text
stringlengths 212
520k
| id
stringlengths 47
47
| metadata
dict |
---|---|---|
This chapter goes into what has an influence on children in terms of development later on in life. All of these studies and subsequent theories are grouped into a type of psychology called developmental psychology. A big component on developmental psychology is looking into the effects of experiences during early childhood. Early experience during childhood can have a profound impact on brain development and influence one's entire life. However, this does not mean that children are fragile in their early lives and are easily damaged by the negative effects of early deprivation.
I found it quite interesting that the human brain begins to develop only eighteen days after fertilization all the way into early adulthood. While most of the body's other organ are fully developed by birth, the brain takes much longer to fully develop and is not completely developed at birth. At infancy, babies have a set of motor behaviors that are sparked by stimulation and are important to survival. One of these needs is the sucking reflex, which is that a baby will clamp down and suck on anything put in its mouth.
Chapter 10 strongly asserts that there are many different connections that an infant has to its surroundings that are stimulated through connections with their parents as well as through interactions with their environments. I hope that this chapter can explain how much someone's personality is determined by their surroundings as opposed to their genetics. | <urn:uuid:baa29b11-1682-401c-b7fb-f8582cf637f7> | {
"date": "2014-07-28T12:27:05",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9874107241630554,
"score": 3.734375,
"token_count": 260,
"url": "http://blog.lib.umn.edu/graz0029/wednesdaywanderings/author/joh09532/2012/01/"
} |
I’ve finally reached the upper section of my Introduction to Tapestry class sampler. This is the section that contains the big, colorful circle.
We start by using a template and permanent marker to mark the outline of the circle on the warps. I didn’t cut out my template like Claudia did in the instructions. In the first photo below, I’ve taped the template to the warps of the closed shed and already marked the circle on the warps with a permanent marker. You can see that the very sides of my circle are straight lines. I’ve learned that if those lines are too short, you’ll end up with “ears” on your circle.
Optionally, after removing the template, you can go back to each mark on the warps and extend it all the way around each warp. This makes it easier to see the marks if your warps spin around while you’re weaving.
We begin weaving the background of the circle with several passes of solid magenta weft. There are two separate wefts of magenta here, going in opposite directions. We weft dance them to hide where they come together.
Technically, the magenta yarn is supposed to reach all the way up into the beginning of the circle, but I ran out of magenta and needed to switch to dark orange sooner.
Here, Claudia points out that the bottom of the circle will start out covering quite a few warps, rather than starting with just one or two warps and then gradually getting larger. This is important for creating the correct shape. That said, keep in mind that no two weavers’ circles ever look exactly alike.
Because the bottom half of the circle increases in size as you weave, the negative spaces around it will decrease in size at first. This means we can continue with our background color around the empty space that will be the bottom half of the circle.
(What is it with cats and Mirrix looms?)
Now we continue weaving until we reach the point that is exactly halfway up the circle. This is the point where the circle will begin to decrease in size, and so we’ll need to weave the circle itself before completing the background.
Claudia shows you how to use the cut-out circle template to locate the middle of the circle. I just stopped weaving the background when I reached a point within the outermost vertical lines on the sides of my circle (because the circle doesn’t get any larger after that).
Next we begin filling in the circle with bright yellow weft. Again we’re using two separate wefts, laid-in in opposite directions. The two wefts come together with warp interlock.
You need to be careful here to make sure you follow the steps that you made on the warps when weaving the background color. That requires taking a close look at how many times you wrapped around each warp.
The yellow wefts are now separated and used to climb up the sides of the circle, covering a thickness of 5 warps each.
At this point, you can see that my weaving is a little shorter on the left than on the right. That’s just because I ran out of dark orange on the left.
Moving back to the bottom of the circle, we now introduce two more wefts: one for the lighter yellow background color and one for the green accents. For the green I just wrapped the weft around the warps, only doing actual weaving (and changing the shed) when I moved to the right. The light yellow fills in the adjacent empty space. I love how this looks — it’s like you’re painting with yarn.
Next, we started a new color to create some dots. Dots are strange in that they don’t follow the general rules of tapestry. Case in point, you begin by laying in a color in the same shed as the previous row.
Dots are really just little accents that swim along in your wefts. They’d be a good use of short yarn scraps.
In this next photo, you can see that I’ve started to vary the width of green, actually weaving it rather than just wrapping once around the warp.
I should point out that I’m not just eyeballing it when I fill in the circle. There’s a lot of counting involved, as I continue to check how many wefts of the dark yellow cover each warp, and making sure I match that number with the light and green wefts beside them.
When you hit the center point of the circle, you need to keep building up the inside of the circle (which decreases in size from this point on) before filling in the background.
I decided to complete my circle before going back and finishing any of the remaining background colors.
Looking back at the photo above, I guess I didn’t weave all the way to my upper black outline. Instead I focused on making the top of the circle look similar to the bottom. However, I still used the sides of the outlines as guides.
Now it was a simple task of filling in. I had some color challenges with the background at the top of the sun because I’d run out of magenta and, eventually, green. I substituted some chartreuse green wool yarn from my stash. I hope it’s not too distracting.
Next it was finally time for the top header. This was actually tricky for me because I was running out of space on my loom, and I’d already advanced as far as I could without my warping bar coming forward over the top of the loom. But I persevered. This header was just like the one we made at the beginning of the sampler.
After the header, I couldn’t believe I’d finally finished weaving! How exciting! It was time to cut the tapestry off of the loom, which I must say was a bit nerve-wracking. It’s not difficult, it’s just that after spending hours on a project, it’s alarming to watch it slump down.
In my next — and final — blog post in this series I’ll finish my sampler and get it hung up proudly on the wall. Stay tuned…
Chris Franchetti Michaels is a bestselling craft book author and designer. Visit her blog at http://www.beadjewelry.net. | <urn:uuid:8e928f0c-9f91-4f1b-ab72-56bf1cb9b140> | {
"date": "2014-07-28T12:18:53",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9298035502433777,
"score": 2.640625,
"token_count": 1347,
"url": "http://blog.mirrixlooms.com/2013/07/03/intro-to-tapestry-class-the-circle/"
} |
By George Weigel/The Patriot-News
Q: In your discussion of pruning raspberries, you specify June-bearing types. I have so-called "ever-bearing" raspberries, which as you know, have two crops per year, although the fall crop is often poor because of cold weather. How should this type of raspberry be pruned?
A: The common and easy way is to just whack all the canes down to about 1 inch at the end of the season or anytime over winter before new growth starts in spring.
Although that's quick and easy, it pushes the fruit back into fall. That's because the plants are producing fruit on that year's new wood, and it takes time for the wood to grow and then for the fruit buds to develop and produce on it. Pruned like this, raspberries are more accurately "fall-bearers" instead of "ever-bearers."
Some people try to milk two distinct crops out of their ever-bearers by pruning more like June-bearers. If you go this route, you can "skinny" your patch at the end of the season (sever unwanted runners) and then shorten the remaining canes by about one-third at the end of winter.
New canes will push up around the remaining, shortened canes. The older, shortened canes should produce a decent crop of berries in early summer, and then the new ones (hopefully) will give you a second crop in fall. Some varieties are more resistant to cold weather in fall than others, so hopefully your type isn't a cold-wimpy one.
Once the second-year, shortened canes fruit, you can prune them down to the ground. Or if you find it's easier, you can cut the old canes to the ground at the end of the season after the leaves have dropped. At the end of winter, shorten the new canes by a third, and let a new cycle begin. | <urn:uuid:b61d3fa4-5ec4-434e-8895-c92f7932306a> | {
"date": "2014-07-28T12:31:53",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9614545106887817,
"score": 2.515625,
"token_count": 413,
"url": "http://blog.pennlive.com/gardening/2008/04/pruning_everbearing_raspberrie.html"
} |
The Glycemic Index (GI) is a scoring system that rates the impact foods (carbohydrates) have on your blood sugar levels. In short, the lower the GI, the less of an impact that food will have on your blood sugar. Low GI foods are great for those with diabetes and are utilized by many diets. But a low GI doesn’t always mean the best nutritional option, so understanding the GI is helpful in balancing your diet.
Foods that are have low-GI numbers (under 50) include:
- Fruits: cherries, grapefruit, dried apricots, apples, pears, plums, peaches, oranges, and grapes.
- Vegetables & Beans: cooked carrots, yam, sweet potato, artichoke, asparagus, broccoli, cauliflower, celery, cucumber, eggplant, green beans, all varieties of lettuce and peppers, snow peas, spinach, young summer squash, tomatoes, zucchini, boiled soya and kidney beans, dried peas, boiled lentils and chickpeas.
- Breads/Cereals/Grains/Bakery: pound cake, multi-grain bread, whole grain bread, coarse barley bread, All-Bran cereal, non-instant porridge, pearl barley, rye, wheat kernels, wheat tortilla, instant rice, bulgur, and brown rice.
- Dairy Products & Beverages: skim milk, reduced-fat yogurt with fruit, ice cream, tomato juice, unsweetened apple and orange juices.
Just because a food has a GI number higher than 50 doesn’t mean it is necessarily unheathly for you, but knowing their GI number allows you to make healthier choices when pairing food together in your meal planning. For example, eating watermelon is not an unhealthy food choice even though is has a high GI of 72 – but if you incorporate it into a meal of other high GI foods like:
- Kraft macaroni and cheese (GI = 64)
- a plain baguette (GI = 95)
- green peas (GI = 51)
- watermelon (GI = 72)
- Coca Cola (GI = 63)
then it can contribute to a spike in your blood sugar levels, which stimulates excessive insulin and leads to increased inflammation and blood pressure, and high triglyceride levels. Cherries or grapefruit, with GI scores in the low 20′s, would be a better fruit choice in a meal that already has several other items that have high GI scores.
Harvard Medical School developed a list of the GI scores of some common foods. You might be surprised by some popular junk foods GI scores:
- Pizza Hut Super Supreme Pizza (GI = 36)
- Peanut M & M’s (GI = 33)
- Snickers (GI = 51)
- Ice Cream (GI = 57)
Foods which have low GI scores do not necessarily equate to healthy eating choices or balanced nutritional options, but GI scores can be helpful when trying to balance out our diet and our intake of carbohydrates and natural sugars. | <urn:uuid:d3f1d12c-f158-414a-a574-54e899f82480> | {
"date": "2014-07-28T12:20:15",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9010491967201233,
"score": 3.40625,
"token_count": 643,
"url": "http://blog.teeter-inversion.com/the-glycemic-index_how-your-food-choices-impact-your-health-goals/"
} |
The bones of dinosaurs have told countless tales about their origins and behaviour, but dinosaurs left behind more than just their skeletons. As they walked about, they made tracks, and some of these also fossilised over time. They too are very informative and a new set, made by some of the dinosaurs’ closest relatives, reveals how these ruling reptiles rose to power at a leisurely pace.
Dinosaurs evolved during the Triassic period from among a broader group called the dinosauromorphs. These include all dinosaurs as well as their closest relatives, species like Lagerpeton and Lagosuchus that only just miss out on membership in the dinosaur club. Fossils of these latter animals are extremely rare and only ten or so species are well documented. Their tracks, on the other hand, are more common.
Indeed [their footprints] suggest that the dinosauromorphs evolved in a geological heartbeat after the greatest mass extinction of all time, a cataclysmic event “when life nearly died”.
For more about the footprints, and how they might push back the date of these dinosauromorphs back to 250 million years ago, check out the rest of the post at Not Exactly Rocket Science.
Not Exactly Rocket Science: Walking with dinosaur ancestors – footprints put dinosaur-like beasts at scene of life’s great comeback
80beats: How Tyrannosaurs Grew from Tiny “Jackals” to Ferocious Giants
80beats: Apparent Discovery of Dino Blood May Finally Prove the Tissue Preserves
Image: American Museum of Natural History | <urn:uuid:55533594-87e7-4ddf-b75e-7b284f1ba477> | {
"date": "2014-07-28T12:43:57",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9340003728866577,
"score": 4.09375,
"token_count": 320,
"url": "http://blogs.discovermagazine.com/80beats/2010/10/06/earths-worst-mass-extinction-allowed-dino-ancestors-to-emerge/"
} |
Bryn Mawr Classical Review 2000.09.03
Alan L. Boegehold, When A Gesture Was Expected. A Selection of Examples From Archaic and Classical Greek Literature. Princeton: Princeton University Press, 1999. Pp. xiv, 154. ISBN 0-691-00263-0. $32.50.
Reviewed by James Clauss, University of Washington
Word count: 2964 words
"The matter of this book could be described in summary form as an extended demonstration that 'gesture here' is often implied on the manuscript page. We only need to be alert for the signs by which those gestures are indicated" (p. 4). In this neatly organized, well written, and lucid study of non-verbal communication in Archaic and Classical Greek Literature, Professor Alan Boegehold offers interesting and helpful insights into the understanding of passages in both poetry and prose where something is apparently missing that would have completed the thought. And that something is a gesture. "Although we cannot recover the gestures themselves in all their actuality, we may become better readers if we try to intuit their effect" (p. 5). This extra dimension that we are invited to consider when reading ancient texts is as necessary in some cases for understanding what is said as it is crucial for sensing what is meant. As the author warns, this is not a systematic review of all Archaic and Classical Literature, but a collection of examples whose "cumulative effect could nevertheless prompt readers and editors of the great ancient Greek texts to try while they read to imagine living, breathing presences whose words their authors saw being delivered with expressive movements of heads, eyes, hands, and torsos" (p. 10).
In Chapter One (Nonverbal Communication), Boegehold sets the groundwork for his study by reviewing descriptions of gestures and postures in ancient literature, depictions of these in sculpture and painting, and gestures used by people in modern Greece and the Mediterranean, insofar as these can reasonably be imagined to represent ancient practice. The survey begins with Iliad 1.527-28, where Homer specifically states that, in response to Thetis' request for help, Zeus expressed his approval by nodding his head in a downward motion, a way of expressing agreement still employed in Greece, as is the opposite motion for signifying denial. Boegehold is particularly convincing where he has been able to match pictorial image with verbal description, as in the case of a red-figure painting by the Andokides Painter (Figure 17), which features two warriors opposite each other at a low table (pp. 25-26). One of the figures holds out his right hand with index and middle fingers extended, while the other two fingers are folded within the palm. This is precisely the same gesture ascribed by Quintilian (11.3.98) and Apuleius (Meta. 2.21). Boegehold reasonably concludes that this slight movement of the arm localizes one who is about to speak, a motion particularly useful for actors; comparison to a photo of Ronald Reagan with Andre Gromyko in 1984 (unfortunately not provided) is a nice touch. Equally witty and persuasive is the photograph of an audience attending a lecture at Wellesley College, several of whom have assumed the Thinker's pose (Figure 16), which is compared to the red-figure kylix on which Oedipus, hand under chin, ponders the Sphinx's riddle (Figure 15).
In Chapter Two (Some Attic Red-Figure Scenes), Boegehold analyzes several scenes employing the methodology established in the first chapter. On Douris' rendition of the vote for the arms of Achilles (Figure 22), he argues convincingly that Athena's outstretched arm does not signify her support of Odysseus, who stands with arms raised in victory to her right, as has been argued, but that she is indicating the result of the vote. In support of this, Boegehold offers Euripides Iph. Taur. 965-66, where Orestes says "'Pallas with <a gesture of> her arm certified the counting of the ballots as equal <and therefore> for me.'" (p. 30). I have some reservations, however, about the interpretation of one of the five figures represented on a different piece (Figure 23, British Museum E 51, also the book's jacket illustration). The scene features two groups of two and three people. In the group of two on the left, a man offers a small bag to a woman who carries a much larger bag. She holds her right hand up, with her thumb and index finger almost touching and the other three fingers folded within her palm. Appealing to Quintilian (11.3.101-3), who states "When you touch the middle of the right-hand edge of the thumbnail with the tip of your first finger, and the other fingers are loose, it is a nice way to express approval and relate episodes and make distinctions" (p. 33), Boegehold concludes that the woman is accepting the man's offer. Two factors argue against this reading, at least to me. First, the larger money bag carried by the woman so dwarfs the man's as to suggest that she might well be saying "you call that a deal? I could buy and sell you two times over!" Second, and more importantly, Quintilian adds the following (quoted by Boegehold): "The Greeks these days especially use a similar gesture, except that the three fingers are folded in, whenever they round off their syllogisms with their gesture as though chopping" (ibid.). Concluding a syllogism is not the same as expressing approval. Also, the differences between the two gestures described by Quintilian are slight but potentially significant. The first one reads like the American A-OK hand motion, with thumb and index finger touching and forming a circle while the other three fingers are open and usually pointing skyward with no motion attending the gesture (exactly the gesture assumed by the man at the center of the scene); the Greek alternative, to which Quintilian assigns a different function, is reminiscent of the Italian gesture where the thumb touches both the index and middle fingers, with the other two folded into the palm, while the hand makes a chopping action (caesim, however, could mean "in short clauses" as OLD s.v. caesim 2). This gesture typically asks "what do you mean?" or "what does this mean?" Such a stance, particularly in the context of a financial arrangement, suggests to me that woman is dismissing the current offer. If we are to imagine that she is arguing by way of syllogism, it might run as follows: All men with small money bags are not to be taken seriously; you have a small money bag; you've got to be kidding.
In Chapter Three (Homer), Boegehold introduces his discussion of the tendency to omit the apodosis of a conditional clause, when something like "it is well," "it will be well," or in one case "beware," is to be understood; there are also cases where the protasis is to be supplied with a phrase such as "if you like." Ancient grammarians called the first ellipsis anantapodosis; Boegehold employs the phrase "'incomplete' conditional sentence" and provides numerous examples throughout the book. For instance, at Il. 1.134-39 Agamemnon states: "Are you telling me to give her back? Well, if the great-hearted Achaians will give me a prize, fitting to my liking, so that it is of equal value --. But if they do not give <such a prize>, then I shall go and take your prize or Aias's, or I shall take Odysseus' and lead <her off>" (p. 40). An apodosis such as "it will be alright," it is argued, would have been communicated by means of a gesture that the poet would make in performance, though the nature of this gesture is not defined or hypothesized. In his commentary on the passage (cited by Boegehold), Eustathios identifies this as an ancient mannerism, and an effective one at that, but does not mention any movement that would have accompanied the omitted phrase. While I find no compelling reason for rejecting the introduction of a gesture of some sort in this and in other cases, I wonder if the tone of the speaker's voice might also, or even by itself, call attention to the unstated apodosis, the effect of which is to force the reader to supply the missing words.
Six passages from Archilochus and two from Pindar are examined in Chapter Four (Archaic Poets). Boegehold reasonably imagines that Archilochus' lively verse would have been accompanied by gestures that dramatize his statements. For instance, in Archilochus 89, when the poet states "I wish I could get to touch Neoboule," he may have touched his own breast or he may have pointed when reciting "Glaukos, look: waves are troubling the deep sea" (Archilochus 103). The two passages taken from Pindar (N. 4.79-81 and O. 2.56-60) are further examples of "incomplete" conditional sentences. In the first case, I don't sense that a gesture is necessary, though I would not necessarily exclude it. Pindar states: "But if you are telling me still to erect a stele / whiter than Parian stone for your mother's brother, Kallikles, <Gesture = No, I will not do that>. / Gold refined shows all its bright shine but a hymn to brave deeds makes a mortal / equal in fortune to kings" (p. 50). While the thought "No, I will not do that" is indeed implied, the interjection of a complementary gesture seems overly prosaic and certainly unnecessary in a genre as highly compressed as lyric. An explanation of how the gesture, whatever it was, might have been executed in performance would certainly be helpful in making a case for its use.
Turning to Tragedy in Chapter Five, Boegehold argues that faith in particles alone as a way of interpreting the tone of an utterance is too limited. He counters that "by imagining the actors' non-verbal communications, [we] can answer questions that have been raised in the past, and for which traditional philology has not provided fully satisfactory answers" (p. 53) . Representative examples from Aeschylus, Sophocles, and Euripides are offered, one of which I shall briefly examine. At Agamemnon 1060-61, when Cassandra does not respond to Clytemnestra's order to enter the palace, she states "But if, because you have no understanding of Greek, you are not receiving my words... / instead of speaking, make an indication with your barbaric hand" (p. 55). The first part of the sentence is treated as another "incomplete" conditional sentence (though this is not necessarily so if we read δέ in the following line as apodotic, as Page does). But more is needed here than a gesticulated "so be it" if the statement is to be realistic instead of ridiculous. Whenever we encounter people who we think do not speak our language, we instinctively continue to talk but also make exaggerated gestures in order to communicate. In the present scene, Clytemnestra reasonably concludes from Cassandra's silence and lack of movement that she does not understand what is being said, and so she tries to elicit a hand motion from her that acknowledges her request, continuing to speak even though she is sure that the Trojan princess does not speak Greek. Whatever the nature of her body language, we can be sure that it was purposefully and carefully exaggerated. Far from being nonsensical, this brief moment provides one of the many remarkable touches of realism in the play. Aeschylus' portrayal of Clytemnestra's frustration both suits her imperious and impatient manner and is of a piece with the intimate characterization of other figures in the play, such as the watchman, the herald, and even the chorus, who reveal themselves in their idiosyncrasies and make the play more three-dimensional. A gesture is surely expected here.
Aristophanes provides the focus for Chapter Six. The first suggestion, that actors would have made a gesture of some sort to signal a quotation or parody, unsupported by ancient testimony, is not compelling, particularly since a shift to the stricter meters of tragedy, for instance, and the use of elevated vocabulary should suffice to signal the allusion. Moreover, it is hard to imagine what kind of gesture would be employed. Rather than a specific gesture (like our four-fingered dramatization of quotation marks), a slight change in the speaker's voice or stance would suffice, though even this may not be likely given the brevity of many of the allusions. A stronger case is made in this chapter for the act of shaking out one's clothes as a gesture accompanying a curse, something the Greeks still do, as Boegehold points out. The examples cited (Acts 18.6, Esdras 2.15.13, and Lysias 6.51) clinch the point. I would be cautious, however, about identifying every act of shaking clothes as a curse. The instances cited on p. 76 (e.g., when the Clouds shake off the mist from their bodies at Clouds 287-90 or when the old men who have been doused at Lysistrata 401-02 act similarly) do not require a curse to make sense. Wet clothes sometimes need to be shaken dry.
Oratorical gestures are examined Chapter Seven. Appealing to Alcidamas (On Sophists 13), Boegehold begins with the proposition that the most effective speeches in court are those which are articulated naturally, sometimes offending against basic rules of syntax, and accompanied by gestures. This must have been the case, with or without the help of Alcidamas, but some of the examples offered are problematic. For instance, Antiphon 6.23: "I told him to go with all the witnesses he wanted to the people who were present -- I named each one -- and question and test them, those who were free in a manner befitting free men, who for their own sakes and for the sake of the truth would tell the truth of what happened, and the slaves, if he thought upon questioning them they were telling the truth <GESTURE = well and good>; otherwise I was ready to give over all of my own for torture and whatever other slaves belonging to others he might order" (p. 81). Observation of the chiastic structure of the last part of the sentence eliminates the need for a gesture: the speaker told his prosecutor to question the slaves [A], if (εἰ μέν) he thought this was useful [B], but if he did not think so (εἰ δὲ μή) [B], he would provide his own slaves [A]. A stronger case is made for Antiphon 6.19: "Where in the first place the prosecutors themselves admit that the boy's death was neither premeditated nor contrived, and where they admit that everything was done in the open and in the presence of many witnesses, both men and boys, free and slave, from whose presence any person who did anything wrong would be wholly visible and whoever charged an innocent person would be wholly exposed." Apparent end of sentence. The text continues: "It is worthwhile to note both the intent of my opponents and the manner in which they came to this business" (ibid.). There are at least four possibilities here: the apodosis has been lost; Antiphon lost track of a rather involved, though neatly balanced protasis and never finished it; the δέ of the following sentence is apodotic (ἄξιον δ' ἐνθυμηθῆναι); there is a conscious ellipsis in need of a gesture. Although the sentence "it is worthwhile to note ..." could well function as the apodosis in this context, given that apodotic δέ is rare among the orators, a vivid gesture of some sort would mitigate this rather abrupt conclusion to an incomplete sentence.
Turning to Historians in Chapter 8, Boegehold argues that elliptical sentences, particularly in Herodotus and Xenophon, can be better understood by the gestures which would have been used in oral performances. This line of thinking raises a broader question regarding the reading public, which I am not prepared to engage. I would hazard to say, however, that an interpretive performance should not be necessary for a reading audience intimately familiar with the body language that typically accompanies certain ellipses. In any event, Boegehold has identified more interesting examples of "incomplete" conditional sentences and embedded quotations. With regard to Herodotus 9.60 and 5.20, the combination νῦν δέ before γάρ is said to require an accompanying gesture signifying "no." The latter passage is interpreted as follows: "In this matter, give a sign as to what you want. But now <Gesture = No, please don't...> because it is almost time for bed and I see that you are well fortified with wine, do please let these women bathe ..." (p. 96). Yet the sense of the sentence is complete if we read γάρ, as Boegehold appears to do, as anticipatory (Denniston 69-70, cited in the next chapter, p. 114): on the one hand, let us know (sc. if you want the women now); on the other hand, because it is late, let the women bathe and then you can have them. The same reading can be applied to other instances of this combination cited by Boegehold, a number of which are discussed in Chapter 9 (Plato). The passages studied in this, the final chapter, are similar to those examined throughout the book and so I shall forego further discussion, especially given the length of this review. The end matter includes a bibliography, divided into three sections (Editions, Translations, and Secondary Literature), an Art Index, Index Locorum, and a General Index, all of which are quite helpful.
In his brief conclusion, Boegehold recapitulates the basic thesis of the book: particles alone cannot bridge the verbal gaps found in Greek prose and verse; often a gesture is needed to complete the thought. Although I may disagree with some of the author's readings, I nonetheless feel that this an important book. Reading ancient Greek literature without allowing for the use of non-verbal communication can, as Boegheld has shown, reduce lively colloquial scenes to static and lacunose tableaux or even lead to misconstructions of the text. By examining, and then inviting us to imagine, formulaic ellipses with the help of ancient testimony and works of art as well as the persistence of certain gestures in specific contexts, Boegehold shows us how to assume a more dynamic approach when reading ancient texts, one that fills in some of the gaps and exposes some of the action inherent in oral communication among the Greeks. | <urn:uuid:ca78c86c-adf7-49d5-a073-fad876115a24> | {
"date": "2014-07-28T12:22:14",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9583433270454407,
"score": 2.625,
"token_count": 4023,
"url": "http://bmcr.brynmawr.edu/2000/2000-09-03.html"
} |
On Friday, Scott Adams put up an interesting post called “Fairness“, wherein he puts to task the average person’s concept of what “fair” means. To illustrate his point that peoples’ basic idea of fairness is deluded, he uses the analogy of splitting ten marbles between two youngsters. The question is, how do you properly divide those marbles? From his post:
Is five marbles apiece actually fair?
Don’t you need to know how many marbles each kid already owns? What if one kid has a thousand and the other has none? The marginal utility of an extra marble is much higher for the marble-poor kid.
Doesn’t their different level of enthusiasm for marbles come into play?
I agree with is analysis of the complexity of fairness. The calculation of absolute fairness would involve identifying and quantifying a nearly infinite number variables. Variables even if they could be known, would be extremely difficult to assign a logical value. Even if you could know with certainty the levels of enthusiasm of each child, how much weight would you assign it? Whatever value you assign would be heavily influenced on your own biases regarding the importance of enthusiasm in your life.
What bothers me about Adams’ post is his acceptance of fairness as a necessary evil, a calculation quickly arrived at by “morons” for the ease of doing business. (“Morons” is his word; he is often condescending, I guess that’s part of his appeal. Don’t think for a minute that I think you, dear reader, are a moron. And I don’t have time to check into rehab for a slip of the tongue. ;) ) I don’t think fairness should ever be used as the reason for any decision. It’s a crutch, and one easily cast off.
Instead of using phrases like “we’ll do such-and-such because it’s fair” or “level the playing field“, I’d love it if people would be more accurate and say instead “it works best with our shared biases” or “we like the idea of altering the current biases be more in favor of one group over another.” My set of phrases is more honest. (Which is why these phrases will never been uttered by any politician, ever. Unless I become one… and I don’t see that happening.) Fairness is just a facade used by people to mask their self interest. And our society hates any discernible displays self interest for some illogical reason. (Which is why every model claims it was somebody else that submitted that first, career-launching headshot.)
Whenever you hear one group of people arguing for something on the basis of fairness and you have another group arguing for an opposing thing on the basis of fairness, you can trust that the end result will not be “fair”. There will be a shift in bias in favor of one group, likely at expense of the other. (Or perhaps nothing will happen. Which might be argued as fairer than either option.)
Rest assured if your boss begins discussing things with you in terms of fairness, you’re about to be laid off. Or he’s just eliminated this year’s bonuses. Hey, he can’t afford both his and your bonus this year, and you expecting one in spite of poor corporate performance would be unfair to the shareholders. (Man I love being a independent consultant.) But I digress.
So I move we abolish the terms “fair” and “fairness” from our language, except when referring to the cost of a taxi, or waxing poetic about the aesthetics of a love interest. Straightforwardness and honesty is the best policy. It’s the marker of good management in any business. It should be the hallmark of a great politician.
(Don’t you just love how managed to completely avoid saying inherently political? :) ) | <urn:uuid:35fc9859-c45f-4f65-9e89-471642a6da0f> | {
"date": "2014-07-28T12:19:34",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9564706087112427,
"score": 2.78125,
"token_count": 843,
"url": "http://brianhewitt.wordpress.com/2007/04/28/fairness-fun-with-myth-and-dishonesty/"
} |
Weightlifting has a lengthy history. For many prehistoric tribes, the traditional test of manhood was the lifting of a special rock. Such manhood stones, some with the name of the first lifter incised, exist in Greece and in Scottish castles. The competitive lifting of stones still persists locally in Germany, Switzerland, the highlands of Montenegro, and the Basque region of Spain. In many such events the consecutive number of lifts within a given time period is used to declare a winner.
The origins of modern weightlifting competition are to be found in the 18th- and 19th-century strong men, such as Eugene Sandow and Arthur Saxon of Germany, George Hackenschmidt of Russia, and Louis Apollon of France, who performed in circuses and theatres. By 1891 there was international competition in London. The revived Olympic Games of 1896 included weightlifting events, as did the Games of 1900 and 1904, but thereafter these events were suspended until 1920. In that year, at the suggestion of the International Olympic Committee, the International Weightlifting Federation (Fédération Haltérophile Internationale; FHI) was formed to regularize events and supervise international competition. By 1928 the one- and two-hand lifts of earlier Games had given way to only two-hand lifts: the snatch, the clean and jerk, and the clean and press (described below). The press was abandoned in 1972.
In the Games before World War II, the leading weightlifters were French, German, and Egyptian. After the war American weightlifters were dominant until 1953. Thereafter Soviet and Bulgarian weightlifters held a virtual monopoly on world records and championships. By the late 1990s the leading countries competing in weightlifting were Turkey, Greece, and China. World championships were held in 192223 and from 1937, except during the war years, and European championships were held from 1924 through 1936. A weightlifting competition for women was added to the Olympic Games in 2000. | <urn:uuid:aaf74dac-b2eb-4a44-b5d5-6e50826639f6> | {
"date": "2014-07-28T12:52:00",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9764479398727417,
"score": 3.15625,
"token_count": 409,
"url": "http://britannica.com/olympics/reflections/article-7836"
} |
Brightly colored changes in the color of your tongue may be caused by eating or drinking something that may have stained your tongue, such as soft drinks or candy. The bright colors can be alarming. Stains caused by soft drinks or candy will brush off or wear off.
A buildup of food debris and bacteria on the tongue may make the tongue look thick or furry ("hairy tongue"). A person with a hairy tongue often has severe bad breath (halitosis). Soreness is not usually present. Often the problems will go away if the surface of the tongue is brushed with a soft-bristled toothbrush. If your tongue problem is from some local irritation, such as tobacco use, removing the source of the irritation may clear up the tongue problem. Home treatment may be all that is needed.
Other common causes of tongue problems include:
- Deep grooves (fissures) of the tongue. Although deep fissures on the tongue are often normal, food particles can get stuck in the grooves, causing inflammation and tenderness.
- Lack of certain vitamins or minerals in your diet, especially B vitamins.
- Fungal infections (thrush), which produce white patches on the tongue and inside of the mouth.
- Injuries, such as biting, chewing, piercing, or burning the tongue.
Common tongue problems include:
- Redness and swelling (inflammation) of the tongue (glossitis). Possible causes of glossitis include an allergy or infection, an injury to the tongue, or a nutrition problem. Most cases of glossitis are minor and can be treated at home. Glossitis may change how you chew, swallow, or speak until it goes away.
- Smooth tongue , a condition in which the normal rough surface (papillae) of the tongue shrinks or disappears, making the tongue look bald or shiny and thin. Without this rough surface, the tongue may be tender and sensitive to spicy foods. This problem can occur because of a lack of folic acid, iron, riboflavin, or vitamin B12 in the diet over a long period of time. With good nutrition, symptoms generally improve in 2 to 4 weeks.
- Other changes in the surface of the tongue. Your tongue may look like it has grown hair (hairy tongue) or white fur (furry tongue), or it may look like a road map (geographic tongue) with smooth, bright red areas. Geographic tongue may cause pain or burning.
- Changes in the color of the tongue. Your tongue may look black or strawberry- or raspberry-colored. A bright red tongue that occurs with fever, sore throat, or other symptoms may be more serious.
Rare, but serious, causes of tongue problems can include:
- A severe allergic reaction, causing the tongue to swell. This is an emergency and requires prompt medical evaluation.
- Oral cancer , which can cause a sore on the tongue or a lasting feeling of numbness.
|Primary Medical Reviewer||William H. Blahd, Jr., MD, FACEP - Emergency Medicine|
|Specialist Medical Reviewer||David Messenger, MD|
|Last Revised||July 20, 2012|
Last Revised: July 20, 2012
Author: Healthwise Staff
Medical Review: William H. Blahd, Jr., MD, FACEP - Emergency Medicine & David Messenger, MD
To learn more visit Healthwise.org
© 1995-2013 Healthwise, Incorporated. Healthwise, Healthwise for every health decision, and the Healthwise logo are trademarks of Healthwise, Incorporated. | <urn:uuid:cea728c2-4231-44fb-92db-e8bb115487d5> | {
"date": "2014-07-28T12:21:01",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8841151595115662,
"score": 3.40625,
"token_count": 739,
"url": "http://cancer.dartmouth.edu/pf/health_encyclopedia/sig258564"
} |
The Apostle Peter states in his first letter that Mark is his son.
Saint Mark the Chosen Son
Saint Mark wrote his version of the Gospel based on Saint Peter's spoken testimony. Peter the disciple of Jesus did not write a version of the Gospel, but he is the author of two epistles, both of which are in the New Testament. They were written during the first century, and the first of these epistles mentions Mark. Owing to this biblical Script, it is certain that Saint Mark the Evangelist is the chosen son of Peter the Apostle.
The Man From Galilee Who Became the Stone Foundation
Simon the fisherman lived in Galilee and was dedicated to his daily work when Jesus chose him along with eleven other disciples. He spoke Aramaic, as did all the disciples of Jesus, and with them he followed Jesus everywhere. On one occasion Jesus spoke to Simon and gave him the name Rock, in the spiritual sense of stone.
The Greek translation for stone is Petros, and from the Greek comes the name Peter. It has the spiritual meaning of foundation. On giving Peter the name Rock, Jesus declared that he would build his Church upon this foundation and give him the keys of the Kingdom of heaven.
Peter's Successor: the Keys Contested
Around the sixth century AD a book appeared in Rome with the title liber pontificalis, meaning the book of popes. The exact date of its first publication is unknown, but it has remained until this day the book through which the Vatican claims that papal authority dates back to Saint Peter. According to the liber pontificalis, Peter’s apostolic authority passed at the time of his death to a certain Linus, who is described as Peter’s successor and second in line of the popes.
The liber pontificalis does not recognise any of the biblical apostles – including the four Evangelists Matthew, Mark, Luke and John – as a successor to Saint Peter. Saint Peter’s two epistles, on the other hand, give an account of their own. Peter does not mention Linus in either of them, but in the first letter names only two men as being with him: Silvas, who helped him to write the first letter, and Mark, who Peter calls his son.
Peter’s Two Epistles Prior to the Written Gospel
In the period when Peter sent his two letters to the Church communities to whom they were addressed, the Gospel had still not been written. Peter mentions Paul’s letters, yet he does not allude to a written version of the Gospel, and so it can be reasonably assumed that the four Evangelists began their written work after Peter’s two letters were made known to the faithful.
The first three gospels, those of Matthew, Mark and Luke, are known as synoptic, for they present a correlation in the description of events that took place when Jesus preached the Gospel in Galilee and Judea. It is universally accepted that one of these books formed the basis for the other two that followed.
The first synoptic gospel is traditionally considered to be Matthew’s, followed by those of Mark and Luke, but biblical research has later concluded that the first of the three synoptic gospels is that of Mark. His gospel is by far the shortest, and it is no doubt the original script which Matthew and Luke each later included in their respective presentation and built upon by presenting further information.
From the Apostle Peter’s Second Letter to the Gospel of Saint Mark
In his second letter, Peter informs the faithful that he will do his best to provide a way for them to remember the good message of Salvation. In so doing he makes known his intention concerning the future of the Gospel of Jesus Christ, and it would later become evident that Peter was alluding to a written Gospel.
As no further epistle from Peter appears after this, it is clear that a successor would continue the apostolic work and provide a way for the Church to remember the promise of Salvation in Jesus. The successor would accomplish this by presenting a written book in which the works and words of Jesus are recorded for all generations.
Peter had named Mark in his first letter, and although he did not use the word successor, he wrote of him as his son. The term son is used here to indicate his favourite disciple. The Apostle Paul used the expression my dear son in his two letters to Timothy with the same meaning of favoured disciple.
Saint Mark was not among the original twelve disciples, but he wrote his gospel according to the spoken testimony of Peter the Apostle. His work as Evangelist is the continuation of Peter’s apostolic mission, and so Mark son of Peter can be rightfully considered Peter’s successor.
The Gospel of Mark later became the basis for the Gospels of Matthew and Luke. In this way, the keys of the Kingdom of Heaven which Jesus had conferred upon Simon Peter were transferred – by way of the three synoptic Evangelists – into the written New Testament, to which the Evangelist John later added his gospel.
- gospel according to Matthew
- first and second letter from Peter
- first and second letter to Timothy
Written by D. Alexander
Read also: Saint Mark the Evangelist. The great controversy between the Church of St. Peter and Rome.
Who was Saint Peter's Successor? Is he a pope or an Apostle?
Saint Peter's Primacy from Zion: Do you know that Zion is the Mount where Jesus Christ is the eternal High Priest?
Saint Peter's Successor: Was pope Linus an Apostle or an Evangelist? Or neither? Can he be greater than St. Mark Evangelist who the Apostle Peter called his son?
The First Written Translation of the Gospel: read about the Evangelists who wrote the Gospel that Jesus taught. | <urn:uuid:b777fbaa-35bb-414c-93c4-a111b4683a1b> | {
"date": "2014-07-28T12:20:00",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9749308228492737,
"score": 2.609375,
"token_count": 1198,
"url": "http://celticbritannia.blogspot.com/2011/12/mark-son-of-peter-apostle.html"
} |
I find this EPA graph
Figure 1: Fluctuations in temperature (blue) and in the atmospheric concentration of carbon dioxide (red) over the past 400,000 years as inferred from Antarctic ice-core records. The vertical red bar is the increase in atmospheric carbon dioxide levels over the past two centuries and before 2006. From A. V. Fedorov et al. Science 312, 1485 (2006)17. 18. Reprinted with permission of AAAS19* 18.
Hmm... looks periodic.
I'm not saying there's not a warming trend right now. There does appear to be one. However, we can't get any conclusive evidence that it's caused by human factors (because no one was around 200-300 thousand years ago to make temperature measurements). As far as anyone can tell, we could be in a natural warming trend. It's happened several times before.
What happens if we act on an "unprecedented global scale" and do something drastic to defeat global warming? What if it doesn't work? What would be the economic, social, and ecological impact of a failed attempt, even if the climate change is caused by humans? What if global warming is a natural phenomenon? Could our attempt to reverse a natural phenomenon have adverse consequences on the world's climate? | <urn:uuid:9c17912c-9d5d-49ea-8e9f-aa0500a27b89> | {
"date": "2014-07-28T12:40:59",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9464535713195801,
"score": 3.015625,
"token_count": 266,
"url": "http://channel9.msdn.com/Forums/Coffeehouse/250465-Sun-Warming/2454a80f8bec44809d709dec003d9448"
} |
On March 10, 2010, Governor Doyle signed into law Senate Bill 415, legislation that requires all homes to have carbon monoxide detectors beginning on February 1, 2011.
On February 1, 2011, Wisconsin's new carbon monoxide detector law will go into effect, requiring all homes to have a carbon monoxide detector.
Carbon monoxide is a dangerous, poisonous gas, which cannot be detected by human senses. Dubbed the "silent killer", carbon monoxide claims more than 2,000 lives each year and sends more than 40,000 people to the emergency room in the U.S. alone. At high concentrations, carbon monoxide can be fatal within minutes. Twenty-three other states already have laws requiring carbon monoxide alarms in residential properties.
This new law will expand the current carbon monoxide detector requirements to all one and two-family homes and parallels requirements for smoke alarms for ease of installation. Specifically, this new law will require carbon monoxide alarms to be installed in the basement of the dwelling and on each floor level except the attic or storage area of both newly constructed and existing homes. For new construction, the alarms must be hard-wired in order to be current with national model safety codes. For existing homes, the alarms can be battery operated and can be multi purpose (smoke and carbon monoxide). Dwellings with no attached garages, no fireplaces and no fuel-burning fireplaces are exempted from this requirement.
Similar to the smoke alarm law, the new carbon monoxide detector law does not have a fine or penalty associated with non-compliance. However, all home inspections will be required to check for carbon monoxide alarms. If a carbon monoxide incident happens in your home without the detector, your insurance may not cover the claim. That would be a very scary thought. Be smart and safe!
If you also need a smoke detector, City of Milwaukee residents can call the Smoke Detector Hotline to have fire department personnel come out and install one for them. The hotline number is 414-286-8980. | <urn:uuid:3c7815e3-c59d-45b0-9fdb-26ab1d048460> | {
"date": "2014-07-28T12:22:00",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9184816479682922,
"score": 2.515625,
"token_count": 418,
"url": "http://city.milwaukee.gov/DistrictTwo/Detectors.htm"
} |
Memories of Negro Leagues captured for new documentary, book
Topics: College of Sciences and Humanities, Immersive Learning, College of Communication Information and Media
March 15, 2011
The days of Negro Leagues baseball in Indiana may be over, but a group of Ball State University students is capturing the memories of former players for an upcoming documentary and book.
Under the mentoring of Geri Strecker, a Ball State English professor, 14 students are traveling the state to interview aging Negro Leagues veterans as part of Black Baseball in Indiana, an immersive learning project through Ball State's Virginia B. Ball Center for Creative Inquiry (VBC).
"When we talk about Negro Leagues baseball, we know about the teams in Pittsburgh, Chicago, Kansas City and Birmingham, but Indianapolis' legacy has long been forgotten," said Strecker, who in 2009 rediscovered lost photos of Greenlee Field, home to the Pittsburgh Crawfords — one of the best teams in the Negro Leagues and possibly in all of baseball.
African-American baseball players formed the Negro Leagues when they were not allowed to play in the white-only Major Leagues. The last of the Negro Leagues teams folded in the 1960s, following Jackie Robinson's integration of Major League Baseball almost in 1947 and the gradual acceptance of black players by most teams.
Negro Leagues baseball in the Hoosier state traces its long history to Indianapolis where the first recorded game was played on May 2, 1920, in Washington Park, a baseball stadium located in the vicinity of the current Indianapolis Zoo. The city's best known teams were the Clowns and the ABCs.
The Indianapolis Clowns continued as an exhibition team into the early 1980s, performing a unique brand of baseball, similar to what the Harlem Globetrotters do in basketball.
Strecker, a noted Negro Leagues historian, believes many Hoosiers are unaware of the deep roots the game has in the state.
"Few people know that former Major League home run champion Hank Aaron played for the Indianapolis Clowns at one point early in his career while Anderson's Jumpin' Johnny Wilson, known locally for his high school basketball exploits, was a member of the Chicago American Giants," she said. "It has been decades since the leagues shut down operations, and we are losing former players, managers and coaches every day. This is our opportunity to record their thoughts. "
Student leads documentary team
Zachary Perlinski, a Ball State senior studying telecommunications from Munster, Ind., is the executive producer for an upcoming 30-minute documentary.
"The movie will incorporate the memories of former players into an examination of the impact Negro Leagues baseball had on Indiana and how baseball shaped the players' lives," said Perlinski, who won the seventh annual Fox News Channel College Challenge with a fellow student in 2010 for a television news story on the potential to revitalize economically depressed Gary, Ind.
He is also writing a book chapter focusing on Bush Stadium in Indianapolis and the other remaining Negro League stadiums. Perlinski experienced his first VBC immersion in 2008 as a photographer for the Emmy Award-winning "State of Assault." | <urn:uuid:931f4a00-59bc-43b6-9056-99d6388c12e7> | {
"date": "2014-07-28T12:27:17",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9710687398910522,
"score": 2.671875,
"token_count": 644,
"url": "http://cms.bsu.edu/news/articles/2011/3/memories-of-negro-leagues-captured-for-new-documentary-book"
} |
Oregon Ban on Indian Mascots
Date: 6:00pm - 7:00pm PDT November 6, 2013 PST Location: Miller Hall 102
Miller Hall 102
Schools and professional sports organizations have long used Native American names and images as mascots. The debate about the Washington Redskins and other team mascots still goes on. The use of native names or symbols by non-native people is offensive, demeaning, racist, and a harmful form of ethnic stereotyping. In May 2012, Oregon State Board of Education banned the use of Indian-themed mascots in Oregon public schools. What is the issue with using Indian mascots? How does this ban affect Oregon schools? How is the community responding?
Felicia Garcia (psychology/sociology) and Kelley Villa (American ethnic studies), Willamette University Class of 2014 will come speak about their research project: the Indian Mascot Community Listening Project. The Indian Mascot Community Listening Project was developed to promote dialogue at public high schools affected by the ban. Over a period of nine weeks, they traveled across Oregon to conduct interviews with various stakeholders from three communities. Their results, including a report and a forthcoming workshop, reflect the deeply collaborative nature of their research design. Come hear about their project and initial results! | <urn:uuid:b3f66877-cce5-4cb0-886f-4e96bc4ece35> | {
"date": "2014-07-28T12:29:23",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9519144296646118,
"score": 2.859375,
"token_count": 264,
"url": "http://college.lclark.edu/live/events/21834"
} |
Last month, ccLearn published “Otherwise Open: Managing Incompatible Content in OER“. For those of you who never got around to reading the paper, it basically provides an overview of the problem posed by the incorporation of “all-rights-reserved” materials into otherwise open educational resources (OER). It also explores ways of dealing with this problem and the trade-offs involved in relying on jurisdictional copyright exceptions and limitations, such as fair use or fair dealing. As the paper is intended to spur further inquiry and research globally, “Otherwise Open” does not offer concrete solutions to the problem right now.
However, the average OER creator cannot afford to wait, especially if they value their work as part of a global learning commons. In order for OER to be global, the copyright of the OER must be viable across jurisdictions. OER that are available under a CC license are global, as CC licenses are effective worldwide. But the inclusion of third party content that is not under the same terms of the license changes the global nature of OER, potentially walling it off from use in other countries. Thus, ccLearn has developed some practical recommendations and alternatives for those OER creators who are concerned with the global reach and impact of their works.
“Open Educational Resources (OER) are defined by the use of a Creative Commons license and are generally created by those who would like to share their work globally. However, some creators find the need to consider the costs and benefits of incorporating third-party materials with incompatible licenses into their “otherwise open” OER. This document recommends ways of managing or avoiding the problems that will arise.”
This and all ccLearn Recommendations and productions are licensed CC BY.Comments Off | <urn:uuid:de33a4ad-b90a-403b-91bd-c86408c62dd5> | {
"date": "2014-07-28T12:56:40",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9493244290351868,
"score": 2.5625,
"token_count": 364,
"url": "http://creativecommons.org/tag/restricted-materials"
} |
Burkina Faso is a landlocked country in the heart of the Sahel region of Africa. With most of the economy engaged in agriculture, especially cotton, Burkina Faso's economy is highly susceptible to fluctuations in world commodity prices and natural disasters. Since most farmers engage in subsistence farming, recurring prolonged droughts and severe floods have led to widespread and chronic food shortages. In addition, instability in Mali has led to an influx of refugees, adding to the populations' already vulnerable state. Low levels of education, gender inequality, and the persistence of preventable diseases and malnutrition compromise the country's ability to meet its basic needs.
Latest Stories From Burkina Faso
View all stories »»
See how CRS eases the suffering of refugees with lifesaving clean water, food kits, medicine and other essentials. »»
From Europeans fleeing countries during WWII to Somalis, Syrians and Malians today, the Church works through CRS to protect and advocate for refugees. »»
By providing improved nutrition, a Burkina Faso clinic helps moms enjoy the blessings of two babies. »»
|Population:||18,365,123 (July 2014 est.)|
|Size:||105,869 sq. mi.; slightly larger than Colorado|
Catholic Relief Services was established in Burkina Faso in 1960, following the invitation of the country's bishops. As the first and longest-standing international development organization in the country, CRS began its work by providing humanitarian and food aid to Burkina shortly after its independence from France. In 1962, CRS expanded its mandate, providing education assistance, especially school feeding.
Since that time, CRS has continued to provide humanitarian and food aid, as well as emergency responses to repeated severe droughts. CRS has spent more than half a century implementing programs that support agriculture, education, emergency relief, food security, peace and justice, maternal and child health, HIV and AIDS prevention, nutrition, water and sanitation, and microfinance. | <urn:uuid:bd923276-599a-4d21-bccd-adddab9cefac> | {
"date": "2014-07-28T12:21:19",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9383807182312012,
"score": 3.171875,
"token_count": 409,
"url": "http://crs.org/countries/burkina-faso"
} |
Padding in cryptography means adding a (mostly secret) random set of data to the cryptographic functionality.
In practice and when done correctly, cryptographic padding adds a cryptographic problem and thereby reduces attack vectors because (theoretically) it reduces the success in “guessing” intermediate or final states of the encryption and/or decryption functionality.
The reason why I wrote “when done correctly” is that one of the disadvantages of cryptographic padding is that it could make the plain text of the message susceptible to padding oracle attacks.
Note that I wrote "(theoretically)" as some algorithms were weakened and even broken due to incorrect or missing implementations of cryptographic padding, but there are also ample cryptographic algorithms that can do without cryptographic padding as they use cryptographic approaches that differ from RSA's.
If you want to dive deeper into RSA-related cryptographic padding, take a look at this question and especially it's accepted answer which dives into the practice a bit more.
Note that there's also a nice and more broad description of cryptographic padding available at | <urn:uuid:d4b1ad58-27c6-4edc-87be-efacedb437b9> | {
"date": "2014-07-28T12:41:01",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.930748462677002,
"score": 3.421875,
"token_count": 214,
"url": "http://crypto.stackexchange.com/questions/9106/rsa-padding-what-is-it-and-how-does-that-work?answertab=votes"
} |
Google Earth Helps Power Plants to Stay Cool
According to the U.S. Geological Survey, in the United States more fresh water is now used for thermoelectric power production (41%) than for agricultural irrigation (37%). Major energy producers—like coal-fired power plants, which produce about 40 percent of our electricity—require about 150 billion gallons of fresh water per day to produce the electricity we need. While dry cooling solutions for thermal power plants are still under development, plant operators are looking for nontraditional water sources.
Now, thanks to a Department of Energy-supported project, there’s an app that catalogs in one place different water sources that can be used for electricity production instead of valuable, limited fresh water.
Working under the Office of Fossil Energy’s Innovations for Existing Plants water program, implemented by the National Energy Technology Laboratory, Tulsa-based Arthur Langhus Layne (ALL) Consulting LLC has developed an internet-based geographic information system (GIS) that catalogs nontraditional sources of water for coal-fired power plants.
The GIS application employs a Google Earth interface to allow plant operators to zero-in on alternative sources of water. Called the Alternative Water Source Information System (AWSIS), the application facilitates in-depth analysis of the location and characteristics of available nontraditional water sources.
Here’s how it works. Using the Google Earth interface, the user can select a power plant by clicking on a map symbol or by searching for a specific power plant by plant name or operator. A pop-up balloon displays basic plant information. With another click, the user can get additional plant information and a summary of alternative water sources within a 15-mile radius – which can include abandoned mine pools, oil- and gas-produced water, saline aquifers, or publicly owned treatment plants. If the summary indicates the presence of alternative water sources within 15 miles, clicking a tab will display its available location, volume, and quality. Only flows above 1,000 gallons per minute, which represents about 20 percent of the cooling tower requirement for a 500-megawatt power plant, have been included in the AWSIS database. And to provide the best possible information, AWSIS will be updated as new data becomes available.
Providing the electricity we need while preserving our supplies of fresh water is a challenge. But with AWSIS, meeting that challenge could be just a few clicks away.
Note: Materials may be edited for accuracy, neutrality, length, clarity and style. For further information, please contact the source cited above. | <urn:uuid:41ce5c88-aa34-4c6b-9955-d8def1723621> | {
"date": "2014-07-28T12:22:46",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8906165957450867,
"score": 3.40625,
"token_count": 531,
"url": "http://dailyfusion.net/2013/06/google-earth-helps-power-plants-to-stay-cool-9972/"
} |
AUGUST 2007 GODDESS OF THE MONTH
Selene, Queen of the Starlit Heavens, is the ancient Greek goddess of the moon. She carries the moon across the sky in a white chariot driven by winged horses or bulls. She is the totality of the moon, with its waxing into fullness and waning into darkness. Selene fell in love with a mortal, Endymion. When she descended to the earth to join Endymion, he fell into a deep sleep from which he never awoke. Selene continued to visit him nightly.
In later Greek mythology Selene represented the full moon, while Artemis represented the crescent or waxing moon and Hecate the waning and dark moon; hence Selene is Phoebe, meaning"bright, shining." She is traditionally represented with the crescent moon as a diadem. Selene represents the fullness of life, incorporating all phases of light and darkness in her shining.
From GODDESS KNOWLEDGE CARDS,
Susan Eleanor Boulet Trust.
Text by Michael Babcock.
Published by Pomegranate
Box 6099, Rohnert Park, California 94927 | <urn:uuid:69a0bb28-9911-4446-9ef6-11040dffabd9> | {
"date": "2014-07-28T12:20:59",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9322038292884827,
"score": 2.59375,
"token_count": 243,
"url": "http://daykeeperjournal.com/aarch07/0708aug/goddess.shtml"
} |
There are two primary ways to think about how to multiply decimals. Both of these ways are demonstrated step by step above.
The first method is called estimation. Begin by writing out your original problem. Once you have done this, remove the decimal from the original numbers and multiply them. Then, round any decimal numbers and multiply again. The final step is to place a decimal back into the answer from the second step in the position which makes the result closest to the estimate from the third step.
The second method is called place values. Rewrite each decimal number as a whole number divided by a power of ten. Then multiply the tops and bottoms to get a fraction. The denominator is a power of ten. Finally, move the decimal place over according to which power of ten is in the denominator. | <urn:uuid:c40d3b87-267c-4bac-aadd-523c692a17fa> | {
"date": "2014-07-28T12:21:59",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9391667246818542,
"score": 3.828125,
"token_count": 166,
"url": "http://demonstrations.wolfram.com/DecimalMultiplication/"
} |
There are many myths and misconceptions about refugees. An important fact to remember is that refugees have entered the country legally after having undergone a stringent application and screening process. Also, keep in mind the definition of a refugee is any person who is unable or unwilling to avail themselves of the protection of their country of nationality or habitual residence because of persecution or a well-founded fear of persecution on account of race, religion, nationality, membership in a particular social group or political opinion.
MYTH: Refugees Do Not Pay Taxes.
FACT: Refugees are subject to the same employment, property, sales, and other taxes as any U.S. citizen. Refugees cannot vote, however.
MYTH: Refugees Receive Special Money From The U.S. Government To Purchase Homes, Cars, And Other Items.
FACT: The U.S. Government does not provide refugees with money when they arrive in the U.S., however, there are minimal benefits available for emergency situations and the medically needy. The refugee must apply for these benefits and meet income and resource standards to qualify for any assistance.
MYTH: Refugees Come To The U.S. for Economic Reasons.
FACT: Refugees are individuals or families who have come to the U.S. because they were forced to flee their homeland, many times with little or no belongings, leaving family and friends behind and are unable to return. Most refugees would rather live and work in their native country.
MYTH: The United States Is The Only Country To Accept Refugees.
FACT: There are 24 countries worldwide involved in refugee resettlement. The major resettlement countries include: Australia, Canada, China, France, Germany, United Kingdom, and the United States.
MYTH: It Seems Like Iowa Resettles All Of The Refugees.
FACT: Refugees have resettled in every state and several territories of the United States.. In FFY 2008 of the XX refguees admitted into the U.S. 593 were resettled in Iowa which ranked XX among all states.
MYTH: Refugees Do Not Contribute Or Participate In Society.
FACT: Refugees contribute a great deal to this country through the sharing of their talents, skills, cultures and customs. History indicates that some of our most significant contributors to the U.S. have been refugees and immigrants. And, as noted previously, refugees do pay taxes.
MYTH: Refugees Represent A Health Hazard To The American Public.
FACT: There are refugees who have health problems which area a result of the lack of medical care that existed in their country of origin or due to problems they encountered during their flight from persecution. Most health problems are addressed by health care services in first-asylum camps and in refugee processing centers before refugees are admitted to the United States. The Centers for Disease Control closely monitors all admissions and prevents the admission of certain persons with health conditions identified as hazardous to the public until they are treated an no longer considered to be infectious.
MYTH: Refugees Represent Only A Few Nationality Groups.
FACT: Each year the President and Congress determine the countries of origin and the number of refugees who will be admitted into the United States. During FFY 2008, refugees from 12 different nations came to Iowa.
MYTH: Refugees Are Another Drain On The Welfare System.
FACT: Since Governor Robert Ray started the refugee resettlement program in Iowa, the resettlement philosophy has been that refugees must become self-sufficient as quickly as possible. The Bureau of Refugee Services focuses on placing refugees into jobs that promote economic independence, generate tax dollars and help local economies. The use of welfare-type funds is on a short-term basis.
For comparison purposes, the average Iowan who receives Family Investment Program (FIP) assistance receives benefits for approximately 28 months. The average refugee who is resettled in Iowa that receives FIP assistance receives benefits for less than 6.5 months.
To subscribe to this page's updates, please Log In. | <urn:uuid:d9de3e0a-7974-45eb-831e-7f3313fc8485> | {
"date": "2014-07-28T12:20:10",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.952845573425293,
"score": 3.578125,
"token_count": 814,
"url": "http://dhs.iowa.gov/refugee-services/myths"
} |
Over 70 million Americans suffer from digestive diseases. Digestive disorders can be very painful, and if left untreated can lead into more serious problems. Eating a natural healthy diet will prevent most of these disorders. Tibet Authentic Goji berries have the nutrients and antioxidants to fight the toxins that cause digestive diseases.
Disorders of the Digestive Tract and How Goji Berries Help
- Gastroenteritis is when the digestive tract becomes inflamed and irritated. This will cause abdominal pain, vomiting and diarrhea. The cause is usually toxins such as bacteria, allergens in foods, parasites or drugs. Eating Goji berries will help fight off these toxins and will help prevent this disorder.
- Gastritis is inflammation of your stomach lining. Just like the gastroenteritis, you will experience abdominal pain. Your diet plays a big part in this disease.
With the antioxidants, Goji berries have helped in the treatment of gastritis.
- Ulcers can develop in the stomach, esophagus or small intestines. The cause can be bacterial or by certain pain medications. Ulcers cause a lot of pain and possible bleeding. Stress can aggravate the problem. A special diet and certain medications are usually prescribed. Goji berries have the specific anti-inflammatory SOD enzyme that reduces the inflammation caused by ulcers.
- Irritable Bowel Syndrome is when the muscles in the intestines do not work properly. This can cause abdominal pain, constipation or diarrhea. Stress can also bring on irritable bowel syndrome. A high fiber, low fat diet is usually prescribed. Goji berries help relieve stress, which can help in the prevention of the irritable bowel.
- Gastroesophageal Reflux Disease (GERD) is caused by stomach acid backflow into the esophagus. A weakness in the muscle that acts as a valve between the stomach and the esophagus. This causes what is known as heartburn. The acid can cause major damage to the esophagus if left untreated. Usually people that are overweight suffer from GERD. Goji berries help with weight loss, and along with exercise will help prevent the acid reflux. | <urn:uuid:0c56ddc9-0c32-4b1e-82b5-b63ece7c9d63> | {
"date": "2014-07-28T12:20:03",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9079155325889587,
"score": 2.984375,
"token_count": 440,
"url": "http://diarrheami.blogspot.com/2013/08/goji-berries-help-keep-your-digestive.html"
} |
Pronunciation: (lOO'thur; Ger. loot'ur), [key]
1. Mar•tin Pronunciation: (mär'tn; Ger. mär'tēn), [key] 1483–1546, German theologian and author: leader, in Germany, of the Protestant Reformation.
2. a male given name: from Germanic words meaning “famous” and “army.”
Random House Unabridged Dictionary, Copyright © 1997, by Random House, Inc., on Infoplease. | <urn:uuid:34c807c5-8e1c-4a4b-98f3-5383230ff854> | {
"date": "2014-07-28T12:27:55",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8276294469833374,
"score": 2.6875,
"token_count": 121,
"url": "http://dictionary.infoplease.com/luther"
} |
Choose New File or New Folder from the File menu.
Type the name into the New File or New Folder field.
Click OK or press Return.
To close the New File or New Folder dialog box without creating a new file or folder, click Cancel or press Esc.
There are two other ways to create objects:
Copy an existing object, then rename the copy (see "To Copy a File or Folder").
Create a new file within an application. For example, Text Editor creates a new file when you save a new document. | <urn:uuid:a02da6ba-80a1-49da-8301-f47f3257eb6c> | {
"date": "2014-07-28T12:27:14",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.6597891449928284,
"score": 2.65625,
"token_count": 111,
"url": "http://docs.oracle.com/cd/E19455-01/806-1360/filemanager-73/index.html"
} |
Earlier this week (June 17-21, 2013), parts of Alaska began experiencing temperatures warmer than the daily averages for Hawaii or Florida at this time of the year: Alaska temps soared into the 80s and 90s. A large ridge of high pressure has provided sinking air and plenty of sunshine to help break many record-high temperatures across the state. This heatwave has been ongoing for the past several days. It has brought windy, dry, and warm conditions responsible for wildfires burning now in parts of Alaska, mainly in locations to the east of Fairbanks. This heatwave developed after Alaska experienced below-average temperatures throughout this past spring.
According to Jeff Masters from Weather Underground, there was an unofficial 98°F measured at Bentalit Lodge on Monday, June 17, which would tie the record for the hottest reliably measured temperature in Alaska history. Talkeetna set an all-time high temperature record of 96°F on Monday, June 17, smashing its previous mark of 91°F set a day earlier, and previously set in June of 1969.
Prior to this June heatwave, Alaska had its 20th coolest and 14th wettest May. In fact, Alaska had its 18th coolest March-May since records began in 1918 with a temperature of 1.8 degrees Celsius below the 1971-2000 average. With such a cool and wet start for 2013, the weather has now done a complete 180, and we find unusually warm and dry weather across the region.
Long-range models are indicating that temperatures will likely remain well above average for parts of central and southern Alaska through the beginning of next week, although they will likely not reach the record warmth of this week. Temperatures in Alaska next week are likely to be five to 10 degrees above average. With dry and windy conditions.
There have been a few wildfires developing, mainly east of Fairbanks. On June 18, 2013, the Kanuti fire started in a neighborhood off Chena Hot Springs Road and has burned approximately 120 acres. It appears as if this fire was likely human-caused, but no specifics have been released as of today (June 21). Fortunately, the fire appears to have caused very little damage to homes or businesses.
Bottom line: Record warmth has occurred throughout parts of Alaska this past week (June 17-21, 2013) with a few areas experiencing highs in the 80s and 90s. An unusually large ridge of high pressure has given a large majority of the state plenty of sunshine, very warm temperatures, and gusty winds. The combination of the three caused a few wildfire issues, likely human-caused, primarily to the east of Fairbanks, Alaska. | <urn:uuid:c87cd763-1dd4-4eec-8121-51ef68455ee4> | {
"date": "2014-07-28T12:21:36",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9738216400146484,
"score": 3.0625,
"token_count": 544,
"url": "http://earthsky.org/earth/alaska-is-having-a-record-breaking-heatwave"
} |
Action 40: Member States to implement harmful content alert hotlines
Member States should fully implement hotlines for reporting illegal online content, organise awareness raising campaigns on online safety for children, and offer teaching online safety in schools, and encourage providers of online services to implement self-regulatory measures regarding online safety for children by 2013.
What is the problem? Children are not safe online
Internet has become one of the main distribution channels for material (images, films, audio files etc) depicting sexual abuse of children. Internet Watch Foundation confirmed 1.316 child abuse domains in 2009. The content is becoming worse over years: 44% of the images reported to the largest hotline depict the rape or torture of a child; 70% of the victims are under the age of 10.
More and more European children go online via mobile phones and game consoles. More than 50% of 13-16 year olds go online from their bedroom and more than half of 9-16 year olds have a social networking profile. At the same time, young people are a vulnerable group as they do not always see the risks of their online actions such as sharing personal information online or talking to people they have never met in real life.
Why is the EU action required? Improving children safety online EU-wide coordination is needed
Addressing risks and strengthening the online safety of children is a shared responsibility of individuals as much as of private and public bodies, both at home and globally.
The Commission supports the development of hotlines for reporting illegal online content (see action 36). It also encourages self-regulation by European service providers (see action 37). At the same time, while action in this field should be coordinated at EU level, it has to be implemented at national level. Thus, Member States are expected to provide the necessary financial and political support to Safer Internet Centres in their respective national jurisdictions. They should also develop a strategy on how best to teach online safety in schools.
What will the Commission do?
In 2011 :
Support the Safer Internet Centres established in all Member States and that run hotlines, awareness centres and helplines
Support Teachtoday (website for teachers developed by Industry as part of a pan-European initiative).
Support the development of investigation tools for Child Sexual Abuse investigators, e.g. for image analysis on seized computers
Support INTERPOL in connecting more Member States and countries to the INTERPOL International Child Sexual Abuse Database
Explore ways to involve Member States in the follow up of self-regulatory agreements (such as European framework of safer mobile use by children and younger teenagers and Safer Social Networking principles for the EU)
Adopted a report on the implementation of the 1998 and 2006 recommendations on the protection of Minors (based on a survey amongst the Member States) in September 2011. On basis of this report the Polish Presidency of the Council adopted Council Conclusions on the protection of minors in the digital world, which includes provisions for Member States to act in this field, including on offering teaching online safety in schools
In 2012 :
Launch a benchmarking exercise of safer internet policies and action across Europe including an analysis of the current resources used for these activities and their breakdown between the Commission and Member States
Continue to support the Safer Internet Centres established in all Member States | <urn:uuid:6c18e0d8-8e7a-4d7d-bfde-c5d5d5fabae4> | {
"date": "2014-07-28T13:35:54",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.931934118270874,
"score": 2.734375,
"token_count": 670,
"url": "http://ec.europa.eu/information_society/newsroom/cf/fiche-dae.cfm?action_id=198&pillar_id=45&action=Action%2040:%20Member%20States%20to%20implement%20harmful%20content%20alert%20hotlines"
} |
The ECG in 3D Heart
to Loop to Leads
Why a 3D
3D Heart Instructional Program
3D Heart Instructional program is designed to aid anyone,
(Doctors, Nurses or EMC personal)
in understanding the12 lead ECG.
As automated ECG analysis has become commonplace, mastery of ECG interpretation in medical education programs has diminished markedly. Students must still appreciate the core fundamentals of electrocardiology, but training frequently does not expose many subtleties by often favoring many of the new heart imaging methods. Even some trained cardiologists may find their range of diagnostic interpretations to be somewhat limited when using the standard 12-lead electrocardiogram.
A new method of visual training using 3-D vector analysis makes ECG diagnosis much more intuitive and accurate for students and experienced clinicians alike. An instructional software program has been developed to improve electrocardiology training and provide a useful means to appreciate the spatial understanding of myocardial activation. This offers an easy way to acquire a clear, visual understanding of the sequence by which electrical excitation spreads through both the normal and diseased myocardium. The student becomes keenly aware of the cardiac excitation process through a series of 3D pictures during the excitation process.
The software available for Purchase on this Web site enables one to readily:
diagnose and localize myocardial infarction from the ECG
comprehend relationships between the ECG and associated vectorcardiogram (VCG).
These 3-D images help the user to integrate the standard 12-lead ECG lead signals with the actual electrical excitation process of the myocardium, resulting in a clearer and more accurate visualization and understanding of the biological process.
Many of the world's leading cardiologists have long known that 3-D vector analysis is the only way to truly understand the electrocardiogram.
"The actual teaching of electrocardiography during the last two or three decades has failed because the person trying to learn is expected to memorize the shapes of abstract signals, called deflections, but may not understand their origin…. Accordingly, it is my opinion that the memorization of deflection shapes without understanding them is not the best way to interpret tracings. The best way to interpret tracings is to learn basic principles of electrocardiography, including vector concepts, and apply them to each tracing that is being interpreted. Without such an approach, people who memorize are helpless when they see tracings that they have not seen previously. In addition, unless basic principles - including vector concepts - are used to interpret each tracing, most persons will soon forget the basic principles." J. Willis Hurst, "Current Status of Clinical Electrocardiology With Suggestions for Improvement of the Interpretive Process" American Journal of Cardiology, Vol. 92, Nov.1, 2003.
3D Heart is an interactive instructional software program developed by ECG-TECH that uses a spatial presentation of ventricular activation to provide understanding about the basis for the generation of electrocardiographic waveforms. Using a 35-40 frame movie sequence, 3D Heart provides the user with an animated tutorial of left ventricular activation with text descriptions and vivid illustrations of the electrical activity of the heart and how it relates to the 12-lead ECG. The main screen of 3D Heart features a three-dimensional model of the left ventricle surrounded by three orthogonal planes with the six limb leads and six precordial leads superimposed in their respective planes. The user can control the progress of the movie sequence as well as the orientation of the display using a series of user controls located at the lower right portion of the screen (Figure I).
During the activation sequence, shading is used to represent the wave of depolarization spreading across the ventricle and dipole vectors are calculated during each frame of the animation in a twelve-segment model.2,3 Although the individual dipole vectors are not displayed in this view, the resultant mean vector is shown at each frame in the animation and coordinated with changes in each of the standard twelve leads of the ECG. As the resultant vector sweeps across the ventricle, a vectorcardiogram propagates from the electrical center of the heart and is projected on to each of the three orthogonal planes. The vectorcardiogram is color-coded to reflect different intervals of time (in milliseconds) during the activation sequence. The user has the option to toggle viewing of the text descriptions with a color code illustrative so that the significance of the colors can be understood (Figure II).
The 3D Heart user controls enable a number of different manipulations of the animation sequence to be performed. For example, the user can pause the animation at any time to study the location of the resultant mean vector or advance the activation sequence on a frame-by-frame basis using the available scroll bar. Left clicking the heart model allows the user to rotate it in space to obtain the preferred orientation and right clicking the model allows the user to drag and drop it to another location. By right-clicking in the rightward panel and dragging the mouse cursor in an upward direction, the user can zoom in on the ventricle and then zoom out by dragging in a downward direction (Figure III).
When the animation sequence is complete, the 3D Heart display yields a full vectorcardiogram as well as three distinct vector loops in each of the orthogonal planes (Figure IV). At this point the user can reload the same animation file to play again or load any variety of different animation sequences, each with their own unique electrical pattern arising from normal or abnormal patterns of ventricular activation.
The 3D Heart program contains a variety of different activation simulations. Currently the program enables the user to view the activation simulation for all of the following cases:
- normal activation
- large, medium, and small anterior MI
- large, medium, and small posterior MI
- large, medium, and small inferior MI
Simulations relating to other cardiac abnormalities, such as bundle branch block and left ventricular hypertrophy, will be added in the near future.
1. Pahlm US, OBrien JE, Pettersson J, Pahlm O, White T, Maynard C, Wagner GS; Comparison of teaching the basic electrocardiographic concept of frontal plane QRS axis: A determination using classic versus orderly limb lead displays. Am Heart J 1997;134:1014-1018.
2. Selvester RH, Ideker RE, Wagner GS. Pathological validation of computer model criteria for localizing infarcts in 12 segments of the left ventricle. Proceedings of the 1982 Engineering Foundation Conference on Computerized Interpretation of the Electrocardiogram. New York, Engineering Foundation Press, 1983, pp 127-138.
3. Olson CW, Wagner GS, Warner RA, Selvester RH, ‘A Dynamic Three Dimensional Display of Ventricular Excitation and the Generation of the Vector- and Electrocardiogram’ J Electrocardiol 34: 7 2001
4. Olson CW, Warner RA, ‘The Quantitative 3-Dimensional Vectorcardiogram’ J. Electrocardiol 33: 176 2000
Sales: 631.673.3714 Fax: 631-684-4285
Information Request: E-Mail-
Comments about this site use Contact US for: Charles Olson
Copyright © 2000-2013 ECG-TECH Corporation: all rights reserved
43 Lewis Court, Huntington Station, NY 11746
Site Design by Sound Services, Fairfield, CT | <urn:uuid:7f391457-3d20-4de6-83dc-b78dfa383916> | {
"date": "2014-07-28T12:19:18",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8850005269050598,
"score": 2.546875,
"token_count": 1568,
"url": "http://ecgtech.com/"
} |
The Definition of a MOOC
How do MOOCs differ from other online courses? And are they truly open?
These kinds of questions have been the subject of increasing discussion and disagreement, and to be frank, I suspect it reflects the penchant of intellectuals to complicate matters. Consequently, the definition of a MOOC was in danger of becoming so conditional that it was of no use to anyone.
Thankfully the Oxford Dictionaries Online has weighed into the debate with its own definition:
“a course of study made available over the Internet without charge to a very large number of people: anyone who decides to take a MOOC simply logs on to the website and signs up”
I like this definition because it’s simple and concise. But is it accurate?
To answer this question, I suggest we go back to first principles and review the history of MOOCs, with a view to shedding light on their contemporary incarnation.
A very brief history of MOOCs
While MOOCs (or at least MOOC-like courses) have arguably been around for decades, Dave Cormier is credited with coining the term “MOOC” to describe the Connectivism and Connective Knowledge course delivered by George Siemens and Stephen Downes in 2008. This course was undertaken online, for free, by over 2000 people around the world.
Fast-forward to today, and a proliferation of MOOC providers have emerged including several big players. For example, Coursera offers over 300 MOOCs on its platform, while earlier this year Udacity’s Introduction to Computer Science class attracted over 300,000 students.
Back to first principles
It’s only fair we consider what Dave Cormier himself has to say on the definition of a MOOC. Aside from his blogging and speaking on the topic, he has also uploaded What is a MOOC? to YouTube.
Dave uploaded this clip in 2010. Has the definition of a MOOC changed since then?
Well, let’s consider each component of the acronym separately...
M is for Massive
A MOOC is “massive” because it attracts tens of thousands of participants per intake. For example, the University of Edinburgh’s E-learning and Digital Cultures course which I participated in last January attracted over 40,000 students. They hailed from North and South America, Europe, Africa, Asia, Australia and New Zealand.
While I found the enormity of it all a little overwhelming at first – particularly as the masses swamped the discussion forums – I found that many of them dropped off after the first week or so, while the remainder tended to self-organize into their social media forums of choice. This made the interaction a lot more manageable and enjoyable.
I valued the diversity of thinking that such a large of cohort of participants provided, and I expanded my network of peers significantly. We continue to share our experiences and expertise long after the MOOC has ended.
If a lesser known provider offers an open online course, does that make it massive? Potentially. The scalability of the cloud means it might be massive, but we could only ever know after it had been run.
Technically, then, the massiveness of an open online course is a matter of past tense. Evidently, however, the likes of Coursera, Udacity and edX have well and truly put the M in MOOC.
O is for Open
Open means different things to different people.
According to Dave Cormier, “open” means the work is accessible, participation is free, and the work is shared among all the participants.
Others have emphasized the openness of the educational resources (OERs) on which MOOCs such as CCK08 were based, but that no longer holds true as so many contemporary MOOCs are based on licensed content.
Other commentators have emphasized the openness of the platform’s architecture, but while some MOOC platforms are open source, others most certainly are not.
Regardless of the history then, these days the first O in MOOC has settled on the fact that the course is open to anyone who wishes to participate. MOOCs have no prerequisites, entrance exams, applicant interviews or tuition fees. All you need is an internet connection; and while this in itself may present a barrier to some people, a MOOC by nomenclature is an open online course, not just an open course.
That’s not to say that other barriers don’t exist either. Access is not the same as accessibility, and some people may be challenged by factors such language, digital literacy, bandwidth, firewalls and even national censorship. Notwithstanding the importance of these issues, it’s also important to recognize that at its end, the MOOC provider will not deny anyone from signing up.
O is for Online
The second O in MOOC refers to the fact that the course is delivered over the Internet. This might involve the distribution of video clips and downloadable readings, supplemented by plenary discussions, segregated social media activity, and the occasional synchronous event such as a live chat.
While some elements of the course such as weekly tasks and local meetups occur offline, the bulk of the course is delivered online.
C is for Course
Another candidate for academic argy bargy, to me a course is simply a series of instructional content delivered over a period of time.
This might involve an expert transmitting pre-defined content to the learner as per traditional college lectures and replicated by the so-called xMOOC – but not necessarily.
The so-called cMOOC has the expert seeding the course with provocative content, which the participants then analyze debate, deconstruct and build upon – and in doing so, generate content of their own. Thus the “instruction” is also sourced from peers.
While MOOCs typically run over a fixed time period with a start date and an end date, between which each cohort participates semi-synchronously, I predict this restriction will be lifted. I’d argue the massiveness of a MOOC supports flexible timing at the individual learner’s convenience, as thousands of other people at any one time will be at hand to collaborate with.
Vive la evolution
As the MOOC evolves, so must its definition. What we think of as a telephone today is very different from what we did in the 1800’s, though its essential nature remains the same. Why should MOOCs be any different?
So I think the boffins at Oxford got it right, for now. A MOOC is a course of study made available over the Internet without charge to a very large number of people. Anyone who decides to take a MOOC simply logs on to the website and signs up.
In other words, a MOOC is a massive open online course. And it always will be.
Ryan Tracey is the instructor of The Wide World of MOOCs – a self-paced online course that raises awareness of this popular form of education, and gives you the insight you need to start leveraging MOOCs for your own teaching and learning. | <urn:uuid:1a15211d-2657-4a0b-9ff9-43064fb68efd> | {
"date": "2014-07-28T12:21:25",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9627337455749512,
"score": 2.828125,
"token_count": 1481,
"url": "http://elearningindustry.com/the-definition-of-a-mooc"
} |
In this Harper’s Weekly cartoon, American Federation of Labor president Samuel Gompers begs William Randolph Hearst’s Independence League to move off the campaign trail so that Democratic presidential nominee William Jennings Bryan may pass. The goat symbolizes Hearst’s stubbornness and is a pun on his name (William becomes a billy goat), while the boater hat and high collar reflect his image as a stylish dresser. The parrot on Bryan’s shoulder represents his talkative tendency to repeat hackneyed political phrases. He rides the emblem of the national party, the Democratic Donkey.
Hearst was publisher of the New York Journal and San Francisco Examiner, and was actively involved in the Democratic Party. He was on the left wing of American politics during the 1890s and early-twentieth century, supporting labor unions and attacking large business corporations (“trusts”). He founded the Los Angeles Examiner in 1903 to present news from a union perspective. He endorsed municipal government ownership of utilities and a progressive tax system that imposed higher percentage levies on larger incomes. In 1902, Hearst won election to the first of two consecutive terms in Congress as a Democrat representing Manhattan’s 11th District. Although he introduced progressive-reform bills, Hearst was not interested in the daily routine of lawmaking and set a record for absenteeism, missing 168 of 170 roll calls during his first term. Besides his controversial positions, Hearst was hamstrung by his simultaneous pursuit of both party regularity—working with Tammany Hall and leading the National Association of Democratic Clubs—and political independence.
In 1904, at the age of 41, Hearst finished a distant second to Judge Alton B. Parker in a race for the Democratic presidential nomination. Although the publisher had supported Bryan for president in 1896 and 1900, the Great Commoner had not returned the favor in 1904. The next year, endorsed by the Municipal Ownership League, Hearst ran for the New York mayoralty, losing to incumbent George B. McClellan Jr., a Tammany Democrat. In 1906, Hearst officially began his campaign for the New York governorship on Labor Day (which he urged be designated a national holiday). On September 11, the Independence League (the new name of the Municipal Ownership League) nominated him for governor on a platform of public ownership of utilities, railroad rate regulation, direct election of U.S. senators, and similar reforms. Worried that an independent Hearst candidacy would spell defeat for the Democratic Party, Tammany Hall worked successfully to have the state party nominate him at its September 25 convention. On November 6, he became the only Democrat on the state ticket to lose when Republican Charles Evans Hughes defeated him, 52%-48%. That effectively ended Hearst’s chances of gaining the Democratic presidential nomination in 1908.
In 1908, Gompers urged Hearst to support Bryan, but the publisher refused to endorse a “chameleon candidate” and “a discredited and decadent old party.” Instead, Hearst tried to transform the Independence League into a viable political party. While chairing its national convention in July 1908, the publisher labeled Bryan “a trickster, a trimmer, and a traitor” because the Democrat had backed away from his earlier endorsement of government ownership. The Independence League nominated Thomas L. Hisgen of Massachusetts for president and John Temple Graves of Georgia for vice president. The party platform called for government ownership of utilities and railroads, direct election of U.S. senators and federal judges, an eight-hour workday, the abolition of child labor, a federal department of labor and public health, a graduated income tax, a central banking system, tariff reform, the exclusion of Asian immigrants, and a strong navy.
In September, Hearst concentrated the Independence League’s resources on New York in an effort to hurt Bryan and Democratic gubernatorial nominee Lewis Chanler. Although League presidential nominee Hisgen only polled 2.2% of the state total in November, Hearst’s constant criticisms of Bryan, including the charge that the Democrat had made secret promises to Gompers in return for delivering the labor vote, may have helped Republican William Howard Taft’s standing in New York. In 1909, Hearst again ran for mayor of New York City, finishing last in a three-man race, and the next year lost an independent bid for lieutenant governor. He never ran for office again, but continued to speak out on public issues as he moved to the political right over the years. | <urn:uuid:56196ca1-d31c-470b-90cd-5d3153a5fffa> | {
"date": "2014-07-28T12:19:28",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9603568911552429,
"score": 3.1875,
"token_count": 934,
"url": "http://elections.harpweek.com/1908/cartoon-1908-large.asp?UniqueID=33&Year=1908"
} |
After becoming king in 1715, the young Louis XV, known as the “Beloved”, decided in 1722 to reinstall the government and court in the Château de Versailles, abandoned since the death of Louis XIV. In 1725, he married Marie Leszczinska and fathered an heir to the throne. Passionately interested in science and botany, he enriched the gardens of the Château and commissioned the building of the Petit Trianon palace for his mistress, Madame de Pompadour.
Son of the duc de Bourgogne and Marie-Adelaïde of Savoy, great-grandson of Louis XIV, Louis XV became the Dauphin on the death of his father in 1712, and then king at the age of 5, in 1715, on the death of Louis XIV. His education, directed by the Governor General, Maréchal de Villeroy, and by his tutor, Cardinal de Fleury, developed his interest in the exact sciences, botany, medicine, astronomy, geography and history. His tutor, the duc d’Orléans, Regent of the kingdom, gave him practical training in political affairs. From the age of 10 he attended the government council meetings.
Crowned at Reims in 1722, Louis XV then reinstalled the government and the court at Versailles, abandoned by the state since the death of Louis XIV. While he re-used the apartments of the king for the state functions, he had his own private quarters, designed by the architect Gabriel, where he took refuge from the crowds and the pomp and ceremony of court life.
The King and the royal family
Although Louis XV was betrothed in 1721 to the heiress of Spain, she was subsequently dropped from his matrimonial projects, regarded as too young to provide a royal heir. In 1725, the king married Marie Leszczinska, princess of Poland, who was seven years older than him. The king and queen had ten children, born between 1727 and 1737. Six daughters and one son, the Dauphin, survived into adult age. They spent their childhood in the Prince’s wing, the present Aile du Midi. Then the Dauphin, aged 6, moved into the central part of the Château where apartments were reserved for the successor to the throne on the ground floor. Louis XV picked a convent education for his youngest daughters, which was very fashionable at the time. When they were adults, the daughters of Louis XV lived with him in Versailles, except for the eldest who in 1739 married her cousin, the heir to the Spanish throne who became the duc de Parme. | <urn:uuid:bf20dec3-f7d2-46b8-bafa-674d6c075d8f> | {
"date": "2014-07-28T12:20:42",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9797736406326294,
"score": 3.171875,
"token_count": 576,
"url": "http://en.chateauversailles.fr/history/court-people/louis-xv-time/louis-xv"
} |
Sculptures depicting the heads of Saints Cassius & Florentius in front of the Bonn Minster.
Originally the Minster was the collegiate church of Saints Cassius and Florentius, who were Roman legionaries of the legendary all-Christian Theban Legion. The legion's garrison, according to legend, was in the Egyptian town of Thebes. Roman EmperorMaximianus Herculius ordered the legion to march to Gaul and assist in subduing rebels from Burgundy. At some point during their march, the legion refused to follow the emperor's orders either to kill fellow Christians or to worship Maximianus Herculius as a god. As a result, a large number of legionaries were martyred in Agaunum, now named Saint Maurice-en-Valais after Saint Maurice. According to legend, Saints Cassius and Florentius, who were under the command of Saint Gereon, were beheaded for their religious beliefs at the present location of the Bonn Minster. | <urn:uuid:700f1569-d350-4cb5-980e-b62b9a5cf467> | {
"date": "2014-07-28T13:03:01",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9631986021995544,
"score": 3.03125,
"token_count": 209,
"url": "http://en.wikipedia.org/wiki/Bonn_Minster"
} |
Dickson County, Tennessee
|Dickson County, Tennessee|
Dickson County Courthouse in Charlotte
Location in the state of Tennessee
Tennessee's location in the U.S.
|Founded||Oct. 25, 1803|
|Named for||William Dickson|
|• Total||491 sq mi (1,272 km2)|
|• Land||490 sq mi (1,269 km2)|
|• Water||1 sq mi (4 km2), .29%|
|• Density||88/sq mi (34/km²)|
|Time zone||Central: UTC-6/-5|
Dickson County is home to Tennessee's oldest courthouse built in 1835. This is the 2nd courthouse as the first was destroyed in the Tornado of 1833, destroying all but one building on the square.
October 25, 1803 the Tennessee General Assembly passed a bill creating Dickson County, the 25th of Tennessee's 95 counties. It was formed from parts of Montgomery and Robertson counties, and was named for William Dickson, a Nashville physician then serving in the United States Congress. Dickson never lived in the county, but his relatives were prominent in its early development. Dickson was a close friend of President Andrew Jackson.
General James Robertson built the first iron works in west Tennessee in Dickson County. Robertson sold his furnace in 1804 to Montgomery Bell (1769–1855), who became one of the state's wealthiest capitalists and industrialists.
Prior to the 1920s, numerous private high schools and colleges existed in Dickson County. These included the Tracy Academy, Charlotte Female School, Alexander Campbell School, Edgewood Academy and Normal College, the Dickson Academy, Dickson Normal School (where Hattie Carraway, the first women elected to the U.S. senate, was educated), Glenwylde Academy, and Ruskin Cave College. Most of these closed during the Great Depression of 1929.
The Ruskin Colony and The Coming Nation
The Ruskin Colony (or Ruskin Commonwealth Association) was a 250-member, utopian socialist cooperative established in Dickson County in 1894. Initially located near Tennessee City, it relocated to what is now Ruskin. Internal conflict had brought about the dissolution of the colony by 1899.
The Coming Nation, a socialist communalist paper established by Julius Augustus Wayland in Greensburg, Indiana, was relocated to the Ruskin Colony. It was the forerunner of the Appeal to Reason, which later became a weekly political newspaper published in the American Midwest from 1895 until 1922. The Appeal to Reason was known for its politics, giving support to the Farmers' Alliance and People's Party, before becoming a mainstay of the Socialist Party of America following its establishment in 1901. Using a network of highly motivated volunteers known as the "Appeal Army" to increase its subscription sales, the Appeal's paid circulation climbed to over a quarter million by 1906, and half a million by 1910, making it the largest-circulation socialist newspaper in American history.
U.S. Route 70
In July 1917, A mass meeting was held in the Alamo Theatre in Dickson to raise $760 to pay for the surveying of the Bristol to Memphis Highway through Dickson County. The money was raised in less than 15 minutes by donations from those present at the meeting. State highway surveyors began surveying the route on August 14, 1917. The building of this highway put the county along the route from New York to San Francisco known as the “Broadway of America,” now Highway 70.
Governor Frank G. Clement
On November 4, 1952, Frank G. Clement (1920–1969) of Dickson was elected Governor of Tennessee. He served as governor from 1953 to 1959, and again from 1963 to 1967. Known for his energetic speaking ability, he delivered the keynote address at the 1956 Democratic National Convention. The Hotel Halbrook, where Clement was born, still stands in Dickson, and has been listed on the National Register of Historic Places.
Ruskin Cave is located 8 miles (13 km) northwest of Dickson.
- Montgomery County (north)
- Cheatham County (east)
- Williamson County (southeast)
- Hickman County (south)
- Humphreys County (southwest)
- Houston County (northwest)
State protected areas
- Cheatham Lake Wildlife Management Area (part)
- Hotel Halbrook Railroad and Local History Museum (state historic site)
- Montgomery Bell State Natural Area
- Montgomery Bell State Park
As of the census of 2000, there were 43,156 people, 16,473 households, and 12,173 families residing in the county. The population density was 88 people per square mile (34/km²). There were 17,614 housing units at an average density of 36 per square mile (14/km²). The racial makeup of the county was 93.25% European American, 4.58% Black or African American, 0.40% Native American, 0.27% Asian, 0.01% Pacific Islander, 0.47% from other races, and 1.01% from two or more races. 1.12% of the population were Hispanic or Latino of any race.
There were 16,473 households out of which 35.60% had children under the age of 18 living with them, 58.30% were married couples living together, 11.50% had a female householder with no husband present, and 26.10% were non-families. 22.30% of all households were made up of individuals and 8.90% had someone living alone who was 65 years of age or older. The average household size was 2.59 and the average family size was 3.02.
In the county, the population was spread out with 26.60% under the age of 18, 8.10% from 18 to 24, 30.70% from 25 to 44, 22.90% from 45 to 64, and 11.70% who were 65 years of age or older. The median age was 36 years. For every 100 females there were 96.20 males. For every 100 females age 18 and over, there were 92.90 males.
The median income for a household in the county was $39,056, and the median income for a family was $45,575. Males had a median income of $32,252 versus $23,686 for females. The per capita income for the county was $18,043. About 8.10% of families and 10.20% of the population were below the poverty line, including 12.90% of those under age 18 and 11.80% of those age 65 or over.
By 2005 the county had a population that was 92.0% non-Hispanic white, 4.4% African-American and 1.7% Latino.
- George E. Jackson, "Dickson County," Tennessee Encyclopedia of History and Culture. Retrieved: 26 June 2013.
- "State & County QuickFacts". United States Census Bureau. Retrieved November 29, 2013.
- "Find a County". National Association of Counties. Retrieved 2011-06-07.
- Tennessee Encyclopedia entry on Dickson County history
- Tim Davenport, "The Appeal to Reason: Forerunner of Haldeman-Julius Publications", Big Blue Newsletter No. 3 (2004). Retrieved November 16, 2009.
- John Simkin, "Appeal to Reason," Spartacus Educational. Retrieved: 26 June 2013.
- "US Gazetteer files: 2010, 2000, and 1990". United States Census Bureau. 2011-02-12. Retrieved 2011-04-23.
- "U.S. Decennial Census". Census.gov. Retrieved November 29, 2013.
- Based on 2000 census data
- "American FactFinder". United States Census Bureau. Retrieved 2011-05-14.
|Wikimedia Commons has media related to Dickson County, Tennessee.|
- Official site
- Dickson County Chamber of Commerce
- Dickson County Schools
- Dickson County, TNGenWeb – genealogy resources
- Dickson County at DMOZ
||Houston County||Montgomery County|
|Humphreys County||Hickman County||Williamson County| | <urn:uuid:7f6bf128-24ef-42f7-af7d-f2a25d288a54> | {
"date": "2014-07-28T13:20:55",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9444739818572998,
"score": 3.125,
"token_count": 1728,
"url": "http://en.wikipedia.org/wiki/Dickson_County,_Tennessee"
} |
Erwise was a pioneering web browser, and the first commonly available with a graphical user interface. [3 ] [4 ]
Released in April 1992, the browser was written for
Unix computers running X and used the W3 common access library. Erwise was the combined master's project of four [5 ] Finnish students at the Helsinki University of Technology: Kim Nyberg, Teemu Rantanen, Kati Suominen and Kari Sydänmaanlakka. [6 ] [1 ] [2 ] The group decided to create a web browser at the suggestion of [7 ] Robert Cailliau, who was visiting the university, and were supervised by [8 ] Ari Lemmke.
The development of Erwise halted after the students graduated and went on to other projects.
[2 ] Tim Berners-Lee, the creator of the World Wide Web, travelled to Finland to encourage the group to continue with the project. However, none of the project members could afford to continue with the project without proper funding. [2 ]
Erwise originates from otherwise and the name of the project group, OHT. [8 ] [9 ] [10 ]
History [ edit ]
Extremely pre-documented (in Finnish).
[9 ] Serious coding started around March 1992.
[9 ] Alpha release available by anonymous FTP from info.cern.ch—binaries only (sun4 works, decstation too, display requires motif) as of 15 April 1992.
[9 ] Source code released on www-talk August 92.
Characteristics [ edit ]
The following are significant characteristics of the browser:
It used a multifont text.
[2 ] The links of Erwise browser were underlined. To visit the links you had to double click on the links.
[2 ] Erwise could execute multiple window operation, though the optional single window mode was also available.
Erwise could open local files.
[2 ] Erwise had little English documentation.
Some of the buttons were for features that were not implemented.
Tim Berners-Lee would have continued with the works of Erwise. He could not do so because Erwise was documented in the Finnish language.
Criticism [ edit ]
Erwise crashed on some
Unices, which Berners-Lee attributed to poor Motif implementations. [2 ] [11 ]
See also [ edit ]
References [ edit ]
External links [ edit ] | <urn:uuid:f2f546a2-9df0-491f-98a6-7511bd3a2be8> | {
"date": "2014-07-28T12:32:09",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9483944177627563,
"score": 2.84375,
"token_count": 512,
"url": "http://en.wikipedia.org/wiki/Erwise"
} |
Gulou and Zhonglou (Beijing)
Gulou (Chinese: 鼓楼; pinyin: Gǔlóu), or Drum Tower of Beijing, is situated at the northern end of the central axis of the Inner City to the north of Di'anmen Street. Originally built for musical reasons, it was later used to announce the time and is now a tourist attraction.
Zhonglou (Chinese: 钟楼; pinyin: Zhōnglóu), or Bell Tower of Beijing, stands closely behind the drum tower. Together, the Bell Tower and Drum Tower have panoramic views over central Beijing and before the modern era, they both dominated Beijing's ancient skyline.
Bells and drums were musical instruments in ancient China. Later they were used by government and communites to announce the time. The Bell and Drum towers were central to official timekeeping in China in the Yuan, Ming and Qing dynasties.
The Bell and Drum Towers continued to function as the official timepiece of Beijing until 1924, when the last emperor of the Qing Dynasty was forced to leave the Forbidden City and western-style clockwork was made the official means of time-keeping.
The Drum Tower was built in 1272 during the reign of Kublai Khan, at which time it stood at the very heart of the Yuan capital Dadu. At that time it was known as the Tower of Orderly Administration (Qizhenglou). In 1420, under the Ming Emperor Yongle, the building was reconstructed to the east of the original site and in 1800 under the Qing Emperor Jiaqing, large-scale renovations were carried out. In 1924, Feng Yuxiang removed the official status of the towers, replacing them with western time-keeping methods, and renamed the building "Mingchilou", or the "tower of clarifying shame". Objects related to the Eight-Power Allied Forces' invasion of Beijing and later the May 30 Massacre of 1925 were put on display, turning the towers into a museum. Nowadays, the upper story of the building serves as the People's Cultural Hall of the East City District.
In the 1980s, after much repair, the Bell and Drum Towers were opened to tourists.
The Drum tower is a two-story building made of wood with a height of 47 metres (154 ft). In ancient times the upper story of the building housed 24 drums, of which only one survives. Nearby stands the Bell Tower, a 33-metre-high (108 ft) edifice with gray walls and a green glazed roof.
|Wikimedia Commons has media related to Beijing Drum Tower.|
|Wikimedia Commons has media related to Beijing Bell Tower.|
- Chinaguide.com: The Beijing Drum Tower — 360-degree virtual tour and photographs.
- Kinabaloo.com: The Drum and Bell Towers in Beijing — 30 high quality photographs. | <urn:uuid:35528f88-005f-478d-bdc4-95a61f22a45d> | {
"date": "2014-07-28T13:49:18",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9589614272117615,
"score": 2.75,
"token_count": 615,
"url": "http://en.wikipedia.org/wiki/Gulou_and_Zhonglou_(Beijing)"
} |
The LZO library implements a number of algorithms with the following characteristics:
compression comparable in speed to DEFLATE compression
very fast decompression
requires an additional buffer during compression (of size 8 kB or 64 kB, depending on compression level)
requires no additional memory for decompression other than the source and destination buffers
allows the user to adjust the balance between compression ratio and compression speed, without affecting the speed of decompression
LZO supports overlapping compression and in-place decompression. As a block compression algorithm, it compresses and decompresses blocks of data. Block size must be the same for compression and decompression. LZO compresses a block of data into matches (a sliding dictionary) and runs of non-matching literals to produce good results on highly redundant data and deals acceptably with non-compressible data, only expanding incompressible data by a maximum of 1/64 of the original size when measured over a block size of at least 1 kB. | <urn:uuid:4144def4-b90e-4cfa-b325-bf002001bf6f> | {
"date": "2014-07-28T12:36:41",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8639808297157288,
"score": 2.625,
"token_count": 208,
"url": "http://en.wikipedia.org/wiki/Lempel%E2%80%93Ziv%E2%80%93Oberhumer"
} |
Location of Polotsk
|• Mayor||Uladzimir S. Tachyla|
|• Total||40.77 km2 (15.74 sq mi)|
|Elevation||111 m (364 ft)|
|• Density||2,000/km2 (5,200/sq mi)|
|Time zone||EET (UTC+2)|
|• Summer (DST)||EEST (UTC+3)|
|Postal code||211291, 211400—211402, 211404—211415, 211422|
|Area code(s)||+375 214|
Polotsk (Polatsk, Belarusian: По́лацк, Russian: По́лоцк, Polish: Połock) is a historical city in Belarus, situated on the Dvina River. It is the center of the Polatsk Raion in Vitsebsk Voblast. Its population is more than 80,000 people. It is served by Polotsk Airport and during the Cold War was home to Borovitsy air base.
The Old East Slavic name, Polotesk, is derived from the Polota River (the real meaning of the name is Puolauta and this in the Lithuanian language means 'falling into', i.e., the river which flows into a bigger river), that flows into the Western Dvina nearby. The Vikings rendered that name as Palteskja.
Polotsk is one of the most ancient cities of the Eastern Slavs. The Primary Chronicle listed Polotsk in 862 (as Полотескъ, /poloteskŭ/), together with Murom and Beloozero. However there is debate about this, as some historians believe Polotsk was not yet in existence in the 9th century, and this record was an invention of the compiler. However, an archaeological expedition from the Institute of History of the National Academy of Sciences of Belarus suggests that Polotsk did exist in the first half of the 9th century. The Norse sagas describe the city as the most heavily fortified in all of Rus.
Between the 10th and 12th centuries, the Principality of Polotsk emerged as the dominant center of power in what is now Belarusian territory, with a lesser role played by the Principality of Turov to the south. It repeatedly asserted its sovereignty in relation to other centers of Kievan Rus, becoming a political capital, the episcopal see and the controller of vassal territories among Balts in the west. Its most powerful ruler was Prince Vseslav Bryachislavich, who reigned from 1044 to 1101. A 12th-century inscription commissioned by Vseslav's son Boris may still be seen on a huge boulder installed near the St. Sophia Cathedral. For a full list of the Polotsk rulers, please see the list of Belarusian rulers.
In 1240, Polotsk became a vassal of Lithuanian princes. Grand Duke of Lithuania Vytenis annexed the city by military force in 1307, completing the process which Lithuanian princes had begun in the 1250s. Polotsk received a charter of autonomy guaranteeing that the grand dukes ′will not introduce new, nor destroy the old′. It was the earliest to be so incorporated into the Grand Duchy of Lithuania. By doing so, the Lithuanians manage to firmly grasp the Dvina trade route into their hands, securing an important element for the surrounding economies. The Magdeburg law was adopted in 1498. Polotsk was a capital of the Połock Voivodship of the Polish-Lithuanian Commonwealth until 1772. Captured by the Russian army of Ivan the Terrible in 1563, it was returned to the Grand Duchy of Lithuania just 15 years later.
That period of warfare started the gradual decline of the city. After the first partition of Poland, Polotsk was reduced to the status of a small provincial town of the Russian Empire. During the French invasion of Russia in 1812, it was the site of two battles, the First Battle of Polotsk and the Second Battle of Polotsk.
The city's Cathedral of Saint Sophia in Polotsk (1044–1066) was a symbol of the independent-mindedness of Polotsk, rivaling churches of the same name in Novgorod and Kiev. The name referred to the original Hagia Sophia in Constantinople and thus to claims of imperial prestige, authority and sovereignty. The cathedral had been ruined by the troops of Peter I of Russia. Hence the present baroque building by Johann Christoph Glaubitz dates from the mid-18th century. Some genuine 12th-century architecture (notably Transfiguration Church) survives in the Convent of Saint Euphrosyne, which also features a neo-Byzantine cathedral, designed and built in 1893—1899 by Vladimir Korshikov.
Cultural achievements of the medieval period include the work of the nun Euphrosyne of Polotsk (1120–1173), who built monasteries, transcribed books, promoted literacy and sponsored art (including local artisan Lazarus Bohsha's famous "Cross of Saint Euphrosyne," a national symbol and treasure lost during World War II), and the prolific, original Church Slavonic sermons and writings of Bishop Cyril of Turaw (1130–1182).
The first Belarusian printer, Francysk Skaryna, was born in Polotsk around 1490. He is famous for the first printing of the Bible in an East Slavic language (in Old Belarusian) in 1517, several decades after the first-ever printed book by Johann Gutenberg and just several years after the first Czech Bible (1506).
In September 2003, as "Days of Belarusian Literacy" were celebrated for the 10th time in Polotsk, city authorities dedicated a monument to honor the unique Cyrillic Belarusian letter Ў, which is not used in any other Slavic language. The original idea for the monument came from the Belarusian calligraphy professor Paval Siemchanka, who has been studying Cyrillic scripts for many years.
- Euphrosyne of Polatsk
- Rogneda of Polotsk
- Vseslav of Polotsk
- Sofia of Minsk, Queen of Denmark
- Andrei of Polotsk
- Symeon of Polotsk
- Francysk Skaryna
- Mary Antin
- Gabriel Lenkiewicz
- "World Gazetteer". Archived from the original on 2013-01-11.
- Occidental spelling according to the Belarus Permanent Mission to the United Nations.
- Occidental spelling according to the official Belarus website.
- Occidental spelling according to "Nations Online" website.
- Spelling according to Google Maps.
- polotskgik.by - City
- Wladyslaw Duczko.Viking Rus: Studies on the Presence of Scandinavians in Eastern Europe. 2004, p.126
- Archaeologists have won the dispute in the ancient chronicles of the earlier date base of Polotsk[dead link]
- The New Cambridge Medieval History: c. 1300-c. 1415. p.706
- The New Cambridge Medieval History: c. 1300-c. 1415. pp.769-770
- Savelyev, Yu. R. Vizantiysky stil v architecture Rossii (Савельев, Ю. Р. Византийский стиль в архитектуре России. - СПБ., 2005) Saint Petersburg, 2005. ISBN 5-87417-207-6, p.260
- Bandy at Bandy2008
|Wikimedia Commons has media related to Polatsk.|
- Official site of the city of Polack - Официальный сайт города Полоцка
- Polotsk Chat Forum
- Photos on Radzima.org
- Polotsk historic images
- Weather Polotsk | <urn:uuid:d7e610da-37db-4179-b55b-dc704bcb4c96> | {
"date": "2014-07-28T12:37:03",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8892179727554321,
"score": 2.625,
"token_count": 1792,
"url": "http://en.wikipedia.org/wiki/Polatsk"
} |
A Block II GPS satellite
|Operator||US Air Force|
|Mission duration||7.5 years (planned)|
|Spacecraft type||GPS Block II|
|Launch mass||840 kilograms (1,850 lb)|
|Start of mission|
|Launch date||11 December 1989, 18:10:01UTC|
|Rocket||Delta II 6925, D190|
|Launch site||Cape Canaveral LC-17B|
|End of mission|
|Deactivated||23 February 2005|
|Perigee||20,009 kilometres (12,433 mi)|
|Apogee||20,357 kilometres (12,649 mi)|
USA-49, also known as GPS II-5 and GPS SVN-17, was an American navigation satellite which formed part of the Global Positioning System. It was the fifth of nine Block II GPS satellites to be launched, which were the first operational GPS satellites to fly.
USA-49 was launched at 18:10:01 UTC on 11 December 1989, atop a Delta II carrier rocket, flight number D190, flying in the 6925 configuration. The launch took place from Launch Complex 17B at the Cape Canaveral Air Force Station, and placed USA-49 into a transfer orbit. The satellite raised itself into medium Earth orbit using a Star-37XFP apogee motor.
On 11 January 1990, USA-49 was in an orbit with a perigee of 20,009 kilometres (12,433 mi), an apogee of 20,357 kilometres (12,649 mi), a period of 718 minutes, and 54.9 degrees of inclination to the equator. It operated in slot 3 of plane D of the GPS constellation. The satellite had a mass of 840 kilograms (1,850 lb), and generated 710 watts of power. It had a design life of 7.5 years, and ceased operations on 23 February 2005.
- Krebs, Gunter. "GPS-2 (Navstar-2)". Gunter's Space Page. Retrieved 10 July 2012.
- "Navstar 2-05". US National Space Science Data Center. Retrieved 10 July 2012.
- McDowell, Jonathan. "Launch Log". Jonathan's Space Page. Retrieved 10 July 2012.
- McDowell, Jonathan. "Satellite Catalog". Jonathan's Space Page. Retrieved 10 July 2012.
- McDowell, Jonathan. "Launch List". Launch Vehicle Database. Jonathan's Space Page. Retrieved 10 July 2012.
- Wade, Mark. "Navstar". Encyclopedia Astronautica. Retrieved 10 July 2012.
|This article about one or more spacecraft of the United States is a stub. You can help Wikipedia by expanding it.| | <urn:uuid:8a1df3a9-9b28-41de-b241-9455c02736b2> | {
"date": "2014-07-28T12:47:04",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8154129981994629,
"score": 2.796875,
"token_count": 569,
"url": "http://en.wikipedia.org/wiki/USA-49"
} |
(Aublet) J.F. Gmelin
~40 species. See text
Uncaria is a genus of flowering plants in the family Rubiaceae. It has about 40 species. Their distribution is pantropical, with most species native to tropical Asia, three from Africa and the Mediterranean and two from the neotropics. They are known colloquially as Gambier, Cat's Claw or Uña de Gato. The latter two names are shared with several other plants. The type species for the genus is Uncaria guianensis.
Indonesian Gambier (U. gambir) is a large tropical vine with leaves typical of the genus, being opposite and about 10 cm (3.9 in) long. The South American U. tomentosa is called Uña de Gato. Uncaria sinensis is common in China.
Uncaria was named in 1789 by Johann von Schreber in his Genera Plantarum edition 8[a] (not to be confused with books of the same title by Linnaeus, Jussieu, and others). The genus name is derived from the Latin word uncus, meaning "a hook". It refers to the hooks, formed from reduced branches, that Uncaria vines use to cling to other vegetation.
Woody lianas; climbing by hooks formed from reduced, modified branches. Stipules entire or bifid. Inflorescence a compact head, terminal, at the ends of plagiotropic branches and their very reduced branches. Corolla lobes without appendages. Seeds with a long wing at each end, the lower wing deeply bifid.
The following species list may be incomplete or contain synonyms.
Cat's claw (U. tomentosa) and the Chinese species are used medicinally. The glycosidic compounds have recognized anti-inflammatory properties, while the alkaloids increase the reactivity of lymphocytes, granting higher response to viral infection. Cat's claw has two varieties depending on whether the alkaloids have four rings or five. The five-ring alkaloid variety is medicinal and is called "savéntaro" by the Asháninka. Diplomat Edmund Roberts noted that upon his visit to China in the 1830s, Chinese were using it for tanning, and noted that the uncaria gambir made "leather porous and rotten." He also noted that Chinese would chew it with areca nut.
Gambier (U. gambir) is used in Indonesia for chewing with areca and betel, for tanning, and for dyeing. It contains many flavan-3-ols (catechins) which are known to have many medicinal properties and are components of Chinese herbal remedies and certain modern medicines. To make gambier, the leaves are first boiled in water. They absorb it and turn brownish in color. The leaves are then pressed mechanically to squeeze and extract liquid. This liquid is then dried into a semi-solid paste and molded into cubes, which are dried in the sun. Gambier is generally packed in 50 kilogram multilayered packing (PP Bags inside and gunny bags outside).
- Uncaria At: World Checklist of Rubiaceae At: Kew Gardens Website. (see External links below).
- David J. Mabberley. 2008. Mabberley's Plant-Book third edition (2008). Cambridge University Press: UK. ISBN 978-0-521-82071-4
- Uncaria In: Index Nominum Genericorum. In: Regnum Vegetabile (see External links below).
- Uncaria in International Plant Names Index. (see External links below).
- Johann Schreber. 1789. Gen. Pl., ed. 8[a]. (Genera Plantarum Eorumque Characteres Naturales Secundum Numerum, Figuram, Situm, & Proportionem Omnium Fructificationis Partium. (Ed. 8[a])). volume 1, page 125. Frankfurt am Main, Germany(see External links below).
- Umberto Quattrocchi. 2000. CRC World Dictionary of Plant Names volume IV. CRC Press: Boca Raton; New York; Washington,DC;, USA. London, UK. ISBN 978-0-8493-2673-8 (set).
- Ulrika Manns and Birgitta Bremer. 2010. "Towards a better understanding of intertribal relationships and stable tribal delimitations within Cinchonoideae s.s. (Rubiaceae)". Molecular Phylogenetics and Evolution 56(1):21-39. doi:10.1016/j.ympev.2010.04.002
- Colin E. Ridsdale. 1978. "A revision of Mitragyna and Uncaria (Rubiaceae)". Blumea 24(1):43-100.
- Roberts, Edmund (1837). Embassy to the Eastern Courts of Cochin-China, Siam, and Muscat. New York: Harper & Brothers. p. 138.
- Lin RD, Hou WC, Yen KY, Lee MH (November 2003). "Inhibition of monoamine oxidase B (MAO-B) by Chinese herbal medicines". Phytomedicine 10 (8): 650–6. doi:10.1078/0944-7113-00324. PMID 14692725.
- "Chemical from tropical flower latest weapon against wrinkles". The Daily Telegraph. February 6, 2011. Retrieved January 7, 2011.
|Wikimedia Commons has media related to Uncaria.|
- Uncaria At: Search Page At: World Checklist of Rubiaceae At: Index by Team At: Projects At: Science Directory At: Scientific Research and Data At: Kew Gardens
- Uncaria At:Index Nominum Genericorum At: References At: NMNH Department of Botany At: Research and Collections At: Smithsonian National Museum of Natural History
- Uncaria At: Plant Names At: IPNI
- Uncaria In: Volume 1 Of: Genera Plantarum edition 8[a] (Schreber)] At: Google books
- Uncaria At: List of Genera At: Rubiaceae At: List of families At: Families and Genera in GRIN At: Queries At: GRIN taxonomy for plants
- Uncaria At: Naucleeae In: ··· Embryophyta At: Streptophytina At: Streptophyta At: Viridiplantae At: Eudaryota At: Taxonomy At: UniProt
- Flora of China: Uncaria checklist
- Cat's claw medicinal properties | <urn:uuid:58bb38ec-fbf3-46aa-b2fd-bd0a700c95e2> | {
"date": "2014-07-28T12:57:26",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.7498024702072144,
"score": 3,
"token_count": 1422,
"url": "http://en.wikipedia.org/wiki/Uncaria"
} |
on considering the circumstances of that experiment, I have remarked a cause of compensation which must render the effect of the motion imperceptible. This cause consists in the reflexion which the light undergoes in that experiment; in fact it may be demonstrated, that when two rays have a certain difference of course, that difference is changed by the effect of the reflexion upon a mirror in motion. On calculating separately the two effects in the experiment of M. Babinet, it is found that they have values sensibly equal with contrary signs.
This explanation renders still more probable the hypothesis of an alteration of velocity, and an experiment made with water in motion appears to me completely appropriate to decide the question with certainty.
The success of the experiment seems to me to render the adoption of Fresnel's hypothesis necessary, or at least the law which he found for the expression of the alteration of the velocity of light by the effect of motion of a body; for although that law being found true may be a very strong proof in favour of the hypothesis of which it is only a consequence, perhaps the conception of Fresnel may appear so extraordinary, and in some respects so difficult, to admit, that other proofs and a profound examination on the part of geometricians will still be necessary before adopting it as an expression of the real facts of the case. — Comptes Rendus, Sept. 29, 1851. | <urn:uuid:6773b267-359b-4591-ae3c-5e49055470e3> | {
"date": "2014-07-28T13:19:45",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.956287145614624,
"score": 2.53125,
"token_count": 283,
"url": "http://en.wikisource.org/wiki/Page:1851_Fizeau_en.djvu/6"
} |
These games typically involve dealing cards from a shuffled deck into a prescribed arrangement on a tabletop, from which the player attempts to reorder the deck by suit and rank through a series of moves transferring cards from one place to another under prescribed restrictions.
Solitaire has its own terminology; see solitaire terminology.
There are many different solitaire games, but the term "Solitaire" is often used to refer specifically to the most well-known form of the game, properly called "Klondike". Klondike and some other solitaire games have been adapted into two-player competitive games.
There are a vast array of variations on the solitaire/patience theme, using either one or two decks of cards, and with rules of varying complexity and skill levels. Many of these games have been converted to electronic form and are available as computer games. A basic form of Klondike solitaire comes with every installation of Microsoft Windows, for example. A two-deck electronic example is Arachnid Solitaire.
The term 'solitaire' is also used for single-player games of concentration and skill using a set layout of tiles[?], pegs or stones rather than cards. These games include:
Examples of solitaire card games:
(A list of 206 games was extracted from PySol[?] version 4.80). | <urn:uuid:99834421-71dc-40cb-8fb7-51699a75c8e2> | {
"date": "2014-07-28T12:26:31",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9516392350196838,
"score": 2.703125,
"token_count": 275,
"url": "http://encyclopedia.kids.net.au/page/so/Solitaire?title=Auld_Lang_Syne"
} |
<p>Green tree pythons were once known by the name <em>Chondropython viridis</em> and was placed in its own genus. When scientists noticed the similarities with Australian and New Guinea carpet pythons, it was placed in the genus <span class="taxon"><em>Morelia</em></span> and given the scientific name <span class="taxon"><em>Morelia viridis</em></span>. In the pet trade, however, green tree pythons still go by the nickname “chondro” and this is unlikely to change soon.<span> (Bartlett, 1995; Ross and Marzec, 1990)</span></p> <p>There can be considerable variation in color and patterning in green tree pythons. Because of this, some herpetologists and many hobbyists in the pet trade separate the species into variants or races. These include the Aru, Sorong, Biak, and Yapen. While these races aren’t recognized currently, additional research may suggest these variations warrant subspecies or species status.<span> (O'Shea, 2007)</span></p> <p>Green tree pythons are often mentioned in discussions of convergent evolution in reptiles. This is because <span class="taxon"><em>Morelia viridis</em></span> shares similar ecology and morphology with <span class="taxon"><em>Corallus caninus</em></span>, despite their relatively distant common ancestry. Both species live in tropical rain forest habitats and are arboreal ambush predators. They exhibit similar diets and switch from a diurnal lifestyle as juveniles to a nocturnal lifestyle as adults. Green tree pythons and <span class="taxon"><em>Corallus caninus</em></span> also share the same resting and hunting postures and, remarkably, both species undergo ontogenetic color change from a red or yellow juvenile to a bright green adult. This can make it quite difficult to differentiate between the two species. One of the few ways to tell them apart is the position of the labial pits. In <span class="taxon"><em>Corallus caninus</em></span>, the pits are on the upper and lower lip. Green tree pythons only have labial pits on the upper lip surface. <span class="taxon"><em>Corallus caninus</em></span> are found in the tropical rainforests of South America.<span> (Bartlett, 1995; Torr, 2000; Wilson and Heinsohn, 2007; Wilson, Heinsohn, and Wood, 2006)</span></p>
- O'Shea, M. 2007. Boas and Pythons of the World. Princeton, New Jersey: Princeton University Press.
- Wilson, D., R. Heinsohn, J. Wood. 2006. Life-history traits and ontogenetic colour change in an arboreal tropical python, Morelia viridis. Journal of Zoology, 270: 399–407.
- Ross, R., G. Marzec. 1990. The Reproductive Husbandry of Pythons and Boas. Des Moines, Iowa: Garner Printing, Inc..
- Bartlett, R. 1995. Popular Pythons and Boas: Complete guide for owners of larger snake species. Mission Viejo, California: Bowtie Press.
- Wilson, D., R. Heinsohn. 2007. Geographic range, population structure and conservation status of the green python (Morelia viridis), a popular snake in the captive pet trade. Australian Journal of Zoology, 55: 147-154.
- Torr, G. 2000. Pythons of Australia: A Natural History. Malabar, Florida: Krieger Publishing Company. | <urn:uuid:b121d844-a4d0-4025-bf84-3cc4eccfe718> | {
"date": "2014-07-28T12:34:15",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.815553605556488,
"score": 3.5,
"token_count": 795,
"url": "http://eol.org/data_objects/12712695"
} |
The life cycles of the three most frequent amphipod species of the shallow waters of Kiel Bay (western Baltic Sea) were studied by evaluating their length-frequency distributions and percentages of gravid females over a15-month period. B. sarsi has two generations per year. The first one hatches in late spring and reproduces insummer. Its offspring overwinters and closes the cycle by breeding in spring. The reproductive phase in the population lasts from May to November; the minimum temperature for reproduction is about 6 C. M. gryllotalpa has a life cycle similar to that of B. sarsi, but less pronounced breeding periods and a shorter reproductive phase (end of June to October). C. insidiosum produces three generations per year during theperiod from end of April to beginning of November. Reproduction culminates in late spring/mid-summer, and to a lesser degree, in autumn. In the last two species variation in sex ratio shows a relationship to thereproductive cycle. | <urn:uuid:4a2fbf74-52be-4e38-bb5b-50b4245d19fc> | {
"date": "2014-07-28T12:34:22",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9316614270210266,
"score": 2.640625,
"token_count": 208,
"url": "http://epic.awi.de/5302/"
} |
Gibbs, Graham R. (1999) Learning how to learn using a virtual learning environment for philosophy. Journal of Computer Assisted Learning, 15 (3). pp. 221-231. ISSN 02664909Metadata only available from this repository.
Many students find theoretical subjects hard and challenging. Although they may pass modules in the subject, they often fail to attain a deeper, conceptual understanding. coMentor, a virtual learning environment on the WWW was developed to support such conceptual subjects by providing facilities for debate, discussion, groupwork, resource sharing and vicarious learning. The system was evaluated with undergraduates taking a philosophy module. Although there was no unequivocal evidence of gains in final assessment in those using the system, there was evidence of other forms of learning. Students learned from seeing each other's work, from having to 'write' down their ideas and share them with others and they adopted learning styles that were beneficial to learning a theoretical subject matter. Using a Learning Styles Inventory Scale, those using coMentor showed higher levels of deep learning and significantly higher levels of strategic learning than those who used the system little.
|Subjects:||L Education > LB Theory and practice of education|
B Philosophy. Psychology. Religion > B Philosophy (General)
Q Science > QA Mathematics > QA75 Electronic computers. Computer science
|Schools:||School of Human and Health Sciences|
|Depositing User:||Sara Taylor|
|Date Deposited:||09 Jan 2009 13:55|
|Last Modified:||09 Jan 2009 13:55|
Item control for Repository Staff only: | <urn:uuid:e4ae825f-c6ac-46c8-bd31-09907bf12ccb> | {
"date": "2014-07-28T12:27:53",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9031362533569336,
"score": 3.0625,
"token_count": 339,
"url": "http://eprints.hud.ac.uk/3065/"
} |
These specialists use specific tests and exams to answer your doctor's questions based on your child's size, health and other needs. The machines can be scary or loud for children, so our staff makes your child as comfortable as possible. They work only with children and are well-trained and experienced in comforting patients and distracting them during exams.
You will be referred to our pediatric radiologists by your primary care doctor, a Children's Hospital specialist or another hospital.
Sedation is sometimes required for tests that require children to stay perfectly still for a long amount of time. Because we only treat children, our sedation team knows how to tailor sedation plans for patients of all ages and sizes.
Magnetic resonance imaging (MRI) is a safe and painless test that uses a magnetic field and radio waves to produce detailed pictures of the body's organs and structures. An MRI does not use radiation.
Your child will lie down on a table that is slid into a large donut-shaped magnet. During the test, the tunnel picks up the positions of the atoms in the body and analyzes them. The result is a clear, cross-sectional image of the body. It can be converted into 3-D pictures of any particular body part. The pediatric radiologists will read the results and send their discoveries to your doctor.
MRIs can be used to detect problems with the brain, spine, skeleton, chest, lungs and joints. It is particularly helpful in diagnosing problems with the eyes, heart, ears and circulatory system.
The MRI machine sometimes makes loud knocking and buzzing noises. Help your child prepare by telling them what will happen and that you will be nearby during the test.
You may be referred to a pediatric radiologist by your child's pediatric gastroenterologist for a fluoroscopy. Your child will drink a white b liquid called barium. The radiologist will do an X-ray of the barium moving through the digestive system. A fluoroscopy can help find the cause of unexplained vomiting, nausea, stomach pain and indigestion. You will receive specific instructions before the fluoroscopy is performed. These guidelines depend on your child's age and will involve him not eating for a period of time before the test.
An ultrasound uses soundwaves instead of radiation to take images of the inside of the body. Ultrasounds may be ordered to find out more about bladder, stomach, kidney, head and pelvic problems. The procedure will take place in a dimly lit room with a large TV screen in it. The radiology staff member will put lotion on the spot to be imaged, then hold a camera to that spot. He will move it around and take pictures at each spot. The procedure is not painful. | <urn:uuid:6a67d2f0-a832-4e25-ad1d-33d5206b1238> | {
"date": "2014-07-28T12:21:27",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.93751060962677,
"score": 2.890625,
"token_count": 561,
"url": "http://etch.com/services_specialties/specialties/pediatric_radiology.aspx"
} |
Zebra mussels (Dreissena polymorpha
) are native to large parts of Europe
, but are exotic species
in North America
. They were first identified in North America in 1988 in Lake St. Clair (between lakes Erie
). In 1991, a second species was identified in Lake Ontario: the quagga mussel (Dreissena bugensis
The zebra mussel was likely introduced to North America via the ballast water of large transport ships. It is thought (partly as a result of genetic evidence) that the zebra mussels now present in North America were from populations in the southern part of their native range; most likely, from the Black Sea. In North America, they have successfully invaded all of the Great Lakes, the St. Lawrence River, the Mississippi river and countless other bodies of freshwater in the northern U. S. and southern Canada.
They are small creatures (maximum size of about 35 mm) that are mostly sessile. They do move (very slowly), but spend most of their time attached to some hard substrate. They remain attached by secreting an adhesive protein mixture from their byssus (foot). Their life cycle differs from native bivalves in that their larval stage (called the veliger stage) is not parasitic, but rather herbivorous. Thus, they are capable of incredible rates of reproduction, given that their life cycle is not dependent on the success of another species. They also have nearly no predators in North America, and as such are able to expand their populations at a nearly geometric rate*.
The impact of zebra mussels on North American ecosystems is extreme. They severely damage native species in two manners. The first is by direct interference; one of the preferred attachment sites for adult zebra mussels is native unionid mussles, which are almost uniformly endangered species. The high rate of flow created by these powerful filter feeders makes their shells perfect locations for zebra mussels, since the food literally comes right to them. However, they tend to attach in such numbers as to kill the native species in a very short period of time. The second impact the zebra mussels have on native species is due to their huge numbers (populations can reach sizes of ~5000 individuals per m2). They can clear the water column in shallow lakes several times per day, and thus consume huge amounts of algae. This takes the biomass from the pelagic zone and transfers it to the benthic zone. As such, zooplankton are heavily disadvantaged, and fish species such as lake trout, walleye, rainbow trout and others that feed in the offshore areas tend to go into decline. However, the mussels produce a copious amount of nutrient rich pseudofaeces, which is a valuable food resource to benthic invertebrates. As such, near shore fish species are favoured, and populations of bass, pike and yellow perch can actually increase in numbers.
North America was recently invaded by three species of gobies
from the same region as the zebra mussels. These fish have a hard, bony upper palate
and are molluscivores. They eat zebra mussels at a remarkable rate, and thus may help to control the exploding populations. However, research has shown that they only eat the juvenile stages, and thus will not be able to control the mussels completely. Also, they are driving another suite of native species into extinction: the sculpin | <urn:uuid:61bd66f3-7f6b-4cc3-9a0b-75f28c46b582> | {
"date": "2014-07-28T12:49:14",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9652876257896423,
"score": 4,
"token_count": 718,
"url": "http://everything2.com/title/Zebra+Mussel?showwidget=showCs1047360"
} |
A knitted, unbleached cotton fabric used in making underwear or hosiery.
The fabric is named after the town of Balbriggan, a coastal town near Dublin in Northern Ireland.
Balbriggan itself has a much shorter history than many of the neighboring villages. In the Civil Survey of 1656 it consists of just 2 farmsteads, those of Nicolas Barnewall and Peter Barnewall. The census of 1659 boasts a total of just 30 living souls.
The next century saw the waning of the Barnewalls and the advent of the Hamilton family. The period of 1761-1765 saw numerous improvements. The Baron Hamilton saw potential in Balbriggan and invested, in conjunction with Parliamentary grants, in developing a harbor which included 600 feet of harbor wall making it suitable for the anchorage of larger vessels. The Baron also developed a fishing fleet numbering 23 vessels, each manned by a crew of 7. The year 1769 saw the addition of a lighthouse and a northern jetty between 1826-1829 completed the harbor.
The 1780s saw the addition of 2 large cotton mills which were powered via millrace
s from the local stream. It was noted in 1837 that upwards of 300 people were employed by the mills in addition to 942 hand loom
s in the village serving the weaving departments.Some of the crafts required in service of the town's thriving industry were weavers, smiths, tailors, brewers, butchers, tanners, and spinners. The town was also still a center of shipping via the harbor, boasted a saltworks, and a large corn storage facility.
All good things must come to an end
The withdrawal of the fishing bounty saw the drastic shrinking of the local fishing fleet by 1837. The mills saw a decline by 1838, and that, along with a diversion of the great northern roadway, spelled lean times for the once thriving village. Still and all, the 1841 census showed Balbriggan far outstripping the other villages of the region, namely Balrothery and Balscadden, which had once eclipsed humble little Balbriggan.
Balbriggan fared better than her rural neighbors. Destitute persons and entire families came to Balbriggan in the hope of finding sustenance. Discussions were held concerning the establishment of workhouses to meet the desperate needs of the wandering and homeless poor. Little did anyone expect that just ahead lay one of the great tragedies of history, the Irish Potato Famine.
Balbriggan today has seen a renaissance. It has become a tourist destination with Ardgillan Castle, the Martello Tower, and the Balbriggan Lighthouse along with the scenic beauty of the area. | <urn:uuid:c19ac7ea-79cd-4124-a73d-e9994579d2bc> | {
"date": "2014-07-28T12:31:44",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9629136323928833,
"score": 3,
"token_count": 567,
"url": "http://everything2.com/title/balbriggan?author_id=1853982"
} |
I have a 10-year-old cousin who is very curious about the world, and physics in particular. When his mother sent me two very interesting questions that he asked about black holes, I had fun coming up with some answers for him. His questions and my answers are reproduced below. (Yes, some of the language isn’t quite as precise as it should be, but I intentionally glossed over a few details. Hopefully I didn’t say anything wrong as a result.)
If a black hole “sucked in” only photons, would it increase in mass?
Photons “die” when they interact with something, but if they do die, then what are they interacting with in the black hole?
These are two great questions, and I had fun coming up with answers to them. I gave a short answer, but any good physics question brings up a lot of related ideas, so I also put a longer answer that brings up some other ideas.
Yes. Einstein taught us that energy and mass are two aspects of the same thing. Even though the photons are massless on their own, their energy can increase the mass of the black hole when they are absorbed. The event horizon prevents any information from escaping a black hole, so we can’t know exactly what the photon interacts with.
When a photon is absorbed by regular matter (anything you see around you), its energy is absorbed by by one of the particles in that object. For example, an electron absorbs the photon, and moves to a higher energy state within the atom. The key thing to remember is that there are billions and billions of different ways the photon can be absorbed by regular matter.
Black holes are much simpler. They have only 3 things that we can know about them: their mass, their electric charge, and how fast they are rotating. Physicists say that black holes have “no hair” to say that there are no other details that we can know about them.
So if we are sitting outside a black hole, and a photon falls past the horizon of the black hole, we can see how much it increased the mass or rotation of the black hole. Either way, the energy of the photon has now been added to the energy of the black hole. (See note below)
Now, why can’t we know what happens to the photon once it’s inside the black hole? Anything inside the event horizon can never come back out — that’s why we call them black holes. So we can’t do an experiment to see what happens, because we’d never see the results! Another problem is that the photon’s behavior is explained by quantum mechanics, and the black hole is explained by general relativity. No one knows how to make these two theories work together, so we can’t make a prediction that would involve both theories. String theory is one idea to solve problems like these, but it doesn’t work yet.
An outside observer can’t actually “watch” anything pass the horizon of the black hole. The outside observer will perceive the infalling matter as infinitely red-shifted, and taking an infinite amount of time to reach the horizon. However, the object falling into the black hole will cross the horizon in a finite amount of its “own” time.
Now, a question of my own, for anyone who knows more GR than I do: does this mean that an outside observer will never be able to observe a mass increase for the black hole? | <urn:uuid:00617318-c2c0-4961-9083-bb19ddc724fb> | {
"date": "2014-07-28T12:19:48",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9638195037841797,
"score": 3.1875,
"token_count": 734,
"url": "http://excitedstate.wordpress.com/2011/06/21/a-10-year-old-asks-about-black-holes/"
} |
The fire ants of the Capital Wasteland were created by a scientist named Doctor Lesko. The doctor was attempting to return giant ants to their normal size through genetic manipulation and accidentally created the fire ants. Dr. Lesko's ambition was to make the ants exponentially smaller through generations, meaning the offspring is born smaller than its parents for generations to come. But as he reasons, one small tweak of an error has left the ants with a completely different mutation. The fact that Lesko used F.E.V. in his experiments in order to produce a quicker result may also help explain the "error." Lesko further explains in very technical terms that the ants breathe fire by expelling flammable venom from what was their venom sacks, then igniting it with a spark made by clicking their mandibles. He calls this process "pyrosis."
It is not known how fire ants came to be in the Mojave Wasteland, but theories are that their ability to breathe fire has been developed in the same way as the similar ability of fire geckos.
Fire ants have a hard, red-orange carapace that protects their body from environmental factors. They live in enormous underground colonies where they eat, sleep, and mate with the queen. Fire ants are omnivorous, using their pyrosis, which stems from a mutated venom gland, to kill live prey, but also eat what little vegetation they can find, when necessary.
Fire ants like to attack from range with a fire breath attack (which has surprisingly long effective range). The ants seem to have a minimum range at which they could breathe fire. If you get extremely close to the ants, they will constantly try to move backwards, letting off a spurt of flame or two. Additionally, they have a slow turn speed.
If their antennae is hit and crippled, they will become frenzied. Once a fire ant becomes frenzied, it will attack other nearby fire ants and other non-player characters. Once attacked by another ant, the attacked ant will return fire, damaging the attacking ant.
Due to their high fire resistance, fire damage based weapons like the flamer and the Shishkebab will have little effect on them.
Fire ant nest guardian
Fire ant nest guardians are unique versions of fire ant warriors. There are only five of these ants protecting the queen. Doctor Lesko refers to these ants as "The Queen's Quintet".
Fire ant soldiers are the second lowest ranked ant in the fire ant colony. Their job is to protect their area from intruders. They are very aggressive and will attack humans, as well as other creatures on sight. They are relatively easy to defeat at medium levels or with a well equipped low level character.
Fire ant workers are the backbone for the ant community's infrastructure. As the name implies, they dig tunnels and care for the eggs. However, they will attack intruders if they are threatened. They are relatively weak compared to fire ant soldiers.
This ant queen found in the queen ant's hatchery. Like the others in the game she is slow and has a ranged acid spitting attack that does a fair amount of damage. She cannot spit fire because Doctor Lesko's experiment affected only her eggs. The queen has a very high amount of HP and is considered a "boss" enemy in the game. | <urn:uuid:d0269b13-49dd-4c5b-851a-6fb456d3cba6> | {
"date": "2014-07-28T12:22:28",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.968693733215332,
"score": 2.53125,
"token_count": 678,
"url": "http://fallout.wikia.com/wiki/Fire_ant_(Fallout_3)?oldid=1742392"
} |
What are the symptoms of Kawasaki disease?
Children who have Kawasaki disease have a fever (sometimes as high as 104°F) for 5 days or longer. Usually, they also have at least 4 of the following symptoms:
- A red, patchy rash that may cover the whole body
- Swollen lymph nodes in the neck
- Swollen and red hands and feet and, later in the illness, peeling skin on the fingers and toes
- Changes in the lips and mouth, such as red, cracked lips, a very red tongue and redness in the mouth and the back of the throat
- Red, bloodshot eyes
Some children who have Kawasaki disease also have diarrhea, vomiting and stomach pain. Kawasaki disease might make your child very irritable and cross.
Written by familydoctor.org editorial staff | <urn:uuid:c8351ff6-36ba-4cba-a8a8-86cd9ae67f54> | {
"date": "2014-07-28T12:21:43",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.952643871307373,
"score": 2.6875,
"token_count": 172,
"url": "http://familydoctor.org/familydoctor/en/diseases-conditions/kawasaki-disease/symptoms.printerview.html"
} |
♕ Dragons are capable of forming strong attachments to humans who raise them. They have a reasonably high level of animal intelligence, and can be trained to serve as battlemounts and receive vocal commands. Dragons are said to be capricious in nature.
The Targaryens used them to conquer and forge the Seven Kingdoms. Over the course of one hundred and fifty years the Targaryens rode their dragons as symbol of power. They built the Dragonpit in King’s Landing to raise and house their dragons and at one time had at least nineteen dragons.
According to legend, a dragon may be tamed by sounding the Dragon Horn. The dragonlords of old sounded such horns, before the Doom devoured them. | <urn:uuid:b3eb99b6-ac19-4646-85f5-56c9a2ad0583> | {
"date": "2014-07-28T12:19:52",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9608944654464722,
"score": 3.109375,
"token_count": 147,
"url": "http://fancilysimple.tumblr.com/"
} |
NOTE: This is an update to my Grading the Teacher post where I introduced the Reformed Teaching Observation Protocol (RTOP) rubric.
How often in your teaching do you:
- show respect for student’s prior knowledge and misconceptions?
- engage students in exploration before your presentation?
- allow student questions to guide your lessons?
- engage students as members of a learning community?
- promote strong conceptual understanding?
- make connections to other disciplines and the real world?
- represent phenomena in multiple ways?
- have a significant amount of student-to-student talk?
- play the role of “teacher as listener?”
According to the original RTOP rubric, those are just a few of the many characteristics of a reformed, inquiry-based classroom. But why are these characteristics important? And what are some examples?
Thankfully, I just discovered that physics teacher Drew Isola has edited the original RTOP rubric to create a more self-reflective guide to reformed teaching. In his version, he includes a description of what each criterion means, why it is important, and asks the teacher to give examples from his/her own teaching.
As we start a new year, think about the ways in which you can incorporate more of these teaching strategies into your classroom. (The PDF version above is posted on Scribd. You can access the MS Word version here. More information about the original RTOP rubric here.) | <urn:uuid:2d9250fb-de20-40ec-92fd-6f688cd9117f> | {
"date": "2014-07-28T12:19:43",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9342252612113953,
"score": 3.71875,
"token_count": 304,
"url": "http://fnoschese.wordpress.com/tag/rtop/"
} |
RUSSIA : Around The World In 400 Years
In this AAR, I will take a Russian Nation (Muscowy or Novgorod) and conquer or colonise the provinces that will make their way around the world. Here is a visual representation:
The green provinces MUST be conquered. These lands represent the Russian Nation. The yellow/black provinces are a possible path to be taken.
Now, you must help me decide one thing. Does RUSSIA go East or West to achieve its goal?
Voting begins now.
Code:Votes: East - ||||| ||||| |||| West - ||||| ||||| ||||| Both - ||||| ||||| || | <urn:uuid:eb35a2b5-3276-4a0d-8a3e-89c3e3a06d7e> | {
"date": "2014-07-28T12:26:23",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8085257411003113,
"score": 2.65625,
"token_count": 147,
"url": "http://forum.paradoxplaza.com/forum/showthread.php?378436-%E2%97%84-RUSSIA-Around-The-World-In-400-Years-%E2%96%BA&p=8983378&viewfull=1"
} |
Was born in Green county, Illinois, in the year 1836. His father, Isaac S. Brown, was born in Kentucky in the year 1810, and emigrated to Green county, Illinois, in 1828, after which he went to New York on horseback. While there, in 1832, he was married to Miss Catharine E. Hay, and in 1833 he returned with his wife to Green county, where he engaged successfully in farming and stock raising, at which he continued until 1850, when he moved to Pike county, and settled on section 16 in Montezuma township, where he again engaged in farming and stock raising until 1862, when, notwithstanding he was in his fifty third year, he enlisted in the 99th Illinois regiment, and was appointed wagon master. He served in that capacity until May, 1863, when he died at Vicksburg from a wound received in the first battle at that place. He was the father of six children, five sons and one daughter — all now living — five of whom are married and one single. Mr. Brown died as he had lived, a highly respected man, a good soldier, and a moral citizen. His death was mourned by all his comrades, a large circle of relatives, and many warm friends. Mrs. Brown resides with her son James on the old homestead farm, in good health, and blessed with all the comforts necessary in this life.
James A. was married, in the year 1861, to Miss Amanda F. Hoover. She was born in Pike county, Illinois, in the year 1840. Her parents, Daniel and America Hoover, emigrated to Pike county, Illinois, in the year 1827, and settled in Montezuma township, where they both died in the year 1868. James is one of the live men of Pike county, and is entitled to great credit for his enterprise in improving the stock of hogs in his neighborhood, as he has spared neither time or expense in procuring the very best blood. He is, perhaps, one of the most successful hog raisers in Montezuma township. He is highly respected by his neighbors, and has frequently been solicited to accept some of the most important offices in his township, and, when consenting to do so, has always discharged the duties to the full satisfaction of his constitutents. Mr. Brown has had born to him five children, four daughters and one son, three of whom are yet living. | <urn:uuid:534b5d7a-b260-4a7f-b812-73ed29ac83a8> | {
"date": "2014-07-28T13:31:11",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9927883744239807,
"score": 2.953125,
"token_count": 504,
"url": "http://freepages.genealogy.rootsweb.ancestry.com/~glendasubyak/jabrown.html"
} |
Changing the world: The GNU project turns 30
It was 30 years ago that Richard Stallman announced the GNU project. An initiative that started with a programmer's frustration over a broken printer driver has changed our society. The idea of software that everyone can use, study, share and improve has proven very powerful indeed.
"Without the GNU project and the Free Software movement that it inspired, our everyday lives - and the Internet - would be a very different place right now," says Karsten Gerloff, President of the Free Software Foundation Europe.
Free Software puts the control of electronic devices where it belongs: with the people who own them. Today, Free Software is everywhere. It powers the Internet, our mobile phones, televisions, cars, routers, and electronic devices of all sorts. Free Software has fundamentally changed the way people create software: instead of preventing people to adapt the software to their own needs, they invite people to participate in the development.
"The GNU project has acted as the starting point of a movement that makes sure we can control technology, and not technology controlling us," says Matthias Kirschner, FSFE's head of Public Awareness.
The influence of the GNU project's approach to sharing knowledge goes far beyond the GNU/Linux operating system, and extends beyond computer programs. With the power of shared knowledge, Wikipedia has fast risen to become the world's mainstream encyclopedia. Creative Commons licenses let artists, musicians and authors use their work in ways ideally suited to the digital age. Scientists and engineers rely on Free Software tools to cure diseases and make everyone's life better. A generation of young people is now coming of age for whom sharing knowledge is simply the natural thing to do.
"We are grateful to Richard Stallman for sparking this epochal change, and to everyone who has worked so hard to drive Free Software's progress for three decades," says Gerloff. "Join our movement, support our work, and help us met the challenges ahead." | <urn:uuid:64dfa6a8-8b54-452c-a798-efae99b1b43f> | {
"date": "2014-07-28T12:23:51",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9382985830307007,
"score": 3.078125,
"token_count": 400,
"url": "http://fsfe.org/news/2013/news-20130927-01.html"
} |
Your body needs a small amount of copper each day -- 900 micrograms -- to function properly. It helps support your metabolism and aids in iron absorption. Copper forms copper peptides by binding to amino acids -- such as glutamine, histidine and lysine. This mini-version of a protein then plays a major role in tissue protection and repair.
The use of copper compounds dates back to ancient Egypt, in about 1550 B.C., mainly as a method for treating burn wounds as well as skin and eye infections. It was not until 1973, notes Copper.org, that Dr. Lauren R. Pickart, then a graduate student studying the biochemistry of human aging, took notice of a natural copper peptide he called GHL-Cu, present in large quantities in the skin tissue of younger persons but in reduced amounts in older persons. Pickart determined this copper peptide plays a major role in skin regeneration and began producing a synthetic version he called GHL-CU factor lamin, or lamin. In 1989, tissue regeneration products containing copper peptides became available to beauty salons and spas and, in 1997, to the public in over-the-counter preparations.
Today, you can find copper peptides in several cosmetics, acne medications, tanning lotions and post-surgical healing products.
How They Work
In reference to healing, copper peptides prevent scar formation by breaking down large clumps of collagen usually found in scars, allowing for the formation of smaller collagen molecules found in normal skin. In addition, SmartSkinCare.com notes that copper peptides promote the production of elastin, proteoglycans and glycosaminoglycans, all components of normal skin; regulate development and growth rate of different types of cells; have an anti-inflammatory effect; and protect the skin from iron oxidation damage.
The positive effect copper peptides have on healing leads many doctors and dermatologists to use them as an aid to healing after procedures such as chemical peels, dermabrasion and laser resurfacing. Their anti-inflammatory properties make them useful in combination with skin rejuvenating products, such as tretinion and alpha-hydroxy acids, which SmartSkinCare.com says can cause skin irritation. Finally, their antioxidant properties can make copper peptides a useful anti-aging ingredient, as they help prevent skin damage due to daily wear and tear on your skin.
Other Potential Uses
Although more research is necessary, SmartSkinCare.com reports that copper peptides may have an effect on reversing skin wrinkles. Currently, however, this is only a theoretical possibility. In addition, the Skin Biology website states that copper peptides may be useful in repairing damage to the kidneys.
Talk to your doctor or dermatologist about how to use copper peptides and how much to use before deciding whether they are good for your situation. Excessive use of these products can, according to SmartSkinCare.com, promote skin damage rather than prevent it.
- Jupiterimages/Brand X Pictures/Getty Images
This article reflects the views of the writer and does not necessarily reflect the views of Jillian Michaels or JillianMichaels.com. | <urn:uuid:36e1765d-680d-4b4e-ad44-5d98b9aa6fe3> | {
"date": "2014-07-28T12:20:56",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9275683164596558,
"score": 2.78125,
"token_count": 651,
"url": "http://getfit.jillianmichaels.com/copper-peptides-do-1217.html"
} |
If there’s one thing the Department of Energy and the Obama administration can do to push clean energy, it’s make sure the necessary transmission lines get built. Miles of transmission lines needed to connect solar and wind farms in the desert can often take years to decades to get built and are one of the biggest barriers to deployment. On Wednesday, the AP reports that the administration is starting a pilot project to speed up the approval and construction process of seven electric transmission lines across 12 states.
The lines will provide electricity to Arizona, Colorado, Idaho, New Mexico, Nevada, Oregon, Utah, Wyoming, New Jersey, Pennsylvania, Minnesota and Wisconsin. The administration is emphasizing “modernization of the grid,” as the reason behind the projects, but also mentioned increased energy efficiency and more clean power. It seems like clean power is almost a dirty word now, post-Solyndra.
As we wrote earlier this year, the U.S. should be spending $12 billion to $16 billion a year to upgrade its major transmission power lines, and this investment could add hundreds of thousands of new jobs in the U.S., according to a study by the WIRES
NEMA trade group, and developed by Brattle Group analysts (PDF). The study was created to urge Congress to do something about the massive delays in getting transmission lines built (looks like it worked), and said investing in new transmission lines could annually support 130,000 to 250,000 full-time jobs in the clean power sector.
Obama has already called for 3,000 miles of new transmission lines to be built to help double renewable energy capacity by 2012. A consortium of Eastern power grid operators said last year that transmissions to carry wind power from the Midwest to the East could cost $80 billion over the next 15 years or so.
According to the AP, the projects will include:
- A 500 kilovolt (kV), 300-mile transmission line proposed by Idaho Power in Oregon and Idaho.
- 1,150 miles of high-voltage lines across Wyoming and Idaho.
- A 210-mile, 500 kV line near Salem, Ore.
- Two 500 kV transmission lines in Arizona and New Mexico.
- A 700-mile, 600 kV transmission line in Wyoming, Utah and Nevada. The project is intended to help develop new wind projects in Wyoming.
- A 345 kV transmission line in Minnesota and Wisconsin.
- A 145-mile, 500 kV transmission line in Pennsylvania and New Jersey
Image courtesy of Jacashgone via Creative Commons license. | <urn:uuid:cb5c9d59-ed98-4a5d-a2e2-99aee79aa389> | {
"date": "2014-07-28T13:31:45",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9361703991889954,
"score": 2.609375,
"token_count": 528,
"url": "http://gigaom.com/2011/10/05/smart-grid-obama-pushes-for-speedier-transmission-lines/"
} |
Log In now to add this Gigapan to a group gallery.
Log In now to add this Gigapan to a gallery.
About This GigapanToggle
- Taken by
- Steve Beckelhimer
- Explore score
- 0.49 Gigapixels
- Date added
- Nov 13, 2011
- Date taken
- Nov 12, 2011
Mining at Red Ash, WV began in 1891 shortly after establishment of the nearby Rush Run mine which eventually connected underground to Red Ash.
The mines are known for early affiliation with mining unions and were the site of several mining disasters including ones in 1900 and 1905. Both of these are believed to be explosions resulting from the buildup of methane gas and coal dust ignited by the open flame miner’s lamps that were commonly used at the time.
The remains of the mining operation of the Red Ash Coal and Coke Company and town of Red Ash are located on the northern bank of the New River. Babcock State Park is across the river as well as mining communities of Beury, Fire Creek and Sewell.
Visible remains exist of the mining operations including some tipple and coking ruins. It is estimated that nearly 100 beehive coke ovens were in the area at the height of operation. There are foundation remains in the residential area of Red Ash including homes, churches, schools business and cemeteries. All that remains of these structures today are some foundation piers and stone walls. The rail spur to the area of the northern side of the river has been removed although the rail bed remains as the best access to the sites.
Red Ash “Island” is an area that is seasonally separated from the town of Red Ash. The island has an extensive cemetery although most of the graves are unmarked or poorly marked with crude headstones. Many of the graves are from the smallpox quarantine facility that was established on the island in the late 1800s. Smallpox victims from nearby mining communities were brought to Red Ash Island and eventual burial since the death rate was very high. Since the terrain of the island is very flat, it provided an ideal site for a baseball field which was constructed in the 1940s. This provided important recreational outlet for miners from Red Ash and the many surrounding mines.
Red Ash can be accessed year round by parking at the public boat launch at the former mining community of Brooklyn, WV. Travel beyond the locked National Park Service gate is easy by foot or bicycle. Motorized travel is prohibited beyond the locked gate.
These images are in support of Marshall University students in the Integrated Science and Technology department working under Dr. Mike Little. Students, Lauren and Jeremy are doing the bulk of the fieldwork to understand the environmental disturbance in the area associated with the mining operations over 100 years ago and the succession that has taken place since. Assistance and cooperation from David Fuerst of the National Park Service is greatly appreciated.
Red Ash Community – N 37o 57.643’ W 081o 02.121’
Graves on Red Ash Island N 37o 57.861’ W 081o 01.431’
Where in the World is this GigaPan?Toggle
GigaPan Stitch version 1.0.0805 (Windows)
Panorama size: 491 megapixels (42456 x 11588 pixels)
Input images: 102 (17 columns by 6 rows)
Field of view: 160.4 degrees wide by 43.8 degrees high (top=23.8, bottom=-20.0)
All default settings
Original image properties:
Camera make: Canon
Camera model: Canon PowerShot A3100 IS
Image size: 4000x3000 (12.0 megapixels)
Capture time: 2011-11-12 12:15:10 - 2011-11-12 12:20:17
Exposure time: 0.005
Focal length (35mm equiv.): 138.5 mm
Digital zoom: off
White balance: Fixed
Exposure mode: Manual
Horizontal overlap: 39.6 to 43.6 percent
Vertical overlap: 42.2 to 42.9 percent
Computer stats: 16375.1 MB RAM, 8 CPUs
Total time 26:49 (16 seconds per picture)
Alignment: 18:14, Projection: 1:47, Blending: 6:47
(Preview finished in 23:03) | <urn:uuid:194e258f-be4d-431d-a325-974b1eed0a38> | {
"date": "2014-07-28T12:28:00",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9468658566474915,
"score": 2.890625,
"token_count": 917,
"url": "http://gigapan.com/gigapans/91987"
} |
Mountain Dew. The oh so sweet is it yellow? is it green? nectar of the geek gods and fuel for gamers has flame retardant in it. Yup. Mountain Dew, along with 10 percent of sodas in the US, contains brominated vegetable oil (BVO), a flame retardant chemical banned in Europe and Japan.
The flame retardant, BVO, is currently listed as an ingredient in various citrus soft drinks such as: Mountain Dew, Squirt, Fanta Orange, Sunkist Pineapple, Gatorade Thirst Quencher Orange, Powerade Strawberry Lemonade and Fresca Original Citrus.
But why and what for? According to the Environmental Health News, BVO contains "bromine atoms which weigh down the citrus flavoring so it mixes with sugar water" instead of floating to the top. Basically, BVO gives soda more consistent flavoring. That sounds good! But BVO is also added to polystyrene foam cushions in furniture and plastics in electronics because BVO can slow down the chemical reactions that cause a fire. Yuck. Is that what we want to be drinking?
So how the hell if BVO is banned in foods in Europe and Japan, does BVO still exist here? Well, back in 1977, the FDA set what they thought was a "safe" limit for BVO in sodas and soda companies have been allowed to use BVO ever since. Seriously! That's the only reason! Scientists believe that the data the FDA looked at in the 1970s is outdated (ya think?) and that BVO needs a closer look. The EHN says:
After a few extreme soda binges—not too far from what many gamers regularly consume—a few patients have needed medical attention for skin lesions, memory loss and nerve disorders, all symptoms of overexposure to bromine. Other studies suggest that BVO could be building up in human tissues, just like other brominated compounds such as flame retardants. In mouse studies, big doses caused reproductive and behavioral problems. | <urn:uuid:8e5d0c82-390a-418f-ac17-a8c5ff98bc5d> | {
"date": "2014-07-28T13:16:53",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9471616148948669,
"score": 2.53125,
"token_count": 424,
"url": "http://gizmodo.com/5868012/theres-flame-retardent-in-mountain-dew?tag=fire"
} |
axioms, definitions, dogmatism, Einstein, experiments, faster than light, FTL, light, light speed, Maxwell, physics, Relativity, relativity theory, science, scientific dogmatism, self-fulfilling prophecy
What is the Relativity Theory? What does it really say?
The major misconceptions are related to the speed of light as a universal speed limit. A limit which… limits us in almost everything – from interspace journeys to information transmission and time travels (yes, Godel proved they are possible).
But how is that limit derived? And can it be overcome?
Speaking in favor of FTL (Faster than Light) speeds can easily ban you from scientific communities.
That “limit” was initially derived from a series of experiments. But not everyone agrees that the results of these experiments were null. (see here) And there are other experiments casting a doubt on that experiment… (see experiments of Dayton Miller here)
That “limit” is set to be true due to the fact that c is calculated from Maxwell’s equations. But why not believe the “Many Minds Relativity” according to which each observer assumes that light propagates according to Maxwell’s equations in a coordinate system, or a vacuum, fixed to the observer? Different observers moving with respect to each other, thus use different coordinate systems or different vacui, but they all use the same Maxwell’s equations. [source] No problem with such an explanation. And surely no “limit” there…
That “limit” is not universal. It is actually broken in more than one occasions. And it is simply “not relevant” to many other cases of faster than light information transfer. See the below sources:
- Electricity faster than light
- Opera experiment: Things DO travel faster than light, what’s the big deal?
- Light speed and scientific dogmatism
- Harmonia Philosophica “φως” related posts
- Harmonia Philosophica “light” related posts
- Alternative Physics – Faster than Light
- Other sources: 1
That “limit” is experimentally verified like a self-fulfilling prophecy.
We use Relativity Theory equations (which were built ON THE BASIS of light speed being the ultimate barrier) to calculate the speed of e.g. space particles and we find it to always be less than c. But this happens because these equations do not allow anything to get a speed beyond c simply because THEY ARE CONTRUCTED SO THAT THIS HAPPENS! [source]
Like Alternative Physics suggests…
Replace: “The speed of light is a constant for all observers” with: The speed of light is a constant relative to its source.
Replace: “No object can exceed the speed of light” with: No object can exceed the speed of light relative to its launch point.
What is the speed of a thought? Think quickly. And as Bruce Lee said… “Have no limit as limit”. | <urn:uuid:b02b7f92-6178-4f41-9d08-e624a7c38d8e> | {
"date": "2014-07-28T12:19:43",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9127403497695923,
"score": 3.609375,
"token_count": 645,
"url": "http://harmoniaphilosophica.wordpress.com/2013/04/24/relativity-theory-and-light-the-fake-limit/"
} |
|Patricia Erikson with Makah Cultural and Research Center staff|
Growing up in rural Maine, my exposure to Native American peoples was, well, complicated. I was lucky enough to experience one field trip at a very young age to the American Indian exhibits of the Peabody Museum in Cambridge, Massachusetts. The clouded, scratched glass exhibit cases and hushed, tomb-like nature of the galleries shaped my memory as much as the Native artifacts themselves. I didn't know it at the time, but this prominent museum, in the 1970s, existed as a hybrid between colonial cabinets of curiosity and 19th c./20th c. natural history exhibits. These type of museums reportedly confused children - and why wouldn't they - leaving them with notions that primitive peoples of dioramas were stuffed or dead, just like the moose or elephant in the adjoining exhibit?
cigar store Indians" that towered stoically over us on the porches of trading posts and general stores. Since my father loved to hunt and fish at Moosehead Lake, I can't count the number of times that I edged around one of those frowning, garish sculptures. Closer to home, my favorite B-grade Westerns on late Saturday afternoon TV offered more animated versions of Indians, complete with the proper doses of romance and violance. And where the Westerns left off shaping my perception of Indians, Girl Scouts and Campfire Girls picked up. Weekly meetings and occasional summer outings as a Girl Scout associated Native Americans with outdoor survival skills. And, I shudder to admit that late-night lore of Campfire Girls taught me the cliche that our campground - with the unlikely name of Camp Pesquasawassis - was built on an Indian burial ground. There, huddled together with other girls in canvas tents, we listened breathlessly to nighttime tales of Indian ghosts that kept us from sleeping. In short, my childhood was steeped in Indian stereotypes, Indians of wood and plastic, dead Indians, but, ironically, devoid of visible, living, contemporary Wabanaki people.
None of these - not the cigar store indians, not the ones shot by cowboys on TV, and not the ones that childhood clubs and summer camps emulated or feared - had anything to do with the Wabanaki people who were fellow citizens in my home state, who played critical roles in the history of our region and continue to contribute in important ways to our modern life while preserving tiny fractions of their original homelands; about them, I had grown up in Maine knowing nothing.
-to be continued
[Patricia Erikson is a Peaks Island-based writer, educator, and anthropologists who blogs here and at Peaks Island Press.] | <urn:uuid:fc659610-41ad-488c-8b01-63c0081ecd68> | {
"date": "2014-07-28T12:20:53",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9638122916221619,
"score": 2.5625,
"token_count": 555,
"url": "http://heritageinmaine.blogspot.com/2013/02/whiteladyknowsnothingWabanaki.html"
} |
in Micah 7:6 we read:
אֹיְבֵי אִישׁ, אַנְשֵׁי בֵיתוֹ
loosely translated as: the enemies of a man, the peoples of his house
Why would this be so? What is the context here?
In context, the phrase seems to be the culmination of a series of illustrations of the depravity surrounding the prophet:
Some translations render this as "his own servants" or otherwise indicate that it isn't referring to blood relatives. That might be a good translation, but the previous lines indicate that close relatives, even spouses, are under suspicion of doing harm. We see similar warnings elsewhere:
A number of passages in the Hebrew scripture draw a disjoint between trusting people and trusting God. For instance:
The next stanza echoes Psalm 1, which compares a person who trusts in the Lord to a tree planted beside a stream. Jeremiah continues by saying that even our own hearts can deceive us. By implication, the only person we can trust is God; we are, in a sense, our own enemy. The call to trust God (and Him alone) is pervasive in the Bible.
Micah speaks within a long tradition of warning Israel against its sins. While it might seem that as God's chosen people, an individual could trust that if they followed the rest of their culture, God would approve their actions. But Micah warns that trusting your neighbor and following their example can be dangerous since even the best can be a metaphorical snare. | <urn:uuid:2118e99f-36a1-4708-8019-e6260a67c824> | {
"date": "2014-07-28T12:21:55",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.946575939655304,
"score": 2.625,
"token_count": 338,
"url": "http://hermeneutics.stackexchange.com/questions/2704/why-are-the-peoples-of-your-house-your-enemies?answertab=votes"
} |
Length: 60 minutes
Summary: Cloud computing – the practice of storing data on a remote server – is a practical solution for genealogists. Learn how the cloud works, how to keep your data safe, and the latest cloud programs.
Description: Tired of keeping your genealogy research data on multiple CDs, DVDs, flash drives, hard drives and in different locations? Cloud computing – the practice of storing data on a remote server – is a practical solution for genealogists. Learn not only how cloud computing works, but also the latest cloud programs and how to keep your data secure and private.
Audience Level: Beginner
Requirements: Projection for laptop/netbook computer on large screen; internet connection – wired or wireless (preferred in order to show live websites and resources).
Content: 9 page handout
- Clouds in Genealogy? What is the Genealogy Cloud?
- How the Cloud Works
- Basic Cloud Computing Concepts
- Cloud Programs for Genealogists
- Security and Privacy Issues
- Genealogy Cloud Best Practices
- Resource List
©2012, copyright Thomas MacEntee | <urn:uuid:6a780062-3fd9-4f4a-8bc1-e88a3a22a402> | {
"date": "2014-07-28T12:19:11",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8466070890426636,
"score": 3.25,
"token_count": 229,
"url": "http://hidefgen.com/presentations/genealogy-cloud-computing/"
} |
Importance of Religious Rites
Swarup, Ram Man is a psychic being. He seeks to praise, to adore, to invoke the invisible at every step. So we must recognize the importance of worship in the life of an individual as well as a nation. There is a constant interchange between men and gods. They sustain and nourish each other, as the Gita says. It further adds that the ayajna belongs neither to this world nor [?] the next.
The best worship is the worship of the heart, but form and discipline in worship are also important. Collective worship works for social vitality and cohesiveness. Those who pray together stay together. Hence, all nations have built temples of one kind or another for themselves.
Once the Hindus had mighty temples and an active temple worship. But these edifices, in the North, were systematically destroyed by the Muslim invaders. In the South some of the temples still stand in their old glory, but they are in a sad state of neglect. They lack the means of self-sustenance. Even urgent repairs are not undertaken, and many of them are not even properly dusted and cleaned. They were deprived of their traditional revenues by the British rulers, and no suitable alternative arrangements have yet been made.
India has acquired some sort of independence, but its deeper spiritual life has yet to come into its own. The new rulers carry on the old tradition of the alien predecessors and discriminate against Hindu institutions. Hindus have yet to acquire a government of their own. Thanks to a thousand years of exploitation by the Muslims and the British, the Hindu society has become impoverished and has fallen into a state of apathy, indifference and self-forget-fulness. Its temples have fallen into disuse; and [?] its Gods are not properly attended to.
Not only the temples, but the priests too have been neglected. They have become illiterate and indigent. Consequently, they have lost in self-esteem and social prestige. They may be the poorest and the most neglected class among the Hindus.
Besides service in the temples, priests in the past were needed for other functions as well. Hinduism conceived life sacramentally. It invested everything secular with the spiritual, individual with the cosmic, visible with the invisible. So all events in life-birth, name-giving, wedding and death-were fortified with the religion rites. All these functions needed trained priests. But in their absence now these functions are being neglected, and Hindu society is falling apart. The quality of Hindu life is suffering irreparable damage.
We are happy to note that our brothers on the other side of the globe in Hawaii, the monks of the Saiva Siddhanta Church, under the leadership of His Holiness, Sivaya Subramuniyaswami, have taken up this matter in right earnest. They have taken up the question of the Saivite priesthood, and their answer should hold good for all of us, whoever be our Ishta Devata, our chosen Deity for worship. As one American Hindu leader noted: "Hindu priests should be well paid so they are never dependent on gifts. Training programs and community support are vital, for today it is true that Hinduism can create a brave new world."
The comments are owned by the author. We aren't responsible for their content. | <urn:uuid:04fa6425-78f3-4e47-a9fd-fe66bfb69e68> | {
"date": "2014-07-28T12:19:06",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9725695252418518,
"score": 2.734375,
"token_count": 681,
"url": "http://hinduismtoday.com/modules/smartsection/item.php?itemid=1136"
} |
While researching the answer to "How was Germany's border decided?", I didn't manage to find any documents which would precisely describe the borders between Germany and Poland between the points 53° 16' 28.19" N 14° 26' 38.96" E (near Mescherin and Gryfino) and 53° 55' 45.45" N 14° 13' 40.78" E (near Świnoujście and Heringsdorf). Also, I didn't find any documents which would describe the precise sea border north of the second point before 1989-05-22.
The Yalta (February 1945) and Potsdam (August 1945) conferences' protocols refer to the Oder-Neisse line as the western border of future Poland, even though the Soviets gave the authority over most of Stettin/Szczecin (which lies west of this line) and surrounding areas to the provisional Polish government on 1945-07-05 already. The same happened with Swinemünde/Świnoujście on 1945-10-06, shortly after the end of the Potsdam conference.
The Treaty of Zgorzelec of 1950-07-06 between East Germany and Poland only re-affirmed the Oder-Neisse line as the border and left Świnoujście to be Polish (without clearly defining what this border was), but it left out the question about the parts west of the Oder which were still administrated by Poland. Another part of the treaty called for creating a joint agency to decide on the exact points of the border, whose publications would likely be the normative source of the border course, but I wasn't able to locate any works by said agency to verify it yet.
There was another treaty between East Germany and Poland, signed on 1951-01-27 in Frankfurt on the Oder by the East German foreign secretary Georg Dertinger and the leader of the Polish foreign ministry Stanislaw Skrzeszewski; this could be another normative document about the border course, but I wasn't able to locate it either.
The Treaty of Warsaw of 1970-12-07 between West Germany and Poland only refereed to the border "... as defined in the previous treaties", specifically referring to the one from 1951.
Another treaty, signed on 1989-05-22 in Berlin (see German version) between East Germany and Poland re-defines the sea border north of the island of Usedom/Uznam, but doesn't include the previous course.
Further treaties between unified Germany and Poland only re-affirm the status quo, but don't contain a formal definition of if, referring to earlier treaties.
So, where is this 100km or so of the German-Polish border defined? | <urn:uuid:8af608fb-0c5e-437f-91b7-0d8d18f3f8a0> | {
"date": "2014-07-28T12:23:04",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9576396346092224,
"score": 3.28125,
"token_count": 584,
"url": "http://history.stackexchange.com/questions/618/in-which-document-was-the-exact-course-of-the-northern-part-of-the-german-polish/620"
} |
Applying manure directly to a garden is not the most efficient use of the nutrients it contains. Raw manure is volatile, releasing methane into the air and causing an unpleasant smell (see References 1). Combining the manure with a material high in carbon and allowing it to undergo aerobic decomposition stabilizes the nutrients and kills most pathogens (see References 2).
Build multiple bins to hold compost in various stages of decomposition. This is the most efficient way to compost moderate amounts of manure. Nail or wire together wood pallets, often available for free from factories and large stores, to form a row of three or more connected bins. Construct each with an open front and three closed sides so it will accommodate a 3-by-3-by-3-foot compost pile. Locate your bins on a level surface in an area away from surface water and runoff. That way you avoid washing your valuable nutrients away and contaminating nearby water with high nitrogen levels (see References 3).
The key to successful composting is to combine manure, which is high in nitrogen, with other ingredients like sawdust, paper or straw, which are high in carbon. Aerobic decomposition works best in compost piles with carbon-to-nitrogen ratios between 25-to-1 and 30-to-1. Manure, by itself, ranges from values of 5-to-1 for swine manure to 25-to-1 for horse manure. Because the carbon and nitrogen contents of compost ingredients vary, the best way to balance the pile is to experiment with it. Start with roughly equal amounts of manure and carbonaceous materials. If the pile smells like ammonia, add more carbon; if it fails to heat up and begin the composting process after a few days, add more manure. (See References 2)
Once you fill your first bin with an appropriate mixture of manure and a carbon source, manage the composting process by maintaining a moderate moisture level and turning the pile. Add water when the pile gets dry; cover it loosely with a tarp if it's very rainy (see References 3). Check the temperature in the center of the pile every day or two with a long-stemmed thermometer. When the interior heats up to about 140 degrees Fahrenheit, turn the pile by shoveling it into the next bin to aerate it. Then start a new pile in the first bin (see References 2, page 3).
Composting outside of a laboratory is an inexact process, but a well-managed 3-by-3-by-3-foot compost pile with a 25-to-1 or 30-to-1 carbon-to-nitrogen ratio will produce crumbly, earthy-smelling compost that is ready to use in about a month. Poor management, lack of oxygen, too much or too little moisture and too much or too little nitrogen all increase the time needed to make compost, potentially extending the process to up to a year or more. Common composting problems include a rotten smell, caused by too much moisture or not enough air penetration, and pest or insect proliferation, caused by inappropriate ingredients like fat or meat in the compost pile. (See References 2)
- Jupiterimages/Photos.com/Getty Images | <urn:uuid:adc90f08-ed1b-406d-a41c-2dd0461c6056> | {
"date": "2014-07-28T12:20:12",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9041013717651367,
"score": 3.5,
"token_count": 659,
"url": "http://homeguides.sfgate.com/compost-manure-garden-78444.html"
} |
While beets may not be at the top of many gardeners' lists of favorite plants, their sweet taste and nutritional punch may make them worth a second look. Health experts emphasize eating a rainbow of colored fruits and vegetables for the best variety of nutrients. Beets, with their different colors and designs, fit that bill perfectly. Beets aren't just the plain, red balls most people picture; growers have developed many different varieties to decorate your plate.
Yellow or Gold
Most yellow or gold beets have a milder flavor than their red cousins. They're often more popular in cooked dishes because their skin is so thin it doesn't require peeling. Some of the more popular varieties are Golden, which is a carroty orange color, and Yellow Detroit, which starts out orange but turns a softer yellow when cooked.
Red beets are definitely the most common variety of beets grown, and there are many more from which to choose when you grow them. Their flavor can range from candy-sweet to almost bitter, depending on the type of beet and how long you let it grow in the garden. Among the most commonly grown red beets are Detroit Dark Red, which grows tasty leaves as well as the roots, and Gladiator, which is popular with people who can beets.
Much like other vegetables, beets have fans who attempt to find or hybridize the plants to get unusual varieties. Some of the more different ones include Chioggia, which is an heirloom Italian beet with a red-and-white bulls-eye design inside created by alternating layers of beet color, and Cylindra, which grows long and thin like a potato, giving cooks many slices of equal size.
While sugar beets are simply another variety of beet, they are grown with a different purpose in mind. Instead of slicing the roots for salads or meals, sugar beet processors turn the plant into table sugar, animal food and other products. Sugar beets are white, sweet, and much larger than ordinary garden beets, with roots that often measure 6 inches or more across.
- Jupiterimages/Comstock/Getty Images | <urn:uuid:a860ab91-1b45-4157-8170-7c854d73a6cc> | {
"date": "2014-07-28T12:21:58",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9604359269142151,
"score": 2.96875,
"token_count": 434,
"url": "http://homeguides.sfgate.com/varieties-beets-25430.html"
} |
Hear the buzz?
That's the sound of a honey bee's wings moving at about 11,400 times per minute.
As a field bee, the worker bee lives only several weeks during the peak nectaring season. She can fly four to five miles a day, at a speed of about 15 miles per hour. When her wings (she has four) fray and wear out, she can no longer fly.
We recently spotted a honey bee with very ragged wings nectaring lantana and another nectaring lavender.
A world of difference between the wings.
For more information on honey bees, check out the UC Davis bee biology Web site and the links page. | <urn:uuid:4f670a23-a532-4b4e-9caf-9c4fb8f236e1> | {
"date": "2014-07-28T12:30:24",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9369451999664307,
"score": 2.9375,
"token_count": 143,
"url": "http://homeorchard.ucanr.edu/?blogpost=2044&blogasset=45538"
} |
Published on December 29th, 2013 | by Mark Anderson4
10 ways to use iBook Author in education
Obviously not exhaustive, but a few more ‘creative’ ideas for using Apple’s brilliant free piece of software, iBook Author rather than the traditional ways you might use it.
1 – An obvious use it to write your own iBook about your teaching practice, so that you can share your ideas with the wider education community. The end result is very professional, and with time spent, the skills needed to use it are not too hard to learn. If you want to extend your book further too, there are lots of widgets you can add in, such as the ones in iAd Producer and other third party widgets from other developers.
2 – It would be a really effective way of collecting and presenting the work of an action research group, so that you can publish your findings if appropriate. The flexibility of the software means that you can present all types of data, as well as embed videos and so on.
3 – Students can also be able to use iBook Author, and it would be an excellent culmination to an extended project, or learning aim that had to have a public outcome.
4 – You could use iBook Author to write about what your school has been doing to reach other stakeholder groups, such as governors or parents. How brilliant would it be to receive this book chronicling the school drama production with a video of the performance included. Plus, it’s far more environmentally friendly than churning out hundreds of letters home to parents.
5 – Enrichment groups could also use iBook Author to encourage other students to participate in their activities.
6 – Teachers could use iBook Author to email parents summaries of either a child’s individual work, or a summary of learning of a classes learning on a specific topic. You could include videos of the children talking about their learning too. You could also embed other interactive content such as learning checks that the students create themselves.
7 – It could also be used as a reflective tool, for children to write for collaboratively, send on to you to compile in to an iBook and then look back on their work. This could be done in other ways too but as iBook Author is free, you could compile responses easily and for free in a Google Form and then students could keep their work in iBooks as a store for their revision notes on that topic – a job for which iBooks is ideally suited!
8 – A-level students could use iBook Author to publish their EPQ extended projects, which would be an excellent way to demonstrate original work in a field with a wider public audience.
9 – In the classroom this would be a great stretch and challenge activity, or an extended abstract if using Solo Taxonomy.
10 – If you run a conference or TeachMeet, this would be a great way of saving and publishing the resources for those who could not make it on the day.
What do you think?!
Image source: http://www.sxc.hu/photo/980542 | <urn:uuid:3225d666-8156-4731-8c2f-f17a00a5b19d> | {
"date": "2014-07-28T12:18:30",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9656362533569336,
"score": 2.84375,
"token_count": 638,
"url": "http://ictevangelist.com/10-ways-use-ibook-author-education/"
} |
Learn about animal genetic modification and the benefits it provides for humans on this Moment of Science.
Here’s how innate immunity works. In your bug body there is a fluid called hemolymph, which is equivalent to human blood. If you’re injured, components in the hemolymph interact with specialized cells in your immune system to clot and form a scab that seals off your wound and prevents infection.
Vampire bats may seem like a blood problem you may have to deal with. However, you should be worrying about having a stroke! | <urn:uuid:7b71cdc4-4678-4f4a-b4d3-8d0ed4738f1c> | {
"date": "2014-07-28T13:31:11",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9480865597724915,
"score": 2.84375,
"token_count": 113,
"url": "http://indianapublicmedia.org/amomentofscience/tag/human-blood/"
} |
THIS GREAT-TASTING SMOOTHIE IS A BRIGHT AND DELICIOUS MIND FOOD
The phrase “food for thought” has new meaning. Recent studies are finding heart-healthy foods can also positively affect our brain health and ability to function. Specific nutrients may affect memory, concentration, learning and decision-making. In general, foods good for overall health are also good for the mind.
A nutrient vital for brain function is glucose. The brain, unlike muscles, cannot store glucose, and operates best with a constant, steady supply of fuel in the form of glucose. The best way to supply glucose to the brain is by eating a diet rich in complex carbohydrates, such as whole-grain breads, cereals, pasta and rice, fruits, vegetables, beans and legumes. Breakfast and snacking during the day will also help keep blood glucose levels steady and available for the brain.
Iron is often overlooked for brain function and is lacking in many American diets. Iron is essential for transporting oxygen to the brain, and is needed by the brain to use glucose. Some of the best food sources for iron are lean beef and lamb. The iron found in meat is the most easily absorbed. A way to increase the iron absorption in other food sources is to consume a vitamin-C rich food with the iron-containing food, such as orange juice with an iron-enriched breakfast cereal.
To maintain mental alertness, eat protein foods such as fish, meat, dairy, soybeans, peanuts, almonds and wheat germ.
Omega-3 fats, well-known for heart-health benefits, are also important for the brain as they help keep the blood vessels and cell membranes healthy. Omega-3 fats are found in salmon, tuna, sardines, herring and lake trout, and also walnuts and flax seed. Some studies have found even one serving of fatty fish every month may lower your risk for stroke.
Antioxidants found in bright-colored fruits and vegetables, especially blueberries, strawberries, spinach and broccoli, may help protect the brain.
Last, but not least, proper hydration is essential for these nutrients to reach the brain. Studies have found even slight dehydration may slow the time nutrients take to reach the brain, resulting in possible short-term memory lapses. Keep in mind, these findings are new and more studies are needed to confirm the effect food may have on the brain.
Enjoy the great-tasting “smoothie for the brain” for breakfast or a snack.
2 cups frozen strawberries
1 cup frozen blueberries
1 cup orange juice
1 cup lowfat raspberry yogurt
˝ teaspoon vanilla extract
3 tablespoons sugar
1 tablespoon wheat germ, optional
1 tablespoon ground flax seed, optional
In a blender, combine strawberries, blueberries, juice, yogurt, vanilla and sugar. Blend until smooth. Add optional ingredients, if desired, to boost nutrients for brain health. | <urn:uuid:d17a15ca-a30c-4813-912c-64c02d94c0dc> | {
"date": "2014-07-28T12:38:09",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9277885556221008,
"score": 3.328125,
"token_count": 608,
"url": "http://indianolarecordherald.desmoinesregister.com/article/20130909/LIFE/309090025"
} |
FSLWhy Go Greek?
Joining a Greek organization gives students the opportunity to grow through Sisterhood/Brotherhood, Scholarship, Leadership, Networking, Community Service, and Philanthropy.
Here are some interesting Greek Facts:
- Since the founding of Greek-letter organizations in 1825, all but two U.S. Presidents were Greek.
- 7 out of 10 people listed in Who’s Who Among College Students & Universities are Greek.
- Both females elected to the U.S. Supreme Court were sorority members.
- 85% of the Fortune 500 executives are Greek.
- Of the nation’s 50 largest corporations, 43 are spearheaded by Greeks.
- 63% of the U.S. President’s Cabinet members since 1900 have been Greek.
- Over 85% of the student leaders on some 730 campuses are members of a Greek-letter organization.
- Since 1910, 40 of 47 Supreme Court Justices have been Greek.
- More than 7 million men and women in the USA and Canada are Greek.
- The Greek system is the largest network of volunteers in the US, with members donating over 10 million hours of volunteer service each year.
- Over $7,000,000 is raised every year by Greeks nationally.
- Studies show that Fraternity and Sorority members are more likely to remain in college and obtain a degree than non-affiliated students.
- First Female Senator was Greek.
- First Female Astronaut was Greek.
- 76% of all Congressmen and Senators belong to a Fraternity or Sorority
Information taken from: http://www.hofstra.edu/StudentAffairs/StudentActivities/greek/greek_whygreek.html | <urn:uuid:9b8da9d8-fe4f-4e1d-9552-6df2af9e7cfc> | {
"date": "2014-07-28T12:21:19",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9406453371047974,
"score": 2.546875,
"token_count": 362,
"url": "http://info.jmu.edu/fsl/joining-us/why-go-greek/"
} |
- A cathode is a terminal or electrode at which electrons enter a system, such as an electrolytic cell or an electron tube.
- A cathode ray is a stream of electrons leaving the negative electrode, or cathode, in a discharge tube (an electron tube that contains gas or vapor at low pressure), or emitted by a heated filament in certain electron tubes.
- A vacuum tube is an electron tube consisting of a sealed glass or metal enclosure from which the air has been withdrawn.
- A cathode ray tube or CRT is a specialized vacuum tube in which images are produced when an electron beam strikes a phosphorescent surface.
The first cathode ray tube scanning device was invented by the German scientist Karl Ferdinand Braun in 1897. Braun introduced a CRT with a fluorescent screen, known as the cathode ray oscilloscope. The screen would emit a visible light when struck by a beam of electrons.
In 1907, the Russian scientist Boris Rosing (who worked with Vladimir Zworykin) used a CRT in the receiver of a television system that at the camera end made use of mirror-drum scanning. Rosing transmitted crude geometrical patterns onto the television screen and was the first inventor to do so using a CRT.
Modern phosphor screens using multiple beams of electrons have allowed CRTs to display millions of colors. | <urn:uuid:9e959ab9-3657-4ed7-8f7a-4222b14d203c> | {
"date": "2014-07-28T12:20:47",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9300849437713623,
"score": 3.40625,
"token_count": 275,
"url": "http://inventors.about.com/od/cstartinventions/a/CathodeRayTube.htm"
} |
The Never Ending Image Learner, or NEIL, is a computer at Carnegie Mellon University in Pittsburgh, Pa., that is teaching itself common sense.
NEIL, which is constantly left running, spends it time looking at images to help build up its common sense. The computer has already viewed over three million images and is able to make several connections that normal computer could not. An example of this, which may seem easy to understand as a human, is that NEIL can make a connection between a tiger and a zebra due to the fact that they both have stripes. The computer is able to make several other comparisons and learns more as it scans images. Scientist also hope to have NEIL scanning videos in the future, reports Science Recorder.
NEIL is funded by Google (GOOG) and the Department of Defense’s Office of Naval Research and is still in its beginning stages. It’s unknown why either of these groups is funding the project, but its possible that the technology could be helpful on the battlefield in the future, Science Reporter notes.
“It’s building upon a lot of work in computer vision using deformable part models,” Abhinav Gupta, an assistant research professor at Carnegie Mellon University, told The Register. | <urn:uuid:1a3b689e-f486-4baf-b517-80b305357352> | {
"date": "2014-07-28T14:10:10",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9669341444969177,
"score": 3.171875,
"token_count": 260,
"url": "http://investorplace.com/2013/11/pennsylvania-computer-picking-common-sense/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+InvestorPlace+%28InvestorPlace%29"
} |
A new method for detecting the levels of amyloid proteins in the brain, a key feature of Alzheimer's Disease, lets researchers figure out if a drug is reducing their prevalence, as one new drug has done. But there's a catch.
Alzheimer's is one of the most terrifying diseases out there, since it leaves people physically healthy but mentally ravaged. Researchers have long believed that amyloid plaques either cause Alzheimer's or are a key factor, and a lot of money has gone into researching drugs that reduce the prevalence of these plaques. So it's a great cause for celebration that bapineuzumab, a drug now being developed by Elan Corp. and now owned by Johnson & Johnson, showed an ability to reduce amyloid plaques in 28 patients.
At the end of the 18-month study period, the patients had 25 percent less amyloid plaques than a control group. And the bapineuzumab patients actually had less plaques than they had at the start of testing.
But actually, there are two catches here. The first is that bapineuzumab can have dangerous side effects — high doses can have ill effects, as earlier tests found, and two patients in the current study had cerebral edemas caused by water on the brain. But it sounds like the side-effects are manageable, and it may be just a matter of finding the right dosage.
The bigger catch is, we still don't know if amyloid plaques are a cause or merely a symptom of Alzheimer's disease. A large and growing number of researchers believe the true cause of Alzheimer's is the tangles of tau proteins that also accumulate in the brains of Alzheimer's sufferers. So it's possible that the decade of research into drugs that can reduce amyloid plaques will turn out to have been a blind alley. (Or it's possible that you need to attack both amyloid plaques and tau tangles, jointly.) It's notable that this latest study didn't actually track the mental functioning of the patients whose plaques were reduced.
In any case, whether bapineuzumab turns out to be a wonder drug, or a dead end, the real breakthrough here is the development of a method of assessing a patient's number of amyloid plaques — something we could only do after death, via autopsy, until now. Researchers were able to use a radiotracer called Pittsburgh compound B, which latches on to amyloid plaques in the brain, and then track it using PET scans. That could also be a valuable diagnostic tool, although it's not terribly useful until we actually have a treatment that works. [NJ.com and PhysOrg] | <urn:uuid:9428495b-3dfc-4c25-948a-c79737f3af52> | {
"date": "2014-07-28T13:06:04",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9679030179977417,
"score": 3.484375,
"token_count": 563,
"url": "http://io9.com/5483908/alzheimers-drug-may-actually-reverse-the-progress-of-the-disease"
} |
I don't think I'm telling tales out of school when I say there's a certain amount of, well, crap on the internet. But engineers at Hewlett-Packard want to take things one step further, using cow manure to power the web.
Companies like Google, Microsoft, and Amazon have historically built their data centers in urban areas, the better to tap into the available industrial infrastructure and get information to as many people as fast as possible. In recent years, however, these locations have become less than ideal due to rising real estate and electricity costs, which has led a lot of internet companies to look towards more rural regions to find the plentiful, cheap land and power they so desperately need.
These centers are no longer tethered to cities because faster data transfer networks eliminate the need to house them near large population areas. That makes such moves even more desirable, and lots of new centers - or, as they're rather appropriately nicknamed, server farms - have opened up in rural Washington, Texas, Oklahoma, and Iowa. That often places them near dairy farms, which led to ideas about a novel way to power the centers.
Farmers have long struggled with just what to do with the voluminous amount of cow manure, and one recent solution has been to convert the waste into biogas. The dung can be processed into methane, which can then be used as a substitute for natural gas or diesel fuel. One researcher estimates a single cow produces enough manure every day to power a 100-watt lightbulb.
The research team at Hewlett-Packard figures about 10,000 cows would be needed to power a small data center, such as one used by a bank. There isn't enough cow manure to power all the data centers - hydroelectric power would still be a key source of energy here - but it would alleviate some of the power crunch. There's also a natural partnership between the two, as data centers typically produce massive amounts of heat while the biogas conversion process requires a lot of heat. If the heat from one can be transferred to the other, that would be a great way to further reduce costs.
While initial plans call for the construction of biogas plants near data centers in California or Texas, the biggest benefit may be overseas. China and India have even larger rural areas than the United States, and consequently even more cow dung to draw upon. The thought is that this cost-saving measure could greatly increase the ability to quickly set up data centers in those countries.
If nothing else, the report is worth reading for this fantastic quote from Chandrakant D. Patel, the director of H.P.'s sustainable information technology laboratory and one of the leaders on this project:
"Information technology and manure have a symbiotic relationship."
If that's not a nice way of saying the internet is full of shit, I don't know what is. | <urn:uuid:db29bd12-66d0-476c-9a1e-9df9efc931ae> | {
"date": "2014-07-28T13:30:02",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9606380462646484,
"score": 3.171875,
"token_count": 591,
"url": "http://io9.com/5543254/cow-manure-to-power-internet-data-centers?tag=hewlett_packard"
} |
- Posted April 10, 2014 by
Verbal memory and learning get a boost from aerobic exercise
In this new study researchers from Canada, examined the effect of resistance training and aerobic exercise on hippocampal volume and the association between change in hippocampal volume and change in memory.
The study included 86 women, aged 70 to 80 years old with probable cognitive impairment and living independently at home.
Participants at random were assigned to a twice weekly hour long sessions of aerobic training (brisk walking), resistance training, such as lunges, squats, and weights; or balance and muscle toning exercises, for a period of six months.
At the beginning and end of study the size of the hippocampus was assessed by using a 3T MRI scan (gold standard in neuroimaging) to determine hippocampal volume. Verbal memory and learning were assessed by Rey's Auditory Verbal Learning Test.
Only 29 of the women had before and after MRI scans, but the results showed that the total volume of the hippocampus in the group who had completed the full six months of aerobic training was significantly larger than that of those who had lasted the course doing balance and muscle toning exercises.
No such difference in hippocampal volume was seen in those doing resistance training compared with the balance and muscle toning group.
Aerobic training significantly improved left, right and total hippocampal volumes. After accounting for baseline cognitive function and experimental group, increased left hippocampal volume was independently associated with reduced verbal memory and learning performance as indexed by loss after interference.
In their conclusion the researchers write “Aerobic training significantly increased hippocampal volume in older women with probable MCI.”” More research is needed to ascertain the relevance of exercise-induced changes in hippocampal volume on memory performance in older adults with MCI.”
At the very least, aerobic exercise seems to be able to slow the shrinkage of the hippocampus and maintain the volume in a group of women who are at risk of developing dementia, said the researchers.
They recommend regular aerobic exercise to stave off mild cognitive decline, which is especially important, given the mounting evidence showing that regular exercise is good for cognitive function and overall brain health, and the rising toll of dementia.
According to the World Health Organization;
Worldwide, 35.6 million people have dementia, with just over half (58%) living in low- and middle-income countries. Every year, there are 7.7 million new cases.
The estimated proportion of the general population aged 60 and over with dementia at a given time is between 2 to 8 per 100 people.
The total number of people with dementia is projected to almost double every 20 years, to 65.7 million in 2030 and 115.4 million in 2050. Much of this increase is attributable to the rising numbers of people with dementia living in low- and middle-income countries.
This study is published online in the British Journal of Sports Medicine. | <urn:uuid:4b1ef72c-8742-4a0c-b3d7-357f4494a01a> | {
"date": "2014-07-28T12:41:23",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9547113180160522,
"score": 2.75,
"token_count": 601,
"url": "http://ireport.cnn.com/docs/DOC-1118912?ref=feeds/latest"
} |
Virtual Space Odyssey is the latest article on the subject of ICT in languages in this week’s TES Teacher supplement. It describes two collaborative projects which show the benefits of using ICT to get pupils to work together in their own school or across different schools.
The MFL department at Aldersley High School in Wolverhampton are seeing how a virtual reality environment (VRE) can motivate their pupils and encourage them to continue studying languages into KS4. The VRE is a type of online community which allows pupils to work collaboratively with each other by:
• creating e-portfolios of their work
• sending text messages
• peer assessment
Using a personal digital assistant (PDA) or PC, groups of language learners can log on to the VRE and work together in their virtual space. The 3-D environment is visually appealing and allows members to listen to, read and watch files in each others’ areas. MFL teacher Sam Fenton points out that working together in the VRE can boost the confidence of more reserved pupils and enable mutually beneficial peer assessment. She also believes that pupils are motivated by creating work for a real purpose and audience.
The project is funded by the Midlands Curriculum Centre for Languages (formerly known as The Black Country Pathfinder). Buoyed by the success of the VRE at Aldersley, director, Dr Henriette Harnisch now wants to use it to bring together groups of AS students from the same cohort in different schools in the North East. Using the VRE in this way is a practical solution for managing dispersed groups and ensuring courses run.
The second project is designed to facilitate eTwinning. St Julie’s Language College in Liverpool is seeing how the free website Writely.com can strengthen links with their partner school in France. The site allows users to create password-protected web pages which can be accessed by any approved subscriber anywhere in the world. The Liverpudlian pupils collaborate with their French peers by sharing pictures and text over the net.
John Hopwood, former MFL teacher supports both projects at Aldersley High School and St Julie’s. He likes the way they allow pupils to collaborate with each other at home as well as at school in a safe environment moderated invisibly by their teachers. He sees them as practical examples to facilitate eTwinning.
The article also mentions the website www.think.com which allows pupils to share audio and video files with each other. Virtual Space Odyssey is now available to read in full from The TES website in its archives section. | <urn:uuid:17d7b4a7-0d8d-4d59-a6cd-a88ce3915912> | {
"date": "2014-07-28T12:19:08",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9553929567337036,
"score": 3.4375,
"token_count": 529,
"url": "http://joedale.typepad.com/integrating_ict_into_the_/2006/06/index.html"
} |
During the last decade, many manufacturers and fast food restaurants have voluntarily eliminated or reduced their use of trans fat in food preparation after an onslaught of publicity of scientific studies linking trans fats with heart disease. But there are still plenty of foods made with trans fats, mainly in “comfort” and pre-packaged foods.
Trans fats are considered harmful because they increase risks for heart disease by both raising bad cholesterol levels (LDL) and lowering good cholesterol (HDL). In 2006, the FDA began requiring food manufacturers to include trans fats on nutritional labels, and in 2007, New York City banned trans fats from restaurants. Food marketers have been gradually going trans-fat-free in recent years -- McDonald's switched to zero-trans fat cooking oil in its iconic french-fries in 2008.
So, what foods are you most likely to find trans fats? Some of the most popular foods that kids woof-down on a fairly regular basis are:
- Cookies, crackers, cakes, muffins, pie crusts, pizza dough, and breads such as hamburger buns
- Some stick margarine and vegetable shortening
- Pre-mixed cake mixes, pancake mixes, and chocolate drink mixes
- Fried foods, including donuts, french fries, chicken nuggets, and hard taco shells
- Snack foods, including chips, candy, and packaged or microwave popcorn
- Frozen dinners
The FDA currently allows small amounts of trans fats to be included in products that are labeled “trans-fat-free.” You could actually be getting more trans fats than you realize when eating more than a serving size. And we all know that serving sizes are notorious for not being indicative of what a person usually eats. An example would be one cookie. If you really like the cookies, you’ll probably have more than just one.
The independent Institute of Medicine has already concluded that trans fats provide no known health benefit and that there is no safe level of consumption of artificial trans fat, said Margaret Hamburg, FDA Commissioner.
Additionally, the IOM has recommended that Americans keep their consumption of trans fats as low as possible while consuming a nutritionally adequate diet. The FDA change could potentially prevent 20,000 heart attacks a year and 7,000 deaths, said Hamburg.
It’s important for parents to get into the habit of reading nutritional guides listed on food products. Keep in mind that saturated fat is also unhealthy. Products may claim to have 0 trans fats, but still contain partially hydrogenated oils (PHOs). Due to the risks associated with consuming PHOs, FDA has issued a Federal Register notice with its preliminary determination that PHOs are no longer "generally recognized as safe," or GRAS, for short. If this preliminary determination is finalized, then PHOs would become food additives subject to premarket approval by FDA. Foods containing unapproved food additives are considered adulterated under U.S. law, meaning they cannot legally be sold.
Kids need a certain amount of healthy fat in their diet for good brain and nervous system development. Experts say kids older than 2 should get about 30% of their daily calories from fat. Some examples of healthier fats are:
- Unsaturated fats, found in avocados and olive, peanut, and canola oils
- Monounsaturated, found in avocados and olive, peanut, and canola oils
- Polyunsaturated, found in most vegetable oils
- Omega-3 fatty acids, a type of polyunsaturated fat found in oily fish like tuna and salmon
SourSources: Linda Carroll, http://www.nbcnews.com/health/fda-wants-ban-trans-fats-food-8C11551559
Kimball Johnson, MD, http://www.webmd.com/food-recipes/understanding-trans-fats | <urn:uuid:3514fc9e-5999-487a-9b64-60f0ad23e4e8> | {
"date": "2014-07-28T12:19:50",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.952655017375946,
"score": 3.1875,
"token_count": 800,
"url": "http://kidsdr.com/your-child/fda-targets-artificial-trans-fats-foods"
} |
Previously published results from Bryan Lessard, a 24-year-old researcher at Australia’s Commonwealth Scientific and Industrial Research Organization, were recently announced on the species that had been sitting in a fly collection since it was captured in 1981 – the same year pop diva Beyonce was born.
He says he wanted to pay respect to the insect’s beauty by naming it Scaptia (Plinthina) beyonceae.
Lessard said Beyonce would be “in the nature history books forever” and that the fly now bearing her name is “pretty bootylicious” with its golden backside.
“Bootylicious” was the title of a song by Beyonce’s previous group, Destiny’s Child.
It’s unknown if the rare species is a bloodsucker like many female horse flies. Lessard says he was unable to find any live specimens when he went looking in 2010 in northeast Queensland’s Atherton Tablelands, where it was captured three decades ago. However, at least one member of the public has alerted him that he was recently bitten by what’s locally called the “gold bum fly.”
The description of the fly was earlier published in the Australian Journal of Entomology, but the results were announced last week.
Lessard says he hasn’t heard from Beyonce, who recently gave birth to her first child, but he is a fan and hopes she will take his scientific gesture as a compliment. He also said the name was picked to help draw attention to the importance of his field and the need for more researchers to catalog and study insects.
Horse flies are “vital pollinators of native plants, not just in Australia, but all over the world,” Lessard said. “It’s extremely important to name all the undescribed species so we can measure our human impact on the environment and hopefully protect it for future generations to enjoy.” | <urn:uuid:c5af2d67-cce4-49fa-8760-7c01047f0e1e> | {
"date": "2014-07-28T13:21:47",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9798097014427185,
"score": 2.890625,
"token_count": 419,
"url": "http://kissdetroit.com/3233312/golden-bum-horse-fly-named-beyonce-yes-were-serious/"
} |
The theory of “mineral evolution” — the idea that the Earth’s rocks are dynamic “species” which emerged over time, sometimes in concert with living things — is a radical new idea introduced by this paper. The theory, called Mineral Evolution, states that:
Biochemical processes may be responsible, directly or indirectly, for most of Earth’s 4300 known mineral species.
According to this theory, life is a geological force. Life has shaped the physical shape and form of the rocky planet we live on. Life, a standing wave of ephemeral organisms, each one who lives a nano-second in geological time, shapes the seemingly eternal rocks beneath them. It is not just layers of pre-living organisms in marble and limestone, but the very mountains may be influenced by life.
The paper offers a brief timeline of the accumulation of species on Earth in geological time might look like this.
60 species of mineral >4.56 Ga (mostly chondrites — the material found in meteorites)
250 species of mineral 4.56 — 4.55 Ga (achondrites and iron)
350 species of mineral 4.55 — 4.0 Ga (igneous rock)
1000 species of mineral 4.0 – 3.2 Ga (granitoids, primitive granites)
1500 species of mineral 3.2 — 2.8 Ga (new sulfate ores, due to plate tectonics and first life)
4000 species of mineral 2.5 — 1.9 Ga (great oxidation)
4300 species of mineral 0.54 > now (calcites, dolomite, opal and clays)
By this account, there are 3 stages to mineral evolution. (The primary author Robert Hazen uses the term evolution to mean progressive change, rather than natural selection. )The first is the progressive separation of elements from the primordial mix of the original gas nebula before the planets and sun formed. Elements like carbon, silicon separate and recombine to form basic building blocks. The second stage is geological pressure and temperature and chemical oxidation upon these blocks, which produced new minerals. The third stage is “the generation of far-from-equilibrium conditions by living systems” which unleash a multitude of new mineral forms.
Thus biology began to affect the Earth’s surface about 3.8 Ga when life changed its atmosphere and ocean chemistry, precipitating out carbonate and iron formations. Later around 2.2 to 2.0 Ga, during the “great oxidation event” the rise of multicellular life yielded massive amounts of skeletal biomineralization (limestone, dolomites, marbles, shales, etc.), which in turn, transformed the surface minerals on the planet.
An example of pre-oxidation life making minerals are these Iron banding rocks formed 2.5 to 4 billion years ago (Ga). Image from Hazen.
According to this article about Hazen’s theory,
As the materials that formed Earth “clumped” together and were subject to thermal pressures and other forces, the number of distinct minerals increased to about 250, the study says. Then, due to volcanic activity, plate tectonics and other processes that churned the surface of the planet before life emerged, the population of mineral “species” had grown to about 1,500 by four billion years ago. That’s when changes to ocean chemistry and atmospheric conditions, coupled with the emergence of life, sparked an unprecedented diversification of the world’s minerals.
“For at least 2.5 billion years, and possibly since the emergence of life, Earth’s mineralogy has evolved in parallel with biology,” Mr. Hazen added. “One implication of this finding is that remote observations of the mineralogy of other moons and planets may provide crucial evidence for biological influences beyond Earth.”
In other words, one might be able to detect life on other planets by looking at the planet’s mineral diversity, which, like its atmosphere, may be detectable from a great distance.
But if the mineralogy of a terrestrial planet evolves as a consequence of a range of physical, chemical, and biological processes, then why should it stop with natural life?
We should expect that over the very long term, if technology continues to increase its presence and scope, our planet will see anthropogenic rock. Technology will produce species of minerals birthed via technological pollution, or by products of agriculture and manufacturing. Indeed, since agriculture has been affecting the Earth for at least 10,000 years, we may be able to find the first evidence of anthropogenic minerals in soils disturbed by tilling, or layers of dust liberated by constant plowing or over-grazing, or in deposits from salt generated by over-irrigation. In the long-term perhaps layers of plastic in landfills, or exposure to acid rain, or sulfur particulates may clump into some new kind of mineral under pressure. These minerals can also form far from the centers of technology, because the lithosphere, like the biosphere, is a complex system of interacting forces.
Just as it may be possible for us to learn how to detect life on a planet by the detecting the presence of certain biogenic minerals, it may also be possible to detect technology by the presence of technogenic minerals. In some cases, the technogenic minerals may be all that is left of a technological civilization. | <urn:uuid:baae64c4-dbfd-436e-b030-51002d190440> | {
"date": "2014-07-28T12:38:41",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9089539647102356,
"score": 3.875,
"token_count": 1133,
"url": "http://kk.org/thetechnium/2008/12/technology-a-ge/"
} |
Sunday, January 2, 2011
The story is in the New York Times:
Perched above the prison yard, five cameras tracked the play-acting prisoners, and artificial-intelligence software analyzed the images to recognize faces, gestures and patterns of group behavior. When two groups of inmates moved toward each other, the experimental computer system sent an alert — a text message — to a corrections officer that warned of a potential incident and gave the location.
The computers cannot do anything more than officers who constantly watch surveillance monitors under ideal conditions. But in practice, officers are often distracted. When shifts change, an observation that is worth passing along may be forgotten. But machines do not blink or forget. They are tireless assistants.
. . .
The uses, noted Frances Scott, an expert in surveillance technologies at the National Institute of Justice, the Justice Department’s research agency, could allow the authorities to spot a terrorist, identify a lost child or locate an Alzheimer’s patient who has wandered off.
The future of law enforcement, national security and military operations will most likely rely on observant machines. A few months ago, the Defense Advanced Research Projects Agency, the Pentagon’s research arm, awarded the first round of grants in a five-year research program called the Mind’s Eye. Its goal is to develop machines that can recognize, analyze and communicate what they see. | <urn:uuid:3561c6b4-163f-4dfa-9279-5d4d3ebadd80> | {
"date": "2014-07-28T12:49:47",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9238998293876648,
"score": 3.03125,
"token_count": 283,
"url": "http://lawprofessors.typepad.com/crimprof_blog/2011/01/computers-that-see-you-and-keep-watch-over-you.html"
} |
Next time your little one strikes a fever it doesn’t mean you need to get overheated. There are a handful of things to remember to help you keep a cool head. First, it’s not considered a fever until the temperature tops 100.4.
“We like to know about fevers over the 100.4 mark. Anything above the 103.5 – 104 range can be associated with significant infections,” says Dr. Nancy Witham, pediatrician with Lee Memorial Health System.
Secondly, fever is a healthy response for the body.
“People always assume the fever itself may be part of the sickness, but a fever is oftentimes what your body is doing to help you fight off an infection,” says Dr. Witham.
Third on our list is to treat the symptoms, not the number. Instead of focusing on the thermometer’s fluctuations, pay attention to what’s making your child feel bad.
“You’re giving your fever reducer not so much to bring down the fever. It’ll do that hopefully, but it is also going to make them feel a little bit more comfortable. Maybe make them a little bit more likely to drink the juice you think they need,” says Dr. Witham.
Fourth up - in babies use a rectal temperature. A rectal thermometer gives true core temperature whereas forehead and ear thermometers aren’t nearly as accurate.
And finally, keep your doctor updated. And tell them about symptoms that might be a sign of something more serious.
“We would like to know where you’ve taken your temperature and what you’ve gotten, what you’re noticing as a parent. Your child is lying around even after the anti fever medicine and has that stiff neck. You might also want to notice any skin rashes; that can be very important,” says Dr. Witham.
Another important point, is to stay calm, most fevers subside in a matter of days. | <urn:uuid:4226d08e-f217-4321-b9bb-be0d6089481e> | {
"date": "2014-07-28T12:21:10",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9499415755271912,
"score": 2.859375,
"token_count": 425,
"url": "http://leememorial.org/healthmatters/scripts_2013/080413.html?lightbox[width]=550&lightbox[height]=500"
} |
The Federal Reserve Bank of New York works to promote sound and well-functioning financial systems and markets through its provision of industry and payment services, advancement of infrastructure reform in key markets and training and educational support to international institutions.
Regional & Community Outreach connects the Bank to Main Street via structured dialogues and two-way conversations on small business, mortgages, and household credit.
Economic Education improves public knowledge about the Federal Reserve System, monetary policy implementation, and promoting financial stability through the Museum and programs for K-16 students and educators, and the community.
Last year, our blog presented results from the FRBNY Consumer Credit Panel (CCP) indicating that, at a time of unprecedented growth in student debt, student borrowers were collectively retreating from housing and auto markets. In this post, we compare our 2012 findings to the news for 2013.
This post is the fifth in a series of thirteen Liberty Street Economics posts on Large and Complex Banks. For more on this topic, see this special issue of the Economic Policy Review.
Building upon previous posts in this series that discussed individual banks, we examine the historical growth of the entire financial sector, relative to the rest of the economy. This sector’s historically large share of the economy today (see chart below) and its role in disrupting the functioning of the real economy during the recent financial crisis have led to questions about the social value of costly financial services. While new regulations such as the Dodd-Frank Act impose restrictions on financial activities and increase their costs, especially those of large firms, our paper suggests that there may be limits to what regulation can achieve. In particular, we show that financial growth has occurred in the more opaque and harder to regulate sectors: private firms, shadow banks, and small nonbank financial firms. Moreover, we find that the stock market values these opaque areas of finance more, suggesting that they may expand even faster in the future.
In the late 1600s, England operated a bi-metallic monetary system of high-value gold coins and lower-value silver coins. In the early 1690s, however, the market price of silver began to rise at a time when the mint price of gold was higher than the market price. Thus, gold bullion was flowing to the mint while silver coins were flowing to the commodity markets. By 1695, nearly half of the silver specie was missing from coin in circulation in England as coins were “clipped” (shaved) with the result that their face value no longer reflected the metal content. Ironically, low-weight coin was still accepted for tax payments. In this post, we recount England’s efforts to remedy the “ill state of the coin of the kingdom” during the re-coinage of 1696.
As Mike Dash notes in his well-researched and gripping Tulipomania, tulips are native to central Asia and arrived in the 1570s in what’s now Holland, primarily through the efforts of botanist Charles de L’Escluse, who classified and spread tulip bulbs among horticulturalists in the late 1500s and early 1600s. By the early 1630s, the tulip was a fixture in Dutch gardens. But Tulip Mania didn’t begin until the summer of 1633, when a house in Hoorn was exchanged for three rare tulips and a Frisian farmhouse was traded for a number of tulip bulbs. The lure of profit enticed novice florists to enter the tulip trade with minimal investment and small parcels of land, harkening back to the days of farmers taking up coin clipping during the Kipper und Wipperzeit. In this edition of Crisis Chronicles, we exchange the trading floors of today for the alcohol-fueled exchanges of the past as we dig up Tulip Mania.
momentous as financial crises have been in the past century, we sometimes
forget that major financial crises have occurred for centuries—and often. This
new series chronicles mostly forgotten financial crises over the 300 years—from
1620 to 1920—just prior to the Great Depression. Today, we journey back to the
1620s and take a fresh look at an economic crisis caused by the rapid
debasement of coin in the states that made up the Holy Roman Empire.
Recent financial developments are calling into question the future of regional economic integration. Market confidence deteriorates across countries in a contagious way. The place is Europe, the time is . . . now? Or twenty years ago? In fact, in the early 1990s Europe went through a systemic crisis that displays remarkable similarities to today’s events. In this post, we go back to those momentous times and briefly recall how the last Europe-wide crisis started, unfolded, and concluded. The 1992 crisis was eventually resolved, suggesting that there may be some light at the end of the current tunnel as well.
In 1937, on the eve of a major policy mistake, U.S. economic conditions were surprisingly similar to those in the nation today. Consider, for example, the following summary of economic conditions: (1) Signs indicate that the recession is finally over. (2) Short-term interest rates have been close to zero for years but are now expected to rise. (3) Some are concerned about excessive inflation. (4) Inflation concerns are partly driven by a large expansion in the monetary base in recent years and by banks’ massive holding of excess reserves. (5) Furthermore, some are worried that the recent rally in commodity prices threatens to ignite an inflation spiral.
Liberty Street Economics invites you to comment on a post.
We encourage you to submit comments, queries and suggestions on our blog entries. We will post them below the entry, subject to the following guidelines:
Please be brief: Comments are limited to 1500 characters.
Please be quick: Comments submitted more than 1 week after the blog entry appears will not be posted.
Please try to submit before COB on Friday: Comments submitted after that will not be posted until Monday morning.
Please be on-topic and patient: Comments are moderated and will not appear until they have been reviewed to ensure that they are substantive and clearly related to the topic of the post. The moderator will not post comments that are abusive, harassing, or threatening; obscene or vulgar; or commercial in nature; as well as comments that constitute a personal attack. We reserve the right not to post a comment; no notice will be given regarding whether a submission will or will not be posted. | <urn:uuid:acd35f68-9d3a-4857-b5c9-084de1b5b38c> | {
"date": "2014-07-28T12:20:01",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9519414305686951,
"score": 2.671875,
"token_count": 1347,
"url": "http://libertystreeteconomics.newyorkfed.org/economic-history/"
} |
© Press Association Images; courtesy of Britannica ImageQuest
- Finding critical essays for assignments
- Reference sources
- Finding books
- Performances of Shakespeare plays
- Guides to MLA style
- Additional sources of information on the Internet
If you are using these resources from off campus, you will need your My Chemeketa user name and password.
- Literature Resource Center
- Includes more than 650,000 full-text articles, critical essays and reviews from over 300 scholarly journals and literary magazines. Also includes book reviews in the popular press. The default search is by author, title, and/or key word. After searching, click the "Literature Criticism" tab.
A short, informal video on how to use Literature Resource Center is at http://screencast.com/t/NTdkZTliNWQ.
If you have low bandwith, or prefer text, a complete set of directions for using Literature Resource Center is available.
- JSTOR is a digital archive of journal content. Chemeketa has the archive collections Arts & Sciences I and Arts & Sciences III, comprising about 400 journals. The collections are strong in the humanities. For best results, click on the Advanced Search link and then choose Article under Item Type.
- Academic OneFile [Gale]
- Available through Gale, Academic OneFile includes full text for more thousands scholarly periodicals covering a wide variety of topics including literature. Academic OneFile indexes a journal called Shakespeare Quarterly, which Chemeketa owns in paper format.
How to use Academic OneFile
Reference call numbers are given for printed books. If you are using the online resources from off campus, you will need your My Chemeketa user name and password.
- An A-Z Guide to Shakespeare
- Gives brief information on many people people and things associated with Shakespeare, e.g., actors, editions, artists, theaters.
- Arts and Humanities Through the Eras
- "Renaissance Europe 1300-1600: Theater" and "The Age of the Baroque and Enlightenment 1600-1800: Theater" include a chronologies of important events, articles on commercial theater in England, and biographical sketches.
- Masterplots II: Drama Series [R 809.204 M39]
- Organized alphabetically by title of play with Title and Author indexes in last volume. Short plot summaries and criticism; a good source to help one understand a play.
- Critical Survey of Drama [R 809.2003 C86]
- Volume 6 includes short introductions to Shakespeare's plays.
- The Crown Guide to the World's Great Plays [R 809.2 Sh6]
- Includes stage history of the plays.
- Dictionary of Shakespeare
- Entries on all aspects of Shakespeare.
- Shakespeare's Sexual Language: A Glossary
- Entries on the extensive sexual references of Shakespeare.
- Music in Shakespeare: A Dictionary
- Scholarly dictionary to musical terms used in the plays and poetry.
- Oxford Companion to Shakespeare
- An "authoritative guide to Shakespeare's plays and poems, and their interpretation around the world over the last four centuries. Special feature entries on every play are included."
- Shakespeare A to Z (Encyclopedia of Shakespeare on spine and cover) [R 822.33 Gbo]
- Nearly 1,000 entries on his life and works.
- A Shakespeare glossary [R 822.33 Fo]
- Explanations of words found in Shakespeare
- The Shakespeare Handbook [R 822.33 Gsh]
- Background, themes, and characters of the plays
- Shakespeare for Students : Critical interpretations of As You Like It, Hamlet, Julius Caesar, Macbeth, The Merchant of Venice, A Midsummer Night's Dream, Othello, and Romeo and Juliet * [R 822.33 Gsha]
- "Essential criticism" of the most-studied plays.
- Shakespeare's Books: A Dictionary of Shakespeare Sources
- Information on all the books which serve as sources of Shakespeare's plots and references.
- Shakespeare's Comedies: Comprehensive Research and Study Guide
- Plots, themes, and characters from Taming of the Shrew, Midsummer Night's Dream, Merhcant of Venice, As You Like It, and Twelfth Night.
- Shakespeare's Legal Language: A Dictionary
- B.J. and Mary Sokol are the authors of this book which includes the complex language of property ownership as well as other legal terms.
- Shakespeare'sShakespeare's Military Language: A Dictionary
- Explains the frequent and unfamiliar terminology of military rank, weapons, etc., used in Shakespeare.
- Shakespeare's Non-Standard English: A Dictionary
- Treats Shakeepare's non-formal or casual vocabulary and usage. By Norman Blake.
- Shakespeare's Religious Language: A Dictionary
- This dictionary by R. Chris Hassell deals with the figurative and literal refrences to religion in the plays.
Literary Dictionaries And Handbooks
These reference books will explain specialized literary terms that may be found in works of criticism. If you are using the online reference books from off campus, you will need your My Chemeketa user name and password.
- A glossary of contemporary literary theory [R 801.95014 H31]
- A multicultural dictionary of literary terms [R 803 C18]
- The Concise Oxford Dictionary of Literary Terms [R 803 C74 and online]
- A Handbook to Literature [R 803 H73]
- Merriam-Webster's Encyclopedia of Literature [R 803 M55]
- Also available online in Literature Resource Center. Start Literature Resource Center and click the "Dictionaries" link at the top of the page.
- New Handbook of Literary Terms
- Oxford Companion to English Literature [R 820.3 Ox2 and online]
- The Cambridge Guide to Literature in English [R 820.9 C14]
- The Oxford Dictionary of Literary Terms [R 803 C74 and online]
You can use Subject or Keyword searches to find books on your topic. The catalog uses special subject headings, which may be found in detail in: R 025.49 L61 Library of Congress Subject Headings. (The headings are searchable online at Library of Congress Authorities.) The catalog is accessible off campus at http://library.chemeketa.edu/information/cataloghome.php.
Numerous Electronic books are available through to Chemeketa students. If you are using these resources from off campus, you will need your My Chemeketa user name and password.
If the material you want is not in Chemeketa's library
- you can change your search from Chemeketa to "All libraries" on the search page.
- For information about requesting books from other CCRLS libraries, see Requesting materials from another CCRLS library.
If what you want is not in the local system,
- you can also click the "Summit" link in the library catalog, or
- search Summit directly.
- Chemeketa students taking at least one credit hour and Chemeketa employees may request items in Summit and have them sent to Chemeketa, or they may set up a Visiting Patron account.
- How to use Summit and request items through the catalog
- For help with Summit requests, please contact the reference desk at 503-399-5231 or e-mail Reference.
If you do not find what you need in Summit, ask your local librarian to request an interlibrary loan. That way the book you need can be sent from Chemeketa or another library for you to check out and use locally.
If you live outside the college district, but in Oregon or Washington
- You can search in the Summit Catalog
- Chemeketa employees and students taking at least one credit hour may request items in Summit and have them sent to a Summit library where thay have set up a Visiting Patron account
- For help with Summit requests, please contact the reference desk at 503-399-5231 or [email protected].
Library catalogs use special subject headings, which may be found in detail online at Library of Congress Authorities.
If you do not live near a Summit library, you can
- Search your local library catalog, or you can search in that of Chemeketa or a third library to find material you need
- You will find all these options on the catalog page
- If the material you want is not in your local library, ask your local librarian to request an interlibrary loan. That way the book you need can be sent from Chemeketa or another library for you to check out and use locally
- A four-page guide to library research services for distant students contains more information on interlibrary loan.
Electronic books are available through to Chemeketa students NetLibrary. If you are using these resources from off campus, you will need your My Chemeketa user name and password.
|Subject||Shakespeare's name||Shakespeare, William, 1564-1616|
|Subject||Shakespeare's name, then scroll to subdivision "Criticism and interpretation"||Shakespeare, William, 1564-1616. -- Criticism and interpretation|
|Subject||Shakespeare's name, then scroll down to subdivision by title of play||Shakespeare, William, 1564-1616. -- Coriolanus|
|Subject||Library of Congress subject heading||English drama -- Early modern and Elizabethan, 1500-1600 -- History and criticism|
|Keyword||Shakespeare AND criticism||Shakespeare AND criticism|
|Keyword||Combination of words from playwright's name and title of play and criticism||Shakespear* AND Romeo AND criticism|
The asterisk (*) is a truncation character that tells the computer to return any word that begins with "Shakespear," such as Shakespeare, Shakespeare's, Shakespearean.
Ambrose Video has full-length performances of 14 Shakespeare plays in streaming video. If using from off campus, you will need your My Chemeketa user name and password.
Theatre in Video has full-length performances of a number of Shakespeare's plays in streaming video. If using from off campus, you will need your My Chemeketa user name and password.
- MLA handbook for writers of research papers [R 808.02 G35 2009]
- The complete, official guide to MLA style.
- The OWL at Perdue: MLA Formatting and Style Guide - http://owl.english.purdue.edu/owl/resource/747/01/#resourcenav
- Perdue University site with examples of MLA citations for different types of resources. Follows the 2009 edition of MLA Handbook.
- Citing Sources from Online Databases - http://library.chemeketa.edu/instruction/citing.php
- Chemeketa has prepared examples of articles in MLA format for you on this page.
- The Forest of Rhetoric: Silva rhetoricae - http://humanities.byu.edu/rhetoric/
- A dictionary of figures of speech.
- Perseus Renaissance Materials - http://www.perseus.tufts.edu/hopper/collection?collection=Perseus:collection:Renaissance&redirect=true#secondary1
- Include an online version of C.T. Onions's Shakespeare glossary, a standard work, and several other works of reference on Shakespeare.
- U Vic Writers' Guide - http://web.uvic.ca/wguide/Pages/StartHere.html
- Click "index" for an alphabetical list of terms, or browse by categories
To comment or request help, please e-mail Reference or call 503.399.5231.
Address of this page: http://library.chemeketa.edu/instruction/handouts/ENG201-203.php
Updated: 18 February 2014 | <urn:uuid:dc19fa07-c69e-44ef-8f1a-46dae9958eb5> | {
"date": "2014-07-28T12:20:11",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8273190259933472,
"score": 2.78125,
"token_count": 2515,
"url": "http://library.chemeketa.edu/instruction/handouts/ENG201-203.php"
} |
Most Active Stories
Fri March 1, 2013
Twin Study, Genetics, And Eppley Cancer Study
Dr. Gareth Davies, PhD Scientific Director of the Avera Institute for Human Genetics, and Dr. Amy Krie, MD-Oncologist, discuss twin study and a recent cancer study.
The Netherlands Twin Study: DNA has been collected from 4,414 twins in the Netherlands, who have been followed from birth until age 22. The study allowed them to identify new genetic influences on child psychiatric illness which in turn has lead to improved diagnostic and treatment approaches. The project was the first single nucleotide polymorphism (SNP)/copy number variation (CNV) and genome-wide association study of common childhood psychopathologies using an extended twin-sibling family study design.
The Eppley Cancer Study is designed to bring cancer experts together, and gather patient information and tissue samples in order to develop improved prevention and treatment strategies in the fight against breast cancer.
Initiatives of the Breast Cancer Collaborative Registry :
- Whole genome analysis to assist physicians in making best treatment recommendations for their individual patients
- An e-Breast Cancer Registry to provide patients with personalized cancer prevention and control information
- An e-Breast Cancer Conference, in which patient cases are reviewed by a multidisciplinary team that collaborates on best treatment protocols
- e-Breast Cancer Consultation in which breast cancer specialists review cases submitted by oncologists | <urn:uuid:ecc6df86-45fa-4204-afa4-1e059924c0b2> | {
"date": "2014-07-28T12:21:13",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9099240899085999,
"score": 2.796875,
"token_count": 296,
"url": "http://listen.sdpb.org/post/twin-study-genetics-and-eppley-cancer-study"
} |
Statistical studies of impact crater populations have been used to model ages of planetary surfaces for several decades . This assumes that crater counts are approximately invariant and a "correct" population will be identified if the counter is skilled and diligent. However, the reality is that crater counting is somewhat subjective, so variability between counters, or even between days for the same counter, is expected [e.g. 2, 3]. This study was undertaken to quantify that variability between crater counting experts.
Eight scientists, each with at least 5 years of crater counting experience, were recruited to count craters on the same image, using their preferred counting method. The software used included ArcGIS (by ESRI) with various extensions, JMARS (by Arizona State U), DS9 (by Smithsonian Astrophysical Obs.) with custom add-ons, and the Moon Mappers interface (by CosmoQuest). In addition, two researchers (Antonenko and Robbins) used several different interfaces to test the role of software on their results. The counting was conducted on a ~4 sq-km segment of a Lunar Reconnaissance Orbiter Narrow-Angle Camera image, M146959973L (63 cm/px), centered on the Apollo 15 landing site. With ~1000 craters in the 10-400 m range, this region is in saturation equilibrium for craters <~150 m (typical for mare ), and so represents an extreme case for crater counting repeatability.
Results from experts were grouped using a clustering code to identify which marked craters represented the same crater. Craters marked by 5 or more experts were deemed "verified" and added to a final crater catalog. Individual results were compared to each other and to the final catalog. Analyses were done in units of pixels, so that results may be generalized.
Cumulative size-frequency distribution (CSFD) plots, which show the total number of craters larger than a diameter (D) as a function of D, suggest significant variability between experts. A > 20% dispersion was found in the number of craters identified at any given diameter. Standard deviations ranged from 20.7% for D?18 px (~12 m for this data set) to 31.5% for D?100 px (~70 m). This implies that expert CSFD results are more consistent for smaller craters than larger craters, possibly due to fewer craters and more degradation at large sizes. This is similar to the results of .
Kolmogorov-Smirnov (K-S) tests were used to compare the populations of expert data. Under these tests, craters with D?18 px (~12 m for this data set) show poor agreement between experts, with 54% of data pairs representing different populations (P-value <0.01). Agreement improved significantly for larger diameters, with 39% representing different populations at D?22 px (~15 m) and only 18% being different at D?25 px (~17 m), suggesting that aliasing effects occur at smaller diameters. However, expert results agree well with the final crater catalog, where 75% of experts match the catalog population (regardless of diameter). Multiple analyses are clearly needed to examine different aspects of how well populations match.
Consistency among different interfaces for individual experts was also variable. Robbins conducted counts using Moon Mappers and ArcGIS (with personal software for fitting circles). His results show good agreement over the entire diameter range: the two CSFDs are within 1 standard deviation of each other's error bars and have a K-S test P-value of 0.59 at D?25 px (17 m). Antonenko conducted counts using Moon Mappers, JMARS, and ArcGIS (with CraterHelper tools). Her results are more complicated; all three methods agree to 1 standard deviation for large craters (D>80 px/ 55 m), but ArcGIS and JMARS data differ by >1 standard deviation from the other methods for medium (30 < D < 80 px or 20 < D < 55 m), and small (D < 25 px / 17 m) craters, respectively. For D?25 px (17 m), K-S test P-values of <0.05 suggest that none of the Antonenko data unambiguously represent the same population. This shows that even individual experts may produce varying results when using different interfaces.
This study has significant implications for comparisons of model surface ages determined by different researchers. Results show that variability in crater counts between different experts using different interfaces is ~20-30% but can be as much as 2-3x different. Disagreements on that order in the literature could therefore be simply due to counting differences. Furthermore, aggregation of data from multiple people and methods is expected to give more reliable results.
Shoemaker & Hackman (1962), in The Moon, LPI, TX, 289-300.
Greeley and Gault (1970), Moon, 2, 10-77.
Hiesinger et al. (2012), JGR 117, doi: 10.1029/2011JE003935.
Shoemaker (1965), in Nature of Lun. Surfaces, 23-77. | <urn:uuid:931d38d6-2619-4397-94ff-b0d5d971a7ad> | {
"date": "2014-07-28T12:19:39",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.938206136226654,
"score": 2.90625,
"token_count": 1083,
"url": "http://lunarscience.nasa.gov/lsf2013/print/135"
} |
The cross timbers is a North American ecoregion that exists between the eastern forest and the tall grass prairie. Much of the cross timbers forest is still intact because the quality of the wood is so poor it was never clear cut. Acreage never cleared for agriculture but used for pasturage still hosts plenty of really old trees. 400 year old post oaks and 500 year old red cedars are not unknown or even rare. The cross timbers is also known as post oak/blackjack oak uplands, named for the 2 dominant tree species. Neither species produces quality wood, explaining why, unlike in the eastern forests, lumber companies left this region alone.
Map of the cross timbers ecoregion.
Oak savannah in the cross timbers. The flora is influenced by fire, drought, and tornado. This is the southern part of tornado alley.
The cross timbers ecoregion is bounded by tall grass prairie to the north-northeast, oak-hickory-pine Ozark highlands to the east, and mixed grass plains to the west. Steep hills, low mountains, rough escarpments, and 4 sizeable rivers shape the topography. Young forests form impenetrable thickets of scrub oak, greenbrier, and sumac. Mature forests become oak savannahs, influenced by frequent fire and tornado. In addition to post oak and blackjack oak, bur oak, and black hickory (Carya texana) grow on the uplands, while big bluestem and Indian grass thrive between the widely spaced trees. River bottomland forests consist of river birch, mockernut hickory, cottonwood, sycamore, black walnut, hackberry, and buttonbush. Live oak is a component of the western part of this region. Red cedar becomes a dominant cross timbers tree when fire is absent or suppressed.
I think the cross timbers region may be a near, but of course not exact, analogue to some parts of southeastern North America during some climatic stages of the Pleistocene, particularly the eoWisconsinian. The eoWisconsinian is not precisely defined in the literature but generally is thought to be the early stages of the Wisconsinian Ice Age, perhaps roughly dated from 118,000 BP- 70,000 BP. It encompasses 3 stadials (cold stages) and 3 interstadials (warmer stages). The climate gradually became cooler and drier during this time period as the north polar ice cap began to reform and expand following its complete dissolution during the Sangamonian Interglacial. This gradual cooling was interupted by sudden reversals when the climate turned wet and warm. Temperatures at the beginning of the eoWisconsinian may have been as warm or warmer than they are today, but by the end average temperatures were below those of the present day.
The 3 pollen studies of southeastern North America that date to this time period suggest an environment dominated by oak and grass during interstadials. The main difference between the Oklahoma cross timbers and the eoWisconsinian of southeastern North America is the considerable presence of pine in the latter, especially during cold stages. Spruce was present but didn’t become a significant compoenent of southeastern Ice Age forests until after the eoWisconsin.
I also consider the Oklahoma cross timbers an analogue to eoWisconsinian environments of the southeast because of the intermingling of western and eastern fauna. The fossil record shows that several species of extant mammals and birds today restricted to the west used to live in the south during the Ice Age.
13-lined ground squirrel
Current distribution of 13-lined ground squirrel. This species lived in the southeast during the Ice Age.
The rangemap above clearly shows the 13-lined ground squirrel (Spermophilus tridecemlineatus) is conspicuously absent from the southeast. Yet, fossil specimens of this species have been recovered from Yarbrough Cave in north Georgia and the Turtle River in south Georgia–evidence it was widespread in the state during the Ice Age. Ground squirrels hibernate for an astonishing 8 months. The evolutionary advantage of being dormant during long winters might explain why they no longer live in south where winters are short. However, the growing season in the Oklahoma cross timbers is over 7 months long. I hypothesize its absence in the south today is due to a severe reduction in southeastern grasslands in the early Holocene when forests expanded. Later, Indians regularly began setting fires here to enhance grassland development, but ground squirrels have been unable to recolonize the area. It would be interesting to do a little experimental human- aided transport to see if they could live in the present day south on suitable habitat, but I’m sure ecologists would consider it an invasive species and object. Along with ground squirrel specimens, other western species such as badger, northern raven, upland sandpiper, and magpie fossils often turn up in southeastern fossil sites dating to the late Pleistocene.
Fox squirrels are far more common in the cross timbers than gray squirrels. The latter prefer dense young forest where they can jump from tree to tree to avoid predators. Fox squirrels are larger and less agile and prefer to run on the ground between widely spaced trees when escaping predators. Therefore, I hypothesize they were the more common squirrel in Georgia’s interstadial oak and grass savannahs.
Specimens of hog-nosed skunk (Coneputus mesoleucus) appear in some Georgia and Florida pleistocene fossil sites, but it too is absent in the present day south. It’s not even a denizen of the cross timbers but occurs just west of that region in arid habitats. I hypothesize patchy tracts of desert-like environments persisted throughout the south during most of the Ice Age, expanding during stadials but still existing as relics during interstadials. The complete disappearance of these desert-like tracts may explain this species more restricted present day range.
Black-tailed jackrabbits, pronghorn antelopes, prairie dogs, and grizzly bears reached their easternmost range limit in the cross timbers during colonial times. There’s no fossil evidence that jack rabbits and pronghorns ever recolonized the south after the mid-Pleistocene but they did occur in the region in the early Pleistocene and the Pliocene. Probably, a large forest grew along the Mississippi River, forming an unsuitable ecological barrier that prevented their southeastern recolonization when climatic changes allowed favorable habitat to redevelop there. Prairie dogs never lived in eastern North America as far as we know, but Pleistocene-age fossils of grizzly bears have been uncovered in Welsh Cave, Kentucky. Why grizzly bears never colonized the rest of the southeast is a bit of an ecological mystery.
Incidentally, early white explorers reported the cross timbers to be rich in game. In the early 19th century they saw mixed herds of thousands of bison, mustangs, deer, elk, and pronghorns. One report mentions a bison herd that was 60 miles long. In 1823 A.P. Chouteaux shipped the black bears skins of 300 females and 150 cubs from his trading post in northeast Oklahoma in just 1 season. As late as 1911 a huge 720 lb black bear was killed in the cross timbers region.
Claire, William; Jack Tyler, Bryan Glass, and Michael Mares
Mammals of Oklahoma
University of Oklahoma Press 1989 | <urn:uuid:d22993f0-c9df-4550-96af-bf93986bf2f1> | {
"date": "2014-07-28T12:19:59",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.954244077205658,
"score": 3.65625,
"token_count": 1566,
"url": "http://markgelbart.wordpress.com/tag/720-lb-black-bear/"
} |
Thanks to Bill Clinton, it is now widely appreciated that much rides on what the meaning of ‘is’ is. Time was, when only philosophers were aware of this. The fact that Clinton made the point to save his hide rather than to advance philosophical logic is irrelevant. Credit where credit is due. But enough joking around.
In our recent Trinitarian explorations we have thus far discussed the ‘is’ of identity and the ‘is’ of predication. We saw that ‘The Father is God’ could be construed as
1. The Father is identical to God
2. The Father is divine.
Both construals left us with logical trouble. If each of the Persons is identical to God, and there is exactly one God, then (given the transitivity and symmetry of identity) there is exactly one Person. On the other hand, if each of the Persons is divine, where ‘is’ is the 'is' of predication, then there are three Gods and tri-theism is the upshot. Either way, we end up contradicting a central Trinitarian tenet.
We explored the mereological way out and we found it wanting, or at least I found it wanting. God is not a whole whose proper parts are the Persons.
But there is also the ‘is’ of composition as when we say, ‘This countertop is marble,’ or in my house, ‘This countertop is faux marble.’ ‘Is’ here is elliptical for ‘is composed of.’ Compare: ‘That jacket is leather,’ and ‘This beverage is whisky.’ To say that a jacket is leather is not to say that it is identical to leather – otherwise it would be an extremely large jacket – or that it has leather as a property: leather is not a property. A jacket is leather by being made out of leather.
Suppose you have a statue S made out for some lump L of material, whether marble, bronze, clay, or whatever. How is S related to L? It seems clear that L can exist without S existing. Thus one could melt the bronze down, or re-shape the clay. In either case, the statue would cease to exist, while the quantity of matter would continue to exist. If S ceases to exist while L continues to exist, then S is not identical to L. They are not identical because something is true of L that is not true of S: it is true of L that it can exist without S existing, but it is not true of S that it can exist without S existing. I am relying upon the following principle, one that seems utterly beyond reproach:
(InId) If x = y, whatever is true of x is true of y, and vice versa.
(This is a rough formulation of the Indiscenibility of Identicals. A more careful formulation would block
such apparent counterexamples as: Maynard G. Krebs believes that the morning star is a planet but does not believe that the evening star is a planet.)
Returning to the statue and the lump, although S is not identical to L, S is not wholly distinct, or wholly
diverse, from L either. This is because S cannot exist unless L exists. Note also that while S exists it occupies exactly the same space as does L. As long as S exists, S and L are spatiotemporally coincident. What's more, they are composed of exactly the same matter arranged in exactly the same way. And yet they are not identical! Very curious. How could there be two physical things in the same place at the same time? But I have just shown that they cannot be identical. Suppose that the statue and the lump come into existence at the same time t and pass out of existence at the same later time t*. At all times they share the same matter, and at no time are they not spatiotemporally coincident. And yet they are not identical because modally discernible. In our world, L composes S now, but there are possible worlds at which L does not not compose S now.
The fact that there are bronze statues and that the statue and its matter are neither strictly identical nor strictly distinct suggests the following analogy: The Father is to God as the statue is to the lump of matter out of which it is sculpted. And the same goes for the other Persons. Each Person is to God as the statue is to the lump. Schematically, P is to G as S to L. The Persons are like hylomorphic compounds where the hyle in question is the divine substance.
Thus the Persons are not each identical to God, which would have the consequence that they are identical to one another. Nor are the persons instances of divinity which would entail tri-theism. It is rather that the persons are composed of God as of a common substance. Thus we avoid a unitarianism in which there is no room for distinctness of Persons, and we avoid tri-theism. So far, so good.
Something like this approach is advocated by Jeffrey Brower and Michael Rea, here.
But does the statue/lump analogy avoid the problems we faced with the water analogy? Aren’t the two analogies so closely analogous that they share the same problems? Water occurs in three distinct states, the gaseous, the liquid, and the solid. One and and the same quantity of water can assume any of these three states. Distinctness of states is compatible with oneness of substance. On the water analogy, the Persons are to God as the three states of water are to water.
Liquid, solid, and gaseous are states of water. Similarly, a statue is a state of a lump of matter. The main problem with both analogies is as follows. God is not a substance in the sense in which clay and water are substances. Thus God is not a stuff or hyle, but a substance in the sense of a hypostasis or hypokeimenon. Beware of equivocating on 'substance.' And it does no good to say that God is an immaterial or nonphysical stuff. God is an immaterila being, but he cannot be or be composed of an immaterial stuff. Besides, 'immaterial stuff' smacks of a contradictio in adjecto. It sounds like 'immaterial matter.' Furthermore, the divine unity must be accommodated. The ground of divine unity cannot be amorphous matter whether physical or nonphysical.
In addition, one and the same quantity of H20 cannot be simultaneously and throughout liquid, solid, and gaseous. Similarly, one and the same quantity of bronze cannot be simultaneously and throughout three different statues. Connected with this is how God could be a hylomorphic compound, or any sort of compound, given the divine simplicity which rules out all composition in God.
In sum, the statue/lump analogy is not better than the water/state analogy. Neither explains how we can secure both unity of the divine nature and distinctness of Persons. | <urn:uuid:e28d6fa7-d52e-488d-84e2-b56a55ca0484> | {
"date": "2014-07-28T12:22:05",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9587749242782593,
"score": 2.515625,
"token_count": 1481,
"url": "http://maverickphilosopher.typepad.com/maverick_philosopher/2013/01/de-trinitate-the-statuelump-analogy-and-the-is-of-composition-1.html"
} |
Orphans need more TLC
Orphans may require more TLC than children reared by their biological parents, according to a study by Yale scientists published online in November in Development and Psychopathology.
Oksana Y. Naumova, Ph.D., and colleagues compared whole-genome methylation profiles based on blood samples from 14 7- to 10-year-olds raised in Russian orphanages and from 14 children growing up in typical families. Orphans showed changes in the genetic regulation of the systems controlling immune response and intercellular interactions—including mechanisms important in the development and functioning of the brain.
The stress of separation, the study found, affects the long-term programming of genome function. “Parenting adopted children might require much nurturing care to correct these biological effects,” said senior author Elena L. Grigorenko, Ph.D. ’96, the Emily Fraser Beede Associate Professor in the Child Study Center and associate professor of psychology and of epidemiology (chronic diseases).
From Other Issues | <urn:uuid:383ce07f-641c-4dbf-ae96-c5c5c2310785> | {
"date": "2014-07-28T12:29:15",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9302935600280762,
"score": 2.75,
"token_count": 214,
"url": "http://medicine.yale.edu/publications/yalemedicine/spring2012/news/chronicle/chronicleetcetra/121746"
} |
Q. Why should quasi-experiments be in the environmental economics toolbox?
A. The single best way to learn about the world is through randomized controlled trials (RCTs). Now, some problems are not directly amenable to RCTs. In the case of climate change, we don’t have a second planet to randomly assign climate change to, or not. And that means to learn about a lot of environmental problems, such as climate change or air quality, we have to turn to other methods.
The conventional approach to doing that has been to rely on comparisons of places that are more polluted to places that are less polluted. [But] places that are more polluted might have other things that are different about them, besides the pollution. In this paper we have highlighted a potential solution, the use of quasi-experimental evaluation techniques, which mimic some of the features of an experiment, in the sense that there is a group that receives the treatment and a [very similar] group that doesn’t. But [this] is based on nature or politics or some other accident, rather than being done through random assignment.
In the case of environmental questions, there has been great progress in the last 10 to 15 years applying quasi-experiments to environmental questions. This same revolution has been occurring in other fields — labor economics, development economics, public finance, statistics, and criminology. This “credibility revolution,” as some people refer to it, tries to move beyond simple comparisons.
Q. What are some kinds of topics or findings that attest to the value of quasi-experiments in environmental economics?
A. One is a comparison of what happened to air pollution-related diseases during the Beijing Olympics, when the Chinese government shut down, by fiat, many sources of air pollution. Others have been taking advantage of the way the Clean Air Act was implemented in the U.S., using places that were otherwise similar, some of which were regulated stringently and others were much less so, [and measuring] what happens to air quality, infant mortality rates, housing prices, and manufacturing activity in those places.
More recently I [co-authored] a paper [with Yuyu Chen, Avraham Ebenstein, and Hongbin Li], on air pollution and life expectancy, by looking at a region in China where there were very large increases in particulate air pollution relative to otherwise seemingly similar places. If you go back to the planning period in China, they didn’t have enough money to heat all of China during the winter, so they implemented an arbitrary rule, which is often the hallmark of quasi-experiments. This arbitrary rule was that all places north of the Huai River were to receive free winter heating, largely derived from coal combustion, and in places to the south, no heating was allowed.
The first result of that paper is that there are dramatic differences in particulate air pollution [between the] north and south [sides] of the river, due to the Huai River heating policy. The second result is: That appears to be matched by sharp declines in life expectancy, just to the north of the river, and just to the south. If you were unfortunate enough to be an intended beneficiary of this policy, the consequences appear substantial: The people who live to the north have a life expectancy of about five years less than people just to the south. If you took those estimates literally, it would suggest the half a billion people in the north are losing 2.5 billion years of life expectancy, which is a staggering figure.
There is another remarkable thing about particulates that motivated us to write the Science paper: We just went back into old [Office of Management and Budget] reports on the benefits of regulation, and somewhere between one-third and one-half of all benefits from all regulations come from the regulation of pollution — and one [form of] air pollution in particular, particulates in air pollution.
Q. When we talk about cost-benefits analyses regarding health, it can create trepidation among those who think focusing on limiting costs may lead to less emphasis on benefits. Quasi-experiments may be sharper tools, but are they also policy-neutral in this sense?
A. Let’s start with the [opposite] case, where we rule out quantitative analysis as being too easily politicized. I think what happens in that vacuum is that people with vested interests rush in. And by definition they do not have the welfare of the full country at heart; they have the welfare of the interest groups or businesses they’re running or representing, be they pro-environment or anti-environment. And I think quantification is absolutely central to being able to constrain those arguments. There is no question that quantification can be abused like anything else can be abused. But I think the role of the university and the academy is to put out, as best they can, credible answers, and what I have observed in the political process is that high-level academic research does not always drive policy decisions, but it puts bounds on the policy discussion. Those bounds constrain the policy decisions to a region around the best evidence. And that can be very valuable. | <urn:uuid:c3ed99e0-9cc5-4497-abd4-b4a0963c014e> | {
"date": "2014-07-28T12:19:41",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9714497923851013,
"score": 2.625,
"token_count": 1070,
"url": "http://mitei.mit.edu/news/3-questions-michael-greenstone-experimental-method-environmental-economics"
} |
NEW YORK (CNNMoney) -- The "driverless cars" of science fiction fame are closer to reality than you think.
But they won't arrive all at once in a single magnificent new machine. In fact, when the driverless car does come, it will happen gradually -- one new technology at a time.
Sure, Google is testing cars that can drive set routes with minimal human interaction, but they're not ready for Main Street yet. (Google ( , Fortune 500) was not available for comment on this story.)
The first "autonomous driving" systems will only take full control in certain environments, such as interstate highways.
Self-driving cars aren't just a matter of convenience; safety is the driving force. That's why some people are pushing for a faster roll-out of the technology, said Bryant Walker Smith, a fellow at Stanford Law School who has written extensively about self-driving cars.
Over 30,000 people a year are killed in car crashes, the majority of which are caused by human error. Computers may not be perfect, but they're almost certain to be far better than us.
"How long are we willing to wait and let people die before we move to the autonomous car?" said Smith.
Semi-autonomous driving has already started with "active safety" features. They take over only some of the driving, especially during emergency maneuvers or when drivers are tired.
"We and other automakers have been adding active safety features gradually," said Nady Boules, director of electronics and controls for General Motors (Fortune 500).,
Boules headed the team that created "The Boss," a self-driving Chevrolet Tahoe SUV that won a Defense Department-sponsored contest for self-driving cars in 2007.
Each of these new features not only makes cars safer but points out ways in which computers can be better at driving than we are:
Electronic stability control: This technology helps drivers keep cars from skidding during abrupt maneuvers.
Pre-collision warning systems: They detect an imminent crash and prepare the brakes.
Active cruise control: It uses radar to detect cars ahead and automatically slows the vehicle to maintain a safe following distance. Most of these systems work only at speeds above about 30 miles an hour. Some more advanced systems -- including ones from Mercedes-Benz and Nissan's Infiniti -- work at any speed, even in stop-and-go traffic.
Pedestrian detection: Volvo has a system that scans ahead looking for pedestrians who seem to be moving into the path of the vehicle. The system can even apply the brakes if someone steps in front of the vehicle.
Autonomous steering: Some vehicles, particularly ones from Infiniti, have systems that recognize lane drift and gently nudge the steering wheel to help guide the car back into the center of the lane.
Several new Ford (Fortune 500) cars can now even parallel park themselves. The driver needs only to operate the gear selector, the gas and the brakes. All the steering wheel movements happen on their own, guided by a sensor that has already measured the size of the parking space.,
Vehicle-to-vehicle communication: A major cause of crashes today is simple miscommunication. Drivers have limited options for letting others know what they're about to do.
"The ways I communicate with other cars are my horn, my lights and my middle finger," said Smith.
In the age of wireless networks, we can do better. It would be fairly easy for every car to electronically broadcast its speed, braking and steering inputs to cars around it so that all the cars in a given area would know what every other car was doing. Cars could then react to each other automatically.
V2V communications, as it's called for short, is actively being pursued by a consortium of major automakers, and experimental cars are already in use. The National Highway Traffic Safety Administration is expected to rule next year on how to move forward with this technology.
On Tuesday, Consumer Reports magazine announced its strong support for the technology, which could save thousands of lives even in human-driven cars.
So what happens now? Once these systems learn to handle the easy stuff such as highways, the next step will be complex city and suburban roads with intersections and pedestrian traffic.
At first, automated driving will be entirely voluntary and used only depending on the situation and your comfort level.
"For the near term, there will always be a driver in the seat and, always, the driver will be responsible," said Boules.
|What we want Apple to unveil at WWDC|
|Millennials squeezed out of buying a home|
|7 traits the rich have in common|
|Big Data knows you're sick, tired and depressed|
|Your car is a giant computer - and it can be hacked| | <urn:uuid:0e04005a-dfee-41e8-b0fd-af4fafda1904> | {
"date": "2014-07-28T13:02:24",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9601184725761414,
"score": 2.8125,
"token_count": 990,
"url": "http://money.cnn.com/2012/02/21/autos/driverless_cars/index.htm?source=cnn_bin"
} |
This topic is monitored by Moritz Law Professor Terri L. Enns
Purging of Voter Registration Lists in Ohio
One of the major criticisms arising from the 2000 presidential election focused on the way in which Florida purged its voter registration lists. Numerous persons claimed that they were improperly removed from the lists and subsequently denied the right to vote in the presidential election. In Ohio, the accuracy of voter lists and the impact of the Help America Vote Act of 2002 (HAVA), passed partly in response to problems with Florida's election system, are not clear. 1
Ohio Voter Registration Lists
In Ohio, voter registration lists are maintained mainly at the local boards of elections. While the Secretary of State keeps a list of registered voters, 2 most voters register with their local boards of elections or other local entities. The Help America Vote Act of 2002 requires each state to create a statewide voter registration list by January 1, 2004, but Ohio was one of over forty states that requested a waiver until 2006. The Secretary of State is developing a statewide system and expects to have the new system active in time for the November 2004 election.
In Ohio, once a person has registered to vote, the person is not required to register again unless his or her registration has been cancelled. 3 The registration may be cancelled for the following reasons: 4
- the voter requests that his or her registration be cancelled;
- the voter dies;
- the voter is convicted of a felony 5;
- the voter is ruled incompetent to vote;
- the voter changes his or her residence to a new county and fails to respond to a confirmation notice sent by the board of elections or otherwise to update his or her registration and does not vote in any election during the period of two federal elections after the mailing of the notice 6; or
- the voter has not voted for four years, receives a confirmation notice, and then fails to either:
- respond to the notice and vote once during the following four consecutive years, or
- update the registration and vote at least once during the following four consecutive years.
Twice a year, the boards of elections must send their voter registration lists to the Secretary of State. Once every two years the Secretary of State sends the information from these lists to a national change of address service and receives a list of voters who have moved during the previous thirty-six months. 7 The Secretary of State then provides that change-of-address information to the board of elections in each county so that the board can send a notice requesting confirmation that the person has moved, including a change of address form and a postage-paid, pre-addressed return envelope.
Each month, the registration lists kept by the county board of elections are updated using information provided by other county agencies in order to purge the list of those disqualified from voting by death, incompetence, or conviction. 8
In 2001-2002, nearly 1.2 million names were deleted from voter registration lists in Ohio. 9
Official Lists for Elections
Before each election, each county board of elections is responsible for creating an official registration list for each precinct. 10 The list must be created at least fifteen days before an election, and must include the name and address, as well as political party of those who voted in recent primaries, in either alphabetical order or geographical order by street. These lists are available to the public at the board of elections.
Any person qualified to vote in the county may seek either to add names to the list or to strike names from the list. 11 The application to add or strike must be made no later than eleven days before the election. On receiving an application, the director of the board of elections must promptly set a time and date for a hearing, which must be held no later than two days before an election. The director sends a written notice of the hearing, not later than three days before the scheduled hearing, to any person whose name is alleged to be omitted or whose right to vote is being challenged. The person may bring witnesses and counsel. Additionally, the person may request that the board issue subpoenas to require witnesses to appear and testify.
The board will decide immediately after the hearing whether to add or delete the person's name from the list. The board's decision is final. 12 However, judicial review may be possible through procedures such as a mandamus action.
Election Day Issues
In some cases, a registered voter may vote even if that person's name does not appear on the precinct registration list. If the voter has moved to a new county, the voter must go to the county board of elections to vote and will be counted as a provisional voter. If the voter has moved from one precinct to another within the same county, the voter may vote at the new precinct or at the board of elections and will be counted as a provisional voter.
The right of any person to vote may be challenged at the polling place on Election Day by any challenger, elector, or any precinct polling place judge or clerk of elections. 13 Following a hearing, the precinct polling place judges will decide whether or not the person is entitled to vote. Ohio law states that the decision of the judges is final. 14 However, HAVA states that when an election official asserts that an individual is not eligible to vote, that individual shall be permitted to cast a provisional ballot if the individual declares that he or she is eligible to vote. 15 Accordingly, the 2004 election could produce circumstances in which a subsequent determination, pursuant to HAVA, that a provisional ballot should be counted supersedes a "final" decision of election judges that the voter was ineligible. Of course, this assumes that election workers have complied with HAVA's provisional ballot requirements.
1. See Thomas Hargrove, Many Names Didn't Belong on Voter Rolls in 2000, Columbus Dispatch, May 9, 2004, at B1.
2. Ohio Revised Code § 3503.07 (west 1995)
3. Ohio Revised Code § 3503.07 (West 1995)
4. Ohio Revised Code § 3503.21(A) (West 1995)
5. Once the person convicted of a felony has been released from prison, the person may register to vote. In Ohio, only incarcerated felons are prohibited from voting. Offenders on probation, paroled felons, and all ex-felons are permitted to vote, and once a felon is paroled, pardoned, or granted judicial release he or she may register to vote.
6. Ohio Revised Code § 3503.21(B) (West 1995)
7. Ohio Revised Code § 3503.21(D) (West 1995)
8. Ohio Revised Code § 3503.18 (Supp. 2004). The chief health officer of each political subdivision and the director of health supply names of all persons over the age of eighteen who have died within the preceding month. The probate judge provides names of persons over the age of eighteen who have been adjudicated incompetent for the purpose of voting. The clerk of courts supplies the names of those convicted of crimes that would disqualify the person from voting.
9 "The Impact of the National Voter Registration Act of 1992 on the Administration of Elections for Federal Office 2001-2002," available at www.fec.gov/pages/nvrareport2002/nvrareport2002.pdf
10. Ohio Revised Code § 3503.23(A) (Supp. 2004)
11. Ohio Revised Code § 3503.24 (Supp. 2004)
12. Ohio Revised Code § 3505.20 (Supp. 2004)
13. Ohio Revised Code § 3505.20 (Supp. 2004)
14. Ohio Revised Code § 3505.20 (Supp. 2004)
15. Help America Vote Act § 302(a) | <urn:uuid:4a7a3a54-6e25-4d4d-865b-76c31773a0dc> | {
"date": "2014-07-28T12:26:52",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9513971209526062,
"score": 2.5625,
"token_count": 1592,
"url": "http://moritzlaw.osu.edu/electionlaw/ebook/part1/eligibility_rules01.html"
} |
Identifies the start of a definition for a user-defined function.
FUNCTION FunctionName [LPARAMETERS parameter1[,parameter2},...] Commands [RETURN [eExpression]] ENDFUNC
FUNCTION FunctionName([parameter1[,parameter2},...]) Commands [RETURN [eExpression]] ENDFUNC
- In Visual FoxPro, function names can be up to 254 characters long.
To distinguish a program file name with more than 10 characters from a function beginning with the same 10 characters in these two products, surround the program file name with quotation marks or include an extension after the program file name.
In many programs, certain routines are frequently repeated. Defining commonly used routines as separate functions reduces program size and complexity and facilitates program maintenance.
FUNCTION FunctionName is a statement within a program. It designates the beginning of a function in a program and identifies the function by name.
FUNCTION FunctionName is followed by a series of Visual FoxPro commands that make up the function. You can include RETURN anywhere in the function to return control to the calling program or to another program, and to define a value returned by the user-defined function. If you do not include a RETURN command, an implicit RETURN is automatically executed when the function quits. If the RETURN command does not include a return value (or if an implicit RETURN is executed), Visual FoxPro assigns .T. (True) as the return value.
The function ends with the ENDFUNC command. This command is optional; the function quits when it encounters another FUNCTION command, a PROCEDURE command, or the end of the program file.
Comments can be placed on the same line after FUNCTION and ENDFUNC. These comments are ignored during compilation and program execution.
You cannot have normal executable program code included in a program file after user-defined functions; only user-defined functions, procedures, and class definitions can follow the first FUNCTION or PROCEDURE command in the file.
When you issue DO with a function name, Visual FoxPro searches for the function in a specific order as follows:
- Visual FoxPro searches the file containing the DO command.
- If the function isn't found there, Visual FoxPro searches the open procedure files. Procedure files are opened with SET PROCEDURE.
- If the function isn't found in an open procedure file, Visual FoxPro searches the programs in the execution chain. Program files are searched from the most recently executed program through the first program executed.
- If the function is still not found, Visual FoxPro searches for a stand-alone program. If a matching program file is found, the program is executed. Otherwise, Visual FoxPro generates an error message.
Include the IN clause in DO to execute a function in a specific file.
By default, parameters are passed to functions by value. For information on passing parameters to functions by reference, see SET UDFPARMS. A maximum of 27 parameters can be passed to a function. Parameters can be passed to a function by including a PARAMETERS or LPARAMETERS statement in the function, or by placing a list of parameters immediately after FUNCTION FunctionName. Enclose the list of parameters in a set of parentheses, and separate the parameters with commas.
For information about use of the FUNCTION command in creating classes, See DEFINE CLASS and Strong Typing in Class, Objects, and Variable code in Help.
This example creates a custom object class called
Hello and adds a function method called
SayHello method returns the character string "Hello World", which is displayed by the MESSAGEBOX function. Note: The class definition code is placed after the program code that instantiates the object.
Local oHello oHello=CREATEOBJECT("Hello") =MESSAGEBOX(oHello.SayHello(),48) RELEASE oHello * Class definition code DEFINE CLASS Hello AS CUSTOM FUNCTION SayHello RETURN "Hello World" ENDFUNC ENDDEFINE | <urn:uuid:b0e0d6e6-4663-4af9-a993-5b7744da689a> | {
"date": "2014-07-28T14:08:16",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.7925986051559448,
"score": 3.03125,
"token_count": 859,
"url": "http://msdn.microsoft.com/en-us/library/10cc6ya9(v=vs.71).aspx"
} |
Specifies the usage of another attribute class. This class cannot be inherited.
Assembly: mscorlib (in mscorlib.dll)
Thetype exposes the following members.
|AllowMultiple||Gets or sets a Boolean value indicating whether more than one instance of the indicated attribute can be specified for a single program element.|
|Inherited||Gets or sets a Boolean value indicating whether the indicated attribute can be inherited by derived classes and overriding members.|
|TypeId||When implemented in a derived class, gets a unique identifier for this Attribute. (Inherited from Attribute.)|
|ValidOn||Gets a set of values identifying which program elements that the indicated attribute can be applied to.|
|Equals||Infrastructure. Returns a value that indicates whether this instance is equal to a specified object. (Inherited from Attribute.)|
|GetHashCode||Returns the hash code for this instance. (Inherited from Attribute.)|
|GetType||Gets the Type of the current instance. (Inherited from Object.)|
|IsDefaultAttribute||When overridden in a derived class, indicates whether the value of this instance is the default value for the derived class. (Inherited from Attribute.)|
|Match||When overridden in a derived class, returns a value that indicates whether this instance equals a specified object. (Inherited from Attribute.)|
|ToString||Returns a string that represents the current object. (Inherited from Object.)|
|_Attribute.GetIDsOfNames||Maps a set of names to a corresponding set of dispatch identifiers. (Inherited from Attribute.)|
|_Attribute.GetTypeInfo||Retrieves the type information for an object, which can be used to get the type information for an interface. (Inherited from Attribute.)|
|_Attribute.GetTypeInfoCount||Retrieves the number of type information interfaces that an object provides (either 0 or 1). (Inherited from Attribute.)|
|_Attribute.Invoke||Provides access to properties and methods exposed by an object. (Inherited from Attribute.)|
When you are defining your own attribute class, you can control the manner in which it is used by placing an on your attribute class. The indicated attribute class must derive from Attribute, either directly or indirectly.
Attribute classes have positional and named parameters. Each public constructor for an attribute class defines a valid sequence of positional parameters for that class. Named parameters are defined by the non-static, public, and read-write fields or properties of the attribute class.
The three properties of are set by defining the following parameters:
This positional parameter specifies the program elements that the indicated attribute can be placed on. The set of all possible elements that you can place an attribute on is listed in the AttributeTargets enumeration. You can combine several AttributeTargets values using a bitwise OR operation to get the desired combination of valid program elements.
This named parameter specifies whether the indicated attribute can be specified more than once for a given program element.
This named parameter specifies whether the indicated attribute can be inherited by derived classes and overriding members.
.NET FrameworkSupported in: 4.5.2, 4.5.1, 4.5, 4, 3.5, 3.0, 2.0, 1.1, 1.0
.NET Framework Client ProfileSupported in: 4, 3.5 SP1
Portable Class LibrarySupported in: Portable Class Library
.NET for Windows Store appsSupported in: Windows 8
.NET for Windows Phone appsSupported in: Windows Phone 8.1, Windows Phone 8, Silverlight 8.1
Windows Phone 8.1, Windows Phone 8, Windows 8.1, Windows Server 2012 R2, Windows 8, Windows Server 2012, Windows 7, Windows Vista SP2, Windows Server 2008 (Server Core Role not supported), Windows Server 2008 R2 (Server Core Role supported with SP1 or later; Itanium not supported)
The .NET Framework does not support all versions of every platform. For a list of the supported versions, see .NET Framework System Requirements. | <urn:uuid:c24b9434-e609-42e4-a396-db53ff8347d4> | {
"date": "2014-07-28T13:48:24",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.697887659072876,
"score": 2.59375,
"token_count": 887,
"url": "http://msdn.microsoft.com/en-us/library/system.attributeusageattribute.aspx"
} |
Technology, Function, Style, and Interaction in the Lower Southeast
Publication Year: 2004
A synthesis of research on earthenware technologies of the Late Archaic Period in the southeastern U.S.
Information on social groups and boundaries, and on interaction between groups, burgeons when pottery appears on the social landscape of the Southeast in the Late Archaic period (ca. 5000-3000 years ago). This volume provides a broad, comparative review of current data from "first potteries" of the Atlantic and Gulf coastal plains and in the lower Mississippi River Valley, and it presents research that expands our understanding of how pottery functioned in its earliest manifestations in this region.
Included are discussions of Orange pottery in peninsular Florida, Stallings pottery in Georgia, Elliot's Point fiber-tempered pottery in the Florida panhandle, and the various pottery types found in excavations over the years at the Poverty Point site in northeastern Louisiana. The data and discussions demonstrate that there was much more interaction, and at an earlier date, than is often credited to Late Archaic societies. Indeed, extensive trade in pottery throughout the region occurs as early as 1500 B.C.
These and other findings make this book indispensable to those involved in research into the origin and development of pottery in general and its unique history in the Southeast in particular.
Published by: The University of Alabama Press
List of Figures
Download PDF (61.4 KB)
List of Tables
Download PDF (40.9 KB)
Download PDF (31.9 KB)
This volume was generated from a series of papers given at the Society for American Archaeology meetings in 2000. The editors would like to thank all the participants of that symposium. To the authors included here, thanks for putting up with our questions ...
1. Introduction: Themes in Early Pottery Research
Download PDF (471.8 KB)
When pottery appeared at the close of the Middle Archaic period (8000–5000 b.p.), the lower Southeast (Figure 1.1) contained a complex social landscape that included small, mobile, hunting and gathering groups as well as semisedentary and possibly transegalitarian groups. These peoples constructed large earthen mound complexes in Louisiana and shell mound...
2. Common Origins and Divergent Histories in the Early Pottery Traditions of the American Southeast
Download PDF (357.0 KB)
The oldest pottery traditions in the American Southeast consist of fiber-tempered wares whose origins arguably can be traced to a single source. The probable locus of origin for all lineages of fiber-tempered pottery in the south Atlantic, peninsular Florida, and the eastern Gulf Coast is most likely the south-central coast of present-day Georgia and northeast Florida. ...
3. Spatial Variation in Orange Culture Pottery: Interaction and Function
Download PDF (499.1 KB)
Orange pottery is a low-fired earthenware tempered with Spanish moss (Simpkins and Allard 1986; Simpkins and Scoville 1981) or palmetto (Brain and Peterson 1971) fibers. The traditional culture history of the type place production of Orange wares between ca. 4000 and 2500 B.P. (Milanich1994:94). A terminal Transitional period between ca. 2500 and 2000 B.P. has...
4. Paste Variability and Possible Manufacturing Origins of Late Archaic Fiber-Tempered Pottery from Selected Sites in Peninsular Florida
Download PDF (830.8 KB)
Late Archaic period fiber-tempered pottery from Florida has been variously called Orange (Bullen 1972; Griffin 1945b), semifiber tempered (Bullenand Bullen 1953), Norwood (Bullen 1969; Phelps 1965), and simply fibertempered. The relationships of the various fiber-tempered wares found indifferent parts of Florida—and of the peoples who made them—are poorly...
5. The Emergence of Pottery in South Florida
Download PDF (589.0 KB)
Relatively few discussions exist on the causes of the early adoption of pottery in Florida. Those few discussions that do exist are generally concerned with early fiber-tempered wares and include theories of spread or migration from coastal Georgia (Milanich 1994:86; Sassaman, this volume) or SouthAmerica (Crusoe 1971a; Ford 1969; Reichel-Dolmatoff 1972; cf. Stoltman 1972b). Some suggest...
6. Fiber-Tempered Pottery and Cultural Interaction on the Northwest Florida Gulf Coast
Download PDF (545.9 KB)
When Gordon Willey (1949b) published his mid-twentieth-century landmark volume Archeology of the Florida Gulf Coast, only a few sherds of fiber-tempered pottery had been found at sites in northwest Florida, and their characteristics were given little more than passing mention. Even up until the early 1960s, fiber-tempered pottery identified in the Florida panhandle...
7. Early Pottery at Poverty Point: Origins and Functions
Download PDF (392.7 KB)
The Poverty Point site (16WC5), located on the eastern edge of Ma
8. In the Beginning: Social Contexts of First Pottery in the Lower Mississippi Valley
Download PDF (576.2 KB)
For three-quarters of a century, archaeologists have been told that the earliest pottery in southeastern North America was fiber tempered and was followed by sand- and clay-tempered wares. We instead propose that the fabric of early pottery was contingent on where, when, and why ceramics first appeared and was not dictated by some inviolate, step-by-step progression...
9. Petrographic Thin-Section Analysis of Poverty Point Pottery
Download PDF (285.1 KB)
Poverty Point (16WC5), located in West Carroll Parish, Louisiana, is famous for many things, including its earthen architecture, stone artifacts, and long-distance trade. The people who built and occupied Poverty Point are not,however, renowned for their pottery vessel technology, despite being contemporary with and clearly trading with people along the ...
10. Did Poverty Pointers Make Pots?
Download PDF (452.5 KB)
Although small amounts of at least two pottery wares—clay tempered and fiber tempered—were recovered during their excavations at Poverty Point(16WC5), Ford and Webb (1956:105–106) made clear it was only the latter that they felt was associated with Poverty Point culture. Subsequently, as the radiocarbon evidence mounted documenting that fiber-tempered pottery ...
Download PDF (242.6 KB)
Download PDF (575.5 KB)
Download PDF (51.9 KB)
Download PDF (413.8 KB)
Page Count: 292
Publication Year: 2004 | <urn:uuid:b9ab94cc-d2cb-4d15-acd9-8dbd56c3bb99> | {
"date": "2014-07-28T12:33:06",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9158255457878113,
"score": 2.8125,
"token_count": 1436,
"url": "http://muse.jhu.edu/books/9780817384272"
} |
Pierre F. M. A. Dejean
THE great name in coleopterology in the early 19th
century. He was
a general in the army who rose to the title of pair de
France, and he served as Napoleons first aide-de-camp
at the battle of Waterloo.
Beginning in 1802, he began a series of catalogs of the
species in his collection; the final edition in 1837 contained
more than 22,000 names!
These lists were used by other entomologists to arrange
their collections, but it is important to note that Dejeans
names of new species in his catalogs are nomina nuda.
Dejean was consistently opposed to the principal of priority
in nomenclature, instead preferring the name most generally
used rather than the oldest one. Although Dejean may be best known for his five volumes on Carabidae
in the Spécies Général des Coléoptères
(1825-1838), he described a number of Scarabaeoidea.
an ardent collector and, combined with his purchases and exchanges,
brought together the largest private insect collection of the
time. His collecting
ardor is evident from an account by Boisduval (Dejeans
private curator) in the Annals of the Entomological Society
of France (vol. 2, p. 502, 1845, translated):
the battle of Alcanizas, which Dejean won after a long-contested
fight, taking a great number of prisoners, when the enemy had
just appeared and he was prepared to give the signal of attack.
Dejean, at the border of a brook caught sight of a Cebrio
ustulatus on a flower. He immediately dismounted, pinned
the insect, applied it to the inside of his helmet which, for
this purpose, was always supplied with pieces of cork, and started
the battle. After
this, Dejeans helmet was terribly maltreated from cartouche
fire; but, fortunately, he refound his precious Cebrio
intact on its piece of cork.
Barber, H S and J. C. Bridwell. 1940. Dejean catalogue names
(Coleoptera). Bulletin of the Brooklyn Entomological Society
Lindroth, C. H. 1973. Systematics specializes between
Fabricius and Darwin: 1800-1859, p. 119-154.
IN, Smith, R. F., T. E. Mittler,
and C. N. Smith, History of Entomology. Annual Reviews Inc., Palo Alto,
CA. 517 pp.
Madge, R B.
1988. The publication dates of Dejean's catalogues.
Archives of Natural History 15: 317-321. | <urn:uuid:4c3d9e71-3b97-49e8-b1bb-96938f738259> | {
"date": "2014-07-28T12:20:18",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9277324676513672,
"score": 2.796875,
"token_count": 605,
"url": "http://museum.unl.edu/research/entomology/workers/PDejean.htm"
} |
You are hereHome ›
Now showing results 1-2 of 2
This is a lesson about scientific and enginering investigation. Learners will review what they have learned, construct a valid scientific question that can be answered by data and/or modeling, and choose an appropriate mission for their rover that... (View More) will answer their scientific question. The lesson uses the 5E instructional model and includes : TEKS Details (Texas Standards alignment), Essential Question, Science Notebook, Vocabulary Definitions for Students, Vocabulary Definitions for Teachers, four Vocabulary Cards, and supplements on Writing a Scientific Question and Mission Choices. This is lesson 5 as part of the Mars Rover Celebration Unit, a six week long curriculum. (View Less)
Learners will compare images of planets and select one planet to visit and tell the tale of their visit through a comic strip. This is activity 9 of 9 in Mars and Earth: Science Learning Activities for After School. | <urn:uuid:22abc503-a926-4a2a-9632-9c0a55e863c0> | {
"date": "2014-07-28T13:08:57",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9195464849472046,
"score": 4.09375,
"token_count": 194,
"url": "http://nasawavelength.org/resource-search?instructionalStrategies=Teamwork&facetSort=1&educationalLevel=Informal+education&learningTime=45+to+60+minutes"
} |
Giant pandas are an endangered species. A 2004 census found only about 1,600 wild giant pandas. They live in scattered populations in the mountains of central China, mostly in Sichuan Province, but also in Gansu and Shaanxi Provinces.
Giant pandas eat almost nothing but bamboo. If the temperate bamboo forests in the mountains of central China continue to be cut down, there will be no room for giant pandas in the wild. This is why it is so crucial to support conservation research in China, and why we need to have a population of giant pandas in zoos as an insurance policy against extinction.
This animated map shows where the distribution of giant pandas has declined over time in China.
The map labeled Prehistoric Panda Distribution shows the approximate original distribution of giant pandas.
The map labeled Historic
Panda Distribution shows the approximate distribution
of giant pandas during most of the last 2,000 years.
The third map shows the Current Panda Distribution. | <urn:uuid:2032d39b-1de5-4413-be0b-37311a78d691> | {
"date": "2014-07-28T12:42:42",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.8971794843673706,
"score": 3.515625,
"token_count": 209,
"url": "http://nationalzoo.si.edu/Animals/GiantPandas/PandaHabitat/default.cfm"
} |
Fast forward 152 million years, and the D. maximus tooth was found in a collection of material that was dredged from the sea floor near Chesil Beach, Dorset. That’s unusual, because most fossilized teeth from prehistoric marine predators are discovered during excavations, or are found on the shore by experts or lucky individuals with a good eye.
The tooth wound up at an online auction, where a savvy fossil collector purchased it. Lorna Steel, a curator at the Natural History Museum in London, then received a nice surprise.
"I was sent a photo of the tooth by the UK fossil collector," Steel told Discovery News, "asking what did I think this tooth was, so I said, 'Dakosaurus,' and forwarded it to Mark for his opinion. Some of what he said is unrepeatable here, but the collector then offered to sell it to the museum for the price he paid online. We are very grateful to him for his generosity."
Dakosaurus was unlike anything alive today, and what is now Europe was certainly a very different place during the marine creature's lifetime.
"At a time when Archaeopteryx was flying around Germany and Diplodocus (a huge dinosaur) walked the plains of America, Earth’s seas were busy with the giant pliosaurs dominating the food chains," Steel said.
As for Dakosaurus and its kin, she said, "With front limbs modified into flippers and a shark-like tail fin, metriorhynchids were so weird and different from living crocodiles today, it is hard to properly compare them."
Dakosaurus, which sported a bullet-shaped snout, has been nicknamed “Sucker Croc.”
The researchers explained that it could suck in large fish and swallow them whole, in addition to biting off chunks of flesh from larger prey with its impressively big teeth. | <urn:uuid:7544315a-e866-4dd8-b424-2fa77cfa02b7> | {
"date": "2014-07-28T12:31:49",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9790266752243042,
"score": 3.5625,
"token_count": 394,
"url": "http://news.discovery.com/animals/dinosaurs/huge-tooth-proves-jurassic-seas-were-crazy-dangerous-1405271.htm"
} |
Talk to astronauts, as we have, and the one thing each says universally is how amazingly beautiful Earth appears from space. Even after returning, they're unable ever to think of this place the same.
It's where we all live. But it's also an immense lump of primordial orbiting art, revolving on its tilted axis once every 24 hours while flying through space eight miles every second. Over billions of years, Earth has never been where it is at this very moment. And it will never return to this exact same spot ever again.
Fifty-two years ago the United States placed its first Earth-observing satellite in orbit. Dozens have followed gathering data and images to study our planet, managed by NASA and the U.S. Geological Survey.
These sharp-eyed robots snap photos as we might and take readings. But they also view the entire surface over and over using light outside the visible range, which produces surreal and beautiful patterns. A sea of clouds swirling around a mountain in the South Atlantic. Dune patterns in Africa. Russian river deltas. Eerie Hudson Bay islands.
Now NASA has collected 75 of its most stunning images in a new book titled "Earth as Art." (Holiday gift alert.)
If you want a PDF file of the 158-pages, it's free right here.
The iPad app with special interactive features that allow zooming in and out is also free over here.
And if you want the hold-in-your-hand, put-on-the-coffee-table volume printed on that stuff called paper, you can order it from the federal government right here for $44. (Or US$61.60 outside the U.S.A.)
Now about the photo above. No, it's not the Obama administration's storylines of the Benghazi attack.
It's part of the world's second largest watershed, a section of the Mississippi River just below Memphis. The massive river begins as a stream draining an obscure lake in Minnesota above the Twin Cities. That's Arkansas on the left here and Mississippi on the right, captured by a Landsat satellite.
Follow the money, they say in politics. With rivers, the flowing water finds the next lowest points on its way to the sea, next river or lake. The Mississippi evolved as a major waterway transporting the melt from the massive glaciers of the last ice age that coated much of the Midwest.
Grain by grain, the river also carried away millions of tons of Midwest soil, to build the intricate Mississippi River Delta miles into the Gulf of Mexico (See the lace-like photo below.) | <urn:uuid:6944187d-178c-459a-af01-a2854210d04c> | {
"date": "2014-07-28T12:35:22",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9375975728034973,
"score": 3.390625,
"token_count": 534,
"url": "http://news.investors.com/politics-andrew-malcolm/120212-635421-nasa-earth-as-art-book-with-photos-from-space.htm"
} |
Subsets and Splits