text
stringlengths 199
648k
| id
stringlengths 47
47
| dump
stringclasses 1
value | url
stringlengths 14
419
| file_path
stringlengths 139
140
| language
stringclasses 1
value | language_score
float64 0.65
1
| token_count
int64 50
235k
| score
float64 2.52
5.34
| int_score
int64 3
5
|
---|---|---|---|---|---|---|---|---|---|
Initiation, propagation, retardation, inhibition and termination steps are the constituent steps in a chain mechanism.
Initiation step is the step, in which radicals are formed from the molecule.
Propagation step is the step, in which new radicals are formed in the presence of radicals formed in initiation step.
Retardation step is the step, reduces the net rate of formation of product but chain reaction will not be terminated.
Inhibition is the step decreases the rate of product formation from the substrate.
Termination step means, in this step radical combined and end the chin mechanism.
|
<urn:uuid:b08c00db-7bf0-4321-9547-52bbf58f3284>
|
CC-MAIN-2016-26
|
http://www.chegg.com/homework-help/physical-chemistry-8th-edition-chapter-23-solutions-9780716787594
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395546.12/warc/CC-MAIN-20160624154955-00159-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.909837 | 121 | 3.140625 | 3 |
July 19, 2011
Save The Environment And Your Health By Eating Less Meat
Eat less meat and cheese, both for your health and for the environment, according to a report released by the Environmental Working Group (EWG).
EWG calculates that if every American goes without meat and cheese for just one day out of the week, it would be the same as the country driving 91 billion fewer miles a year.The report brings together statistics from various previous studies that say eating meat can be an important source of protein and vitamins when eaten in moderation.
"The goal is to really make this information accessible to consumers," Kari Hamerschlag, an agriculture analyst with EWG, told the Huffington Post.
"On the health side, we really pulled together all of the information and tried to make it as clear as possible that there's not just one reason to limit meat consumption; there are a whole host of reasons."
Data from the United Nations Food and Agriculture Organization suggests that Americans consume nearly 60% more meat than their European counterparts, and four times more than in many developing countries, reports the Huffington Post.
The EWG report claims a myriad of health effects from eating meat. For example, they cited a 2009 report from the National Cancer Institute that found that people who ate the most red meat, which can contain high levels of cholesterol-rising saturated fat, were 27% more likely to die of heart disease. In addition, the same report found that serious meat eaters were 20% more likely to die from cancer than those who consumed the least amount of meat.
A statement issued by the American Meat Institute, a trade association representing companies that process most of the red meat and turkey in the U.S., says that the report oversimplifies many of the health issues and that "the total body of evidence clearly demonstrates that meat is a healthy part of a balanced diet," according to the Huffington Post.
On the environmental side, the report is the most recent in a long list of reports that calculates the greenhouse gases emitted from food production.
USA Today reports that Lamb, which is consumed about 1% of the time by Americans, produced the highest pounds of carbon dioxide (39.2 lbs) per pound of meat. Beef came in second with 27 pounds of carbon dioxide, with cheese right behind it at 13.5%.
""¦ it takes about 10 pounds of milk to make 1 pound of cheese," says Hamerschlag.
However, according to the Environmental Protection Agency, only 3.4% of all greenhouse gases are the results of animal agriculture.
"By changing the focus of eating habits, people think it doesn't matter whether they drive a Hummer or a Prius, it's whether they eat a burger or not."
USA Today reports that Frank Mitloehner, who studies animal-environmental interactions at the University of California-Davis, disagrees with the EWG numbers. He says that the scientific life cycle assessments of meat production "haven't been conducted."
EWG is not asking people to become vegetarians. Instead, Hamerschlag says, "We're just urging people to be more conscious about what they eat."
The EWG report advocates once-a-week meat free meals that calls for "Meatless Mondays," and when eating meat, to opt for meat that comes from grass-fed, certified organic and pasture-raised animals.
"I'm not a vegetarian myself," says Marion Nestle, professor of nutrition at New York University, "but people don't need to eat as much meat as they're eating."
The Huffington Post reports that the American Institute for Cancer Research and the American Dietetic Association recommend limiting consumption of red meat to about 18 ounces a week, which is a little more than a pound.
On the Net:
- Environmental Working Group Statement
- United Nations Food and Agriculture Organization
- National Cancer Institute
- American Meat Institute
- Environmental Protection Agency
- University of California-Davis
- American Institute for Cancer Research
- American Dietetic Association
|
<urn:uuid:d3a9b036-5fa5-4da7-af11-1602b234c1a7>
|
CC-MAIN-2016-26
|
http://www.redorbit.com/news/health/2081023/save_the_environment_and_your_health_by_eating_less_meat/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783392099.27/warc/CC-MAIN-20160624154952-00197-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.959998 | 823 | 2.796875 | 3 |
Caves and Age
How radioactive dating confuses the situation
Caves are a common feature of karst landscapes—the rugged sort formed in rocks that dissolve easily such as limestone (mainly calcium carbonate), forming underground passages and drainages. Caves have always been considered the perfect archive, preserving the past, unlike most other environments. And they offer evolutionary scientists an array of items aching to be radiometrically dated.
These include the inspiring stone decorations called speleothems—such as stalactites (on the ceiling), stalagmites (on the floor) and flowstone. These formed when water enriched by dissolved carbon dioxide (CO2)—making it acidic—dissolved the alkaline calcium carbonate (CaCO3) in one place and released the mineral in another.1
Evolutionists claim speleothems formed over hundreds of thousands of years. But in my own evolutionary days, I had never considered an important consequence of such an age: the tiny water droplet, which built that stalagmite, had to keep arriving at precisely the same spot on the floor of the cave for 100,000 years!
Well, I knew—and all karstologists know—that the surface of limestone terrains above caves changes dramatically in short periods of time. And any change at the surface also changes the location of the water droplets inside the cave. However, the stalagmites do not indicate any changes. So the conclusion is simple: they cannot be that old. And that fact indicates the old-age belief is fallacious.
Speleothems are amenable to the uranium-thorium (234U/230Th) method of dating, and caves are assumed to be much less prone to variations of all sorts. Sometimes the ‘measured’ ages of speleothems can be tested by radiocarbon ages of artefacts and fossils found in caves. Speleothems are believed to preserve accurate records of ancient climates—or paleoclimates. This is because they preserve oxygen and carbon isotope ratios from the past, and that allows scientists to make paleoclimate reconstructions.
Radiometric dating however often disagrees with the observed growth rates of speleothems and their complex formation processes,2 and this confuses attempts to make sense of speleothem interpretations. As for paleoclimate reconstructions, one must understand well how any variation in climate could have affected the isotopic ratios and accurately relate these to the speleothem record.
Speleothems and ice cover
On the use of climate variations, karstological wisdom maintains that during the Ice Age the water infiltrating into caves either stopped or significantly diminished. At this time, ice covered much of the ground and even where it didn’t, beyond the ice sheets, permafrost was extensive. With less water it is expected that the growth of speleothems would be arrested or much diminished. This is a soundly-based understanding of how past environments would affect speleothem development.
Yet, this karstological wisdom is contradicted by most of the speleothems studied from areas that are known to have been affected by the ice cover! The reason is all to do with the dates that have been assigned by radioactive dating.
Because of the ‘dates’, evolutionists concluded that speleothems grew fast when they should not have grown, and did not grow when they should have! Rather than discard the dates, most evolutionary scientists prefer to discard all ‘unorthodox’ speleothems, and use only the few that match their grand scheme of things.
Vancouver Island karst
Some of the contradictory results have come from the karst on Vancouver Island, Canada, which has provided only a few datable speleothems. The reason for the paucity of specimens is that the island was covered by up to 2 km (6,500 ft) of ice during the Fraser Glaciation, the most intense episode of glaciation during the Ice Age. Understandably, the speleothems did not grow when ice covered the landscape, and after the ice melted, the caves are too young to have a large number of speleothems. In fact all North American karst terrains that have been covered by ice have similar characteristics.
Also, massive amounts of meltwater, running beneath the ice sheet, repeatedly flooded Vancouver Island caves. This is revealed by the frequent and large rounded boulders inside many caves, some transported by moving water from a considerable distance. This would have destroyed any speleothems and prevented new ones from forming. Thus, in North America, only caves south of the ice cover during the Ice Age are rich in speleothems.
The Vancouver Island speleothems have yielded radiometric ages of between 12 and 18 thousand years.3,4 That creates a problem and causes confusion. According to various geological evidences, the island was covered by ice, so the speleothems should not have grown at this time. But rather than question the radio-isotopic dates (and hence the methodology involved), some scientists have proposed that the 2-km—(6,500-ft—) thick ice cover melted and grew back in a few thousand years, even though there is no evidence for this melting and they cannot explain how it could have happened! Of course, a simpler explanation is that the radiometric dating is incorrect and that the speleothems grew only after the ice had melted.
Another contradictory result was uncovered by scientists studying a speleothem from Arch Cave on Vancouver Island. They nonchalantly stated that the cave was “chosen for its proximity to the ocean so as to reflect a global climate history, and for its abundance of accessible cave deposits that were distant enough from the cave entrance and ground surface to mitigate any seasonal temperature effects.” In other words, they envisaged that speleothem growth on the ancient shore lines on the east coast of Vancouver Island would allow meaningful global correlation as the world’s sea level oscillated during the Ice Age—rising and falling as ice was locked on continents or melted.
Based on the measured oxygen and carbon isotopes (18O and 13C) they reconstructed the paleoclimate from the speleothem, which was radiometrically dated at 12,500 years. Yet, the geological evidence indicates the island was covered by ice at that time, so there should have been no speleothems growing at all. Not only the island, but the nearby Strait of Georgia was completely plugged by ice, with glacial scouring still visible on the bottom. In spite of this, maintaining their unshakable confidence in radiometric dating, the scientists conveniently ignored these geological facts and claimed the speleothems grew beneath the ice cover.
But if there really was this much ice cover at the time that the speleothems grew, the water infiltrating into the caves would not reflect the atmospheric composition at the time (as rainwater infiltrating into caves does today). Rather it would reflect an unreliable mixture of water from the melted ice layers. That would render any paleoclimate reconstruction from speleothems meaningless. Under such circumstances the ‘global climate history’ cannot be reconstructed and cannot be directly correlated with data from the caves.
In other words, by uncritically accepting the radioactive date without question, the researchers have ended up with a scheme that contradicts the geological evidence and undermines the basis for making paleoclimate reconstructions in the first place.
Clearing the confusion
On the other hand, when we apply some scientific skepticism to the spurious dates, we uncover a rather simple and consistent scenario that is in perfect accordance with the Genesis record. This allows us to understand the proper sequence of events, with the effects of Noah’s Flood being the key. The caves on Vancouver Island formed after the Flood and during the Ice Age.5 As creationist geologists have so simply documented, the Ice Age was a consequence of the warmer oceans and cooler land that existed on the earth immediately after the Flood.6 Only when the ice from the Ice Age had retreated did speleothems start growing inside those caves, and these have recorded the post-glacial climate variations over the last 4,000 years.
References and notes
- Lewis, D., Rapid stalactite growth in Siberia, Creation 32(1):40–42, 2009; creation.com/stalactite. Return to text.
- Silvestru, E., Caves for all seasons, Creation 25(3):44–49, 2003;
creation.com/all-seasons. Return to text.
- Latham, A.G., Schwarcz, H.P. and Ford, D.C., Secular variation in the Earth’s magnetic field from 18.5 to 15.0 ka BP, as recorded in a Vancouver Island stalagmite, Canadian Journal of Earth Sciences 24:1235–1241, 1987. Return to text.
- Marshall, D., Bassam, G., Countess, R. and Gabities, J., Preliminary paleoclimate reconstruction based on a 12,500 year old speleothem from Vancouver Island, Canada: Stable isotopes and U–Th disequilibrium dating, Quaternary Science Reviews XXX:1–7, 2009. Return to text.
- Silvestru, E., Geology and Cave Formation: A Post-Flood Story, DVD. Return to text.
- Evolutionary ideas of the ice age involve cooling of the whole earth, but cold seas won’t evaporate much, hence fewer clouds, so less snow, so no source of the ice sheets. But the “fountains of the great deep” (Genesis 7:11) would have warmed the ocean, and cooled the land when volcanic ash blocked sunlight. See the Creation Answers Book, ch.16; creation.com/cab. For more technical detail, see Oard, M.J., An Ice Age Caused by the Genesis Flood, Institute for Creation Research, El Cajon, California, 1990. Return to text.
(Also available in German.)
Beautifully written. I have tried to make sense of previous articles on Vancouver's speleothems without success. This one is clear without being patronising.
You continue to use this kind of fallacious argument that how ONE of a thing formed means they ALL formed that way. Why?
Just because one formed quickly doesn't mean ALL formed quickly. It's quite simple.
"that the surface of limestone terrains above caves changes dramatically in short periods of time. And any change at the surface also changes the location of the water droplets inside the cave. "
No it doesn't. Surface changes don't change the location of the cracks in the cave "roof."
This is one example that is looked at in detail. It is enough to show that millions of years are not needed to form caves.
The cracks may not change, but the surface drainage would change and that would affect the way water flowed through the rocks.
I find it interesting that you conveniently left out one important factor in the formation of speleothems in caves:
" The bedrock also needs to be relatively close or at the surface."
I consistently find that your articles leave out bits of known information like that. Why?
Yes, the bedrock does need to be relatively close to the surface. That is why the article says that caves on Vancouver Island formed after the Flood and during the Ice Age. At that time the overlying rocks had been eroded away by the receding waters of the Flood and the bedrock was near the surface. Caves also formed very late in the Flood, again for the same reason.
Great article. It reminded me of a recent trip to Kartchner Caverns in Arizona, USA. After the full field trip explaining how a special formation in particular called "straws" took a thousand years per inch to grow from the ceiling of the cave, the trip was then concluded and we were exiting into a man made concrete tunnel. I looked up and to my surprise I saw a fully formed approx 6 inch "straw" formation growing down from the concrete tunnel. I stopped one of the tour guides and quietly asked him "so, if the straws took a thousand years per inch and this tunnel is only 10 years old, how is that here?" His reply was priceless: "Well, this tunnel presents ideal conditions for them to grow".
Since I relied on the tour guide to give me a ride back to the tourist center, I chose not to ask him why he thought the cave we had just left never had ideal conditions, but a man made tunnel did.
Great article. I started reading wondering whether it would be too technical, but the language and explanations are so clear that one wonders why evolutionists are so far off the mark.
|
<urn:uuid:20877db4-49df-4de5-bdc5-5e15bbc0b65a>
|
CC-MAIN-2016-26
|
http://creation.com/caves-and-age
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396224.52/warc/CC-MAIN-20160624154956-00136-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.950939 | 2,682 | 4 | 4 |
Every year on 21 March, the world commemorates the anniversary of the 1960 Sharpeville massacre, where dozens of peaceful demonstrators were shot by police in apartheid South Africa for protesting racially discriminatory laws.
This year's International Day for the Elimination of Racial Discrimination focuses on "Racism and Sport". The theme was chosen by the UN Human Rights Office to highlight the problem of racism in sports, which remains a disturbing occurrence in many parts of the world, as well as to raise awareness of the role sports can play in combating racism and racial discrimination.
"There is no place for racism and intolerance in sport… Sport is meant to foster social cohesion, bring different cultures together in a celebration of healthy competition, and to overcome the diffidence and even contempt that all too often divide countries and communities in the political and social arenas." — said UN Human Rights Chief, Navi Pillay.
At a special event in Geneva, the UN Human Rights Office will highlight the issues raised by the persistent racism at sporting events.
Professional footballer, Kevin-Prince Boateng, from AC Milan, Edgar Davids, ex-Dutch international and currently head coach at Barnet Football Club and Patrick Vieira, ex-French international, currently an executive with Manchester City, senior officials from the Union of European Football Associations and the Federation of International Football Associations and other experts will share their views on racism in football .
Racism in sport, both by fans and competitors is an on going concern of the UN Human Rights Office. In September 2012, the Human Rights Council noted that, “Despite the immense potential of sport in promoting tolerance, racism in sport is still a serious problem.”
Referencing the Olympic spirit requiring “human understanding, tolerance, fair play and solidarity, the Council urged an intensified “fight against racism in sport.”
The event in Geneva 21 March will focus on football and the damage inflicted on the sport by racism but also its potential as a positive force to combat discrimination.
Use social media to speak up against racial discrimination! Join the conversation using #FightRacism and share your views and experiences with others.
Find much more, and very detailed information, on discrimination via these links on the website of the UN Human Rights Office.
Discrimination is a priority of the United Nations Human Rights Office: read our feature stories about this issue and the anti discrimination programmes of the Office.
The Brussels based United Nations Regional Information Centre for Western Europe - UNRIC provides information on UN activities to the countries of the region. It also provides liaison with institutions of the European Union in the field of information. Its outreach activities extend to all segments of society and joint campaigns, projects and events are organized with partners including the EU, governments, the media, NGOs, schools and local authorities.
United Nations Regional Information Centre for Western Europe (UNRIC Brussels)
Residence Palace, Rue de la Loi/Wetstraat 155, Block C2,7th and 8th floor, Brussels 1040, Belgium
Tel.: +32 2 788 8484 / Fax: 32 2 788 8485
|
<urn:uuid:9cb28f7b-3cd0-4787-ada2-bbcc4fb2f42b>
|
CC-MAIN-2016-26
|
https://www.unric.org/en/latest-un-buzz/28318-no-place-for-racism-and-intolerance-in-sport
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396027.60/warc/CC-MAIN-20160624154956-00145-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.918631 | 638 | 2.90625 | 3 |
on 19 July 2005
the FCC released
Notice of Proposed
and Order (NPRM), .... When acted upon as written and posted in
the Federal Register ... this page will no
longer be necessary.
Looks like 23 February 07 is the day that Morse code is no longer a requirement for Amateur Radio licensing.......
Just a note...... 23 February 07 is now history......... Just leaving the page here for a bit of nostalgia.
(13 March 2007)
.... These notes are from My experience's of administrating the CW
examination as a member of a VE team...... even before the FCC turned it over to
the Amateur community in mid- eighties. --- all NOVICE Class 5 WPM examinations
were administered by a General Class or higher prior to that.
TIPS FOR TESTING scroll down a little ... DONT WAIT FOR THE FCC TO REMOVE THIS REQUIREMENT.....Get the code "under Your belt"
MORSE CODE a little background
It is a relative simple matter for anyone to broadcast a message using voice and the
English language. The only requirement is that the individual sending the message
should speak into a microphone connected to a transmitter. At the receiving end, the
procedure is just as simple, the individual desiring to understand the transmitted message
needs only to tune a receiver to the broadcasting station and listen to the spoken words
as they are reproduced by the receiver.
The transmission of messages by code however, requires a special skill on the part of
both the sender and the receiver.
WHY USE CODE TRANSMISSION IF VOICE TRANSMISSION IS SO MUCH SIMPLER?
1. Radio communication by code requires less elaborate, less costly and less bulky
equipment than does voice radio communication.
2. Code transmission will penetrate radio and atmospheric interference more readily than
will phone transmission. Code transmission will usually be intelligently received under
conditions that render voice transmission and reception impossible. The spoken word with
it's inflections, intonation and a tremendous variety of sounds is infinitely more complex
than is the single piercing note of a radio telegraph signal.
3. The radio telegraph code constitutes an invaluable method of sending secret
messages or security information with a greater amount of safety.
4. A transmitted code signal requires much less frequency space than does a radio
telephone signal. Approximately 6 KHZ for an AM signal and 15 KHZ for the wideband
FM signal. The typical CW signal is 1.5 KHZ.
5. Amateur radio operators use "Q" signals which have common meaning in languages
other than English. This permits the exchange of basic information in CW between
operators regardless of their English speaking ability.
The Morse code is made up of letters as is most spoken languages. The code letters
consist of sounds of short and long duration which are called DOTS & DASHES.
(sounded like DITS & DAHS) These sounds are usually high pitched tones of about 500
to 800 Hertz or approximately the sound of a high C on a piano. The long sound (DAH) is
three times as long in duration as the short sound (DIT). Each letter of the alphabet, each
number and each punctuation mark is composed of a different combination of these long
and short sounds.
Since Morse code consists of sound combinations it is very similar to music. A person
listening to the National Anthem hears only the melody and not the individual notes of the
music. Morse code is quickly mastered by listening for the "melody" of the letter sound
rather than counting the individual dits and dahs.
Now for the Examination
NUMBER NUMBERS NUMBERS ... KNOW THE NUMBERS It's difficult to have ten
questions about a five minute QSO without four or five of them requiring
numbers. (Call Signs, RST, Antenna Height, number of tubes, power, age,
years a ham....etc)
Expect to have a CALL Sign with a DAH DIT DIT DAH DIT ( / ) ... FCC exams are
required to have all 26 letters, zero thru 9 numbers, at least 4 punctuation
marks including the slant bar & procedural SK. Learn the common configurations
for CALLSIGNS like 1x2, 1x3, 2x1, 2x2 & 2x3 ... That way there will be no
surprises if something like WN7OPQ/6 is heard.
The exam is a typical QSO that will last for a little over five minutes.
Before the exam there will be a one minute warm-up to insure that everyone
can hear the message. You will be given a paper to copy both the practice
warm-up minute and the QSO . The QSO will start with a series of six "V"s and end
with the procedural sign SK.
A passing score is achieved by answering 7 out of the ten questions
correctly or 25 characters in a row. (Not counting the V's or Warmup)...
Numbers and punctuation marks count 2 and letters count 1.
What is the Call of the receiving station?
What is the location of the receiving station?
What is the Call of the Transmitting station?
What is the location of the transmitting operator?
What was the name of the receiving operator?
What was the RST report given by the transmitting operator?
What was the radio being used by the transmitting operator?
What did the transmitting operator say His power output was?
What type of antenna did the transmitting operator utilize?
What was the height of the antenna?
What was the weather described as?
How long had the transmitting operator been a Ham?
What was the reason given for ending the contact?
ADDITIONAL HELP: Learn the names of as many type of radios as possible...
especially the more common ones like KENWOOD, ICOM, YAESU, TEN-TEC, SWAN,
NATIONAL, HALLICRAFTERS, SBE & HEATHKIT.
Learn the names of the common antenna configurations..... like DIPOLE,
DELTA LOOP, WINDOM, ZEP, BAZOOKA, YAGI, BEAM, INVERTED VEE, LONGWIRE & ROMBIC
THAT WAY IF YOU COPY A PORTION OF THE RADIO NAME OR ANTENNA TYPE IT WILL BE EASIER TO FILL IN THE BLANK.
Be "up" for the examination both mentally & physically.
A good night's rest and something on the stomach is important.
Comfortable attire - (pinching shoes or a tight collar is a distraction)
Get to the examination location early. (get familiar with the testing facilities ..this
takes the apprehension "edge" off)
Whenever the examination is announced - secure a seat close to the sound.
When given the opportunity - copy all of the "warm-up" or practice run.
CW exams start with a series of six Vs and end with the procedural sign AR or SK
Call signs (If you miss part at first, they will also be in the closing).. The first call given is the RECEIVING operator followed by DE .. and then the Call of the TRANSMITTING operator
Names of the operators (receiving operator usually near the first of message)
.... Expect short names like JOE, JIM, JACK, BILL rarely a SAMANTHA or CLEMENTINE
but often a MARY, JILL, BETH
When you hear UR RST or SIGs is/are --- know there will be three numbers coming
next. Most likely the first will be a 5 and the last a 9 (know what RST is ....and that the first number is never over 5).... remember, it's possible to get a RST report like .... 599 W/QSB (with fading).. ....QSB....QRM ..... QRN are the only ones I have ever seen on a 5 WPM exam.
If you miss a Character----FORGET IT (for now) -- mark your copy with a "-" or just a space where the letter should be. These "holes" can be filled in later.... see below.
QTH - look for City & State (rarely DX locations on 5WPM exam) Sometimes just
the CITY or the STATE is given.... and the question usually asks for the CITY or STATE
even if both CITY & STATE are given.
When you hear weather or WX it's usually a two word description following.
(WINDY and WARM......... COLD and FREEZING .....DAMP and RAINY)
Sometimes followed by "TEMPERATURE IS __ DEGREES"
Type of radio (rig) --sometimes descriptive like OLD TUBE or QRP but
most often the name of a manufacturer.... KENWOOD, ICOM or YAESU
(TEN-TEC, SWAN, NATIONAL, HALLICRAFTERS, SBE, HOMEBREW
& HEATHKIT). ... be familiar with names of Rig types
Antenna used. Know the names of several configurations. DIPOLE, DELTA LOOP,
WINDOM, ZEP, BAZOOKA, YAGI, BEAM, INVERTED VEE, LONGWIRE & ROMBIC
By knowing the configuration names of the antennas it helps to fill in the "holes" in Your copy.
Comment like "BEEN A HAM 30 YEARS" or "AM IN 12TH GRADE"
Listen for why QRT........ "I MUST QRT FOR WORK".... "QRT FOR BED"
Listen for Callsigns again
The CW message is over: Listen for directions from the VE
Scan your copy - fill in the" holes" of the letters missed. (GROC_R) most likely
GROCER (EN_INEER) likely ENGINEER .... GET THE IDEA?.... This filling in of the "holes" helps in getting 1 minute of straight copy (25 characters in a row)..... a person must be able to communicate at 5 words per minute...... a copy of CHICA-O and later adding the G still means that the person got the meaning of the communication.
See if QTH corresponds to the callsigns (KL7XXX should be Alaska--WH6XXX in
Hawaii & etc).... KNOW the Call sign areas
Read over ALL the questions BEFORE printing any answers.
Usually the questions follow the copy (first in message --- first on test generally the
same sequence - but there are exceptions)
Answer all of the "SURE" ones FIRST. (Hopefully 7 or more)....
Look at the "doubtful" ones. Are any a "toss-up" between 2 responses? Like is it a four or a six? If its in a Callsign ..... see if You answered Florida for a location ... Florida is in 4 land
Look for "tell-tell" letters in your copy--if a couple of letters
match to what You have knowledge of , MARK IT. (DI_O__ is likely DIPOLE.... even
if the copy is just D_____ and it's about an antenna it's probably DIPOLE
if the copy is just _a___ and it's about a radio it's probably YAESU
If there is one "I have no idea" it's worth a guess. If it's a callsign remember the FCC
requires ALL numbers be used in the exam. Count the numbers You have copied....
If You are missing a ZERO or any other number, put it in the Callsign that doesn't have a number in Your copy.
If an Op says His age is 78, it's likely He's not a go-go dancer. If an Op says STUDENT
don't expect a number over 20 for age.
As a last resort----- EDUCATED GUESS...... any omitted answers are already incorrect.
If You don't have anything copied for antenna .... dipole, vertical, beam & longwire
showup most often. NEVER OMIT AN ANSWER ...... put down an educated guess.
Nothing copied for the rig? ... Kenwood, Yaesu or Icom .... certainly better than leaving it blank.
All of this is NO substitute for CW skill however, but it's a sure thing to help overcome the
exam apprehension and to secure a passing score. 7 out of 10 right
On the 5 WPM examination the requirement is 25 characters in a row.
(Not counting the practice run or the series of "V"s)
Numbers and punctuation marks count as two characters
After July 2001, all of the CW examinations were "fill in the blank". Of the
examinations that I have administered since that date there have been many
more applicants passing by 25 characters in a row rather than correctly getting
7 of 10 of the fill in the blank.
Good luck! I would even like to know if this information helped You.........
send Me a message......... [email protected]
|
<urn:uuid:06b6c4ad-7113-4189-ab5e-c5053c75198d>
|
CC-MAIN-2016-26
|
http://www.qsl.net/wj5o/mcode.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395560.69/warc/CC-MAIN-20160624154955-00099-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.914514 | 2,771 | 2.671875 | 3 |
Three special types of permissions are available for executable files and public directories: setuid, setgid, and sticky bit. When these permissions are set, any user who runs that executable file assumes the ID of the owner (or group) of the executable file.
You must be extremely careful when you set special permissions, because special permissions constitute a security risk. For example, a user can gain superuser capabilities by executing a program that sets the user ID (UID) to 0, which is the UID of root. Also, all users can set special permissions for files that they own, which constitutes another security concern.
You should monitor your system for any unauthorized use of the setuid permission and the setgid permission to gain superuser capabilities. A suspicious permission grants ownership of an administrative program to a user rather than to root or bin. To search for and list all files that use this special permission, see How to Find Files With Special File Permissions.
When setuid permission is set on an executable file, a process that runs this file is granted access on the basis of the owner of the file. The access is not based on the user who is running the executable file. This special permission allows a user to access files and directories that are normally available only to the owner.
For example, the setuid permission on the passwd command makes it possible for users to change passwords. A passwd command with setuid permission would resemble the following:
-r-sr-sr-x 3 root sys 28144 Jun 17 12:02 /usr/bin/passwd
This special permission presents a security risk. Some determined users can find a way to maintain the permissions that are granted to them by the setuid process even after the process has finished executing.
The use of setuid permissions with the reserved UIDs (0–100) from a program might not set the effective UID correctly. Use a shell script, or avoid using the reserved UIDs with setuid permissions.
The setgid permission is similar to the setuid permission. The process's effective group ID (GID) is changed to the group that owns the file, and a user is granted access based on the permissions that are granted to that group. The /usr/bin/mail command has setgid permissions:
-r-x--s--x 1 root mail 67504 Jun 17 12:01 /usr/bin/mail
When the setgid permission is applied to a directory, files that were created in this directory belong to the group to which the directory belongs. The files do not belong to the group to which the creating process belongs. Any user who has write and execute permissions in the directory can create a file there. However, the file belongs to the group that owns the directory, not to the group that the user belongs to.
You should monitor your system for any unauthorized use of the setgid permission to gain superuser capabilities. A suspicious permission grants group access to such a program to an unusual group rather than to root or bin. To search for and list all files that use this permission, see How to Find Files With Special File Permissions.
The sticky bit is a permission bit that protects the files within a directory. If the directory has the sticky bit set, a file can be deleted only by the file owner, the directory owner, or by a privileged user. The root user and the Primary Administrator role are examples of privileged users. The sticky bit prevents a user from deleting other users' files from public directories such as /tmp:
drwxrwxrwt 7 root sys 400 Sep 3 13:37 tmp
Be sure to set the sticky bit manually when you set up a public directory on a TMPFS file system. For instructions, see Example 7–5.
|
<urn:uuid:5d39bea9-166b-4f99-9f68-3d9ed49c7af3>
|
CC-MAIN-2016-26
|
http://docs.oracle.com/cd/E19082-01/819-3321/6n5i4b79b/index.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396106.25/warc/CC-MAIN-20160624154956-00167-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.913667 | 776 | 3.203125 | 3 |
Story: McKenna, John and McKenna, Thomas
This biography was written by Claire Hills and was first published in the Dictionary of New Zealand BiographyVolume 3, 1996
John and Thomas McKenna were born to Patrick McKenna and his wife, Margaret Wallace, who farmed in Newpark, Kilmaganny, County Kilkenny, Ireland. John is said to have been born on 20 February 1860 and Thomas on 21 December 1864. The brothers attended St Kieran's College and trained for the priesthood at St John's College, Waterford, and at the Knocktopher seminary.
John McKenna was ordained in 1883 and volunteered for the New Zealand mission. For a time he assisted at St Mary's Cathedral, Wellington, then in 1887 he became the parish priest of St Patrick's Church, Masterton. The Catholics, few in number, were mainly of Polish or Irish origin. Within weeks of his arrival McKenna realised that there was far too much work in the district for one man: the parish stretched from Pahiatua to Featherston and Martinborough. Thomas McKenna, who had just been ordained at St Mary's Cathedral, Kilkenny, was on his way to New Zealand. When he reached Wellington on 2 March 1888 his brother was there to meet him, and they travelled up to Masterton on the same day. Within a fortnight Thomas was appointed as curate in Masterton. He served there until 1891, then was stationed at Patea until 1894.
John and Thomas McKenna were able administrators and outstanding pastoral priests who together laid the foundation of the Catholic church in Wairarapa. When Pahiatua was established as a separate parish in 1894, Thomas returned as its first priest. The parish included Woodville, Pahiatua and surrounding country districts. He travelled widely in a gig across an often wild countryside of rough bush tracks and fast-flowing rivers to deliver instruction and offer Mass and the sacraments. When the Pahiatua church became too small, he joined his parishioners in clearing a new site. A church was built at Woodville and another at Hamua on land provided by the prominent Wairarapa Maori leader Nireaha Tamaki. John McKenna successfully overcame the financial difficulties of his parish, and oversaw the creation of a separate parish south of Masterton in 1900. He enlarged St Patrick's Church in 1902 and built new churches at Eketahuna and Mauriceville. In his 43 years in Masterton he trained 23 curates.
In the 1890s Catholic education in Wairarapa was still in the hands of lay teachers. John McKenna obtained six sisters of the Congregation of St Brigid from Australia in 1898, and from 1899 secondary education for girls became available at St Bride's Boarding and Day High School (later St Bride's College); co-educational primary education was already available at St Patrick's School. Thomas McKenna established a branch of the same order at Pahiatua in 1906. He offered them the use of the presbytery as a temporary convent, and moved into a small cottage in Tyndall Street until the convent was built in 1912. Catholic education in Pahiatua started in the old Anglican church in Sedcole Street, which was leased for the purpose until St Anthony's Convent School was built in 1918.
In 1928 a new St Patrick's School was opened in Queen Street, Masterton. John McKenna contributed £1,000 towards the £5,000 cost. With an astute eye to the future he acquired the large Chapel Street property known as The Fish Ponds, which had originally been used for raising trout. The new St Bride's College was built on this site in 1970; it was later to become the third St Patrick's School.
John and Thomas McKenna were known for their ability to mix easily with people of widely varying backgrounds and for their lack of sectarianism. Wellington's rabbi, Herman van Staveren, was a personal friend of John McKenna, and McKenna stated that no attempt would be made to alter the religious beliefs of any non-Catholic children who happened to attend St Bride's school.
Thomas McKenna left Pahiatua in 1919 for St Anne's parish in Newtown, Wellington, and later ministered at New Plymouth. John became a prominent figure in the hierarchy of the Wellington diocese. He was made a dean in 1899 and vicar general of the archdiocese in 1913, with the title of monsignor. He was created domestic prelate in 1915, and in 1926 became the first national director of the Work of the Propagation of the Faith.
Both John and Thomas McKenna were famous throughout Wairarapa as enthusiastic sportsmen and able athletes. They represented Wairarapa at rugby, playing under their mother's maiden name, and Thomas refereed the first representative game between Wairarapa and Marlborough at Pahiatua in 1894. Both were excellent players of tennis and cricket. John was patron of the Wairarapa Rugby Football Union and the Masterton Lawn Tennis Club, a founding member of the Wairarapa Amateur Athletic and Cycling Club in 1893 (he broke the cycling record between Masterton and Carterton in 1895), and a member of the Masterton Gymnasium committee. He also played hockey and bowls. Community cultural organisations benefited from his participation and support: he was at various times vice president of the Masterton Operatic Society, the Masterton Juvenile Amateur Operatic Society and the Masterton Private Band.
Thomas McKenna died at New Plymouth on 8 July 1923; John McKenna died at Masterton on 13 April 1930. Their work and devotion to duty had earned them the affection of all sections of the Wairarapa community.
|
<urn:uuid:b7fa3f90-2b0c-4f04-b5ad-b8fccfd5870c>
|
CC-MAIN-2016-26
|
http://www.teara.govt.nz/en/biographies/3m16/mckenna-john
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395160.19/warc/CC-MAIN-20160624154955-00151-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.985014 | 1,173 | 2.71875 | 3 |
Oil spill's role in animal deaths unclear, officials say
Federal officials say they don't know whether a massive oil spill in the Gulf of Mexico killed 189 sea turtles, birds and other animals found dead since it started.
But in a phone news conference Tuesday, officials said they don't know if any of the animals were killed by oil or the chemicals being used to disperse it.
Barbara Schroeder of the National Oceanic and Atmospheric Administration's fisheries program says necropsies have not detected oil in the bodies of the sea turtles.
Acting U.S. Fish and Wildlife Service Director Rowan Gould says the spill's effects could be felt for decades and may never be fully known because so many affected creatures live far offshore.
RELATED ECOLOGY NEWS:
U.N. report warns about the importance of biological diversity protection measures
Shave pets, help the Gulf oil spill recovery effort: Group turns fur into mats that help contain oil
-- John Fleshler, Associated Press
Photo: Research assistant Megan Broadway holds an injured sea turtle at the Institute for Marine Mammal Studies in Gulfport, Miss., on May 1. The institute is involved in the effort to help animals affected by the oil spill. Credit: Dave Martin / Associated Press
|
<urn:uuid:9e536224-f65b-4217-853b-a0bc7c99cf61>
|
CC-MAIN-2016-26
|
http://latimesblogs.latimes.com/unleashed/2010/05/oil-spills-role-in-animal-deaths-unclear-officials-say.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391519.2/warc/CC-MAIN-20160624154951-00069-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.935757 | 254 | 2.9375 | 3 |
GEORGE RETSECKIMAGE COURTESY OF DELPHINE GOMEZ
Techniques exist to visualize specific gene loci within tissue sections. And separate test-tube experiments exist to determine those genes’ epigenetic modifications. Now Gary Owens, a professor of cardiovascular research at the University of Virginia, has devised a new technique that enables gene visualization and epigenetic analysis at the same time.
“The dirty little secret of epigenetics research is that we report quantitative differences from a cell population,” says Andrew Feinberg, a professor of molecular medicine at Johns Hopkins University who was not involved in the study. “If you really want to understand mechanisms, you also need to measure individual cells.”
To achieve single-cell precision, Owens modified an existing technique called a proximity ligation assay (PLA) that is used to determine if two proteins are in close proximity within a cell. Antibodies to the two proteins are tagged with overlapping complementary single strands of DNA. If the two strands are close together, they can be ligated to form an amplifiable circular DNA molecule that is detectable with a fluorescently labeled DNA probe.
Owens simply combined the method with in situ hybridization (ISH) to reveal whether a specific gene was in close proximity to a particular epigenetic mark—for example, methylation of lysine 4 in histone H3. First he hybridized his gene of interest with a DNA probe tagged with biotin. He then used an anti-biotin antibody tagged with one of the single-stranded DNAs for PLA. The other PLA tag was attached to the antibody recognizing the particular epigenetic mark.
The concept of combining ISH with PLA “was a real technical tour de force,” says Feinberg.
At present, Owens’s PLA-ISH technique allows examination of one type of epigenetic mark at one gene locus per experiment. But he says that with the development of further PLA reagents, it should be possible to look at multiple loci, epigenetic marks, and even transcription factors at the same time. (Nat Methods, 10:171-77, 2013)
|THE METHOD||HOW IT WORKS||ADVANTAGES||DISADVANTAGES|
|Chromatin immunoprecipitation (ChIP)||DNA cross-linked to chromatin is sheared into short sections. Antibodies recognizing epigenetic marks precipitate the associated DNA segments, which can then be sequenced.||Robust, well-established||
Results are an average from pooled cells.
|PLA-ISH||A gene of interest is tagged with single stranded DNA (ssDNA), and modified histones are tagged with a complementary strand of ssDNA. If the gene and modified histones are in close proximity, the ssDNAs anneal and are detected with a fluorescent probe.||Precise detection of specific proteins at specific gene loci in tissue sections||Currently limited to one color/interaction type per experiment|
|
<urn:uuid:674042ab-1102-45cf-a110-253f461e46e5>
|
CC-MAIN-2016-26
|
http://www.the-scientist.com/?articles.view/articleNo/37155/title/Precision-Epigenetics/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395160.19/warc/CC-MAIN-20160624154955-00047-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.908071 | 621 | 3.09375 | 3 |
Margot Krasojević just unveiled designs for a futuristic hydroelectric house that looks like a piece of Atlantis surfacing from the waves. Inspired by the shape of a sea urchin, the Hydroelectric Tidal House harnesses tidal and solar energy to generate electricity. Conceptualized for Llandudno, Cape Town, the sculptural building comprises two shells: a fixed, outer shell that anchors the home to the beach and a free-moving interior unit buoyed by the waves.
Cast in concrete, the outer semi-circular shell attaches the house to the shoreline with sand foundations. Solar cells line the outer shell to take advantage of Cape Town’s abundant sunshine however; the structure will be primarily powered by the more reliable renewable energy source of tidal waves. To maximize the amount of tidal energy captured, the shell is designed with a porous structure that allows multiple channels of water to flood the space between the outer and inner shells.
The Hydroelectric Tidal House features an electromagnetic turbine system that uses neodymium magnets and copper wire coils to induce an electric current when the waves push and pull against the extruded chambers. Thus, the inner floating shell is made from a lightweight non-ferrous aluminum structure; electrical energy is captured in a capacitor. The living area is composed of three modules that can be easily altered depending on the client’s functional requirements.
Images via Margot Krasojević
|
<urn:uuid:01085a6e-2c8f-46f4-81bd-a51ffe810785>
|
CC-MAIN-2016-26
|
http://inhabitat.com/spiky-sea-urchin-inspired-hydroelectric-house-converts-tidal-wave-energy-into-electricity/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403826.29/warc/CC-MAIN-20160624155003-00072-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.906902 | 295 | 2.703125 | 3 |
Scientists at the University of York have characterised an important new step in the mechanism used by bacteria to evade our immune system.
It is an invisibility cloak which means that bacteria like Haemophilus influenzae, a common cause of ear infections in children, can move about the body without the risk of being attacked by the immune system.
A multidisciplinary research team from the Departments of Biology and Chemistry at York have been studying how bacteria capture the molecule used to make the cloak, called sialic acid.
The researchers have now discovered an enzymatic activity that helps in the more efficient capture of sialic acids released from our cell surfaces. As well as using the sialic acid to make the invisibility cloak other bacteria use similar methods to capture sialic acid as a simple food source, so are literally eating us from the inside!
The research is published in the latest issue of the Journal of Biological Chemistry.
Dr Gavin Thomas, of the Department of Biology, who led the research said: This novel enzyme, as well as other steps required for the formation of the 'invisibility cloak' that we have discovered in York, now offers the chance to develop novel antimicrobials against these bacteria.
|Contact: David Garner|
University of York
|
<urn:uuid:cba11b31-8694-4a28-9dc1-4d81bf9c983b>
|
CC-MAIN-2016-26
|
http://www.bio-medicine.org/biology-news-1/Invisible-bacteria-dupe-the-human-immune-system-2264-1/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393533.44/warc/CC-MAIN-20160624154953-00140-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.923185 | 264 | 3.59375 | 4 |
“CSpace creates a virtual moving screen display that contains a variety of particles suspended within its volumetric image space. When these particles are excited by two different infrared lasers, they illuminate to generate a 3D image.”
The two infrared lasers combine to form an image in a “volumetric image space” (something like a clear cube). The breakthrough made is in the technology as well as the display quality. Not only can the 3D image be viewed from any angle, but it also displays an incredibly high resolution. On top of this, the whole prototype requires no moving parts. So far they’ve only been able to create green 3D objects, but the hope is to eventually create full-color 3D images.
Planet Earth is about to get its own version of the Web!
Cisco Systems is partnering with NASA to create a massive online collaborative global monitoring platform called the "Planetary Skin" to capture, collect, analyze and report data on environmental conditions around the world, while also providing researchers social web services for collaboration.
This type of platform is essential for Climate and Ecosystem researchers, but it also might be a sneak peak at the future of the Internet.
'Smart Planet': Age of Sensors & Structured Data If life in the past few decades has been forever altered by complex microprocessor chips, the next century could see the same social disruption via simple, low cost networked sensors and 'embedded objects' that mirror a digital signal of our analog world. But making this disconnected data relevant is a challenge.
The 'Planetary Skin' platform [video] will stitch together 'petabytes' of unstructured data collected by sensors (land, sea, air, space) reporting on changing environmental conditions. The platform will also allow for 'streamlining of decision making' and 'collaborative swarming' on analysis of relevant data. The project's first layer, “Rainforest Skin,” will be prototyped during 2009.
Good for NASA, Great for Cisco, and Wonderful for 'Mirror World' Metaverse Enthusiasts The benefits to NASA and Planetary system researchers is clear. Forget about Facebook, these scientists are looking for a functional digital research simulation 'Mirror World' (as envisioned by David Gelertner).
Meanwhile, Cisco is working diligently to make itself the most relevant web company in the next era of Internet architecture where collaboration, video, 3D simulations and structured data change the nature of our interactions. 'Planetary Skin' might be Cisco Systems under the radar, but out in the open effort of essentially building its own Internet of Tomorrow.
The day when anyone can create a stunning 3D Augmented Reality simulation is getting closer. Last month, General Electric's innovative AR media campaign to promote its 'Smart Grid' platform helped to push Augmented Reality out into the masses by giving users a chance to try it at home using a printable marker download and webcam.
Add sports media to the list of early technology adopter companies alongside the military and porn industries!
ESPN and Electronic Arts have joined forces around the ‘Virtual Playbook’ to shake up the world of broadcast media by launching a new era of immersive mass media experiences.
In recent years sports based games have pushed the evolution of 3D experiences, but now ESPN is bringing football analysis into the era of 3D Augmented Reality. This Fall, ESPN commentators will interact live with realistic 3D virtual NFL players. They will stand next to life sized scale 3D players as they demonstrate based offensive and defensive patterns.
Gamers are obviously thrilled and NFL viewers are likely to become bigger fans of sports commentators able to navigate a virtual landscape of players.
Now that we are witnessing the first mass media application of augmented reality, it becomes easier to build a futures road map looking at the convergence of drivers that support augmented mass media experiences.
We can see clear developmental lines of commercialization with 3D software (ray trace rendering, 3D authoring etc.), hardware (terahertz chips and video servers) and display technology (thin film, flexible OLEDs and high def projection systems) and interface standards (gesture, smart object and motion based interactions).
Thanks to ESPN, we have now jumped to major hurdles – viable business models around convergence of 3D software, gaming and virtual world companies with broadcast media. And the biggest barrier with the most uncertainty – People! Specifically mainstream TV viewers.
Entrepreneurs can now start imagining the unique applications. When might students use augmented reality to create reports – immersing themselves in history scenes or building cities? When might kids insert themselves inside a Dora the Explorer adventure? Or aspiring athletes play the world champions in an immersive experience that makes Wii tennis look like 8 bit pong?
When might technicians and engineers use augmented reality to work collaboratively long distance? Could Home Depot or our plumber walk us step by step through the bathroom project?!
The list of mainstream applications is exhaustive. And the convergence of technologies is within sight. There is no need to overstate and ‘hype’ augmented reality, or bow to naysayer skeptics of tech adoption. Augmented reality is much more appealing and functional than a pure virtual world experience. And it could give a boost to TV broadcasters desperate to stay relevant.
3, 5, 7 or 10 years is not too far off for mainstream applications at work and home! But how do we get there?
One of the most exciting areas of 'Nano-bio' research is the engineered integration of 'wet' and 'dry' nanoscale systems that might revolutionize research in genetics and proteomics (Study of Proteins). But how do you explain this breaking down the barriers of biological and human-made systems? Through 3D animation videos on YouTube, of course!
During the next decade we are likely to see commercial products that will start to define the 'Post PC' Era of smart, networked objects that follow a new path of product development. Users will interact with embedded devices beyond the keyboard and mouse. We know that OLEDs offer a clear path to flexible, transparent display screens, but what about the combination of sensors and low power chips that make the 'screen' irrelevant for new applications. If it is hard to imagine commercial Post PC applications for enterprise sectors, what about designs for education and entertainment markets based on visions like Impress project from Sillenet [via Vimeo]
France-based Easy Web develops 3D video projection systems for 'monumental architecture', but could they be developing new cultural expectations for human-city interfaces where everything becomes a template?
In its effort to catalog and effectively share the world’s
information, Google continues to improve its dynamic representation
of earth and has now extended its reach to cities and towns.
The first time I experienced Google Earth, I was pretty
impressed. Accessing satellite information, I was able to navigate
most any location on the planet that I was interested in, from a
bird’s eye view. Of course the first thing I did was check out my
street, the homes of my past, and landmarks around my town.
Next I was introduced to Street View, a
visualization composed of photos taken from automobiles that allows
full 3D street navigation. It wasn’t until a few weeks ago, when
Street View was at last integrated with Google Maps, that I could
travel down my street take a glance at my house and my car parked
neatly on the curb. That was really cool to me. I found myself
wondering where I was the time the photos was taken, and being
thankful they hadn’t caught me outside my
house in an early morning stupor.
After some light research I found that Google isn’t just
concerned with satisfying my curiosity. It has found ways to make
money with this technology while expanding its functionality for
important, decision-making parties.
Google introducing advanced versions of the platform with
Pro ($400/year), a collaborative tool for commercial and
professional use and Google Earth
Plus ($20/year) for everyday map enthusiasts. It also provides
non-profit organizations with Earth Outreach, a
program that allows organizations to map their projects to help
In March 2008, Google Earth introduced Cities in 3D which is
unsurprisingly a complete 3D visualization of numerous cities. To
contribute to this effort, users can submit and share renditions of
structures and buildings using Google’s SketchUp. The program
primarily relies on city governments to submit their 3D information
electronically (for free) and invites them to review the
The benefits for local governments seem rather extensive. They
include: engaging the public in planning, fostering economic
development, boosting tourism, simplifying navigation analysis,
enhancing facilities management, supporting security and crime
prevention, and facilitating emergency management.
Note: Make sure the movie loads fully before watching. I am trying to upload it to YouTube, but the feature is still buggy as Xtra Normal is in beta.
Using the new Xtra Normal platform, the above video took just 30 minutes to produce. This forward-step in super-user-friendly machinima brings us just a little closer to a scenario that I like to call The Toon Point, the time when virtual-world-generated video equals the average quality of a Saturday morning cartoon created in 2005. (Why 2005? Because that’s roughly when I began thinking about the notion of a Toon Point.)
Ever since my days in the West Hollywood Metaverse House, as my buddy and former roommate Jerry Paffendorf likes to call it, I’ve been a fan of virtual worlds and looking forward to The Toon Point. Due to their ability to incorporate and network other communication technologies, the potential of virtual worlds as an Interactive Communication Technology is simply astounding, and is reflected in their rapid diffusion patterns.
By helping us to climb the stairs of abstraction, user-friendly immersive data visualization (ie, geospatial data mapping) is poised to become one of the more significant near-term drivers of accelerating human inteligence and economics. Leading the charge is the small but robust company Green Phosphor, core participants in the progressive and under-recognized Second Life DataViz Group, which is laying down the foundations for Matrix-esque search: "I need guns, lots of guns."
Color me impressed by Green Phosphor's newest release, Glasshouse (demo vid below - don't worry, better graphics are on the way), which converts raw binary data into interactive 3d models. As indicated by the hire of a molecular biologist as Chief Scientist, the company is gearing up to monetize by applying this technology to the medical domains such as genomics and drug discovery.
As CEO Ben Lindquist points out, "The immersive 3d environment creates an entirely new paradigm for business intelligence and process modelling." More specifically, I'd argue that it marks a Meta-System Transition, or topsight leap, in our ability to process then interact with a variety of systems.
In the video above you are seeing the making of an augmented reality print ad. If you print out the PDF file here, go the their website here and launch your webcam, a highly-detailed MINI Cabrio should appear on the page which you can manipulate and zoom by rotating the ad. You'll need to download 3D plugins for the program to work which is daunting enough, but persevere and you'll get a 3D car on your paper.
You may have read a past article we did on augmented reality pop-up books for kids where people were working towards creating a commercially viable product involving augmented reality. Although they said development would be years away, seems like MINI has gone ahead and shortened the deadline. There have even been cases where cellphones have been used to display augmented reality projections.
Using print ads and a webcam is just the first step, next year we'll be seeing goggles which will make the whole experience that much more exciting.
This baby allows you to navigate all of your content, both locally stored and cloud based, with a 3D immersive application. It also includes a recommendation app that suggests related content (natch).
Visual search and browsing applications are starting to come fast and furious as the days of static, 2D text-based as sole option fade in the rearview mirror. The interface revolution is afoot. Should be a fun ride.
|
<urn:uuid:ae2b6614-00fa-4935-840a-187f1496393b>
|
CC-MAIN-2016-26
|
http://www.futureofgadgets.com/futureblogger/tag/3d
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391519.0/warc/CC-MAIN-20160624154951-00149-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.928843 | 2,580 | 2.8125 | 3 |
If you have hearing loss, research tells us that you can improve your ability to understand by using visual cues such as lipreading, body language, and facial expressions. Hearing aids and assistive devices amplify and improve the quality of sound, but for many people who have hearing loss, this still does not lead to adequate comprehension. To help us understand speech, we must learn to “read” what our friends, family and associates are saying. Have fun and learn new skills as you become more skilled in using visual information. No experience is necessary! Difficulty level will be tailored to participants’ needs.
Note: This is a 4-part series of courses. Classes can be taken in any order. Sign up for one or take them all. Each class is 4 hours in length.
D1: Homophenes P, B, M – Saturday, October 4, 9 a.m. – 1:30 p.m.
D2: Homophenes F,V – Saturday, October 18, 9 a.m. – 1:30 p.m.
D3: Vowel sounds and Numbers – Saturday, November , 9 a.m. – 1:30 p.m.
D4: W.Wh – Saturday, November 15, 9 a.m. – 1:30 p.m.
Sessions held in our office Boardroom, 63 Cornell Road NW.
To register please contact Lynsey or 403-284-6212 or by following this link.
|
<urn:uuid:8c068e76-2dd5-4952-8a46-c74dfea2471d>
|
CC-MAIN-2016-26
|
http://deafandhearalberta.ca/deaf-and-hear-alberta-news/speechreading-the-basics/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399385.17/warc/CC-MAIN-20160624154959-00169-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.949377 | 309 | 2.59375 | 3 |
These questions are to be read aloud by the scientist host. Teams will have two
minutes to submit the answer to each question on a sheet of paper (be sure to
include team names) and hand in each sheet for scoring. The host will give the
answer for each question before moving to the next one.
Scientist host should take out a cell phone and loudly pretend to place a call
to someone a few hundred miles away in another state. After "hanging up," the
scientist should ask the group for a show of hands to indicate who they think
heard his or her words first—the Kaffeehaus guests in the back of the
room (about 10 meters/30 feet away), or the friend in another state. The answer
may surprise some, but it gets back to the speed of light. Cell phones carry
signals as electromagnetic radiation (that is, at light speed). Light speed is
900,000 times faster than the speed of sound traveling through the air of the
room. So the scientist's voice made it to the other state before it made it
across the room to the people's ears.
Einstein was fascinated by the nature of light. One interesting thing about
light is that although it appears white, it can be broken out into a spectrum
of different colors by passing the white light through a prism. What are the
colors of the rainbow from longest wavelength to shortest?
Answer: Red, orange, yellow, green, blue, violet. (Also acceptable is
red, orange, yellow, green, blue, indigo, violet—forming the
familiar mnemonic ROYGBIV. The labels used for colors are arbitrary and while
indigo is no longer commonly used, it is included to make the sequence easier
What was the name of the top-secret U.S. government program to build the
Answer: The Manhattan Project
What radioactive element was used in the bomb that was dropped on
Answer: Uranium; offer bonus point for naming specific
Einstein was working as a patent clerk in Switzerland when he arrived at
E = mc2. A particularly notable patent that was awarded
within the last few years was to inventor Dean Kamen for the Segway Human
Transporter. What was the code name for this invention?
A: "Ginger" is the code name for the Segway Human Transporter. Also
acceptable, "IT" (rhymes with "fit").
How long does it take for light to travel from the sun to Earth?
- 10 seconds
- 85 minutes
- 850 minutes
- 10 minutes
- 8.5 minutes
Answer: (e) 8.5 minutes
This Hollywood comedian who starred in the movie ¡Three Amigos!
wrote a play called Picasso at the Lapin Agile about a fictional meeting
between Albert Einstein and Pablo Picasso.
Answer: Steve Martin
What instrument did Albert Einstein play starting at the age of five?
Answer: (b) Violin
Working after Einstein proposed his famous equation, Lise Meitner was the
first to show that a uranium atom can be split, converting a tiny amount of
mass into a prodigious amount of energy in accordance with the formula E=
mc2. What is the name of this splitting process?
Suppose you have a light bulb shining on a page of a book. Now you
move the bulb half the distance closer to the page. How much more intense will
the light be on the page?
Answer: 4 times more intense. The intensity of the light has
an inverse squared relationship to its distance from the page. 1/(1/2)2
Ten-Point "Make or Break" Question
Note to host: Remind players that they can wager up to 10 points on this
question. Points will be added to team total for a correct answer and
subtracted for an incorrect answer.
To what institute did Einstein come when he immigrated to the United States?
Answer: Institute for Advanced Study (located in Princeton, New Jersey,
but not affiliated with Princeton University)
|
<urn:uuid:bf61b5d6-3687-4439-b7c0-de540d0e25d1>
|
CC-MAIN-2016-26
|
http://www.pbs.org/wgbh/nova/einstein/lrk-hand-trivia2.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397695.90/warc/CC-MAIN-20160624154957-00108-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.935886 | 862 | 3.359375 | 3 |
Definition of warring
p. pr. & vb. n. - of War 2
The word "warring" uses 7 letters: A G I N R R W.
No direct anagrams for warring found in this word list.
Words formed by adding one letter before or after warring (in bold), or to aginrrw in any order:
o - arrowing
Shorter words found within warring:
ag agin ai ain air airn an ani ar aw awing awn gain gan gar garni gin girn gnar gnarr gnaw grain gran grin in na nag naw rag ragi rain ran rang rani raring raw rawin ria rig rin ring wag wain wair wan war waring warn wig wigan win wing wirra wrang wring
List shorter words within warring, sorted by length
All words formed from warring by changing one letter
Browse words starting with warring by next letter
|
<urn:uuid:39b6879e-a72a-4edd-b7f0-1ca96fe8d572>
|
CC-MAIN-2016-26
|
http://www.morewords.com/word/warring/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399106.96/warc/CC-MAIN-20160624154959-00182-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.839258 | 212 | 2.53125 | 3 |
The fire at Los Alamos has had one significant
consequence. A secret scientific document was discovered in a bunker
whose security systems were mostly destroyed by the fire. This document
was leaked to the public last weekend.
Actually it reveals nothing that we didnít already
suspect. But it does show that besides arsenic, lead, mercury, radon,
strontium and plutonium, one more extremely deadly and pervasive element
is known to exist.
This startling new discovery has been tentatively
named Governmentium (Gv) but kept top secret for 50 years. The new
element has no protons or electrons, thus having an atomic number of 0.
It does, however, have 1 neutron, 125 deputy neutrons, 75 supervisory
neutrons, and 111 team leader neutrons, giving it an atomic mass of 312.
These 312 particles are held together by a force
called morons, that are surrounded by vast quantities of lepton-like
particles called peons. Since it has no electrons, Governmentium is
inert. However, it can be detected as it impedes every reaction with
which it comes into contact.
According to the discoverers, a minute amount of
Governmentium causes one reaction to take over four days to complete
when it would normally take less than a second. Governmentium has a
normal half-life of approximately three years. It does not decay but
instead undergoes a reorganization in which a portion of the deputy
neutrons, supervisory neutrons, and team leader neutrons exchange
places. In fact, Governmentium mass will actually increase over time,
since, with each reorganization, some of the morons inevitably become
neutrons, forming new isodopes.
This characteristic of moron promotion leads some
scientists to speculate that Governmentium is formed whenever morons
reach a certain quantity in concentration. This hypothetical quantity is
referred to as the "Critical Morass."
|
<urn:uuid:0abaef34-b187-4593-b7fe-f76178af7bb4>
|
CC-MAIN-2016-26
|
http://www.appleseeds.org/governmentium.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395621.98/warc/CC-MAIN-20160624154955-00192-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.942359 | 415 | 2.953125 | 3 |
SARVAGNA KAVI: Biographical notes
The time of Sarvagna cannot be placed definitively. Research based on the early references to his work and his usage of script some of which became extinct later, one can place him to be in the early seventeenth century. According to Sarvagna (which is a pen name), his real name was Pushpadatta. His father was a Shaivaite Brahmin and his mother was a Shudra widow named Mali. His father met his mother at a place in present day Dharwar district in Karnataka on his way to Benares on a pilgrimage. Sarvagna grew up as a wandering monk. About a thousand verses are attributed to him, all in the meter Tripadi or three line stanzas. His poems deal with religion, morals, customs, astrology, weather-lores and even riddles. His Vachanas or sayings are often quoted by scholars and common folks alike. No two books of his work are alike and it is probable that several verses attributed to him were composed by imitators.
Stanza 1: Sarvagna was made of the same stuff as everyone. However, by learning one word of wisdom from each, he became a mountain of knowledge.
Stanza 2: While borrowing it is like eating a meal of milk and honey. When the loan is due to be paid, it feels as if the bones in the body are broken (This is a warning to credit card debts in particular!)
Stanza 3: A drunkard is like a pig. The poor pig, however, is helpful. The drunk is worse and useless.
Stanza 4: What is the use of circling round the temple without any feeling? It is like the ox which circles round the oil crusher. (Note: In old times oil was extracted in little ox pulled crushers).
Stanza 5: What use is giving advice to a fool a hundred times? It is like raining on a rock for hundred years. Will it ever soak in?
Stanza 6:One who has control over his pants, hand and mouth is like Vishnu and Brahma. He has nothing to worry. (Note: control over sexual conduct, behaviour and speech is what Sarvagna is talking about)
Stanza 7: If fools claim that they jumped over six mountains, agree to it. It is not worth fighting over.
Stanza 8: For one who knows how to speak, it is like water pouring out of Eta from a well. For one who does not know, it is just the rope hanging down. (Note: Eta is a device to draw water from a well. It is a pot tied to a rope).
Stanza 9:Learn somethings from those who know; Watch somethings from those who do; Learn otherthings by self experience.
Stanza 10: Offering food (to the hungry), telling the truth and putting others above oneself is a happy way to heaven.
Stanza 11: A wife who keeps the home warm, watches expenses, knows what is on your mind and acts accordingly is everything. Who cares if the heavens catch fire!
Stanza 12: One who gives (alms) without advertising is superior. One who gives and talks about it is medium. Only a knave talks much and gives nothing.
Stanza 13: The company of good men (women also) is like enjoying sweet honey. The company of evil men is like the stinking stuff in the sewer.
Stanza 14: By wearing a mark of ash (Note: orthodox Hindus wear such marks on their forehead and other parts of the body during religious rituals.) one were to reach heaven, a donkey (that rolls in ash) should reach there surely.
Stanza 15: By dipping in the river everyday ( Note: baths in holy rivers are parts of Hindu rituals.) a Brahmin were to jump to heaven, the frog which is born and lives in water should surely go to heaven.
Stanza 16: By dabbing sandalwood paste on the forehead one were to reach heaven, the stone used to grind the paste should be first to go there.
Stanza 17: No one knows everything. The learned are few. There is no guarantee that the smart bring wisdom. Knowledge is not available for all.
Stanza 18: A service without flowers, the king without a horse and friendship with one who does not know the language (one who cannot carry an intelligent conversation) are a waste.
|
<urn:uuid:cfab4a7e-0a4b-4f69-97ab-c8a55ae5cff3>
|
CC-MAIN-2016-26
|
http://web.missouri.edu/~chandrasekharh/kannada/SARVAGNA/sarvagna.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397795.31/warc/CC-MAIN-20160624154957-00044-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.977156 | 929 | 2.703125 | 3 |
Starting with a search for books is a good way to begin research. Books will cover a topic more broadly than articles and give you ideas of more specific issues to search for in articles. To find books, search the Online Catalog. For hints on search words to use for specific topics, see below.
The Opposing Viewpoints Resource Center is a database of electronic books covering a variety of controversial issues with chapters from books with both pro and con views. When you get to the list of topics, some relevant topics to choose might be: Bioethics, Biological Weapons, Cloning, Genetic Engineering, Stem Cells, etc.
ProQuest Research Library is a good general database for news, magazine, and some journal articles. Do not choose to search only peer reviewed articles, as most articles covering controversial issues are news or opinion rather than research articles.
Scientific American articles cover many issues in science from an educated perspective but understandable to the general reader. Articles cover a date range of 1910 to present.
Find articles in newspapers. The initial main page allows you to choose a quick news search or a guided news search in which you can select specific newspapers to search or to search only headlines, etc.
|
<urn:uuid:44298b4a-10c7-49d0-92b2-25bd5fa2d1f0>
|
CC-MAIN-2016-26
|
http://libguides.lib.msu.edu/biotech
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395160.19/warc/CC-MAIN-20160624154955-00192-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.901025 | 243 | 3.53125 | 4 |
WASHINGTON, June 19, 2003 — Forget matching a pile of black socks in an unlit room: Cosmic acceleration caused by dark energy, and the black holes that lurk in almost every galaxy are two of the real dark mysteries of the universe. Scientists are using rapidly advancing observational tools, computer simulations and theoretical predictions to study how these dark mysteries impact the past, present and future of our galaxy and of the universe.
Articles describing “the state of the dark” appear in Friday’s “Dark Side” special issue of the journal Science, published by the American Association for the Advancement of Science.
Astrophysicists around the world are refining and improving their ability to study distant and ancient light. These advances are also helping scientists understand the dark energy, dark matter and black holes that make up the 96 percent of the cosmos that we can’t see — the dark side.
“Making precise measurements is the nature of the game … and a real observational challenge,” said Robert Kirshner from the Harvard-Smithsonian Center for Astrophysics in Cambridge, Mass. His article describes the connections between dark energy, exploding stars and cosmic expansion.
Our expanding universe
The expansion of the universe has been speeding up in the past 7 billion years, thanks to dark energy. Scientists report that the presence of dark energy — with its unique density and negative pressure — is causing the universe to expand at a faster and faster rate.
Imagine our Milky Way galaxy as a red grape suspended in the orange Jell-O of the universe. To say that the universe is expanding at an ever-increasing rate means that the amount of orange Jell-O expands more today than it did yesterday.
There are many billions of other grapes in the Jell-O — each representing a galaxy in the universe. As the universe expands, the Milky Way and the rest of the galaxies stay the same size because they are held together by gravitational forces. However, the distance between galaxies increases.
Exploding stars expose accelerations
The acceleration of the universe provides indirect evidence for the existence of dark energy. But how did the researchers figure out that the universe is expanding?
The answer comes from exploding stars — specifically, a certain class of supernova explosions. Supernovae are the extremely bright explosions that mark the end of the life of some stars.
Scientists compare the light from supernova explosions from different ages in the past and use this light to measure changes in the rate of the expansion of the universe.
Light from explosions approximately one-third of the way back to the Big Bang or about 5 billion years ago are about 25 percent dimmer than they would be if the universe were expanding at a constant rate. From these kinds of observations, scientists demonstrate that for the past 7 billion years, the universe has been expanding at an increasing rate. These supernova explosions, about 4 billion times brighter than the sun, make it possible to back track through space and time and probe the history of cosmic expansion and the nature of dark energy.
Kirshner writes that the current evidence points to a universe currently dominated by dark energy.
“You see a tree moving and you say, ‘Oh, it’s the wind,’” said Kirshner, who drew a conceptual comparison between the invisibility of both wind and dark energy.
“We can’t see the dark energy, but we can study the way it interacts with the aspects of space that we can see,” explained Kirshner.
Big roles for black holes
Scientists are also watching the lights of the cosmos to gain insights on another dark mystery of the universe — black holes.
In a separate article in the same special issue of Science, Mitchell Begelman from the University of Colorado at Boulder describes how black-hole research is informing scientists about the evolution of our 14-billion-year-old universe.
Unlike dark energy, which is sprinkled throughout the universe and is measured by its large-scale effect on the evolution of the universe, black holes are discrete places that scientists can identify with observations from telescopes.
Black holes can form when massive stars collapse. Begelman writes that the gravity of black holes is so strong that nothing that enters them — not even light — can escape.
Tornados of space and time
“We can study what happens around specific black holes. We can also observe things that are in the process of falling into black holes,” said Begelman. He explained that spinning black holes kick up a tornado of space and time. Matter gets caught up in spacetime tornadoes and swirls around the black hole as it falls in.
In describing black holes, Begelman writes, “space and time are so distorted that there is literally no way out.”
Black holes as laboratories
There may be no way out of a black hole — but they are anything but a dead end for scientists.
“Black holes are laboratories for the most extreme conditions encountered in the post-Big Bang universe. Understanding black holes is crucial to understanding the Universe. They are much more than an oddity found in galaxies,” said Begelman.
Black holes come in at least two sizes. There are the smaller, stellar-size black holes, and there are supermassive black holes. The center of each galaxy, including our own Milky Way galaxy, contains a supermassive black hole.
Our supermassive black hole is 25,000 light years away from Earth. If you look in the direction of the constellation Sagittarius, the Archer, in the center of the Milky Way, you are looking toward our supermassive black hole. To study it, scientists must pierce the thick dust obscuring the Galactic Center.
The energy currently released from the Milky Way’s supermassive black hole is a thousand times greater than the energy emitted from the sun. However, researchers believe this amount of energy is just a dribble when compared with the energy it unleashed during galaxy formation.
“During the growth of our supermassive black hole, it released so much energy that it greatly impacted the development of the galaxy,” said Begelman. “But it’s hard to tell what role it played.”
Black holes and life
Scientists believe that supermassive black holes were crucial to the development of the structure of the universe.
“Black holes were involved in the accumulation of stars and gas into the compact regions of space that eventually formed planets and possibly life,” explained Begelman.
“We are incredibly lucky to be working just at the moment when the pieces of the cosmic jigsaw puzzle are falling into place, locking together, and revealing the outline of the pieces yet to come. Dark energy is the biggest missing piece and a place where astronomical observations point to a gaping hole in the present knowledge of fundamental physics,” Kirshner writes in Science.
© 2013 American Association for the Advancement of Science
|
<urn:uuid:1eb6ae53-aba9-4e9c-841d-90b2b7c983d4>
|
CC-MAIN-2016-26
|
http://www.nbcnews.com/id/3077421/ns/technology_and_science-science/t/dark-side-universe/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397864.87/warc/CC-MAIN-20160624154957-00082-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.924974 | 1,437 | 3.46875 | 3 |
I wanted to kick things off with Sir Lawrence Alma Tadema (1836-1912), a Dutch artist who became quite famous across Europe and was later based in England. He enjoyed fame and wealth during his living years. During the Victorian Era, there was an extremely high demand for his work, which placed strains on him to continue to create original works. Despite this, Alma-Tadema produced a significant body of work which is both beautiful to behold, but carries a history lesson within...of sorts.
Modern scholars are less keen on Tadema, and Hollywood for that matter, for depicting antiquity in a very stylised manner. Tadema's work, whilst very pleasing to behold, is not a shockingly accurate portrayal of life in times past. It is however, less florid and somewhat more believable than other Romantic period artists who made forays into Ancient Greece and Rome.
The image above is one my favourite Tadema works - definitely my favourite of his catalogue depicting Ancient Greece. The Parthenon of Athens is easily one of the most famous landmarks of Western Civilisation. Imbued with great symbolism atop the Acropolis, it not only proclaimed the greatness of Ancient Athens, but created an archetype of architecture that is intrinsically linked with modern depictions of Antiquity in popular media.
The central figure in the darker clothing is Phidias, the most lauded of Ancient artisans. A true Jack of All Trades, he was a Painter, Sculptor and Architect. In the classical style at least - such dazzling multi talent was not seen again for 1000 years until Michelangelo Buonarroti started poking around in Renaissance Italy. Aside from the Parthenon, Phidias was also responsible for the statue of Zeus at Olympia, later proclaimed among the Seven Wonders of The Ancient World. Although the original Zeus did not survive, in 1954, Phidias workshop at Olympia was unearthed.
As was common with classical sculpture, the frieze itself was also painted. It is here depicted as Tadema imagines it would have looked. The male pair to the left are interesting, the apparent familiarity of the two indicating a reference to a famous Athenian pass time among males.
A Channel 4 UK Documentary Athens: The Truth About Democracy, hosted by Bettany Hughes was aired in 2007. It provides a detailed and visually rich exploration of Athens during its golden age - and spends some time discussing Phidias' (and cohorts) Parthenon in depth.
|
<urn:uuid:76b4ee7a-989f-4c3b-b648-e00318bde8f4>
|
CC-MAIN-2016-26
|
http://www.3pipe.net/2009/11/phidias-flaunts-freize.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398216.41/warc/CC-MAIN-20160624154958-00063-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.974538 | 503 | 2.734375 | 3 |
The term, "Big Pharma," commonly describes large pharmaceutical corporations like Pfizer, Merck, GlaxoSmithKline and other large- and mega-cap companies. They pour billions of dollars into research to cure the world's diseases. Why, then, is Big Pharma essentially a four-letter word in the eyes of so many people? Surveys show that the public ranks Big Pharma near the bottom of their list of favorite industries. Pharmaceutical companies only ranked higher than the oil and gas, chemical and tobacco industries. That's it! Why would an industry with the mission of curing disease rank so low?
Not About the Public Good
At least that is the perception. People read accounts of lawsuits involving Big Pharma. They know that the pharmaceutical industry spends a lot of money sending sales representatives to doctors' offices to convince them to use their products.
They may even see studies such as the one published in the New England Journal of Medicine that showed that 94% of all doctors had a relationship of some kind with the pharmaceutical industry, and an average of four out of five of these relationships included receiving food in the workplace. Another study found that 28% of all doctors reported receiving some kind of payment from pharmaceutical companies, often as speakers on behalf of a certain drug.
The lawsuits are even worse. Take the $3-billion fine against GlaxoSmithKline, the largest fine ever imposed to a pharmaceutical company by the U.S. Department of Justice. GlaxoSmithKline illegally marketed Paxil and Wellbutrin, antidepressant drugs, while withholding data describing the health risks of Avandia, a diabetes drug.
Although it was the largest pharmaceutical fine in history, it amounted to an insignificant punishment for GlaxoSmithKline, accounting for only 11% of associated revenue. Critics argue that lawsuits like these do not deter companies from unlawful or unethical practices.
Leaving even larger public relations damage in its wake, in 2004, Big Pharma company, Merck, announced a recall of the popular anti-pain medication, Vioxx. The FDA found that Vioxx put patients at a significantly greater risk for heart attack and stroke. Later reviews found that as many as 55,000 deaths might have occurred because of Vioxx.
Fines later cost Merck more than $900 million. An additional $4.85-billion judgment followed in 2007 because of a class action lawsuit. Nonetheless, this was no more than a short-term hit to the company, which has since recovered. In 2011, Merck reported gross revenues of $31 billion.
Bristol Myers Squibb
Bristol Myers Squibb paid $515 million in fines after it was discovered that the company marketed its antipsychotic drug, Abilify, to treat conditions the drug is not approved to treat.
In addition, Bristol Myers Squibb sent sales teams to nursing homes to promote the drug, although they knew it had potentially fatal side effects on the elderly. The government also accused the company of paying medical professionals as well as pharmacists to dispense the product by offering them kickbacks and vacations.
Clean up Your Act
The pharmaceutical industry's representatives argue that they are working hard to enact policies and take actions that will restore the industry's reputation. A revised voluntary code put in place in 2009 by the Pharmaceutical Research and Manufacturers of America (PhRMA) no longer permits mugs, pens, tablets or other non-educational "reminder" gifts to be dispensed by pharmaceutical companies. When the code was announced, 32 of the 34 member companies of the trade organization signed on.
PhRMA points out that member companies spent a collective $49.5 billion in research and development. This makes the pharmaceutical industry one of the most research-intensive industries in the United States. In contrast, the entire industry spent $11.3 billion on marketing and promotion in 2008, including $4.4 billion for direct to consumer advertising, such as commercials and Internet or magazine ads.
Others point to the Physician Payment Sunshine Act, which is legislation that requires pharmaceutical companies to report any gift or compensation of more than $10. This includes food, speaking fees and most other transfers. It does not include, however, drug samples earmarked for patients.
The Bottom Line
It costs about $1.3 billion to bring a drug to market. Many drugs never gain Food and Drug Administration approval. For that reason, Big Pharma companies have to market aggressively or hike prices of drugs in order to stay in business. Others argue that, much like the oil and gas industry, Big Pharma, as a whole, isn't hurting for money. Engaging in criminal practices, they say, is not only bad for patients, but it's bad for stockholders and the roughly 300,000 industry employees who have lost their jobs since 2000.
|
<urn:uuid:ee132401-4cac-48e6-9e1a-19df59fc7889>
|
CC-MAIN-2016-26
|
http://bisdep.org/news.php?readmore=32
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399385.17/warc/CC-MAIN-20160624154959-00054-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.964564 | 989 | 2.859375 | 3 |
To address the growing problem of people being overdiagnosed and overtreated for cancer, a group of scientists convened by the National Cancer Institute and chaired by a UC San Francisco breast cancer expert is proposing a major update of the way the nation approaches diseases now classified as “cancer.”
The “Viewpoint” article will be published online on July 29 in the Journal of the American Medical Association.
When cancer screening programs were widely initiated three decades ago, medical knowledge of the disease was more simplistic. The intent was to detect cancer at its earliest stages to reduce illness and mortality, but in fact early diagnosis has not led to a proportional decline in serious disease and death, the scientists write in the JAMA commentary.
Instead, screening programs are identifying not only malignant cancers, but also slow-growing, low-risk lesions, and sweeping them into the same treatment process. As a result, patients are being diagnosed and treated for forms of cancer that might never actually harm them – a phenomenon that’s been termed overdiagnosis, which translates to “too much medicine.”
Now, with the advancement of scientific understanding of the biology of cancer, the authors say it is time for significant changes in practice and policy.
“By recognizing that cancer is not one disease, but a number of different diseases, we can individualize our treatment based on biology and avoid overtreatment,” said panel chair Laura J. Esserman, MD, MBA, director of the Carol Franc Buck Breast Care Center at the UCSF Helen Diller Family Comprehensive Cancer Center.
The authors recommend creation of a new classification for tumors that are indolent (unlikely to cause patients harm). For example, ductal carcinoma of the breast – currently considered the earliest form of breast cancer – would no longer be called cancer. The authors also call for the formation of registries for lesions with low potential for malignancy, and for a multidisciplinary approach across pathology, imaging, surgery and other medical specialties “to revise the taxonomy of lesions now called cancer.”
The key, they say, is to improve screening strategies to avoid overtreating tumors that would not be lethal, or that would not even have come to medical attention.
The JAMA article is comprised of recommendations from a working group formed last year during a meeting convened by the National Cancer Institute. The group was charged with developing a strategy to improve current approaches to cancer screening and prevention.
"Although our understanding of the biology of cancer has changed dramatically, perceptions on the part of the public, and among many physicians, have not yet changed,” Esserman said. “Cancer is still widely perceived as a diagnosis with lethal consequences if left untreated.”
The commentary was co-written by Ian M. Thompson, MD, professor at the University of Texas Health Science Center at San Antonio; and Brian Reid, MD, PhD, director of the Seattle Barrett’s Esophagus Program and member of the Human Biology Division at the Fred Hutchison Cancer Research Center in Seattle. The three authors served as chairs of the NCI working group.
An internationally known leader in the field of breast cancer, Esserman, a UCSF professor of surgery and radiology, is leading an effort to change the delivery of breast cancer services and the information systems used to support both research and patient care.
Overdiagnosis Occurs Across Many Medical Conditions
Overdiagnosis is occurring across many medical conditions, but is particularly common in breast cancer, lung cancer, prostate, thyroid cancer and melanoma, said the authors.
They cite DCIS, or ductal carcinoma of the breast, and Barrett’s esophagus as illustrations of how the detection and surgical removal of what have been called precancerous lesions have failed to lead to lower rates of invasive cancer.
By contrast, the authors said, colon and cervical cancer serve as examples of “effective screening programs in which early detection and removal of precancerous lesions have reduced incidence as well as late-stage disease.”
Cancer screening should have three important missions, the authors write: To detect disease that would ultimately harm the patient; to uncover tumors that benefit from intervention; and to detect disease that is more likely to be cured or better treated when spotted early.
Optimal screening frequency depends on a cancer’s growth rate. If a cancer is fast growing, screening is less likely to be effective. “If a cancer is slow growing but progressive, with a long latency and a precancerous lesion, screening is ideal and less frequent screening (eg.10 years for colonoscopy) may be effective,” the authors said.
The recommendations include:
• Recognize that screening will identify indolent cancers.
• Change terminology and omit the word “cancer” from premalignant/indolent conditions;
• Convene a multidisciplinary body to revise the current taxonomy of cancer and to create reclassification criteria for indolent conditions;
• Create observational registries for lesions with low potential for malignancy – generate the data to provide patients and their doctors “with confidence to select less invasive interventions;”
• Develop, validate and adopt molecular diagnostic tools that identify indolent or low-risk lesions;
• Mitigate overdiagnosis: appropriately reduce frequency of screening exams while focusing on high-risk populations, and raise the threshold for patients being recalled for re-testing and biopsy.
“Although no physician has the intention to overtreat or overdiagnose cancer, screening and patient awareness have increased the chance of identifying a spectrum of cancers, some of which are not life threatening,” the authors wrote. “The ultimate goal is to preferentially detect consequential cancer while avoiding detection of inconsequential disease.”
|
<urn:uuid:c083080b-e4e0-48a9-a42b-19bc3e9a05d9>
|
CC-MAIN-2016-26
|
http://www.technologynetworks.com/genomics/news.aspx?id=155731
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393332.57/warc/CC-MAIN-20160624154953-00021-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.949597 | 1,201 | 2.5625 | 3 |
Israel / Cities and Towns
Town in northeasternIsrael with 40,000 inhabitants (2008 estimate), at the western shore of Sea of Galilee, in a depression 205 metres below sea level.
The economic base of the town is agriculture, fishing and tourism. Tiberias is an important city in the theological development of Judaism.
19 CE: Founded by Herod Antipod.
70: With the destruction of the Temple of Jerusalem, many Jewish scholars moved to Tiberias. The town became centre of the highest religious court.
3rd-5th centuries: Much of the Palestinian Talmud is written down by Jewish scholars stationed in Tiberius.
1922: The Jews become majority of Tiberius.
|
<urn:uuid:310b3e5a-2ef2-4ac7-a8cf-c155451f3abd>
|
CC-MAIN-2016-26
|
http://www.i-cias.com/e.o/tiberias.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399117.38/warc/CC-MAIN-20160624154959-00157-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.923614 | 148 | 3 | 3 |
|This article needs additional citations for verification. (September 2014) (Learn how and when to remove this template message)|
Ross Island is one of the Andaman and Nicobar Islands, about 2 km east of Port Blair. It was the Administrative Headquarters for the islands, before an earthquake rocked it in 1941. The headquarters were then shifted to Port Blair. One can see remnants of an opulent past in the ruins of the church, swimming pool and the chief commissioner's residence with its huge gardens and grand ballrooms. There is also a cemetery and a small museum managed by the Indian Navy. The museum has on display a collection of old records.
Ross Island can be reached by a short boat ride from Water Sports Complex. The island is controlled by the Indian navy, which requires every visitor to sign in on entering.
The small island, with its treasure of ruins, became the hot tourists spot in the territory. The island presently houses the ruins of the state Ballroom, the Chief Commissioner’s House, the Government House, Church, the old 'Andamanese Home', which was Hospital, Bakery, Press, Swimming Pool and Troop Barracks, all in dilapidated condition, reminiscent of the old British regime. Ever since Dr. James Pattison Walker arrived in Port Blair aboard the East India Company’s steam frigate ‘Semiramis’ on 10 March 1858, this island remained under British occupation till 1942. From 1942 to 1945, the island was under the occupation of Japan. However, the allies reoccupied the island in 1945 and later abandoned it. During British occupation, this island was the seat of power of the British.
The rise and fall of Ross Island
Ross Island, a few km from Aberdeen jetty at Port Blair, is yet another member of the Andaman group of islands. As in the case of its sister-islands, it also has thick forests. To any onlooker it may give the impression that it has no "life" — in the sense that there is no human habitation.
Yes, it is an island where no settlement is allowed by the authorities. But, a few decades ago, this island was the seat of "British power." Ross Island was the headquarters of the Indian Penal Settlement for nearly 80 years. It had everything — bazaar, bakery, stores, water treatment plant, church, tennis court, printing press, secretariat, hospital, cemetery and what have you. Today, everything has disappeared except some buildings, which housed some of these landmarks.
After Archibald Blair's survey of the Andaman and Nicobar Islands in 1788-89, a settlement was established at present day Port Blair (then called Port Cornwallis). In 1792 it was shifted to northern harbour (present day Diglipur) which was also Christened Port Cornwallis (the former became Old Harbour). But, the settlement was abandoned in 1796 as the mortality rate was very high. Between 1789-92, Blair was said to have established a hospital and a sanatorium at Ross Island.
Six decades later, the 1857 Revolt forced the British to turn to Andaman again and this time, their stay lasted for 90 years. During the Second World War, the Andaman and Nicobar Islands were captured by the Japanese in 1942. The Japanese rule lasted till 1945.
In November 1857, the Government decided to establish a penal settlement in Andaman and send "hard-core elements" among those who took on the British. There were two reasons: One, to keep them away from other prisoners and the other, to send out a message that a similar treatment would be meted out to anyone who challenged the British authority.
Two months later, the British took possession of three islands in and around Port Blair and Captain H. Man, Executive Engineer, hoisted the Union Jack flag. In March, J.P. Walker, an experienced jail superintendent, arrived in Port Blair with four European officials, an Indian overseer, two doctors, 50 naval guards and 773 freedom fighters.
Writer Gauri Shankar Pandey, who belongs to a family that had suffered torture during the Japanese occupation of the Andaman and Nicobar Islands, has documented that it was water scarcity that had driven Walker out of Port Blair and go to Ross Island.
Named after the marine surveyor Sir Daniel Ross, the Island soon became the base. Initially, crude barracks of bamboo and grass were put up for freedom fighters while the rest of the party stayed on board the ships that had brought them. Later, the freedom fighters built houses, offices, barracks and other structures at the Ross Island, after which they were promptly sent to Viper Island, where the first jail was built. The bungalow, meant for the chief of the Penal Settlement, was constructed at the northern summit of the Island. Called Government House, the large-gabled home had Italian tiled flooring on the ground level. Now, some remains of the flooring are there, of course in a decrepit condition.
In 1872, the post of Superintendent was elevated to the level of Chief Commissioner and Sir Donald Martin Stewart, who was at Ross Island for one year, was made the first Chief Commissioner. Stewart held the post from July 1872 to June 1875.
After Stewart, Ross Island saw 24 chief commissioners. But, it was during the tenure of Sir Charles Francis Waterfall that the Island's position as the seat of power collapsed.
Waterfall, who became the Chief Commissioner in 1938, was captured by the Japanese in March 1942 when the latter invaded the Andaman and Nicobar Islands during World War II. He was held as a prisoner of war and his deputy, Major Bird, was beheaded by the Japanese at a clock tower in Aberdeen, Port Blair.
Netaji hoists tri-color
The Government House became the residence of the Japanese admiral also for three years (from March 1942 to October 1945). It was during this period that Netaji Subhas Chandra Bose, who took the help of Japanese in his fight against the British, stayed at the Island for a day in December 1943. Netaji also hoisted the national tri-color at the top of the Government House.
The Japanese too left their imprint on the island which stood in the form of bunkers. The bunkers were used as watch points to safeguard the Island from any foreign invasion.
After the War, the Island came back under the control of the British but they never went back to the Island.
About nine months before the Japanese take-over of the entire set of islands, Ross Island experienced an earthquake, which caused many people to leave the Island. Except for a brief time when the Japanese occupied, the abandonment of Ross Island as a result of the quake continued.
In April 1979, the island was handed over to the Navy, which set up a small post, INS Jarawa, named after one of the indigenous tribes of the Andaman group of islands.
In December 1993, a museum was established. It was declared open by the then Lt. Governor Vakkom Purushothaman. A small guesthouse has been put up for the Navy officers.
There are frequent boat services from Port Blair to Ross Island. The authorities charge entry fee of Rs. 50 for adults. No entry fee for children up to nine. Now, the Government have started Light and Sound Show in Ross Island also. (One more is in Cellular Jail). The new Sound and Light show at Ross Island has been inaugurated on 07.12.2014 and opened for general public from 08.12.2014 onwards. Initially there will be only one show in Hindi and the duration of the show is 45 minutes. The rates of ticket are as under:
Adult: Rs.100/- for the show plus Rs.100/- for the boat fare plus Rs. 75/ for entry to Ross Island i.e. Total – Rs 275/-
Children between 05-12 years: Rs.25/- for the show plus Rs.100/- for the boat fare plus Rs. 25/ for entry to Ross Island i.e. Total – Rs 150/-
Wednesdays will be weekly off for the show.
Boat for ferrying viewers for this show shall start from Aberdeen Jetty at 04:00 p.m. The capacity of the boat is 100 persons only. Visitors can spend time for going around Ross Island till 05:15 p.m. The show will start after it gets dark i.e. around 05:30 p.m. Tickets (for the boat, the show, and entry to Ross Island) will be sold on first come first served basis from the Reception counter of Directorate of Tourism from 8.30 am to 3.00 pm on the same day. For further details contact: 232694/244091.
- Established between 1863 and 1866 by the Rev. Henry Fisher Corbyn of the Bengal Ecclesiastical Establishment, who was sent to also set up proper full-time church services, and after whom 'Corbyn Cove' is also named. Rev.Corbyn was eventually posted out as Vicar to St. Luke's Church, Abbottabad, and he later died there and is buried in the Old Christian Cemetery, Abbottabad
- India Travel
- List of Lieutenant Governors of the Andaman and Nicobar Islands
- The Hindu (daily newspaper)
This page uses Creative Commons Licensed content from Wikipedia. A portion of the proceeds from advertising on Digplanet goes to supporting Wikipedia.
|
<urn:uuid:a7bdc906-93fd-4cbf-9147-cf2df6a41bd6>
|
CC-MAIN-2016-26
|
http://www.digplanet.com/wiki/Ross_Island_(Andaman)
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397428.37/warc/CC-MAIN-20160624154957-00124-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.974968 | 1,952 | 2.828125 | 3 |
Merowe Dam, Nile River, Republic of the Sudan
Astronaut photograph ISS025-E-6160 was acquired on October 5, 2010, with a Nikon D2Xs digital camera using a 50 mm lens, and is provided by the ISS Crew Earth Observations experiment and Image Science & Analysis Laboratory, Johnson Space Center. The image was taken by the Expedition 25 crew. The image in this article has been cropped and enhanced to improve contrast. Lens artifacts have been removed. The International Space Station Program supports the laboratory as part of the ISS National Lab to help astronauts take pictures of Earth that will be of the greatest value to scientists and the public, and to make those images freely available on the Internet. Additional images taken by astronauts and cosmonauts can be viewed at the NASA/JSC Gateway to Astronaut Photography of Earth. Caption by William L. Stefanov, NASA-JSC.
The Merowe Dam is located near the 4th cataract of the Nile River, in the Nubian Desert of the Republic of the Sudan (also known as Sudan). The dam was built to generate hydroelectric power—electricity intended to further industrial and agricultural development of the country. This astronaut photograph illustrates the current extent of the reservoir, which has been filling behind the dam since the final spill gate was closed in 2008. The Merowe Dam is located approximately 350 kilometer (215 miles) to the northwest of Sudan’s capital, Khartoum. The nearest settlement downstream of the dam is Karima.
Following Sudan’s independence from Egypt and the United Kingdom in 1956, allocation and control of Nile River water was divided between Egypt and Sudan by the Nile Waters Treaty signed in 1959. Today, other countries within the Nile basin—including Ethiopia, Kenya, Rwanda, Tanzania, and Uganda—are seeking more equitable allocation and utilization of the water and recently (2010) signed a new water use pact challenging the 1959 treaty.
Beyond the issues of water rights, several local tribes will be displaced by the planned 170 kilometer (105 mile) reservoir, and the flooded region contains significant but little-studied archeological sites. The Sudanese government has a resettlement program in place for the tribes, and a variety of international institutions have been conducting “salvage ” or “rescue” archeological surveys since 1999. Such rescue surveys seek to preserve as much information as possible from sites that will be destroyed or otherwise made inaccessible (in this case by flooding).
Note: Often times, due to the size, browsers have a difficult time opening and displaying images. If you experiece an error when clicking on an image link, please try directly downloading the image (using a right click, save as method) to view it locally.
This image originally appeared on the Earth Observatory. Click here to view the full, original record.
|
<urn:uuid:670b7c3b-7232-4a27-aad9-c783536b4849>
|
CC-MAIN-2016-26
|
http://visibleearth.nasa.gov/view.php?id=46505
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399385.17/warc/CC-MAIN-20160624154959-00101-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.943707 | 583 | 3.625 | 4 |
The Center’s History
The Sarah Isom Center for Women was established at The University of Mississippi in 1981 to address the changing roles and expectations of women students, faculty, and staff. The University has provided educational opportunities for women longer than any other state university in the South. When UM opened its doors to women in 1882, eleven women registered for classes. Today, women constitute half the student body.
Sarah McGehee Isom
Sarah Isom was the first female faculty member at the University of Mississippi and the first female faculty member at a coeducational institution of higher learning in the Southeast. She was born in Oxford, Mississippi, in the early 1850’s. Her parents were Dr. Thomas Dudley Isom, a physician and one of the town’s leading citizens, and Sarah McGehee Isom, formerly of South Carolina.
After receiving her early education in her hometown, “Miss Sallie” attended Augusta Seminary in Staunton, Virginia, where her special talent in drama and public speaking was recognized. She later studied with James Murdock at the Philadelphia School of Expression and George Riddle and Madame Janauschek in Boston. Highly praised by her professors and others who heard her perform, she appeared destined for a career on the stage. However, she returned home instead.
In 1885, the Board of Trustees elected her to fill the Chair of Elocution at the University of Mississippi. Since no woman had previously been included in the faculty, her selection was preceded by interesting correspondence between the Board’s Secretary and former Chancellor F.A.P. Barnard.
For the next twenty years, until her death, Miss Isom taught oratory to aspiring young politicians and other public figures, gaining appreciation and respect for her ability to train them to be effective readers and speakers. A striking redhead with a forceful personality, she became the subject of many tantalizing legends, some of which may actually have been true.
As part of the University’s mission, the Sarah Isom Center for Women and Gender Studies is responsible for integrating scholarly research on women’s and gender issues with advocacy for women in the classroom, on the campus, and in the larger community. The Center undertakes to:
- Provide an inclusive place where women and groups concerned with gender-related issues can gather.
- Educate community and campus on women’s and gender issues. This includes recognition of how gender intersects with other social categories like race, ethnicity, class, sexual orientation, gender identity, age, nationality, and ability.
- Aid interdisciplinary faculty research and teaching in Gender Studies.
- Continue to offer an interdisciplinary minor and a Graduate Certificate in Gender Studies, to support student research on Gender Studies, and to develop an undergraduate major in Gender Studies.
|
<urn:uuid:e8162bc1-161a-40fa-ac27-5b9c5f98bf09>
|
CC-MAIN-2016-26
|
http://sarahisomcenter.org/historymission/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783394987.40/warc/CC-MAIN-20160624154954-00015-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.968446 | 581 | 2.671875 | 3 |
The word Lecithin is taken from the Greek Lekithos, which means "egg yolk". A fitting name for this essential nutrient, for the egg is considered a symbol of life, strength and fertility. Lecithin is important for all of these biological functions and more.
Our brain is approximately 30% Lecithin. The insulating myelin sheaths that protect the brain, spine and thousands of miles of nerves in your baody are almost two-thirds Lecithin. Even the heart has a high concentration of Lecithin. Lecithin is composed of many different components, including Choline, Inositol, Linoleic Acid, Phosphatidylserine, beneficial fatty acids and triglycerides. These valuable constituents of Lecithin are vital for the proper functioning of many metabolic processes. NOW Lecithin Granules are derived entirely from soybeans.
|Serving Size: 10 grams|
Servings Per Container: 1997
|Ingredient||Amount||% Daily Value**|
|Calories from Fat||50|
| ** Percent Daily Value is based on a 2000 calorie diet. Your daily values may be higher or lower depending on your calorie needs.|
† Daily Value not established.
As a dietary supplement, take 2 tablespoons daily, preferably with meals. Mix in juice or shakes, or sprinkle on food. Lecithin is a naturally occurring compound found in all cells in nature, plant and animal. It plays a major role in almost all biological processes - including nerve transmission, breathing and energy production.
|
<urn:uuid:55a91296-48d4-48f3-adcd-7e39fdcd69fa>
|
CC-MAIN-2016-26
|
http://www.allstarhealth.com/f/now-lecithin_granules.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395679.92/warc/CC-MAIN-20160624154955-00164-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.873284 | 330 | 2.875 | 3 |
Expo/Science & Industry/Spacetime Wrinkles
| Forward |
Up | Map | Glossary | Information |
Anatomy of a Black Hole
By definition a black hole is a region where matter collapses to infinite density, and where, as a result, the curvature of spacetime is extreme. Moreover, the intense gravitational field of the black hole prevents any light or other electromagnetic radiation from escaping. But where lies the "point of no return" at which any matter or energy is doomed to disappear from the visible universe?
Applying the Einstein Field Equations to collapsing stars, German astrophysicist Kurt Schwarzschild deduced the critical radius for a given mass at which matter would collapse into an infinitely dense state known as a singularity. For a black hole whose mass equals 10 suns, this radius is about 30 kilometers or 19 miles, which translates into a critical circumference of 189 kilometers or 118 miles.
Schwarzschild Black Hole
If you envision the simplest three-dimensional geometry for a black hole,
that is a sphere (known as a Schwarzschild black hole), the black hole's
surface is known as the event horizon. Behind this horizon, the inward
pull of gravity is overwhelming and no information about the black hole's
interior can escape to the outer universe.
Apparent versus Event Horizon
As a doomed star reaches its critical circumference, an "apparent"
event horizon forms suddenly. Why "apparent?" Because it separates light rays that are trapped inside a black hole from those that can move away from it. However, some light rays that are moving away at a given instant of time may find themselves trapped later if more matter or energy falls into the black hole, increasing its gravitational pull. The event horizon is traced out by "critical" light rays that will never escape or fall in.
Apparent versus Event Horizon
Even before the star meets its final doom, the event horizon forms at the center, balloons out and breaks through the star's surface at the very moment it shrinks through the critical circumference. At this point in time, the apparent and event horizons merge as one: the horizon. For more details, see the caption for the above diagram.
The distinction between apparent horizon and event horizon may seem subtle, even obscure. Nevertheless the difference becomes important in computer simulations of how black
holes form and evolve.
Beyond the event horizon, nothing, not even light, can escape. So the event horizon acts as a kind of "surface" or "skin" beyond which we can venture but cannot see. Imagine what happens as you approach the horizon, then cross the threshold.
Care to take a one-way trip into a black hole?
At the center of a black hole lies the singularity, where matter is crushed to infinite density, the pull of gravity is infinitely strong, and spacetime has infinite curvature. Here it's no longer meaningful to speak of space and time, much less spacetime. Jumbled up at the singularity, space and time cease to exist as we know them.
The Limits of Physical Law
Newton and Einstein may have looked at the universe very differently, but they would have agreed on one thing: all physical laws are inherently bound up with a coherent fabric of space and time.
At the singularity, though, the laws of physics, including General Relativity, break down. Enter the strange world of quantum gravity. In this bizzare realm in which space and time are broken apart, cause and effect cannot be unraveled. Even today, there is no satisfactory theory
for what happens at and beyond the singularity.
It's no surprise that throughout his life Einstein rejected the possibility of singularities. So disturbing were the implications that, by the late 1960s, physicists conjectured that the universe forbade "naked singularities." After all, if a singularity were "naked," it could alter the whole universe unpredictably. All singularities within the universe must therefore be "clothed."
But inside what? The event horizon, of course! Cosmic censorship is thus enforced. Not so, however, for that ultimate cosmic singularity that gave rise to the Big Bang.
Science versus Speculation
We can't see beyond the event horizon. At the singularity, randomness reigns supreme. What, then, can we really "know" about black holes? How can we probe their secrets? The answer in part lies in understanding their evolution right after they form.
Forward to When a Black Hole Forms
Return to A Black Hole is Born
to Einstein's Legacy
Copyright © 1995, The Board of Trustees of the University of
NCSA. Last modified 11/5/95
|
<urn:uuid:5ab79654-a223-4f0d-8a50-656eec0516cc>
|
CC-MAIN-2016-26
|
http://archive.ncsa.illinois.edu/Cyberia/NumRel/BlackHoleAnat.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783408828.55/warc/CC-MAIN-20160624155008-00164-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.925872 | 968 | 4.4375 | 4 |
You may have heard that pizza is an American invention, ice cream is Italian, and The Earl of Sandwich invented the sandwich. Not so! Here's a look at the origins of some foods you enjoy every day. Some are a lot older than you may think!
The sandwich was named after John Montague, the 4th Earl of Sandwich, who was a prominent citizen of 18th century England and who did, indeed, eat meat between two slices of bread. But he was far from the first. The earliest recorded account of what became known as a sandwich was a Passover dish. The ancient sage Hillel was known to put meat from the Passover lamb, along with the ceremonial bitter herbs, inside matzo (unleavened bread). Montague was also not the first sandwich-eater in Britain, as bread was often used as plates during the Middle Ages. Even today, one of the best things about a sandwich is the lack of dishwashing involved.
Pasta is an Italian word, and Italy probably has the highest usage of pasta in the world, as well as the most shapes. But the food that is unleavened dough, extruded and dried, then boiled before eating, is definately Chinese. The oldest known noodles (pictured above) were found in 2005 in northwest China, supposedly 4,000 years old. I've occasionally put off cleaning out my refrigerator for a long time, but that's ridiculous.
More food history, after the jump.
Is ice cream really an Italian invention? That depends on how you define ice cream. Frozen desserts were made in ancient times by mixing various ingredients with snow or ice. In warmer climates, this was a delicacy reserved for the wealthy, as ice had to be brought down from the highest mountains. The Arabs were the first to make ice cream using sugar, and the first to sell such treats from commercial factories. The first ice cream using milk was created in Italy in the Middle Ages. Ice cream was served in the courts of Charles I and Charles II of England in the mid-1600s. Several ice cream recipes appeared in the a French cookbook in 1700. Recipes with actual cream didn't appear until the 18th century. The earliest known recipe with cream was published in 1751 by a London cookbook author named Hannah Glasse.
You've probably been told that pizza is an American invention. Not so, it is quite Italian, but pizza would never be if it weren't for the Americas. If you define pizza as Mediterranian flatbread cooked with tomatos, then you have your American connection. The tomato is a native American plant, introduced to Europe in the 16th century by Spanish travelers to America. Many Europeans considered the tomato to be poison, but they got over that eventually. By the 18th century, poor people in Italy were making tomato-based pizza, which led to street vendors, then finally the first pizzaria, Antica Pizzeria Port'Alba in Naples.
Update: For a much more detailed history of pizza, see David's Tuesday Turnip!
There's an old saying, If you love sausage and you love the law, you don't want to watch either being made. The word sausage covers a lot of different foods, but is usually defined as ground meat packed in casings, often with salt and spices for both flavor and preservation. Traditionally, the casings were the intestines of butchered animals, but now are often made of cellulose or plastic. Almost all populated areas of the world have their own forms of sausage. It was developed to efficiently use all the available meat from an animal, even if it were in parts too small to serve on their own... or too ugly to appear appetizing. The origins of sausage date back to at least 3000 BC, when Sumerians in what is now Iraq invented the technique.
Coffee consumption goes back to Ethiopia in the nineth century. The legend says that shepherds noticed the strange energetic way their goats danced after eating the berries of the wild coffee plant. Whether the story is true or not, it brings up a nice picture. By the 15th century, the beverage was popular all over the Middle East. It spread to Italy and the rest of Europe, and became fashionable after Pope Clement VIII pronounced the "Muslim drink" acceptable to Christians in 1600. Coffee consumption in America rested upon the availability of tea. During the Revolutionary War and the War of 1812, coffee gained a significant hold in the US due to trade problems with Britain. Today, the majority of caffeine consumed worldwide comes from coffee.
Hamburgers are indeed named after Hamburg, Germany, where they put pork roast on a bun. However, the sandwich we know as a hamburger, with grilled ground beef, was first recorded in 1885 in the United States. The delicacy seemed to arise in several locations, with Seymour, Wisconsin, Athens, Texas, and Hamburg, New York all claiming the first hamburger. On the other hand, the hot dog has a European origin. Frankfurt maintains the Frankfurter wurst was developed in the city in the 1480s. Vienna claims the hot dog decended from its wienerwurst. The city of Coburg in Bavaria says that a butcher there invented the "dachshund" or "little-dog" sausage. In any event, you have to wonder why people say "as American as hot dogs," when the hamburger has a better claim.
|
<urn:uuid:1efd32f2-2cf5-4dfa-9077-ddadb6dfa6b1>
|
CC-MAIN-2016-26
|
http://mentalfloss.com/node/17114/atom.xml
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398209.20/warc/CC-MAIN-20160624154958-00051-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.981787 | 1,120 | 2.90625 | 3 |
Protection from infection
Avoiding infections during pregnancy is important for your health and for protecting the well-being of your unborn baby. Some infections can be prevented by taking simple steps to make your environment and your food safe.
Toxoplasmosis is an infection caused by a single-celled parasite named Toxoplasma gondii. While the infection in adults causes flu-like symptoms, swollen lymph glands, or muscle aches and pains that last for a few days to several weeks, babies who became infected before birth can have serious mental or physical problems. The organism can be transmitted by eating raw meat, by handling litter boxes with cat feces containing the parasite, or by outdoor gardening in contaminated soil.
Listeriosis is a food-borne illness transmitted by bacteria in contaminated food. The listeria organism has been found in a variety of raw foods, such as uncooked meats and vegetables, as well as in processed foods that become contaminated after processing, such as soft cheeses and cold cuts at the deli counter. Unpasteurized (raw) milk or foods made from unpasteurized milk may contain listeria. Symptoms are flu-like, with fever, muscle aches, and sometimes nausea or diarrhea. When contracted during pregnancy, listeriosis may cause infection in the amniotic membranes leading to miscarriage, stillbirth, or severe infection in a newborn.
Food poisoning is a risk for all people, but in pregnancy, it can lead to dehydration in the mother and may deprive your unborn baby of nourishment. In addition, maternal food poisoning can cause serious illness in the fetus. Escherichia coli O157:H7 (a specific type of E. coli) can cause food poisoning that leads to bloody diarrhea and possible kidney failure. Illness can occur after eating undercooked, contaminated ground beef, drinking raw milk, or after swimming in or drinking contaminated water. Although alfalfa sprouts are often considered a "health food," the warm, humid conditions needed to grow sprouts from seeds are also ideal for bacteria, such as E. coli, to flourish.
Stay healthy and avoid these potential illnesses with the following recommendations:
Click here to view the
Online Resources of Pregnancy, Birth, and Baby Center
|
<urn:uuid:eaa5bb61-ea2f-4f4d-98a1-63c51ebf9309>
|
CC-MAIN-2016-26
|
http://www.nyhq.org/diw/Content.asp?PageID=DIW007571&More=DIW&language=Korean
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397749.89/warc/CC-MAIN-20160624154957-00090-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.955701 | 460 | 3.734375 | 4 |
The Diesel Tree: Grow Your Own Oil
You'd have thought that with 20,000 stories in our archives we might've at least mentioned this in passing. But it seems not. Australian farmers in the wet tropical region of North Queensland have bought over 20,000 of these so-called diesel trees. The intention is that in 15 or so years they'll have their very own oil mine growing on their farmland.
Because, the Brazilian Copaifera langsdorfii, to use its botanical name, can be tapped not unlike a rubber tree, but instead of yielding rubbery latex it gives up a natural diesel. According to the nurseryman selling the trees, one hectare will yield about 12,000 litres annually. *Once filtered—no complex refining required, apparently—it can be placed straight into a diesel tractor or truck. We read that a single Copaifera langsdorfii will continue to produce fuel oil for an impressive 70 years, with the only negative being that its particular form of diesel needs to be used within three months of extraction.
Oddly this is not news. The Center for New Crops & Plant Products, at Purdue University reports that it was first reported to the western world as far back as 1625. They observe reports from 1979 saying "Natives ... drill a 5 centimeter hole into the 1-meter thick trunk and put a bung into it. Every 6 months or so, they remove the bung and collect 15 to 20 liters of the hydrocarbon." The UN's Food and Agriculture Organisation noted in a paper at the Eleventh world forestry congress back in 1997 on the topic of tree oil for cars that "... the potential of other alternatives such as the Amazon Copaifera langsdorfii need to be investigated."
Copaifera langsdorfii can grow trunks 30 metres tall and store the oil in their unusual capilliary structure. The above image is a transverse section of the tree's cells.
* I used to convert metric measurements in American imperial but when I discovered that the only countries that have failed to embrace metric are the USA, Liberia and Burma I stopped. However Purdue University record that "An acre of 100 mature trees might thus be able to produce 25 barrels of fuel per year."
Image found at: 'Richter, H.G., and Dallwitz, M.J. 2000 onwards. Commercial timbers: descriptions, illustrations, identification, and information retrieval. In English, French, German, Portuguese, and Spanish. Version: 16th April 2006. http://delta-intkey.com'
|
<urn:uuid:94986308-1488-4dd3-a66d-14bec74ea1ce>
|
CC-MAIN-2016-26
|
http://www.treehugger.com/renewable-energy/the-diesel-tree-grow-your-own-oil.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397797.77/warc/CC-MAIN-20160624154957-00129-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.929067 | 531 | 2.890625 | 3 |
Scientists in Japan said Friday they have for the first time succeeded in coaxing sperm cells from mouse embryonic stem cells, a breakthrough that could one day help humans overcome infertility.
The sperm were used to fertilize eggs and were found to produce "healthy offspring that grew into fertile male and female adult mice," said the study in a special online edition of the US journal Cell.
Potential use of the technology in humans is at least a decade away, the Kyoto University team said.
But the experiment is exciting because it tackles one of the biggest obstacles in biology - making embryonic stem cells into sperm precursors, known as primordial germ cells, which then can become healthy sperm.
"This is the first (study) to report the generation of fully functional germline cells from ES (embryonic stem) cells," lead author of the study, Mitinori Saitou, professor at the department of anatomy and cell biology graduate school of medicine, Kyoto University, told AFP by email.
Researchers took mice that were unable to produce normal sperm and injected them with the stem cell-derived primordial germ cells, or PGCs.
These PGCs "produced normal-looking sperm, which were then used to successfully fertilize eggs," said the study.
The team intends to continue studying the technique and its effects in further generations of male and female mice.
|
<urn:uuid:634cb44f-d32d-4d7a-a5a7-d0532d5c8508>
|
CC-MAIN-2016-26
|
http://www.independent.co.uk/life-style/health-and-families/japan-scientists-coax-sperm-from-stem-cells-2333870.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783404405.88/warc/CC-MAIN-20160624155004-00075-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.96879 | 279 | 3.140625 | 3 |
Did you know? A bicycle is a marvel of engineering efficiency, one where an investment in 22 pounds of metal and rubber boosts the efficiency of an individual mobility by a factor of three. On my bike I estimate that I get easily 7 miles per potato. For more information view the text and data in Chapter 6 of Plan B 4.0: Mobilizing to Save Civilization.
As summer comes to the Gulf of Mexico, it brings with it each year a giant “dead zone” devoid of fish and other aquatic life. Expanding over the past several decades, this area now can span up to 21,000 square kilometers, which is larger than the state of New Jersey. A similar situation is found on a smaller scale in the Chesapeake Bay, where since the 1970s a large lifeless zone has become a yearly phenomenon, sometimes shrouding 40 percent of the bay.
Worldwide, there are some 146 dead zones—areas of water that are too low in dissolved oxygen to sustain life. Since the 1960s, the number of dead zones has doubled each decade. Many are seasonal, but some of the low-oxygen areas persist year-round.
What is killing fish and other living systems in these coastal areas? A complex chain of events is to blame, but it often starts with farmers trying to grow more food for the world’s growing population. Fertilizers provide nutrients for crops to grow, but when they are flushed into rivers and seas they fertilize microscopic plant life as well. In the presence of excessive concentrations of nitrogen and phosphorus, phytoplankton and algae can proliferate into massive blooms. When the phytoplankton die, they fall to the seafloor and are digested by microorganisms. This process removes oxygen from the bottom water and creates low-oxygen, or hypoxic, zones.
Most sea life cannot survive in low-oxygen conditions. Fish and other creatures that can swim away abandon dead zones. But they are still not entirely safe—by relocating they may become vulnerable to predators and face other stresses. Other aquatic life, like shellfish, that cannot migrate in time suffocate in low-oxygen waters.
Dead zones range in size from small sections of coastal bays and estuaries to large seabeds spanning some 70,000 square kilometers. Most occur in temperate waters, concentrated off the east coast of the United States and in the seas of Europe. Others have appeared off the coasts of China, Japan, Brazil, Australia, and New Zealand.
Coastal Dead Zones Around the World Source: UNEP, GEO Yearbook 2003 (Nairobi: 2004), compiled from Boesch 2002, Caddy 2000, Diaz et al. (in press), Green and Short 2003, Rabalais 2002.
The world’s largest dead zone is found in the Baltic Sea, where a combination of agricultural runoff, deposition of nitrogen from burning fossil fuels, and human waste discharge has overfertilized the sea. Similar problems have created hypoxic areas in the northern Adriatic Sea, the Yellow Sea, and the Gulf of Thailand. Offshore fish farming is another growing source of nutrient buildup in some coastal waters.
Forty-three of the world’s known dead zones occur in U.S. coastal waters. The one in the Gulf of Mexico, now the world’s second largest, disrupts a highly productive fishery that provides some 18 percent of the U.S. annual catch. Gulf shrimpers and fishers have had to move outside of the hypoxic area to find fish and shrimp. Landings of brown shrimp, the most economically important seafood product from the Gulf, have fallen from the record high in 1990, with the annual lows corresponding to the highly hypoxic years.
Excess nutrients from fertilizer runoff transported by the Mississippi River are thought to be the primary cause of the Gulf of Mexico’s dead zone. Each year some 1.6 million tons of nitrogen now enter the Gulf from the Mississippi basin, more than triple the average flux measured between 1955 and 1970. The Mississippi River drains 41 percent of the U.S. landmass, yet most of the nitrogen originates in fertilizer used in the productive Corn Belt.
Worldwide, annual fertilizer use has climbed to 145 million tons, a tenfold rise over the last half-century. (See data.) This coincides with the increase in the number of dead zones around the globe. And not only has more usable nitrogen been added to the environment each year, but nature’s capacity to filter nutrients has been reduced as wetlands are drained and as areas along riverbanks are developed. Over the last century, the world has lost half its wetlands.
In the United States, some of the key farming states like Ohio, Indiana, Illinois, and Iowa have drained 80 percent of their wetlands. Louisiana, Mississippi, Arkansas, and Tennessee have lost over half of theirs. This lets even more of the excess fertilizer farmers apply flow down the Mississippi River to the gulf.
There is no one way to cure hypoxia, as the mix of contributing factors varies among locations. But the keys are to reduce nutrient pollution and to restore ecosystem functions. Fortunately, there are a few successes to point to. The Kattegat straight between Denmark and Sweden had been plagued with hypoxic conditions, plankton blooms, and fish kills since the 1970s. In 1986, the Norway lobster fishery collapsed, leading the Danish government to draw up an action plan. Since then, phosphorus levels in the water have been reduced by 80 percent, primarily by cutting emissions from wastewater treatment plants and industry. Combined with the reestablishment of coastal wetlands and reductions of fertilizer use by farmers, this has limited plankton growth and raised dissolved oxygen levels.
The dead zone on the northwestern shelf of the Black Sea peaked at 20,000 square kilometers in the 1980s. Largely because of the collapse of centralized economies in the region, phosphorus applications were cut by 60 percent and nitrogen use was halved in the Danube River watershed and fell similarly in other Black Sea river basins. As a result, the dead zone shrank. In 1996 it was absent for the first time in 23 years. Although farmers sharply reduced fertilizer use, crop yields did not suffer proportionately, suggesting they had been using too much fertilizer before.
While phosphorus appears to have been the main culprit in the Black Sea, nitrogen from atmospheric sources—namely, emissions from fossil fuel burning—seems to be the primary cause of the dead zones in the North and Baltic seas. Curbing fuel use through efficiency improvements, conservation, and a move toward renewable energy can diminish this cause of the problem.
For the Gulf of Mexico, curbing nitrogen runoff from farms can shrink the dead zone. Applying fertilizer to match crop needs more precisely would allow more nutrients to be taken up by plants instead of being washed out to sea. Preventing erosion through conservation tillage and changing crop rotations, along with wetland restoration and preservation, can also play a part.
Innovative programs such as the American Farmland Trust’s Nutrient Best Management Practices Endorsement can reduce the common practice of using too much fertilizer. Farmers who follow recommendations for fertilizer application and cut their use are guaranteed financial coverage for potential shortfalls in crop yields. They save money on fertilizer purchases and are insured against losses. Under test programs in the United States, fertilizer use has dropped by a quarter.
With carefully set goals and management, it is possible for some dead zones to shrink in as little as a year. For other hypoxic areas (especially in the Baltic, a largely enclosed sea with slower nutrient turnover), improvement may take longer, pointing to the need for early action. For while dead zones shrink or grow depending on nutrient input and climatic conditions, the resulting fish dieoffs are not so easily reversed.
Copyright © 2004 Earth Policy Institute
|
<urn:uuid:2cbcbb4c-c8d9-482d-b1db-b0008aec3598>
|
CC-MAIN-2016-26
|
http://www.earth-policy.org/plan_b_updates/2004/update41
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403826.29/warc/CC-MAIN-20160624155003-00139-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.942101 | 1,623 | 3.203125 | 3 |
Contents of this page:
Synthesis of d-aminolevulinate & porphobilinogen
Formation & modification of the tetrapyrrole ring system
Regulation of iron absorption and transport
is the prosthetic group of hemoglobin, myoglobin, and the
cytochromes. The heme
of cytochrome c is shown at right. (For the slightly different structure of heme
a, see the notes on electron
transfer.) Heme is an
asymmetric molecule. (Note the
positions of the methyl side chains around the ring system.)
The heme ring system is synthesized from glycine and succinyl-CoA.
Using isotopic tracers, it was initially found that N & C atoms of heme are derived from glycine and acetate. It was later determined that the labeled acetate first enters Krebs Cycle as acetyl-CoA, and the labeled carbon becomes incorporated into succinyl-CoA, which is the more immediate precursor of heme.
|Heme synthesis begins with condensation of glycine & succinyl-CoA, with decarboxylation, to form d-aminolevulinic acid (ALA).|
|Pyridoxal phosphate (PLP) serves as coenzyme for d-Aminolevulinate Synthase (ALA Synthase), an enzyme is evolutionarily related to transaminases.|
| Condensation with succinyl-CoA
takes place while the amino group of glycine is in
Schiff base linkage to
the aldehyde of PLP. Coenzyme A and the carboxyl of glycine are lost
following the condensation reaction. Diagram p. 1015.
d-Aminolevulinate Synthase (ALA Synthase) is the committed step of the heme synthesis pathway, and is usually rate-limiting for the overall pathway. Regulation occurs through control of gene transcription. Heme functions as a feedback inhibitor, repressing transcription of the gene for d-Aminolevulinate Synthase in most cells. A variant of ALA Synthase expressed only in developing erythrocytes is regulated instead by availability of iron in the form of iron-sulfur clusters.
|PBG Synthase (Porphobilinogen Synthase), also called ALA Dehydratase, catalyzes condensation of two molecules of d-aminolevulinic acid (ALA) to form porphobilinogen (PBG).|
|The reaction mechanism involves
two lysine residues and a bound
cation at the
active site. The bound cation in the mammalian enzyme is Zn++.
As each of the two d-aminolevulinate (ALA) substrates binds at the active site, its keto group initially reacts with the side-chain amino group of one of the two lysine residues to form a Schiff base. These Schiff base linkages promote the C-C and C-N condensation reactions that follow, assisted by the metal ion that coordinates to the ALA amino groups.
Zn++ binding sites in the
homo-octomeric mammalian Porphobilinogen Synthase, which include cysteine S ligands, can also bind
Inhibition of Porphobilinogen Synthase by Pb++
results in elevated blood
ALA, as impaired synthesis of heme results in de-repression of
transcription of the gene for ALA Synthase.
High ALA is thought to cause some of the neurological effects of lead poisoning, although Pb++ also may directly affect the nervous system. ALA (d-aminolevulinate) is toxic to the brain. This may be due in part to the fact that ALA is somewhat similar in structure to the neurotransmitter GABA (g-aminobutyric acid). In addition, autoxidation of ALA generates reactive oxygen species (oxygen radicals).
|A proposed reaction mechanism (see
diagram) is based on solved
crystal structures of:
Explore these structures at right.
PBG Synthase - ALA
PBG Synthase - PBG
The porphyrin ring is formed by condensation of four molecules of porphobilinogen.
Porphobilinogen Deaminase catalyzes successive condensations of PBG, initiated in each case by elimination of the amino group. Diagram p. 1018.
Deaminase enzyme has a dipyrromethane
prosthetic group, linked at the active site via a cysteine S.
The enzyme itself catalyzes formation of this prosthetic group.
|PBG units are added to the dipyrromethane until a linear
hexapyrrole has been formed.
Porphobilinogen Deaminase is organized in 3 domains. Predicted interdomain flexibility may accommodate the growing polypyrrole in the active site cleft.
Hydrolysis of the link to the enzyme's dipyrromethane releases the tetrapyrrole hydroxymethylbilane
Explore at right the structure of the enzyme Porphobilinogen Deaminase, with its covalently linked prosthetic group dipyrromethane.
|Uroporphyrinogen III Synthase converts the linear tetrapyrrole hydroxymethylbilane to the macrocyclic uroporphyrinogen III.|
| Uroporphyrinogen III Synthase
catalyzes ring closure,
and flipping over one of the pyrroles, to yield an asymmetric
tetrapyrrole. Note the distribution of acetyl
and propionyl side chains in the diagram
This rearrangement is thought to proceed via a spiro intermediate, as depicted at right and in the animation below.
|The active site of Uroporphyrinogen
III Synthase is
located in a cleft between two domains of the enzyme. The structural flexibility inherent in this arrangement
is proposed to be essential to catalysis.
Uroporphyrinogen III is the precursor for synthesis of vitamin B12, chlorophyll, and heme, in organisms that produce these compounds.
|Conversion of uroporphyrinogen III to protoporphyrin
IX (above) occurs in several steps, as presented in the animation
These steps include:
is added to protoporphyrin IX via Ferrochelatase.
This enzyme in mammals is homodimeric and contains two [2Fe-2S] iron-sulfur
A conserved active site histidine, along with a chain of anionic residues, may conduct released protons away, as Fe++ binds from the other side of the porphyrin ring, to yield heme.
Regulation of transcription or post-translational processing of enzymes of the heme synthesis pathways differs between erythrocyte forming cells and other tissues.
There is relatively steady production of pathway enzymes in erythrocyte-forming cells, limited only by iron availability.
Expression of pathway enzymes in other tissues, is more variable and subject to feedback inhibition by heme.
Porphyrias are genetic diseases resulting in decreased activity of one of the enzymes involved in heme synthesis (e.g., PBG Synthase, Porphobilinogen Deaminase, etc...). Symptoms vary depending on the enzyme, the severity of the deficiency and whether heme synthesis is affected primarily in liver or in developing erythrocytes.
Occasional episodes of severe neurological symptoms are associated with some porphyrias. Permanent nerve damage and even death can result, if not treated promptly. Elevated d-aminolevulinic acid (ALA), arising from de-repression of ALA Synthase gene transcription, is considered responsible for the neurological symptoms. Treatment of acute attacks is by injection of hemin (a form of heme). The heme, in addition to supplying needs, would repress transcription of ALA Synthase in non-erythroid tissues.
For more information on these diseases, search the OMIM (Online Mendelian Inheritance in Man) website with the keyword porphyria.
Regulation of iron absorption and transport
Iron for use in synthesis of heme, iron-sulfur centers and other non-heme iron proteins is obtained from the diet and via release of recycled iron from macrophages of the reticuloendothelial system that ingest old and damaged erythrocytes (red blood cells). There is no mechanism for iron excretion. Iron is significantly lost from the body only by bleeding, including menstruation in females, with small losses, e.g., from sloughing of cells of skin and other epithelia.
Iron is transported in blood serum bound to the protein transferrin. The plasma membrane transferrin receptor mediates uptake of the complex of iron with transferrin by cells via receptor mediated endocytosis.
Iron is stored within cells as a complex with the protein ferritin. The main storage site is liver.
The plasma membrane protein ferroportin mediates release of absorbed iron from intestinal cells to blood serum, as well as release of iron from hepatocytes (liver cells) and macrophages. Control of dietary iron absorption and serum iron levels involves regulation of ferroportin expression:
Transcription of the gene for the iron transporter ferroportin is responsive to iron.
Hepcidin, a regulatory peptide secreted by liver, induces degradation of ferroportin. Hepcidin secretion increases when iron levels are high or in response to cytokines produced at sites of inflammation. Degradation of ferroportin leads to decreased absorption of dietary iron and decreased serum iron. Hepcidin is considered an antimicrobial peptide because by lowering serum iron it would limit bacterial growth.
Hereditary hemochromatosis is a family of genetic diseases characterized by excessive iron absorption, transport and storage. Genes mutated in these disorders include those for the transferrin receptor, a protein HFE that interacts with the transferrin receptor, hepcidin and hemojuvelin, an iron-sensing protein required for transcription of the gene for hepcidin. E.g., impaired synthesis or activity of hepcidin leads to unrestrained ferroportin activity, with high dietary intake and high % saturation of serum transferrin with iron. Organs particularly affected by accumulation of excess iron include liver and heart.
For more information on these diseases, search the OMIM (Online Mendelian Inheritance in Man) website with the keyword hemochromatosis.
Copyright © 2000-2008 by Joyce J. Diwan. All rights reserved.
Additional material on Heme Synthesis:
|
<urn:uuid:be676675-89b8-4409-886d-01cd6cd8326b>
|
CC-MAIN-2016-26
|
http://www.rpi.edu/dept/bcbp/molbiochem/MBWeb/mb2/part1/heme.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393442.26/warc/CC-MAIN-20160624154953-00097-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.893725 | 2,294 | 2.796875 | 3 |
A digger wasp that excavates its burrow in sandy soil and then catches prey with which to furnish it. Sand wasps typically have an abdomen with a very long and slender “waist.”.
- One hard-working mother is the sand wasp, who spends all her time catering for her yet unhatched young, ensuring they have a tasty meal when they hatch by placing live paralysed caterpillars in their nest for them.
- Then we re-entered the dunes and walked the edge of Newborough Warren, the grassed over portion of the nature reserve which is grazed by grey ponies to keep down rank grasses and for the benefit of the sand wasp.
- The sand wasp works hard to look after its young but the female is too busy to guard all her nest sites.
For editors and proofreaders
Syllabification: sand wasp
Definition of sand wasp in:
What do you find interesting about this word or phrase?
Comments that don't adhere to our Community Guidelines may be moderated or removed.
|
<urn:uuid:e0336fc4-dcab-4ca4-8a8a-cb3ad181dd0a>
|
CC-MAIN-2016-26
|
http://www.oxforddictionaries.com/us/definition/american_english/sand-wasp
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399385.17/warc/CC-MAIN-20160624154959-00015-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.942865 | 226 | 3.1875 | 3 |
Local government food safety guidelines for storing foods (p26) which have already been cooked stipulate food internal temperature must be brought from above 140F (serving temperature) to 70F in less than 2 hours and from 70F to 40F in less than four hours.
Why then do the rules for defrosting (p23) (the reverse) say food should be at room temperature "for very short periods during preparation" and foods can only be defrosted in one of three ways: in refrigerator, under running water, or in the microwave provided there is no interruption in the cooking process (ie. partially in the microwave then cooked or all in microwave). If its just time and temperature, why is the cook trusted to watch the clock for cooling and not defrosting?
Previous posts have asked for guidelines and best practices; however, my question accepts the practical advise and hopes to discover the political (creating effective guidelines) and biological (does warming from 40F generate more/more harmful bacteria than cooling from >140F?) reasons. I have my own theories but what are yours?
|
<urn:uuid:a412c844-e5db-4355-9c70-2589a93e83ed>
|
CC-MAIN-2016-26
|
http://cooking.stackexchange.com/questions/18280/why-can-food-be-left-out-to-cool-140f-to-40f-in-6h-but-not-to-defrost
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397842.93/warc/CC-MAIN-20160624154957-00199-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.951004 | 223 | 2.59375 | 3 |
There's a reason that towering mammals the likes of King Kong are resigned to fiction. Our aching bones can only take so much weight before they start crumbling under the pressure. But if that's the case, then why were dinosaurs able to reach such phenomenal heights? According to a new study, the answer isn't so much about the bones themselves as it is the soft, squishy joints they lay between.
The scientists leading the new study published in PLOS ONE measured the ends of bones in both mammals and dinosaurs as well as their descendants to see how joint and bone shape changes as size increases.
As mammals grow, our bones become progressively rounder at the ends to be able to support the increase in weight while minimizing pressure as much as possible. Reptiles and birds, however, (as well as the dinosaurs that came before them) have bones that grow wider and flatter as more weight is added to the frame. So considering that these two very different shapes are both meant to sustain more weight, the joints and cartilage that connect them must also work differently.
For humans and other mammals, as the bones become rounder the connecting cartilage continues to stretch thin and tight across the bones surface. Because the soft, connective cartilage is close-fitting and maleable, our weight is able to distribute more evenly. The wider, flatter bones of reptiles, however, solve the problem by packing as many layers of the stuff as they can—which as it turns out, is a much more efficient method. According to Matthew Bonnan from the Richard Stockton College of New Jersey and one of the lead authors on the study:
More than just evenly distributing the pressure, the joint itself may be deforming a little — it’s actually squishier, increasing the force it can sustain.
Of course, these gelatinous joint fillings weren't the only thing letting dinos tower over the rest of the prehistoric world. The lighter, hollow bones favored by reptiles also meant that larger frames didn't require as much support as our own solid bricks for bones. This does, however, at least begin to explain why dinosaurs were able to reach such larger than (modern) life proportions.
Still, as pillowy and bouncy as their joints may be, everything has its limits. You know, like extinction-event comets. [Live Science]
|
<urn:uuid:9e131ffa-21bc-493f-81b7-c514781ecf77>
|
CC-MAIN-2016-26
|
http://gizmodo.com/dinosaurs-were-able-to-grow-so-huge-because-of-their-sq-1452328578
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783392159.3/warc/CC-MAIN-20160624154952-00023-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.978461 | 480 | 4.15625 | 4 |
Afriat, Alexander and Caccese, Ermenegildo
The relativity of inertia and reality of nothing.
The determination of inertia by matter is looked at in general relativity, where inertia can be represented by affine or projective structure. The matter tensor T seems to underdetermine affine structure by ten degrees of freedom, eight of which can be eliminated by gauge choices, leaving two. Their physical meaning---which is bound up with that of gravitational waves and the pseudotensor t, and with the conservation of energy-momentum---is considered, along with the dependence of reality on invariance and of causal explanation on conservation.
Monthly Views for the past 3 years
Monthly Downloads for the past 3 years
Actions (login required)
|
<urn:uuid:5a9e70d0-0ef5-47ee-8f4e-07f79c6a2fbe>
|
CC-MAIN-2016-26
|
http://philsci-archive.pitt.edu/3954/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397748.48/warc/CC-MAIN-20160624154957-00098-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.900261 | 160 | 2.5625 | 3 |
Knowledge of birds and willingness to support their conservation: an Australian case study
Wilson, Clevo & Tisdell, Clem (2005) Knowledge of birds and willingness to support their conservation: an Australian case study. Bird Conservation International, 15(3), pp. 225-235.
This case study concentrates on the extent of knowledge among the Australian public of Australia's tropical bird species, and their willingness to support their conservation. In order to place this issue in context, we provide background information on the status of Australian bird species, focusing attention on species that occur in tropical Australia. Then, using questionnaire survey results, we consider the hypothesis that the public's support for the conservation of different bird species depends on their understanding of the species' existence and status. Based on results from a sample of residents in Brisbane, Queensland, we found that knowledge of bird species that occur exclusively in the Australian tropics (including tropical Queensland) was very poor compared with that of those occurring in the Brisbane area that are relatively common. Experimental results indicated that when respondents in the sample had an option to allocate A$1,000 between 10 bird species listed in the survey, they allocated more funds to the better-known and more common species, unless they were provided with balanced information about all the selected species. With balanced information, the average allocation to bird species confined mostly to the Australian tropics, particularly those threatened, increased. This demonstrates the conservation implications of information provision about bird species. The results showed that public education can play a crucial role in attempts to conserve bird species that are poorly known and threatened.
Impact and interest:
Citation counts are sourced monthly from and citation databases.
These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.
Citations counts from theindexing service can be viewed at the linked Google Scholar™ search.
Full-text downloads displays the total number of times this work’s files (e.g., a PDF) have been downloaded from QUT ePrints as well as the number of downloads in the previous 365 days. The count includes downloads for all files if a work has more than one.
|Item Type:||Journal Article|
|Subjects:||Australian and New Zealand Standard Research Classification > ECONOMICS (140000)
Australian and New Zealand Standard Research Classification > ECONOMICS (140000) > APPLIED ECONOMICS (140200) > Environment and Resource Economics (140205)
Australian and New Zealand Standard Research Classification > ECONOMICS (140000) > APPLIED ECONOMICS (140200)
|Divisions:||Current > QUT Faculties and Divisions > QUT Business School|
|Copyright Owner:||Copyright 2005 Cambridge University Press|
|Copyright Statement:||Reproduced in accordance with the copyright policy of the publisher.|
|Deposited On:||21 Jan 2008 00:00|
|Last Modified:||29 Feb 2012 13:11|
Repository Staff Only: item control page
|
<urn:uuid:7bd78377-fb33-4eef-88ca-412e5048f664>
|
CC-MAIN-2016-26
|
http://eprints.qut.edu.au/12090/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397864.87/warc/CC-MAIN-20160624154957-00144-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.896953 | 670 | 2.875 | 3 |
Difference between Over The Counter Drugs and Prescription Drugs
For people who are looking for medication to treat a specific health condition, the choice often boils down to over-the-counter drugs or prescription medications. While there are certain instances wherein only prescription medications would be the right choice, there are just as many instances wherein over-the-counter drugs work just as well. This comparison article shows the main differences between each.
One of the main differences between over the counter drugs and prescription drugs is consumer access. Prescription drugs are only given to patients via a doctor's prescription, and only licensed medical professionals can order them. Over-the-counter drugs are a lot easier to come by in comparison, and they are often even available from locations other than pharmacies. This is because prescription drugs are intended only for specific patients, and in fact it is illegal to share them with other people under any circumstances. Conversely, over-the-counter drugs can be given freely to anyone including friends and family members that are suffering from the same illness or health condition. It is important to keep in mind however that dosage and application instructions should be followed to the letter when taking over-the-counter drugs.
One other key difference between prescription drugs and over-the-counter drugs is their formulation. It is important to note that prescription drugs are formulated in does that conform to an aggressive treatment procedure prescribed by a doctor. There is in fact a certain amount of risk involved in taking prescription drugs, since aside from the dosage considerations, there are also numerous possible interactions with other medications to consider. As for over-the-counter drugs, they are usually sold in doses that are deemed both safe and effective according to guidelines set by the FDA or Food and Drug Administration. In fact, over-the-counter drugs are a lot safer than prescription drugs in that they can generally be combined with other over-the-counter drugs without worrying about potential risk of overdose or adverse reaction.
Cost is another key difference between both types of medications. One factor that dictates the prices of prescription drugs is the patents held by certain formulations, which may be enforced for several years. What this means is that drug companies basically have the option to price prescription drugs as they see fit, although pricing is of course subject to approval by government regulatory bodies. Over-the-counter drugs on the other hand are usually manufactured with ingredients that have since been made public, making it possible for any manufacturer to produce them. This result is more competitive prices for over-the-counter drugs in general.
- Often available from locations other than pharmacies
- Can be given freely to anyone
- Are priced more competitively
- Are only given to patients via a doctor's prescription
- Can only be ordered by licensed medical professionals
- Intended only for specific patients
- Are usually priced according to the drug companies’ discretion
|
<urn:uuid:9bad8124-e99f-4b9e-8924-86c896e382e3>
|
CC-MAIN-2016-26
|
http://recomparison.com/comparisons/100874/over-the-counter-drugs-vs-prescription-drugs/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396872.10/warc/CC-MAIN-20160624154956-00020-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.962114 | 579 | 2.71875 | 3 |
The Gila River in southwestern New Mexico is an ecological gem, but is threatened by a proposed diversion. Photo by Sandra Postel
The western United States was settled with the help of big dams and river diversions that delivered distant water to burgeoning cities and farms, but at least one state is saying it’s time to shift gears.
In a resounding voice of support for river protection, 85 percent of New Mexico residents say they want officials to address the state’s water problems through conservation, recycling and wiser use of existing water supplies – not by diverting more water from the state’s rivers.
In a poll
conducted this past June, the vast majority of New Mexicans said that rivers are critical to the state’s quality of life and economy, and want to protect them for future generations.
Nine-in-ten believe the state’s rivers are “at risk” at the present time.
When asked specifically about the Gila River in southwestern New Mexico, which in recent years has come under threats of a diversion
to send water over the Continental Divide to cities and farms, 61 percent of respondents sided with the no-diversion stance once they were informed about the project’s details, while only 36% sided with the pro-diversion position.
A beautiful desert river that supports a rich diversity of birds and wildlife
, the Gila (pronounced Hee-la) is the last undammed river in New Mexico and historically was a crucial tributary to the Colorado River. For millennia, the river emerged from what are now the Gila and Aldo Leopold Wilderness areas, and flowed across southwestern New Mexico and through Arizona before emptying into the Colorado River
at Yuma, near the U.S.-Mexican border.
Today, however, water users in Arizona take all of the Gila’s flow, leaving the river completely dry and delivering no water to the depleted Colorado.
On the New Mexico side of the border, however, the Gila is an ecological gem
, supporting one of the healthiest cottonwood-willow riparian forests to be found in the desert southwest, as well as a variety of threatened and endangered species.
During the polling, the more New Mexicans learned about the proposed Gila diversion, which would siphon as much as 14,000 acre-feet (4.56 billion gallons) a year from the river, the more strongly they opposed it.
While the federal government would subsidize a portion of the diversion project, which emerged in response to the 2004 Arizona Water Settlements Act
(AWSA), New Mexico’s taxpayers and water users would be saddled with some two-thirds of the estimated $300 million cost to build the pipeline.
On top of that, the Act requires New Mexico to pay Arizona for any Gila water it diverts. That’s because the Gila River Indian Community in Arizona owns that water, and New Mexico would have to pay Arizona to deliver replacement supplies.
As a clincher, the AWSA provides $66 million for community water projects
to help meet local water needs in southwestern New Mexico. These funds could be used to invest in urban and agricultural conservation measures, sustainable groundwater use and other solutions that make better use of local water supplies – and would cost far less than the diversion project.
Historically, big water decisions have been made in an authoritarian, top-down manner, often with little involvement or say from the public.
Thanks to this poll – which was commissioned by Protect the Flows
, a network of nearly 900 businesses in the seven states of the Colorado River Basin, and conducted by the market research firm Public Opinion Strategies
– the voice of the people has been brought into the debate.
The state of New Mexico must notify the U.S. Secretary of the Interior by December 2014 as to whether or not it will divert Gila River water.
Hopefully, state officials will heed the public’s wishes for more cost-effective and environmentally sound water alternatives – and keep the Gila River flowing strong.
|
<urn:uuid:9646b9aa-3047-4171-aab5-5b7166d05903>
|
CC-MAIN-2016-26
|
http://www.resilience.org/stories/2013-10-18/new-mexicans-call-for-conservation-over-river-diversions
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395166.84/warc/CC-MAIN-20160624154955-00092-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.957631 | 846 | 3.03125 | 3 |
Definition of Coffey still
1. Noun. A still consisting of an apparatus for the fractional distillation of ethanol from fermentation on an industrial scale.
Coffey Still Pictures
Click the following link to bring up a new window with an automated collection of images related to the term: Coffey Still Images
Lexicographical Neighbors of Coffey Still
Literary usage of Coffey still
Below you will find example usage of this term as found in modern and/or classical literature:
1. Coal-tar and Ammonia by Georg Lunge (1916)
"Coffey still. We shall first, in Fig. 299, give a sketch of the combination of apparatus employed at a London works, where 100000 gall, of gas-liquor are ..."
2. Outlines of Industrial Chemistry: A Text-book for Students by Frank Hall Thorp, Charles D. Demond (1905)
"The Coffey still (Fig. 7) is much used for alcohol and gas liquor distillation. This consists of two | | FIG. «. towers, one, called the "analyzer" (E), ..."
3. The Encyclopaedia Britannica: A Dictionary of Arts, Sciences, and General by Thomas Spencer Baynes (1888)
"The Coffey still may further be regarded as a type of continuous distilling apparatus ... Beginning, as the Coffey still does, with the steam of pure water, ..."
4. A Dictionary of Applied Chemistry by Thomas Edward Thorpe (1921)
"In many of the still-heads employed on the large scale, for example in the Coffey still (Fig. 28), the condensed liquid is caused, by means of suitable ..."
|
<urn:uuid:651863d2-b771-431b-9e41-7c78792aaad3>
|
CC-MAIN-2016-26
|
http://www.lexic.us/definition-of/Coffey_still
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397748.48/warc/CC-MAIN-20160624154957-00169-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.885622 | 359 | 3.234375 | 3 |
Why have nuclear weapons not been used since Hiroshima and Nagasaki in 1945? Nina Tannenwald disputes the conventional answer of 'deterrence' in favour of what she calls a nuclear taboo - a widespread inhibition on using nuclear weapons - which has arisen in global politics. Drawing on newly released archival sources, Tannenwald traces the rise of the nuclear taboo, the forces that produced it, and its influence, particularly on US leaders. She analyzes four critical instances where US leaders considered using nuclear weapons (Japan 1945, the Korean War, the Vietnam War, and the Gulf War 1991) and examines how the nuclear taboo has repeatedly dissuaded US and other world leaders from resorting to these 'ultimate weapons'. Through a systematic analysis, Tannenwald challenges conventional conceptions of deterrence and offers a compelling argument on the moral bases of nuclear restraint as well as an important insight into how nuclear war can be avoided in the future.
1. Introduction: the tradition of nuclear non-use; 2. Explaining non-use; 3. Hiroshima and the origins of the nuclear taboo; 4. The Korean War: the emerging taboo; 5. The rise of the nuclear taboo, 1953–1960; 6. Nuclear weapons and the Vietnam War; 7. Institutionalizing the taboo, 1960–1989; 8. The 1991 Gulf War; 9. The taboo in the post-Cold War world; 10. Conclusion: the prospects for the nuclear taboo.
Winner, 2008 Lepgold Book Prize, Georgetown University
“At a time when the actual use of nuclear weapons is being contemplated as ‘mini-nukes’ or ‘bunker-busters,’ Nina Tannenwald’s book is a timely reminder of humanity’s visceral recoiling from the use of the world’s most destructive weapon.”
Jayantha Dhanapala, Former United Nations Under-Secretary-General for Disarmament Affairs and former Ambassador of Sri Lanka to the USA
“The Nuclear Taboo is a compelling account of the role of moral restraint in international politics. Tannenwald explains how the habit of non-use has become expected and required behavior, reminding us that there was nothing inevitable about it. She traces the historical trajectory and effect of the taboo on international power politics. She also raises perhaps the most important war-related issue of our time: will the nuclear taboo be broken in light of new technologies and new threats? Read this book and find out how beliefs about right and wrong conduct have shaped the choices of policy makers and the expectations of the public. No explanation of international politics in the nuclear age will be complete without it.”
Joel H. Rosenthal, President, Carnegie Council on Ethics and International Affairs
“Nina Tannenwald has written a powerful and provocative book examining the influence of ethical norms on U.S. leaders’ nuclear weapons decisions. Her thesis that a nuclear taboo has taken hold will be widely read and hotly debated in both university classrooms and inside defense ministries in all nuclear nations.”
Scott D. Sagan, Stanford University
|
<urn:uuid:634d2e6c-9bcf-45b1-ada0-c68eff286e3e>
|
CC-MAIN-2016-26
|
http://www.cambridge.org/us/catalogue/catalogue.asp?isbn=9780521818865
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396027.60/warc/CC-MAIN-20160624154956-00091-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.900002 | 636 | 2.875 | 3 |
Chartered November 13, 1889, the 5-mile SD&C was built in 1890-92 and operated by James Monroe Smith, owner of a 30 square-mile plantation in Oglethorpe County. Smith, a country boy of modest means who began in business by cutting crossties and selling them to the Georgia Railroad, gradually put together one of the state's largest farms, with ten thousand acres under cultivation and upwards of 500 buildings of various types. Smithonia, the center of his small empire, had a hotel, a post office, and several factories and warehouses.
Realizing that horses and wagons could not continue to efficiently transport the ever-growing products of his plantation and town, Smith built two railroads, the SD&C and the Smithonia & Dunlap. The SD&C ran five miles from Smithonia north to a connection with the Seaboard Air Line Railway at Five Forks, later renamed Colbert. The S&D ran west to connect with the Georgia Railroad at Dunlap, two miles down the tracks from Winterville.
The SD&C never reached Danielsville or Carnesville; only the five miles between Smithonia and Five Forks was built. Other lines that Smith considered, but did not ultimately build, included a Danielsville-Hartwell connection and a line from Smithonia to Augusta. The Augusta line would have passed through Sandy Cross, Danburg, and Lincolnton.
Smith considered building his lines as narrow gauge, but changed his mind and constructed standard gauge tracks instead.
In the 1894 edition of The Official Railway List, the SD&C and the S&D jointly reported operating 20 miles of railroad with 2 locomotives, 1 passenger car, and 8 freight and miscellaneous cars.
Smithonia was described in Allen D. Candler and Clement A. Evans' Georgia, an encyclopedia published in 1906:
|"Smithonia, one of the important towns of Oglethorpe county, is about eight miles northwest of Lexington. It is the terminus of the Smithsonia, Danielsville & Carnesville and the Smithonia & Dunlap railroads, and in 1900 had a population of 200. It has a number of good stores, some factories, schools, churches, etc., a money order post office, and handles a large volume of freight."
Poors 1917 Manual reported the SD&C as operating 4.3 miles of track with equipment consisting of two locomotives and eight cars. The railroad’s offices were noted as being in Colbert and its president was indicated as James M. Smith. Farmer Smith, however, had died in 1915 and his SD&C was abandoned the next year.
While Smith was undeniably successful as a farmer, businessman, railroad builder, and self-made man, much of what he accomplished was built through the use of forced labor. He was a leading figure in Georgia's barbarous convict leasing schemes in the years after the Civil War, and he defended that system and profited from it. The self-made man contributed mightily to the unmaking of others.
|
<urn:uuid:1c6b4f1a-04fd-4156-b68a-c2b1d3a1fecc>
|
CC-MAIN-2016-26
|
http://railga.com/smitdan.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783408828.55/warc/CC-MAIN-20160624155008-00036-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.98124 | 633 | 2.5625 | 3 |
Rachel E. Baden
In reflecting on my own experiences as a college student, graduate student, and now as an instructor in psychology, I’ve come to appreciate the value in intellectual exchanges – both in and out of the classroom. Those conversations draw connections between science, theory, and daily life, have direct applications, and foster critical and creative thinking. My goals as an instructor are to provide learning opportunities and to create a learning environment that facilitates these objectives. Moreover, I believe that I am most able to meet my teaching goals when I approach teaching expecting to learn.
Drawing connections between science, theory, and everyday life
In psychology, I believe that helping students draw connections between science, theory, and daily life is a key goal. In some ways, psychology’s intuitive appeal both helps and hinders progress towards this goal. On one hand, concepts in psychology seem to naturally hit on students’ interests. It is rare to find a student who has absolutely no opinion about basic questions of human nature: Why do good people do bad things? How do we learn new things? How is it that some people get stuck in depression and seem unable to disentangle themselves? The list goes on. While psychology’s intuitive appeal certainly guarantees rousing classroom discussions, its intuitive appeal can also lull students into intellectual complacency and result in the laying-aside of empirical evidence and the blurring of connections between science, theory, and practice. To counteract this, I attempt to link students’ natural observations to research – sometimes even my own. For example, in discussing social learning theory and the development of aggression in children, I highlight my own research suggesting that children learn aggressive conflict behaviors by observing their parents engage in aggressive marital conflict and parenting behaviors. Moreover, I attempt to highlight how psychologists through the ages have made observations, developed theories, and tested their theories to provide empirical support for our everyday, “commonsense” observations. I believe that helping students identify these links between theory, research, and their lives is essential.
Highlighting direct applications
Not only is it important for students to understand how theory and research might support or contradict their real life observations, but it also essential – and exciting – when students begin to apply psychological concepts to their own life. I believe that my job as an instructor is to help material come alive for students in this way. Through classroom discussions, I have observed that highlighting personal applications of psychological principles and asking students to volunteer their own engages students more deeply and enhances their encoding of course material. I also try to help students apply concepts to their own life by assigning periodic reaction papers that take a personal turn. For example, instead of asking students to recapitulate the major learning theories in their papers, I ask them to tell me about something they have learned and how they learned it – either through classical conditioning, operant conditioning, or observational learning. Likewise instead of asking for their simple reactions to the Zimbardo prison study, I ask them to tell me how they would behave as a prisoner or guard and how sure they are in their prediction. I am pleasantly pleased with the degree to which students, as a whole, draw parallels with their own lives and express increased insight about their own capacities to do wrong.
Think critically and creatively about psychological concepts
I believe that students who are engaged in academic material at a personal level will be more likely to think critically and creatively about those same concepts. I often attempt to ask questions that will lead students to engage with material in this way. For example, in discussing research findings regarding the stability of temperament and attachment over the lifespan, my class then turned to a discussion of what factors or experiences might lead to changes in these two domains. Students shared various personal experiences (e.g., parental divorce seemingly resulted in less secure attachment for one student), and we ultimately turned to the research in this area for empirical answers. In addition, I have found that even failed in-class experiments can prove useful in leading students to identify factors that could account for the results and to craft new research studies.
Teaching as a learning experience
I believe that I am most able to accomplish my teaching goals when I approach teaching as a learning experience for me. While I sometimes find myself bumping up against students’ limitations and needing to tailor the course accordingly, I also find myself surprised and gratified by students’ insightful comments and creative questions. It is a joy when students lead me to think about psychological concepts in new ways, and at these times, I see that I can push their intellectual boundaries even more. I think that it is important for me to share my appreciation for students’ creativity and thinking and to see teaching as a mutual process of learning. I believe that this approach to teaching creates an environment of mutual respect where true intellectual exchanges can occur.
|
<urn:uuid:660aef80-d282-4589-a576-91fa624eca33>
|
CC-MAIN-2016-26
|
http://bama.ua.edu/~sprentic/695%20Baden%20teaching%20statement.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395548.53/warc/CC-MAIN-20160624154955-00002-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.965163 | 982 | 2.703125 | 3 |
Related National Standards
Grade Level: 5-9
Estimated Time: One class period to watch each of the videos and take notes. Three days to research each animal and determine what information will be placed on the bulletin board. Two days to construct the display. Several days to complete the student descriptions.
The Amazon basin is filled from top to bottom with life. New species are discovered each year in the rainforest, and scientists guess that less than half of the existing species have been described. Many of these organisms have remained unknown due to the remoteness of their habitat. For example, many rainforest species live only at the tops of tall trees unseen from the ground, while others live about half way to the top, making it extremely difficult to stop and look for them.
In this activity, students will research the characteristics of a variety of rainforest organisms and present their research findings to the group. As a class, they will construct a bulletin board that places the animals by their position in the environment, gives information about each animal, and shows their interrelationships.
- Research a plant or animal from the rainforest and identify its physical location within the rainforest (e.g., canopy, etc.).
- Understand that different organisms live in different layers of the rainforest.
- Contribute information to a group project about the organisms in a rainforest.
- Make a presentation about their organism to the class.
- "Journey Into Amazonia" video
- Construction paper in various colors
- Art tissue paper (especially browns and greens but other colors also)
- Markers, colored pencils, crayons
- Tag board
- Scissors, rulers, glue
- Reference materials: encyclopedias, magazines, Internet
Students will research one of a number of organisms that live in the Amazon rainforest. For younger students, a list of organisms should be provided, though older students should be able to identify appropriate organisms on their own through reading or by watching the video. A list of possible plants and animals is provided below.
Students should collect information on index cards that are labeled with general topics on the top, factual information on the lines and bibliographic details on the back. It is recommended that you consult with your school's English teachers so that the cards are consistent with the research format being taught in students' other classes. A collection of between 10 and 30 cards should prove sufficient information. The cards should then be condensed so that each organism is represented by one index card on the bulletin board display.
The bulletin board should have a dark green background. Tree trunks are made from rolled newspaper covered with brown tissue paper. Rolled paper bags resemble vines. Construction paper backed with florist's wire with tissue paper fronds represent ferns. Bromeliads may be made from toilet paper rolls with layers of construction paper and tissue. Flowers are constructed from tissue. Animals are usually represented by drawings.
The plant materials should be attached to the board first and the animals last. The information cards are placed along the outside edges with a string running from the organism to the card.
After completion of the display, students should present a short description of their research to their class or to classes of younger students.
Selected Organisms For Research:
- Plants: Fern, Brazil Nut, Banana, Cecropia, Strangler fig, Palm trees (many varieties), Coffee, Kapok, Cocoa, Orchid, Vanilla, Bromeliad, Passion flower, Philodendron, Breadfruit, Cashew, Manioc, Yucca, Heliconia, Mahogany, Rubber
- Animals: Anaconda, Ant, Anteater, Beetle, Boa constrictor, Pit viper, Butterfly, Fer de Lance, Capybara, Caiman, Coatamundi, Cockroach, Electric eel, Catfish, Frog, Pink dolphin, Katydid, Grasshopper, Monkeys (many varieties), Jaguar, Kinkajou, Puma, Macaw, Parrot, Crow, Manatee, Mosquito, Bot fly, Parrot, Tarantula, Bat, Termite, Sloth, Quetzal, Toucan
The rainforest exists through nutrient recycling. The soil is extremely poor, and thus doesn't always supply the nutrients required for plant growth. As plants die, their parts are quickly decomposed and the next generation of plants recycles the nutrients they contained. Without this process, the soil is too poor to support sustained plant growth.
Near the rivers, plants grow quickly into a dense mass of vegetation that absorb the available sunlight. Trees reach to the sun and spread wide branches with large leaves to absorb the energy. Away from the rivers, the floor of the rainforest is dark with less than 5% of the available sunlight filtering to the ground at noon. Thus the forest floor is fairly clear of thick vegetation and the tree trunks rise high to the canopy above.
The rainforest is layered with the thickest layer being the highest. At the floor is the herb layer that contains small grasses and other plants up to several feet high. The shrub layer rises above the herbs to a height of about 20 feet. This is composed of short trees and bushes. Far above is the understory, an area of medium height trees. At the top is the canopy, a wide and unbroken expanse of leaves at a height of 100 feet or more.
Most of the animals in the rainforest live in only one of the vegetation zones. The canopy is the most populated area. Due to the difficulties in reaching and moving through the canopy, much of the life in this region is unknown. Even more difficult to reach is the understory layer. Trees in this area are relatively far apart, will not support much weight and hard to climb. Some contain nests of biting ants. Since the canopy prevents studies from being done from above and the weak trees prevent researchers from climbing, a lot of life in the rainforest is virtually unknown. Most of the exploration of the rainforest has occurred in the herb and shrub layers.
- Teachers should begin with a review of the biomes of the earth. Using either a wall map or smaller printed maps and research materials, identify the areas of rainforest around the world. If students need help identifying rainforests in other areas of the world, they might visit the Rainforest Action Network site at http://www.ran.org/ran/info_center/factsheets/k1.html. A Fact Sheet at this site will inform students that tropical rainforests are located around the equator, from the Tropic of Cancer in the north, to the Tropic of Capricorn in the south. The largest rainforests are in Brazil (South America), Zaire (Africa) and Indonesia (islands found near the Indian Ocean). Other tropical rainforests lie in Southeast Asia, Hawaii and the Caribbean Islands. The Amazon rainforest in South America is the world's largest, covering an area about two-thirds the size of the continental United States.
- Watch all or parts of the "Journey To Amazonia" videos. To select appropriate segments of the film for your class, visit "About The Series" on this Web site. Because all the episodes of the program contain information about plant and animal life in the rainforest, teachers may want to narrow the focus to aquatic life, life in the canopy, etc.
- While watching the video(s), students should note the wide diversity of plants and animals in the Amazon basin by listing in their notebooks the names of plants and animals and the portion of the rainforest they inhabit.
- Students will select or be assigned an organism from a list of organisms to research. Research may be done in books, magazines or over the Internet. Begin with the sites listed below and with the content elsewhere on this Web site.
- Students will prepare a color drawing and/or model from the provided materials for use on the display board.
- Students will prepare a 5x8 inch card giving information about the organism.
- Students will post their organism in the proper position on a classroom bulletin board. The information card will be placed on the perimeter of the board with a string connecting the information to the organism model.
- Students will prepare a 2 to 5 minute presentation for the class about their organism. The presentation should provide general characteristics and identify the organism's diet.
- Colored yarn may be used to connect organisms to one another to illustrate the concepts of a food web, commensalism, symbiosis, competition for resources, or predator-prey relationships. Different colors can be used to represent different relationships.
Student assessment should be done on a matrix grid. Students' note cards should have subject headings, bibliographic information and factual information. These may be evaluated by completeness of the card and by the number of cards in an objective manner. The bulletin board portion should be assessed subjectively with the emphasis being on the proper placement of the organism. The presentation should be graded with an emphasis on the characteristics of the organism and its relationship to its surroundings.
- In schools with computer labs, technology may be integrated with the use of presentation software. These presentations emphasize organizational and outlining skills. Most of them allow the presentation to easily be published in the HTML language for use on a school Web site.
- Students might play the Amazon Explorer game found on this Web site and use this game as a model for their own online game. Using their newfound rainforest knowledge, students might create a "choose-your-own-adventure" type of game, or a game more closely tied to one particular layer of the rainforest.
Related National Standards
This lesson addresses the following national standards found in the McRel Standards Database at http://www.mcrel.org/standards-benchmarks/ :
- Knows that plants and animals have features that help them live in different environments
- Knows that animals and plants have a great variety of body plans and internal structures that serve specific functions for survival (e.g., digestive structures in vertebrates, invertebrates, unicellular organisms, and plants)
- Knows that living things are found almost everywhere in the world and that distinct environments support the life of different types of plants and animals
- Knows ways in which species interact and depend on one another in an ecosystem (e.g., producer/consumer, predator/prey, parasite/host, relationships that are mutually beneficial or competitive)
- Knows relationships that exist among organisms in food chains and food webs
|
<urn:uuid:f6ae5e1d-c488-446e-9ca0-6c7ae1af9db2>
|
CC-MAIN-2016-26
|
http://www.pbs.org/journeyintoamazonia/teacher_levels.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396459.32/warc/CC-MAIN-20160624154956-00136-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.917767 | 2,181 | 4.21875 | 4 |
Philippines - Every Island is an Adventure
The Philippines is an island country in Southeast Asia in the Western Pacific Ocean, which is an archipelago with 7,107 islands. The country shares its borders with Palau, Malaysia, Indonesia, China, and Vietnam.
The people of the Philippines have diverse ethnicity, which also implies a multiplicity of dialects. That being said, the country is also one of the most populous in the world.
A Quick Glance into Early Philippine History
The earliest inhabitants of the country are Australo-Malenesian and are known as Negritos. They have inhabited the islands even before Europeans along with other settlers from neighboring countries. It is evident that even from the ninth century these early settlers had cultural and trading relations with people from India, Malaysia, Indonesia, and China. Islamic communities were also established in various parts of the country, mainly on the southern areas of the country.
Spaniards arrived in the islands in the 16th century. Portuguese explorer, Ferdinand Magellan, reached the islands on 1521 under the commission of Spain. He was later killed in a battle with Lapu-Lapu, a Rajah in one of the islands. Successive expeditions went on and Spanish settlements were established. Manila was brought under Spanish rule in 1571 while the rest of the archipelago was being reigned in and united for the very first time.
Spanish rule was marked by revolts at various periods in the country’s history even until the outbreak of the Spanish-American War. When the war reached the country, it only signaled a change of colonial masters and not independence. The proclamation of the first Philippine Republic in 1899 only lead to the Philippine-American War and was ended in 1901. The Philippine Commonwealth was later established but was interrupted during the Japanese invasion in World War II.
The Japanese occupation only lasted three years but left a massive devastation in its wake. The country was granted its long sought independence from US control in 1946.
Visiting the Philippine Islands
You should expect a generally tropical weather, which is usually hot and humid, when you visit the country. Temperatures in the Philippines average around 26 degrees Celsius. There are two pronounced seasons in the country, the wet and dry seasons. However, some destinations may not necessarily have distinguished seasons. The dry season is usually from March to May while the wet season runs from June to November. The wet season is marked by heavy rains and tropical storms. There is also a cold season running from December to February.
The Philippines has a lot of interesting dive sites all over the archipelago. The provinces of Palawan and Bohol alone have sites to excite and astound reef, open water, wreck, and cave divers. The beaches of Boracay and Puerto Galera have attained world renown and are popular destinations during the hot summer months. A hike to the mountain city of Baguio is warranted for those who are nostalgic for cold mountain air. The captivating Chocolate Hills is also another tourist site that has attained world fame.
The Ninoy Aquino International Airport and the Cebu-Mactan International Airport are two of the busiest airports in the country with flights served from various domestic and international destinations. Other means of inter-island travel are passenger ferries, which are obviously cheaper.
There are a lot of accommodations available in the country especially in locations where tourism is a major industry. International hotels like the Shangri-La Hotel and Regency Hotels are around to cater to business or leisure needs. Restaurants around the country serve a dazzling array of different cuisines. You can mix and match different dishes at times making a gastronomic adventure of your very own.
Money changers are almost everywhere so you won’t have to worry about changing your money into the local currency. Major banks in the Philippines include Bank of Philippine Islands, Equitable PCI Bank, Philippine National Bank, and Metrobank. International ATM consortia like PLUS and Cirrus are accessible through local ATMs.
Warm Hospitable Greetings of Mabuhay
Visitors will surely experience the Filipino trademark of hospitality wherever they go in the country. Visitors will often be greeted with ‘mabuhay’, which denotes a warm hospitable hello that will be remembered long after the gesture was extended.
Comprised of 7,107 beautiful islands, the Philippines features a bevy of wonderful and popular tourist destinations. As a nation that primarily thrives on ecotourism, it is not surprising anymore that it has invested a lot of money and other available resources in beautifying as well as developing its various offerings. As the years go by, more and more people from the different parts of the world flock to this place in search for something that they can truly call home.
Through the joint efforts of the various local governments as well as their local residents, the different tourist destinations continue to flourish and blossom up to this very moment. Palawan, Bohol, and Boracay Island are just some of the many wonderful tourist spots that can be found in this country. Moreover, tourists and guests just cannot get enough of the spectacular beauty and features of places like Tagaytay, Puerto Galera, and Panglao. Furthermore, local and foreign visitors annually visit outstanding attractions like the Mayon Volcano, Banaue Rice Terraces, and Taal Volcano.
Tourism is just one of the major specialties of the Philippines because of its rich natural environment and surroundings. The different features and customary practices of places like Aklan, Baguio, and Ilocos Norte have shown the rich and colorful history of the country. At the same time, the clean and clear bodies of water in Davao, Zamboanga, and Pangasinan have provided tourists and guests enough reasons to return for more wonderful and memorable experiences in the future.
Based on statistics, the tourism industry in the Philippines continues to grow at a rapid pace. Since 2000, the trends are looking bright for the country, recording outstanding profits and revenues on an annual basis. One of the main reasons behind this positive trend is the continued support being provided by the Philippine government on localities and provinces to improve their natural treasures and attractions. Furthermore, local residents have continued to support the government’s plan to improve the general status of tourism in the country.
Furthermore, the Philippines is also known for hosting some of the biggest entertainment events. Since 2005, several countries have been taking an active part in the World Pyro Olympics, which has drawn a serious volumes of crowds and spectators year in and year out. At the same time, international beauty competitions such as the Miss Earth beauty pageant is held in a country where beauty and brains are greatly appreciated.
Additionally, tourists and guests should watch out for the other exciting places to visit in the Philippines. The beautiful and old churches in Intramuros, the highly industrialized business hub in Makati, and the sweet-looking Chocolate Hills of Bohol are main attractions that should not be missed. At the same time, the Banaue Rice Terraces in Ifugao, the Hanging Coffins of Sagada in the Mountain Province, and white sandy beaches of Boracay are major reasons why the Philippines is truly a place worth visiting.
There are several things to consider when finding good accommodations especially if you're on a budget. Tourists should consider distance, cost, cultural familiarity, and crime rates among other things when looking for a place to stay.
|
<urn:uuid:17814e3e-19ea-4b0e-844b-84cfed3f33d1>
|
CC-MAIN-2016-26
|
http://www.philippinesboard.com/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403508.34/warc/CC-MAIN-20160624155003-00131-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.96293 | 1,536 | 2.875 | 3 |
Desiccant substances are often contained in desiccant packs which are used to decrease humidity for a variety of applications. A desiccant is able to attract water from its immediate environment, thereby maintaining a state of dryness within a contained space. There are two chemical drying processes describing desiccant action: absorption and adsorption.
Although chemicals that dehumidify by either absorption or adsorption produce similar results, the scientific reasons that desiccants work are decidedly different. Absorption occurs when one substance becomes part of another, while adsorption occurs when a physical bond is created between two substances, holding one within the other. Most desiccants, like silica gel, montmorillonite clay, activated charcoal and products which function as a molecular sieve, work to adsorb moisture to their porous surfaces.
How Are Desiccant Packs Used?
Desiccants are used mostly to stabilize environmental moisture conditions in packaged products. Many products need to be kept dry since the presence of moisture can create contamination, resulting in damage. Desiccant packs are commonly used for food, fabrics, electronics, leather articles, tools, pharmaceuticals, sporting goods, scientific instruments, historical artifacts, artwork, film and manuscripts.
Shipping is one of the most common applications in which desiccants, especially silica gel, are used. Indicating silica gel shows that moisture is present by changing colors when exposed to it. Activated charcoal is a particularly good desiccant for use in water or air filters. Montmorillonite clay is widely used to prevent animal feeds from clumping. A desiccant is classified as a molecular sieve when it has the ability to differentiate molecules to be filtered, on the basis of their size. A molecular sieve can adsorb molecules from both gases and liquids, making it ideal for separation of compounds and drying of reactive materials, such as required by flammables industries like oil and petroleum.
Selecting The Appropriate Desiccant Pack For Specific Uses
Selection of a desiccant should be based on the characteristics of both the packaging and product that it will be protecting, in addition to the characteristics of the desiccant itself. Environmental factors to which the product may be exposed, as well as desiccant size and the material from which desiccant packs are made, are some factors to consider.
Indicating silica gel is typically sold in granular form, since it needs to be seen in order to accomplish its purpose. However, indicating silica gel should never be used with consumable goods, due to the presence of the toxic salt, cobalt chloride. Other desiccants like silica gel, activated charcoal and montmorillonite clay are produced in a wide variety of sizes and their desiccants packs can be selected from various materials.
|
<urn:uuid:11521707-0e0f-42c2-ae2e-e0f60f8cb5b3>
|
CC-MAIN-2016-26
|
http://desiccantpacks.org/desiccant-types/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391519.0/warc/CC-MAIN-20160624154951-00077-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.953447 | 576 | 4.03125 | 4 |
Definitions for ganglioside galactosyltransferase
This page provides all possible meanings and translations of the word ganglioside galactosyltransferase
In enzymology, a ganglioside galactosyltransferase is an enzyme that catalyzes the chemical reaction The 2 substrates of this enzyme are UDP-galactose and N-acetyl-D-galactosaminyl--D-galactosyl-1,4-beta-D-glucosyl-N-acylsphingosine, whereas its 2 products are UDP and D-galactosyl-1,3-beta-N-acetyl-D-galactosaminyl--D-galactosyl-D-glucosyl-N-acylsphingosine. This enzyme belongs to the family of glycosyltransferases, specifically the hexosyltransferases. The systematic name of this enzyme class is UDP-galactose:N-acetyl-D-galactosaminyl--D-galac tosyl-D-glucosyl-N-acylsphingosine beta-1,3-D-galactosyltransferase. Other names in common use include UDP-galactose-ceramide galactosyltransferase, uridine diphosphogalactose-ceramide galactosyltransferase, UDP galactose-LAC Tet-ceramide alpha-galactosyltransferase, UDP-galactose-GM2 galactosyltransferase, uridine diphosphogalactose-GM2 galactosyltransferase, uridine diphosphate D-galactose:glycolipid galactosyltransferase, UDP-galactose:N-acetylgalactosaminyl-, galactosyl-glucosyl-ceramide galactosyltransferase, UDP-galactose-GM2 ganglioside galactosyltransferase, and GM1-synthase. This enzyme participates in glycosphingolipid biosynthesis - ganglioseries and glycan structures - biosynthesis 2.
U.S. National Library of Medicine
Catalyzes the final step in the galactocerebroside biosynthesis pathway.
The numerical value of ganglioside galactosyltransferase in Chaldean Numerology is: 5
The numerical value of ganglioside galactosyltransferase in Pythagorean Numerology is: 1
Find a translation for the ganglioside galactosyltransferase definition in other languages:
Select another language:
Discuss these ganglioside galactosyltransferase definitions with the community:
Word of the Day
Would you like us to send you a FREE new word definition delivered to your inbox daily?
Use the citation below to add this definition to your bibliography:
"ganglioside galactosyltransferase." Definitions.net. STANDS4 LLC, 2016. Web. 30 Jun 2016. <http://www.definitions.net/definition/ganglioside galactosyltransferase>.
|
<urn:uuid:e30182dc-4301-42ea-af53-a17a0a45e1b9>
|
CC-MAIN-2016-26
|
http://www.definitions.net/definition/ganglioside%20galactosyltransferase
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399428.8/warc/CC-MAIN-20160624154959-00008-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.729422 | 679 | 2.53125 | 3 |
LONDON – The oldest known copy of the Bible has been published online. Religious scholars haved noted some differences from the modern version.
Museum officials from London, Germany, Russia, and Egypt have finally brought together pieces from the world’s oldest Bible, the Codex Sinaiticus. During the 4th century, the codex was split into several pieces which were spread to the farthest corners of the known world. Four of those pieces have been digitized and brought together online for the first time in centuries. The fifth and final piece, containing much of the Old Testament, is still lost to history. Legend says that if the Codex is completed it will release a power capable of destroying the Earth. Researchers dismiss this as pure superstition
The Codex Sinaiticus, being the oldest known Bible, contains many typos, revisions, corrections and additions which chronicle the history of the development of Christianity. Much of what is in the Codex has been left out of modern Bibles, such as:
Moses repeatedly asking God for directions during the Exodus. Moses’ questioning of God culminates in a long discussion the two have on the shores of the Red Sea. The conversation revolves mostly around Moses complaining about sore feet and asking about the practicalities of parting an ocean. This only slows down the story of the Exodus and offers little enlightenment, so it is understandable why it was cut.
Jesus and the Disciples gambling in Myceanea. Included in the Gospel of Mark is the story of Jesus and the Disciples on a weekend gambling trip to Myceanea. Not long before Jesus knew he would be crucified, he took the 12 men who had been following him for years for a weekend getaway. According to the story, there was some confusion over room service charges, and James the Lesser had to be brought back to life after beating a local thug in a game of dice. In the end they donated all their winnings to the needy and Christ magically removed their hangovers.
Adam and Eve trying to break back in to the Garden of Eden. The Codex tells of Adam and Eve, aging and fearing their impending mortality, attempting to break in to the Garden of Eden to get to the Tree of Life. God and His Angels stood back silently and watched as the elderly man and woman struggled to get over a 12 foot wall, with no success.
Graphic descriptions of sea sickness on Noah’s Ark. Apparently Noah, his family, and two of every species that walks the earth got sea sick for 40 days and 40 nights aboard the ark. Included in the Codex are strongly graphic and incredibly detailed descriptions which had been passed down from generation to generation. This would also explain how so many animals were able to live together without killing each other for 40 days.
The reunited Codex can be found online for now, while the 4 remaining pieces are safely kept at opposite corners of the world.
|
<urn:uuid:673618ba-2108-4548-a319-50459d2de999>
|
CC-MAIN-2016-26
|
http://weeklyworldnews.com/headlines/9725/oldest-known-bible-goes-online/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395346.72/warc/CC-MAIN-20160624154955-00069-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.97025 | 594 | 2.796875 | 3 |
Transition from School to Adult Life
information | links and resources
Realizing successful post-secondary outcomes is a goal we have for all students. Depending on the disability and the support services required in adult life, successful transition from high school to adult life may require that planning activities begin in elementary school with students exploring their interests in middle school. Starting the process early prepares students with disabilities to think about what they want to be able to do in adult life. High school transition planning includes exploring post-secondary opportunities and employment options and may include connecting with the adult service agencies that may provide the student with services when he or she graduates or turn 22 years of age.
Statement of Needed Transition Services - beginning no later than the first IEP developed when the eligible student is 14.
Recognizing the need for students with disabilities to engage in effective transition planning, the Individuals with Disabilities Education Act (IDEA) requires that transition planning be part of the Individualized Education Program (IEP). Beginning no later than the first IEP developed when the eligible student is 14, the Team considers the student's need for transition services and documents this discussion. If appropriate, the IEP includes a statement of needed transition services. The school district understands that it must maintain documentation of a full discussion of the student's transition needs, whether or not such discussion identifies needed transition services for the IEP. Such documentation must be reviewed and updated annually thereafter. Students must be invited to all educational meetings and allowed to participate actively when transition planning is discussed.
Linkages to Post School Options - beginning no later than the first IEP developed when the eligible student is 14 and update annually.
Beginning no later than the first IEP developed when the eligible student is 14, the IEP's of students should include a post school vision statement as well as identify the transition services necessary to support the vision. IDEA 2004 defines transition services as a coordinated set of activities for a student with a disability that -
- Is designed to be within a results-oriented process, that is focused on improving the academic and functional achievement of the student with a disability to facilitate the student's movement from school to post-school activities, including post-secondary education, vocational education, integrated employment (including supported employment), continuing and adult education, adult services, independent living, or community participation;
- Is based on individual strengths, preferences and interest; and
- Includes instruction, related services, community experiences, the development of employment and other post-school adult living objectives, and when appropriate, acquisition of daily living skills and functional vocational evaluation. (P.L. 108-446, Sec 603 (34))
Transition Planning Form
Use the Transition Planning Form (TPF) 28M/9 for all students with IEPs who are 14-22 years of age. The TPF (28M/9) is a mandated form that is maintained with the IEP in the student's file but is not part of the IEP. The TPF is a flexible discussion guide that encourages the entire IEP Team to work together to assist the student in making a smooth transition to adult life.
Although the Department mandates that the TPF must be used by the Team to guide the transition planning discussion, what is written on the TPF itself does not spell out specific responsibilities for what will occur; the TPF is a planning tool and not the transition plan itself. Once the TPF is complete, the Team uses the TPF to create the transition plan that is formally documented in the IEP, specifying the services that the school will provide.
This inclusive planning process does not require that all identified actions will be the responsibility of the school's special education program. Instead, the entire Team - parents, the student, general education services, other agencies, community partners, and special education services - all work together to provide opportunities that will help the student to gain skills and move closer toward achieving the student's postsecondary goals (i.e., the student's vision for life after high school).
The Team should discuss and complete the TPF before completing the IEP form.
The students' postsecondary goals should be recorded on page one of the TPF in the "Post-Secondary Vision" box. Once the TPF is complete, the IEP Team transfers the postsecondary goals to the Vision Statement on IEP 1.
Also on page one of the TPF, the Team documents the student's disability-related skills that may require annual IEP goals and/or related services. There is no requirement that every disability-related need have a corresponding annual IEP goal. One year's IEP should contain only those annual IEP goals that a student can reasonably be expected to accomplish in one year's time. The TPF and IEP must be updated every year.
Discussing and mapping out the Action Plan on page two of the TPF can help the team to fully understand and articulate the intersection between the student's postsecondary goals, the student's skills and disability-related needs, and the supports and services that the student requires in order to achieve his/her desired postsecondary outcomes.
For a more comprehensive discussion of the TPF and IEP, please see Technical Assistance Advisory SPED 2013-1 and Technical Assistance Advisory SPED 2014-4.
Age of Majority - transfer of parental rights to student at age 18
In Massachusetts, regardless of the severity of their disability, students are considered adults and competent to make their own decisions at age 18 (Age of Majority). Unless there is a court appointed guardian or the student has chosen to share decision making with his or her parent, the school district must seek the consent of the student to continue the special education program. Students at age 18 have the right to make their own educational and medical decisions and must sign all consent forms. Parents and students must be notified about the transfer of parental rights to the student at least 1 year before the student turns 18 years of age.
Interagency Collaboration - develop supports and services necessary for adult life
The adult service system is complex and understanding it is essential for effective transition planning. When students with disabilities graduate from school or turn 22 years of age, they move from an entitlement to a non-entitlement system. While in school students receive services and supports mandated by federal and state law. As adults, while they may be eligible for services from adult service agencies, these services are not an entitlement which means they are not guaranteed. Consequently, it is essential that educators, parents and students understand the adult service system years before adult services need to be accessed. It is a sound practice to invite adult service agencies to speak to groups of students and individuals who live with and work with students with disabilities in order to understand the eligibility processes specific to each agency as well as the services that are available to adults with disabilities.
Adult Services - make Chapter 688 Referrals and general referrals
For students with severe disabilities, a Chapter 688 referral should be made to ensure that students who will require ongoing supports and services from one or more public agency are part of the eligibility process for receiving services and supports as adults. For other students who require fewer supports and services and may not meet the eligibility requirements for Chapter 688, a general referral for services can be made to adult service agencies.
Appeals can be made to the Bureau of Transitional Planning (BTP) relative to decisions about eligibility and the ITP. For more information call BTP at 617-573-1722.
Council for Exceptional Children (Division on Career Development and Transition)
DCDT focuses on the career development of children, youth and adults of all ages and exceptionalities, including transitions and career development of exceptional children.
The National Center on Secondary Education and Transition (NCSET)
The National Center on Secondary Education and Transition (NCSET) coordinates national resources, offers technical assistance, and disseminates information related to secondary education and transition for youth with disabilities in order to create opportunities for youth to achieve successful futures.
National Collaborative on Workforce and Disability for Youth (NCWD/Youth)
The National Collaborative on Workforce and Disability for Youth (NCWD/Youth) assists state and local workforce development systems to better serve youth with disabilities. The NCWD/Youth is composed of partners with expertise in disability, education, employment, and workforce development issues. NCWD/Youth is funded by a grant from the U.S. Department of Labor's Office of Disability Employment Policy (ODEP).
Office of Disability Employment Policy (ODEP)
Through the Department of Labor (DOL) The Office of Disability Employment Policy (ODEP) provides national leadership by developing and influencing disability-related employment policy as well as practice affecting the employment of people with disabilities.
Students with Disabilities Preparing for Postsecondary Education: Know Your Rights and Responsibilities
The Office for Civil Rights (OCR) in the U.S. Department of Education is providing the information in this pamphlet to explain the rights and responsibilities of students with disabilities who are preparing to attend postsecondary schools.
National Secondary Transition Technical Assistance Center (NSTTAC)
NSTTAC assists states in building capacity to support and improve transition planning, services, and outcomes for youth with disabilities.
information | links and resources
|
<urn:uuid:be31a14d-280c-4e2e-a3ed-e4beb3d5b15f>
|
CC-MAIN-2016-26
|
http://www.doe.mass.edu/sped/links/transition.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399106.96/warc/CC-MAIN-20160624154959-00188-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.94387 | 1,900 | 2.71875 | 3 |
View related sites
Why Cambridge English?
Grade statistics give the average percentages in each grade for all sessions of a particular exam by country or territory. This information helps researchers understand how our exams perform and is helpful to teachers who want to understand how students perform in a test in their country or region.
Please note: these statistics do not include absent, partial absent or ungraded candidates.
|
<urn:uuid:f8c43f30-4d9c-405c-8204-5e65afaa71c5>
|
CC-MAIN-2016-26
|
http://www.cambridgeenglish.org/research-and-validation/quality-and-accountability/grade-statistics/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783394987.40/warc/CC-MAIN-20160624154954-00003-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.909572 | 78 | 2.578125 | 3 |
A leading cause of cancer deaths worldwide, colon cancer is famously resistant to treatment. There are many reasons for this, but one has to do with a group of persisting cancer cells in the colon that cause relapses. Conventional therapies against them are mostly ineffective. EPFL scientists have now identified a biological mechanism that can be exploited to counteract colon cancer relapses. The approach activates a protein that is lost in the persisting cancer cells. The researchers were able to reactivate it using vitamin A, thus eliminating the cancer cells and preventing metastasis. The study is published in Cancer Cell, and introduces a new way to treat colon cancer.
When a colon-cancer patient receives treatment, e.g. chemotherapy, most of the cancer cells die off. But the genetic mutations that caused the cancer in the first place can survive in a specific group of cells of the colon. These are actually stem cells, meaning that they are premature cells waiting to grow into full-blown, normal cells of the colon. After cancer treatment ends, the surviving stem cells, still containing the cancerous mutations, can reappear and cause a relapse.
The lab of Joerg Huelsken at EPFL studied how differentiated colon cells come from stem cells in the gut. Using an array of different techniques, the team looked at cells, mouse models and samples from human patients.
Proteins and signaling pathways
The study focused on a protein called HOXA5, which belongs to a family of proteins that regulate the development of the fetus. These proteins are made during early development and work together to make sure that every tissue is correctly identified and that the fetus's body and limbs are patterned properly. In the adult body, proteins like HOXA5 regulate the body's stem cells to maintain both the identity and function of different tissues. Huelsken's team found that in the gut, HOXA5 plays a major role in restricting the number of stem cells, as well as the cells that make them.
Like all proteins, HOXA5 originates from a specific gene. The study showed that the cancerous stem cells of the colon use a biological mechanism that blocks it. This mechanism is called a "signaling pathway" because it involves a domino of molecules, each activating the next one down the line. The purpose of a signaling pathway is to transmit biological information from one part of the cell to another, e.g. from the outer membrane all the way to the nucleus. By blocking the HOXA5 gene, the cancerous stem cells of the colon can grow uncontrollably and spread, causing relapses and metastasis.
Retinoids: a way to fight back
The researchers looked for ways to reverse the blocking of HOXA5. The answer came from vitamin A. This small chemical structure is called a retinoid, and it has been known to induce differentiation of stem cells in the skin. The EPFL scientists found that retinoids can re-activate HOXA5. In mice that had colon cancer, the treatment with retinoids blocked tumor progression and normalized the tissue. By turning the gene for HOXA5 back on, this treatment eliminated cancer stem cells and prevented metastasis in the live animals. The researchers got similar results with samples from actual patients.
The new study suggests that patients that may profit from this well-tolerated treatment can be identified based on their expression pattern for the HOXA5 gene. Retinoid differentiation therapy could be significantly effective against colon cancer, not only for treatment of existing disease but also as a preventive measure in high-risk patients.
This study included contributions from EPFL's core facilities, Kyoto University, and the Japan Science and Technology Agency. It was funded by EMBO, the Swiss League against Cancer, the Swiss National Science Foundation and the NCCR in Molecular Oncology.
Ordóñez-Morán P, Dafflon C, Imajo M, Nishida E, Huelsken J. HOXA5 Counteracts Stem Cell Traits by Inhibiting Wnt Signaling in Colorectal Cancer. Cancer Cell Dec. 14, 2015. DOI: 10.1016/j.ccell.2015.11.001
|
<urn:uuid:3d0850a2-b217-4e40-b085-83061840ace3>
|
CC-MAIN-2016-26
|
http://www.eurekalert.org/pub_releases/2015-12/epfd-tcc121115.php
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396538.42/warc/CC-MAIN-20160624154956-00122-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.935939 | 867 | 3.296875 | 3 |
Mauvide-Genest Manor National Historic Site of Canada
Links and documents
Listed on the Canadian Register:
Statement of Significance
Description of Historic Place
Mauvide-Genest Manor National Historic Site of Canada is located on the south coast of l’Île d’Orléans at 1451 chemin Royal in the municipality of Saint-Jean. Its site is sub-divided by the chemin Royal which circumnavigates the island. This road separates the smaller southern portion near the St. Lawrence River from the main northern portion between the road and a small wooded hill, on which a substantial 18th-century stone manor house is located. There are several later outbuildings on both segments of the property. Official recognition refers to the house and its legal lot.
Mauvide-Genest Manor was designated a national historic site of Canada in 1994 because:
- it is a particularly distinguished example of a mid 18th-century seigneurial manor in a rural setting; and,
- closely associated with the nationally significant "les anciennes seigneuries de l'Île d'Orléans", it is witness to the importance of the seigneurial system under the French Regime.
The heritage value of Mauvide-Genest Manor lies in the substantial 18th-century rural form, materials and setting of its residence, and in its illustration of land subdivisions of the French Regime seigneurial system. Although a later owner was likely responsible, both the land and the manor house appear have been gentrified during the 18th century. Through its size, proximity to the St. Lawrence River and a clear running stream, as well as its access to an established woodlot, the property displays all the characteristics of a rural seigneury along the St. Lawrence.
Originally part of the seigneurie of l’Île d’Orléans, the Mauvide-Genest Manor property was created from an estate owned by Charles Genest. His grandson Jean Mauvide acquired part of the property in 1734, adding the southwest portion of the present property in 1752. When the residence was constructed, its façade was oriented towards the south where it overlooked a garden and the river. The gentrification of the property and the manor in the 18th-century, however, seems to have been completed by a subsequent owner.
Although the manor complex lacks the substantial barn that typically separated such houses from an established road, the Mauvide-Genest Manor is a substantial residence that makes an important contribution to the historic ambience of l’Île d’Orléans.
Sources: Historic Sites and Monuments Board of Canada, Minutes, July 1994, June 1995.
Key elements contributing to the heritage value of the site include:
- its location on l’Île d’Orleans near the St. Lawrence River;
- the siting of the house on a rise;
- the estate consisting of the main house and outbuildings set within a rural landscape;
- the substantial two-storey rectangular massing of the manor’s main block under a steeply hipped roof broken by small dormer windows and two large chimneys;
- the extension of the main block with a one-and-a-half-storey rear kitchen and a single-storey side chapel;
- the nine-bay façade with regularly spaced wooden casement windows and two entry doors;
- the stone and timber vernacular construction;
- the surviving original finishes and craftsmanship;
- the presence of surviving 18th-century interior furnishings and fittings;
- evidence of the original interior layout “en enfilade”;
- evidence of archaeological remains of earlier buildings;
- the presence of a clear stream running through the property;
- the presence of a sheltering wooded hill behind the manor proper;
- the alignment of long narrow fields running back from the river;
- the viewscapes from the site to the St. Lawrence River.
Government of Canada
Historic Sites and Monuments Act
National Historic Site of Canada
1752/01/01 to 1752/01/01
Theme - Category and Type
- Developing Economies
- Extraction and Production
- Expressing Intellectual and Cultural Life
- Architecture and Design
Function - Category and Type
- Single Dwelling
Architect / Designer
Location of Supporting Documentation
National Historic Sites Directorate, Documentation Centre, 5th Floor, Room 89, 25 Eddy Street, Gatineau, Québec.
Cross-Reference to Collection
|
<urn:uuid:9a47707f-ea05-4b37-b96a-d4ddd670f892>
|
CC-MAIN-2016-26
|
http://www.historicplaces.ca/en/rep-reg/place-lieu.aspx?id=12024
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395546.12/warc/CC-MAIN-20160624154955-00142-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.919807 | 990 | 2.609375 | 3 |
It is well known that the gonadotropic hormone secreted by the pituitary gland play an important role in the maturation of the gonads and spawning of fishes. The Brazilians were the first to succeed in inducing spawning by injecting fish with pituitary extract.
Several corps labeo rohita, L.bata, cirrhino mrigala, C.reba etc. were successfully breed by injecting pituitary extract. Now this technique is very popular in obtaining fish seed fro commercial purpose.
In fishes pituitary gland lies in a well protected depression the myodome, as the floor of the skull. For getting the pituitary the upper part of the skull is removed by a knife or bone cutter. The brain is lifted to reach the gland, which is preserved for future use in one of the following method.
Absolute alcohol in sealed tube in a dessicator at room temperature.
Acetone, which dehydrates and hardens the gland. After 36 hours the gland is dried on a filter paper and stored in sealed phials in a refrigerator.
Just before injected these glands are taken out and harmogenized in distilled water or 0.3% saline. The suspension is then centrifused and supernatant fluid is taken in a syringe and injected intramusculary as the back or base of the caudal fin.
|
<urn:uuid:4429c75e-2c1b-4905-a430-cf1accadc787>
|
CC-MAIN-2016-26
|
http://www.preservearticles.com/201104054941/short-note-on-induced-breeding.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396459.32/warc/CC-MAIN-20160624154956-00069-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.947124 | 285 | 2.734375 | 3 |
For many locals, Silicon Valley surrendered to the tyranny of development when it lost its last major fruit orchard in 1996. Olson's family cherry orchards, a 100-year player in the valley's agricultural history, shut down its main operations, and Deborah Olson mournfully told a local reporter then, "We're down to 15 acres at this point." There is a happy ending. With community support, the Olson family continues to sell its famous cherries at its fruit stand in Sunnyvale, Calif.
Ultimately, Silicon Valley's history is predicated on a continual progression from industrial to post-industrial. Adding to the chaotic ferment and success, multiple sectors co-exist at different stages of maturity at any given moment.
Before its industrial period, the region was an agrarian economy. At the height of the farming boom in the 1920s and 1930s, over 100,000 acres of orchards blanketed the valley. In 2006, farming continued to thrive across the broader San Francisco Bay Area in resilient specialty pockets, which included organic farms, gourmet cheese producers, and wine vineyards. Stett Holbrook reported that roughly 20,000 acres of agriculture remained, most of it clustered in southern Santa Clara County around Morgan Hill, Gilroy, and the Coyote Valley. New technologies and tools modernized local farming practices, so that what exists today is a far cry from efforts a century ago. Now the region produces 1.3 million tons of food annually, according to the Greenbelt Alliance.
By the 1920s, as farms began to industrialize, a big push occurred next in manufacturing, namely in automobile production, shipbuilding, and food canning.
The local auto industry shows a constant rise and fall. In the 1920s, Oakland became known as the "Detroit of the West" with factories operated by General Motors, Chrysler, Fageol Motor Company, and Durant Motors. All closed over the next 30 years or so, as the auto industry first consolidated to the Great Lakes and later shifted overseas, as well as the southeast.
The Bay Area saw a resurgent interest in car manufacturing in the 1980s when Toyota – a complete unknown in the earlier era – teamed up with GM to open the New United Motor Manufacturing Inc. (NUMMI) plant in Fremont, Calif. Now 25 years later, Toyota announced that all NUMMI operations will close by March in response to recent economic pressures.
NUMMI's closing is emblematic of the nature of employment change that accompanies broader industrial change. Currently, 4,700 people work at the auto factory, and another 50,000 people work for suppliers and other businesses that depend on NUMMI's ongoing operations.
Local and state leaders are concerned about the larger regional impact. Over the last 12 months, the East Bay has lost 4,400 manufacturing jobs, a decline of 5 percent in that industry, according to the U.S. Bureau of Labor Statistics. In comparison, Silicon Valley lost 13,800 manufacturing jobs, an 8 percent decline. Bruce Kern, executive director of the East Bay Economic Development Alliance, told the press, "You have the jobs from suppliers and other vendors that provide goods and services to NUMMI." Most of these workers are stranded with skills only suitable for the industrial Silicon Valley, so Gov. Arnold Schwarzenegger announced that California state will focus on retraining them, as well as finding alternative uses for the roughly 5 million-square-foot NUMMI factory.
On the other side of the Bay, Tesla Motors today is making the transition from a cottage to a production industry, and it has also shifted gears in its manufacturing plans. The highly subsidized company had originally planned to build an electric car factory in San Jose earlier this year, but Tesla is now close to a deal to build an electric car factory at the site of a former N.A.S.A. manufacturing plant in Downey, Calif., a blue-collar city south of Los Angeles.
Shipbuilding offers a counter example. While efforts have largely vanished from the area, a few notable examples have survived in new form. For instance, Kaiser Shipyards in Richmond, Calif., developed a new medical system for its shipyard workers in WWII that eventually became the basis for Kaiser Permanente, a highly successful modern health care organization. Here is an early example of a company converting its business model from hardware to service.
But the high point of the industrial era dates from the 1950s when U.S. defense contracts spurred the area's growth, building aerospace and other military equipment largely through Lockheed Martin. Then, as magnetic core memories were replaced by semiconductor memory chips in computers, semiconductor and chip manufacturing soared in the 1960s and 1970s, dominating the Valley with industrial fervor.
By the late 1970s, however, Silicon Valley had lost its lead in memory chips, thanks to several revolutionary measurement tools from Hewlett-Packard's Japanese partnership. The Japanese soon took over the memory chip business, going from less than 10% to over 80% of worldwide chips in six short years. Today, the memory chip market is an $18 billion worldwide market with virtually no U.S. manufacturers. In order to thrive against this fierce competition, Silicon Valley companies had to re-invent themselves, such as Intel's adoption of the microcomputer chipsets now known as Pentium.
Other areas of the information technology (IT) industry have also undergone reinvention. Charles House, in The HP Phenomenon, points out that Hewlett-Packard has re-invented itself six times in seven decades. Apple has also done so in spectacular fashion, first with computers, then with music, and now smartphones. Since 1976, Apple has gradually evolved from a computer hardware manufacturer into a consumer electronics company. The company originally handled most manufacturing locally, but by 1992, Apple had closed its plant in Fremont, Calif., and moved all operations out to Colorado, Ireland, and East Asia. For a time, Apple elevated its role in the industrial process, noting on its products: "Designed in California, assembled in China."
Apple's decision reflects a larger trend in Silicon Valley to shift more to post-industrialized work, marked by higher value technology services within a knowledge economy.
Another example is VIA Technologies, a chip manufacturer founded in Fremont in 1987, which moved its headquarters in 1992 to Taiwan. Richard Brown, vice president of international marketing at VIA, explained, "The main reason was that we saw that Taiwan would replace Silicon Valley as the global hub for PC, notebook, and motherboard design and manufacturing." He added, "It enabled us to get closer with key manufacturing partners in Taiwan."
Now expanded as a fabless semiconductor design company, VIA has kept a strong presence in Silicon Valley these last two decades. About 250 employees work locally. Brown said, "We conduct advanced R&D work on chipsets and graphics in our Fremont office, and we also have extensive customer support and sales operations covering the U.S. and Latin America."
Beyond IT, where is new industrial growth occurring in the Bay Area?
One economic indicator is demand in office and warehouse space. The U.S. industrial vacancy rate hit a decade high last quarter, marking the eighth consecutive quarter of increasing vacancy, according to real estate services firm Colliers International. Nationally, warehouses under construction declined to the lowest number Colliers has on record, and both bulk warehouse space and tech/R&D space showed larger decreases in rental rates than prior years.
The Silicon Valley market was the third largest contributor to the national drop after Chicago and the Los Angeles basin. Jeff Fredericks, senior managing partner out of Colliers' San Jose office, has observed that no sector has been left unscathed locally.
He noted, "Very little manufacturing or industrial space has been built in Silicon Valley in the last 10 years, and that trend is likely to continue." Fredericks believes, however, that some light manufacturing will continue to exist within the region, either to support local technology companies or simply because the business owners choose to live here.
He added, "Certainly, green tech is a market favorite right now, but that really only forms a small percentage of Silicon Valley's total market. Nonetheless, it is a sector that is experiencing better growth than others."
Richard Ogawa has seen a similar regional boom in the clean tech industry. As an intellectual property attorney with Townsend and Townsend and Crew LLP, Ogawa currently advises several clean tech start-up companies that are funded by Khosla Ventures, among others. Several companies, such as Stion Corporation and Solaria Corporation, have built pilot production lines. Part of the clean tech growth can be attributed to stricter state regulations, which push for greater reliance on renewable energy sources. He said, "It's very geographic-centric."
Ogawa has also seen a rise in small-scale manufacturing in other industries. For example, within the local apparel business, Levi Strauss & Co. shuttered its last operating factory in 2002, which had been operating since 1906. Many locals were discouraged to see the longtime factory close. Today, retail manufacturers like Golden Bear Sportswear and Timbuk2 actively operate in San Francisco, but of course with far smaller workforces.
Personally, Ogawa is a wonderful embodiment of industrial and post-industrial Silicon Valley. As a third generation Northern Californian, whose father owned a farm in the Central Valley, Ogawa specializes in post-industrial work. His clients in semiconductors, software, networking, and lately clean tech mix industrial and post-industrial work, either shifting manufacturing abroad or undertaking light production locally.
Reflecting on the changes he has witnessed over time, Ogawa said, "I'm not aware of any industry that's left the area, at least in my lifetime." In Silicon Valley, most industries simply take on new form as part of the constant evolution from industrial to post-industrial.
Tamara Carleton is a doctoral student at Stanford University, studying innovation culture and technology visions. She is also a Fellow of the Foundation for Enterprise Development and the Bay Area Science and Innovation Consortium.
|
<urn:uuid:f62f5027-4a83-4d24-a4b7-b59416f6357d>
|
CC-MAIN-2016-26
|
http://www.newgeography.com/content/001235-the-cycles-industrial-and-post-industrial-silicon-valley
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783394937.4/warc/CC-MAIN-20160624154954-00068-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.955094 | 2,066 | 2.84375 | 3 |
BEIJING (AP) — China moved one step closer to setting up its own space station early Thursday, with two spacecraft docking successfully above the earth.
The state-run Xinhua News Agency said the unmanned spacecraft Shenzhou 8 docked with the Tiangong 1 module now in orbit as China moved ahead with its most ambitious space project to date. Shenzhou 8 launched Tuesday from a base in far western China.
China launched its own space station program after being turned away in its repeated attempts to join the 16-nation International Space Station. That was largely on objections from the United States, which is wary of the Chinese space program's military links.
Xinhua said China joins the U.S. and Russia as the only countries to master the space docking technique.
In terms of technology, the launch of the Tiangong-1 places China about where the U.S. was in the 1960s during the Gemini program. But space experts have said that China progresses farther than the U.S. did with each launch it undertakes.
Experts see no explicit military function for the Chinese space station.
President Hu Jintao praised the docking in a message from France, where he is ahead of the Group of 20 summit of economic powers. Premier Wen Jiabao and other top officials watched the docking from an aerospace center in Beijing, Xinhua reported.
China plans two more space missions — at least one of them manned — to meet up with the Tiangong 1 module next year for further practice.
Plans call for launching two other experimental modules for more tests before the actual station is launched in three sections between 2020 and 2022.
At about 60 tons when completed, the Chinese station will be considerably smaller than the International Space Station, which is expected to continue operating through 2028.
China launched its first manned flight in 2003, joining Russia and the United States as the only countries to launch humans into orbit. The Chinese space program also calls for one day landing on the moon, possibly with astronauts.
|
<urn:uuid:30591965-de3c-4c90-9c22-a96cf67cbf84>
|
CC-MAIN-2016-26
|
http://cnsnews.com/news/article/china-spacecraft-make-first-successful-docking
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396106.71/warc/CC-MAIN-20160624154956-00108-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.945746 | 413 | 2.78125 | 3 |
"I took an earthen vessel in which I put 200 pounds of soil dried in an oven, and then I moistened with rain water and pressed hard into it a shoot of willow weighing five pounds. After exactly five years the tree that had grown up weighed 169 pounds and about three ounces. But the vessel had never received anything but rain water or distilled water to moisten the soil when this was necessary, and it remained full of soil, which was still tightly packed, and, lest any dust from outside should get into the soil, it was covered with a sheet of iron coated with tin but perforated with many holes. I did not take the weight of the leaves that fell in the autumn. In the end I dried the soil once more and got the same 200 pounds that I started with, less about two ounces. Therefore the 164 pounds of wood bark, and root arose from the water alone." ~ Jan Baptist van Helmont
Jan Baptist van Helmont (bapt. 12 January 1579 – 30 December 1644) was an early modern period Flemish chemist, physiologist, and physician. He worked during the years just after Paracelsus and iatrochemistry, and is sometimes considered to be "the founder of pneumatic chemistry". Van Helmont is remembered today largely for his ideas on spontaneous generation, his 5-year tree experiment, and his introduction of the word "gas" (from the Greek word chaos) into the vocabulary of scientists.
|
<urn:uuid:371c3515-ea10-41d9-8299-742349c26b90>
|
CC-MAIN-2016-26
|
http://lem4546567.newsvine.com/_news/2012/01/12/10136376-jan-baptist-van-helmont-baptized-january-12-1579
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783408840.13/warc/CC-MAIN-20160624155008-00023-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.985127 | 302 | 2.859375 | 3 |
Also found in: Thesaurus, Medical, Legal, Financial, Acronyms, Idioms, Encyclopedia, Wikipedia.
v. laid, lay•ing,
- lay - As in layperson, it derives from Greek laikos, "of the people"—as opposed to clerics.
- nest egg - Poultry farmers formerly placed a porcelain or other fake egg in a hen's nest to encourage it to lay more eggs—from this came nest egg, money saved to encourage the making of more.
- lay, lie - To lay is to place something; to lie is to recline.
- oviposit - To lay an egg.
2. Setting of a weapon for a given range, a given direction, or both.
3. To drop one or more aerial bombs or aerial mines onto the surface from an aircraft.
4. To spread a smoke screen on the ground from an aircraft.
5. To calculate or project a course.
6. To lay on: a. to execute a bomber strike; b. to set up a mission.
Lay is a transitive verb, and it is also a past tense of another verb, lie.
To lay something somewhere means to put it there carefully or neatly.
The other forms of lay are lays, laying, laid.
Lie is an intransitive verb with two different meanings.
To lie somewhere means to be there in a horizontal position, or to get into that position.
When lie is used like this, its other forms are lies, lying, lay, lain. The -ed participle lain is rarely used.
Past participle: laid
|Noun||1.||lay - a narrative song with a recurrent refrain|
song, vocal - a short musical composition with words; "a successful musical must have at least three good songs"
minstrelsy - ballads sung by minstrels
|2.||lay - a narrative poem of popular origin |
Edda - either of two distinct works in Old Icelandic dating from the late 13th century and consisting of 34 mythological and heroic ballads composed between 800 and 1200; the primary source for Scandinavian mythology
|Verb||1.||lay - put into a certain place or abstract location; "Put your things here"; "Set the tray down"; "Set the dogs on the scent of the missing children"; "Place emphasis on a certain point"|
docket - place on the docket for legal action; "Only 5 of the 120 cases docketed were tried"
cock - set the trigger of a firearm back for firing
postpose - place after another constituent in the sentence; "Japanese postposes the adpositions, whereas English preposes them"
prepose - place before another constituent in the sentence; "English preposes the adpositions; Japanese postposes them"
step - place (a ship's mast) in its step
put back, replace - put something back where it belongs; "replace the book on the shelf after you have finished reading it"; "please put the clean dishes back in the cabinet when you have washed them"
stratify - form, arrange, or deposit in layers; "The fish are stratified in barrels"; "The rock was stratified by the force of the water"; "A statistician stratifies the list of names according to the addresses"
plant - place something or someone in a certain position in order to secretly observe or deceive; "Plant a spy in Moscow"; "plant bugs in the dissident's apartment"
intersperse - place at intervals in or among; "intersperse exclamation marks in the text"
pile - place or lay as if in a pile; "The teacher piled work on the students until the parents protested"
arrange, set up - put into a proper or systematic order; "arrange the books on the shelves in chronological order"
superpose - place (one geometric figure) upon another so that their perimeters coincide
park - place temporarily; "park the car in the yard"; "park the children with the in-laws"; "park your bag in this locker"
dispose - place or put in a particular order; "the dots are unevenly disposed"
emplace - put into place or position; "the box with the ancestors' ashes was emplaced on the top shelf of the house altar"
emplace - provide a new emplacement for guns
ship - place on board a ship; "ship the cargo in the hold of the vessel"
underlay - put (something) under or beneath; "They underlaid the shingles with roofing paper"
trench - set, plant, or bury in a trench; "trench the fallen soldiers"; "trench the vegetables"
pigeonhole - place into a small compartment
shelve - place on a shelf; "shelve books"
jar - place in a cylindrical vessel; "jar the jam"
repose - to put something (eg trust) in something; "The nation reposed its confidence in the King"
sign - place signs, as along a road; "sign an intersection"; "This road has been signed"
middle - put in the middle
parallelize - place parallel to one another
butt - place end to end without overlapping; "The frames must be butted at the joints"
recess - put into a recess; "recess lights"
reposition - place into another position
throw, thrust - place or put with great energy; "She threw the blanket around the child"; "thrust the money in the hands of the beggar"
rack up - place in a rack; "rack pool balls"
coffin - place into a coffin; "her body was coffined"
bed - put to bed; "The children were bedded at ten o'clock"
appose - place side by side or in close proximity
place down, put down, set down - cause to sit or seat or be in a settled position or place; "set down your bags here"
misplace - place or position wrongly; put in the wrong position; "misplaced modifiers"
juxtapose - place side by side; "The fauvists juxtaposed strong colors"
set down - put or settle into a position; "The hotel was set down at the bottom of the valley"
bottle - put into bottles; "bottle the mineral water"
bucket - put into a bucket
barrel - put in barrels
ground - place or put on the ground
mislay, misplace, lose - place (something) where one cannot find it again; "I misplaced my eyeglasses"
upend - set, turn, or stand on end; "upend the box and empty the contents"
seat - place in or on a seat; "the mother seated the toddler on the high chair"
|2.||lay - put in a horizontal position; "lay the books on the table"; "lay the patient carefully onto the bed"|
lay, place, put, set, position, pose - put into a certain place or abstract location; "Put your things here"; "Set the tray down"; "Set the dogs on the scent of the missing children"; "Place emphasis on a certain point"
rail - lay with rails; "hundreds of miles were railed out here"
lay - lay eggs; "This hen doesn't lay"
blow - lay eggs; "certain insects are said to blow"
entomb, inhume, inter, lay to rest, bury - place in a grave or tomb; "Stalin was buried behind the Kremlin wall on Red Square"; "The pharaohs were entombed in the pyramids"; "My grandfather was laid to rest last Sunday"
rebury - bury again; "After the king's body had been exhumed and tested to traces of poison, it was reburied in the same spot"
|3.||lay - prepare or position for action or operation; "lay a fire"; "lay the foundation for a new health care plan"|
|4.||lay - lay eggs; "This hen doesn't lay"|
spawn - lay spawn; "The salmon swims upstream to spawn"
|5.||lay - impose as a duty, burden, or punishment; "lay a responsibility on someone"|
|Adj.||1.||lay - characteristic of those who are not members of the clergy; "set his collar in laic rather than clerical position"; "the lay ministry"|
|2.||lay - not of or from a profession; "a lay opinion as to the cause of the disease"|
nonprofessional - not professional; not engaged in a profession or engaging in as a profession or for gain; "the nonprofessional wives of his male colleagues"; "nonprofessional actors"
I haven't laid eyes on him for years → hace años que no lo veo
I didn't lay a finger on it! → ¡no lo toqué!
to lay sth flat → extender algo (sobre la mesa )
I don't know where to lay my hands on → no sé dónde echar mano a or conseguir ...
to lay sth over or on sth → extender algo encima de algo
to lay the table (Brit) → poner la mesa
the best laid plans (of mice and men) can go astray → el hombre propone y Dios dispone
to lay a claim before sb → presentar una reivindicación a algn
to lay the facts before sb → presentar los hechos a algn
see also charge A1
see also claim A2
to lay a town flat → arrasar or destruir una ciudad
he has been laid low with flu → la gripe lo ha tenido en cama
to lay o.s. open to attack/criticism → exponerse al ataque/a la crítica
to be laid to rest → ser enterrado
to lay that → apostar a que ...
they're laying bets on who is going to leave next → hacen apuestas sobre quién será el próximo en marcharse
see also odds 1
it lays its eggs on/in [fish, amphibian, insect] → deposita los huevos or desova en ...
the lay of the land (US) → la configuración del terreno (fig) → la situación, el estado de las cosas
to come into lay → empezar a poner huevos
to go out of lay → dejar de poner huevos
to lay o.s. down → tumbarse, echarse
to lay down one's life for sth/sb → dar su vida por algo/algn
to lay it down that → asentar que ..., dictaminar que ...
see also law A2
to lay in supplies → aprovisionarse
to lay in supplies of sth → proveerse or abastecerse de algo
to lay off cigarettes → dejar de fumar (cigarrillos)
lay off it! → ¡ya está bien!, ¡déjalo por Dios!
you rent the hall and we'll lay on the refreshments → usted alquila la sala y nosotros nos hacemos cargo de or ponemos los refrigerios
everything's laid on → todo está dispuesto
they laid on a car for me → pusieron un coche a mi disposición
to lay it on thick or with a trowel (= exaggerate) → recargar las tintas
the house is well laid out → la casa está bien distribuida
the town is well laid out → la ciudad tiene un trazado elegante
he laid himself out to please → se volcó por complacerla/los
he's laying up trouble for himself → se está creando or buscando problemas
she was laid up for weeks → tuvo que guardar cama durante varias semanas
She laid the baby in her cot → Elle a mis le bébé dans son lit.
to lay the facts before sb → présenter les faits à qn
to lay one's proposals before sb → présenter ses propositions à qn
to lay the blame on sb → rejeter la faute sur qn
She refused to lay the blame on any one party → Elle refusa de rejeter la faute sur un parti en particulier.
A man came to lay the carpet → Un homme est venu pour poser la moquette.
to lay a trap for sb → tendre un piège à qn
to lay the foundations for sth (fig) → jeter les fondations de qch
The table was laid for lunch → La table était mise pour le déjeuner.
He said it was six months since he'd last got laid → Il a dit que ça faisait six mois qu'il n'avait pas baisé.
Raymond claims that Ducruet and his bodyguard laid into him → Raymond prétend que Ducruet et son garde du corps lui sont tombés dessus.
to lay off doing sth → arrêter de faire qch
They laid on extra buses → Ils ont mis en place un service de bus supplémentaire.
Clothes and jewels were laid out on the ground → On avait disposé les vêtements et les bijoux sur le sol.
Maxwell listened closely as Johnson laid out his plan → Maxwell écoutait attentivement tandis que Johnson exposait son plan.
lay4 vb: pret, ptp <laid>
lay1 [leɪ] adj (Rel) → laico/a, secolare; (brother, sister) → laico/a (fig) (non-specialist) → profano/a
lay3 [leɪ] (laid (pt, pp))
to lay sth over sth → stendere qc su qc
to lay sth on sth → coprire qc con qc
to lay the facts/one's proposals before sb → presentare i fatti/delle proposte a qn
to be laid low with flu → essere costretto/a a letto con l'influenza
to be laid to rest (euph) (buried) → essere sepolto/a
to get laid (fam!) → scopare (fam!)
I don't know where to lay my hands on it → non saprei dove trovarlo
to lay o.s. open to attack/criticism → esporsi agli attacchi/alle critiche
to lay the blame (for sth) on sb → dar la colpa (di qc) a qn
to lay claim to sth → reclamare qc, accampare diritti mpl su qc
to lay odds or a bet on sth → scommettere su qc
to lay down one's life for sb/sth → sacrificare la propria vita per qn/qc
to lay down the law (fig) → dettar legge
lay off him! → non rompergli le scatole!, lascialo in pace!
to lay on (for) (meal, entertainment) → offrire (a) (facilities, transport) → mettere a disposizione (di)
to lay it on thick (fam) (flatter) → andarci pesante con i complimenti; (exaggerate) → metterla giù dura
the way the house is laid out → la disposizione della casa
to lay up trouble for o.s → crearsi dei guai
lay1(lei) – past tense, past participle laid (leid) – verb
lie takes no object and has lying as its present participle, lay as its past tense and lain as its past participle: Please lie down ; He lay down ; He had lain there for hours .
lie , to be untruthful, has lying as its present participle, and lied as its past tense and past participle: She (has always) lied about her age .
|
<urn:uuid:18812bc1-5a54-45ab-bb2e-93cf0977e2ff>
|
CC-MAIN-2016-26
|
http://www.thefreedictionary.com/lay
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397842.93/warc/CC-MAIN-20160624154957-00061-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.78674 | 3,590 | 3.078125 | 3 |
The Faded Gingham Dress - Stanford University Origin Legend
This enduring and entertaining tale supposedly outlines the origins of California's prestigious Stanford University. According to the story, after Mr. and Mrs. Leland Stanford were rudely rebuffed by the President of Harvard University when they offered to fund a building to honour the memory of their dead son, the pair subsequently established the university that bears their name. The story claims that the couple met such a cold and arrogant reception at Harvard because they were dressed in a "faded gingham dress" and a "homespun threadbare suit" and thereby had the appearance of penniless country bumpkins. It is a nice story, and one that carries a valuable moral lesson - people should not make snap judgements based on a person's initial appearance or demeanour.
However, while core elements in the tale are more or less factual, as a whole it strays a long way from the truth. In fact it is an urban legend that has been circulating for more than a decade. Leland and Jane Stanford did indeed establish Stanford University, they did visit Harvard University before establishing Stanford and, sadly, they did have a son that died young. Historical notes published on Stanford's website suggest that the couple did indeed create the institution as a memorial to their son. However, any truth in the story well and truly ends with these few facts.
The family was well-to-do and certainly would not have dressed as poor country hicks, especially when attending an important meeting. Moreover, Leland Stanford was a powerful and influential man, astute at business, a political leader, later a U.S. Senator and at one point, Governor of California. Hardly the type of individual who would venture "timidly" into a university office and then quietly wait for hours to be seen. And the couple's son, Leland Jr, died not of an accident, but of typhoid fever while travelling with his family in Italy. The boy was only 15 years old and was not attending Harvard or any other university at the time of his death. Before going ahead with plans to establish their university, the Stanfords did visit several eastern universities, including Harvard where they spoke to then president Charles William Eliot. However, they were not rudely dismissed at these visits and in fact received valuable advice that helped them in their project. An entry in the Stanford University Libraries FAQ, dismissed the story as false, noting in part:
The thought of Leland and Jane Stanford, by this time quite wealthy, arriving at Harvard in a homespun threadbare suit and faded gingham dress is amusing, but highly inaccurate. It also is unlikely that Leland Stanford, a former governor of California and well-known railroad baron, and his wife Jane were knowingly kept waiting outside Eliot's office. The Stanfords also visited Cornell, MIT, and Johns Hopkins.
The story was also resoundingly debunked in a 1998 edition of a university publication, the Stanford Magazine:
Take the tale of two "backwoods country hicks" that's been zapped across the nation and around the world in countless e-mails over the last few months. The story has it that sometime in the 1880s a man and woman show up unannounced to meet with the president of Harvard. They talk to him about building a memorial for their son, who "accidentally killed" himself after his freshman year at Harvard. Eyeing the woman's "faded gingham dress" and the man's "homespun threadbare suit," the president rudely informs them of the cost of building a university. "Is that all?" the woman says to her husband. "Why don't we just start our own?" With that, the story goes, Leland and Jane Stanford returned to Palo Alto, "where they established the University that bears their name, a memorial to a son that Harvard no longer cared about."
Thus, while the story may be entertaining, it is not an accurate account of the founding of Stanford University. This version of the story falsely claims that it was penned by the late Malcolm Forbes, a well known business leader and publisher of Forbes magazine.
The account, of course, is wrong -- and, in places, absurd. Leland Jr. died of typhoid fever at age 15. He never enrolled at Harvard. His parents did visit Harvard President Charles Eliot, but only to get advice on endowing a university. Perhaps most ridiculous is the notion that Sen. Stanford, a wealthy railroad baron, and his wife would show up in ratty clothes.
Still, the story lives on. Stanford officials have fielded questions from tourists, alumni, reporters -- and Harvard itself. Archivist Margaret Kimball, '80, was even asked to settle a bet between a husband and wife. "I might have caused a divorce," she says.
The first quote included at the bottom of the message is generally attributed to American poet Maya Angelou. The slightly munged and abridged second quote, attributed in the message to James Arthur Ray, is more usually attributed to 19th Century American politician and orator, William Jennings Bryan who said, "Destiny is no matter of chance. It is a matter of choice. It is not a thing to be waited for, it is a thing to be achieved".
Identity theft is one of the fastest growing crimes in the world. Learn how to stay safe online with Hoax-Slayer's comprehensive eBook:
Subject: THE GINGHAM DRESS
A lady in a faded gingham dress
and her husband, dressed in a Homespun
threadbare suit, stepped off the train in Boston ,
and walked timidly without an appointment into the Harvard University
President's outer office.
The secretary could tell in a moment that such backwoods,
country hicks had no business at Harvard and probably didn't even
deserve to be in Cambridge
'We'd like to see the president,' the man said softly.
'He'll be busy all day,' the secretary snapped.
'We'll wait,' the lady replied.
For hours the secretary ignored them, hoping
that the couple would finally become discouraged and go away.
They didn't, and the secretary grew
frustrated and finally decided to disturb the president,
even though it was a chore she always regretted.
'Maybe if you see them for a few minutes, they'll leave,' she
said to him!
He sighed in exasperation and nodded. Someone of his importance
obviously didn't have the
time to spend with them, and he detested gingham dresses and homespun
up his outer office.
The president, stern faced and with dignity, strutted toward
the couple. The lady told him, 'We had a son who attended Harvard for
year. He loved Harvard. He was happy here. But about a year ago, he
was accidentally killed. My husband and I would like to erect a
him, somewhere on campus.'
The president wasn't touched. He was shocked. 'Madam,' he said,
gruffly, 'we can't put up a statue for every person who attended
and died. If we did, this place would look like a cemetery.'
'Oh, no,' the lady explained quickly. 'We don't want to erect
a statue. We thought we would like to give a building to Harvard.'
The president rolled his eyes. He glanced at the gingham dress and
homespun suit, then exclaimed, 'A building! Do you have any earthly
how much a building costs? We have over seven and a half million
dollars in the
physical buildings here at Harvard.'
For a moment the lady was silent. The president was pleased. Maybe he
could get rid of them now.
The lady turned to her husband and said quietly, 'Is that all it costs
to start a university? Why don't we just start our own?'
Her husband nodded. The president's face wilted in confusion and
bewilderment. Mr. and Mrs. Leland Stanford got up and walked away,
traveling to Palo Alto , California where they established the university
that bears their name, Stanford University , a memorial to
a son that Harvard no longer cared about.
You can easily judge the character of others by how they treat those
who they think can do nothing for
A TRUE STORY By Malcolm Forbes
'People will forget what you said; People will forget what you
did. But people will never forget how you made them feel'.
"Destiny is not a matter of chance, it is a matter of
choice."- James Arthur Ray
Last updated: May 1, 2015
First published: September 24, 2009
By Brett M. Christensen
Were Leland and Jane Stanford snubbed by the president of Harvard University?
THE BIRTH OF THE UNIVERSITY
Truth and Lies at Harvard
Latest Hoax-Slayer Articles
|
<urn:uuid:3cfb0fa3-3a38-4b80-b5d0-7ad937bf2efc>
|
CC-MAIN-2016-26
|
http://www.hoax-slayer.com/gingham-dress-stanford-university.shtml
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402699.36/warc/CC-MAIN-20160624155002-00083-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.973199 | 1,849 | 2.515625 | 3 |
This stamp was issued to pay the reduced rate for first class letters, as provided by an Act of Congress approved the same day the stamp was issued.
Born in Virginia, George Washington was dissuaded from a career at sea by his mother. Turning to land surveying, he was appointed to survey Lord Fairfax's lands in the Shenandoah Valley. With the beginning of the French and Indian War in 1753, Washington was dispatched by Virginia Gov. Dinwiddie to warn the French commander of Fort Le Boeuf against further encroachment against British territory.
On his way to establish a post at the "Forks of the Ohio," now Pittsburgh, Washington learned the French already had built a fort there and that the French were advancing on British holdings. He attempted to stave off the advance and was defeated, but allowed to remove his troops to Virginia as part of the surrender. Later he was part of Gen. Braddock's expedition that failed to move the French from Fort Duquesne, as well as Gen. John Forbes' successful campaign that resulted in Fort Duquesne becoming Fort Pitt. Washington left the military in 1758 and returned to Mount Vernon.
In 1759 he began a 15-year tenure in the Virginia legislature and married Martha Dandridge Custis. He was a delegate to both the First and Second Continental Congress, although he did not participate actively. In 1775 he was the group's unanimous choice as commander in chief of the Continental forces. His early military results in the Revolutionary War were mixed, with his joining French forces to overcome Gen. Cornwallis at Yorktown. One of his great strengths was his unquestioned integrity.
After the war he again returned to Mount Vernon. In 1787 he headed the Virginia delegation to the Constitutional Convention in Philadelphia and unanimously was elected presiding officer. Two years later he unanimously was elected president. His presidency was replete with crises, including the feud between the factions led by Thomas Jefferson and Alexander Hamilton. Washington was reelected president in 1792, a year before the greatest crisis of his tenure.
Washington was dismayed by excesses in the French Revolution and unhappy with attempts by the French minister to the United States to interfere in American politics. Once again, in 1797 at the end of his second term as president (he refused a third term), George Washington returned to Mount Vernon. In his farewell address he warned the United States against permanent alliances abroad. Philatelic Information
|
<urn:uuid:71725c36-edff-4fd6-b2a9-5391effcbdea>
|
CC-MAIN-2016-26
|
http://usstampgallery.com/view.php?id=135debd4837026bf06c7bfc5d1e0c6a31611af1d
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397565.80/warc/CC-MAIN-20160624154957-00044-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.989134 | 496 | 3.625 | 4 |
- January 2014
- 33 Stan.Envtl.L.J. 3
Extracting DNA from ancient specimens and using cloning technology to resurrect extinct species has become a staple plot device of wildly popular science fiction novels and films since Jurassic Park. But the prospect that extinct animals may live again no longer belongs solely to the realm of science fiction. “De-extinction” is coming closer to reality, as scientists now are experimenting with a number of methods for resurrecting extinct species. No method will bring back the dinosaurs; it has been too long since the Jurassic era for their DNA to survive. It may well be possible to “resurrect” more recently extinct species, however, such as the Pyrenean ibex, the passenger pigeon, or possibly even the awe-inspiring woolly mammoth, in the not too distant future.
While some discussion of these exciting developments has appeared in the scientific and popular press, most articles focus on technical and ethical issues: can we do this, and should we? For purposes of this Article, we treat de-extinction, in some form, as a scientifically reasonable future prospect whose legal implications should be considered in a practical manner. For the most part, we assume that if de-extinction can feasibly be accomplished, someone will undertake the effort if for no other reason than because it would be irresistibly thrilling to do so. Jurassic Park itself may be unattainable, but a somewhat more plausible Pleistocene Park, populated with mammoths and aurochs, would generate nearly as much popular excitement. Other motivations for pursuing de-extinction might include the reintroduction of “keystone” species for purposes of reviving whole ecosystems, with substantial environmental benefits.
Therefore, this Article explores the implications of de-extinction under existing law. Part I introduces the current science of de-extinction and the different methods its proponents are pursuing. The methods are worth reviewing in some detail, since the implications of those methods are significant for legal outcomes. Part II discusses the ESA, whether it would apply to de-extinct species, and how it should be applied. Part III addresses permitting and evaluation of environmental impacts under NEPA for projects to reintroduce de-extinct species into the wild, by analogy to EISs for reintroductions of living but locally extirpated species into regions that they formerly inhabited and EISs for releases into the environment of genetically modified organisms (GMOs). Part IV explores the regulation of resurrected species as GMOs, given that two of the three de-extinction methods being pursued would result in GMOs. Part V considers the patentability of such GMOs. Part VI summarizes our conclusions.
|
<urn:uuid:82905367-d9bd-4d3c-89d3-814ea01da312>
|
CC-MAIN-2016-26
|
http://journals.law.stanford.edu/stanford-environmental-law-journal-selj/print/volume-33/number-1/how-permit-your-mammoth-some-legal-implications-de-extinction
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395346.6/warc/CC-MAIN-20160624154955-00162-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.943014 | 552 | 3.40625 | 3 |
Lakewood, Colo. (AP) - Biologists have found endangered fish in parts of the Colorado and Yampa Rivers where they haven't been seen in decades.
The U.S. Fish and Wildlife Service says a 26-inch adult Colorado Pikeminnow was captured in the Colorado River near Grand Junction.
Colorado State University researchers captured a 17-inch adult Razorback Sucker in the Yampa River about seven miles upstream of Dinosaur National Monument in northwest Colorado.
Both fish, found in April, are on the Federal Endangered Species List. Biologists are trying to rebuild the populations of the Pikeminnow, Razorback Sucker, Humpback Chub and Bonytail.
All the fish are natives of the Colorado River System whose numbers have dropped because of dams and nonnative fish.
(COPYRIGHT 2009 BY THE ASSOCIATED PRESS. ALL RIGHTS RESERVED
|
<urn:uuid:c1105bd9-58e1-4b61-b865-cdbe180bb5ab>
|
CC-MAIN-2016-26
|
http://www.nbc11news.com/localnews/headlines/44916377.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396872.10/warc/CC-MAIN-20160624154956-00193-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.924783 | 186 | 2.96875 | 3 |
The system for informing Americans about the threats to their health and safety posed by chemical plants is seriously broken, a Reuters investigation revealed August 10, 2013.
The April 17, 2013, explosion of a fertilizer plant in the town of West, Texas, was a reminder that there is very little federal regulation of chemical safety in the US. There is a reason for that. After the chemical plant disaster in Bhopal, India, killed thousands there in 1984, the US chemical industry feared that safety regulations would be imposed in this country.
The chemical industry headed off real regulation by striking a grand bargain with legislators and environmentalists: They agreed to disclose information about the chemicals they were handling — and the threats they present to nearby communities — in a series of laws and amendments. One keystone is the Emergency Planning and Community Right-To-Know Act (EPCRA), first passed in 1986. One reason environmentalists agreed was that they thought awareness of chemical threats would create public pressure on companies to make their plants safer. To some extent, that is what happened.
One part of EPCRA, known as "Tier 2," requires chemical facilities to list the hazardous chemicals they are handling and report them to state and local agencies, and also requires the state and local agencies to disclose these lists to the public.
An extensive investigation by Reuters reporters M.B. Pell, Ryan McNeill, and Selam Gebrekidan, however, found that the "27-year-old U.S. program intended to warn the public of the presence of hazardous chemicals is flawed in many states due to scant oversight and lax reporting by plant owners."
A key purpose of the information is to help first responders. Better information in the West, Texas, case might well have saved firefighters' lives.
"But facilities across the country often misidentify these chemicals or their location, and sometimes fail to report the existence of the substances altogether," Reuters reported. "And except for a handful of states, neither federal nor local authorities are auditing the reports for errors."
Very often the local agency that keeps this data is an arm of the local fire department. Reporters have a legally mandated right to the information, and they can sometimes keep safety officials and plant operators on their toes by asking for it — and writing stories with what they find.
Tier 2 reports are only available to the public through the states.
While the Tier 2 reports are important, journalists who want to find out about hazardous chemicals in their communities have a number of other tools available. One is the Toxics Release Inventory.
Another investigative tool is the so-called Risk Management Plans for hazardous chemical facilities. While Congress has forced EPA to make these hard to get, they are publicly available. The Right-To-Know Network, an arm of the Center for Effective Government, has compiled them in an easy-to-access form.
- "Exclusive: U.S. System for Flagging Hazardous Chemicals Is Widely Flawed," Reuters, August 10, 2013, by M.B. Pell, Ryan McNeill, and Selam Gebrekidan.
- Previous Coverage from SEJ: WatchDog of June 5, 2013 ; WatchDog of May 22, 2013 ; EJToday Headlines of May 6, 2013 ; EJToday Headlines of April 24, 2013 ; EJToday Headlines of June 4, 2013 ; EJToday Headlines of August 2, 2013 ; and EJToday Headlines of July 16, 2013 .
- "Updated Database Reveals Significant Chemical Risks Are Distributed Across the Country," Center for Effective Government, July 30, 2013.
|
<urn:uuid:43ab57ed-2b37-47b7-b058-6d5a913d3a59>
|
CC-MAIN-2016-26
|
http://www.sej.org/print/publications/watchdog-tipsheet/chemical-safety-right-know-no-not-exactly
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396872.10/warc/CC-MAIN-20160624154956-00099-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.956103 | 748 | 2.71875 | 3 |
Sea level rise
From Greenlivingpedia, a wiki on green living, building and energy
There is a correlation between C02 levels in the atmosphere and sea level rises. The world sea level has risen approximately 20cm since 1900. CO2 levels in the atmosphere equate historically to a higher sea level than we have in 2008. There is a time lag effect due to the time taken for glaciers and ice shelves to melt.
Temperature and sea level changes
So far we have looked at the astonishing melting of the ice in the Arctic, at what the IPCC did or didn’t do about sea level rise and at Hansen’s recent thinking on the matter. Now I’d like to give a few snapshots of what the real world implications would be.
The story of temperature and sea level change is encapsulated in that really neat little image at the top of the post which I got from Climate Code Red (February 2008). They got it via Rahmstorf from Archer, 2006.
We can argue about the extremities. The last glacial maximum may have been 5 or 6C colder than now. Hansen puts an ice-free world at 5c warmer. It might turn out to be 6C if, perish the thought, Armageddon comes to be. But anyone can see there’s a problem. When 10-12C gives you close to 200 metres of sea level change each degree means a lot.
A further insight comes from an Emeritus Professor called William Ruddiman. His thesis is that humans have been altering the climate for the last 8000 years through land clearing and methane-producing rice growing. Hansen reckons that the effect he describes is real, but somewhat less than Ruddiman thinks. Yet it’s a fascinating article (pdf). For our purposes the important point is that Ruddiman finds that the threshold for a new ice age to start building is 245ppm of CO2 corresponding to a temperature about 2C less than the present.
So in that neat little graph you can’t just join up the dots of sea level in a more or less straight line. There needs to be a flat section between the temperature values of 13 and 15C. That represents the unusual stability given us as paradise on earth, or at least civilisation as we know it in the last 8000 years or so. A period when Co2 levels didn’t stray very far at all from 280ppm.
So coming out of the last ice age each degree in temperature change corresponded to about 30-40m of sea level change. Going forward we can look forward to from 12 to 18 metres for each degree of warming.
Remember the three graphs from the post about the IPCC that linked temperature, greenhouse gases and sea level, with ice sheets thrown in. (Original from NASA)
Temperature and GHGs are conjoined as it were. If one moves so does the other. When temperature moves so does sea level as a cansequence.
I can’t do tables so here’s five statements that link levels of CO2e and temperatures (referenced to pre-industrial) with sea level rise.
- 180ppm give a temperature of -5C and a sea level of -120m
- 280ppm give a temperature of 0C and a sea level of 0m
- 280-300ppm give a temperature of 1.7 to 2.7C and a sea level of 4-6m
- 380 (360-400)ppm give a temperature of 2.7 to 3.7C and a sea level of 15 to 35m
- 425 (350-500)ppm give a temperature of 5.7C and a sea level of 75m
The last three rely on the paleoclimate record going back increasingly into the past, so the uncertainty grows with each one. The last one, for example comes from Hansen. It wasn’t long ago that he was saying 500ppm plus or minus 150 for an ice-free world. Either way the lower bound is 350ppm and to be avoided if possible.
The sea levels would take time, but are implied in the nominated levels of CO2.
The implications of sea level rise are very serious.
In Climate Code Red (February 2008) the authors point out that long before Greenland or West Antarctica disintegrate, with 1-2m sea level rise the results would be catastrophic. The authors quote Stern (November 2006):
- “currently, more than 200 million people live in coastal floodplains around the world, with two million square kilometres of land and one trillion dollars worth of assets less than one metre elevation above current sea level.”
In Climate Code Red they suggest that you can use a sea-rise level overlay such as http://flood.firetree.net/ with Google Earth to see where the water goes.
Many major cities are low lying and are very much in the front line of sea level change.
Some of these assets include American naval installations and indeed major centres. On cities Climate Code Red points out (assuming 20% loss of Greenland - I make that 1.4 metres):
Many of the world’s major cities (22 of the top 50) are at risk of flooding from coastal surges, including Tokyo, Shanghai, Hong Kong, Mumbai, Kolkata, Karachi, Buenos Aires, St Petersburg, New York, Miami and London. In almost every case, the city relies on costly flood defences for protection. Even if protected, these cities would lie below sea level with a residual risk of flooding like New Orleans today.
- The 2006 Conference of the International Association of Hydrogeologists heard that rising sea levels will also lead to the inundation by salt water of the aquifers used by cities such as Shanghai, Manila, Jakarta, Bangkok, Kolkata, Mumbai, Karachi, Lagos, Buenos Aires and Lima. “The water supplies of dozens of major cities around the world are at risk from a previously ignored aspect of global warming. Within the next few decades rising sea levels will pollute underground water reserves with salt…
CO2 levels in the atmosphere are now 387ppm
World C02 levels are now at a record high of 387 parts per million (ppm), up almost 40% since the industrial revolution and the highest for at least the last 650,000 years. This could translate to eventual sea level rises in the range of 15 to 35m, which would be catastrophic. So we need to reduce C02 emissions now.
The present-day global temperature is already seeing significant global ice melt - which together with thermal expansion is driving sea level rise. If present-day or higher global temperatures persist there does not appear to be any plausible reason why the present ice melt will pause, diminish or stop. Instead the ice melt will continue at rates that are commensurate with prevailing temperatures on the significant ice masses and ice sheet dynamics until the ice is gone.
A pragmatic view suggests that unless GHG concentrations fall to the point where temperatures reduce to pre-industrial levels (at which ice sheets were comparatively stable) then it appears inevitable that the ice melt will continue until most if not all surface ice is melted. Thus - even if temperatures only remain at present-day levels (i.e. if the current warming 'in the pipeline' represented by the present levels of GHGs is not realised) - there will be an unstoppable progression of melt until sea levels eventually stablise at between 70 metres to 80 metres above present day levels.
As several commentators have noted the dynamics of ice sheet disintegration are not well understood, and so the time frame for the full range of sea level rise is uncertain, but with "business as usual" the eventual outcome appears to be both inevitable and unavoidable.
Sea level rise by country
- About 2.6 percent of the world’s population — about 177 million people — live in areas that will be vulnerable to chronic flooding within the next 100 years. At minimum, even with extremely rigorous cuts to global emissions and with oceans much less sensitive to climate change than expected, 1.9 percent of the population of coastal countries would be affected. At worst, the figure would be 3.1 percent.
- The Netherlands would be the most exposed, with more than 40 percent of its country at risk, but it also has the world’s most advanced levee system, which means in practice its risk is much lower.
- Flood-exposure estimates, including those shown above, may still understate the risks. Using more detailed elevation data for the United States than is available globally, for instance, the group found that estimated flood exposure was probably much too conservative. Applied globally, that means more than 500 million people could be living in places that are at risk of regular flooding in the next century.
- More than a quarter of Vietnam’s residents live in areas likely to be subject to regular floods by the end of the century.
- Four percent of China’s residents — 50 million people — live in the same kind of areas.
- Across the globe, about one person in 40 lives in a place likely to be exposed to such flooding by the end of the century
- Globally, eight of the 10 large countries most at risk are in Asia.
Article source
- Author: Brian
- Link: Sea level rise: some real world implications, Larvatus Prodeo
See also
External links
- Wikipedia:Current sea level rise
- Flooding Risk From Climate Change, Country by Country, New York Times
- ↑ World CO2 levels at record high, scientists warn, May 12, 2008
- ↑ Flooding Risk From Climate Change, Country by Country, NYTimes.com
|
<urn:uuid:b25cea0e-7dc2-4213-9dcd-5eff32d7d56c>
|
CC-MAIN-2016-26
|
http://greenlivingpedia.org/Sea_level_rise
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402479.21/warc/CC-MAIN-20160624155002-00143-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.930755 | 2,001 | 3.140625 | 3 |
One type of bomb is this air to surface missile.
- The definition of a bomb is something that has the potential to explode.
An example of a bomb is a stick of dynamite with a timer set to ignite it.
- Bomb means to attack or destroy with explosives.
An example of bomb is the Japanese attack on Pearl Harbor in 1941.
- Bomb means to fail.
An example of bomb is for a stand up comedian to fail on stage and getting booed off stage.
- a container filled with an explosive, incendiary, or other chemical for dropping or hurling, or for detonating by a timing mechanism
- bombshell (sense )
- a small container with compressed gas in it: an aerosol bomb
- a heavily shielded apparatus with radioactive material in it, used in radiotherapy: a cobalt bomb
- ⌂ Informal a complete failure: said esp. of a theatrical performance
- Slang, Sports
- a long forward pass in football
- a long three-pointer in basketball
- a long home run in baseball
- Geol. a mass of lava, usually globular, ejected from a volcano by explosion
Origin of bombFrench bombe ; from Italian bomba; probably ; from Classical Latin bombus, a buzzing ; from Classical Greek bombos, deep and hollow sound: origin, originally echoic
- atomic bomb
- any nuclear weapon
- nuclear weapons collectively
Origin of bombéFrench ; from bombe, bomb (because of the shape)
- a. An explosive weapon detonated by impact, proximity to an object, a timing mechanism, or other means.b. An atomic or nuclear bomb. Used with the.
- Any of various weapons detonated to release destructive material, such as smoke or gas.
- Football A long forward pass.
- a. A container capable of withstanding high internal pressure.b. A vessel for storing compressed gas.c. A portable, manually operated container that ejects a spray, foam, or gas under pressure.
- Slang A dismal failure; a fiasco.
- Slang An old car.
- Slang One that is excellent or superior. Used with the.
- Chiefly British Slang a. A large amount of money.b. A great success.
verbbombed, bomb·ing, bombs
- To drop a bomb or bombs.
- Slang To fail miserably: The play bombed.
- Slang To paint a graffito.
Origin of bombFrench bombe, from Italian bomba, probably from Latin bombus, a booming sound, from Greek bombos, of imitative origin.
- An explosive device used or intended as a weapon.
- (slang) A failure; an unpopular commercial product.
- (US, Australia, informal) A car in poor condition.
- (UK, slang) A large amount of money, a fortune.
- make a bomb, cost a bomb
- (chiefly UK, slang) A success; the bomb.
- Our fabulous new crumpets have been selling like a bomb.
- (chiefly UK, slang) A very attractive woman; a bombshell.
- (often in combination) An action or statement that causes a strong reaction.
- It was an ordinary speech, until the president dropped a bomb: he would be retiring for medical reasons.
- Normally very controlled, he dropped the F-bomb and cursed the paparazzi.
- (dated) The atomic bomb.
- During the Cold War, everyone worried about the bomb sometimes.
- (American football, slang) A long forward pass.
- (chemistry) A heavy-walled container designed to permit chemical reactions under high pressure.
- (informal) A jump into water in a squatting position, with the arms wrapped around the legs, for maximum splashing.
- The diametrical slang meanings are somewhat distinguishable by the article. For “a success”, the phrase is generally the bomb. Otherwise bomb can mean “a failure”.
(third-person singular simple present bombs, present participle bombing, simple past and past participle bombed)
- (intransitive) To attack using one or more bombs; to bombard.
- (intransitive, slang) To fail dismally.
- (informal) To jump into water in a squatting position, with the arms wrapped around the legs.
- (slang) To cover an area in many graffiti tags.
- (informal, Australia) to add an excessive amount of chlorine to a pool when it has not been maintained properly.
(comparative more bomb, superlative most bomb)
|
<urn:uuid:80e95203-e21f-409d-9ae5-47915c8f5ae4>
|
CC-MAIN-2016-26
|
http://www.yourdictionary.com/bomb
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395992.75/warc/CC-MAIN-20160624154955-00135-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.847147 | 988 | 3.046875 | 3 |
The effect a trapeze artist has on an audience is an example of astonish.
Origin of astonishaltered ; from Middle English astonien ; from Old French estoner ; from Vulgar Latin an unverified form extonare (for Classical Latin attonare) ; from ex-, intensive + tonare, to thunder
transitive verbas·ton·ished, as·ton·ish·ing, as·ton·ish·es
Origin of astonishAlteration of Middle English astonen, from Old French estoner, from Vulgar Latin *extonare : Latin ex-, ex- + Latin tonare, to thunder; see (s)ten&schwa;- in Indo-European roots.
(third-person singular simple present astonishes, present participle astonishing, simple past and past participle astonished)
From an alteration (due to words ending in -ish: abolish, banish, cherish, establish, furnish, etc.) of earlier astony, astone, aston, astun (“to astonish, confound, stun”), from Middle English astonien, astunien, astonen, astunen, astounen (“to astound, stun, astonish”), from Old English *āstunian, from ā- (perfective prefix) + stunian (“to make a loud sound, crash, resound, roar, bang, dash, impinge, knock, confound, astonish, stupefy”), from Proto-Germanic *stunōną (“to sound, crash, bang, groan”), from Proto-Indo-European *(s)ten-, *(s)ton- (“to thunder, roar, groan”), equivalent to a- + stun. Compare German erstaunen (“to astonish, amaze”). Influenced by Old French estoner, estuner, estonner (“to stun”), either from an assumed Latin *extonare, or from Old Frankish *stunen (“to stun”), related to Middle High German stunen (“to knock, strike, stun”) and thus also to the Old English word above.
|
<urn:uuid:14adf23f-65c9-49fa-a224-d8b7af1022e6>
|
CC-MAIN-2016-26
|
http://www.yourdictionary.com/astonish
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396949.33/warc/CC-MAIN-20160624154956-00098-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.756361 | 481 | 2.65625 | 3 |
This course provides NRCS employees with the basics of interpersonal skills. It helps participants to discover information about themselves and how that information affects their ability to meet and deal with people around them, and identifies ways to improve effectiveness of their interpersonal skills. Course topics include behavioral styles, value systems, effective listening, conflict management, constructive feedback, valuing diversity, time management and stress management. The training is accomplished with extensive use of self-assessment instruments, instructional videos, case studies, role plays, group discussions and personal action plans.
Upon completion of this training, participants will be able to
discuss the importance of effective interpersonal skills
identify his/her own work behavioral style and select effective strategies for interacting with different styles
identify his/her own style in regard to various interpersonal skills, explain or demonstrate ways to interact with individuals with different styles, and ways to improve these skills
demonstrate effective listening skills, and how to give and receive constructive feedback
list the dimensions of diversity, and identify strategies that will contribute to the valuing of diversity in the workplace
|
<urn:uuid:1a82d536-ea83-4e68-bb87-ce78e5f74d1d>
|
CC-MAIN-2016-26
|
http://www.nrcs.usda.gov/wps/portal/nrcs/detail/national/nedc/training/catalog/?cid=nrcs143_024189
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396959.83/warc/CC-MAIN-20160624154956-00125-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.883564 | 217 | 2.90625 | 3 |
1448, Sir Alexander Montgomery, Sir
Robert Cunninghams' brother-in-law, was
made Bailie of Cunninghame, a title that
belonged to Sir Robert Cunningham. This
event sparked the bloody
Montgomery/Cunningham feud that lasted
until the 1660s.
1458, Sir Alexander Cunningham was
rewarded for his support of King James II
(Stuart) against the Clan Douglas. He was
granted the Barony of Kilmaurs, along
with the lands of Kilmarnock, Hilton,
Finlaystone and Glencairn.
1488, Sir Alexander Cunningham is made
1st Earl of Glencairn by royal charter,
and receives Drummond and Duchray in
Lennox for helping defeat the rebels at
Blackness (the rebels being an army of
King James III son James fighting to
overthrow his father).
June 1488, Sir Alexander Cunningham
and King James III were killed at the
Battle of Sauchieburn. The victorious son
became King James IV of Scotland.
Later in 1488, King James IV revoked
all titles given by his father over the
past few years. Sir Alexander
Cunningham's son and heir, Robert
Cunningham, lost his title of 2nd Earl of
Glencairn. He did retain the earlier
title of 2nd Lord Kilmaurs.
Also in 1488, the Montgomerys' burned
the Cunninghams' Kerelaw Castle.
1499, Cuthbert Cunningham, 3rd Lord
Kilmaurs, lead the Clan in an attack on
Montgomerys' at Irvine.
1528, William Cunningham, 4th Earl of
Glencairn, lead an attack on the
Montgomerys' and burned their Eglinton
Castle at Irvine in Ayrshire.
The fifth Earl of Glencairn, a
Protestant reformer, fought against Mary
Queen of Scots forces. He was one of the
commanders at the Battle of Carbery Hill
where she surrendered in 1567. Glencairn
is said to have ordered the destruction
of the Chapel Royal at
1586, the Cunningham-Montgomery feud
erupts after Hugh Montgomery, 4th Earl of
Eglinton, is murdered by Cunninghams'.
James Cunningham, 7th Earl of Glencairn
and 7th Lord Kilmaurs is head of the clan
at that time.
1661, William Cunningham, 9th Earl of
Glencairn, is made Lord High Chancellor
of Scotland for life. His marriage to
Margaret Montgomery, daughter of
Alexander, 6th Earl of Eglinton, ended
the Cunningham-Montgomery feud.
The Cunningham’s were among the
Scottish involved in the Plantation of
Ulster. Sir James Cunningham, who was
married to a daughter of the Earl of
Glencairn, was granted five thousand
acres in County Donegal. The name is now
among the seventy-five most common names
The 9th Earl of Glencairn raised an
army in Scotland to fight for Charles II
in his bid to gain his father’s
throne. Somehow he managed to avoid
execution by Cromwell after the uprising
1699, Sir John Cunningham of
Caprington, a distinguished lawyer, was
created a Baronet of Nova Scotia by
Other prominent Cunningham’s
were Alexander Cunningham, an
eighteenth-century historical writer, who
was British envoy to Venice from 1715 to
Charles Cunningham was famous for his
historical paintings, some of which still
hang in the Hermitage Palace in St
Petersburg and Berlin.
Alan Cunningham, poet and writer, whom
many believe was only eclipsed by Robert
Burns, was born at Blackwood in
Dumfriesshire in 1784. His work was
supported by Sir Walter Scott who, on
Cunningham’s death in 1828,
provided for his two sons.
Caprington Castle was remodelled in
the 1780s, and again in the 1830s. The
castle still remains in the Cunningham
family to this day.
The ruin of Kerlaw Castle has been
preserved as a tourist attraction.
The Cunninghams' were known for their
local fueds with other Ayrshire Clans
such as the Montgomerys'.
The Cunninghams' were connected to
other Ayrshire Clans through marriage
such as the Cambells' and Hamiltons'.
|
<urn:uuid:2736cacd-7d47-4953-9aef-85c4b21fa47a>
|
CC-MAIN-2016-26
|
http://www.ayrshirescotland.com/clans/cunningham.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396872.10/warc/CC-MAIN-20160624154956-00116-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.943298 | 983 | 3.078125 | 3 |
Investigators at the University of Alabama at Birmingham (UAB) have unlocked another piece of the puzzle surrounding idiopathic pulmonary fibrosis, an often fatal lung disease with no cure and no effective treatments. In findings published March 1, 2013, in the Journal of Clinical Investigation, the research team has discovered a new pathway that contributes to fibrosis, or scarring in the lungs. More importantly, they may have also found a potential treatment to block that pathway.
The key is something the researchers call mechanosensitive signaling of myofibroblasts. Myofibroblasts are cells responsible for wound healing in the body. In healthy tissues, myofibroblasts assist with wound repair then die in a pre-programmed process known as apoptosis. Fibrosis involving the lungs or other organs occurs when myofibroblasts fail to undergo apoptosis, resulting in a persistent repair process.
Idiopathic pulmonary fibrosis, or IPF, occurs when lingering myofibroblasts secrete too much collagen in the air-sacs of the lungs, leading to scarring and stiffening of the surrounding matrix tissue. The researchers report that a protein called Rho kinase, known as ROCK, may contribute to the failure of myofibroblasts to undergo apoptosis. ROCK activates a mechanical signaling pathway causing the myofibroblasts to respond to mechanical cues. This promotes the survival of myofibroblasts and leads to more scar tissue formation, creating a vicious cycle of non-resolving repair.
“Fibrosis begets more fibrosis in a sort of feed-forward mechanism,” said Victor Thannickal, M.D., director of the Division of Pulmonary, Allergy and Critical Care Medicine and senior author of the study. “The ROCK pathway ultimately helps to keep the myofibroblasts alive and evade apoptosis.”
|Myofibroblasts are cells responsible for wound healing in the body. In healthy tissues, myofibroblasts assist with wound repair then die in a pre-programmed process known as apoptosis. Fibrosis involving the lungs or other organs occurs when myofibroblasts fail to undergo apoptosis, resulting in a persistent repair process.|
Previous studies have shown that cells have the ability to detect and respond to mechanical cues and changes in the stiffness of their immediate surroundings. A cell in contact with a soft matrix will respond differently than a cell in contact with a hard or stiff matrix.
“We can think of ROCK as a sort of enabler for myofibroblasts, sustaining them beyond normal timeframes and promoting mechanosensitive signaling,” said Yong Zhou, Ph.D., assistant professor in the Division of Pulmonary, Allergy and Critical Care Medicine and first author of the study. “The good news is this may also provide targets to interfere with the ROCK pathway and provide a viable therapy.”
One such possible therapy is a stroke drug called fasudil, which is a ROCK inhibitor. In animal models and in human IPF tissue studied in cell culture, fasudil blocked ROCK activation and promoted normal apoptosis of myofibroblasts.
In healthy cells, ROCK is believed to be responsible for smooth muscle function and controlling blood pressure. Blocking it systemically with fasudil may have some side effects, mostly a risk of a decrease in blood pressure. Zhou says this potential risk could be averted through the development of therapeutics to deliver the drug locally to the lung, perhaps inhaled.
“As this research continues and we learn more about the ROCK signaling pathway, we would anticipate the development of other ROCK inhibitors that might provide much the same mechanism of activity with less potential side effects,” said Zhou.
Thannickal says this approach may have utility in other diseases or conditions in which apoptosis of myofibroblasts is disrupted.
“Dysfunctional apoptosis is implicated in a number of diseases, such as cancer, autoimmune diseases and inflammatory and fibrotic diseases,” he said. “This discovery of the ROCK pathway and its specific role in mechanosensitive signaling and controlling apoptosis opens up intriguing new avenues for research.”
UAB is a leader in research and treatment for idiopathic pulmonary fibrosis. A member of the federally funded IPF Clinical Research Network, UAB is actively engaged in finding therapies for this condition that has no FDA-approved treatments.
In the United States, IPF is estimated to affect between 132,000 and 200,000 people, with approximately 50,000 new cases diagnosed each year. As many as 40,000 Americans die from IFP each year, with survival rates ranging from 2.5 to 3.5 years following diagnosis.
The study was funded by a grant from the National Heart, Lung and Blood Institute, one of the National Institutes of Health.
|
<urn:uuid:a1c6a981-0e92-46dc-bd13-1b3efb880cca>
|
CC-MAIN-2016-26
|
http://www.uab.edu/news/innovation/item/3282-uab-researchers-discover-possible-treatment-for-incurable-lung-disease
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397696.49/warc/CC-MAIN-20160624154957-00098-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.944471 | 1,026 | 2.921875 | 3 |
view a plan
Teams answer archery questions by hitting T/F targets in this cleverly appropriate quiz game idea
P.E. & Health
Title – Fun with Archery
By – Krista Gillette
Primary Subject – Physical Education
Grade Level – Grades 11-12
- Attend classes on the archery shot (previously learned the body stance, nock, draw, anchor, aim, release, and follow through)
- Also students should have been taught the history, equipment, safety, scoring, and mechanics of the shot.
- 4 targets – 2 that say TRUE on the front, 2 that say FALSE
- 2 Bows
- 12 Arrows-6 per station
- 2 Armguards
- Index cards with true and false questions on one side (related to cognitive domain)
- Blue and Green cards (10 each)
- Whiteboard/Poster board and Marker
- Quiz (evaluation)
There are 2 stations set up with a true target, a false target, a bow, 6 arrows, and an armguard. Students start about 20-25 feet away.
There is an area away from these stations that have aprox. 30 index cards laying face down. The students are split into two groups by the blue and green cards. On one side of the index card area is the blue team, on the other is the green team. Each team comes up with a team name.
On the whistle, the first person from each team will run to the cards, pick one, run back and read it out loud to their team. The team has to decide if it is true or false. The person that picked the card then runs to the stations and prepares to shoot. The station is placed away from everyone else. They shoot until they hit the correct target or they use all their arrows. Then they place their bow down and wait till the teacher tells them to retrieve their arrows. The students then comes and stands in front of the class and reads their card to the whole class and gives the answer they chose.
If the answer is correct and they hit the correct target they earn 5 points. If the answer is correct but they did not hit the correct target they earn 2 points. If they hit the correct target first, they receive 1 extra point. Then the next person on the team will do the same on the whistle. The teacher will keep tally on the whiteboard.
* If there are a lot of students make more teams and stations, so that everyone gets many chances to shoot.
E-Mail Krista Gillette !
|
<urn:uuid:792cc89a-eefb-441d-8d70-a518546a21cf>
|
CC-MAIN-2016-26
|
http://lessonplanspage.com/pefunwitharcherytfquizgameideahs1112-htm/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396027.60/warc/CC-MAIN-20160624154956-00113-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.940042 | 532 | 3.296875 | 3 |
By De Vante Cooley
Libraries are relevant to students because they provide resources that students otherwise could not access, offer quiet study areas and can provide a variety of accurate information from sources other than questionable online sources.
Students without personal computers or printers rely heavily on the library when they need information because more information is distributed virtually. Therefore, libraries are very relevant, especially in this age of technology.
The library is a great place for quiet study time without noise or distraction. If students have roommates or friends who are noisy and rambunctious, the library provides a quiet study atmosphere to complete their work.
The Internet provides access to a variety of information, but cannot replace some printed media.
Since it is so easy to post inaccurate information on the Internet, print resources are usually more reliable.
The library provides a variety of printed and reliable media sources instead of potentially inaccurate material.
Students still rely heavily upon libraries; therefore, libraries should not be considered irrelevant because of advances in technology or cultural changes.
By Misha Umer
Asst. entertainment editor
Libraries are no longer as relevant to students because modern students are used to instant gratification, there are other alternatives to the library, and libraries do not always have a complete set of resources.
Libraries are inconvenient because they do not offer information immediately. A student has to go through a process to obtain a library card and then struggle to find a book that might not even contain the right information. Alternatively, the Internet offers thousands of results in less than a second.
Today, students have other resources in addition to libraries. In the past, libraries were the only way to get information, but now other options exist to provide a wider array of resources. With more choices available, students are less prone to visit the library.
Most libraries lack funds to provide a complete set of resources. Students cannot go to any library and expect to find all information. A scavenger hunt from library to library for relevant material makes libraries a hassle for students.
Students of today find libraries irrelevant because they are used to getting fast results, there are other data sources and libraries do not always have complete information.
|
<urn:uuid:cf42e485-340c-45ca-8b93-6492df5440ed>
|
CC-MAIN-2016-26
|
http://hbucollegian.com/?p=10633
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395621.98/warc/CC-MAIN-20160624154955-00039-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.928705 | 440 | 3.046875 | 3 |
High blood pressure is called the "silent killer" because it often does not have any signs or symptoms. According to the Centers for Disease Control and Prevention, 1 in 3 adults is living with this "silent killer".
What is high blood pressure?
Blood pressure is the force of the blood pushing against the walls of the arteries. High blood pressure, or hypertension, is anything higher than 140/90mmHg (normal blood pressure is 120/80mmHg). When high blood pressure is not treated, it can lead to other problems like heart attack, stroke, and kidney failure.
What can I do during a
disaster to protect my
It is important to take your medication at the same time each day. This might be hard to do in an emergency, so you should plan ahead.
How can a disaster affect my
health if I have high blood
You might have to evacuate or shelterin- place during an emergency. If you are not prepared, you may run out of medicine. If you stop taking your medicine, you can get headaches, an increase in blood pressure, stroke, heart attack, heart failure, or kidney failure.
- The goal of treatment is to reduce blood pressure so you have a lower risk of problems.
- Make an emergency kit and emergency plan.
- Include at least a 3-day supply of your medication in your emergency kit.
- Carry a list of medications. Include the medicine name, dose and how often you take it.
- If you have a blood pressure monitor and cuff, include it in your kit to check your blood pressure daily.
- Do you have a special medical need?
- Are you under the care of a doctor for any reason?
- You should have a Health Information Card to carry in an emergency.
- Any special needs
- Any special supplies
- Important health information
- Emergency contact information
Keep the Health Information Card in your wallet or pocket. If you don’t speak English well, ask your doctor or nurse to help you fill out the Health Information card.
Spring is a great time to exercise and let your children and pets play outside. Help your kids stay healthy and safe during these months.
- Always wear a helmet when you ride your bicycle to prevent head injury.
- Do not play with dogs you do not know (they can bite!).
- Tell someone right away if you are bitten by a dog.
- CALL the Health Department at (215) 685-6748 if you or someone else has been bitten by a dog or other animal. They can tell you what you should do.
Learn how to dispose of unused medications safely.
|
<urn:uuid:5f238caa-2a45-4e89-a356-c5d64b3aafd9>
|
CC-MAIN-2016-26
|
http://www.phila.gov/health/diseasecontrol/hbSpring2013.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395039.24/warc/CC-MAIN-20160624154955-00102-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.92708 | 550 | 3.65625 | 4 |
Watch for Diseases
Be on the watch for spotted leaves; whitish powder forming on foliage, stems, and buds; or triangular tan lesions on leaves. When possible, pick off individual leaves, but don't let them drop to the ground. Instead, put them in a paper bag and destroy them so diseases won't spread to other areas in your garden. Avoid working in the garden just after a rain, so you don't inadvertently spread disease.
Fertilize Lawns Carefully
If it's been over five weeks, fertilize the lawn with a slow-release lawn fertilizer that contains iron and sulfur. This will help the lawn turn from its pale yellow to green and help sparse lawns to thicken up. As lawn grasses thicken, this dense growth will crowd out the invasion of weeds. Avoid the use of weed and feed products that contain dicamba near and around the root zone of trees and shrubs.
Control Asparagus Beetles
Be on the lookout for asparagus beetles early in the morning. These reddish and black beetles can be found on the fern-like growth of asparagus plants. As they feed on the stems and foliage, the plant will grow distorted and become weakened. Reduced growth will deplete the plants of their strength and reduce production next season. Control the beetles by squishing them with your fingers or dropping them in a bucket of soapy water.
Use caution when pruning back your rhododendrons. Use sharp pruning shears and cut off the spent blossoms without cutting through the new growth that can be seen pushing its way into the faded flower. Lightly cultivate the soil around the bushes, and lightly fertilize with a slow-release, granular fertilizer (10-10-10). Lightly scratch the fertilizer granules into the soil and water in thoroughly.
Reduce Tomato Diseases
Prevent the invasion of potato psyllids that have migrated into the Rocky Mountain region. These tiny pests attack potatoes, tomatoes, and peppers. The tiny nymphs gather on the undersides of the leaves, and if not controlled, psyllids can severely damage the plants and reduce production. One of the safest controls is sulfur dust applied to the undersides of the foliage and along the stems.
|
<urn:uuid:cb9d798f-67fa-425a-b141-bbb66b26f218>
|
CC-MAIN-2016-26
|
http://garden.org/regional/report/arch/reminders/1483
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783394605.61/warc/CC-MAIN-20160624154954-00085-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.939108 | 465 | 3.234375 | 3 |
All we can do is get ready
Published: Monday, February 22, 2010 at 10:02 a.m.
Last Modified: Monday, February 22, 2010 at 10:02 a.m.
One of the latest debates among environmentalists and weather experts is whether global warming will cause stronger hurricanes and whether those stronger storms have begun.
If the experts are right, the Earth could see fewer hurricanes over the next several decades, but the hurricanes that do form would be slightly stronger.
Overall, that could mean fewer weak hurricanes and more stronger ones, some say.
The average wind speeds of hurricanes is predicted to increase 2 to 11 percent. While that might not sound like a giant change, the effects could be devastating. One meteorology professor said an 11 percent rise in wind speeds would cause 60 percent more material damage.
That is a troubling thought, but it should not substantially change what people in this region do to prepare for storms.
Each year, coastal residents nervously await word of hurricanes forming in the Atlantic Ocean and watch as their paths are predicted, paying particular attention to whether they might come this way.
And each year, those same residents let out a collective sigh of relief when hurricane season ends and we get a brief respite.
But what concerns any resident or region is the potential for one of those storms to land here, bringing with it the wind and water everyone fears.
Too often, the storms have had tremendously devastating impacts here, a reality everyone recognizes.
We also recognize, however, that the damage is not inflicted by the average wind speed of a year’s storms or a decade’s storms, but just by those storms that hit here.
In other words, we don’t deal with the annual averages, we deal with each storm on its own. No matter how many there are and what their average strength, one hurricane can be utterly devastating to our region.
So we have long recommended that people prepare for the eventual possibility of a hurricane regardless of how many the forecasters say could form this year. Instead, we have to realize that we live in a place that is prone to serious storms and the destruction they bring with them.
We have to live with the knowledge that one could come this year. But our best defense is to prepare now. It is a lesson we have painfully learned many times over: Get ready just in case.
We hope, of course, that the scientists are proven wrong, that hurricanes become less destructive and less common over time. But we cannot afford to bank on that possibility. And neither can you.
Editorials represent the opinions of the newspaper, not of any individual.
Reader comments posted to this article may be published in our print edition. All rights reserved. This copyrighted material may not be re-published without permission. Links are encouraged.
|
<urn:uuid:845c5223-0e69-4b5f-b024-5f4bfb60af5f>
|
CC-MAIN-2016-26
|
http://www.dailycomet.com/article/20100222/OPINION/100229918/0/living03
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399385.17/warc/CC-MAIN-20160624154959-00067-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.958592 | 578 | 2.703125 | 3 |
Are you seeing big, plump bees hovering around your South Jersey home?
Image courtesy of Jim Baker, North Carolina State University, Bugwood.org
Carpenter Bees are large bees. They have a full, rounded, shiny black bottom, black shiny head, and a yellow, fuzzy back with a black dot in the center.
Male Carpenter Bees have no sting so they are harmless to humans. Female Carpenter Bees have a potent sting, but use them very rarely.
Bumble Bees are even larger than Carpenter Bees.
They have a full, rounded, fuzzy yellow bottom, a shiny black back with yellow near the head.
Bumble Bees can sting and will defend their nests very aggressively. They have been known to chase nest invaders long distances and have the ability to sting more than once.
Carpenter Bees like to attack wooden window sills, siding, eaves, railings, outdoor furniture and fences.
A round hole in wood with a pile of sawdust underneath is a clear sign of Carpenter Bees at work.
Image Courtesy of Lamar Merck, University of Georgia, Bugwood.org.
Dew stains on the soffits and fascia board of a home are another clear sign of Carpenter Bees at work near the gutters and fascia boards.
If a homeowner does not take care of the problem with the help of a Pest Control Professional, the Queen Carpenter Bee tunnels through the wood to lay her eggs in chambers.
This is an example of the kind of damage a Carpenter Bee can do very quickly inside the wood.
Image Courtesy of USDA Forest Service Archive, USDA Forest Service, Bugwood.org.
Left un-checked - a secondary problem will occur as birds (especially woodpeckers) peck at the wood to get to the larvae for dinner!
Call AB-Con today and have your Bee problem solved correctly from the start!
Serving South Jersey for over 40 years
Camden County, Burlington County and Gloucester County
South Jersey Cities Served: Atco, Audobon, Audobon Park, Barrington, Bellmawr, Berlin, Beverly, Blackwood, Brooklawn, Browns Mills, Burlington, Burlington City, Camden, Cherry Hill, Clayton, Clementon, Cinnaminson, Collingswood, Columbus, Delanco, Delran, Deptford, Edgewater Park, Eastampton, Evesham, Florence, Franklinville, Gibbsboro, Glassboro, Glendora, Gloucester City, Gloucester Township, Haddonfield, Haddon Heights, Haddon Township, Hainesport, Hammonton, Hi Nella, Laurel Springs, Lawnside, Lindenwold,Lumberton, Magnolia, Mansfield, Mantua, Maple Shade, Marlton, Medford, Medford Lakes, Merchantville, Moorestown, Mt. Ephraim, Mt. Holly, Mt. Laurel, Mt. Royal, Mullica Hill, Oaklyn, Palmyra, Paulsboro, Pemberton, Pennsauken, Pine Hill, Pitman, Riverside, Riverton, Roebling, Runnemede, Sewell, Sicklerville, Somerdale, Southampton, Springfield, Stratford, Swedesboro, Tavistock, Thorofare, Trenton, Turnersville, Vincentown, Voorhees, Washington Township, Waterford Works, Wenonah, Westampton, West Berlin, West Deptford, Westville, Williamstown, Willingboro, Winslow, Woodlynne, Woodbury, Woodbury Heights, Wrightstown
|
<urn:uuid:705a1c7f-001d-4754-8692-71f8292bab66>
|
CC-MAIN-2016-26
|
http://www.abcon1.com/blog/144-carpenter-bees-or-bumble-bees.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783404826.94/warc/CC-MAIN-20160624155004-00194-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.86364 | 741 | 2.765625 | 3 |
1 Billion Pixel MicroscopeKyle Maxey
posted on July 31, 2013 |
| 5047 views
Engineers at Caltech have hacked an inexpensive microscope, turning it into a billion-pixel imager that makes even the best standard microscopes pale in comparison.
One of the most fundamental truths in microscopy is that you can have either high resolution images of a small area or low resolution views of wide fields, but you can’t have both. Well, Changhuei Yang and his team at Caltech have reversed that truth with their new microscope hack.
To re-engineer their microscope, the Caltech team leveraged a concept known as Fourier ptychographic microscopy, computationally correcting the low-resolution imagery. By adding a series of LEDs, the microscope could variably illuminate a larger field, leaving the Caltech engineers with the ability to piece together a 20X resolution image from a 2X lens.
In the most recent issue of Nature Photonics, Yang describes the significance of his team’s breakthrough. "What this project has developed is a means of taking low-resolution images and managing to tease out both the intensity and the phase of the light field of the target sample. Using that information, you can actually correct for optical aberration issues that otherwise confound your ability to resolve objects well."
What’s even more incredible is that Yang and his team transformed a standard microscope into a power research tool with a few LEDs and a $200. While it’s true that you have to have advanced understanding of optics and condensed matter physics to truly grasp how this project works, for most of us just the idea of having a billion-pixel imager is cool in-and-of-itself.
As soon as Yang and his team release an Instructables for their project, you can bet that I’ll be hacking the microscope at my place.
Image Courtesy of CalTech
|
<urn:uuid:3e57ffb7-cbe5-4cfc-8b8f-7028afd6f53a>
|
CC-MAIN-2016-26
|
http://www.engineering.com/DesignerEdge/DesignerEdgeArticles/ArticleID/6093/Billion-Pixel-Imager.aspx
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391519.2/warc/CC-MAIN-20160624154951-00143-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.953153 | 397 | 2.796875 | 3 |
The use of DNA evidence in the courtroom used to be one of the most contentious issues in both law and forensic science, but now it’s among the most trusted standards available. Travel records, fingerprints, and even eye-witness testimony tend to be minimized in relation to the certainty of genetic testing: if independently checked genetic analysis says you were at the crime scene, then you (or your identical twin) were at the scene. And yet, the ability to compare genetic information against known standards only helps if your criminal has their genotype in a government database; otherwise, investigators must already have a suspect to test against their evidence. Even bleeding-edge technologies for drawing genuinely novel information from DNA provide broad characteristics at best; a guess at the suspect’s ethnicity, hair colour, and perhaps a six-inch range for height.
Now, researchers in the US and Belgium have teamed up to make such estimates far, far more accurate. They hope that routine genetic analysis could be the basis for basic facial reconstruction, providing a computer-generated sketch for criminals that nobody (living) ever actually saw. Their results are, as you can see below, startlingly accurate at times — but the limitations of their methodology mean that they still have a long way to go before they’re ready for the courtroom.
The basic insight at use in this research is that genetic analysis doesn’t have to progress in a purely mechanistic way. Many past attempts in forensic genetics have looked at the impact of a particular gene on the molecular level, following it through from genotype to the probability of having a physical trait. That’s fine for something simple like eye colour, but facial features are influenced by an unknown number of genes. To simplify matters, the researchers looked at more than 75 genes known to create facial abnormalities when mutated, reasoning that if less common mutations can cause improper development then more common mutations might cause normal facial variation. Their research returned 20 genes of interest to face-shape.
More than 600 volunteers of mixed ethnic backgrounds (to increase genetic diversity in the sample) had their faces scanned into high-resolution digital meshes, which were in turn analyzed for nine facial landmarks. These landmarks, like the position of the pupils, cheekbones, and tip of the nose, relate to the team’s 20 genes of interest. By doing detailed analysis of the relationship between face-shape and genotype, the researchers hope to make a database that can read an unidentified genome to make educated guesses about the location of each facial landmark. Generating a mesh that interpolates between the points (with a few other basic considerations like sex taken into account) leads to the computational mugshot.
This sort of analysis has already been in very preliminary use for some the world’s most desperate cases — crimes of a nature that ensure there will be no pushback against police methodology. The most famous case so far involved the 2004 bombings in Madrid, which saw genetic analysis correctly predict the ethnic background of the criminals. That insight provoked relatively little controversy in the context of hunting the murderers of several hundred innocent commuters — but in the general legal system, any technology that pinpoints racial history is likely to spark heated legal debate.
No matter how the technology progresses, these computational mugshots will likely always fall into the same legal category as today’s artist-drawn sketches from witness descriptions — they will be legally useless. We have good reasons for excluding artist renderings from admissibility (they tend to cause an unacceptable number of false positives) and those reasons hold true for the computational kind. Only so much information can be gleaned from “facial landmarks” and just like the human memory, genes only tell part of the story. Everything from disease to drug use to injury to tattoos to the normal ageing process can throw genetic descriptions off-target.
That’s not to say that they can’t be helpful in an investigation, in narrowing suspects and helping detectives stay on the right path, but that’s a far cry from direct admissibility as evidence. It will likely be useful more as a disconfirming technology that proves certain suspects can’t be the perpetrator, as it narrows the range of possibilities for various physical traits. Staying out of the courtroom will earn this software some leeway in the public sphere, but that will last only until the first national manhunt launched in pursuit of a computer-generated person.
|
<urn:uuid:be1903b1-5d97-4e09-97d6-b3cb0f1ebfd5>
|
CC-MAIN-2016-26
|
http://www.geek.com/science/genetic-mugshot-could-make-dna-an-eye-witness-1588720/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393442.26/warc/CC-MAIN-20160624154953-00050-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.943673 | 902 | 3.625 | 4 |
Thornton, Sir Henry(1871-1933)
A railway engineer was responsible for Canada's first coast-to-coast radio network – in fact the first such radio network in North America. The visionary was Sir Henry Thornton, second president of Canadian National Railways.
Some later broadcast empires developed from a desire to sell radios or groceries. Sir Henry was a marketing and organizational genius who wanted to sell train seats and turn the reputation of the CNR from white elephant to profitable innovator. Radio at the time was as novel and exciting as the Internet 70 years later. Sir Henry exploited that fact.
Henry Thornton was an American, born in Logansport, Indiana. He joined the Pennsylvania Railway in 1894 as an engineering draftsman, joined the Long Island Railroad seven years later as assistant to the president, and in 1914 was lured to England to become general manager of a passenger rail system, the Great Eastern Railway north-east of London.
King George V knighted him in 1919 for his work with the transportation division of the British Expeditionary Forces in France.
Sir Henry moved to Canada in 1922 after accepting the job of president of CNR. It was a new amalgam of rail companies which had been started for political reasons to provide competition against Canadian Pacific Railway. The rail companies failed, threatening economic and political harm to Canada, so the government pulled them together then went looking for someone to clean up the mess. Sir Henry accepted the job which many others were reported to have turned down.
CNR was mainly a freight carrier. Sir Henry offered passenger service and luxury hotels in competition with CP Railway. CNR Radio was a marketing idea to promote CNR and attract passengers, who could listen to the exciting new medium as they travelled in special cars – even if they had to wear heavy headsets to do so.
Radio stations were burgeoning. Much of their programming was what you'd expect from pioneers driven more by enthusiasm than money. Before Sir Henry's arrival, CNR had worked with the Canadian Marconi Company to broadcast experimentally, including to trains running between Toronto, Ottawa and Montreal. On June 1, 1923 Sir Henry established a radio department and began planning a network to carry co-ordinated, quality programming and CNR's promotional message to Canadians and to CNR's passengers, using the circuits built for its telegraph service.
In 1924, CNR Radio broadcast the first network hockey game to be carried on the network. In 1925 it made the first broadcast from a moving train and then the first Canadian radio broadcast to the United Kingdom. Two years later CNR provided the first nation-wide broadcast to celebrate the 60th anniversary of Canadian confederation. CNR demonstrated that radio was a powerful and effective medium that, like the railways, could help pull Canada together.
The CNR network consisted of three CNR stations combined with time leased from private stations. CNR provided the private stations with leasing revenue and quality programming. Sir Henry's employees loved him, the private stations were generally happy, and the promotional value was inestimable. But the success of this and other innovations, which turned CNR from a loser into a high-profile company, produced powerful enemies.
CNR was succeeding until the Depression hit in 1929 and potential profits suffered along with everything else. Then Sir Henry's enemies, especially at the CPR which he had outgunned, were able to portray him as irresponsible, extravagant and even a threat to Canada. A faction within a new government drove him out in 1932 without even a pension, in addition pressuring a bank to drop him from its board and ruining a future career opportunity. He died a ruined man, of cancer, in 1933.
A royal commission report released soon after Sir Henry's departure criticized CPR as much as CNR for aggressive expansion but failed to criticize CNR Radio, which had been so reviled by the CPR.
The CNR sold its radio network to the government and it became the forerunner to the CBC.
Written by Jerry Fairbridge - January, 2003« Previous Personality Bio | Next Personality Bio »
Skip to the Personalities whose last names start with:
« ALL A B C D E F G H I J K L M N O P Q R S T U V W X Y Z »
|
<urn:uuid:2d7ae099-afd2-4b9e-aa60-0175cd0af6ce>
|
CC-MAIN-2016-26
|
http://www.broadcasting-history.ca/personalities/personalities.php?id=35
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397865.91/warc/CC-MAIN-20160624154957-00009-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.982258 | 870 | 2.75 | 3 |
HIV/AIDS in Zimbabwe Has Reduced Life Expectancy, Not Affecting Population Growth, Study Says
August 29, 2007
HIV/AIDS has reduced the life expectancy in Zimbabwe, but the country's overall population growth remains unchanged as births continue to outpace deaths, according to a study recently published in the Proceedings of the National Academy of Sciences, Reuters reports.
According to Reuters, the purpose of the study was to test the accuracy of a 1989 World Health Organization study that estimated population growth rates in sub-Saharan Africa would become negative because of HIV/AIDS. Gregson said the 1989 estimates were inaccurate because researchers at the time did not realize that behavior contributing to the spread of the virus differed within populations and that transmission rates and other factors changed during the stages of infection. "The prevalence of HIV has been coming down in the last few years, and as more people receive treatment, we hope the death rate will also soon start to go down," Gregson said, adding that the effects of the HIV/AIDS epidemic are "substantial and still unfolding." Gregson said the new findings likely are representative of trends in other parts of Africa (Kahn, Reuters, 8/27).
This article was provided by Henry J. Kaiser Family Foundation. It is a part of the publication Kaiser Daily HIV/AIDS Report. Visit the Kaiser Family Foundation's website to find out more about their activities, publications and services.
|
<urn:uuid:11e6751d-8eb8-4369-a653-0b31bae5177f>
|
CC-MAIN-2016-26
|
http://www.thebody.com/content/art42841.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397797.77/warc/CC-MAIN-20160624154957-00038-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.962906 | 286 | 2.859375 | 3 |
- LWCF Fact Sheet
- LWCF Fact Sheet - Forest Legacy
- LWCF Fact Sheet - American History
- TPL Return on the Investment from the Land and Water Conservation Fund Full Report
- TPL Return on the Investment from the Land and Water Conservation Fund Summary
- Coalition Report
- LWCF Economic Fact Sheet
- National LWCF Poll Summary
- Letters of Support
What is the Land & Water Conservation Fund?
Created by Congress in 1965, the Land and Water Conservation Fund (LWCF) was a bipartisan commitment to safeguard natural areas, water resources and our cultural heritage, and to provide recreation opportunities to all Americans. National parks like Rocky Mountain, the Grand Canyon, and the Great Smoky Mountains, as well as national wildlife refuges, national forests, rivers and lakes, community parks, trails, and ball fields in every one of our 50 states were set aside for Americans to enjoy thanks to federal funds from the Land and Water Conservation Fund (LWCF).
It was a simple idea: use revenues from the depletion of one natural resource - offshore oil and gas - to support the conservation of another precious resource - our land and water. Every year, $900 million in royalties paid by energy companies drilling for oil and gas on the Outer Continental Shelf (OCS) are put into this fund. The money is intended to create and protect national parks, areas around rivers and lakes, national forests, and national wildlife refuges from development, and to provide matching grants for state and local parks and recreation projects.
Yet, nearly every year, Congress breaks its own promise to the American people and diverts much of this funding to uses other than conserving our most important lands and waters.
As a result, there is a substantial backlog of federal land acquisition needs estimated at more than $30 billion—including places vulnerable to development such as the Florida Everglades, Petrified Forest National Park in Arizona, Civil War battlefields in Virginia and other precious places around the country. State governments also report needing $27 billion in LWCF funds for eligible local parks and recreation projects.
From Large Landscapes to Your Local Community Park
Federal Land Protection Program
The LWCF program has permanently protected nearly five million acres of public lands including some of America’s most treasured assets such as Grand Canyon National Park, the Appalachian National Scenic Trail, the White Mountain National Forest, and Pelican Island National Wildlife Refuge, the nation’s first federal refuge.
Over the duration of the program, funding for LWCF has varied yearly, falling drastically in the last few years to total less than $100 million in 2007.
Today, the four federal land management agencies (National Park Service, U.S. Fish and Wildlife Service, U.S. Forest Service, and Bureau of Land Management) estimate the accumulated backlog of deferred federal acquisition needs to be around $30 billion. Opportunities to protect fish and wildlife habitat, provide public access for recreation, preserve our nation’s most notable historic and cultural sites, and protect scenic vistas are being lost every day to development.
State Assistance Program
The LWCF state assistance program provides matching grants to help states and local communities protect parks and recreation resources. Running the gamut from wilderness to trails and neighborhood playgrounds, LWCF funding has benefited nearly every county in America, supporting over 41,000 projects. This 50:50 matching program is the primary federal investment tool to ensure that families have easy access to parks and open space, hiking and riding trails, and neighborhood recreation facilities.
Over the life of the program, more than $3 billion in LWCF grants to states has leveraged more than $7 billion in nonfederal matching funds. But funding levels have been unpredictable and the average annual appropriation since fiscal year 1987 is a mere $40 million—despite the need for millions more.
Today, the National Park Service reports that the unmet need for outdoor recreation facilities and parkland acquisition at the state level is $27 billion. While the LWCF alone cannot address all state park needs, it is a critical federal partnership with our nation’s state and local parks and communities.
|
<urn:uuid:abe9d562-2e5d-4550-87fc-78d85b8c9d8a>
|
CC-MAIN-2016-26
|
http://www.lwcfcoalition.org/about-lwcf.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393518.22/warc/CC-MAIN-20160624154953-00158-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.923392 | 850 | 2.9375 | 3 |
Knowledge-Based Computing and Version 2.0 of the Wolfram|Alpha API
Wolfram|Alpha is making possible a whole new very interesting and very powerful kind of computing. And with the release today of version 2.0 of the Wolfram|Alpha API, it’s going to be considerably easier for a broad range of software developers to take advantage of it.
I’m happy to say that it seems as if Wolfram|Alpha is pretty useful to humans—for example through the wolframalpha.com website. But it also turns out that Wolfram|Alpha is extremely useful to programs. And in fact, even today, the number of requests coming to Wolfram|Alpha each second from programs often exceeds by some margin all the requests coming directly from humans.
The reason for this popularity is really pretty simple: Wolfram|Alpha completely changes the economics of a lot of programming. You see, these days a remarkable number of programs rely on having some kind of knowledge. And traditionally, the only way to get knowledge into a program was for the programmer to painstakingly put it there.
But with Wolfram|Alpha in the picture, it’s a different story. Because built into Wolfram|Alpha is already a huge amount of computable knowledge. And if a program is connected to Wolfram|Alpha, then it can immediately make use of all that knowledge.
Whether one’s building a website or a mobile app or desktop software or an enterprise application, the point is that one can use Wolfram|Alpha as a “knowledge-based computing” platform—so that having all sorts of computable knowledge becomes effectively free from an engineering point of view.
How does a program communicate with Wolfram|Alpha? It uses the Wolfram|Alpha API. (These days, API is pretty much a term on its own, but it comes from “Application Program Interface”.)
Well, if you were a program, all you’d do is instead use a URI of the form http://api.wolframalpha.com/… And what you’d get back is a structure that you could use inside your program.
Like most modern APIs, the Wolfram|Alpha API is a so-called REST-style API, that returns XML output.
That XML output can contain all sorts of different elements. It can have a big HTML structure, suitable for reproducing a whole Wolfram|Alpha output page. Or it can have individual images, or text, that correspond to particular pods or parts of pods in the Wolfram|Alpha output.
It can also have a complete symbolic representation of each piece of the output, given as a Mathematica symbolic expression.
Needless to say, there are all sorts of detailed controls provided. For determining the geolocation to assume. For specifying whether results should come back synchronously all together, or asynchronously in pieces when they are ready. And so on.
There’s also a whole extended language for Wolfram|Alpha queries, that makes it possible to specify for example which particular output pods should be generated, or what assumptions should be made about the types of objects in the input.
All of these capabilities can ultimately be accessed just by sending the appropriate string to the Wolfram|Alpha servers. But as a convenience, there are now libraries for many common languages (.Net, Perl, Python, Ruby, PHP, and Java, not to mention Mathematica) that set up the request string, and then manipulate the resulting structure that comes back. (The Mathematica case is particularly convenient, because it’s a symbolic language, so one can easily deal with arbitrary structures—and it’s interactive, so one can see everything immediately.)
Many of the language libraries for the Wolfram|Alpha API were actually contributed by software developers in the Wolfram|Alpha community (thanks!). There are more to come, as well as SDKs (=“software development kits”) for a variety of environments and platforms.
One way that the Wolfram|Alpha API can be used is for adding Wolfram|Alpha capabilities to websites. But it can be used inside any software system—on a desktop (as with Mathematica), on a server or in the cloud (as with webMathematica), or in any kind of mobile or other device. (And, for example, all Wolfram|Alpha apps, and Wolfram Course Assistant apps, are built using the Wolfram|Alpha API.)
There are a lot of software projects that are already using the Wolfram|Alpha API. One notable example is Bing at Microsoft, where queries are sent from the Bing search engine to the Wolfram|Alpha API. Another example, of a quite different character, is in Touch Press ebooks, where Wolfram|Alpha is used to generate dynamic elements in the books.
What’s happening today with version 2.0 of the Wolfram|Alpha API is that we’re opening up a lot more to software developers. There’s streamlining and extension in the API itself. And we’re simplifying the licensing requirements for the API—notably so that anyone can get started for free using the API.
Creating an API that’s widely used is quite a responsibility. There are server clouds to keep running well. There are compatibilities to maintain. There are users to support.
But we know what we’re getting into. Because we’ve had an API for Mathematica for 21 years—since well before anyone had ever heard of an API. The MathLink API for Mathematica is quite sophisticated. It’s allowed external programs to communicate with Mathematica since 1990. And in fact Mathematica uses it extensively itself, notably in connecting its user interface (“front end”) to its computational kernel, and in setting up distributed computation.
As we build new things with the technology of Wolfram|Alpha—and there are a lot in the pipeline—they are essentially all based on the Wolfram|Alpha API. But what we’re doing internally is soon going to be completely dwarfed by what outside developers are doing with the Wolfram|Alpha API.
I don’t know all the projects that are underway. But of those I know, what’s most remarkable is their diversity. They’re all ultimately using the same Wolfram|Alpha platform. But what they’re doing with it is vastly different.
Beginning to build out the first generation of what’s made possible by the concept of knowledge-based computing that Wolfram|Alpha has introduced…
|
<urn:uuid:0da3de84-a3c7-469a-9f78-1416e3b2bb88>
|
CC-MAIN-2016-26
|
http://blog.wolframalpha.com/2011/01/20/knowledge-based-computing-and-version-20-of-the-wolframalpha-api/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395621.98/warc/CC-MAIN-20160624154955-00155-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.899953 | 1,379 | 2.578125 | 3 |
THE Ministry of Health has advised the public of the possible existence of two new mosquito-borne viral diseases — chikungunya and zika.
It has also confirmed there is no vaccine for these two diseases, which is transmitted by infected mosquitoes.
The ministry's national adviser for communicable diseases, Dr Mike Kama, said they feared the chikungunya and zika viruses, which have been identified in other Pacific island countries, may follow the same path as dengue.
Dengue fever killed 15 people and infected 25,300 people in the past seven months, according to statistics released by the ministry.
Dr Kama said there had been no cases of chikungunya or zika virus identified in the country so far but warned that despite the decline in the number of dengue fever cases, citizens must remain vigilant. Regular blood samples have been sent abroad for test for these emerging mosquito-borne viruses.
"We were free from dengue for a year before it started knocking on our doors in December, so there's always that possibility that other viruses will reach our shores, this is why vigilance is important."
The two viruses have recorded confirmed outbreaks in French Polynesia, New Caledonia and the Cook Islands. He said French Polynesia topped the list with 8700 suspected cases of the zika virus.
Tonga has also reported a chikungunya outbreak.
THE TWO NEW VIRUS
Source: Centers For Disease Control And Prevention And Nsw Government Health
* People infected with chikungunya virus will develop some symptoms three to seven days after being bitten by an infected mosquito;
* The most common symptoms are fever and joint pain, headache, muscle pain, joint swelling, or rash;
* There is no medicine to treat chikungunya virus infection or disease.
* Zika fever is an illness caused by the Zika virus that spreads through the bite of infected mosquitoes;
* Symptoms include fever, headache, red eyes, rash, muscle aches, and joint pains
* The illness is usually mild and lasts 4-7 days
|
<urn:uuid:14b0a53e-8b2a-4da0-b95e-ee4a34574b9e>
|
CC-MAIN-2016-26
|
http://www.fijitimes.com/story.aspx?id=268683
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396106.25/warc/CC-MAIN-20160624154956-00195-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.951229 | 434 | 3.21875 | 3 |
The increasing traffic from Buffalo westward along the lake shore, stimulated the popular desire for a better
means of transportation than that of the stage-coach, or even the steamboats of the day. Accordingly in 1831 a
gathering of interested citizens at Fredonia, New York, discussed the matter, with General C. M. Reed, P. S. V.
Hamot and Thomas H. Sill from Erie in attendance.
On April 12, 1842, Charles M. Reed, John A. Tracy and John H. Walker obtained a charter for the first railroad
company in the county called The Erie and North East Railroad Company, and books for the popular subscription to
its stock were opened on Oct. 19, 1846. Its stock was taken up largely in Erie. By the spring of 1849 the route
was surveyed under the supervision of Milton Courtright, who had been on the force of engineers on the old canal,
and contracts for the construction of the new railroad were let on July 26, 1849, the road extending from Erie
to the New York State Line at Northville, the present State Line.
Two companies in New York State had been projecting lines in that state up to the Pennsylvania line, and the Erie
and North East Railroad Company contracted with the Dunkirk and State Line Railroad for a connection at the state
line, both of which roads were planned with a six foot gauge, which would have made Erie the terminus of the railroad
from Buffalo, for the gauge of roads from Ohio to Erie carried the Ohio standard guage of four feet eight and a
half inches, which necessitated a reloading of cars at Erie. The road west from Erie had been built by The Franklin
Canal Company, which had been originally chartered to repair the Franklin division of the old canal, and by an
amendment of their charter were authorized to build a railroad on the route of the canal from Franklin to Meadville,
and thence north to Erie and south to Pittsburg. By a liberal construction of their charter powers, they assumed
the right to construct their road from Erie to the Ohio State Line; but it was of the narrow width gauge.
The railroad companies found the change of gauge at Erie a most serious impediment to travel, and efforts were
initiated to change the roads to make them of a uniform guage. The first train over the Franklin Canal Company's
road west of Erie, left Erie for Ashtabula on the morning of Nov. 23, 1852.
On Nov. 17, 1853, the Erie and North East Company and the Buffalo and State Line Company entered into a contract
to change their guages to four feet ten inches, thus planning to make a practically uniform guage from Buffalo
to Cleveland. On Dec. 7, 1853, work was commenced to carry this agreement into effect, and was completed Feb. 1,
1854, when the first train arrived in Erie from the east over the newly changed guage. The people of Erie resented
the plan, for they had hoped to make Erie the lake terminus of the New York lines, and saw in the installation
of the new and uniform guage the death knell to their hopes. They were filled with indignation, and resolved to
prevent the change if possible.
The railroad situation became the general topic of conversation, on the street, at social and business gatherings,
and in all public and private functions. At last the city councils were moved to the following:
"Whereas, The joint resolution granting to the Franklin Canal Company the right to cross the streets of the
city with their railroad where the same is now located, is not sufficiently guarded and restricted to protect the
rights of the city; and whereas, the city council will at all times be ready to grant all the facilities in their
power to railroads terminating here, when the same will promote the interests of this city, when the policy of
such railroad companies shall become settled and fixed with regard to width of track, etc., therefore,
"Resolved, etc., That the joint resolution granting the use of the streets of the city to the Franklin Canal
Company, passed Nov. 12, 1852, and also the resolutions passed March 14, 1850, granting the Erie & North East
Railroad Company the use of State Street from the depot to the lake on conditions therein named, for railroad purposes,
be and the same are hereby repealed."
And here is the reason that the New York Central Railroad Company today is not operating a railroad up and down
the main street of Erie.
However, the railroads stood pat on their determination to effect the proposed change of grade, and many of the
cool-headed citizens who were opposed to the change, believed that counsel would still win the day, held the more
violent in check; even succeeding in obtaining council's passage of the following in hopes of peaceably effecting
"Resolved, That the city councils will give all the aid in their power to the Erie & North East Railroad
Company in procuring ground in the canal basin for depots, etc., in case they will run their road to the dock."
More or less conferences, discussions, and meetings continued to be held until Mayor King called a public meeting
at 9 o'clock in the morning of July 19, 1853, which was marked by the most intense excitement and fervid oratory.
That evening councils adopted a lengthy resolution prohibiting the railroads, entering Erie from the east, from
using any other guage than six feet; and prohibiting the Franklin Canal Company from using any other guage on their
road leading west from Erie, than four feet and ten inches, and providing for police action and penalties in case
of violations. In the meantime the citizens were on the alert, noting any and every sign which would seem to indicate
an attempt to alter the guage. Many exciting meetings took place, not all of them inspired by the prudence and
good sense which should have prevailed, and many resolutions of'councils were adopted bearing on varidus angles
of the situation, until Saturday afternoon, Nov. 26, 1853, when councils were suddenly convened on the report that
the railroad company had spotted the ties all along the way, and would effect the change that night. A resolution
was adopted after a half day of earnest discussion, as follows:
"Resolved, That the mayor be instructed to call out the police force of the city to remove the bridges from
the streets of the city, now used by the Erie & North East Railroad Company at any time that he, the mayor
may deem necessary, in order to preserve the present railroad guage, and to preserve the peace of the city, in
accordance with the ordinance of July 19, 1853. Also any bridge or obstruction crossing any street used by the
Western Railroad Company within the limits of the city."
This was adopted in their regular place of meeting in "Wright's Block," then located on the northeast
corner of Fifth and State streets, where the excitement usually centered. On Nov. 28, 1853, councils passed another
ordinance directing the mayor to remove from the streets of the city all bridges, tracks, embankments, ditches,
timbers and other construction or obstructions placed in them by both of the railroad companies, and on Dec. 7,
1853, the mayor having sworn in 150 special police constables, mounted a large horse and rode at the head of his
police, and followed by a determined crowd of his fellow citizens, went up State Street to the railroad bridge,
where the city engineer carefully marked the location of the street lines upon the railroad structure, and men
with saws carefully cut the bridge in two upon those lines. All was done systematically and according to law and
the ordinance. Ira W. Hart, a railroad man, and J. F. Tracy, another, tried to order them away; but they, being
fiercely attacked, were glad to beat a hasty retreat. For a long time passengers and freight had to be carted from
east of town to the west side of it, the bridges being wholly destroyed across the streets. Much upbraiding of
our city was indulged in by the traveling public, who suffered great inconvenience. Through the traveling public
the incident was widely advertised, and Erie received much adverse notoriety through this trouble. The matter was
carried to the Pittsburg courts, the railroad men in Erie were ostracised and abused, the newspaper which advocated
the railroad side of the trouble was attacked, the press demolished, the type scattered about the street in front
of where the Park View Hotel now stands, its publisher was assaulted, and even the building which housed the paper
Near Harborcreek the farmers tore up the tracks on two separate occasions, and the U. S. Marshal was sent here
from Pittsburg to serve an injunction to restrain the determined people from interfering with the road; he found
the rioters busy along the tracks, and had difficulty in getting the attention of the people, until Archie Kilpatrick
demanded his business when the marshal informed them he had "An injunction under the seal of the United States
Court," when Kilpatrick took it, and throwing it upon the ground most irreverently declared "Now it has
the seal of Harborcreek," he he stamped it into the mud with his heel. He and John Jacks, Ira Sherwin and
John Kilpatrick were arrested for this and taken to jail in Pittsburg, ultimately being released.
This strife engendered the most bitter feeling between the two factiOns in the city and neighborhood, which was
never really allayed in that generation. The Civil War coming on a little later, helped greatly in dissipating
the keenness of the rancour; but to this day there are those in the city who resent every reference to it, terming
it one of the "most disgraceful things" that ever happened in Erie.
However, this struggle created conditions which served to make possible the construction of the great railroad
from Philadelphia to Erie, shortly afterwards. Interest had been aroused, and that seemed to be a way to obtain
railroad facilities for the sure development of the harbor at Erie, which the other railroads seemed to despise.
It also served to stimulate the building of the Erie & Pittsburg Railroad. Both of those projected railroads
benefitted in the settlement made by which the Erie & North East Railroad Company contributed $400,000 to the
construction of the Erie & Pittsburg Railroad, while the Cleveland, Painesville & Ashtabula Railroad Company
(being the successor of the Franklin Canal Company) contributed $500,000 to the building of the Sunbury & Erie
Railroad (now the Philadelphia & Erie Railroad).
The guage of the railroads became standard, and the various lines are today known as the New York Central (succeeding
the former Erie and North East Railroad Company and the Franklin Canal Company); while the Philadelphia & Erie
Railroad is a division of the Pennsylvania Railroad, as is likewise the Erie & Pittsburg Railroad, one of the
great railway systems of the country.
The passenger depot of the P. & E. B. B. was situated on the east side of the State Street Bridge over the
railroad below Hamot Hospital, where the freight business of that road in Erie continued to be carried on for some
years after 1864, when the passenger traffic was handled at the Union Station.
The Nickel Plate Railroad was an enterprise projected to run from Buffalo to Chicago by way of Erie, Cleveland,
Fostoria and Fort Wayne. Its road bed was graded, and the rails in place in very little over a year. The company
was organized in 1880, grading commenced in June, 1881, and the first train over its entire length was run in August,
1882. Experiencing some difficulty in obtaining terms for its franchise through the City of Erie, a gang of men
was set to laying ties and rails in the early morning of Sunday, April 2, 1882, and before dark the line was completed
through the city for the running of a train. This was done to avoid delays which would have been occasioned had
the work been done on a week day when civil process would have been served to arrest the work. Regular trains started
to run over this line on Oct. 23, 1882.
From time to time interest was shown in the construction of another railroad from Erie to Pittsburg, to be built
on the route of the old canal, the site of which was owned by W. W. Reed, and later was the property of his sister,
Miss Sarah Reed of Erie. Several promising prospects for such an enterprise fell through. At last Messrs. Huidekoper
and Dick, heading a syndicate from Meadville, arranged for the old canal bed, the road was laid into Erie in November,
1891, and the following spring was opened for business. From the start it had a large ore trade through the harbor
at Conneaut, Ohio, from where a line joined the main road at Cranesville. It had a connection with Conneaut Lake,
and also with Meadville. It has always done a thriving business, chiefly in ore and coal, making its passenger
business of secondary importance. It was understood at the beginning that this road, which was known as the Pittsburg,
Shenango & Lake Erie Railroad, and later more familiarily called "The Bessemer," would have extended
dock facilities at the harbor, and a fine, large passenger depot up town. Neither of these expectations have been
realized. It originally terminated at Butler, but sought and obtained a Pittsburg connection over the Pittsburg
& Western, and is now enjoying running rights with the Baltimore & Ohio.
Several railroad enterprises towards the south and east from Erie, have never advanced beyond the promotion stage;
some others have even secured charters, and a few have done some grading.
|
<urn:uuid:6a1a47b8-ac9c-4bff-9c74-6ece79e08bba>
|
CC-MAIN-2016-26
|
http://history.rays-place.com/pa/erie-railroads.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396147.66/warc/CC-MAIN-20160624154956-00144-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.973754 | 2,931 | 3.28125 | 3 |
Newquay Zoo, in Cornwall, UK, is excited to announce the birth of twin Owston’s Civets. The young pair, named Tai and Quy, are the offspring of mother, Dong Ha, and father, Bao. Dong Ha was born and bred at Newquay Zoo, and Bao originated from the Carnivore & Pangolin Conservation Center in Vietnam.
Photo Credits: Newquay Zoo
Senior Carnivore Keeper, Owen Taylor recently said, “This is a magnificent achievement for all of us here at Newquay Zoo, as the civet species is very vulnerable due to ongoing population decline. So, to have these two new arrivals is a great conservation result and helps us maintain the ongoing survival of this species.”
John Meek, Curator, added, “The arrival of the Owston's Civets is a welcome addition to the animal population [at the zoo], as this extraordinary species are actually illegally hunted for their fur and often eaten in local restaurants in Vietnam. So, to be able to continue to preserve this species is a fantastic win for Owen and the team.”
Owston’s Civet (also known as Owston’s Palm Civet) is named after wildlife collector Alan Owston and is native to Vietnam, Laos, and southern China.
A civet is a small, mostly nocturnal mammal that is native to tropical Asia and Africa. The term civet applies to over a dozen different mammal species. The best-known species is the African Civet, which historically has been the main species from which a musky scent, used in perfumes, was obtained.
Civets have a broadly cat-like appearance, though the muzzle is extended and often pointed, much like an otter or mongoose. They range in length from 17 to 28 inches (43 to 71 cm) and in weight from 3 to 10 lbs. (1.4 to 4.5 kg).
The civet will spend most of their days asleep and start their foraging for food at dusk. Occasionally they will venture up the trees to look for food but prefer to spend most of their time on the ground, using their long snouts to dig into the soil for food.
The civet produces a musk (also called civet) that is highly valued as a fragrance and stabilizing agent for perfume. Both male and female produce the secretion. The secretion is harvested by killing the animal or by removing the glands.
Owston’s Civet is currently listed as “Vulnerable” on the IUCN Red List due to an ongoing population decline. It is estimated there has been a loss of more than 30% of the population over the last three generations (about 15 years), due to over-exploitation, habitat destruction, and degradation.
|
<urn:uuid:71fa386b-84d9-4517-9b5b-a48021bb216a>
|
CC-MAIN-2016-26
|
http://www.zooborns.com/zooborns/newquay-zoo/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393533.44/warc/CC-MAIN-20160624154953-00039-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.959317 | 603 | 2.703125 | 3 |
Community Notification and Education
Over the past decade, the nation has focused increasing
attention on the risk that sex offenders pose to the safety of communities.
Legislation to address this issue has proliferated as a result, including
sex offender registries, community notification laws, and directives related
to the supervision and treatment of known sex offenders.
The term "community notification" refers to the dissemination
of identifying information to citizens and community organizations about
convicted sex offenders who are released into the community. These laws
are distinct from sex offender registration laws, which require convicted
sex offenders who are living in the community to notify police officials
of their place of residence.
Notification has grown from an idea of one police chief
in Washington State to a phenomenon that has received overwhelming public
support. This support can be attributed to the fact that sex offenders
reside in most communities and that notification is intended to protect
vulnerable populations, particularly children.
Many differences exist among the states, and within states,
in how they notify communities. The fact that there is little research
on community notification makes it difficult to determine which approach
is most effective, or if notification is effective at all. However, some
states have adopted promising approaches to notification that involve community
education and the strategic use of resources.
This paper examines the differences in state laws regarding
notification and explores some innovative approaches to community notification
and education in place across the United States. It is important to remember
that these laws apply only to known sex offenders who have been apprehended
and processed by the criminal justice system. These offenders account for
only a small portion of sex offenders in any community.
In order to understand the significant support for community
notification laws, it is important to examine the history of these laws
in the United States. Horrific events in Washington, Minnesota, and New
Jersey were the impetus for the creation of notification and registration
laws for sex offenders. These new statutes provided guidance for the rest
of the country as new states enacted their own registration and notification
In Washington State, a series of highly publicized sex
crimes occurred during a very short period of time. In May 1987, Earl K.
Shriner, a man with a long criminal record, completed a ten-year sentence
in Washington for kidnapping and assaulting two teenage girls. Two years
after his release, he raped and strangled a seven-year-old boy, severed
his penis, and left him in the woods to die. In 1989, Gene Raymond Kane
kidnapped and murdered a young Seattle businesswoman. He was on work release
after serving a 13-year sentence for attacking two women. In another incident
in 1989, Wesley Allen Dodd was apprehended during an attempted abduction
of a six-year-old boy from a movie theater in southwest Washington. Following
an investigation, Dodd confessed to the killings of two young boys who
had been riding their bikes in a park and the kidnapping and murder of
a four-year-old boy he found playing in a school yard.
In July 1989, Mountlake Terrace Chief of Police John Turner
learned of the imminent release to his community of a person who, while
in prison, had documented plans to sexually molest school children. Because
he did not want a repeat of the Shriner case, Chief Turner weighed the
potential for harm against the offender’s right to privacy and decided
to notify the community. This was the first instance of community notification
in Washington and was widely publicized throughout the state.
In response to significant public outcry from these crimes
and increased attention on the need to better protect communities, Governor
Booth Gardner appointed a task force to recommend changes to the state
laws. The task force held public hearings throughout the state and considered
numerous ways to strengthen the state’s statutes concerning sex offenses.
The task force’s recommendations became an omnibus bill enacted by the
1990 Legislature, outlining sweeping changes in the penalties for sex offenses,
including civil commitment, registration, and community notification (Lieb,
Washington State’s community notification
law applies to adult and juvenile sex offenders, regardless of conviction
date. Notification is dependent upon the level of risk an offender
poses to public safety. An end-of-sentence review committee was established
to assess, on a case-by-case basis, the public risk posed by sex offenders
who are preparing for their release from confinement or are accepted from
another state under the Interstate Compact. All sex offenders are
classified into tiers of risk for the purposes of public notification.
A model policy was developed for law enforcement agencies to follow when
disclosing information about sex offenders to the public:
Tier I, Low risk: Notice is made to law enforcement
agencies who may disclose information, upon request, to any individual
community member who resides near an offender.
Tier II, Moderate risk: In addition to the above, information
may also be disclosed to schools, child day care centers, family day care
providers, businesses, and organizations that serve primarily children,
women, or vulnerable adults, and neighborhood groups.
Tier III, High risk: In addition to the above, information
may also be disclosed to the public at large.
In October 1989, a masked man abducted 11-year-old Jacob
Wetterling at gunpoint near his home in St. Joseph, Minnesota. Neighbors,
friends, and strangers rallied to the Wetterling family’s aid and worked
diligently to search the area and distribute flyers across the country.
That outpouring of support led to the establishment of a nonprofit foundation
in Jacob’s name to focus national attention on missing children and their
families. Jacob remains missing to this day.
In 1991, the Jacob Wetterling Foundation recommended a legislative
initiative that resulted in the passage of Minnesota’s sex offender registration
act. Prior to this act, law enforcement agencies lacked resources to identify
known sex offenders residing in the state, which could assist in the investigation
of these types of crimes. The Wetterling Foundation also worked to have
this initiative passed on the federal level. In 1994, Congress enacted
the Jacob Wetterling Crimes Against Children and Sex Offender Registration
Act. The Act mandated that each state create a program to register sex
offenders and authorized discretionary community notification.
Like Washington State, Minnesota’s community
notification process is dependent upon the offender’s assessed level of
risk to reoffend:
Low risk: Information is maintained within law enforcement
agencies and is provided to victims;
Moderate risk: In addition to the above, law enforcement
agencies may disclose information to agencies and groups that the offender
is likely to encounter; and
High risk: In addition to the above, law enforcement agencies
may disclose information to members of the community whom the offender
is likely to encounter.
End-of-confinement review committees assess the public risk
posed by sex offenders on a case-by-case basis and are utilized at each
state correctional facility and each state treatment facility where sex
offenders are confined.
A model policy was developed to address and recommend
the contents and form of community notification, methods of distributing
community notification, methods of educating community residents at public
meetings on how they can use the information to enhance their safety, and
procedures for educating sex offenders on the nature and scope of the notification
Seven-year-old Megan Kanka was raped and murdered in 1994
by Jesse Timmendequas, a twice convicted child molester who lived on her
block in Hamilton, New Jersey. Megan’s parents believe that if they had
known that a pedophile lived nearby, this heinous crime would never have
happened. Megan’s death gave new momentum to the concept of community notification—that
residents should be warned when a sex offender moves into their neighborhood.
Residents of Megan’s community held rallies and signed petitions
in support of community notification. Megan’s parents served as leaders
to the cause, beginning a very public campaign to protect children. In
1995, this campaign led to the enactment of community notification legislation
in New Jersey, known as "Megan’s Law." New Jersey politicians helped carry
the issue to a national level. President Clinton signed the Megan’s Law
amendment in May 1996, changing the discretionary language in the Jacob
Wetterling Act regarding community notification to a requirement.
New Jersey’s community notification law
is similar to Minnesota and Washington laws, in that the notification process
is dependent upon the degree of risk an offender presents to the community:
County prosecutors, together with law enforcement officials,
assess the risk of reoffense by each released sex offender and determine
the appropriate means of notification. Some methods of notification
include community meetings, speeches in schools and religious congregations,
and door-to-door visits in the community.
Low risk: Notice is provided only to the victim and law enforcement
agencies likely to encounter the offender;
Moderate risk: In addition to the above, notice is given
to community organizations including schools, and religious and youth organizations;
High risk: In addition to the above, community members who
are likely to encounter the offender are notified.
In November 2000, voters in New Jersey approved a measure
to amend the state constitution to allow sex offender registration information
to be posted on the Internet. Previously, the New Jersey Supreme
Court had ruled that broad release of this information violated offenders’
Congress passed the Jacob Wetterling Act (Title XVII of
the Violent Crime Control and Law Enforcement Act of 1994), requiring states
to create registries of offenders convicted of sexually violent offenses
or crimes against children and to establish more rigorous registration
requirements for highly dangerous sex offenders. While states did not receive
any additional federal funding to fulfill the Act’s requirements, they
are penalized if found not in compliance. The U.S. Department of Justice
issued guidelines (January 5, 1999) to assist states with complying with
the Act and its amendments. [The original compliance deadline for the Jacob
Wetterling Act was September 1997; a two-year extension was granted to
states making good faith efforts to achieve compliance. States granted
this extension had until September 12, 1999, to comply with the original
features of the Act. States found not in compliance are penalized
10 percent of their Byrne Grant funds.]
The Wetterling Act has been amended three times, by the
Megan’s Law was added in 1996, requiring community notification;
The Pam Lychner Sexual Offender Tracking and Identification
Act was added in 1996, heightening registration requirements for repeat
and aggravated offenders; and
Section 115 of the General Provisions of Title I of the Departments
of Commerce, Justice, and State, the Judiciary, and Related Agencies Appropriations
Act (CJSA) was added in 1998, increasing sexually violent predator requirements
and requiring the registration of federal, military, and non-resident students
In addition, the 1998 CJSA amendments require states to participate
in the National Sex Offender Registry (NSOR). The NSOR will interface with
state registries to identify, collect, and properly disseminate relevant
information that is consistent, accurate, complete, and up-to-date. The
NSOR was established so that state registry information could be tracked
between jurisdictions. The NSOR was launched in July 1999, as part of the
National Crime Information Center (NCIC 2000). [The FBI established
NCIC 2000 to provide a nationwide information network database of criminal
justice information to law enforcement agencies, improving positive identification,
data quality, access to external databases, usage statistics, and flexible
The principal objective of community notification is to
ensure that members of the public can obtain information that can help
them protect themselves and their families from dangerous sex offenders
residing in their community. Federal guidelines allow states discretion
in determining the approaches they will take to notification. These guidelines
state that "The designated state law enforcement agency... shall release
relevant information that is necessary to protect the public concerning
a specific person required to register." All 50 states have enacted sex
offender community notification legislation. The following chart shows
the growth in states enacting notification laws—the majority of activity
occurred between 1994 and 1996.
Variations in state community notification laws occur in
the following areas:
the procedures or guidelines for agencies to follow when
performing a notification;
the categories of offenders who are subject to notification;
the scope, form, and content of notification; and
the designation of an agency to perform notifications.
State community notification laws can be divided into three
categories, organized by the extent of notification: broad community notification;
notification to those at risk; and passive notification (Matson and Lieb
Broad Community Notification
In states utilizing broad notification, criminal justice
officials actively and widely release information about sex offenders to
the public. Currently, 19 states provide this type of notification. The
process for determining which offenders should be subject to notification
differs from state to state. Some state statutes define this population.
In other states, officials conduct risk assessments to make this determination.
Still others rely on local law enforcement discretion.
Notification to Those at Risk
States that utilize a more limited type of notification
release information based on the need to protect an individual or vulnerable
population from a specific sex offender. Currently, 14 states provide this
type of notification. As with states in the broad community notification
category, the process for determining which offenders are subject to notification
differs from state to state. Organizations typically notified are child
care facilities, religious organizations, public and private schools, and
other entities that provide services to children or vulnerable populations.
States that utilize passive notification require citizens
or community organizations to actively seek out sex offender information
themselves. Currently, 17 states allow such access. In most of these states,
this information is available at local law enforcement offices or through
a central state agency (typically managed by state police or department
of public safety). While most are open for public inspection, others are
open only to citizens at risk from a specific offender (generally determined
by proximity to an offender’s residence).
Identifying Offenders for Notification
The process by which an offender is selected for community
notification also varies from state to state. In many states, legislation
mandates notification for offenders convicted of specific sex offenses.
In others, discretion is granted to the notifying authority. Some states
conduct risk assessment on offenders before determining if notification
Statutory Determination. The majority of states’
notification laws define the population of offenders that are subject to
community notification as those convicted of a sexually violent offense
or a sexual offense against a victim who is a minor. These states typically
do not distinguish between high- and low-risk offenders.
Law Enforcement Discretion. In some states, local
law enforcement agencies make the final decision on notification. Generally,
law enforcement officials have broad discretion in making this decision.
Risk Assessment. Several states assess the risk
of individual offenders before notification. At least 12 states use risk
assessment instruments and an additional six states enlist committees for
the purpose of assessing an offender’s level of notification. The most
common risk assessment tools used in these states are the Oregon Sex Offender
Assessment Scale, the Minnesota Sex Offender Screening Tool-Revised (MnSOST-R),
the Rapid Risk Assessment for Sex Offense Recidivism (RRASOR), and the
Static-99. Other states have developed their own risk assessment instruments.
These instruments categorize offenders according to their similarities
and differences from offenders known to have committed new sexual offenses.
Under federal guidelines, states are not required to
register or conduct notification on juveniles who are adjudicated delinquent
for a sex crime. However, states have the option to require registration
and notification for these youth. Juveniles adjudicated or convicted of
a sex offense are required to register in 28 states:
Indiana (age 14 or older)
Mississippi (if twice adjudicated)
South Dakota (age 15 or older)
California, Colorado, Illinois, Michigan, Minnesota,
North Carolina, and Vermont prohibit the release of this information to
the public. The remaining states authorize notification in some or all
instances, or are silent on the matter.
Methods of Notification
When it is determined necessary to release information
to the public about a sex offender, various methods of dissemination are
used. However, most states use one or more of the following practices:
media release, door-to-door flyers, mailed flyers, or Internet distribution.
Several states also utilize other methods. For example, in Louisiana, the
offender is required to place an ad in a local newspaper and mail the notification
to neighbors and the superintendent of the school district in which he
or she intends to reside. In Texas, judges can order the posting of signs
on an offender’s home, warning neighbors that a sex offender resides within.
California, Florida, New York, and Wisconsin maintain "800" or "900" telephone
lines that the public may call to inquire whether individuals are registered
sex offenders. In California, a CD-ROM containing a list of all registered
sex offenders is available for public viewing throughout the state at local
law enforcement offices.
The broadest form of notification is issuing a media
release. Generally, with a media release, a press conference is held or
a local newspaper or television station is alerted about a specific offender.
Usually, a notice is placed in a newspaper of general circulation in the
county in which the offender intends to reside or with a local television
station. In the notice, identifying information is given about the offender
along with his or her criminal history. In some instances, the media may
choose to run a more detailed story.
Some jurisdictions, usually those that are more rural
or suburban, alert the public door-to-door with flyers or bulletins distributed
to neighbors living in a certain proximity to a sex offender. In these
instances, a criminal justice official delivers the flyers in person to
citizens in communities at risk. These flyers or bulletins contain identifying
information about the offender and his or her criminal history.
In other jurisdictions, criminal justice officials choose
to notify the public through mailed flyers or bulletins. Similar to door-to-door
flyers, information is mailed to the communities within certain geographic
parameters. Identifying information is provided about the offender and
his or her criminal history.
Accessing Registration Information
Almost every state maintains a central registry, which
lists all registered sex offenders within the state. In addition to or
in lieu of notification, many states allow members of the public access
to these registries. In these instances, information can be accessed in
a variety of ways: telephone, computer, written request, or by review of
the registry at a local law enforcement office.
At the time of this writing, approximately 28 states
and the District of Columbia operate sex offender registry Internet websites.
The majority of these sites have been implemented over the past three years.
The first states to launch these sites were Alaska, Florida, Indiana, and
Kansas. California, Maryland, New Jersey, and Rhode Island recently passed
bills authorizing Internet registries (which have yet to be launched).
There are also many local websites that list registered sex offenders within
a given city or county, which are operated by local law enforcement. A
number of private sector agencies and private citizens also post lists
of registered sex offenders. In these instances, individuals have obtained
registration lists from law enforcement and posted them without law enforcement’s
Several jurisdictions’ approaches to notification include
community meetings designed to provide information about the offender,
sex offenders in general, and community protection. In some cases, these
meetings also serve to introduce the offender personally. Meetings are
held regarding specific offenders or the topic can be addressed as part
of a community crime prevention meeting.
Advantages and Disadvantages of the Different Types
||Reaches the broadest possible
audience in the least amount of time; is more cost effective than notifying
communities one household at a time.
||Unable to assure that all vulnerable
citizens have been reached.
Unable to respond immediately to citizen questions about
the situation or the law.
Media potentially will not print the information as requested.
Depending on the volume, the significance of each notification
to the public may be lost.
||Allows law enforcement to personally
address concerns the public may have about a sex offender.
Shows the community that law enforcement cares enough
to take the time to warn them.
|Only notifies a small group of
people. For example, the sex offender may work in a different community
than was notified.
More time consuming and expensive (in terms of staff hours)
than a media release.
or Posted Flyers
||More time efficient and less costly
in terms of staff hours, when compared to door-to-door visits.
Reaches all targeted community members.
|Not able to personally address
No opportunity to educate the public.
||Cost effective; less resource
||Relies on citizens to actively
seek out information—not everyone who is vulnerable will inquire.
Generally, these lists do not distinguish between high-
and low-risk offenders.
||Registries posted on the Web are
easily accessible by members of the public who have Internet access, making
this an effective dissemination tool for law enforcement.
After initial startup costs, this is an inexpensive way
to comply with federal requirements.
|Impersonal—not able to answer
questions or inform citizens of the appropriate use of such information.
Inability to limit who accesses the information over the
Misidentification—there can be problems encountering offenders
with the same name when searching.
Addresses and other information on registered sex offenders
is frequently outdated and inaccurate.
Information is too broadly disseminated and may go beyond
the scope of the intended audience.
Generally, these lists do not distinguish between high-
and low-risk offenders.
||Gives community members concrete
information about the offender and provides an excellent opportunity for
In this forum, presenters counter misinformation, quell
fears, discourage vigilantism, and offer actions that citizens can take
to enhance their safety.
Provides opportunities for supervision officers, treatment
providers, law enforcement officials, victim advocates, and others to work
together to present information to the community.
|If not properly conducted, a "mob
mentality" may emerge; presenters should be trained and a curriculum must
be in place prior to conducting these meetings.
Unable to assure that all vulnerable citizens will attend
or be reached.
The central constitutional challenge to community notification
statutes questions whether the burden imposed by the law constitutes punishment
of the offender. Notification laws have been challenged in nearly every
state. Courts have generally found that notification laws are constitutional
and that their principal purpose is regulatory in nature and not punitive.
Courts have further stated that the primary concern of these statutes is
protecting the public. Thus far, no challenges have overturned the law
completely, but some have forced legislatures to refine or modify statutes.
Portions of notification laws, such as procedural mechanisms (due process)
and retroactive application, are most susceptible to challenges in state
and federal courts.
The most common and successful due process challenge is
procedural due process. This challenge has occurred mainly in states that
classify offenders according to the level of risk they pose to communities.
This argument centers on whether an offender is allowed a hearing to challenge
a risk classification. This challenge succeeded in Massachusetts, New Jersey,
and New York, forcing the legislatures to revamp their statutes so that
every offender has the right to a hearing.
The Massachusetts Supreme Court recently found that provisions
of the state’s community notification law violated constitutional due process
[Doe v. Sex Offender Registry Board, Mass. SJC-07608 (July 24,1998)]. Massachusetts
uses a three-tier notification system, under which the state’s Sex Offender
Registry Board classifies an offender into one of three risk levels. The
State Supreme Court upheld the law; however, it found the risk level classification
system unconstitutional. The court made recommendations to alter the law
to satisfy constitutional due process:
"...the appropriateness of an offender’s risk
classification must be proved by a preponderance of the evidence, and that
the [Sex Offender Registry] board must make specific, written, detailed,
and individualized findings to support the appropriateness of each offender’s
risk classification. Offenders may appeal to the Superior Court for review
of the board’s decision..."
At least 10 states allow offenders to contest decisions subjecting
them to notification (Florida, Louisiana, Massachusetts, Minnesota, Nevada,
New Jersey, New York, Pennsylvania, Texas, and West Virginia). In these
instances, an offender can petition a court for a hearing or seek administrative
review of the decision. At the court hearing, the offender has the right
to be present, give testimony, call and cross-examine witnesses, and be
represented by counsel.
In July 1995, the New Jersey Supreme Court upheld the
state’s notification statute, determining it to be constitutional as long
as sex offenders facing notification had a chance to exercise their right
to contest the decision in court:
"…those subject to the statue are entitled
to the protection of procedures designed to assure that the risk of reoffense
and the extent of notification are fairly evaluated before Tier II or Tier
III notification is implemented. We have concluded that judicial review
through summary proceeding should be available prior to notification if
sought by any person covered by the law." [Doe v. Poritz, 662 A.2d 367
The retroactive provisions of New Jersey, New York, and Washington
notification laws have been upheld by the United States Court of Appeals.
The issue of community notification of sex offenders has not been heard
by the United States Supreme Court.
Are Notification Laws Effective?
Community notification laws are based on the presumption
that alerting a community about a sex offender living in their neighborhood
will help prevent further cases of sexual assault. While it may not be
feasible to learn the number of crimes prevented by these laws, the impact
of notification practices should be evaluated to the extent possible. For
example, information can be gathered about the influence of community notification
on community perceptions, behaviors, criminal justice practices, and offender
Currently, research is lacking on the relationship between
community notification and reduced recidivism or increased community safety.
There are few studies on the effectiveness of community notification laws
(as there are few studies on the effectiveness of most laws). Most of this
research has been conducted in Washington State, where researchers have
studied offender recidivism after community notification and measured the
public’s response to the law.
The Washington State Recidivism Study
In 1995, the Washington State Institute for Public Policy
conducted a study on the state’s community notification law (Schram and
Milloy, 1995). The study examined how Washington State implemented community
notification, who was affected by it, and its impact on recidivism (as
measured by rearrest) among sex offenders subjected to the law. The study
provides a descriptive portrait of the offenders who were subjects of the
highest level (Level III) of community notification during the first three
years after implementation. Researchers found that adult sex offenders
targeted for notification usually had extensive sexual or violent offense
histories. Most had two or more prior convictions for offenses that typically
involved the molestation or rape of female children they knew. Most of
the offenders also had prior convictions for nonsexual offenses.
The study also provides a comparison of the recidivism
patterns of adult sex offenders who were subjects of Level III notification
with those of similar sex offenders who were released prior to the implementation
of the law, and who therefore, were not subject to notification. Researchers
found that at the end of 54 months at risk, the notification group had
a slightly lower estimated rate of sexual recidivism (19 percent) than
the comparison group (22 percent). This difference was not statistically
significant. Although there were no significant differences in overall
levels of general recidivism, the timing of reoffending was different for
the notification and comparison groups. Offenders who were subjected to
community notification were arrested for new crimes much more quickly than
comparable offenders who were released without notification.
The Washington Public Opinion Poll
As part of Washington State’s evaluation of the Community
Protection Act, a telephone survey was conducted soliciting public opinion
among Washington State adults about the state’s community notification
law. Over the summer of 1997, approximately 400 residents from both rural
and urban regions of eastern and western Washington State were surveyed
The results of the survey indicated an overwhelming majority
of respondents were familiar with the law and believed it was very important.
Nearly 75 percent of the respondents reported they learned more about sex
offenses and how sex offenders operate because of community notification.
More than 60 percent agreed that community notification makes released
sex offenders more law abiding than they would be if no one in the community
knew their background. The vast majority of respondents indicated they
were more safety conscious and had a heightened awareness of their surroundings
as a result of community notification.
Community notification is relatively new and states are
still refining how best to put it into practice. However, those approaches
that involve the community appear to offer the greatest promise. The following
section describes innovative approaches to community notification in place
in Connecticut, Oregon, and Washington, and specific jurisdictions in Arizona
Arizona enacted its notification law in 1996. In Mesa,
since the inception of the law, 493 sex offenders (out of approximately
1,500 registered) have been identified as moderate or high risk and subject
to community notification. The Mesa Police Department surveyed communities
to find out how they would like to be notified about sex offenders residing
in their neighborhoods. Door-to-door notification is the preferred method;
five detectives are assigned to conduct these notifications. Because of
the overwhelming workload that notification presents, community action
grant officers and bicycle officers (funded through community policing
grants) are enlisted to assist in the notification process. In addition,
neighborhood block watch captains, volunteers, probation officers, and
treatment providers aid in these efforts. During these door-to-door notifications,
citizen reactions are documented. If a citizen indicates any intention
of harming or harassing an offender, they are subsequently visited by one
of the Mesa Police Department detectives and warned that vigilante activity
will be prosecuted.
In Mesa, community meetings are also held. At these meetings,
law enforcement and other presenters (i.e., probation officers and treatment
providers) educate the public and media about sexual assault statistics
and facts, and offer guidance on protection from sexual assault. They also
encourage citizens to watch for inappropriate behavior by the offenders
and to report any suspicious activity to the police department hotline.
In Connecticut, a team of individuals that includes probation
and parole officials, law enforcement, victim advocates, and sex offender
treatment providers have developed a multi-disciplinary approach to community
education and notification. Team members view community education as an
integral part of notification and have developed a comprehensive, collaborative
model, which incorporates information from the various team members. Recently,
the Judicial Branch, in collaboration with team members, developed a supplemental
video to enhance education information provided to communities through
In Connecticut, victim advocates assist probation and
parole officers (as well as other team members) in conducting community
notification, through door-to-door visits or community meetings. Advocates
help shift the focus of notification laws from merely informing the public
about known offenders in their neighborhoods to preventing future sexual
victimization. Advocate involvement in the notification process creates
the opportunity to educate citizens about sexual assault and offer help
The Tampa Police Department recently developed the Sexual
Predator Identification and Notification Program (SPIN). SPIN is a proactive,
comprehensive community policing initiative that addresses the issue of
sex offenders released from incarceration back into communities. In addition
to carrying out the minimal requirements of community notification, the
SPIN Program enlists the community policing officer assigned to the area
to contact sex offenders on a monthly basis. These contacts serve multiple
purposes. Officers ensure that the offender lives at the address listed
in the state database and verifies the offender’s compliance with state
laws, which mandate that the offender maintain a valid, updated license
and accurate registration information. Additionally, community oriented
police officers work daily with probation officers to monitor offenders
and ensure that they are complying with conditions of probation.
The SPIN coordinator meets regularly with community members
and gives presentations to explain all aspects of the program, legal issues,
and the rights of both citizens and offenders.
Trained parole and probation officers in Oregon use the
Sex Offender Assessment Scale, developed in the state, to determine whether
an offender exhibits predatory characteristics and should be subject to
notification. Supervising probation or parole officers develop an individualized
notification plan based on the offender’s criminal behavior and the make-up
of the community. Typically, neighborhoods are notified through door-to-door
delivery of flyers with descriptive information about the offender. A 1996
amendment to the statute permits law enforcement agencies to conduct lifetime
notification for predatory sex offenders not under supervision.
In Oregon, notification is used as a management tool—when
an offender is doing poorly in treatment or not complying with conditions
of his or her supervision, officials may decide that the offender poses
a risk to the community and should be subject to notification.
When issuing a notification, probation officers leave
flyers at a residence only if an adult is in the home. This practice allows
officers the opportunity to address citizen questions or concerns about
the offender. If an adult is not present, officers either leave their business
cards or leave a flyer with a neighbor. Following door-to-door community
visits, flyers are also mailed to the media, school districts, and other
law enforcement agencies.
In Washington State, local community meetings are either
convened regarding a specific offender or to discuss broader issues of
sexual assault; sex offender management may be addressed as part of an
overall crime prevention meeting.
Community meetings that focus on specific sex offenders
are presented by law enforcement, Department of Corrections staff, and
others (including legal advisors, juvenile justice officers, representatives
from the prosecutor’s office, representatives from crime prevention units,
school officials, mental health providers, victim advocates, and community
leaders). They provide educational information as well as facts about offenders
who are the subjects of the meetings.
Generally, a predetermined agenda is followed that sets
the ground rules and expectations of the meeting. The notification law
is first described, followed by a presentation on what is known about sex
offenders and safety related issues. Finally, information on the specific
offender is presented (such as where they live, what they were convicted
of, victim characteristics, and other identifiers) and questions are answered.
Despite the legislative purpose of community notification
to enhance public safety, notification can have negative effects on the
criminal justice system, the community, victims, and offenders (Freeman-Longo,
Potential for Vigilantism
The potential for citizens to harass offenders following
notification has been a concern since community notification laws were
first passed. Anecdotal incidents of vigilantism or harassment have been
reported in almost every state in the country. Fortunately, few have been
violent in nature. Instead, most of these incidents have involved verbal
threats and/or attempts to force the offender to move from the community.
The fact that violent incidents are relatively rare may seem surprising
given the media attention to these events. At least four states have tracked
incidents of harassment: New Jersey, Oregon, Washington, and Wisconsin.
In New Jersey, 135 community notifications produced one
instance of physical assault reported to the authorities and four reports
of threats, harassment, or other offensive, non-violent actions. In July
1998, an individual reacting to a flyer distributed by police shot at the
house of a recently paroled rapist. [This information was collected from
November 1994 through May 1996, in preparation for a court case (E.B. v.
In Oregon, less than 10 percent of those offenders subject
to notifications experienced some form of harassment (from November 1993
to January 1995). These incidents included name-calling, graffiti, and
minor property vandalism. Two extreme cases of harassment were reported;
the first involved a sex offender being threatened at gun-point and the
second included threats of arson to an offender’s residence (Oregon Department
of Corrections, 1995).
In Washington State, harassment incidents follow less
than 4 percent of notifications (from 1990 to 1996). [This data is from
a survey of law enforcement, in which respondents were asked to recall
incidents that they knew about and reported.] The most serious incident
resulted in arson of an offender’s intended residence. Two cases resulted
in minor property damage, and in two others, offenders were physically
assaulted (Matson and Lieb, 1996). In July 1998, neighbors in a trailer
park burned down a vacant mobile home days before a sex offender was scheduled
to move into it. Last year, a man was imprisoned for threatening a sex
offender at gun-point who had recently been released from civil commitment.
In Wisconsin, 23 percent of law enforcement agencies reported
incidents of harassment of sex offenders since the law took effect in 1997.
Most of these incidents were deemed minor, involving insults and verbal
taunts, and offenders being denied housing (Zevitz and Farkas, 1999).
Compliance with Registration Requirements
In addition to vigilantism and harassment, compliance
with registration requirements is a problem in every state. Some would
argue that notification causes sex offenders to abscond in order to avoid
additional stigmatization. Some states report that the whereabouts of as
many as 50 percent of registered sex offenders are not known. It is probably
safe to assume that no state has a 100 percent compliance rate in registering
sex offenders. Providing communities with exact addresses of offenders
whose whereabouts are in fact unknown can cause undue harm to individuals
who occupy a sex offender’s prior residence.
Because registration requirements generally last 10 years
to life, many registered offenders are not under community supervision
(i.e., probation or parole). In these instances, conforming with registration
requirements is dependent on the offenders’ choice to remain in compliance
or the degree to which law enforcement tracks and/or verifies offenders’
whereabouts. Failure to comply, which may result in inaccurate offender
addresses, jeopardizes the effectiveness of broad notification strategies.
All states impose penalties on offenders who fail to keep their registration
information current. Some impose felony sentences; others impose monetary
penalties for noncompliance.
Offenders Not Able to Find Housing
Some communities have reported that certain property
owners are not renting to sex offenders because of pressure from other
tenants or neighbors. In a few metropolitan areas, sex offenders who cannot
find residences are housed in local motels (by their parole or probation
officer) and even returned to prison until they can find adequate housing.
In Waukesha County, Wisconsin, two offenders chose to return voluntarily
to prison because they could not find housing following their notifications.
In some jurisdictions, sex offenders reside in shelters, temporary housing,
or on the streets. There have been instances of neighborhoods joining together
to keep registered offenders out of their community. Recently, in Lake
Oswego, Oregon, a group of residents pooled funds to send a registered
sex offender to college in order to remove him from their neighborhood.
Because offenders are not able to find residence, they
may be ineligible for early release and thus, "max-out" their sentence
(early release decisions generally are based upon an approved plan, which
includes approved residency). This means that some of the highest risk
offenders are released into the community with no court ordered supervision
or treatment to help them control their offending behavior.
Name and Shame in the United Kingdom
As evidenced by the “For Sarah Campaign,” named for eight-year-old
Sarah Payne who was murdered in the UK in July 2000, the public and media
can take matters of notification into their own hands. A “name and
shame” campaign by a local newspaper sought to identify more than 100,000
suspected pedophiles in the UK, because the public did not have access
to sex offender information. This campaign caused alleged offenders
to flee their homes to avoid persecution and has led to mob riots, physical
assaults, property damage, misidentifications, and a suicide that is believed
to be related to the campaign (Born, 2000, News of the World, 2000).
There have been instances around the country of victims’
identities revealed as a result of community notification. The potential
is highest when victims are related to or known to offenders. Furthermore,
when officials conduct notification in neighborhoods where the offender’s
victim resides, they may inadvertently traumatize the victim in the process.
In an effort to comply with federal guidelines efficiently
and economically and to release vital information about offenders to the
public, many states have adopted the use of Internet websites to post sex
offender registration information. However, posting sex offender registries
on the Internet raises several concerns. These include the accuracy of
the information provided, the potential unintended identification of the
victim, and privacy concerns of the offender. There are several other key
issues to consider in the use of Internet websites, including the following:
States that list registered sex offenders on websites rely
on citizens to proactively seek this information. If the goal of making
such lists available to the public is to protect the citizenry, these methods
must be employed with the knowledge that not everyone who is vulnerable
will inquire through an Internet registry.
Citizens who learn of sex offenders in their community via
the Internet are not always provided with support or education when receiving
this information. Many professionals in the field contend that citizens
are ill equipped to respond to this information absent additional education
on the risks of sexual offending and how one might better protect oneself
and one’s family.
Internet registries do not require a demonstration of a "need
to know" when an individual accesses the information they provide. Several
states have elected to use alternative methods of access that contain a
"need to know" checkpoint to ensure that the information obtained is used
for the purposes for which it is intended (such as a parent checking to
see if a neighbor is a registered sex offender).
Anecdotal reports from around the country have described
incidents where offender information on a website has been outdated or
incorrect, thus subjecting innocent citizens to stigma or harassment.
Reducing Unintended Consequences
The negative and often unintended consequences of community
notification can be harmful to communities and to sex offenders’ efforts
to reintegrate into society. Different programs throughout the country
have made efforts to reduce these effects. These efforts involve education
of citizens and explanation of laws, identification of offender risk, caution
around exact address release, planning and foresight, cooperation with
media, and involvement of victim advocates.
The opportunity to educate the public may be the most
powerful aspect of recent community notification efforts. Education should
focus on: the fact that victimization data indicate that most sex offenders
remain undetected in the community, that most people are victimized by
someone they know, and that known sex offenders are often under the supervision
of the criminal justice system; the steps that the criminal justice system
can and cannot take to control these offenders; and methods to protect
oneself and one’s family from sexual victimization.
Community notification may best be reserved for those
offenders at greatest risk to reoffend. Reconviction data suggest that
not all sex offenders reoffend and alerting the public of their crimes
may be detrimental to offenders’ progress in treatment and community reintegration.
Sex offenders are not a homogenous group; reoffense rates vary among different
types of sex offenders and are related to specific characteristics of the
offender and the offense. Several states assess the risk of individual
offenders and only release information to the public about higher risk
Community notification usually takes place upon an offender's
release from incarceration. However, notice should also take place when
an offender is found in noncompliance with supervision conditions or registration
requirements, or when an offender absconds from his or her jurisdiction.
Some states use notification as a management tool under these circumstances,
alerting the public when an offender is of greater risk. This serves two
purposes; it informs communities of dangerous behaviors by particular offenders
and it helps keep sex offenders in compliance through the threat of public
Some states post warnings on their Internet websites,
indicating that the purpose of the list is to help protect the public from
potential danger posed by individuals who have committed sex offenses.
These statements also reflect that any actions taken against any person
on the list, including vandalism of property, verbal or written threats
of harm, or physical assault against an individual on this list, their
family, or employer, may result in arrest and prosecution. The public should
be further notified that ostracizing or harassing sex offenders can stand
in the way of their successful reintegration into the community.
Accuracy of Information
Offender registration information must be updated regularly
to maintain accuracy. States have a responsibility to ensure that the information
is as accurate and up to date as possible. At a minimum, offenders who
are out of compliance with registration requirements should not have their
addresses posted on websites or given as part of notification, as this
information is more than likely inaccurate. In addition, regular record
updates ensure that other information, such as the offender’s physical
appearance, is kept current.
In planning for community notification, corrections and
law enforcement officials should identify individuals who may be negatively
affected and develop strategies to reduce these potential impacts, without
interfering with the notification. Notifying family members, victims, landlords,
and employers before conducting a notification allows these individuals
time to prepare for the disclosure. Every effort should be made to protect
the privacy of any victims of sex offenders subject to community notification.
It is vital that no direct or indirect identifying information regarding
the sex offenders’ victims be released as a part of the notification process.
Victim advocates (both community-based and governmental)
can play an important role in the development of a successful community
notification program. States that use review committees to assess an offender’s
risk of reoffense often enlist the help of victim advocates. In many instances,
legislation requires their participation in the development of the classification
procedures or in the actual risk assessment. Some states that conduct community
meetings use victim advocates to help educate audiences about the nature
of sex crimes and teach parents how to protect themselves and their children
from sex offenders. In addition, victim advocates can be helpful in strategizing
with corrections and law enforcement officials regarding who should be
notified and how, as well as assisting in the notification itself. Victim
advocacy groups, such as the National Center for Missing and Exploited
Children, the National Center for Victims of Crime, and many local sexual
assault advocacy programs, develop and provide educational materials that
teach parents how to protect their children and themselves.
Agencies charged with protecting the public from sex
offenders (i.e., probation, parole, law enforcement, and treatment providers)
should enlist the support of the news media in their community protection
efforts. These agencies should provide the media with general information
about sex offender management practices and resources for victims. If this
is accomplished, the media can be a positive resource in the notification
For the benefits of community notification to be realized
to the greatest extent possible, notification should be used as an opportunity
to educate the public. Notification should be accompanied with community
discussions about the nature and extent of sexual offending, what is known
about sex offenders, sex offenders’ rights, and actions that citizens can
take to protect themselves and their families. Communities also need to
be educated about the role notification plays in sex offender management.
What is the Extent of Sexual Offending?
Those people who commit sexual assaults, whether convicted
for these offenses or not, live in our communities. Data suggests that
there are many more sexual abusers in the community than those who have
been identified by the court system (or are subject to community notification
or placed on Internet registries). A 1992 study estimated that only 12
percent of rapes were reported (Kilpatrick, Edmunds, and Seymour, 1992).
The National Crime Victimization Surveys conducted in 1994, 1995, and 1998
indicate that only 32 percent of sexual assaults against persons 12 or
older were reported to law enforcement. As of April 1998, there were approximately
280,000 registered sex offenders in the United States (Baldau, 1999). This
number may only represent a fraction of those who commit sexual assault.
Who Commits Sexual Offenses?
Most sexual assaults are committed by someone known to
the victim or the victim’s family, regardless of whether the victim is
a child or an adult. Statistics indicate that the majority of women who
have been raped know their assailant. A 1998 National Violence Against
Women Survey revealed that among those women who reported being raped,
76 percent were victimized by a current or former husband, live-in partner,
or date (Tjaden and Thoennes, 1998). Also, a Bureau of Justice Statistics
study found that nearly 9 out of 10 rape or sexual assault victimizations
involved a single offender with whom the victim had a prior relationship
as a family member, intimate, or acquaintance (Greenfeld, 1997). Approximately
60 percent of boys and 80 percent of girls who are sexually victimized
are abused by someone known to the child or the child’s family (Lieb, Quinsey,
and Berliner, 1998). Relatives, friends, baby-sitters, persons in positions
of authority over the child, or persons who supervise children are more
likely than strangers to commit a sexual assault.
What are the Rights of Sex Offenders?
The public must accept that sex offenders will and do
live in our communities. It is not feasible for every community to incarcerate
all sex offenders for life. Citizens should be encouraged to refrain from
ostracizing sex offenders or their families.
Citizens should use available channels for expressing
concerns. If community members have a concern about a particular sex offender,
this information should be brought to the attention of the offender’s probation
or parole officer immediately. If there is not a satisfactory response,
citizens should call the officer’s supervisor. Attempts by citizens to
confront, harass, or shame a sex offender into compliance can have unintended,
negative consequences. Concerns should always be addressed through the
official criminal justice system.
Communities can help by supporting sex offenders’ attempts
to reintegrate into society. Assuring stable housing and employment for
these offenders can promote safety in the long run.
How Can Citizens Protect Themselves?
In order for citizens to most effectively protect themselves,
it is important that they clearly understand who is at risk and how best
they can be protected. Citizens should be encouraged to educate themselves
and loved ones about the dangers of sexual assault and in particular about
child sexual assault. (Organizations such as the National Center for Missing
and Exploited Children and local sexual assault victim advocacy programs
provide free information on sexual assault protection.)
Citizens must understand that safely supervising sex offenders
in communities is a complex task. The strategies that are emerging as promising
for preventing individual offenders from reoffending involve the establishment
of numerous controls and safety mechanisms. Unfortunately, there is no
simple solution that will end sexual assault.
Knowing My 8 Rules for Safety
National Center for Missing and Exploited Children*
1. I always check first with my parents or the person in charge
before I go anywhere or get into a car, even with someone I know.
2. I always check first with my parents or a trusted adult before
I accept anything from anyone, even from someone I know.
3. I always take a friend with me when I go places or play outside.
4. I know my name, address, telephone number, and my parents’
5. I say no if someone tries to touch me or treat me in a way
that makes me feel scared, uncomfortable, or confused.
6. I know that I can tell my parents or a trusted adult if I
feel scared, uncomfortable, or confused.
7. It’s OK to say no, and I know that there will always be someone
who can help me.
8. I am strong, smart, and have the right to be safe.
*A sample of the public information resources currently available.
Why Do We Need to Talk About Managing Sex Offenders
Given that some portion of sex offenders are under correctional
supervision in the community, it is prudent that citizens are educated
about what effective supervision entails and the need to allocate appropriate
supervision and treatment resources to the management of these individuals.
Communities must also realize the importance of supporting offenders’ attempts
to reintegrate into society and become more productive citizens. Their
successful reintegration can also help provide much needed financial and
emotional resources to offenders’ families (which may include primary victims).
Community notification laws have been in effect for more
than 10 years. Surprisingly, little research has been conducted on the
impact of these laws. Perhaps this dearth of research is due to the tremendous
variation among the states, and even within states, in how these statutes
have been implemented. Regardless of what research does (or does not) tell
us, notification has tremendous support from the public and appears to
be gaining momentum, as evidenced by the rapid increase in states posting
registration lists on the Internet.
An increased awareness of sexual assault and how to prevent
it may well be the best possible outcome of community notification. Efforts
to increase public safety through notification can be furthered by using
the opportunity to educate the public about ways they can help protect
themselves. Even if community notification does not reduce the prevalence
of sexual assault in our society or the recidivism rates of those subjected
to notification, citizens can still benefit from these laws through the
opportunity for education and awareness they offer.
Scott Matson, Research Associate for the Center for Sex
Offender Management was the principal author this paper. Kristin Littel
and Madeline Carter edited the document.
|Center for Sex Offender Management
8403 Colesville Road, Suite 720
Silver Spring, MD 20910
Phone: (301) 589-9383
Fax: (301) 589-3505
|National Alliance of Sexual Assault Coalitions
110 Connecticut Blvd.
East Hartford, CT 06108
Phone: (860) 282-9881
|Detective Robert Shilling
Sex Offender Detail
Seattle Police Department
610 Third Avenue
Seattle, WA 98104
Phone: (206) 684-5588
|Jacob Wetterling Resource Center
32 1st St. NW
St. Joseph, MN 56374
Phone: (320) 363-0470
Fax: (320) 363-0473
|National Center for Missing and Exploited Children
2101 Wilson Blvd., Suite 550
Arlington, VA 22201
Phone: (800) THE LOST
|MPO Lisa Boeving
SPIN Program Coordinator
Tampa Police Department
411 N. Franklin St.
Tampa, FL 33602
Phone: (813) 276-3637
|Mesa Police Department
225 East 1st Street, Suite 102
Mesa, AZ 85201
Phone: (480) 644-2040
Fax: (480) 644-4084
|National Center for Victims of Crime
2111 Wilson Boulevard, Suite 300
Arlington, VA 22201
Phone: (703) 276-2880
Toll Free: (800) 211-7996
Fax: (703) 276-2889
|Washington State Institute for Public Policy
P.O. Box 40999
110 East Fifth Ave., Suite 214
Olympia, WA 98504
Phone: (360) 586-2677
Fax: (360) 586-2793
Adams, D. (1999). Summary of state sex offender registry
dissemination procedures. Washington, D.C.: U.S. Department of Justice,
Bureau of Justice Statistics.
Baldau, V.B. (1999 August). Summary of state sex offender
registries: Automation and operation. Washington, D.C.: U.S. Department
of Justice, Bureau of Justice Statistics.
Born, M. (2000, August 5). Paper drops paedophile campaign.
Center for Sex Offender Management (1997). An overview
of sex offender community notification practices: Policy implications and
promising approaches. Silver Spring, MD: Author.
Freeman-Longo, R.E. (2000). Revisiting Megan’s Law
and sex offender registration: Prevention or problem. Lexington, KY:
American Probation and Parole Association.
Greenfeld, L. (1997). Sex offenses and offenders: An
analysis of data on rape and sexual assault. Washington, D.C.: U.S.
Department of Justice, Bureau of Justice Statistics.
Kilpatrick, D., Edmunds, C., and Seymour, A. (1992). Rape
in America: A report to the nation. Arlington, VA: National Center
for Victims of Crime.
Lieb, R. (1996). Washington’s sexually violent predator
law: Legislative history and comparisons with other states. Olympia,
WA: Washington State Institute for Public Policy.
Lieb, R., Quinsey, V., and Berliner, L. (1998). Sexual
predators and social policy. In M. Tonry (Ed.), Crime and Justice (pp.
43-114). Chicago, IL: University of Chicago.
Matson, S. and Lieb, R. (1996). Community notification
in Washington State: 1996 survey of law enforcement. Olympia, WA: Washington
State Institute for Public Policy.
Matson, S. and Lieb, R. (1997). Megan’s Law: A review
of state and federal legislation. Olympia, WA: Washington State Institute
for Public Policy.
Named Shamed. (2000, July 23). News of the World.
Oregon Department of Corrections (1995, January). Sex
offender community notification in Oregon (Prepared for the 1995 Legislature).
Salem, OR: Author
Phillips, D. (1998). Community notification as viewed
by Washington’s citizens. Olympia, WA: Washington State Institute for
Schram, D. and Milloy, C. (1995).
A study of offender characteristics and recidivism.
Olympia, WA: Washington
State Institute for Public Policy.
Tjaden, P. and Thoennes, N. (1998).
and consequences of violence against women: Findings from the National
Violence against Women Survey. Washington, D.C.: U.S. Department of
Justice, National Institute of Justice.
U.S. Department of Justice (1999, January 5). Megan’s
Law; Final guidelines for the Jacob Wetterling Crimes Against Children
and Sexually Violent Offender Registration Act, as amended.
Register 64 (2), 572-587.
Walsh, E. and Cohen, F. (2000). Sex offender registration
and community notification: A ‘Megan’s Law’ sourcebook.
Civic Research Institute.
Zevitz, R. and Farkas, M. (2000).
Sex offender community
notification: Assessing the impact in Wisconsin. Washington, D.C.:
U.S. Department of Justice, National Institute of Justice.
Established in June 1997, CSOM’s goal is to enhance
public safety by preventing further victimization through improving the
management of adult and juvenile sex offenders who are in the community.
A collaborative effort of the Office of Justice Programs, the National
Institute of Corrections, and the State Justice Institute, CSOM is administered
by the Center for Effective Public Policy and the American Probation and
This project was supported by Grant No. 97-WT-VX-K007,
awarded by the Office of Justice Programs, U.S. Department of Justice.
Points of view in this document are those of the author and do not necessarily
represent the official position or policies of the U.S. Department of Justice.
Back to CSOM Publications
|
<urn:uuid:cc2cb51e-1e34-445e-ae9a-d827c8d9df46>
|
CC-MAIN-2016-26
|
http://www.csom.org/pubs/notedu.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396106.25/warc/CC-MAIN-20160624154956-00078-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.916386 | 13,037 | 2.640625 | 3 |
Rare Books and Printed Material: New Acquisitions Include WWI Book
A recent acquisition is this nearly pristine copy of a 1917 history and pictorial book on a World War I medical training camp at Fort Oglethorpe in the Georgia mountains just eight miles from Chattanooga. Officially named Camp Greenleaf, it was opened in June 1917 while the United States was involved in the Great War. It closed in early 1919 after the war ended. Medical Training Camp Fort Oglethorpe, Georgia is available for viewing in the Annie Belle Weaver Special Collections.
In related collections, the ABW Special Collections also contains a personal photo album from a WWI soldier who spent time at an American hospital in Savenay, France (MS-0008). The owner of the album is unknown, but the photographs capture the grit of trench warfare and mechanized weapons. A former A&M student and teacher, Woodfin Carmical, did military service at Camp Gordon in Georgia. His scrapbook (LH-0023) contains photos and other memorabilia from his service circa 1917-1918.
ABW Special Collections holds approximately 3,000 printed items dating from the 16th century to the present. Collection strengths include:
· Local and regional history and culture, including agriculture, transportation,
education, music, politics, and religion
· Paranormal and humanistic psychology
· Shape Note and Sacred Harp musical traditions
· Publications by current and former faculty, including the works of nationally
known Colonial America scholar John Ferling
Several personal libraries are included in Special Collections:
· David Hooks Library, composed of about 1,600 books from the 19th and 20th centuries covering subjects such as life after death, extra sensory perception, out-of-body experiences, apparitions, and altered states of consciousness. This collection was acquired by Special Collections in association with the Dr. William G. Roll Collection (unprocessed).
· Anne G. Ingram Historical Children’s Literature Collection, consisting of eighty-six volumes dating from the mid-19th to early 20th centuries, which includes works by Louisa May Alcott, Lewis Carroll, James Fenimore Cooper, Charles Dickens, and many others. Anne Ingram was the only child of Irvine S. Ingram, who led first as principal of the 4th District A&M School and then was president of West Georgia College for nearly thirty years.
· Sidney Jourard Library contains 520 works on anthropology, sociology, psychotherapy, religion, philosophy, research, and theory. Many of the books include the psychologist’s margin notes, providing researchers with an idea of the forces that shaped his thinking in the field of humanistic psychology.
· Guillermo Hernandez de Alba book and ephemera collection of 100 items on Colombian colonial history, especially pertaining to Simon Bolivar and General Francisco de Paula Santander. This collection was purchased by the History Department in 1969.
· Many more including the libraries of past university presidents Ingram and James E. Boyd, and immigrant scholar Gregor Sebba
All materials can be found in the Ingram Library catalog and are available for viewing in the Research Room. Materials in Special Collections do not circulate.
|
<urn:uuid:0d5c307c-743a-4eb5-a5ca-4c855368332e>
|
CC-MAIN-2016-26
|
http://www.westga.edu/special/index_6970.php
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395992.75/warc/CC-MAIN-20160624154955-00121-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.947316 | 654 | 2.5625 | 3 |
Inspired by this post, and our science theme of Electricity, I decided to talk to my students about inventors.
We began by discussing “what is an inventor?” and then brainstormed a list of as many inventions as they could think of. They had a hard time wondering what life might be like without a telephone, a car, and even a zipper!
And then the fun began. I pulled out all of our art supplies and asked them to be inventors for the afternoon! I didn’t get too picky with these little learners, some created use-able inventions, some models of inventions they would like to build bigger, and others made slight variations on items that were already invented. Whatever. We were inventing, finding ways to use materials, solving problems, and talking about what we were learning.
We were busy all afternoon, and I heard a lot of “Can I make another one?” and “Can we do this again tomorrow?”
We have been working a lot, as a class, on clearly communicating our ideas to others through the written word. So as an extension of designing our inventions, I took pictures of each inventor and invention and each child wrote a description of what they had designed and how it works. I also videotaped a number of the inventors explaining their design, to be shown as part of our school news. If you want to do this at home, you could always write a letter or send a video or email to a friend or relative showcasing the new invention!
- Read about some famous inventions and inventors
- Create inventions that solve a problem (for instance I asked some of my inventors if they could invent a use for all of the fabric scraps we have accumulated in our classroom!)
- Create inventions using a different set of materials (pipe and tubing would be fun, as would wood scraps)
- Choose a modern invention and try and spend a day without it! Experience a day without a car, or a telephone or electricity.
|
<urn:uuid:fb5063f5-bba7-4e60-bfb3-97717c141321>
|
CC-MAIN-2016-26
|
http://www.artisaninthewoods.com/2012/04/10/we-are-inventors/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393997.50/warc/CC-MAIN-20160624154953-00072-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.983224 | 416 | 3.703125 | 4 |
WEST LAFAYETTE, Ind., May 14, 2014 — Optical imaging of objects as small as DNA strands could be possible using hyperbolic metamaterials. The ultrathin crystalline films act like metals when light passes through in one direction and like dielectrics when light passes in a perpendicular direction. Researchers exploring the metamaterials at Purdue University say practical applications could include quantum computing and high-performance solar cells. “This work is a very important step in terms of fundamental contributions in materials science and optics, as well as paving the way to some interesting applications,” said researcher Alexandra Boltasseva, an associate professor of electrical and computer engineering at Purdue. The metamaterial's hyperbolic dispersion of light. Images courtesy of Purdue University. Hyperbolic metamaterials harness surface plasmons to control light. However, some plasmonic components use metals like gold and silver, which are incompatible with CMOS manufacturing processes and do not transmit light efficiently. To alleviate that issue, the researchers created superlattice crystals by using magnetron sputtering to combine metals and semiconductors with atomic-scale precision using layers of titanium nitride and aluminum scandium nitride. “Here, we develop both plasmonic and dielectric materials that can be grown epitaxially into ultrathin and ultrasmooth layers with sharp interfaces,” Boltasseva said. In the study, the layers of titanium nitride and aluminum scandium nitride were each about 5 to 20 nm thick. The researchers said such superlattices could be developed in 2-nm thickness. The material has been shown to work in a broad spectrum from NIR, essential for telecommunications and optical communications, to visible light, essential for sensors, microscopes and efficient solid-state light sources. At left, a high-resolution transmission electron microscope image shows the interface of titanium nitride and aluminum scandium nitride in a superlattice. At right are images created with a technique that allows the material’s individual layers to be visible. “That's a novel part of this work: that we can create a superlattice metamaterial showing hyperbolic dispersion in the visible spectrum range,” Boltasseva said. A possible application for hyperbolic metamaterials is in planar hyperlenses, which could make optical microscopes 10 times more powerful and able to see objects as small as DNA. Advanced sensors could also be possible, in addition to more efficient solar collectors and quantum computing. The work was funded by the U.S. Army Research Office and the National Science Foundation and is published in Proceedings of the National Academy of Sciences (doi: 10.1073/pnas.1319446111). For more information, visit www.purdue.edu.
|
<urn:uuid:0f1cc24b-d8d1-4bad-92a4-5e7bd0f8aa19>
|
CC-MAIN-2016-26
|
http://www.photonics.com/Article.aspx?PID=6&VID=120&IID=759&Tag=Research+%26+Technology&AID=56190
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783400572.45/warc/CC-MAIN-20160624155000-00146-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.910195 | 586 | 3.59375 | 4 |
(Medical Xpress)—The findings of a 20-year project undertaken by scientists committed to developing improved treatments for chronic kidney disease reveal a significant advance in our understanding of organ failure.
In a new paper published in the journal Immunity, researchers at the School of Medicine demonstrate a novel link that strongly implicates chronic inflammation in organ damage resulting in organ failure. The research paves the way for a new generation of therapies that will protect organs from this type of damage and diagnostics capable of predicting patients susceptible to organ failure.
Critical for patients with kidney failure on peritoneal dialysis (the process uses the patient's peritoneum in the abdomen as a membrane across which fluids and dissolved substances - electrolytes, urea, glucose, albumin and other small molecules - are exchanged from the blood), the peritoneal cavity was used by scientists as a model to show how repeated episodes of infection result in inflammation triggering irreversible tissue damage.
"Damage to organs, such as the heart, lungs, liver, kidneys – in this case the peritoneal cavity – due to chronic inflammation is a significant healthcare issue. Tissue damage results in organ dysfunction and in some cases organ failure requiring transplantation or dialysis," said Professor Simon Jones, one of the lead authors of the study.
The other senior investigator of the paper, Professor Nick Topley, added:
"Preventing infection-induced damage to the peritoneal membrane is critical to the future success of peritoneal dialysis. These findings are a major leap forward as they will allow us to target specific pathways for therapeutic benefit. This will enable us to treat patients for longer and more efficiently and target those who are most likely to develop problems."
Explore further: Snapshot of dialysis: Who's getting treated at home?
Ceri A. Fielding, Gareth W. Jones, Rachel M. McLoughlin, Louise McLeod, Victoria J. Hammond, Javier Uceda, Anwen S. Williams, Mark Lambie, Thomas L. Foster, Chia-Te Liao, Christopher M. Rice, Claire J. Greenhill, Chantal S. Colmont, Emily Hams, Barbara Coles, Ann Kift-Morgan, Zarabeth Newton, Katherine J. Craig, John D. Williams, Geraint T. Williams, Simon J. Davies, Ian R. Humphreys, Valerie B. O'Donnell, Philip R. Taylor, Brendan J. Jenkins, Nicholas Topley, Simon A. Jones. "Interleukin-6 Signaling Drives Fibrosis in Unresolved Inflammation," Immunity, Available online 9 January 2014, ISSN 1074-7613, dx.doi.org/10.1016/j.immuni.2013.10.022.
|
<urn:uuid:ecf0e45d-1253-47d5-a178-173274ba89f1>
|
CC-MAIN-2016-26
|
http://medicalxpress.com/news/2014-01-failure-advances.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397744.64/warc/CC-MAIN-20160624154957-00118-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.886533 | 569 | 2.734375 | 3 |
Newer anti-seizure drugs may have fewer side effects
More recent research supports the use of the anticonvulsants gabapentin (Neurontin) or pregabalin (Lyrica) to help relieve pain caused by damaged nerves.
Both gabapentin and pregabalin are particularly effective in the treatment of postherpetic neuralgia, diabetic neuropathy and pain caused by a spinal cord injury. Pregabalin also may be used to treat fibromyalgia.
Because these drugs have few side effects and are usually well tolerated, they are often the first medications to try for neuropathic pain. You may experience side effects, such as drowsiness, dizziness, confusion or swelling in the feet and legs. These side effects are limited by starting with a low dosage and slowly increasing it.
Medications from other drug classes with distinct mechanisms of pain relief (such as antidepressants) may be used in combination with anti-seizure class medications if anti-seizure medications fail to control your pain.
Side effects limit use of older anticonvulsants
Anti-seizure drugs have been used to treat nerve pain for many years, but their use was limited by the severity of side effects they produce.
Older anti-seizure drugs include:
- Carbamazepine (Carbatrol, Tegretol)
- Oxcarbazepine (Trileptal)
- Phenytoin (Dilantin)
- Valproic acid (Depakene)
Side effects may include:
- Liver damage
- Double vision
- Loss of coordination
If you take an older anticonvulsant, you generally need regular follow-up visits so that your doctor can monitor for side effects. These older drugs often have more side effects than do the newer anticonvulsants, and the evidence supporting use of the older anticonvulsants for neuropathic pain is sparse at times. As a result, older drugs may be recommended only when the newer medications prove ineffective.
As scientists learn more about the way anti-seizure drugs work, this information will be useful in determining which drugs may work best for different types of nerve pain. Pain caused by nerve damage can be disabling, but anti-seizure drugs sometimes provide relief.
Aug. 22, 2013
- Bajwa ZH, et al. Overview of the treatment of chronic pain. http://www.uptodate.com/home. Accessed June 13, 2013.
- Daroff RB, et al. Bradley's Neurology in Clinical Practice. 6th ed. Philadelphia, Pa.: Saunders Elsevier; 2012. http://www.mdconsult.com/books/page.do?eid=4-u1.0-B978-1-4377-0434-1..00051-7--s0085&isbn=978-1-4377-0434-1&sid=1449455838&uniqId=413635127-3#4-u1.0-B978-1-4377-0434-1..00051-7--s0085. Accessed June 13, 2013.
- Lynch ME. The pharmacotherapy of chronic pain. Rheumatic Disease Clinics of North America. 2008;34:369.
- Jongen JL, et al. Neuropathic pain and pharmacological treatment. Pain Practice. In press. Accessed June 12, 2013.
- Diabetic neuropathies: The nerve damage of diabetes. National Diabetes Information Clearinghouse. http://diabetes.niddk.nih.gov/dm/pubs/neuropathies/index.aspx. Accessed June 13, 2013.
- Shingles: Hope through research. National Institute of Neurological Disorders and Stroke. http://www.ninds.nih.gov/disorders/shingles/detail_shingles.htm. Accessed June 13, 2013.
- Facing forward: Life after cancer treatment. National Cancer Institute. http://www.cancer.gov/cancertopics/coping/life-after-treatment/. Accessed June 13, 2013.
- Low back pain fact sheet. National Institute of Neurological Disorders and Stroke. http://www.ninds.nih.gov/disorders/backpain/detail_backpain.htm. Accessed June 13, 2013.
- Fibromyalgia: Questions and answers about fibromyalgia. National Institute of Arthritis and Musculoskeletal and Skin Diseases. http://www.niams.nih.gov/health_info/fibromyalgia/. Accessed June 13, 2013.
- Suicidal behavior and ideation and antiepileptic drugs. U.S. Food and Drug Administration. http://www.fda.gov/Drugs/DrugSafety/PostmarketDrugSafetyInformationforPatientsandProviders/ucm100190.htm. Accessed June 13, 2013.
- NINDS trigeminal neuralgia information page. National Institute of Neurological Disorders and Stroke. http://www.ninds.nih.gov/disorders/trigeminal_neuralgia/trigeminal_neuralgia.htm. Accessed June 13, 2013.
- Watson JC (expert opinion). Mayo Clinic, Rochester, Minn. June 27, 2013.
|
<urn:uuid:a0e8ced6-8c87-4185-a4a1-19cdd3c55db4>
|
CC-MAIN-2016-26
|
http://www.mayoclinic.org/diseases-conditions/peripheral-neuropathy/in-depth/pain-medications/ART-20045004?pg=2
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398516.82/warc/CC-MAIN-20160624154958-00149-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.847087 | 1,143 | 2.515625 | 3 |
Aucune remarque pour cette diapositive
First, there is inherent openness—hardware can be pretty self-explanatory about its composition. To keep that openness intact the challenge lies in defeating the novelty requirement of related patent application or design registrations by open design techniques.Second, breaking up complex systems into simpler modules is not as common in hardware design as in software—despite being promoted as good design practice. Combining modules is potentially more complex as in software as physical forces, mechanical fit and design considerations will have to be taken into account. Third, there are materials involved that may come at a cost and manufacturing processes that may not easily be accessed or require specialist tooling. Different strategies can be employed to overcome such barriers, such as using industrial side-products as raw materials, pooling manufacturing resources or using more universal fabricators.Fourth, the term hardware spans a much broader field than software and includes such far apart things as integrated circuits, home furniture and ship-to-shore container cranes. The different branches of hardware vary according to materials and technologies involved, manufacturing tools and processes, documentation customs and standards, etc., and the above mentioned characteristics may apply to a different extent.
00:47:00Soundbite by Jeremy Rifkin, President of the Foundation for Economic Trends and Adviser to the European Commission, (in ENGLISH) on the global economic crisis and a new economic vision for the world00:28:49
|
<urn:uuid:7903692d-6f06-4082-8d22-0d7ec7b96f10>
|
CC-MAIN-2016-26
|
http://fr.slideshare.net/petertroxler/open-source-in-distributed-manufacturing
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783394414.43/warc/CC-MAIN-20160624154954-00081-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.938831 | 297 | 2.65625 | 3 |
Science and Technology/Engineering
Inquiry and Experimentation
Asking and pursuing questions are keys to learning in all academic disciplines. There are multiple ways that students can ask and pursue questions in the science class. One way is to explore scientific phenomena in a classroom laboratory or around the school. Classroom investigation and experimentation can build essential scientific skills such as observing, measuring, replicating experiments, manipulating equipment, and collecting and reporting data. Students may sometimes choose what phenomenon to study, e.g., for a science fair project. More often, they conduct investigations and experiments that are selected and guided by the teacher.
Students can also examine the questions pursued by scientists in their investigations of natural phenomena and processes as reported or shown in textbooks, papers, videos, the internet, and other media. These sources are valuable because they efficiently organize and highlight the key concepts and supporting evidence that characterize the most important work in science. Such study can then be supported in the classroom by demonstrations, experiments, or simulations that deliberately manage features of a natural object or process. Whatever the instructional approach, science instruction should include both concrete and manipulable materials and explanatory diagrams and textbooks.
Scientific inquiry and experimentation should not be taught or tested as separate, stand-alone skills. Rather, opportunities for inquiry and experimentation should arise within a well-planned curriculum in the domains of science. They should be assessed through examples drawn from the life, physical, and earth and space science standards so that it is clear to students that in science, what is known does not stand separate from how it is known.
In the earliest grades, scientific investigations can center on student questions, observations, and communication about what they observe. For example, students might plant a bean seed following simple directions written on a chart. Then they would write down what happens over time in their own words.
In the later elementary years, students can plan and carry out investigations as a class, in small groups, or independently, often over a period of several class lessons. The teacher should first model the process of selecting a question that can be answered, formulating a hypothesis, planning the steps of an experiment, and determining the most objective way to test the hypothesis. Students should begin to incorporate the mathematical skills of measuring and graphing to communicate their findings.
In the middle school years, teacher guidance remains important but allows for more variations in student approach. Students at this level are ready to formalize their understanding of what an experiment requires by controlling variables to ensure a fair test. Their work becomes more quantitative, and they learn the importance of carrying out several measurements to minimize sources of error. Because students at this level use a greater range of tools and equipment, they must learn safe laboratory practices (see Appendix V). At the conclusion of their investigations, students at the middle school level can be expected to prepare formal reports of their questions, procedures, and conclusions.
In high school, students develop greater independence in designing and carrying out experiments, most often working alone or in small groups. They come up with questions and hypotheses that build on what they have learned from secondary sources. They learn to critique and defend their findings, and to revise their explanations of phenomena as new findings emerge. Their facility with using a variety of physical and conceptual models increases. Students in the final two years of high school can be encouraged to carry out extended independent experiments that explore a scientific hypothesis in depth, sometimes with the assistance of a scientific mentor from outside the school setting.
Skills of Inquiry
- Ask questions about objects, organisms, and events in the environment.
- Tell about why and what would happen if?
- Make predictions based on observed patterns.
- Name and use simple equipment and tools (e.g., rulers, meter sticks, thermometers, hand lenses, and balances) to gather data and extend the senses.
- Record observations and data with pictures, numbers, or written statements.
- Discuss observations with others.
- Ask questions and make predictions that can be tested.
- Select and use appropriate tools and technology (e.g., calculators, computers, balances, scales, meter sticks, graduated cylinders) in order to extend observations.
- Keep accurate records while conducting simple investigations or experiments.
- Conduct multiple trials to test a prediction. Compare the result of an investigation or experiment with the prediction.
- Recognize simple patterns in data and use data to create a reasonable explanation for the results of an investigation or experiment.
- Record data and communicate findings to others using graphs, charts, maps, models, and oral and written reports.
- Formulate a testable hypothesis.
- Design and conduct an experiment specifying variables to be changed, controlled, and measured.
- Select appropriate tools and technology (e.g., calculators, computers, thermometers, meter sticks, balances, graduated cylinders, and microscopes), and make quantitative observations.
- Present and explain data and findings using multiple representations, including tables, graphs, mathematical and physical models, and demonstrations.
- Draw conclusions based on data or evidence presented in tables or graphs, and make inferences based on patterns or trends in the data.
- Communicate procedures and results using appropriate science and technology terminology.
- Offer explanations of procedures, and critique and revise them.
- Pose questions and state hypotheses based on prior scientific observations, experiments, and knowledge.
- Distinguish between hypothesis and theory as scientific terms.
- Either individually or as part of a student team, design and complete a scientific experiment that extends over several days or weeks.
- Use mathematics to analyze and support findings and to model conclusions.
- Simulate physical processes or phenomena using different kinds of representations.
- Identify possible reasons for inconsistent results, such as sources of error or uncontrolled conditions.
- Revise scientific models.
- Communicate and defend a scientific argument.
|
<urn:uuid:8b45aab5-5b21-4458-8a5b-48616e4cf09a>
|
CC-MAIN-2016-26
|
http://www.doe.mass.edu/frameworks/scitech/2001/vision/iande.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402479.21/warc/CC-MAIN-20160624155002-00196-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.921212 | 1,195 | 4.15625 | 4 |
The Puyallup people constitute a Native American tribe residing on a reservation in western Washington's Puget Sound area. The reservation is unusual in that it lies within the city limits of several municipalities. The citified reservation is the home of more than 80,000 residents of various ethnic backgrounds.
The original name of the tribe was spwiya'laphabsh, meaning generous or welcoming. The tribe originally spoke the Puyallup Nisqually tongue of the Salishan family of languages spoken among Northwest Coast original peoples.
Salmon was the main food and an important object of veneration in Puyallup ceremonies. The Western red cedar was used extensively for shelter, clothing, and basketry. The Puyallup were fishers, gatherers, and hunters. They inhabited permanent dwellings along the riverbank. They were closely related to the Nisqually, a larger number of natives residing in the Nisqually River valley.
The first European settler of the Puyallup region was a Dr. Tolmie, who arrived in the early 1830s. He, an Indian guide, and a number of other natives made their way through the valley in which about 2,000 Puyallup lived. Many more settlers would aggressively encroach upon the area over the next couple of decades, which exerted a hugely negative impact on the Puyallup and neighboring tribes.
Finally, to try to shore up their way of life, the Puyallup tribe established relations with the U. S. government on December 16, 1854. Under duress, they and other tribes negotiated with Isaac Stevens, the Washington territorial governor and Indian agent. The result was the Treaty of Medicine Creek, by which the tribes ceded most of their territories, but reserved certain lands and rights including fishing rights.
The Puyallup reservation was established by the treaty and originally comprised 1,280 acres. On January 20, 1856, the reservation was enlarged to 18,062 acres. The people raised wheat, oats and hay on natural meadows near tidal flats on the reservation. Article 10 of the treaty provided for a physician to address the health needs of the Puyallup tribe.
Beginning with the 1877 Dawes Act, a congressional allotment program, the Puyallup reservation was broken up. To encourage farming, Congress authorized the division of reservation land among individual Indians with the exception of a tribal cemetery; much of the land is now in the city of Tacoma. Tacoma's growing population spurred locals to seek removal of restrictions on allotted reservation lands.
On March 3, 1893, an act provided for the selection of allotment portions that were not required for Indian homes, and part of a tract that wasn't required for school purposes. The selected acreage was put up for sale by public auction. The 1893 statute provided that reservation land not sold would remain in Indian hands and not be sold for 10 years. Following that decade, non-Indians could transact directly with Indians. Half of the reservation was sold during that time.
Under the auspices of the Indian Reorganization Act of 1934, which promulgated new rights for Native Americans, the tribe drafted a constitution that was approved by the secretary of the interior on May 13, 1936. The governing body was dubbed the Puyallup Tribal Council.
Bob Satiacum, a proponent of Native American rights in particular treaty fishing rights was a well-known Puyallup tribal leader in the 1960s and '70s. Satiacum first gained notoriety in 1954, when he was apprehended for fishing unlawfully in the Puyallup River at Tacoma. He believed that he had a right by treaty to fish there. Satiacum was convicted; however, the Washington State Supreme Court overturned his conviction.
Years of legal disputation followed over the issue. In addition, "fish-ins" were staged by Satiacum and his supporters, including Marlon Brando, who lent celebrity status to the effort. Eventually, the historic Boldt Decision of 1974 was handed down, which held that treaties signed with native tribes and the federal government in the 1850s entitled the tribes to 50 percent of the total fish harvest.
On February 20, 1984, the U.S. Supreme Court upheld a U.S. Circuit Court of Appeals ruling that a dozen acres acquired by the Port of Tacoma in 1950 properly belonged to the Puyallup. President George H.W. Bush signed a bill that settled Puyallup tribal claims. The tribe was compensated in the amount of $77.25 million.
See Indian Wars Time Table .
See also Native American Cultural Regions map .
|
<urn:uuid:e647e48e-3acf-4865-a728-fc13ebe14e3a>
|
CC-MAIN-2016-26
|
http://www.u-s-history.com/pages/h1563.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397744.64/warc/CC-MAIN-20160624154957-00183-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.972564 | 958 | 3.8125 | 4 |
How the Interagency Process in Washington, D.C., Works
An example of checks and balances in Washington, D.C., is the way in which the different parts of a single branch of government interact. In the executive branch, agencies that have overlapping jurisdiction over a policy issue must coordinate with one another through the interagency process.
An example of the interagency process is the multilayered decision-making process of U.S. foreign policy. In the role of central foreign policy coordinator is the National Security Council (NSC). The National Security Advisor (NSA) is the personal presidential advisor responsible for the NSC agenda, meeting preparations, records, and distribution of NSC decisions.
In a larger capacity, the NSA is responsible for ensuring that the president has the resources to make a fully informed decision, providing him (and someday her) with not only the available policy options but also the risks, opportunities, and political and practical feasibility associated with each option.
At the most senior level, the interagency process is reflected by the Principals Committee (PC), which is chaired by the NSA.
PC membership is up to the president; under the Obama administration, it has included the Secretaries of State, Treasury, Defense, Energy, and Homeland Security; the Attorney General; the Director of the Office of Management and Budget; the Ambassador to the United Nations; the president’s Chief of Staff; the Director of National Intelligence; and the Chairman of the Joint Chiefs of Staff.
Often, other key Cabinet-level officials are invited to attend PC meetings when their issue of responsibility is being discussed.
For example, when international economic or trade policy is on the agenda, additional participants may include the Secretary of Commerce, U.S. Trade Representative, or Secretary of Agriculture.
However, the interagency process is much more complex than just holding meetings among the top Cabinet-level officials. Immediately below the PC is the Deputies Committee (DC), made up of the deputies or relevant undersecretaries of the executive agencies.
The DC is responsible for managing the work of the interagency working groups at the staff level and making sure that the issues that are finally raised for PC and NSC review have been thoroughly evaluated.
Historically, the DC level is where most policy decisions are made before the PC’s review and president’s decision. Usually, the issues that are raised to the PC level are very controversial or have major national security implications.
Beneath the DC (adding more layers to our already-multilayered process) are interagency working groups or policy coordinating committees. These working groups are made up of issue experts, often with a regional or functional focus. Depending on the nature of the issues and responsibilities, these working groups meet regularly or only when an issue requires reconciliation or more than one agency’s involvement in implementing decisions.
Making and implementing policy through the interagency process involves shifting factions and coalitions, just as you find in Congress (although party labels may not be at play in the interagency process). This reality creates built-in checks and balances within the executive branch — and, on occasion, gridlock.
It also gives lobbyists the opportunity to insert themselves into the process by staying in touch with the agencies involved. Smart lobbyists find out where interagency players stand on a specific issue, identify who is driving that issue, and launch targeted advocacy to support or stall it.
|
<urn:uuid:7f854512-01b5-4a45-a40c-b8a6f41ff996>
|
CC-MAIN-2016-26
|
http://www.dummies.com/how-to/content/how-the-interagency-process-in-washington-dc-works.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397636.15/warc/CC-MAIN-20160624154957-00184-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.950962 | 701 | 2.8125 | 3 |
In this section, you will learn how to use break statement with Switch-Case in C.
The switch case statements allows to control complex conditional and branching operations. It include any number of case instances, but should not have the same value. The break statement ends the processing of particular case otherwise, the program continues to the next case and executing all the statements until it reach at the end of the statement. The default statement shows the error message. You can see in the given example, the program prompts the user to enter any number. The expression defined in the switch statement finds whether the number is odd or even. If the number found is even, it will show the first case otherwise it will show the second case.
Here is the code:
Output will be displayed as:
If you enter the number 5, the switch statement checks the condition and shows the second case i.e odd
If you enter the number 6, the switch statement checks the condition and shows the first case i.e even
Posted on: February 5, 2009 If you enjoyed this post then why not add us on Google+? Add us to your Circles
|
<urn:uuid:54e15cb9-d757-4f23-8018-3dee476661b8>
|
CC-MAIN-2016-26
|
http://www.roseindia.net/c-tutorials/c-break-switch-statement.shtml
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783392069.78/warc/CC-MAIN-20160624154952-00052-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.796646 | 232 | 4.28125 | 4 |
Forks of the Neshaminy
The Forks of the Neshaminy is so called because of the narrow, winding stream valleys formed by the juncture of the Neshaminy and Little Neshaminy Creeks. This watershed is approximately 5,600 acres and was recently recognized in the Natural Areas Inventory of Bucks County as an area containing significant natural features, which should receive priority for protection.
This region is also made up of a group of farms united by Neshaminy Creek. Due to topography, they form a visually distinct area that still reflects the region’s agricultural heritage.
To view a map of our Lasting Landscapes® initiative for Forks of the Neshaminy, click in the attatchments box below.
- Forks of the Neshaminy
|
<urn:uuid:a8853c89-ebda-4414-bb5e-bc5cf023130d>
|
CC-MAIN-2016-26
|
https://www.heritageconservancy.org/lasting-landscapes/forks-of-the-neshaminy/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395039.24/warc/CC-MAIN-20160624154955-00095-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.924275 | 169 | 2.65625 | 3 |
April 22, 2010
Gene Found that Plays Role in Intelligence
University of Utah Brain Institute researcher leads multi-institution team in groundbreaking study
SALT LAKE CITY, UT -- Although genetics is the most significant known determinant of human intelligence, how specific genes affect intelligence remains largely unknown. A multi-institution team led by a University of Utah (U of U) USTAR researcher has found that the brain gene STX1A plays a significant role in the level of intelligence displayed by patients with Williams Syndrome (WS). The study may have implications for the understanding of intelligence and treatment of neurological disease in the general population.Researchers at UCLA, Cedars-Sinai Medical Center, Salk Institute, and the U of U found that variations in the expression of STX1A could account for 15.6 percent of cognitive variation in a group of 65 WS patients, a very high level of confidence in comparison to prior genetic studies. STX1A is involved in the electrochemical processes that occur at the brain's synapses.
The research team is under the direction of Julie R. Korenberg, Ph.D., M.D., Brain Institute USTAR investigator and professor of pediatrics at the U of U School of Medicine. The team published the study on April 21, 2010 in the open access / online scientific jounal PLoS ONE.
The study describes a new approach in determining the relationship between gene expression and intelligence in patients with WS, a neurodevelopmental disorder caused by the deletion of only two dozen genes from chromosome 7, a tiny fraction of the almost 30,000 genes found in humans. WS patients have one less copy each of the genes in question than does the general population.
WS patients typically exhibit an IQ of 60, compared to an average of 100 for the general population. WS patients tend to be highly verbal and social, but have difficulty with numbers, visual-spatial perception and memory.
"Williams Syndrome patients are missing a very, very small amount of genetic material," said Korenberg. "In almost all other respects, their make-up is the same as the general population, so we knew to take a very close look at a small number of genes. We analyzed ten different genes, but the data spoke, and STX1A clearly stood out in relation to the different patients' intelligence levels," Korenberg said.
STX1A has a fundamental role in the brain's neurotransmission machinery. It supports the process by which electrical signals speed from one neuron to the next. "In terms of the brain, we're talking about a basic utility when we look at STX1A," Korenberg said.
The study points the way to further research that may have long-range benefits for WS patients as well as the general population. "This study shows in part how Nature's hand shapes intelligence at the synapse. Monitoring gene expression may provide unique insights into the neurobiology and genetics of intelligence in WS subjects and possibly the general population," Korenberg said.
Korenberg suggested there may be pharmaceutical treatments in the future that could help enhance synaptic function. "New studies could suggest ways to help people whose brain function is lacking, such as in Williams Syndrome, or people who are losing brain function, such as in Alzheimer's Disease," she said.
The research team overcame obstacles with some creative problem solving, Korenberg said. Since brain cells from live patients were unavailable for study, lymphoblastoid cells from the lymph system grown in culture provided the genetic material to analyze.
In addition, the researchers developed a more precise measure of WS intelligence test data, using a technique called Principal Component Analysis (PCA). In comparison to standardized IQ tests best suited for the general population, the PCA approach was able to better represent a baseline pattern of intelligence in WS patients. The WS baseline adjusted for relative strengths and weaknesses in the study group, and was able to illuminate the impact of specific genes like STX1A more accurately.
On the Net:
|
<urn:uuid:a5bdb52e-8566-439c-8e79-3ba4ba939114>
|
CC-MAIN-2016-26
|
http://www.redorbit.com/news/science/1854396/gene_found_that_plays_role_in_intelligence/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397696.49/warc/CC-MAIN-20160624154957-00145-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.941668 | 821 | 2.546875 | 3 |
Art looted by Nazis returns to Jewish owners
A man looks at a poster reading "Census of Jews" displayed in an exhibition at the Shoah Memorial in Paris, Feb. 12. The French state prepares to give back seven stolen Nazi-era paintings - four of which are in the Louvre - to two Jewish families, after a decade-long tug of war. It ends years of struggle for the two families, whose claims were all validated by the French prime minister last year. (AP Photo/Jacques Brinon)
The French government has announced that seven paintings seized by the Nazis from Jewish collectors and art dealers in France during World War II are to be returned to their rightful owners.
Three of the paintings are kept in the illustrious Louvre, while four others hang in French national museums.
They were part of a massive haul of 100,000 art works stolen in France by occupying Nazi forces during WWII at the behest of leader and failed art student Adolf Hitler.
The return of the paintings marks welcome progress in a decades-long battle waged by the descendants of the Jewish owners whose collections were plundered during the occupation.
The French government recovered about 60,000 art works following the war, of which about 45,000 were returned to their rightful owners, and another 10,000 were sold on the open market. But at the time, ownership of the balance could not be traced – many of the owners had perished in the Holocaust – and the search for their descendants effectively ceased in 1950.
But Puerto Rican journalist and author Hector Feliciano ignited an explosive debate in France in 1995 with the publication of his book, “The Lost Museum,” in which he listed the looted art then hanging in French museums and accused the government of not doing enough to track the art works’ proper inheritors.
The French government had “stonewalled” Feliciano's research at the time and he was forced to turn to U.S. archives to complete his book.
The French government finally relented and staged an exhibition of more than 1,000 of 2,058 pieces then housed in its national collections.
Six of the seven paintings to be returned – all 17th and18th century works with religious themes – will be returned to 82-year-old American Thomas Selldorf, a grandson of businessman and art collector Richard Neumann, who first fled Vienna for Paris, then Spain, before finally landing in Cuba.
The other painting by Dutch artist Pieter Jansz van Asch will go back to the family of Czech banker Josef Wiener who died en route to a Nazi concentration camp in 1942.
The London Times today reports that British officials say they are ready to accept new claims for looted art in its collections. Arts Council England’s senior policy adviser Gerry McQuillan said a British panel had already returned seven looted paintings since 2001.
Elsewhere around the world descendants of the rightful owners continue their pursuit.
Bill Schiller has held bureau postings for the Toronto Star in Johannesburg, Berlin, London and Beijing. He is a NNA and Amnesty International Award winner, and a Harvard Nieman Fellow from the class of '06. Follow him on Twitter @wschiller
|
<urn:uuid:07c8c184-0314-4e6a-87e8-6661346811fc>
|
CC-MAIN-2016-26
|
http://thestar.blogs.com/worlddaily/2013/02/art-looted-by-nazis-returns-to-jewish-owners.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396100.16/warc/CC-MAIN-20160624154956-00119-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.974317 | 662 | 2.875 | 3 |
At the time when the viceroy was received at Lima, Pedro de Puelles, who was lieutenant of Guanuco under Vaca de Castro, came among the first to pay his compliments and to tender submission to his authority. As he had resided long in Peru, and had great experience in the affairs of that country, the viceroy gave him a new commission, by which he was confirmed in the lieutenancy of Guanuco, to which city he was sent back, with orders to hold the inhabitants in readiness to take the field with their horses and arms in case of need. Puelles not only prepared the people of his government for taking the field, but even retained in his pay some soldiers who had come from the province of Chachapoyas along with Gomez de Soliz and Bonefaz. Thinking it necessary to strengthen his army as much as possible to oppose Gonzalo, who was now marching towards Lima, the viceroy sent Jeronimo de Villegas with a letter commanding Puelles to join him without delay with all his force. On the arrival of Villegas at Guanuco, he and Puelles consulted together on the state of affairs, and concluded that if they should join the viceroy they would give a decided superiority to his side; and after the defeat of Gonzalo, having no one to oppose him, the viceroy would then cause the regulations to be enforced in their utmost rigour, by which the whole colonists of Peru would suffer extreme injury; as by depriving them of their Indians, not only the burgesses to whom they belonged would be reduced to poverty, but even the soldiers would be materially injured, as the burgesses would be no longer in condition to furnish subsistence to the troops as now. They came to the resolution therefore to join the party of Gonzalo, and set out immediately in search of his army for that purpose.
The author of this history.—E.
About that distance to the north of Lima is the
town of Huaura,
which is probably the place indicated in the text, as in many names of
places in Peru the initial syllable Gua or Hua, are
interchangeably used by different authors.—E.
Zarate is exceedingly negligent in regard to dates.
We learn from the
history of America, II. 370, that the present occurrences took place
It has been already mentioned in a former note,
that this is probably
a different orthography for Huaura, a place about 70 miles to the N.N.
W. of Lima.—E.
Arequipa is a considerable way from the coast,
on which there are
several harbours, thirty or forty miles distant.—E.
Garcilasso de la Vega differs somewhat in the
names of one or two of
these leading men who deserted from Gonzalo, and enumerates a
considerable number more, among whom he names one Pedro Pizarro,
saying they were in all about forty, with many of whom he was
|
<urn:uuid:2d150933-7d7a-4b67-a3fb-62c7852a7c46>
|
CC-MAIN-2016-26
|
http://www.bookrags.com/ebooks/12514/428.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397562.76/warc/CC-MAIN-20160624154957-00113-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.985279 | 633 | 2.6875 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.