2001, all of the CW examinations were "fill in the blank". Of the examinations that I have administered since that date there have been many more applicants passing by 25 characters in a row rather than correctly getting 7 of 10 of the fill in the blank. Good luck! I would even like to know if this information helped You......... send Me a message......... [email protected]
<urn:uuid:06b6c4ad-7113-4189-ab5e-c5053c75198d>
CC-MAIN-2016-26
http://www.qsl.net/wj5o/mcode.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395560.69/warc/CC-MAIN-20160624154955-00099-ip-10-164-35-72.ec2.internal.warc.gz
en
0.914514
2,771
2.671875
3
Three special types of permissions are available for executable files and public directories: setuid, setgid, and sticky bit. When these permissions are set, any user who runs that executable file assumes the ID of the owner (or group) of the executable file. You must be extremely careful when you set special permissions, because special permissions constitute a security risk. For example, a user can gain superuser capabilities by executing a program that sets the user ID (UID) to 0, which is the UID of root. Also, all users can set special permissions for files that they own, which constitutes another security concern. You should monitor your system for any unauthorized use of the setuid permission and the setgid permission to gain superuser capabilities. A suspicious permission grants ownership of an administrative program to a user rather than to root or bin. To search for and list all files that use this special permission, see How to Find Files With Special File Permissions. When setuid permission is set on an executable file, a process that runs this file is granted access on the basis of the owner of the file. The access is not based on the user who is running the executable file. This special permission allows a user to access files and directories that are normally available only to the owner. For example, the setuid permission on the passwd command makes it possible for users to change passwords. A passwd command with setuid permission would resemble the following: -r-sr-sr-x 3 root sys 28144 Jun 17 12:02 /usr/bin/passwd This special permission presents a security risk. Some determined users can find a way to maintain the permissions that are granted to them by the setuid process even after the process has finished executing. The use of setuid permissions with the reserved UIDs (0–100) from a program might not set the effective UID correctly. Use a shell script, or avoid using the reserved UIDs with setuid permissions. The setgid permission is similar to the setuid permission. The process's effective group ID (GID) is changed to the group that owns the file, and a user is granted access based on the permissions that are granted to that group. The /usr/bin/mail command has setgid permissions: -r-x--s--x 1 root mail 67504 Jun 17 12:01 /usr/bin/mail When the setgid permission is applied to a directory, files that were created in this directory belong to the group to which the directory belongs. The files do not belong to the group to which the creating process belongs. Any user who has write and execute permissions in the directory can create a file there. However, the file belongs to the group that owns the directory, not to the group that the user belongs to. You should monitor your system for any unauthorized use of the setgid permission to gain superuser capabilities. A suspicious permission grants group access to such a program to an unusual group rather than to root or bin. To search for and list all files that use this permission, see How to Find Files With Special File Permissions. The sticky bit is a permission bit that protects the files within a directory. If the directory has the sticky bit set, a file can be deleted only by the file owner, the directory owner, or by a privileged user. The root user and the Primary Administrator role are examples of privileged users. The sticky bit prevents a user from deleting other users' files from public directories such as /tmp: drwxrwxrwt 7 root sys 400 Sep 3 13:37 tmp Be sure to set the sticky bit manually when you set up a public directory on a TMPFS file system. For instructions, see Example 7–5.
<urn:uuid:5d39bea9-166b-4f99-9f68-3d9ed49c7af3>
CC-MAIN-2016-26
http://docs.oracle.com/cd/E19082-01/819-3321/6n5i4b79b/index.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396106.25/warc/CC-MAIN-20160624154956-00167-ip-10-164-35-72.ec2.internal.warc.gz
en
0.913667
776
3.203125
3
Story: McKenna, John and McKenna, Thomas This biography was written by Claire Hills and was first published in the Dictionary of New Zealand BiographyVolume 3, 1996 John and Thomas McKenna were born to Patrick McKenna and his wife, Margaret Wallace, who farmed in Newpark, Kilmaganny, County Kilkenny, Ireland. John is said to have been born on 20 February 1860 and Thomas on 21 December 1864. The brothers attended St Kieran's College and trained for the priesthood at St John's College, Waterford, and at the Knocktopher seminary. John McKenna was ordained in 1883 and volunteered for the New Zealand mission. For a time he assisted at St Mary's Cathedral, Wellington, then in 1887 he became the parish priest of St Patrick's Church, Masterton. The Catholics, few in number, were mainly of Polish or Irish origin. Within weeks of his arrival McKenna realised that there was far too much work in the district for one man: the parish stretched from Pahiatua to Featherston and Martinborough. Thomas McKenna, who had just been ordained at St Mary's Cathedral, Kilkenny, was on his way to New Zealand. When he reached Wellington on 2 March 1888 his brother was there to meet him, and they travelled up to Masterton on the same day. Within a fortnight Thomas was appointed as curate in Masterton. He served there until 1891, then was stationed at Patea until 1894. John and Thomas McKenna were able administrators and outstanding pastoral priests who together laid the foundation of the Catholic church in Wairarapa. When Pahiatua was established as a separate parish in 1894, Thomas returned as its first priest. The parish included Woodville, Pahiatua and surrounding country districts. He travelled widely in a gig across an often wild countryside of rough bush tracks and fast-flowing rivers to deliver instruction and offer Mass and the sacraments. When the Pahiatua church became too small, he joined his parishioners in clearing a new site. A church was built at Woodville and another at Hamua on land provided by the prominent Wairarapa Maori leader Nireaha Tamaki. John McKenna successfully overcame the financial difficulties of his parish, and oversaw the creation of a separate parish south of Masterton in 1900. He enlarged St Patrick's Church in 1902 and built new churches at Eketahuna and Mauriceville. In his 43 years in Masterton he trained 23 curates. In the 1890s Catholic education in Wairarapa was still in the hands of lay teachers. John McKenna obtained six sisters of the Congregation of St Brigid from Australia in 1898, and from 1899 secondary education for girls became available at St Bride's Boarding and Day High School (later St Bride's College); co-educational primary education was already available at St Patrick's School. Thomas McKenna established a branch of the same order at Pahiatua in 1906. He offered them the use of the presbytery as a temporary convent, and moved into a small cottage in Tyndall Street until the convent was built in 1912. Catholic education in Pahiatua started in the old Anglican church in Sedcole Street, which was leased for the purpose until St Anthony's Convent School was built in 1918. In 1928 a new St Patrick's School was opened in Queen Street, Masterton. John McKenna contributed £1,000 towards the £5,000 cost. With an astute eye to the future he acquired the large Chapel Street property known as The Fish Ponds, which had originally been used for raising trout. The new St Bride's College was built on this site in 1970; it was later to become the third St Patrick's School. John and Thomas McKenna were known for their ability to mix easily with people of widely varying backgrounds and for their lack of sectarianism. Wellington's rabbi, Herman van Staveren, was a personal friend of John McKenna, and McKenna stated that no attempt would be made to alter the religious beliefs of any non-Catholic children who happened to attend St Bride's school. Thomas McKenna left Pahiatua in 1919 for St Anne's parish in Newtown, Wellington, and later ministered at New Plymouth. John became a prominent figure in the hierarchy of the Wellington diocese. He was made a dean in 1899 and vicar general of the archdiocese in 1913, with the title of monsignor. He was created domestic prelate in 1915, and in 1926 became the first national director of the Work of the Propagation of the Faith. Both John and Thomas McKenna were famous throughout Wairarapa as enthusiastic sportsmen and able athletes. They represented Wairarapa at rugby, playing under their mother's maiden name, and Thomas refereed the first representative game between Wairarapa and Marlborough at Pahiatua in 1894. Both were excellent players of tennis and cricket. John was patron of the Wairarapa Rugby Football Union and the Masterton Lawn Tennis Club, a founding member of the Wairarapa Amateur Athletic and Cycling Club in 1893 (he broke the cycling record between Masterton and Carterton in 1895), and a member of the Masterton Gymnasium committee. He also played hockey and bowls. Community cultural organisations benefited from his participation and support: he was at various times vice president of the Masterton Operatic Society, the Masterton Juvenile Amateur Operatic Society and the Masterton Private Band. Thomas McKenna died at New Plymouth on 8 July 1923; John McKenna died at Masterton on 13 April 1930. Their work and devotion to duty had earned them the affection of all sections of the Wairarapa community.
<urn:uuid:b7fa3f90-2b0c-4f04-b5ad-b8fccfd5870c>
CC-MAIN-2016-26
http://www.teara.govt.nz/en/biographies/3m16/mckenna-john
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395160.19/warc/CC-MAIN-20160624154955-00151-ip-10-164-35-72.ec2.internal.warc.gz
en
0.985014
1,173
2.71875
3
Oil spill's role in animal deaths unclear, officials say Federal officials say they don't know whether a massive oil spill in the Gulf of Mexico killed 189 sea turtles, birds and other animals found dead since it started. But in a phone news conference Tuesday, officials said they don't know if any of the animals were killed by oil or the chemicals being used to disperse it. Barbara Schroeder of the National Oceanic and Atmospheric Administration's fisheries program says necropsies have not detected oil in the bodies of the sea turtles. Acting U.S. Fish and Wildlife Service Director Rowan Gould says the spill's effects could be felt for decades and may never be fully known because so many affected creatures live far offshore. RELATED ECOLOGY NEWS: U.N. report warns about the importance of biological diversity protection measures Shave pets, help the Gulf oil spill recovery effort: Group turns fur into mats that help contain oil -- John Fleshler, Associated Press Photo: Research assistant Megan Broadway holds an injured sea turtle at the Institute for Marine Mammal Studies in Gulfport, Miss., on May 1. The institute is involved in the effort to help animals affected by the oil spill. Credit: Dave Martin / Associated Press
<urn:uuid:9e536224-f65b-4217-853b-a0bc7c99cf61>
CC-MAIN-2016-26
http://latimesblogs.latimes.com/unleashed/2010/05/oil-spills-role-in-animal-deaths-unclear-officials-say.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391519.2/warc/CC-MAIN-20160624154951-00069-ip-10-164-35-72.ec2.internal.warc.gz
en
0.935757
254
2.9375
3
GEORGE RETSECKIMAGE COURTESY OF DELPHINE GOMEZ Techniques exist to visualize specific gene loci within tissue sections. And separate test-tube experiments exist to determine those genes’ epigenetic modifications. Now Gary Owens, a professor of cardiovascular research at the University of Virginia, has devised a new technique that enables gene visualization and epigenetic analysis at the same time. “The dirty little secret of epigenetics research is that we report quantitative differences from a cell population,” says Andrew Feinberg, a professor of molecular medicine at Johns Hopkins University who was not involved in the study. “If you really want to understand mechanisms, you also need to measure individual cells.” To achieve single-cell precision, Owens modified an existing technique called a proximity ligation assay (PLA) that is used to determine if two proteins are in close proximity within a cell. Antibodies to the two proteins are tagged with overlapping complementary single strands of DNA. If the two strands are close together, they can be ligated to form an amplifiable circular DNA molecule that is detectable with a fluorescently labeled DNA probe. Owens simply combined the method with in situ hybridization (ISH) to reveal whether a specific gene was in close proximity to a particular epigenetic mark—for example, methylation of lysine 4 in histone H3. First he hybridized his gene of interest with a DNA probe tagged with biotin. He then used an anti-biotin antibody tagged with one of the single-stranded DNAs for PLA. The other PLA tag was attached to the antibody recognizing the particular epigenetic mark. The concept of combining ISH with PLA “was a real technical tour de force,” says Feinberg. At present, Owens’s PLA-ISH technique allows examination of one type of epigenetic mark at one gene locus per experiment. But he says that with the development of further PLA reagents, it should be possible to look at multiple loci, epigenetic marks, and even transcription factors at the same time. (Nat Methods, 10:171-77, 2013) |THE METHOD||HOW IT WORKS||ADVANTAGES||DISADVANTAGES| |Chromatin immunoprecipitation (ChIP)||DNA cross-linked to chromatin is sheared into short sections. Antibodies recognizing epigenetic marks precipitate the associated DNA segments, which can then be sequenced.||Robust, well-established|| Results are an average from pooled cells. |PLA-ISH||A gene of interest is tagged with single stranded DNA (ssDNA), and modified histones are tagged with a complementary strand of ssDNA. If the gene and modified histones are in close proximity, the ssDNAs anneal and are detected with a fluorescent probe.||Precise detection of specific proteins at specific gene loci in tissue sections||Currently limited to one color/interaction type per experiment|
<urn:uuid:674042ab-1102-45cf-a110-253f461e46e5>
CC-MAIN-2016-26
http://www.the-scientist.com/?articles.view/articleNo/37155/title/Precision-Epigenetics/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395160.19/warc/CC-MAIN-20160624154955-00047-ip-10-164-35-72.ec2.internal.warc.gz
en
0.908071
621
3.09375
3
Margot Krasojević just unveiled designs for a futuristic hydroelectric house that looks like a piece of Atlantis surfacing from the waves. Inspired by the shape of a sea urchin, the Hydroelectric Tidal House harnesses tidal and solar energy to generate electricity. Conceptualized for Llandudno, Cape Town, the sculptural building comprises two shells: a fixed, outer shell that anchors the home to the beach and a free-moving interior unit buoyed by the waves. Cast in concrete, the outer semi-circular shell attaches the house to the shoreline with sand foundations. Solar cells line the outer shell to take advantage of Cape Town’s abundant sunshine however; the structure will be primarily powered by the more reliable renewable energy source of tidal waves. To maximize the amount of tidal energy captured, the shell is designed with a porous structure that allows multiple channels of water to flood the space between the outer and inner shells. The Hydroelectric Tidal House features an electromagnetic turbine system that uses neodymium magnets and copper wire coils to induce an electric current when the waves push and pull against the extruded chambers. Thus, the inner floating shell is made from a lightweight non-ferrous aluminum structure; electrical energy is captured in a capacitor. The living area is composed of three modules that can be easily altered depending on the client’s functional requirements. Images via Margot Krasojević
<urn:uuid:01085a6e-2c8f-46f4-81bd-a51ffe810785>
CC-MAIN-2016-26
http://inhabitat.com/spiky-sea-urchin-inspired-hydroelectric-house-converts-tidal-wave-energy-into-electricity/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403826.29/warc/CC-MAIN-20160624155003-00072-ip-10-164-35-72.ec2.internal.warc.gz
en
0.906902
295
2.703125
3
Scientists at the University of York have characterised an important new step in the mechanism used by bacteria to evade our immune system. It is an invisibility cloak which means that bacteria like Haemophilus influenzae, a common cause of ear infections in children, can move about the body without the risk of being attacked by the immune system. A multidisciplinary research team from the Departments of Biology and Chemistry at York have been studying how bacteria capture the molecule used to make the cloak, called sialic acid. The researchers have now discovered an enzymatic activity that helps in the more efficient capture of sialic acids released from our cell surfaces. As well as using the sialic acid to make the invisibility cloak other bacteria use similar methods to capture sialic acid as a simple food source, so are literally eating us from the inside! The research is published in the latest issue of the Journal of Biological Chemistry. Dr Gavin Thomas, of the Department of Biology, who led the research said: This novel enzyme, as well as other steps required for the formation of the 'invisibility cloak' that we have discovered in York, now offers the chance to develop novel antimicrobials against these bacteria. |Contact: David Garner| University of York
<urn:uuid:cba11b31-8694-4a28-9dc1-4d81bf9c983b>
CC-MAIN-2016-26
http://www.bio-medicine.org/biology-news-1/Invisible-bacteria-dupe-the-human-immune-system-2264-1/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393533.44/warc/CC-MAIN-20160624154953-00140-ip-10-164-35-72.ec2.internal.warc.gz
en
0.923185
264
3.59375
4
“CSpace creates a virtual moving screen display that contains a variety of particles suspended within its volumetric image space. When these particles are excited by two different infrared lasers, they illuminate to generate a 3D image.” The two infrared lasers combine to form an image in a “volumetric image space” (something like a clear cube). The breakthrough made is in the technology as well as the display quality. Not only can the 3D image be viewed from any angle, but it also displays an incredibly high resolution. On top of this, the whole prototype requires no moving parts. So far they’ve only been able to create green 3D objects, but the hope is to eventually create full-color 3D images. Planet Earth is about to get its own version of the Web! Cisco Systems is partnering with NASA to create a massive online collaborative global monitoring platform called the "Planetary Skin" to capture, collect, analyze and report data on environmental conditions around the world, while also providing researchers social web services for collaboration. This type of platform is essential for Climate and Ecosystem researchers, but it also might be a sneak peak at the future of the Internet. 'Smart Planet': Age of Sensors & Structured Data If life in the past few decades has been forever altered by complex microprocessor chips, the next century could see the same social disruption via simple, low cost networked sensors and 'embedded objects' that mirror a digital signal of our analog world. But making this disconnected data relevant is a challenge. The 'Planetary Skin' platform [video] will stitch together 'petabytes' of unstructured data collected by sensors (land, sea, air, space) reporting on changing environmental conditions. The platform will also allow for 'streamlining of decision making' and 'collaborative swarming' on analysis of relevant data. The project's first layer, “Rainforest Skin,” will be prototyped during 2009. Good for NASA, Great for Cisco, and Wonderful for 'Mirror World' Metaverse Enthusiasts The benefits to NASA and Planetary system researchers is clear. Forget about Facebook, these scientists are looking for a functional digital research simulation 'Mirror World' (as envisioned by David Gelertner). Meanwhile, Cisco is working diligently to make itself the most relevant web company in the next era of Internet architecture where collaboration, video, 3D simulations and structured data change the nature of our interactions. 'Planetary Skin' might be Cisco Systems under the radar, but out in the open effort of essentially building its own Internet of Tomorrow. The day when anyone can create a stunning 3D Augmented Reality simulation is getting closer. Last month, General Electric's innovative AR media campaign to promote its 'Smart Grid' platform helped to push Augmented Reality out into the masses by giving users a chance to try it at home using a printable marker download and webcam. Add sports media to the list of early technology adopter companies alongside the military and porn industries! ESPN and Electronic Arts have joined forces around the ‘Virtual Playbook’ to shake up the world of broadcast media by launching a new era of immersive mass media experiences. In recent years sports based games have pushed the evolution of 3D experiences, but now ESPN is bringing football analysis into the era of 3D Augmented Reality. This Fall, ESPN commentators will interact live with realistic 3D virtual NFL players. They will stand next to life sized scale 3D players as they demonstrate based offensive and defensive patterns. Gamers are obviously thrilled and NFL viewers are likely to become bigger fans of sports commentators able to navigate a virtual landscape of players. Now that we are witnessing the first mass media application of augmented reality, it becomes easier to build a futures road map looking at the convergence of drivers that support augmented mass media experiences. We can see clear developmental lines of commercialization with 3D software (ray trace rendering, 3D authoring etc.), hardware (terahertz chips and video servers) and display technology (thin film, flexible OLEDs and high def projection systems) and interface standards (gesture, smart object and motion based interactions). Thanks to ESPN, we have now jumped to major hurdles – viable business models around convergence of 3D software, gaming and virtual world companies with broadcast media. And the biggest barrier with the most uncertainty – People! Specifically mainstream TV viewers. Entrepreneurs can now start imagining the unique applications. When might students use augmented reality to create reports – immersing themselves in history scenes or building cities? When might kids insert themselves inside a Dora the Explorer adventure? Or aspiring athletes play the world champions in an immersive experience that makes Wii tennis look like 8 bit pong? When might technicians and engineers use augmented reality to work collaboratively long distance? Could Home Depot or our plumber walk us step by step through the bathroom project?! The list of mainstream applications is exhaustive. And the convergence of technologies is within sight. There is no need to overstate and ‘hype’ augmented reality, or bow to naysayer skeptics of tech adoption. Augmented reality is much more appealing and functional than a pure virtual world experience. And it could give a boost to TV broadcasters desperate to stay relevant. 3, 5, 7 or 10 years is not too far off for mainstream applications at work and home! But how do we get there? One of the most exciting areas of 'Nano-bio' research is the engineered integration of 'wet' and 'dry' nanoscale systems that might revolutionize research in genetics and proteomics (Study of Proteins). But how do you explain this breaking down the barriers of biological and human-made systems? Through 3D animation videos on YouTube, of course! During the next decade we are likely to see commercial products that will start to define the 'Post PC' Era of smart, networked objects that follow a new path of product development. Users will interact with embedded devices beyond the keyboard and mouse. We know that OLEDs offer a clear path to flexible, transparent display screens, but what about the combination of sensors and low power chips that make the 'screen' irrelevant for new applications. If it is hard to imagine commercial Post PC applications for enterprise sectors, what about designs for education and entertainment markets based on visions like Impress project from Sillenet [via Vimeo] France-based Easy Web develops 3D video projection systems for 'monumental architecture', but could they be developing new cultural expectations for human-city interfaces where everything becomes a template? In its effort to catalog and effectively share the world’s information, Google continues to improve its dynamic representation of earth and has now extended its reach to cities and towns. The first time I experienced Google Earth, I was pretty impressed. Accessing satellite information, I was able to navigate most any location on the planet that I was interested in, from a bird’s eye view. Of course the first thing I did was check out my street, the homes of my past, and landmarks around my town. Next I was introduced to Street View, a visualization composed of photos taken from automobiles that allows full 3D street navigation. It wasn’t until a few weeks ago, when Street View was at last integrated with Google Maps, that I could travel down my street take a glance at my house and my car parked neatly on the curb. That was really cool to me. I found myself wondering where I was the time the photos was taken, and being thankful they hadn’t caught me outside my house in an early morning stupor. After some light research I found that Google isn’t just concerned with satisfying my curiosity. It has found ways to make money with this technology while expanding its functionality for important, decision-making parties. Google introducing advanced versions of the platform with Pro ($400/year), a collaborative tool for commercial and professional use and Google Earth Plus ($20/year) for everyday map enthusiasts. It also provides non-profit organizations with Earth Outreach, a program that allows organizations to map their projects to help In March 2008, Google Earth introduced Cities in 3D which is unsurprisingly a complete 3D visualization of numerous cities. To contribute to this effort, users can submit and share renditions of structures and buildings using Google’s SketchUp. The program primarily relies on city governments to submit their 3D information electronically (for free) and invites them to review the The benefits for local governments seem rather extensive. They include: engaging the public in planning, fostering economic development, boosting tourism, simplifying navigation analysis, enhancing facilities management, supporting security and crime prevention, and facilitating emergency management. Note: Make sure the movie loads fully before watching. I am trying to upload it to YouTube, but the feature is still buggy as Xtra Normal is in beta. Using the new Xtra Normal platform, the above video took just 30 minutes to produce. This forward-step in super-user-friendly machinima brings us just a little closer to a scenario that I like to call The Toon Point, the time when virtual-world-generated video equals the average quality of a Saturday morning cartoon created in 2005. (Why 2005? Because that’s roughly when I began thinking about the notion of a Toon Point.) Ever since my days in the West Hollywood Metaverse House, as my buddy and former roommate Jerry Paffendorf likes to call it, I’ve been a fan of virtual worlds and looking forward to The Toon Point. Due to their ability to incorporate and network other communication technologies, the potential of virtual worlds as an Interactive Communication Technology is simply astounding, and is reflected in their rapid diffusion patterns. By helping us to climb the stairs of abstraction, user-friendly immersive data visualization (ie, geospatial data mapping) is poised to become one of the more significant near-term drivers of accelerating human inteligence and economics. Leading the charge is the small but robust company Green Phosphor, core participants in the progressive and under-recognized Second Life DataViz Group, which is laying down the foundations for Matrix-esque search: "I need guns, lots of guns." Color me impressed by Green Phosphor's newest release, Glasshouse (demo vid below - don't worry, better graphics are on the way), which converts raw binary data into interactive 3d models. As indicated by the hire of a molecular biologist as Chief Scientist, the company is gearing up to monetize by applying this technology to the medical domains such as genomics and drug discovery. As CEO Ben Lindquist points out, "The immersive 3d environment creates an entirely new paradigm for business intelligence and process modelling." More specifically, I'd argue that it marks a Meta-System Transition, or topsight leap, in our ability to process then interact with a variety of systems. In the video above you are seeing the making of an augmented reality print ad. If you print out the PDF file here, go the their website here and launch your webcam, a highly-detailed MINI Cabrio should appear on the page which you can manipulate and zoom by rotating the ad. You'll need to download 3D plugins for the program to work which is daunting enough, but persevere and you'll get a 3D car on your paper. You may have read a past article we did on augmented reality pop-up books for kids where people were working towards creating a commercially viable product involving augmented reality. Although they said development would be years away, seems like MINI has gone ahead and shortened the deadline. There have even been cases where cellphones have been used to display augmented reality projections. Using print ads and a webcam is just the first step, next year we'll be seeing goggles which will make the whole experience that much more exciting. This baby allows you to navigate all of your content, both locally stored and cloud based, with a 3D immersive application. It also includes a recommendation app that suggests related content (natch). Visual search and browsing applications are starting to come fast and furious as the days of static, 2D text-based as sole option fade in the rearview mirror. The interface revolution is afoot. Should be a fun ride.
<urn:uuid:ae2b6614-00fa-4935-840a-187f1496393b>
CC-MAIN-2016-26
http://www.futureofgadgets.com/futureblogger/tag/3d
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391519.0/warc/CC-MAIN-20160624154951-00149-ip-10-164-35-72.ec2.internal.warc.gz
en
0.928843
2,580
2.8125
3
If you have hearing loss, research tells us that you can improve your ability to understand by using visual cues such as lipreading, body language, and facial expressions. Hearing aids and assistive devices amplify and improve the quality of sound, but for many people who have hearing loss, this still does not lead to adequate comprehension. To help us understand speech, we must learn to “read” what our friends, family and associates are saying. Have fun and learn new skills as you become more skilled in using visual information. No experience is necessary! Difficulty level will be tailored to participants’ needs. Note: This is a 4-part series of courses. Classes can be taken in any order. Sign up for one or take them all. Each class is 4 hours in length. D1: Homophenes P, B, M – Saturday, October 4, 9 a.m. – 1:30 p.m. D2: Homophenes F,V – Saturday, October 18, 9 a.m. – 1:30 p.m. D3: Vowel sounds and Numbers – Saturday, November , 9 a.m. – 1:30 p.m. D4: W.Wh – Saturday, November 15, 9 a.m. – 1:30 p.m. Sessions held in our office Boardroom, 63 Cornell Road NW. To register please contact Lynsey or 403-284-6212 or by following this link.
<urn:uuid:8c068e76-2dd5-4952-8a46-c74dfea2471d>
CC-MAIN-2016-26
http://deafandhearalberta.ca/deaf-and-hear-alberta-news/speechreading-the-basics/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399385.17/warc/CC-MAIN-20160624154959-00169-ip-10-164-35-72.ec2.internal.warc.gz
en
0.949377
309
2.59375
3
These questions are to be read aloud by the scientist host. Teams will have two minutes to submit the answer to each question on a sheet of paper (be sure to include team names) and hand in each sheet for scoring. The host will give the answer for each question before moving to the next one. Scientist host should take out a cell phone and loudly pretend to place a call to someone a few hundred miles away in another state. After "hanging up," the scientist should ask the group for a show of hands to indicate who they think heard his or her words first—the Kaffeehaus guests in the back of the room (about 10 meters/30 feet away), or the friend in another state. The answer may surprise some, but it gets back to the speed of light. Cell phones carry signals as electromagnetic radiation (that is, at light speed). Light speed is 900,000 times faster than the speed of sound traveling through the air of the room. So the scientist's voice made it to the other state before it made it across the room to the people's ears. Einstein was fascinated by the nature of light. One interesting thing about light is that although it appears white, it can be broken out into a spectrum of different colors by passing the white light through a prism. What are the colors of the rainbow from longest wavelength to shortest? Answer: Red, orange, yellow, green, blue, violet. (Also acceptable is red, orange, yellow, green, blue, indigo, violet—forming the familiar mnemonic ROYGBIV. The labels used for colors are arbitrary and while indigo is no longer commonly used, it is included to make the sequence easier What was the name of the top-secret U.S. government program to build the Answer: The Manhattan Project What radioactive element was used in the bomb that was dropped on Answer: Uranium; offer bonus point for naming specific Einstein was working as a patent clerk in Switzerland when he arrived at E = mc2. A particularly notable patent that was awarded within the last few years was to inventor Dean Kamen for the Segway Human Transporter. What was the code name for this invention? A: "Ginger" is the code name for the Segway Human Transporter. Also acceptable, "IT" (rhymes with "fit"). How long does it take for light to travel from the sun to Earth? - 10 seconds - 85 minutes - 850 minutes - 10 minutes - 8.5 minutes Answer: (e) 8.5 minutes This Hollywood comedian who starred in the movie ¡Three Amigos! wrote a play called Picasso at the Lapin Agile about a fictional meeting between Albert Einstein and Pablo Picasso. Answer: Steve Martin What instrument did Albert Einstein play starting at the age of five? Answer: (b) Violin Working after Einstein proposed his famous equation, Lise Meitner was the first to show that a uranium atom can be split, converting a tiny amount of mass into a prodigious amount of energy in accordance with the formula E= mc2. What is the name of this splitting process? Suppose you have a light bulb shining on a page of a book. Now you move the bulb half the distance closer to the page. How much more intense will the light be on the page? Answer: 4 times more intense. The intensity of the light has an inverse squared relationship to its distance from the page. 1/(1/2)2 Ten-Point "Make or Break" Question Note to host: Remind players that they can wager up to 10 points on this question. Points will be added to team total for a correct answer and subtracted for an incorrect answer. To what institute did Einstein come when he immigrated to the United States? Answer: Institute for Advanced Study (located in Princeton, New Jersey, but not affiliated with Princeton University)
<urn:uuid:bf61b5d6-3687-4439-b7c0-de540d0e25d1>
CC-MAIN-2016-26
http://www.pbs.org/wgbh/nova/einstein/lrk-hand-trivia2.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397695.90/warc/CC-MAIN-20160624154957-00108-ip-10-164-35-72.ec2.internal.warc.gz
en
0.935886
862
3.359375
3
Definition of warring p. pr. & vb. n. - of War 2 The word "warring" uses 7 letters: A G I N R R W. No direct anagrams for warring found in this word list. Words formed by adding one letter before or after warring (in bold), or to aginrrw in any order: o - arrowing Shorter words found within warring: ag agin ai ain air airn an ani ar aw awing awn gain gan gar garni gin girn gnar gnarr gnaw grain gran grin in na nag naw rag ragi rain ran rang rani raring raw rawin ria rig rin ring wag wain wair wan war waring warn wig wigan win wing wirra wrang wring List shorter words within warring, sorted by length All words formed from warring by changing one letter Browse words starting with warring by next letter
<urn:uuid:39b6879e-a72a-4edd-b7f0-1ca96fe8d572>
CC-MAIN-2016-26
http://www.morewords.com/word/warring/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399106.96/warc/CC-MAIN-20160624154959-00182-ip-10-164-35-72.ec2.internal.warc.gz
en
0.839258
212
2.53125
3
The fire at Los Alamos has had one significant consequence. A secret scientific document was discovered in a bunker whose security systems were mostly destroyed by the fire. This document was leaked to the public last weekend. Actually it reveals nothing that we didnít already suspect. But it does show that besides arsenic, lead, mercury, radon, strontium and plutonium, one more extremely deadly and pervasive element is known to exist. This startling new discovery has been tentatively named Governmentium (Gv) but kept top secret for 50 years. The new element has no protons or electrons, thus having an atomic number of 0. It does, however, have 1 neutron, 125 deputy neutrons, 75 supervisory neutrons, and 111 team leader neutrons, giving it an atomic mass of 312. These 312 particles are held together by a force called morons, that are surrounded by vast quantities of lepton-like particles called peons. Since it has no electrons, Governmentium is inert. However, it can be detected as it impedes every reaction with which it comes into contact. According to the discoverers, a minute amount of Governmentium causes one reaction to take over four days to complete when it would normally take less than a second. Governmentium has a normal half-life of approximately three years. It does not decay but instead undergoes a reorganization in which a portion of the deputy neutrons, supervisory neutrons, and team leader neutrons exchange places. In fact, Governmentium mass will actually increase over time, since, with each reorganization, some of the morons inevitably become neutrons, forming new isodopes. This characteristic of moron promotion leads some scientists to speculate that Governmentium is formed whenever morons reach a certain quantity in concentration. This hypothetical quantity is referred to as the "Critical Morass."
<urn:uuid:0abaef34-b187-4593-b7fe-f76178af7bb4>
CC-MAIN-2016-26
http://www.appleseeds.org/governmentium.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395621.98/warc/CC-MAIN-20160624154955-00192-ip-10-164-35-72.ec2.internal.warc.gz
en
0.942359
415
2.953125
3
SARVAGNA KAVI: Biographical notes The time of Sarvagna cannot be placed definitively. Research based on the early references to his work and his usage of script some of which became extinct later, one can place him to be in the early seventeenth century. According to Sarvagna (which is a pen name), his real name was Pushpadatta. His father was a Shaivaite Brahmin and his mother was a Shudra widow named Mali. His father met his mother at a place in present day Dharwar district in Karnataka on his way to Benares on a pilgrimage. Sarvagna grew up as a wandering monk. About a thousand verses are attributed to him, all in the meter Tripadi or three line stanzas. His poems deal with religion, morals, customs, astrology, weather-lores and even riddles. His Vachanas or sayings are often quoted by scholars and common folks alike. No two books of his work are alike and it is probable that several verses attributed to him were composed by imitators. Stanza 1: Sarvagna was made of the same stuff as everyone. However, by learning one word of wisdom from each, he became a mountain of knowledge. Stanza 2: While borrowing it is like eating a meal of milk and honey. When the loan is due to be paid, it feels as if the bones in the body are broken (This is a warning to credit card debts in particular!) Stanza 3: A drunkard is like a pig. The poor pig, however, is helpful. The drunk is worse and useless. Stanza 4: What is the use of circling round the temple without any feeling? It is like the ox which circles round the oil crusher. (Note: In old times oil was extracted in little ox pulled crushers). Stanza 5: What use is giving advice to a fool a hundred times? It is like raining on a rock for hundred years. Will it ever soak in? Stanza 6:One who has control over his pants, hand and mouth is like Vishnu and Brahma. He has nothing to worry. (Note: control over sexual conduct, behaviour and speech is what Sarvagna is talking about) Stanza 7: If fools claim that they jumped over six mountains, agree to it. It is not worth fighting over. Stanza 8: For one who knows how to speak, it is like water pouring out of Eta from a well. For one who does not know, it is just the rope hanging down. (Note: Eta is a device to draw water from a well. It is a pot tied to a rope). Stanza 9:Learn somethings from those who know; Watch somethings from those who do; Learn otherthings by self experience. Stanza 10: Offering food (to the hungry), telling the truth and putting others above oneself is a happy way to heaven. Stanza 11: A wife who keeps the home warm, watches expenses, knows what is on your mind and acts accordingly is everything. Who cares if the heavens catch fire! Stanza 12: One who gives (alms) without advertising is superior. One who gives and talks about it is medium. Only a knave talks much and gives nothing. Stanza 13: The company of good men (women also) is like enjoying sweet honey. The company of evil men is like the stinking stuff in the sewer. Stanza 14: By wearing a mark of ash (Note: orthodox Hindus wear such marks on their forehead and other parts of the body during religious rituals.) one were to reach heaven, a donkey (that rolls in ash) should reach there surely. Stanza 15: By dipping in the river everyday ( Note: baths in holy rivers are parts of Hindu rituals.) a Brahmin were to jump to heaven, the frog which is born and lives in water should surely go to heaven. Stanza 16: By dabbing sandalwood paste on the forehead one were to reach heaven, the stone used to grind the paste should be first to go there. Stanza 17: No one knows everything. The learned are few. There is no guarantee that the smart bring wisdom. Knowledge is not available for all. Stanza 18: A service without flowers, the king without a horse and friendship with one who does not know the language (one who cannot carry an intelligent conversation) are a waste.
<urn:uuid:cfab4a7e-0a4b-4f69-97ab-c8a55ae5cff3>
CC-MAIN-2016-26
http://web.missouri.edu/~chandrasekharh/kannada/SARVAGNA/sarvagna.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397795.31/warc/CC-MAIN-20160624154957-00044-ip-10-164-35-72.ec2.internal.warc.gz
en
0.977156
929
2.703125
3
Starting with a search for books is a good way to begin research. Books will cover a topic more broadly than articles and give you ideas of more specific issues to search for in articles. To find books, search the Online Catalog. For hints on search words to use for specific topics, see below. The Opposing Viewpoints Resource Center is a database of electronic books covering a variety of controversial issues with chapters from books with both pro and con views. When you get to the list of topics, some relevant topics to choose might be: Bioethics, Biological Weapons, Cloning, Genetic Engineering, Stem Cells, etc. ProQuest Research Library is a good general database for news, magazine, and some journal articles. Do not choose to search only peer reviewed articles, as most articles covering controversial issues are news or opinion rather than research articles. Scientific American articles cover many issues in science from an educated perspective but understandable to the general reader. Articles cover a date range of 1910 to present. Find articles in newspapers. The initial main page allows you to choose a quick news search or a guided news search in which you can select specific newspapers to search or to search only headlines, etc.
<urn:uuid:44298b4a-10c7-49d0-92b2-25bd5fa2d1f0>
CC-MAIN-2016-26
http://libguides.lib.msu.edu/biotech
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395160.19/warc/CC-MAIN-20160624154955-00192-ip-10-164-35-72.ec2.internal.warc.gz
en
0.901025
243
3.53125
4
WASHINGTON, June 19, 2003 — Forget matching a pile of black socks in an unlit room: Cosmic acceleration caused by dark energy, and the black holes that lurk in almost every galaxy are two of the real dark mysteries of the universe. Scientists are using rapidly advancing observational tools, computer simulations and theoretical predictions to study how these dark mysteries impact the past, present and future of our galaxy and of the universe. Articles describing “the state of the dark” appear in Friday’s “Dark Side” special issue of the journal Science, published by the American Association for the Advancement of Science. Astrophysicists around the world are refining and improving their ability to study distant and ancient light. These advances are also helping scientists understand the dark energy, dark matter and black holes that make up the 96 percent of the cosmos that we can’t see — the dark side. “Making precise measurements is the nature of the game … and a real observational challenge,” said Robert Kirshner from the Harvard-Smithsonian Center for Astrophysics in Cambridge, Mass. His article describes the connections between dark energy, exploding stars and cosmic expansion. Our expanding universe The expansion of the universe has been speeding up in the past 7 billion years, thanks to dark energy. Scientists report that the presence of dark energy — with its unique density and negative pressure — is causing the universe to expand at a faster and faster rate. Imagine our Milky Way galaxy as a red grape suspended in the orange Jell-O of the universe. To say that the universe is expanding at an ever-increasing rate means that the amount of orange Jell-O expands more today than it did yesterday. There are many billions of other grapes in the Jell-O — each representing a galaxy in the universe. As the universe expands, the Milky Way and the rest of the galaxies stay the same size because they are held together by gravitational forces. However, the distance between galaxies increases. Exploding stars expose accelerations The acceleration of the universe provides indirect evidence for the existence of dark energy. But how did the researchers figure out that the universe is expanding? The answer comes from exploding stars — specifically, a certain class of supernova explosions. Supernovae are the extremely bright explosions that mark the end of the life of some stars. Scientists compare the light from supernova explosions from different ages in the past and use this light to measure changes in the rate of the expansion of the universe. Light from explosions approximately one-third of the way back to the Big Bang or about 5 billion years ago are about 25 percent dimmer than they would be if the universe were expanding at a constant rate. From these kinds of observations, scientists demonstrate that for the past 7 billion years, the universe has been expanding at an increasing rate. These supernova explosions, about 4 billion times brighter than the sun, make it possible to back track through space and time and probe the history of cosmic expansion and the nature of dark energy. Kirshner writes that the current evidence points to a universe currently dominated by dark energy. “You see a tree moving and you say, ‘Oh, it’s the wind,’” said Kirshner, who drew a conceptual comparison between the invisibility of both wind and dark energy. “We can’t see the dark energy, but we can study the way it interacts with the aspects of space that we can see,” explained Kirshner. Big roles for black holes Scientists are also watching the lights of the cosmos to gain insights on another dark mystery of the universe — black holes. In a separate article in the same special issue of Science, Mitchell Begelman from the University of Colorado at Boulder describes how black-hole research is informing scientists about the evolution of our 14-billion-year-old universe. Unlike dark energy, which is sprinkled throughout the universe and is measured by its large-scale effect on the evolution of the universe, black holes are discrete places that scientists can identify with observations from telescopes. Black holes can form when massive stars collapse. Begelman writes that the gravity of black holes is so strong that nothing that enters them — not even light — can escape. Tornados of space and time “We can study what happens around specific black holes. We can also observe things that are in the process of falling into black holes,” said Begelman. He explained that spinning black holes kick up a tornado of space and time. Matter gets caught up in spacetime tornadoes and swirls around the black hole as it falls in. In describing black holes, Begelman writes, “space and time are so distorted that there is literally no way out.” Black holes as laboratories There may be no way out of a black hole — but they are anything but a dead end for scientists. “Black holes are laboratories for the most extreme conditions encountered in the post-Big Bang universe. Understanding black holes is crucial to understanding the Universe. They are much more than an oddity found in galaxies,” said Begelman. Black holes come in at least two sizes. There are the smaller, stellar-size black holes, and there are supermassive black holes. The center of each galaxy, including our own Milky Way galaxy, contains a supermassive black hole. Our supermassive black hole is 25,000 light years away from Earth. If you look in the direction of the constellation Sagittarius, the Archer, in the center of the Milky Way, you are looking toward our supermassive black hole. To study it, scientists must pierce the thick dust obscuring the Galactic Center. The energy currently released from the Milky Way’s supermassive black hole is a thousand times greater than the energy emitted from the sun. However, researchers believe this amount of energy is just a dribble when compared with the energy it unleashed during galaxy formation. “During the growth of our supermassive black hole, it released so much energy that it greatly impacted the development of the galaxy,” said Begelman. “But it’s hard to tell what role it played.” Black holes and life Scientists believe that supermassive black holes were crucial to the development of the structure of the universe. “Black holes were involved in the accumulation of stars and gas into the compact regions of space that eventually formed planets and possibly life,” explained Begelman. “We are incredibly lucky to be working just at the moment when the pieces of the cosmic jigsaw puzzle are falling into place, locking together, and revealing the outline of the pieces yet to come. Dark energy is the biggest missing piece and a place where astronomical observations point to a gaping hole in the present knowledge of fundamental physics,” Kirshner writes in Science. © 2013 American Association for the Advancement of Science
<urn:uuid:1eb6ae53-aba9-4e9c-841d-90b2b7c983d4>
CC-MAIN-2016-26
http://www.nbcnews.com/id/3077421/ns/technology_and_science-science/t/dark-side-universe/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397864.87/warc/CC-MAIN-20160624154957-00082-ip-10-164-35-72.ec2.internal.warc.gz
en
0.924974
1,437
3.46875
3
I wanted to kick things off with Sir Lawrence Alma Tadema (1836-1912), a Dutch artist who became quite famous across Europe and was later based in England. He enjoyed fame and wealth during his living years. During the Victorian Era, there was an extremely high demand for his work, which placed strains on him to continue to create original works. Despite this, Alma-Tadema produced a significant body of work which is both beautiful to behold, but carries a history lesson within...of sorts. Modern scholars are less keen on Tadema, and Hollywood for that matter, for depicting antiquity in a very stylised manner. Tadema's work, whilst very pleasing to behold, is not a shockingly accurate portrayal of life in times past. It is however, less florid and somewhat more believable than other Romantic period artists who made forays into Ancient Greece and Rome. The image above is one my favourite Tadema works - definitely my favourite of his catalogue depicting Ancient Greece. The Parthenon of Athens is easily one of the most famous landmarks of Western Civilisation. Imbued with great symbolism atop the Acropolis, it not only proclaimed the greatness of Ancient Athens, but created an archetype of architecture that is intrinsically linked with modern depictions of Antiquity in popular media. The central figure in the darker clothing is Phidias, the most lauded of Ancient artisans. A true Jack of All Trades, he was a Painter, Sculptor and Architect. In the classical style at least - such dazzling multi talent was not seen again for 1000 years until Michelangelo Buonarroti started poking around in Renaissance Italy. Aside from the Parthenon, Phidias was also responsible for the statue of Zeus at Olympia, later proclaimed among the Seven Wonders of The Ancient World. Although the original Zeus did not survive, in 1954, Phidias workshop at Olympia was unearthed. As was common with classical sculpture, the frieze itself was also painted. It is here depicted as Tadema imagines it would have looked. The male pair to the left are interesting, the apparent familiarity of the two indicating a reference to a famous Athenian pass time among males. A Channel 4 UK Documentary Athens: The Truth About Democracy, hosted by Bettany Hughes was aired in 2007. It provides a detailed and visually rich exploration of Athens during its golden age - and spends some time discussing Phidias' (and cohorts) Parthenon in depth.
<urn:uuid:76b4ee7a-989f-4c3b-b648-e00318bde8f4>
CC-MAIN-2016-26
http://www.3pipe.net/2009/11/phidias-flaunts-freize.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398216.41/warc/CC-MAIN-20160624154958-00063-ip-10-164-35-72.ec2.internal.warc.gz
en
0.974538
503
2.734375
3
The term, "Big Pharma," commonly describes large pharmaceutical corporations like Pfizer, Merck, GlaxoSmithKline and other large- and mega-cap companies. They pour billions of dollars into research to cure the world's diseases. Why, then, is Big Pharma essentially a four-letter word in the eyes of so many people? Surveys show that the public ranks Big Pharma near the bottom of their list of favorite industries. Pharmaceutical companies only ranked higher than the oil and gas, chemical and tobacco industries. That's it! Why would an industry with the mission of curing disease rank so low? Not About the Public Good At least that is the perception. People read accounts of lawsuits involving Big Pharma. They know that the pharmaceutical industry spends a lot of money sending sales representatives to doctors' offices to convince them to use their products. They may even see studies such as the one published in the New England Journal of Medicine that showed that 94% of all doctors had a relationship of some kind with the pharmaceutical industry, and an average of four out of five of these relationships included receiving food in the workplace. Another study found that 28% of all doctors reported receiving some kind of payment from pharmaceutical companies, often as speakers on behalf of a certain drug. The lawsuits are even worse. Take the $3-billion fine against GlaxoSmithKline, the largest fine ever imposed to a pharmaceutical company by the U.S. Department of Justice. GlaxoSmithKline illegally marketed Paxil and Wellbutrin, antidepressant drugs, while withholding data describing the health risks of Avandia, a diabetes drug. Although it was the largest pharmaceutical fine in history, it amounted to an insignificant punishment for GlaxoSmithKline, accounting for only 11% of associated revenue. Critics argue that lawsuits like these do not deter companies from unlawful or unethical practices. Leaving even larger public relations damage in its wake, in 2004, Big Pharma company, Merck, announced a recall of the popular anti-pain medication, Vioxx. The FDA found that Vioxx put patients at a significantly greater risk for heart attack and stroke. Later reviews found that as many as 55,000 deaths might have occurred because of Vioxx. Fines later cost Merck more than $900 million. An additional $4.85-billion judgment followed in 2007 because of a class action lawsuit. Nonetheless, this was no more than a short-term hit to the company, which has since recovered. In 2011, Merck reported gross revenues of $31 billion. Bristol Myers Squibb Bristol Myers Squibb paid $515 million in fines after it was discovered that the company marketed its antipsychotic drug, Abilify, to treat conditions the drug is not approved to treat. In addition, Bristol Myers Squibb sent sales teams to nursing homes to promote the drug, although they knew it had potentially fatal side effects on the elderly. The government also accused the company of paying medical professionals as well as pharmacists to dispense the product by offering them kickbacks and vacations. Clean up Your Act The pharmaceutical industry's representatives argue that they are working hard to enact policies and take actions that will restore the industry's reputation. A revised voluntary code put in place in 2009 by the Pharmaceutical Research and Manufacturers of America (PhRMA) no longer permits mugs, pens, tablets or other non-educational "reminder" gifts to be dispensed by pharmaceutical companies. When the code was announced, 32 of the 34 member companies of the trade organization signed on. PhRMA points out that member companies spent a collective $49.5 billion in research and development. This makes the pharmaceutical industry one of the most research-intensive industries in the United States. In contrast, the entire industry spent $11.3 billion on marketing and promotion in 2008, including $4.4 billion for direct to consumer advertising, such as commercials and Internet or magazine ads. Others point to the Physician Payment Sunshine Act, which is legislation that requires pharmaceutical companies to report any gift or compensation of more than $10. This includes food, speaking fees and most other transfers. It does not include, however, drug samples earmarked for patients. The Bottom Line It costs about $1.3 billion to bring a drug to market. Many drugs never gain Food and Drug Administration approval. For that reason, Big Pharma companies have to market aggressively or hike prices of drugs in order to stay in business. Others argue that, much like the oil and gas industry, Big Pharma, as a whole, isn't hurting for money. Engaging in criminal practices, they say, is not only bad for patients, but it's bad for stockholders and the roughly 300,000 industry employees who have lost their jobs since 2000.
<urn:uuid:ee132401-4cac-48e6-9e1a-19df59fc7889>
CC-MAIN-2016-26
http://bisdep.org/news.php?readmore=32
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399385.17/warc/CC-MAIN-20160624154959-00054-ip-10-164-35-72.ec2.internal.warc.gz
en
0.964564
989
2.859375
3
To address the growing problem of people being overdiagnosed and overtreated for cancer, a group of scientists convened by the National Cancer Institute and chaired by a UC San Francisco breast cancer expert is proposing a major update of the way the nation approaches diseases now classified as “cancer.” The “Viewpoint” article will be published online on July 29 in the Journal of the American Medical Association. When cancer screening programs were widely initiated three decades ago, medical knowledge of the disease was more simplistic. The intent was to detect cancer at its earliest stages to reduce illness and mortality, but in fact early diagnosis has not led to a proportional decline in serious disease and death, the scientists write in the JAMA commentary. Instead, screening programs are identifying not only malignant cancers, but also slow-growing, low-risk lesions, and sweeping them into the same treatment process. As a result, patients are being diagnosed and treated for forms of cancer that might never actually harm them – a phenomenon that’s been termed overdiagnosis, which translates to “too much medicine.” Now, with the advancement of scientific understanding of the biology of cancer, the authors say it is time for significant changes in practice and policy. “By recognizing that cancer is not one disease, but a number of different diseases, we can individualize our treatment based on biology and avoid overtreatment,” said panel chair Laura J. Esserman, MD, MBA, director of the Carol Franc Buck Breast Care Center at the UCSF Helen Diller Family Comprehensive Cancer Center. The authors recommend creation of a new classification for tumors that are indolent (unlikely to cause patients harm). For example, ductal carcinoma of the breast – currently considered the earliest form of breast cancer – would no longer be called cancer. The authors also call for the formation of registries for lesions with low potential for malignancy, and for a multidisciplinary approach across pathology, imaging, surgery and other medical specialties “to revise the taxonomy of lesions now called cancer.” The key, they say, is to improve screening strategies to avoid overtreating tumors that would not be lethal, or that would not even have come to medical attention. The JAMA article is comprised of recommendations from a working group formed last year during a meeting convened by the National Cancer Institute. The group was charged with developing a strategy to improve current approaches to cancer screening and prevention. "Although our understanding of the biology of cancer has changed dramatically, perceptions on the part of the public, and among many physicians, have not yet changed,” Esserman said. “Cancer is still widely perceived as a diagnosis with lethal consequences if left untreated.” The commentary was co-written by Ian M. Thompson, MD, professor at the University of Texas Health Science Center at San Antonio; and Brian Reid, MD, PhD, director of the Seattle Barrett’s Esophagus Program and member of the Human Biology Division at the Fred Hutchison Cancer Research Center in Seattle. The three authors served as chairs of the NCI working group. An internationally known leader in the field of breast cancer, Esserman, a UCSF professor of surgery and radiology, is leading an effort to change the delivery of breast cancer services and the information systems used to support both research and patient care. Overdiagnosis Occurs Across Many Medical Conditions Overdiagnosis is occurring across many medical conditions, but is particularly common in breast cancer, lung cancer, prostate, thyroid cancer and melanoma, said the authors. They cite DCIS, or ductal carcinoma of the breast, and Barrett’s esophagus as illustrations of how the detection and surgical removal of what have been called precancerous lesions have failed to lead to lower rates of invasive cancer. By contrast, the authors said, colon and cervical cancer serve as examples of “effective screening programs in which early detection and removal of precancerous lesions have reduced incidence as well as late-stage disease.” Cancer screening should have three important missions, the authors write: To detect disease that would ultimately harm the patient; to uncover tumors that benefit from intervention; and to detect disease that is more likely to be cured or better treated when spotted early. Optimal screening frequency depends on a cancer’s growth rate. If a cancer is fast growing, screening is less likely to be effective. “If a cancer is slow growing but progressive, with a long latency and a precancerous lesion, screening is ideal and less frequent screening (eg.10 years for colonoscopy) may be effective,” the authors said. The recommendations include: • Recognize that screening will identify indolent cancers. • Change terminology and omit the word “cancer” from premalignant/indolent conditions; • Convene a multidisciplinary body to revise the current taxonomy of cancer and to create reclassification criteria for indolent conditions; • Create observational registries for lesions with low potential for malignancy – generate the data to provide patients and their doctors “with confidence to select less invasive interventions;” • Develop, validate and adopt molecular diagnostic tools that identify indolent or low-risk lesions; • Mitigate overdiagnosis: appropriately reduce frequency of screening exams while focusing on high-risk populations, and raise the threshold for patients being recalled for re-testing and biopsy. “Although no physician has the intention to overtreat or overdiagnose cancer, screening and patient awareness have increased the chance of identifying a spectrum of cancers, some of which are not life threatening,” the authors wrote. “The ultimate goal is to preferentially detect consequential cancer while avoiding detection of inconsequential disease.”
<urn:uuid:c083080b-e4e0-48a9-a42b-19bc3e9a05d9>
CC-MAIN-2016-26
http://www.technologynetworks.com/genomics/news.aspx?id=155731
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393332.57/warc/CC-MAIN-20160624154953-00021-ip-10-164-35-72.ec2.internal.warc.gz
en
0.949597
1,201
2.5625
3
Israel / Cities and Towns Town in northeasternIsrael with 40,000 inhabitants (2008 estimate), at the western shore of Sea of Galilee, in a depression 205 metres below sea level. The economic base of the town is agriculture, fishing and tourism. Tiberias is an important city in the theological development of Judaism. 19 CE: Founded by Herod Antipod. 70: With the destruction of the Temple of Jerusalem, many Jewish scholars moved to Tiberias. The town became centre of the highest religious court. 3rd-5th centuries: Much of the Palestinian Talmud is written down by Jewish scholars stationed in Tiberius. 1922: The Jews become majority of Tiberius.
<urn:uuid:310b3e5a-2ef2-4ac7-a8cf-c155451f3abd>
CC-MAIN-2016-26
http://www.i-cias.com/e.o/tiberias.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399117.38/warc/CC-MAIN-20160624154959-00157-ip-10-164-35-72.ec2.internal.warc.gz
en
0.923614
148
3
3
|This article needs additional citations for verification. (September 2014) (Learn how and when to remove this template message)| Ross Island is one of the Andaman and Nicobar Islands, about 2 km east of Port Blair. It was the Administrative Headquarters for the islands, before an earthquake rocked it in 1941. The headquarters were then shifted to Port Blair. One can see remnants of an opulent past in the ruins of the church, swimming pool and the chief commissioner's residence with its huge gardens and grand ballrooms. There is also a cemetery and a small museum managed by the Indian Navy. The museum has on display a collection of old records. Ross Island can be reached by a short boat ride from Water Sports Complex. The island is controlled by the Indian navy, which requires every visitor to sign in on entering. The small island, with its treasure of ruins, became the hot tourists spot in the territory. The island presently houses the ruins of the state Ballroom, the Chief Commissioner’s House, the Government House, Church, the old 'Andamanese Home', which was Hospital, Bakery, Press, Swimming Pool and Troop Barracks, all in dilapidated condition, reminiscent of the old British regime. Ever since Dr. James Pattison Walker arrived in Port Blair aboard the East India Company’s steam frigate ‘Semiramis’ on 10 March 1858, this island remained under British occupation till 1942. From 1942 to 1945, the island was under the occupation of Japan. However, the allies reoccupied the island in 1945 and later abandoned it. During British occupation, this island was the seat of power of the British. The rise and fall of Ross Island Ross Island, a few km from Aberdeen jetty at Port Blair, is yet another member of the Andaman group of islands. As in the case of its sister-islands, it also has thick forests. To any onlooker it may give the impression that it has no "life" — in the sense that there is no human habitation. Yes, it is an island where no settlement is allowed by the authorities. But, a few decades ago, this island was the seat of "British power." Ross Island was the headquarters of the Indian Penal Settlement for nearly 80 years. It had everything — bazaar, bakery, stores, water treatment plant, church, tennis court, printing press, secretariat, hospital, cemetery and what have you. Today, everything has disappeared except some buildings, which housed some of these landmarks. After Archibald Blair's survey of the Andaman and Nicobar Islands in 1788-89, a settlement was established at present day Port Blair (then called Port Cornwallis). In 1792 it was shifted to northern harbour (present day Diglipur) which was also Christened Port Cornwallis (the former became Old Harbour). But, the settlement was abandoned in 1796 as the mortality rate was very high. Between 1789-92, Blair was said to have established a hospital and a sanatorium at Ross Island. Six decades later, the 1857 Revolt forced the British to turn to Andaman again and this time, their stay lasted for 90 years. During the Second World War, the Andaman and Nicobar Islands were captured by the Japanese in 1942. The Japanese rule lasted till 1945. In November 1857, the Government decided to establish a penal settlement in Andaman and send "hard-core elements" among those who took on the British. There were two reasons: One, to keep them away from other prisoners and the other, to send out a message that a similar treatment would be meted out to anyone who challenged the British authority. Two months later, the British took possession of three islands in and around Port Blair and Captain H. Man, Executive Engineer, hoisted the Union Jack flag. In March, J.P. Walker, an experienced jail superintendent, arrived in Port Blair with four European officials, an Indian overseer, two doctors, 50 naval guards and 773 freedom fighters. Writer Gauri Shankar Pandey, who belongs to a family that had suffered torture during the Japanese occupation of the Andaman and Nicobar Islands, has documented that it was water scarcity that had driven Walker out of Port Blair and go to Ross Island. Named after the marine surveyor Sir Daniel Ross, the Island soon became the base. Initially, crude barracks of bamboo and grass were put up for freedom fighters while the rest of the party stayed on board the ships that had brought them. Later, the freedom fighters built houses, offices, barracks and other structures at the Ross Island, after which they were promptly sent to Viper Island, where the first jail was built. The bungalow, meant for the chief of the Penal Settlement, was constructed at the northern summit of the Island. Called Government House, the large-gabled home had Italian tiled flooring on the ground level. Now, some remains of the flooring are there, of course in a decrepit condition. In 1872, the post of Superintendent was elevated to the level of Chief Commissioner and Sir Donald Martin Stewart, who was at Ross Island for one year, was made the first Chief Commissioner. Stewart held the post from July 1872 to June 1875. After Stewart, Ross Island saw 24 chief commissioners. But, it was during the tenure of Sir Charles Francis Waterfall that the Island's position as the seat of power collapsed. Waterfall, who became the Chief Commissioner in 1938, was captured by the Japanese in March 1942 when the latter invaded the Andaman and Nicobar Islands during World War II. He was held as a prisoner of war and his deputy, Major Bird, was beheaded by the Japanese at a clock tower in Aberdeen, Port Blair. Netaji hoists tri-color The Government House became the residence of the Japanese admiral also for three years (from March 1942 to October 1945). It was during this period that Netaji Subhas Chandra Bose, who took the help of Japanese in his fight against the British, stayed at the Island for a day in December 1943. Netaji also hoisted the national tri-color at the top of the Government House. The Japanese too left their imprint on the island which stood in the form of bunkers. The bunkers were used as watch points to safeguard the Island from any foreign invasion. After the War, the Island came back under the control of the British but they never went back to the Island. About nine months before the Japanese take-over of the entire set of islands, Ross Island experienced an earthquake, which caused many people to leave the Island. Except for a brief time when the Japanese occupied, the abandonment of Ross Island as a result of the quake continued. In April 1979, the island was handed over to the Navy, which set up a small post, INS Jarawa, named after one of the indigenous tribes of the Andaman group of islands. In December 1993, a museum was established. It was declared open by the then Lt. Governor Vakkom Purushothaman. A small guesthouse has been put up for the Navy officers. There are frequent boat services from Port Blair to Ross Island. The authorities charge entry fee of Rs. 50 for adults. No entry fee for children up to nine. Now, the Government have started Light and Sound Show in Ross Island also. (One more is in Cellular Jail). The new Sound and Light show at Ross Island has been inaugurated on 07.12.2014 and opened for general public from 08.12.2014 onwards. Initially there will be only one show in Hindi and the duration of the show is 45 minutes. The rates of ticket are as under: Adult: Rs.100/- for the show plus Rs.100/- for the boat fare plus Rs. 75/ for entry to Ross Island i.e. Total – Rs 275/- Children between 05-12 years: Rs.25/- for the show plus Rs.100/- for the boat fare plus Rs. 25/ for entry to Ross Island i.e. Total – Rs 150/- Wednesdays will be weekly off for the show. Boat for ferrying viewers for this show shall start from Aberdeen Jetty at 04:00 p.m. The capacity of the boat is 100 persons only. Visitors can spend time for going around Ross Island till 05:15 p.m. The show will start after it gets dark i.e. around 05:30 p.m. Tickets (for the boat, the show, and entry to Ross Island) will be sold on first come first served basis from the Reception counter of Directorate of Tourism from 8.30 am to 3.00 pm on the same day. For further details contact: 232694/244091. - Established between 1863 and 1866 by the Rev. Henry Fisher Corbyn of the Bengal Ecclesiastical Establishment, who was sent to also set up proper full-time church services, and after whom 'Corbyn Cove' is also named. Rev.Corbyn was eventually posted out as Vicar to St. Luke's Church, Abbottabad, and he later died there and is buried in the Old Christian Cemetery, Abbottabad - India Travel - List of Lieutenant Governors of the Andaman and Nicobar Islands - The Hindu (daily newspaper) This page uses Creative Commons Licensed content from Wikipedia. A portion of the proceeds from advertising on Digplanet goes to supporting Wikipedia.
<urn:uuid:a7bdc906-93fd-4cbf-9147-cf2df6a41bd6>
CC-MAIN-2016-26
http://www.digplanet.com/wiki/Ross_Island_(Andaman)
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397428.37/warc/CC-MAIN-20160624154957-00124-ip-10-164-35-72.ec2.internal.warc.gz
en
0.974968
1,952
2.828125
3
Merowe Dam, Nile River, Republic of the Sudan Astronaut photograph ISS025-E-6160 was acquired on October 5, 2010, with a Nikon D2Xs digital camera using a 50 mm lens, and is provided by the ISS Crew Earth Observations experiment and Image Science & Analysis Laboratory, Johnson Space Center. The image was taken by the Expedition 25 crew. The image in this article has been cropped and enhanced to improve contrast. Lens artifacts have been removed. The International Space Station Program supports the laboratory as part of the ISS National Lab to help astronauts take pictures of Earth that will be of the greatest value to scientists and the public, and to make those images freely available on the Internet. Additional images taken by astronauts and cosmonauts can be viewed at the NASA/JSC Gateway to Astronaut Photography of Earth. Caption by William L. Stefanov, NASA-JSC. The Merowe Dam is located near the 4th cataract of the Nile River, in the Nubian Desert of the Republic of the Sudan (also known as Sudan). The dam was built to generate hydroelectric power—electricity intended to further industrial and agricultural development of the country. This astronaut photograph illustrates the current extent of the reservoir, which has been filling behind the dam since the final spill gate was closed in 2008. The Merowe Dam is located approximately 350 kilometer (215 miles) to the northwest of Sudan’s capital, Khartoum. The nearest settlement downstream of the dam is Karima. Following Sudan’s independence from Egypt and the United Kingdom in 1956, allocation and control of Nile River water was divided between Egypt and Sudan by the Nile Waters Treaty signed in 1959. Today, other countries within the Nile basin—including Ethiopia, Kenya, Rwanda, Tanzania, and Uganda—are seeking more equitable allocation and utilization of the water and recently (2010) signed a new water use pact challenging the 1959 treaty. Beyond the issues of water rights, several local tribes will be displaced by the planned 170 kilometer (105 mile) reservoir, and the flooded region contains significant but little-studied archeological sites. The Sudanese government has a resettlement program in place for the tribes, and a variety of international institutions have been conducting “salvage ” or “rescue” archeological surveys since 1999. Such rescue surveys seek to preserve as much information as possible from sites that will be destroyed or otherwise made inaccessible (in this case by flooding). Note: Often times, due to the size, browsers have a difficult time opening and displaying images. If you experiece an error when clicking on an image link, please try directly downloading the image (using a right click, save as method) to view it locally. This image originally appeared on the Earth Observatory. Click here to view the full, original record.
<urn:uuid:670b7c3b-7232-4a27-aad9-c783536b4849>
CC-MAIN-2016-26
http://visibleearth.nasa.gov/view.php?id=46505
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399385.17/warc/CC-MAIN-20160624154959-00101-ip-10-164-35-72.ec2.internal.warc.gz
en
0.943707
583
3.625
4
The Center’s History The Sarah Isom Center for Women was established at The University of Mississippi in 1981 to address the changing roles and expectations of women students, faculty, and staff. The University has provided educational opportunities for women longer than any other state university in the South. When UM opened its doors to women in 1882, eleven women registered for classes. Today, women constitute half the student body. Sarah McGehee Isom Sarah Isom was the first female faculty member at the University of Mississippi and the first female faculty member at a coeducational institution of higher learning in the Southeast. She was born in Oxford, Mississippi, in the early 1850’s. Her parents were Dr. Thomas Dudley Isom, a physician and one of the town’s leading citizens, and Sarah McGehee Isom, formerly of South Carolina. After receiving her early education in her hometown, “Miss Sallie” attended Augusta Seminary in Staunton, Virginia, where her special talent in drama and public speaking was recognized. She later studied with James Murdock at the Philadelphia School of Expression and George Riddle and Madame Janauschek in Boston. Highly praised by her professors and others who heard her perform, she appeared destined for a career on the stage. However, she returned home instead. In 1885, the Board of Trustees elected her to fill the Chair of Elocution at the University of Mississippi. Since no woman had previously been included in the faculty, her selection was preceded by interesting correspondence between the Board’s Secretary and former Chancellor F.A.P. Barnard. For the next twenty years, until her death, Miss Isom taught oratory to aspiring young politicians and other public figures, gaining appreciation and respect for her ability to train them to be effective readers and speakers. A striking redhead with a forceful personality, she became the subject of many tantalizing legends, some of which may actually have been true. As part of the University’s mission, the Sarah Isom Center for Women and Gender Studies is responsible for integrating scholarly research on women’s and gender issues with advocacy for women in the classroom, on the campus, and in the larger community. The Center undertakes to: - Provide an inclusive place where women and groups concerned with gender-related issues can gather. - Educate community and campus on women’s and gender issues. This includes recognition of how gender intersects with other social categories like race, ethnicity, class, sexual orientation, gender identity, age, nationality, and ability. - Aid interdisciplinary faculty research and teaching in Gender Studies. - Continue to offer an interdisciplinary minor and a Graduate Certificate in Gender Studies, to support student research on Gender Studies, and to develop an undergraduate major in Gender Studies.
<urn:uuid:e8162bc1-161a-40fa-ac27-5b9c5f98bf09>
CC-MAIN-2016-26
http://sarahisomcenter.org/historymission/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783394987.40/warc/CC-MAIN-20160624154954-00015-ip-10-164-35-72.ec2.internal.warc.gz
en
0.968446
581
2.671875
3
The word Lecithin is taken from the Greek Lekithos, which means "egg yolk". A fitting name for this essential nutrient, for the egg is considered a symbol of life, strength and fertility. Lecithin is important for all of these biological functions and more. Our brain is approximately 30% Lecithin. The insulating myelin sheaths that protect the brain, spine and thousands of miles of nerves in your baody are almost two-thirds Lecithin. Even the heart has a high concentration of Lecithin. Lecithin is composed of many different components, including Choline, Inositol, Linoleic Acid, Phosphatidylserine, beneficial fatty acids and triglycerides. These valuable constituents of Lecithin are vital for the proper functioning of many metabolic processes. NOW Lecithin Granules are derived entirely from soybeans. |Serving Size: 10 grams| Servings Per Container: 1997 |Ingredient||Amount||% Daily Value**| |Calories from Fat||50| | ** Percent Daily Value is based on a 2000 calorie diet. Your daily values may be higher or lower depending on your calorie needs.| † Daily Value not established. As a dietary supplement, take 2 tablespoons daily, preferably with meals. Mix in juice or shakes, or sprinkle on food. Lecithin is a naturally occurring compound found in all cells in nature, plant and animal. It plays a major role in almost all biological processes - including nerve transmission, breathing and energy production.
<urn:uuid:55a91296-48d4-48f3-adcd-7e39fdcd69fa>
CC-MAIN-2016-26
http://www.allstarhealth.com/f/now-lecithin_granules.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395679.92/warc/CC-MAIN-20160624154955-00164-ip-10-164-35-72.ec2.internal.warc.gz
en
0.873284
330
2.875
3
Expo/Science & Industry/Spacetime Wrinkles | Forward | Up | Map | Glossary | Information | Anatomy of a Black Hole By definition a black hole is a region where matter collapses to infinite density, and where, as a result, the curvature of spacetime is extreme. Moreover, the intense gravitational field of the black hole prevents any light or other electromagnetic radiation from escaping. But where lies the "point of no return" at which any matter or energy is doomed to disappear from the visible universe? Applying the Einstein Field Equations to collapsing stars, German astrophysicist Kurt Schwarzschild deduced the critical radius for a given mass at which matter would collapse into an infinitely dense state known as a singularity. For a black hole whose mass equals 10 suns, this radius is about 30 kilometers or 19 miles, which translates into a critical circumference of 189 kilometers or 118 miles. Schwarzschild Black Hole If you envision the simplest three-dimensional geometry for a black hole, that is a sphere (known as a Schwarzschild black hole), the black hole's surface is known as the event horizon. Behind this horizon, the inward pull of gravity is overwhelming and no information about the black hole's interior can escape to the outer universe. Apparent versus Event Horizon As a doomed star reaches its critical circumference, an "apparent" event horizon forms suddenly. Why "apparent?" Because it separates light rays that are trapped inside a black hole from those that can move away from it. However, some light rays that are moving away at a given instant of time may find themselves trapped later if more matter or energy falls into the black hole, increasing its gravitational pull. The event horizon is traced out by "critical" light rays that will never escape or fall in. Apparent versus Event Horizon Even before the star meets its final doom, the event horizon forms at the center, balloons out and breaks through the star's surface at the very moment it shrinks through the critical circumference. At this point in time, the apparent and event horizons merge as one: the horizon. For more details, see the caption for the above diagram. The distinction between apparent horizon and event horizon may seem subtle, even obscure. Nevertheless the difference becomes important in computer simulations of how black holes form and evolve. Beyond the event horizon, nothing, not even light, can escape. So the event horizon acts as a kind of "surface" or "skin" beyond which we can venture but cannot see. Imagine what happens as you approach the horizon, then cross the threshold. Care to take a one-way trip into a black hole? At the center of a black hole lies the singularity, where matter is crushed to infinite density, the pull of gravity is infinitely strong, and spacetime has infinite curvature. Here it's no longer meaningful to speak of space and time, much less spacetime. Jumbled up at the singularity, space and time cease to exist as we know them. The Limits of Physical Law Newton and Einstein may have looked at the universe very differently, but they would have agreed on one thing: all physical laws are inherently bound up with a coherent fabric of space and time. At the singularity, though, the laws of physics, including General Relativity, break down. Enter the strange world of quantum gravity. In this bizzare realm in which space and time are broken apart, cause and effect cannot be unraveled. Even today, there is no satisfactory theory for what happens at and beyond the singularity. It's no surprise that throughout his life Einstein rejected the possibility of singularities. So disturbing were the implications that, by the late 1960s, physicists conjectured that the universe forbade "naked singularities." After all, if a singularity were "naked," it could alter the whole universe unpredictably. All singularities within the universe must therefore be "clothed." But inside what? The event horizon, of course! Cosmic censorship is thus enforced. Not so, however, for that ultimate cosmic singularity that gave rise to the Big Bang. Science versus Speculation We can't see beyond the event horizon. At the singularity, randomness reigns supreme. What, then, can we really "know" about black holes? How can we probe their secrets? The answer in part lies in understanding their evolution right after they form. Forward to When a Black Hole Forms Return to A Black Hole is Born to Einstein's Legacy Copyright © 1995, The Board of Trustees of the University of NCSA. Last modified 11/5/95
<urn:uuid:5ab79654-a223-4f0d-8a50-656eec0516cc>
CC-MAIN-2016-26
http://archive.ncsa.illinois.edu/Cyberia/NumRel/BlackHoleAnat.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783408828.55/warc/CC-MAIN-20160624155008-00164-ip-10-164-35-72.ec2.internal.warc.gz
en
0.925872
968
4.4375
4
You may have heard that pizza is an American invention, ice cream is Italian, and The Earl of Sandwich invented the sandwich. Not so! Here's a look at the origins of some foods you enjoy every day. Some are a lot older than you may think! The sandwich was named after John Montague, the 4th Earl of Sandwich, who was a prominent citizen of 18th century England and who did, indeed, eat meat between two slices of bread. But he was far from the first. The earliest recorded account of what became known as a sandwich was a Passover dish. The ancient sage Hillel was known to put meat from the Passover lamb, along with the ceremonial bitter herbs, inside matzo (unleavened bread). Montague was also not the first sandwich-eater in Britain, as bread was often used as plates during the Middle Ages. Even today, one of the best things about a sandwich is the lack of dishwashing involved. Pasta is an Italian word, and Italy probably has the highest usage of pasta in the world, as well as the most shapes. But the food that is unleavened dough, extruded and dried, then boiled before eating, is definately Chinese. The oldest known noodles (pictured above) were found in 2005 in northwest China, supposedly 4,000 years old. I've occasionally put off cleaning out my refrigerator for a long time, but that's ridiculous. More food history, after the jump. Is ice cream really an Italian invention? That depends on how you define ice cream. Frozen desserts were made in ancient times by mixing various ingredients with snow or ice. In warmer climates, this was a delicacy reserved for the wealthy, as ice had to be brought down from the highest mountains. The Arabs were the first to make ice cream using sugar, and the first to sell such treats from commercial factories. The first ice cream using milk was created in Italy in the Middle Ages. Ice cream was served in the courts of Charles I and Charles II of England in the mid-1600s. Several ice cream recipes appeared in the a French cookbook in 1700. Recipes with actual cream didn't appear until the 18th century. The earliest known recipe with cream was published in 1751 by a London cookbook author named Hannah Glasse. You've probably been told that pizza is an American invention. Not so, it is quite Italian, but pizza would never be if it weren't for the Americas. If you define pizza as Mediterranian flatbread cooked with tomatos, then you have your American connection. The tomato is a native American plant, introduced to Europe in the 16th century by Spanish travelers to America. Many Europeans considered the tomato to be poison, but they got over that eventually. By the 18th century, poor people in Italy were making tomato-based pizza, which led to street vendors, then finally the first pizzaria, Antica Pizzeria Port'Alba in Naples. Update: For a much more detailed history of pizza, see David's Tuesday Turnip! There's an old saying, If you love sausage and you love the law, you don't want to watch either being made. The word sausage covers a lot of different foods, but is usually defined as ground meat packed in casings, often with salt and spices for both flavor and preservation. Traditionally, the casings were the intestines of butchered animals, but now are often made of cellulose or plastic. Almost all populated areas of the world have their own forms of sausage. It was developed to efficiently use all the available meat from an animal, even if it were in parts too small to serve on their own... or too ugly to appear appetizing. The origins of sausage date back to at least 3000 BC, when Sumerians in what is now Iraq invented the technique. Coffee consumption goes back to Ethiopia in the nineth century. The legend says that shepherds noticed the strange energetic way their goats danced after eating the berries of the wild coffee plant. Whether the story is true or not, it brings up a nice picture. By the 15th century, the beverage was popular all over the Middle East. It spread to Italy and the rest of Europe, and became fashionable after Pope Clement VIII pronounced the "Muslim drink" acceptable to Christians in 1600. Coffee consumption in America rested upon the availability of tea. During the Revolutionary War and the War of 1812, coffee gained a significant hold in the US due to trade problems with Britain. Today, the majority of caffeine consumed worldwide comes from coffee. Hamburgers are indeed named after Hamburg, Germany, where they put pork roast on a bun. However, the sandwich we know as a hamburger, with grilled ground beef, was first recorded in 1885 in the United States. The delicacy seemed to arise in several locations, with Seymour, Wisconsin, Athens, Texas, and Hamburg, New York all claiming the first hamburger. On the other hand, the hot dog has a European origin. Frankfurt maintains the Frankfurter wurst was developed in the city in the 1480s. Vienna claims the hot dog decended from its wienerwurst. The city of Coburg in Bavaria says that a butcher there invented the "dachshund" or "little-dog" sausage. In any event, you have to wonder why people say "as American as hot dogs," when the hamburger has a better claim.
<urn:uuid:1efd32f2-2cf5-4dfa-9077-ddadb6dfa6b1>
CC-MAIN-2016-26
http://mentalfloss.com/node/17114/atom.xml
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398209.20/warc/CC-MAIN-20160624154958-00051-ip-10-164-35-72.ec2.internal.warc.gz
en
0.981787
1,120
2.90625
3
Protection from infection Avoiding infections during pregnancy is important for your health and for protecting the well-being of your unborn baby. Some infections can be prevented by taking simple steps to make your environment and your food safe. Toxoplasmosis is an infection caused by a single-celled parasite named Toxoplasma gondii. While the infection in adults causes flu-like symptoms, swollen lymph glands, or muscle aches and pains that last for a few days to several weeks, babies who became infected before birth can have serious mental or physical problems. The organism can be transmitted by eating raw meat, by handling litter boxes with cat feces containing the parasite, or by outdoor gardening in contaminated soil. Listeriosis is a food-borne illness transmitted by bacteria in contaminated food. The listeria organism has been found in a variety of raw foods, such as uncooked meats and vegetables, as well as in processed foods that become contaminated after processing, such as soft cheeses and cold cuts at the deli counter. Unpasteurized (raw) milk or foods made from unpasteurized milk may contain listeria. Symptoms are flu-like, with fever, muscle aches, and sometimes nausea or diarrhea. When contracted during pregnancy, listeriosis may cause infection in the amniotic membranes leading to miscarriage, stillbirth, or severe infection in a newborn. Food poisoning is a risk for all people, but in pregnancy, it can lead to dehydration in the mother and may deprive your unborn baby of nourishment. In addition, maternal food poisoning can cause serious illness in the fetus. Escherichia coli O157:H7 (a specific type of E. coli) can cause food poisoning that leads to bloody diarrhea and possible kidney failure. Illness can occur after eating undercooked, contaminated ground beef, drinking raw milk, or after swimming in or drinking contaminated water. Although alfalfa sprouts are often considered a "health food," the warm, humid conditions needed to grow sprouts from seeds are also ideal for bacteria, such as E. coli, to flourish. Stay healthy and avoid these potential illnesses with the following recommendations: Click here to view the Online Resources of Pregnancy, Birth, and Baby Center
<urn:uuid:eaa5bb61-ea2f-4f4d-98a1-63c51ebf9309>
CC-MAIN-2016-26
http://www.nyhq.org/diw/Content.asp?PageID=DIW007571&More=DIW&language=Korean
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397749.89/warc/CC-MAIN-20160624154957-00090-ip-10-164-35-72.ec2.internal.warc.gz
en
0.955701
460
3.734375
4
The Diesel Tree: Grow Your Own Oil You'd have thought that with 20,000 stories in our archives we might've at least mentioned this in passing. But it seems not. Australian farmers in the wet tropical region of North Queensland have bought over 20,000 of these so-called diesel trees. The intention is that in 15 or so years they'll have their very own oil mine growing on their farmland. Because, the Brazilian Copaifera langsdorfii, to use its botanical name, can be tapped not unlike a rubber tree, but instead of yielding rubbery latex it gives up a natural diesel. According to the nurseryman selling the trees, one hectare will yield about 12,000 litres annually. *Once filtered—no complex refining required, apparently—it can be placed straight into a diesel tractor or truck. We read that a single Copaifera langsdorfii will continue to produce fuel oil for an impressive 70 years, with the only negative being that its particular form of diesel needs to be used within three months of extraction. Oddly this is not news. The Center for New Crops & Plant Products, at Purdue University reports that it was first reported to the western world as far back as 1625. They observe reports from 1979 saying "Natives ... drill a 5 centimeter hole into the 1-meter thick trunk and put a bung into it. Every 6 months or so, they remove the bung and collect 15 to 20 liters of the hydrocarbon." The UN's Food and Agriculture Organisation noted in a paper at the Eleventh world forestry congress back in 1997 on the topic of tree oil for cars that "... the potential of other alternatives such as the Amazon Copaifera langsdorfii need to be investigated." Copaifera langsdorfii can grow trunks 30 metres tall and store the oil in their unusual capilliary structure. The above image is a transverse section of the tree's cells. * I used to convert metric measurements in American imperial but when I discovered that the only countries that have failed to embrace metric are the USA, Liberia and Burma I stopped. However Purdue University record that "An acre of 100 mature trees might thus be able to produce 25 barrels of fuel per year." Image found at: 'Richter, H.G., and Dallwitz, M.J. 2000 onwards. Commercial timbers: descriptions, illustrations, identification, and information retrieval. In English, French, German, Portuguese, and Spanish. Version: 16th April 2006. http://delta-intkey.com'
<urn:uuid:94986308-1488-4dd3-a66d-14bec74ea1ce>
CC-MAIN-2016-26
http://www.treehugger.com/renewable-energy/the-diesel-tree-grow-your-own-oil.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397797.77/warc/CC-MAIN-20160624154957-00129-ip-10-164-35-72.ec2.internal.warc.gz
en
0.929067
531
2.890625
3
Scientists in Japan said Friday they have for the first time succeeded in coaxing sperm cells from mouse embryonic stem cells, a breakthrough that could one day help humans overcome infertility. The sperm were used to fertilize eggs and were found to produce "healthy offspring that grew into fertile male and female adult mice," said the study in a special online edition of the US journal Cell. Potential use of the technology in humans is at least a decade away, the Kyoto University team said. But the experiment is exciting because it tackles one of the biggest obstacles in biology - making embryonic stem cells into sperm precursors, known as primordial germ cells, which then can become healthy sperm. "This is the first (study) to report the generation of fully functional germline cells from ES (embryonic stem) cells," lead author of the study, Mitinori Saitou, professor at the department of anatomy and cell biology graduate school of medicine, Kyoto University, told AFP by email. Researchers took mice that were unable to produce normal sperm and injected them with the stem cell-derived primordial germ cells, or PGCs. These PGCs "produced normal-looking sperm, which were then used to successfully fertilize eggs," said the study. The team intends to continue studying the technique and its effects in further generations of male and female mice.
<urn:uuid:634cb44f-d32d-4d7a-a5a7-d0532d5c8508>
CC-MAIN-2016-26
http://www.independent.co.uk/life-style/health-and-families/japan-scientists-coax-sperm-from-stem-cells-2333870.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783404405.88/warc/CC-MAIN-20160624155004-00075-ip-10-164-35-72.ec2.internal.warc.gz
en
0.96879
279
3.140625
3
Did you know? A bicycle is a marvel of engineering efficiency, one where an investment in 22 pounds of metal and rubber boosts the efficiency of an individual mobility by a factor of three. On my bike I estimate that I get easily 7 miles per potato. For more information view the text and data in Chapter 6 of Plan B 4.0: Mobilizing to Save Civilization. As summer comes to the Gulf of Mexico, it brings with it each year a giant “dead zone” devoid of fish and other aquatic life. Expanding over the past several decades, this area now can span up to 21,000 square kilometers, which is larger than the state of New Jersey. A similar situation is found on a smaller scale in the Chesapeake Bay, where since the 1970s a large lifeless zone has become a yearly phenomenon, sometimes shrouding 40 percent of the bay. Worldwide, there are some 146 dead zones—areas of water that are too low in dissolved oxygen to sustain life. Since the 1960s, the number of dead zones has doubled each decade. Many are seasonal, but some of the low-oxygen areas persist year-round. What is killing fish and other living systems in these coastal areas? A complex chain of events is to blame, but it often starts with farmers trying to grow more food for the world’s growing population. Fertilizers provide nutrients for crops to grow, but when they are flushed into rivers and seas they fertilize microscopic plant life as well. In the presence of excessive concentrations of nitrogen and phosphorus, phytoplankton and algae can proliferate into massive blooms. When the phytoplankton die, they fall to the seafloor and are digested by microorganisms. This process removes oxygen from the bottom water and creates low-oxygen, or hypoxic, zones. Most sea life cannot survive in low-oxygen conditions. Fish and other creatures that can swim away abandon dead zones. But they are still not entirely safe—by relocating they may become vulnerable to predators and face other stresses. Other aquatic life, like shellfish, that cannot migrate in time suffocate in low-oxygen waters. Dead zones range in size from small sections of coastal bays and estuaries to large seabeds spanning some 70,000 square kilometers. Most occur in temperate waters, concentrated off the east coast of the United States and in the seas of Europe. Others have appeared off the coasts of China, Japan, Brazil, Australia, and New Zealand. Coastal Dead Zones Around the World Source: UNEP, GEO Yearbook 2003 (Nairobi: 2004), compiled from Boesch 2002, Caddy 2000, Diaz et al. (in press), Green and Short 2003, Rabalais 2002. The world’s largest dead zone is found in the Baltic Sea, where a combination of agricultural runoff, deposition of nitrogen from burning fossil fuels, and human waste discharge has overfertilized the sea. Similar problems have created hypoxic areas in the northern Adriatic Sea, the Yellow Sea, and the Gulf of Thailand. Offshore fish farming is another growing source of nutrient buildup in some coastal waters. Forty-three of the world’s known dead zones occur in U.S. coastal waters. The one in the Gulf of Mexico, now the world’s second largest, disrupts a highly productive fishery that provides some 18 percent of the U.S. annual catch. Gulf shrimpers and fishers have had to move outside of the hypoxic area to find fish and shrimp. Landings of brown shrimp, the most economically important seafood product from the Gulf, have fallen from the record high in 1990, with the annual lows corresponding to the highly hypoxic years. Excess nutrients from fertilizer runoff transported by the Mississippi River are thought to be the primary cause of the Gulf of Mexico’s dead zone. Each year some 1.6 million tons of nitrogen now enter the Gulf from the Mississippi basin, more than triple the average flux measured between 1955 and 1970. The Mississippi River drains 41 percent of the U.S. landmass, yet most of the nitrogen originates in fertilizer used in the productive Corn Belt. Worldwide, annual fertilizer use has climbed to 145 million tons, a tenfold rise over the last half-century. (See data.) This coincides with the increase in the number of dead zones around the globe. And not only has more usable nitrogen been added to the environment each year, but nature’s capacity to filter nutrients has been reduced as wetlands are drained and as areas along riverbanks are developed. Over the last century, the world has lost half its wetlands. In the United States, some of the key farming states like Ohio, Indiana, Illinois, and Iowa have drained 80 percent of their wetlands. Louisiana, Mississippi, Arkansas, and Tennessee have lost over half of theirs. This lets even more of the excess fertilizer farmers apply flow down the Mississippi River to the gulf. There is no one way to cure hypoxia, as the mix of contributing factors varies among locations. But the keys are to reduce nutrient pollution and to restore ecosystem functions. Fortunately, there are a few successes to point to. The Kattegat straight between Denmark and Sweden had been plagued with hypoxic conditions, plankton blooms, and fish kills since the 1970s. In 1986, the Norway lobster fishery collapsed, leading the Danish government to draw up an action plan. Since then, phosphorus levels in the water have been reduced by 80 percent, primarily by cutting emissions from wastewater treatment plants and industry. Combined with the reestablishment of coastal wetlands and reductions of fertilizer use by farmers, this has limited plankton growth and raised dissolved oxygen levels. The dead zone on the northwestern shelf of the Black Sea peaked at 20,000 square kilometers in the 1980s. Largely because of the collapse of centralized economies in the region, phosphorus applications were cut by 60 percent and nitrogen use was halved in the Danube River watershed and fell similarly in other Black Sea river basins. As a result, the dead zone shrank. In 1996 it was absent for the first time in 23 years. Although farmers sharply reduced fertilizer use, crop yields did not suffer proportionately, suggesting they had been using too much fertilizer before. While phosphorus appears to have been the main culprit in the Black Sea, nitrogen from atmospheric sources—namely, emissions from fossil fuel burning—seems to be the primary cause of the dead zones in the North and Baltic seas. Curbing fuel use through efficiency improvements, conservation, and a move toward renewable energy can diminish this cause of the problem. For the Gulf of Mexico, curbing nitrogen runoff from farms can shrink the dead zone. Applying fertilizer to match crop needs more precisely would allow more nutrients to be taken up by plants instead of being washed out to sea. Preventing erosion through conservation tillage and changing crop rotations, along with wetland restoration and preservation, can also play a part. Innovative programs such as the American Farmland Trust’s Nutrient Best Management Practices Endorsement can reduce the common practice of using too much fertilizer. Farmers who follow recommendations for fertilizer application and cut their use are guaranteed financial coverage for potential shortfalls in crop yields. They save money on fertilizer purchases and are insured against losses. Under test programs in the United States, fertilizer use has dropped by a quarter. With carefully set goals and management, it is possible for some dead zones to shrink in as little as a year. For other hypoxic areas (especially in the Baltic, a largely enclosed sea with slower nutrient turnover), improvement may take longer, pointing to the need for early action. For while dead zones shrink or grow depending on nutrient input and climatic conditions, the resulting fish dieoffs are not so easily reversed. Copyright © 2004 Earth Policy Institute
<urn:uuid:2cbcbb4c-c8d9-482d-b1db-b0008aec3598>
CC-MAIN-2016-26
http://www.earth-policy.org/plan_b_updates/2004/update41
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403826.29/warc/CC-MAIN-20160624155003-00139-ip-10-164-35-72.ec2.internal.warc.gz
en
0.942101
1,623
3.203125
3
Contents of this page: Synthesis of d-aminolevulinate & porphobilinogen Formation & modification of the tetrapyrrole ring system Regulation of iron absorption and transport is the prosthetic group of hemoglobin, myoglobin, and the cytochromes. The heme of cytochrome c is shown at right. (For the slightly different structure of heme a, see the notes on electron transfer.) Heme is an asymmetric molecule. (Note the positions of the methyl side chains around the ring system.) The heme ring system is synthesized from glycine and succinyl-CoA. Using isotopic tracers, it was initially found that N & C atoms of heme are derived from glycine and acetate. It was later determined that the labeled acetate first enters Krebs Cycle as acetyl-CoA, and the labeled carbon becomes incorporated into succinyl-CoA, which is the more immediate precursor of heme. |Heme synthesis begins with condensation of glycine & succinyl-CoA, with decarboxylation, to form d-aminolevulinic acid (ALA).| |Pyridoxal phosphate (PLP) serves as coenzyme for d-Aminolevulinate Synthase (ALA Synthase), an enzyme is evolutionarily related to transaminases.| | Condensation with succinyl-CoA takes place while the amino group of glycine is in Schiff base linkage to the aldehyde of PLP. Coenzyme A and the carboxyl of glycine are lost following the condensation reaction. Diagram p. 1015. d-Aminolevulinate Synthase (ALA Synthase) is the committed step of the heme synthesis pathway, and is usually rate-limiting for the overall pathway. Regulation occurs through control of gene transcription. Heme functions as a feedback inhibitor, repressing transcription of the gene for d-Aminolevulinate Synthase in most cells. A variant of ALA Synthase expressed only in developing erythrocytes is regulated instead by availability of iron in the form of iron-sulfur clusters. |PBG Synthase (Porphobilinogen Synthase), also called ALA Dehydratase, catalyzes condensation of two molecules of d-aminolevulinic acid (ALA) to form porphobilinogen (PBG).| |The reaction mechanism involves two lysine residues and a bound cation at the active site. The bound cation in the mammalian enzyme is Zn++. As each of the two d-aminolevulinate (ALA) substrates binds at the active site, its keto group initially reacts with the side-chain amino group of one of the two lysine residues to form a Schiff base. These Schiff base linkages promote the C-C and C-N condensation reactions that follow, assisted by the metal ion that coordinates to the ALA amino groups. Zn++ binding sites in the homo-octomeric mammalian Porphobilinogen Synthase, which include cysteine S ligands, can also bind Inhibition of Porphobilinogen Synthase by Pb++ results in elevated blood ALA, as impaired synthesis of heme results in de-repression of transcription of the gene for ALA Synthase. High ALA is thought to cause some of the neurological effects of lead poisoning, although Pb++ also may directly affect the nervous system. ALA (d-aminolevulinate) is toxic to the brain. This may be due in part to the fact that ALA is somewhat similar in structure to the neurotransmitter GABA (g-aminobutyric acid). In addition, autoxidation of ALA generates reactive oxygen species (oxygen radicals). |A proposed reaction mechanism (see diagram) is based on solved crystal structures of: Explore these structures at right. PBG Synthase - ALA PBG Synthase - PBG The porphyrin ring is formed by condensation of four molecules of porphobilinogen. Porphobilinogen Deaminase catalyzes successive condensations of PBG, initiated in each case by elimination of the amino group. Diagram p. 1018. Deaminase enzyme has a dipyrromethane prosthetic group, linked at the active site via a cysteine S. The enzyme itself catalyzes formation of this prosthetic group. |PBG units are added to the dipyrromethane until a linear hexapyrrole has been formed. Porphobilinogen Deaminase is organized in 3 domains. Predicted interdomain flexibility may accommodate the growing polypyrrole in the active site cleft. Hydrolysis of the link to the enzyme's dipyrromethane releases the tetrapyrrole hydroxymethylbilane Explore at right the structure of the enzyme Porphobilinogen Deaminase, with its covalently linked prosthetic group dipyrromethane. |Uroporphyrinogen III Synthase converts the linear tetrapyrrole hydroxymethylbilane to the macrocyclic uroporphyrinogen III.| | Uroporphyrinogen III Synthase catalyzes ring closure, and flipping over one of the pyrroles, to yield an asymmetric tetrapyrrole. Note the distribution of acetyl and propionyl side chains in the diagram This rearrangement is thought to proceed via a spiro intermediate, as depicted at right and in the animation below. |The active site of Uroporphyrinogen III Synthase is located in a cleft between two domains of the enzyme. The structural flexibility inherent in this arrangement is proposed to be essential to catalysis. Uroporphyrinogen III is the precursor for synthesis of vitamin B12, chlorophyll, and heme, in organisms that produce these compounds. |Conversion of uroporphyrinogen III to protoporphyrin IX (above) occurs in several steps, as presented in the animation These steps include: is added to protoporphyrin IX via Ferrochelatase. This enzyme in mammals is homodimeric and contains two [2Fe-2S] iron-sulfur A conserved active site histidine, along with a chain of anionic residues, may conduct released protons away, as Fe++ binds from the other side of the porphyrin ring, to yield heme. Regulation of transcription or post-translational processing of enzymes of the heme synthesis pathways differs between erythrocyte forming cells and other tissues. There is relatively steady production of pathway enzymes in erythrocyte-forming cells, limited only by iron availability. Expression of pathway enzymes in other tissues, is more variable and subject to feedback inhibition by heme. Porphyrias are genetic diseases resulting in decreased activity of one of the enzymes involved in heme synthesis (e.g., PBG Synthase, Porphobilinogen Deaminase, etc...). Symptoms vary depending on the enzyme, the severity of the deficiency and whether heme synthesis is affected primarily in liver or in developing erythrocytes. Occasional episodes of severe neurological symptoms are associated with some porphyrias. Permanent nerve damage and even death can result, if not treated promptly. Elevated d-aminolevulinic acid (ALA), arising from de-repression of ALA Synthase gene transcription, is considered responsible for the neurological symptoms. Treatment of acute attacks is by injection of hemin (a form of heme). The heme, in addition to supplying needs, would repress transcription of ALA Synthase in non-erythroid tissues. For more information on these diseases, search the OMIM (Online Mendelian Inheritance in Man) website with the keyword porphyria. Regulation of iron absorption and transport Iron for use in synthesis of heme, iron-sulfur centers and other non-heme iron proteins is obtained from the diet and via release of recycled iron from macrophages of the reticuloendothelial system that ingest old and damaged erythrocytes (red blood cells). There is no mechanism for iron excretion. Iron is significantly lost from the body only by bleeding, including menstruation in females, with small losses, e.g., from sloughing of cells of skin and other epithelia. Iron is transported in blood serum bound to the protein transferrin. The plasma membrane transferrin receptor mediates uptake of the complex of iron with transferrin by cells via receptor mediated endocytosis. Iron is stored within cells as a complex with the protein ferritin. The main storage site is liver. The plasma membrane protein ferroportin mediates release of absorbed iron from intestinal cells to blood serum, as well as release of iron from hepatocytes (liver cells) and macrophages. Control of dietary iron absorption and serum iron levels involves regulation of ferroportin expression: Transcription of the gene for the iron transporter ferroportin is responsive to iron. Hepcidin, a regulatory peptide secreted by liver, induces degradation of ferroportin. Hepcidin secretion increases when iron levels are high or in response to cytokines produced at sites of inflammation. Degradation of ferroportin leads to decreased absorption of dietary iron and decreased serum iron. Hepcidin is considered an antimicrobial peptide because by lowering serum iron it would limit bacterial growth. Hereditary hemochromatosis is a family of genetic diseases characterized by excessive iron absorption, transport and storage. Genes mutated in these disorders include those for the transferrin receptor, a protein HFE that interacts with the transferrin receptor, hepcidin and hemojuvelin, an iron-sensing protein required for transcription of the gene for hepcidin. E.g., impaired synthesis or activity of hepcidin leads to unrestrained ferroportin activity, with high dietary intake and high % saturation of serum transferrin with iron. Organs particularly affected by accumulation of excess iron include liver and heart. For more information on these diseases, search the OMIM (Online Mendelian Inheritance in Man) website with the keyword hemochromatosis. Copyright © 2000-2008 by Joyce J. Diwan. All rights reserved. Additional material on Heme Synthesis:
<urn:uuid:be676675-89b8-4409-886d-01cd6cd8326b>
CC-MAIN-2016-26
http://www.rpi.edu/dept/bcbp/molbiochem/MBWeb/mb2/part1/heme.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393442.26/warc/CC-MAIN-20160624154953-00097-ip-10-164-35-72.ec2.internal.warc.gz
en
0.893725
2,294
2.796875
3
A digger wasp that excavates its burrow in sandy soil and then catches prey with which to furnish it. Sand wasps typically have an abdomen with a very long and slender “waist.”. - One hard-working mother is the sand wasp, who spends all her time catering for her yet unhatched young, ensuring they have a tasty meal when they hatch by placing live paralysed caterpillars in their nest for them. - Then we re-entered the dunes and walked the edge of Newborough Warren, the grassed over portion of the nature reserve which is grazed by grey ponies to keep down rank grasses and for the benefit of the sand wasp. - The sand wasp works hard to look after its young but the female is too busy to guard all her nest sites. For editors and proofreaders Syllabification: sand wasp Definition of sand wasp in: What do you find interesting about this word or phrase? Comments that don't adhere to our Community Guidelines may be moderated or removed.
<urn:uuid:e0336fc4-dcab-4ca4-8a8a-cb3ad181dd0a>
CC-MAIN-2016-26
http://www.oxforddictionaries.com/us/definition/american_english/sand-wasp
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399385.17/warc/CC-MAIN-20160624154959-00015-ip-10-164-35-72.ec2.internal.warc.gz
en
0.942865
226
3.1875
3
Local government food safety guidelines for storing foods (p26) which have already been cooked stipulate food internal temperature must be brought from above 140F (serving temperature) to 70F in less than 2 hours and from 70F to 40F in less than four hours. Why then do the rules for defrosting (p23) (the reverse) say food should be at room temperature "for very short periods during preparation" and foods can only be defrosted in one of three ways: in refrigerator, under running water, or in the microwave provided there is no interruption in the cooking process (ie. partially in the microwave then cooked or all in microwave). If its just time and temperature, why is the cook trusted to watch the clock for cooling and not defrosting? Previous posts have asked for guidelines and best practices; however, my question accepts the practical advise and hopes to discover the political (creating effective guidelines) and biological (does warming from 40F generate more/more harmful bacteria than cooling from >140F?) reasons. I have my own theories but what are yours?
<urn:uuid:a412c844-e5db-4355-9c70-2589a93e83ed>
CC-MAIN-2016-26
http://cooking.stackexchange.com/questions/18280/why-can-food-be-left-out-to-cool-140f-to-40f-in-6h-but-not-to-defrost
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397842.93/warc/CC-MAIN-20160624154957-00199-ip-10-164-35-72.ec2.internal.warc.gz
en
0.951004
223
2.59375
3
There's a reason that towering mammals the likes of King Kong are resigned to fiction. Our aching bones can only take so much weight before they start crumbling under the pressure. But if that's the case, then why were dinosaurs able to reach such phenomenal heights? According to a new study, the answer isn't so much about the bones themselves as it is the soft, squishy joints they lay between. The scientists leading the new study published in PLOS ONE measured the ends of bones in both mammals and dinosaurs as well as their descendants to see how joint and bone shape changes as size increases. As mammals grow, our bones become progressively rounder at the ends to be able to support the increase in weight while minimizing pressure as much as possible. Reptiles and birds, however, (as well as the dinosaurs that came before them) have bones that grow wider and flatter as more weight is added to the frame. So considering that these two very different shapes are both meant to sustain more weight, the joints and cartilage that connect them must also work differently. For humans and other mammals, as the bones become rounder the connecting cartilage continues to stretch thin and tight across the bones surface. Because the soft, connective cartilage is close-fitting and maleable, our weight is able to distribute more evenly. The wider, flatter bones of reptiles, however, solve the problem by packing as many layers of the stuff as they can—which as it turns out, is a much more efficient method. According to Matthew Bonnan from the Richard Stockton College of New Jersey and one of the lead authors on the study: More than just evenly distributing the pressure, the joint itself may be deforming a little — it’s actually squishier, increasing the force it can sustain. Of course, these gelatinous joint fillings weren't the only thing letting dinos tower over the rest of the prehistoric world. The lighter, hollow bones favored by reptiles also meant that larger frames didn't require as much support as our own solid bricks for bones. This does, however, at least begin to explain why dinosaurs were able to reach such larger than (modern) life proportions. Still, as pillowy and bouncy as their joints may be, everything has its limits. You know, like extinction-event comets. [Live Science]
<urn:uuid:9e131ffa-21bc-493f-81b7-c514781ecf77>
CC-MAIN-2016-26
http://gizmodo.com/dinosaurs-were-able-to-grow-so-huge-because-of-their-sq-1452328578
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783392159.3/warc/CC-MAIN-20160624154952-00023-ip-10-164-35-72.ec2.internal.warc.gz
en
0.978461
480
4.15625
4
Afriat, Alexander and Caccese, Ermenegildo The relativity of inertia and reality of nothing. The determination of inertia by matter is looked at in general relativity, where inertia can be represented by affine or projective structure. The matter tensor T seems to underdetermine affine structure by ten degrees of freedom, eight of which can be eliminated by gauge choices, leaving two. Their physical meaning---which is bound up with that of gravitational waves and the pseudotensor t, and with the conservation of energy-momentum---is considered, along with the dependence of reality on invariance and of causal explanation on conservation. Monthly Views for the past 3 years Monthly Downloads for the past 3 years Actions (login required)
<urn:uuid:5a9e70d0-0ef5-47ee-8f4e-07f79c6a2fbe>
CC-MAIN-2016-26
http://philsci-archive.pitt.edu/3954/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397748.48/warc/CC-MAIN-20160624154957-00098-ip-10-164-35-72.ec2.internal.warc.gz
en
0.900261
160
2.5625
3
Knowledge of birds and willingness to support their conservation: an Australian case study Wilson, Clevo & Tisdell, Clem (2005) Knowledge of birds and willingness to support their conservation: an Australian case study. Bird Conservation International, 15(3), pp. 225-235. This case study concentrates on the extent of knowledge among the Australian public of Australia's tropical bird species, and their willingness to support their conservation. In order to place this issue in context, we provide background information on the status of Australian bird species, focusing attention on species that occur in tropical Australia. Then, using questionnaire survey results, we consider the hypothesis that the public's support for the conservation of different bird species depends on their understanding of the species' existence and status. Based on results from a sample of residents in Brisbane, Queensland, we found that knowledge of bird species that occur exclusively in the Australian tropics (including tropical Queensland) was very poor compared with that of those occurring in the Brisbane area that are relatively common. Experimental results indicated that when respondents in the sample had an option to allocate A$1,000 between 10 bird species listed in the survey, they allocated more funds to the better-known and more common species, unless they were provided with balanced information about all the selected species. With balanced information, the average allocation to bird species confined mostly to the Australian tropics, particularly those threatened, increased. This demonstrates the conservation implications of information provision about bird species. The results showed that public education can play a crucial role in attempts to conserve bird species that are poorly known and threatened. Impact and interest: Citation counts are sourced monthly from and citation databases. These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards. Citations counts from theindexing service can be viewed at the linked Google Scholar™ search. Full-text downloads displays the total number of times this work’s files (e.g., a PDF) have been downloaded from QUT ePrints as well as the number of downloads in the previous 365 days. The count includes downloads for all files if a work has more than one. |Item Type:||Journal Article| |Subjects:||Australian and New Zealand Standard Research Classification > ECONOMICS (140000) Australian and New Zealand Standard Research Classification > ECONOMICS (140000) > APPLIED ECONOMICS (140200) > Environment and Resource Economics (140205) Australian and New Zealand Standard Research Classification > ECONOMICS (140000) > APPLIED ECONOMICS (140200) |Divisions:||Current > QUT Faculties and Divisions > QUT Business School| |Copyright Owner:||Copyright 2005 Cambridge University Press| |Copyright Statement:||Reproduced in accordance with the copyright policy of the publisher.| |Deposited On:||21 Jan 2008 00:00| |Last Modified:||29 Feb 2012 13:11| Repository Staff Only: item control page
<urn:uuid:7bd78377-fb33-4eef-88ca-412e5048f664>
CC-MAIN-2016-26
http://eprints.qut.edu.au/12090/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397864.87/warc/CC-MAIN-20160624154957-00144-ip-10-164-35-72.ec2.internal.warc.gz
en
0.896953
670
2.875
3
Difference between Over The Counter Drugs and Prescription Drugs For people who are looking for medication to treat a specific health condition, the choice often boils down to over-the-counter drugs or prescription medications. While there are certain instances wherein only prescription medications would be the right choice, there are just as many instances wherein over-the-counter drugs work just as well. This comparison article shows the main differences between each. One of the main differences between over the counter drugs and prescription drugs is consumer access. Prescription drugs are only given to patients via a doctor's prescription, and only licensed medical professionals can order them. Over-the-counter drugs are a lot easier to come by in comparison, and they are often even available from locations other than pharmacies. This is because prescription drugs are intended only for specific patients, and in fact it is illegal to share them with other people under any circumstances. Conversely, over-the-counter drugs can be given freely to anyone including friends and family members that are suffering from the same illness or health condition. It is important to keep in mind however that dosage and application instructions should be followed to the letter when taking over-the-counter drugs. One other key difference between prescription drugs and over-the-counter drugs is their formulation. It is important to note that prescription drugs are formulated in does that conform to an aggressive treatment procedure prescribed by a doctor. There is in fact a certain amount of risk involved in taking prescription drugs, since aside from the dosage considerations, there are also numerous possible interactions with other medications to consider. As for over-the-counter drugs, they are usually sold in doses that are deemed both safe and effective according to guidelines set by the FDA or Food and Drug Administration. In fact, over-the-counter drugs are a lot safer than prescription drugs in that they can generally be combined with other over-the-counter drugs without worrying about potential risk of overdose or adverse reaction. Cost is another key difference between both types of medications. One factor that dictates the prices of prescription drugs is the patents held by certain formulations, which may be enforced for several years. What this means is that drug companies basically have the option to price prescription drugs as they see fit, although pricing is of course subject to approval by government regulatory bodies. Over-the-counter drugs on the other hand are usually manufactured with ingredients that have since been made public, making it possible for any manufacturer to produce them. This result is more competitive prices for over-the-counter drugs in general. - Often available from locations other than pharmacies - Can be given freely to anyone - Are priced more competitively - Are only given to patients via a doctor's prescription - Can only be ordered by licensed medical professionals - Intended only for specific patients - Are usually priced according to the drug companies’ discretion
<urn:uuid:9bad8124-e99f-4b9e-8924-86c896e382e3>
CC-MAIN-2016-26
http://recomparison.com/comparisons/100874/over-the-counter-drugs-vs-prescription-drugs/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396872.10/warc/CC-MAIN-20160624154956-00020-ip-10-164-35-72.ec2.internal.warc.gz
en
0.962114
579
2.71875
3
The Gila River in southwestern New Mexico is an ecological gem, but is threatened by a proposed diversion. Photo by Sandra Postel The western United States was settled with the help of big dams and river diversions that delivered distant water to burgeoning cities and farms, but at least one state is saying it’s time to shift gears. In a resounding voice of support for river protection, 85 percent of New Mexico residents say they want officials to address the state’s water problems through conservation, recycling and wiser use of existing water supplies – not by diverting more water from the state’s rivers. In a poll conducted this past June, the vast majority of New Mexicans said that rivers are critical to the state’s quality of life and economy, and want to protect them for future generations. Nine-in-ten believe the state’s rivers are “at risk” at the present time. When asked specifically about the Gila River in southwestern New Mexico, which in recent years has come under threats of a diversion to send water over the Continental Divide to cities and farms, 61 percent of respondents sided with the no-diversion stance once they were informed about the project’s details, while only 36% sided with the pro-diversion position. A beautiful desert river that supports a rich diversity of birds and wildlife , the Gila (pronounced Hee-la) is the last undammed river in New Mexico and historically was a crucial tributary to the Colorado River. For millennia, the river emerged from what are now the Gila and Aldo Leopold Wilderness areas, and flowed across southwestern New Mexico and through Arizona before emptying into the Colorado River at Yuma, near the U.S.-Mexican border. Today, however, water users in Arizona take all of the Gila’s flow, leaving the river completely dry and delivering no water to the depleted Colorado. On the New Mexico side of the border, however, the Gila is an ecological gem , supporting one of the healthiest cottonwood-willow riparian forests to be found in the desert southwest, as well as a variety of threatened and endangered species. During the polling, the more New Mexicans learned about the proposed Gila diversion, which would siphon as much as 14,000 acre-feet (4.56 billion gallons) a year from the river, the more strongly they opposed it. While the federal government would subsidize a portion of the diversion project, which emerged in response to the 2004 Arizona Water Settlements Act (AWSA), New Mexico’s taxpayers and water users would be saddled with some two-thirds of the estimated $300 million cost to build the pipeline. On top of that, the Act requires New Mexico to pay Arizona for any Gila water it diverts. That’s because the Gila River Indian Community in Arizona owns that water, and New Mexico would have to pay Arizona to deliver replacement supplies. As a clincher, the AWSA provides $66 million for community water projects to help meet local water needs in southwestern New Mexico. These funds could be used to invest in urban and agricultural conservation measures, sustainable groundwater use and other solutions that make better use of local water supplies – and would cost far less than the diversion project. Historically, big water decisions have been made in an authoritarian, top-down manner, often with little involvement or say from the public. Thanks to this poll – which was commissioned by Protect the Flows , a network of nearly 900 businesses in the seven states of the Colorado River Basin, and conducted by the market research firm Public Opinion Strategies – the voice of the people has been brought into the debate. The state of New Mexico must notify the U.S. Secretary of the Interior by December 2014 as to whether or not it will divert Gila River water. Hopefully, state officials will heed the public’s wishes for more cost-effective and environmentally sound water alternatives – and keep the Gila River flowing strong.
<urn:uuid:9646b9aa-3047-4171-aab5-5b7166d05903>
CC-MAIN-2016-26
http://www.resilience.org/stories/2013-10-18/new-mexicans-call-for-conservation-over-river-diversions
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395166.84/warc/CC-MAIN-20160624154955-00092-ip-10-164-35-72.ec2.internal.warc.gz
en
0.957631
846
3.03125
3
Definition of Coffey still 1. Noun. A still consisting of an apparatus for the fractional distillation of ethanol from fermentation on an industrial scale. Coffey Still Pictures Click the following link to bring up a new window with an automated collection of images related to the term: Coffey Still Images Lexicographical Neighbors of Coffey Still Literary usage of Coffey still Below you will find example usage of this term as found in modern and/or classical literature: 1. Coal-tar and Ammonia by Georg Lunge (1916) "Coffey still. We shall first, in Fig. 299, give a sketch of the combination of apparatus employed at a London works, where 100000 gall, of gas-liquor are ..." 2. Outlines of Industrial Chemistry: A Text-book for Students by Frank Hall Thorp, Charles D. Demond (1905) "The Coffey still (Fig. 7) is much used for alcohol and gas liquor distillation. This consists of two | | FIG. «. towers, one, called the "analyzer" (E), ..." 3. The Encyclopaedia Britannica: A Dictionary of Arts, Sciences, and General by Thomas Spencer Baynes (1888) "The Coffey still may further be regarded as a type of continuous distilling apparatus ... Beginning, as the Coffey still does, with the steam of pure water, ..." 4. A Dictionary of Applied Chemistry by Thomas Edward Thorpe (1921) "In many of the still-heads employed on the large scale, for example in the Coffey still (Fig. 28), the condensed liquid is caused, by means of suitable ..."
<urn:uuid:651863d2-b771-431b-9e41-7c78792aaad3>
CC-MAIN-2016-26
http://www.lexic.us/definition-of/Coffey_still
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397748.48/warc/CC-MAIN-20160624154957-00169-ip-10-164-35-72.ec2.internal.warc.gz
en
0.885622
359
3.234375
3
Why have nuclear weapons not been used since Hiroshima and Nagasaki in 1945? Nina Tannenwald disputes the conventional answer of 'deterrence' in favour of what she calls a nuclear taboo - a widespread inhibition on using nuclear weapons - which has arisen in global politics. Drawing on newly released archival sources, Tannenwald traces the rise of the nuclear taboo, the forces that produced it, and its influence, particularly on US leaders. She analyzes four critical instances where US leaders considered using nuclear weapons (Japan 1945, the Korean War, the Vietnam War, and the Gulf War 1991) and examines how the nuclear taboo has repeatedly dissuaded US and other world leaders from resorting to these 'ultimate weapons'. Through a systematic analysis, Tannenwald challenges conventional conceptions of deterrence and offers a compelling argument on the moral bases of nuclear restraint as well as an important insight into how nuclear war can be avoided in the future. 1. Introduction: the tradition of nuclear non-use; 2. Explaining non-use; 3. Hiroshima and the origins of the nuclear taboo; 4. The Korean War: the emerging taboo; 5. The rise of the nuclear taboo, 1953–1960; 6. Nuclear weapons and the Vietnam War; 7. Institutionalizing the taboo, 1960–1989; 8. The 1991 Gulf War; 9. The taboo in the post-Cold War world; 10. Conclusion: the prospects for the nuclear taboo. Winner, 2008 Lepgold Book Prize, Georgetown University “At a time when the actual use of nuclear weapons is being contemplated as ‘mini-nukes’ or ‘bunker-busters,’ Nina Tannenwald’s book is a timely reminder of humanity’s visceral recoiling from the use of the world’s most destructive weapon.” Jayantha Dhanapala, Former United Nations Under-Secretary-General for Disarmament Affairs and former Ambassador of Sri Lanka to the USA “The Nuclear Taboo is a compelling account of the role of moral restraint in international politics. Tannenwald explains how the habit of non-use has become expected and required behavior, reminding us that there was nothing inevitable about it. She traces the historical trajectory and effect of the taboo on international power politics. She also raises perhaps the most important war-related issue of our time: will the nuclear taboo be broken in light of new technologies and new threats? Read this book and find out how beliefs about right and wrong conduct have shaped the choices of policy makers and the expectations of the public. No explanation of international politics in the nuclear age will be complete without it.” Joel H. Rosenthal, President, Carnegie Council on Ethics and International Affairs “Nina Tannenwald has written a powerful and provocative book examining the influence of ethical norms on U.S. leaders’ nuclear weapons decisions. Her thesis that a nuclear taboo has taken hold will be widely read and hotly debated in both university classrooms and inside defense ministries in all nuclear nations.” Scott D. Sagan, Stanford University
<urn:uuid:634d2e6c-9bcf-45b1-ada0-c68eff286e3e>
CC-MAIN-2016-26
http://www.cambridge.org/us/catalogue/catalogue.asp?isbn=9780521818865
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396027.60/warc/CC-MAIN-20160624154956-00091-ip-10-164-35-72.ec2.internal.warc.gz
en
0.900002
636
2.875
3
Chartered November 13, 1889, the 5-mile SD&C was built in 1890-92 and operated by James Monroe Smith, owner of a 30 square-mile plantation in Oglethorpe County. Smith, a country boy of modest means who began in business by cutting crossties and selling them to the Georgia Railroad, gradually put together one of the state's largest farms, with ten thousand acres under cultivation and upwards of 500 buildings of various types. Smithonia, the center of his small empire, had a hotel, a post office, and several factories and warehouses. Realizing that horses and wagons could not continue to efficiently transport the ever-growing products of his plantation and town, Smith built two railroads, the SD&C and the Smithonia & Dunlap. The SD&C ran five miles from Smithonia north to a connection with the Seaboard Air Line Railway at Five Forks, later renamed Colbert. The S&D ran west to connect with the Georgia Railroad at Dunlap, two miles down the tracks from Winterville. The SD&C never reached Danielsville or Carnesville; only the five miles between Smithonia and Five Forks was built. Other lines that Smith considered, but did not ultimately build, included a Danielsville-Hartwell connection and a line from Smithonia to Augusta. The Augusta line would have passed through Sandy Cross, Danburg, and Lincolnton. Smith considered building his lines as narrow gauge, but changed his mind and constructed standard gauge tracks instead. In the 1894 edition of The Official Railway List, the SD&C and the S&D jointly reported operating 20 miles of railroad with 2 locomotives, 1 passenger car, and 8 freight and miscellaneous cars. Smithonia was described in Allen D. Candler and Clement A. Evans' Georgia, an encyclopedia published in 1906: |"Smithonia, one of the important towns of Oglethorpe county, is about eight miles northwest of Lexington. It is the terminus of the Smithsonia, Danielsville & Carnesville and the Smithonia & Dunlap railroads, and in 1900 had a population of 200. It has a number of good stores, some factories, schools, churches, etc., a money order post office, and handles a large volume of freight." Poors 1917 Manual reported the SD&C as operating 4.3 miles of track with equipment consisting of two locomotives and eight cars. The railroad’s offices were noted as being in Colbert and its president was indicated as James M. Smith. Farmer Smith, however, had died in 1915 and his SD&C was abandoned the next year. While Smith was undeniably successful as a farmer, businessman, railroad builder, and self-made man, much of what he accomplished was built through the use of forced labor. He was a leading figure in Georgia's barbarous convict leasing schemes in the years after the Civil War, and he defended that system and profited from it. The self-made man contributed mightily to the unmaking of others.
<urn:uuid:1c6b4f1a-04fd-4156-b68a-c2b1d3a1fecc>
CC-MAIN-2016-26
http://railga.com/smitdan.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783408828.55/warc/CC-MAIN-20160624155008-00036-ip-10-164-35-72.ec2.internal.warc.gz
en
0.98124
633
2.5625
3
Rachel E. Baden In reflecting on my own experiences as a college student, graduate student, and now as an instructor in psychology, I’ve come to appreciate the value in intellectual exchanges – both in and out of the classroom. Those conversations draw connections between science, theory, and daily life, have direct applications, and foster critical and creative thinking. My goals as an instructor are to provide learning opportunities and to create a learning environment that facilitates these objectives. Moreover, I believe that I am most able to meet my teaching goals when I approach teaching expecting to learn. Drawing connections between science, theory, and everyday life In psychology, I believe that helping students draw connections between science, theory, and daily life is a key goal. In some ways, psychology’s intuitive appeal both helps and hinders progress towards this goal. On one hand, concepts in psychology seem to naturally hit on students’ interests. It is rare to find a student who has absolutely no opinion about basic questions of human nature: Why do good people do bad things? How do we learn new things? How is it that some people get stuck in depression and seem unable to disentangle themselves? The list goes on. While psychology’s intuitive appeal certainly guarantees rousing classroom discussions, its intuitive appeal can also lull students into intellectual complacency and result in the laying-aside of empirical evidence and the blurring of connections between science, theory, and practice. To counteract this, I attempt to link students’ natural observations to research – sometimes even my own. For example, in discussing social learning theory and the development of aggression in children, I highlight my own research suggesting that children learn aggressive conflict behaviors by observing their parents engage in aggressive marital conflict and parenting behaviors. Moreover, I attempt to highlight how psychologists through the ages have made observations, developed theories, and tested their theories to provide empirical support for our everyday, “commonsense” observations. I believe that helping students identify these links between theory, research, and their lives is essential. Highlighting direct applications Not only is it important for students to understand how theory and research might support or contradict their real life observations, but it also essential – and exciting – when students begin to apply psychological concepts to their own life. I believe that my job as an instructor is to help material come alive for students in this way. Through classroom discussions, I have observed that highlighting personal applications of psychological principles and asking students to volunteer their own engages students more deeply and enhances their encoding of course material. I also try to help students apply concepts to their own life by assigning periodic reaction papers that take a personal turn. For example, instead of asking students to recapitulate the major learning theories in their papers, I ask them to tell me about something they have learned and how they learned it – either through classical conditioning, operant conditioning, or observational learning. Likewise instead of asking for their simple reactions to the Zimbardo prison study, I ask them to tell me how they would behave as a prisoner or guard and how sure they are in their prediction. I am pleasantly pleased with the degree to which students, as a whole, draw parallels with their own lives and express increased insight about their own capacities to do wrong. Think critically and creatively about psychological concepts I believe that students who are engaged in academic material at a personal level will be more likely to think critically and creatively about those same concepts. I often attempt to ask questions that will lead students to engage with material in this way. For example, in discussing research findings regarding the stability of temperament and attachment over the lifespan, my class then turned to a discussion of what factors or experiences might lead to changes in these two domains. Students shared various personal experiences (e.g., parental divorce seemingly resulted in less secure attachment for one student), and we ultimately turned to the research in this area for empirical answers. In addition, I have found that even failed in-class experiments can prove useful in leading students to identify factors that could account for the results and to craft new research studies. Teaching as a learning experience I believe that I am most able to accomplish my teaching goals when I approach teaching as a learning experience for me. While I sometimes find myself bumping up against students’ limitations and needing to tailor the course accordingly, I also find myself surprised and gratified by students’ insightful comments and creative questions. It is a joy when students lead me to think about psychological concepts in new ways, and at these times, I see that I can push their intellectual boundaries even more. I think that it is important for me to share my appreciation for students’ creativity and thinking and to see teaching as a mutual process of learning. I believe that this approach to teaching creates an environment of mutual respect where true intellectual exchanges can occur.
<urn:uuid:660aef80-d282-4589-a576-91fa624eca33>
CC-MAIN-2016-26
http://bama.ua.edu/~sprentic/695%20Baden%20teaching%20statement.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395548.53/warc/CC-MAIN-20160624154955-00002-ip-10-164-35-72.ec2.internal.warc.gz
en
0.965163
982
2.703125
3
Related National Standards Grade Level: 5-9 Estimated Time: One class period to watch each of the videos and take notes. Three days to research each animal and determine what information will be placed on the bulletin board. Two days to construct the display. Several days to complete the student descriptions. The Amazon basin is filled from top to bottom with life. New species are discovered each year in the rainforest, and scientists guess that less than half of the existing species have been described. Many of these organisms have remained unknown due to the remoteness of their habitat. For example, many rainforest species live only at the tops of tall trees unseen from the ground, while others live about half way to the top, making it extremely difficult to stop and look for them. In this activity, students will research the characteristics of a variety of rainforest organisms and present their research findings to the group. As a class, they will construct a bulletin board that places the animals by their position in the environment, gives information about each animal, and shows their interrelationships. - Research a plant or animal from the rainforest and identify its physical location within the rainforest (e.g., canopy, etc.). - Understand that different organisms live in different layers of the rainforest. - Contribute information to a group project about the organisms in a rainforest. - Make a presentation about their organism to the class. - "Journey Into Amazonia" video - Construction paper in various colors - Art tissue paper (especially browns and greens but other colors also) - Markers, colored pencils, crayons - Tag board - Scissors, rulers, glue - Reference materials: encyclopedias, magazines, Internet Students will research one of a number of organisms that live in the Amazon rainforest. For younger students, a list of organisms should be provided, though older students should be able to identify appropriate organisms on their own through reading or by watching the video. A list of possible plants and animals is provided below. Students should collect information on index cards that are labeled with general topics on the top, factual information on the lines and bibliographic details on the back. It is recommended that you consult with your school's English teachers so that the cards are consistent with the research format being taught in students' other classes. A collection of between 10 and 30 cards should prove sufficient information. The cards should then be condensed so that each organism is represented by one index card on the bulletin board display. The bulletin board should have a dark green background. Tree trunks are made from rolled newspaper covered with brown tissue paper. Rolled paper bags resemble vines. Construction paper backed with florist's wire with tissue paper fronds represent ferns. Bromeliads may be made from toilet paper rolls with layers of construction paper and tissue. Flowers are constructed from tissue. Animals are usually represented by drawings. The plant materials should be attached to the board first and the animals last. The information cards are placed along the outside edges with a string running from the organism to the card. After completion of the display, students should present a short description of their research to their class or to classes of younger students. Selected Organisms For Research: - Plants: Fern, Brazil Nut, Banana, Cecropia, Strangler fig, Palm trees (many varieties), Coffee, Kapok, Cocoa, Orchid, Vanilla, Bromeliad, Passion flower, Philodendron, Breadfruit, Cashew, Manioc, Yucca, Heliconia, Mahogany, Rubber - Animals: Anaconda, Ant, Anteater, Beetle, Boa constrictor, Pit viper, Butterfly, Fer de Lance, Capybara, Caiman, Coatamundi, Cockroach, Electric eel, Catfish, Frog, Pink dolphin, Katydid, Grasshopper, Monkeys (many varieties), Jaguar, Kinkajou, Puma, Macaw, Parrot, Crow, Manatee, Mosquito, Bot fly, Parrot, Tarantula, Bat, Termite, Sloth, Quetzal, Toucan The rainforest exists through nutrient recycling. The soil is extremely poor, and thus doesn't always supply the nutrients required for plant growth. As plants die, their parts are quickly decomposed and the next generation of plants recycles the nutrients they contained. Without this process, the soil is too poor to support sustained plant growth. Near the rivers, plants grow quickly into a dense mass of vegetation that absorb the available sunlight. Trees reach to the sun and spread wide branches with large leaves to absorb the energy. Away from the rivers, the floor of the rainforest is dark with less than 5% of the available sunlight filtering to the ground at noon. Thus the forest floor is fairly clear of thick vegetation and the tree trunks rise high to the canopy above. The rainforest is layered with the thickest layer being the highest. At the floor is the herb layer that contains small grasses and other plants up to several feet high. The shrub layer rises above the herbs to a height of about 20 feet. This is composed of short trees and bushes. Far above is the understory, an area of medium height trees. At the top is the canopy, a wide and unbroken expanse of leaves at a height of 100 feet or more. Most of the animals in the rainforest live in only one of the vegetation zones. The canopy is the most populated area. Due to the difficulties in reaching and moving through the canopy, much of the life in this region is unknown. Even more difficult to reach is the understory layer. Trees in this area are relatively far apart, will not support much weight and hard to climb. Some contain nests of biting ants. Since the canopy prevents studies from being done from above and the weak trees prevent researchers from climbing, a lot of life in the rainforest is virtually unknown. Most of the exploration of the rainforest has occurred in the herb and shrub layers. - Teachers should begin with a review of the biomes of the earth. Using either a wall map or smaller printed maps and research materials, identify the areas of rainforest around the world. If students need help identifying rainforests in other areas of the world, they might visit the Rainforest Action Network site at http://www.ran.org/ran/info_center/factsheets/k1.html. A Fact Sheet at this site will inform students that tropical rainforests are located around the equator, from the Tropic of Cancer in the north, to the Tropic of Capricorn in the south. The largest rainforests are in Brazil (South America), Zaire (Africa) and Indonesia (islands found near the Indian Ocean). Other tropical rainforests lie in Southeast Asia, Hawaii and the Caribbean Islands. The Amazon rainforest in South America is the world's largest, covering an area about two-thirds the size of the continental United States. - Watch all or parts of the "Journey To Amazonia" videos. To select appropriate segments of the film for your class, visit "About The Series" on this Web site. Because all the episodes of the program contain information about plant and animal life in the rainforest, teachers may want to narrow the focus to aquatic life, life in the canopy, etc. - While watching the video(s), students should note the wide diversity of plants and animals in the Amazon basin by listing in their notebooks the names of plants and animals and the portion of the rainforest they inhabit. - Students will select or be assigned an organism from a list of organisms to research. Research may be done in books, magazines or over the Internet. Begin with the sites listed below and with the content elsewhere on this Web site. - Students will prepare a color drawing and/or model from the provided materials for use on the display board. - Students will prepare a 5x8 inch card giving information about the organism. - Students will post their organism in the proper position on a classroom bulletin board. The information card will be placed on the perimeter of the board with a string connecting the information to the organism model. - Students will prepare a 2 to 5 minute presentation for the class about their organism. The presentation should provide general characteristics and identify the organism's diet. - Colored yarn may be used to connect organisms to one another to illustrate the concepts of a food web, commensalism, symbiosis, competition for resources, or predator-prey relationships. Different colors can be used to represent different relationships. Student assessment should be done on a matrix grid. Students' note cards should have subject headings, bibliographic information and factual information. These may be evaluated by completeness of the card and by the number of cards in an objective manner. The bulletin board portion should be assessed subjectively with the emphasis being on the proper placement of the organism. The presentation should be graded with an emphasis on the characteristics of the organism and its relationship to its surroundings. - In schools with computer labs, technology may be integrated with the use of presentation software. These presentations emphasize organizational and outlining skills. Most of them allow the presentation to easily be published in the HTML language for use on a school Web site. - Students might play the Amazon Explorer game found on this Web site and use this game as a model for their own online game. Using their newfound rainforest knowledge, students might create a "choose-your-own-adventure" type of game, or a game more closely tied to one particular layer of the rainforest. Related National Standards This lesson addresses the following national standards found in the McRel Standards Database at http://www.mcrel.org/standards-benchmarks/ : - Knows that plants and animals have features that help them live in different environments - Knows that animals and plants have a great variety of body plans and internal structures that serve specific functions for survival (e.g., digestive structures in vertebrates, invertebrates, unicellular organisms, and plants) - Knows that living things are found almost everywhere in the world and that distinct environments support the life of different types of plants and animals - Knows ways in which species interact and depend on one another in an ecosystem (e.g., producer/consumer, predator/prey, parasite/host, relationships that are mutually beneficial or competitive) - Knows relationships that exist among organisms in food chains and food webs
<urn:uuid:f6ae5e1d-c488-446e-9ca0-6c7ae1af9db2>
CC-MAIN-2016-26
http://www.pbs.org/journeyintoamazonia/teacher_levels.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396459.32/warc/CC-MAIN-20160624154956-00136-ip-10-164-35-72.ec2.internal.warc.gz
en
0.917767
2,181
4.21875
4
Philippines - Every Island is an Adventure The Philippines is an island country in Southeast Asia in the Western Pacific Ocean, which is an archipelago with 7,107 islands. The country shares its borders with Palau, Malaysia, Indonesia, China, and Vietnam. The people of the Philippines have diverse ethnicity, which also implies a multiplicity of dialects. That being said, the country is also one of the most populous in the world. A Quick Glance into Early Philippine History The earliest inhabitants of the country are Australo-Malenesian and are known as Negritos. They have inhabited the islands even before Europeans along with other settlers from neighboring countries. It is evident that even from the ninth century these early settlers had cultural and trading relations with people from India, Malaysia, Indonesia, and China. Islamic communities were also established in various parts of the country, mainly on the southern areas of the country. Spaniards arrived in the islands in the 16th century. Portuguese explorer, Ferdinand Magellan, reached the islands on 1521 under the commission of Spain. He was later killed in a battle with Lapu-Lapu, a Rajah in one of the islands. Successive expeditions went on and Spanish settlements were established. Manila was brought under Spanish rule in 1571 while the rest of the archipelago was being reigned in and united for the very first time. Spanish rule was marked by revolts at various periods in the country’s history even until the outbreak of the Spanish-American War. When the war reached the country, it only signaled a change of colonial masters and not independence. The proclamation of the first Philippine Republic in 1899 only lead to the Philippine-American War and was ended in 1901. The Philippine Commonwealth was later established but was interrupted during the Japanese invasion in World War II. The Japanese occupation only lasted three years but left a massive devastation in its wake. The country was granted its long sought independence from US control in 1946. Visiting the Philippine Islands You should expect a generally tropical weather, which is usually hot and humid, when you visit the country. Temperatures in the Philippines average around 26 degrees Celsius. There are two pronounced seasons in the country, the wet and dry seasons. However, some destinations may not necessarily have distinguished seasons. The dry season is usually from March to May while the wet season runs from June to November. The wet season is marked by heavy rains and tropical storms. There is also a cold season running from December to February. The Philippines has a lot of interesting dive sites all over the archipelago. The provinces of Palawan and Bohol alone have sites to excite and astound reef, open water, wreck, and cave divers. The beaches of Boracay and Puerto Galera have attained world renown and are popular destinations during the hot summer months. A hike to the mountain city of Baguio is warranted for those who are nostalgic for cold mountain air. The captivating Chocolate Hills is also another tourist site that has attained world fame. The Ninoy Aquino International Airport and the Cebu-Mactan International Airport are two of the busiest airports in the country with flights served from various domestic and international destinations. Other means of inter-island travel are passenger ferries, which are obviously cheaper. There are a lot of accommodations available in the country especially in locations where tourism is a major industry. International hotels like the Shangri-La Hotel and Regency Hotels are around to cater to business or leisure needs. Restaurants around the country serve a dazzling array of different cuisines. You can mix and match different dishes at times making a gastronomic adventure of your very own. Money changers are almost everywhere so you won’t have to worry about changing your money into the local currency. Major banks in the Philippines include Bank of Philippine Islands, Equitable PCI Bank, Philippine National Bank, and Metrobank. International ATM consortia like PLUS and Cirrus are accessible through local ATMs. Warm Hospitable Greetings of Mabuhay Visitors will surely experience the Filipino trademark of hospitality wherever they go in the country. Visitors will often be greeted with ‘mabuhay’, which denotes a warm hospitable hello that will be remembered long after the gesture was extended. Comprised of 7,107 beautiful islands, the Philippines features a bevy of wonderful and popular tourist destinations. As a nation that primarily thrives on ecotourism, it is not surprising anymore that it has invested a lot of money and other available resources in beautifying as well as developing its various offerings. As the years go by, more and more people from the different parts of the world flock to this place in search for something that they can truly call home. Through the joint efforts of the various local governments as well as their local residents, the different tourist destinations continue to flourish and blossom up to this very moment. Palawan, Bohol, and Boracay Island are just some of the many wonderful tourist spots that can be found in this country. Moreover, tourists and guests just cannot get enough of the spectacular beauty and features of places like Tagaytay, Puerto Galera, and Panglao. Furthermore, local and foreign visitors annually visit outstanding attractions like the Mayon Volcano, Banaue Rice Terraces, and Taal Volcano. Tourism is just one of the major specialties of the Philippines because of its rich natural environment and surroundings. The different features and customary practices of places like Aklan, Baguio, and Ilocos Norte have shown the rich and colorful history of the country. At the same time, the clean and clear bodies of water in Davao, Zamboanga, and Pangasinan have provided tourists and guests enough reasons to return for more wonderful and memorable experiences in the future. Based on statistics, the tourism industry in the Philippines continues to grow at a rapid pace. Since 2000, the trends are looking bright for the country, recording outstanding profits and revenues on an annual basis. One of the main reasons behind this positive trend is the continued support being provided by the Philippine government on localities and provinces to improve their natural treasures and attractions. Furthermore, local residents have continued to support the government’s plan to improve the general status of tourism in the country. Furthermore, the Philippines is also known for hosting some of the biggest entertainment events. Since 2005, several countries have been taking an active part in the World Pyro Olympics, which has drawn a serious volumes of crowds and spectators year in and year out. At the same time, international beauty competitions such as the Miss Earth beauty pageant is held in a country where beauty and brains are greatly appreciated. Additionally, tourists and guests should watch out for the other exciting places to visit in the Philippines. The beautiful and old churches in Intramuros, the highly industrialized business hub in Makati, and the sweet-looking Chocolate Hills of Bohol are main attractions that should not be missed. At the same time, the Banaue Rice Terraces in Ifugao, the Hanging Coffins of Sagada in the Mountain Province, and white sandy beaches of Boracay are major reasons why the Philippines is truly a place worth visiting. There are several things to consider when finding good accommodations especially if you're on a budget. Tourists should consider distance, cost, cultural familiarity, and crime rates among other things when looking for a place to stay.
<urn:uuid:17814e3e-19ea-4b0e-844b-84cfed3f33d1>
CC-MAIN-2016-26
http://www.philippinesboard.com/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403508.34/warc/CC-MAIN-20160624155003-00131-ip-10-164-35-72.ec2.internal.warc.gz
en
0.96293
1,536
2.875
3
Desiccant substances are often contained in desiccant packs which are used to decrease humidity for a variety of applications. A desiccant is able to attract water from its immediate environment, thereby maintaining a state of dryness within a contained space. There are two chemical drying processes describing desiccant action: absorption and adsorption. Although chemicals that dehumidify by either absorption or adsorption produce similar results, the scientific reasons that desiccants work are decidedly different. Absorption occurs when one substance becomes part of another, while adsorption occurs when a physical bond is created between two substances, holding one within the other. Most desiccants, like silica gel, montmorillonite clay, activated charcoal and products which function as a molecular sieve, work to adsorb moisture to their porous surfaces. How Are Desiccant Packs Used? Desiccants are used mostly to stabilize environmental moisture conditions in packaged products. Many products need to be kept dry since the presence of moisture can create contamination, resulting in damage. Desiccant packs are commonly used for food, fabrics, electronics, leather articles, tools, pharmaceuticals, sporting goods, scientific instruments, historical artifacts, artwork, film and manuscripts. Shipping is one of the most common applications in which desiccants, especially silica gel, are used. Indicating silica gel shows that moisture is present by changing colors when exposed to it. Activated charcoal is a particularly good desiccant for use in water or air filters. Montmorillonite clay is widely used to prevent animal feeds from clumping. A desiccant is classified as a molecular sieve when it has the ability to differentiate molecules to be filtered, on the basis of their size. A molecular sieve can adsorb molecules from both gases and liquids, making it ideal for separation of compounds and drying of reactive materials, such as required by flammables industries like oil and petroleum. Selecting The Appropriate Desiccant Pack For Specific Uses Selection of a desiccant should be based on the characteristics of both the packaging and product that it will be protecting, in addition to the characteristics of the desiccant itself. Environmental factors to which the product may be exposed, as well as desiccant size and the material from which desiccant packs are made, are some factors to consider. Indicating silica gel is typically sold in granular form, since it needs to be seen in order to accomplish its purpose. However, indicating silica gel should never be used with consumable goods, due to the presence of the toxic salt, cobalt chloride. Other desiccants like silica gel, activated charcoal and montmorillonite clay are produced in a wide variety of sizes and their desiccants packs can be selected from various materials.
<urn:uuid:11521707-0e0f-42c2-ae2e-e0f60f8cb5b3>
CC-MAIN-2016-26
http://desiccantpacks.org/desiccant-types/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391519.0/warc/CC-MAIN-20160624154951-00077-ip-10-164-35-72.ec2.internal.warc.gz
en
0.953447
576
4.03125
4
Definitions for ganglioside galactosyltransferase This page provides all possible meanings and translations of the word ganglioside galactosyltransferase In enzymology, a ganglioside galactosyltransferase is an enzyme that catalyzes the chemical reaction The 2 substrates of this enzyme are UDP-galactose and N-acetyl-D-galactosaminyl--D-galactosyl-1,4-beta-D-glucosyl-N-acylsphingosine, whereas its 2 products are UDP and D-galactosyl-1,3-beta-N-acetyl-D-galactosaminyl--D-galactosyl-D-glucosyl-N-acylsphingosine. This enzyme belongs to the family of glycosyltransferases, specifically the hexosyltransferases. The systematic name of this enzyme class is UDP-galactose:N-acetyl-D-galactosaminyl--D-galac tosyl-D-glucosyl-N-acylsphingosine beta-1,3-D-galactosyltransferase. Other names in common use include UDP-galactose-ceramide galactosyltransferase, uridine diphosphogalactose-ceramide galactosyltransferase, UDP galactose-LAC Tet-ceramide alpha-galactosyltransferase, UDP-galactose-GM2 galactosyltransferase, uridine diphosphogalactose-GM2 galactosyltransferase, uridine diphosphate D-galactose:glycolipid galactosyltransferase, UDP-galactose:N-acetylgalactosaminyl-, galactosyl-glucosyl-ceramide galactosyltransferase, UDP-galactose-GM2 ganglioside galactosyltransferase, and GM1-synthase. This enzyme participates in glycosphingolipid biosynthesis - ganglioseries and glycan structures - biosynthesis 2. U.S. National Library of Medicine Catalyzes the final step in the galactocerebroside biosynthesis pathway. The numerical value of ganglioside galactosyltransferase in Chaldean Numerology is: 5 The numerical value of ganglioside galactosyltransferase in Pythagorean Numerology is: 1 Find a translation for the ganglioside galactosyltransferase definition in other languages: Select another language: Discuss these ganglioside galactosyltransferase definitions with the community: Word of the Day Would you like us to send you a FREE new word definition delivered to your inbox daily? Use the citation below to add this definition to your bibliography: "ganglioside galactosyltransferase." Definitions.net. STANDS4 LLC, 2016. Web. 30 Jun 2016. <http://www.definitions.net/definition/ganglioside galactosyltransferase>.
<urn:uuid:e30182dc-4301-42ea-af53-a17a0a45e1b9>
CC-MAIN-2016-26
http://www.definitions.net/definition/ganglioside%20galactosyltransferase
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399428.8/warc/CC-MAIN-20160624154959-00008-ip-10-164-35-72.ec2.internal.warc.gz
en
0.729422
679
2.53125
3
LONDON – The oldest known copy of the Bible has been published online. Religious scholars haved noted some differences from the modern version. Museum officials from London, Germany, Russia, and Egypt have finally brought together pieces from the world’s oldest Bible, the Codex Sinaiticus. During the 4th century, the codex was split into several pieces which were spread to the farthest corners of the known world. Four of those pieces have been digitized and brought together online for the first time in centuries. The fifth and final piece, containing much of the Old Testament, is still lost to history. Legend says that if the Codex is completed it will release a power capable of destroying the Earth. Researchers dismiss this as pure superstition The Codex Sinaiticus, being the oldest known Bible, contains many typos, revisions, corrections and additions which chronicle the history of the development of Christianity. Much of what is in the Codex has been left out of modern Bibles, such as: Moses repeatedly asking God for directions during the Exodus. Moses’ questioning of God culminates in a long discussion the two have on the shores of the Red Sea. The conversation revolves mostly around Moses complaining about sore feet and asking about the practicalities of parting an ocean. This only slows down the story of the Exodus and offers little enlightenment, so it is understandable why it was cut. Jesus and the Disciples gambling in Myceanea. Included in the Gospel of Mark is the story of Jesus and the Disciples on a weekend gambling trip to Myceanea. Not long before Jesus knew he would be crucified, he took the 12 men who had been following him for years for a weekend getaway. According to the story, there was some confusion over room service charges, and James the Lesser had to be brought back to life after beating a local thug in a game of dice. In the end they donated all their winnings to the needy and Christ magically removed their hangovers. Adam and Eve trying to break back in to the Garden of Eden. The Codex tells of Adam and Eve, aging and fearing their impending mortality, attempting to break in to the Garden of Eden to get to the Tree of Life. God and His Angels stood back silently and watched as the elderly man and woman struggled to get over a 12 foot wall, with no success. Graphic descriptions of sea sickness on Noah’s Ark. Apparently Noah, his family, and two of every species that walks the earth got sea sick for 40 days and 40 nights aboard the ark. Included in the Codex are strongly graphic and incredibly detailed descriptions which had been passed down from generation to generation. This would also explain how so many animals were able to live together without killing each other for 40 days. The reunited Codex can be found online for now, while the 4 remaining pieces are safely kept at opposite corners of the world.
<urn:uuid:673618ba-2108-4548-a319-50459d2de999>
CC-MAIN-2016-26
http://weeklyworldnews.com/headlines/9725/oldest-known-bible-goes-online/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395346.72/warc/CC-MAIN-20160624154955-00069-ip-10-164-35-72.ec2.internal.warc.gz
en
0.97025
594
2.796875
3
Transition from School to Adult Life information | links and resources Realizing successful post-secondary outcomes is a goal we have for all students. Depending on the disability and the support services required in adult life, successful transition from high school to adult life may require that planning activities begin in elementary school with students exploring their interests in middle school. Starting the process early prepares students with disabilities to think about what they want to be able to do in adult life. High school transition planning includes exploring post-secondary opportunities and employment options and may include connecting with the adult service agencies that may provide the student with services when he or she graduates or turn 22 years of age. Statement of Needed Transition Services - beginning no later than the first IEP developed when the eligible student is 14. Recognizing the need for students with disabilities to engage in effective transition planning, the Individuals with Disabilities Education Act (IDEA) requires that transition planning be part of the Individualized Education Program (IEP). Beginning no later than the first IEP developed when the eligible student is 14, the Team considers the student's need for transition services and documents this discussion. If appropriate, the IEP includes a statement of needed transition services. The school district understands that it must maintain documentation of a full discussion of the student's transition needs, whether or not such discussion identifies needed transition services for the IEP. Such documentation must be reviewed and updated annually thereafter. Students must be invited to all educational meetings and allowed to participate actively when transition planning is discussed. Linkages to Post School Options - beginning no later than the first IEP developed when the eligible student is 14 and update annually. Beginning no later than the first IEP developed when the eligible student is 14, the IEP's of students should include a post school vision statement as well as identify the transition services necessary to support the vision. IDEA 2004 defines transition services as a coordinated set of activities for a student with a disability that - - Is designed to be within a results-oriented process, that is focused on improving the academic and functional achievement of the student with a disability to facilitate the student's movement from school to post-school activities, including post-secondary education, vocational education, integrated employment (including supported employment), continuing and adult education, adult services, independent living, or community participation; - Is based on individual strengths, preferences and interest; and - Includes instruction, related services, community experiences, the development of employment and other post-school adult living objectives, and when appropriate, acquisition of daily living skills and functional vocational evaluation. (P.L. 108-446, Sec 603 (34)) Transition Planning Form Use the Transition Planning Form (TPF) 28M/9 for all students with IEPs who are 14-22 years of age. The TPF (28M/9) is a mandated form that is maintained with the IEP in the student's file but is not part of the IEP. The TPF is a flexible discussion guide that encourages the entire IEP Team to work together to assist the student in making a smooth transition to adult life. Although the Department mandates that the TPF must be used by the Team to guide the transition planning discussion, what is written on the TPF itself does not spell out specific responsibilities for what will occur; the TPF is a planning tool and not the transition plan itself. Once the TPF is complete, the Team uses the TPF to create the transition plan that is formally documented in the IEP, specifying the services that the school will provide. This inclusive planning process does not require that all identified actions will be the responsibility of the school's special education program. Instead, the entire Team - parents, the student, general education services, other agencies, community partners, and special education services - all work together to provide opportunities that will help the student to gain skills and move closer toward achieving the student's postsecondary goals (i.e., the student's vision for life after high school). The Team should discuss and complete the TPF before completing the IEP form. The students' postsecondary goals should be recorded on page one of the TPF in the "Post-Secondary Vision" box. Once the TPF is complete, the IEP Team transfers the postsecondary goals to the Vision Statement on IEP 1. Also on page one of the TPF, the Team documents the student's disability-related skills that may require annual IEP goals and/or related services. There is no requirement that every disability-related need have a corresponding annual IEP goal. One year's IEP should contain only those annual IEP goals that a student can reasonably be expected to accomplish in one year's time. The TPF and IEP must be updated every year. Discussing and mapping out the Action Plan on page two of the TPF can help the team to fully understand and articulate the intersection between the student's postsecondary goals, the student's skills and disability-related needs, and the supports and services that the student requires in order to achieve his/her desired postsecondary outcomes. For a more comprehensive discussion of the TPF and IEP, please see Technical Assistance Advisory SPED 2013-1 and Technical Assistance Advisory SPED 2014-4. Age of Majority - transfer of parental rights to student at age 18 In Massachusetts, regardless of the severity of their disability, students are considered adults and competent to make their own decisions at age 18 (Age of Majority). Unless there is a court appointed guardian or the student has chosen to share decision making with his or her parent, the school district must seek the consent of the student to continue the special education program. Students at age 18 have the right to make their own educational and medical decisions and must sign all consent forms. Parents and students must be notified about the transfer of parental rights to the student at least 1 year before the student turns 18 years of age. Interagency Collaboration - develop supports and services necessary for adult life The adult service system is complex and understanding it is essential for effective transition planning. When students with disabilities graduate from school or turn 22 years of age, they move from an entitlement to a non-entitlement system. While in school students receive services and supports mandated by federal and state law. As adults, while they may be eligible for services from adult service agencies, these services are not an entitlement which means they are not guaranteed. Consequently, it is essential that educators, parents and students understand the adult service system years before adult services need to be accessed. It is a sound practice to invite adult service agencies to speak to groups of students and individuals who live with and work with students with disabilities in order to understand the eligibility processes specific to each agency as well as the services that are available to adults with disabilities. Adult Services - make Chapter 688 Referrals and general referrals For students with severe disabilities, a Chapter 688 referral should be made to ensure that students who will require ongoing supports and services from one or more public agency are part of the eligibility process for receiving services and supports as adults. For other students who require fewer supports and services and may not meet the eligibility requirements for Chapter 688, a general referral for services can be made to adult service agencies. Appeals can be made to the Bureau of Transitional Planning (BTP) relative to decisions about eligibility and the ITP. For more information call BTP at 617-573-1722. Council for Exceptional Children (Division on Career Development and Transition) DCDT focuses on the career development of children, youth and adults of all ages and exceptionalities, including transitions and career development of exceptional children. The National Center on Secondary Education and Transition (NCSET) The National Center on Secondary Education and Transition (NCSET) coordinates national resources, offers technical assistance, and disseminates information related to secondary education and transition for youth with disabilities in order to create opportunities for youth to achieve successful futures. National Collaborative on Workforce and Disability for Youth (NCWD/Youth) The National Collaborative on Workforce and Disability for Youth (NCWD/Youth) assists state and local workforce development systems to better serve youth with disabilities. The NCWD/Youth is composed of partners with expertise in disability, education, employment, and workforce development issues. NCWD/Youth is funded by a grant from the U.S. Department of Labor's Office of Disability Employment Policy (ODEP). Office of Disability Employment Policy (ODEP) Through the Department of Labor (DOL) The Office of Disability Employment Policy (ODEP) provides national leadership by developing and influencing disability-related employment policy as well as practice affecting the employment of people with disabilities. Students with Disabilities Preparing for Postsecondary Education: Know Your Rights and Responsibilities The Office for Civil Rights (OCR) in the U.S. Department of Education is providing the information in this pamphlet to explain the rights and responsibilities of students with disabilities who are preparing to attend postsecondary schools. National Secondary Transition Technical Assistance Center (NSTTAC) NSTTAC assists states in building capacity to support and improve transition planning, services, and outcomes for youth with disabilities. information | links and resources
<urn:uuid:be31a14d-280c-4e2e-a3ed-e4beb3d5b15f>
CC-MAIN-2016-26
http://www.doe.mass.edu/sped/links/transition.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399106.96/warc/CC-MAIN-20160624154959-00188-ip-10-164-35-72.ec2.internal.warc.gz
en
0.94387
1,900
2.71875
3
View related sites Why Cambridge English? Grade statistics give the average percentages in each grade for all sessions of a particular exam by country or territory. This information helps researchers understand how our exams perform and is helpful to teachers who want to understand how students perform in a test in their country or region. Please note: these statistics do not include absent, partial absent or ungraded candidates.
<urn:uuid:f8c43f30-4d9c-405c-8204-5e65afaa71c5>
CC-MAIN-2016-26
http://www.cambridgeenglish.org/research-and-validation/quality-and-accountability/grade-statistics/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783394987.40/warc/CC-MAIN-20160624154954-00003-ip-10-164-35-72.ec2.internal.warc.gz
en
0.909572
78
2.578125
3
A leading cause of cancer deaths worldwide, colon cancer is famously resistant to treatment. There are many reasons for this, but one has to do with a group of persisting cancer cells in the colon that cause relapses. Conventional therapies against them are mostly ineffective. EPFL scientists have now identified a biological mechanism that can be exploited to counteract colon cancer relapses. The approach activates a protein that is lost in the persisting cancer cells. The researchers were able to reactivate it using vitamin A, thus eliminating the cancer cells and preventing metastasis. The study is published in Cancer Cell, and introduces a new way to treat colon cancer. When a colon-cancer patient receives treatment, e.g. chemotherapy, most of the cancer cells die off. But the genetic mutations that caused the cancer in the first place can survive in a specific group of cells of the colon. These are actually stem cells, meaning that they are premature cells waiting to grow into full-blown, normal cells of the colon. After cancer treatment ends, the surviving stem cells, still containing the cancerous mutations, can reappear and cause a relapse. The lab of Joerg Huelsken at EPFL studied how differentiated colon cells come from stem cells in the gut. Using an array of different techniques, the team looked at cells, mouse models and samples from human patients. Proteins and signaling pathways The study focused on a protein called HOXA5, which belongs to a family of proteins that regulate the development of the fetus. These proteins are made during early development and work together to make sure that every tissue is correctly identified and that the fetus's body and limbs are patterned properly. In the adult body, proteins like HOXA5 regulate the body's stem cells to maintain both the identity and function of different tissues. Huelsken's team found that in the gut, HOXA5 plays a major role in restricting the number of stem cells, as well as the cells that make them. Like all proteins, HOXA5 originates from a specific gene. The study showed that the cancerous stem cells of the colon use a biological mechanism that blocks it. This mechanism is called a "signaling pathway" because it involves a domino of molecules, each activating the next one down the line. The purpose of a signaling pathway is to transmit biological information from one part of the cell to another, e.g. from the outer membrane all the way to the nucleus. By blocking the HOXA5 gene, the cancerous stem cells of the colon can grow uncontrollably and spread, causing relapses and metastasis. Retinoids: a way to fight back The researchers looked for ways to reverse the blocking of HOXA5. The answer came from vitamin A. This small chemical structure is called a retinoid, and it has been known to induce differentiation of stem cells in the skin. The EPFL scientists found that retinoids can re-activate HOXA5. In mice that had colon cancer, the treatment with retinoids blocked tumor progression and normalized the tissue. By turning the gene for HOXA5 back on, this treatment eliminated cancer stem cells and prevented metastasis in the live animals. The researchers got similar results with samples from actual patients. The new study suggests that patients that may profit from this well-tolerated treatment can be identified based on their expression pattern for the HOXA5 gene. Retinoid differentiation therapy could be significantly effective against colon cancer, not only for treatment of existing disease but also as a preventive measure in high-risk patients. This study included contributions from EPFL's core facilities, Kyoto University, and the Japan Science and Technology Agency. It was funded by EMBO, the Swiss League against Cancer, the Swiss National Science Foundation and the NCCR in Molecular Oncology. Ordóñez-Morán P, Dafflon C, Imajo M, Nishida E, Huelsken J. HOXA5 Counteracts Stem Cell Traits by Inhibiting Wnt Signaling in Colorectal Cancer. Cancer Cell Dec. 14, 2015. DOI: 10.1016/j.ccell.2015.11.001
<urn:uuid:3d0850a2-b217-4e40-b085-83061840ace3>
CC-MAIN-2016-26
http://www.eurekalert.org/pub_releases/2015-12/epfd-tcc121115.php
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396538.42/warc/CC-MAIN-20160624154956-00122-ip-10-164-35-72.ec2.internal.warc.gz
en
0.935939
867
3.296875
3
Mauvide-Genest Manor National Historic Site of Canada Links and documents Listed on the Canadian Register: Statement of Significance Description of Historic Place Mauvide-Genest Manor National Historic Site of Canada is located on the south coast of l’Île d’Orléans at 1451 chemin Royal in the municipality of Saint-Jean. Its site is sub-divided by the chemin Royal which circumnavigates the island. This road separates the smaller southern portion near the St. Lawrence River from the main northern portion between the road and a small wooded hill, on which a substantial 18th-century stone manor house is located. There are several later outbuildings on both segments of the property. Official recognition refers to the house and its legal lot. Mauvide-Genest Manor was designated a national historic site of Canada in 1994 because: - it is a particularly distinguished example of a mid 18th-century seigneurial manor in a rural setting; and, - closely associated with the nationally significant "les anciennes seigneuries de l'Île d'Orléans", it is witness to the importance of the seigneurial system under the French Regime. The heritage value of Mauvide-Genest Manor lies in the substantial 18th-century rural form, materials and setting of its residence, and in its illustration of land subdivisions of the French Regime seigneurial system. Although a later owner was likely responsible, both the land and the manor house appear have been gentrified during the 18th century. Through its size, proximity to the St. Lawrence River and a clear running stream, as well as its access to an established woodlot, the property displays all the characteristics of a rural seigneury along the St. Lawrence. Originally part of the seigneurie of l’Île d’Orléans, the Mauvide-Genest Manor property was created from an estate owned by Charles Genest. His grandson Jean Mauvide acquired part of the property in 1734, adding the southwest portion of the present property in 1752. When the residence was constructed, its façade was oriented towards the south where it overlooked a garden and the river. The gentrification of the property and the manor in the 18th-century, however, seems to have been completed by a subsequent owner. Although the manor complex lacks the substantial barn that typically separated such houses from an established road, the Mauvide-Genest Manor is a substantial residence that makes an important contribution to the historic ambience of l’Île d’Orléans. Sources: Historic Sites and Monuments Board of Canada, Minutes, July 1994, June 1995. Key elements contributing to the heritage value of the site include: - its location on l’Île d’Orleans near the St. Lawrence River; - the siting of the house on a rise; - the estate consisting of the main house and outbuildings set within a rural landscape; - the substantial two-storey rectangular massing of the manor’s main block under a steeply hipped roof broken by small dormer windows and two large chimneys; - the extension of the main block with a one-and-a-half-storey rear kitchen and a single-storey side chapel; - the nine-bay façade with regularly spaced wooden casement windows and two entry doors; - the stone and timber vernacular construction; - the surviving original finishes and craftsmanship; - the presence of surviving 18th-century interior furnishings and fittings; - evidence of the original interior layout “en enfilade”; - evidence of archaeological remains of earlier buildings; - the presence of a clear stream running through the property; - the presence of a sheltering wooded hill behind the manor proper; - the alignment of long narrow fields running back from the river; - the viewscapes from the site to the St. Lawrence River. Government of Canada Historic Sites and Monuments Act National Historic Site of Canada 1752/01/01 to 1752/01/01 Theme - Category and Type - Developing Economies - Extraction and Production - Expressing Intellectual and Cultural Life - Architecture and Design Function - Category and Type - Single Dwelling Architect / Designer Location of Supporting Documentation National Historic Sites Directorate, Documentation Centre, 5th Floor, Room 89, 25 Eddy Street, Gatineau, Québec. Cross-Reference to Collection
<urn:uuid:9a47707f-ea05-4b37-b96a-d4ddd670f892>
CC-MAIN-2016-26
http://www.historicplaces.ca/en/rep-reg/place-lieu.aspx?id=12024
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395546.12/warc/CC-MAIN-20160624154955-00142-ip-10-164-35-72.ec2.internal.warc.gz
en
0.919807
990
2.609375
3
It is well known that the gonadotropic hormone secreted by the pituitary gland play an important role in the maturation of the gonads and spawning of fishes. The Brazilians were the first to succeed in inducing spawning by injecting fish with pituitary extract. Several corps labeo rohita, L.bata, cirrhino mrigala, C.reba etc. were successfully breed by injecting pituitary extract. Now this technique is very popular in obtaining fish seed fro commercial purpose. In fishes pituitary gland lies in a well protected depression the myodome, as the floor of the skull. For getting the pituitary the upper part of the skull is removed by a knife or bone cutter. The brain is lifted to reach the gland, which is preserved for future use in one of the following method. Absolute alcohol in sealed tube in a dessicator at room temperature. Acetone, which dehydrates and hardens the gland. After 36 hours the gland is dried on a filter paper and stored in sealed phials in a refrigerator. Just before injected these glands are taken out and harmogenized in distilled water or 0.3% saline. The suspension is then centrifused and supernatant fluid is taken in a syringe and injected intramusculary as the back or base of the caudal fin.
<urn:uuid:4429c75e-2c1b-4905-a430-cf1accadc787>
CC-MAIN-2016-26
http://www.preservearticles.com/201104054941/short-note-on-induced-breeding.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396459.32/warc/CC-MAIN-20160624154956-00069-ip-10-164-35-72.ec2.internal.warc.gz
en
0.947124
285
2.734375
3
For many locals, Silicon Valley surrendered to the tyranny of development when it lost its last major fruit orchard in 1996. Olson's family cherry orchards, a 100-year player in the valley's agricultural history, shut down its main operations, and Deborah Olson mournfully told a local reporter then, "We're down to 15 acres at this point." There is a happy ending. With community support, the Olson family continues to sell its famous cherries at its fruit stand in Sunnyvale, Calif. Ultimately, Silicon Valley's history is predicated on a continual progression from industrial to post-industrial. Adding to the chaotic ferment and success, multiple sectors co-exist at different stages of maturity at any given moment. Before its industrial period, the region was an agrarian economy. At the height of the farming boom in the 1920s and 1930s, over 100,000 acres of orchards blanketed the valley. In 2006, farming continued to thrive across the broader San Francisco Bay Area in resilient specialty pockets, which included organic farms, gourmet cheese producers, and wine vineyards. Stett Holbrook reported that roughly 20,000 acres of agriculture remained, most of it clustered in southern Santa Clara County around Morgan Hill, Gilroy, and the Coyote Valley. New technologies and tools modernized local farming practices, so that what exists today is a far cry from efforts a century ago. Now the region produces 1.3 million tons of food annually, according to the Greenbelt Alliance. By the 1920s, as farms began to industrialize, a big push occurred next in manufacturing, namely in automobile production, shipbuilding, and food canning. The local auto industry shows a constant rise and fall. In the 1920s, Oakland became known as the "Detroit of the West" with factories operated by General Motors, Chrysler, Fageol Motor Company, and Durant Motors. All closed over the next 30 years or so, as the auto industry first consolidated to the Great Lakes and later shifted overseas, as well as the southeast. The Bay Area saw a resurgent interest in car manufacturing in the 1980s when Toyota – a complete unknown in the earlier era – teamed up with GM to open the New United Motor Manufacturing Inc. (NUMMI) plant in Fremont, Calif. Now 25 years later, Toyota announced that all NUMMI operations will close by March in response to recent economic pressures. NUMMI's closing is emblematic of the nature of employment change that accompanies broader industrial change. Currently, 4,700 people work at the auto factory, and another 50,000 people work for suppliers and other businesses that depend on NUMMI's ongoing operations. Local and state leaders are concerned about the larger regional impact. Over the last 12 months, the East Bay has lost 4,400 manufacturing jobs, a decline of 5 percent in that industry, according to the U.S. Bureau of Labor Statistics. In comparison, Silicon Valley lost 13,800 manufacturing jobs, an 8 percent decline. Bruce Kern, executive director of the East Bay Economic Development Alliance, told the press, "You have the jobs from suppliers and other vendors that provide goods and services to NUMMI." Most of these workers are stranded with skills only suitable for the industrial Silicon Valley, so Gov. Arnold Schwarzenegger announced that California state will focus on retraining them, as well as finding alternative uses for the roughly 5 million-square-foot NUMMI factory. On the other side of the Bay, Tesla Motors today is making the transition from a cottage to a production industry, and it has also shifted gears in its manufacturing plans. The highly subsidized company had originally planned to build an electric car factory in San Jose earlier this year, but Tesla is now close to a deal to build an electric car factory at the site of a former N.A.S.A. manufacturing plant in Downey, Calif., a blue-collar city south of Los Angeles. Shipbuilding offers a counter example. While efforts have largely vanished from the area, a few notable examples have survived in new form. For instance, Kaiser Shipyards in Richmond, Calif., developed a new medical system for its shipyard workers in WWII that eventually became the basis for Kaiser Permanente, a highly successful modern health care organization. Here is an early example of a company converting its business model from hardware to service. But the high point of the industrial era dates from the 1950s when U.S. defense contracts spurred the area's growth, building aerospace and other military equipment largely through Lockheed Martin. Then, as magnetic core memories were replaced by semiconductor memory chips in computers, semiconductor and chip manufacturing soared in the 1960s and 1970s, dominating the Valley with industrial fervor. By the late 1970s, however, Silicon Valley had lost its lead in memory chips, thanks to several revolutionary measurement tools from Hewlett-Packard's Japanese partnership. The Japanese soon took over the memory chip business, going from less than 10% to over 80% of worldwide chips in six short years. Today, the memory chip market is an $18 billion worldwide market with virtually no U.S. manufacturers. In order to thrive against this fierce competition, Silicon Valley companies had to re-invent themselves, such as Intel's adoption of the microcomputer chipsets now known as Pentium. Other areas of the information technology (IT) industry have also undergone reinvention. Charles House, in The HP Phenomenon, points out that Hewlett-Packard has re-invented itself six times in seven decades. Apple has also done so in spectacular fashion, first with computers, then with music, and now smartphones. Since 1976, Apple has gradually evolved from a computer hardware manufacturer into a consumer electronics company. The company originally handled most manufacturing locally, but by 1992, Apple had closed its plant in Fremont, Calif., and moved all operations out to Colorado, Ireland, and East Asia. For a time, Apple elevated its role in the industrial process, noting on its products: "Designed in California, assembled in China." Apple's decision reflects a larger trend in Silicon Valley to shift more to post-industrialized work, marked by higher value technology services within a knowledge economy. Another example is VIA Technologies, a chip manufacturer founded in Fremont in 1987, which moved its headquarters in 1992 to Taiwan. Richard Brown, vice president of international marketing at VIA, explained, "The main reason was that we saw that Taiwan would replace Silicon Valley as the global hub for PC, notebook, and motherboard design and manufacturing." He added, "It enabled us to get closer with key manufacturing partners in Taiwan." Now expanded as a fabless semiconductor design company, VIA has kept a strong presence in Silicon Valley these last two decades. About 250 employees work locally. Brown said, "We conduct advanced R&D work on chipsets and graphics in our Fremont office, and we also have extensive customer support and sales operations covering the U.S. and Latin America." Beyond IT, where is new industrial growth occurring in the Bay Area? One economic indicator is demand in office and warehouse space. The U.S. industrial vacancy rate hit a decade high last quarter, marking the eighth consecutive quarter of increasing vacancy, according to real estate services firm Colliers International. Nationally, warehouses under construction declined to the lowest number Colliers has on record, and both bulk warehouse space and tech/R&D space showed larger decreases in rental rates than prior years. The Silicon Valley market was the third largest contributor to the national drop after Chicago and the Los Angeles basin. Jeff Fredericks, senior managing partner out of Colliers' San Jose office, has observed that no sector has been left unscathed locally. He noted, "Very little manufacturing or industrial space has been built in Silicon Valley in the last 10 years, and that trend is likely to continue." Fredericks believes, however, that some light manufacturing will continue to exist within the region, either to support local technology companies or simply because the business owners choose to live here. He added, "Certainly, green tech is a market favorite right now, but that really only forms a small percentage of Silicon Valley's total market. Nonetheless, it is a sector that is experiencing better growth than others." Richard Ogawa has seen a similar regional boom in the clean tech industry. As an intellectual property attorney with Townsend and Townsend and Crew LLP, Ogawa currently advises several clean tech start-up companies that are funded by Khosla Ventures, among others. Several companies, such as Stion Corporation and Solaria Corporation, have built pilot production lines. Part of the clean tech growth can be attributed to stricter state regulations, which push for greater reliance on renewable energy sources. He said, "It's very geographic-centric." Ogawa has also seen a rise in small-scale manufacturing in other industries. For example, within the local apparel business, Levi Strauss & Co. shuttered its last operating factory in 2002, which had been operating since 1906. Many locals were discouraged to see the longtime factory close. Today, retail manufacturers like Golden Bear Sportswear and Timbuk2 actively operate in San Francisco, but of course with far smaller workforces. Personally, Ogawa is a wonderful embodiment of industrial and post-industrial Silicon Valley. As a third generation Northern Californian, whose father owned a farm in the Central Valley, Ogawa specializes in post-industrial work. His clients in semiconductors, software, networking, and lately clean tech mix industrial and post-industrial work, either shifting manufacturing abroad or undertaking light production locally. Reflecting on the changes he has witnessed over time, Ogawa said, "I'm not aware of any industry that's left the area, at least in my lifetime." In Silicon Valley, most industries simply take on new form as part of the constant evolution from industrial to post-industrial. Tamara Carleton is a doctoral student at Stanford University, studying innovation culture and technology visions. She is also a Fellow of the Foundation for Enterprise Development and the Bay Area Science and Innovation Consortium.
<urn:uuid:f62f5027-4a83-4d24-a4b7-b59416f6357d>
CC-MAIN-2016-26
http://www.newgeography.com/content/001235-the-cycles-industrial-and-post-industrial-silicon-valley
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783394937.4/warc/CC-MAIN-20160624154954-00068-ip-10-164-35-72.ec2.internal.warc.gz
en
0.955094
2,066
2.84375
3
BEIJING (AP) — China moved one step closer to setting up its own space station early Thursday, with two spacecraft docking successfully above the earth. The state-run Xinhua News Agency said the unmanned spacecraft Shenzhou 8 docked with the Tiangong 1 module now in orbit as China moved ahead with its most ambitious space project to date. Shenzhou 8 launched Tuesday from a base in far western China. China launched its own space station program after being turned away in its repeated attempts to join the 16-nation International Space Station. That was largely on objections from the United States, which is wary of the Chinese space program's military links. Xinhua said China joins the U.S. and Russia as the only countries to master the space docking technique. In terms of technology, the launch of the Tiangong-1 places China about where the U.S. was in the 1960s during the Gemini program. But space experts have said that China progresses farther than the U.S. did with each launch it undertakes. Experts see no explicit military function for the Chinese space station. President Hu Jintao praised the docking in a message from France, where he is ahead of the Group of 20 summit of economic powers. Premier Wen Jiabao and other top officials watched the docking from an aerospace center in Beijing, Xinhua reported. China plans two more space missions — at least one of them manned — to meet up with the Tiangong 1 module next year for further practice. Plans call for launching two other experimental modules for more tests before the actual station is launched in three sections between 2020 and 2022. At about 60 tons when completed, the Chinese station will be considerably smaller than the International Space Station, which is expected to continue operating through 2028. China launched its first manned flight in 2003, joining Russia and the United States as the only countries to launch humans into orbit. The Chinese space program also calls for one day landing on the moon, possibly with astronauts.
<urn:uuid:30591965-de3c-4c90-9c22-a96cf67cbf84>
CC-MAIN-2016-26
http://cnsnews.com/news/article/china-spacecraft-make-first-successful-docking
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396106.71/warc/CC-MAIN-20160624154956-00108-ip-10-164-35-72.ec2.internal.warc.gz
en
0.945746
413
2.78125
3
"I took an earthen vessel in which I put 200 pounds of soil dried in an oven, and then I moistened with rain water and pressed hard into it a shoot of willow weighing five pounds. After exactly five years the tree that had grown up weighed 169 pounds and about three ounces. But the vessel had never received anything but rain water or distilled water to moisten the soil when this was necessary, and it remained full of soil, which was still tightly packed, and, lest any dust from outside should get into the soil, it was covered with a sheet of iron coated with tin but perforated with many holes. I did not take the weight of the leaves that fell in the autumn. In the end I dried the soil once more and got the same 200 pounds that I started with, less about two ounces. Therefore the 164 pounds of wood bark, and root arose from the water alone." ~ Jan Baptist van Helmont Jan Baptist van Helmont (bapt. 12 January 1579 – 30 December 1644) was an early modern period Flemish chemist, physiologist, and physician. He worked during the years just after Paracelsus and iatrochemistry, and is sometimes considered to be "the founder of pneumatic chemistry". Van Helmont is remembered today largely for his ideas on spontaneous generation, his 5-year tree experiment, and his introduction of the word "gas" (from the Greek word chaos) into the vocabulary of scientists.
<urn:uuid:371c3515-ea10-41d9-8299-742349c26b90>
CC-MAIN-2016-26
http://lem4546567.newsvine.com/_news/2012/01/12/10136376-jan-baptist-van-helmont-baptized-january-12-1579
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783408840.13/warc/CC-MAIN-20160624155008-00023-ip-10-164-35-72.ec2.internal.warc.gz
en
0.985127
302
2.859375
3
Also found in: Thesaurus, Medical, Legal, Financial, Acronyms, Idioms, Encyclopedia, Wikipedia. v. laid, lay•ing, - lay - As in layperson, it derives from Greek laikos, "of the people"—as opposed to clerics. - nest egg - Poultry farmers formerly placed a porcelain or other fake egg in a hen's nest to encourage it to lay more eggs—from this came nest egg, money saved to encourage the making of more. - lay, lie - To lay is to place something; to lie is to recline. - oviposit - To lay an egg. 2. Setting of a weapon for a given range, a given direction, or both. 3. To drop one or more aerial bombs or aerial mines onto the surface from an aircraft. 4. To spread a smoke screen on the ground from an aircraft. 5. To calculate or project a course. 6. To lay on: a. to execute a bomber strike; b. to set up a mission. Lay is a transitive verb, and it is also a past tense of another verb, lie. To lay something somewhere means to put it there carefully or neatly. The other forms of lay are lays, laying, laid. Lie is an intransitive verb with two different meanings. To lie somewhere means to be there in a horizontal position, or to get into that position. When lie is used like this, its other forms are lies, lying, lay, lain. The -ed participle lain is rarely used. Past participle: laid |Noun||1.||lay - a narrative song with a recurrent refrain| song, vocal - a short musical composition with words; "a successful musical must have at least three good songs" minstrelsy - ballads sung by minstrels |2.||lay - a narrative poem of popular origin | Edda - either of two distinct works in Old Icelandic dating from the late 13th century and consisting of 34 mythological and heroic ballads composed between 800 and 1200; the primary source for Scandinavian mythology |Verb||1.||lay - put into a certain place or abstract location; "Put your things here"; "Set the tray down"; "Set the dogs on the scent of the missing children"; "Place emphasis on a certain point"| docket - place on the docket for legal action; "Only 5 of the 120 cases docketed were tried" cock - set the trigger of a firearm back for firing postpose - place after another constituent in the sentence; "Japanese postposes the adpositions, whereas English preposes them" prepose - place before another constituent in the sentence; "English preposes the adpositions; Japanese postposes them" step - place (a ship's mast) in its step put back, replace - put something back where it belongs; "replace the book on the shelf after you have finished reading it"; "please put the clean dishes back in the cabinet when you have washed them" stratify - form, arrange, or deposit in layers; "The fish are stratified in barrels"; "The rock was stratified by the force of the water"; "A statistician stratifies the list of names according to the addresses" plant - place something or someone in a certain position in order to secretly observe or deceive; "Plant a spy in Moscow"; "plant bugs in the dissident's apartment" intersperse - place at intervals in or among; "intersperse exclamation marks in the text" pile - place or lay as if in a pile; "The teacher piled work on the students until the parents protested" arrange, set up - put into a proper or systematic order; "arrange the books on the shelves in chronological order" superpose - place (one geometric figure) upon another so that their perimeters coincide park - place temporarily; "park the car in the yard"; "park the children with the in-laws"; "park your bag in this locker" dispose - place or put in a particular order; "the dots are unevenly disposed" emplace - put into place or position; "the box with the ancestors' ashes was emplaced on the top shelf of the house altar" emplace - provide a new emplacement for guns ship - place on board a ship; "ship the cargo in the hold of the vessel" underlay - put (something) under or beneath; "They underlaid the shingles with roofing paper" trench - set, plant, or bury in a trench; "trench the fallen soldiers"; "trench the vegetables" pigeonhole - place into a small compartment shelve - place on a shelf; "shelve books" jar - place in a cylindrical vessel; "jar the jam" repose - to put something (eg trust) in something; "The nation reposed its confidence in the King" sign - place signs, as along a road; "sign an intersection"; "This road has been signed" middle - put in the middle parallelize - place parallel to one another butt - place end to end without overlapping; "The frames must be butted at the joints" recess - put into a recess; "recess lights" reposition - place into another position throw, thrust - place or put with great energy; "She threw the blanket around the child"; "thrust the money in the hands of the beggar" rack up - place in a rack; "rack pool balls" coffin - place into a coffin; "her body was coffined" bed - put to bed; "The children were bedded at ten o'clock" appose - place side by side or in close proximity place down, put down, set down - cause to sit or seat or be in a settled position or place; "set down your bags here" misplace - place or position wrongly; put in the wrong position; "misplaced modifiers" juxtapose - place side by side; "The fauvists juxtaposed strong colors" set down - put or settle into a position; "The hotel was set down at the bottom of the valley" bottle - put into bottles; "bottle the mineral water" bucket - put into a bucket barrel - put in barrels ground - place or put on the ground mislay, misplace, lose - place (something) where one cannot find it again; "I misplaced my eyeglasses" upend - set, turn, or stand on end; "upend the box and empty the contents" seat - place in or on a seat; "the mother seated the toddler on the high chair" |2.||lay - put in a horizontal position; "lay the books on the table"; "lay the patient carefully onto the bed"| lay, place, put, set, position, pose - put into a certain place or abstract location; "Put your things here"; "Set the tray down"; "Set the dogs on the scent of the missing children"; "Place emphasis on a certain point" rail - lay with rails; "hundreds of miles were railed out here" lay - lay eggs; "This hen doesn't lay" blow - lay eggs; "certain insects are said to blow" entomb, inhume, inter, lay to rest, bury - place in a grave or tomb; "Stalin was buried behind the Kremlin wall on Red Square"; "The pharaohs were entombed in the pyramids"; "My grandfather was laid to rest last Sunday" rebury - bury again; "After the king's body had been exhumed and tested to traces of poison, it was reburied in the same spot" |3.||lay - prepare or position for action or operation; "lay a fire"; "lay the foundation for a new health care plan"| |4.||lay - lay eggs; "This hen doesn't lay"| spawn - lay spawn; "The salmon swims upstream to spawn" |5.||lay - impose as a duty, burden, or punishment; "lay a responsibility on someone"| |Adj.||1.||lay - characteristic of those who are not members of the clergy; "set his collar in laic rather than clerical position"; "the lay ministry"| |2.||lay - not of or from a profession; "a lay opinion as to the cause of the disease"| nonprofessional - not professional; not engaged in a profession or engaging in as a profession or for gain; "the nonprofessional wives of his male colleagues"; "nonprofessional actors" I haven't laid eyes on him for years → hace años que no lo veo I didn't lay a finger on it! → ¡no lo toqué! to lay sth flat → extender algo (sobre la mesa ) I don't know where to lay my hands on → no sé dónde echar mano a or conseguir ... to lay sth over or on sth → extender algo encima de algo to lay the table (Brit) → poner la mesa the best laid plans (of mice and men) can go astray → el hombre propone y Dios dispone to lay a claim before sb → presentar una reivindicación a algn to lay the facts before sb → presentar los hechos a algn see also charge A1 see also claim A2 to lay a town flat → arrasar or destruir una ciudad he has been laid low with flu → la gripe lo ha tenido en cama to lay o.s. open to attack/criticism → exponerse al ataque/a la crítica to be laid to rest → ser enterrado to lay that → apostar a que ... they're laying bets on who is going to leave next → hacen apuestas sobre quién será el próximo en marcharse see also odds 1 it lays its eggs on/in [fish, amphibian, insect] → deposita los huevos or desova en ... the lay of the land (US) → la configuración del terreno (fig) → la situación, el estado de las cosas to come into lay → empezar a poner huevos to go out of lay → dejar de poner huevos to lay o.s. down → tumbarse, echarse to lay down one's life for sth/sb → dar su vida por algo/algn to lay it down that → asentar que ..., dictaminar que ... see also law A2 to lay in supplies → aprovisionarse to lay in supplies of sth → proveerse or abastecerse de algo to lay off cigarettes → dejar de fumar (cigarrillos) lay off it! → ¡ya está bien!, ¡déjalo por Dios! you rent the hall and we'll lay on the refreshments → usted alquila la sala y nosotros nos hacemos cargo de or ponemos los refrigerios everything's laid on → todo está dispuesto they laid on a car for me → pusieron un coche a mi disposición to lay it on thick or with a trowel (= exaggerate) → recargar las tintas the house is well laid out → la casa está bien distribuida the town is well laid out → la ciudad tiene un trazado elegante he laid himself out to please → se volcó por complacerla/los he's laying up trouble for himself → se está creando or buscando problemas she was laid up for weeks → tuvo que guardar cama durante varias semanas She laid the baby in her cot → Elle a mis le bébé dans son lit. to lay the facts before sb → présenter les faits à qn to lay one's proposals before sb → présenter ses propositions à qn to lay the blame on sb → rejeter la faute sur qn She refused to lay the blame on any one party → Elle refusa de rejeter la faute sur un parti en particulier. A man came to lay the carpet → Un homme est venu pour poser la moquette. to lay a trap for sb → tendre un piège à qn to lay the foundations for sth (fig) → jeter les fondations de qch The table was laid for lunch → La table était mise pour le déjeuner. He said it was six months since he'd last got laid → Il a dit que ça faisait six mois qu'il n'avait pas baisé. Raymond claims that Ducruet and his bodyguard laid into him → Raymond prétend que Ducruet et son garde du corps lui sont tombés dessus. to lay off doing sth → arrêter de faire qch They laid on extra buses → Ils ont mis en place un service de bus supplémentaire. Clothes and jewels were laid out on the ground → On avait disposé les vêtements et les bijoux sur le sol. Maxwell listened closely as Johnson laid out his plan → Maxwell écoutait attentivement tandis que Johnson exposait son plan. lay4 vb: pret, ptp <laid> lay1 [leɪ] adj (Rel) → laico/a, secolare; (brother, sister) → laico/a (fig) (non-specialist) → profano/a lay3 [leɪ] (laid (pt, pp)) to lay sth over sth → stendere qc su qc to lay sth on sth → coprire qc con qc to lay the facts/one's proposals before sb → presentare i fatti/delle proposte a qn to be laid low with flu → essere costretto/a a letto con l'influenza to be laid to rest (euph) (buried) → essere sepolto/a to get laid (fam!) → scopare (fam!) I don't know where to lay my hands on it → non saprei dove trovarlo to lay o.s. open to attack/criticism → esporsi agli attacchi/alle critiche to lay the blame (for sth) on sb → dar la colpa (di qc) a qn to lay claim to sth → reclamare qc, accampare diritti mpl su qc to lay odds or a bet on sth → scommettere su qc to lay down one's life for sb/sth → sacrificare la propria vita per qn/qc to lay down the law (fig) → dettar legge lay off him! → non rompergli le scatole!, lascialo in pace! to lay on (for) (meal, entertainment) → offrire (a) (facilities, transport) → mettere a disposizione (di) to lay it on thick (fam) (flatter) → andarci pesante con i complimenti; (exaggerate) → metterla giù dura the way the house is laid out → la disposizione della casa to lay up trouble for o.s → crearsi dei guai lay1(lei) – past tense, past participle laid (leid) – verb lie takes no object and has lying as its present participle, lay as its past tense and lain as its past participle: Please lie down ; He lay down ; He had lain there for hours . lie , to be untruthful, has lying as its present participle, and lied as its past tense and past participle: She (has always) lied about her age .
<urn:uuid:18812bc1-5a54-45ab-bb2e-93cf0977e2ff>
CC-MAIN-2016-26
http://www.thefreedictionary.com/lay
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397842.93/warc/CC-MAIN-20160624154957-00061-ip-10-164-35-72.ec2.internal.warc.gz
en
0.78674
3,590
3.078125
3
The Faded Gingham Dress - Stanford University Origin Legend This enduring and entertaining tale supposedly outlines the origins of California's prestigious Stanford University. According to the story, after Mr. and Mrs. Leland Stanford were rudely rebuffed by the President of Harvard University when they offered to fund a building to honour the memory of their dead son, the pair subsequently established the university that bears their name. The story claims that the couple met such a cold and arrogant reception at Harvard because they were dressed in a "faded gingham dress" and a "homespun threadbare suit" and thereby had the appearance of penniless country bumpkins. It is a nice story, and one that carries a valuable moral lesson - people should not make snap judgements based on a person's initial appearance or demeanour. However, while core elements in the tale are more or less factual, as a whole it strays a long way from the truth. In fact it is an urban legend that has been circulating for more than a decade. Leland and Jane Stanford did indeed establish Stanford University, they did visit Harvard University before establishing Stanford and, sadly, they did have a son that died young. Historical notes published on Stanford's website suggest that the couple did indeed create the institution as a memorial to their son. However, any truth in the story well and truly ends with these few facts. The family was well-to-do and certainly would not have dressed as poor country hicks, especially when attending an important meeting. Moreover, Leland Stanford was a powerful and influential man, astute at business, a political leader, later a U.S. Senator and at one point, Governor of California. Hardly the type of individual who would venture "timidly" into a university office and then quietly wait for hours to be seen. And the couple's son, Leland Jr, died not of an accident, but of typhoid fever while travelling with his family in Italy. The boy was only 15 years old and was not attending Harvard or any other university at the time of his death. Before going ahead with plans to establish their university, the Stanfords did visit several eastern universities, including Harvard where they spoke to then president Charles William Eliot. However, they were not rudely dismissed at these visits and in fact received valuable advice that helped them in their project. An entry in the Stanford University Libraries FAQ, dismissed the story as false, noting in part: The thought of Leland and Jane Stanford, by this time quite wealthy, arriving at Harvard in a homespun threadbare suit and faded gingham dress is amusing, but highly inaccurate. It also is unlikely that Leland Stanford, a former governor of California and well-known railroad baron, and his wife Jane were knowingly kept waiting outside Eliot's office. The Stanfords also visited Cornell, MIT, and Johns Hopkins. The story was also resoundingly debunked in a 1998 edition of a university publication, the Stanford Magazine: Take the tale of two "backwoods country hicks" that's been zapped across the nation and around the world in countless e-mails over the last few months. The story has it that sometime in the 1880s a man and woman show up unannounced to meet with the president of Harvard. They talk to him about building a memorial for their son, who "accidentally killed" himself after his freshman year at Harvard. Eyeing the woman's "faded gingham dress" and the man's "homespun threadbare suit," the president rudely informs them of the cost of building a university. "Is that all?" the woman says to her husband. "Why don't we just start our own?" With that, the story goes, Leland and Jane Stanford returned to Palo Alto, "where they established the University that bears their name, a memorial to a son that Harvard no longer cared about." Thus, while the story may be entertaining, it is not an accurate account of the founding of Stanford University. This version of the story falsely claims that it was penned by the late Malcolm Forbes, a well known business leader and publisher of Forbes magazine. The account, of course, is wrong -- and, in places, absurd. Leland Jr. died of typhoid fever at age 15. He never enrolled at Harvard. His parents did visit Harvard President Charles Eliot, but only to get advice on endowing a university. Perhaps most ridiculous is the notion that Sen. Stanford, a wealthy railroad baron, and his wife would show up in ratty clothes. Still, the story lives on. Stanford officials have fielded questions from tourists, alumni, reporters -- and Harvard itself. Archivist Margaret Kimball, '80, was even asked to settle a bet between a husband and wife. "I might have caused a divorce," she says. The first quote included at the bottom of the message is generally attributed to American poet Maya Angelou. The slightly munged and abridged second quote, attributed in the message to James Arthur Ray, is more usually attributed to 19th Century American politician and orator, William Jennings Bryan who said, "Destiny is no matter of chance. It is a matter of choice. It is not a thing to be waited for, it is a thing to be achieved". Identity theft is one of the fastest growing crimes in the world. Learn how to stay safe online with Hoax-Slayer's comprehensive eBook: Subject: THE GINGHAM DRESS A lady in a faded gingham dress and her husband, dressed in a Homespun threadbare suit, stepped off the train in Boston , and walked timidly without an appointment into the Harvard University President's outer office. The secretary could tell in a moment that such backwoods, country hicks had no business at Harvard and probably didn't even deserve to be in Cambridge 'We'd like to see the president,' the man said softly. 'He'll be busy all day,' the secretary snapped. 'We'll wait,' the lady replied. For hours the secretary ignored them, hoping that the couple would finally become discouraged and go away. They didn't, and the secretary grew frustrated and finally decided to disturb the president, even though it was a chore she always regretted. 'Maybe if you see them for a few minutes, they'll leave,' she said to him! He sighed in exasperation and nodded. Someone of his importance obviously didn't have the time to spend with them, and he detested gingham dresses and homespun up his outer office. The president, stern faced and with dignity, strutted toward the couple. The lady told him, 'We had a son who attended Harvard for year. He loved Harvard. He was happy here. But about a year ago, he was accidentally killed. My husband and I would like to erect a him, somewhere on campus.' The president wasn't touched. He was shocked. 'Madam,' he said, gruffly, 'we can't put up a statue for every person who attended and died. If we did, this place would look like a cemetery.' 'Oh, no,' the lady explained quickly. 'We don't want to erect a statue. We thought we would like to give a building to Harvard.' The president rolled his eyes. He glanced at the gingham dress and homespun suit, then exclaimed, 'A building! Do you have any earthly how much a building costs? We have over seven and a half million dollars in the physical buildings here at Harvard.' For a moment the lady was silent. The president was pleased. Maybe he could get rid of them now. The lady turned to her husband and said quietly, 'Is that all it costs to start a university? Why don't we just start our own?' Her husband nodded. The president's face wilted in confusion and bewilderment. Mr. and Mrs. Leland Stanford got up and walked away, traveling to Palo Alto , California where they established the university that bears their name, Stanford University , a memorial to a son that Harvard no longer cared about. You can easily judge the character of others by how they treat those who they think can do nothing for A TRUE STORY By Malcolm Forbes 'People will forget what you said; People will forget what you did. But people will never forget how you made them feel'. "Destiny is not a matter of chance, it is a matter of choice."- James Arthur Ray Last updated: May 1, 2015 First published: September 24, 2009 By Brett M. Christensen Were Leland and Jane Stanford snubbed by the president of Harvard University? THE BIRTH OF THE UNIVERSITY Truth and Lies at Harvard Latest Hoax-Slayer Articles
<urn:uuid:3cfb0fa3-3a38-4b80-b5d0-7ad937bf2efc>
CC-MAIN-2016-26
http://www.hoax-slayer.com/gingham-dress-stanford-university.shtml
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402699.36/warc/CC-MAIN-20160624155002-00083-ip-10-164-35-72.ec2.internal.warc.gz
en
0.973199
1,849
2.515625
3
This stamp was issued to pay the reduced rate for first class letters, as provided by an Act of Congress approved the same day the stamp was issued. Born in Virginia, George Washington was dissuaded from a career at sea by his mother. Turning to land surveying, he was appointed to survey Lord Fairfax's lands in the Shenandoah Valley. With the beginning of the French and Indian War in 1753, Washington was dispatched by Virginia Gov. Dinwiddie to warn the French commander of Fort Le Boeuf against further encroachment against British territory. On his way to establish a post at the "Forks of the Ohio," now Pittsburgh, Washington learned the French already had built a fort there and that the French were advancing on British holdings. He attempted to stave off the advance and was defeated, but allowed to remove his troops to Virginia as part of the surrender. Later he was part of Gen. Braddock's expedition that failed to move the French from Fort Duquesne, as well as Gen. John Forbes' successful campaign that resulted in Fort Duquesne becoming Fort Pitt. Washington left the military in 1758 and returned to Mount Vernon. In 1759 he began a 15-year tenure in the Virginia legislature and married Martha Dandridge Custis. He was a delegate to both the First and Second Continental Congress, although he did not participate actively. In 1775 he was the group's unanimous choice as commander in chief of the Continental forces. His early military results in the Revolutionary War were mixed, with his joining French forces to overcome Gen. Cornwallis at Yorktown. One of his great strengths was his unquestioned integrity. After the war he again returned to Mount Vernon. In 1787 he headed the Virginia delegation to the Constitutional Convention in Philadelphia and unanimously was elected presiding officer. Two years later he unanimously was elected president. His presidency was replete with crises, including the feud between the factions led by Thomas Jefferson and Alexander Hamilton. Washington was reelected president in 1792, a year before the greatest crisis of his tenure. Washington was dismayed by excesses in the French Revolution and unhappy with attempts by the French minister to the United States to interfere in American politics. Once again, in 1797 at the end of his second term as president (he refused a third term), George Washington returned to Mount Vernon. In his farewell address he warned the United States against permanent alliances abroad. Philatelic Information
<urn:uuid:71725c36-edff-4fd6-b2a9-5391effcbdea>
CC-MAIN-2016-26
http://usstampgallery.com/view.php?id=135debd4837026bf06c7bfc5d1e0c6a31611af1d
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397565.80/warc/CC-MAIN-20160624154957-00044-ip-10-164-35-72.ec2.internal.warc.gz
en
0.989134
496
3.625
4
- January 2014 - 33 Stan.Envtl.L.J. 3 Extracting DNA from ancient specimens and using cloning technology to resurrect extinct species has become a staple plot device of wildly popular science fiction novels and films since Jurassic Park. But the prospect that extinct animals may live again no longer belongs solely to the realm of science fiction. “De-extinction” is coming closer to reality, as scientists now are experimenting with a number of methods for resurrecting extinct species. No method will bring back the dinosaurs; it has been too long since the Jurassic era for their DNA to survive. It may well be possible to “resurrect” more recently extinct species, however, such as the Pyrenean ibex, the passenger pigeon, or possibly even the awe-inspiring woolly mammoth, in the not too distant future. While some discussion of these exciting developments has appeared in the scientific and popular press, most articles focus on technical and ethical issues: can we do this, and should we? For purposes of this Article, we treat de-extinction, in some form, as a scientifically reasonable future prospect whose legal implications should be considered in a practical manner. For the most part, we assume that if de-extinction can feasibly be accomplished, someone will undertake the effort if for no other reason than because it would be irresistibly thrilling to do so. Jurassic Park itself may be unattainable, but a somewhat more plausible Pleistocene Park, populated with mammoths and aurochs, would generate nearly as much popular excitement. Other motivations for pursuing de-extinction might include the reintroduction of “keystone” species for purposes of reviving whole ecosystems, with substantial environmental benefits. Therefore, this Article explores the implications of de-extinction under existing law. Part I introduces the current science of de-extinction and the different methods its proponents are pursuing. The methods are worth reviewing in some detail, since the implications of those methods are significant for legal outcomes. Part II discusses the ESA, whether it would apply to de-extinct species, and how it should be applied. Part III addresses permitting and evaluation of environmental impacts under NEPA for projects to reintroduce de-extinct species into the wild, by analogy to EISs for reintroductions of living but locally extirpated species into regions that they formerly inhabited and EISs for releases into the environment of genetically modified organisms (GMOs). Part IV explores the regulation of resurrected species as GMOs, given that two of the three de-extinction methods being pursued would result in GMOs. Part V considers the patentability of such GMOs. Part VI summarizes our conclusions.
<urn:uuid:82905367-d9bd-4d3c-89d3-814ea01da312>
CC-MAIN-2016-26
http://journals.law.stanford.edu/stanford-environmental-law-journal-selj/print/volume-33/number-1/how-permit-your-mammoth-some-legal-implications-de-extinction
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395346.6/warc/CC-MAIN-20160624154955-00162-ip-10-164-35-72.ec2.internal.warc.gz
en
0.943014
552
3.40625
3
Lakewood, Colo. (AP) - Biologists have found endangered fish in parts of the Colorado and Yampa Rivers where they haven't been seen in decades. The U.S. Fish and Wildlife Service says a 26-inch adult Colorado Pikeminnow was captured in the Colorado River near Grand Junction. Colorado State University researchers captured a 17-inch adult Razorback Sucker in the Yampa River about seven miles upstream of Dinosaur National Monument in northwest Colorado. Both fish, found in April, are on the Federal Endangered Species List. Biologists are trying to rebuild the populations of the Pikeminnow, Razorback Sucker, Humpback Chub and Bonytail. All the fish are natives of the Colorado River System whose numbers have dropped because of dams and nonnative fish. (COPYRIGHT 2009 BY THE ASSOCIATED PRESS. ALL RIGHTS RESERVED
<urn:uuid:c1105bd9-58e1-4b61-b865-cdbe180bb5ab>
CC-MAIN-2016-26
http://www.nbc11news.com/localnews/headlines/44916377.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396872.10/warc/CC-MAIN-20160624154956-00193-ip-10-164-35-72.ec2.internal.warc.gz
en
0.924783
186
2.96875
3
The system for informing Americans about the threats to their health and safety posed by chemical plants is seriously broken, a Reuters investigation revealed August 10, 2013. The April 17, 2013, explosion of a fertilizer plant in the town of West, Texas, was a reminder that there is very little federal regulation of chemical safety in the US. There is a reason for that. After the chemical plant disaster in Bhopal, India, killed thousands there in 1984, the US chemical industry feared that safety regulations would be imposed in this country. The chemical industry headed off real regulation by striking a grand bargain with legislators and environmentalists: They agreed to disclose information about the chemicals they were handling — and the threats they present to nearby communities — in a series of laws and amendments. One keystone is the Emergency Planning and Community Right-To-Know Act (EPCRA), first passed in 1986. One reason environmentalists agreed was that they thought awareness of chemical threats would create public pressure on companies to make their plants safer. To some extent, that is what happened. One part of EPCRA, known as "Tier 2," requires chemical facilities to list the hazardous chemicals they are handling and report them to state and local agencies, and also requires the state and local agencies to disclose these lists to the public. An extensive investigation by Reuters reporters M.B. Pell, Ryan McNeill, and Selam Gebrekidan, however, found that the "27-year-old U.S. program intended to warn the public of the presence of hazardous chemicals is flawed in many states due to scant oversight and lax reporting by plant owners." A key purpose of the information is to help first responders. Better information in the West, Texas, case might well have saved firefighters' lives. "But facilities across the country often misidentify these chemicals or their location, and sometimes fail to report the existence of the substances altogether," Reuters reported. "And except for a handful of states, neither federal nor local authorities are auditing the reports for errors." Very often the local agency that keeps this data is an arm of the local fire department. Reporters have a legally mandated right to the information, and they can sometimes keep safety officials and plant operators on their toes by asking for it — and writing stories with what they find. Tier 2 reports are only available to the public through the states. While the Tier 2 reports are important, journalists who want to find out about hazardous chemicals in their communities have a number of other tools available. One is the Toxics Release Inventory. Another investigative tool is the so-called Risk Management Plans for hazardous chemical facilities. While Congress has forced EPA to make these hard to get, they are publicly available. The Right-To-Know Network, an arm of the Center for Effective Government, has compiled them in an easy-to-access form. - "Exclusive: U.S. System for Flagging Hazardous Chemicals Is Widely Flawed," Reuters, August 10, 2013, by M.B. Pell, Ryan McNeill, and Selam Gebrekidan. - Previous Coverage from SEJ: WatchDog of June 5, 2013 ; WatchDog of May 22, 2013 ; EJToday Headlines of May 6, 2013 ; EJToday Headlines of April 24, 2013 ; EJToday Headlines of June 4, 2013 ; EJToday Headlines of August 2, 2013 ; and EJToday Headlines of July 16, 2013 . - "Updated Database Reveals Significant Chemical Risks Are Distributed Across the Country," Center for Effective Government, July 30, 2013.
<urn:uuid:43ab57ed-2b37-47b7-b058-6d5a913d3a59>
CC-MAIN-2016-26
http://www.sej.org/print/publications/watchdog-tipsheet/chemical-safety-right-know-no-not-exactly
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396872.10/warc/CC-MAIN-20160624154956-00099-ip-10-164-35-72.ec2.internal.warc.gz
en
0.956103
748
2.71875
3
Sea level rise From Greenlivingpedia, a wiki on green living, building and energy There is a correlation between C02 levels in the atmosphere and sea level rises. The world sea level has risen approximately 20cm since 1900. CO2 levels in the atmosphere equate historically to a higher sea level than we have in 2008. There is a time lag effect due to the time taken for glaciers and ice shelves to melt. Temperature and sea level changes So far we have looked at the astonishing melting of the ice in the Arctic, at what the IPCC did or didn’t do about sea level rise and at Hansen’s recent thinking on the matter. Now I’d like to give a few snapshots of what the real world implications would be. The story of temperature and sea level change is encapsulated in that really neat little image at the top of the post which I got from Climate Code Red (February 2008). They got it via Rahmstorf from Archer, 2006. We can argue about the extremities. The last glacial maximum may have been 5 or 6C colder than now. Hansen puts an ice-free world at 5c warmer. It might turn out to be 6C if, perish the thought, Armageddon comes to be. But anyone can see there’s a problem. When 10-12C gives you close to 200 metres of sea level change each degree means a lot. A further insight comes from an Emeritus Professor called William Ruddiman. His thesis is that humans have been altering the climate for the last 8000 years through land clearing and methane-producing rice growing. Hansen reckons that the effect he describes is real, but somewhat less than Ruddiman thinks. Yet it’s a fascinating article (pdf). For our purposes the important point is that Ruddiman finds that the threshold for a new ice age to start building is 245ppm of CO2 corresponding to a temperature about 2C less than the present. So in that neat little graph you can’t just join up the dots of sea level in a more or less straight line. There needs to be a flat section between the temperature values of 13 and 15C. That represents the unusual stability given us as paradise on earth, or at least civilisation as we know it in the last 8000 years or so. A period when Co2 levels didn’t stray very far at all from 280ppm. So coming out of the last ice age each degree in temperature change corresponded to about 30-40m of sea level change. Going forward we can look forward to from 12 to 18 metres for each degree of warming. Remember the three graphs from the post about the IPCC that linked temperature, greenhouse gases and sea level, with ice sheets thrown in. (Original from NASA) Temperature and GHGs are conjoined as it were. If one moves so does the other. When temperature moves so does sea level as a cansequence. I can’t do tables so here’s five statements that link levels of CO2e and temperatures (referenced to pre-industrial) with sea level rise. - 180ppm give a temperature of -5C and a sea level of -120m - 280ppm give a temperature of 0C and a sea level of 0m - 280-300ppm give a temperature of 1.7 to 2.7C and a sea level of 4-6m - 380 (360-400)ppm give a temperature of 2.7 to 3.7C and a sea level of 15 to 35m - 425 (350-500)ppm give a temperature of 5.7C and a sea level of 75m The last three rely on the paleoclimate record going back increasingly into the past, so the uncertainty grows with each one. The last one, for example comes from Hansen. It wasn’t long ago that he was saying 500ppm plus or minus 150 for an ice-free world. Either way the lower bound is 350ppm and to be avoided if possible. The sea levels would take time, but are implied in the nominated levels of CO2. The implications of sea level rise are very serious. In Climate Code Red (February 2008) the authors point out that long before Greenland or West Antarctica disintegrate, with 1-2m sea level rise the results would be catastrophic. The authors quote Stern (November 2006): - “currently, more than 200 million people live in coastal floodplains around the world, with two million square kilometres of land and one trillion dollars worth of assets less than one metre elevation above current sea level.” In Climate Code Red they suggest that you can use a sea-rise level overlay such as http://flood.firetree.net/ with Google Earth to see where the water goes. Many major cities are low lying and are very much in the front line of sea level change. Some of these assets include American naval installations and indeed major centres. On cities Climate Code Red points out (assuming 20% loss of Greenland - I make that 1.4 metres): Many of the world’s major cities (22 of the top 50) are at risk of flooding from coastal surges, including Tokyo, Shanghai, Hong Kong, Mumbai, Kolkata, Karachi, Buenos Aires, St Petersburg, New York, Miami and London. In almost every case, the city relies on costly flood defences for protection. Even if protected, these cities would lie below sea level with a residual risk of flooding like New Orleans today. - The 2006 Conference of the International Association of Hydrogeologists heard that rising sea levels will also lead to the inundation by salt water of the aquifers used by cities such as Shanghai, Manila, Jakarta, Bangkok, Kolkata, Mumbai, Karachi, Lagos, Buenos Aires and Lima. “The water supplies of dozens of major cities around the world are at risk from a previously ignored aspect of global warming. Within the next few decades rising sea levels will pollute underground water reserves with salt… CO2 levels in the atmosphere are now 387ppm World C02 levels are now at a record high of 387 parts per million (ppm), up almost 40% since the industrial revolution and the highest for at least the last 650,000 years. This could translate to eventual sea level rises in the range of 15 to 35m, which would be catastrophic. So we need to reduce C02 emissions now. The present-day global temperature is already seeing significant global ice melt - which together with thermal expansion is driving sea level rise. If present-day or higher global temperatures persist there does not appear to be any plausible reason why the present ice melt will pause, diminish or stop. Instead the ice melt will continue at rates that are commensurate with prevailing temperatures on the significant ice masses and ice sheet dynamics until the ice is gone. A pragmatic view suggests that unless GHG concentrations fall to the point where temperatures reduce to pre-industrial levels (at which ice sheets were comparatively stable) then it appears inevitable that the ice melt will continue until most if not all surface ice is melted. Thus - even if temperatures only remain at present-day levels (i.e. if the current warming 'in the pipeline' represented by the present levels of GHGs is not realised) - there will be an unstoppable progression of melt until sea levels eventually stablise at between 70 metres to 80 metres above present day levels. As several commentators have noted the dynamics of ice sheet disintegration are not well understood, and so the time frame for the full range of sea level rise is uncertain, but with "business as usual" the eventual outcome appears to be both inevitable and unavoidable. Sea level rise by country - About 2.6 percent of the world’s population — about 177 million people — live in areas that will be vulnerable to chronic flooding within the next 100 years. At minimum, even with extremely rigorous cuts to global emissions and with oceans much less sensitive to climate change than expected, 1.9 percent of the population of coastal countries would be affected. At worst, the figure would be 3.1 percent. - The Netherlands would be the most exposed, with more than 40 percent of its country at risk, but it also has the world’s most advanced levee system, which means in practice its risk is much lower. - Flood-exposure estimates, including those shown above, may still understate the risks. Using more detailed elevation data for the United States than is available globally, for instance, the group found that estimated flood exposure was probably much too conservative. Applied globally, that means more than 500 million people could be living in places that are at risk of regular flooding in the next century. - More than a quarter of Vietnam’s residents live in areas likely to be subject to regular floods by the end of the century. - Four percent of China’s residents — 50 million people — live in the same kind of areas. - Across the globe, about one person in 40 lives in a place likely to be exposed to such flooding by the end of the century - Globally, eight of the 10 large countries most at risk are in Asia. Article source - Author: Brian - Link: Sea level rise: some real world implications, Larvatus Prodeo See also External links - Wikipedia:Current sea level rise - Flooding Risk From Climate Change, Country by Country, New York Times - ↑ World CO2 levels at record high, scientists warn, May 12, 2008 - ↑ Flooding Risk From Climate Change, Country by Country, NYTimes.com
<urn:uuid:b25cea0e-7dc2-4213-9dcd-5eff32d7d56c>
CC-MAIN-2016-26
http://greenlivingpedia.org/Sea_level_rise
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402479.21/warc/CC-MAIN-20160624155002-00143-ip-10-164-35-72.ec2.internal.warc.gz
en
0.930755
2,001
3.140625
3
One type of bomb is this air to surface missile. - The definition of a bomb is something that has the potential to explode. An example of a bomb is a stick of dynamite with a timer set to ignite it. - Bomb means to attack or destroy with explosives. An example of bomb is the Japanese attack on Pearl Harbor in 1941. - Bomb means to fail. An example of bomb is for a stand up comedian to fail on stage and getting booed off stage. - a container filled with an explosive, incendiary, or other chemical for dropping or hurling, or for detonating by a timing mechanism - bombshell (sense ) - a small container with compressed gas in it: an aerosol bomb - a heavily shielded apparatus with radioactive material in it, used in radiotherapy: a cobalt bomb - ⌂ Informal a complete failure: said esp. of a theatrical performance - Slang, Sports - a long forward pass in football - a long three-pointer in basketball - a long home run in baseball - Geol. a mass of lava, usually globular, ejected from a volcano by explosion Origin of bombFrench bombe ; from Italian bomba; probably ; from Classical Latin bombus, a buzzing ; from Classical Greek bombos, deep and hollow sound: origin, originally echoic - atomic bomb - any nuclear weapon - nuclear weapons collectively Origin of bombéFrench ; from bombe, bomb (because of the shape) - a. An explosive weapon detonated by impact, proximity to an object, a timing mechanism, or other means.b. An atomic or nuclear bomb. Used with the. - Any of various weapons detonated to release destructive material, such as smoke or gas. - Football A long forward pass. - a. A container capable of withstanding high internal pressure.b. A vessel for storing compressed gas.c. A portable, manually operated container that ejects a spray, foam, or gas under pressure. - Slang A dismal failure; a fiasco. - Slang An old car. - Slang One that is excellent or superior. Used with the. - Chiefly British Slang a. A large amount of money.b. A great success. verbbombed, bomb·ing, bombs - To drop a bomb or bombs. - Slang To fail miserably: The play bombed. - Slang To paint a graffito. Origin of bombFrench bombe, from Italian bomba, probably from Latin bombus, a booming sound, from Greek bombos, of imitative origin. - An explosive device used or intended as a weapon. - (slang) A failure; an unpopular commercial product. - (US, Australia, informal) A car in poor condition. - (UK, slang) A large amount of money, a fortune. - make a bomb, cost a bomb - (chiefly UK, slang) A success; the bomb. - Our fabulous new crumpets have been selling like a bomb. - (chiefly UK, slang) A very attractive woman; a bombshell. - (often in combination) An action or statement that causes a strong reaction. - It was an ordinary speech, until the president dropped a bomb: he would be retiring for medical reasons. - Normally very controlled, he dropped the F-bomb and cursed the paparazzi. - (dated) The atomic bomb. - During the Cold War, everyone worried about the bomb sometimes. - (American football, slang) A long forward pass. - (chemistry) A heavy-walled container designed to permit chemical reactions under high pressure. - (informal) A jump into water in a squatting position, with the arms wrapped around the legs, for maximum splashing. - The diametrical slang meanings are somewhat distinguishable by the article. For “a success”, the phrase is generally the bomb. Otherwise bomb can mean “a failure”. (third-person singular simple present bombs, present participle bombing, simple past and past participle bombed) - (intransitive) To attack using one or more bombs; to bombard. - (intransitive, slang) To fail dismally. - (informal) To jump into water in a squatting position, with the arms wrapped around the legs. - (slang) To cover an area in many graffiti tags. - (informal, Australia) to add an excessive amount of chlorine to a pool when it has not been maintained properly. (comparative more bomb, superlative most bomb)
<urn:uuid:80e95203-e21f-409d-9ae5-47915c8f5ae4>
CC-MAIN-2016-26
http://www.yourdictionary.com/bomb
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395992.75/warc/CC-MAIN-20160624154955-00135-ip-10-164-35-72.ec2.internal.warc.gz
en
0.847147
988
3.046875
3
The effect a trapeze artist has on an audience is an example of astonish. Origin of astonishaltered ; from Middle English astonien ; from Old French estoner ; from Vulgar Latin an unverified form extonare (for Classical Latin attonare) ; from ex-, intensive + tonare, to thunder transitive verbas·ton·ished, as·ton·ish·ing, as·ton·ish·es Origin of astonishAlteration of Middle English astonen, from Old French estoner, from Vulgar Latin *extonare : Latin ex-, ex- + Latin tonare, to thunder; see (s)ten&schwa;- in Indo-European roots. (third-person singular simple present astonishes, present participle astonishing, simple past and past participle astonished) From an alteration (due to words ending in -ish: abolish, banish, cherish, establish, furnish, etc.) of earlier astony, astone, aston, astun (“to astonish, confound, stun”), from Middle English astonien, astunien, astonen, astunen, astounen (“to astound, stun, astonish”), from Old English *āstunian, from ā- (perfective prefix) + stunian (“to make a loud sound, crash, resound, roar, bang, dash, impinge, knock, confound, astonish, stupefy”), from Proto-Germanic *stunōną (“to sound, crash, bang, groan”), from Proto-Indo-European *(s)ten-, *(s)ton- (“to thunder, roar, groan”), equivalent to a- + stun. Compare German erstaunen (“to astonish, amaze”). Influenced by Old French estoner, estuner, estonner (“to stun”), either from an assumed Latin *extonare, or from Old Frankish *stunen (“to stun”), related to Middle High German stunen (“to knock, strike, stun”) and thus also to the Old English word above.
<urn:uuid:14adf23f-65c9-49fa-a224-d8b7af1022e6>
CC-MAIN-2016-26
http://www.yourdictionary.com/astonish
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396949.33/warc/CC-MAIN-20160624154956-00098-ip-10-164-35-72.ec2.internal.warc.gz
en
0.756361
481
2.65625
3
This course provides NRCS employees with the basics of interpersonal skills. It helps participants to discover information about themselves and how that information affects their ability to meet and deal with people around them, and identifies ways to improve effectiveness of their interpersonal skills. Course topics include behavioral styles, value systems, effective listening, conflict management, constructive feedback, valuing diversity, time management and stress management. The training is accomplished with extensive use of self-assessment instruments, instructional videos, case studies, role plays, group discussions and personal action plans. Upon completion of this training, participants will be able to discuss the importance of effective interpersonal skills identify his/her own work behavioral style and select effective strategies for interacting with different styles identify his/her own style in regard to various interpersonal skills, explain or demonstrate ways to interact with individuals with different styles, and ways to improve these skills demonstrate effective listening skills, and how to give and receive constructive feedback list the dimensions of diversity, and identify strategies that will contribute to the valuing of diversity in the workplace
<urn:uuid:1a82d536-ea83-4e68-bb87-ce78e5f74d1d>
CC-MAIN-2016-26
http://www.nrcs.usda.gov/wps/portal/nrcs/detail/national/nedc/training/catalog/?cid=nrcs143_024189
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396959.83/warc/CC-MAIN-20160624154956-00125-ip-10-164-35-72.ec2.internal.warc.gz
en
0.883564
217
2.90625
3
1448, Sir Alexander Montgomery, Sir Robert Cunninghams' brother-in-law, was made Bailie of Cunninghame, a title that belonged to Sir Robert Cunningham. This event sparked the bloody Montgomery/Cunningham feud that lasted until the 1660s. 1458, Sir Alexander Cunningham was rewarded for his support of King James II (Stuart) against the Clan Douglas. He was granted the Barony of Kilmaurs, along with the lands of Kilmarnock, Hilton, Finlaystone and Glencairn. 1488, Sir Alexander Cunningham is made 1st Earl of Glencairn by royal charter, and receives Drummond and Duchray in Lennox for helping defeat the rebels at Blackness (the rebels being an army of King James III son James fighting to overthrow his father). June 1488, Sir Alexander Cunningham and King James III were killed at the Battle of Sauchieburn. The victorious son became King James IV of Scotland. Later in 1488, King James IV revoked all titles given by his father over the past few years. Sir Alexander Cunningham's son and heir, Robert Cunningham, lost his title of 2nd Earl of Glencairn. He did retain the earlier title of 2nd Lord Kilmaurs. Also in 1488, the Montgomerys' burned the Cunninghams' Kerelaw Castle. 1499, Cuthbert Cunningham, 3rd Lord Kilmaurs, lead the Clan in an attack on Montgomerys' at Irvine. 1528, William Cunningham, 4th Earl of Glencairn, lead an attack on the Montgomerys' and burned their Eglinton Castle at Irvine in Ayrshire. The fifth Earl of Glencairn, a Protestant reformer, fought against Mary Queen of Scots forces. He was one of the commanders at the Battle of Carbery Hill where she surrendered in 1567. Glencairn is said to have ordered the destruction of the Chapel Royal at 1586, the Cunningham-Montgomery feud erupts after Hugh Montgomery, 4th Earl of Eglinton, is murdered by Cunninghams'. James Cunningham, 7th Earl of Glencairn and 7th Lord Kilmaurs is head of the clan at that time. 1661, William Cunningham, 9th Earl of Glencairn, is made Lord High Chancellor of Scotland for life. His marriage to Margaret Montgomery, daughter of Alexander, 6th Earl of Eglinton, ended the Cunningham-Montgomery feud. The Cunningham’s were among the Scottish involved in the Plantation of Ulster. Sir James Cunningham, who was married to a daughter of the Earl of Glencairn, was granted five thousand acres in County Donegal. The name is now among the seventy-five most common names The 9th Earl of Glencairn raised an army in Scotland to fight for Charles II in his bid to gain his father’s throne. Somehow he managed to avoid execution by Cromwell after the uprising 1699, Sir John Cunningham of Caprington, a distinguished lawyer, was created a Baronet of Nova Scotia by Other prominent Cunningham’s were Alexander Cunningham, an eighteenth-century historical writer, who was British envoy to Venice from 1715 to Charles Cunningham was famous for his historical paintings, some of which still hang in the Hermitage Palace in St Petersburg and Berlin. Alan Cunningham, poet and writer, whom many believe was only eclipsed by Robert Burns, was born at Blackwood in Dumfriesshire in 1784. His work was supported by Sir Walter Scott who, on Cunningham’s death in 1828, provided for his two sons. Caprington Castle was remodelled in the 1780s, and again in the 1830s. The castle still remains in the Cunningham family to this day. The ruin of Kerlaw Castle has been preserved as a tourist attraction. The Cunninghams' were known for their local fueds with other Ayrshire Clans such as the Montgomerys'. The Cunninghams' were connected to other Ayrshire Clans through marriage such as the Cambells' and Hamiltons'.
<urn:uuid:2736cacd-7d47-4953-9aef-85c4b21fa47a>
CC-MAIN-2016-26
http://www.ayrshirescotland.com/clans/cunningham.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396872.10/warc/CC-MAIN-20160624154956-00116-ip-10-164-35-72.ec2.internal.warc.gz
en
0.943298
983
3.078125
3
Investigators at the University of Alabama at Birmingham (UAB) have unlocked another piece of the puzzle surrounding idiopathic pulmonary fibrosis, an often fatal lung disease with no cure and no effective treatments. In findings published March 1, 2013, in the Journal of Clinical Investigation, the research team has discovered a new pathway that contributes to fibrosis, or scarring in the lungs. More importantly, they may have also found a potential treatment to block that pathway. The key is something the researchers call mechanosensitive signaling of myofibroblasts. Myofibroblasts are cells responsible for wound healing in the body. In healthy tissues, myofibroblasts assist with wound repair then die in a pre-programmed process known as apoptosis. Fibrosis involving the lungs or other organs occurs when myofibroblasts fail to undergo apoptosis, resulting in a persistent repair process. Idiopathic pulmonary fibrosis, or IPF, occurs when lingering myofibroblasts secrete too much collagen in the air-sacs of the lungs, leading to scarring and stiffening of the surrounding matrix tissue. The researchers report that a protein called Rho kinase, known as ROCK, may contribute to the failure of myofibroblasts to undergo apoptosis. ROCK activates a mechanical signaling pathway causing the myofibroblasts to respond to mechanical cues. This promotes the survival of myofibroblasts and leads to more scar tissue formation, creating a vicious cycle of non-resolving repair. “Fibrosis begets more fibrosis in a sort of feed-forward mechanism,” said Victor Thannickal, M.D., director of the Division of Pulmonary, Allergy and Critical Care Medicine and senior author of the study. “The ROCK pathway ultimately helps to keep the myofibroblasts alive and evade apoptosis.” |Myofibroblasts are cells responsible for wound healing in the body. In healthy tissues, myofibroblasts assist with wound repair then die in a pre-programmed process known as apoptosis. Fibrosis involving the lungs or other organs occurs when myofibroblasts fail to undergo apoptosis, resulting in a persistent repair process.| Previous studies have shown that cells have the ability to detect and respond to mechanical cues and changes in the stiffness of their immediate surroundings. A cell in contact with a soft matrix will respond differently than a cell in contact with a hard or stiff matrix. “We can think of ROCK as a sort of enabler for myofibroblasts, sustaining them beyond normal timeframes and promoting mechanosensitive signaling,” said Yong Zhou, Ph.D., assistant professor in the Division of Pulmonary, Allergy and Critical Care Medicine and first author of the study. “The good news is this may also provide targets to interfere with the ROCK pathway and provide a viable therapy.” One such possible therapy is a stroke drug called fasudil, which is a ROCK inhibitor. In animal models and in human IPF tissue studied in cell culture, fasudil blocked ROCK activation and promoted normal apoptosis of myofibroblasts. In healthy cells, ROCK is believed to be responsible for smooth muscle function and controlling blood pressure. Blocking it systemically with fasudil may have some side effects, mostly a risk of a decrease in blood pressure. Zhou says this potential risk could be averted through the development of therapeutics to deliver the drug locally to the lung, perhaps inhaled. “As this research continues and we learn more about the ROCK signaling pathway, we would anticipate the development of other ROCK inhibitors that might provide much the same mechanism of activity with less potential side effects,” said Zhou. Thannickal says this approach may have utility in other diseases or conditions in which apoptosis of myofibroblasts is disrupted. “Dysfunctional apoptosis is implicated in a number of diseases, such as cancer, autoimmune diseases and inflammatory and fibrotic diseases,” he said. “This discovery of the ROCK pathway and its specific role in mechanosensitive signaling and controlling apoptosis opens up intriguing new avenues for research.” UAB is a leader in research and treatment for idiopathic pulmonary fibrosis. A member of the federally funded IPF Clinical Research Network, UAB is actively engaged in finding therapies for this condition that has no FDA-approved treatments. In the United States, IPF is estimated to affect between 132,000 and 200,000 people, with approximately 50,000 new cases diagnosed each year. As many as 40,000 Americans die from IFP each year, with survival rates ranging from 2.5 to 3.5 years following diagnosis. The study was funded by a grant from the National Heart, Lung and Blood Institute, one of the National Institutes of Health.
<urn:uuid:a1c6a981-0e92-46dc-bd13-1b3efb880cca>
CC-MAIN-2016-26
http://www.uab.edu/news/innovation/item/3282-uab-researchers-discover-possible-treatment-for-incurable-lung-disease
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397696.49/warc/CC-MAIN-20160624154957-00098-ip-10-164-35-72.ec2.internal.warc.gz
en
0.944471
1,026
2.921875
3
view a plan Teams answer archery questions by hitting T/F targets in this cleverly appropriate quiz game idea P.E. & Health Title – Fun with Archery By – Krista Gillette Primary Subject – Physical Education Grade Level – Grades 11-12 - Attend classes on the archery shot (previously learned the body stance, nock, draw, anchor, aim, release, and follow through) - Also students should have been taught the history, equipment, safety, scoring, and mechanics of the shot. - 4 targets – 2 that say TRUE on the front, 2 that say FALSE - 2 Bows - 12 Arrows-6 per station - 2 Armguards - Index cards with true and false questions on one side (related to cognitive domain) - Blue and Green cards (10 each) - Whiteboard/Poster board and Marker - Quiz (evaluation) There are 2 stations set up with a true target, a false target, a bow, 6 arrows, and an armguard. Students start about 20-25 feet away. There is an area away from these stations that have aprox. 30 index cards laying face down. The students are split into two groups by the blue and green cards. On one side of the index card area is the blue team, on the other is the green team. Each team comes up with a team name. On the whistle, the first person from each team will run to the cards, pick one, run back and read it out loud to their team. The team has to decide if it is true or false. The person that picked the card then runs to the stations and prepares to shoot. The station is placed away from everyone else. They shoot until they hit the correct target or they use all their arrows. Then they place their bow down and wait till the teacher tells them to retrieve their arrows. The students then comes and stands in front of the class and reads their card to the whole class and gives the answer they chose. If the answer is correct and they hit the correct target they earn 5 points. If the answer is correct but they did not hit the correct target they earn 2 points. If they hit the correct target first, they receive 1 extra point. Then the next person on the team will do the same on the whistle. The teacher will keep tally on the whiteboard. * If there are a lot of students make more teams and stations, so that everyone gets many chances to shoot. E-Mail Krista Gillette !
<urn:uuid:792cc89a-eefb-441d-8d70-a518546a21cf>
CC-MAIN-2016-26
http://lessonplanspage.com/pefunwitharcherytfquizgameideahs1112-htm/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396027.60/warc/CC-MAIN-20160624154956-00113-ip-10-164-35-72.ec2.internal.warc.gz
en
0.940042
532
3.296875
3
By De Vante Cooley Libraries are relevant to students because they provide resources that students otherwise could not access, offer quiet study areas and can provide a variety of accurate information from sources other than questionable online sources. Students without personal computers or printers rely heavily on the library when they need information because more information is distributed virtually. Therefore, libraries are very relevant, especially in this age of technology. The library is a great place for quiet study time without noise or distraction. If students have roommates or friends who are noisy and rambunctious, the library provides a quiet study atmosphere to complete their work. The Internet provides access to a variety of information, but cannot replace some printed media. Since it is so easy to post inaccurate information on the Internet, print resources are usually more reliable. The library provides a variety of printed and reliable media sources instead of potentially inaccurate material. Students still rely heavily upon libraries; therefore, libraries should not be considered irrelevant because of advances in technology or cultural changes. By Misha Umer Asst. entertainment editor Libraries are no longer as relevant to students because modern students are used to instant gratification, there are other alternatives to the library, and libraries do not always have a complete set of resources. Libraries are inconvenient because they do not offer information immediately. A student has to go through a process to obtain a library card and then struggle to find a book that might not even contain the right information. Alternatively, the Internet offers thousands of results in less than a second. Today, students have other resources in addition to libraries. In the past, libraries were the only way to get information, but now other options exist to provide a wider array of resources. With more choices available, students are less prone to visit the library. Most libraries lack funds to provide a complete set of resources. Students cannot go to any library and expect to find all information. A scavenger hunt from library to library for relevant material makes libraries a hassle for students. Students of today find libraries irrelevant because they are used to getting fast results, there are other data sources and libraries do not always have complete information.
<urn:uuid:cf42e485-340c-45ca-8b93-6492df5440ed>
CC-MAIN-2016-26
http://hbucollegian.com/?p=10633
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395621.98/warc/CC-MAIN-20160624154955-00039-ip-10-164-35-72.ec2.internal.warc.gz
en
0.928705
440
3.046875
3
High blood pressure is called the "silent killer" because it often does not have any signs or symptoms. According to the Centers for Disease Control and Prevention, 1 in 3 adults is living with this "silent killer". What is high blood pressure? Blood pressure is the force of the blood pushing against the walls of the arteries. High blood pressure, or hypertension, is anything higher than 140/90mmHg (normal blood pressure is 120/80mmHg). When high blood pressure is not treated, it can lead to other problems like heart attack, stroke, and kidney failure. What can I do during a disaster to protect my It is important to take your medication at the same time each day. This might be hard to do in an emergency, so you should plan ahead. How can a disaster affect my health if I have high blood You might have to evacuate or shelterin- place during an emergency. If you are not prepared, you may run out of medicine. If you stop taking your medicine, you can get headaches, an increase in blood pressure, stroke, heart attack, heart failure, or kidney failure. - The goal of treatment is to reduce blood pressure so you have a lower risk of problems. - Make an emergency kit and emergency plan. - Include at least a 3-day supply of your medication in your emergency kit. - Carry a list of medications. Include the medicine name, dose and how often you take it. - If you have a blood pressure monitor and cuff, include it in your kit to check your blood pressure daily. - Do you have a special medical need? - Are you under the care of a doctor for any reason? - You should have a Health Information Card to carry in an emergency. - Any special needs - Any special supplies - Important health information - Emergency contact information Keep the Health Information Card in your wallet or pocket. If you don’t speak English well, ask your doctor or nurse to help you fill out the Health Information card. Spring is a great time to exercise and let your children and pets play outside. Help your kids stay healthy and safe during these months. - Always wear a helmet when you ride your bicycle to prevent head injury. - Do not play with dogs you do not know (they can bite!). - Tell someone right away if you are bitten by a dog. - CALL the Health Department at (215) 685-6748 if you or someone else has been bitten by a dog or other animal. They can tell you what you should do. Learn how to dispose of unused medications safely.
<urn:uuid:5f238caa-2a45-4e89-a356-c5d64b3aafd9>
CC-MAIN-2016-26
http://www.phila.gov/health/diseasecontrol/hbSpring2013.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395039.24/warc/CC-MAIN-20160624154955-00102-ip-10-164-35-72.ec2.internal.warc.gz
en
0.92708
550
3.65625
4
Watch for Diseases Be on the watch for spotted leaves; whitish powder forming on foliage, stems, and buds; or triangular tan lesions on leaves. When possible, pick off individual leaves, but don't let them drop to the ground. Instead, put them in a paper bag and destroy them so diseases won't spread to other areas in your garden. Avoid working in the garden just after a rain, so you don't inadvertently spread disease. Fertilize Lawns Carefully If it's been over five weeks, fertilize the lawn with a slow-release lawn fertilizer that contains iron and sulfur. This will help the lawn turn from its pale yellow to green and help sparse lawns to thicken up. As lawn grasses thicken, this dense growth will crowd out the invasion of weeds. Avoid the use of weed and feed products that contain dicamba near and around the root zone of trees and shrubs. Control Asparagus Beetles Be on the lookout for asparagus beetles early in the morning. These reddish and black beetles can be found on the fern-like growth of asparagus plants. As they feed on the stems and foliage, the plant will grow distorted and become weakened. Reduced growth will deplete the plants of their strength and reduce production next season. Control the beetles by squishing them with your fingers or dropping them in a bucket of soapy water. Use caution when pruning back your rhododendrons. Use sharp pruning shears and cut off the spent blossoms without cutting through the new growth that can be seen pushing its way into the faded flower. Lightly cultivate the soil around the bushes, and lightly fertilize with a slow-release, granular fertilizer (10-10-10). Lightly scratch the fertilizer granules into the soil and water in thoroughly. Reduce Tomato Diseases Prevent the invasion of potato psyllids that have migrated into the Rocky Mountain region. These tiny pests attack potatoes, tomatoes, and peppers. The tiny nymphs gather on the undersides of the leaves, and if not controlled, psyllids can severely damage the plants and reduce production. One of the safest controls is sulfur dust applied to the undersides of the foliage and along the stems.
<urn:uuid:cb9d798f-67fa-425a-b141-bbb66b26f218>
CC-MAIN-2016-26
http://garden.org/regional/report/arch/reminders/1483
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783394605.61/warc/CC-MAIN-20160624154954-00085-ip-10-164-35-72.ec2.internal.warc.gz
en
0.939108
465
3.234375
3
All we can do is get ready Published: Monday, February 22, 2010 at 10:02 a.m. Last Modified: Monday, February 22, 2010 at 10:02 a.m. One of the latest debates among environmentalists and weather experts is whether global warming will cause stronger hurricanes and whether those stronger storms have begun. If the experts are right, the Earth could see fewer hurricanes over the next several decades, but the hurricanes that do form would be slightly stronger. Overall, that could mean fewer weak hurricanes and more stronger ones, some say. The average wind speeds of hurricanes is predicted to increase 2 to 11 percent. While that might not sound like a giant change, the effects could be devastating. One meteorology professor said an 11 percent rise in wind speeds would cause 60 percent more material damage. That is a troubling thought, but it should not substantially change what people in this region do to prepare for storms. Each year, coastal residents nervously await word of hurricanes forming in the Atlantic Ocean and watch as their paths are predicted, paying particular attention to whether they might come this way. And each year, those same residents let out a collective sigh of relief when hurricane season ends and we get a brief respite. But what concerns any resident or region is the potential for one of those storms to land here, bringing with it the wind and water everyone fears. Too often, the storms have had tremendously devastating impacts here, a reality everyone recognizes. We also recognize, however, that the damage is not inflicted by the average wind speed of a year’s storms or a decade’s storms, but just by those storms that hit here. In other words, we don’t deal with the annual averages, we deal with each storm on its own. No matter how many there are and what their average strength, one hurricane can be utterly devastating to our region. So we have long recommended that people prepare for the eventual possibility of a hurricane regardless of how many the forecasters say could form this year. Instead, we have to realize that we live in a place that is prone to serious storms and the destruction they bring with them. We have to live with the knowledge that one could come this year. But our best defense is to prepare now. It is a lesson we have painfully learned many times over: Get ready just in case. We hope, of course, that the scientists are proven wrong, that hurricanes become less destructive and less common over time. But we cannot afford to bank on that possibility. And neither can you. Editorials represent the opinions of the newspaper, not of any individual. Reader comments posted to this article may be published in our print edition. All rights reserved. This copyrighted material may not be re-published without permission. Links are encouraged.
<urn:uuid:845c5223-0e69-4b5f-b024-5f4bfb60af5f>
CC-MAIN-2016-26
http://www.dailycomet.com/article/20100222/OPINION/100229918/0/living03
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399385.17/warc/CC-MAIN-20160624154959-00067-ip-10-164-35-72.ec2.internal.warc.gz
en
0.958592
578
2.703125
3
Are you seeing big, plump bees hovering around your South Jersey home? Image courtesy of Jim Baker, North Carolina State University, Bugwood.org Carpenter Bees are large bees. They have a full, rounded, shiny black bottom, black shiny head, and a yellow, fuzzy back with a black dot in the center. Male Carpenter Bees have no sting so they are harmless to humans. Female Carpenter Bees have a potent sting, but use them very rarely. Bumble Bees are even larger than Carpenter Bees. They have a full, rounded, fuzzy yellow bottom, a shiny black back with yellow near the head. Bumble Bees can sting and will defend their nests very aggressively. They have been known to chase nest invaders long distances and have the ability to sting more than once. Carpenter Bees like to attack wooden window sills, siding, eaves, railings, outdoor furniture and fences. A round hole in wood with a pile of sawdust underneath is a clear sign of Carpenter Bees at work. Image Courtesy of Lamar Merck, University of Georgia, Bugwood.org. Dew stains on the soffits and fascia board of a home are another clear sign of Carpenter Bees at work near the gutters and fascia boards. If a homeowner does not take care of the problem with the help of a Pest Control Professional, the Queen Carpenter Bee tunnels through the wood to lay her eggs in chambers. This is an example of the kind of damage a Carpenter Bee can do very quickly inside the wood. Image Courtesy of USDA Forest Service Archive, USDA Forest Service, Bugwood.org. Left un-checked - a secondary problem will occur as birds (especially woodpeckers) peck at the wood to get to the larvae for dinner! Call AB-Con today and have your Bee problem solved correctly from the start! Serving South Jersey for over 40 years Camden County, Burlington County and Gloucester County South Jersey Cities Served: Atco, Audobon, Audobon Park, Barrington, Bellmawr, Berlin, Beverly, Blackwood, Brooklawn, Browns Mills, Burlington, Burlington City, Camden, Cherry Hill, Clayton, Clementon, Cinnaminson, Collingswood, Columbus, Delanco, Delran, Deptford, Edgewater Park, Eastampton, Evesham, Florence, Franklinville, Gibbsboro, Glassboro, Glendora, Gloucester City, Gloucester Township, Haddonfield, Haddon Heights, Haddon Township, Hainesport, Hammonton, Hi Nella, Laurel Springs, Lawnside, Lindenwold,Lumberton, Magnolia, Mansfield, Mantua, Maple Shade, Marlton, Medford, Medford Lakes, Merchantville, Moorestown, Mt. Ephraim, Mt. Holly, Mt. Laurel, Mt. Royal, Mullica Hill, Oaklyn, Palmyra, Paulsboro, Pemberton, Pennsauken, Pine Hill, Pitman, Riverside, Riverton, Roebling, Runnemede, Sewell, Sicklerville, Somerdale, Southampton, Springfield, Stratford, Swedesboro, Tavistock, Thorofare, Trenton, Turnersville, Vincentown, Voorhees, Washington Township, Waterford Works, Wenonah, Westampton, West Berlin, West Deptford, Westville, Williamstown, Willingboro, Winslow, Woodlynne, Woodbury, Woodbury Heights, Wrightstown
<urn:uuid:705a1c7f-001d-4754-8692-71f8292bab66>
CC-MAIN-2016-26
http://www.abcon1.com/blog/144-carpenter-bees-or-bumble-bees.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783404826.94/warc/CC-MAIN-20160624155004-00194-ip-10-164-35-72.ec2.internal.warc.gz
en
0.86364
741
2.765625
3
1 Billion Pixel MicroscopeKyle Maxey posted on July 31, 2013 | | 5047 views Engineers at Caltech have hacked an inexpensive microscope, turning it into a billion-pixel imager that makes even the best standard microscopes pale in comparison. One of the most fundamental truths in microscopy is that you can have either high resolution images of a small area or low resolution views of wide fields, but you can’t have both. Well, Changhuei Yang and his team at Caltech have reversed that truth with their new microscope hack. To re-engineer their microscope, the Caltech team leveraged a concept known as Fourier ptychographic microscopy, computationally correcting the low-resolution imagery. By adding a series of LEDs, the microscope could variably illuminate a larger field, leaving the Caltech engineers with the ability to piece together a 20X resolution image from a 2X lens. In the most recent issue of Nature Photonics, Yang describes the significance of his team’s breakthrough. "What this project has developed is a means of taking low-resolution images and managing to tease out both the intensity and the phase of the light field of the target sample. Using that information, you can actually correct for optical aberration issues that otherwise confound your ability to resolve objects well." What’s even more incredible is that Yang and his team transformed a standard microscope into a power research tool with a few LEDs and a $200. While it’s true that you have to have advanced understanding of optics and condensed matter physics to truly grasp how this project works, for most of us just the idea of having a billion-pixel imager is cool in-and-of-itself. As soon as Yang and his team release an Instructables for their project, you can bet that I’ll be hacking the microscope at my place. Image Courtesy of CalTech
<urn:uuid:3e57ffb7-cbe5-4cfc-8b8f-7028afd6f53a>
CC-MAIN-2016-26
http://www.engineering.com/DesignerEdge/DesignerEdgeArticles/ArticleID/6093/Billion-Pixel-Imager.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391519.2/warc/CC-MAIN-20160624154951-00143-ip-10-164-35-72.ec2.internal.warc.gz
en
0.953153
397
2.796875
3
The use of DNA evidence in the courtroom used to be one of the most contentious issues in both law and forensic science, but now it’s among the most trusted standards available. Travel records, fingerprints, and even eye-witness testimony tend to be minimized in relation to the certainty of genetic testing: if independently checked genetic analysis says you were at the crime scene, then you (or your identical twin) were at the scene. And yet, the ability to compare genetic information against known standards only helps if your criminal has their genotype in a government database; otherwise, investigators must already have a suspect to test against their evidence. Even bleeding-edge technologies for drawing genuinely novel information from DNA provide broad characteristics at best; a guess at the suspect’s ethnicity, hair colour, and perhaps a six-inch range for height. Now, researchers in the US and Belgium have teamed up to make such estimates far, far more accurate. They hope that routine genetic analysis could be the basis for basic facial reconstruction, providing a computer-generated sketch for criminals that nobody (living) ever actually saw. Their results are, as you can see below, startlingly accurate at times — but the limitations of their methodology mean that they still have a long way to go before they’re ready for the courtroom. The basic insight at use in this research is that genetic analysis doesn’t have to progress in a purely mechanistic way. Many past attempts in forensic genetics have looked at the impact of a particular gene on the molecular level, following it through from genotype to the probability of having a physical trait. That’s fine for something simple like eye colour, but facial features are influenced by an unknown number of genes. To simplify matters, the researchers looked at more than 75 genes known to create facial abnormalities when mutated, reasoning that if less common mutations can cause improper development then more common mutations might cause normal facial variation. Their research returned 20 genes of interest to face-shape. More than 600 volunteers of mixed ethnic backgrounds (to increase genetic diversity in the sample) had their faces scanned into high-resolution digital meshes, which were in turn analyzed for nine facial landmarks. These landmarks, like the position of the pupils, cheekbones, and tip of the nose, relate to the team’s 20 genes of interest. By doing detailed analysis of the relationship between face-shape and genotype, the researchers hope to make a database that can read an unidentified genome to make educated guesses about the location of each facial landmark. Generating a mesh that interpolates between the points (with a few other basic considerations like sex taken into account) leads to the computational mugshot. This sort of analysis has already been in very preliminary use for some the world’s most desperate cases — crimes of a nature that ensure there will be no pushback against police methodology. The most famous case so far involved the 2004 bombings in Madrid, which saw genetic analysis correctly predict the ethnic background of the criminals. That insight provoked relatively little controversy in the context of hunting the murderers of several hundred innocent commuters — but in the general legal system, any technology that pinpoints racial history is likely to spark heated legal debate. No matter how the technology progresses, these computational mugshots will likely always fall into the same legal category as today’s artist-drawn sketches from witness descriptions — they will be legally useless. We have good reasons for excluding artist renderings from admissibility (they tend to cause an unacceptable number of false positives) and those reasons hold true for the computational kind. Only so much information can be gleaned from “facial landmarks” and just like the human memory, genes only tell part of the story. Everything from disease to drug use to injury to tattoos to the normal ageing process can throw genetic descriptions off-target. That’s not to say that they can’t be helpful in an investigation, in narrowing suspects and helping detectives stay on the right path, but that’s a far cry from direct admissibility as evidence. It will likely be useful more as a disconfirming technology that proves certain suspects can’t be the perpetrator, as it narrows the range of possibilities for various physical traits. Staying out of the courtroom will earn this software some leeway in the public sphere, but that will last only until the first national manhunt launched in pursuit of a computer-generated person.
<urn:uuid:be1903b1-5d97-4e09-97d6-b3cb0f1ebfd5>
CC-MAIN-2016-26
http://www.geek.com/science/genetic-mugshot-could-make-dna-an-eye-witness-1588720/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393442.26/warc/CC-MAIN-20160624154953-00050-ip-10-164-35-72.ec2.internal.warc.gz
en
0.943673
902
3.625
4
Thornton, Sir Henry(1871-1933) A railway engineer was responsible for Canada's first coast-to-coast radio network – in fact the first such radio network in North America. The visionary was Sir Henry Thornton, second president of Canadian National Railways. Some later broadcast empires developed from a desire to sell radios or groceries. Sir Henry was a marketing and organizational genius who wanted to sell train seats and turn the reputation of the CNR from white elephant to profitable innovator. Radio at the time was as novel and exciting as the Internet 70 years later. Sir Henry exploited that fact. Henry Thornton was an American, born in Logansport, Indiana. He joined the Pennsylvania Railway in 1894 as an engineering draftsman, joined the Long Island Railroad seven years later as assistant to the president, and in 1914 was lured to England to become general manager of a passenger rail system, the Great Eastern Railway north-east of London. King George V knighted him in 1919 for his work with the transportation division of the British Expeditionary Forces in France. Sir Henry moved to Canada in 1922 after accepting the job of president of CNR. It was a new amalgam of rail companies which had been started for political reasons to provide competition against Canadian Pacific Railway. The rail companies failed, threatening economic and political harm to Canada, so the government pulled them together then went looking for someone to clean up the mess. Sir Henry accepted the job which many others were reported to have turned down. CNR was mainly a freight carrier. Sir Henry offered passenger service and luxury hotels in competition with CP Railway. CNR Radio was a marketing idea to promote CNR and attract passengers, who could listen to the exciting new medium as they travelled in special cars – even if they had to wear heavy headsets to do so. Radio stations were burgeoning. Much of their programming was what you'd expect from pioneers driven more by enthusiasm than money. Before Sir Henry's arrival, CNR had worked with the Canadian Marconi Company to broadcast experimentally, including to trains running between Toronto, Ottawa and Montreal. On June 1, 1923 Sir Henry established a radio department and began planning a network to carry co-ordinated, quality programming and CNR's promotional message to Canadians and to CNR's passengers, using the circuits built for its telegraph service. In 1924, CNR Radio broadcast the first network hockey game to be carried on the network. In 1925 it made the first broadcast from a moving train and then the first Canadian radio broadcast to the United Kingdom. Two years later CNR provided the first nation-wide broadcast to celebrate the 60th anniversary of Canadian confederation. CNR demonstrated that radio was a powerful and effective medium that, like the railways, could help pull Canada together. The CNR network consisted of three CNR stations combined with time leased from private stations. CNR provided the private stations with leasing revenue and quality programming. Sir Henry's employees loved him, the private stations were generally happy, and the promotional value was inestimable. But the success of this and other innovations, which turned CNR from a loser into a high-profile company, produced powerful enemies. CNR was succeeding until the Depression hit in 1929 and potential profits suffered along with everything else. Then Sir Henry's enemies, especially at the CPR which he had outgunned, were able to portray him as irresponsible, extravagant and even a threat to Canada. A faction within a new government drove him out in 1932 without even a pension, in addition pressuring a bank to drop him from its board and ruining a future career opportunity. He died a ruined man, of cancer, in 1933. A royal commission report released soon after Sir Henry's departure criticized CPR as much as CNR for aggressive expansion but failed to criticize CNR Radio, which had been so reviled by the CPR. The CNR sold its radio network to the government and it became the forerunner to the CBC. Written by Jerry Fairbridge - January, 2003« Previous Personality Bio | Next Personality Bio » Skip to the Personalities whose last names start with: « ALL A B C D E F G H I J K L M N O P Q R S T U V W X Y Z »
<urn:uuid:2d7ae099-afd2-4b9e-aa60-0175cd0af6ce>
CC-MAIN-2016-26
http://www.broadcasting-history.ca/personalities/personalities.php?id=35
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397865.91/warc/CC-MAIN-20160624154957-00009-ip-10-164-35-72.ec2.internal.warc.gz
en
0.982258
870
2.75
3
HIV/AIDS in Zimbabwe Has Reduced Life Expectancy, Not Affecting Population Growth, Study Says August 29, 2007 HIV/AIDS has reduced the life expectancy in Zimbabwe, but the country's overall population growth remains unchanged as births continue to outpace deaths, according to a study recently published in the Proceedings of the National Academy of Sciences, Reuters reports. According to Reuters, the purpose of the study was to test the accuracy of a 1989 World Health Organization study that estimated population growth rates in sub-Saharan Africa would become negative because of HIV/AIDS. Gregson said the 1989 estimates were inaccurate because researchers at the time did not realize that behavior contributing to the spread of the virus differed within populations and that transmission rates and other factors changed during the stages of infection. "The prevalence of HIV has been coming down in the last few years, and as more people receive treatment, we hope the death rate will also soon start to go down," Gregson said, adding that the effects of the HIV/AIDS epidemic are "substantial and still unfolding." Gregson said the new findings likely are representative of trends in other parts of Africa (Kahn, Reuters, 8/27). This article was provided by Henry J. Kaiser Family Foundation. It is a part of the publication Kaiser Daily HIV/AIDS Report. Visit the Kaiser Family Foundation's website to find out more about their activities, publications and services.
<urn:uuid:11e6751d-8eb8-4369-a653-0b31bae5177f>
CC-MAIN-2016-26
http://www.thebody.com/content/art42841.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397797.77/warc/CC-MAIN-20160624154957-00038-ip-10-164-35-72.ec2.internal.warc.gz
en
0.962906
286
2.859375
3
- LWCF Fact Sheet - LWCF Fact Sheet - Forest Legacy - LWCF Fact Sheet - American History - TPL Return on the Investment from the Land and Water Conservation Fund Full Report - TPL Return on the Investment from the Land and Water Conservation Fund Summary - Coalition Report - LWCF Economic Fact Sheet - National LWCF Poll Summary - Letters of Support What is the Land & Water Conservation Fund? Created by Congress in 1965, the Land and Water Conservation Fund (LWCF) was a bipartisan commitment to safeguard natural areas, water resources and our cultural heritage, and to provide recreation opportunities to all Americans. National parks like Rocky Mountain, the Grand Canyon, and the Great Smoky Mountains, as well as national wildlife refuges, national forests, rivers and lakes, community parks, trails, and ball fields in every one of our 50 states were set aside for Americans to enjoy thanks to federal funds from the Land and Water Conservation Fund (LWCF). It was a simple idea: use revenues from the depletion of one natural resource - offshore oil and gas - to support the conservation of another precious resource - our land and water. Every year, $900 million in royalties paid by energy companies drilling for oil and gas on the Outer Continental Shelf (OCS) are put into this fund. The money is intended to create and protect national parks, areas around rivers and lakes, national forests, and national wildlife refuges from development, and to provide matching grants for state and local parks and recreation projects. Yet, nearly every year, Congress breaks its own promise to the American people and diverts much of this funding to uses other than conserving our most important lands and waters. As a result, there is a substantial backlog of federal land acquisition needs estimated at more than $30 billion—including places vulnerable to development such as the Florida Everglades, Petrified Forest National Park in Arizona, Civil War battlefields in Virginia and other precious places around the country. State governments also report needing $27 billion in LWCF funds for eligible local parks and recreation projects. From Large Landscapes to Your Local Community Park Federal Land Protection Program The LWCF program has permanently protected nearly five million acres of public lands including some of America’s most treasured assets such as Grand Canyon National Park, the Appalachian National Scenic Trail, the White Mountain National Forest, and Pelican Island National Wildlife Refuge, the nation’s first federal refuge. Over the duration of the program, funding for LWCF has varied yearly, falling drastically in the last few years to total less than $100 million in 2007. Today, the four federal land management agencies (National Park Service, U.S. Fish and Wildlife Service, U.S. Forest Service, and Bureau of Land Management) estimate the accumulated backlog of deferred federal acquisition needs to be around $30 billion. Opportunities to protect fish and wildlife habitat, provide public access for recreation, preserve our nation’s most notable historic and cultural sites, and protect scenic vistas are being lost every day to development. State Assistance Program The LWCF state assistance program provides matching grants to help states and local communities protect parks and recreation resources. Running the gamut from wilderness to trails and neighborhood playgrounds, LWCF funding has benefited nearly every county in America, supporting over 41,000 projects. This 50:50 matching program is the primary federal investment tool to ensure that families have easy access to parks and open space, hiking and riding trails, and neighborhood recreation facilities. Over the life of the program, more than $3 billion in LWCF grants to states has leveraged more than $7 billion in nonfederal matching funds. But funding levels have been unpredictable and the average annual appropriation since fiscal year 1987 is a mere $40 million—despite the need for millions more. Today, the National Park Service reports that the unmet need for outdoor recreation facilities and parkland acquisition at the state level is $27 billion. While the LWCF alone cannot address all state park needs, it is a critical federal partnership with our nation’s state and local parks and communities.
<urn:uuid:abe9d562-2e5d-4550-87fc-78d85b8c9d8a>
CC-MAIN-2016-26
http://www.lwcfcoalition.org/about-lwcf.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393518.22/warc/CC-MAIN-20160624154953-00158-ip-10-164-35-72.ec2.internal.warc.gz
en
0.923392
850
2.9375
3
Knowledge-Based Computing and Version 2.0 of the Wolfram|Alpha API Wolfram|Alpha is making possible a whole new very interesting and very powerful kind of computing. And with the release today of version 2.0 of the Wolfram|Alpha API, it’s going to be considerably easier for a broad range of software developers to take advantage of it. I’m happy to say that it seems as if Wolfram|Alpha is pretty useful to humans—for example through the wolframalpha.com website. But it also turns out that Wolfram|Alpha is extremely useful to programs. And in fact, even today, the number of requests coming to Wolfram|Alpha each second from programs often exceeds by some margin all the requests coming directly from humans. The reason for this popularity is really pretty simple: Wolfram|Alpha completely changes the economics of a lot of programming. You see, these days a remarkable number of programs rely on having some kind of knowledge. And traditionally, the only way to get knowledge into a program was for the programmer to painstakingly put it there. But with Wolfram|Alpha in the picture, it’s a different story. Because built into Wolfram|Alpha is already a huge amount of computable knowledge. And if a program is connected to Wolfram|Alpha, then it can immediately make use of all that knowledge. Whether one’s building a website or a mobile app or desktop software or an enterprise application, the point is that one can use Wolfram|Alpha as a “knowledge-based computing” platform—so that having all sorts of computable knowledge becomes effectively free from an engineering point of view. How does a program communicate with Wolfram|Alpha? It uses the Wolfram|Alpha API. (These days, API is pretty much a term on its own, but it comes from “Application Program Interface”.) Well, if you were a program, all you’d do is instead use a URI of the form http://api.wolframalpha.com/… And what you’d get back is a structure that you could use inside your program. Like most modern APIs, the Wolfram|Alpha API is a so-called REST-style API, that returns XML output. That XML output can contain all sorts of different elements. It can have a big HTML structure, suitable for reproducing a whole Wolfram|Alpha output page. Or it can have individual images, or text, that correspond to particular pods or parts of pods in the Wolfram|Alpha output. It can also have a complete symbolic representation of each piece of the output, given as a Mathematica symbolic expression. Needless to say, there are all sorts of detailed controls provided. For determining the geolocation to assume. For specifying whether results should come back synchronously all together, or asynchronously in pieces when they are ready. And so on. There’s also a whole extended language for Wolfram|Alpha queries, that makes it possible to specify for example which particular output pods should be generated, or what assumptions should be made about the types of objects in the input. All of these capabilities can ultimately be accessed just by sending the appropriate string to the Wolfram|Alpha servers. But as a convenience, there are now libraries for many common languages (.Net, Perl, Python, Ruby, PHP, and Java, not to mention Mathematica) that set up the request string, and then manipulate the resulting structure that comes back. (The Mathematica case is particularly convenient, because it’s a symbolic language, so one can easily deal with arbitrary structures—and it’s interactive, so one can see everything immediately.) Many of the language libraries for the Wolfram|Alpha API were actually contributed by software developers in the Wolfram|Alpha community (thanks!). There are more to come, as well as SDKs (=“software development kits”) for a variety of environments and platforms. One way that the Wolfram|Alpha API can be used is for adding Wolfram|Alpha capabilities to websites. But it can be used inside any software system—on a desktop (as with Mathematica), on a server or in the cloud (as with webMathematica), or in any kind of mobile or other device. (And, for example, all Wolfram|Alpha apps, and Wolfram Course Assistant apps, are built using the Wolfram|Alpha API.) There are a lot of software projects that are already using the Wolfram|Alpha API. One notable example is Bing at Microsoft, where queries are sent from the Bing search engine to the Wolfram|Alpha API. Another example, of a quite different character, is in Touch Press ebooks, where Wolfram|Alpha is used to generate dynamic elements in the books. What’s happening today with version 2.0 of the Wolfram|Alpha API is that we’re opening up a lot more to software developers. There’s streamlining and extension in the API itself. And we’re simplifying the licensing requirements for the API—notably so that anyone can get started for free using the API. Creating an API that’s widely used is quite a responsibility. There are server clouds to keep running well. There are compatibilities to maintain. There are users to support. But we know what we’re getting into. Because we’ve had an API for Mathematica for 21 years—since well before anyone had ever heard of an API. The MathLink API for Mathematica is quite sophisticated. It’s allowed external programs to communicate with Mathematica since 1990. And in fact Mathematica uses it extensively itself, notably in connecting its user interface (“front end”) to its computational kernel, and in setting up distributed computation. As we build new things with the technology of Wolfram|Alpha—and there are a lot in the pipeline—they are essentially all based on the Wolfram|Alpha API. But what we’re doing internally is soon going to be completely dwarfed by what outside developers are doing with the Wolfram|Alpha API. I don’t know all the projects that are underway. But of those I know, what’s most remarkable is their diversity. They’re all ultimately using the same Wolfram|Alpha platform. But what they’re doing with it is vastly different. Beginning to build out the first generation of what’s made possible by the concept of knowledge-based computing that Wolfram|Alpha has introduced…
<urn:uuid:0da3de84-a3c7-469a-9f78-1416e3b2bb88>
CC-MAIN-2016-26
http://blog.wolframalpha.com/2011/01/20/knowledge-based-computing-and-version-20-of-the-wolframalpha-api/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395621.98/warc/CC-MAIN-20160624154955-00155-ip-10-164-35-72.ec2.internal.warc.gz
en
0.899953
1,379
2.578125
3
THE Ministry of Health has advised the public of the possible existence of two new mosquito-borne viral diseases — chikungunya and zika. It has also confirmed there is no vaccine for these two diseases, which is transmitted by infected mosquitoes. The ministry's national adviser for communicable diseases, Dr Mike Kama, said they feared the chikungunya and zika viruses, which have been identified in other Pacific island countries, may follow the same path as dengue. Dengue fever killed 15 people and infected 25,300 people in the past seven months, according to statistics released by the ministry. Dr Kama said there had been no cases of chikungunya or zika virus identified in the country so far but warned that despite the decline in the number of dengue fever cases, citizens must remain vigilant. Regular blood samples have been sent abroad for test for these emerging mosquito-borne viruses. "We were free from dengue for a year before it started knocking on our doors in December, so there's always that possibility that other viruses will reach our shores, this is why vigilance is important." The two viruses have recorded confirmed outbreaks in French Polynesia, New Caledonia and the Cook Islands. He said French Polynesia topped the list with 8700 suspected cases of the zika virus. Tonga has also reported a chikungunya outbreak. THE TWO NEW VIRUS Source: Centers For Disease Control And Prevention And Nsw Government Health * People infected with chikungunya virus will develop some symptoms three to seven days after being bitten by an infected mosquito; * The most common symptoms are fever and joint pain, headache, muscle pain, joint swelling, or rash; * There is no medicine to treat chikungunya virus infection or disease. * Zika fever is an illness caused by the Zika virus that spreads through the bite of infected mosquitoes; * Symptoms include fever, headache, red eyes, rash, muscle aches, and joint pains * The illness is usually mild and lasts 4-7 days
<urn:uuid:14b0a53e-8b2a-4da0-b95e-ee4a34574b9e>
CC-MAIN-2016-26
http://www.fijitimes.com/story.aspx?id=268683
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396106.25/warc/CC-MAIN-20160624154956-00195-ip-10-164-35-72.ec2.internal.warc.gz
en
0.951229
434
3.21875
3
The increasing traffic from Buffalo westward along the lake shore, stimulated the popular desire for a better means of transportation than that of the stage-coach, or even the steamboats of the day. Accordingly in 1831 a gathering of interested citizens at Fredonia, New York, discussed the matter, with General C. M. Reed, P. S. V. Hamot and Thomas H. Sill from Erie in attendance. On April 12, 1842, Charles M. Reed, John A. Tracy and John H. Walker obtained a charter for the first railroad company in the county called The Erie and North East Railroad Company, and books for the popular subscription to its stock were opened on Oct. 19, 1846. Its stock was taken up largely in Erie. By the spring of 1849 the route was surveyed under the supervision of Milton Courtright, who had been on the force of engineers on the old canal, and contracts for the construction of the new railroad were let on July 26, 1849, the road extending from Erie to the New York State Line at Northville, the present State Line. Two companies in New York State had been projecting lines in that state up to the Pennsylvania line, and the Erie and North East Railroad Company contracted with the Dunkirk and State Line Railroad for a connection at the state line, both of which roads were planned with a six foot gauge, which would have made Erie the terminus of the railroad from Buffalo, for the gauge of roads from Ohio to Erie carried the Ohio standard guage of four feet eight and a half inches, which necessitated a reloading of cars at Erie. The road west from Erie had been built by The Franklin Canal Company, which had been originally chartered to repair the Franklin division of the old canal, and by an amendment of their charter were authorized to build a railroad on the route of the canal from Franklin to Meadville, and thence north to Erie and south to Pittsburg. By a liberal construction of their charter powers, they assumed the right to construct their road from Erie to the Ohio State Line; but it was of the narrow width gauge. The railroad companies found the change of gauge at Erie a most serious impediment to travel, and efforts were initiated to change the roads to make them of a uniform guage. The first train over the Franklin Canal Company's road west of Erie, left Erie for Ashtabula on the morning of Nov. 23, 1852. On Nov. 17, 1853, the Erie and North East Company and the Buffalo and State Line Company entered into a contract to change their guages to four feet ten inches, thus planning to make a practically uniform guage from Buffalo to Cleveland. On Dec. 7, 1853, work was commenced to carry this agreement into effect, and was completed Feb. 1, 1854, when the first train arrived in Erie from the east over the newly changed guage. The people of Erie resented the plan, for they had hoped to make Erie the lake terminus of the New York lines, and saw in the installation of the new and uniform guage the death knell to their hopes. They were filled with indignation, and resolved to prevent the change if possible. The railroad situation became the general topic of conversation, on the street, at social and business gatherings, and in all public and private functions. At last the city councils were moved to the following: "Whereas, The joint resolution granting to the Franklin Canal Company the right to cross the streets of the city with their railroad where the same is now located, is not sufficiently guarded and restricted to protect the rights of the city; and whereas, the city council will at all times be ready to grant all the facilities in their power to railroads terminating here, when the same will promote the interests of this city, when the policy of such railroad companies shall become settled and fixed with regard to width of track, etc., therefore, "Resolved, etc., That the joint resolution granting the use of the streets of the city to the Franklin Canal Company, passed Nov. 12, 1852, and also the resolutions passed March 14, 1850, granting the Erie & North East Railroad Company the use of State Street from the depot to the lake on conditions therein named, for railroad purposes, be and the same are hereby repealed." And here is the reason that the New York Central Railroad Company today is not operating a railroad up and down the main street of Erie. However, the railroads stood pat on their determination to effect the proposed change of grade, and many of the cool-headed citizens who were opposed to the change, believed that counsel would still win the day, held the more violent in check; even succeeding in obtaining council's passage of the following in hopes of peaceably effecting "Resolved, That the city councils will give all the aid in their power to the Erie & North East Railroad Company in procuring ground in the canal basin for depots, etc., in case they will run their road to the dock." More or less conferences, discussions, and meetings continued to be held until Mayor King called a public meeting at 9 o'clock in the morning of July 19, 1853, which was marked by the most intense excitement and fervid oratory. That evening councils adopted a lengthy resolution prohibiting the railroads, entering Erie from the east, from using any other guage than six feet; and prohibiting the Franklin Canal Company from using any other guage on their road leading west from Erie, than four feet and ten inches, and providing for police action and penalties in case of violations. In the meantime the citizens were on the alert, noting any and every sign which would seem to indicate an attempt to alter the guage. Many exciting meetings took place, not all of them inspired by the prudence and good sense which should have prevailed, and many resolutions of'councils were adopted bearing on varidus angles of the situation, until Saturday afternoon, Nov. 26, 1853, when councils were suddenly convened on the report that the railroad company had spotted the ties all along the way, and would effect the change that night. A resolution was adopted after a half day of earnest discussion, as follows: "Resolved, That the mayor be instructed to call out the police force of the city to remove the bridges from the streets of the city, now used by the Erie & North East Railroad Company at any time that he, the mayor may deem necessary, in order to preserve the present railroad guage, and to preserve the peace of the city, in accordance with the ordinance of July 19, 1853. Also any bridge or obstruction crossing any street used by the Western Railroad Company within the limits of the city." This was adopted in their regular place of meeting in "Wright's Block," then located on the northeast corner of Fifth and State streets, where the excitement usually centered. On Nov. 28, 1853, councils passed another ordinance directing the mayor to remove from the streets of the city all bridges, tracks, embankments, ditches, timbers and other construction or obstructions placed in them by both of the railroad companies, and on Dec. 7, 1853, the mayor having sworn in 150 special police constables, mounted a large horse and rode at the head of his police, and followed by a determined crowd of his fellow citizens, went up State Street to the railroad bridge, where the city engineer carefully marked the location of the street lines upon the railroad structure, and men with saws carefully cut the bridge in two upon those lines. All was done systematically and according to law and the ordinance. Ira W. Hart, a railroad man, and J. F. Tracy, another, tried to order them away; but they, being fiercely attacked, were glad to beat a hasty retreat. For a long time passengers and freight had to be carted from east of town to the west side of it, the bridges being wholly destroyed across the streets. Much upbraiding of our city was indulged in by the traveling public, who suffered great inconvenience. Through the traveling public the incident was widely advertised, and Erie received much adverse notoriety through this trouble. The matter was carried to the Pittsburg courts, the railroad men in Erie were ostracised and abused, the newspaper which advocated the railroad side of the trouble was attacked, the press demolished, the type scattered about the street in front of where the Park View Hotel now stands, its publisher was assaulted, and even the building which housed the paper Near Harborcreek the farmers tore up the tracks on two separate occasions, and the U. S. Marshal was sent here from Pittsburg to serve an injunction to restrain the determined people from interfering with the road; he found the rioters busy along the tracks, and had difficulty in getting the attention of the people, until Archie Kilpatrick demanded his business when the marshal informed them he had "An injunction under the seal of the United States Court," when Kilpatrick took it, and throwing it upon the ground most irreverently declared "Now it has the seal of Harborcreek," he he stamped it into the mud with his heel. He and John Jacks, Ira Sherwin and John Kilpatrick were arrested for this and taken to jail in Pittsburg, ultimately being released. This strife engendered the most bitter feeling between the two factiOns in the city and neighborhood, which was never really allayed in that generation. The Civil War coming on a little later, helped greatly in dissipating the keenness of the rancour; but to this day there are those in the city who resent every reference to it, terming it one of the "most disgraceful things" that ever happened in Erie. However, this struggle created conditions which served to make possible the construction of the great railroad from Philadelphia to Erie, shortly afterwards. Interest had been aroused, and that seemed to be a way to obtain railroad facilities for the sure development of the harbor at Erie, which the other railroads seemed to despise. It also served to stimulate the building of the Erie & Pittsburg Railroad. Both of those projected railroads benefitted in the settlement made by which the Erie & North East Railroad Company contributed $400,000 to the construction of the Erie & Pittsburg Railroad, while the Cleveland, Painesville & Ashtabula Railroad Company (being the successor of the Franklin Canal Company) contributed $500,000 to the building of the Sunbury & Erie Railroad (now the Philadelphia & Erie Railroad). The guage of the railroads became standard, and the various lines are today known as the New York Central (succeeding the former Erie and North East Railroad Company and the Franklin Canal Company); while the Philadelphia & Erie Railroad is a division of the Pennsylvania Railroad, as is likewise the Erie & Pittsburg Railroad, one of the great railway systems of the country. The passenger depot of the P. & E. B. B. was situated on the east side of the State Street Bridge over the railroad below Hamot Hospital, where the freight business of that road in Erie continued to be carried on for some years after 1864, when the passenger traffic was handled at the Union Station. The Nickel Plate Railroad was an enterprise projected to run from Buffalo to Chicago by way of Erie, Cleveland, Fostoria and Fort Wayne. Its road bed was graded, and the rails in place in very little over a year. The company was organized in 1880, grading commenced in June, 1881, and the first train over its entire length was run in August, 1882. Experiencing some difficulty in obtaining terms for its franchise through the City of Erie, a gang of men was set to laying ties and rails in the early morning of Sunday, April 2, 1882, and before dark the line was completed through the city for the running of a train. This was done to avoid delays which would have been occasioned had the work been done on a week day when civil process would have been served to arrest the work. Regular trains started to run over this line on Oct. 23, 1882. From time to time interest was shown in the construction of another railroad from Erie to Pittsburg, to be built on the route of the old canal, the site of which was owned by W. W. Reed, and later was the property of his sister, Miss Sarah Reed of Erie. Several promising prospects for such an enterprise fell through. At last Messrs. Huidekoper and Dick, heading a syndicate from Meadville, arranged for the old canal bed, the road was laid into Erie in November, 1891, and the following spring was opened for business. From the start it had a large ore trade through the harbor at Conneaut, Ohio, from where a line joined the main road at Cranesville. It had a connection with Conneaut Lake, and also with Meadville. It has always done a thriving business, chiefly in ore and coal, making its passenger business of secondary importance. It was understood at the beginning that this road, which was known as the Pittsburg, Shenango & Lake Erie Railroad, and later more familiarily called "The Bessemer," would have extended dock facilities at the harbor, and a fine, large passenger depot up town. Neither of these expectations have been realized. It originally terminated at Butler, but sought and obtained a Pittsburg connection over the Pittsburg & Western, and is now enjoying running rights with the Baltimore & Ohio. Several railroad enterprises towards the south and east from Erie, have never advanced beyond the promotion stage; some others have even secured charters, and a few have done some grading.
<urn:uuid:6a1a47b8-ac9c-4bff-9c74-6ece79e08bba>
CC-MAIN-2016-26
http://history.rays-place.com/pa/erie-railroads.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396147.66/warc/CC-MAIN-20160624154956-00144-ip-10-164-35-72.ec2.internal.warc.gz
en
0.973754
2,931
3.28125
3
Newquay Zoo, in Cornwall, UK, is excited to announce the birth of twin Owston’s Civets. The young pair, named Tai and Quy, are the offspring of mother, Dong Ha, and father, Bao. Dong Ha was born and bred at Newquay Zoo, and Bao originated from the Carnivore & Pangolin Conservation Center in Vietnam. Photo Credits: Newquay Zoo Senior Carnivore Keeper, Owen Taylor recently said, “This is a magnificent achievement for all of us here at Newquay Zoo, as the civet species is very vulnerable due to ongoing population decline. So, to have these two new arrivals is a great conservation result and helps us maintain the ongoing survival of this species.” John Meek, Curator, added, “The arrival of the Owston's Civets is a welcome addition to the animal population [at the zoo], as this extraordinary species are actually illegally hunted for their fur and often eaten in local restaurants in Vietnam. So, to be able to continue to preserve this species is a fantastic win for Owen and the team.” Owston’s Civet (also known as Owston’s Palm Civet) is named after wildlife collector Alan Owston and is native to Vietnam, Laos, and southern China. A civet is a small, mostly nocturnal mammal that is native to tropical Asia and Africa. The term civet applies to over a dozen different mammal species. The best-known species is the African Civet, which historically has been the main species from which a musky scent, used in perfumes, was obtained. Civets have a broadly cat-like appearance, though the muzzle is extended and often pointed, much like an otter or mongoose. They range in length from 17 to 28 inches (43 to 71 cm) and in weight from 3 to 10 lbs. (1.4 to 4.5 kg). The civet will spend most of their days asleep and start their foraging for food at dusk. Occasionally they will venture up the trees to look for food but prefer to spend most of their time on the ground, using their long snouts to dig into the soil for food. The civet produces a musk (also called civet) that is highly valued as a fragrance and stabilizing agent for perfume. Both male and female produce the secretion. The secretion is harvested by killing the animal or by removing the glands. Owston’s Civet is currently listed as “Vulnerable” on the IUCN Red List due to an ongoing population decline. It is estimated there has been a loss of more than 30% of the population over the last three generations (about 15 years), due to over-exploitation, habitat destruction, and degradation.
<urn:uuid:71fa386b-84d9-4517-9b5b-a48021bb216a>
CC-MAIN-2016-26
http://www.zooborns.com/zooborns/newquay-zoo/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393533.44/warc/CC-MAIN-20160624154953-00039-ip-10-164-35-72.ec2.internal.warc.gz
en
0.959317
603
2.703125
3
Community Notification and Education Over the past decade, the nation has focused increasing attention on the risk that sex offenders pose to the safety of communities. Legislation to address this issue has proliferated as a result, including sex offender registries, community notification laws, and directives related to the supervision and treatment of known sex offenders. The term "community notification" refers to the dissemination of identifying information to citizens and community organizations about convicted sex offenders who are released into the community. These laws are distinct from sex offender registration laws, which require convicted sex offenders who are living in the community to notify police officials of their place of residence. Notification has grown from an idea of one police chief in Washington State to a phenomenon that has received overwhelming public support. This support can be attributed to the fact that sex offenders reside in most communities and that notification is intended to protect vulnerable populations, particularly children. Many differences exist among the states, and within states, in how they notify communities. The fact that there is little research on community notification makes it difficult to determine which approach is most effective, or if notification is effective at all. However, some states have adopted promising approaches to notification that involve community education and the strategic use of resources. This paper examines the differences in state laws regarding notification and explores some innovative approaches to community notification and education in place across the United States. It is important to remember that these laws apply only to known sex offenders who have been apprehended and processed by the criminal justice system. These offenders account for only a small portion of sex offenders in any community. In order to understand the significant support for community notification laws, it is important to examine the history of these laws in the United States. Horrific events in Washington, Minnesota, and New Jersey were the impetus for the creation of notification and registration laws for sex offenders. These new statutes provided guidance for the rest of the country as new states enacted their own registration and notification In Washington State, a series of highly publicized sex crimes occurred during a very short period of time. In May 1987, Earl K. Shriner, a man with a long criminal record, completed a ten-year sentence in Washington for kidnapping and assaulting two teenage girls. Two years after his release, he raped and strangled a seven-year-old boy, severed his penis, and left him in the woods to die. In 1989, Gene Raymond Kane kidnapped and murdered a young Seattle businesswoman. He was on work release after serving a 13-year sentence for attacking two women. In another incident in 1989, Wesley Allen Dodd was apprehended during an attempted abduction of a six-year-old boy from a movie theater in southwest Washington. Following an investigation, Dodd confessed to the killings of two young boys who had been riding their bikes in a park and the kidnapping and murder of a four-year-old boy he found playing in a school yard. In July 1989, Mountlake Terrace Chief of Police John Turner learned of the imminent release to his community of a person who, while in prison, had documented plans to sexually molest school children. Because he did not want a repeat of the Shriner case, Chief Turner weighed the potential for harm against the offender’s right to privacy and decided to notify the community. This was the first instance of community notification in Washington and was widely publicized throughout the state. In response to significant public outcry from these crimes and increased attention on the need to better protect communities, Governor Booth Gardner appointed a task force to recommend changes to the state laws. The task force held public hearings throughout the state and considered numerous ways to strengthen the state’s statutes concerning sex offenses. The task force’s recommendations became an omnibus bill enacted by the 1990 Legislature, outlining sweeping changes in the penalties for sex offenses, including civil commitment, registration, and community notification (Lieb, Washington State’s community notification law applies to adult and juvenile sex offenders, regardless of conviction date. Notification is dependent upon the level of risk an offender poses to public safety. An end-of-sentence review committee was established to assess, on a case-by-case basis, the public risk posed by sex offenders who are preparing for their release from confinement or are accepted from another state under the Interstate Compact. All sex offenders are classified into tiers of risk for the purposes of public notification. A model policy was developed for law enforcement agencies to follow when disclosing information about sex offenders to the public: Tier I, Low risk: Notice is made to law enforcement agencies who may disclose information, upon request, to any individual community member who resides near an offender. Tier II, Moderate risk: In addition to the above, information may also be disclosed to schools, child day care centers, family day care providers, businesses, and organizations that serve primarily children, women, or vulnerable adults, and neighborhood groups. Tier III, High risk: In addition to the above, information may also be disclosed to the public at large. In October 1989, a masked man abducted 11-year-old Jacob Wetterling at gunpoint near his home in St. Joseph, Minnesota. Neighbors, friends, and strangers rallied to the Wetterling family’s aid and worked diligently to search the area and distribute flyers across the country. That outpouring of support led to the establishment of a nonprofit foundation in Jacob’s name to focus national attention on missing children and their families. Jacob remains missing to this day. In 1991, the Jacob Wetterling Foundation recommended a legislative initiative that resulted in the passage of Minnesota’s sex offender registration act. Prior to this act, law enforcement agencies lacked resources to identify known sex offenders residing in the state, which could assist in the investigation of these types of crimes. The Wetterling Foundation also worked to have this initiative passed on the federal level. In 1994, Congress enacted the Jacob Wetterling Crimes Against Children and Sex Offender Registration Act. The Act mandated that each state create a program to register sex offenders and authorized discretionary community notification. Like Washington State, Minnesota’s community notification process is dependent upon the offender’s assessed level of risk to reoffend: Low risk: Information is maintained within law enforcement agencies and is provided to victims; Moderate risk: In addition to the above, law enforcement agencies may disclose information to agencies and groups that the offender is likely to encounter; and High risk: In addition to the above, law enforcement agencies may disclose information to members of the community whom the offender is likely to encounter. End-of-confinement review committees assess the public risk posed by sex offenders on a case-by-case basis and are utilized at each state correctional facility and each state treatment facility where sex offenders are confined. A model policy was developed to address and recommend the contents and form of community notification, methods of distributing community notification, methods of educating community residents at public meetings on how they can use the information to enhance their safety, and procedures for educating sex offenders on the nature and scope of the notification Seven-year-old Megan Kanka was raped and murdered in 1994 by Jesse Timmendequas, a twice convicted child molester who lived on her block in Hamilton, New Jersey. Megan’s parents believe that if they had known that a pedophile lived nearby, this heinous crime would never have happened. Megan’s death gave new momentum to the concept of community notification—that residents should be warned when a sex offender moves into their neighborhood. Residents of Megan’s community held rallies and signed petitions in support of community notification. Megan’s parents served as leaders to the cause, beginning a very public campaign to protect children. In 1995, this campaign led to the enactment of community notification legislation in New Jersey, known as "Megan’s Law." New Jersey politicians helped carry the issue to a national level. President Clinton signed the Megan’s Law amendment in May 1996, changing the discretionary language in the Jacob Wetterling Act regarding community notification to a requirement. New Jersey’s community notification law is similar to Minnesota and Washington laws, in that the notification process is dependent upon the degree of risk an offender presents to the community: County prosecutors, together with law enforcement officials, assess the risk of reoffense by each released sex offender and determine the appropriate means of notification. Some methods of notification include community meetings, speeches in schools and religious congregations, and door-to-door visits in the community. Low risk: Notice is provided only to the victim and law enforcement agencies likely to encounter the offender; Moderate risk: In addition to the above, notice is given to community organizations including schools, and religious and youth organizations; High risk: In addition to the above, community members who are likely to encounter the offender are notified. In November 2000, voters in New Jersey approved a measure to amend the state constitution to allow sex offender registration information to be posted on the Internet. Previously, the New Jersey Supreme Court had ruled that broad release of this information violated offenders’ Congress passed the Jacob Wetterling Act (Title XVII of the Violent Crime Control and Law Enforcement Act of 1994), requiring states to create registries of offenders convicted of sexually violent offenses or crimes against children and to establish more rigorous registration requirements for highly dangerous sex offenders. While states did not receive any additional federal funding to fulfill the Act’s requirements, they are penalized if found not in compliance. The U.S. Department of Justice issued guidelines (January 5, 1999) to assist states with complying with the Act and its amendments. [The original compliance deadline for the Jacob Wetterling Act was September 1997; a two-year extension was granted to states making good faith efforts to achieve compliance. States granted this extension had until September 12, 1999, to comply with the original features of the Act. States found not in compliance are penalized 10 percent of their Byrne Grant funds.] The Wetterling Act has been amended three times, by the Megan’s Law was added in 1996, requiring community notification; The Pam Lychner Sexual Offender Tracking and Identification Act was added in 1996, heightening registration requirements for repeat and aggravated offenders; and Section 115 of the General Provisions of Title I of the Departments of Commerce, Justice, and State, the Judiciary, and Related Agencies Appropriations Act (CJSA) was added in 1998, increasing sexually violent predator requirements and requiring the registration of federal, military, and non-resident students In addition, the 1998 CJSA amendments require states to participate in the National Sex Offender Registry (NSOR). The NSOR will interface with state registries to identify, collect, and properly disseminate relevant information that is consistent, accurate, complete, and up-to-date. The NSOR was established so that state registry information could be tracked between jurisdictions. The NSOR was launched in July 1999, as part of the National Crime Information Center (NCIC 2000). [The FBI established NCIC 2000 to provide a nationwide information network database of criminal justice information to law enforcement agencies, improving positive identification, data quality, access to external databases, usage statistics, and flexible The principal objective of community notification is to ensure that members of the public can obtain information that can help them protect themselves and their families from dangerous sex offenders residing in their community. Federal guidelines allow states discretion in determining the approaches they will take to notification. These guidelines state that "The designated state law enforcement agency... shall release relevant information that is necessary to protect the public concerning a specific person required to register." All 50 states have enacted sex offender community notification legislation. The following chart shows the growth in states enacting notification laws—the majority of activity occurred between 1994 and 1996. Variations in state community notification laws occur in the following areas: the procedures or guidelines for agencies to follow when performing a notification; the categories of offenders who are subject to notification; the scope, form, and content of notification; and the designation of an agency to perform notifications. State community notification laws can be divided into three categories, organized by the extent of notification: broad community notification; notification to those at risk; and passive notification (Matson and Lieb Broad Community Notification In states utilizing broad notification, criminal justice officials actively and widely release information about sex offenders to the public. Currently, 19 states provide this type of notification. The process for determining which offenders should be subject to notification differs from state to state. Some state statutes define this population. In other states, officials conduct risk assessments to make this determination. Still others rely on local law enforcement discretion. Notification to Those at Risk States that utilize a more limited type of notification release information based on the need to protect an individual or vulnerable population from a specific sex offender. Currently, 14 states provide this type of notification. As with states in the broad community notification category, the process for determining which offenders are subject to notification differs from state to state. Organizations typically notified are child care facilities, religious organizations, public and private schools, and other entities that provide services to children or vulnerable populations. States that utilize passive notification require citizens or community organizations to actively seek out sex offender information themselves. Currently, 17 states allow such access. In most of these states, this information is available at local law enforcement offices or through a central state agency (typically managed by state police or department of public safety). While most are open for public inspection, others are open only to citizens at risk from a specific offender (generally determined by proximity to an offender’s residence). Identifying Offenders for Notification The process by which an offender is selected for community notification also varies from state to state. In many states, legislation mandates notification for offenders convicted of specific sex offenses. In others, discretion is granted to the notifying authority. Some states conduct risk assessment on offenders before determining if notification Statutory Determination. The majority of states’ notification laws define the population of offenders that are subject to community notification as those convicted of a sexually violent offense or a sexual offense against a victim who is a minor. These states typically do not distinguish between high- and low-risk offenders. Law Enforcement Discretion. In some states, local law enforcement agencies make the final decision on notification. Generally, law enforcement officials have broad discretion in making this decision. Risk Assessment. Several states assess the risk of individual offenders before notification. At least 12 states use risk assessment instruments and an additional six states enlist committees for the purpose of assessing an offender’s level of notification. The most common risk assessment tools used in these states are the Oregon Sex Offender Assessment Scale, the Minnesota Sex Offender Screening Tool-Revised (MnSOST-R), the Rapid Risk Assessment for Sex Offense Recidivism (RRASOR), and the Static-99. Other states have developed their own risk assessment instruments. These instruments categorize offenders according to their similarities and differences from offenders known to have committed new sexual offenses. Under federal guidelines, states are not required to register or conduct notification on juveniles who are adjudicated delinquent for a sex crime. However, states have the option to require registration and notification for these youth. Juveniles adjudicated or convicted of a sex offense are required to register in 28 states: Indiana (age 14 or older) Mississippi (if twice adjudicated) South Dakota (age 15 or older) California, Colorado, Illinois, Michigan, Minnesota, North Carolina, and Vermont prohibit the release of this information to the public. The remaining states authorize notification in some or all instances, or are silent on the matter. Methods of Notification When it is determined necessary to release information to the public about a sex offender, various methods of dissemination are used. However, most states use one or more of the following practices: media release, door-to-door flyers, mailed flyers, or Internet distribution. Several states also utilize other methods. For example, in Louisiana, the offender is required to place an ad in a local newspaper and mail the notification to neighbors and the superintendent of the school district in which he or she intends to reside. In Texas, judges can order the posting of signs on an offender’s home, warning neighbors that a sex offender resides within. California, Florida, New York, and Wisconsin maintain "800" or "900" telephone lines that the public may call to inquire whether individuals are registered sex offenders. In California, a CD-ROM containing a list of all registered sex offenders is available for public viewing throughout the state at local law enforcement offices. The broadest form of notification is issuing a media release. Generally, with a media release, a press conference is held or a local newspaper or television station is alerted about a specific offender. Usually, a notice is placed in a newspaper of general circulation in the county in which the offender intends to reside or with a local television station. In the notice, identifying information is given about the offender along with his or her criminal history. In some instances, the media may choose to run a more detailed story. Some jurisdictions, usually those that are more rural or suburban, alert the public door-to-door with flyers or bulletins distributed to neighbors living in a certain proximity to a sex offender. In these instances, a criminal justice official delivers the flyers in person to citizens in communities at risk. These flyers or bulletins contain identifying information about the offender and his or her criminal history. In other jurisdictions, criminal justice officials choose to notify the public through mailed flyers or bulletins. Similar to door-to-door flyers, information is mailed to the communities within certain geographic parameters. Identifying information is provided about the offender and his or her criminal history. Accessing Registration Information Almost every state maintains a central registry, which lists all registered sex offenders within the state. In addition to or in lieu of notification, many states allow members of the public access to these registries. In these instances, information can be accessed in a variety of ways: telephone, computer, written request, or by review of the registry at a local law enforcement office. At the time of this writing, approximately 28 states and the District of Columbia operate sex offender registry Internet websites. The majority of these sites have been implemented over the past three years. The first states to launch these sites were Alaska, Florida, Indiana, and Kansas. California, Maryland, New Jersey, and Rhode Island recently passed bills authorizing Internet registries (which have yet to be launched). There are also many local websites that list registered sex offenders within a given city or county, which are operated by local law enforcement. A number of private sector agencies and private citizens also post lists of registered sex offenders. In these instances, individuals have obtained registration lists from law enforcement and posted them without law enforcement’s Several jurisdictions’ approaches to notification include community meetings designed to provide information about the offender, sex offenders in general, and community protection. In some cases, these meetings also serve to introduce the offender personally. Meetings are held regarding specific offenders or the topic can be addressed as part of a community crime prevention meeting. Advantages and Disadvantages of the Different Types ||Reaches the broadest possible audience in the least amount of time; is more cost effective than notifying communities one household at a time. ||Unable to assure that all vulnerable citizens have been reached. Unable to respond immediately to citizen questions about the situation or the law. Media potentially will not print the information as requested. Depending on the volume, the significance of each notification to the public may be lost. ||Allows law enforcement to personally address concerns the public may have about a sex offender. Shows the community that law enforcement cares enough to take the time to warn them. |Only notifies a small group of people. For example, the sex offender may work in a different community than was notified. More time consuming and expensive (in terms of staff hours) than a media release. or Posted Flyers ||More time efficient and less costly in terms of staff hours, when compared to door-to-door visits. Reaches all targeted community members. |Not able to personally address No opportunity to educate the public. ||Cost effective; less resource ||Relies on citizens to actively seek out information—not everyone who is vulnerable will inquire. Generally, these lists do not distinguish between high- and low-risk offenders. ||Registries posted on the Web are easily accessible by members of the public who have Internet access, making this an effective dissemination tool for law enforcement. After initial startup costs, this is an inexpensive way to comply with federal requirements. |Impersonal—not able to answer questions or inform citizens of the appropriate use of such information. Inability to limit who accesses the information over the Misidentification—there can be problems encountering offenders with the same name when searching. Addresses and other information on registered sex offenders is frequently outdated and inaccurate. Information is too broadly disseminated and may go beyond the scope of the intended audience. Generally, these lists do not distinguish between high- and low-risk offenders. ||Gives community members concrete information about the offender and provides an excellent opportunity for In this forum, presenters counter misinformation, quell fears, discourage vigilantism, and offer actions that citizens can take to enhance their safety. Provides opportunities for supervision officers, treatment providers, law enforcement officials, victim advocates, and others to work together to present information to the community. |If not properly conducted, a "mob mentality" may emerge; presenters should be trained and a curriculum must be in place prior to conducting these meetings. Unable to assure that all vulnerable citizens will attend or be reached. The central constitutional challenge to community notification statutes questions whether the burden imposed by the law constitutes punishment of the offender. Notification laws have been challenged in nearly every state. Courts have generally found that notification laws are constitutional and that their principal purpose is regulatory in nature and not punitive. Courts have further stated that the primary concern of these statutes is protecting the public. Thus far, no challenges have overturned the law completely, but some have forced legislatures to refine or modify statutes. Portions of notification laws, such as procedural mechanisms (due process) and retroactive application, are most susceptible to challenges in state and federal courts. The most common and successful due process challenge is procedural due process. This challenge has occurred mainly in states that classify offenders according to the level of risk they pose to communities. This argument centers on whether an offender is allowed a hearing to challenge a risk classification. This challenge succeeded in Massachusetts, New Jersey, and New York, forcing the legislatures to revamp their statutes so that every offender has the right to a hearing. The Massachusetts Supreme Court recently found that provisions of the state’s community notification law violated constitutional due process [Doe v. Sex Offender Registry Board, Mass. SJC-07608 (July 24,1998)]. Massachusetts uses a three-tier notification system, under which the state’s Sex Offender Registry Board classifies an offender into one of three risk levels. The State Supreme Court upheld the law; however, it found the risk level classification system unconstitutional. The court made recommendations to alter the law to satisfy constitutional due process: "...the appropriateness of an offender’s risk classification must be proved by a preponderance of the evidence, and that the [Sex Offender Registry] board must make specific, written, detailed, and individualized findings to support the appropriateness of each offender’s risk classification. Offenders may appeal to the Superior Court for review of the board’s decision..." At least 10 states allow offenders to contest decisions subjecting them to notification (Florida, Louisiana, Massachusetts, Minnesota, Nevada, New Jersey, New York, Pennsylvania, Texas, and West Virginia). In these instances, an offender can petition a court for a hearing or seek administrative review of the decision. At the court hearing, the offender has the right to be present, give testimony, call and cross-examine witnesses, and be represented by counsel. In July 1995, the New Jersey Supreme Court upheld the state’s notification statute, determining it to be constitutional as long as sex offenders facing notification had a chance to exercise their right to contest the decision in court: "…those subject to the statue are entitled to the protection of procedures designed to assure that the risk of reoffense and the extent of notification are fairly evaluated before Tier II or Tier III notification is implemented. We have concluded that judicial review through summary proceeding should be available prior to notification if sought by any person covered by the law." [Doe v. Poritz, 662 A.2d 367 The retroactive provisions of New Jersey, New York, and Washington notification laws have been upheld by the United States Court of Appeals. The issue of community notification of sex offenders has not been heard by the United States Supreme Court. Are Notification Laws Effective? Community notification laws are based on the presumption that alerting a community about a sex offender living in their neighborhood will help prevent further cases of sexual assault. While it may not be feasible to learn the number of crimes prevented by these laws, the impact of notification practices should be evaluated to the extent possible. For example, information can be gathered about the influence of community notification on community perceptions, behaviors, criminal justice practices, and offender Currently, research is lacking on the relationship between community notification and reduced recidivism or increased community safety. There are few studies on the effectiveness of community notification laws (as there are few studies on the effectiveness of most laws). Most of this research has been conducted in Washington State, where researchers have studied offender recidivism after community notification and measured the public’s response to the law. The Washington State Recidivism Study In 1995, the Washington State Institute for Public Policy conducted a study on the state’s community notification law (Schram and Milloy, 1995). The study examined how Washington State implemented community notification, who was affected by it, and its impact on recidivism (as measured by rearrest) among sex offenders subjected to the law. The study provides a descriptive portrait of the offenders who were subjects of the highest level (Level III) of community notification during the first three years after implementation. Researchers found that adult sex offenders targeted for notification usually had extensive sexual or violent offense histories. Most had two or more prior convictions for offenses that typically involved the molestation or rape of female children they knew. Most of the offenders also had prior convictions for nonsexual offenses. The study also provides a comparison of the recidivism patterns of adult sex offenders who were subjects of Level III notification with those of similar sex offenders who were released prior to the implementation of the law, and who therefore, were not subject to notification. Researchers found that at the end of 54 months at risk, the notification group had a slightly lower estimated rate of sexual recidivism (19 percent) than the comparison group (22 percent). This difference was not statistically significant. Although there were no significant differences in overall levels of general recidivism, the timing of reoffending was different for the notification and comparison groups. Offenders who were subjected to community notification were arrested for new crimes much more quickly than comparable offenders who were released without notification. The Washington Public Opinion Poll As part of Washington State’s evaluation of the Community Protection Act, a telephone survey was conducted soliciting public opinion among Washington State adults about the state’s community notification law. Over the summer of 1997, approximately 400 residents from both rural and urban regions of eastern and western Washington State were surveyed The results of the survey indicated an overwhelming majority of respondents were familiar with the law and believed it was very important. Nearly 75 percent of the respondents reported they learned more about sex offenses and how sex offenders operate because of community notification. More than 60 percent agreed that community notification makes released sex offenders more law abiding than they would be if no one in the community knew their background. The vast majority of respondents indicated they were more safety conscious and had a heightened awareness of their surroundings as a result of community notification. Community notification is relatively new and states are still refining how best to put it into practice. However, those approaches that involve the community appear to offer the greatest promise. The following section describes innovative approaches to community notification in place in Connecticut, Oregon, and Washington, and specific jurisdictions in Arizona Arizona enacted its notification law in 1996. In Mesa, since the inception of the law, 493 sex offenders (out of approximately 1,500 registered) have been identified as moderate or high risk and subject to community notification. The Mesa Police Department surveyed communities to find out how they would like to be notified about sex offenders residing in their neighborhoods. Door-to-door notification is the preferred method; five detectives are assigned to conduct these notifications. Because of the overwhelming workload that notification presents, community action grant officers and bicycle officers (funded through community policing grants) are enlisted to assist in the notification process. In addition, neighborhood block watch captains, volunteers, probation officers, and treatment providers aid in these efforts. During these door-to-door notifications, citizen reactions are documented. If a citizen indicates any intention of harming or harassing an offender, they are subsequently visited by one of the Mesa Police Department detectives and warned that vigilante activity will be prosecuted. In Mesa, community meetings are also held. At these meetings, law enforcement and other presenters (i.e., probation officers and treatment providers) educate the public and media about sexual assault statistics and facts, and offer guidance on protection from sexual assault. They also encourage citizens to watch for inappropriate behavior by the offenders and to report any suspicious activity to the police department hotline. In Connecticut, a team of individuals that includes probation and parole officials, law enforcement, victim advocates, and sex offender treatment providers have developed a multi-disciplinary approach to community education and notification. Team members view community education as an integral part of notification and have developed a comprehensive, collaborative model, which incorporates information from the various team members. Recently, the Judicial Branch, in collaboration with team members, developed a supplemental video to enhance education information provided to communities through In Connecticut, victim advocates assist probation and parole officers (as well as other team members) in conducting community notification, through door-to-door visits or community meetings. Advocates help shift the focus of notification laws from merely informing the public about known offenders in their neighborhoods to preventing future sexual victimization. Advocate involvement in the notification process creates the opportunity to educate citizens about sexual assault and offer help The Tampa Police Department recently developed the Sexual Predator Identification and Notification Program (SPIN). SPIN is a proactive, comprehensive community policing initiative that addresses the issue of sex offenders released from incarceration back into communities. In addition to carrying out the minimal requirements of community notification, the SPIN Program enlists the community policing officer assigned to the area to contact sex offenders on a monthly basis. These contacts serve multiple purposes. Officers ensure that the offender lives at the address listed in the state database and verifies the offender’s compliance with state laws, which mandate that the offender maintain a valid, updated license and accurate registration information. Additionally, community oriented police officers work daily with probation officers to monitor offenders and ensure that they are complying with conditions of probation. The SPIN coordinator meets regularly with community members and gives presentations to explain all aspects of the program, legal issues, and the rights of both citizens and offenders. Trained parole and probation officers in Oregon use the Sex Offender Assessment Scale, developed in the state, to determine whether an offender exhibits predatory characteristics and should be subject to notification. Supervising probation or parole officers develop an individualized notification plan based on the offender’s criminal behavior and the make-up of the community. Typically, neighborhoods are notified through door-to-door delivery of flyers with descriptive information about the offender. A 1996 amendment to the statute permits law enforcement agencies to conduct lifetime notification for predatory sex offenders not under supervision. In Oregon, notification is used as a management tool—when an offender is doing poorly in treatment or not complying with conditions of his or her supervision, officials may decide that the offender poses a risk to the community and should be subject to notification. When issuing a notification, probation officers leave flyers at a residence only if an adult is in the home. This practice allows officers the opportunity to address citizen questions or concerns about the offender. If an adult is not present, officers either leave their business cards or leave a flyer with a neighbor. Following door-to-door community visits, flyers are also mailed to the media, school districts, and other law enforcement agencies. In Washington State, local community meetings are either convened regarding a specific offender or to discuss broader issues of sexual assault; sex offender management may be addressed as part of an overall crime prevention meeting. Community meetings that focus on specific sex offenders are presented by law enforcement, Department of Corrections staff, and others (including legal advisors, juvenile justice officers, representatives from the prosecutor’s office, representatives from crime prevention units, school officials, mental health providers, victim advocates, and community leaders). They provide educational information as well as facts about offenders who are the subjects of the meetings. Generally, a predetermined agenda is followed that sets the ground rules and expectations of the meeting. The notification law is first described, followed by a presentation on what is known about sex offenders and safety related issues. Finally, information on the specific offender is presented (such as where they live, what they were convicted of, victim characteristics, and other identifiers) and questions are answered. Despite the legislative purpose of community notification to enhance public safety, notification can have negative effects on the criminal justice system, the community, victims, and offenders (Freeman-Longo, Potential for Vigilantism The potential for citizens to harass offenders following notification has been a concern since community notification laws were first passed. Anecdotal incidents of vigilantism or harassment have been reported in almost every state in the country. Fortunately, few have been violent in nature. Instead, most of these incidents have involved verbal threats and/or attempts to force the offender to move from the community. The fact that violent incidents are relatively rare may seem surprising given the media attention to these events. At least four states have tracked incidents of harassment: New Jersey, Oregon, Washington, and Wisconsin. In New Jersey, 135 community notifications produced one instance of physical assault reported to the authorities and four reports of threats, harassment, or other offensive, non-violent actions. In July 1998, an individual reacting to a flyer distributed by police shot at the house of a recently paroled rapist. [This information was collected from November 1994 through May 1996, in preparation for a court case (E.B. v. In Oregon, less than 10 percent of those offenders subject to notifications experienced some form of harassment (from November 1993 to January 1995). These incidents included name-calling, graffiti, and minor property vandalism. Two extreme cases of harassment were reported; the first involved a sex offender being threatened at gun-point and the second included threats of arson to an offender’s residence (Oregon Department of Corrections, 1995). In Washington State, harassment incidents follow less than 4 percent of notifications (from 1990 to 1996). [This data is from a survey of law enforcement, in which respondents were asked to recall incidents that they knew about and reported.] The most serious incident resulted in arson of an offender’s intended residence. Two cases resulted in minor property damage, and in two others, offenders were physically assaulted (Matson and Lieb, 1996). In July 1998, neighbors in a trailer park burned down a vacant mobile home days before a sex offender was scheduled to move into it. Last year, a man was imprisoned for threatening a sex offender at gun-point who had recently been released from civil commitment. In Wisconsin, 23 percent of law enforcement agencies reported incidents of harassment of sex offenders since the law took effect in 1997. Most of these incidents were deemed minor, involving insults and verbal taunts, and offenders being denied housing (Zevitz and Farkas, 1999). Compliance with Registration Requirements In addition to vigilantism and harassment, compliance with registration requirements is a problem in every state. Some would argue that notification causes sex offenders to abscond in order to avoid additional stigmatization. Some states report that the whereabouts of as many as 50 percent of registered sex offenders are not known. It is probably safe to assume that no state has a 100 percent compliance rate in registering sex offenders. Providing communities with exact addresses of offenders whose whereabouts are in fact unknown can cause undue harm to individuals who occupy a sex offender’s prior residence. Because registration requirements generally last 10 years to life, many registered offenders are not under community supervision (i.e., probation or parole). In these instances, conforming with registration requirements is dependent on the offenders’ choice to remain in compliance or the degree to which law enforcement tracks and/or verifies offenders’ whereabouts. Failure to comply, which may result in inaccurate offender addresses, jeopardizes the effectiveness of broad notification strategies. All states impose penalties on offenders who fail to keep their registration information current. Some impose felony sentences; others impose monetary penalties for noncompliance. Offenders Not Able to Find Housing Some communities have reported that certain property owners are not renting to sex offenders because of pressure from other tenants or neighbors. In a few metropolitan areas, sex offenders who cannot find residences are housed in local motels (by their parole or probation officer) and even returned to prison until they can find adequate housing. In Waukesha County, Wisconsin, two offenders chose to return voluntarily to prison because they could not find housing following their notifications. In some jurisdictions, sex offenders reside in shelters, temporary housing, or on the streets. There have been instances of neighborhoods joining together to keep registered offenders out of their community. Recently, in Lake Oswego, Oregon, a group of residents pooled funds to send a registered sex offender to college in order to remove him from their neighborhood. Because offenders are not able to find residence, they may be ineligible for early release and thus, "max-out" their sentence (early release decisions generally are based upon an approved plan, which includes approved residency). This means that some of the highest risk offenders are released into the community with no court ordered supervision or treatment to help them control their offending behavior. Name and Shame in the United Kingdom As evidenced by the “For Sarah Campaign,” named for eight-year-old Sarah Payne who was murdered in the UK in July 2000, the public and media can take matters of notification into their own hands. A “name and shame” campaign by a local newspaper sought to identify more than 100,000 suspected pedophiles in the UK, because the public did not have access to sex offender information. This campaign caused alleged offenders to flee their homes to avoid persecution and has led to mob riots, physical assaults, property damage, misidentifications, and a suicide that is believed to be related to the campaign (Born, 2000, News of the World, 2000). There have been instances around the country of victims’ identities revealed as a result of community notification. The potential is highest when victims are related to or known to offenders. Furthermore, when officials conduct notification in neighborhoods where the offender’s victim resides, they may inadvertently traumatize the victim in the process. In an effort to comply with federal guidelines efficiently and economically and to release vital information about offenders to the public, many states have adopted the use of Internet websites to post sex offender registration information. However, posting sex offender registries on the Internet raises several concerns. These include the accuracy of the information provided, the potential unintended identification of the victim, and privacy concerns of the offender. There are several other key issues to consider in the use of Internet websites, including the following: States that list registered sex offenders on websites rely on citizens to proactively seek this information. If the goal of making such lists available to the public is to protect the citizenry, these methods must be employed with the knowledge that not everyone who is vulnerable will inquire through an Internet registry. Citizens who learn of sex offenders in their community via the Internet are not always provided with support or education when receiving this information. Many professionals in the field contend that citizens are ill equipped to respond to this information absent additional education on the risks of sexual offending and how one might better protect oneself and one’s family. Internet registries do not require a demonstration of a "need to know" when an individual accesses the information they provide. Several states have elected to use alternative methods of access that contain a "need to know" checkpoint to ensure that the information obtained is used for the purposes for which it is intended (such as a parent checking to see if a neighbor is a registered sex offender). Anecdotal reports from around the country have described incidents where offender information on a website has been outdated or incorrect, thus subjecting innocent citizens to stigma or harassment. Reducing Unintended Consequences The negative and often unintended consequences of community notification can be harmful to communities and to sex offenders’ efforts to reintegrate into society. Different programs throughout the country have made efforts to reduce these effects. These efforts involve education of citizens and explanation of laws, identification of offender risk, caution around exact address release, planning and foresight, cooperation with media, and involvement of victim advocates. The opportunity to educate the public may be the most powerful aspect of recent community notification efforts. Education should focus on: the fact that victimization data indicate that most sex offenders remain undetected in the community, that most people are victimized by someone they know, and that known sex offenders are often under the supervision of the criminal justice system; the steps that the criminal justice system can and cannot take to control these offenders; and methods to protect oneself and one’s family from sexual victimization. Community notification may best be reserved for those offenders at greatest risk to reoffend. Reconviction data suggest that not all sex offenders reoffend and alerting the public of their crimes may be detrimental to offenders’ progress in treatment and community reintegration. Sex offenders are not a homogenous group; reoffense rates vary among different types of sex offenders and are related to specific characteristics of the offender and the offense. Several states assess the risk of individual offenders and only release information to the public about higher risk Community notification usually takes place upon an offender's release from incarceration. However, notice should also take place when an offender is found in noncompliance with supervision conditions or registration requirements, or when an offender absconds from his or her jurisdiction. Some states use notification as a management tool under these circumstances, alerting the public when an offender is of greater risk. This serves two purposes; it informs communities of dangerous behaviors by particular offenders and it helps keep sex offenders in compliance through the threat of public Some states post warnings on their Internet websites, indicating that the purpose of the list is to help protect the public from potential danger posed by individuals who have committed sex offenses. These statements also reflect that any actions taken against any person on the list, including vandalism of property, verbal or written threats of harm, or physical assault against an individual on this list, their family, or employer, may result in arrest and prosecution. The public should be further notified that ostracizing or harassing sex offenders can stand in the way of their successful reintegration into the community. Accuracy of Information Offender registration information must be updated regularly to maintain accuracy. States have a responsibility to ensure that the information is as accurate and up to date as possible. At a minimum, offenders who are out of compliance with registration requirements should not have their addresses posted on websites or given as part of notification, as this information is more than likely inaccurate. In addition, regular record updates ensure that other information, such as the offender’s physical appearance, is kept current. In planning for community notification, corrections and law enforcement officials should identify individuals who may be negatively affected and develop strategies to reduce these potential impacts, without interfering with the notification. Notifying family members, victims, landlords, and employers before conducting a notification allows these individuals time to prepare for the disclosure. Every effort should be made to protect the privacy of any victims of sex offenders subject to community notification. It is vital that no direct or indirect identifying information regarding the sex offenders’ victims be released as a part of the notification process. Victim advocates (both community-based and governmental) can play an important role in the development of a successful community notification program. States that use review committees to assess an offender’s risk of reoffense often enlist the help of victim advocates. In many instances, legislation requires their participation in the development of the classification procedures or in the actual risk assessment. Some states that conduct community meetings use victim advocates to help educate audiences about the nature of sex crimes and teach parents how to protect themselves and their children from sex offenders. In addition, victim advocates can be helpful in strategizing with corrections and law enforcement officials regarding who should be notified and how, as well as assisting in the notification itself. Victim advocacy groups, such as the National Center for Missing and Exploited Children, the National Center for Victims of Crime, and many local sexual assault advocacy programs, develop and provide educational materials that teach parents how to protect their children and themselves. Agencies charged with protecting the public from sex offenders (i.e., probation, parole, law enforcement, and treatment providers) should enlist the support of the news media in their community protection efforts. These agencies should provide the media with general information about sex offender management practices and resources for victims. If this is accomplished, the media can be a positive resource in the notification For the benefits of community notification to be realized to the greatest extent possible, notification should be used as an opportunity to educate the public. Notification should be accompanied with community discussions about the nature and extent of sexual offending, what is known about sex offenders, sex offenders’ rights, and actions that citizens can take to protect themselves and their families. Communities also need to be educated about the role notification plays in sex offender management. What is the Extent of Sexual Offending? Those people who commit sexual assaults, whether convicted for these offenses or not, live in our communities. Data suggests that there are many more sexual abusers in the community than those who have been identified by the court system (or are subject to community notification or placed on Internet registries). A 1992 study estimated that only 12 percent of rapes were reported (Kilpatrick, Edmunds, and Seymour, 1992). The National Crime Victimization Surveys conducted in 1994, 1995, and 1998 indicate that only 32 percent of sexual assaults against persons 12 or older were reported to law enforcement. As of April 1998, there were approximately 280,000 registered sex offenders in the United States (Baldau, 1999). This number may only represent a fraction of those who commit sexual assault. Who Commits Sexual Offenses? Most sexual assaults are committed by someone known to the victim or the victim’s family, regardless of whether the victim is a child or an adult. Statistics indicate that the majority of women who have been raped know their assailant. A 1998 National Violence Against Women Survey revealed that among those women who reported being raped, 76 percent were victimized by a current or former husband, live-in partner, or date (Tjaden and Thoennes, 1998). Also, a Bureau of Justice Statistics study found that nearly 9 out of 10 rape or sexual assault victimizations involved a single offender with whom the victim had a prior relationship as a family member, intimate, or acquaintance (Greenfeld, 1997). Approximately 60 percent of boys and 80 percent of girls who are sexually victimized are abused by someone known to the child or the child’s family (Lieb, Quinsey, and Berliner, 1998). Relatives, friends, baby-sitters, persons in positions of authority over the child, or persons who supervise children are more likely than strangers to commit a sexual assault. What are the Rights of Sex Offenders? The public must accept that sex offenders will and do live in our communities. It is not feasible for every community to incarcerate all sex offenders for life. Citizens should be encouraged to refrain from ostracizing sex offenders or their families. Citizens should use available channels for expressing concerns. If community members have a concern about a particular sex offender, this information should be brought to the attention of the offender’s probation or parole officer immediately. If there is not a satisfactory response, citizens should call the officer’s supervisor. Attempts by citizens to confront, harass, or shame a sex offender into compliance can have unintended, negative consequences. Concerns should always be addressed through the official criminal justice system. Communities can help by supporting sex offenders’ attempts to reintegrate into society. Assuring stable housing and employment for these offenders can promote safety in the long run. How Can Citizens Protect Themselves? In order for citizens to most effectively protect themselves, it is important that they clearly understand who is at risk and how best they can be protected. Citizens should be encouraged to educate themselves and loved ones about the dangers of sexual assault and in particular about child sexual assault. (Organizations such as the National Center for Missing and Exploited Children and local sexual assault victim advocacy programs provide free information on sexual assault protection.) Citizens must understand that safely supervising sex offenders in communities is a complex task. The strategies that are emerging as promising for preventing individual offenders from reoffending involve the establishment of numerous controls and safety mechanisms. Unfortunately, there is no simple solution that will end sexual assault. Knowing My 8 Rules for Safety National Center for Missing and Exploited Children* 1. I always check first with my parents or the person in charge before I go anywhere or get into a car, even with someone I know. 2. I always check first with my parents or a trusted adult before I accept anything from anyone, even from someone I know. 3. I always take a friend with me when I go places or play outside. 4. I know my name, address, telephone number, and my parents’ 5. I say no if someone tries to touch me or treat me in a way that makes me feel scared, uncomfortable, or confused. 6. I know that I can tell my parents or a trusted adult if I feel scared, uncomfortable, or confused. 7. It’s OK to say no, and I know that there will always be someone who can help me. 8. I am strong, smart, and have the right to be safe. *A sample of the public information resources currently available. Why Do We Need to Talk About Managing Sex Offenders Given that some portion of sex offenders are under correctional supervision in the community, it is prudent that citizens are educated about what effective supervision entails and the need to allocate appropriate supervision and treatment resources to the management of these individuals. Communities must also realize the importance of supporting offenders’ attempts to reintegrate into society and become more productive citizens. Their successful reintegration can also help provide much needed financial and emotional resources to offenders’ families (which may include primary victims). Community notification laws have been in effect for more than 10 years. Surprisingly, little research has been conducted on the impact of these laws. Perhaps this dearth of research is due to the tremendous variation among the states, and even within states, in how these statutes have been implemented. Regardless of what research does (or does not) tell us, notification has tremendous support from the public and appears to be gaining momentum, as evidenced by the rapid increase in states posting registration lists on the Internet. An increased awareness of sexual assault and how to prevent it may well be the best possible outcome of community notification. Efforts to increase public safety through notification can be furthered by using the opportunity to educate the public about ways they can help protect themselves. Even if community notification does not reduce the prevalence of sexual assault in our society or the recidivism rates of those subjected to notification, citizens can still benefit from these laws through the opportunity for education and awareness they offer. Scott Matson, Research Associate for the Center for Sex Offender Management was the principal author this paper. Kristin Littel and Madeline Carter edited the document. |Center for Sex Offender Management 8403 Colesville Road, Suite 720 Silver Spring, MD 20910 Phone: (301) 589-9383 Fax: (301) 589-3505 |National Alliance of Sexual Assault Coalitions 110 Connecticut Blvd. East Hartford, CT 06108 Phone: (860) 282-9881 |Detective Robert Shilling Sex Offender Detail Seattle Police Department 610 Third Avenue Seattle, WA 98104 Phone: (206) 684-5588 |Jacob Wetterling Resource Center 32 1st St. NW St. Joseph, MN 56374 Phone: (320) 363-0470 Fax: (320) 363-0473 |National Center for Missing and Exploited Children 2101 Wilson Blvd., Suite 550 Arlington, VA 22201 Phone: (800) THE LOST |MPO Lisa Boeving SPIN Program Coordinator Tampa Police Department 411 N. Franklin St. Tampa, FL 33602 Phone: (813) 276-3637 |Mesa Police Department 225 East 1st Street, Suite 102 Mesa, AZ 85201 Phone: (480) 644-2040 Fax: (480) 644-4084 |National Center for Victims of Crime 2111 Wilson Boulevard, Suite 300 Arlington, VA 22201 Phone: (703) 276-2880 Toll Free: (800) 211-7996 Fax: (703) 276-2889 |Washington State Institute for Public Policy P.O. Box 40999 110 East Fifth Ave., Suite 214 Olympia, WA 98504 Phone: (360) 586-2677 Fax: (360) 586-2793 Adams, D. (1999). Summary of state sex offender registry dissemination procedures. Washington, D.C.: U.S. Department of Justice, Bureau of Justice Statistics. Baldau, V.B. (1999 August). Summary of state sex offender registries: Automation and operation. Washington, D.C.: U.S. Department of Justice, Bureau of Justice Statistics. Born, M. (2000, August 5). Paper drops paedophile campaign. Center for Sex Offender Management (1997). An overview of sex offender community notification practices: Policy implications and promising approaches. Silver Spring, MD: Author. Freeman-Longo, R.E. (2000). Revisiting Megan’s Law and sex offender registration: Prevention or problem. Lexington, KY: American Probation and Parole Association. Greenfeld, L. (1997). Sex offenses and offenders: An analysis of data on rape and sexual assault. Washington, D.C.: U.S. Department of Justice, Bureau of Justice Statistics. Kilpatrick, D., Edmunds, C., and Seymour, A. (1992). Rape in America: A report to the nation. Arlington, VA: National Center for Victims of Crime. Lieb, R. (1996). Washington’s sexually violent predator law: Legislative history and comparisons with other states. Olympia, WA: Washington State Institute for Public Policy. Lieb, R., Quinsey, V., and Berliner, L. (1998). Sexual predators and social policy. In M. Tonry (Ed.), Crime and Justice (pp. 43-114). Chicago, IL: University of Chicago. Matson, S. and Lieb, R. (1996). Community notification in Washington State: 1996 survey of law enforcement. Olympia, WA: Washington State Institute for Public Policy. Matson, S. and Lieb, R. (1997). Megan’s Law: A review of state and federal legislation. Olympia, WA: Washington State Institute for Public Policy. Named Shamed. (2000, July 23). News of the World. Oregon Department of Corrections (1995, January). Sex offender community notification in Oregon (Prepared for the 1995 Legislature). Salem, OR: Author Phillips, D. (1998). Community notification as viewed by Washington’s citizens. Olympia, WA: Washington State Institute for Schram, D. and Milloy, C. (1995). A study of offender characteristics and recidivism. Olympia, WA: Washington State Institute for Public Policy. Tjaden, P. and Thoennes, N. (1998). and consequences of violence against women: Findings from the National Violence against Women Survey. Washington, D.C.: U.S. Department of Justice, National Institute of Justice. U.S. Department of Justice (1999, January 5). Megan’s Law; Final guidelines for the Jacob Wetterling Crimes Against Children and Sexually Violent Offender Registration Act, as amended. Register 64 (2), 572-587. Walsh, E. and Cohen, F. (2000). Sex offender registration and community notification: A ‘Megan’s Law’ sourcebook. Civic Research Institute. Zevitz, R. and Farkas, M. (2000). Sex offender community notification: Assessing the impact in Wisconsin. Washington, D.C.: U.S. Department of Justice, National Institute of Justice. Established in June 1997, CSOM’s goal is to enhance public safety by preventing further victimization through improving the management of adult and juvenile sex offenders who are in the community. A collaborative effort of the Office of Justice Programs, the National Institute of Corrections, and the State Justice Institute, CSOM is administered by the Center for Effective Public Policy and the American Probation and This project was supported by Grant No. 97-WT-VX-K007, awarded by the Office of Justice Programs, U.S. Department of Justice. Points of view in this document are those of the author and do not necessarily represent the official position or policies of the U.S. Department of Justice. Back to CSOM Publications
<urn:uuid:cc2cb51e-1e34-445e-ae9a-d827c8d9df46>
CC-MAIN-2016-26
http://www.csom.org/pubs/notedu.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396106.25/warc/CC-MAIN-20160624154956-00078-ip-10-164-35-72.ec2.internal.warc.gz
en
0.916386
13,037
2.640625
3
Rare Books and Printed Material: New Acquisitions Include WWI Book A recent acquisition is this nearly pristine copy of a 1917 history and pictorial book on a World War I medical training camp at Fort Oglethorpe in the Georgia mountains just eight miles from Chattanooga. Officially named Camp Greenleaf, it was opened in June 1917 while the United States was involved in the Great War. It closed in early 1919 after the war ended. Medical Training Camp Fort Oglethorpe, Georgia is available for viewing in the Annie Belle Weaver Special Collections. In related collections, the ABW Special Collections also contains a personal photo album from a WWI soldier who spent time at an American hospital in Savenay, France (MS-0008). The owner of the album is unknown, but the photographs capture the grit of trench warfare and mechanized weapons. A former A&M student and teacher, Woodfin Carmical, did military service at Camp Gordon in Georgia. His scrapbook (LH-0023) contains photos and other memorabilia from his service circa 1917-1918. ABW Special Collections holds approximately 3,000 printed items dating from the 16th century to the present. Collection strengths include: · Local and regional history and culture, including agriculture, transportation, education, music, politics, and religion · Paranormal and humanistic psychology · Shape Note and Sacred Harp musical traditions · Publications by current and former faculty, including the works of nationally known Colonial America scholar John Ferling Several personal libraries are included in Special Collections: · David Hooks Library, composed of about 1,600 books from the 19th and 20th centuries covering subjects such as life after death, extra sensory perception, out-of-body experiences, apparitions, and altered states of consciousness. This collection was acquired by Special Collections in association with the Dr. William G. Roll Collection (unprocessed). · Anne G. Ingram Historical Children’s Literature Collection, consisting of eighty-six volumes dating from the mid-19th to early 20th centuries, which includes works by Louisa May Alcott, Lewis Carroll, James Fenimore Cooper, Charles Dickens, and many others. Anne Ingram was the only child of Irvine S. Ingram, who led first as principal of the 4th District A&M School and then was president of West Georgia College for nearly thirty years. · Sidney Jourard Library contains 520 works on anthropology, sociology, psychotherapy, religion, philosophy, research, and theory. Many of the books include the psychologist’s margin notes, providing researchers with an idea of the forces that shaped his thinking in the field of humanistic psychology. · Guillermo Hernandez de Alba book and ephemera collection of 100 items on Colombian colonial history, especially pertaining to Simon Bolivar and General Francisco de Paula Santander. This collection was purchased by the History Department in 1969. · Many more including the libraries of past university presidents Ingram and James E. Boyd, and immigrant scholar Gregor Sebba All materials can be found in the Ingram Library catalog and are available for viewing in the Research Room. Materials in Special Collections do not circulate.
<urn:uuid:0d5c307c-743a-4eb5-a5ca-4c855368332e>
CC-MAIN-2016-26
http://www.westga.edu/special/index_6970.php
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395992.75/warc/CC-MAIN-20160624154955-00121-ip-10-164-35-72.ec2.internal.warc.gz
en
0.947316
654
2.5625
3
Inspired by this post, and our science theme of Electricity, I decided to talk to my students about inventors. We began by discussing “what is an inventor?” and then brainstormed a list of as many inventions as they could think of. They had a hard time wondering what life might be like without a telephone, a car, and even a zipper! And then the fun began. I pulled out all of our art supplies and asked them to be inventors for the afternoon! I didn’t get too picky with these little learners, some created use-able inventions, some models of inventions they would like to build bigger, and others made slight variations on items that were already invented. Whatever. We were inventing, finding ways to use materials, solving problems, and talking about what we were learning. We were busy all afternoon, and I heard a lot of “Can I make another one?” and “Can we do this again tomorrow?” We have been working a lot, as a class, on clearly communicating our ideas to others through the written word. So as an extension of designing our inventions, I took pictures of each inventor and invention and each child wrote a description of what they had designed and how it works. I also videotaped a number of the inventors explaining their design, to be shown as part of our school news. If you want to do this at home, you could always write a letter or send a video or email to a friend or relative showcasing the new invention! - Read about some famous inventions and inventors - Create inventions that solve a problem (for instance I asked some of my inventors if they could invent a use for all of the fabric scraps we have accumulated in our classroom!) - Create inventions using a different set of materials (pipe and tubing would be fun, as would wood scraps) - Choose a modern invention and try and spend a day without it! Experience a day without a car, or a telephone or electricity.
<urn:uuid:fb5063f5-bba7-4e60-bfb3-97717c141321>
CC-MAIN-2016-26
http://www.artisaninthewoods.com/2012/04/10/we-are-inventors/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393997.50/warc/CC-MAIN-20160624154953-00072-ip-10-164-35-72.ec2.internal.warc.gz
en
0.983224
416
3.703125
4
WEST LAFAYETTE, Ind., May 14, 2014 — Optical imaging of objects as small as DNA strands could be possible using hyperbolic metamaterials. The ultrathin crystalline films act like metals when light passes through in one direction and like dielectrics when light passes in a perpendicular direction. Researchers exploring the metamaterials at Purdue University say practical applications could include quantum computing and high-performance solar cells. “This work is a very important step in terms of fundamental contributions in materials science and optics, as well as paving the way to some interesting applications,” said researcher Alexandra Boltasseva, an associate professor of electrical and computer engineering at Purdue. The metamaterial's hyperbolic dispersion of light. Images courtesy of Purdue University. Hyperbolic metamaterials harness surface plasmons to control light. However, some plasmonic components use metals like gold and silver, which are incompatible with CMOS manufacturing processes and do not transmit light efficiently. To alleviate that issue, the researchers created superlattice crystals by using magnetron sputtering to combine metals and semiconductors with atomic-scale precision using layers of titanium nitride and aluminum scandium nitride. “Here, we develop both plasmonic and dielectric materials that can be grown epitaxially into ultrathin and ultrasmooth layers with sharp interfaces,” Boltasseva said. In the study, the layers of titanium nitride and aluminum scandium nitride were each about 5 to 20 nm thick. The researchers said such superlattices could be developed in 2-nm thickness. The material has been shown to work in a broad spectrum from NIR, essential for telecommunications and optical communications, to visible light, essential for sensors, microscopes and efficient solid-state light sources. At left, a high-resolution transmission electron microscope image shows the interface of titanium nitride and aluminum scandium nitride in a superlattice. At right are images created with a technique that allows the material’s individual layers to be visible. “That's a novel part of this work: that we can create a superlattice metamaterial showing hyperbolic dispersion in the visible spectrum range,” Boltasseva said. A possible application for hyperbolic metamaterials is in planar hyperlenses, which could make optical microscopes 10 times more powerful and able to see objects as small as DNA. Advanced sensors could also be possible, in addition to more efficient solar collectors and quantum computing. The work was funded by the U.S. Army Research Office and the National Science Foundation and is published in Proceedings of the National Academy of Sciences (doi: 10.1073/pnas.1319446111). For more information, visit www.purdue.edu.
<urn:uuid:0f1cc24b-d8d1-4bad-92a4-5e7bd0f8aa19>
CC-MAIN-2016-26
http://www.photonics.com/Article.aspx?PID=6&VID=120&IID=759&Tag=Research+%26+Technology&AID=56190
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783400572.45/warc/CC-MAIN-20160624155000-00146-ip-10-164-35-72.ec2.internal.warc.gz
en
0.910195
586
3.59375
4
(Medical Xpress)—The findings of a 20-year project undertaken by scientists committed to developing improved treatments for chronic kidney disease reveal a significant advance in our understanding of organ failure. In a new paper published in the journal Immunity, researchers at the School of Medicine demonstrate a novel link that strongly implicates chronic inflammation in organ damage resulting in organ failure. The research paves the way for a new generation of therapies that will protect organs from this type of damage and diagnostics capable of predicting patients susceptible to organ failure. Critical for patients with kidney failure on peritoneal dialysis (the process uses the patient's peritoneum in the abdomen as a membrane across which fluids and dissolved substances - electrolytes, urea, glucose, albumin and other small molecules - are exchanged from the blood), the peritoneal cavity was used by scientists as a model to show how repeated episodes of infection result in inflammation triggering irreversible tissue damage. "Damage to organs, such as the heart, lungs, liver, kidneys – in this case the peritoneal cavity – due to chronic inflammation is a significant healthcare issue. Tissue damage results in organ dysfunction and in some cases organ failure requiring transplantation or dialysis," said Professor Simon Jones, one of the lead authors of the study. The other senior investigator of the paper, Professor Nick Topley, added: "Preventing infection-induced damage to the peritoneal membrane is critical to the future success of peritoneal dialysis. These findings are a major leap forward as they will allow us to target specific pathways for therapeutic benefit. This will enable us to treat patients for longer and more efficiently and target those who are most likely to develop problems." Explore further: Snapshot of dialysis: Who's getting treated at home? Ceri A. Fielding, Gareth W. Jones, Rachel M. McLoughlin, Louise McLeod, Victoria J. Hammond, Javier Uceda, Anwen S. Williams, Mark Lambie, Thomas L. Foster, Chia-Te Liao, Christopher M. Rice, Claire J. Greenhill, Chantal S. Colmont, Emily Hams, Barbara Coles, Ann Kift-Morgan, Zarabeth Newton, Katherine J. Craig, John D. Williams, Geraint T. Williams, Simon J. Davies, Ian R. Humphreys, Valerie B. O'Donnell, Philip R. Taylor, Brendan J. Jenkins, Nicholas Topley, Simon A. Jones. "Interleukin-6 Signaling Drives Fibrosis in Unresolved Inflammation," Immunity, Available online 9 January 2014, ISSN 1074-7613, dx.doi.org/10.1016/j.immuni.2013.10.022.
<urn:uuid:ecf0e45d-1253-47d5-a178-173274ba89f1>
CC-MAIN-2016-26
http://medicalxpress.com/news/2014-01-failure-advances.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397744.64/warc/CC-MAIN-20160624154957-00118-ip-10-164-35-72.ec2.internal.warc.gz
en
0.886533
569
2.734375
3
Newer anti-seizure drugs may have fewer side effects More recent research supports the use of the anticonvulsants gabapentin (Neurontin) or pregabalin (Lyrica) to help relieve pain caused by damaged nerves. Both gabapentin and pregabalin are particularly effective in the treatment of postherpetic neuralgia, diabetic neuropathy and pain caused by a spinal cord injury. Pregabalin also may be used to treat fibromyalgia. Because these drugs have few side effects and are usually well tolerated, they are often the first medications to try for neuropathic pain. You may experience side effects, such as drowsiness, dizziness, confusion or swelling in the feet and legs. These side effects are limited by starting with a low dosage and slowly increasing it. Medications from other drug classes with distinct mechanisms of pain relief (such as antidepressants) may be used in combination with anti-seizure class medications if anti-seizure medications fail to control your pain. Side effects limit use of older anticonvulsants Anti-seizure drugs have been used to treat nerve pain for many years, but their use was limited by the severity of side effects they produce. Older anti-seizure drugs include: - Carbamazepine (Carbatrol, Tegretol) - Oxcarbazepine (Trileptal) - Phenytoin (Dilantin) - Valproic acid (Depakene) Side effects may include: - Liver damage - Double vision - Loss of coordination If you take an older anticonvulsant, you generally need regular follow-up visits so that your doctor can monitor for side effects. These older drugs often have more side effects than do the newer anticonvulsants, and the evidence supporting use of the older anticonvulsants for neuropathic pain is sparse at times. As a result, older drugs may be recommended only when the newer medications prove ineffective. As scientists learn more about the way anti-seizure drugs work, this information will be useful in determining which drugs may work best for different types of nerve pain. Pain caused by nerve damage can be disabling, but anti-seizure drugs sometimes provide relief. Aug. 22, 2013 - Bajwa ZH, et al. Overview of the treatment of chronic pain. http://www.uptodate.com/home. Accessed June 13, 2013. - Daroff RB, et al. Bradley's Neurology in Clinical Practice. 6th ed. Philadelphia, Pa.: Saunders Elsevier; 2012. http://www.mdconsult.com/books/page.do?eid=4-u1.0-B978-1-4377-0434-1..00051-7--s0085&isbn=978-1-4377-0434-1&sid=1449455838&uniqId=413635127-3#4-u1.0-B978-1-4377-0434-1..00051-7--s0085. Accessed June 13, 2013. - Lynch ME. The pharmacotherapy of chronic pain. Rheumatic Disease Clinics of North America. 2008;34:369. - Jongen JL, et al. Neuropathic pain and pharmacological treatment. Pain Practice. In press. Accessed June 12, 2013. - Diabetic neuropathies: The nerve damage of diabetes. National Diabetes Information Clearinghouse. http://diabetes.niddk.nih.gov/dm/pubs/neuropathies/index.aspx. Accessed June 13, 2013. - Shingles: Hope through research. National Institute of Neurological Disorders and Stroke. http://www.ninds.nih.gov/disorders/shingles/detail_shingles.htm. Accessed June 13, 2013. - Facing forward: Life after cancer treatment. National Cancer Institute. http://www.cancer.gov/cancertopics/coping/life-after-treatment/. Accessed June 13, 2013. - Low back pain fact sheet. National Institute of Neurological Disorders and Stroke. http://www.ninds.nih.gov/disorders/backpain/detail_backpain.htm. Accessed June 13, 2013. - Fibromyalgia: Questions and answers about fibromyalgia. National Institute of Arthritis and Musculoskeletal and Skin Diseases. http://www.niams.nih.gov/health_info/fibromyalgia/. Accessed June 13, 2013. - Suicidal behavior and ideation and antiepileptic drugs. U.S. Food and Drug Administration. http://www.fda.gov/Drugs/DrugSafety/PostmarketDrugSafetyInformationforPatientsandProviders/ucm100190.htm. Accessed June 13, 2013. - NINDS trigeminal neuralgia information page. National Institute of Neurological Disorders and Stroke. http://www.ninds.nih.gov/disorders/trigeminal_neuralgia/trigeminal_neuralgia.htm. Accessed June 13, 2013. - Watson JC (expert opinion). Mayo Clinic, Rochester, Minn. June 27, 2013.
<urn:uuid:a0e8ced6-8c87-4185-a4a1-19cdd3c55db4>
CC-MAIN-2016-26
http://www.mayoclinic.org/diseases-conditions/peripheral-neuropathy/in-depth/pain-medications/ART-20045004?pg=2
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398516.82/warc/CC-MAIN-20160624154958-00149-ip-10-164-35-72.ec2.internal.warc.gz
en
0.847087
1,143
2.515625
3
Aucune remarque pour cette diapositive First, there is inherent openness—hardware can be pretty self-explanatory about its composition. To keep that openness intact the challenge lies in defeating the novelty requirement of related patent application or design registrations by open design techniques.Second, breaking up complex systems into simpler modules is not as common in hardware design as in software—despite being promoted as good design practice. Combining modules is potentially more complex as in software as physical forces, mechanical fit and design considerations will have to be taken into account. Third, there are materials involved that may come at a cost and manufacturing processes that may not easily be accessed or require specialist tooling. Different strategies can be employed to overcome such barriers, such as using industrial side-products as raw materials, pooling manufacturing resources or using more universal fabricators.Fourth, the term hardware spans a much broader field than software and includes such far apart things as integrated circuits, home furniture and ship-to-shore container cranes. The different branches of hardware vary according to materials and technologies involved, manufacturing tools and processes, documentation customs and standards, etc., and the above mentioned characteristics may apply to a different extent. 00:47:00Soundbite by Jeremy Rifkin, President of the Foundation for Economic Trends and Adviser to the European Commission, (in ENGLISH) on the global economic crisis and a new economic vision for the world00:28:49
<urn:uuid:7903692d-6f06-4082-8d22-0d7ec7b96f10>
CC-MAIN-2016-26
http://fr.slideshare.net/petertroxler/open-source-in-distributed-manufacturing
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783394414.43/warc/CC-MAIN-20160624154954-00081-ip-10-164-35-72.ec2.internal.warc.gz
en
0.938831
297
2.65625
3
Science and Technology/Engineering Inquiry and Experimentation Asking and pursuing questions are keys to learning in all academic disciplines. There are multiple ways that students can ask and pursue questions in the science class. One way is to explore scientific phenomena in a classroom laboratory or around the school. Classroom investigation and experimentation can build essential scientific skills such as observing, measuring, replicating experiments, manipulating equipment, and collecting and reporting data. Students may sometimes choose what phenomenon to study, e.g., for a science fair project. More often, they conduct investigations and experiments that are selected and guided by the teacher. Students can also examine the questions pursued by scientists in their investigations of natural phenomena and processes as reported or shown in textbooks, papers, videos, the internet, and other media. These sources are valuable because they efficiently organize and highlight the key concepts and supporting evidence that characterize the most important work in science. Such study can then be supported in the classroom by demonstrations, experiments, or simulations that deliberately manage features of a natural object or process. Whatever the instructional approach, science instruction should include both concrete and manipulable materials and explanatory diagrams and textbooks. Scientific inquiry and experimentation should not be taught or tested as separate, stand-alone skills. Rather, opportunities for inquiry and experimentation should arise within a well-planned curriculum in the domains of science. They should be assessed through examples drawn from the life, physical, and earth and space science standards so that it is clear to students that in science, what is known does not stand separate from how it is known. In the earliest grades, scientific investigations can center on student questions, observations, and communication about what they observe. For example, students might plant a bean seed following simple directions written on a chart. Then they would write down what happens over time in their own words. In the later elementary years, students can plan and carry out investigations as a class, in small groups, or independently, often over a period of several class lessons. The teacher should first model the process of selecting a question that can be answered, formulating a hypothesis, planning the steps of an experiment, and determining the most objective way to test the hypothesis. Students should begin to incorporate the mathematical skills of measuring and graphing to communicate their findings. In the middle school years, teacher guidance remains important but allows for more variations in student approach. Students at this level are ready to formalize their understanding of what an experiment requires by controlling variables to ensure a fair test. Their work becomes more quantitative, and they learn the importance of carrying out several measurements to minimize sources of error. Because students at this level use a greater range of tools and equipment, they must learn safe laboratory practices (see Appendix V). At the conclusion of their investigations, students at the middle school level can be expected to prepare formal reports of their questions, procedures, and conclusions. In high school, students develop greater independence in designing and carrying out experiments, most often working alone or in small groups. They come up with questions and hypotheses that build on what they have learned from secondary sources. They learn to critique and defend their findings, and to revise their explanations of phenomena as new findings emerge. Their facility with using a variety of physical and conceptual models increases. Students in the final two years of high school can be encouraged to carry out extended independent experiments that explore a scientific hypothesis in depth, sometimes with the assistance of a scientific mentor from outside the school setting. Skills of Inquiry - Ask questions about objects, organisms, and events in the environment. - Tell about why and what would happen if? - Make predictions based on observed patterns. - Name and use simple equipment and tools (e.g., rulers, meter sticks, thermometers, hand lenses, and balances) to gather data and extend the senses. - Record observations and data with pictures, numbers, or written statements. - Discuss observations with others. - Ask questions and make predictions that can be tested. - Select and use appropriate tools and technology (e.g., calculators, computers, balances, scales, meter sticks, graduated cylinders) in order to extend observations. - Keep accurate records while conducting simple investigations or experiments. - Conduct multiple trials to test a prediction. Compare the result of an investigation or experiment with the prediction. - Recognize simple patterns in data and use data to create a reasonable explanation for the results of an investigation or experiment. - Record data and communicate findings to others using graphs, charts, maps, models, and oral and written reports. - Formulate a testable hypothesis. - Design and conduct an experiment specifying variables to be changed, controlled, and measured. - Select appropriate tools and technology (e.g., calculators, computers, thermometers, meter sticks, balances, graduated cylinders, and microscopes), and make quantitative observations. - Present and explain data and findings using multiple representations, including tables, graphs, mathematical and physical models, and demonstrations. - Draw conclusions based on data or evidence presented in tables or graphs, and make inferences based on patterns or trends in the data. - Communicate procedures and results using appropriate science and technology terminology. - Offer explanations of procedures, and critique and revise them. - Pose questions and state hypotheses based on prior scientific observations, experiments, and knowledge. - Distinguish between hypothesis and theory as scientific terms. - Either individually or as part of a student team, design and complete a scientific experiment that extends over several days or weeks. - Use mathematics to analyze and support findings and to model conclusions. - Simulate physical processes or phenomena using different kinds of representations. - Identify possible reasons for inconsistent results, such as sources of error or uncontrolled conditions. - Revise scientific models. - Communicate and defend a scientific argument.
<urn:uuid:8b45aab5-5b21-4458-8a5b-48616e4cf09a>
CC-MAIN-2016-26
http://www.doe.mass.edu/frameworks/scitech/2001/vision/iande.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402479.21/warc/CC-MAIN-20160624155002-00196-ip-10-164-35-72.ec2.internal.warc.gz
en
0.921212
1,195
4.15625
4
The Puyallup people constitute a Native American tribe residing on a reservation in western Washington's Puget Sound area. The reservation is unusual in that it lies within the city limits of several municipalities. The citified reservation is the home of more than 80,000 residents of various ethnic backgrounds. The original name of the tribe was spwiya'laphabsh, meaning generous or welcoming. The tribe originally spoke the Puyallup Nisqually tongue of the Salishan family of languages spoken among Northwest Coast original peoples. Salmon was the main food and an important object of veneration in Puyallup ceremonies. The Western red cedar was used extensively for shelter, clothing, and basketry. The Puyallup were fishers, gatherers, and hunters. They inhabited permanent dwellings along the riverbank. They were closely related to the Nisqually, a larger number of natives residing in the Nisqually River valley. The first European settler of the Puyallup region was a Dr. Tolmie, who arrived in the early 1830s. He, an Indian guide, and a number of other natives made their way through the valley in which about 2,000 Puyallup lived. Many more settlers would aggressively encroach upon the area over the next couple of decades, which exerted a hugely negative impact on the Puyallup and neighboring tribes. Finally, to try to shore up their way of life, the Puyallup tribe established relations with the U. S. government on December 16, 1854. Under duress, they and other tribes negotiated with Isaac Stevens, the Washington territorial governor and Indian agent. The result was the Treaty of Medicine Creek, by which the tribes ceded most of their territories, but reserved certain lands and rights including fishing rights. The Puyallup reservation was established by the treaty and originally comprised 1,280 acres. On January 20, 1856, the reservation was enlarged to 18,062 acres. The people raised wheat, oats and hay on natural meadows near tidal flats on the reservation. Article 10 of the treaty provided for a physician to address the health needs of the Puyallup tribe. Beginning with the 1877 Dawes Act, a congressional allotment program, the Puyallup reservation was broken up. To encourage farming, Congress authorized the division of reservation land among individual Indians with the exception of a tribal cemetery; much of the land is now in the city of Tacoma. Tacoma's growing population spurred locals to seek removal of restrictions on allotted reservation lands. On March 3, 1893, an act provided for the selection of allotment portions that were not required for Indian homes, and part of a tract that wasn't required for school purposes. The selected acreage was put up for sale by public auction. The 1893 statute provided that reservation land not sold would remain in Indian hands and not be sold for 10 years. Following that decade, non-Indians could transact directly with Indians. Half of the reservation was sold during that time. Under the auspices of the Indian Reorganization Act of 1934, which promulgated new rights for Native Americans, the tribe drafted a constitution that was approved by the secretary of the interior on May 13, 1936. The governing body was dubbed the Puyallup Tribal Council. Bob Satiacum, a proponent of Native American rights in particular treaty fishing rights was a well-known Puyallup tribal leader in the 1960s and '70s. Satiacum first gained notoriety in 1954, when he was apprehended for fishing unlawfully in the Puyallup River at Tacoma. He believed that he had a right by treaty to fish there. Satiacum was convicted; however, the Washington State Supreme Court overturned his conviction. Years of legal disputation followed over the issue. In addition, "fish-ins" were staged by Satiacum and his supporters, including Marlon Brando, who lent celebrity status to the effort. Eventually, the historic Boldt Decision of 1974 was handed down, which held that treaties signed with native tribes and the federal government in the 1850s entitled the tribes to 50 percent of the total fish harvest. On February 20, 1984, the U.S. Supreme Court upheld a U.S. Circuit Court of Appeals ruling that a dozen acres acquired by the Port of Tacoma in 1950 properly belonged to the Puyallup. President George H.W. Bush signed a bill that settled Puyallup tribal claims. The tribe was compensated in the amount of $77.25 million. See Indian Wars Time Table . See also Native American Cultural Regions map .
<urn:uuid:e647e48e-3acf-4865-a728-fc13ebe14e3a>
CC-MAIN-2016-26
http://www.u-s-history.com/pages/h1563.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397744.64/warc/CC-MAIN-20160624154957-00183-ip-10-164-35-72.ec2.internal.warc.gz
en
0.972564
958
3.8125
4
How the Interagency Process in Washington, D.C., Works An example of checks and balances in Washington, D.C., is the way in which the different parts of a single branch of government interact. In the executive branch, agencies that have overlapping jurisdiction over a policy issue must coordinate with one another through the interagency process. An example of the interagency process is the multilayered decision-making process of U.S. foreign policy. In the role of central foreign policy coordinator is the National Security Council (NSC). The National Security Advisor (NSA) is the personal presidential advisor responsible for the NSC agenda, meeting preparations, records, and distribution of NSC decisions. In a larger capacity, the NSA is responsible for ensuring that the president has the resources to make a fully informed decision, providing him (and someday her) with not only the available policy options but also the risks, opportunities, and political and practical feasibility associated with each option. At the most senior level, the interagency process is reflected by the Principals Committee (PC), which is chaired by the NSA. PC membership is up to the president; under the Obama administration, it has included the Secretaries of State, Treasury, Defense, Energy, and Homeland Security; the Attorney General; the Director of the Office of Management and Budget; the Ambassador to the United Nations; the president’s Chief of Staff; the Director of National Intelligence; and the Chairman of the Joint Chiefs of Staff. Often, other key Cabinet-level officials are invited to attend PC meetings when their issue of responsibility is being discussed. For example, when international economic or trade policy is on the agenda, additional participants may include the Secretary of Commerce, U.S. Trade Representative, or Secretary of Agriculture. However, the interagency process is much more complex than just holding meetings among the top Cabinet-level officials. Immediately below the PC is the Deputies Committee (DC), made up of the deputies or relevant undersecretaries of the executive agencies. The DC is responsible for managing the work of the interagency working groups at the staff level and making sure that the issues that are finally raised for PC and NSC review have been thoroughly evaluated. Historically, the DC level is where most policy decisions are made before the PC’s review and president’s decision. Usually, the issues that are raised to the PC level are very controversial or have major national security implications. Beneath the DC (adding more layers to our already-multilayered process) are interagency working groups or policy coordinating committees. These working groups are made up of issue experts, often with a regional or functional focus. Depending on the nature of the issues and responsibilities, these working groups meet regularly or only when an issue requires reconciliation or more than one agency’s involvement in implementing decisions. Making and implementing policy through the interagency process involves shifting factions and coalitions, just as you find in Congress (although party labels may not be at play in the interagency process). This reality creates built-in checks and balances within the executive branch — and, on occasion, gridlock. It also gives lobbyists the opportunity to insert themselves into the process by staying in touch with the agencies involved. Smart lobbyists find out where interagency players stand on a specific issue, identify who is driving that issue, and launch targeted advocacy to support or stall it.
<urn:uuid:7f854512-01b5-4a45-a40c-b8a6f41ff996>
CC-MAIN-2016-26
http://www.dummies.com/how-to/content/how-the-interagency-process-in-washington-dc-works.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397636.15/warc/CC-MAIN-20160624154957-00184-ip-10-164-35-72.ec2.internal.warc.gz
en
0.950962
701
2.8125
3
In this section, you will learn how to use break statement with Switch-Case in C. The switch case statements allows to control complex conditional and branching operations. It include any number of case instances, but should not have the same value. The break statement ends the processing of particular case otherwise, the program continues to the next case and executing all the statements until it reach at the end of the statement. The default statement shows the error message. You can see in the given example, the program prompts the user to enter any number. The expression defined in the switch statement finds whether the number is odd or even. If the number found is even, it will show the first case otherwise it will show the second case. Here is the code: Output will be displayed as: If you enter the number 5, the switch statement checks the condition and shows the second case i.e odd If you enter the number 6, the switch statement checks the condition and shows the first case i.e even Posted on: February 5, 2009 If you enjoyed this post then why not add us on Google+? Add us to your Circles
<urn:uuid:54e15cb9-d757-4f23-8018-3dee476661b8>
CC-MAIN-2016-26
http://www.roseindia.net/c-tutorials/c-break-switch-statement.shtml
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783392069.78/warc/CC-MAIN-20160624154952-00052-ip-10-164-35-72.ec2.internal.warc.gz
en
0.796646
232
4.28125
4
Forks of the Neshaminy The Forks of the Neshaminy is so called because of the narrow, winding stream valleys formed by the juncture of the Neshaminy and Little Neshaminy Creeks. This watershed is approximately 5,600 acres and was recently recognized in the Natural Areas Inventory of Bucks County as an area containing significant natural features, which should receive priority for protection. This region is also made up of a group of farms united by Neshaminy Creek. Due to topography, they form a visually distinct area that still reflects the region’s agricultural heritage. To view a map of our Lasting Landscapes® initiative for Forks of the Neshaminy, click in the attatchments box below. - Forks of the Neshaminy
<urn:uuid:a8853c89-ebda-4414-bb5e-bc5cf023130d>
CC-MAIN-2016-26
https://www.heritageconservancy.org/lasting-landscapes/forks-of-the-neshaminy/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395039.24/warc/CC-MAIN-20160624154955-00095-ip-10-164-35-72.ec2.internal.warc.gz
en
0.924275
169
2.65625
3
April 22, 2010 Gene Found that Plays Role in Intelligence University of Utah Brain Institute researcher leads multi-institution team in groundbreaking study SALT LAKE CITY, UT -- Although genetics is the most significant known determinant of human intelligence, how specific genes affect intelligence remains largely unknown. A multi-institution team led by a University of Utah (U of U) USTAR researcher has found that the brain gene STX1A plays a significant role in the level of intelligence displayed by patients with Williams Syndrome (WS). The study may have implications for the understanding of intelligence and treatment of neurological disease in the general population.Researchers at UCLA, Cedars-Sinai Medical Center, Salk Institute, and the U of U found that variations in the expression of STX1A could account for 15.6 percent of cognitive variation in a group of 65 WS patients, a very high level of confidence in comparison to prior genetic studies. STX1A is involved in the electrochemical processes that occur at the brain's synapses. The research team is under the direction of Julie R. Korenberg, Ph.D., M.D., Brain Institute USTAR investigator and professor of pediatrics at the U of U School of Medicine. The team published the study on April 21, 2010 in the open access / online scientific jounal PLoS ONE. The study describes a new approach in determining the relationship between gene expression and intelligence in patients with WS, a neurodevelopmental disorder caused by the deletion of only two dozen genes from chromosome 7, a tiny fraction of the almost 30,000 genes found in humans. WS patients have one less copy each of the genes in question than does the general population. WS patients typically exhibit an IQ of 60, compared to an average of 100 for the general population. WS patients tend to be highly verbal and social, but have difficulty with numbers, visual-spatial perception and memory. "Williams Syndrome patients are missing a very, very small amount of genetic material," said Korenberg. "In almost all other respects, their make-up is the same as the general population, so we knew to take a very close look at a small number of genes. We analyzed ten different genes, but the data spoke, and STX1A clearly stood out in relation to the different patients' intelligence levels," Korenberg said. STX1A has a fundamental role in the brain's neurotransmission machinery. It supports the process by which electrical signals speed from one neuron to the next. "In terms of the brain, we're talking about a basic utility when we look at STX1A," Korenberg said. The study points the way to further research that may have long-range benefits for WS patients as well as the general population. "This study shows in part how Nature's hand shapes intelligence at the synapse. Monitoring gene expression may provide unique insights into the neurobiology and genetics of intelligence in WS subjects and possibly the general population," Korenberg said. Korenberg suggested there may be pharmaceutical treatments in the future that could help enhance synaptic function. "New studies could suggest ways to help people whose brain function is lacking, such as in Williams Syndrome, or people who are losing brain function, such as in Alzheimer's Disease," she said. The research team overcame obstacles with some creative problem solving, Korenberg said. Since brain cells from live patients were unavailable for study, lymphoblastoid cells from the lymph system grown in culture provided the genetic material to analyze. In addition, the researchers developed a more precise measure of WS intelligence test data, using a technique called Principal Component Analysis (PCA). In comparison to standardized IQ tests best suited for the general population, the PCA approach was able to better represent a baseline pattern of intelligence in WS patients. The WS baseline adjusted for relative strengths and weaknesses in the study group, and was able to illuminate the impact of specific genes like STX1A more accurately. On the Net:
<urn:uuid:a5bdb52e-8566-439c-8e79-3ba4ba939114>
CC-MAIN-2016-26
http://www.redorbit.com/news/science/1854396/gene_found_that_plays_role_in_intelligence/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397696.49/warc/CC-MAIN-20160624154957-00145-ip-10-164-35-72.ec2.internal.warc.gz
en
0.941668
821
2.546875
3
Art looted by Nazis returns to Jewish owners A man looks at a poster reading "Census of Jews" displayed in an exhibition at the Shoah Memorial in Paris, Feb. 12. The French state prepares to give back seven stolen Nazi-era paintings - four of which are in the Louvre - to two Jewish families, after a decade-long tug of war. It ends years of struggle for the two families, whose claims were all validated by the French prime minister last year. (AP Photo/Jacques Brinon) The French government has announced that seven paintings seized by the Nazis from Jewish collectors and art dealers in France during World War II are to be returned to their rightful owners. Three of the paintings are kept in the illustrious Louvre, while four others hang in French national museums. They were part of a massive haul of 100,000 art works stolen in France by occupying Nazi forces during WWII at the behest of leader and failed art student Adolf Hitler. The return of the paintings marks welcome progress in a decades-long battle waged by the descendants of the Jewish owners whose collections were plundered during the occupation. The French government recovered about 60,000 art works following the war, of which about 45,000 were returned to their rightful owners, and another 10,000 were sold on the open market. But at the time, ownership of the balance could not be traced – many of the owners had perished in the Holocaust – and the search for their descendants effectively ceased in 1950. But Puerto Rican journalist and author Hector Feliciano ignited an explosive debate in France in 1995 with the publication of his book, “The Lost Museum,” in which he listed the looted art then hanging in French museums and accused the government of not doing enough to track the art works’ proper inheritors. The French government had “stonewalled” Feliciano's research at the time and he was forced to turn to U.S. archives to complete his book. The French government finally relented and staged an exhibition of more than 1,000 of 2,058 pieces then housed in its national collections. Six of the seven paintings to be returned – all 17th and18th century works with religious themes – will be returned to 82-year-old American Thomas Selldorf, a grandson of businessman and art collector Richard Neumann, who first fled Vienna for Paris, then Spain, before finally landing in Cuba. The other painting by Dutch artist Pieter Jansz van Asch will go back to the family of Czech banker Josef Wiener who died en route to a Nazi concentration camp in 1942. The London Times today reports that British officials say they are ready to accept new claims for looted art in its collections. Arts Council England’s senior policy adviser Gerry McQuillan said a British panel had already returned seven looted paintings since 2001. Elsewhere around the world descendants of the rightful owners continue their pursuit. Bill Schiller has held bureau postings for the Toronto Star in Johannesburg, Berlin, London and Beijing. He is a NNA and Amnesty International Award winner, and a Harvard Nieman Fellow from the class of '06. Follow him on Twitter @wschiller
<urn:uuid:07c8c184-0314-4e6a-87e8-6661346811fc>
CC-MAIN-2016-26
http://thestar.blogs.com/worlddaily/2013/02/art-looted-by-nazis-returns-to-jewish-owners.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396100.16/warc/CC-MAIN-20160624154956-00119-ip-10-164-35-72.ec2.internal.warc.gz
en
0.974317
662
2.875
3
At the time when the viceroy was received at Lima, Pedro de Puelles, who was lieutenant of Guanuco under Vaca de Castro, came among the first to pay his compliments and to tender submission to his authority. As he had resided long in Peru, and had great experience in the affairs of that country, the viceroy gave him a new commission, by which he was confirmed in the lieutenancy of Guanuco, to which city he was sent back, with orders to hold the inhabitants in readiness to take the field with their horses and arms in case of need. Puelles not only prepared the people of his government for taking the field, but even retained in his pay some soldiers who had come from the province of Chachapoyas along with Gomez de Soliz and Bonefaz. Thinking it necessary to strengthen his army as much as possible to oppose Gonzalo, who was now marching towards Lima, the viceroy sent Jeronimo de Villegas with a letter commanding Puelles to join him without delay with all his force. On the arrival of Villegas at Guanuco, he and Puelles consulted together on the state of affairs, and concluded that if they should join the viceroy they would give a decided superiority to his side; and after the defeat of Gonzalo, having no one to oppose him, the viceroy would then cause the regulations to be enforced in their utmost rigour, by which the whole colonists of Peru would suffer extreme injury; as by depriving them of their Indians, not only the burgesses to whom they belonged would be reduced to poverty, but even the soldiers would be materially injured, as the burgesses would be no longer in condition to furnish subsistence to the troops as now. They came to the resolution therefore to join the party of Gonzalo, and set out immediately in search of his army for that purpose. The author of this history.—E. About that distance to the north of Lima is the town of Huaura, which is probably the place indicated in the text, as in many names of places in Peru the initial syllable Gua or Hua, are interchangeably used by different authors.—E. Zarate is exceedingly negligent in regard to dates. We learn from the history of America, II. 370, that the present occurrences took place It has been already mentioned in a former note, that this is probably a different orthography for Huaura, a place about 70 miles to the N.N. W. of Lima.—E. Arequipa is a considerable way from the coast, on which there are several harbours, thirty or forty miles distant.—E. Garcilasso de la Vega differs somewhat in the names of one or two of these leading men who deserted from Gonzalo, and enumerates a considerable number more, among whom he names one Pedro Pizarro, saying they were in all about forty, with many of whom he was
<urn:uuid:2d150933-7d7a-4b67-a3fb-62c7852a7c46>
CC-MAIN-2016-26
http://www.bookrags.com/ebooks/12514/428.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397562.76/warc/CC-MAIN-20160624154957-00113-ip-10-164-35-72.ec2.internal.warc.gz
en
0.985279
633
2.6875
3