text
stringlengths
199
648k
id
stringlengths
47
47
dump
stringclasses
1 value
url
stringlengths
14
419
file_path
stringlengths
139
140
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
50
235k
score
float64
2.52
5.34
int_score
int64
3
5
The lima bean is also known as the butter bean. They have a buttery and starchy texture, and are used to complement many meals. They originated in Lima in Peru, and are often cooked and added to soups, salads, casseroles, and bean dishes. So if we can eat them, can guinea pigs eat lima beans, and if so how much can they have? Lets take a look at its nutritional data and in particular its sugar, phosphorus, fat, oxelate acid and calcium content, as these are particularly pertinent to guinea pigs. A good amount of vitamin c would also be beneficial for piggies. Energy 482 kJ (115 kcal) Carbohydrates 20.88 g – Sugars 2.9 g – Dietary fiber 7 g Fat 0.38 g Protein 7.8 g Thiamine (vit. B1) 0.161 mg (14%) Riboflavin (vit. B2) 0.055 mg (5%) Niacin (vit. B3) 0.421 mg (3%) Pantothenic acid (B5) 0.422 mg (8%) Vitamin B6 0.161 mg (12%) Folate (vit. B9) 83 μg (21%) Vitamin E 0.18 mg (1%) Vitamin K 2 μg (2%) Calcium 17 mg (2%) Iron 2.39 mg (18%) Magnesium 43 mg (12%) Manganese 0.516 mg (25%) Phosphorus 111 mg (16%) Potassium 508 mg (11%) Sodium 2 mg (0%) Zinc 0.95 mg (10%) Fluoride 2.2 µg As far as our key ingredients are concerned, you can see Lima beans do contain quite a lot of Phosphourus, a hint of calcium, and some sugar. They also contain no vitamin c at all which is a big let down. Guinea pigs can eat Lima Beans, but they are not great for guinea pigs and give them no nutritional benefit whatsoever. Because of their phosphorus content, they shouldn’t really be fed to guinea pigs often. At most, once a week. But because of their lack of vitamin c, there are much better vegetables available to guinea pigs to eat.
<urn:uuid:7c457de7-9abd-48ee-bffc-6984f191da9a>
CC-MAIN-2016-26
http://www.onlineguineapigcare.com/can-guinea-pigs-eat-lima-beans/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396100.16/warc/CC-MAIN-20160624154956-00013-ip-10-164-35-72.ec2.internal.warc.gz
en
0.898783
515
3.0625
3
Musculus discors (Linnaeus, 1767) Mytiloidea : Mytilidae To size: To 12mm. Shell Structure: Thin but not fragile. Equivalve: Equivalve. Equilateral: Strongly inequilateral beaks close to the anterior margin. Tumidity: Not inflated, umbos low. Outline: Modioliform; ligament margin long, not sloping steeply, angled to posterior dorsal margin; posterior rounded; ventral margin long, more or less straight but often depressed adjacent to non ribbed area; anterior narrow, rounded. Sculpture: Radially ribbed except for smooth median area; 30-40 flat posterior ribs often faint, interspaces narrow; 9-12 prominent anterior ribs; Overall with comarginal lines and growth stops. Margin: Crenulate where radial ribs meet margin. Ligament: Deeply inset extending for most of the posterior dorsal margin. Hinge: Hinge plate narrow, few large dysodont teeth posterior of ligament distinct from marginal crenulations, otherwise smooth. Pallial Musculature: Mostly obscure. Periostracum: Green to greenish brown, thin, persistent. Colour: Grayish white, internally lustrous. Distribution & Ecology Continental Shelf (to 200m) Additional Information & Related Species Mytiloidea : Mytilidae Listed are literature citing Musculus discors (Linnaeus, 1767). Reference containing the species Type Description is highlighted. Linnaeus C 1767. Systema Naturae. Editio duodecima. 1. Regnum Animale. 1&2 Homliae, Laurentii Salvii. 1-532: 533-1327. - Conchological Society of Great Britain & Ireland Provides resources for understanding, identifying, recording, and conserving molluscs Check List of European Marine Mollusca The Marine Life Information Network for Britain and Ireland (MarLIN) provides information for marine environmental management, protection and education. It is a centre of excellence in spatially based and time-series marine biological information and supports good stewardship in the marine environment. - NBN Gateway National Biodiversity Network's Gateway. Use it to explore UK biodiversity data, as contributed by participating data providers. - Malacological Society - Unitas Malacologica - Census of Marine Life MarBEF, a network of excellence funded by the European Union and consisting of 94 European marine institutes, is a platform to integrate and disseminate knowledge and expertise on marine biodiversity, with links to researchers, industry, stakeholders and the general public.
<urn:uuid:ac06e093-fbc9-417a-8ef3-1642ac8ca134>
CC-MAIN-2016-26
http://naturalhistory.museumwales.ac.uk/britishbivalves/browserecord.php?-recid=99
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397873.63/warc/CC-MAIN-20160624154957-00014-ip-10-164-35-72.ec2.internal.warc.gz
en
0.760057
562
2.546875
3
What are feeds? Feeds are a simpler way of keeping up to date with web sites. Rather than having to regularly check your favourite web sites for new stories and articles, you receive summaries of articles automatically as soon as they are published. There's no better way of keeping bang up to date. If something interests you, simply click on it to be taken to the full article on the web site. Feeds (also known as RSS feeds) are free and so is the software you need to receive them. In fact, online services like Google Reader allow you to use feeds without installing any software on your computer. What software do I need? There is a wide array of feed-reading software available for PCs and Macs, or you can use an online service. Some web browsers also have feed reading built in. For PCs we recommend FeedReader3 (www.feedreader.com). For Macs, Vienna (www.vienna-rss.org) is an excellent choice. If you'd rather not install software on your computer, or you want to be able to access your feeds from any computer, use an online service. GoogleReader (www.google.com/reader) is especially good, though Yahoo and Microsoft Live! have similar services. Users of the popular iGoogle personalised homepage (www.google.co.uk/ig) can add feeds to their homepage by simply clicking AddStuff, Add feed or gadget, then pasting in the feed web address. You can specify how many articles appear in each feed on your iGoogle homepage using their drop-down menus. How do I subscribe to a feed? Some web browsers make it especially easy to subscribe to feeds. For instance, when you click on a feed in Firefox it automatically detects that it is a feed and offers to subscribe you to the feed using a web-based feed reader like Google Reader or Firefox's own Live Bookmarks facility - whereby feeds are displayed in your bookmarks and bookmarks toolbar. Safari and Internet Explorer 7 onwards also streamline the process of subscribing to feeds. If your browser doesn't help in this way, subscribing to feeds is still simple. Just click on the feed and cut and paste the URL from your web browser to your feed reader. Often you can achieve the same affect faster by dragging the icon of a feed (usually an orange button with a 'radar' icon) into your feed reader.
<urn:uuid:76d8f4a1-331b-460e-aa45-e4ba36628d18>
CC-MAIN-2016-26
http://www.womensfitness.co.uk/feeds
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398628.62/warc/CC-MAIN-20160624154958-00029-ip-10-164-35-72.ec2.internal.warc.gz
en
0.909664
499
2.515625
3
Flexible electronics set to aid future technological advancementsPublished On: Tue, Aug 30th, 2011 | Semiconductors | By BioNews Plastic-based flexible electronics, produced in large volume using roll-to-roll processing, inkjet printing or spray deposition, represent the “electronics everywhere” trend of the future, a US researcher says. Oana Jurchescu, assistant professor of physics at Wake Forest, her graduate students Katelyn Goetz and Jeremy Ward, and interdisciplinary collaborators from Stanford University, Imperial College (London), University of Kentucky and Appalachian State University, have developed one such organic semiconductor. They have developed, for the first time, an extremely large molecule that is stable, possesses excellent electrical properties, and inexpensive to produce. The technology may eventually turn scientific wonders – including artificial skin, smart bandages, flexible displays, smart windshields, wearable electronics and electronic wallpapers – into everyday realities, they say. Organic electronics build on carbon-based (plastic) materials, which offer not only ease of manufacturing and low cost, but also lightweight and mechanical flexibility, says Jurchescu. “The devices we study (field-effect transistors) are the fundamental building blocks in all modern-based electronics. Our findings shed light on the effect of the structure of the molecules on their electrical performance, and pave the way towards a design of improved materials for high-performance, low-cost, plastic-based electronics,” she added. The study was recently published in Advanced Materials.
<urn:uuid:183bc1a6-e089-42af-9192-50f334e10260>
CC-MAIN-2016-26
http://news.bioscholar.com/2011/08/flexible-electronics-set-to-aid-future-technological-advancements.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393442.26/warc/CC-MAIN-20160624154953-00199-ip-10-164-35-72.ec2.internal.warc.gz
en
0.919929
318
2.84375
3
There are many species of ticks. Of these, a large proportion are capable of carrying disease. Diseases carried by ticks include Lyme disease, Erlichiosis, Rocky Mountain Spotted Fever, Colorado Tick Fever, tularemia, typhus, hemorrhagic fever, and viral encephalitis. (Image courtesy of the Centers for Disease Control and Prevention.) Mark Levin, MD, Division of Infectious Disease, MacNeal Hospital, Berwyn, IL. Review provided by VeriMed Healthcare Network. Also reviewed by David Zieve, MD, MHA, Medical Director, A.D.A.M. Health Solutions, Ebix, Inc.
<urn:uuid:21b2fb0e-2899-450a-902d-30291e4fe576>
CC-MAIN-2016-26
http://www.northside.com/HealthLibrary/?Path=HIE+Multimedia%5C2%5C1254.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397111.67/warc/CC-MAIN-20160624154957-00084-ip-10-164-35-72.ec2.internal.warc.gz
en
0.909326
131
3.234375
3
by Lauren Kane (VM16) Blue Iguana (Cyclura lewisi) The Grand Cayman Blue Iguana (Cyclura lewisi) is endemic to the island of Grand Cayman and is one of the longest-lived species of lizards. Fewer than 15 animals remained in the wild by 2003, and this wild population was predicted to become extinct within the first decade of the 21st century. The species’ decline is mainly being driven by predation by feral pets (cats and dogs) and indirectly by the destruction of their natural habitat as fruit farms are converted to pasture for cattle grazing. Since 2004, hundreds of captive-bred animals have been released into a preserve on Grand Cayman run by a partnership headed by the Durrell Wildlife Conservation Trust, in an attempt to save the species. The Blue Iguana is listed as endangered on the IUCN Red List. In late 2012, the Blue Iguana Recovery Program estimated that the wild population had risen to approximately 750 individuals, and the IUCN subsequently downlisted the species from critically endangered to endangered. The Blue Iguana Recovery Program’s conservation strategy involves generating large numbers of genetically diverse hatchlings, head-startingthem for two years where their chance of survival in the wild is high, and using these animals to rebuild a series of wild sub-populations in protected, managed natural areas.This is accompanied by field research, nest site protection, and monitoring of the released animals. Restored sub-populations are already present in two non-contiguous areas—the Salina Reserve and the Queen Elizabeth II Botanic Park. For more information, please check out, http://www.blueiguana.ky/
<urn:uuid:c6d1e13e-4aff-4176-9e7a-939e7bde8dd6>
CC-MAIN-2016-26
http://publish.illinois.edu/wildlifemedicalclinic/2014/02/26/featured-endangered-wildlife-species-2/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396100.16/warc/CC-MAIN-20160624154956-00126-ip-10-164-35-72.ec2.internal.warc.gz
en
0.939634
350
3.8125
4
It looks like you're using an Ad Blocker. Please white-list or disable AboveTopSecret.com in your ad-blocking tool. Some features of ATS will be disabled while you continue to use an ad-blocker. An ancient Roman lead scroll unearthed in England three years ago has turned out to be a curse intended to cause misfortune to more than a dozen people, according to new research. Found in East Farleigh, U.K., in the filling of a 3rd to 4th Century AD building that may have originally been a temple, the scroll was made of a 2.3- by 3.9-inch inscribed lead tablet. Popular in the Greek and Roman world, these sorts of "black magic" curses called upon gods to torment specific victims. Rolled up to conceal their inscriptions, the tablets were either nailed to the wall of a temple or buried in places considered to be close to the underworld, such as graves, springs or wells. He deciphered the Latin names Sacratus, Constitutus, Memorianus, Constant[...] and the Celtic names (Atr)ectus and Atidenus. Eight other names are incomplete.
<urn:uuid:a0dfdadf-a89c-4144-9f2c-8b011eb973b5>
CC-MAIN-2016-26
http://www.abovetopsecret.com/forum/thread874312/pg1
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783404382.73/warc/CC-MAIN-20160624155004-00008-ip-10-164-35-72.ec2.internal.warc.gz
en
0.93841
249
3.078125
3
for National Geographic News Kings of the corporate jungle survive by using conflict and cooperation techniques honed by their primate relatives, a new book asserts. The Ape in the Corner Office: Understanding the Workplace Beast in All of Us, by award-winning journalist Richard Conniff, examines corporate behavior through the eyes of a primatologist. - Lemur Logic May Provide Clues to Primate Intellect Evolution - Females are Dominant Sex, Primate Study Suggests - Chimps Show Hallmark of Human Culture, Study Finds - Lemur is First Known Hibernating Primate, Study Says - Chimps, Humans 96 Percent the Same, Gene Study Finds - "Gorilla Mafia?" Groups Ruled by Related Males, Study Says Conniff suggests that the ways in which humans manage conflict and cooperation are key to their successes or failuresjust like primates. He also explains that while aggression can be effective, nice guys certainly don't finish last. Killer Apes or Cooperative Apes? Primates and humans are essentially social creatures, Conniff posits. "We have the idea that we are 'killer apes,' as the expression goes, but we are quintessentially cooperative apes," he told National Geographic News. "Conflict and aggression are normal primate behaviors, and that's not a bad thing. But most people's perception of the animal world is that they think it's only [full of] conflict." Conniff believes conflict plays an important but more limited social role in the wild than cooperation. "Even chimps, who have a reputation for being brutal, only spend 5 percent of the day in antagonistic behaviors and 15 to 20 percent of the day grooming one another," he said. But invariably it's aggression that gets attention. Human perceptions of office behavior might be skewed toward less frequent but dramatic events. "We really pay attention to conflict in the office, because it can affect our survival in the job," Conniff noted. "But the rule is people being nice to each other, being polite to each other, opening doors for each other. It's crucial to having a successful workplace." SOURCES AND RELATED WEB SITES
<urn:uuid:fde42f94-d626-44a8-8032-659d5371889b>
CC-MAIN-2016-26
http://news.nationalgeographic.com/news/2005/09/0923_050923_ape_office.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397567.28/warc/CC-MAIN-20160624154957-00150-ip-10-164-35-72.ec2.internal.warc.gz
en
0.928491
460
2.703125
3
This press release is available in German. The Galapagos giant tortoise, one of the most fascinating species of the Galapagos archipelago, treks slowly and untiringly across the volcanic slopes. Scientists of the Max Planck Institute for Ornithology in Radolfzell, together with the Charles Darwin Foundation, have used GPS technology and modern 3D acceleration measurements to find out that especially the dominant male tortoise wanders up to 10 kilometres into the highlands of the island. Only the fully grown animals migrate, the young tortoises stay year round in the lowlands. The reason for this and the question of why the animals don't rest during the dry season are not known yet. Even Charles Darwin anticipated that the giant tortoises wandered large distances. In the cool dry season, the highlands of Santa Cruz are engulfed in fog which allows the vegetation to grow despite the lack of rain. In the lowlands, however, there is no thick layer of clouds and the tortoises' vegetation is not available year round. Adults, which can weigh up to 250 kilogram, spend the dry season in the higher regions at an elevation of 400 meters above sea level. However, since the food is not as nutritious there, they trek back to the lower zones where there is succulent vegetation in abundance as soon as the rainy season begins. In order to study the migratory pattern more closely, Stephen Blake from the Max Planck Institute for Ornithology and his colleague Washington Tapia from the Galapagos National Park secured GPS loggers with 3D acceleration monitors onto 17 adult tortoises. This allowed the scientists to determine the animals' exact position and behaviour over a period of two years. In order to gather information on the entire population, the researchers noted the size, sex and location of each tortoise they met on their monthly hikes along the volcanic hillsides. They combined the GPS data with the temperature data and information about availability of vegetation. The results show that the tortoises have a partial migration system, where not every individual migrates. Only the adult animals wander and only the larger specimens are more likely to move. In June they start their slow, tedious march which can be up to ten kilometres long into the highlands. Adult females remain in the lowlands until they lay their eggs and then they also make their way to the highlands. In contrast, the smaller tortoises stay in the lower elevated areas all year round. Although giant tortoises are able to survive for up to one year without nourishment, which made them a popular staple for seamen, they nevertheless wander for large distances searching for food as this study shows for the first time. Why don't they just look for a shelter? The question of why the younger animals don't migrate hasn't been answered by the scientists yet. "Either the energy expenditure of this strenuous hike is too high, or there is still enough food available for the smaller animals." Stephen Blake suspects, "perhaps the younger animals can't tolerate the wet cold climate of the higher regions." In other species, the largest and the most dominant individual does not migrate because it can best defend itself against its competitors. It doesn't have to leave to survive. However, among the Galapagos tortoises, it's usually the largest and most dominant individual which takes on this arduous journey. Future studies on giant tortoise species of the other Galapagos Islands with varying ecological conditions will show how environment influences the migration scheme of these closely related reptiles. The scientists also want to include factors such as age, size, sex and morphology in their studies to see why the behaviour changes in different lifetime stages and what the trigger of migration is. Despite the threat of hunting, invasive species such as goats and rats, and the loss of habitat due to man, the Galapagos Tortoise still shows its original migrating behaviour. This and future studies will help to maintain this behaviour with the help of effective measures such as establishing corridors, preserving key habitats, keeping tortoise-friendly roads and maintaining less urban development. Based on its importance to the Galapagos Archipelago ecosystem as an herbivore and seed disperser, the annual migration of the tortoise must be preserved. |Contact: Martin Wikelski|
<urn:uuid:23140d17-de51-440f-b16f-be6610c07b11>
CC-MAIN-2016-26
http://www.bio-medicine.org/biology-news-1/Galapagos-tortoises-are-a-migrating-species-27606-1/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395346.72/warc/CC-MAIN-20160624154955-00158-ip-10-164-35-72.ec2.internal.warc.gz
en
0.94041
877
3.765625
4
May Is National Teen Self-Esteem Month Girl Scouts of Greater New York is proud to participate in National Teen Self-Esteem Month, established to emphasize the importance of self-esteem and self-image for teen girls. Many teen girls have their lives shaped for the worse by low self-esteem and poor self-image. In our society, film, pop music, television, and social media all put girls under frequent pressure - including from their own peers - to conform to a certain narrow image. This can be highly harmful to their ability to learn and lead, putting them at increased risk of depression, eating disorders, drug abuse, suicidal thoughts, and abusive relationships. According to a 2008 survey, 70 percent of girls "believe they are not good enough or do not measure up in some way, including their looks, performance in school and relationships with friends and family members." It doesn't have to be this way. Every day, Girl Scouts is changing girls' lives for the better by instilling in girls the courage, confidence, and character that empowers them to overcome these challenges. Every day, girls are triumphing over the negative, shallow, and sexist images of girls and women that pervade our culture in order to become future leaders. National Teen Self-Esteem Month is an opportunity for girls to: - help build self-esteem in others by developing a positive attitude and encouraging others to reject unrealistic and unhealthy images as ideals - act with confidence to lead in their communities - identify adults who can act as role models and self-esteem builders - act as positive role models for younger girls The research of Girl Scouts of the USA illustrates the power of high self-esteem and its importance to building future women leaders. According to the findings of the recent Change It Up! report, promoting leadership in girls is primarily a matter of nurturing their self-confidence and providing supportive environments for them to learn leadership skills. In fact, confidence in their own skills and competencies is the most important factor in driving girls to actively pursue leadership.
<urn:uuid:5be3c232-e813-496d-a0a3-c8593682c811>
CC-MAIN-2016-26
http://www.girlscoutsnyc.org/blog?p=727
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783400031.51/warc/CC-MAIN-20160624155000-00148-ip-10-164-35-72.ec2.internal.warc.gz
en
0.965685
422
3.203125
3
Constitution Hall - Other related materials Constitution Hall tells the stories of the town of Lecompton, the Land Office where American Indian lands were sold by the U.S. government to settlers, surveying the territory. Collections on exhibit - Ely Moore used this desk from 1857 to 1860 and made sure legal procedures were followed - Plump bob Cool Things - stories from our collections - Calhoun's Candlebox - Hand shackles, seldom used in Kansas Territory - Pitcher belonging to a former slave - Community activities items from Masons, Oddfellows, Modern Woodmen, and Ku Klux Klan. Browse these collections items related to Constitution Hall but not on display at the site. Kansas Memory - items featured in our digital archives related to Constitution Hall Bibliography - Lecompton Constitution resources National Register - nomination for the site
<urn:uuid:a60dace3-f2a3-4446-9688-c41dd15d263f>
CC-MAIN-2016-26
http://www.kshs.org/p/constitution-hall-collections/15524
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397873.63/warc/CC-MAIN-20160624154957-00000-ip-10-164-35-72.ec2.internal.warc.gz
en
0.901551
182
2.65625
3
& Joannie Dobbs Wednesday, Exercise program can result in quick weight This time of year, many people get serious about fitness and vigorously jump into various types of exercise programs. Typically, their immediate expectation is weight loss. However, a new exercise program can cause immediate weight gain, even if done right. This experience has probably curtailed the best fitness intentions for millions of people every year. Take the case of a person starting up a new strength-training program with weight lifting. Their muscles are not accustomed to this type of exercise and they can become very sore during the days following the workout. Exercise physiologists call this phenomenon delayed-onset muscle soreness, or DOMS. This type of soreness is thought to be caused by a variety of factors, including physical damage or minute tears in muscle tissue. In addition, the muscle tissue becomes inflamed and slightly swollen by fluid retention. This temporary retention of fluid can result in a 3- to 4-pound weight gain within a few days of the workout. Most people are motivated enough to put up with muscle soreness, but if they are watching the scale go up, they can grow discouraged. Understanding that this is a normal and temporary phenomenon can help to maintain motivation. This is one reason many fitness experts recommend starting up an exercise program gradually, allowing your body to adapt to the new stresses. If you experience a significant amount of soreness, you are starting your exercise program with too much intensity. After a couple weeks of strength training, some increase in muscle size will typically take place. Of course, this can show up as weight gain even though body fat is being lost. Muscle is heavier than fat, so a pound of muscle takes up less space than a pound of fat. Consequently, muscle development can mask fat loss if you are watching the scale. Yet, your waist, hips and thighs can be shrinking in size and your clothes will fit better. Also, an increase in muscle tissue results in increased calorie needs, even at rest. A quick start-up to an aerobic exercise program can also result in immediate weight gain, partly related to the fluid retention of delayed-onset muscle soreness. But another natural phenomenon can increase the water content (and weight) of muscles even more. As a person adapts to an aerobic exercise program, their muscles get better at storing carbohydrate in a form called glycogen. To muscles, glycogen is the storage form of high-octane fuel. During exercise, muscles break down glycogen to a high-energy source called glucose. A steady supply of glucose is essential for maintaining moderate- to high-intensity exercise. So far, so good. But here's the rub: Along with each additional gram of glycogen stored in the muscles, about 3 grams of water are stored, resulting in a weight gain of as much as 2 to 4 pounds. The increased storage of glycogen is important to the training program. It means extra carbohydrate calories from the diet are more likely to be stored as glycogen instead of fat. In the long run, this immediate weight gain will prove advantageous for the loss of body fat and maintenance of the loss. Increased glycogen storage also provides more of the high-octane fuel needed to maintain a quality training program that enhances overall health. If you start up a new exercise regimen, ignore the scale for at least a month and rest assured that you are doing the right thing for your body. Alan Titchenal, Ph.D., C.N.S. and Joannie Dobbs, Ph.D., C.N.S. are nutritionists in the Department of Human Nutrition, Food and Animal Sciences, College of Tropical Agriculture and Human Resources, UH-Manoa. Dr. Dobbs also works with the University Health Service © 2002 Honolulu Star-Bulletin -- http://starbulletin.com Human Nutrition, Food & Animal Sciences · University of Hawai`i at Mānoa 1955 East-West Road · Honolulu, HI 96822 Page was last updated on:
<urn:uuid:3f74138e-5617-4593-9c01-96dcbfa7e414>
CC-MAIN-2016-26
http://www.nutritionatc.hawaii.edu/HO/2002/135.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395679.92/warc/CC-MAIN-20160624154955-00073-ip-10-164-35-72.ec2.internal.warc.gz
en
0.940159
838
2.609375
3
BOSTON — ``Listen, my children, and you shall hear of the midnight ride of Paul Revere.`` -Henry Wadsworth Longfellow To most Americans, July 4 marks the nation`s birthday, but ask any Bostonian worth his beans and he`ll tell you that April 18 is when U.S. history really got started. For it was at 10 p.m. on that date in 1775 that a 40-year-old gold- and silversmith (and part-time dentist) named Paul Revere left his small frame house on North Square to embark on the midnight mission that would become immortalized by the poetry of Henry Wadsworth Longfellow. That house, which already was 90 years old when Revere moved in with his wife, Sara, their five children and his elderly mother, Deborah, still stands- the last remaining structure from 17th Century Boston. Each year about 200,000 people walk through. Many tourists like to visit ``the Reveres` place`` in April when New Englanders celebrate Patriots Day on the third Monday, a period filled with parades, battle re-enactments, musters and ceremonies that commemorate the events of April 18-19 and the start of the American Revolution. Two lanterns are hung in the steeple of nearby Old North Church, guns roar as the Battle of Lexington heats up once again and you can usually find a modern version of Revere himself riding off in a cloud of dust to warn of the British approach. (The Boston Marathon, now a regular part of the Patriots Day activities, was added in 1897.) But there is something to be said for a walk through the three-story structure any time of year, as it offers lessons about the way people lived in those days. Detours along the ride For example, you`ll discover that the midnight ride was not a total success. Revere made it to Lexington, where he succeeded in warning John Hancock and Sam Adams of the British approach. From there he set out toward Concord, but never arrived. Riding with William Dawes, a second courier, and Samuel Prescott, a local doctor, he was intercepted by a British patrol halfway to Concord. Dawes eluded the patrol but lost his horse and never reached his destination. Revere was detained for a short time, his horse taken from him; he was forced to return to Lexington on foot. Only Prescott escaped and completed the mission to Concord. By the time Revere bought the place in 1770, the house already had changed hands several times. It was built in 1680 by Robert Howard, a wealthy merchant. It had also undergone several alterations. The roofline was raised, with windows added to the third story. Today, the house reflects both its original 17th Century appearance and the later Revere period, and the self-guided stroll through the four rooms open to visitors provides a pretty good impression of the way the Reveres lived. For urban women such as Sara (and Paul`s second wife, Rachel, whom he married in 1773 after Sara`s death) managing the household was a full-time job, with food preparation a major portion of the task. The kitchen, with its wooden crossbeams and low, white ceiling, is typical of the 18th Century. Iron pots, kettles and other cooking utensils hang over the brick fireplace; foodstuffs hang from the walls. Next to the kitchen on the first floor is a room called ``The Hall.`` The oak-beamed room was certainly the most versatile in the Colonial house. At various times of the day it was used as a parlor, dining room, spare bedroom, workshop and business office. The English and American furniture in this room reflects the period before the Reveres moved in, probably closer to what was used by Howard. They include a press cupboard for linens; a day bed; a three-cornered chair; and a gateleg table. Upstairs, in the yellow-and-white ``Best Chamber,`` there are several pieces of furniture that belonged to the Reveres. They include the bowfront dresser to the left of the bed; a large upholstered chair, now recovered in a period cream, red and green floral print on cotton; and a ladies` work table with a green sewing basket on it. The four-poster bed is a period piece, but not one actually used by the Reveres. Here again, the room is multifunctional, serving as master bedroom and elegant parlor. The practice of using rooms for several purposes was common in middle-class homes, which often didn`t have separate parlors or sitting rooms. On the way into the children`s room there is a fascinating showcase containing several original Revere silver engravings as well as an ad for his dental services. (He made house calls.) Between 1768 and 1775 Revere supplemented his income by cleaning original teeth and wiring in false ones-a trade he had picked up from Dr. John Baker, the local surgeon-dentist. A look at the small upstairs children`s room reminds one that Revere`s two marriages produced 16 children.
<urn:uuid:21463c61-783f-4ce2-9cc7-ff3f3ed95335>
CC-MAIN-2016-26
http://articles.chicagotribune.com/1991-04-14/travel/9102030082_1_paul-revere-ride-patriots-day
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783394605.61/warc/CC-MAIN-20160624154954-00147-ip-10-164-35-72.ec2.internal.warc.gz
en
0.971712
1,078
2.828125
3
Like the United States, Japan, too, has a long history of comics. Manga didn’t take off in popularity until Osamu Tezuka entered the picture, but just as well, cartooning has always existed in the country. One of the early stars in manga is Norakuro. Norakuro is a black dog enlisted in the “Mokenrentai” (Fierce Dog Brigade), an Imperial army of dogs fighting in a war against the enemy Monkey Army. This war-time comic first appeared in 1931 in Shonen Club (Boy’s Club) magazine and was clearly based on the Japanese Imperial Army of the time. His creator, Suihō Tagawa (1899-1989), served in the army and used his experience as a basis for his strip. Norakuro is a stray black-and-white dog in an army of white dogs who blundered his way while being a Private Second-Class. As pointed out by Aaron Herald Skabelun in his book Empire of Dogs: Canines, Japan, and the Making of the Modern Imperial World, Norakuro defied the Japanese expectation that the army is brave; he and his men got captured, surrendered to the enemy Monkey army (a not-so-subtle representation of the Chinese army) and cried, which goes against the Imperial Army’s supposed image. But in spite of that, he would escape and use the information obtained to capture the Monkey troops. Throughout the comic’s 10 year run Norakuro was promoted from Private to Colonel. Design-wise, the character was influenced by Felix the Cat. Tagawa was an avid watcher of the Pat Sullivan films, which had distribution in Japan at the time. Norakuro was one of the the first biggest cartoon star in Japan. According to Skabelun, the circulation of the Shonen Club went up at the peak of the comic’s run, its success attributed to the comic. It had profound influence on Machiko Hasegawa, who went on to create Sazae-San. Osamu Tezuka also cited Tagawa as one of his influences. Tezuka would go on to popularize the comic medium further in Japan. Even though the regular comic run ended in 1941, this was not the end of Norakuro. Far from it. As expected, Norakuro was animated numerous times. Three short films were produced between 1933 and 1935. The first film was directed by Yasuji Murata (1896-1966), with the latter two by Mitsuyo Seo (1911-2010). Both men were pioneers in the Japanese animation field, having made some of the earliest anime to be shown in mainstream. These films were crude and primitive, but they exhibit the source material’s appeal. One can compare these to Pat Sullivan’s Felix the Cat films that were being made a decade before. A TV anime was later made several decades later. Produced by TCJ Doga Center (now Eiken), the 26 episode series, which ran on Fuji Television from October 5, 1970 to March 29, 1971, were relatively faithful to the comics. One big change, however, was the addition of the army nurse Miko, whom Norakuro had a crush on. For this series, Norakuro was voiced by Nobuyo Ooyama, who would later become noted for voicing Doraemon. Click Here to see the first episode of the 1970 series. A second TV series was made in the 1980s. Called Norakuro Kun, this is the Japanese equivalent of the “spinoff babies” craze that American television had in the 1980s with the likes of “Flintstones Kids” and “Muppet Babies”. Here, the original Norakuro, now retired, decides to open a detective agency, with his grandson, Norakuro-Kun, as his assistant. The new show focuses on the grandson, with his grandfather (dubbed ‘ Norayama Kuroyoshi’ in order to differentiate with the younger star) in the supporting role. They rent a house with the human family. Norakuro-Kun befriended the brother and sister and the two go solve crime together. The new show aired from October 4, 1987 to October 2, 1988 on Fuji Television for 50 episodes. It was produced by Studio Pierrot, known to anime fans for producing Urusei Yatsura and Naruto. These days Norakuro is obscure, popularity surpassed by other manga and anime that was introduced since its run. But its influence in Japan can’t be downplayed. There’s a Norakuro Museum, located in Koto-ku, Tokyo, which people can visit for free.
<urn:uuid:fb90a5e4-2927-4f01-82a2-5fde1a52ad39>
CC-MAIN-2016-26
http://cartoonresearch.com/index.php/norakuro/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396459.32/warc/CC-MAIN-20160624154956-00043-ip-10-164-35-72.ec2.internal.warc.gz
en
0.983874
992
2.671875
3
Translation of "hour" - English-Mandarin Chinese dictionary › [C] a period of 60 minutes The exam lasted an hour and a half. There are 24 hours in a day. How many hours' sleep do you need? I'll be back in an hour's/two hours' time (= after one/two hours). The village is an hour from Doncaster/an hour away (= It takes an hour to travel there). He gets paid by the hour (= gets a particular amount of money for each hour he works). Trains leave every hour on the hour (= at exactly one o'clock, two o'clock, etc.). Buses leave at ten minutes past/to the hour (= at ten past/to one o'clock, two o'clock, etc.). War was declared at eighteen hundred/18.00 hours (= at six o'clock in the evening). Specific periods of time work long/regular/unsocial, etc. hours › used to describe how many hours in the day you work or what part of the day you work She's a nurse so she often works unsocial hours. He's paid well but he works long hours. Working hours and periods of workWork, working and the workplace for hours (and hours) informal › for a very long time I waited for him for hours. Continue and last at all hours (of the day and night) disapproving
<urn:uuid:5ec990fc-8ec2-4d53-8a95-ff33498db335>
CC-MAIN-2016-26
http://dictionary.cambridge.org/dictionary/english-chinese-simplified/hour
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397428.37/warc/CC-MAIN-20160624154957-00051-ip-10-164-35-72.ec2.internal.warc.gz
en
0.799749
301
2.578125
3
In (1+1)D, the hyperbolic system (4.17) requires two initial conditions. That is, we require the knowledge of initial current and voltage distributions along the line. We would like to enter the discrete equivalent of this data into the delay registers somehow at the first time step . From Figure 4.14, it should be clear that four sets of data are required: , , , which are the initial incoming waves at the parallel junctions, and , the values initially stored in the self-loops at the series junctions. The first problem we encounter is that, on our decimated grid, we calculate values of and , the grid functions corresponding to voltage and current, at alternating time steps. We have chosen our grid such that for and half-integer, is calculated for odd values of , and for even; at time zero, then, is accessible (as a combination of wave variables). How then do we enter the current initial data into the algorithm? It turns out that this problem is rather simply addressed. We can do one of two things: set the value of at time step to be equal to a sampled version of , and accept the error that this introduces, which will be , or we can use any available numerical method (i.e. one which does not operate on a staggered grid) to propagate the initial data forward by . Such a method should be at least accurate, but it is allowed to even be unstable, since we will only be using it to update once . Assume then, that our initial data are , and , some approximation to obtained by either of the methods mentioned above. At time step , we can write the junction voltages as We may ask, however, whether there is a way of setting the initial values such that we achieve better initial accuracy. For a network of type I, say, we have . Then, if is non-zero everywhere (this can always be arranged by operating slightly away from CFL), we may use These initialization procedures generalize simply to (2+1)D, where the parallel-plate equations require three initial conditions , and . In general, we now have seven wave variables to set: the waves approaching any parallel junction with coordinates at , namely , , , and , as well as the values stored in the self-loop registers at the series junctions, and . For the sake of brevity, we provide only the settings for the general case, analogous to (4.75): Because DWNs of the forms discussed in the previous sections are equivalent to two-step finite difference methods, problems with parasitic modes do not arise as they do in wave digital networks which simulate the same systems. This problem was discussed in detail in §3.9.
<urn:uuid:a534dcd0-fdf3-4460-9903-41c29a3b52c6>
CC-MAIN-2016-26
https://ccrma.stanford.edu/~bilbao/master/node122.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399425.79/warc/CC-MAIN-20160624154959-00019-ip-10-164-35-72.ec2.internal.warc.gz
en
0.928312
560
2.515625
3
Some causative factors - Vitamin B6 deficiency - Vitamin C deficiency - Vitamin E deficiency Plasma levels of vitamin B6 were found to be very low in 16 sickle cell anaemia sufferers compared with normals. Supplementation with 100 mg vitamin B6 per day resulted in an increase in number of red cells and haemoglobin. Natta CL et al: Apparent vitamin B6 deficiency in sickle cell anaemia. Am J Clin Nutr 40(2):235-9, 1984. Promising nutritional research Sickled red blood cells are more susceptible to peroxidation than normal red cells. Vitamin E deficiency promotes red cell susceptibility to peroxidation and could lead to cell abnormalities, capillary obstruction and tissue damage. The investigators propose that sickle-cell patients would benefit from vitamin E supplementation. Chiu D et al: Peroxidation, vitamin E and sickle-cell anaemia. Ann NY Acad Sci 393:323-35, 1982. Three years after beginning a wholefood diet free of added salt, with homoeopathic remedies, multivitamins, calcium pantothenate and vitamin E, a 40-year old woman with von Willebrand’s disease was free of all symptoms and abnormal bleeding. Hayman-Budden G, Nutritional Therapy Today 2(2):4, 1992. Society for the Promotion of Nutritional Therapy, UK. 11 patients with idiopathic thrombocytopenic purpura were treated with 2 grams of vitamin C daily. 7 patients responded well and suffered no relapses. Brox AG et al: Treatment of idiopathic thrombocytopenic purpura with ascorbate. Brit J Haematol 70:341-44, 1988. Information compiled by Linda Lazarides Naturopathic Nutritionist, Author, Educator
<urn:uuid:82199b9d-a2ea-4e59-b3bb-501bef07e294>
CC-MAIN-2016-26
http://www.health-diets.net/research/health-issues/blooddisorders/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402746.23/warc/CC-MAIN-20160624155002-00044-ip-10-164-35-72.ec2.internal.warc.gz
en
0.844083
388
2.5625
3
The documentary series "Lost Worlds," broadcast by National Geographic TV, continued on April 16, 2003 with the episode "Human Invasion." The program contained speculation regarding the last 50,000 years of the so-called evolution of man and called on interpretations by various evolutionists. Yet again, National Geographic TV engaged in propaganda concerning the theory of evolution and its most popular component, the "evolution of man" scenario. The program described how hand-made objects and various artistic products from the period showed how there had been a kind of intellectual leap in human beings and also contained various evolutionist speculation about the capacity for speech and thought. These evolutionist accounts of National Geographic TV"s about the origin of speech and thought were devoid of any scientific foundation and were speculation entirely dependent upon preconceptions. One of these contained the following statements: Every child still exhibits this astonishing change (beginning to speak). He builds sentences by using simple words and verbs. By the age of three he suddenly discovers grammar. Language, learnt very quickly and easily, may be an instinctive ability. One can also refer to it as an evolutionary leap which began in the Stone Age. Since the theory of evolution maintains that man evolved from an ape-like creature it also regards all these human characteristics as having emerged during this so-called evolutionary process. As well as possessing no scientific evidence, evolutionists have no propaganda difficulties regarding the "physical" aspect of this so-called evolution. Discoveries of fossils of extinct species of ape and the remains of disappeared human beings prepare the ground for wide-ranging speculation. It is by no means difficult, with the use of one"s imagination, to design the physical features of a creature somewhere between the ape-like ones of an imaginary ancestor and those of modern man: slow progress from walking on four legs to an upright posture and walking on two, a gradual reduction in the amount of body hair, the gradual disappearance of the protuberances on the hands and feet used for climbing trees and an increasing resemblance to human hands and feet, etc. Yet human beings have another property whose physical features cannot be seen, something for which evolutionists are unable to suggest any intermediate stage: thought. Nothing is known about the physical foundations of consciousness, the source of thought. To put it more accurately, there are no such foundations. Computer-supported brain scans have revealed not the slightest clue about the foundations of thought, and all attempts to seek those foundations within the brain cells have proved fruitless. That is only to be expected, since the cells which make up the brain consist of atoms such as oxygen, carbon, hydrogen and nitrogen. It is clear that atoms can neither "know," "feel" nor "think." Such properties belong to the soul, something which belongs beyond the material realm. The fact that these statements on National Geographic TV refer to language as an evolutionary leap or instinct is an expression of that helplessness. The term "evolutionary leap" really means "it somehow happened to suddenly evolve" and is an implicit admission of defeat aimed at sliding out from under the ruins. That is because what evolutionists refer to as instinct is nothing more than a characteristic which cannot be shown to be linked to any physical structure even though it is observed in behavior. Instinct, in other words, represents a real "unknown" for evolutionists rather than being an explanation. The efforts to resolve this unknown from an evolutionist perspective appears to have left National Geographic TV in the middle of an unsolvable difficulty. Unable to make a comment regarding the imaginary evolution of consciousness, evolutionists resort to chance mutations as a way out whenever they are trapped in a corner on this issue. Indeed, one evolutionist whose views are cited in the program does just that: Forty thousand years ago there was a major change in modern human beings" thinking. There was a different part of the mind in which different intelligences controlled social, technical and grammatical intelligence etc. In some way these different areas came together. How the human mind emerged is not known. Brains might have undergone a change resulting in a restructuring in a different way, perhaps due to a genetic mutation of some kind. As we can see, not one shred of concrete evidence is offered here for how this so-called evolution might have come about. In fact, the anthropologist Kathleen R. Gibson, whose views are canvassed immediately afterwards, says: Could a sudden mutation have happened 50,000 years ago? There is no change in the brain"s external structure. Neither are there any findings to indicate a sudden mutation that might have radically restructured the functioning of the brain. Evolutionists are thus unable to propose any mutation which might account for the origin of human reason. It is evident, therefore, that engaging in speculation based on mutations is a waste of time. Even if one were to accept for one moment that an organ as complex as the brain could have emerged by means of mutations, the product of blind chance, this does not mean that evolution can account for the origin of thought, since as we have already stated, consciousness is a phenomenon that cannot be reduced to matter. It is certainly miraculous the way that a child with no knowledge of the science of linguistics can build sentences by using nouns and verbs when he or she reaches the age of three. The child has learned how to put words in order and how to express his thoughts to someone else. Furthermore, when speaking a person automatically carries out the most complicated muscular movements: one is able to employ 100 or so muscles in such a way as to produce syllables, words and sentences. We never even wonder how this behavior, which takes place entirely spontaneously, actually takes place as we engage in it. We simply "desire" to speak, it is as simple as that. All this goes to show that the abilities to speak and think, which have no physical foundation, have been miraculously designed and given to man. No blind coincidence can turn an animal into a thinking and speaking human being. The odds that this could have happened by means of random mutation are about the same as those of the fairy story about the prince and the frog being true. It is God, Who created man and gave him consciousness. This documentary aired on National Geographic TV is a propaganda vehicle screened for the sole purpose keeping Darwinism alive and containing no scientific explanation. National Geographic TV must stop trying to account for the abilities to speak and think by means of evolutionary fairy tales and must instead accept the fact that the origin of these, and of man in his entirety of course, lies in "creation."
<urn:uuid:329deca8-d7e9-4b33-ad56-e2ba7f090c2a>
CC-MAIN-2016-26
http://darwinism-watch.com/index.php?git=makale&makale_id=147929
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396945.81/warc/CC-MAIN-20160624154956-00014-ip-10-164-35-72.ec2.internal.warc.gz
en
0.968035
1,341
2.796875
3
The Wärtsilä shipyard and Enso Gutzeit signed a contract about building the first passenger/car-ferry in the world powered by gas-turbines. The plan was to call the biggest and fastest ferry on earth "FINNJET". The journey time between Helsinki and Travemünde was to be cut from 36 hours and more to only 22 hours. Furthermore the smaller units like "Finnpartner" and "Finnhansa" had to be replaced. The yearly passenger-volume was expected to be 305.000. The costs of this unique project were almost as high as 300 Million Finnish Marks and so Finnjet was one of the biggest investments in finnish tourism trade ever. Since the building owner was the forest-industry giant Enso-Gutzeit, the huge costs of the project were compared with a buy of a small pulp mill! For the designing of the ship, the designers of the shipyard spent more than 200.000 hours of work in the next 12 months. Photo: Wärtsilä, own collection © Salomon Kaukiainen, Mathias Saken 2001-2004
<urn:uuid:dde24803-0b76-4a5a-8803-f4eaf27ea781>
CC-MAIN-2016-26
http://www.finnjetweb.com/en/fakten/051273.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395620.56/warc/CC-MAIN-20160624154955-00071-ip-10-164-35-72.ec2.internal.warc.gz
en
0.953764
243
2.59375
3
Water Quality Control Division Who is Water Quality Control? The Water Quality Control Division (WQCD) of Public Works, formerly the Environmental Control Division, provides the resources and programs necessary to adequately monitor and protect the quality of our community’s water resources, including both public drinking water and water discharged to the sanitary sewer and storm drain systems. Our mission is to operate and implement water pollution control programs as required by Federal and State laws ensuring compliance by both the City of Merced and those dischargers regulated by the City. Our goals are to control the quality of industrial discharges to the wastewater collection system through inspections, monitoring, and permitting; ensure compliance with all applicable Federal and State water quality discharge requirements for the Wastewater Treatment Plant and its customers; and to monitor and evaluate drinking water quality, ensuring City compliance with all applicable Federal and State regulations governing drinking water quality and municipal well construction and destruction. The Water Quality Control Division also educates the public on topics, such as the Fats, Oils, and Grease (F.O.G.) Program and Storm Water Pollution Prevention. You might recognize our pollution control team, the F.O.G. Detective and Freddy Fin, from our many local commercials and radio advertisements; if you have, then you already know “Stop the F.O.G., Before it’s a Clog,” and “Only Rain Down the Drain!” Question: What is the ONLY thing that should go down a storm drain? A. Trash B. Leaves C. Rain Water D. Glitter Answer: C. Rain Water – Remember, Freddy Fin says “Only Rain Down the Drain” Water Quality Control Team: Lorraine Carrasquillo, Supervisor; Jeremy Geiger, ECO II; Mary Grissom, ECO I; Beth Ball, ECO I; and Elyse Davis, Secretary I.
<urn:uuid:3b529797-daca-459e-9f40-0ccc06947c73>
CC-MAIN-2016-26
https://www.cityofmerced.org/depts/pw/water_quality_control_division/default.asp
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396459.32/warc/CC-MAIN-20160624154956-00200-ip-10-164-35-72.ec2.internal.warc.gz
en
0.8886
397
2.640625
3
COLON CANCER MORE COMMON in MEN Colorectal cancer appears to be more common in men than women, according to a new study from Poland published in this week's issue of the New England Journal of Medicine. Doctors using colonoscopy on 50,000 patients found 73 percent more advanced cancerous lesions in males than in their female counterparts. Currently, recommendations say that both men and women go in for a colonoscopy at age 50 and follow up about every 10 years, with earlier and more frequent visits advised for people with a family history of colon or rectal cancers. The authors of this study predict that their findings may lead to the adjustment of screening recommendations for colorectal cancer based on sex, where men may need to be screened more often. TREATING GUM DISEASE in PREGNANT WOMEN DOESN'T HELP BABIES There is plenty of evidence that women with gum disease are more likely to have premature and undersize babies, so doctors naturally thought that treating the gum disease in the moms would improve the babies' situation. The theory was that the gum disease allowed bacteria to get into the mother's bloodstream and cause problems in the pregnancy. Turns out it's not that simple. A new study from researchers at the University of Minnesota finds that treating pregnant women improves their gums, but does not change the likelihood of having a premature baby. Doctors are not sure whether treating the women during pregnancy is too late in the process to benefit the babies, or whether gum disease really has no role causal role in prematurity. These findings were published this week in the New England Journal of Medicine. RELIGIOUS LIFE MAY LENGTHEN LUNG HEALTH Senior citizens who regularly attend religious services may experience lower levels of lung decline, report researchers from the Harvard School of Public Health. In a five-year study of 1,174 senior citizens ages 70 years to 79 years, scientists found that the lung function of people who attended religious services decreased at half the rate of those who never attended. Because the difference in lung health could not be explained by smoking or physical-activity levels, researchers suggest that spirituality may influence well-being. Attending regular religious services also provides emotional and physical benefits, such as reducing stress and providing people with a support system when they need it. These findings were published in the most recent issue of the Annals Behavioral Medicine. STAT is a brief look at the latest medical research and is compiled by Joanna Schaffhausen, who holds a doctorate in behavioral neuroscience. She works in the ABC News Medical Unit, evaluating medical studies, abstracts and news releases.
<urn:uuid:dbb81fd7-8354-40d9-b1bc-8971cfdcb309>
CC-MAIN-2016-26
http://abcnews.go.com/Health/story?id=2622285
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396949.33/warc/CC-MAIN-20160624154956-00144-ip-10-164-35-72.ec2.internal.warc.gz
en
0.964808
536
2.53125
3
|Select the desired Level or Schedule Type to find available classes for the course.| |ED 552 - Methods and Materials of Teaching in the Pre K-6 Bilingual Classroom| Course Description: Using culture literature, this course focuses on helping students construct meaning in classroom literacy activities. The course examines language teaching methods and models, and effective, integrative instructional practices in teaching of reading and language arts and other core subjects (mathematics, science and social studies) to the bilingual child. This course is required for all students seeking a Bilingual Education Extension to a NYS teaching certificate at the Childhood or Early Childhood Levels. Field experience and/or an Apprenticeship in bilingual settings and successful completion of NY State assessments in bilingual education are also required for the certification extension. 3.000 Credit hours 3.000 Lecture hours Schedule Types: Discussion, Lecture, Tutorial, Online Course Must be enrolled in one of the following Levels: |Return to Previous||New Search|
<urn:uuid:a9574fa8-938a-4564-9696-0b1850d22562>
CC-MAIN-2016-26
https://bannerss.pace.edu/prod/bwckctlg.p_disp_course_detail?cat_term_in=201420&subj_code_in=ED&crse_numb_in=552
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783404405.88/warc/CC-MAIN-20160624155004-00025-ip-10-164-35-72.ec2.internal.warc.gz
en
0.888026
206
2.578125
3
Scientists at the University of Southampton are pioneering a technique to predict when an ecosystem is likely to collapse, which may also have potential for foretelling crises in agriculture, fisheries or even social systems. The researchers have applied a mathematical model to a real world situation, the environmental collapse of a lake in China, to help prove a theory which suggests an ecosystem 'flickers', or fluctuates dramatically between healthy and unhealthy states, shortly before its eventual collapse. Head of Geography at Southampton, Professor John Dearing explains: "We wanted to prove that this 'flickering' occurs just ahead of a dramatic change in a system – be it a social, ecological or climatic one – and that this method could potentially be used to predict future critical changes in other impacted systems in the world around us." A team led by Dr Rong Wang extracted core samples from sediment at the bottom of Lake Erhai in Yunnan province, China and charted the levels and variation of fossilised algae (diatoms) over a 125-year period. Analysis of the core sample data showed the algae communities remained relatively stable up until about 30 years before the lake's collapse into a turbid or polluted state. However, the core samples for these last three decades showed much fluctuation, indicating there had been numerous dramatic changes in the types and concentrations of algae present in the water – evidence of the 'flickering' before the lake's final definitive change of state. Rong Wang comments: "By using the algae as a measure of the lake's health, we have shown that its eco-system 'wobbled' before making a critical transition – in this instance, to a turbid state. "Dramatic swings can be seen in other data, suggesting large external impacts on the lake over a long time period – for example, pollution from fertilisers, sewage from fields and changes in water levels – caused the system to switch back and forth rapidly between alternate states. Eventually, the lake's ecosystem could no longer cope or recover – losing resilience and reaching what is called a 'tipping point' and collapsing altogether." The researchers hope the method they have trialled in China could be applied to other regions and landscapes. Co-author Dr Pete Langdon comments: "In this case, we used algae as a marker of how the lake's ecosystem was holding-up against external impacts – but who's to say we couldn't use this method in other ways? For example, perhaps we should look for 'flickering' signals in climate data to try and foretell impending crises?" The paper, 'Flickering gives early warning signals of a critical transition to a eutrophic lake state' will be published in the journal Nature University of Southampton: http://www.southampton.ac.uk/ This press release was posted to serve as a topic for discussion. Please comment below. We try our best to only post press releases that are associated with peer reviewed scientific literature. Critical discussions of the research are appreciated. If you need help finding a link to the original article, please contact us on twitter or via e-mail. An 18-month off-road trial will test underground charging systems to juice up on the go and extend driving range Yosemite, Redwood, and other famous parks as they look from outer space 8-year-old Harapan joins his brother at an Indonesian breeding sanctuary; fewer than 100 "hairy rhinos" are left in the world The white Kermode bear of British Columbia is galvanizing First Nations people fighting to protect their homeland A naturalist cuts through the myths surrounding the invasive plant Attracting the right species can help get rid of vine-munching insects and allow farmers to cut back on pesticides "We are seeing wildfires in the United States grow to sizes that were unimaginable just 20 or 30 years ago" Driftwood on Iceland and other Arctic islands is younger than once thought Electric shock training and surgery are starting to pay off for the teams fighting to save one of the world's largest birds As bat populations dwindle, a new effort is aimed at getting North America's bat researchers working on the same page.
<urn:uuid:84509f5c-3308-4617-9793-c9b7120514e6>
CC-MAIN-2016-26
http://www.labspaces.net/125344/Scientists_pioneer_method_to_predict_environmental_collapse
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397213.30/warc/CC-MAIN-20160624154957-00133-ip-10-164-35-72.ec2.internal.warc.gz
en
0.934504
858
3.859375
4
Individual differences | Methods | Statistics | Clinical | Educational | Industrial | Professional items | World psychology | A Webinar is a seminar which is conducted over the World Wide Web. It is a type of web conferencing. In contrast to a Webcast, which is transmission of information in one direction only, a webinar is designed to be interactive between the presenter and audience. A webinar is 'live' in the sense that information is conveyed according to an agenda, with a starting and ending time. In most cases, the presenter may speak over a standard telephone line, pointing out information being presented on screen, and the audience can respond over their own telephones, preferably a speakerphone. |This page uses Creative Commons Licensed content from Wikipedia (view authors).|
<urn:uuid:7d6b9038-8d33-418e-aca3-696afa26c408>
CC-MAIN-2016-26
http://psychology.wikia.com/wiki/Webinar
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395039.24/warc/CC-MAIN-20160624154955-00068-ip-10-164-35-72.ec2.internal.warc.gz
en
0.897621
157
2.9375
3
- Building Typology> - COUNTRY PAGES TABULA Building Typologies - Country Pages A number of residential building typologies have been developed on the basis of the TABULA concept. For each country a summary of the results can be found at the respective country page (click on flag below). Explanations of the items on the country pages are explained in the text below. Direct Access to the "Country Pages" National Building Typologies - Explanations and Examples In the following the elements of the national building typologies which can be found on the country pages are explained. The basics of the TABULA concept for building typologies are described in the TABULA Synthesis Report SR1 . Classification of National Residential Building Stocks The parameters for classification of residential buildings according to the TABULA concept are: - the country - the region or climate zone, if available - the construction year class - the building size class - an additional parameter A code system is used for identification of the building types. Building Type Matrix An overview of the national building typology is given by the "Building Type Matrix". The columns of the matrix are representing different building sizes, the rows different construction periods. To each building type of a country (cell of the classification grid) an example building is assigned which is represented by a photo and the data of the thermal envelope. The example building is supposed to be a typical representative of the building type, meaning that it has features which can commonly be found in houses of the respective age and size class. The envelope area and the heat transfer coefficient of the example building are not necessarily representative in a statical sense. For the question of "average buildings" see below in chapter "Models of the National Building Stock". Definition of Example Buildings / Construction Elements / Supply Systems In order to enable an energy balance calculation for the example buildings the respective datasets of construction elements, envelope areas and different supply systems are collected in a common database for each country (Excel workbook "TABULA.xls", see page <Download>). In case that definitions of the national EPC procedure differs from the TABULA data structure a data transformation must be applied. In consequence, always two versions of the example building and supply system data are existing: - Data according to the national EPC procedure used in the national context for analyses, typology brochures, default datasets in EPC software, ... - Data according to the TABULA data structure used to understand and compare the energy performance and refurbishment measures of buildings from different countries, e.g. within the frame of showcase analyses (TABULA WebTool) or cross-border building stock models (see page<TABULA Typology Structure - Concept>) Exemplary sheets of the TABULA database: datasets of ... The collected set of real buildings serve as showcase examples to demonstrate the effect of refurbishment measures. There are three variants of each building: - "Existing State": typical state of a non-refurbished building - "Usual Refurbishment": package of measures for upgrading the thermal envelope and the heat supply system which are commonly realised during renovation; - "Advanced Refurbishment": package of measures for upgrading the thermal envelope and the heat supply system which are usually only realised in very ambitious renovations or research projects. Common Calculation Procedure for Cross-Country Comparison of Building and System Energy Performance To enable a comparison of buildings and heat supply systems between countries a simple energy balance calculation based on the respective CEN standards is used. The basics of the procedure are tabled on the page <TABULA Typology Structure - Concept>. The calculation sheets are shown in the pictures below. Due to the few numbers of calculation formulas an implementation in form of a spreadsheet (1 row for each building) can easily be performed. In consequence a large number of building and system variants can be calculated in a fast and transparent way. In order to enable realistic statements as regards energy performance indicators and energy savings the ratio of typical levels of measured consumption to the standard calculation should be determined or estimated for each country. In case of estimations the calibration to the typical level of consumption is deemed preliminary - up to the time when statistical analyses of the correlation have been performed. Example of a calculation sheet: energy need for heating Standard Reference Calculation - based on: EN ISO 13790 / seasonal method The energy need for heating is calculated by applying standard boundary conditions and relevant national climate data. For more information consult page "Common Calculation Procedure". National Typology Brochures For each country a brochure has been eleaborated which contains the following elements: - classification of the national building stock / display of the building type matrix - frequencies of the building types - typical energy consumption values of examplary buildings - effect of refurbishment measures - building display sheets Each brochure is written in the language of the respective country. Example of "Building Display Sheets" from "National Typology Brochures" Building Typology WebTool The <TABULA WebTool> is designed to visualize the national building typologies. It showcases the energy consumption of typical buildings of a selected country and the effect of energy saving measures on the two levels "Standard" and "Advanced". All above mentioned elements are part of the online tool. The expert version gives access to the underlying data (see WebTool menue Calculation Details / Open Expert Version). A webtool user guide can be downloaded here: <TABULA_WebTool_UserGuide.pdf> The building and system datasets will continuously be evaluated and improved. Feedback is welcome. Access to Building Datasets by the Excel Workbook "tabula-calculator.xls" The datasets of the example buildings and heat supply systems demonstrated by the TABULA WebTool are documented in the Excel workbook "tabula-calculator.xls" (extract from the database "TABULA.xls"). Apart from an easy data access this workbook also enables own calculations and variations on a row by row spreadsheet basis. The calcuation formulas of the webtool and the Excel workbook are identical. You can find the Excel Workbook "tabula-calculator.xls" at the page "Download". Statistics of Buildings and Heat Supply Systems In order to assess the relevance of the building types and as a pre-requisite for the design of building stock models the available statistics are reported for each country. The basic statistics are giving account of the frequencies of building types and supply system types. Information about the energy related properties, current refurbishment grades and annual rates of refurbishment is added - as far as available. More details about the concept and the structure of the statistical tables can be found in the <TABULA Synthesis Report SR1> chapter 6. Models of the National Building Stock One important objective of the set-up of national building typologies is the elaboration of bottom-up models which enable a calculation of the energy consumption of the national building stock. A typical application field is the investigation of energy saving potentials for a national or regional building stock and the ex post and ex ante evaluation of instruments and political strategies. The elaborated set of example buildings, as shown above, can be used directly as a building stock balance model - as far as statistics are available for the frequencies of building types and system types and for the refurbishment state. The example buildings can be considered as a small random sample. It is also possible to merge several classes and derive a small number of “average buildings”. As a consequence the implementation of scenario analyses – which implicates the variation of a large number of parameter combinations (e.g. differetn insulation measures, supply system upgrades) – is much more easy. A further way to set-up building stock models is to elaborate "average buildings" on the basis of statistical analyses. The basis can be random samples (or a census in the best case) collected by surveys or from EPC databases. For some countries average buildings have already been derived in the framework of the TABULA project. An access to these datasets is possible by the <Expert Version> of the TABULA WebTool (identification code contains "SyAv" for "Synthetical Average" in contrast to "ReEx" for real existing building). National building stock models have been elaborated by four TABULA partners on the basis of the typology data. The results are available at the following report:
<urn:uuid:cbb4fba1-913f-404f-93d6-c2adc199ccd8>
CC-MAIN-2016-26
http://episcope.eu/building-typology/country/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783392099.27/warc/CC-MAIN-20160624154952-00114-ip-10-164-35-72.ec2.internal.warc.gz
en
0.903556
1,803
2.65625
3
Difference between revisions of "Wuxi" Revision as of 23:11, 22 May 2009 The climate of Wuxi is moist and temperate, belonging to that of the sub-tropical maritime with distinct seasons. The average annual temperature is 15.5℃. There are 250 frostless days and the average rainfall is about 1,000 mm. There are hills, rivers and lakes in this area but the most part of it is plain area crisscrossed with canals and riverlets. With fertile soil and rich produce, it is the famous “land teeming with fish and rice” in China. Belonging to one of the eight primitive cultural districts in China, Wuxi is a famous cultural city with a history of over 3,000 years. The establishment of the city can be traced back to the end of the Shang Dynasty. Taibo,the eldest son of emperor Zhouwu in the West Zhou Dynasty came here from the inland of China. He introduced the inland culture to the south and created the Wu culture. The place used to be rich in tin deposit during the Zhou and Qin dynasties. As the tin was depleted by the end of the Qin Dynasty, the place was called Wuxi, meaning “ a place without tin”. Wuxi is endowed with rich natural and human resources with a galaxy of gifted persons and developed economy. As one of the birthplaces of China’s national industry and commerce, Wuxi is one of the fifteen economic centers in China. With convenient transportation network, Wuxi is a hub of transportation which connects Jiangsu, Zhejiang and Anhui provinces. Nine highways join Wuxi with important cities like Shanghai, Nanjing and Hangzhou. Shanghai-Nanjing railway and Shanghai-Nanjing expressway pass through the city. It takes about 3 hours by car to get from Wuxi to Pudong International Airport. There are seven water routes to various places in the country along Yangtse River, the Grand Canal and lake Taihu. With developed post and telecommunications system, direct calls can be made to 156 countries or regions in the world. The express mail services are established between Wuxi and 27 countries and regions in the world. With rich natural and cultural heritage, Wuxi is one of the top ten tourist cities in China. The typical features of the area is that of the regions of rivers and lakes. Wuxi occupies the most scenic part of Lake Taihu and enjoys the beautiful scenery. Theme parks like the Tang City, the Three Kingdoms City, the Water Margin City which feature daily live shows are new tourist attractions. The 88-meter tall bronze Buddha statue (Linshan Dafuo) and the holiday resorts add more appeal to the visitors. Taihu Lake Yuantouzhu (Turtle's Head) Scenic Area With a water surface of 2,400 km2, Taihu Lake is the third largest fresh water lake in China. In 1982 it was designated as a national scenic area by the State Council. Yuatouzhu is actually a small hill stretching into the lake like the head of a turtle, hence the name. This scenic area covers an area of 130ha and is composed of the following eight scenic spots. Wuxi is a city with alot of shopping areas, although it is very expensive, there are a wide range of brands. The traditional Wuxi foods are very sweet and savoury types of food, but there is a wide range of selection of western foods. In some alleys there are different kinds of foods on a stick, it is very poular with a lot of locals going. Wuxi is home to a variety of accommodations catering to both foreign and local guests.
<urn:uuid:e8d66081-ba59-4577-b767-fb3fbcffcbbe>
CC-MAIN-2016-26
http://wikitravel.org/wiki/en/index.php?title=Wuxi&diff=1150108&oldid=980590
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391519.0/warc/CC-MAIN-20160624154951-00008-ip-10-164-35-72.ec2.internal.warc.gz
en
0.950173
787
3.421875
3
Many people from individuals to research firms are searching for an alternative fuel source that is renewable, economical, and environmentally friendly as fossil fuels are fast depleting. Biodiesel refers to any diesel-equivalent biofuel made from renewable biological materials such as vegetable oils or animal fats consisting of long-chain saturated hydrocarbons. It can be used in pure form (B100) or may be blended with petrodiesel at any concentration. Biodiesel made from crops such as corn and soybeans is one such alternative that most people are aware of. However, there are problems with biodiesel made from crops namely the displacement of food and the amount of crops it takes to produce a gallon of oil. Algae to biodiesel has been widely discussed among experts in the petroleum industry and conservationist who are looking for a more reliable and safer source of energy that is both renewable and easy to attain. One of the key reasons why algae are considered as feedstock for oil is their yields. DOE (Department of Energy, Gov of USA) has reported that algae yield 30 times more energy per acre than land crops such as soybeans, and some estimate even higher yields up to 15000 gallons per acre. Aside from keeping the earth clean and free form pollution, these algal biodiesel fuels help to utilize a resource that is available in abundance just waiting to be harnessed and exploited. A Detailed Process of Biodiesel from Algae: Once the algae are grown and harvested, there are a different ways of extracting the oil. Which ever method is used for extraction, the resulting product is a vegetable oil called 'green crude', similar to crude oil, which is further transformed into biodiesel fuel through a process called 'transesterification'. Refer for more details: http://www.oilgae.com/algae/oil/biod/tra/tra.html In this process the green crude is mixed with a catalyst, such as sodium hydroxide and an alcohol, such as methanol, resulting in biodiesel mixed with glycerol. The mixture is cleaned to remove the glycerol, a valuable by-product, leaving pure algal biodiesel fuel, which is similar to petrodiesel fuel. Although algal biodiesel and petro diesel are similar, there are a few significant differences between their properties. See more on the algal biodiesel properties: http://www.oilgae.com/algae/oil/biod/char/char.html - Algae represent the third generation feedstock for biodiesel, with much higher yields than second generation crops. Algae yields could reach a high of 50 T of biodiesel per hectare year against 2 T for competing feedstock such as jatropha. - On lipid content alone (in terms of % of lipid content by dry weight), algae are only as good as biomass from most other oil crops. Where algae score over all other oil crops is in the biomass yield for similar areas. - Oil yields per unit area from algae can be even further increased, and it is one of the most researched topics currently. - Making biodiesel from algae oil is similar to the process of making biodiesel oil from any other oilseed, and thus can quite possibly use the same conversion processes to produce biodiesel. - Pilot projects suggest that algae could provide over 10,000 gallons of biodiesel per hectare per year. - Recent advances in oil extraction and transesterification could reduce the cost of making biodiesel from plant oils. - There could be some challenges in converting algae oil into biodiesel using the transesterification process owing to the high FFA of algae oil. To know more about Biodiesel from algae, buy our Comprehensive Oilgae report with its recent updated version. List of contents under this topic include - Introduction to Biodiesel - Growth of Biodiesel - Biodiesel from Algae - Why Isn’t Algal Biodiesel Currently Produced on a Large-scale? - Oil Yields from Algae - Oil Extraction from Algae (change in index) - Converting Algae Oil into Biodiesel As with anything worth having, there is some work to be done to perfect the process of optimizing the algae biodiesel manufacturing process. Algae tend to grow very quickly, but yield very little oil when left to grow naturally. They can be genetically altered for additional oil output, but this will slow down the growth process. Over time, these kinks will be worked out through research efforts. Considering the early stages and multiple possibilities of algal biodiesel, the research being performed on its cultivation and benefits or shortcomings comprises a long list. Selecting high-oil content strains, and devising cost effective methods of harvesting, oil extraction and conversion of oil to biodiesel options head up lists for many researchers. See more about the research on algal biodiesel: http://www.oilgae.com/algae/oil/biod/res/res.html - Biodiesel Production from Microalgae - Biodiesel from Algae oil - A Look Back at the U.S. Department of Energy’s Aquatic Species Program: Biodiesel from Algae - Biodiesel Fuel Production from Algae as Renewable Energy - The Potential for Biofuels from Algae - Algae Farming for Biodiesel with Nanotechnology - Algae as a Biodiesel Feedstock: A Feasibility Assessment - The Economics of Micro-Algae Production and Processing into Biodiesel - Genetic Engineering of Algae for Biofuel Production - Indigenous Algae: Potential Factories for Biodiesel Production Related Blog Posts - Algae-to-Fuel Research Enjoys Resurgence at NREL - Algae - boon to farmers and a solution to global warming - Powerful Ideas: Wringing Oil from Algae - Algal Fuel Headed For The Racetrack - UCLA Find Algae To Be The Fuel Of The Future - Breakthrough boasted by Bionavitas - 500 per gal Omega 3 vs $3 per gal fuel - Algae for food or fuel? - Algae Event - JetBlue Airways will Demonstrate a Biofuel Test Flight - Large-scale Algae-to-Biofuel Research Project in Nevada - Algae Could End the fuel Crisis - PetroSun BioFuels Proposes New Crop to Catfish Farmers at the Mississippi Biomass Council Meeting - Algae Biodiesel vs. Cellulosic Ethanol - an interesting comparison - Bio-diesel: Engineered Algae the Way to Go - Malaysia News - Biofuels: The Next Generation - Algae - Lipid Productivity Of Algae Grown On Dairy Wastewater As A Possible Feedstock For Biodiesel - Primafuel, Converting Algae to Green Gasoline - Algae Protein Market -A Driving Force for Algae Biodiesel - John Benemann - New Advisor to Future Fuels Consortium - Green Star Products: Energy from Algae is Being Recognized as a Major Solution - Defence Research Laboratory (DRL), Tezpur, India is working on fresh water algae as source for bio-diesel - Algae Fuel Research by Appalachian State University students - Oregon State University develops biodiesel from algae - Shell awards prize to Scottish Bioenergy for Algae-to-biodiesel Process - Algae Commercialization, Research and and Business Networking Forum - Jan 2009 Related Forum Discussions - Refining Algae into Biodiesel Question - Lipids to Oil...getting closer to home algae diesel. - Problems of high FFA - 85% oil botrycoccus how to crack it - Has Anyone Tried Algal Biodiesel? - Inputs on algae oil costs - Properties of Algal Oil - OriginOil Develops Portable Modular Algae Biodiesel System - Microalgae biodiesel companies - Algae Education
<urn:uuid:cd3ca81b-6182-4d99-8dab-4d56a1fb6393>
CC-MAIN-2016-26
http://www.oilgae.com/algae/oil/biod/biod.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397562.76/warc/CC-MAIN-20160624154957-00159-ip-10-164-35-72.ec2.internal.warc.gz
en
0.906591
1,671
3.65625
4
Whereas, no person of good moral conscience can agree to the commission of an injustice; And, according to Martin Luther King Jr., quoting St. Augustine, "An unjust law is no law at all"; And, it can thus be no crime to violate that which is no law; Therefore, as a duly sworn juror, I can find no one guilty either of violating an unjust law or of violating any law applied unjustly. Judges who says to jurors that, "you will be required to follow and apply this law," regardless of whether it seems just or not, might be asked if they would exercise this rule against Harriet Tubman (1820-1913), who violated the federal Fugitive Slave Laws by participating in the Underground Railroad for escaped slaves, or against Rosa Parks (b.1913), who was arrested in 1955 for violating the segregation laws in Montgomery, Alabama, by refusing to move to the back of the bus when the bus driver told her to give up her seat to a white passenger. If a judge bites the bullet and says that, yes, he would have to instruct juries to convict these women because the law is the law, he might be told that such blind obedience was not accepted as a defense during the War Crimes Tribunal at Nuremberg, when many Nazis claimed that they were just "following orders." A judge who participates in injustices because he is "following orders" might be similarly called to account. The late Justice William C. Goodloe (1919-1997) of the Washington State Supreme Court, an advocate of jury nullification, suggested that the following instruction be given by judges to all juries in criminal cases: You are instructed that this being a criminal case you are the exclusive judges of the evidence, the credibility of the witnesses and the weight to be given to their testimony, and you have a right also to determine the law in the case. The court does not intend to express any opinion concerning the weight of the evidence, but it is the duty of the court to advise you as to the law, and it is your duty to consider the instructions of the court; yet in your decision upon the merits of the case you have a right to determine for yourselves the law as well as the facts by which your verdict shall be governed. Justice Goodloe was one of the rare judges who voluntarily surrendered part of the power that has improperly accrued to him in the interest of justice and of the system of trial by jury as this was understood by the Founders of the nation. I was called to jury duty in the Van Nuys Superior and Municipal Courts in November 1999. I had to tell two judges that I could undertake to follow no law or instructions that would result in an injustice, or could swear no oath that would require me to act in such a way. I was quickly excused from both juries, though a Superior Court Judge actually called a sidebar conference with the attorneys to discuss me, and even called me over to clarify my answer -- as though this sort of thing had never been heard of before. I certainly didn't hear any similar reponses from other jurors, which is frightening. The judge also asked if I had studied law, which, of course, was besides the point, since judgements of justice are not based on knowledge of the law but on knowledge of right and wrong. Quotes on the Powers and Duties of Juries
<urn:uuid:8dc0ff38-60f9-4910-83dd-3499282d0acb>
CC-MAIN-2016-26
http://www.friesian.com/oath.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398869.97/warc/CC-MAIN-20160624154958-00106-ip-10-164-35-72.ec2.internal.warc.gz
en
0.984176
696
2.734375
3
Prion surprise on West Coast offshore island Conservationists have been stunned to discover the West Coast's largest seabird colony while exploring a tiny island near Westport. West Coast Blue Penguin Trust members were recently searching for sooty shearwaters on Wall Island, about 120m offshore from Cape Foulwind, but were astonished to discover about 4500 fairy prions and about 300 shearwaters had made the rocky outcrop their home. They were also amazed the island appeared predator-free, which meant the birds had a safe place to breed. Trust chairwomen Kerry-Jayne Wilson, a seabird expert, said it was exciting to find so many fairy prions, which no longer nested on the mainland because of predators. The entire island was riddled with burrows and the group had to step very carefully to avoid falling through them. "We would be one of very few people to ever step foot on the island above the shoreline," Wilson said. It was rare in New Zealand to find an inshore island so close to the mainland that remained predator free, she said. "Virtually every bit of rock around New Zealand which doesn't have mammal predators has seabirds and virtually every piece of rock that does have rats, stoats, cats and dogs doesn't have seabirds." The trust's find was significant news to the Department of Conservation, which had been unsure of bird numbers on Wall Island. "Even though the birds are reasonably common, the habitat they create is gone from the mainland and seabird colonies on inshore islands are the last remnants of how New Zealand used to be," DoC scientist Don Neale said. The trust planned to set up traps on the adjacent mainland to ensure the island remained predator-free. Fairy prions, the smallest prions and part of the petrel family, only used the island during summer to breed. Sooty shearwaters, also called muttonbirds or titi, are almost extinct on the mainland. Black-backed gulls, white- fronted terns, red-billed gulls and probably blue penguins also nest on the island. - The Press What will be the main motivation for humanity's future space endeavours?Related story: (See story) The cost of losing nature
<urn:uuid:9dd17003-cd75-461a-9939-884b68db5461>
CC-MAIN-2016-26
http://www.stuff.co.nz/science/8706201/Prion-surprise-on-West-Coast-inshore-island
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397795.31/warc/CC-MAIN-20160624154957-00181-ip-10-164-35-72.ec2.internal.warc.gz
en
0.971553
482
2.546875
3
Speaking as a natural redhead, I don’t need a study to tell me I’m especially photosensitive to the sun. I’ve spent a lifetime smelling like sunscreen and avoiding the daylight during key hours when the UV is most intense as though I were cast as an extra in Twilight. However, new research published in BioEssays, suggests sunscreen and avoidance may not be enough to protect the vulnerable DNA enfleshed within redheads. Scientists have posed two hypotheses on why red pigment (pheomelanin) might cause skin cells to be more susceptible to cancer. Cells produce two types of pigment: dark brown eumelanin and red/orange pheomelanin. The production of pheomelanin has been linked to oxidative stress, which can lead to DNA damage. Additionally, researchers hypothesize that pheomelanin production could use up cells’ antioxidant reserves. Thus, the pheomelanin pigment, that creates the color red in the hair, is now thought to give us an increased risk of melanoma. Dr. David Fisher – the study’s co-author and chief of dermatology at Massachusetts General Hospital in Boston – explained why this pigment makes the skin more susceptible. The pigment may be creating unbalanced molecules in the skin. Fisher and his team first uncovered the apparent link between red hair pigment and skin cancer last fall. That study used genetically altered mice that had been given a mutant gene that increased their risk of contracting melanoma. In the new paper, Fisher further speculated that pheomelanin could increase the risk, finding that melanoma was still possible among mice with the red pigment even after UV was completely removed. UV radiation is part of the electromagnetic spectrum that radiates from the sun year round. Excessive exposure to UV rays damages the skin on a cellular level, mutating the DNA over time. DNA is the source of genetic information coded into each living cell. UVB are the rays that burn you. UVA rays, which account for 95 percent of the radiation, are those that prematurely age you. They penetrate deeper than UVB rays. These rays can penetrate water, glass, clouds, and clothing. Reflective surfaces can impose UV rays into shaded areas. UV radiation is the primary cause of skin cancer, effecting millions of people a year. Twenty years of research has assessed fair-skinned people, like redheads, are more at risk because of the decreased or inconsistent presence of melanin. However, that does not mean those with darker pigment are completely immune. Melanin is present in skin, hair, and eyes. It determines color and is produced by melanocytes found in the basal layer of the epidermis (outermost layer of the skin). Melanoma is caused by changes in melanocytes. Melanin is considered a photochemical. When provoked by UVB rays, it reacts with a photo-protectant response, absorbing the ultraviolet light as heat. This process is meant to inhibit the damage to DNA. With prolonged exposure, the photochemical reaction creates freckling, tanning, and burning. The more often you burn, the higher the risk of damaging your DNA. When the integrity of DNA is compromised, a cancer-related mutation can result. Cancer is the uncontrolled growth of abnormal cells in the body. A cancer’s degree of perniciousness and cause can depend on multiple factors and isn’t always isolated to one part of the body as it can metastasize (spread). The findings suggest that redheads should take additional precautions to prevent melanoma, even if they are already diligent about avoiding the sun and using high SPF sunscreen. It is advised fair-haired and light skinned individuals undergo annual screenings with their dermatologists – who are skilled at identifying physical abnormalities in moles. If questionable, these moles can be excised and tested. SPF stands for Sun Protections Factor. It’s usually seen as an abbreviation followed by a number seen on many beauty and hygiene products and some clothing items. These numbers refer to the product’s ability to screen, reflect, or absorb the sun’s UV rays; the higher the number, the higher the supposed coverage. Unfortunately, there is a great deal of confusion surrounding the sun protection factor when trying to understand what the number truly represents. Sunblock makers have come under fire in recent years for obfuscated claims surrounding effectiveness, all day protection, and whether or not there is such a thing as waterproof or sweat proof coverage. Regardless, regular use of some type of SPF is recommended to limit the onset of melanoma. [Image via Shutterstock]
<urn:uuid:5ab81443-2ac0-4d1e-95b2-de24092f855b>
CC-MAIN-2016-26
http://www.inquisitr.com/657980/redheads-beware-sunscreen-may-not-be-enough/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391766.5/warc/CC-MAIN-20160624154951-00098-ip-10-164-35-72.ec2.internal.warc.gz
en
0.942248
973
3.34375
3
In Hinduism, Kali Yuga (Devanāgarī: कलियुग, lit. "Age of Kali", "age of vice"), is one of the four stages or yugas that the world goes through. Traditionally, most Hindus believe that the Kali Yuga is 432,000 years long. Kali Yuga is also recognized and stated in Sikhism, in the Guru Granth Sahib. References[change | change source] Other websites[change | change source] - On the Golden period of 10,000 years in current Kali Yuga - Future History of the World - description of the features of Kali Yuga - Comparison of Hindu and Christian end-of-world prophecies - Story of the Kali Yuga 'taking up residence' at beginning of the current age - Kali Yuga and the Precession of the Equinoxes
<urn:uuid:14cf4aac-3aec-420e-ad94-aee3ead4bb7e>
CC-MAIN-2016-26
https://simple.wikipedia.org/wiki/Kali_Yuga
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396887.54/warc/CC-MAIN-20160624154956-00141-ip-10-164-35-72.ec2.internal.warc.gz
en
0.865363
190
3
3
Step one - Draw a line across the bottom half of your paper. This your horizon line. It separates the foreground from the background. Step Two - Draw a square making sure that most of the shape is above the horizon line. Step Three -Draw another square behind square number one, making sure that it finished below the horizon line and a little to the side.Step four - Now join the two squares by drawing straight lines (red lines) from the four corners.Step Five -Draw four more straight lines (red lines). Two on the square number one and two on the side facing you in a slight angle.
<urn:uuid:8c421d96-6670-42c0-94fa-c11d1742fa83>
CC-MAIN-2016-26
http://themuslimartist.blogspot.com/2008/01/drawing-kaaba.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398869.97/warc/CC-MAIN-20160624154958-00187-ip-10-164-35-72.ec2.internal.warc.gz
en
0.884566
125
3.25
3
In the development market, it helps to develop contemporary devices to ensure top high quality tasks. For example, every street, link, or structures designed must be durable enough to avoid failure that may cause injuries. Moreover, a badly designed building or facilities will price any company even more cash due to its repair. Thus, it is much better to create any venture completely to avoid any issue gradually. Technological innovation delivers us new technology that create development tasks rather durable and efficient. Here are a few of the latest technology in the development market. The innovation of lcd arc technology are the excellent solution to enhance the poor fundamentals where structures, streets and connects are to be designed. In this process, the ground is warmed to increase its strength and balance and to reduce compressibility. This heat system for the ground enhances the high company's base dirt, thus avoiding landslides. Although this method has already persisted in the past, there are restrictions because of the costly treatments, complicated techniques and the restricted development equipment and programs. Hence, the lcd arc technology was developed to create a highly effective alkaline gas called lcd. The lcd flash light is used on the ground, warming it at a significant share of heat range. Hence, ongoing warming can cause the ground to become more strong and constant. With an extreme quantity of heat, the inflammation of the ground is reduced. The ground starts to liquefy and later on combines and become more complicated like some stone or stone. This technology is a more extreme warming ability than electric warming resources and energy resources. Thus, the tremendous heat range makes a better result in solidifying and contracting the ground. In effect, this makes the ground more strong and constant. However, more research and analysis are made to determine the potency of lcd in the development market. Research programs are done in Asia, Europe, South African-american and Sydney, among many other nations. Fiber Optic Receptors for Sturdy Structures Every year, streets and connects require servicing because some decline easily. The recovery of these components price a lot of cash and effort, which can be a issue for the government and federal areas. Thus, scientists have suggested the use smart components to enhance and avoid quick destruction of development tasks. Fraxel treatments is examined and analyzed at the School of Greater, in the Institution for Aerospace Studies. The scientists recommend the use of linens optic sensors to line the content of the connects. After implementing these sensors, these are protected with some compact artificial to avoid the destruction and damage of the framework. Hence, this will hopefully protect infrastructures and cause less need for street servicing. Although linens optic sensors are ideal in building up the components, thus avoiding destruction, these materials are quite costly. Moreover, there is still an comprehensive analysis done to confirm its efficiency in keeping streets and many other components. Some good reviews are still partially when it comes to determining whether the material is indeed effective or not. Thus, scientists continue to find out the value and functionality in using linens optics in the development tasks. These are only a few among the many other technology in the development market. The contemporary technology enhance greater enhancement in the facilities and development tasks. However, these technology face difficulties in terms of complete application in development tasks. The heavy price and inadequate analysis are among some of the reasons why the use of these new technology is not fully applied. Nevertheless, there are excellent opportunities of the complete use of know-how in the near future.
<urn:uuid:912eeb94-2d5a-43cf-8f6e-d060f621da30>
CC-MAIN-2016-26
http://inventions23.blogspot.com/2012/11/great-information-about-contemporary.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393463.1/warc/CC-MAIN-20160624154953-00201-ip-10-164-35-72.ec2.internal.warc.gz
en
0.944495
710
2.9375
3
Dust falls. Dust launched by upward-whirling winds on the swift currents of the upper air is often blown for hundreds of miles beyond the arid region from which it was taken. Dust falls from western storms are not unknown even as far east as the Great Lakes. In 1896 a “black snow” fell in Chicago, and in another dust storm in the same decade the amount of dust carried in the air over Rock Island, Ill., was estimated at more than one thousand tons to the cubic mile. In March, 1901, a cyclonic storm carried vast quantities of dust from the Sahara northward across the Mediterranean to fall over southern and central Europe. On March 8th dust storms raged in southern Algeria; two days later the dust fell in Italy; and on the 11th it had reached central Germany and Denmark. It is estimated that in these few days one million eight hundred thousand tons of waste were carried from northern Africa and deposited on European soil. We may see from these examples the importance of the wind as an agent of transportation, and how vast in the aggregate are the loads which it carries. There are striking differences between air and water as carriers of waste. Rivers flow in fixed and narrow channels to definite goals. The channelless streams of the air sweep across broad areas, and, shifting about continually, carry their loads back and forth, now in one direction and now in another. The mantle of waste of deserts is rapidly sorted by the wind. The coarser rubbish, too heavy to be lifted into the air, is left to strew wide tracts with residual gravels (Fig. 120). The sand derived from the disintegration of desert rocks gathers in vast fields. About one eighth of the surface of the Sahara is said to be thus covered with drifting sand. In desert mountains, as those of Sinai, it lies like fields of snow in the high valleys below the sharp peaks. On more level tracts it accumulates in seas of sand, sometimes, as in the deserts of Arabia, two hundred and more feet deep. Dunes. The sand thus accumulated by the wind is heaped in wavelike hills called dunes. In the desert of northwestern India, where the prevalent wind is of great strength, the sand is laid in longitudinal dunes, i.e. in stripes running parallel with the direction of the wind; but commonly dunes lie, like ripple marks, transverse to the wind current. On the windward side they show a long, gentle slope, up which grains of sand can readily be moved; while to the lee their slope is frequently as great as the angle of repose (Fig. 122). Dunes whose sands are not fixed by vegetation travel slowly with the wind; for their material is ever shifted forward as the grains are driven up the windward slope and, falling over the crest, are deposited in slanting layers in the quiet of the lee. Like river deposits, wind-blown sands are stratified, since they are laid by currents of air varying in intensity, and therefore in transporting power, which carry now finer and now coarser materials and lay them down where their velocity is checked (Fig. 123). Since the wind varies in direction, the strata dip in various directions. They also dip at various angles, according to the inclination of the surface on which they were laid.
<urn:uuid:816656df-ab33-43cd-ae20-5fd9717dc91d>
CC-MAIN-2016-26
http://www.bookrags.com/ebooks/4204/68.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398075.47/warc/CC-MAIN-20160624154958-00062-ip-10-164-35-72.ec2.internal.warc.gz
en
0.965371
682
3.75
4
Star Tiger to unveil submillimetre wave secrets The Star Tiger team today begins a four-month pioneering research and development project at Rutherford Appleton Laboratories (RAL), which could lead to a real breakthrough for submillimetre wave imaging. For the first time under the ESA Star Tiger initiative, eleven scientists and specialists from seven different European countries (The United Kingdom, Ireland, Italy, Germany, France, the Netherlands, and Spain) are working together in an innovative way. The idea is to get together a small group of highly motivated researchers, grant them full access to laboratory and production facilities, remove all administrative distractions, and let them work for an intense period of four months. What is Star Tiger? Star Tiger stands for 'Space Technology Advancements by Resourceful, Targeted and Innovative Groups of Experts and Researchers', a pioneering activity under the European Space Agency's Basic Technology Research Programme (TRP) to facilitate innovative, breakthrough research. The main aim is to reduce dramatically the development time for critical space technology programmes. The goal of this Star Tiger project is to realise the world’s first compact submillimetre wave imager using state-of-the-art micro-electro-mechanical technology. Such an imager is acknowledged to break a number of barriers today limiting scientific research in several fields. "If we succeed in building such an imager operating at these frequencies, it will represent a true breakthrough for submillimetre wave remote sensing from space,” said Peter de Maagt, ESA's Project Manager for Star Tiger. “In the field of planetary, cometary and atmospheric sensing, imaging arrays capable of measuring height-resolved spectral features in the submillimetre frequency range will have a major impact on instrumentation for monitoring issues such as climate change and ozone chemistry." For space astronomy observation the submillimetre wavelength will open up a virtually unexplored part of the spectrum. This could answer some of the big questions of how galaxies were formed in the early Universe, and how stars form, and have been forming, throughout the history of the Universe. On Earth such an imager has already been identified to be potentially very useful in medicine for early diagnosis of skin cancer, process control in industrial manufacturing, and non-invasive security systems for airports and other public areas. By observing submillimetre waves it is possible to see through many materials, and obtain the equivalent of an X-ray image without the use of X-rays. “The unique properties of submillimetre waves mean that there undoubtedly will be many other new applications. We just do not know how many yet,” continued De Maagt. Eleven innovative brains ESA and RAL have put together a team of professionals for the Star Tiger project. Eleven applicants were selected last April to cover all the necessary fields of expertise. “We have been very lucky,” explained Dr Chris Mann, the Project Manager at RAL. “We got many applications from very motivated and highly experienced researchers who were willing to put in the necessary time and effort over the summer to make this project a success. The eleven selected team members cover together all the technologies required to develop a compact colour submillimetre wave imager.” The imager will integrate such innovative technology areas as planar antenna technology, planar detector technology, micro-machining technology, photonic band gap materials and miniaturised back-end electronics. The key to success is the ready access to state-of-the-art equipment, facilities, computing power and technical support. The Space Science and Technology Department at RAL with top class laboratories, and some of the most highly regarded scientists and engineers, is the ideal setting for the project. Geoff McBride, Deputy Project Manager at RAL added, “we are happy to carry out this project at RAL and many of my colleagues are ready to provide assistance. The Star Tiger project team will have at their disposal all the resources of our Central Microstructure Facility and Millimetre Wave Technology Group.” A dedicated support team of many engineers and scientists at RAL will assist the Star Tiger team over the four-month project period. On Monday 24 June, the Star Tiger project will be officially inaugurated at Rutherford Appleton Laboratory (RAL) in Oxfordshire near Didcot. Among the invited speakers is Lord Sainsbury, Parliamentary Under-Secretary of State for Science and Innovation in the UK. ESA and RAL will formally introduce the project and the members of the Star Tiger team. Media interviews can be arranged. For queries from the media please contact: Jacky Hutchinson, CLRC Press Officer Tel: +44 1235 44 6482 Mobile: +44 777 55 85 811 For all further information on the Star Tiger project, please contact: Peter de Maagt, ESA Project Manager Tel: +31 71 565 5906 Dr Chris Mann, RAL Project Manager Tel: +44 7990 506110 Geoff McBride, RAL Deputy Project Manager Tel: +44 1235 446004
<urn:uuid:d409b0a7-ba3f-40c0-b063-7e9d625f3c85>
CC-MAIN-2016-26
http://www.esa.int/ESA_in_your_country/United_Kingdom/Star_Tiger_to_unveil_submillimetre_wave_secrets
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395560.14/warc/CC-MAIN-20160624154955-00039-ip-10-164-35-72.ec2.internal.warc.gz
en
0.900922
1,058
3.09375
3
- Banned Books Week celebrates the freedom to choose and the freedom to express one’s opinion, even if that opinion might be considered unpopular or unorthodox. The campaign stresses the importance of ensuring the availability of those viewpoints to all who wish to read them. - Banned Websites Awareness Day was created in order to raise awareness of the overly restrictive blocking of legitimate, educational websites and academically useful social networking tools in schools and school libraries. - CLC: Your Key to Accessing Libraries Across the State: Colorado Libraries Collaborate! provides FREE access to library resources for library users of all CLC member libraries. Currently all public, most school districts, academic and a number of special libraries are members. - Colorado Humanities along with Colorado Center for the Book, in affiliation with the Center for the Book in the Library of Congress, holds the Colorado contests for two national student literary competitions, Letters About Literature and River of Words. - Colorado Libraries for Early Literacy (CLEL): All children deserve the joy of reading and the skills in life that literacy brings. Colorado Libraries for Early Literacy is passionately committed to strengthening children's literacy through library services and community advocacy. - Conflict Resolution Month is celebrated annually in October. National and International Conflict Resolution Day is celebrated on the third Thursday of October as designated by The Association for Conflict Resolution. The Association for Conflict Resolution (ACR) is a professional organization dedicated to enhancing the practice and public understanding of conflict resolution. - Intergeneration Month, celebrated worldwide in September, connects generations through communication, celebration, and education. - Library Card Sign-up Month is in September, and the Campaign for America’s Libraries is looking for stories about how libraries are promoting the initiative. National Green Week The Green Education Foundation has put together a program including activities, projects and a toolkit. Geared more towards schools, but public libraries can use the materials as well. - Read Across America Day Grab Your Hat and Read with the Cat! Celebrate NEA's Read Across America Day. March 2 is fast approaching and NEA members across the country are mobilizing millions of students, parents, VIP readers and leaders to join the nation's largest reading celebration, are you ready? Here are 11 tips to make your event Seussational. - Teen Tech Week Teen Tech Week is a national initiative for teens, librarians, educators, parents, and other concerned adults that highlights the many types of technology available to teens at libraries, and encourages teens to take advantage of libraries' non-print resources. Return to Public Library Information home page For more information, contact 303-866-6900.
<urn:uuid:6b10aacf-0cb7-4fb5-81a5-5879b3244fbc>
CC-MAIN-2016-26
http://www.cde.state.co.us/cdelib/librarydevelopment/publiclibraries/Programs.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397562.76/warc/CC-MAIN-20160624154957-00136-ip-10-164-35-72.ec2.internal.warc.gz
en
0.92238
543
3.109375
3
Keep on Smiling Archived This broadcast discusses the inclusion of fluoride in drinking water, which is considered by CDC to be one of the top ten public health achievements of the twentieth century. Dr. Bill Bailey discusses why fluoridation is largely responsible for the decline in tooth decay in the United States over the previous 60 years. . Created: 7/11/2008 by MMWR. Date Released: 7/17/2008. Series Name: A Cup of Health with CDC. - Page last reviewed:March 12, 2015 - Page last updated:March 12, 2015 - Content source:
<urn:uuid:a4962434-3d77-4ace-83b6-d62eea9f2bb7>
CC-MAIN-2016-26
http://www2c.cdc.gov/podcasts/player.asp?f=9927
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396538.42/warc/CC-MAIN-20160624154956-00042-ip-10-164-35-72.ec2.internal.warc.gz
en
0.89905
122
2.796875
3
A car and driver weighing 7200 N passes a sign stating "Bridge out 21.3 m ahead." She slams on the brakes, and the car decelerates at a constant rate of 10.3 m/s squared. The acceleration of gravity is 9.8 m/s squared. What is the magnitude if the work done stopping the car if the car just stops in time to avoid diving into the water? Answer in units of J.
<urn:uuid:638f12fe-7d6b-489e-8f11-d3134e5c4ae7>
CC-MAIN-2016-26
http://www.chegg.com/homework-help/questions-and-answers/car-driver-weighing-7200-n-passes-sign-stating-bridge-213-m-ahead-slams-brakes-car-deceler-q1993653
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395679.18/warc/CC-MAIN-20160624154955-00124-ip-10-164-35-72.ec2.internal.warc.gz
en
0.93169
90
2.90625
3
||This article's lead section may not adequately summarize key points of its contents. (March 2012)| The Windows Registry is a hierarchical database that stores low-level settings for the Microsoft Windows operating system and for applications that opt to use the Registry. The kernel, device drivers, services, Security Accounts Manager (SAM), and user interface can all use the Registry. The Registry also allows access to counters for profiling system performance. When introduced with Windows 3.1, the Windows Registry primarily stored configuration information for COM-based components. Windows 95 and Windows NT extended its use to rationalise and centralise the information in the profusion of INI files, which held the configurations for individual programs, and were stored at various locations. It is not a requirement for Windows applications to use the Windows Registry. For example, .NET Framework applications use XML files for configuration, while portable applications usually keep their configuration files with their executable. Prior to the Windows Registry, .INI files stored each program's settings as a text file, often located in a shared location that did not provide user-specific settings in a multi-user scenario. By contrast, the Windows Registry stores all application settings in one logical repository (but a number of discrete files) and in a standardized form. According to Microsoft this offers several advantages over .INI files. Since file parsing is done much more efficiently with a binary format, it may be read from or written to more quickly than an INI file. As well, strongly typed data can be stored in the Registry, as opposed to the text information stored in .INI files. This is a benefit when editing keys manually using regedit.exe, the built-in Windows Registry editor. Because user-based Registry settings are loaded from a user-specific path rather than from a read-only system location, the Registry allows multiple users to share the same machine, and also allows programs to work for less privileged users. Backup and restoration is also simplified as the Registry can be accessed over a network connection for remote management/support, including from scripts, using the standard set of APIs, as long as the Remote Registry service is running and firewall rules permit this. Because the Registry is a database, it offers improved system integrity with features such as atomic updates. If two processes attempt to update the same Registry value at the same time, one process's change will precede the other's and the overall consistency of the data will be maintained. Where changes are made to .INI files, such race conditions can result in inconsistent data that does not match either attempted update. Windows Vista and later operating systems provide transactional updates to the Registry by means of the Kernel Transaction Manager, extending the atomicity guarantees across multiple key and/or value changes, with traditional commit–abort semantics. (Note however that NTFS provides such support for the file system as well, so the same guarantees could, in theory, be obtained with traditional configuration files.) The Registry contains two basic elements: keys and values. Registry keys are container objects similar to folders. Registry values are non-container objects similar to files. Keys may contain values or further keys. Keys are referenced with a syntax similar to Windows' path names, using backslashes to indicate levels of hierarchy. Keys must have a case insensitive name without backslashes. The hierarchy of Registry keys can only be accessed from a known root key handle (which is anonymous but whose effective value is a constant numeric handle) that is mapped to the content of a Registry key preloaded by the kernel from a stored "hive", or to the content of a subkey within another root key, or mapped to a registered service or DLL that provides access to its contained subkeys and values. E.g. HKEY_LOCAL_MACHINE\Software\Microsoft\Windows refers to the subkey "Windows" of the subkey "Microsoft" of the subkey "Software" of the HKEY_LOCAL_MACHINE root key. There are seven predefined root keys, traditionally named according to their constant handles defined in the Win32 API, or by synonymous abbreviations (depending on applications): Like other files and services in Windows, all Registry keys may be restricted by access control lists (ACLs), depending on user privileges, or on security tokens acquired by applications, or on system security policies enforced by the system (these restrictions may be predefined by the system itself, and configured by local system administrators or by domain administrators). Different users, programs, services or remote systems may only see some parts of the hierarchy or distinct hierarchies from the same root keys. Registry values are name/data pairs stored within keys. Registry values are referenced separately from Registry keys. Each Registry value stored in a Registry key has a unique name whose letter case is not significant. The Windows API functions that query and manipulate Registry values take value names separately from the key path and/or handle that identifies the parent key. Registry values may contain backslashes in their names, but doing so makes them difficult to distinguish from their key paths when using some legacy Windows Registry API functions (whose usage is deprecated in Win32). The terminology is somewhat misleading, as each Registry key is similar to an associative array, where standard terminology would refer to the name part of each Registry value as a "key". The terms are a holdout from the 16-bit Registry in Windows 3, in which Registry keys could not contain arbitrary name/data pairs, but rather contained only one unnamed value (which had to be a string). In this sense, the entire Registry was like a single associative array where the Registry keys (in both the Registry sense and dictionary sense) formed a hierarchy, and the Registry values were all strings. When the 32-bit Registry was created, so was the additional capability of creating multiple named values per key, and the meanings of the names were somewhat distorted. For compatibility with the previous behavior, each Registry key may have a "default" value, whose name is the empty string. Each value can store arbitrary data with variable length and encoding, but which is associated with a symbolic type (defined as a numeric constant) defining how to parse this data. The standard types are: |Type ID||Symbolic type name||Meaning and encoding of the data stored in the Registry value| |0||REG_NONE||No type (the stored value, if any)| |1||REG_SZ||A string value, normally stored and exposed in UTF-16LE (when using the Unicode version of Win32 API functions), usually terminated by a NUL character| |2||REG_EXPAND_SZ||An "expandable" string value that can contain environment variables, normally stored and exposed in UTF-16LE, usually terminated by a NUL character| |3||REG_BINARY||Binary data (any arbitrary data)| |4||REG_DWORD / REG_DWORD_LITTLE_ENDIAN||A DWORD value, a 32-bit unsigned integer (numbers between 0 and 4,294,967,295 [232 – 1]) (little-endian)| |5||REG_DWORD_BIG_ENDIAN||A DWORD value, a 32-bit unsigned integer (numbers between 0 and 4,294,967,295 [232 – 1]) (big-endian)| |6||REG_LINK||A symbolic link (UNICODE) to another Registry key, specifying a root key and the path to the target key| |7||REG_MULTI_SZ||A multi-string value, which is an ordered list of non-empty strings, normally stored and exposed in UTF-16LE, each one terminated by a NUL character, the list being normally terminated by a second NUL character.| |8||REG_RESOURCE_LIST||A resource list (used by the Plug-n-Play hardware enumeration and configuration)| |9||REG_FULL_RESOURCE_DESCRIPTOR||A resource descriptor (used by the Plug-n-Play hardware enumeration and configuration)| |10||REG_RESOURCE_REQUIREMENTS_LIST||A resource requirements list (used by the Plug-n-Play hardware enumeration and configuration)| |11||REG_QWORD / REG_QWORD_LITTLE_ENDIAN||A QWORD value, a 64-bit integer (either big- or little-endian, or unspecified) (introduced in Windows XP)| The keys at the root level of the hierarchical database are generally named by their Windows API definitions, which all begin "HKEY". They are frequently abbreviated to a three- or four-letter short name starting with "HK" (e.g. HKCU and HKLM). Technically, they are predefined handles (with known constant values) to specific keys that are either maintained in memory, or stored in hive files stored in the local filesystem and loaded by the system kernel at boot time and then shared (with various access rights) between all processes running on the local system, or loaded and mapped in all processes started in a user session when the user logs on the system. The HKEY_LOCAL_MACHINE (local machine-specific configuration data) and HKEY_CURRENT_USER (user-specific configuration data) nodes have a similar structure to each other; user applications typically look up their settings by first checking for them in "HKEY_CURRENT_USER\Software\Vendor's name\Application's name\Version\Setting name", and if the setting is not found, look instead in the same location under the HKEY_LOCAL_MACHINE key. However, the converse may apply for administrator-enforced policy settings where HKLM may take precedence over HKCU. The Windows Logo Program has specific requirements for where different types of user data may be stored, and that the concept of least privilege be followed so that administrator-level access is not required to use an application.[a] Even though the Registry presents itself as an integrated hierarchical database, branches of the Registry are actually stored in a number of disk files called hives. (The word hive constitutes an in-joke.) Some hives are volatile and are not stored on disk at all. An example of this is the hive of branch starting at HKLM\HARDWARE. This hive records information about system hardware and is created each time the system boots and performs hardware detection. Individual settings for users on a system is stored in a hive (disk file) per user. During user login the system loads the user hive under the HKEY_USERS key, but it also sets the HKCU (HKEY_CURRENT_USER) symbolic reference to point to the current user. This allows applications to store/retrieve settings for the current user implicitly under the HKCU key. Not all hives are loaded at any one time. At boot time only a minimal set of hives are loaded and after that hives are loaded as the operating system initializes and as users log in or whenever a hive is explicitly loaded by an application. The Registry contains important configuration information for the operating system, for installed applications as well as individual settings for each user and application. A careless change to the operating system configuration in the Registry could cause irreversible damage, so it is usually only installer programs which perform changes to the Registry database during installation/configuration and removal. If a user wants to edit the Registry manually, Microsoft recommends that a backup of the Registry is performed before the change. Editing the Registry is sometimes necessary when working around Windows-specific issues e.g. problems when logging onto a domain can be resolved by editing the Registry. Windows Registry can be edited manually using programs such as regedit.exe, although these tools do not expose some of Registry's metadata such as the last modified date. The registry editor for the 3.1/95 series of operating systems is RegEdit.exe and for Windows NT it is RegEdt32.exe; the functionalities are merged in Windows XP.<ref>Windows XP Resource Kit</ref> Optional and/or third-party tools similar to RegEdit.exe are available for many Windows CE versions. Registry Editor allows users to perform the following functions: .REG files (also known as Registration entries) are text-based human-readable files for exporting and importing portions of the Registry. On Windows 2000 and later, they contain the string Windows Registry Editor Version 5.00 at the beginning and are Unicode-based. On Windows 9x and NT 4.0 systems, they contain the string REGEDIT4 and are ANSI-based.[not in citation given] Windows 9x format .REG files are compatible with Windows 2000 and later. The Registry Editor on Windows on these systems also supports exporting .REG files in Windows 9x/NT format. Data is stored in .REG files in the following syntax: [<Hive name>\<Key name>\<Subkey name>] "Value name"=<Value type>:<Value data> The Default Value of a key can be edited by using @ instead of "Value Name": [<Hive name>\<Key name>\<Subkey name>] @=<Value type>:<Value data> String values do not require a <Value type> (see example), but backslashes ('\') need to be written as a double-backslash ('\\'), and quotes ('"') as backslash-quote ('\"'). For example, to add the values "Value A", "Value B", "Value C", "Value D", "Value E", "Value F", "Value G", "Value H", "Value I", "Value J", "Value K", "Value L", and "Value M" to the HKLM\SOFTWARE\Foobar key, Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SOFTWARE\Foobar] "Value A"="<String value data with escape characters>" "Value B"=hex:<Binary data (as comma-delimited list of hexadecimal values)> "Value C"=dword:<DWORD value integer> "Value D"=hex(0):<REG_NONE (as comma-delimited list of hexadecimal values)> "Value E"=hex(1):<REG_SZ (as comma-delimited list of hexadecimal values representing a UTF-16LE NUL-terminated string)> "Value F"=hex(2):<Expandable string value data (as comma-delimited list of hexadecimal values representing a UTF-16LE NUL-terminated string)> "Value G"=hex(3):<Binary data (as comma-delimited list of hexadecimal values)> ; equal to "Value B" "Value H"=hex(4):<DWORD value (as comma-delimited list of 4 hexadecimal values, in little endian byte order)> "Value I"=hex(5):<DWORD value (as comma-delimited list of 4 hexadecimal values, in big endian byte order)> "Value J"=hex(7):<Multi-string value data (as comma-delimited list of hexadecimal values representing UTF-16LE NUL-terminated strings)> "Value K"=hex(8):<REG_RESOURCE_LIST (as comma-delimited list of hexadecimal values)> "Value L"=hex(a):<REG_RESOURCE_REQUIREMENTS_LIST (as comma-delimited list of hexadecimal values)> "Value M"=hex(b):<QWORD value (as comma-delimited list of 8 hexadecimal values, in little endian byte order)> Data from .REG files can be added/merged with the Registry by double-clicking these files or using the /s switch in the command line. .REG files can also be used to remove Registry data. To remove a key (and all subkeys, values and data), the key name must be preceded by a minus sign ("-"). For example, to remove the HKLM\SOFTWARE\Foobar key (and all subkeys, values and data), To remove a value (and its data), the values to be removed must have a minus sign ("-") after the equal sign ("="). For example, to remove only the "Value A" and "Value B" values (and their data) from the HKLM\SOFTWARE\Foobar key, [HKEY_LOCAL_MACHINE\SOFTWARE\Foobar] "Value A"=- "Value B"=- To remove only the (Default) value of the key HKLM\SOFTWARE\Foobar (and its data), Lines beginning with a semicolon are considered comments: ; This is a comment. This can be placed in any part of a .reg file [HKEY_LOCAL_MACHINE\SOFTWARE\Foobar] "Value"="Example string" Windows group policies can change Registry keys for a number of machines or individual users based on policies. When a policy first takes effect for a machine or for an individual user of a machine, the Registry settings specified as part of the policy is applied to the machine or user settings. Windows will also look for updated policies and apply them periodically, typically every 90 minutes. Through its scope a policy defines which machines and/or users the policy is to be applied to. Whether a machine or user is within the scope of a policy or not is defined by a set of rules which can filter on the location of the machine/user account in organizational directory, specific user/machine accounts or security groups. More advanced rules can be set up using Windows Management Instrumentation expressions. Such rules can filter on properties such as computer vendor name, CPU architecture, installed software, networks connected to etc. For instance, the administrator can create a policy with one set of Registry settings for machines in the accounting department and policy with another (lock-down) set of Registry settings for kiosk terminals in the visitors area. When a machine is moved from one scope to another (e.g. changing its name or moving it to another organizational unit), the correct policy is automatically applied. When a policy is changed it is automatically re-applied to all machines currently in its scope. The policy is edited through a number of administrative templates which provides a user interface for picking and changing settings. The set of administrative templates is extensible and software packages which support such remote administration can register their own templates. The Registry can be manipulated in a number of ways from the command line. The RegIni.exe utility tools are included in Windows XP and later versions of Windows. Alternative locations for legacy versions of Windows include the Resource Kit CDs or the original Installation CD of Windows. .REG file can be imported from the command line with the following command: RegEdit.exe /s file The /s means the file will be silent merged to the Registry. If the /s parameter is omitted the user will be asked to confirm the operation. In Windows 98, Windows 95 and at least some configurations of Windows XP the /s switch also causes RegEdit.exe to ignore the setting in the Registry that allows administrators to disable it. When using the RegEdit.exe does not return an appropriate return code if the operation fails, unlike Reg.exe which does. RegEdit.exe /e file exports the whole Registry in V5 format to a UNICODE .REG file, while any of RegEdit.exe /e file HKEY_CLASSES_ROOT[\<key>] RegEdit.exe /e file HKEY_CURRENT_CONFIG[\<key>] RegEdit.exe /e file HKEY_CURRENT_USER[\<key>] RegEdit.exe /e file HKEY_LOCAL_MACHINE[\<key>] RegEdit.exe /e file HKEY_USERS[\<key>] export the specified (sub)key (which has to be enclosed in quotes if it contains spaces) only. RegEdit.exe /a file exports the whole Registry in V4 format to an ANSI RegEdit.exe /a file <key> exports the specified (sub)key (which has to be enclosed in quotes if it contains spaces) only. We can use also Reg.exe. Here is a sample to display the value of the Registry value Version: Reg.exe QUERY HKLM\Software\Microsoft\ResKit /v Version Registry permissions can be manipulated through the command line using RegIni.exe and the SubInACL.exe tool. For example, the permissions on the HKEY_LOCAL_MACHINE\SOFTWARE key can be displayed using: SubInACL.exe /keyreg HKEY_LOCAL_MACHINE\SOFTWARE /display Windows PowerShell comes with a Registry provider which presents the Registry as a location type similar to the file system. The same commands used to manipulate files/directories in the file system can be used to manipulate keys/values of the Registry. Also like the file system, PowerShell uses the concept of a current location which defines the context on which commands by default operate. The Get-ChildItem (also available through the alias ls or dir) retrieves the child keys of the current location. By using the Set-Location (or the alias cd) command the user can change the current location to another key of the Registry. Commands which rename items, remove items, create new items or set content of items or properties can be used to rename keys, remove keys or entire sub-trees or change values. Through PowerShell scripts files a user/administrator can prepare scripts which, when executed, make changes to the Registry. Such scripts can be distributed to users/administrators who can execute them on individual machines. The PowerShell Registry provider supports transactions, i.e. multiple changes to the Registry can be bundled into a single atomic transaction. An atomic transaction ensures that either all of the changes are committed to the database, or if the script fails, none of the changes is committed to the database. The Registry can be edited through the APIs of the Advanced Windows 32 Base API Library (advapi32.dll). |List of Registry API functions| Many programming languages offer built-in runtime library functions or classes that wrap the underlying Windows APIs and thereby enable programs to store settings in the Registry (e.g. Microsoft.Win32.Registry in VB.NET and C#, or TRegistry in Delphi and Free Pascal). COM-enabled applications like Visual Basic 6 can use the WSH WScript.Shell object. Another way is to use the Windows Resource Kit Tool, Reg.exe by executing it from code, although this is considered poor programming practice. Similarly, scripting languages such as Perl (with Win32::TieRegistry), Python (with winreg), TCL (which comes bundled with the Registry package), Windows Powershell and Windows Scripting Host also enable Registry editing from scripts. Prior to the introduction of registration-free COM, developers were encouraged to add initialization code to in-process and out-of-process binaries to perform the Registry configuration required for that object to work. For in-process binaries such as .DLL and .OCX files, the modules typically exported a function called DllInstall() that could be called by installation programs or invoked manually with utilities like Regsvr32.exe; out-of-process binaries typically support the commandline arguments /Regserver and /Unregserver that created or deleted the required Registry settings. COM applications that break because of DLL Hell issues can commonly be repaired with RegSvr32.exe or the /RegServer switch without having to re-invoke installation programs. Windows exposes APIs that allows user-mode applications to register to receive a notification event if a particular Registry key is changed. APIs are also available to allow kernel-mode applications to filter and modify Registry calls made by other applications. Windows also supports remote access to the Registry of another computer via the RegConnectRegistry function if the Remote Registry service is running, correctly configured and its network traffic is not firewalled. The Registry is physically stored in several files, which are generally obfuscated from the user-mode APIs used to manipulate the data inside the Registry. Depending upon the version of Windows, there will be different files and different locations for these files, but they are all on the local machine. The location for system Registry files in Windows NT is %SystemRoot%\System32\Config; the user-specific HKEY_CURRENT_USER user Registry hive is stored in Ntuser.dat inside the user profile. There is one of these per user; if a user has a roaming profile, then this file will be copied to and from a server at logout and login respectively. A second user-specific Registry file named UsrClass.dat contains COM Registry entries and does not roam by default. Windows NT systems store the Registry in a binary file format which can be exported, loaded and unloaded by the Registry Editor in these operating systems. The following system Registry files are stored in %SystemRoot%\System32\Config\: The following file is stored in each user's profile folder: For Windows 2000, Server 2003 and Windows XP, the following additional user-specific file is used for file associations and COM information: For Windows Vista and later, the path was changed to: Windows 2000 kept an alternate copy of the Registry hives (.ALT) and attempts to switch to it when corruption is detected. Windows XP and Windows Server 2003 do not maintain a System.alt hive because NTLDR on those versions of Windows can process the System.log file to bring up to date a System hive that has become inconsistent during a shutdown or crash. In addition, the %SystemRoot%\Repair folder contains a copy of the system's Registry hives that were created after installation and the first successful startup of Windows. Each Registry data file has an associated file with a ".log" extension that acts as a transaction log that is used to ensure that any interrupted updates can be completed upon next startup. Internally, Registry files are split into 4 kB "bins" that contain collections of "cells". The Registry files are stored in the %WINDIR% directory under the names USER.DAT and SYSTEM.DAT with the addition of CLASSES.DAT in Windows Me. Also, each user profile (if profiles are enabled) has its own USER.DAT file which is located in the user's profile directory in %WINDIR%\Profiles\<User name>\. The only Registry file is called REG.DAT and it is stored in the %WINDIR% directory. Each key in the Registry of Windows NT versions can have an associated security descriptor. The security descriptor contains an access control list (ACL) that describes which user groups or individual users are granted or denied access permissions. The set of Registry permissions include 10 rights/permissions which can be explicitly allowed or denied to a user or a group of users. |Query Value||The right to read the Registry key value.| |Set Value||The right to write a new value| |Create Subkey||The right to create subkeys.| |Enumerate Subkeys||Allow the enumeration of subkeys.| |Notify||The right to request change notifications for Registry keys or subkeys.| |Create Link||Reserved by the operating system.| |Delete||The right to delete a key.| |Write DACL||The right to modify permissions of the container’s DACL.| |Write Owner||The right to modify the container’s owner.| |Read Control||The right to read the DACL.| As with other securable objects in the operating system, individual access control entries (ACE) on the security descriptor can be explicit or inherited from a parent object. Windows Resource Protection is a feature of Windows Vista and later versions of Windows that uses security to deny Administrators and the system WRITE access to some sensitive keys to protect the integrity of the system from malware and accidental modification. Special ACEs on the security descriptor can also implement mandatory integrity control for the Registry key and subkeys. A process running at a lower integrity level cannot write, change or delete a Registry key/value, even if the account of the process has otherwise been granted access through the ACL. For instance, Internet Explorer running in Protected Mode can read medium and low integrity Registry keys/values of the currently logged on user, but it can only modify low integrity keys. Outside security, Registry keys cannot be deleted or edited due to other causes. Registry keys containing NUL characters cannot be deleted with standard registry editors and require a special utility for deletion, such as RegDelNull. Different editions of Windows have supported a number of different methods to back up and restore the Registry over the years, some of which are now deprecated: RDISK.EXE, a utility to back up and restore the entire Registry. Windows 2000 and later versions of Windows use Group Policy to enforce Registry settings through a Registry-specific client extension in the Group Policy processing engine. Policy may be applied locally to a single computer using gpedit.msc, or to multiple users and/or computers in a domain using gpmc.msc. With Windows 95, Windows 98, Windows ME and Windows NT 4.0, administrators can use a special file to be merged into the Registry, called a policy file (POLICY.POL). The policy file allows administrators to prevent non-administrator users from changing Registry settings like, for instance, the security level of Internet Explorer and the desktop background wallpaper. The policy file is primarily used in a business with a large number of computers where the business needs to be protected from rogue or careless users. The default extension for the policy file is .POL. The policy file filters the settings it enforces by user and by group (a "group" is a defined set of users). To do that the policy file merges into the Registry, preventing users from circumventing it by simply changing back the settings. The policy file is usually distributed through a LAN, but can be placed on the local computer. The policy file is created by a free tool by Microsoft that goes by the filename poledit.exe for Windows 95/Windows 98 and with a computer management module for Windows NT. The editor requires administrative permissions to be run on systems that uses permissions. The editor can also directly change the current Registry settings of the local computer and if the remote Registry service is installed and started on another computer it can also change the Registry on that computer. The policy editor loads the settings it can change from .ADM files, of which one is included, that contains the settings the Windows shell provides. The .ADM file is plain text and supports easy localisation by allowing all the strings to be stored in one place. Windows NT kernels support redirection of INI file-related APIs into a virtual file in a Registry location such as HKEY_CURRENT_USER using a feature called "InifileMapping". This functionality was introduced to allow legacy applications written for 16-bit versions of Windows to be able to run under Windows NT platforms on which the System folder is no longer considered an appropriate location for user-specific data or configuration. Non-compliant 32-bit applications can also be redirected in this manner, even though the feature was originally intended for 16-bit applications. Windows Vista introduced limited Registry virtualization, whereby poorly written applications that do not respect the principle of least privilege and instead try to write user data to a read-only system location (such as the HKEY_LOCAL_MACHINE hive), are silently redirected to a more appropriate location, without changing the application itself. Of course this also meant that well written applications that needed to write to system locations ceased to work. Similarly, application virtualization redirects all of an application's invalid Registry operations to a location such as a file. Used together with file virtualization, this allows applications to run on a machine without being installed on it. Low integrity processes may also use Registry virtualization. For example, Internet Explorer 7 or 8 running in "Protected Mode" on Windows Vista and above will automatically redirect Registry writes by ActiveX controls to a sandboxed location in order to frustrate some classes of security exploits. The Application Compatibility Toolkit provides shims that can transparently redirect HKEY_LOCAL_MACHINE or HKEY_CLASSES_ROOT Registry operations to HKEY_CURRENT_USER to address "LUA" bugs that cause applications not to work for users with insufficient rights. Critics labeled the Registry in Windows 95 a single point of failure, because re-installation of the operating system was required if the Registry became corrupt. However, Windows NT uses transaction logs to protect against corruption during updates. Current versions of Windows use two levels of log files to ensure integrity even in the case of power failure or similar catastrophic events during database updates. Even in the case of a non-recoverable error, Windows can repair or re-initialize damaged Registry entries during system boot. |This section needs additional citations for verification. (November 2010) (Learn how and when to remove this template message)| In Windows, use of the Registry for storing program data is a matter of developer's discretion. Microsoft provides programming interfaces for storing data in XML files (via MSXML) or database files (via SQL Server Compact) which developers can use instead. Developers are also free to use non-Microsoft alternative or develop their own proprietary data stores. In contrast to Windows Registry's binary-based database model, some other operating systems use separate plain-text files for daemon and application configuration, but group these configurations together for ease of management. |Wikibooks has a book on the topic of: Windows registry hacks|
<urn:uuid:07319918-f3b1-4493-a9da-8e78a9aa93bd>
CC-MAIN-2016-26
http://www.mashpedia.com/Windows_Registry
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396887.54/warc/CC-MAIN-20160624154956-00019-ip-10-164-35-72.ec2.internal.warc.gz
en
0.865841
7,171
3.484375
3
A group of Chinese and Turkish evangelical explorers say wooden remains they have discovered on Mount Ararat in eastern Turkey are the remains of Noah's Ark.On the other hand: The group claims that carbon dating proves the relics are 4,800 years old, meaning they date to around the same time the ark was said to be afloat. Mt. Ararat has long been suspected as the final resting place of the craft by evangelicals and literalists hoping to validate biblical stories. Yeung Wing-Cheung, from the Noah's Ark Ministries International research team that made the discovery, said: "It's not 100 percent that it is Noah's Ark, but we think it is 99.9 percent that this is it." Earlier this week a group of Chinese Christians held a news conference to announce they were 99.9 percent sure they had found Noah's Ark — the boat the Bible says was built by God's most righteous man before a "sinful" human race drowned in the Great Flood.I'm going to need a lot more evidence before I believe that this is the real Ark mentioned in Genesis. Maybe the find on Mount Ararat in Turkey really is Noah's Ark. More likely, it isn't. But if it isn't, that won't stop Ark enthusiasts from believing it is out there somewhere. Immediately in the wake of the news flash, experts weighed in to shoot it down. "The wood in the photos is not old enough" ... "There are no location pictures to verify the site" ... "No independent experts have looked at the data" ... "There's never been evidence of a great flood." And the people voicing the loudest caution are biblical archeologists who believe the ark is real and that it can be found.
<urn:uuid:85439526-567b-4205-a3d6-a9e6741d9147>
CC-MAIN-2016-26
http://rightontheleftcoast.blogspot.com/2012/04/noahs-ark-found.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403823.74/warc/CC-MAIN-20160624155003-00061-ip-10-164-35-72.ec2.internal.warc.gz
en
0.974409
360
2.5625
3
A compiler that can convert instructions into machine code or low level code for a computer other than that on which it is run. - To compile on Windows, you may need a cross-compiler. - Here, we use the cross-compiler to demonstrate a simple program. - This will download and compile the basic cross-compiler tool chain. For editors and proofreaders Definition of cross-compiler in: What do you find interesting about this word or phrase? Comments that don't adhere to our Community Guidelines may be moderated or removed.
<urn:uuid:c4e68060-9a95-49cf-a351-4d66f82054af>
CC-MAIN-2016-26
http://www.oxforddictionaries.com/definition/american_english/cross-compiler
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393442.26/warc/CC-MAIN-20160624154953-00022-ip-10-164-35-72.ec2.internal.warc.gz
en
0.806272
119
3.171875
3
Leaded gasoline predominant source of lead exposure in latter 20th century Leaded gasoline was responsible for about two-thirds of toxic lead that African-American children in Cleveland ingested or inhaled during the latter two-thirds of the 20th century, according to a new study in Science of the Total Environment. Researchers from Case Western Reserve University say what they've shown in Cleveland probably applies to many cities across the U.S. and reinforces concerns about the health threat for children in countries still using leaded gasoline. However, they emphasize that the results do not minimize the ongoing importance of current childhood lead exposure due to persistence and deterioration of leaded paint which was used as late as the 1960's. Extrapolation from lead analyses of teeth from 124 residents of urban Cleveland neighborhoods show that “at the peak of leaded gasoline usage, in the 1960's and early 70's, the levels of lead in the bloodstream were likely to be toxic,” said Norman Robbins, emeritus professor of neurosciences at Case Western Reserve School of Medicine. Research of others has shown that these levels of lead are associated with significant neurological and behavioral defects lasting into adulthood, he said. "It raises the question, has leaded gasoline had a lasting effect on many present-day Cleveland adults?" Robbins said. Robbins, who began the study 17 years ago, put together an interdisciplinary team to determine what was the predominant recent historic source of lead exposure within the city. Leaded gasoline, lead paint, and lead soldering in food cans had been implicated. "The findings are important today," said Jiayang Sun, professor of statistics at CWRU and a co-author of the study. "Some countries are still using leaded gasoline." The United Nations Environment Programme says Afghanistan, Myanmar and North Korea rely on leaded gasoline while Algeria, Bosnia, Egypt, Iraq, Serbia and Yemen sell both leaded and unleaded gasoline. The researchers here used a comprehensive analysis of data collected from multiple sources, including the Cleveland tooth enamel data from 1936 to 1993, two different Lake Erie sediment data sets (one collected by faculty from the CWRU Geology dept), data from the Bureau of Mines and traffic data from the Ohio Bureau of Motor Vehicles. Because blood tests to determine lead levels were unreliable prior to the mid 1970s, the team used lead levels in the enamel of teeth removed from adults at Cleveland dental clinics to determine their childhood lead exposure. James A. Lalumandier, chairman of the Department of Community Dentistry at CWRU's School of Dental Medicine, obtained teeth, which were removed from for dental reasons. Richard A. Shulze, a former dental student now in private practice, developed the method to extract lead samples from the enamel. They trimmed the outer layers to reveal lead trapped within the enamel of developing first and second molars. Like trees, teeth grow in layers around the center, Lalumandier said. The enamel layers in first and second molars provide a permanent record of the lead to which the tooth’s owner was exposed, with mid-points of lead incorporation at about ages 3 and 7, respectively. The researchers obtained the birthplace, age, sex and race of the owners and wound back the clock. Chemistry Professor Michael E. Ketterer began the lead analysis at John Carroll University in Cleveland and continued after moving to Northern Arizona University. Lead levels in the teeth were compared to reliable blood levels taken in the 1980s and 1990s, Lake Erie sediment cores that reflect atmospheric lead levels of the past, as well as leaded gasoline use by year. Sun and former PhD student Zhong-Fa Zhang, now at the Wistar Institute in Philadelphia, who joined in the study in late 2003, developed and applied modern statistical methods to mine the information and compare data curves created with the tooth, blood, sediment and usage data. The impact of the new statistical technique motivated by this study, goes beyond this lead application; it has a general application to simultaneous comparison of curves needed in other biomedical data applications. The data shows leaded gasoline was the primary cause of exposure, with lead levels in teeth comparatively low in 1936 and increasing dramatically, mirroring the usage of leaded gas and atmospheric lead levels, which tripled from the 1930s to the mid 1960's. The time dependency of the lead isotope ratios in tooth enamel, measured in Ketterer's laboratory, also closely matched that of atmospheric deposition from gasoline. If the main source of lead in teeth had been lead from paint and food can solder that were commonly used at the turn of the last century up through the 1960s, the data would have shown consistently high levels of lead in teeth already in the 1930s and a modest rise as lead was introduced into gasoline from that decade up until usage peaked in the mid 1960s. Traffic data kept by the Ohio Department of Transportation reinforced the finding. The researchers found that children in neighborhood clusters with the highest number of cars on their roads also had the highest levels of lead in their teeth. Cleveland is hardly unique in the nation's history of lead usage and exposure, Robbins said. "What we found here we expect to be similar to urban areas in the rest of the country." The study was funded by the Mary Ann Swetland Endowment, Case Western Reserve University and by grants or programs of the National Science Foundation.
<urn:uuid:f224784d-94db-42c1-8035-e200f180201f>
CC-MAIN-2016-26
http://blog.case.edu/think/2010/08/09/leaded_gasoline_predominant_source_of_lead_exposure_in_latter_20th_century
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396459.32/warc/CC-MAIN-20160624154956-00166-ip-10-164-35-72.ec2.internal.warc.gz
en
0.967821
1,111
3.28125
3
See Snapshots Archive. Snapshot for November 9, 2005. Katrina Evacuees Face Extreme Levels of Joblessness Hurricane Katrina hit the Gulf Coast on August 29, forcing hundreds of thousands of people to leave their homes and communities, as well as their jobs. While some of them have managed to return home, most have not. According to new data from the Bureau of Labor Statistics (BLS), joblessness remains rampant among the evacuees, especially those who have yet to return to their homes. In fact, only about half the African American evacuees who looked for work and are still away from home have been able to find a job. Last week, the BLS reported that the nation’s unemployment rate was 5% in October. The BLS also reported the results of a new set of questions it added to its monthly survey to learn the employment status of those who evacuated the Gulf Coast in the wake of Katrina. The BLS identified 800,000 evacuees in October, 500,000 of whom have yet to return to their homes (since this comes from the regular household survey, it misses the many thousands housed in hotels and shelters, so it is an incomplete accounting of this population). When taken together—that is, both those still away from home and those who have returned—their overall unemployment rate is a staggering 24.5%, but the rate for minorities is even higher, about 42% for both blacks and Hispanics. The chart also shows that those who have made it back to their homes (or at least back to the region) have much lower levels of joblessness, with especially large gains for blacks, whose jobless rate fell over 30 percentage points for returnees (thus driving down the black/white unemployment gap as well). Source: Bureau of Labor Statistics special tabulations from the Current Population Survey, Oct. 2005. But the majority of evacuees have not returned to the region, and they had the greatest difficulty finding work. Jobless rates for these displaced persons were about 24% for whites, just under 50% for African American, and 42% for Hispanics. Blacks who evacuated were much less likely than whites to have returned: only 21% of black evacuees have returned compared to 48% of whites. Although anecdotes have surfaced that show evacuees integrating successfully into their new communities, quickly finding jobs and housing, these new data—from the first government report on the Katrina evacuees—reveal that a large proportion of them are in reality struggling to find work. And not only are they without jobs, but many of these people lost much of their property and possessions in the storm, and it is likely that few have significant savings on which to fall back. The difference between the chart’s second and third set of bars suggests the need for a policy intervention that would significantly boost the job prospects of those evacuees who want to return home. Given that many of those who left the affected areas have low incomes and little savings, they need to get back to work as soon as possible. Congress should quickly craft and implement policies to help them find transportation to return to the Gulf, temporary housing, and a system to help match them up with employers, including contractors engaged in federally funded reconstruction. This week’s Snapshot was written by EPI economist Jared Bernstein.
<urn:uuid:76c0d6f5-b065-4e36-8a33-8164462904f0>
CC-MAIN-2016-26
http://www.epi.org/publication/webfeatures_snapshots_20051109/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395992.75/warc/CC-MAIN-20160624154955-00137-ip-10-164-35-72.ec2.internal.warc.gz
en
0.975825
687
3.046875
3
Monday Tuesday & Wednesday we need an assessment (grade/test/quiz) on the ideas of transformations. 1) perform transformations by hand (show me as you do it) 2) perform transformations on computer (show me as you do it) 3) write rules/describe transformations (paper quiz) 4) identify symmetries (paper quiz) 5) perform & describe composite transformations Thursday & Friday revisit Surface Area and Volume. Partners get a shape and show everyone how to calculate the SA & V of it Partners should design 3 composite shapes and calculate surface area and volume of the shapes The final two weeks we will work on Statistics & Data Analysis You will need to create some surveys to have data to analyze
<urn:uuid:86a9a20f-f5d2-4d70-9dea-cd0708bf0162>
CC-MAIN-2016-26
https://sites.google.com/a/buckeyeschools.org/2010psgeometry5th/weeklyplans/may09to13
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397428.37/warc/CC-MAIN-20160624154957-00140-ip-10-164-35-72.ec2.internal.warc.gz
en
0.8246
155
2.8125
3
Viruses cause most coughs and sore throats. Using an antibiotic to treat this type of infection simply won't work. What's more, it could mean that the next time your baby has a bacterial illness, it may be harder to cure with antibiotics. To help prevent this scary scenario, the American Academy of Pediatrics, the Centers for Disease Control and Prevention, and other groups have launched the new "Get Smart: Know When Antibiotics Work" campaign. Here's what parents need to know. ? Recognize the difference: Most illnesses are caused by one of two types of germs -- bacteria or viruses. Bacteria cause some ear and sinus infections, strep throat, and some pneumonia. These can be cured with antibiotics. Viruses, on the other hand, cause the common cold and the flu. Your baby recovers from these basic viral infections when the illness has run its course. Using antibiotics to treat a virus won't cure the infection, help your child feel better, or keep others from catching his illness. ? Talk to your doctor: Even when you know the difference between a bacterial and viral infection, you can't always tell which is causing your baby's illness. That's why it's important to consult your pediatrician. She'll examine your baby, run tests if necessary, and then make a diagnosis and recommend treatment. ? Use antibiotics properly: If the pediatrician determines that your baby has a bacterial infection and prescribes an antibiotic, follow the dosing schedule and finish the medicine, even if he seems to be feeling better. Never save an antibiotic to use again in the future. Using only part of the prescription means that only part of the infection has been treated and can cause resistant bacteria to develop. Also, never give your baby an antibiotic that was prescribed for another family member. ? Immunize your baby: One of the most important things you can do to protect him is make sure he gets all the recommended vaccinations on schedule. Fully immunizing him can reduce the likelihood that he'll get an infection for which antibiotics would be prescribed. Your pediatrician can tell you which shots your little one needs and when he needs to get them. To learn more about antibiotics, contact your pediatrician or visit the "Get Smart: Know When Antibiotics Work" website at www.cdc.gov/drugresistance/community/.
<urn:uuid:6de663d2-c618-49a4-b569-ce00d2171ced>
CC-MAIN-2016-26
http://www.parenting.com/article/antibiotic-alert-21332986
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398869.97/warc/CC-MAIN-20160624154958-00035-ip-10-164-35-72.ec2.internal.warc.gz
en
0.950532
479
3.1875
3
This document defines N-Triples, a concrete syntax for RDF [[!RDF11-CONCEPTS]]. N-Triples is an easy to parse line-based subset of Turtle [[!TURTLE]]. The syntax is a revised version of N-Triples as originally defined in the RDF Test Cases [[!RDF-TESTCASES]] document. Its original intent was for writing test cases, but it has proven to be popular as an exchange format for RDF data. An N-Triples document contains no parsing directives. N-Triples triples are a sequence of RDF terms representing the subject, predicate and object of an RDF Triple. These may be separated by white space (spaces U+0020 or tabs U+0009). This sequence is terminated by a ' .' and a new line (optional at the end of a document). N-Triples triples are also Turtle simple triples, but Turtle includes other representations of RDF terms and abbreviations of RDF Triples. When parsed by a Turtle parser, data in the N-Triples format will produce exactly the same triples as a parser for the N-triples language. The RDF graph represented by an N-Triples document contains exactly each triple matching the N-Triples The simplest triple statement is a sequence of (subject, predicate, object) terms, separated by whitespace and terminated by ' .' after each triple. IRIs may be written only as absolute IRIs. IRIs are enclosed in ' <' and ' >' and may contain numeric escape sequences (described below). For example Literals are used to identify values such as strings, numbers, dates. Literals (Grammar production Literal) have a lexical form followed by a language tag, a datatype IRI, or neither. The representation of the lexical form consists of an " (U+0022), a sequence of permitted characters or numeric escape sequence or string escape sequence, and a final delimiter. Literals may not contain the characters CR except in their escaped forms. In addition ' \' (U+005C) may not appear in any quoted literal except as part of an escape sequence. The corresponding RDF lexical form is the characters between the delimiters, after processing any escape sequences. If present, the language tag is preceded by a ' If there is no language tag, there may be a datatype IRI, preceded by ' ^^' (U+005E U+005E). If there is no datatype IRI and no language tag it is a simple literal and the datatype is RDF blank nodes in N-Triples are expressed as _: followed by a blank node label which is a series of name characters. The characters in the label are built upon PN_CHARS_BASE, liberalized as follows: [0-9]may appear anywhere in a blank node label. .may appear anywhere except the first or last character. U+2040are permitted anywhere except the first character. A fresh RDF blank node is allocated for each unique blank node label in a document. Repeated use of the same blank node label identifies the same RDF blank node. \ffor backspace and form feed This section defined a canonical form of N-Triples which has less variability in layout. The grammar for the language is the same. Implementers are encouraged to produce this form. Canonical N-Triples has the following additional constraints on layout: objectMUST be a single space, ( U+0020). All other locations that allow whitespace MUST be empty. HEXMUST use only uppercase letters ( U+000Dare encoded using ECHARMUST NOT be used for characters that are allowed directly in STRING_LITERAL_QUOTE. This specification defines conformance criteria for: A conforming N-Triples document is a Unicode string that conforms to the grammar and additional constraints defined in , starting with the ntriplesDoc production. An N-Triples document serializes an RDF graph. A conforming Canonical N-Triples document is an N-Triples document that follows the additional constraints of Canonical N-Triples. A conforming N-Triples parser is a system capable of reading N-Triples documents on behalf of an application. It makes the serialized RDF graph, as defined in , available to the application, usually through some form of API. The IRI that identifies the N-Triples language is: The media type of N-Triples is The content encoding of N-Triples is always UTF-8. See N-Triples Media Type for the media type N-Triples has been historically provided with other media types. N-Triples may also be provided as text/plain. When used in this way N-Triples MUST use the escaped form of any character outside US-ASCII. As N-Triples is a subset of Turtle an N-Triples document MAY also be provided as text/turtle. In both of these cases the document is not an N-Triples document as an N-Triples document is only provided as An N-Triples document is a Unicode [[!UNICODE]] character string encoded in UTF-8. Unicode code points only in the range U+0 to U+10FFFF inclusive are allowed. White space (tab U+0009 or space U+0020) is used to separate two terminals which would otherwise be (mis-)recognized as one terminal. White space is significant in the production STRING_LITERAL_QUOTE. Comments in N-Triples take the form of ' STRING_LITERAL_QUOTE, and continue up-to, and excluding, the end of line ( or end of file if there is no end of line after the comment marker. Comments are treated as white space. The EBNF used here is defined in XML 1.0 [[!EBNF-NOTATION]]. Escape sequence rules are the same as Turtle [[TURTLE]]. However, as only the STRING_LITERAL_QUOTE production is allowed new lines in literals MUST be escaped. Parsing N-Triples requires a state of one item: bnodeLabels— A mapping from string to blank node. This table maps productions and lexical tokens to RDF terms or components of RDF terms listed in : |IRIREF||IRI||The characters between "<" and ">" are taken, with escape sequences unescaped, to form the unicode string of the IRI.| |STRING_LITERAL_QUOTE||lexical form||The characters between the outermost '"'s are taken, with escape sequences unescaped, to form the unicode string of a lexical form.| |LANGTAG||language tag||The characters following the | |literal||literal||The literal has a lexical form of the first rule argument, | |BLANK_NODE_LABEL||blank node||The string after '| An N-Triples document defines an RDF graphs composed of a set of RDF triples. The triple production produces a triple defined by the terms constructed for The editor of the RDF 1.1 edition acknowledges valuable contributions from Gregg Kellogg, Eric Prud'hommeaux, Dave Beckett, David Robillard, Gregory Williams, Pat Hayes, Richard Cyganiak, Henry S. Thompson, Peter Ansell, Evan Patton and David Booth. This specification is a product of extended deliberations by the members of the RDF Working Group. It draws upon the earlier specification in RDF Test Cases, edited by Dave Beckett. No substantive changes. The Internet Media Type / MIME Type for N-Triples is "application/n-triples". It is recommended that N-Triples files have the extension ".nt" (all lowercase) on all platforms. It is recommended that N-Triples files stored on Macintosh HFS file systems be given a file type of "TEXT". This information that follows will be submitted to the IESG for review, approval, and registration with IANA.
<urn:uuid:ca0df4ee-c6d0-4b84-90b7-5a06f6bc36ab>
CC-MAIN-2016-26
https://dvcs.w3.org/hg/rdf/raw-file/default/rdf-turtle/n-triples.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393442.26/warc/CC-MAIN-20160624154953-00001-ip-10-164-35-72.ec2.internal.warc.gz
en
0.814009
1,794
3.265625
3
Within the insect order Hymenoptera, family Sphecidae, is the Sphex genus with over 130 recognized species and subspecies. One of the larger and more impressive thread-waisted is the Great Golden Digger Wasp or Sphex ichneumoneus. Aptly named, as the term "ichneumoneus" is Greek for tracker, these robust wasps are known for tracking their prey. Great Goldens are one-half to over an inch in length, though some sightings have reported seeing them as large as two inches. Great Goldens are easily spotted during the summer. Their black head and thorax are covered with short golden hair. Half of the back segment of their abdomen is also black with their front segment and legs a reddish-orange. Great Goldens have large amber wings that actually make a rustling noise when they fly. This wasp is related to the Giant Cicada Killer Wasp (Sphecius speciosus, which is common in the Galveston-Houston area) although Great Goldens are a little more wasp-like. Occurring in North America, Mexico, Central America, South America and the Caribbean, Great Goldens are usually seen in parks, gardens, fields and meadows—anywhere that is sunny, has compacted clay and sand, flower nectar for adults to feed on, and crickets, grasshoppers and katydids for their larvae. The adult wasps subside strictly on sap fluids and a variety of flower nectars that bloom during their flying time. Spotting them is one thing, but observing them can be dicey. Great Goldens do not linger around a bloom for very long and are quite wary of anything larger than they are. Fortunately, though they may look scary, these wasps are not aggressive unless handled and should be left alone. Great Goldens are solitary wasps, live independently and do not share in either nest maintenance or in the caring of their young. Between May and August, the female Great Golden, in preparation for egg laying, constructs as many as half a dozen nests. The building of, and provisions for, the nests is done in a concise, methodical manner, which she never deviates from. Rarely is there vegetation around the nests. Most sites are exposed to the sun in an open locale. The female begins digging, almost vertically, by cutting the earth with her mandibles. She walks about an inch backwards from the nesting site with a section of soil between her forelegs and head and flips the soil with her forelegs beneath her body, scattering it to the sides with her hindlegs. Great Golden nests have a cylinder shaped main tunnel that is one-half inch in diameter and four to six inches deep. From the main tunnel, she extends secondary tunnels that lead to individual larval cells where she will store anesthetized prey. The cells are broader than the tunnels and parallel to the soil. Once completed, she temporarily closes it after excavation by using the earth that remains by the nest entrance. The female throws it towards the entry with movements identical to those she made when she dug the nest. After constructing the burrow, she flies from the nesting area to open fields and hunts for any number of small locally available species of Orthoptera. Great Goldens hunt for crickets (Gryllidae), grasshoppers (Trimerotropis) and katydids (Tettigoniidae) to serve as a food source for her young. [Katydid is a general name given to several species of American large green long-horned grasshoppers. Male katydids have stridulating organs on the forewings that produce a loud shrill sound. The eggs are rather distinctive and are oftentimes deposited along leaf margins in rows usually in large trees but also on shrubs. Even katydid eggs can be heavily parasitized by a small wasp, Anastatus mirabilis, which makes a small round exit hole when the adult wasp emerges from the katydid egg.] Upon capturing a suitable prey, the female Great Golden will paralyze it with toxins in her sting. If the prey is small, she flies it directly to the nest. If prey is too large to transport aerially, the wasp will walk with it across the ground. The prey is clasped beneath her body by grasping its antennas with her mandibles. Once the Great Golden reaches the opening of her nest, she sets the paralyzed insect down. Leaving the prey outside, she goes into the tunnel for inspection. When satisfied that all is well, she comes partially out from the nest and again grasps the prey’s antennas pulling it backwards into the nest’s interior where it is deposited in a cell with its head turned to the bottom. Though the prey is permanently paralyzed, it is able to eliminate feces and slightly move its antennas and mouthparts. Great Golden females close the nest each time prey is placed inside. When she re-enters for egg laying, she emits a set of buzzing sounds as she compacts the earth closing the entrance. There are several behavioral aspects to this “self-programmed” wasp that continue to fascinate as humans tend to think such rote habits denote forethought and logic. Douglas Hofstadter and Daniel Dennett, two professors of Cognitive Science, created a controlled environment to study the Sphex routines more closely. After the Great Golden dropped her prey and was inspecting her nest’s interior, the professors moved the prey a few inches away from the opening. When the wasp emerged ready to drag the prey in, she found it missing. Quickly locating the prey, the professors believe her “behavioral program had been reset” as they found that, once again, she dragged the prey back to the threshold of the nest, dropped it and repeated the nest inspection procedure. During one study, this was done 40 times, always with the same result. This test can be replicated again and again, with the Sphex never seeming to notice what is going on, never able to escape from its genetically programmed sequence of behaviors. The wasp never "thinks" of pulling the prey straight in, but continually drops it outside until she is done with her nest inspection. Using this as an example of what may seem as thoughtful behavior can actually be quite mindless, the opposite of what is considered free will (or, as Hofstadter described it, “antisphexishness”). In addition to this apparent inborn, programmed behavior, Sphex has been shown, in some studies, not to count how many insects it collects for its nest. Although she may instinctively search for a certain number of insects, she is not an able take into account one that is lost. After the Great Golden has dragged all her paralyzed prey into the nest hole, she lays one egg on each insect, placing it horizontally on the prey’s thorax. The eggs are yellow, less than a ¼ inch long and has a slightly curved cylindrical shape. They hatch within 2-to-3 days of oviposition, and without moving, they begin to feed on the prey’s abdomen or at the junction of its leg. The feeding phase is very rapid. In one of the observed cases, the larva consumed even the more rigid parts of the prey’s exoskeleton. There is one generation per year with the developing Great Goldens spending the winter in their nests and emerging in summer. Once this new generation of adults comes out, they contain the inbred behavior that is only seen in this species. As a side note there is a reference to birds stealing prey from Great Goldens. House sparrows (Passer domesticus) and American robins (Turdus migratorius) were observed stealing from them at a large nesting site. The birds chased wasps that were carrying prey to their nests, causing them to drop the food, which the birds then retrieved and ate. In another instance, a male Scarlet tanager (Piranga olivacea) flew directly at a flying wasp causing her to drop an insect, but this time the bird did not pick it up. After being robbed of its prey, the wasp either left or flew in tight circles around the back of the bird until it flew away, or if the bird was on the ground, dove back and forth around its head. The wasp’s behavior never scared the bird. Large concentrations of Great Golden females are quite vulnerable to attacks by birds as the prey the wasps bring in are an easy food source for the birds. There is no record of any other species of digger wasps known to be harassed by birds in such a fashion. Unfortunately, homeowners, who have these foraging wasps around their landscape and dig holes in their lawn, usually reach for a can of insecticide. Great Goldens are benign, do not defend their nests, are not aggressive and definitely do more good than harm. Hold that can for a moment and realize that like many other wasps, the Great Golden Digger Wasp is quite beneficial to both gardeners and farmers. So please leave them alone to do their job. Beneficials in the Garden & Landscape is an Earth-KindTM program coordinated through Extension Horticulture at Texas A&M University. Earth-Kind uses research-proven techniques to provide maximum gardening and landscape enjoyment while preserving and protecting our environment. All digital photographs are the property of the Galveston County Master Gardener Association, Inc. (GCMGA) 2002-2015 GCMGA - All Rights Reserved.
<urn:uuid:116ffc78-f5ab-4f7a-b658-7ebb669ad762>
CC-MAIN-2016-26
http://aggie-horticulture.tamu.edu/galveston/beneficials/beneficial-54_great_golden_digger_wasp.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397213.30/warc/CC-MAIN-20160624154957-00021-ip-10-164-35-72.ec2.internal.warc.gz
en
0.96143
2,000
2.96875
3
Medical Examiner : FAQ's do Medical Examiners do? Examiners perform postmortem examinations on decedents. They review medical records and investigator reports. They examine glass slides of tissue samples under a microscope to identify diseases or anomalies. They review toxicology reports for evidence of chemical abnormalities or drug use or abuse. They dictate a report of findings as to the cause and manner of death. They meet with law enforcement officers, attorneys and family members to explain my findings. They appear in court to testify as an expert witness. education is required to qualify as a specialist in your work? graduate education and training include four years of medical school, a five year residency in anatomic and clinical pathology, and a one year fellowship in forensic pathology. Following the residency you must pass Medical Boards in Anatomic Pathology and following the fellowship you need to pass Boards in Forensic Pathology. A medical doctor is also required to take a minimum of 20 hours of approved medical education every year to maintain their medical license. Describe the kind of person it takes to be a Medical Examiner. are many different types of people in forensic pathology. In general, most doctors tend to be very objective, analytical and overachievers. Doctors that go into forensic pathology must like both the medical and the legal aspects of the work, they must be observant and like to put all the information and clues together to find the reason why a person died. This is true whether the person died of natural or accidental causes or a homicide. happens when you arrive at the scene of a crime? - An understanding of the scene of death is frequently critical to an accurate assessment of the cause and manner of death. Generally there are medical investigators who go to the scene and collect information to report back to the medical examiner. The steps taken at the scene depend on what type of case is being investigated. In the case of an infant who has died in his or her sleep, where the infant was found and the type of bedding around the infant are important factors. If it is suspected that the death is related to the dead person becoming too hot (hyperthermia), the temperature where they were found would be important. Medical Examiners become immune to what they see? - No, but it is important to maintain a clinical detachment in order to do the is the difference between an ME and Coroner? - A medical examiner is always a medical doctor, usually a forensic pathologist who has received training in this specialty. A medical examiner certifies a death based on his or her expert opinion following an investigation and medical examination or an autopsy of the decedent. A medical examiner also completes a report to document and support his or her findings. Most medical examiners are appointed to their positions. A coroner is an elected official. Coroners are usually not required to be doctors, but the requirements depend on the laws governing the jurisdiction. Usually coroners come from law enforcement or funeral home backgrounds, but they may also be doctors who have run for the office of coroner. Coroners may hold public inquests to determine the cause and manner of death. They may have a doctor examine the body and report their findings at the inquest. Usually coroners have some law enforcement or legal powers, such as subpoena powers, but it varies depending on the laws in their jurisdiction. Medical examiners are usually not a part of law enforcement. Generally medical examiners are in agencies separate from law enforcement and the criminal justice system to preserve their objectivity. For example, in Maricopa County the Office of the Medical Examiner is under the County Health Department. This is not unusual. The Maricopa County Office of the Medical Examiner handles over 5,000 cases a year, but only about 10% are homicides. Arizona State statutes provide for a medical examiner system based in each county. There is no coroner in Arizona. Each state has different laws and each jurisdiction operates differently, but these are the basic differences between a medical examiner and a coroner. Forensic Science Center 701 West Jefferson Phoenix, AZ 85007 Ph: 602-506-3322 Fax: 602-506-1546
<urn:uuid:e2c8f42b-c2d2-4582-a8f8-3a1add86afa3>
CC-MAIN-2016-26
http://maricopa.gov/Medex/faq.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391519.2/warc/CC-MAIN-20160624154951-00074-ip-10-164-35-72.ec2.internal.warc.gz
en
0.944659
911
2.75
3
See also the Browse High School Statistics Stars indicate particularly interesting answers or good places to begin browsing. Selected answers to common questions: Mean, median, mode, range. - Averages with Examples [10/17/2001] My teacher has explained three ways to figure out averages, kind of like weighted averages, but without the weight... - Calculating Breast Cancer Survival Rates [06/30/2003] Survival of a group of breast cancer patients is 100 at year 0, 100*X at year 1, 100*X*X at year 2, 100*X*X*X at year three and so on to year 10. How do I find the nth year survival? - Chi-Square Test [04/24/2002] Four chiropractors examine a patient... I have calculated the number of times the chiropractors agree for any combination of 2, 3, and all 4; I need to compare this finding to that of chance probability of - Grade and Test Averages [12/02/2001] In a class of 21 students the average score on a math test was 77%. If Suzie got 95% and Jack got 78%, find the average grade of the other 19 - Measures of Dispersion [6/30/1996] What are the different characteristics of: Range, Mean Absolute Deviation, Standard Deviation, Variance, Quantiles (percentile, decile, - Questions About Standard Deviation [9/20/1995] Why does a standard deviation take the square root of the average of the sum of the squared differences between X and X mean instead of the average of the absolute value differences? What is the reasoning behind dividing by n vs. n-1 in the population versus sample standard - Sample and Population Standard Deviation [03/03/2001] What letters represent theoretical and 'real' standard deviation, mean, - Stem and Leaf and Scatter Plots [10/13/1998] Information on stem and leaf plots and scatter plots. - Using the Range to Find Outliers [09/11/2001] How can you use the range of a set of numbers to determine whether any of the observations were outliers? - Weighted Averages [11/02/1998] Can you explain the concept of weighted averages, with examples? - 20 Golf Players [04/11/1997] How do you set up four teams such that the variance in the average team handicap is no more than one or two? - Analyzing Survey Results [05/04/2000] How can I determine a ranking of priority (1st, 2nd, 3rd, etc.) for the results of a satisfaction survey that asked people to rank, in order of importance, seven factors? - Applications of Arithmetic, Geometric, Harmonic, and Quadratic Means [11/22/2006] How do I choose what sort of mean to calculate for a given set of data? - Are Two Formulas for Finding Standard Deviation the Same? [10/29/2007] My statistics text gives a shortcut formula for calculating sample SD as the square root of [(the sum of x^2) minus (the sum of x)^2/n all divided by n-1]. Is this really just another form of the full formula? - Arithmetic vs. Geometric Mean [03/27/2001] When is it appropriate to use the arithmetic mean, and when the geometric - Arrangements of Letters [09/14/1999] In how many ways can the letters in UNUNSUAL be arranged? For those arrangements, how many have all 3 U's together? - Average of Ratios vs. Ratio of Averages [10/24/2003] We currently calculate 'Average dollars per square foot' as the ratio of the average price divided by the average square footage of all the homes in the list. It seems to me that it should be calculated as the average of the price-per-square-foot ratio of each house. Can you think of any reason why the ratio of the averages would be more useful than the average of the ratios? - Average Radial Distance of Points within a Circle [03/26/2003] I'm trying to determine the average value of a circular/radial gradient that is at full value (white, call it 100% brightness) in the center, and drops in a linear fashion to zero (black, call it 0% brightness) at the radius. - Averaging Averages [11/09/1999] How can I average the results of a survey sent to 5 different departments if I only have averages from each department? - Averaging Kelly's Test Scores [01/07/2002] Kelly's average score on 4 tests is 85.5. The average of her 3 highest scores is 87, and her two lowest scores are the same as each other. What is the average of her two highest test scores? - Bar Graphs and Histograms [04/30/2008] What is the difference between a bar graph and a histogram? What are the similarities? Which graph explains more details? - Bar Graphs vs. Histograms [09/05/2002] What is the difference between bar graphs and histograms? - Batting Averages [05/07/1999] How do you calculate batting averages? Do you have to average the new hit into all the previous hits? - Bayesians and Frequentists [08/21/2001] What is the difference between Bayesian and "regular" statistics? - Benford's Law [08/06/1998] What is Benford's law? - Best Line Fit: Least Squares [03/23/1997] What is least squares fitting? How exactly does one do it? - Biased and Unbiased Surveys [11/05/2008] The Tri-State Soccer League is conducting a survey to determine if the players want to change the style of soccer shirt. If they randomly survey all players who wear size large shirts, is the survey biased or unbiased? I'm not sure what those two words mean. - Binomial and Normal Distribution [06/09/1999] Could you please tell me the difference between normal approximation to binomial distibution and normal distribution? - Binomial Distribution [8/25/1996] The mean life of a certain television tube is 1200 hours with a standard deviation of 200 hours... The probability that three machines will be in use on any one day is 0.8,0.7 and 0.6 respectively. - Binomial Experiments [09/05/2003] How can I explain the binomial distribution to my six grade math class? - Box and Whisker Plots [02/13/2000] Can you explain how to make and use box and whisker plots? - Box and Whisker Plots [05/18/2000] If there is an odd number of points in a data set, is the median considered to be part of the subgroup used to find the upper (or lower) - Calculating a Grade Average [08/15/1999] How can I figure out my average if some things are worth more than - Calculating and Interpreting Expected and Chi-Square Tables [04/10/1998] How do you calculate the expected frequency and chi-square value of a 3- - Calculating and Interpreting Z-Scores [12/13/2005] Please help me by providing a step-by-step process for calculating the z-score, or standard score. - Calculating Average Starting Time [06/23/2003] How do you average a series of starting times to get the average starting time? Say 9:30a.m., 10:15a.m., 11:45a.m., 1:30p.m., and - Calculating a Weighted Average Grade [05/05/2000] What is the grade if the following make up the final grade: 45% = 3 tests (85, 78, 92), 25% = final (94), 15% = project (91.9), 15% = 3 case questions each worth 25 points (25, 25, 23.5)? - Calculating Percentage Errors [02/20/1999] How do you calculate percent error from a set of data that includes predicted values and observed values? - Calculating Percentage of Errors [03/21/2002] You have items to be picked off a shelf every day. You pick one item a day and check it against the order. You wish to asign a percentage to the error in wrong items and/or number of items. - Calculating Percentile Rank [04/30/2009] When calculating percentile rank, if more than one data value matches the number you are calculating, why do you count only half of them?
<urn:uuid:bd29fb8b-5b21-4a43-8132-0fc47f704a2b>
CC-MAIN-2016-26
http://mathforum.org/library/drmath/sets/high_statistics.html?start_at=1&num_to_see=40&s_keyid=40929329&f_keyid=40929331
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402746.23/warc/CC-MAIN-20160624155002-00035-ip-10-164-35-72.ec2.internal.warc.gz
en
0.859048
1,958
3.640625
4
Kenyan wildlife officials have begun inserting microchips into rhinos in a bid to combat poachers, who kill the animals for their horns. Officials say the chips and accompanying scanners will allow them to track the animals and help authorities link recovered or confiscated horns to poaching cases. The Kenyan Wildlife Service received the equipment from the World Wildlife Fund (WWF), whose Kenya spokesman Robert Magori says each rhino will have one chip implanted in its body and a second chip embedded in its horn. "When a rhino is killed and the horn is hacked off and taken away, if this horn is confiscated and the microchip tag can be identified, it can be tracked back to a poached animal and it can actually show and prove that this was a poaching incident," he said. Poaching incidents are on the rise in Kenya, which has a relatively small population of about 1,000 rhinos. Magori says poachers killed at least 23 of the animals last year and have killed at least 10 this year. He believes the microchips will help deter thieves who are tempted to hack off rhino horns and then try to smuggle them out of the country. "They will have no idea where the microchips are and so, it could be extremely dangerous for them to go through ports of entry as well as any immigration areas without them being noticed." Rhino horns are often sold in Asian countries where some consumers believe they have healing properties. The horns are made from the same material as human fingernails. Experts say they are worthless as a cure for diseases.
<urn:uuid:a0a41941-881f-4bca-8ee5-7b22f1bcdd68>
CC-MAIN-2016-26
http://www.voanews.com/content/kenyas-rhinos-getting-microchips-to-deter-poachers/1770942.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396106.71/warc/CC-MAIN-20160624154956-00052-ip-10-164-35-72.ec2.internal.warc.gz
en
0.968839
324
2.671875
3
As unsustainable overdevelopment in Utila, Honduras, continues to cause irreparable environmental damage to the island’s fragile ecosystems - threatening the viability of the tourism industry itself - Postcards from Utila negotiates the fine balance between resource over-exploitation and the economic importance of tourism revenue. Located north of the Honduran mainland along the Mesoamerican Barrier Reef System, Utila is the smallest of the Bay Islands, and one of the cheapest places globally to obtain a PADI Scuba Diving certificate. Although originally remote and inaccessible, today, the island is a dive and party mecca, having been visited by 142,785 people from 2002 to 2006. Sadly, due to increased tourism revenue and overpopulation, unbridled over-fishing, coral reef degradation, mangrove destruction and over-development patterns in the sector are being allowed to continue to cause irreparable environmental damage. This type of unsustainable development further continues to threaten the long-term feasibility of the tourism industry itself, whilst promoting social stratification and intensifying existing inequalities amongst the diverse members of Utila’s social fabric. Regardless of Utila’s prominence in Central American tourist guidebooks, such issues are hidden from tourist ephemera; further exacerbating the aforementioned plights and perpetuating neglected communities’ reliance on scarce government and foreign aid handouts. Postcards from Utila explores these alternate realities and urges the audience to recognize the ways tourist framing dictates their perceptions. With close ties to several local NGOs, the film also explores positive initatives from the private as well as corporate sectors and encourages both the locals as well as the visitors in Utila to become cognizant of their environmental footprints. As the unparalleled and detrimental commodification of terrestrial and marine resources continues, the situation on the island is endemic of all coastal communities worldwide dependent upon marine tourism. What unites these locations is the immediate and urgent need to negotiate a fine balance between resource over-exploitation and the economic importance of tourism revenue.
<urn:uuid:02a6adb3-16f7-4beb-8993-38e5a61396f5>
CC-MAIN-2016-26
http://postcards-from-utila.com/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393146.70/warc/CC-MAIN-20160624154953-00045-ip-10-164-35-72.ec2.internal.warc.gz
en
0.917289
408
2.75
3
A potentiometer is a simple knob that provides a variable resistance. In this project, potentiometer values are read in through an 'Analog In' pin. The values are then used to control the blinking rate of an LED. Use a 1kΩ potentiometer. Connect three wires to the Arduino board. The first goes to ground from one of the outer pins of the potentiometer. The second goes from 5 volts to the other outer pin of the potentiometer. The third goes from analog input 2 to the middle pin of the potentiometer.
<urn:uuid:4658895d-b741-475a-bd01-69ce2a175e18>
CC-MAIN-2016-26
http://fritzing.org/projects/analog-input-potentiometer/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783400572.45/warc/CC-MAIN-20160624155000-00176-ip-10-164-35-72.ec2.internal.warc.gz
en
0.802019
118
3.328125
3
Hydroponic systems are a way to grow plants without the need for soil. A nutrient solution is used to provide nutrients to the plants, either directly to the roots, or to the roots through a growing medium such as vermiculite or perlite. Building your own hydroponic station is an inexpensive way of growing plants indoors. You can use materials around the home to build your station. A gardening center will provide the nutrient solution, as well as the growing medium needed for an automatic watering system. This passive system requires no air pumps or expensive bubbling equipment, and automatically refills as it drains. Place your piece of foam on the floor and set your container on top of it. Cut around the foam around container as a guide. Remove the container from the foam and cut a small amount away from the edges of the foam so it sits inside, at the top of the container. Trace around the bottom of the foam cup on the foam and cut out holes to accommodate them. Fit the cups so that they rest toward the lip of the cup. This allows the roots of your plant to rest inside the container. Poke several holes into the bottom of each cup to allow room for the roots to grow. Cut another hole into the foam so your 2-liter bottle will fit into the hole just past the shoulder of the bottle. Fill the 2-liter bottle with hydroponic solution and water. Pour nutrient solution into the container until it is about 1 to 2 inches from the bottom of the cups. Wet the growing medium inside the cups at this time and place them into the foam board and put the board into the container. Turn your 2-liter bottle over and quickly put it upside down into the hole you cut out of the foam board earlier. Force the bottle until the mouth of the bottle is submerged slightly into the nutrient solution. As the plants use up nutrient solution and the solution level lowers, the 2-liter bottle will drain into the container, no need to refill until the 2-liter bottle is drained. Place your foam with the cups inserted on top of the container and turn on the air pump to get the nutrient solution moving. Check the nutrient solution regularly to make sure the level is high enough to touch the roots of the plants, which will appear at the bottom of the cups.
<urn:uuid:ffb14f51-4dc5-46f3-8688-be635cbca3f3>
CC-MAIN-2016-26
http://www.gardenguides.com/108624-buld-small-hydroponic-grow-station.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396106.25/warc/CC-MAIN-20160624154956-00009-ip-10-164-35-72.ec2.internal.warc.gz
en
0.923653
473
3.296875
3
Food labels are a hot topic, and it’s easy to see why. Eaters are more concerned than ever before about where their food comes from, resulting in increasingly exact labeling. So what’s the difference between organic, natural, and conventional food? Conventional What it means? Not organic. Conventional is the new buzzword that essentially means “the opposite of organic”, which means: grown using synthesized (man-made from chemicals) fertilizers, possibly genetically modified seeds, and possibly growth hormones & regular antibiotics (in the case of meat). Some people lean away from conventionally grown food because they are concerned about putting chemicals in their bodies, while others are motivated by environmental concerns. In all cases, “conventional” as it’s now known passes along cost savings […] The Good Food blog is brought to you by We partner with organic farmers to bring the freshest seasonal, local produce and the perfect selection of natural groceries right to your doorstep. Learn more - Loading tweets...
<urn:uuid:239243a6-38da-4c63-ad30-feb82fec33b0>
CC-MAIN-2016-26
https://blog.doortodoororganics.com/colorado/2009/11/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393997.50/warc/CC-MAIN-20160624154953-00116-ip-10-164-35-72.ec2.internal.warc.gz
en
0.952932
212
2.5625
3
Pictures in an art gallery. - An example of a gallery is a space where local artists show their work. - An example of a gallery is a covered path between two buildings. - a covered walk open at one side or having the roof supported by pillars; colonnade - Chiefly South a veranda or porch - a long, narrow balcony on the outside of a building - a platform projecting at either quarter or around the stern of an early sailing ship - a platform or projecting upper floor attached to the back wall or sides of a church, theater, etc.; esp., the highest of a series of such platforms in a theater, with the cheapest seats - the cheapest seats in a theater - the people occupying these seats, sometimes regarded as exemplifying popular tastes - the spectators at a sporting event, legislative meeting, etc. - a long, narrow corridor or room - a place or establishment for exhibiting or dealing in artworks - any of the display rooms of a museum - a collection of paintings, statues, etc. - ⌂ a room or establishment used as a photographer's studio, for practice in shooting at targets, etc. - an underground passage, as one made by an animal, or one used in mining or military engineering - a low railing of wood or metal around the edge of a table, shelf, etc. Origin of galleryMiddle English ; from Old French galerie, gallerie, long portico, gallery ; from Medieval Latin galeria, probably ; from galilaea: see galilee (porch) play to the gallery - Theater to act in a manner intended to please those in the gallery - to try to win the approval of the public, esp. in an obvious or showy way - A roofed promenade, especially one extending along the wall of a building and supported by arches or columns on the outer side. - A long enclosed passage, such as a hallway or corridor. - a. A narrow balcony, usually having a railing or balustrade, along the outside of a building.b. A projecting or recessed passageway along an upper story on the interior or exterior of a large building, generally marked by a colonnade or arcade.c. Such a passageway situated over the aisle of a church and opening onto the nave. Also called tribune2. - Southwestern Gulf States See veranda. - a. An upper section, often with a sloping floor, projecting from the rear or side walls of a theater or an auditorium to provide additional seating.b. The seats in such a section, usually cheaper than those on the main floor.c. The cheapest seats in a theater, generally those of the uppermost gallery.d. The audience occupying a gallery or cheap section of a theater. - A large audience or group of spectators, as at a tennis or golf match. - The general public, usually considered as exemplifying a lack of discrimination or sophistication: accused the administration of playing to the gallery on the defense issue. - a. A building, room, or website for the exhibition of artistic work.b. An establishment that displays and sells works of art.c. A photographer's studio. - A collection; an assortment: The trial featured a gallery of famous and flamboyant witnesses. - a. An underground tunnel or passageway, as in a cave or one dug for military or mining purposes.b. A tunnel or series of tunnels made by an animal. - Nautical A platform or balcony at the stern or quarters of some early sailing ships. - A decorative upright trimming or molding along the edge of a table top, tray, or shelf. Origin of galleryMiddle English galerie, from Old French, from Old North French galilee, galilee; see galilee. - An institution, building, or room for the exhibition and conservation of works of art. - An establishment that buys, sells, and displays works of art. - Uppermost seating area projecting from the rear or side walls of a theater, concert hall, or auditorium. - A roofed promenade, especially one extending along the wall of a building and supported by arches or columns on the outer side - as a whole, the spectators of an event.
<urn:uuid:4dc82193-ef70-4bd7-9c5b-5c8824fec3c5>
CC-MAIN-2016-26
http://www.yourdictionary.com/gallery
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783392099.27/warc/CC-MAIN-20160624154952-00011-ip-10-164-35-72.ec2.internal.warc.gz
en
0.905868
905
2.625
3
Redirected from Stellar wind In the Sol system, the composition of this plasma is identical to Sol's corona, 73% hydrogen and 25% helium with the remainder as trace impurities, and is ionized. Near Earth, the velocity of the solar wind varies from 200km/s-889km/s. The average is 450 km/s. From Sol, approximately 800 kg/s of material is lost as ejected solar wind. Since solar wind is a plasma, it carries with it the Sun's magnetic field. Out to a distance of approximately 160,000,000 km (100,000,000 miles), the sun's rotation sweeps the solar wind into a spiral pattern by dragging its magnetic field lines with it, but beyond that distance solar wind moves outwards without much additional influence directly from the sun. Unusually energetic outbursts of solar wind caused by solar flares and other such solar weather phenomena are known as "solar storms" and can subject space probes and satellites to strong doses of radiation. Solar wind particles trapped in Earth's magnetic field tend to collect within the Van Allen radiation belts and can cause the Aurora borealis and the Aurora australis ,when they impact with Earth's atmosphere near the poles. Other planets, with magnetic fields,= similar to Earth's, also have their own auroras. The solar wind blows a "bubble" in the interstellar medium (the rarefied hydrogen and helium gas that permeates the galaxy). The point where the solar wind's strength is no longer great enough to push back the interstellar medium is known as the heliopause, and is often considered to be the outer "border" of the solar system. The distance to the heliopause is not precisely known, and probably varies widely depending on the current velocity of the solar wind and the local density of the interstellar medium, but it is known to lie far outside the orbit of Pluto.
<urn:uuid:eda12834-922b-40c3-83e2-d4683cf70ad2>
CC-MAIN-2016-26
http://encyclopedia.kids.net.au/page/st/Stellar_wind
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402479.21/warc/CC-MAIN-20160624155002-00030-ip-10-164-35-72.ec2.internal.warc.gz
en
0.926564
390
3.84375
4
By RONI CARYN RABIN The New York Times Millions of Americans take ginkgo biloba supplements to boost memory and prevent dementia. Studies have never found any solid evidence that ginkgo does any such thing, but it did not seem to be doing much harm. But this year, scientists released the first government toxicology study of ginkgo biloba, which found that the extract — one of the top-selling herbal supplements in the country — caused cancer in lab animals, including an excessive number of liver and thyroid cancers, as well as nasal tumors. The findings were somewhat surprising because ginkgo biloba has had a long and apparently benign history of human use. Although it has been associated with bleeding and cerebral hemorrhages in the elderly, there have been few reports of serious side effects. The results of the study do not confirm that ginkgo biloba is dangerous to humans, but it is disturbing that the laboratory animals all tended to suffer the same sorts of injuries, said Cynthia Rider of the National Toxicology Program and the lead scientist of the ginkgo biloba study. “We often see different targets depending on the sex of the animal or the species, finding one thing here and one thing there,” Rider said. “But with the ginkgo studies it was consistent across the sexes and the species. The liver was a target, the thyroid was a target, and the nose.” The study concluded that there is clear evidence that ginkgo causes carcinogenic activity in the livers of mice and some evidence linking it to carcinogenic activity in rats’ thyroids. Officials with the American Herbal Products Association and the American Botanical Council have sharply criticized the study. They say the ginkgo extract used had a different chemical composition than the extract typically sold in the United States. The government scientists say they purchased it from a major supplier to U.S. supplement companies. More important, the critics questioned how applicable animal toxicity studies — long considered a mainstay in evaluating cancer risk — are to human health, and how the high doses often used in these studies relate to human consumption. It is a valid criticism, as doses used in toxicology studies tend to be very high. In the new ginkgo study, mice were given up to 2,000 milligrams of extract per kilogram of body weight, or just more than 900 milligrams per pound of body weight, five times a week. Doses sold for human consumption range from 30-120 milligrams, regardless of body size. The Food and Drug Administration already bans ginkgo biloba from food and beverages, and the agency has repeatedly told drink manufacturers to remove ginkgo from its products. But when it comes to supplements, the government has a different standard. A substance that is considered unsafe in food items or drinks can be legally sold as a supplement. “We don’t review supplements before they go to market,” said Tamara Ward, an FDA spokeswoman. “We get involved when there is a risk to the consumer, but manufacturers are responsible for making sure the products do not pose a risk to the consumer and for making sure claims are not misleading.” The distinction has long rankled consumer advocates. The Center for Science in the Public Interest no longer regards ginkgo biloba as safe and is urging consumers to avoid it.
<urn:uuid:e25612bb-0d73-4b56-8e43-31ce8bf87f27>
CC-MAIN-2016-26
http://health.heraldtribune.com/2013/05/07/new-doubts-about-ginkgo-biloba/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391766.5/warc/CC-MAIN-20160624154951-00144-ip-10-164-35-72.ec2.internal.warc.gz
en
0.950231
707
2.859375
3
What is MT and BT malaria? “MT” stands for “malignant tertian” and “BT” stands for “benign tertian” malaria. Tertian malaria describes fever which occurs every other day, in cycles. Of the main types of human malaria, Plasmodium vivax and Plasmodium ovale are the most stereotypically tertian. P. falciparum can be tertian, but it is more erratic and due to its severity, can result in increased frequency of fever. “Malignant” and “benign” refers to the severity of the disease. Malignant malaria is severe and sometimes fatal, whereas benign malaria is less acute and rarely results in death.
<urn:uuid:45438eb3-1591-46ce-8bdf-aab9da85c41f>
CC-MAIN-2016-26
http://www.malaria.com/questions/malaria-11
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395679.18/warc/CC-MAIN-20160624154955-00071-ip-10-164-35-72.ec2.internal.warc.gz
en
0.901854
159
3.1875
3
Citing From One Source: Using Internal Citations Correctly cite the page number of your quotation. Set quotations apart from the text like this: Example: The narrator ends the story with an appeal to nature: Were the birds better friends than their hunter would have been, –who can tell? Whatever treasures were lost to her, woodlands and summer-time, remember! Bring your gifts and graces and tell your secrets to this lonely country child! (54) * The set-off quotation should be double-spaced and in the same size font as the rest of the paper (12 point font). * Notice that set-off quotations do not have quotation marks unless they mark dialogue. * Notice that the page number in the set-off quotation is to the right of the punctuation mark: child! (54) Using Multiple Citations To correctly cite more than one source in a paper, download this guidesheet.
<urn:uuid:99ab6128-5bc4-405b-94cf-bc0b3d5b10fe>
CC-MAIN-2016-26
http://sites.middlebury.edu/middwrite/2008/01/14/using-a-single-citation/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783408840.13/warc/CC-MAIN-20160624155008-00196-ip-10-164-35-72.ec2.internal.warc.gz
en
0.895554
196
2.796875
3
Initial analyses of the database by USP food scientists was published in the April 5, 2012, Journal of Food Science. This research revealed that milk, vegetable oils and spices were among the top categories where food fraud occurred as documented in published reports. Analyses of new information by USP scientists show similar trends for 2011 and 2012, and add seafood (fish, shrimp), clouding agents and lemon juice as categories vulnerable to food fraud. Food fraud is a collective term that encompasses the deliberate substitution, addition, tampering or misrepresentation of food, food ingredients or food packaging, or false or misleading statements made about a product for economic gain. A more specific type of fraud, intentional or economically motivated adulteration of food ingredients, has been defined by USP as the fraudulent addition of non-authentic substances or removal or replacement of authentic substances without the purchaser’s knowledge for economic gain to the seller. “While food fraud has been around for centuries, with a handful of notorious cases well documented, we suspect that what we know about the topic is just the tip of the iceberg,” said Dr. Jeffrey Moore, senior scientific liaison for USP and the database’s creator and lead analyst. “The idea behind the database was to shed some light on this largely uncharacterized space by collecting and analyzing the fragmented information in the public domain reported by scholars, regulators and media. Ultimately, we hope the database can be used as a tool by food manufacturers, regulators, scientists and others worldwide to help achieve a safer food supply—whether by providing more complete knowledge of known and potential threats, spurring new research and development of more accurate detection methods for potential adulterants, increasing awareness on the part of consumers, lawmakers and others, or by any other means that makes it more difficult on a practical level for parties to engage in this unscrupulous and harmful activity—which is both a public health and business threat.” USP is a nonprofit, scientific organization that publishes the Food Chemicals Codex (FCC), an international compendium of standards offering specifications for the identity, quality and purity of food ingredients used worldwide. FCC results from the decision-making of the USP Council of Experts’ Food Ingredients Expert Committee (chaired by Dr. Andrew Ebert). USP staff scientists worked with scientific experts from this Expert Committee and others to advance the USP Food Fraud Database. Fraudulent Food Products and Ingredients Among the new scholarly records added to the database, the top ingredients represented are olive oil, milk, saffron, honey and coffee (all in the top seven in the analysis of 1980-2010 records), followed by tea, fish, clouding agents (commonly used in fruit juices/beverages to improve their visual appearance and make products look freshly squeezed) and black pepper—none of which was in the top 25 for 1980-2010. Among the new media and other reports examined, the most-represented products in the database are milk, fish, turmeric, chili powder and cooking oil (all in the top 12 in 1980-2010), followed by shrimp, lemon juice and maple syrup (none of which was even in the top 25 in 1980-2010). Examples of fraud include: Milk, Vegetable Oils and Spices: In three areas of ongoing concern, the database indicates watered-down and urea adulterated fluid milk in India, dilution of milk powder with fillers such as maltodextrin in South America and replacement of milk fat with vegetable oil in South America. In the category of oils, olive oil replaced with other, less-expensive vegetable oils was pervasive, and so-called “gutter oil” (waste oil repurposed as cooking oil) was documented in China. With regard to spices, the database shows examples of the dilution or replacement of spices with less-expensive spices or fillers. Seafood: With $80 billion in seafood sold in the U.S. each year and more than 80% of fish in the country imported, seafood is big business—and fraud is a significant problem. Examples of seafood fraud documented in the database include sale of the fish escolar, often fraudulently mislabeled as white tuna or butterfish. Escolar is banned in Italy and Japan, and other countries have issued advisories on the trade and consumption of this fish. Escolar has high content of waxy esters that is likely to cause a special form of food poisoning called gempylotoxism or gempylid fish poisoning. Another example of seafood fraud included in the database involves puffer fish, with documented incidents in the U.S. of the fish being mislabeled as monkfish to evade import and other restrictions. Puffer fish has caused tetrodotoxin poisonings in the U.S. and elsewhere. “Seafood is an example where food safety controls are species-specific, making replacement of one fish with another especially troublesome,” Moore stated. Clouding Agents: Considered the 2011 equivalent to the melamine scandal involving Chinese milk products from a few years ago, numerous database records document the plasticizer Di(2-ethylhexyl) phthalate (DEHP) and other related phthalates as having been fraudulently added as clouding agents in place of the more expensive palm oil or other allowed food ingredients in fruit juices, jams and other products. The scope of this fraud was vast: 877 food products from 315 companies were involved; 206 products were exported to as many as 22 countries; and there were roughly 4,000 potential victims in Taiwan. Safety concerns surrounding DEHP include cancer and the improper reproductive organ development in children. DEHP may be used in food contact materials (e.g., seals, packaging), however the amount allowed to migrate into the food is tightly regulated as to not exceed approximately 1.5 ppm; levels in reported examples of food fraud were found from 2-34 and 8,700 ppm in food and supplement products, respectively. The fraudulent replacement of clouding agents may have been ongoing for years, but as with other food frauds, it is often difficult to detect fraud when no immediate illness occurs. However, as illustrated in this episode, severe health repercussions may still result from consumer consumption of an undetected harmful adulterant over an extended period. USP is actively seeking outside additions to the database. To add to the database or to search this free resource, visit www.foodfraud.org. Media inquiries may be directed to [email protected].
<urn:uuid:be7bd873-2e73-4806-b346-428814e96632>
CC-MAIN-2016-26
http://www.nutraceuticalsworld.com/contents/view_breaking-news/2013-01-23/usp-expands-food-fraud-database/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396455.95/warc/CC-MAIN-20160624154956-00164-ip-10-164-35-72.ec2.internal.warc.gz
en
0.955033
1,343
2.890625
3
Self-esteem games are a subtle way you can help build a Your child’s sense of his own self-worth is the key to his development socially, emotionally and intellectually. Playing games makes working on this sense of self-worth a fun thing to do. The goal of these games is to show children that it’s great to be themselves. This is a fairly easy goal to accomplish if you’re working with very young children. Children under 5 have no problem listing off things they do well. As children get older, self-consciousness increases and many children begin to believe that they don’t do anything well, or that they don’t do anything well enough. Self-esteem games focus on positive qualities, and increase a child’s awareness of what he or she is doing right. They can build on this awareness and grow into healthy self-confidence. A child with may have trouble interacting with others and may resist taking risks or taking on new challenges. Particularly for this type of child, games need to be fun and as non-threatening as possible. One example of a self-esteem game is to have a group of children each pick a name out of a hat. For the name they choose, they should make a list of all the positive qualities they can think of regarding that person. Negative comments are not allowed. The lists are gathered by an adult and read back to the group. During games such as this, children are often surprised and pleased to hear the good things that are said about them. If you are looking for an activity for just one child , make a list of different aspects of the child’s life, such as math class, spelling class, swimming lessons, getting along with brothers and sisters, helping around the house, etc. For each aspect of the child’s life, they should be asked to share something about that aspect of their life that made them feel good about themselves. Another way to get your child in the habit of recognizing positive qualities in themselves is at the end of each day, ask the child to write down something they did right that day. This can be in the form of a paragraph or a drawing. Put up this positive statement or picture on a bulletin board. Do this every day for 30 days. At the end of 30 days, call to your child’s attention all the things they have done right or accomplished in the last month. Self-esteem games are a great way to get children in the habit of looking for the good in themselves and others. Games are great ways you can help your child begin a journey to a healthy sense of self-worth.
<urn:uuid:82d35dcc-2426-482a-91a6-25ea0f1a3d71>
CC-MAIN-2016-26
http://www.selfesteem2go.com/self-esteem-games.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397562.76/warc/CC-MAIN-20160624154957-00130-ip-10-164-35-72.ec2.internal.warc.gz
en
0.971917
550
3.4375
3
The sea state must be recorded during every Shorewatch because it affects the probability of a sighting. For this reason Shorewatch is not carried out when sea state is above 4*. The Beaufort Sea State Code is a simple scale that can be used to give an approximate but concise description of sea conditions. It is a visual method to assess wind speed in the marine environment. All WDC cetacean researchers use the Beaufort Sea State Code as part of their shorewatch protocol. Using your binoculars assess the sea state of the whole survey area using the WDC Shorewatch Sea State Key (one in every shorewatch kit). Record the greatest sea state observed within the survey area, discounting coastal surf and waves breaking on the shore. Record your final assessment of sea state as a whole number i.e. 0, 1, 2, 3 or 4 (not: 2-3 or 2.5) in the sea state column on your data sheet before beginning your 10-minute Shorewatch. *Note: If the sea state is above 4 DO NOT carry out a shorewatch; make regular checks of the sea state. If/when sea state drops conduct a Shorewatch later in the day/week. Beaufort Sea State Codes Sea State 0 Conditions: Sea like a mirror. Wind Speed: Under 1 knot (smoke rises vertically) Wave Height: 0 feet Sea State 1 Wind Speed: 1 - 3 knots (wind motion visible in smoke) Wave Height: 0.33 feet/10cm Sea State 2 Conditions: Small wavelets all over. No whitecaps. Wind Speed: 4 - 6 knots (wind felt on exposed skin and leaves rustle) Wave Height: 0.66 feet/20cm Tip: The distinction between a sea state 2 and 3 is easy to determine; as soon as you can see any white caps within your survey area it is a sea state 3. No white caps on the wavelets and it is a sea state 2! Sea State 3 Conditions: Large wavelets. Few white caps here and there. Wind Speed: 7 - 10 knots (leaves and smaller twigs in constant motion) Wave Height: 2 feet/60cm Sea State 4 Conditions: Small waves. Fairly frequent white caps. Wind Speed: 11 - 16 knots (dust and loose paper raised. Small branches begin to move) Wave Height: 3.3 feet/1m Sea State 5 Conditions: Moderate waves. Many white caps. Spray possible. Wind Speed: 17 - 21 knots (branches of a moderate size move. Small trees begin to sway) Wave Height: 6.6 feet/2m
<urn:uuid:209302c7-a955-4c1e-bde7-22c92d6c436a>
CC-MAIN-2016-26
http://www.wdcs.org/national_regions/scotland/shorewatch/sea_state.php
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783392159.3/warc/CC-MAIN-20160624154952-00030-ip-10-164-35-72.ec2.internal.warc.gz
en
0.868984
566
3
3
If you ever watched the TV show “House,” you’re familiar with the term “Cushing’s.” It seemed that on every other episode, Dr. House and his team suspected a patient had Cushing’s. In real life, however, Cushing’s Syndrome and Cushing’s Disease, a disorder caused by a form of Cushing’s Syndrome, are extremely rare, with incidence rates of just one or two cases for every million people. What is Cushing’s Syndrome? Cushing’s Syndrome is the disorder associated with high levels of glucocorticoids, primarily cortisol, which are hormones that the adrenal cortex naturally secretes in response to the release of ACTH (adrenocorticotrophic hormone) from the pituitary gland. The pituitary gland is stimulated to produce these secretions by CRH secretions in the hypothalamus. It’s pretty confusing for a layperson. But ultimately, what it all means is that with Cushing’s Syndrome, the body’s glucocorticoids, such as cortisol, are way too high, and these hormones have tremendous impacts on the immune system and one’s metabolism. Cushing’s Syndrome has a few different causes, one of which is a pituitary tumor. In this case, the proper term is Cushing’s Disease. Other causes include over-secretion of cortisol by the adrenal gland, over-secretion of ACTH by the pituitary gland, and ACTH secretion from an abnormal location such as a tumor somewhere other than the pituitary gland. Cushing’s Syndrome can also be caused by the use of corticosteroids, which are sometimes prescribed to treat other medical issues. When people have Cushing’s Syndrome, including those with Cushing’s Disease, they typically experience significant weight gain, particularly in the midsection, face, and between the shoulders, but not in the limbs. They tend to have striations on the abdomen, breasts, thighs, and/or arms that look like pink or purple stretch marks. People with Cushing’s Syndrome bruise very easily and heal from cuts and infections slowly. They may also experience extreme fatigue, depression, emotional instability, impaired cognitive function, high blood pressure, and headaches. Who Is At Risk? Women are far more likely to develop Cushing’s than men, with the incidence ratio being 8:1. Men, however, are ten times more likely than women to develop the ectopic ACTH form of Cushing’s. The age of onset is typically between 20 and 40, although it is possible (and extremely rare) for Cushing’s to develop in babies and children. Left untreated, Cushing’s Syndrome has only a 50% survival rate at 5 years, so it is essential that people who suspect they may have Cushing’s see a doctor right away. Doctors will run a long series of tests before providing treatment, which can include surgery, medication, and/or radiation. People who have Cushing’s Syndrome or Cushing’s Disease have a serious illness and their diagnoses are important things for EMTs, First Responders, all treating medical personnel, and those around them to be aware of. Wearing a medical ID necklace or bracelet, and carrying a wallet card, are simple steps people with Cushing’s can take to help protect themselves in the event of a medical emergency. Do you know someone with Cushing’s or have it yourself? Tell us about it in the comments, and let us know what other diseases, disabilities, allergies, and chronic health conditions you’d like to read about here on the Lauren’s Hope blog.
<urn:uuid:1f86ce96-678a-4f2a-a743-ec4a96b8a974>
CC-MAIN-2016-26
http://blog.laurenshope.com/medical-id-jewelry-blog/bid/79765/What-Is-Cushing-s-Syndrome
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783392099.27/warc/CC-MAIN-20160624154952-00091-ip-10-164-35-72.ec2.internal.warc.gz
en
0.952357
802
3.296875
3
One of the biggest differences between all-wheel-drive vehicles and four-wheel-drive vehicles is in who decides when all four wheels get power. With all-wheel-drives, electronic sensors play this role; with four-wheel-drives, it's the driver who throws a lever or flips a switch to give power to all four wheels. AWD is always "on," meaning that the electronic sensors can send power to all four wheels anytime they decide it's necessary. 4WD is engaged manually, and usually has a high range for highway speeds, and a low range for driving off-road or in heavy snow. Both systems work well in slippery conditions. Indeed, both are superb, especially when compared to the performance of rear-wheel-drdive vehicles on snow or ice. AWD may have the edge for suburban drivers who don't face snow and ice very often; 4WD may have the edge in places where winter comes early, stays long, and is fairly harsh. Both systems affect gas mileage because they add weight to the vehicles, and both mean more wear and tear on tires. With AWD, cars are generally designed for luxury and style as much as for rugged performance, ranging from the Subaru Impreza at the low end to the Bentley Continental and Lamborghini Murecielago at the high end. With 4WD, cars tend to be more utilitarian; think Jeep and Ford Explorer.
<urn:uuid:91ebe021-5a23-473f-bf3c-5e9c0ce2ec6e>
CC-MAIN-2016-26
http://www.onthesnow.com/news/a/8590/four-wheel-drive-vs--all-wheel-drive-in-the-snow
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398516.82/warc/CC-MAIN-20160624154958-00065-ip-10-164-35-72.ec2.internal.warc.gz
en
0.963441
294
2.609375
3
The Russian Manual Alphabet. The table below shows the Russian Manual Alphabet used for fingerspelling in Russian Sign Language. In general, fingerspelling is used for the following types of words: The chart below gives the Cyrillic letter, the name of the letter in Russian, and an English word illustrating an approximate pronunciation of the letter. proper nouns (names, cities, titles, brand names, etc) short conjunctions, prepositions, interjections, modal particles, etc., e.g. v-in, nu-well, words lacking a sign representation. - The above image is copyrighted to Joseph Kautz, Director of the Stanford Language Lab there web site is at: http://www.stanford.edu/ - I got in to trouble for putting this image on my site so I apologise for this. A-Z to Deafblindness http://www.deafblind.com
<urn:uuid:21623846-5ad4-4caa-aeed-931674658212>
CC-MAIN-2016-26
http://www.deafblind.com/russima.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397842.93/warc/CC-MAIN-20160624154957-00172-ip-10-164-35-72.ec2.internal.warc.gz
en
0.719789
203
3.25
3
Synopsis: El Niño is expected to continue at least through the Northern Hemisphere spring 2010. A moderate-to-strong El Niño continued during February 2010, with sea surface temperature (SST) anomalies exceeding 1.5oC in parts of the equatorial Pacific Ocean at the end of the month (Fig. 1). Weekly values of the Niño-3.4 index remained steady at +1.2oC during February (Fig. 2). An oceanic Kelvin wave was initiated in early February, which acted to increase the subsurface heat content anomalies (average temperatures in the upper 300m of the ocean, Fig. 3), and to strengthen subsurface temperature departures (exceeding +2oC down to 100-175m) across much of the equatorial Pacific (Fig. 4). SSTs were sufficiently warm to support deep tropical convection, which strongly increased across the central and eastern tropical Pacific, while remaining suppressed over Indonesia (Fig. 5). Equatorial low-level westerly wind anomalies also strengthened during February, while upper-level easterly wind anomalies weakened slightly. Collectively, these oceanic and atmospheric anomalies reflect a moderate-to-strong El Niño episode. Nearly all models predict decreasing SST anomalies in the Niño-3.4 region through 2010, with the model spread increasing at longer lead times (Fig. 6). The majority of models predict the 3-month Niño-3.4 SST anomaly will drop below +0.5oC by May-June-July 2010, indicating a transition to ENSO-neutral conditions near the onset of Northern Hemisphere summer. However, several models suggest the potential of continued weak El Niño conditions through 2010, while others predict the development of La Niña conditions later in the year. Predicting when El Niño will dissipate and what may follow remains highly uncertain. El Niño impacts are expected to last through the Northern Hemisphere spring, even as equatorial SST departures decrease, partly in response to the typical warming that occurs between now and April/May. Expected impacts during March-May 2010 include drier-than-average conditions over Indonesia and enhanced convection over the central and eastern equatorial Pacific Ocean, as well as coastal sections of Peru and Ecuador. For the contiguous United States, potential El Niño impacts include above-average precipitation for the Southwest, the south-central states, and Florida, and below-average precipitation in the Pacific Northwest and Great Lakes region. Above-average temperatures are most likely across the northern tier of states (excluding New England and the Northern Plains), while below-average temperatures are favored for the south-central and southeastern states. This discussion is a consolidated effort of the National Oceanic and Atmospheric Administration (NOAA), NOAA’s National Weather Service, and their funded institutions. Oceanic and atmospheric conditions are updated weekly on the Climate Prediction Center web site (El Niño/La Niña Current Conditions and Expert Discussions). Forecasts for the evolution of El Niño/La Niña are updated monthly in the Forecast Forum section of CPC's Climate Diagnostics Bulletin. The next ENSO Diagnostics Discussion is scheduled for 8 April 2010. To receive an e-mail notification when the monthly ENSO Diagnostic Discussions are released, please send an e-mail message
<urn:uuid:a3244f10-2a4d-4193-8850-da2750b4521e>
CC-MAIN-2016-26
http://www.cpc.noaa.gov/products/analysis_monitoring/enso_disc_mar2010/ensodisc.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397428.37/warc/CC-MAIN-20160624154957-00074-ip-10-164-35-72.ec2.internal.warc.gz
en
0.913194
678
2.578125
3
More than 200 species of birds make the annual migration from Canada to the tropics. University of Windsor students had a chance to study 47 of them this weekend when they went on a full-day field trip as part of a third-year class in ornithology. Almost 60 students watched migratory gulls and hawks at Point Pelee National Park, documented avian biodiversity at UWindsor’s Pelee Environmental Research Centre and banded migratory birds at Holiday Beach Conservation Area. Enthusiastic students were impressed to learn about the scale of the autumnal migration through Essex County. “I was surprised to learn that there are such diverse birds so close to us,” said Talia Masse, a biology student who took part in the trip. “It's not just a couple of birds, but flocks of thousands. Bird watching has definitely become a new hobby of mine." One of the most exciting parts of the trip was learning from the scientists at the Holiday Beach Migration Observatory. “My favourite part of the trip was learning how birds are captured, examined, and tagged,” said Bradley Poisson, a biology major. Another student, Samantha Malette, agreed. “My favourite part of the trip was seeing how bird banding works,” she said. “It was really incredible to see firsthand.” The trip was organized by Dan Mennill, a professor in Biological Sciences who teaches the ornithology course. Part of the excitement was introducing UWindsor students to the volunteer scientists in the community who run the observatory, Dr. Mennill said. “The amount of research being done there was astounding,” said student Matt Battiston. “I had no idea there were so many local people excited about the migration of birds through Windsor's backyard. It really stimulated my interest.”
<urn:uuid:c4c1a305-39eb-4127-ae95-48edfa2ce3b3>
CC-MAIN-2016-26
http://www.uwindsor.ca/dailynews/2011-09-26/field-trip-gives-students-hands-on-experience-with-marvel-of-migration
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398216.41/warc/CC-MAIN-20160624154958-00075-ip-10-164-35-72.ec2.internal.warc.gz
en
0.969412
393
2.65625
3
Word of the Day: Shark Admittedly, ‘shark’ is not the first word one associates with Shakespeare, but both the noun and the now obsolete verb were used by the Bard. The noun crops up as one of the ingredients for the witches’ potion in Macbeth: Scale of dragon, tooth of wolf, Witches’ mummy, maw and gulf, Of the ravin’d salt-sea shark. (4i) To be specific and to use the OED, it is the mouth (maw) and throat (gulf) of a shark glutted with prey (ravin’d) that the witches specifically require. As for the verb, it is Horatio in Hamlet who uses the word to describe Fortinbras’ rabble-rousing efforts: Now, sir, young Fortinbras, Of unimproved mettle hot and full, Hath in the skirts of Norway here and there Shark’d up a list of lawless resolutes… (1i) He goes on to emphasise the voracious qualities of the animal and, by extension, of Fortinbras’ soldiers. The only other use of the word as a verb similarly plays upon the sense of man giving in to his animal cravings, as Thomas More tells a crowd that if they give in to such cravings they will only become victims of more violent men. For other ruffians, as their fancies wrought, With self same hand, self reasons, and self right, Would shark on you, and men like ravenous fishes Would feed on one another… Thomas More is a collaborative work, and one in which critics believe Shakespeare participated, contributing this speech. The evidence? Amongst other things, his use of the word ‘shark’.
<urn:uuid:1678e667-218b-4cb5-9085-fcfbb74e347f>
CC-MAIN-2016-26
http://openliterature.net/2010/03/12/shark/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391766.5/warc/CC-MAIN-20160624154951-00124-ip-10-164-35-72.ec2.internal.warc.gz
en
0.94162
394
2.828125
3
|Violence Against Women and HIV/AIDS: Setting the Research Agenda| AUTHOR: Gender and Women's Health, World Health Organization PUBLISHER: Gender and Women's Health, World Health Organization A growing number of studies have documented the high prevalence of intimate partner violence and sexual violence against women worldwide. This violence can and does contribute to women's increased risk of HIV infection. However, questions remain about the connections and complexities between different forms of violence against women (VAW) and HIV/AIDS. Further research is needed to understand exactly how these two areas overlap and the extent to which interventions can effectively address both problems. The problem also requires further research and collaboration between those working on VAW and those working on HIV/AIDS. It was with this in mind that WHO convened an expert consultation "Violence Against Women and HIV/AIDS: Setting the Research Agenda" from 23-25 October 2000, to take stock and learn from existing research. This report is a result of the meeting. It provides summaries of the presentations at the meeting, the subsequent discussions and concludes with recommendations. Article can be accessed on-line here in PDF format. To view PDF documents you will need to download and install Adobe Acrobat Reader. The program is available for free through the Adobe website, download here. More help is available on PDF documents and Adobe Acrobat Reader here.
<urn:uuid:97ed4a5d-246e-4d10-9bff-232443f10415>
CC-MAIN-2016-26
http://www.genderandaids.org/index.php?option=com_content&view=article&id=440:Violence-Against-Women-and-HIV/AIDS:-Setting-the-Research-Agenda&catid=62:violence-against-women-and-hivaids&Itemid=104
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398869.97/warc/CC-MAIN-20160624154958-00051-ip-10-164-35-72.ec2.internal.warc.gz
en
0.947775
280
2.609375
3
Why is the scoring system in Tennis so odd? Tennis as we know it today is barely more than 100 years old. A Welshman, Major Walter Clopton Wingfield, devised the game as a diversion for his guests on his lawn before the real purpose for the get-together – a pheasant shoot. Very quickly, however, the members of the Wimbledon Cricket Club adopted Wingfield’s game for use on their own under-utilised lawns, empty since croquet had waned in popularity in the late 18th century. Long before Wingfield, however, there were other forms of tennis. The word ‘tennis’ first appeared in a poem by John Gower in 1399, and Chaucer’s characters spoke of playing ‘rackets’ in 1380. Court tennis (also known as ‘real’ tennis) dates back to the Middle Ages. That great athlete Henry VIII was a devotee of the game. Court tennis was an indoor game featuring an asymmetrical rectangular cement court with a sloping roof, a hard ball, a lopsided racket and windows on the walls that came into play. Very much a gentleman’s sport, the game is still played by a few diehards. And so to the scoring system … Lawn tennis’s strange scoring system was clearly borrowed from court tennis. Although court tennis used a 15-point system, the scoring system was a little different from modern scoring. Each point in a game was worth 15 points (while modern tennis progresses 15-30-40-game, court tennis progressed 15-30-45-game). Instead of the current 3 or 5 sets of 6 games each, court tennis matches were 6 sets of 4games each. The most accepted theory for explaining the scoring system is that it reflected a preoccupation with astronomy, and particularly with the sextant (one-sixth of a circle). One-sixth of a circle is, of course, 60 degrees (the number of points in a court tennis game). Because the victor would have to win 6 sets of 4 games each, or 24 points, and each point was worth 15 points, the game concluded when the winner had ‘completed’ a circle of 360 degrees (24 x 15). Writings by Italian Antonio Scaino indicate that the sextant scoring system was firmly in place as early as 1555. When the score of a game is tied after 6 points in modern tennis, we call it ‘deuce’ – the Italians already had an equivalent in the sixteenth century, a due (in other words, 2 points were needed to win). Somewhere along the line, however, the geometric progression of individual game points was dropped. Instead of the third point scoring 45, it became worth forty. According to the Official Encyclopedia of Tennis, it was most likely dropped to the lower number for the ease of announcing scores out loud, because ’40’ could not be confused with any other number. In the early 1700s, the court tennis set was extended to 6 games, obscuring the astronomical origins of the scoring system. There have been many attempts to simplify the scoring system in order to entice new fans. The World Pro Championship League tried the table-tennis scoring system of 21-point matches, but neither the scoring system nor the league survived. Perhaps the most profound scoring change in the past century has been the tie-breaker. The United States Tennis Association’s Middle States section, in 1968, experimented with sudden-death play-offs, which for the first time in modern tennis history allowed a player who had won all of his regulation service games to lose a set. The professionals adopted the tie-breaker in 1970, and it is used in almost every tournament today.
<urn:uuid:9081dfcd-e308-4687-87e7-f1e1cb768882>
CC-MAIN-2016-26
http://guernseydonkey.com/?p=1890
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393997.50/warc/CC-MAIN-20160624154953-00079-ip-10-164-35-72.ec2.internal.warc.gz
en
0.974245
793
3.296875
3
(NAPSI)—According to the National Weather Service, the possibility of an El Niño weather pattern this year means the likelihood of a significant hurricane is lower than average. That means homeowners have more time to prepare. The United States is struck by a major hurricane about once every two years, meaning that the next big storm could be brewing in the not-so-distant future. The potential for a slower season affords residents in hurricane-prone areas a rare opportunity to shore up defenses and prepare for the next big storm. Every hurricane that makes landfall causes about $3 billion in damage. “Even with eight of the 10 most deadly hurricanes striking the U.S. in the past eight years, building along the East and Gulf Coasts continues and property values are increasing,” says Karen McCague, claims operations manager, Liberty Mutual Insurance. “It is imperative that coastal residents are prepared. We see it time and time again: Those who have planned ahead fare far better during and after a major storm and are back on their feet sooner.” McCague recommends following a preparation outline she calls “The Three Ps,” to ensure safety of people, property and possessions: • During a hurricane, follow all evacuation directives. If evacuations are optional and you decide to stay in your home, take precautions against extended power outages by replacing batteries in flashlights and filling bathtubs and sinks with clean water in case the water supply is compromised. • To secure your home, install hurricane shutters, prune back trees and secure loose roof shingles to minimize damage from heavy winds and rain. When the storm approaches, turn off all electronics and circuit breakers to prevent damage from power surges. • Every household should have a fully stocked hurricane emergency kit, which includes first-aid supplies, food, water and other necessities. All families should identify an out-of-area contact. This person should have copies of your important documents (passports, birth certificates, property deeds, etc.) as well as an up-to-date phone list. • Have an evacuation plan mapped out well in advance and make sure you know the best route to a predetermined meeting point or shelter. Fill your vehicle with gas ahead of time to protect against long lines at the pump and gas shortages. Regardless of your level of preparation, always follow instructions from local authorities and evacuation directives. For more information, visit www.libertymutual.com/prepare. On the Net:North American Precis Syndicate, Inc.(NAPSI)
<urn:uuid:99a4d1ef-fe3b-49c5-a83c-a5f80f6c75b5>
CC-MAIN-2016-26
http://www.mysuncoast.com/online_features/money_and_finance/a-rare-opportunity-to-prepare-for-hurricane-season/article_4c2ab45e-2ffb-5eb7-9bbb-43600f704f4d.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396538.42/warc/CC-MAIN-20160624154956-00189-ip-10-164-35-72.ec2.internal.warc.gz
en
0.937824
525
2.625
3
Progress in the world of biometrics should cause us all to shudder. Cameras in public locations can now employ facial recognition to direct advertising to us based upon an assessment of our age, sex, and other characteristics. Cameras can determine our reaction to and engagement in video games and movies. It sounds a bit like a world composed of two-way mirrors. But instead of shuddering, we sometimes knowingly, sometimes carelessly, support the technology – and other data collection practices – through our online and commercial activities. How many of us constantly update and tag our Facebook pages with pictures of us and our loved ones and where we’ve been? How many take advantage of product/service discounts by scanning our smart phones and “liking” products on Facebook? How many of us are now buying into dating apps and social apps that are based on facial recognition technology? The fact is that much of our data can be, and is being, collected and we consumers (especially in the United States) seem to have no problem with it, even volunteering for it. Perhaps fortunately, some regulators are stepping in and keeping a watchful eye on these developments and looking for ways to curb the potentially nefarious use of consumer data. The FTC and its Division of Privacy and Identity Protection recently published its list of best practices for companies who use facial recognition technologies. The publication, “Facing Facts: Best Practices for Common Uses of Facial Recognition Technologies,” underlines important concerns about being able to identify anonymous individuals in public and about attendant security breaches such as hacking. The FTC’s proposed best practices include the following: • Companies should maintain reasonable data security protections to prevent unauthorized information “scraping” of consumer images and biometric data. • Companies should maintain appropriate retention and disposal practices. • Companies should consider the sensitivity of information when developing facial recognition products and services, e.g., they should avoid placing signs in sensitive areas, such as bathrooms, locker rooms, health care facilities, or places where children congregate. • Companies using digital signs capable of demographic detection should provide clear notice to consumers that the technologies are in use, before consumers come into contact with the signs. • Social networks should provide consumers with (1) an easy-to-find, meaningful choice not to have their biometric data collected and used for facial recognition; and (2) the ability to turn off the feature at any time and delete any biometric data previously collected. • Companies should obtain a consumer’s affirmative express consent before using a consumer’s image or any biometric data in a materially different manner than they represented when they collected the data. • Companies should not use facial recognition to identify anonymous images of a consumer to someone who could not otherwise identify him or her, without obtaining the consumer’s affirmative express consent. The guidelines come only a few months after the FTC’s March 2012 Privacy Report (“Protecting Consumer Privacy in an Era of Rapid Change: Recommendations For Businesses and Policymakers”) and are a logical follow-on to the report. They incorporate the Privacy Report’s core principles: privacy by design, simplified consumer choice, and transparency. These principles and guidelines are a step in the direction of responsible data collection and responsible technological advancements. We should point out that neither the Privacy Report nor the Best Practices in Facial Recognition are binding or enforceable as they do not fall under FTC’s legal authority. And the FTC prominently makes this disclaimer, noting that the guidelines are merely recommendations without the force of law. It is clear, however, that the FTC is appropriately preparing to assume enforcement authority, should Congress pursue privacy legislation (something the FTC recommends in the Privacy Report). That is obvious from the mere fact that the agency has established a Privacy and Identity Protection Division. Companies that are developing or seeking to employ biometrics – or that employ other data collection practices – would be well advised to pay attention to the FTC’s recommendations. The guidelines provide insight into how an enforcement authority is likely to approach biometrics and other data collection practices. The guidelines also provide a framework for responsible use of consumer data. And even though consumers currently seem passive or dismissive about biometrics and data collection, it would take just one scandal or highly publicized incident for public opinion to change. Companies will benefit in the long run by building good will among consumers.
<urn:uuid:2e801e1e-e5c1-44eb-bedf-fc88414e69d0>
CC-MAIN-2016-26
http://ftcbeat.com/2012/11/12/policing-the-wide-wild-new-world-of-biometrics/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402746.23/warc/CC-MAIN-20160624155002-00096-ip-10-164-35-72.ec2.internal.warc.gz
en
0.928002
906
2.59375
3
In cell cycle, interphase is the period between two consecutive cell divisions, e.g. the interval between two mitoses (hence the name). Compared to mitosis, the interphase is generally longer in duration; it is comprised of three stages: G1, S phase, and G2. During interphase, the cell typically undergoes growth (i.e. increases in cell size) and makes a copy of the cell's DNA to prepare for the next cell division. Word origin: inter (between) + phase (from phasis, appearance)
<urn:uuid:56cc5695-4a44-4c41-b8a5-642918fc6a79>
CC-MAIN-2016-26
http://www.biology-online.org/dictionary/Interphase
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396106.25/warc/CC-MAIN-20160624154956-00124-ip-10-164-35-72.ec2.internal.warc.gz
en
0.936395
116
3.75
4
Needle aspiration of the thyroid gland is used to determine the cause of a lump and, if the lump is a cyst, to drain it. During the procedure, cells are removed from the abnormal area using a fine hollow needle attached to a syringe. Ultrasound guidance may be used if a lump is inaccessible. The sample is then examined in a laboratory for cancerous cells. This procedure is safe and almost painless and can be carried out in an outpatient clinic. From the 2010 revision of the Complete Home Medical Guide © Dorling Kindersley Limited. The subjects, conditions and treatments covered in this encyclopaedia are for information only and may not be covered by your insurance product should you make a claim.
<urn:uuid:87daf7b4-08cb-4f15-ad16-17d06ce87906>
CC-MAIN-2016-26
http://www.aviva.co.uk/health-insurance/home-of-health/medical-centre/medical-encyclopedia/entry/test-needle-aspiration-of-the-thyroid-gland/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399425.79/warc/CC-MAIN-20160624154959-00038-ip-10-164-35-72.ec2.internal.warc.gz
en
0.909707
148
2.59375
3
May 30, 2013 An important part of learning to read is reading out loud. During the summer months, students have some extra time to practice reading, and parents can easily become involved in the read-out-loud process. A fun book to get kids involved in reading aloud is Very Short Fairy Tales to Read Together by Mary Ann Hoberman. This book features children’s favorite fairy-tale characters, such as the Three Bears, Cinderella, and Little Red Riding in very short tellings with a twist. Each story is told in "two voices" and uses traditional reading techniques—alliteration, rhyme, repetition, and short sentences—to invite young children to read along with an adult. If you have an older child listening to that child read, one of Dan Gutman’s My Weird School Daze books can be fun. For example, in Ms. LaGrange Is Strange!, the new lunch lady talks funny—and why is she writing secret messages in the mashed potatoes? Reading this book together will help find the answer. Perhaps this is the summer to read a Mark Twain award book together. In Sparrow Road by Sheila O’Connor, twelve-year-old Raine O-Rourke explores a mysterious mansion while her mother works there. This book has mysteries, secrets, and a cast of unforgettable characters. When my daughter was in sixth grade, we took turns reading a chapter of a Mark Twain book. We enjoyed it so much that it became a nighttime ritual for many months. Even reading classics together or a book like Jurassic Park by Michael Crichton can be enjoyable. Many children don’t outgrow the joy of having a book read to them and will look forward to sitting down and listening to one more chapter of a book. Reading out loud together can bring joy to both parents and children. Use this summer to begin a tradition of togetherness that can carry through to the school year and beyond. Jean Ann G. Lone Jack Branch
<urn:uuid:c7475371-a360-400f-9413-3bed4d231b2e>
CC-MAIN-2016-26
http://www.mymcpl.org/blog/reading-togetherness
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391766.5/warc/CC-MAIN-20160624154951-00086-ip-10-164-35-72.ec2.internal.warc.gz
en
0.95428
409
3.359375
3
Part I of this Article discusses the fundamental nature of the rights found in California's Declaration of Rights, and the need to maintain their stability. It also discusses the problems inherent in forcing the interpretation of California rights to follow federal interpretations. Part II traces the development of the independent state grounds doctrine in the United States, and specifically, in California. Part III explains the history and procedure of the voter initiative in California, while Part IV analyzes how Propositions 8 and 115 have limited the ability of the California judiciary to give independent meaning to California's Declaration of Rights. Part V examines other proposals and concludes that a super-majority vote for changes to the Declaration of Rights would best achieve a balance between the right of the voters to alter the Declaration of Rights and the right to an independent state constitution. 21 Hastings Cont. L. Q. 95 (1993)
<urn:uuid:d77f378f-a7f0-4b2f-a87c-96cd601f7f6f>
CC-MAIN-2016-26
http://digitalcommons.law.ggu.edu/pubs/423/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398873.39/warc/CC-MAIN-20160624154958-00160-ip-10-164-35-72.ec2.internal.warc.gz
en
0.892423
172
2.53125
3
Resident Dr. Adam Sonabend Gets Attention for Brain Tumor Research This year in New Orleans at the 81st Annual Scientific Meeting of the American Association of Neurological Surgeons (AANS), Neurosurgical Resident Dr. Adam Sonabend was invited to give an oral presentation on the brain tumor research he has been doing here at Columbia. Dr. Sonabend has been working with neurosurgeon Dr. Jeffrey Bruce in the Bartoli Brain Tumor Lab to find better ways to treat a rare but deadly brain tumor, the central nervous system hemangiopericytoma. These tumors are unique in that they can metastasize outside of the central nervous system (CNS). A protective barrier exists between the CNS, which is made up of the brain and spinal cord, and the rest of the body. CNS hemangiopericytomas, unlike other types of brain cancer, can jump this barrier and spread to other parts of the body. This makes them unpredictable and difficult to treat. At a plenary session of the CNS/AANS Tumor Section in New Orleans, Dr. Sonabend said, “Due to the relatively uncommon nature of these tumors, it is hard to learn about their clinical behavior in a single institution case series. To deal with this limitation, we used the SEER database, which samples 26% of the whole US population. The work suggests that radiation therapy is beneficial for treating patients with CNS hemangiopericytoma. Dr. Sonabend’s presentation was followed by an illuminating question and answer session. We have just heard that Dr. Sonabend’s work has been accepted for publication by the Journal of Neurosurgery and they are currently working on an editorial about this research. Good work Dr. Sonabend! In Areas of Expertise, Award, Blog, Brain Tumor, Brain Tumor Blog, Brain Tumors, Centers, Doctors, Metastatic Brain Tumors Tags: , AANS, Annual Meeting of AANS, award, Bartoli Brain Tumor Lab, Brain Tumor, Bruce, CNS, Dr. Adam Sonabend, Dr. Jeffrey Bruce, hemangiopericytomas, honor, Presentation, Residency, resident, Sonabend Comments are closed.
<urn:uuid:4701b97a-b5b3-4908-acb0-7dfe0845fe67>
CC-MAIN-2016-26
http://www.columbianeurosurgery.org/2013/06/resident-neurosurgeon-dr-adam-sonabend-wins-award-at-aans-2013/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783394414.43/warc/CC-MAIN-20160624154954-00046-ip-10-164-35-72.ec2.internal.warc.gz
en
0.912022
482
2.515625
3
Other Names for this Disease - Alpha thalassemia See Disclaimer regarding information on this site. Some links on this page may take you to organizations outside of the National Institutes of Health. hemoglobin. Affected people have anemia, which can cause pale skin, weakness, fatigue, and more serious complications. Two types of alpha-thalassemia can cause health problems: the more severe type is known as Hb Bart syndrome; the milder form is called HbH disease. Hb Bart syndrome may be characterized by hydrops fetalis; severe anemia; hepatosplenomegaly; heart defects; and abnormalities of the urinary system or genitalia. Most babies with this condition are stillborn or die soon after birth. HbH disease may cause mild to moderate anemia; hepatosplenomegaly; jaundice; or bone changes. Alpha-thalassemia typically results from deletions involving the HBA1 and HBA2 genes. The inheritance is complex, and can be read about here. No treatment is effective for Hb Bart syndrome. For HbH disease, occasional red blood cell transfusions may be needed.Alpha-thalassemia is a blood disorder that reduces the body's production of Last updated: 7/29/2015 - Alpha thalassemia. Genetics Home Reference. August 2009; http://ghr.nlm.nih.gov/condition/alpha-thalassemia. Accessed 1/23/2012. - Alpha-Thalassemia. GeneReviews. July 15, 2008; http://www.ncbi.nlm.nih.gov/books/NBK1435/. Accessed 1/23/2012. - Genetics Home Reference (GHR) contains information on Alpha-thalassemia. This website is maintained by the National Library of Medicine. - MedlinePlus was designed by the National Library of Medicine to help you research your health questions, and it provides more information about this topic. - The National Heart, Lung, and Blood Institute (NHLBI) provides leadership for a national program in diseases of the heart, blood vessels, lung, and blood; blood resources; and sleep disorders. Since October 1997, the NHLBI has also had administrative responsibility for the NIH Woman's Health Initiative. Click on the link to view information on this topic. - The National Human Genome Research Institute's (NHGRI) mission encompasses a broad range of studies aimed at understanding the structure and function of the human genome and its role in health and disease. Click on the link to view the information page on this topic. - The Screening, Technology And Research in Genetics (STAR-G) Project has a fact sheet on this condition, which was written specifically for families that have received a diagnosis as a result of newborn screening. This fact sheet provides general information about the condition and answers questions that are of particular concern to parents. - The Monarch Initiative brings together data about this condition from humans and other species to help physicians and biomedical researchers. Monarch’s tools are designed to make it easier to compare the signs and symptoms (phenotypes) of different diseases and discover common features. This initiative is a collaboration between several academic institutions across the world and is funded by the National Institutes of Health. Visit the website to explore the biology of this condition. - Online Mendelian Inheritance in Man (OMIM) is a catalog of human genes and genetic disorders. Each entry has a summary of related medical articles. It is meant for health care professionals and researchers. OMIM is maintained by Johns Hopkins University School of Medicine. - Orphanet is a European reference portal for information on rare diseases and orphan drugs. Access to this database is free of charge. - PubMed is a searchable database of medical literature and lists journal articles that discuss Alpha-thalassemia. Click on the link to view a sample search on this topic.
<urn:uuid:d37a1eef-5f05-4975-84ea-914b4f8eb6bf>
CC-MAIN-2016-26
https://rarediseases.info.nih.gov/gard/621/alpha-thalassemia/resources/1
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397565.80/warc/CC-MAIN-20160624154957-00053-ip-10-164-35-72.ec2.internal.warc.gz
en
0.898957
808
3.640625
4
|Entering into marriage| |Dissolution of marriage| |Issues affecting children| |Areas of possible legal concern| Alimony, maintenance, or spousal support is an obligation established by law in many countries based on the premise that both spouses have an absolute obligation to support each other during their marriage (or civil union). Historically, alimony arose as a result of the indissoluble nature of marriage—because divorce was rare, husband and wife remained married after their physical separation and the husband's obligation to support his wife continued. When divorce became more common, many societies continued to recognize the need for the wife to be supported, at least for a time, when the marriage was terminated. With the growing view that men and women should be treated equally, at least in Western society, the law recognized that both husbands and wives owed each other a similar duty of support. Accordingly, courts now may order either the husband or wife to pay alimony, although in practice it is more often the husband. Alimony can be understood as an effort by society to ensure that those whose marriage breaks down receive a degree of financial support. While this is a valuable measure, and has enabled many to move on and lead successful lives following divorce, it has often proved burdensome to those required to make large payments for a considerable time period. Unless a solution can be found to divorce, however, the right to receive alimony remains an essential component of the proceedings. The practice of alimony has deep roots in history. Alimony is among the rules regarding marriage written about in the Code of Hammurabi. Under this ancient Babylonian code (created ca. 1780 B.C.E.), if a couple divorced, the man was obligated to return the dowry, grant his ex-wife custody of any children from the marriage, and give her an allowance to sustain her and the children until they were grown. If the couple did not have children, the man was obligated to return the dowry and pay his wife the equivalent of a bride price. If the wife had violated any number of traditions, the husband could be entitled to keep the dowry and children or even relegate his ex-wife to slavery. Alimony is also mentioned in the Code of Justinian, which later became the basis for Roman law and British common law. This code discusses alimony in the context of marriage by habit and repute, in which couples are considered legally married and entitled to any rights or privileges stemming therefrom despite not formalizing their union. The modern concept of alimony in the United States derives from English ecclesiastical courts which awarded alimony in cases of separation and divorce. Alimony Pendente lite was given until the divorce decree, based on the husband's duty to support the wife during a marriage. Post-divorce or permanent alimony was also based on the notion that the marriage continued, as ecclesiastical courts could only award a divorce a mensa et thora (Latin, "from table and bed" but more commonly translated as "from bed and board"). This phrase designates a divorce which is really akin to a separation granted by a court whereby a husband and wife are not legally obligated to live together, but their marriage has not been dissolved. Hence, the husband's duty to support his wife remained intact. Once dissolution proceedings commence, either party may seek interim or pendente lite support during the course of the litigation. Where a divorce or dissolution of marriage (or civil union) is granted, either party may ask for post-marital alimony. It is not an absolute right, but may be granted, the amount and terms varying with the circumstances. If one party is already receiving support at the time of the divorce, the previous order is not automatically continued (although this can be requested), as the arguments for support during and after the marriage can be different. Unless the parties agree on the terms of their divorce in a binding written instrument, the court will make a fair determination based on the legal argument and the testimony submitted by both parties. This can be modified at any future date based on a change of circumstances by either party on proper notice to the other party and application to the court. However, courts are generally reluctant to modify an existing agreement unless the reasons are compelling. In some jurisdictions the court always has jurisdiction to grant maintenance should one of the former spouses become a public charge. Alimony is not child support, which is another ongoing financial obligation often established in divorce. Child support is where one parent is required to contribute to the support of his or her children through the agency of the child's other parent or guardian. Alimony is treated very differently from child support in the United States with respect to taxation. Alimony is treated as income to the receiving spouse, and deducted from the income of the paying spouse. Child support is not a payment that affects U.S. taxes, as it is viewed as a payment that a parent is making for the support of their own offspring. If a party fails to pay alimony there are no special legal options available to the party that is owed money. In many jurisdictions, however, people whose child support obligations go into arrears can have licenses seized, and in a few states they can even be imprisoned. On the other hand, options for recovering back alimony are limited to the collection procedures that are available to all other creditors (for example, they could report the back alimony to a collection agency). Some of the factors that bear on the amount and duration of the support are: A prenuptial agreement is a contract entered into by two people prior to marriage. The content of a prenuptial agreement can vary widely, but commonly includes provisions for the division of property should the couple divorce and any rights to alimony during or after the dissolution of marriage. The intention of the prenuptial agreement can be questionable, as it appears to imply a lack of trust and/or commitment to the marriage. Laws around the world vary in their recognition of such agreements. Historically, judges in the United States frowned upon prenuptial agreements as corrupting what marriage was supposed to stand for. Nowadays while recognized, they may not always be enforced. It is common to have legal advice to the effect that both parties should have lawyers present during the signing, for a judge to ensure that neither party has been coerced into the agreement. Prenuptial agreements are, at best, a partial solution to obviating some of the risks of marital property disputes and obligations of burdensome alimony payments. The situation with respect to paying alimony differs in different countries. The role of alimony and child support around the world is different based on the different traditions that exist. The amount and ramifications of alimony is greatly dependent on the status afforded to women in each culture around the world. According to Section 71 of the U.S. Internal Revenue Code, alimony must be included in the recipient’s gross income and can be excluded from the payer’s gross income. To qualify as alimony the payments must meet the following five conditions: These requirements apply whether the parties enter an agreement that is approved in an order of the court (contractual alimony) or the court orders alimony after a contested trial (statutory alimony). Section 215 of the Internal Revenue Code allows the alimony payer to take a tax deduction for any alimony or separate maintenance paid during the year. The payer’s deduction is tied to the recipient’s inclusion of alimony. If the amount of the alimony payments would be reduced in the event of the age, death, or marriage of the child, this contingent amount would be considered child support, which must be included in the payer’s gross income and can be excluded from the recipient’s gross income. Together Sections 71 and 215 act as an income-splitting device. Because of this, collaborative divorce processes such as mediation may allow special tax-saving alimony planning opportunities. Though alimony has foundations in the Middle East, rights for women have been limited. Thus, in many countries women have been prohibited from initiating divorce and claiming alimony. Attempts to do so led to allegations that their actions were destroying the family, the unity of the nation, and imposing "immoral" values on society. By the beginning of the twenty-first century, however, changes were in motion. Egypt, for example, has considered loosening rules regarding woman-initiated divorce, although with the stipulation that the woman would give up any claim to alimony payments. When alimony is awarded, it often goes unpaid due to lax legal systems. The Permanent Arab Court to Resist Violence Against Women, established in December 1999 in 13 Arab countries, launched the Feminine Rights Campaign, which called for equality between men and women especially with respect to divorce. The objectives included the achievement of equality in the right of divorce and its consequences; equal rights as to the custody of children, marital property and all other marital rights; and government funding to guarantee the payment of alimony. Alimony is equally tenuous in Asia. For example, loose enforcement has led to contention and ignoring court ordered payments in China. The duration of alimony payments may also be insufficient. In Bangladesh, for instance, an alimony verdict may mean that a divorced woman receives alimony for only three months and 13 days after the divorce. New World Encyclopedia writers and editors rewrote and completed the Wikipedia article in accordance with New World Encyclopedia standards. This article abides by terms of the Creative Commons CC-by-sa 3.0 License (CC-by-sa), which may be used and disseminated with proper attribution. Credit is due under the terms of this license that can reference both the New World Encyclopedia contributors and the selfless volunteer contributors of the Wikimedia Foundation. To cite this article click here for a list of acceptable citing formats.The history of earlier contributions by wikipedians is accessible to researchers here: Note: Some restrictions may apply to use of individual images which are separately licensed.
<urn:uuid:f8cc5661-de99-490c-9369-1450755479e8>
CC-MAIN-2016-26
http://www.newworldencyclopedia.org/entry/Alimony
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399106.96/warc/CC-MAIN-20160624154959-00201-ip-10-164-35-72.ec2.internal.warc.gz
en
0.96467
2,074
3.3125
3
The Life of Jose Rizal: Philippine Patriot Liberalizing Hereditary Influences The hope of the Binan landlords that by changing from Filipino to Chinese tenantry they could avoid further litigation seems to have been disappointed. A family tradition of Francisco Mercado tells of a tedious and costly lawsuit with the Order. Its details and merits are no longer remembered, and they are not important. History has recorded enough agrarian trouble, in all ages and in all countries, to prove the economic mistake of large holdings of land by those who do not cultivate it. Human nature is alike the world over, it does not change with the centuries, and just as the Filipinos had done, the Chinese at last objected to paying increased rent for improvements which they made themselves. A Spanish judge required the landlords to produce their deeds, and, after measuring the land, he decided that they were then taking rent for considerably more than they had originally bought or had been given. But the tenants lost on the appeal, and, as they thought it was because they were weak and their opponents powerful, a grievance grew up which was still remembered in Rizal's day and was well known and understood by Another cause of discontent, which was a liberalizing influence, was making itself felt in the Philippines about the time of Domingo's death. A number of Spaniards had been claiming for their own countrymen such safeguards of personal liberty as were enjoyed by Englishmen, for no other government in Europe then paid any attention to the rights of the individual. Learned men had devoted much study to the laws and rights of nations, but these Spanish Liberals insisted that it was the guarantees given to the citizens, and not the political independence of the State, that made a country really free. Unfortunately, just as their proposals began to gain followers, Spain became involved in war with England, because the Spanish King, then as now a Bourbon and so related to a number of other reactionary rulers, had united in the family compact by which the royal relatives were to stamp out liberal ideas in their own dominions, and as allies to crush England, the source of the dissatisfaction which threatened their thrones. Many progressive Spaniards had become Freemasons, when that ancient society, after its revival in England, had been reintroduced into Spain. Now they found themselves suspected of sympathy with England and therefore of treason to Spain. While this could not be proved, it led to enforcing a papal bull against them, by which Pope Clement XII placed their institution under the ban of excommunication. At first it was intended to execute all the Spanish Freemasons, but the Queen's favorite violinist secretly sympathized with them. He used his influence with Her Majesty so well that through her intercession the King commuted the sentences from death to banishment as minor officials in the possessions overseas.
<urn:uuid:363ecce1-12c3-4032-8eda-d9ab333ea5c7>
CC-MAIN-2016-26
http://www.free-ebooks.net/ebook/The-Life-of-Jose-Rizal-Philippine-Patriot/html/23
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395992.75/warc/CC-MAIN-20160624154955-00049-ip-10-164-35-72.ec2.internal.warc.gz
en
0.984163
614
2.828125
3
Theon of Alexandria worked in Alexandria as a teacher of mathematics and astronomy. We know from his own writings that he observed a solar eclipse on 16 June 364 at Alexandria and a lunar eclipse, again in Alexandria, on 25 November 364. We also know that he made a list of Roman consuls which he continued to make until 372. There is a reference in the Suda Lexicon (a work of a 10th century Greek lexicographer) which states that Theon of Alexandria lived under the Emperor Theodosius I (who reigned from 379 to 395). These dates are therefore consistent. The Suda also states that Theon was a member of the Museum, which was an institute for higher education set up in Alexandria in 300 BC. Again this is possible, but the Museum certainly did not exist much beyond the time of Theon if indeed it existed in his time. On balance it seems reasonable to accept that he was one of its last members. Theon was the father of Hypatia and it certainly seems to be the case that he died before she was murdered in 415. There does not seem to be any other evidence which would let us give a more accurate guess of the dates of his birth and death other than these few indications of times when he was certainly working. Theon is famed for his commentaries on many works such as Ptolemy's Almagest and the works of Euclid. These commentaries were written for his students and some are even thought to be lecture notes taken by students at his lectures. On one work he gave two commentaries and in the preface to the second he explains that he is giving a more elementary account for the majority of his students are unable to understand geometrical proofs. This again confirms that the vigour had gone out of his teaching establishment and indeed the poor quality of students it seemed to be attracting could have been a telling factor in the closure of the Museum (if as we commented above the Suda is right in giving that as his institution). Theon was a competent but unoriginal mathematician. Theon's version of Euclid's Elements (with textual changes and some additions) is thought to have been written with the assistance of his daughter Hypatia and was the only Greek text of the Elements known, until an earlier one was discovered in the Vatican in the late 19th century. However, now that the Vatican manuscript has been discovered it is possible to see exactly the changes that Theon made in his version. The approach that Theon makes appears to make is to try to improve the earlier manuscript rather than to try to reproduce an accurate reproduction with comments. So he corrected mistakes which he spotted in the mathematics, but unfortunately not all the points that he fails to understand are mistakes, some are perfectly correct. Theon also tried to standardise the way that Euclid writes, so when Theon came across an expression which was somewhat different from the norm, he replaced it by the standard form of expression. On the positive side, however, Theon amplified Euclid's text whenever he thought that an argument was overly brief, sometimes adding propositions to make the text more easily read by beginners. In this he was successful, so much so in fact that his became the standard edition and almost all earlier editions have been lost. Heath writes of Theon's edition of the Elements :- .. while making only inconsiderable additions to the content of the "Elements", he endeavoured to remove difficulties that might be felt by learners in studying the book, as a modern editor might do in editing a classical text-book for use in schools; and there is no doubt that his edition was approved by his pupils at Alexandria for whom it was written, as well as by later Greeks who used it almost exclusively... Theon also produced commentaries on other works of Euclid. Certainly he produced a commentary on Euclid's Optics and on his Data. Theon's commentary on the Data is written at a relatively advanced level and in it Theon tends to shorten Euclid's proofs rather than to amplify them. The Optics on the other hand is elementary and written in a totally different style and some historians conjecture that it is really a set of lecture notes by one of Theon's students. Many times the manuscript contains a phrase such as "he said" and it is thought that a student is indeed writing down what "Theon said". The Catoptrica is a rather different case for here we have a work which on the face of it claims to be written by Euclid. This however is impossible since the contents are a mixture of work dating from Euclid's time together with work which is much later than Euclid's time. The style and elementary nature of the work make authorship by Theon a distinct possibility. If this is the case then again he is writing for his weak students. Theon also wrote extensive commentaries on the astronomical works of Ptolemy, both on the Almagest and the Handy tables. Again his daughter Hypatia assisted him in the commentary on the Almagest and this is Theon's most major piece of work. In the preface to his commentary on the Almagest Theon writes that his intention is to improve on previous commentators (see for example ):- ... who claim that they will only omit the more obvious points, but in fact prove to have omitted the most difficult. However, as Toomer points out in , this is exactly what Theon himself goes on to do. Theon wrote two commentaries on Ptolemy's Handy Tables. The small commentary only explains how to use the tables while the large commentary explains their construction. The larger commentary has been published recently by Tihon in and . Although Theon certainly wrote the small commentary after the larger one, since he refers to the larger commentary in the preface to the smaller. However, Tihon discovered that the oldest manuscript which has been preserved, a Vatican manuscript dating from the 9th century, suggests that Theon never completed the text of his large commentary. This Vatican manuscript is made from an earlier copy of Theon's text which was being used in the year 463 in Apamea in Syria. As to Theon's commentary on Ptolemy's Syntaxis Heath writes :- This commentary is not calculated to give us a very high opinion of Theon's mathematical calibre, but it is valuable for several historical notices that it gives, and we are indebted to it for a useful account of the Greek method of operating with sexagesimal fractions, which is illustrated with examples of multiplication, division, and the extraction of the square root of a non-number by way of approximation. Article by: J J O'Connor and E F Robertson
<urn:uuid:2ab196c8-3811-4627-80b5-d09ee9d1ac21>
CC-MAIN-2016-26
http://www-groups.dcs.st-and.ac.uk/~history/Printonly/Theon.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391634.7/warc/CC-MAIN-20160624154951-00117-ip-10-164-35-72.ec2.internal.warc.gz
en
0.987944
1,389
3.078125
3
< Browse to Previous Essay | Browse to Next Essay > CCC Camp Darrington opens on May 20, 1933. HistoryLink.org Essay 8583 : Printer-Friendly Format On May 20, 1933, Civilian Conservation Corps (CCC) Camp Darrington opens a half mile north of the town of Darrington in Snohomish County. Designated as a forest service camp, it will undertake a wide variety of projects that will benefit out-of-work young men and their families throughout the long years of the Great Depression. It will serve several thousand enrollees over the years, providing jobs and creating structures in the national forest nearby, making roads, and fighting fires. It will close in 1942. Young Men and Their Tents On the rainy afternoon of May 17, 1933, 22 young men arrived in an old Model T mail truck at a forested spot a half-mile north of Darrington. By day's end, they had erected four tents and a kitchen fly. Thus, less than two months after President Franklin D. Roosevelt signed the bill that created the Civilian Conservation Corps, these enrollees, their three officers, and three enlisted men put CCC Camp Darrington on the map. The next day they began to clear land and start building. Under the leadership of Lieutenant B. Adams, over the next couple of weeks the CCC crew erected two barracks and a mess hall. The camp was planned as a main facility that could hold up to 200 men, and enrollment grew to 172 enrollees, additional officers, and a doctor. The Darrington group was assigned to the Forest Service; its initial work focused the Sauk and Siuattle truck trails. By the end of June, all the buildings were completed and occupied. The mail truck was replaced with two Chevrolet trucks, badly needed to move enrollees to their work assignments and bring in supplies. Once the flagpole was up, Camp F-15, Darrington, began to look like it would stay. "The country adjacent to the camp is rough, mountainous & accessible with great difficulty," an article in the Camp Darrington album stated. "Road building has, therefore, occupied the major portion of the man-days expended since the camp was first established." By 1938, some 41 miles of road were completed, the majority of it through solid rock. Eventually, side camps were established at Verlot and Sauk. Three C’s Memories Camp Darrington was in a rugged area, but the work and the camp life inspired the men. Carl Pearson joined Company 934 at the camp in July 1938. He later reflected: “I was fortunate to be assigned under Claude Brazelton construction crew. Mr. Brazelton was a very competent builder in all phases. The forest Service was setting up a new headquarters compound, moving a few older buildings on to new foundations and building new shops, etc. We had a very compatable [sic] hard working crew and though our main work was carpentering, we also did plumbing, electrical wiring, bricklaying and naturally, cement work, as the need arose. This was valuable experience for us all. We were also encouraged to take free correspondence courses in these fields, which most of us took advantage” (“Carl P. Pearson Recollects,” Vic and Mae Civilian Conservation Corps Collection). Thor Pearson remembers building a fire-watch on Miners Ridge. “This was a real paradise for us. The scenery was spectacular: And after work we would go hiking, There was deer all over, black bears were common. I once met a grizzly bear, and even came close to a mountain goat” (Camp Darrington, Vic and Mae Civilian Conservation Corps Collection). In addition to fire-watching duties, the "CCC boys," as they were often called, had time off in the little town of Darrington. They enjoyed the camaraderie of the camp life with its mix of people from across the country. Byron Reagan was also in company No. 934. “I enjoyed my days in the CCC and made many friends. We had good times as well as bad. One night a bunch of us were in Darrington and we saw a car that belonged to one of the guys from the office. He had said no one could fool him. He should have not said that. We picked the car up and carried it around in back. It took him threes days to find it (Byron Reagan, “CCC Memories”). CCC workers were not allowed to have cars. Some of the camp officers thought they might have one anyway and park them in the little town of Darrington. One such officer was known as Snakey. Walt Bailey remembers that he “snuck around looking for such cars” (Bailey, March 26, 2008). Celebrating the Past On March 31, 2008, surviving enrollees, family members, and supporters preserving the heritage of the CCC in Washington state, gathered to celebrate the 75th anniversary of the Civil Conservation Corps. Held at the Mansford Grange just outside of town on the very spot of Camp Darrington, the enrollees were honored for building shelters, the Squire Creek and Clear Creek trails, and the Mountain Loop Highway. After so many years, the CCCs are still remembered with affection for their good works in the national parks and forests, works the public enjoys to this day. Byron Reagan, "CCC Memories," Camp Darrington file, Vic and Mae Civilian Conservation Corps Collection, Center for Pacific Northwest Studies, Bellingham; Carl P. Pearson, "Carl P. Pearson Recollects," Camp Darrington file, Vic and Mae Civilian Conservation Corps Collection, Center for Pacific Northwest Studies, Bellingham; Sarah Arney, "Walt Bailey Celebrates the Best Job He Ever Had," The Arlington Times, March 26, 2008 (http://www.arlingtontimes.com); " Roster of Camp Darrington 1937" and Chet Nichols, "Biography of Chester R. Nichols" in James F. Justin Civilian Conservation Museum website accessed June 7, 2008 (http://members.aol.com/famjustin/ccchis.html); Janet Oakley phone interview with Walt Bailey, March 26, 2008; "History of Camp Darrington," Camp Darrington Album, 1937, Darrington Historical Society; Alison T. Otis, William D. Honey, Thomas C. Hogg, and Kimberly K. Lakin, The Forest Service and The Civilian Conservation Corps: 1933-42 (n.p.: United States Department of Agriculture, U. S. Forest Service publication FS -395, August 1986), online book available at National Park Service website accessed April 2008 (http://www.nps.gov/history/history/online_books/ccc/ccc/chap8.htm). Travel through time (chronological order): < Browse to Previous Essay Browse to Next Essay > Licensing: This essay is licensed under a Creative Commons license that encourages reproduction with attribution. Credit should be given to both HistoryLink.org and to the author, and sources must be included with any reproduction. Click the icon for more info. Please note that this Creative Commons license applies to text only, and not to images. For more information regarding individual photos or images, please contact the source noted in the image credit. Major Support for HistoryLink.org Provided By: The State of Washington | Patsy Bullitt Collins | Paul G. Allen Family Foundation | Museum Of History & Industry | 4Culture (King County Lodging Tax Revenue) | City of Seattle | City of Bellevue | City of Tacoma | King County | The Peach Foundation | Microsoft Corporation, Other Public and Private Sponsors and Visitors Like You
<urn:uuid:41e23305-3c16-4111-b218-11419e7d2855>
CC-MAIN-2016-26
http://www.historylink.org/index.cfm?DisplayPage=output.cfm&file_id=8583
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783404405.88/warc/CC-MAIN-20160624155004-00092-ip-10-164-35-72.ec2.internal.warc.gz
en
0.964164
1,638
3.109375
3
Discover the cosmos! Each day a different image or photograph of our fascinating universe is featured, along with a brief explanation written by a professional astronomer. 2012 December 27 Explanation: What's in this smooth soil on Mars? In late October, NASA's robotic Curiosity rover stopped near a place dubbed Rocknest as it continues to explore Gale Crater on Mars. Rocknest is the group of stones seen near the top left of the above image -- just to the left of Curiosity's mast. Of particular interest was the unusually smooth patch of soil named Wind Drift seen to the left of Curiosity, which was likely created by the Martian wind blowing fine particles into Rocknest's wake. The above image shows part of Mt. Sharp in the background to upper right, and, oddly, almost the entire rover itself, digitally reconstructed from 55 frames while digitally removing an extended arm. Curiosity scooped several sand samples from Wind Drift into its Chemistry and Mineralogy Experiment (CheMin) and the Sample Analysis at Mars (SAM) laboratory for a detailed analysis. Preliminary data from the soil indicates a small amount of one-carbon organic material the origin of which it presently unknown. Although the organic signal might be just contaminants from Earth, the exciting possibility that it could be from Mars itself will remain a focus of future exploration and research. Authors & editors: Jerry Bonnell (UMCP) NASA Official: Phillip Newman Specific rights apply. A service of: ASD at NASA / GSFC & Michigan Tech. U.
<urn:uuid:25b55a38-0183-41c9-ae40-953e14737409>
CC-MAIN-2016-26
http://apod.nasa.gov/apod/ap121227.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397797.77/warc/CC-MAIN-20160624154957-00051-ip-10-164-35-72.ec2.internal.warc.gz
en
0.924987
310
3.265625
3
High up in the Colorado Rockies lies Grand Lake, headwaters of the mighty Colorado River. Located at the western gateway to Rocky Mountain National Park at an elevation of 8,369 feet, Grand Lake is Colorado's largest natural body of water, as well as the state's oldest tourist destination. Rich in both natural history and western lore, Grand Lake truly embodies the essence of a Colorado mountain paradise. For thousands of years, travelers journeying to Grand Lake have encountered an astonishing abundance of fish and wild game, vast stands of virgin timber, precious minerals, and breathtaking vistas. The area's first visitors were Paleo-Indians, the Clovis peoples, who crossed the high mountain passes in search of game, possibly even mammoths, which they found plentiful in the rugged glacial valleys surrounding Grand Lake. In later centuries, the volume and variety of travelers entering the region increased markedly. Like a classic book on the Great American West, Grand Lake's early recorded history is filled with spellbinding tales of Indian warriors and raiding parties, fur trappers and mountain men, legendary explorers and hardy settlers, gunfighters and gold miners, conservationists and entrepreneurs. In the 1800s, Arapaho, Sioux, and Cheyenne Indians began venturing into the Grand Lake region in search of bison and other big game. Conflicts with the Grand River Utes, who lived throughout Middle Park, soon escalated. A famous local tale written in 1882, "The Legend of Spirit Lake," recalls a ferocious battle fought between these rival tribes. One evening long ago, as an ominous thunderstorm rolled in over the Never Summer mountains, a small tribe of Ute Indians camping on the shores of Grand Lake was attacked by an Arapaho-Cheyenne war party. Surprised by the sudden assault, the Utes hurriedly loaded their children, squaws, and elderly onto pine rafts and set them adrift on the cold, black water. A furious battle ensued on the west shore of the lake; both sides lost dozens of warriors to arrow and knife. Later, after the raiders had been driven off, the victorious Ute Chief looked out across the empty, white-capped lake. The rafts had capsized in the storm, leaving only broken timber floating on the surface. The next morning, the frightened Utes observed the spirits of their dead families rising as spectral mists above the now placid lake. They fled, vowing never to revisit "Spirit Lake." By 1879, the Utes of Middle Park had all been moved west to the White River Reservation, where Ute braves took part in the terrible Meeker Massacre and The Battle of Milk Creek. Shortly thereafter, the Utes and other Native Americans disappeared from the region entirely. In the aftermath of the Colorado Gold Rush of 1859 ("Pike's Peak or Bust!, access to Grand Lake remained limited to a handful of trans-mountain Native American trails. From 1864 -1874, wagon roads on Rollins Pass and Berthoud Pass were completed, along with a crude trail from Hot Sulphur Springs to Grand lake. "The Island in the Rockies"- isolated and remote Middle Park - soon experienced rapid growth due to these early roads, and Grand Lake began attracting a variety of early miners and settlers. During the 1870s and 1880s, great changes occurred in the Grand Lake area. In 1875 silver, lead, copper, and gold ore were discovered in the Never Summer Range, less than 20 miles from the shores of Grand Lake. A mining boom soon echoed across the region, creating such towns as Gaskill, Dutchtown, Teller City, and Lulu City. Mines like the Ruby, Eureka, Bonanza, and the Wolverine brought eager miners from Georgetown, Denver, and points east. The Town of Grand Lake was surveyed in 1881 with 320 acres platted. Soon mercantile shops opened, hotels appeared, and saloons and parlors began offering refreshment and entertainment to the miners. Grand Lake was a true "Town of the Wild West." After the County Seat was moved from Hot Sulphur Springs to Grand Lake in 1881, animosity between rival political factions led to a bloody shoot-out on July 4, 1883. Four men died on the lake shore that day, including three County Commissioners and the County Clerk. Sheriff Royer, who committed suicide some weeks later, and Deputy Redman - who may have been murdered by a posse near the Utah border - brought the death toll in the Tragedy of 1883 to six men. The shoot-out scared off new investors, and hard times descended upon Grand Lake. Soon came the end of the mining era, too, as the boom went bust. By 1886, all mining sites and camps were abandoned. Lulu City became a ghost town, and in Grand Lake, the pace slowed down as businesses - even the County seat - moved away. By 1890, Grand Lake's population plummeted from 600 to 80 year-round residents. By the turn of the century, the Grand Lake area had shrugged off the economic depression that followed the collapse of the mining boom. Tourists, ranchers, and recreationists began returning to the lake in large numbers. Population records indicate that over 1000 folks resided here in the summer of 1900. Regular church services were held, guest camps and inns such as the Kauffman House, the Fairview House, and Camp Wheeler prospered, and the Holzwarth (or Never Summer), Green Mountain, and Harbison Dude Ranches soon developed. In addition, people of wealth from Denver and cities in Oklahoma, Iowa, and Kansas came to Grand Lake by stage coach to construct lavish lake shore cabins. They registered a yacht club in 1902, the World's Highest, and built a Clubhouse in 1912. Later that year, Sir Thomas Lipton- the famous tea baron and English yachtsman- donated the exquisite Lipton Cup to the Club, and ever since, avid sailors have raced for the prestigious cup during Regatta Week, held every August. Hikers and naturalists, in addition to boating enthusiasts, were also lured here. The Grand Lake region, like so much of the American West during President Theodore Roosevelt's conservation movement of the early 1900s, helped inspire the nation's new-found appreciation for nature and wildlife. From the Estes Park area came calls to create a large National Reserve in the Long's Peak Region. Naturalists like Enos A. Mills, ìFather of Rocky Mountain National Parkî and a close friend of John Muir, labored tirelessly to protect this domain. Six years of campaigning finally convinced Congress to set aside the Long's Peak Region as a National Park in January 1915. Rocky Mountain, with 417 square miles and 124 glacial peaks over 10,000 feet, became the Nation's Tenth National Park. "After standing on the summit of an eternal peak and feeling the inspiring influence of its pictured and silent story, one will return to duty and live amid life's changing scenes more kindly and cheerfully than before," wrote Mills. Visits to the Park tripled by 1918 to 150,000 tourists. The Era of Tourism had finally come to Grand Lake. Improved transportation enabled Grand Lake to expand as a recreation outpost. In 1905, the Moffat Line, which crossed over Rollins Pass, brought the railroad to Granby. From there, stage and horse-drawn busses ferried tourists over rough roads to Grand Lake. Work on the Grand Ditch, 15 miles of canals carrying water to the Eastern Slope, increased the need for developed roads around Grand Lake. With the creation of Rocky Mountain National Park, the idea of a road connecting Grand Lake and Estes Park began to be taken seriously. Fall River Road, from Estes Park to Fall River Pass, was finished by 1917, but 20 miles to Grand Lake by horseback and rutted road remained. The State Highway Dept. instructed Grand County Engineer and Surveyor, Frank I. Huntington, to design a safe, linking route. By late 1918, Huntington's new road neared completion, except for a difficult portion from Milner Pass to Fall River Pass. A burst of entrepreneurial opportunism in the region followed, attracting wealthy Denver financiers. Huntington, with assistance from Al House, accepted an offer to survey and build a resort lodge close to the entrance of the Nat'l Park. This resort, the Grand Lake Lodge, was the brain child of tourism pioneer Roe Emery. Roe Emery, later to be hailed "The Father of Colorado Tourism," envisioned an easy, affordable, and breath-taking Circle Tour of the central Colorado Rockies. At the Union Pacific and Burlington Railheads in Denver, Greeley, and Lyons, tourists in volume from the Midwest and "Back East," would be transported by bus to Roe Emery's Estes Park Chalet, where they would dine and sleep. The following day, the bus would climb the steep switchbacks of scenic Rocky Mountain Nat'l Park, cross over the "Top of the World", and head down to the Grand Lake Lodge for the night. After breakfast and taking in the view from the Lodge's porch, the bus would travel through Middle Park, over the Continental Divide at Berthoud Pass, and descend to Idaho Springs. The Hot Springs Hotel, also owned by Emery, would be the final night's stop before the tourists' return to the Mile High City. Having experience with tourist accommodations and transportation by rubber" in Glacier and Yellowstone Nat'l Parks, Emery looked to both profit from and assist the fledgling Rocky Mountain National Park. In 1917, however, his Rocky Mountain Parks Transportation Company was financially strained and kept him from building the Lodge, the last property needed to connect his mountain empire. He eventually secured financing from a wealthy friend, A.D. Lewis, and, with Park Service permission, construction on the Grand Lake Lodge finally began in April 1919. Using native lodgepole pine, the main lodge and a majority of the property's 100 buildings were completed a year later. The Lodge opened with a Grand Ball on July 3, 1920, just two months prior to the long-awaited (34 years) completion of Fall River Road in September 1920. Roe Emery took control of the Lodge from Lewis in 1923, operating it successfully for the next three decades. In 1932, the completion of Trail Ridge Road, "the World's Highest Continuous Paved Highway," increased tourism in the area and attracted many famous visitors, including Henry Ford, who visited the Lodge in 1927. From 1933 to 1942, the Civilian Conservation Corps improved the Nat'l Park's facilities for tourists. In 1953, Roe Emery sold his empire to T.J. Manning of Denver, who was unable to secure adequate financing for the deal. Later that year, Manning offered the company to two brothers from Nebraska, I.B. and T.L. James, who formed the Colorado Transportation Company. In the early 1950's, I.B. and Ted L. James purchased the assets of the Emery bus and lodging company. The James brothers formed the Colorado Transportation Company and took over in 1953. By an Act of Congress in 1963, the James family was able to exchange several recently acquired ranch acreages within the National Park for ownership of the land occupied by the Lodge. Hence the National Park Service realigned the Park boundary to exclude the Grand Lake Lodge. With attendance growing in the Park and at the Lodge, the James family divided the company between I.B. James, who retained the bus service, and Ted L. James, who retained the Grand Lake Lodge After construction of the swimming pool and many building and roadway improvements, misfortune struck the Grand Lake Lodge in 1973. Both Ted L. James Sr. and son Ted Jr. were forced to close the Lodge during a busy mid-season because of an extensive fire. Disappointed prior guests passed by the quiet property for the next seven years, while a small crew diligently hand peeled and restored both the interior and the exterior of the main Lodge. Native American rugs and artifacts, taxidermy, and wicker furniture were repaired and acquired during this refurbishment. In June 1981, the Grand Lake Lodge reopened to the public with the help of restaurateur Dave McDougal and the family of Ted L. James Jr. In 1993, the James Family proudly announced the recognition and designation of the Lodge as a National Historic Landmark. On December 21, 2010, Grand Lake Ventures, L.L.C. purchased Grand Lake Lodge and hired Regency Hotel Management to manage all operations, including sales and marketing of the resort. Historic Grand Lake Lodge reopened as a full-service resort in May 2011. Visitors can now make cabin and special event reservations by calling 855-585-0004! by Michael Geary Published Sept. 1999 by Western Reflections - Paperback - 129 Pages - ISBN 1890437379 A Quick History of Grand Lake presents a concise and interesting account of the people and events that have influenced the human history of Grand Lake and its immediate vicinity -- including Rocky Mountain National Park and the Grand Lake Lodge.
<urn:uuid:f12a5483-5f87-419d-8082-5f4225fecda4>
CC-MAIN-2016-26
http://grandlakelodge.com/the-lodge/history/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398869.97/warc/CC-MAIN-20160624154958-00158-ip-10-164-35-72.ec2.internal.warc.gz
en
0.959429
2,697
2.828125
3
Girl with a Pearl Earring(Meisje met de parel) c. 1665- 1667 Oil on canvas 46.5 x 40 cm. (18 1/4 x 15 1/4 in.) Mauritshuis, The Hague In respects to the paint-handling of other interior fine paintings of the time, the borad brushwork of the turban is astounding. The object is reduced to two flat shapes of blue. The complicated folds and tucks, which would have certainly be visible, have been entirely eliminated for the sake of simplicity. The blue part of the turban was painted with natural ultramarine, an extremely costly pigment made of crushed lapis lazuli that Vermeer's contemporaries rarely used. The chromatic brilliance of this pigment can be clearly appreciated where it has been applied unadulterated (with lead white) in the rendering of the bright blue part of the girl's turban. Since Vermeer continued to employ without reserve this pigment even in the last few years of his life when he faced a dramatically deteriorating financial situation due to the war with France, it may be that his rich Delft patron Pieter van Ruijven covered the cost. This daring slash of impasto white paint represents some form of undergarment worn beneath the rustic yellow ocher garment. Surprisingly, an almost identical brush stroke defines the same sort of garment worn by the model of Vermeer's Art of Painting. The brush stroke has most likely lost much of its character due to early restorations when hot irons were used to reline the deteriorating canvas. The Girl with a Pearl Earring was completely restored in 1994 in the Mauritshuis. The painting's masterly three dimensional effect, brilliant color and hitherto hidden subtleties of the flesh tones were revealed as they were originally intended by Vermeer. Certain details, characteristic of Vermeer's technique were also brought to light including a small light reflection near the left corner of her mouth. This highlight consists of two small pale pink spots of paint on top of each other. Vermeer painted a similar highlight on the lips of the Girl with a Red Hat in Washington. Vermeer writers have frequently noted that no line defines the profile of the left-hand side of the girl's nose. The bridge is given precisely the color and tone of the adjacent cheek. The lines of the right side of her nose and nostril are lost in shadow as well. Moreover, the blue section of the turban has been reduced to two essential tones of ultramarine blue, one lighter and one darker. These and other characteristics have lead more than one scholar to believe that Vermeer had created the Girl with a Pearl Earring with the aid of camera obscura, a sort of precursor of the modern photographic camera. The imperfect lens of the period camera tends to eliminate line and reduce the tonal range of lights and darks. The yellow garment worn by the young girl is unique in Vermeer's oeuvre and is, from a technical point of view, probably one of the painter's most generalized renderings. The broad vigorous brushstrokes suggest rather than clearly define the heavy folds of what would appear to be a cape or a loose-fitting garment of rustic cut made of course fabric. In 1950, P. T. A. Swillens suggestively accounted for the young girl's dress in the following manner: "The blue-yellow head covering of the portrait in The Hague and the yellow cape round the shoulders are not usual wear for those times. It is a special dress, which suits children and which children delight in, just because it is unusual and different and attractive in colour. Just with such a fancy-dress children betray that they are still childish." Prior to the 1994 restoration, the painting was not in good condition from an aesthetic point of view. The old protective varnish had yellowed considerably and had to be removed with solvent using cotton swabs. The old layer of varnish can be seen in the left-hand side of the image above. Moreover, some areas of the face which appeared discolored were in fact earlier degraded retouches of paint that had flaked off. The old retouches were removed and then restored to integrate them with the present lighter tone of the painting. Vermeer most likely employed a badger brush, a kind of fan-shaped flat brush with soft bristles, to delicately blend the lighter tone of the flesh tones with the darker areas of the deep shadows to the right. Badger brushes, also called sweeteners, were used sparingly in the 17th century but became the rage among Neoclassical painters who strove for the most refined tonal transitions possible Vermeer, as well as many other Dutch painters, had obviously enjoyed introducing an exotic note in his paintings welcoming the possibility to show off his technical prowess. However, the type of turban worn by Vermeer's young girl is so unusual that no reasonable comparison has been found in the context of European painting. In the 17th century, a Dutch girl would not have been easily seen wearing a turban. Critics now believe that Vermeer drew his inspiration from art rather than life, specifically from Michael Sweerts' A Boy Wearing a Turban and Holding a Nosegay, an excellent example of the Dutch tronie tradition. Sweerts' painting dates c. 1655-1656 or about ten years before the Girl with a Pearl Earring was presumably painted. The out-of-the-ordinary garb, the black background (typical of Sweerts) and the curious turban coupled with the distinctive blue/light-yellow color scheme may have indeed struck Vermeer's imagination. It is possible that the piece of fabric used as a makeshift turban, whatever its proper use may have been, appears in other pictures by Vermeer. Its material and the light yellow color with a blue border color seem to be comparable to the one seen draping from the still life in The Art of Painting and the Love Letter. The young girl's tear drop pearl hangs freely and motionless, caught within a pool of recessive space. Its form and substance are defined by the thick white fleck of impasto which registers the same beams of light which rake across the girl's face and turban and by the soft reflection that has gathered up some of the light cast off by the intensely light band of the white collar below. Its ovoid shape conveys the experience of weight and volume, qualities which are less appreciable in a spherical formed pearl. It is likely that a pearl of such dimension and form did not exist and that the artist had either represented an artificial one or deliberately exaggerated its dimensions, no great feat for a painter so technically proficient as Vermeer. In the 1994 restoration of the painting, the reflection under the pearl contained a small, bright highlight which was not a part of the original painting. After careful examination, it was seen that it was a flake of paint (see detail above) colored by surrounded light toned filler which had stuck to the spot during an earlier restoration. Once the flake was removed, the pearl regained its original softness. The background of the Girl with a Pearl Earring does not appear as it does when it came off the Vermeer's easel some 340 years ago. Recent analysis demonstrates that the artist had painted a transparent "glaze" of green paint over the dark underpainting. Originally, the background must have appeared as a smooth, glossy, hard and deep translucent green. This tone set against the warm flesh tone probably produced a more vibrant optical effect than the one which can be observed today. The green glaze was composed of three pigments (see left): indigo (a natural dye from the indigo plant) and weld (a natural dye from the yellow flowers of the woud plant widely used to dye clothes in Vermeer's day). Dark backgrounds were widely used in portraiture to enhance the three-dimensional effect of the figure. In fragment 232 of his Treatise on Painting, Leonardo da Vinci had noted that a dark background makes an object appear lighter and vice versa. - the Turkish turban in European painting - beautiful women and jewels - Vermeer & the fijnschilder school of art - a painting made of crushed pearls - pricing a masterwork - who posed for the painting? - sold in 1881 for "next to nothing" - the painting's signature - inspired by an Italian painting? - listen to period music It is always the beauty of this portrait head, its purity, freshness, radiance, sensuality that is singled out for comment. Vermeer himself, as Gowing notes, provides the metaphor: she is like a pearl. Yet there is a sense in which this response, no matter how inevitable, begs the question of the. painting, and evades the claims it makes on the viewer. For to look at it is to be implicated in a relationship so urgent that to take an instinctive step backward into aesthetic appreciation would seem in this case a defensive, an act of betrayal and bad faith. It is me at whom she gazes, with real, unguarded human emotions, and with an erotic intensity that demands something just as real and human in return. The relationship may be only with an image, yet it involves all that art is supposed to keep at bay. Edward A. Snow, A Study of Vermeer, 1979 Arthur K. Wheelock Jr. Vermeer: The Complete Works, New York, 1997) Walter Liedtke Vermeer: The Complete Paintings, New York, 2008) The fine, plain-weave linen support, which has been lined, has a threadcount of 14.7 x 14.3 per cm 2. Only fragments of the original tacking edges survive. The composition was laid in with light and dark areas. The ground is a thick, yellowish-white layer containing lead white; chalk, and possibly umber. The dark background and the deeper shadows of the girl's face, turban, and bodice were established with a mixture of black and earth pigments and further modeled with a paler, ocher color. The shadow of her nose was underpainted with red lake while the highlights on her nose, right cheek and forehead have a thick, cream colored underpaint. The turban was painted with varying shades of an ultramarine and lead-white mixture; wet-in-wet, over which a blue glaze was applied, except in the highlights. A thin, off-white scumble of paint over the brown shadow of the girl's neck defines the pearl, and is painted more opaquely at the bottom where the pearl reflects the white collar. Small hairs from Vermeer's brush are found in the half-tones of the flesh areas. * Johannes Vermeer (exh. cat., National Gallery of Art and Royal Cabinet of Paintings Mauritshuis - Washington and The Hague, 1995, edited by Arthur Wheelock) - (?) Pieter Claesz van Ruijven, Delft (d. 1674); (?) his widow, Maria de Knuijt, Delft (d. 1681); - (?) their daughter, Magdalena van Ruijven, Delft (d. 1682); - (?) her widower, Jacob Abrahamsz Dissius (d. 1695); Dissius sale, Amsterdam, 16 May 1696, no. 38, 39 or 40 [tronies]; - Braams sale, The Hague, 1881 (day and month unknown), to Des Tombe; - Arnoldus Andries des Tombe, The Hague (1881-d.1902); - 1903 bequest of Arnoldus des Tombe to the Koninklijk Kabinet van Schilderijen Mauritshuis, The Hague (inv. 670). - The Hague 1890 Catalogus der tentoonstelling van schilderijen van oude meesters. Pulchri Studio. 57, no. 117. - Paris 1921 Exposition hollandaise. Tableaux, aquarelles et dessins anciens et modernes. Jeu de Paume. 10, no. 106. - Rome 1928 Mostra di capolavori della pittura olandese. Galleria Borghese. 100, no. 125 and ill. - London 1929 Exhibition of Dutch Art, 1450-1900. Royal Academy of Arts. 145, no. 306. - The Hague 1945 Nederlandsche kunst van de XVde en XVIde eeuw. Mauritshuis. - Antwerp 1946 De Hollandsche Schilderkunst van Jeroen Bosch tot Rembrandt. Keuze van Meesterwerken uit Nederlandsche Musea. Koninklijk Museum voor Schone Kunsten. no. 91 and ill. - Delft 1950 Het Koninklijke kabinet 'Het Mauritshuis' in het museum 'Het Prinsenhof' te Delft. Stedelijk Museum Het Prinsenhof. 11, no. 27. - The Hague 24 June – 5 September, 1966 In het licht van Vermeer. Mauritshuis. no. V and ill. - Paris 24 September – 28 November, 1966 Dans la lumière de Vermeer. Musée de l'Orangerie. no. VI and ill. - Washington D. C. 1982 Mauritshuis, Dutch Paintings of the Golden Age. National Gallery of Art. 120-121, no. 38 and ill. - Paris 1986 De Rembrandt à Vermeer: Les peintres hollandais au Mauritshuis à la Haye. Grand Palais. 358-362, no. 54 and ill. - Washington D. C. November 12, 1995 - February 11, 1996 Johannes Vermeer. National Gallery of Art. 166-169, no. 15, repro. - The Hague March 1 - June 2, 1996 Johannes Vermeer. Royal Cabinet of Paintings Mauritshuis. 166-169, no. 15, repro. - Osaka 4 April – 2 July, 2000 The public and the private in the age of Vermeer. Osaka Municipal Museum of Art. 186-189, no. 34 and ill. - Kobe 1 October, 2012 – 23 December, 2013 Masterpieces from the Royal Picture Gallery. Tokyo Art Museum. City Museum Kobe. - Tokyo 30 June – 17, September, 2012 Masterpieces from the Royal Picture Gallery. Tokyo Art Museum. - San Francisco 26 January – 2 June, 2013 Masterpieces from the Royal Picture Gallery. de Young - San Francisco Museum of Art. - New York 22 October, 2013 – 12 January, 2014 Masterpieces from the Royal Picture Gallery. - Atlanta 22 June – 29, September, 2013 Masterpieces from the Royal Picture Gallery. High Museum of Art. - Bologna, Italy, 8 febbraio - 25 maggio 2014 La ragazza con l'orecchino di perla: Il mito della Golden Age. Da Vermeer a Rembrandt capolavori dal Mauritshuis. Palazzo Fava. |vermeer's life||Pieter van Ruijven and his wife Maria Knuijt leave 500 guilders to Vermeer in their last will and testament. This kind of a bequest is very unusual and testifies a close relationship between Vermeer and Van Ruijven that went beyond the usual patron/painter one. It would seem that in his life-time the rich Delft burger had bought a sizable share of Vermeer's artistic output.| Rembrandt paints The Jewish Bride. Adriaen van Ostade paints The Physician in His Study. c. 1665 Gerrit Dou painted Woman at the Clavichord and a Self-Portrait in which he resembled Rembrandt. |european painting & architecture|| Bernini finishes high altar, St. Peter's, Rome (begun 1656). Murillo: Rest on the Flight into Egypt. Nicolas Poussin, French painter, dies. Known as the founder of French Classicism, he spent most of his career in Rome which he reached at age 30 in 1624. His Greco-Romanism work includes The Death of Chione and The Abduction of the Sabine Women. Compagnie Saint-Gobain is founded by royal decree to make mirrors for France's Louis XIV. It will become Europe's largest glass-maker. Francesco Borromini completes Rome's Church of San Andrea delle Fratte. Molière: Don Giovanni. Sep 22, Moliere's L'amour Medecin, premiered in Paris. Philosophical Transactions of the Royal Society begins publication. |science & philosophy|| Giovanni Cassini determines rotations of Jupiter, Mars, and Venus. Peter Chamberlen, court physician to Charles 11, invents midwifery forceps Pierre de Fermat, French mathematician, dies. His equation xn + yn = zn is called Fermat's Last Theorem and remained unproven for many years. The history of its resolution and final proof by Andrew Wiles is told by Amir D. Aczel in his 1996 book Fermat's Last Theorem. Fermat's Enigma: The Epic Quest to Solve the World's Greatest Mathematical Problem by Simon Singh was published in 1997. In 1905 Paul Wolfskehl, a German mathematician, bequeathed a reward of 100,000 marks to whoever could find a proof to Fermat's "last theorem." It stumped mathematicians until 1993, when Andrew John Wiles made a breakthrough. Francis Grimaldi: Physicomathesis de lumine (posth.) explains diffraction of light. Isaac Newton experiments on gravitation; invents differential calculus. Robert Hooke's Micrographia, with illustrations of objects viewed through a microscope, is published. The book greatly influences both scientists and educated laypeople. In it, Hooke describes cells (viewed in sections of cork) for the first time. Fundamentally, it is the first book dealing with observations through a microscope, comparing light to waves in water. Mathematician Pierre de Fermat dies at Castres January 12 at age 63, having (with the late Blaise Pascal) founded the probability theory. His remains will be reburied in the family vault at Toulouse. English naval forces defeat a Dutch fleet off Lowestoft June 3 as a Second Anglo-Dutch war begins, 11 years after the end of the first such war. General George Monck, 1st duke of Albemarle, commands the English fleet, Charles II bestows a knighthood on Irish-born pirate Robert Holmes, 42, and promotes him to acting rear admiral, giving him command of the new third-rate battleship Defiance, but the Dutch block the entrance to the Thames in October Feb 6, Anne Stuart, queen of England (1702-14), is born. At least 68,000 Londoners died of the plague in this year. The second war between England and the United Provinces breaks out. It will last until 1667 and devastate the art market. Mar 11, A new legal code was approved for the Dutch and English towns, guaranteeing religious observances unhindered. Nov 7, The London Gazette, the oldest surviving journal, is first published. Ceylon becomes important trade centre for the VOC The Concert presents a very similar deep spatial recession similar to the earlier Music Lesson. Vermeer's interest in the accurate portrayal of three dimensional perspective to create such an effect was shared by other interior genre painters of the time, however, only Vermeer seems to have fully and consciously understood the expressive function of perspective. The two paintings' underlying theme of music between male and female company is also analogous although few critics believe they were conceived as a pendant. In the paintings of the 1660s the painted surfaces are smoother and less tactile, the lighting schemes tend to be less bold. These pictures convey and impalpable air of reticence and introspection, unique among genre painters with the possible exception of Gerard ter Borch. |dutch painting||Frans Hals, eminent Dutch portrait painter, dies. It was formerly believed that he died in the Oudemannenhuis almshouse in Haarlem which was later became the Frans Halsmuseum.| |european painting & architecture|| François Mansart, French architect, dies. Apr 9, 1st public art exhibition (Palais Royale, Paris). |music||Dec 5, Francesco Antonio Nicola Scarlatti, composer, is born.| |literature||Le Misanthrope by Molière is palyed at the Palais-Royal, Paris.| |science & philosophy|| Laws of gravity established by Cambridge University mathematics professor Isaac Newton, 23, state that the attraction exerted by gravity between any two bodies is directly proportional to their masses and inversely proportional to the square of the distance between them. Newton has returned to his native Woolsthorpe because the plague at Cambridge has closed Trinity College, where he is a fellow; he has observed the fall of an apple in an orchard at Woolsthorpe and calculates that at a distance of one foot the attraction between two objects is 100 times stronger than at 10 feet. Although he does not fully comprehend the nature of gravity, he concludes that the force exerted on the apple is the same as that exerted on Earth by the moon. Calculusis invented by Isaac Newton will prove to be one of the most effective tool for scientific investigation ever produced by mathematics. Nov 14, Samuel Pepys reported the on first blood transfusion, which was between dogs. The plague decimates London and Isaac Newton moved to the country. He had already discovered the binomial theorem at Cambridge and was offered the post of professor of mathematics. Newton formulates his law of universal gravitation. A French Academy of Sciences (Académie Royale des Sciences) founded by Louis XIV at Paris seeks to rival London's 4-year-old Royal Society. Jean Baptiste Colbert has persuaded the king to begin subsidizing scientists. Christiaan Huygens, along with 19 other scientists, is elected as a founding member. After the French Revolution, the Royale is dropped and the character of the academy changes. It later becomes the Institut de France. Sep 2, The Great Fire of London, started at Pudding Lane, began to demolish about four-fifths of London when in the house of King Charles II's baker, Thomas Farrinor, forgets to extinguish his oven. The flames raged uncontrollably for the next few days, helped along by the wind, as well as by warehouses full of oil and other flammable substances. Approximately 13,200 houses, 90 churches and 50 livery company halls burn down or explode. But the fire claimed only 16 lives, and it actually helped impede the spread of the deadly Black Plague, as most of the disease-carrying rats were killed in the fire. Because almost all European paper is made from recycled cloth rags, which are becoming increasingly scarce as more and more books and other materials are printed, the English Parliament bans burial in cotton or linen cloth so as to preserve the cloth for paper manufacture. Vermeer's name is mentioned in a poem by Arnold Bon in Dirck van Bleyswijck's Beschryvinge der Stadt Delft (Description of the City of Delft) published in 1667. It is the most significant and direct reference to Vermeer's art to be found. The poem written by Arnold Bon, Bleyswyck's publisher, was composed in the honor of Carel Fabritius who had died in the famous ammunitions explosion. Vermeer's name is lauded in the poem's last stanza. Maria Thins empowers Vermeer to collect various debts owed to her and to reinvest the money according to his will and discretion. Vermeer's mother-on-law evidently maintained her moral and financial support of Vermeer and his family. Another of Vermeer's children is buried in the Nieuwe Kerk in Delft. |dutch painting||Gabriel Metsu, ecclectic Dutch painter, dies.| |european painting & architecture|| Francesco Borromini, Italian sculptor and architect, dies. Borromini designed the San Ivo della Sapienza church in Rome Alonso Cano, Spanish painter and architect, dies. |music||German composer-organist-harpsichordist Johann Jakob Froberger dies at Héricourt, France. His keyboard suites will be published in 1693, arranged in the order that will become standard: allemande, courante, sarabande, and gigue.| Paradise Lost is written by John Milton, who has been blind since 1652 but has dictated to his daughters the 10-volume work on the fall of man, Better to reign in Hell than serve in Heaven. Milton's Adam questions the angel Raphael about celestial mechanics, Raphael replies with some vague hints and then says that "the rest from Man or Angel the great Architect did wisely conceal and not divulge His secrets to be scann'd by them who ought rather admire." The work enjoys sales of 1,300 copies in 18 months and will be enlarged to 12 volumes in 1684, the year of Milton's death; Annus Mirabilis by John Dryden is about the Dutch War and last year's Great Fire. Nov 7, Jean Racine's Andromaque, premiered in Paris. |science & philosophy||National Observatory, Paris, founded| |history||Pope Alexander VII dies. Giulio Rospigliosi becomes Pope Clement IX. c. 1667 In France, during the reign of King Louis XIV, the fork begins to achieve popularity as an eating implement. Formerly, only knives and spoons had been used. Jun 18, The Dutch fleet sailed up the Thames and threatened London. They burned 3 ships and capture the English flagship. Jun 21, The Peace of Breda endsthe Second Anglo-Dutch War (1664-67) and sees the Dutch cede New Amsterdam (on Manhattan Island) to the English in exchange for the island of Surinam. De Verstandige Kok (The Sensible Cook) is published for the first time. Geared towards middle- and upper middle-class families, the book advises a regular and balanced diet, including fresh meat at least once a week, frequent servings of bread and cheese, stew, fresh vegetables and salads. While simple dishes, such as porridge, pancakes and soup with bread are eaten by all classes, studies reveal that only the affluent have regular access to fresh vegetables during the period; the less wealthy depend on dried peas and beans. The appearance of the young girl's turban within the context of Vermeer's seemingly quintessential Dutch oeuvre should not come as a complete surprise. Other objects of "Turkish" origin may be associated with the painter. Some of the carpets which appear as table coverings in his interiors (contemporary painters rarely represented these precious imports lying on the ground) are of Turkish origin. They must have been appreciated for their evocative floral motifs and the large mass of warm red color which enlivened the otherwise geometrical and cold interiors. However, we must not believe that anything called "Turkish" in contemporary accounts really came from that country. The term was loosely used to describe exotic imported objects which were much in vogue. In the inventory (29 February, 1676) taken shortly after the artist's death we find listed among other things: "a Turkish mantle of the aforesaid Sr. Vermeer," "a pair of Turkish trousers" and "a black Turkish mantle" all in the "great hallway" of his house. Some scholars have suggested that the two tronies in "Turkish dress" found in the kitchen could possibly have been by Vermeer's hand. Vermeer's women are often associated with the pearls eleven of them wear, so much that his oeuvre itself has become synonymous with the pearl. In 1908, Jan Veth articulated a widespread sentiment while observing the Girl with a Pearl Earring: "More than with any other VERMEER one could say that it looks as if it were blended from the dust of crushed pearls." In the 17th century, pearls were probably an important status symbol. A careful consideration of the Girl with a Pearl Earring gives rise to the question of how far the painting is to be taken as a portrait. P. T. A. Swillens, who compiled the first exhaustive study of the artist's life and work in 1950, believed that one of the most important characteristics of a 17th-century portrait was its likeness and although we can no longer judge of this anymore, the face would not be called a beauty in an aesthetic sense. Swillens writes that Vermeer made no attempt to idealize her. Contemporary scholars are not in agreement on the subject. According to Arthur Wheelock the painting is an "idealized study" which reveals Vermeer's "classical tendencies." Not a single sitter in Vermeer's extant paintings has ever been identified, including the young girl in the Girl with a Pearl Earring. Many critics believe that she may have been Vermeer's first daughter, Maria who would have been about 12 or 13 years old in 1665-1667, the dating scholars have assigned to the painting. However, this painting was certainly not a portrait in the 17th-century sense of the term, but rather a tronie. In any case, she resembles the model in Vermeer's Art of Painting (see above). The Girl with a Pearl Earring reemerged in the Netherlands 300 years after it left the artist's studio. Shortly after it was sold for next to nothing. The history of the acquisition of the Vermeer has by now become legendary. Arnoldus Andries des Tombe purchased Vermeer's Girl with a Pearl Earring in 1881 at a sale at the Venduhuis der Notarissen in the Nobelstraat in The Hague for 2 guilders with a 30 cent premium. Unfortunately, the invoice, which was given to the Mauritshuis in 1944, has disappeared without a trace. Thanks to a notice in the former daily newspaper Het Vaderland of 3 March 1903, in which the bequest was made public (pasted in the Mauritshuis' cuttings album), we know that Victor de Stuers had recognized the painting as a work by Vermeer. De Stuers was Des Tombe's neighbor—his collection in his residence at 24 Parkstraat was also open to all interested parties—and the two gentlemen had gone together to the auction preview. Des Tombe and De Stuers agreed not to bid against each other. After its acquisition, the badly neglected canvas was sent to Antwerp, where it was "restored" by the painter Van der Haeghen. In the Des Tombe family, however, the story was that Des Tombe and his friend De Stuers had seen a painting that "seemed rather beautiful but was too dirty to evaluate properly." In this version, it was only after the picture had been cleaned that the signature became visible, making clear the identity of the painter. After Des Tombe's death on 16 December 1902 (his wife had died the year before and their marriage had remained childless) it turned out that he had secretly bequeathed 12 paintings to the Mauritshuis, including Vermeer's famous Girl with a Pearl Earring. (from Quentin Buvelot, "COLLECTING HISTORY: ON DES TOMBE, DONOR OF VERMEER'S GIRL WITH A PEARL EARRING" in the Mauritshuis Bulletin, volume 17, no. 1, March 2004) The signature of the Girl with a Pearl Earring is located on the upper left corner. It was painted with a lighter toned pigment over the dark background but is usually not visible in reproductions. Vermeer used light toned signatures in other paintings as well. The style too, is comparable to other signatures by the artist. Although the pigments of the signature cannot be analyzed due to the abraded paint layer, the Mauritshuis, where the painting is now housed, has always maintained that it is authentic. While the thematic and compositional origins of some of Vermeer's works have proven easy to identify, other of his works pose more problems. And it is hardly out of the question that such an uncomplicated motif as the Girl with a Pearl Earring could have been devised independently. Nonetheless, Vermeer scholars have proposed a wide variety of Dutch and foreign models including, traditionally, the Beatrice Cenci by the Italian painter Guido Reni.* While such a connection may appear far fetched, Vermeer certainly knew the Beatrice Cenci story which had captured Europe's collective imagination. He could have easily seen one of the many copies of Reni's original or engravings which circulated throughout Europe. Beatrice, the daughter of the rich and powerful Francesco Cenci, suffered from her father's mistreatment. Violent and dissolute, he imprisoned Beatrice and her stepmother in the Castle of Petrella Salto, near Rieti. With the blessing of her stepmother and two brothers, all of whom shared her exasperation at his continued abuse, Beatrice murdered her father in 1598. She was apprehended and, after a trial that riveted the attention of the citizens of Rome, condemned to death at the order of Pope Clement VIII, who may have been motivated by the hope of confiscating the assets of the family. In the presence of an enormous crowd, Beatrice was decapitated in the Ponte Sant'Angelo in September of 1599, instantly becoming a symbol of innocence oppressed. It has been hypothesized that the great Italian painter Caravaggio was present at the decapitation and was inspired to paint his Judith Cutting off the Head of Holofernes. The precise and realistic rendering of Caravaggio's scene, anatomically and physiologically correct to the minutest details, presupposes the artist's observation of a real decapitation. The influential Vermeer writer Lawrence Gowing had proposed the influence of Jan Scorel's female portraits. The Scorel and Reni influences have been largely set aside in favor of somewhat less exotic connections with the Dutch painter Michiel Sweerts. * While the Beatrice Cenci is traditionally attributed to Reni, its poor quality in comparison to other works of the master has led many critics to reject it as an autograph work. Instead, it could be by a painter in the immediate circle of Reni, possibly Elisabetta Sirani, who is known for rendering the master's models in abbreviated and reduced form. As art historian Robert Baldwin pointed out, there existed a "tradition of comparing beautiful women to jewels. In court culture, the beautiful woman took on a jewel-like preciousness and radiance which worked, ultimately, to represent an inner beauty beyond material splendor. (This is how jewels had long worked in Christian representations of the sacred, their richness and luminosity pointing to a celestial beauty.). In European court poetry, the lady was either described as jewel-like or said to surpass the beauty of all jewels." However, "Vermeer also went beyond a suspect material beauty by avoiding the extensive use of jewels seen in courtly portraits and representations of artists like Van Dyck and Mignard and by restricting himself to the simpler pearl, avoiding rubies, sapphires, and diamonds. More importantly, Vermeer painted everything with a cool, silvery palette and layered, translucent oil glazes, dissolving all material reality with a pearl-like luminosity. Visualised this way, Vermeer's beautiful women, ornamented with pearls, took on the familiar, pearl-like beauty of contemporary love lyrics where outer loveliness dissolved into an inner radiance." Although this portrait by fijnschilder (fine painter) Frans van Mieris has been linked with the Girl with a Pearl Earring, few works document so well how fundamentally diverse were their artistic means and goals. It is true that Vermeer did share with the fijnschilders a common reservoir of motifs but it would be hard to enlist him as a true believer in their exasperated technical approach. Nor had the fijnschilders ever displayed the detached interest in the activities of light or the intricacies of pictorial design which are hallmarks of Vermeer's art. As detailed as Vermeer's works may appear to the relaxed eye of the 21st-century viewer, the broadness of his painting technique contrasts with the microscopic rendering of detail which was the principal calling card of this school. His modeling is so generalized that the fabric of the girl's yellow garment has never been satisfactorily identified. Instead, the individual hairs of the fur trim in Van Mieris' composition (see detail below) have been rendered one by one to assure recognition keeping in mind that Van Mieris' work is much smaller than Vermeer's. While such microscopic rendering induces the viewer to draw as close as possible to admire the work detail by detail, the Vermeer's more essential approach suggests the viewer to step back and relate to the image as a whole. The fijnschilder mode had reached such extremes because pupils were forever trying to outdo their masters in producing the most convincing illusion of surface textures. Art historian Peter Hecht argued that the thematic motifs were designed to show off textural imitation or emulative awareness of one's predecessors and peers. Curiously, the fijnschilder school evolved in the very years when the Dutch art market had begun contract due to a significant downturn in the nation's economic conditions. The once bustling art market was not only flooded with low-priced paintings by living artists but with works of previous generations slowly working their way back into the market as their original purchasers passed away. Instead of devising new tactics to abbreviate production time and beat competition, the fijnschilder took the opposite and spent unprecedented time on each work. In fact, they targeted the tastes and pockets of the uppermost burgers whose well hood had not been adversely effected by the economic crisis but, on the contrary, had prospered as never before. Thus, it may not be unreasonable that the essential "simplicity" and sobriety of Vermeer's technique might not have been fully appreciated admist the dominant fijnschilder tastes of the day. While it is true that Vermeer's art was recognized among elite connoisseurs, he had gained neither the international reputation nor the prices of his competitors. Given its present iconic status, it may come as a surprise that the Girl with a Pearl Earring was uncovered only in 1881 after it disappeared for some 200 years. While it is true that Vermeer's name had been largely forgotten by mainstream art history, some of his flagship works had held their own in important European art collections even if a few had been attributed to other painters to augment their value. In the 17th century, a work of art work was seen through different eyes than today. First of all, the Girl with a Pearl Earring was not seen as a portrait but a tronie, a sort of characteristic bust-length figure whose ability to capture the purchaser's eye, rather than the sitter's identity, was the artist's main concern. Tronies were made for the open market and sold in great numbers at low prices. As odd as it may seem, a painting's worth was often determined not only by its beauty or by its author's reputation. The hierarchical importance of subject matter was held in great consideration and a tronie such as the Girl with a Pearl Earring was definitely on the lower rungs of the ladder not too distant from landscape and the lowest of all categories, still life. This mind set may be reflected in the relatively low price the Girl with a Pearl Earring may have fetched in the 1696 Amsterdam auction of 21 Vermeer paintings. Some scholars conjecture that it corresponds to "a tronie in antique dress, uncommonly artful" sold at 46 guilders, a trifle if compared to the equally-sized Milkmaid or the Woman Holding a Balance which earned 175 and 155 guilders respectively. However, is not out of the question that it was another tronie sold in the same auction for only 17 guilders. Johan Larson, a Hague/London sculptor was known to have had another Vermeer tronie valued at only 10 guilders. In deference to the category, a Rembrandt tronie was sold for a mere 7 guilders in the same sale as the two Vermeer's. How were the prices of paintings determined in Vermeer's time? There exists a number of period documents which testify that the price of painting was directly correlated to labor hours spent. Gerrit Dou and Frans van Mieris could demand from 5 to 6 guilder per hours for their fine paintings, which are comparable in style and motif to Vermeer's more elaborate interiors. Dou, who was as scrupulous an accountant as a painter technician, daily noted the exact number of hours he devoted to a painting in order to determine is market value. But Dou and Van Mieris were hardly the norm. They represent the absolute high end of the art market in Europe. Dou once received the astronomical sum of 4,000 guilders from the States of Holland for the Young Mother (see image left) while Van Mieris was paid 2,500 by Cosimo III of the Medici family for a Family Concert. Even the successful landscape painter Jan van Goyen is known to have charged approximately from 8 to 10 guilders a work day. A small painting, which he could easily make in a single day, might go for 10 guilders while a large one for 60 guilders. It would appear that only Rembrandt attempted, and not always successfully, to establish the value of a painting by its artistic merit and his international reputation rather than the hours of labor spent. Although judged outlandish by the inquirer, the highest price associated with a Vermeer painting in the artist's lifetime was 600 guilders.
<urn:uuid:748279fc-5edb-4d70-a819-0eb9f07b32f5>
CC-MAIN-2016-26
http://www.essentialvermeer.com/catalogue/girl_with_a_pearl_earring.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783404826.94/warc/CC-MAIN-20160624155004-00042-ip-10-164-35-72.ec2.internal.warc.gz
en
0.958304
9,033
2.515625
3
802 words (2.3 double-spaced pages) - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - The contamination of public water wells in Monmouth and Ocean County can lead to negative long terms effects and put a major impact on the cost for water filtration. The accumulation of polluted water being produced in the area requires additional treatments making our county limited to our expenses. Many water wells in the state of New Jersey in addition to those in Monmouth and Ocean County have been susceptible to pollution. Some experts say, including the DEP commissioner, that the problem is not whether water coming out of your tap is safe. The real issue is the cost to put in addition treatments into the water therefore making it safe for every element where water is required and utilized. Though, updates have shown that drinking water itself is becoming unsafe and insecure for residents to consume as well. Several conditions play a part in the pollution of water through the state. Whether it’s storm runoffs, leaky storage tanks, or harmful waste dump sites, these all have an effect on the high bacteria levels in the water. Keeping the pollution to a minimal is not the easiest thing in the world to do. Pesticides, petroleum products, corrosive or ignitable toxins are some examples of hazardous materials that are found in water today. The major water pollutants are chemical, biological, or physical materials that degrade water quality. Residents in Brick Township, Lakewood, Jackson Millstone, Freehold Township, Howell and Wall are some of the many local areas that are affected. Those organizations that are responsible for replenishing the water such as the New Jersey American Water Co., Monmouth and Lakewood systems, United Water Toms River, Brick Township Municipal Utilities Authority and New Jersey American's Mount Holly system will probably be required to face these challenges and obstacles with a different strategy compared to the previous procedures. Life threatening circumstances have occurred in the past that reminds us what could happen to our water supply if we do not maintain it. Situations like the Cuyahoga River on fire, or the Potomac River too dirty for swimming, or Lake Erie dying. Since these incidents have happened environmentalists have taken extreme measures to reduce the amount of pollution that is coming out of the power plants that are on the river and on Lake Erie. Public awareness and concern for controlling water pollution led to enactment of the Federal Water Pollution Control Act Amendments of 1972. In the United States, the serious campaign against water pollution began in 1972, when Congress passed the Clean Water Act. This Act or law began a national campaign to stop any pollution to any lakes, rivers, streams, wetlands, and coastal waters. The law also required anyone or any companies that discharge pollutants into waterways to apply for federal permits and to be responsible. The statistics show that although Monmouth and Ocean do have excessive amounts of contaminants every water source in the entire state of New Jersey is affected. The article specifically says, “As of summer 2003, New Jersey had 606 community water systems that serve residences with a total of 2,237 wells and 64 surface water intakes. The systems serve about 7.5 million people. 77 percent of the drinking water sources statewide were rated highly susceptible to contamination from at least one kind of contaminant.” These remarkable numbers are the main influence on efforts to protect our water from future mishaps. Water pollution control techniques are applying quality monitoring and other scientific studies performed by the Agency in cooperation with state. Popular methods of controlling contaminants and pollution can start from simple treatments in water from homes, businesses and industries. Experts say the an effective approach would be zoning ordinances to control activities and development, preserving and conduct classes or have several programs which will instruct you how to successfully participate in waste management. The recycling methods to produce clean water are a crucial and vital aspect of our environment. Having contaminated water in your area can cause many devastating effects. The continuous procedures could bring forth several outcomes that can affect our every day lives. The replenishing of water will become costly in the nearby future if reports continue to show excessive amounts of contaminants in the water. Whether it is streams, rivers, lakes, or the ocean, the state needs to take great measures to maintain a high quality of water source for both human consumption and as a key component to the environment. Bates, T. 2004. Contaminants Threaten Wells, DEP Concludes. Asbury Park Press. Monmouth and Ocean Counties, NJ. Section: A, Page: 01 EPA.gov. Thursday Feb. 20th, 2003. Clean Water Act. Http.//www.EPA.gov/regions5/water/cwa.htm. January 30, 2003 How to Cite this Page "Water Pollution Reduces Drinking Water Quality." 123HelpMe.com. 01 Jul 2016
<urn:uuid:a0762ae6-475a-4710-9e2a-2707e991574a>
CC-MAIN-2016-26
http://www.123helpme.com/view.asp?id=95907
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402746.23/warc/CC-MAIN-20160624155002-00027-ip-10-164-35-72.ec2.internal.warc.gz
en
0.934908
1,009
2.75
3
“Primitive human society ‘not driven by war’” BBC 18 July 2013 Researchers from Abo Academy University in Finland say that violence in early human communities was driven by personal conflicts rather than large-scale battles. They say their findings suggest that war is not an innate part of human nature, but rather a behaviour that we have adopted more recently. The research team based their findings on isolated tribes from around the world that had been studied over the last century. About those “isolated tribes”: if I read the sentences correctly, it would appear that the researchers are extending their findings of isolated modern tribes to prehistorical human group behavior. It would appear there are tons of assumptions there that haven’t been addressed, the most important of which being the assumption that the behavior of modern tribal societies mirrors that of past tribal societies. Without detailing exactly why one would make that assumption, the entire rest of their argument is suspicious. Why should we assume that all tribal societies throughout our time on the Earth have behaved similarly? What evidence do we have that that’s true? Remaining tribal societies live in generally inhospitable places with minimal pressures from anyone wanting to take over their territory. I’m not sure those societies would behave the same as ones in the middle of resource-rich environments with many peoples coveting their land/territory. Furthermore, the remaining tribal societies are almost all in a permanent state of warfare with their neighbors as were the native societies of Europe and America and Asia. A reader of Peter Matthiessen’s Under the Mountain Wall, would get a very different picture of warfare among modern tribal societies than the authors present. It’s hardly personal feuds, as the authors suggest. One would have to examine their data carefully. But even if they found that most modern conflicts are limited personal conflicts, it doesn’t mean that larger-scale operations haven’t always operated in resource-rich areas. It’s a big jump that, perhaps, the authors cover in their paper but was missed in the reporting. One hopes. The issue, it would seem, is one of scale. Small, local conflicts can be described as personal conflicts; but that may just be because hunting-gathering societies don’t tend to gather in such large organized masses as farming societies do, so the conflicts of farmers tend to be larger in scale than those of hunter-gatherers. Are the authors reserving the use of war to large-scale conflicts? That would seem defeating and inaccurate. In the end, it seems a semantic problem more than anything else.
<urn:uuid:d79b3512-252d-4081-9bbf-ca0a7e81cb33>
CC-MAIN-2016-26
http://apeshit-mathiesen.blogspot.com/2013/07/tough-call.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402479.21/warc/CC-MAIN-20160624155002-00176-ip-10-164-35-72.ec2.internal.warc.gz
en
0.974551
543
2.765625
3
District of Columbia State Flower The American Beauty rose - Rosa 'American Beauty' is the state flower of the District of Columbia. American Beauty rose was once a very popular flower, but now it is not cultivated for commercial value. - Rosa American Beauty The American beauty rose blooms are full, cupped, large, with 50 petals. American beauty roses are seen in different colors, usually pink to red colors. American beauty roses are very beautiful, fragrant, with thick and colored petals encircling the bud. The bud open up giving it a gorgeous look. Facts About American Beauty rose - The American beauty rose plant grows to a height of 12-15 feet. - American Beauty rose is the hybrid perpetual, which is famous for its crimson blooms. - American Beauty rose leaves are dull green. - American Beauty rose flowers are quite fragrant. - American Beauty rose flowers bloom from Late Spring/Early Summer. - American Beauty rose are Vigorous, greenhouse, susceptible to Blackspot, Powdery Mildew, Rust. - American Beauty rose are susceptible to Mildew. There are many online florists who deliver flowers to District-of-Columbia. You can send flowers, plants of your choice to your loved ones living in District-of-Columbia or from District-of-Columbia to other locations across the United States of America through these popular District-of-Columbia Online Florists. Facts About District of Columbia District of Columbia (Washington, D.C.) is the capital city of the USA. The city is called simply D.C. and the state is called Washington State. The flag of Washington, D.C., was adopted in 1938. - District of Columbia joined the Union on February 21, 1871.(as a municipal corporation) - District of Columbia is so named in honor of Christopher Columbus. - District of Columbia is located between 38.90N, 77.05W of the United States. - District of Columbia has a temperate type of climate. - Bordering States of Washington D.C. are Virginia and Maryland. - Total land area of District of Columbia is 68.25 square miles. - Historical Sites and Points of Interest in District of Columbia are the Washington, Jefferson and Lincoln Memorials; the Smithsonian Institution (including the National Gallery of Art and the National Air and Space Museum; and the National Archives. - Nickname of District of Columbia is D.C.
<urn:uuid:2328fc18-cf16-4496-833c-9bc458443789>
CC-MAIN-2016-26
http://www.theflowerexpert.com/content/aboutflowers/stateflowers/district-of-columbia-state-flowers
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395679.92/warc/CC-MAIN-20160624154955-00130-ip-10-164-35-72.ec2.internal.warc.gz
en
0.892889
517
2.890625
3
"Many scholars have agreed that if the Vinland Map is authentic, it is the first cartographic representation of North America, and its date would be key in establishing the history of European knowledge of the lands bordering the western Atlantic Ocean," said Jacqueline S. Olin, assistant director for archaeometric research at SCMRE when the study began in 1995. Olin and co-authors Douglas Donahue, a physicist at the University of Arizona and Garman Harbottle, a chemist at Brookhaven National Laboratory, along with SCMRE paper conservator Dianne Van Der Reyden, sampled the bottom right edge of the parchment for analysis. The dating was carried out at the National Science Foundation-University of Arizona Accelerator Mass Spectrometer in Tucson. The unusually high precision of the date was possible because the Vinland Map's date fell in a very favorable region of the carbon-14 dating calibration curve. The parchment analysis again indicates the map's connection with the Catholic Church's Council of Basel, convened between 1431 and 1449, first posited by R.A. Skelton, T.E. Marston and G.D. Painter, the scholars who undertook a six-year investigation of the Vinland Map and accompanying "Tartar Relation," and made their argument for the map's authenticity in the book, The Vinland Map and the Tartar Relation, published in 1965 by Yale University Press. Paul A. Mellon had purchased the map and manuscript for $1 million in 1958, and requested the study after donating them to Yale. The map came to light in Europe in the mid-1950s without any record of previous ownership or provenance in any library or collection. It is now in the collection of Yale's Beinecke Rare Book and Manuscript Library in New Haven, Conn. The name "Vinland" derives from text on the map that recounts Bjarni and Leif Eriksson discovering "a new land, extremely fertile and even having vines, ... which island they named Vinland." The "Island of Vinland" appears on the map in the northwest Atlantic Ocean. Scholars postulate it may represent present-day Labrador, Newfoundland or Baffin Island. The map also shows Europe, Africa and Asia. Several previous studies challenging the map's authenticity focused on the chemical composition of the ink used to draw it, and pointed to the presence of anatase, which was not produced commercially until the 20th century. But there are questions about how an ink containing anatase could have been formulated and used by a forger. More recently, the ink has been shown to contain carbon, which also has been presented as evidence of a forgery. However, carbon can be present in a medieval ink. "Anatase may be a result of the chemical deterioration of the ink over the centuries, or may even have been present naturally in the ink used in medieval times," Olin said, adding, "The elemental composition of the ink is consistent with a medieval iron gall ink, based on historical evidence regarding ink production." Present carbon-dating technology does not permit the analysis of samples as small as the actual ink lines on the map. Concluded Olin, "While the date result itself cannot prove that the map is authentic, it is an important piece of new evidence that must be considered by those who argue that the map is a forgery and without cartographic merit." The article is available online at www.radiocarbon.org. The Smithsonian Center for Materials Research and Education advises and assists the Smithsonian and other museums in the study, preservation and conservation of artistic and historic objects. Its staff conducts research in the areas of material technology, chemistry, art and cultural history, as well as in the development of treatment procedures. The Center also offers educational programs about the properties and preservation of collections to museums and associated professionals around the world. Note to editors: Brookhaven National Laboratory and the University of Arizona are issuing concurrent releases.
<urn:uuid:7de3505f-fd02-4377-8090-b58696780135>
CC-MAIN-2016-26
http://www.eurekalert.org/pub_releases/2002-07/si-sda072902.php
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397842.93/warc/CC-MAIN-20160624154957-00132-ip-10-164-35-72.ec2.internal.warc.gz
en
0.945857
816
3.328125
3
Air handling unit maintenance strategies The Air-Handling Unit (AHU) filters and treats air, and circulates it to where it is needed. The unit is typically made up of a fan, heating and cooling coils, humidification equipment, filters and dampers. The treated air is circulated through the building space and returned to the air handling unit by ductwork. An effective maintenance strategy relies heavily on information supplied by the manufacturer and installer of the equipment. This will indicate when parts should be replaced and provide advice on appropriate maintenance procedures and schedules. Description of task Regular maintenance will help to keep air handling units (AHUs) running at optimum efficiency. How to deliver Carry out a survey of all air handling units (AHUs) and note and prioritise areas for corrective maintenance. To keep AHUs at maximum efficiency, undertake the following maintenance activities: - Clean heating and cooling coils. A dirty coil can reduce the heat transfer efficiency and cause the boiler and chiller to run longer than necessary; - Fix leaks in cabinet and supply ducts. Losing only 6 cubic metres per minute from an AHU cuts heating, cooling and airflow capacity by about 5% and can waste more than €100 per year in energy costs; - Clean and adjust dampers and actuators. Operating properly, economiser dampers keep the refrigerant compressor from running when outside air temperature is below 15.5°C; - Fans, bearings and belts: - Clean and check fans for proper direction of rotation. Running backwards, a fan will supply less than 50% of the rated airflow; - Replace worn or noisy fans or motor bearings. Fans in older AHUs have sleeve bearings that should be lightly oiled two or three times a year with the recommended lubricant; - Do not over or under lubricate conventional greased ball bearings; - Maintain proper belt tension and alignment. Loose belts slip on the pulley wheels, causing torque loss and rapid wear. Belts that are too tight put an excessive load on motor and fan bearings, causing early failure of the bearings and/or belts. - Use cogged V-belts. These belts run on conventional smooth pulleys, but notches on the inside of the belt reduce internal bending losses and improve grip; - Replace filters. Filter changing intervals should be every 1–6 months, depending on particulate loading from indoor and outdoor air. Ideally they should be based on pressure drop across the filter; - Direct expansion (DX) coils. Check the defrost function; - Economisers. Check that: - dampers are operating freely; - linkages are properly lubricated; - actuator motors and pistons are working and responding to control signals; - temperature and humidity sensors are working and properly calibrated. - Balance distribution of ventilation air. Some existing systems may not be balanced correctly (not delivering the intended amount of air to each space served) or may have faulty controls within a damper system. Rebalancing of flows is usually required to establish and maintain proper ventilation and comfort levels in all areas served by the modified system; - Tune-up AHU controls. Control setting and sensor calibration may drift over time causing the heating and cooling system to work harder than necessary. Economiser controls are particularly susceptible to problems and should be checked frequently for proper operation. Implement an ongoing preventative and predictive maintenance programme for your AHUs designed to maintain maximum heating and cooling efficiencies. Points to note/troubleshooting When deciding your maintenance strategy, consider the following: - Age of the equipment. Older equipment costs more to maintain because it is out of warranty and needs more attention; - Service history of equipment. Equipment that has not been properly maintained for a long period may require extensive work. Service contractors may charge a premium for such work; - Accessibility. If it is difficult to gain access to the equipment or to work around it, maintenance costs will be higher; - Changes to operating systems should only be made by technically qualified personnel. Typical payback time The payback time on a typical AHU refurbishment is 6 months to a year. For units with malfunctioning economisers, payback time can be <6 months following repairs. An average unit that has not been serviced for over a year can be expected to perform 5–10% more efficiently following a comprehensive refurbishment. Units with malfunctioning economisers can save even more following repairs. Further information sources The Carbon Trust Ventilation Fact Sheet (GIL130) Energy Efficient Mechanical Ventilation Systems (GPG257) Focus on Energy: A Practical Introduction to Reducing Energy Bills (FOCUS) Chartered Institution of Building Services Engineers Heating, air conditioning and refrigeration publications
<urn:uuid:e01cba07-e944-43aa-8816-cb43f6078188>
CC-MAIN-2016-26
http://www.seai.ie/energymap/Energy_Wizard/Action/Air_handling_unit_maintenance_strategies.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393146.70/warc/CC-MAIN-20160624154953-00096-ip-10-164-35-72.ec2.internal.warc.gz
en
0.894188
995
2.625
3
You have a set of the digits from 0 – 9. Can you arrange these in the 5 boxes to make two-digit numbers as close to the targets as possible? How would you create the largest possible two-digit even number from the digit I've given you and one of your choice? If you put three beads onto a tens/ones abacus you could make the numbers 3, 30, 12 or 21. What numbers can be made with six beads? Can you find the chosen number from the grid using the clues? Pat counts her sweets in different groups and both times she has some left over. How many sweets could she have had? Who said that adding couldn't be fun? How quickly can you put back the numbers on the hundred square? What's the smartest way to do it? This is a game in which your counters move in a spiral round the snail's shell. It is about understanding tens and units.
<urn:uuid:f75b3ae4-4edd-49ff-abfc-0ce7fbdf0167>
CC-MAIN-2016-26
https://nrich.maths.org/8940
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398628.62/warc/CC-MAIN-20160624154958-00125-ip-10-164-35-72.ec2.internal.warc.gz
en
0.957535
197
3.21875
3
Yesterday, a hacker group — most likely the Syrian Electronic Army (SEA) — managed to redirect The New York Times, Twitter, and Huffington Post websites to alternate, defaced websites. These websites were down for hours, and in some cases are still down more than 24 hours later. How did a single hacker group manage to hoodwink dozens of network admins and security specialists, and run rings around three of the largest web properties? The simple answer is that securing websites is extremely hard, and almost no amount of preparation can protect a website from a well-organized attack. Let’s dive into the specifics of the attack — and discuss how the NYT, Twitter, and HuffPo could’ve better protected themselves. A bit of history As you probably know, and without getting into unnecessary complexities of NAT and virtual hosts, every device connected to the internet has an IP address. Back when the ARPAnet was first created, every service was accessed directly via an IP address. Unmemorable numeric addresses obviously aren’t ideal, though, and so the folks at the Stanford Research Institute — one of the first and most important entities on the early ARPAnet — created a Hosts.txt file that mapped memorable names to numeric addresses. With the Hosts file in place, you could connect to services by name rather than number — but, in the background, that name was simply being looked up in the Hosts file and translated into the required IP address. As the ARPAnet grew, it became difficult to update and distribute the Hosts file between each of the ARPAnet links — and thus the Domain Name System (DNS) was born. DNS is essentially a (somewhat) secure and decentralized way of distributing those Hosts files to DNS servers around the world. Today, when you type a website address into your browser, your browser quickly and quietly requests the IP address from a nearby DNS server. The web’s intrinsic weakness The DNS has one key feature that allowed the SEA to take over the three domains, and will allow this same kind of attack to be carried out in the future: Delegation of trust. Basically, today’s DNS is a hierarchy of root name servers, authoritative name servers, and recursive DNS servers. The root servers are mostly operated by internet veterans, such as Verisign, RIPE, and ICANN, and are mostly tasked with storing a list of authoritative name servers. Authoritative name servers are databases that a domain (say, extremetech.com) has nominated as the trusted source of the name-to-IP-address translation. Whatever IP address is stored by the authoritative name server, that’s the IP address that your browser ultimately receives. Recursive DNS servers, which are generally operated by ISPs and companies like OpenDNS and Google, perform the task of going to the root server to ask for an authoritative name server, and then going to the authoritative name server to ask for the IP address. Generally, as a web surfer, your interaction with the DNS will consist of hitting the recursive DNS servers hundreds of times per day. If you are a domain owner, when you update your domain’s IP address or other DNS records, you are playing with the authoritative name server. You will never really interact directly with the root servers. Now, the problem is, root servers and recursive DNS servers completely trust an authoritative name server (thus their name). If someone alters an authoritative name server record, it is automatically propagated to every internet user, usually within a few minutes or hours (as dictated by the domain’s TTL). If you can access the authoritative name server, you can redirect a domain name to another IP address — and that’s exactly what happened to the New York Times, Twitter, and Huffington Post. The three domain names for the three websites in question are managed by Melbourne IT, a domain registrar. If the NYT ever wants to change the IP address of its website, it logs into its Melbourne IT control panel and duly pushes some new records to the authoritative name server. Unfortunately, if you have the right name and password, anyone can log into that control panel and change those DNS records — and that’s exactly what happened. Melbourne IT sent an email to all of its customers, alerting them that a reseller account had been compromised. It did not identify which reseller, but it seems that Twitter, NYT, and HuffPo all bought their domains through the same reseller. We don’t know how the SEA obtained the reseller’s details, but spear phishing (phishing targeted directly at the reseller) is the most likely method. With the account details in hand, the SEA simply logged into Melbourne IT and updated the DNS records to point to its own server — voilà, three defaced websites. Fixing the problem is equally as simple — just update the authoritative name server records again — but due to caching, some recursive DNS servers might take 24-48 hours to restore the correct records. If you’re still having issues accessing the NYT website, it’s because your recursive DNS server (usually provided by your ISP) hasn’t updated its cache yet. One easy fix As you can imagine, this is a fairly well known flaw of DNS — which is why the system allows for registry locking. If the registrar so wishes, it can lock the domain, so that no one — including the owner or a hacker — can modify, move, or delete DNS records. As it turns out, twitter.com was locked, which is why the SEA couldn’t deface Twitter’s main page — nytimes.com, on the other hand, wasn’t locked. Whether the NYT’s technical team kept the domain unlocked for a specific reason (maybe they were updating some records), or whether it was just a screw-up, we don’t know. There are reasons for not locking a domain, but in the case of high-profile domains those reasons are fairly scarce. The final irony with domain locking, of course, is that most registrars allow you to unlock your domain through an online control panel — so if a hacker gets your name and password, locking will only cause a minor delay. Ideally, high-profile websites should be managed by registrars that require, real-world hoops to jump through to unlock a domain — but even then, social engineering could still be used to get the domain unlocked.
<urn:uuid:d8c1a2e5-c3b4-44ae-b792-7ba705bb67aa>
CC-MAIN-2016-26
http://www.extremetech.com/extreme/165115-how-the-syrian-electronic-army-hacked-the-new-york-times-and-twitter
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396459.32/warc/CC-MAIN-20160624154956-00138-ip-10-164-35-72.ec2.internal.warc.gz
en
0.948426
1,349
2.625
3
In the past year a group of synthetic proteins called CRISPR-Cas RNA-guided nucleases (RGNs) have generated great excitement in the scientific community as gene-editing tools. Exploiting a method that some bacteria use to combat viruses and other pathogens, CRISPR-Cas RGNs can cut through DNA strands at specific sites, allowing new genetic material to be inserted. Now a team of HMS researchers at Massachusetts General Hospital has found a significant limitation to the method’s use: CRISPR-Cas RGNs produce unwanted DNA mutations at sites other than the desired target. “We found that expression of CRISPR-Cas RGNs in human cells can have off-target effects that, surprisingly, can occur at sites with significant sequence differences from the targeted DNA site,” said J. Keith Joung, HMS associate professor of pathology at Mass General and associate chief of pathology, research in the Mass General Department of Pathology. He is co-senior author of the report published online in Nature Biotechnology. “RGNs continue to have tremendous advantages over other genome-editing technologies, but these findings have now focused our work on improving their precision.” Consisting of a DNA-cutting enzyme called Cas9, coupled with a short, 20-nucleotide segment of RNA that matches the target DNA segment, CRISPR-Cas RGNs mimic the primitive immune systems of certain bacteria. When these microbes are infected by viruses or other organisms, they copy a segment of the invader’s genetic code and incorporate it into their DNA, passing it on to future bacterial generations. If the same pathogen is encountered in the future, the bacterial enzyme Cas9, guided by an RNA sequence that matches the copied DNA segment, inactivates the pathogen by cutting its DNA at the target site. About a year ago, scientists reported the first use of programmed CRISPR-Cas RGNs to target and cut specific DNA sites. Since then several research teams, including Joung’s, have successfully used CRISPR-Cas RGNs to make genomic changes in fruit flies, zebrafish, mice and in human cells—including induced pluripotent stem cells that have many of the characteristics of embryonic stem cells. The technology’s reliance on such a short RNA segment makes CRISPR-Cas RGNs much easier to use than other gene-editing tools called zinc finger nucleases (ZFNs) and transcription activator-like effector nucleases (TALENs). RGNs can also be programmed to introduce several genetic changes at the same time. The possibility that CRISPR-Cas RGNs might cause additional, unwanted genetic changes has been largely unexplored, so Joung’s team set out to investigate the occurrence of “off-target” mutations in human cells expressing CRISPR-Cas RGNs. Since the interaction between the guiding RNA segment and the target DNA relies on only 20 nucleotides, they hypothesized that the RNA might also recognize DNA segments that differed from the target by a few nucleotides. Although previous studies had found that a single-nucleotide mismatch could prevent the action of some CRISPR-Cas RGNs, the MGH team’s experiments in human cell lines found multiple instances in which mismatches of as many as five nucleotides did not prevent cleavage of an off-target DNA segment. They also found that the rates of mutation at off-target sites could be as high as, or even higher than, those at the targeted site, something that has not been observed with off-target mutations associated with ZFNs or TALENs. “Specificity is important both for research and especially for gene therapy,” George Church, the Robert Winthrop Professor of Genetics at HMS, said about Joung’s report. “This is the first paper to seriously address this topic. The next big question is how to reduce the off-target ratio to on-target.” In January, Church reported in Science on research using the genome-editing tool. While he was not involved in the current study reported in Nature Biotechnology, Church and Joung are collaborators. Together with George Daley, HMS professor of biological chemistry and molecular pharmacology, and Kun Zhang, associate professor of bioengineering at the University of California at San Diego, they are co-principal investigators of a National Human Genome Research Institute Center for Excellence in Genomic Science. Joung said RGNs remain valuable. “Our results don’t mean that RGNs cannot be important research tools, but they do mean that researchers need to account for these potentially confounding effects in their experiments. They also suggest that the existing RGN platform may not be ready for therapeutic applications,” said Joung. “We are now working on ways to reduce these off-target effects, along with methods to identify all potential off-target sites of any given RGN in human cells so that we can assess whether any second-generation RGN platforms that are developed will be actually more precise on a genome-wide scale. I am optimistic that we can further engineer this system to achieve greater specificity so that it might be used for therapy of human diseases.” Support for the study includes National Institutes of Health (NIH) Director’s Pioneer Award DP1 GM105378; NIH grants R01 GM088040 and P50 HG005550, DARPA grant W911NF-11-2-0056, and the Jim and Ann Orr MGH Research Scholar Award. Adapted from a Mass General news release. Stay informed via email on the latest news, research, and media from Harvard Medical School.
<urn:uuid:bdd49109-7dcd-4429-ac07-d1972c42119d>
CC-MAIN-2016-26
http://hms.harvard.edu/news/genetics/target-gene-editing-6-25-13
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397695.90/warc/CC-MAIN-20160624154957-00109-ip-10-164-35-72.ec2.internal.warc.gz
en
0.934494
1,204
3.234375
3
The coal plant at the Indiana University Bloomington campus burns 60,000 tons of coal each year. It is all stoker-grade Indiana coal with moderate sulfur content burned at 11,200 Btu per pound. The plant generates steam for heating, cooling, and processes, such as cooking or for research uses. Return to the Table of Contents
<urn:uuid:7dbbca37-1ec1-45f1-9a2e-05fe57c07328>
CC-MAIN-2016-26
http://www.indiana.edu/~rcapub/v20n3/6c.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393146.70/warc/CC-MAIN-20160624154953-00181-ip-10-164-35-72.ec2.internal.warc.gz
en
0.911291
74
2.640625
3
The heart pumps blood to all of the body's organs. If the heart stops functioning (cardiac arrest), blood flow ceases, organs begin to shut down, and within a few minutes the person will die. If cardiac arrest can be detected and treated immediately, serious organ damage, brain damage, or death may be prevented. Cardiac arrest can occur in adults and children. It may happen suddenly in a person who was thought to be healthy. Community-based programs emphasizing activation of emergency medical services (calling 911 in most areas of North America), cardiopulmonary resuscitation (CPR), and rapid defibrillation (correcting an abnormal heart rhythm with an electrical shock from a defibrillator) have raised public awareness about cardiac arrest and its treatment. However, cardiac arrest remains a major cause of death in all parts of the world. The January 4, 2006, issue of JAMA includes an article about the outcome of cardiac arrest in children and in adults.
<urn:uuid:08a69678-db27-41a7-83fc-12b064d14fd4>
CC-MAIN-2016-26
http://jama.jamanetwork.com/article.aspx?articleid=202139
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397864.87/warc/CC-MAIN-20160624154957-00055-ip-10-164-35-72.ec2.internal.warc.gz
en
0.934831
195
3.8125
4
at issue, contended, contentious, controvertible, debatable, disputable, disputed, open to question, polemic, under discussion English Collins Dictionary - English synonyms & Thesaurus If you describe something or someone as controversial, you mean that they are the subject of intense public argument, disagreement, or disapproval. adj Immigration is a controversial issue in many countries..., The changes are bound to be controversial. controversially adv usu ADV with cl, also ADV with v More controversially, he claims that these higher profits cover the cost of finding fresh talent... Translation English Cobuild Collins Dictionary Add your entry in the Collaborative Dictionary. - Create your own vocabulary list - Contribute to the Collaborative Dictionary - Improve and share your linguistic knowledge "Collins Cobuild English Dictionary for Advanced Learners 4th edition published in 2003 © HarperCollins Publishers 1987, 1995, 2001, 2003 and Collins A-Z Thesaurus 1st edition first published in 1995 © HarperCollins Publishers 1995"
<urn:uuid:7cd19b6c-fe84-4a04-b8d8-02f5da363f9d>
CC-MAIN-2016-26
http://dictionary.reverso.net/english-synonyms/controversial
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783400031.51/warc/CC-MAIN-20160624155000-00094-ip-10-164-35-72.ec2.internal.warc.gz
en
0.843438
212
2.75
3
The Vegie Patch: July 2007 Growing Green Manure comprising Algerian Oats and Mustard, This will be dug in before maturity in preparation for Root Crops. Growing Broad Bean ‘Aquadulce’. Preparing ground for peas Growing garlic, Potato onions and shallots, soon to plant onion seedlings Tomato / Capsicum Bed Green manure has been dug in and now is breaking down. Brassica & Leafy Green Bed Growing Cabbage ‘Savoy’, Broccoli ‘Green Dragon’ Rainbow Chard, Spinach ‘Winter Bloomsdale’ This year we are growing 3 varieties – Kennebec, Pink Eye and Nicola The Vegie Patch is a working display garden. The six bed crop rotation system is designed to fit into the average backyard. You can visit The Vegie Patch any time of the year at the Royal Tasmanian Botanical Gardens (External Site) Crop rotation means never growing the same thing nor its relatives in the same place two seasons in a row, as this can lead to pest and disease build up in the soil. By rotating crops, the pest or disease is deprived of its favourite host and serious infestations are avoided. As well different vegies have different nutrient requirements. Where possible green manure is sown after harvesting the tender vegies (autumn) and dug in winter to replenish nutrients and condition the soil. Sheep manure and compost are added when required.
<urn:uuid:86277d97-3204-447d-be77-27a382e90258>
CC-MAIN-2016-26
http://www.abc.net.au/gardening/stories/s1904480.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403825.35/warc/CC-MAIN-20160624155003-00046-ip-10-164-35-72.ec2.internal.warc.gz
en
0.87298
309
2.9375
3
In this book, the words "data", "function", "argument" and "expression" are used with the meanings usual in programming. Certain other words are used in this book with meanings given below, in a sequence such that the explanation of each word depends only on words || Anything which can be produced by evaluating an expression is said to be a value. Every value is a data value or a function. | NOUN || a data value | VERB || a function which computes nouns from nouns. | MONAD || a verb which takes a single argument. | DYAD || a verb which takes two arguments. Every verb is a monad or a dyad. |AMBIVALENT ||An expression is said to be ambivalent when it denotes either a monad or a dyad (depending on whether one or two arguments are supplied). |OPERATOR ||a function which takes, as its argument(s), nouns or verbs, and produces as its result, a noun or verb or operator. Every J function is a verb or an operator. |ADVERB||an operator which takes a single argument. |CONJUNCTION|| an operator which takes two arguments. Every operator is an adverb or a conjunction. |BIDENT||a sequence of two expressions for which the J grammar provides an interpretation as a single function. |TRIDENT || a sequence of three expressions for which the J grammar provides an interpretation as a single function. |TRAIN||a sequence of two or more expressions for which the J grammar provides an interpretation as a single function. |HOOK|| a verb defined as a sequence of two verbs, that is, a bident. |FORK|| a verb defined as a sequence of three verbs, that is, a trident. |EXPLICIT|| a function is said to be explicitly defined, or just explicit, when defined by an expression containing argument variables for which values are to be substituted. |TACIT|| a function is said to be tacitly defined, or just tacit, when defined without using argument variables. Every J function is either built-in or explicit or tacit. |ARRAY|| a noun, that is, a data value, consisting of a number of simpler values arranged on rectangular coordinates, or axes. Every noun is an array, with zero or more axes. |DIMENSION || (of an array) the length of an axis |SHAPE|| (of an array) the list of its dimensions |SCALAR|| a noun with no dimensions. The shape of a scalar is an empty list. |RANK || (of a noun) the number of its dimensions, that is, the length of its shape. |BOX|| A scalar of a special type, such that its value can represent any array. |CELL||The list of dimensions of any array can be arbitrarily partitioned into leading dimensions followed by trailing dimensions. The original array is thus described as an array of cells, where each cell has only the trailing dimensions. The leading dimensions are called a frame for those cells. |FRAME|| See Cell. |RANK|| (of a verb) The natural, or intrinsic, rank for its argument(s). With an argument of any rank higher than its intrinsic rank, the verb is applied separately to each intrinsic-rank cell of the argument. A monad has one rank, a dyad has two (one each for left and right arguments) and hence an ambivalent verb has three.
<urn:uuid:f342c87f-045e-4670-9757-65be72e2a723>
CC-MAIN-2016-26
http://www.jsoftware.com/help/learning/92.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399117.38/warc/CC-MAIN-20160624154959-00152-ip-10-164-35-72.ec2.internal.warc.gz
en
0.84643
782
3.671875
4
1.1 CMOS LATCHUP In this chapter, a brief overview of latchup is provided. We will provide a first quick look on what latchup is. As a starting point, this discussion will be followed by a summary of evolution, history, key innovations and patents. This chapter discusses the key innovations, contributions and patents associated with the process of understanding how to address the latchup issue in semiconductor technology. In addition, this chapter will provide the reader what are the sources of latchup, from pulses to particles; latchup issues associated with ionizing radiation events, as well as current and voltage excursions outside of the native current and voltage conditions of a technology, will be shown. In this discussion, the issue of technology scaling and how scaling leads to latchup concerns will be reviewed. When this chapter is completed, the following chapters will spiral backward into more depth, on each individual area from models, testing and tools. 1.1.1 CMOS Latchup-What is Latchup? Latchup is a state where a semiconductor device undergoes a high-current state as a result of interaction between a pnp and an npn bipolar transistor. The pnp and npn transistors can be natural to the technology, or parasitic devices. In CMOS technology, these are typically parasitic devices. For each p-channel MOSFET (metal oxide semiconductor field effect transistor) device, there is a corresponding parasitic pnp element formed between the p-channel diffusion, the n-well and the substrate. For each n-channel MOSFET (NMOS) device, there is a corresponding parasitic npn element formed between the n-channel diffusion, the p-substrate and the n-well of the p-channel MOSFET. For each inverter gate, there are corresponding pnp and npn parasitic bipolar elements. Figure 1.1 shows an example of a cross section of a CMOS inverter circuit. When interaction occurs between a pnp and an npn bipolar transistor, regenerative feedback between the two transistors can lead to electrical instability. This interaction between a three-region pnp and a three-region npn that share base and collector regions can be viewed as a four-region pnpn device. As a result of the feedback between the two transistors, there exist stable and unstable regions in the I-V characteristic. The I-V characteristic is an S-type I-V characteristic with both a low-current/high-voltage state and a high-current/low-voltage state (Figure 1.2). In an S-type I-V characteristic, there are multiple current states for a given voltage level; the state it chooses is a function of the circuit load line. It is 'off' in normal operation and can be triggered 'on' in a high-current state. In this state, it establishes a high current at a low-voltage, allowing a low impedance shunt. When the two transistors are coupled, the combined device acts as a four-region device of alternating p- and n-doped regions with three physical p-n metallurgical junctions, forming a pnpn structure. Why are we concerned about latchup? When these parasitic pnpn elements undergo a high-current state, latchup can initiate thermal runaway and can be destructive. Latchup events can lead to destruction of a semiconductor chip, package or system. The current magnitude is such that typically the semiconductor silicon, aluminum and copper metallization fails, and sometimes the package materials melt. Note that another indicator of latchup is the package cracking, melting, delamination, separation and outgassing. Another clear indicator, on a system level, is smoke. In these cases, it is difficult to provide chip-level failure analysis due to the magnitude of the package and system damage. When the card smoke is evident, the module package is melted and the silicon chip is molten, this is a good indicator that latchup has occurred in your semiconductor chip. Back to the semiconductor device level, conceptually the two transistors can be understood as a cross-coupled pnp and npn bipolar junction transistor (BJT) device, where the base of the pnp BJT device is the collector of the npn BJT device and the base of the npn is the collector of the pnp BJT device. The two cross-coupled devices can be represented as a four-region pnpn (Figure 1.3). This pnp-npn BJT coupling establishes regenerative feedback leading to the S-type I-V characteristic and causing the electrical instability that is observed as a negative resistance state (dI/dV < 0). It is this feature that makes this interaction a danger and an enabler of latchup. Application of a positive bias on the emitter of the pnp element and a ground potential on the emitter of the npn element establishes a voltage across the pnpn. The positive voltage provides forward biasing of the emitter-base junctions of the pnp and npn transistors. The base-collector junction of the pnp (which is also the base-collector junction of the npn) is in a reverse-biased state. This prevents current flow from the anode of the pnpn to the cathode. As the voltage is increased, the voltage across the base-collector junction increases. This mode of operation is called the forward blocking state. In order for current to flow efficiently from the pnpn anode to the cathode, the base-collector junction must allow current to flow. For current continuity at the cross-coupled nodes, the collector current of the pnp transistor must equal the base current of the npn transistor, as well as the collector current of the npn transistor must equal the base current of the pnp transistor. Mathematically, the coupling is established through solving Kirchoff's current law at the base-collector nodes. In this form, the standard equations of bipolar transistors can be used to quantify the interaction and current in the pnpn structure. Hence, the two nodal equations can be expressed as [I.sub.cp] = [I.sub.bn], [I.sub.cn] = [I.sub.bp], where [I.sub.cp] and [I.sub.cn] are the collector currents of the pnp and npn bipolar junction transistors, respectively, and likewise, [I.sub.bn] and [I.sub.bp] are the base currents of the npn and pnp bipolar junction transistors, respectively. The total current through the pnpn structure is equal to the emitter current of the pnp or npn bipolar transistor, [I.sub.ep] and [I.sub.en], respectively. From Kirchoff's current law in the transistor, the emitter current must equal the sum of the base and collector currents: I = [I.sub.ep] = [I.sub.cp] + [I.sub.bp]. From the coupling relationships, the current can be expressed as I = [I.sub.ep] = [I.sub.cp] + [I.sub.cn] = [I.sub.bp] + [I.sub.bn] = [I.sub.cn] + [I.sub.bn] = [I.sub.en] = I. Solving for the current as a function of the two collector current relationships, the collector current can be represented as a function of the emitter current: [I.sub.cp] = [alpha][I.sub.ep] + [I.sub.cp0], [I.sub.cn] = [alpha][I.sub.en] + [I.sub.cn0], where the collector current is equal to the product of the collector-to-emitter transport factor [alpha] and the emitter current summed with the base-collector leakage. Solving for the current through the pnpn structure, I = [I.sub.cp0] + [I.sub.cn0]/1 - ([alpha]n + [alpha]p). From this analysis, it is clear that the current is infinite, when the denominator is equal to zero. This condition can be expressed as [[alpha].sub.p] + [[alpha].sub.n] = 1. This expression shows that when the sum of the collector-to-emitter gains is equal to unity, the current goes to infinity. This can also be expressed as a function of the bipolar transistor current gain b, substituting in for the collector-emitter transport, I = [I.sub.cp0] + [I.sub.cn0]/1 - ([[beta].sub.n]/[[beta].sub.n] + 1 + [[beta].sub.p]/[[beta].sub.p] + 1, [[alpha].sub.n] = [[beta].sub.n]/[[beta].sub.n] + 1, [[alpha].sub.p] = [[beta].sub.p]/[[beta].sub.p] + 1. In this form, when the denominator is equal to zero, the product of the bipolar current gains is equal to unity: [[beta].sub.n][[beta].sub.p] = 1. The pnpn current magnitude can be large given that the numerator is large, or if the denominator approaches zero. Hence, from a simple derivation, it can be observed that the regenerative feedback between the parasitic pnp and the npn has a condition where a large current can be established between the power supply and the ground rail in an inverter circuit through the parasitics associated with the p- and the n-channel MOSFET transistor. The transport properties of the parasitic pnp and the npn are also involved, which are influenced by the semiconductor process and the chip design layout. As a result, latchup involves the chip architecture, the circuit layout, the circuit design and the semiconductor process. What is the frequency of these parasitics in a modern semiconductor design? Today, in an advanced CMOS microprocessor with 200 million transistors, there are 100 million p-channel MOSFETs and 100 million n-channel MOSFETs. As a result, there are 100 million pnp and 100 million npn transistors. Hence, there are on the order of 100 million pnpn elements in a CMOS logic chip that contains 100 million inverter circuits. Question: How many circuits does it take to initiate CMOS latchup? Answer: One. As the number of circuits increases, the number of peripheral circuits and I/O circuits increases. In a CMOS chip with 200 million transistors, there may be on the order of 1000-10 000 interface circuits. It is likely that voltage and current events on the interface circuits can lead to latchup. Question: How many peripheral circuits does it take to initiate CMOS latchup? Answer: One. Yet, today, the number of products exhibiting latchup is a small minority of designs and applications. Hence, there must be a method or methods to diagnose and discriminate which parasitic pnpn structures are important, and which are not. Additionally, there are semiconductor process solutions, circuit solutions and system solutions. 1.1.2 CMOS Latchup-Why is Latchup Still an Issue? A key question on CMOS latchup is the following-Why is latchup still a concern? There are many reasons why latchup is an issue in today's semiconductor chips. The reasons why is is a concern in some corporations differ based on the choices made in the semiconductor technology, latchup design strategy as well as the latchup methodology. The following is a list of why this issue reoccurs in semiconductor chips: lack of characterization of parasitic devices; lack of semiconductor process control of parasitic devices; lack of dc and ac models of parasitic devices; lack of parasitic devices in the circuit simulation; lack of extraction, checking and verification of parasitic devices; lack of tools addressing parasitic devices between devices, circuits and subfunctions; lack of ground rules that sufficiently provide 100% coverage of design environment; low business priority of addressing CMOS latchup, until it is a concern; lack of educational training on CMOS latchup in university and college course work for circuit and layout design engineers and technicians; education focus on the understanding of bipolar transistors and parasitic transistors; lack of focus on latchup during semiconductor process and device design point definition; lack of preservation of dimensional and electrical similitude of the lateral and vertical dimensions in the scaling of CMOS technology; lack of awareness of the CMOS latchup technology scaling and making CMOS latchup technology part of the technology roadmap; lack of semiconductor device and CMOS latchup design point cosynthesis; isolation, well and substrate scaling; new design methodologies in digital, mixed signal and RF designs; nonnative voltages integrated into products well above the native-voltage CMOS latchup capability; introduction of high-voltage CMOS (HVCMOS) integrated with low-voltage CMOS (LVCMOS) circuitry; new issues associated with subsystem and system integration; reversal of battery installation; negative polarity on pins; wire-bond mismatching in multichip power systems. These are just some of the reasons why today CMOS latchup is not 'cured' and remains an issue in today's semiconductor chips. In this book, we will address many of these issues in the following chapters. 1.1.3 Early CMOS Latchup History The first transistor, invented at Bell Labs in 1947, was not a CMOS transistor, but was a bipolar junction transistor device. At that time, an advantage of the bipolar junction transistor was the ability to manufacture it, as well as the speed of the transistor. One of the early advantages of the bipolar junction transistor was that it was not a surface device, but a bulk device. In 1955, Bell Labs manufactured and demonstrated the first metal oxide semiconductor field effect transistor. The MOSFET structure was proposed in 1930 by Lilienfeld and Heil, but was not manufactured successfully due to fixed and mobile positive charge issues. Fixed charge and mobile charge problems also remained a large issue in p-channel transistors, leading to the early implementation of n-channel MOSFET technology. CMOS had to wait for the p-channel MOSFET device to emerge while the development and research community continued to look for a solution to the oxide charge problem. By the late 1960s, many manufacturers offered integrated circuits based on either a p-channel or an n-channel MOSFET device. CMOS was invented by RCA and was first demonstrated by Al Medwin at RCA's technology center in Somerville, New Jersey. The RCA Corporation called this technology COS/MOS, which stood for complementary symmetry metal oxide silicon. The first circuits using COS/MOS included a circuit that contained 13 transistors with a 15-V power supply. Early interest in CMOS was also due to the potential for military and space applications. Publications in the 1960s by Kinoshita et al., Poll and Leavy and Dennehy et al. focused on the initiation of CMOS latchup in radiation environments. CMOS latchup became of growing interest in the early 1970s as interest increased in the usage of CMOS for mainstream technology applications. Interest in CMOS continued in Sandia Laboratories and RCA. Gregory and Shafer, Gallace and Pujol and Barnes et al. of Sandia Laboratories focused on latchup as an impediment to the mainstream integration of CMOS. During the first development of RCA's COS/MOS, CMOS latchup was discovered by Gallace and Pujol. Ironically, the parasitic bipolar transistors unintentionally formed by the CMOS inverter switch impacted the introduction of CMOS. With the early problems of CMOS technology, most corporations began to focus on NMOS technology. In this time frame, prior to mainstream introduction of CMOS, model development, guidelines and radiation implications were analyzed. Alexander et al. evaluated MOS model implications. Brucker evaluated the implications on CMOS and silicon-on-sapphire (SOS) memory. Coppage and Evans evaluated the characteristics of the destruction induced by CMOS latchup. Total dose characterization and other nuclear radiation effects were evaluated by London and Wang, Simons and Ricketts. It was during the late 1970s that the focus on how to improve CMOS latchup using design techniques and process solutions was first addressed. From a practical perspective, application guidelines were released by Stephenson to address CMOS latchup guidelines. The focus shifted toward addressing CMOS latchup by screening, testing and selection processes. Sivo et al. focused on methods of latchup screening. Crowley et al. used radiation as a method of selection. In this time frame, the use of neutron irradiation for the prevention of CMOS latchup was proposed by Adams and Sokel. In this time frame, the use of recombination centers (e.g. using gold dopants) was demonstrated by Dawes and Derbenwick. In many corporations, the first attempts to establish a mainstream CMOS technology for memory and logic development discovered the problem of latchup. Early developers of CMOS were hindered by the latchup problem, impeding the mainstream introduction of CMOS in the 1970s. In those time frames, MOSFET-based static read access memory (SRAM) introduced resistor-load NMOS cells and four-device NMOS cells, and avoided integration of p-channel MOSFETs into the network. As a result, CMOS logic was delayed until solutions to latchup were resolved. Excerpted from Latchup by Steven H. Voldman Copyright © 2007 by John Wiley & Sons, Ltd. Excerpted by permission. All rights reserved. No part of this excerpt may be reproduced or reprinted without permission in writing from the publisher. Excerpts are provided by Dial-A-Book Inc. solely for the personal use of visitors to this web site.
<urn:uuid:cc556940-8086-4a49-829b-291b8958d185>
CC-MAIN-2016-26
http://www.dmmserver.com/DialABook/978/047/001/9780470016428.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396147.66/warc/CC-MAIN-20160624154956-00024-ip-10-164-35-72.ec2.internal.warc.gz
en
0.924242
3,883
3.15625
3
The Persian word for “new day,” Nowruz marks the beginning of the new year in Iran and many other countries. This period of celebration and rejuvenation coincides with the vernal equinox and the first day of spring. When the sun crosses the celestial equator (the vernal equinox in the Northern Hemisphere), the length of the day and night are the same. This occasion was celebrated by major cultures in ancient Mesopotamia as early as 3000 BCE. It is rooted in Zoroastrianism, the religion of Iran before the founding of Islam. Today, people in Iraq, Afghanistan, Albania, Turkey, Turkmenistan, Kazakhstan, Kyrgyzstan, India, and Pakistan also participate in the thirteen days of Nowruz with their own local variations of festivities. In Iranian communities people clean their home, get haircuts, and buy clothes in preparation for the new year. They set up and gather around the beautiful haft sin table, and they cook and enjoy special foods. Friends, families, and neighbors visit with one another and exchange gifts. Young people bring flowers, fruits, nuts, and pastries to adults, while parents and grandparents give their children crisp bills of money in return. As they have done for generations, families and friends celebrate the start of a new year and welcome the return of spring.
<urn:uuid:ade482d4-111e-4bf0-95e0-84f45b676d9e>
CC-MAIN-2016-26
http://www.asia.si.edu/events/nowruz/nowruz-traditions.asp
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395166.84/warc/CC-MAIN-20160624154955-00004-ip-10-164-35-72.ec2.internal.warc.gz
en
0.947426
277
3.40625
3