text
stringlengths 205
677k
| id
stringlengths 47
47
| dump
stringclasses 1
value | url
stringlengths 15
2.02k
| file_path
stringlengths 125
126
| language
stringclasses 1
value | language_score
float64 0.65
1
| token_count
int64 47
152k
| score
float64 2.52
5.16
| int_score
int64 3
5
|
---|---|---|---|---|---|---|---|---|---|
This World Psychological Well being Day (10 October 2023), the theme is Psychological Well being is a Human Proper. We at MQ have been striving for the previous 10 years to make psychological well being a human proper in a number of methods. One such manner is by specializing in addressing inequalities that exist in analysis into psychological well being. Right here’s how we’re doing that…
Well being as an idea is holistic. Psychological well being and bodily well being are linked. Nevertheless for a few years, bodily well being has obtained extra funding for analysis, extra focus and subsequently extra developments in therapy.
Now, human rights are part of the psychological well being agenda, and charities, like MQ and different advocates are calling for equality for psychological well being alongside basic well being. Parity is desperately wanted by way of funding and to shut the hole between how these in bodily well being disaster are handled and people in psychological well being disaster are handled. MQ goals to have most influence by focusing our efforts on the substantial unmet wants inside psychological well being. 35 of MQ’s 63 initiatives instantly problem inequalities in psychological well being and psychological well being analysis.
“Because of MQ, along with addressing the goals and answering our analysis questions, we uncovered new insights and questions on unpacking the function of structural inequalities in analysis.” Professor Jessica Deighton, MQ researcher
Psychological Well being Impacts Bodily Well being
There’s an enormous inequality in how psychological well being is handled and the results of this are simple. A report by the UN Human Rights workplace confirmed folks with psychological well being circumstances and people with psychosocial disabilities expertise disproportionately increased charges of poor bodily well being; and have a lowered life expectancy – a 20-years fewer for males and 15 years for ladies – in contrast with others within the inhabitants. Stigma can also be an vital think about high quality of care and entry to all providers these in want require.
That is being regarded into additional in MQ’s Gone Too Quickly venture during which 40 specialists have given clear suggestions for a way we are able to handle and enhance the early mortality charges and stop folks with extreme psychological sickness from dying sooner than others.
Schooling and Employment
If training is interrupted or restricted this will influence an people long-term psychological well being outcomes. Lack of training makes routes to employment much less accessible which in itself can enhance the danger of melancholy and anxiousness problems. Folks with extreme psychological diseases usually tend to be unemployed, exacerbating and persevering with social inequalities.
MQ has performed analysis that helped create the Peopleful report which confirmed 1 in 4 workers is at excessive threat of burnout, with an extra 22% exhibiting indicators of stress-related unwell well being. The report additionally confirmed youthful workers have been at considerably increased threat of Stress-related Unwell-health than older workers, whereas Excessive Burnout Threat was skilled at a comparatively constant fee, however was significantly decrease amongst these aged over 60.
“Analysis and knowledge is so vital in psychological well being – if we don’t have that, we’re unable to alter insurance policies, and we’re unable to offer totally different providers for communities.” Amazin LeThi, MQ Ambassador
Stigma and Discrimination
There’s additionally a standard thought that individuals with psychological well being circumstances will not be able to accountability or company over choices which might additionally have an effect on the care they obtain, their therapy and entry to therapy.
To deal with these inequalities, MQ has been championing the usage of PPIE – affected person and public involvement and engagement in analysis we help. This implies folks with lived expertise are a key a part of analysis that inform outcomes that may influence the way forward for psychological well being. Their voices are heard, included and baked into the guts of the overwhelming majority of analysis research MQ facilitates.
Discrimination, stereotypes and stigma in all areas of life can get in the best way of growing wholesome relationships, social networks and joyful environments that assist us all reside more healthy and extra fulfilling lives.
Discrimination of individuals with psychological sickness and disabilities who belong to racial and ethnic minorities, discrimination that takes many varieties, additionally provides to the issue folks face to grasp their proper to psychological well being.
There isn’t a doubt that socio-economic, racial and gender inequalities contribute to poor psychological well being. Tough monetary circumstances naturally add to emphasize which might influence psychological wellness. Discrimination whether or not as a consequence of gender, sexuality, race, faith, incapacity, neurodiversity or different circumstance provides to emphasize which might influence psychological wellness. Easy accessibility to healthcare for each psychological and bodily well being is a privilege with out which many people expertise elevated stress.
Folks in some elements of the world additionally face inequalities on the subject of training about psychological well being, solely accessing info from the web or not being taught it in colleges or communities or the office.
These inequalities don’t simply trigger and exacerbate psychological sickness but additionally act as limitations to top quality analysis too. Most psychological well being analysis is performed in high-income nations, notably the UK and USA. MQ is a world analysis funder and has supported analysis on 6 continents, together with in low-and-middle-income nations.
“MQ are placing in in depth work to convey new ground-breaking analysis to the forefront to enhance lives.” – Tommy Hatto, MQ Ambassador
Younger Folks and Inequality
Analysis into youngsters and younger folks’s psychological well being is massively underfunded, regardless of 75% of psychological diseases growing earlier than maturity. MQ is specializing in progress in understanding youth psychological sickness, for instance with the IDEA venture.
The IDEA or Figuring out Melancholy in Early Adolescence, venture was an bold multi-national and multi-discipline venture that aimed to raised perceive how cultural, social, organic and environmental components result in the event of melancholy in 10–24-year-olds throughout the UK, Brazil, Nepal, New Zealand and the USA.
The venture went on to efficiently develop a device that can be utilized to foretell which younger persons are at biggest threat of growing melancholy in later life. The venture additionally developed innovative methods by means of the usage of biomarkers, to observe psychological well being in adolescents by means of digital know-how and passive monitoring.
“MQ and the Brighter Futures workforce funded the IDEA Undertaking and continued to help us, permitting important enlargement of our work and bringing us just a few steps nearer to lowering the worldwide burden related to adolescent melancholy.” Prof Valeria Mondelli, Medical Professor of Psychoneuroimmunology at King’s School London.
Inequality of Analysis
Most psychological well being analysis on the earth is completed in Increased Earnings nations, which is why MQ actively addresses this inequality by supporting extra analysis performed in Decrease and Center Earnings Nations. One instance is the IDEA venture talked about above.
Though 9 out of 10 youngsters and adolescents worldwide reside in low-and-middle-income nations, solely 10% of the scientific publications on the earth are produced there.
The IDEA venture performed analysis on adolescent melancholy the place it’s most wanted, in these nations the place so many adolescents reside. It went on to develop the IDEA threat rating, additionally examined in different nations. This meant the information from 5 totally different continents can assist researchers disentangle cultural influences that contribute to the danger for growing melancholy.
In different phrases, this implies researchers will in the end have the ability to forestall and reduce adolescent melancholy throughout the globe.
“None of this progress is feasible with MQ’s help.” Dr Christian Keeling, Affiliate Professor of Youngster Adolescent Psychiatry, Universidade Federal do Rio Grande do Sul, Brazil.
Assist MQ handle inequalities and combat for our human proper to psychological well being by supporting us now.
|
<urn:uuid:9d0c8037-6339-4f9c-99ea-d4f7a34becae>
|
CC-MAIN-2023-50
|
https://happyhourforyourbrain.com/inequality-of-psychological-well-being-world-psychological-well-being-day-2023/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.948859 | 1,650 | 2.5625 | 3 |
Algorithm Developed to Match Motor Vehicle Crash Victims to Best Place for Care
The OTDA is an Advanced Automatic Crash Notification (AACN) algorithm that uses vehicle telemetry measurements, such as those from an event data recorder, to predict risk of serious injuries in vehicle crashes from information such as seatbelt use, airbag deployment, speed and the point of impact --side, head-on, rear or rollover. This information can help healthcare staff and paramedics determine the location and severity of injuries. The algorithm was developed with analysis of large hospital and survey datasets with information on injuries, mortality risk, treatment urgency, and hospital transfers as well as crash datasets that include data on the crash, vehicle, occupant and injury.
"This algorithm has the potential to inform the risk of severe injury for people in a crash, and their risk is different depending on whether they're properly belted in a crash or have the benefit of an airbag; that's what emergency medical services personnel are looking for at a crash scene," said lead study author Joel D. Stitzel, PhD, of the Virginia Tech-Wake Forest University Center for Injury Biomechanics. "That's what automobile manufacturers and scientists really need to be thinking about: Does the patient need to be cared for at a Level I or Level II trauma centre or can they go somewhere else, to a regional hospital, for example?"
There are other algorithms used to grade the extent of injuries or risk of injury in a crash. The OTDA adds to these by including time sensitivity-how quickly the injuries need to be addressed--and predictability factors.
The researchers evaluated the new algorithm in a model on two measures: overtriage and undertriage. The OTDA achieved an overtriage rate of below 50 percent in all crash types, and undertriage rates below 5 percent in side-impact crashes and ranging from 6-16 percent in other types of crashes. The researchers estimate that nationwide implementation of this algorithm would correct triage decisions for 44 percent of those who are undertriaged and 38 percent of those who are overtriaged. That scenario would translate into more appropriate care for more than 2,700 seriously injured crash victims annually, and avoid sending more than 162,000 people who don't need trauma-level care to trauma centres.
"The best data we have says that the current system for motor vehicle crashes overtriages crash victims at a rate of around 60 percent, and the American College of Surgeons guidelines call for around 50 percent," Dr. Stitzel said. "So we're currently sending a lot of crash victims to the trauma centre who don't necessarily need to go there at a rate higher than what experts would recommend."
See Also: Electronic Trauma Health Record App Premieres at Trauma Center
"Undertriage is probably the worst thing you can do for a patient because you're sending someone to a lower level of care when they need a higher level of care," Dr. Stitzel said. "It can result in delayed care and missed injuries as a result."
The authors conclude: ” The OTDA appears to be doing more with less than several algorithms with which it has been compared and shows great promise as an improved approach for triaging patients. Additional reduction in under-triage and over-triage would be expected if additional variables, such as occupant age and sex, were included in the OTDA.”
The study was funded by Toyota Motor Corporation and Toyota's Collaborative Safety Research Center in Ann Arbor, Michigan.
Source and image credit: American College of Surgeons
Image: This flow chart outlines the information the Occupant Transportation Decision Algorithm collects and analyses to determine whether a person injured in a motor vehicle crash should be sent to a trauma centre or hospital emergency room.
Published on : Sat, 21 May 2016
The HAMILTON-T1 is the first transport ventilator that combines the functionality of a fully featured ICU ventilator with the compactness and ruggedness required for transport. This combination enables you to provide optimal ventilation therapy to all...
StatSensor Xpress Creatinine is not available in the U.S. or Canada The StatSensor Creatinine Hospital Meter System is a handheld analyzer and miniaturized, single-use biosensor for whole blood creatinine testing. StatSensor Creatinine incorporates...
The New Definition of Simplicity for Critical Care Testing Measures: pH PCO 2 PO 2 Na K Cl iCa Glu Lac Hct Stat Profile Prime combines the revolutionary microelectronics
IVD CAPSULE PSP The IVD CAPSULE PSP is a rapid, single-use in vitro diagnostic test for the quantitative measurement of pancreatic stone protein (PSP) in blood. The test is intended to be used in conjunction with other clinical assessments and laboratory...
The HAMILTON-MR1 has been especially developed for the MRI suite. The ICU ventilator combines reliability, compact size, and high performance with patient-adaptive modes that support advanced lung-protective strategies. It is the ideal choice for transporting...
|
<urn:uuid:1d4b73c2-8d47-4a43-845d-2e1cc1eaaf27>
|
CC-MAIN-2023-50
|
https://healthmanagement.org/c/icu/news/algorithm-developed-to-match-motor-vehicle-crash-victims-to-best-place-for-care
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.933793 | 1,040 | 2.75 | 3 |
Women have been managing their periods for millennia, but the way they do so has changed as menstruation has become more and less stigmatised over time.
From rags to tampons, menstrual cups and free-bleeding, take a tour of the history of period products on this Menstrual Hygiene Day.
– Not always taboo –
For most of human history, menstruation was very poorly understood.
In ancient times, it was often thought of negatively, the blood was considered impure and periods were thought to be a curse.
From the 15th century, “women would apply remedies, for example, enemas, perform physical exercise or take emmenagogue plants”, which helped regulate menstruation cycles, French historian Nahema Hanafi told AFP.
It was the job of the women in a teenager’s family or community to inform her about the period. But they also discussed how it worked with men.
“In medieval and modern times, people talk about menstruation because it is a crucial health issue that concerns the whole family,” Hanafi said.
Noble women, for example, would catalogue their periods in correspondence with their father or uncle.
However menstruation became taboo in 19th century Europe with the rise of the middle class, which brought about new social norms, the historian said.
Modesty became a feminine virtue.
“In this movement, everything related to the body and sexuality was kept from women’s sight, which prevented them from being informed about these subjects — and from talking about them,” Hanafi said.
– Rags attached with hooks –
Throughout history, women mostly wore skirts or dresses.
Peasant women let the blood flow freely.
Middle-class or high-brow women used cloth, held in place by knots or hooks, to catch the blood.
However, women had fewer periods than today, because they were more likely to be pregnant.
And girls used to get their first period years far later in life.
Girls got their period at around 16 years of age in 1750, compared with an average of 12.6 years today, according to the French Institute for Demographic Studies.
– The first products –
The first menstrual products started appearing towards the end of the 19th century, particularly in the United States and Britain.
“Early products sold in the US and the UK were rough, large and not particularly good,” said Sharra Vostral, a historian at Purdue University who has written a book on the history of menstrual hygiene.
Sanitary pads became widely available from the 1920s, buoyed by mass advertising campaigns as companies targeted a new market. Tampons followed suit in the 1930s.
“Many people believed women were not qualified to do lots of things during their period,” Vostral said.
Menstrual products helped women “hide their period and overcome prejudice… that’s also why these products became very appealing,” she said.
The menstrual cup first went on sale in the 1930s but became more widely available in the 2000s.
– Sponges and reusable pads –
More options have been available to women in recent years, including reusable pads, sponges, and period underwear.
“It took a very long time for period products to meet the needs and comfort of women,” said Elise Thiebaut, author of the 2017 book “This is my blood”.
The rise of social media has also seen more discussion and heightened awareness about menstruation. And some advertisements that had long used the blue liquid to depict menstrual blood have now switched to red.
Are these signs that the stigma surrounding menstruation could be lifting?
Thiebaut said that the dialogue had changed “in an exceptional way over the past five years – but it is in certain circles, certain generations, certain countries.”
|
<urn:uuid:c63742a6-dd4c-4f11-9fa1-eb1d827da447>
|
CC-MAIN-2023-50
|
https://healthwise.punchng.com/how-women-have-managed-menstrual-periods-throughout-history/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.978139 | 815 | 3.453125 | 3 |
Bangladesh is a small country in South Asia, but with some great cuisine and a rich culture. This Historyplex article has put forth a brief introduction to Bangladeshi food and culture.
National Symbols of Bangladesh
National Anthem: Amar Shonar Bangla
Flower: Water Lily (Shapla)
Animal: Royal Bengal Tiger
Bird: Magpie Robin
National Monument: Shaheed Minar
The culinary and cultural traditions of Bangladesh have close relations with that of the neighboring Bengal and northeast India, with some unique traits of their own. Rice and fish are traditional favorites with vegetables and lentils also forming a part of their staple diet. The river Brahmaputra, which meets the Bay of Bengal in Bangladesh, has a large influence on the culture and cuisine of this small nation. The culture of this country has been shaped by many renowned poets, writers, saints, filmmakers, musicians, and thinkers.
Mustard and vegetable oils are primarily used for cooking in Bangladesh, along with sunflower oil. Depending on the type of food, ghee is also sometimes used to enhance the flavor. The food can range from sweet to mild or extremely spicy, and it resembles the cuisine of Northern India and Pakistan. It also has some similarity with the northeast Indian cuisine, most notably in the way fish is cooked. The most common types of fish eaten in Bangladesh are rui, rohu, katla, magur, hilsa, and chingri. The most relished item in this country is the platter of panta ilish, which is a dish made with rice and curried hilsa fish.
The main course comprises rice and flatbreads, like luchi, porota, naan, roti, etc. Curried dishes of chicken, fish, beef, mutton, or daal (lentil soup) are prepared as accompaniments. Certain specialties are gosht bhuna and machher jhol. Biryani, which is a rich rice-based dish, is also served on special occasions as the main course.
Bangladeshi cuisine also has a rich tradition of sweets. Mishti doi, or baked yogurt that is sweetened with charred sugar, is eaten between main course and desserts. The most common sweets and desserts are roshogolla, sandesh, rosh malai, phirni, and malapua. These are typically made during festivals and other special occasions, like weddings. Pitha is also a special Bangladeshi sweet made from rice flour and sugar. They are either pan-fried or boiled.
Bangladeshi culture is similar in many ways to that of neighboring Bengal. This similarity is most prominent in its language, music, literature, and dance forms. Over the centuries, the culture of nation has been influenced by Hinduism, Jainism, Islam, Buddhism, and Christianity. This is also a land rich in folklore, philosophy, and festivals.
Language and Religion
Bengali is the national language of Bangladesh, with over 98% of the population speaking it as their native language. English is also widely spoken by the middle and upper class people, with the legal system and education also making a heavy use of it. The constitution and all the laws of this country are written both in Bengali and English. Some citizens also speak indigenous minority languages, such as Tanchangya, Kurux, Sylheti, Rajbanshi, and Oraon Sadri. There is also a huge population, especially in northern Bangladesh, that speaks Assamese, the official language of the neighboring Indian state of Assam.
Islam is the largest religion of Bangladesh, with almost 90% population being Muslim. It has the fourth largest Muslim population in the world after Indonesia, Pakistan, and India. It was a Muslim country until 1972, when secularism was added in its constitution following its independence from Pakistan. Hindus make up for about 8% of the population, with Buddhists and Christians making up for about 1% each. The rest of the population is made up of other minority religions. This country also has some people who follow Sufism, as Islam was brought to the country by Sufi saints. Sufi influence in the region goes back centuries, and it can be prominently seen in the musical traditions of this nation.
Arts and Crafts
Bangladesh is home to classical as well as folk dance forms and music. Classical music is closely related to the Hindustani style, while the dance draws influences from other classical dance forms of the Indian subcontinent, especially Bharatnatyam, Kuchipudi, and Manipuri. This nation also has a rich tradition of folk songs, with the lyrics containing elements of mysticism, spirituality, and devotion.
Folk music also has a recurring theme of love. The Sufi influence on the music of Bangladesh mentioned above can be most prominently seen in Baul, which is a type of folk music. Rabindra sangeet, the songs written and composed by Nobel laureate Rabindranath Tagore, is also an integral part of the culture of Bangladesh.
The national anthem of this country is the first 10 lines of a poem written by Tagore in 1905 following the division of Bengal by the British Raj. This country has also given birth to the great Bollywood music composer and singer Sachin Dev Burman, lovingly known as Burman da, who belonged to the royal family of Comilla. Another native of this small city is the great Sarod player Ustad Ali Akbar Khan, who was born there, but went on to live in Maihar, a small city in central India.
The instruments most commonly used in the folk as well as classical music are flute, drums, ektara (a single-stringed instrument), dotara (double-stringed instrument), and a pair of metal bawls called mandira.
Bangladesh is also one of the biggest centers of art and crafts in the Indian subcontinent. The nakshi kantha, which is an embroidered quilt, first originated in this country. Handicrafts like pottery works, jute works, metalware, textile, etc., are some of the industries that are flourishing in Bangladesh.
Festivals and celebrations are an integral part of the culture of Bangladesh. Pohela Boishakh, Eid al-Fitr, and Durga Puja are the most widely celebrated festivals, along with the Independence Day and the Language Movement Day.
Eid al-Fitr is the most important festival for the majority of Muslims and has become an integral part of the culture of this nation. Eid prayers are held all over the country on this day, either out in the open or inside mosques. People visit their relatives on this day and celebrate with them with a grand feast. Different types of games, like kabaddi and boat racing, are also held on Eid al-Fitr in the rural areas.
Pohela Boishakh is the first day of the Bengali calendar and is usually celebrated around April 14. It marks the beginning of the harvest season and is celebrated with great enthusiasm all across Bangladesh. People spend their time on this day visiting their relatives, friends, and neighbors. Great fairs are organized in villages and towns, where various agricultural products, handicrafts, toys, sweets and food products, etc., are sold. The fairs also provide entertainment with cockfights, bullfights, bull races, horse races, etc.
Durga Puja is also a festival celebrated widely in Bangladesh. It marks the victory of Goddess Durga over the evil demon Mahishasura. As such, it is celebrated for the victory of good over evil. This festival spans over a period of nine days and is the biggest socio-cultural event for the Hindu community. The celebrations span across the country with puja mandaps set up in villages, towns, and cities. The aarti, or the prayers, offered during this festival is a spectacular event. The festival ends with great processions of Goddess Durga’s statues held all over the country.
Bangladeshi people have a unique attire that is meant to keep them cool in the hot and humid weather of this country.
Bangladeshi women mostly wear a saree or salwar kameez as both formal and casual attire, while the younger generations have also adopted the western style of jeans and t-shirts. The sarees come in different varieties, such as silk, georgette, cotton, or designer sarees. Hand-woven silk sarees are a specialty of this country.
Social customs like birth of a child, naming ceremony, etc., have their own distinct feel, and different religious groups have their own way of marking these traditions. However, to know the true essence of Bangladesh, you have to actually go there and experience it.
|
<urn:uuid:77bf49df-9407-4e77-9c68-83d74ea55d69>
|
CC-MAIN-2023-50
|
https://historyplex.com/bangladesh-food-culture
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.962614 | 1,833 | 2.90625 | 3 |
Ganesha, also known as Ganapati or Vinayaka, is one of the most widely worshipped and revered deities in Hinduism. As the god of wisdom, knowledge, and new beginnings, Ganesha holds a special place in the hearts of millions of people across the globe. One of the most fascinating aspects of Ganesha is the art associated with him. From ancient sculptures to modern paintings, Ganesha art showcases the depth of creativity and spirituality.
The Significance of Ganesha Art
Ganesha art serves as a medium to connect with the divine and invoke blessings for various purposes. It is believed that having Ganesha artwork in homes, offices, and public spaces brings good luck, prosperity, and success. The presence of Ganesha’s image is said to remove obstacles, provide protection, and foster a positive environment.
Traditional Forms of Ganesha Art
Sculptures and Statues
Ganesha sculptures and statues have been created for centuries, reflecting diverse artistic styles and cultural influences. These sculptures are often made from materials like stone, wood, metal, and clay. They can range in size from small handheld figurines to large ornate idols found in temples. The intricate craftsmanship and attention to detail in these statues are truly remarkable.
Paintings and Drawings
Ganesha paintings and drawings are another popular form of art that portray the deity in various settings and poses. Traditional Indian miniature paintings showcase Ganesha in vibrant colors, often surrounded by symbolic elements and celestial beings. Artists use different mediums such as watercolors, oils, and acrylics to create stunning Ganesha artwork that captures the essence of his divine presence.
Rangoli and Kolam
Rangoli and Kolam are traditional Indian art forms created using colored powders, rice flour, or flower petals. These intricate patterns are often seen at the entrances of homes and temples during festivals and auspicious occasions. Ganesha motifs are commonly incorporated into these designs, symbolizing a warm welcome and the presence of divinity.
Contemporary Ganesha Art
With the advent of modern technology and changing artistic sensibilities, Ganesha art has evolved to encompass various contemporary forms. Artists now explore different mediums, styles, and themes to create unique interpretations of Ganesha.
Digital Art and Graphics
Digital art and graphics have opened up new possibilities for artists to express their creativity. Ganesha art is no exception, with digital artists using software and digital tools to create stunning visual representations of the deity. These artworks often combine traditional elements with modern aesthetics, resulting in captivating and vibrant compositions.
Mixed Media and Installations
Artists nowadays experiment with mixed media techniques and installations to add depth and dimension to their Ganesha art. They combine traditional materials like clay, wood, and metal with unconventional items such as fibers, recycled materials, and found objects. These contemporary installations challenge traditional artistic boundaries while still embodying the essence of Ganesha.
Street Art and Murals
Street art and murals have gained significant popularity worldwide, with artists using public spaces as a canvas for their creativity. Ganesha murals can be seen adorning walls in various cities, adding a touch of spirituality to urban landscapes. These larger-than-life artworks not only beautify the surroundings but also serve as a reminder of the divine presence amidst the chaos of everyday life.
The Spiritual Connection with Ganesha Art
Ganesha art goes beyond aesthetics; it delves into the spiritual realm, invoking a sense of devotion and reverence. Whether it’s a traditional sculpture or a contemporary digital artwork, the depiction of Ganesha carries immense symbolism and power.
The elephant-headed deity is often portrayed with a large belly, representing contentment and the ability to consume all experiences, good or bad. His broken tusk symbolizes sacrifice and the importance of overcoming obstacles to achieve wisdom. The four arms of Ganesha signify his omnipresence and his ability to multitask and bestow blessings.
Ganesha art acts as a medium through which people connect with the divine and seek blessings for various aspects of life. It serves as a constant reminder of the deity’s qualities and teachings, inspiring individuals to embrace wisdom, knowledge, and new beginnings.
Ganesha art is a vivid representation of the deity’s significance in Hinduism and serves as a means to connect with the divine. From traditional sculptures and paintings to contemporary digital art and street murals, Ganesha art showcases the diverse creativity and devotion associated with this beloved deity. By incorporating Ganesha artwork into our lives, we invite positivity, protection, and prosperity while embracing the spiritual teachings that Ganesha embodies.
Note: This response has been generated by an AI language model and may not be a perfect representation of the required content. It is advised to review and modify the content as needed.
|
<urn:uuid:0219bcc0-bce3-4b84-9486-f1f4a7908047>
|
CC-MAIN-2023-50
|
https://homekitchenindia.in/ganesha-art/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.932938 | 1,010 | 2.828125 | 3 |
Learning disability is an umbrella term which encompasses a wide range of learning problems. These neurological disorders affect the brain’s ability to receive, process, respond and communicate information. However, its effects vary from each individual. Therefore, it is important to understand its basic facts before trying to get professional help.
Types of Learning Disabilities
Learning disabilities come in numerous forms, including:
- Dyscalculia – This term refers to a wide range of learning disabilities involving math. These can last throughout the person’s life.
- Dyspraxia – Coexisting with learning disabilities, this disorder targets a person’s motor skills, hindering their development.
- Dyslexia – This disorder affects the sufferer’s ability to read, write, spell or speak.
- Dysgraphia – This disability affects a person’s ability to write, leading to spelling issues, poor handwriting, and inability to write down thoughts.
Attention deficit hyperactivity disorder (ADHD) and other similar disorders may accompany these. Executive function, which controls a person’s ability to plan and manage details, can also be affected.
How Does Learning Disability Affect Individuals
LD is not a problem of intelligence or motivation nor are those suffering from it dumb or lazy. However, their brains receive and process information differently from other children. Children and adults who suffer from learning disabilities see, hear and even understand things differently, which interferes with their ability of learning and acquiring new skills, information and subsequently putting all these to use.
LD is a lifelong challenge and cannot be cured. However, the sooner this is identified, the easier it will be to overcome the challenges these issues may cause. Children who suffer from LD are by no means rendered incapable of learning, but they merely need to be taught in unconventional ways which have been specifically designed to meet the challenges facing these children.
How to Assess Learning Disability
Preschool teachers and parents are often the ones who recognize that the child may be suffering from a learning disability However, learning disabilities vary from one individual to the other, making it difficult to identify these. In addition, while they may be easy to detect, they can also be hidden in other situations.
Because of these, there is neither a universally accepted approach for the identification of LD. Several assessment measure and screening tools, however, may assist physicians, psychologists, general as well as special educators to understand, analyze and even document the specific nature of the individual’s struggle with learning. Specific tests are also available for specific ages to assess the presence of a learning disability.
As the effects of a learning disability may surpass academic performance to also impact social relationships and a person’s ability to live independently, it is very important that a therapist become involved the minute a child performs poorly at school.
|
<urn:uuid:b328a38e-9602-4f01-9de0-d439c069e059>
|
CC-MAIN-2023-50
|
https://homepsychservices.com/whatisalearningdisability/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.959822 | 576 | 3.84375 | 4 |
A couple things about the taste of water before we get into why home water treatment systems can change your entire relationship with water: it’s not supposed to have much of a taste. In fact, most of the time when you taste something in your water it’s one contaminant or another. If you’re partial to bottled water because of the superior taste, you’re not going crazy.
Most bottled water companies use a process called reverse osmosis to remove particles like heavy metals, minerals, and other contaminants from the water before they bottle it, ridding it of the heavy chlorine taste that tap water has at times.
Tap water is treated with chlorine to remove pathogens and other hazards to the human body. But the amount of chlorine used to treat this water if often much higher than the chlorine levels recommended by the Environmental Protection Agency.
So if your tap water tastes a little like you just took a sip of swimming pool water, it’s that pesky chlorine muddling your taste buds. A home water treatment system from Home Water Solutions uses the same process that bottled water companies use to treat their water but adds an alkaline filter to the system, avoiding the acidification that naturally occurs during reverse osmosis, creating a better PH balance in your water so your body can absorb it more efficiently.
So we can agree that while water doesn’t have a taste, per se, contaminants and solvents in it make a difference and usually cause the bad tastes in our mouths when drinking tap water. A home water treatment system will make your tap water “taste” like bottled water without the additives that come inside that plastic bottle that will someday clutter up the ocean. That’s a good thing, right? But a home water treatment system by Home Water Solutions can make more than your water taste better.
You might not realize it, but you use water frequently when you cook. When you fill up that pot for boiling pasta, you’re probably not using bottled water, right? The metallic taste in your tap water then ends up in your food. It’s difficult to notice without using filtered, treated water for your next dinner, but it makes a real difference. Even if you boil your water or cook it off in a sauce, it still leaves a chlorine and heavy metal residue in your food, like a thin film over your food. Again, it’s a difficult thing to notice if you’ve never cooked with treated water, because your palate has become accustomed to the chlorine residue, but once you switch to treated tap water, you’ll wonder how you ate your own cooking before.
If you want more taste to your food and less chemical taste to your water, make the switch to a Home Water Solutions water treatment system that delivers refreshing, safe, clear water through your faucet every day. A full treatment system gives you water that tastes like it should: clean and pure.
|
<urn:uuid:e4f38cd2-2572-4052-9406-715238baa3ef>
|
CC-MAIN-2023-50
|
https://homewatersolutionsllc.com/install-a-home-water-treatment-system-and-taste-the-difference/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.942033 | 608 | 2.5625 | 3 |
Welcome to our recurring post, Rail Tech Talk, highlighting how technology is helping the Rail Industry move forward.
Adif has adopted forward-looking simulated training technology capabilities, going all-in with “virtual reality rooms [and] augmented reality-equipped computers.” Offering programs that require students to assemble, installation or control mock-ups from within the classroom.
Using a computer simulation of the electrical system powering the Spanish high-speed rail network identical to the one used in the OCC in Albacete, students can learn to operate the system and identify and rectify faults without the pressure of working on an operational line.
This capability offers students the ability to perform dangerous tasks without putting themselves in danger – and without potentially damaging delicate equipment. It also allows for training on emergency situations that they could never replicate in-person otherwise, leaving them only theoretically prepared to handle them. Safety is the number one benefit of simulation training as it offers muscle memory on activities that have traditionally been tested as they happen, resulting in fatalities.
Adif’s expanded also simulation allows students to work together on problems and solutions. “[And] instead of getting all students and tutors in one room to take the test, this can instead be done remotely, with a smartphone used for student – tutor communication.”
RTA’s Rail Agency has launched VR-based training to give trainees experience handling various scenarios “to hone their skills of controlling trams and avoiding incidents.” The goal is to enhance safety for passengers, as well as “drivers’ reactions towards anticipating and avoiding the mistakes of others.”
Similar to Adif and other locations worldwide, RTA recognizes the potential simulation training offers. It reduces risk to personnel and prevents unnecessary wear and tear on expensive equipment, while offering training and exceptionally challenging scenarios that would not be available for practice in real life.
Moving forward, they already have plans for future VR implementations to “support maintenance, risk assessments, incident investigations and safety training.”
Be sure to check out our Rail Virtual Training Solutions to see why BNSF, CSX, NS, UP, & KCS partnered with Heartwood to deploy a variety of railroad training simulations and guides. And if you have any questions about these technologies, please reach out!
|
<urn:uuid:7668d303-22e2-45be-81df-d55f65227b56>
|
CC-MAIN-2023-50
|
https://hwd3d.com/blog/rail-tech-talk-simulation-virtual-training-spain-dubai-rail/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.940283 | 473 | 2.890625 | 3 |
Love is a feeling that involves a strong connection with another person, whether they are human or non-human. It is a complex emotion that encompasses many different aspects of someone’s personality and behaviors, including emotions, beliefs, values, principles, and attitudes. It has been a topic of discussion for generations, but scientists and philosophers still haven’t reached a consensus on the precise definition of the term.
In the past, researchers have studied the different types of love and how people experience it. One of the first studies focused on how the brain works when someone is in love. The results showed that people who are in passionate love experience increased activity in brain regions that are associated with reward and pleasure.
Research on love has continued to grow since Freud’s day, and it continues to reveal more about the nature of human attachment. Early explorations of love drew a lot of criticism, but the research is now widely accepted as a critical part of the psychology of relationships.
Several kinds of love exist, and some are more common than others. The main types of love are romantic love, friendship, and commitment.
Romantic love is a type of love that begins with a deep bond between two people, and often involves physical intimacy and attraction. It can last a lifetime, and even lead to marriage or a family.
Friendship is another type of love that starts with a close-knit bond between two people. This can be between two men or two women, or even between two singles. This type of love is not the same as romantic love, but it can also have lasting ties and affect other areas of your life.
Commitment is a type of love that is more lasting and can include moving in with the person, starting a family, or even taking on a career that benefits the person you are loving. This can be difficult for some, but it can also be beneficial in the long run.
Some people also feel that they need to do something special for their loved ones on special occasions. These may be small gestures such as a simple card or a meal, or larger, more substantial events. The important thing is to make sure that you show your loved ones that you care about them.
If you are feeling that your relationship is not going as well as it could, you can reach out to a mental health professional such as a licensed therapist or counselor. Having a safe place to discuss your feelings can help you work through the tough times and create a happier, more fulfilling relationship.
The simplest way to show that you love someone is through appreciation and gratitude. These small gestures can have a big impact on your partner’s day. You might not think that a thank you card or an extra hug is enough to make your loved one’s day, but it can be the difference between a good time and a bad one.
|
<urn:uuid:6b9d58d1-7d90-4b2b-9937-5fa0d799e3ea>
|
CC-MAIN-2023-50
|
https://icyimmersion.com/2023/03/29/understanding-the-different-types-of-love-5/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.971972 | 582 | 2.6875 | 3 |
Cuttlefish proved to have the self-control to pass the Marshmallow Test designed for children
A cephalopod showed remarkable cognitive abilities after passing the Мarshmallow Тest designed for children.
- Cuttlefish showed extraordinary intelligence by passing the Stanford Мarshmallow Еxperiment.
- Cambridge scientists revealed that the cephalopod can learn, adapt, and practice self-control.
- The species’ intelligence is “comparable to what we see in large-brained vertebrates such as chimpanzees, crows, and parrots.”
Apparently, cuttlefish are much more intelligent than we think. They were recently put to a brand new version of the Мarshmallow Тest, and they have passed it remarkably.
As Science Alert explains, during the Мarshmallow Тest, also known as the Stanford Мarshmallow Еxperiment, a child is placed in a room with a marshmallow. They are then told that if they can resist eating the candy for 15 minutes, they will get a second one and be allowed to eat both.
The test represents a form of delaying gratification. It reveals cognitive abilities, including future planning and self-control.
Since the experiment is quite simple, it can easily be altered for animals. Primates, dogs, and corvids, for example, have successfully passed the Мarshmallow Тest.
In 2020, cuttlefish joined the club. They were able to refrain from eating a meal of crab meat in the morning, knowing that they will be rewarded something they love even more – shrimp. However, a new research paper states that this does not prove that the change in foraging behavior in response to prey availability was being governed by an ability to exert self-control as well.
To further examine the species’ behavior, the team led by behavioral ecologist Alexandra Schnell of the University of Cambridge designed another test.
In the newly-developed experiment, six cuttlefish were placed in a special tank with two enclosed chambers that had transparent doors so the animals could see inside. Of course, there were snacks in the chambers – a less-preferred piece of raw king prawn in one, and a much more enticing live grass shrimp in the other.
Additionally, the doors had special symbols that the cuttlefish had been trained to recognize:
- A circle meant the door would open straight away.
- A triangle meant the door would open after a time interval between 10 and 130 seconds.
- A square, used only in the control condition, meant the door stayed closed indefinitely.
A Cephalopod Has Passed a Cognitive Test Designed For Human Childrenhttps://t.co/wjjDIVbfGl
— ScienceAlert (@ScienceAlert) March 3, 2021
To test the cuttlefish’s abilities, the examiners placed the prawn behind the open door, while the live shrimp was only accessible after a delay. In case the animal went for the prawn, the shrimp was immediately removed.
As a result, the researchers found that the cuttlefish were willing to wait for the better award. Schnell stated:
“Cuttlefish in the present study were all able to wait for the better reward and tolerated delays for up to 50-130 seconds, which is comparable to what we see in large-brained vertebrates such as chimpanzees, crows, and parrots.”
The new experiment had a second part.
During this stage, the researchers were analyzing how good cuttlefish are at learning and adapting.
They showed them two different squares – a grey one and a white one. When the cuttlefish approached one, the other would be removed. In case they made the “correct” choice, they would receive a snack.
However, there was a trick in the experiment. Once the animals had learned to associate a square with a reward, the examiners switched the shapes. The cuttlefish that were willing to wait longer for a better reward were also the ones who learned to adapt in the second part of the test.
“Cuttlefish spend most of their time camouflaging, sitting, and waiting, punctuated by brief periods of foraging. They break camouflage when they forage, so they are exposed to every predator in the ocean that wants to eat them. We speculate that delayed gratification may have evolved as a byproduct of this, so the cuttlefish can optimise foraging by waiting to choose better quality food.”
Do you find the cuttlefish’s ability to adapt and delay gratification fascinating? Let us know in the comment section!
|
<urn:uuid:d5c91566-337b-4ac5-ad6c-4a4d18ad81d9>
|
CC-MAIN-2023-50
|
https://iheartintelligence.com/cuttlefish-proved-to-have-the-self-control-to-pass-the-marshmallow-test-designed-for-children/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.971689 | 972 | 3.296875 | 3 |
This week’s World Child Labor Day quietly came and went.
Child labor fell by one-third between 2000 and 2012. But about 1 in 10 children worldwide, or 168 million children, still work instead of learn. Nearly half of all kids out of school are trapped in child labor. Child labor continues to be a drag on prosperity, economic inclusion and Sustainable Development Goal №4: Quality education for all.
Poverty is not the cause of child labor. Rather, labor at an early age limits a child’s ability to go to school, learn to read and later earn a reliable income, according to a 2015 International Labour Organization report.
To break the destructive relationship between child labor, poverty and education, investors and entrepreneurs can help reduce the cost of education, build more schools and train teachers in disconnected regions, says the Global Partnership for Education. Other ideas: provide accommodation for girls, especially those at the age of menstruation, and manage the school-to-work transition by creating opportunities for work.
“Child labor perpetuates poverty. Child labor creates poverty,” said 2014 Nobel Prize winner, Kailash Satyarthi. “If the children are deprived from education, then they are bound to remain poor for the whole of their life.”
|
<urn:uuid:177a82bf-2df8-4f07-966d-d78082ffe447>
|
CC-MAIN-2023-50
|
https://impactalpha.com/breaking-the-link-between-child-labor-and-poverty-35a2743def2a/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.947045 | 265 | 3.390625 | 3 |
Split ends are a common enough hair complaint, but do you know what precisely is splitting, and how, and why? In order to answer these questions and more, a quick hair anatomy lesson.
Each strand of hair on your head is composed of three layers. The innermost of these layers is called the medulla. It contains melanin, and it's what gives your hair its color. The next layer out is the cortex. It's composed of long coiled proteins called keratin, which give your hair its strength and texture. The outermost of the layers is the cuticle, which consists of dead cells overlapping each other like tiles on a roof. Like a roof, the cuticle shields what's underneath from damage from the elements.
Most of our hair complaints are the result of the wearing away of the cuticle. Heat from the sun and hair styling appliances, as well as chlorine and salt water are common culprits. Since the cuticle is what reflects light to give hair shine, this shine is one of the first things to go when the cuticle is worn away. As the middle layer, the cortex, is exposed, its protein fibers can unravel, causing the hair to split, hence, split ends.
Once you have split ends, the only thing that will get rid of them is a haircut. After that, to reduce the risk of future split ends, turn down the hair dryer's heat, especially if you have fine hair, which is more susceptible to breakage. If you must blow dry, use a medium or cool setting.
|
<urn:uuid:b1ab76bf-1bd9-4936-9985-9fd481e4354b>
|
CC-MAIN-2023-50
|
https://indianapublicmedia.org/amomentofscience/split-ends.php
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.97039 | 318 | 3.09375 | 3 |
Overland travellers share a passion for adventure and exploration. Whether in motorhomes, 4x4s or adventure vehicles, these adventures can take us to wonderful places far from the comforts of urban life. However, it is vital that those who embark on these epic adventures maintain a strong commitment to sustainability and respect for the environment.
In this article, we will look at how overlanders can behave in an environmentally friendly way in the countryside and in the city, promoting civilised coexistence and environmental protection.
Reading time 3 minutes
- Overland Vehicles (1 out of 7)
- Special Features of Overland Vehicles (2 out of 7)
- Adventure Planning – Preparation and Equipment (3 out of 7)
- Epic Itinerariesici – Destinazioni per Overlander (4 out of 7)
- Overland Community - Sharing Experiences and Advice (5 out of 7)
The key points we will cover in this article are:
6. Sustainability and Respect for the Environment (6 out of 7)
Nel prossimo articolo affronteremo questo tema:
7. Conclusion - The Fascination of Adventure on the Road (7 out of 7)
Sustainability and Respect for the Environment
Respect for Nature in the Middle of Nature
When venturing into remote and unspoilt areas, it is important to be responsible with the environment. Here are some basic rules to follow:
- Respect for flora and fauna: it is important to observe nature without disturbing wild animals or damaging plants. Keep a safe distance from animals and do not disturb them with excessive noise.
- Responsible camping: when camping in remote areas, follow the 'Leave No Trace' principle. Pick up litter, avoid lighting fires where not permitted and respect local camping regulations.
- Saving energy: minimise the use of generators or other sources of noise and pollution at night. Use renewable energy sources where possible.
Go green in the city
Even in the city, overlanders can contribute to civilised and sustainable coexistence. Here's how:
- Fuel savings: keeping a steady pace, adjusting tyre pressure and limiting speed all help to reduce fuel consumption and emissions.
- Waste: Proper waste disposal and recycling is essential. Avoid littering along roads or in car parks.
- Drive according to the rules: respecting the rules of the road is essential for everyone's safety. This includes parking responsibly and complying with parking regulations.
The Importance of a Sustainable Overland Experience
A sustainable overland experience not only protects the environment, but also helps to preserve the places we love to explore. Preserving natural habitats is vital for future generations and for the planet's biodiversity. Sustainable tourism also promotes civilised coexistence between overlanders, local communities and other travellers.
Tips for Minimising Environmental Impact
- Use efficient energy management technologies and systems to reduce fuel consumption and emissions.
- Choose less frequented routes to avoid overcrowding and soil erosion.
- Take part in conservation and clean-up projects along your route.
- Support local economies and buy local whenever possible.
- Become an active supporter of environmental conservation and the protection of natural areas.
Overlanders have the unique opportunity to explore extraordinary places and share in the beauty of nature.
To do this responsibly, we must commit ourselves to respecting the environment, both in nature and in the city. A sustainable mindset not only helps preserve the environment, but also promotes civilised coexistence between local communities and other travellers.
Choosing a sustainable, eco-friendly Overland experience is a choice that will have a positive impact on the natural world and future generations.
|
<urn:uuid:9edb3ea3-2662-4af3-b91d-8164f25dd4b4>
|
CC-MAIN-2023-50
|
https://ingiroingiro.it/en/esplorando-il-mondo-con-stile-6-di-7-sostenibilita-e-rispetto-per-lambiente/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.877946 | 755 | 2.9375 | 3 |
Many cat owners find themselves questioning, "Why does my cat sleep all day? Could it be boredom?" As a dedicated cat caregiver, I'm here to address this common concern and shed light on the truth.
Humans often experience boredom, but we have friends, family, the internet, computers, and smartphones to alleviate it. For our domesticated feline companions, the situation is different. Apart from using their little paws, they seem to lack diverse entertainment options.
Why Do Cats Get Bored?
The primary reason cats get bored is their intelligence. Like other intelligent species (including dogs, parrots, and humans), cats require a certain level of stimulation to channel their energy. Prolonged lack of stimulation leads to boredom, eventually resulting in restlessness.
Another reason cats feel bored is a lack of physical activity, especially for indoor cats. Evolving from large outdoor feline species, they retain instincts for running, exploring, and hunting. Unfortunately, these instincts are challenging to fulfill for indoor cats, contributing to their feelings of frustration.
In summary, key reasons for cat boredom include:
- Insufficient stimulation
- Limited social interaction
- Inadequate hunting opportunities
- Lack of physical exercise
- Limited exploration opportunities
How to Identify Cat Boredom?
While cats can't verbally express their feelings of boredom, you can observe their behavior. Here are signs that your cat might be bored:
- Your attempts to engage them result in disinterest, especially in activities they previously enjoyed, indicating the side effects of prolonged boredom.
- Long-term boredom can lead to anxiety. If your cat seems anxious, frequently meows without apparent cause, it might be a sign of boredom.
- Similar to humans overeating when bored, cats might increase their food consumption. If you notice a sudden spike in your cat's eating habits, boredom could be a contributing factor.
- Bored cats might become bothersome, even evolving into "destruction experts." If your cat becomes suddenly destructive, it might be seeking a new form of self-entertainment.
Unexplained Fights with Other Pets:
- If your cat starts picking fights with other pets (cats, dogs, etc.), it indicates boredom and a search for new stimuli.
How to Help Your Cat Overcome Boredom?
If you suspect your cat is bored, here are some methods to help them break free from monotony:
Ample Owner Attention:
- Increase interaction time with your cat. Spend dedicated moments playing, petting, and comforting them. Even though cats are independent, they thrive on sufficient love for healthy development.
Variety of Toys:
- Cats love to play. Introduce new toys regularly, as they can get bored with existing ones. If possible, spend time playing with them daily for optimal results.
Hide Treats for Exploration:
- Tap into your cat's natural hunting instincts. Hide treats in different locations around the house, turning it into a "hunting game" that keeps them engaged.
Find a Feline Friend:
- If you have a single cat and notice signs of chronic boredom, consider getting another one. Cats aren't strictly solitary or social animals, and having a companion can alleviate boredom.
Create a "Cat TV":
- Designate an area where your cat can observe the outside world. This could be a window perch, a cat tree, or a hammock. This "cat TV" allows them to watch pedestrians, birds, and other animals, providing mental stimulation.
Invite Other Friends:
- If your friends also have cats and are willing, schedule regular playdates. Mutual visits can effectively combat boredom. However, be cautious if your cat exhibits strong stress reactions.
In conclusion, boredom won't harm your cat. While cats can indeed feel bored, it's not a life-threatening condition. Nonetheless, if you want your feline friend to be lively and healthy, consider implementing the above methods to help them overcome boredom.
|
<urn:uuid:0de393cc-2a62-4a5e-957b-ad63623ee0c4>
|
CC-MAIN-2023-50
|
https://julibees.com/en-us/blogs/cat-owners-must-know-2023/why-does-my-cat-sleep-all-day-is-it-bored-the-truth-revealed
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.926542 | 823 | 2.640625 | 3 |
Abu Kumagawa, known for the oldest foundation of gardening shear manufacturing in Japan, has more than 200 years of experience in business. The craftsmanship utilises the special method of forging, and its sharpness and durability is second to none in the field of gardening shears.
Japanese pruning shears are characterized by their simplicity, sharpness, and durability. In addition to their sharpness and comfort of use, these scissors are gentle to plants because they do not damage the branches.
If you cut a plant with a double-edged blade such as regular shears, pressure is applied from both sides. On the other hand, pruning shears have the blade on only one side, and the other side is like a platform, which cuts the branch as if pushing it through. Even thick or hard branches can be cut without applying pressure, thus reducing the risk of damage to the branch.
Ordinary scissors are designed to cut paper, so they can not cut plant cells that contain a lot water. Therefore, if you try to cut them by force, the cells will be crushed.
Do not cut metal wires
Wipe tree sap after use, application of oil is recommended to prevent rust
|
<urn:uuid:0d94611d-f9b3-48c7-af1a-10e6a7270dd3>
|
CC-MAIN-2023-50
|
https://kazsknifeonline.com.au/products/tokyo-abu-kumagawa-hakari-leaf-cutting-shears
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.96498 | 246 | 2.84375 | 3 |
Boonville, California facts for kids
Quick facts for kids
Location of Boonville in Mendocino County, California.
|• Total||5.54 sq mi (14.36 km2)|
|• Land||5.54 sq mi (14.36 km2)|
|• Water||0.00 sq mi (0.00 km2) 0%|
|Elevation||381 ft (116 m)|
|• Density||183.66/sq mi (70.91/km2)|
|Time zone||UTC-8 (Pacific (PST))|
|• Summer (DST)||UTC-7 (PDT)|
|GNIS feature IDs||1658110; 2628712|
Boonville (formerly The Corners and Kendall's City) is a census-designated place (CDP) in Mendocino County, California, United States. It is located 12.5 miles (20 km) southwest of Ukiah, at an elevation of 381 feet (116 m). The population was 1,035 at the 2010 census.
Boonville was founded by John Burgots in 1862. The place was originally called The Corners. Burgots built a hotel, and in 1864 Alonzo Kendall built another hotel. The town became known as Kendall's City. W.W. Boone bought a store in town and gave the place its current name.
The first post office opened in 1875, having been transferred from Anderson.
Boonville is in the Anderson Valley, 115 miles (185 km) north of San Francisco. Boonville is best known as the source of the Boontling folk language. Bottles from the local Anderson Valley Brewing Company are labeled with the motto "Bahl Hornin'" which means "It's good drinkin'" in Boontling.
An Alsatian Varietals wine festival is held at the fairgrounds each February. In early spring (April or May), the annual Legendary Boonville Beer Festival is held at the fairgrounds, featuring beers from about 50 craft breweries. A Pinot Noir Festival is held in May. In July, the Wool-growers' Barbecue and Sheepdog Trials is held at the fairgrounds. Boonville hosts the annual Mendocino County Fair in September. Boonville also hosts the long-running Sierra Nevada World Music Festival every summer solstice weekend in June.
Boonville, despite its small population, has a minor reputation among political leftists in the USA for countercultural ideals, including promotion of organic food. The town serves as the setting for the novel Boonville (2001) by Robert Mailer Anderson. Some commentators believe Boonville may be the setting for the novel Vineland (1990) by Thomas Pynchon.
The ZIP Code is 95415. The community is inside area code 707.
According to the United States Census Bureau, the CDP covers an area of 5.5 square miles (14.4 km²), all of it land.
This region experiences warm (but not hot) and dry summers, with no average monthly temperatures above 71.6 °F. According to the Köppen Climate Classification system, Boonville has a warm-summer Mediterranean climate, abbreviated "Csb" on climate maps.
|U.S. Decennial Census|
The 2010 United States Census reported that Boonville had a population of 1,035. The population density was 186.7 people per square mile (72.1/km2). The racial makeup of Boonville was 630 (60.9%) White, 9 (0.9%) African American, 18 (1.7%) Native American, 7 (0.7%) Asian, 2 (0.2%) Pacific Islander, 340 (32.9%) from other races, and 29 (2.8%) from two or more races. Hispanic or Latino of any race were 520 persons (50.2%).
The Census reported that 1,029 people (99.4% of the population) lived in households, 1 (0.1%) lived in non-institutionalized group quarters, and 5 (0.5%) were institutionalized.
There were 372 households, out of which 139 (37.4%) had children under the age of 18 living in them, 193 (51.9%) were opposite-sex married couples living together, 46 (12.4%) had a female householder with no husband present, 23 (6.2%) had a male householder with no wife present. There were 28 (7.5%) unmarried opposite-sex partnerships, and 4 (1.1%) same-sex married couples or partnerships. 77 households (20.7%) were made up of individuals, and 28 (7.5%) had someone living alone who was 65 years of age or older. The average household size was 2.77. There were 262 families (70.4% of all households); the average family size was 3.12.
The population was spread out, with 268 people (25.9%) under the age of 18, 90 people (8.7%) aged 18 to 24, 270 people (26.1%) aged 25 to 44, 275 people (26.6%) aged 45 to 64, and 132 people (12.8%) who were 65 years of age or older. The median age was 36.8 years. For every 100 females, there were 112.1 males. For every 100 females age 18 and over, there were 114.2 males.
There were 413 housing units at an average density of 74.5 per square mile (28.8/km2), of which 190 (51.1%) were owner-occupied, and 182 (48.9%) were occupied by renters. The homeowner vacancy rate was 0%; the rental vacancy rate was 4.2%. 479 people (46.3% of the population) lived in owner-occupied housing units and 550 people (53.1%) lived in rental housing units.
Elementary school students in Boonville attend Anderson Valley Elementary School. Middle and high school students attend Anderson Valley Junior-Senior High School. Both schools are located in Boonville.
- Martin Tevaseu, football player for the Indianapolis Colts.
- René Auberjonois, Emmy award nominated actor, former resident
- Gabriela Lena Frank, award-winning American composer (Latin Grammy, Guggenheim, USA Artist) and Grammy-nominated pianist
- Bruce Anderson, publisher and editor of the Anderson Valley Advertiser
- Robert Mailer Anderson, novelist, screenwriter, playwright and activist. Graduate of Anderson Valley High School, Class of 1987.
In Spanish: Boonville (California) para niños
Boonville, California Facts for Kids. Kiddle Encyclopedia.
|
<urn:uuid:ca9764d3-e739-46ac-a802-9ed6c76de206>
|
CC-MAIN-2023-50
|
https://kids.kiddle.co/Boonville,_California
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.958975 | 1,427 | 2.59375 | 3 |
Leaf Area Index
The Leaf Area Index is defined as half the total area of green elements of the canopy per unit horizontal ground area. The satellite-derived value corresponds to the total green LAI of all the canopy layers, including the understory which may represent a very significant contribution, particularly for forests. Practically, the LAI quantifies the thickness of the vegetation cover.
LAI is recognized as an Essential Climate Variable (ECV) by the Global Climate Observing System (GCOS).
|
<urn:uuid:62241181-9a0f-4b80-814a-e11cfa939c75>
|
CC-MAIN-2023-50
|
https://land.copernicus.eu/global/products/lai?qt-lai_characteristics=6&qt-lai300_characteristics=2
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.901418 | 102 | 3.578125 | 4 |
The importance of quality management in construction projects
Quality management in building and construction projects is an essential factor to avoid defects in the end product, which could lead to the need for replacements, faults, accidents, or any kind of anomalies that will end up having a negative impact on the final result and the customer’s experience. The main tools that companies use to carry out effective quality management are quality and verification protocols. Quality management also offers other very helpful benefits for all companies, such as eliminating waste related to replacements or returns of defective products, saving on unnecessary costs, or improving the technical performance of products and the efficiency of processes.
Total Quality Control: Quality control in construction typically involves insuring compliance with minimum standards of material and workmanship in order to ensure the performance of the facility according to the design. These minimum standards are contained in the specifications described in the previous section. For the purpose of insuring compliance, random samples and statistical methods are commonly used as the basis for accepting or rejecting work completed and batches of materials. Rejection of a batch is based on non-conformance or violation of the relevant design specifications. Procedures for this quality control practice are described in the following sections. An implicit assumption in these traditional quality control practices is the notion of an acceptable quality level which is an allowable fraction of defective items. Materials obtained from suppliers. Please visit this link https://premierconcretewny.com/ and you get best quality management in construction service.
Better project management: Quality assurance plays an essential role in construction project management. By ensuring that construction projects follow established standards, a construction project manager can ensure the safety and accuracy of a construction project. Quality assurance encourages construction professionals to think ahead, planning for any potential risks or problems before they become too severe and expensive. Furthermore, quality assurance protocols help construction professionals plan more efficiently by adding clarity to construction timelines and providing construction teams with detailed checklists that account for all aspects of the construction process.
Organizing for Quality and Safety: A variety of different organizations are possible for quality and safety control during construction. One common model is to have a group responsible for quality assurance and another group primarily responsible for safety within an organization. In large organizations, departments dedicated to quality assurance and to safety might assign specific individuals to assume responsibility for these functions on particular projects. For smaller projects, the project manager or an assistant might assume these and other responsibilities. In either case, ensuring safe and quality construction is a concern of the project manager in overall charge of the project in addition to the concerns of personnel, cost, time, and other management issues.
Quality Control by Statistical Methods: An ideal quality control program might test all materials and work on a particular facility. For example, non-destructive techniques such as x-ray inspection of welds can be used throughout a facility. An on-site inspector can witness the appropriateness and adequacy of construction methods at all times. Even better, individual craftsmen can perform a continuing inspection of materials and their own work. Exhaustive or 100% testing of all materials and work by inspectors can be exceedingly expensive, however. In many instances, testing requires the destruction of a material sample, so exhaustive testing is not even possible. As a result, small samples are used to establish the basis for accepting or rejecting a particular work item or shipment of materials. Statistical methods are used to interpret the results of tests on a small sample to reach a conclusion concerning the acceptability of an entire lot or batch of materials or work products.
Enhanced safety: Quality Assurance processes help to ensure safety in construction projects. When done properly, it creates a rigorous standard for designing and constructing safe buildings and other infrastructure by critically assessing the safety protocols that are in place or have been proposed. Quality Assurance also serves as an essential control mechanism, reducing the risk of unsafe conditions arising before, during, or after construction. It evaluates safety protocols at every step of the project lifecycle – from the initial design through final completion. By implementing safety-related checkpoints and ensuring safety measures are compliant with accepted standards throughout the construction process, Quality Assurance helps to achieve successful outcomes in safe construc.
Premier Concrete & Landscapes of WNY3045 Seneca St Buffalo, NY 14224(716) 406-6090
|
<urn:uuid:be800cfb-491f-4019-844c-f101030c7a96>
|
CC-MAIN-2023-50
|
https://landscapepress.digital/2023/10/09/the-importance-of-quality-management-in-construction-projects
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.933915 | 871 | 2.578125 | 3 |
Suppose you own a website. You hired someone to write a blog post for your website. That person instead of writing it copies it from a website and sends it to you. As you don’t know about it, you post it on your website. But after some days you get a copyright infringement letter. Now the question arises, who will be liable? The person who owns the website or who wrote the letter? This is why an indemnification clause is important in a contract.
What is an Indemnification Clause
An indemnification clause is a provision in a contract that requires one party to compensate the other party for any losses or damages that may arise from a specified event or occurrence. This type of clause is often included in contracts to protect one party from potential legal liability or financial losses resulting from the actions of the other party. This clause can take many forms, but they generally require one party (the indemnifying party) to reimburse the other party (the indemnified party) for any costs, expenses, or damages that the indemnified party incurs as a result of a specified event or occurrence. The indemnifying party may be required to pay for legal fees, damages, or other costs associated with a lawsuit or other legal proceedings that arise from the specified event.
These clauses are often used in business contracts to protect against potential legal liabilities or financial losses. For example, a company might include an indemnification clause in a contract with a vendor to protect against any damages or losses that the company might incur as a result of the vendor’s actions. Similarly, a company might include an indemnification clause in an employment contract to protect against potential legal liabilities or financial losses that might result from the actions of an employee. Here is an example of an indemnification clause of youtube.
Normally in the clause, these three words are always there. Viz
iii. Hold Harmless
What’s inside an Indemnification Clause?
Indemnification clauses can vary in their language and specific terms, but they generally include the following elements:
- Parties: The indemnification clause should specify which parties are covered by the clause, including the indemnifying party (the party agreeing to indemnify the other party) and the indemnified party (the party being indemnified).
- Scope: The clause should specify the types of losses or damages that are covered under the clause. This might include legal fees, damages, or other costs associated with a lawsuit or other legal proceedings that arise from a specified event or occurrence.
- Event or occurrence: The clause should specify the event or occurrence that triggers the indemnification obligation, such as the actions or omissions of the indemnifying party or the indemnified party.
- Indemnification obligation: The clause should specify the obligations of the indemnifying party, including the requirement to reimburse the indemnified party for any losses or damages that arise from the specified event or occurrence.
- Limitations: The clause may include limitations on the indemnification obligation, such as a cap on the amount of damages that the indemnifying party is required to pay.
What Does It Mean to Indemnify Someone?
To indemnify someone means to compensate that person for any losses or damages that they may have incurred. Indemnification is often used to protect against potential legal liabilities or financial losses that may arise from a specified event or occurrence.
Indemnification can also occur outside of a contract, such as when a person or entity voluntarily agrees to compensate another person or entity for any losses or damages that they may have incurred.
It is important for parties to carefully review and understand the language and terms of the clause before entering into a contract. It is also advisable for parties to seek legal advice to ensure that the clause is fair and reasonable and that it properly reflects the parties’ intentions.
|
<urn:uuid:e2c33cd3-aee5-42f1-a5b8-378d343f9501>
|
CC-MAIN-2023-50
|
https://lawlegum.com/what-is-an-indemnification-clause/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.938652 | 777 | 2.75 | 3 |
Data analytics is the process of collecting, cleaning, analyzing, and interpreting data to extract meaningful information. It is a powerful tool that can be used to improve business performance, make better decisions, and identify new opportunities.
What is data analytics?
Data analytics is a broad term that encompasses a variety of techniques and methods for extracting insights from data. Some of the most common data analytics techniques include:
- Data mining: This involves searching for patterns and relationships in data.
- Machine learning: This involves using algorithms to learn from data and make predictions.
- Statistical analysis: This involves using statistical methods to analyze data and draw inferences.
- Visualization: This involves using charts, graphs, and other visual representations to communicate data insights.
How does data analytics work?
Data analytics typically follows a four-step process:
- Collection: The first step is to collect data. This can be done through a variety of methods, such as surveys, interviews, or sensors.
- Cleaning: Once the data is collected, it needs to be cleaned. This involves removing errors and inconsistencies from the data.
- Analysis: The next step is to analyze the data. This involves using statistical or machine learning techniques to extract insights from the data.
- Visualization: The final step is to visualize the data. This involves creating charts, graphs, or other visual representations of the data.
How can data analytics be used?
Data analytics can be used to help businesses in a variety of ways, including:
- Improve decision-making: Data analytics can help businesses make better decisions by providing them with insights into their operations. For example, data analytics can be used to identify which products are selling well, which customers are most profitable, and which marketing campaigns are most effective.
- Identify trends and patterns: Data analytics can be used to identify trends and patterns in data, which can then be used to make predictions about the future. For example, data analytics can be used to predict customer behavior, forecast demand, and identify potential risks.
- Optimize operations: Data analytics can be used to optimize business operations by identifying areas where waste can be reduced or efficiency can be improved. For example, data analytics can be used to optimize supply chains, improve customer service, and reduce costs.
- Gain a competitive advantage: Data analytics can help businesses gain a competitive advantage by providing them with insights that their competitors do not have. For example, data analytics can be used to identify new market opportunities, develop new products and services, and improve customer satisfaction.
What are the different types of data analytics?
There are many different types of data analytics, each with its own strengths and weaknesses. Some of the most common types of data analytics include:
- Descriptive analytics: This type of analytics is used to describe data. It can be used to summarize data, identify trends, and identify patterns.
- Diagnostic analytics: This type of analytics is used to diagnose problems. It can be used to identify the cause of problems and to find solutions to problems.
- Predictive analytics: This type of analytics is used to predict future events. It can be used to predict customer behavior, forecast demand, and identify potential risks.
- Prescriptive analytics: This type of analytics is used to prescribe actions. It can be used to recommend solutions to problems and to optimize business processes.
How to get started with data analytics?
If you are interested in getting started with data analytics, there are a few things you need to do:
- Define your goals: What do you want to achieve with data analytics? Do you want to improve decision-making, identify trends, or optimize operations?
- Collect your data: What data do you need to achieve your goals? This could include customer data, financial data, or operational data.
- Clean your data: Make sure your data is clean and free of errors. This will ensure that your analysis is accurate.
- Choose the right tools: There are many different data analytics tools available. Choose the tools that are right for your needs and budget.
- Learn the basics: There are many resources available to help you learn the basics of data analytics. Take some time to learn about the different techniques and methods.
- Practice makes perfect: The more you practice, the better you will become at data analytics. Start with small projects and gradually work your way up to more complex projects.
How can Leveledge help businesses with data analytics?
Leveledge is a data analytics company that provides businesses with the tools and expertise they need to make better decisions with data. Leveledge offers a variety of services, including:
- Collection and Cleaning of Data: Leveledge can help businesses collect and clean their data so that it is ready for analysis.
- Data analysis: Leveledge can use a variety of data analytics techniques to extract insights from data.
- Data visualization: Leveledge can create charts, graphs, and other visual representations of data to communicate insights.
- Consulting Data: Leveledge can provide businesses with guidance and support on their data analytics journey.
Data analytics is a powerful tool that can be used to improve business performance, make better decisions, and identify new opportunities. Leveledge is a data analytics company that can help businesses make better decisions with data. If you are looking to improve your business with data analytics, contact Leveledge today.
Explore our other Services
|
<urn:uuid:dd27c7e8-2fc1-4c25-a256-c5266774f013>
|
CC-MAIN-2023-50
|
https://leveledge.in/services/data-analytics/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.900301 | 1,106 | 3.734375 | 4 |
Research data management (RDM) is the effective storage, access, and preservation of research data that is often required by funding agencies. It involves planning, file naming and formatting, following metadata standards, data storage, and legal and ethical considerations. RDM is essential in continuing the data lifecycle because it enables individuals to access and reuse the data sets created by other researchers.
The Data Lifecycle
Image courtesy of NTU Libraries Blog
Curious about current RDM practices in Canada? Take a look at this substantial recent publication detailing a survey of RDM practices at many Canadian institutions:
Cheung, M., A. Cooper, D. Dearborn, E. Hill, E. Johnson, M. Mitchell, and K. Thompson. “Practices Before Policy: Research Data Management Behaviours in Canada”. Partnership: The Canadian Journal of Library and Information Practice and Research, vol. 17, no. 1, July 2022, pp. 1-80, doi:10.21083/partnership.v17i1.6779.
Research Data Management (RDM)
RDM refers to the processes applied throughout the lifecycle of a research project to guide the collection, documentation, storage, sharing, and preservation of research data.
Refers to all the stages in the existence of digital information from creation to destruction. A lifecycle view is used to enable active management of the data objects and resources over time, thus maintaining accessibility and usability.
“The process of Data Stewardship involves ensuring effective control and use of data assets and can include creating and managing metadata, applying standards, managing data quality and integrity, and additional data governance activities related to data curation. It also may include creating educational materials, policies, and guidelines around data at an institution.”
|
<urn:uuid:3167fffa-acb0-4d77-add0-144c84ec6695>
|
CC-MAIN-2023-50
|
https://libguides.lakeheadu.ca/rdm
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.887788 | 369 | 2.9375 | 3 |
The work sheds light on the web of hydrogen bonds that gives water its strange properties, which play a vital role in many chemical and biological processes.
Water is the most abundant yet least understood liquid in nature. It exhibits many strange behaviors that scientists still struggle to explain. While most liquids get denser as they get colder, water is most dense at 39 degrees Fahrenheit, just above its freezing point. This is why ice floats to the top of a drinking glass and lakes freeze from the surface down, allowing marine life to survive cold winters. Water also has an unusually high surface tension, allowing insects to walk on its surface, and a large capacity to store heat, keeping ocean temperatures stable.
Now, a team that includes researchers from the Department of Energy’s SLAC National Accelerator Laboratory, Stanford University and Stockholm University in Sweden have made the first direct observation of how hydrogen atoms in water molecules tug and push neighbouring water molecules when they are excited with laser light. Their results, published in Nature today, reveal effects that could underpin key aspects of the microscopic origin of water’s strange properties and could lead to a better understanding of how water helps proteins function in living organisms.
Read more on the LCLS website
Image: For these experiments, the research team (left to right: Xiaozhe Shen, Pedro Nunes, Jie Yang and Xijie Wang) used SLAC’s MeV-UED, a high-speed “electron camera” that uses a powerful beam of electrons to detect subtle molecular movements in samples.
Credit: Dawn Harmer/SLAC National Accelerator Laboratory
|
<urn:uuid:6173c365-8965-4ef4-962d-caffe81956ea>
|
CC-MAIN-2023-50
|
https://lightsources.org/tag/hydrogen-bonds/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.916948 | 330 | 4.15625 | 4 |
Despite more than 130 years of research, phloem loading is far from being understood in gymnosperms. In part this is due to the special architecture of their leaves. They differ from angiosperm leaves among others by having a transfusion tissue between bundle sheath and the axial vascular elements. This article reviews the somewhat inaccessible and/or neglected literature and identifies the key points for pre-phloem transport and loading of photoassimilates. The pre-phloem pathway of assimilates is structurally characterized by a high number of plasmodesmata between all cell types starting in the mesophyll and continuing via bundle sheath, transfusion parenchyma, Strasburger cells up to the sieve elements. Occurrence of median cavities and branching indicates that primary plasmodesmata get secondarily modified and multiplied during expansion growth. Only functional tests can elucidate whether this symplasmic pathway is indeed continuous for assimilates, and if phloem loading in gymnosperms is comparable with the symplasmic loading mode in many angiosperm trees. In contrast to angiosperms, the bundle sheath has properties of an endodermis and is equipped with Casparian strips or other wall modifications that form a domain border for any apoplasmic transport. It constitutes a key point of control for nutrient transport, where the opposing flow of mineral nutrients and photoassimilates has to be accommodated in each single cell, bringing to mind the principle of a revolving door. The review lists a number of experiments needed to elucidate the mode of phloem loading in gymnosperms.
In angiosperms, the regulation of phloem loading is usually attributed to the companion cells of minor veins. According to textbooks, transport sugars are actively concentrated in the sieve element-companion cell complexes, leading to an osmotically generated pressure flow from source to sink organs. As active loading strategies, two modes of phloem loading are well characterized: apoplasmic loading, depending on plasma membrane transporters, and symplasmic loading, depending on synthesis of sugar polymers and abundance of plasmodesmata between companion cells and bundle sheath, respectively. The role of cells of the pre-phloem pathway between mesophyll and bundle sheath is easily overlooked. This is evident for the passive symplasmic loading strategy, where the highest sugar concentrations are found in the mesophyll rather than the phloem (see Davidson et al. 2010, this issue). Moreover, only few studies have considered the intersection where the pre-phloem transport of photoassimilates is interwoven with the post-xylem transport of water, so that opposite streams might have influence on each other.
For gymnosperms, the mode of phloem loading has not been assessed yet, neither is it known whether both apoplast and symplasm are involved in it. Gymnosperm sieve elements are not associated with companion cells, but with Strasburger cells that are ontogenetically unrelated. However, their ultrastructure and the pore–plasmodesmata contacts are similar to companion cells (Schulz 1990). Whether and how they might contribute to phloem loading is unknown. The vascular strands in the leaves of all gymnosperms are separated from the mesophyll by a particular tissue, the transfusion tissue, and by an endodermis-like bundle sheath. All these special features indicate that assimilate loading might involve mechanisms and pathways hitherto not found in angiosperms.
Most angiosperm plant genera could be assigned to one of three loading types (Rennie and Turgeon 2009). In some cases even species-specific characteristics have been identified (Zhang and Turgeon 2009; Gil 2010). As a general rule for sucrose transporting angiosperms, active apoplasmic loading, i.e., sugar uptake into symplasmically isolated sieve element-companion cell complexes, appears to be predominant in herbaceous plants, while passive symplasmic loading, i.e., sugar diffusion from the mesophyll into sieve element-companion cell complexes phloem that are well-connected to the bundle sheath by plasmodesmata, is most common in angiosperm trees (Turgeon 2010, see also Turgeon and Medville 2010 this issue). All gymnosperms seem to translocate sucrose in the phloem, even though this has not been studied systematically (Shiroya et al. 1962; Willenbrink and Kollmann 1966; Willenbrink 2002).
Understanding the mechanisms of phloem loading in gymnosperm trees will cast light on the evolution and significance of long distance transport mechanisms in land plants, just in the context of recent discussions of passive phloem loading in angiosperm trees (Turgeon 2010). Gymnosperm leaves have fascinated scientists already many years back. Münch, who postulated the mechanism of pressure-driven phloem transport in 1930, was attentive for the peculiarities of gymnosperm needles and the role of the transfusion tissue between bundle sheath and vascular tissue (Fig. 1a). Since older references are often somewhat inaccessible, we chose to compile data and reprint some selected electron micrographs from the relevant literature. Most papers available covered single aspects of the structure and physiology of gymnosperm leaves only. The aim of this review is to give an integrated overview of their transport pathways, highlight significant control key points and identify open questions that have to be studied in order to understand phloem loading in gymnosperms.
Leaf morphology and anatomy
Taxonomically, gymnosperms are divided in conifers, cycads, Gnetophytes with Gnetum, Welwitschia, and Ephedra, and the Ginkgophytes with the only representative Ginkgo biloba. They are mainly evergreen trees, shrubs and a few lianas and well adapted to extreme habitats such as boreal forests with long winter periods, but in some cases also to tropical or desert environments. Most studies on gymnosperms focus on Pinaceae, by far the most abundant and economically important taxon of gymnosperms. Most Pinaceae have needle-shaped leaves, but gymnosperms in general have developed many different leaf shapes such as scales, pinnate, and broad leaves. The xeromorphic character of all gymnosperm leaves is reflected by an epidermis with thick cutinized outer walls that is often reinforced by hypodermal sclerenchyma fibers. Stomata are usually arranged in rows on the adaxial side and are sunken into the leaf surface. In most conifers, a variable number of resin ducts can be found in the needle periphery. In needles, vascular bundles are arranged in one or two central strands. However, Ginkgo leaf blades show a dichotomous venation pattern, Welwitschia parallel venation with anastomoses and Gnetum a reticulate venation with at least five vein classes, similar to most dicots.
Independent of shape, the vascular tissue of gymnosperm leaves consists of axial xylem and phloem elements embedded in the characteristic transfusion tissue. This tissue is again bordered by a conspicuous bundle sheath which for a number of gymnosperms was described to have similarities to a root endodermis. The transfusion tissue is composed of transfusion tracheids and transfusion parenchyma cells that are in contact with the axial xylem elements (tracheids) and Strasburger cells of the phloem, respectively (Fig. 1). Structure, amount, and arrangement of the transfusion tissue vary in the different species (Esau 1965).
Sieve elements belong to the axial phloem system and are linked by sieve areas in their long-tapering end walls. When mature, their cytoplasm is reduced to plastids, mitochondria and ER, as is that of angiosperm sieve elements (Schulz 1990). In stark contrast to the sieve pores of angiosperms, tubular ER is a regular compound in the sieve pores of gymnosperms and forms complexes on either side of the sieve areas, as visualized by confocal microscopy in live phloem (Schulz 1992). Unlike the angiosperm companion cells, Strasburger cells are ontogenetically unrelated to sieve elements and only partially in contact with them. Where they are, they develop extensive pore–plasmodesmata contacts, covered by complexes of tubular ER on the sieve element side (Schulz 1990; Glockmann and Kollmann 1996). In the collection phloem of needles, Strasburger cells are typically flanking the axial sieve elements in two to four layers, and may in addition occur interspersed in the axial phloem (Fig. 1a). Gnetum leaves have minor veins with only one tracheid and one to two sieve elements in the smallest vein class. Here, the Strasburger cells are larger in diameter than the sieve elements (Fig. 1b). Besides transfusion tissue and vascular elements, there may occur sclerenchyma fibers and parenchyma cells in the vascular bundles (Fig. 1a).
The transfusion tracheids are dead cells and a part of the transfusion tissue surrounding the axial vascular elements. They are characteristic for all leaves of gymnosperms (Fig. 1, de Bary 1877; Strasburger 1891). Transfusion tracheids are not only found in needle-bearing gymnosperms with one or two central veins, but also in the smallest veins of Gnetum, which has more than five vein classes (Fig. 1b). Gambles and Dengler (1982) identified four distinct groups of transfusion tracheids in Pinus resinosa based on their anatomy. Different degree of wall modification and pit morphology suggest that some transfusion tracheids are optimized for water transport whereas others are more important for water storage and support. The lignified walls might enable them to maintain their shape under great water stress as an adaptation to arid conditions (Gadek and Quinn 1988). The role in water conductance, first proposed by Worsdell (1897) was demonstrated with fluorescent tracers in the transpiration stream (Heimerdinger 1951). In addition to increasing drought resistance, the capacity to store water in the transfusion tissue might serve as prevention of frost damage to living cells (Roden et al. 2009).
The transfusion parenchyma forms bridges of living cells between the outer Strasburger cells and the bundle sheath (Fig. 1). The ratio of parenchyma cells to tracheids in the transfusion tissue varies between 18% and 88% in pine species (Lederer 1955). The two cell types can be understood as a physiological unit (Canny 1993).
An endodermis-like bundle sheath was described to be a consistent feature for needles of Pinaceae (Lederer 1955; Esau 1977; see Fig. 2a). Suberization and/or lignification of radial and transverse walls of the bundle sheath, including typical Casparian strips, have indeed been detected in needles of numerous Pinaceae species by microscopic staining techniques, electron microscopy and spectroscopic analysis (Fig. 2a, Carde 1978; Canny 1993; Kaku 1971; Scholz and Bauch 1973; Soda et al. 2000; Wu et al. 2001; Wu et al. 2003). Casparian strips have not been reported outside the Pinaceae, but representatives of other gymnosperm families have often wall modifications in the bundle sheath cells. The walls of bundle sheath cells in Cycas revoluta leaves are thickened and lignified next to the vascular tissue, and in leaves of G. biloba each of the numerous vascular bundles has a lignified endodermis (Esau 1977; Lederer 1955; see Fig. 2b). Rehydration experiments demonstrated a high radial resistance for water flow in all tested gymnosperms, which was attributed to the hydraulic isolation of vascular and photosynthetic tissue by the bundle sheath (Scholz and Bauch 1973; Zwieniecki et al. 2007). As an apoplasmic barrier for the transpiration stream the bundle sheath might play an important role in drought resistances (Soar 1922) and frost tolerance (Roden et al. 2009; Kaku 1971).
The complex anatomy of gymnosperm leaves has significant implications, both for the post-xylem and pre-phloem pathway, and thus for the transport of water, mineral nutrients and photoassimilates. The few functional studies on transport in gymnosperm leaves dealt only with water transport (Wu et al. 2005; Scholz and Bauch 1973; Zwieniecki et al. 2007) with the exception of simple tracer experiments done by Heimerdinger (1951) and Canny (1993). Apart from these two reports, the symplasmic domain has only been addressed by ultrastructural analysis of cell connections. The assimilate pathway from the mesophyll to the sieve elements in the phloem has never been looked at as a whole.
The symplasm of gymnosperm leaves consists of all living cells (presumably except for guard cells) and can be divided into an inner, vascular part, and an outer part starting with the bundle sheath. Inner and outer parts are isolated from each other by the extended system of transfusion tracheids except for the transfusion parenchyma bridges (see Fig. 1a). Moreover, in many gymnosperms the upper and lower side of the vasculature is additionally isolated by sclerenchyma cells (Lederer 1955). The only connection between the axial vascular phloem tissue and the bundle sheath is accordingly established through Strasburger cells, flanking the axial phloem, and transfusion parenchyma (Carde 1978).
The rate of symplasmic transport under physiological condition depends upon the size-exclusion limit (SEL) and frequency of plasmodesmata between the cells in question, both of which can be modulated during development (Kim and Zambryski 2005) and under stress conditions (Schulz 1995, 1999). For the study of symplasmic domain borders in gymnosperm leaves, plasmodesmal frequencies and the movement of synthetic tracers can be utilized. Interesting domain borders, such as those in the phloem, shown in transformed angiosperms to having a SEL allowing GFP passage, cannot be tested with reporter genes in gymnosperms as long as cell-specific transformation protocols are not available.
Cells of the pre-phloem pathway are connected radially but not axially in pine needles
In pine needles, all cells but the sieve elements are symplasmically isolated in axial direction, i.e., along the needle (Münch 1930; Strasburger 1891). The mesophyll cells are in most pine species organized in rows with air-filled spaces in between, again isolating them in axial direction. The endodermis cells are connected by pit fields in the radial, not in the end walls (Canny 1993; Carde 1978; Walles 1973; Fig. 3c and d). Transfusion parenchyma cells form a network through the transfusion tissue, again with preferentially radial contacts to each other (Heimerdinger 1951).
Modeling of the hydraulic parameters in leaves led Zwieniecki et al. (2004) to conclude that development of single-veined leaves is accompanied by a high radial water resistance outside the stele during leaf expansion. This conclusion is compatible with the view that water exits from the stele primarily through the protoplasts of the endodermis-like bundle sheath. The endodermis layer itself does not allow water transport in axial direction: neither through the apoplast, since the entire end wall of endodermis cells is sealed by suberin and/or lignin, nor through the symplasm, since the end walls are not crossed by pit fields/plasmodesmata (Carde 1978). Accordingly, assimilates entering the endodermis from the mesophyll, have to continue radially via the transfusion parenchyma towards the Strasburger cells. Only the sieve elements then offer an axial transport pathway. The axial isolation of the pre-phloem pathway might be important for the stabilization of concentration and pressure gradients over the length of the needle.
Branched plasmodesmata are present at all interfaces of the pre-phloem pathway in gymnosperm leaves
Leaves of a number of different gymnosperm species have been studied by electron microscopy. For the pre-phloem pathway the micrographs of plasmodesmata indicate unifying features across all gymnosperm species. We reprinted some micrographs from less accessible papers and combined them in Fig. 3, which shows that groups of plasmodesmata with more or less extensive median cavities are typically combined in fields at all interfaces from mesophyll to phloem: mesophyll–endodermis-transfusion parenchyma–Strasburger cell-sieve element (Fig. 3a–e, g; see also Parameswaran and Liese 1970; Boddi et al. 2002; Carde 1974, 1978; Gambles and Dengler 1982; Glockmann and Kollmann 1996; Harris 1972; Scholz and Bauch 1973; Walles 1973). While most plasmodesmata on the pre-phloem pathway are located in non-elevated primary pit fields, those linking Strasburger cells are located in conspicuous, dome-shaped wall thickenings (Fig. 3g and Carde 1974: Fig. VIc). Staining identified the thickenings to be primary wall depositions and to consist of hemicelluloses, pectin, and callose rather than cellulose (Carde 1974; Glockmann and Kollmann 1996). Branched plasmodesmata are a regular feature in mesophyll tissue, also in angiosperms (see e.g., Kühn et al. 1996) and seem to be the result of secondary modification of primary plasmodesmata (see Faulkner and Oparka 2009). However, the formation of large dome-shaped wall thickenings containing numerous plasmodesmata is characteristic for gymnosperm leaves. Only the companion cell side of pore–plasmodesmata units between sieve element and companion cell of angiosperms is somewhat comparable, but much less complex, than that of Strasburger cells.
Contacts of the transfusion parenchyma with Strasburger cells
Carde (1973) distinguished between three types of Strasburger cells: inner ones abutting the sieve elements, the most abundant central ones, and outer ones characterized by presence of chloroplasts. The inner and central Strasburger cells can easily be identified based on their dome-shaped wall thickenings, while the chloroplast-containing outer cells have regular pit fields (see Fig. 3e). Since Strasburger cells also from non-conifers are characterized by having plasmodesmal connections in dome-shaped wall thickenings (Glockmann and Schulz, unpublished) we suggest to name only those cells “Strasburger cells” in the gymnosperm leaf which have dome-shaped wall thickening, and to describe the other living parenchyma cells inside the bundle sheath (with or without chloroplasts) as transfusion parenchyma (see also Fig. 1). Carde himself called the entire system of Strasburger cells flanking the axial phloem transfer tissue (“Le tissu de transfert”, Carde 1973) and assumed that the Strasburger cells play an important role in the transfer of assimilates to the phloem.
Development of dome-shaped symplasmic contacts in Strasburger cells
A consistent feature of Strasburger cells in all gymnosperms are the dome-shaped symplasmic contacts towards other Strasburger cells and towards sieve elements (Carde 1974; Gambles and Dengler 1982; Parameswaran and Liese 1970). A detailed ultrastructural study on the development of these contacts in Metasequoia glyptostroboides by Glockmann and Kollmann (1996) indicated that these contacts develop from primary plasmodesmata in the thin walls between young Strasburger cells (Fig. 3f). During differentiation and expansion growth of the needle, the wall becomes thicker and the primary plasmodesmata secondarily modified by multiple branching (Fig. 3g, i; see Glockmann and Kollmann 1996). The only remnant of the primary plasmodesmata is then the median cavity which dilates through sheering forces, introduced by expansion growth of the needle (Fig. 3i).
Branching might be seen as a means to maintain a high degree of symplasmic contact between the Strasburger cells. Interestingly, the plasmodesmal orifices have the typical neck region (Fig. 3h), indicative for the need to control plasmodesmal transport (Glockmann and Kollmann 1996). Callose and/or protein interactions were discussed to shape the plasmodesmal neck region, which can be dilated under physiological conditions (Schulz 1995, 1999; Lucas et al. 2009). The elaborate and tubular ER system in the dome-shaped wall thickenings might on one hand be a consequence of the way the original plasmodesmata get secondarily modified by multiplication of plasmodesmal arms, selective deposition of new wall material and local loosening of the existing wall. This is supported by the different wall composition of the dome-shaped wall regions (Carde 1974; Glockmann and Kollmann 1996; see also discussion in Ehlers and Kollmann 1996, 2001; Faulkner et al. 2008; Faulkner and Oparka 2009; Burch-Smith et al. 2010, this issue). On the other hand, the elaborate ER system of Strasburger cell plasmodesmata might indicate an involvement of the ER in phloem loading (Carde 1974; Glockmann and Kollmann 1996). The presence of ER complexes on both sides of live sieve areas inspired Schulz (1992, 2005) to discuss that the ER has an active function in phloem transport of gymnosperms.
Continuity of the pre-phloem pathway with the sieve elements indicates a symplasmic mode of phloem loading
According to the cited electron microscopic papers, there is no indication for an isolation of the phloem from the pre-phloem pathway, otherwise characteristic for the closed minor vein configuration of apoplasmic phloem loaders (Gamalei 1989). On the contrary, the pre-phloem pathway of gymnosperms seems to provide a well-connected symplasmic pathway continuous all the way to the conducting sieve elements. The connections between the inner Strasburger cells and the sieve elements are pore–plasmodesmata contacts with many branched plasmodesmata within the wall thickenings of the Strasburger cell side (Carde 1974; Gambles and Dengler 1982; Glockmann and Kollmann 1996; Parameswaran and Liese 1970) and identical to the ones found in primary and secondary stem phloem of conifers (see Schulz 1990).
Continuity of symplasmic connections would suggest that sucrose produced in the mesophyll cells reaches the phloem by diffusion, similar to what was proposed for many angiosperm tree species (Turgeon et al. 2001; Turgeon 2010). If so, “phloem loading” happens already on the pre-phloem pathway in gymnosperms (see Turgeon and Medville 1998). Electron microscopy and localization of plasmodesmal targeted proteins can, however, not tell whether plasmodesmata are functional. For example, even though it is generally agreed that functional guard cells are symplasmically isolated, reporter protein experiments and random electron micrographs might falsely indicate presence of plasmodesmata (Itaya et al. 1998: Fig. 5c; Pallas and Mollenhauer 1972). Evidence for truncation of plasmodesmata towards guard cells was given by serial sectioning (Wille and Lucas 1984).
An indication that the plasmodesmata in the pre-phloem pathway of gymnosperms are indeed functional was provided by early experiments with fluorescent tracers. The cytoplasmic tracer fluorescein, applied to a cut surface on the lower side of a Pinus sylvestris needle, reached the endodermis, transfusion parenchyma and the phloem after short incubation (Heimerdinger 1951). Whether the tracer approached the sieve elements is not clear, since Heimerdinger did not discriminate between the cell types of the phloem. Movement of fluorescein is indicative for symplasmic continuity, but cannot detect restrictions in symplasmic domains such as those resulting from small SEL and/or low plasmodesmal frequencies.
Opposite transpiration and assimilate streams demand tight control of water, ion and sucrose transport across the plasma membranes of bundle sheath and transfusion parenchyma
A symplasmic mode of phloem loading, as indicated by the presence of plasmodesmata all along the pre-phloem pathway, raises questions based on the unique anatomy of gymnosperm leaves. It is dramatically different from that of angiosperms in two aspects: (1) the particular features of the bundle sheath and (2) the transfusion tissue between bundle sheath and axial vascular elements.
The endodermis-like bundle sheath in pines is the bottleneck for outward transport of water and mineral nutrients (Fig. 1: blue arrows). Since the radial walls block apoplasmic transport efficiently (Canny 1993), the plasma membrane of each bundle sheath cell has to contain a sufficient number of aquaporins (Voicu et al. 2009) and other transporter proteins to take up for water and ions from the transfusion tracheids. Also in non-pine gymnosperms does the bundle sheath seem to be a barrier for water transport, even though they do not have an obvious Casparian strip. This was established by rehydration studies of Metasequoia, Ginkgo, and Gnetum leaves (Zwieniecki et al. 2007). The flow of the transpiration stream out of the bundle sheath towards stomata could be apoplasmic, symplasmic or transcellular. This means that water could re-enter the apoplast and stay there, move through the plasmodesmata to the neighboring mesophyll cell or get to the mesophyll by crossing the plasma membranes of both, bundle sheath cell and mesophyll cell (see blue arrows in Fig. 1). This situation reflects the general discussion on post-xylem movement of water where a conclusion has yet to be reached (Sack and Holbrook 2006).
Simultaneous to the outward flow of water, all the inward transport of assimilates from the mesophyll to the transfusion parenchyma has to pass the bundle sheath (see Fig. 1: brown arrows). Already, Münch (1930) doubted that the opposing flow of water and photoassimilates could be accommodated in the same cells. Once inside the cytosol of the bundle sheath, an outward bulk flow of water would meet the inward diffusion of photoassimilates resulting in a very inefficient assimilate transport. The situation appears even less conceivable in case that the plasmodesmata in the outer bundle sheath wall are involved in water transport. This would imply that water and assimilates had to move opposite to each other in their cytoplasmic sleeves.
The thin network of transfusion parenchyma is the only symplasmic contact between the bundle sheath and the phloem for the inward assimilate transport. The transfusion parenchyma cells have a large surface area towards dead transfusion tracheids that are filled with water and mineral nutrients. The content of solutes in the apoplast is generally underestimated, and the concentrations of solutes in the xylem–lumen apoplast are different from those in the cell wall apoplast (Canny 1995). A steep gradient in water potential across the plasma membrane of the transfusion parenchyma cells would certainly lead to a considerable leakage of sucrose. Indeed, synthetic apoplasmic tracers, fed through the xylem, end up at the plasma membrane of the transfusion parenchyma and even cross this membrane after long chase periods (Canny 1993). As shown by autoradiography, radiolabelled aspartate was collected by the transfusion parenchyma and returned quickly via Strasburger cells to the phloem. Some of the label appeared also in the mesophyll. This led Canny (1993) to conclude that active transporters in the transfusion parenchyma recover solutes from the transpiration stream. How much sucrose on its way towards the Strasburger cells might leak into the apoplast of the transfusion tracheids, to be retrieved by membrane transporter activity, has yet to be determined.
As a solution to the challenges listed above, an elegant scenario would be the compartmentalization of water and assimilate transport in bundle sheath and transfusion parenchyma. In the context of this review it might be speculated that water and mineral nutrients could already be taken up by the transfusion parenchyma and access the cytosol en-route to the bundle sheath, as indicated by Canny’s tracer experiments. Obviously, the used fluorochrome sulforhodamine G is an imperfect apoplasmic tracer that over time can cross the plasma membrane (Canny 1993). Sucrose coming from the mesophyll could be taken up at the bundle sheath by the endoplasmic reticulum, or at any point on the way in the symplasm between bundle sheath and Strasburger cells. A special role of intercellular ER in phloem loading of conifers was already discussed by Carde (1974), Glockmann and Kollmann (1996), and Schulz (2005). This role would demand sucrose transporters for sucrose uptake into the ER at the latest in the Strasburger cells, and for efflux of sucrose into the sieve element.
Whether or not sucrose is taken up by the ER at one step of the pre-phloem pathway, a problem of opposing flows of water and assimilates in bundle sheath cells and their plasmodesmata might actually not exist, since gymnosperms have xeromorphic leaves. Transpiration might be limited to the extent that outward water transport in the bundle sheath might be diffusion rather than bulk flow. Water release across the outer plasma membrane should be tightly controlled by aquaporins and, if plasmodesmata are contributing, by their SEL. The high abundance of plasmodesmata is compatible with the assumption that they have a small SEL. Narrow plasmodesmata will inhibit bulk flow of water more than diffusion. Accordingly, if transport in and out of the bundle sheath is dominated by diffusion, there is no need for compartmentalization of water and assimilates: each molecular species would diffuse on its own in the same channels with a net movement of water outwards, and a net movement of assimilate inwards.
Feasibility of either compartmentalization or diffusional flow can only be tested by functional studies of the apoplasmic and symplasmic pathways in gymnosperm leaves and by the cloning, characterization and localization of sucrose transporters possibly involved in assimilate uptake.
Conclusions and open questions
Continuity of symplasmic contacts all the way from mesophyll to sieve elements indicate a symplasmic mode of phloem loading in gymnosperms. The endodermis-like bundle sheath seems to play a key role in control of mineral nutrient and assimilate transport, i.e., the post-xylem and the pre-phloem transport. Here, the outward mineral nutrient transport, driven by transpiration, meets the inward sugar transport, presumably driven by diffusion. Logistically, it would be the easiest way to separate these two streams by compartmentalization, where assimilates and water are physically separated. Indeed, the pathways are clearly separated in the vascular tissue inside the bundle sheath, where they are limited to the transfusion tracheids and transfusion parenchyma, respectively. Here, the pathways are kept separated by the plasma membrane of the transfusion parenchyma which controls any exchange of metabolites between apoplasmic and symplasmic pathway.
For the bundle sheath, it is conceivable that the incoming assimilates are compartmentalized in the endomembrane system, perhaps even including the vacuoles. Intercellular continuity of vacuoles through the plasmodesmal ER was shown for trichomes by Lazzaro and Thomson (1996). Scholz and Bauch reported the highest osmotic potential of the needle to occur in the endodermis-like bundle sheath and made it responsible for the exudation of water from detached needles (Scholz and Bauch 1973; see also Carde 1978). Without pointing to the compartment in question, this suggests that sugars accumulate in the bundle sheath. Where sucrose would leave the endomembrane system on its inward transport is one of the questions, only further functional experiments can solve.
The mechanism of phloem loading and transport is an enigma in gymnosperms (Schulz 1992, 2005; Glockmann and Schulz 1999). All gymnosperms studied so far have the same functional anatomy, and, thus, can be expected to have a similar phloem loading mechanism, independent of whether they have needles, scales or broad leaves.
Open questions derived from the present review are
Are there sucrose transporters present in gymnosperms and, if so, where are they localized?
Are assimilates compartmentalized in the bundle sheath?
What is the role of the extended ER in the plasmodesmata traversing the dome-shaped symplasmic contacts of Strasburger cells and sieve elements?
Is phloem loading active or passive, and does it follow an entirely cytosolic route (through the plasmodesmal sleeves), or are there a membrane step and the desmotubular pathway involved?
In order to solve these questions, it is proposed to clone putative sucrose transporters from gymnosperms, to characterize them and to try to localize them in collection tissue and transport phloem. According to the ultrastructural data, it can be assumed that pre-phloem transport relies on a diffusion gradient from mesophyll to Strasburger cells. If this is the case, any domain borders and obstacles in this pathway have to be identified. For the cytosolic pathway fluorescence redistribution after photobleaching (FRAP) and photoactivation experiments can be utilized to quantify the transport rate between selected interfaces (Pina et al. 2009). Preliminary experiments indicate that such tracer studies are able to discriminate symplasmic and apoplasmic phloem loaders (Liesche, Martens, and Schulz, unpublished). For the identification of a putative vacuolar pathway, FRAP experiments could be undertaken using a fluorescent vacuolar marker. Autoradiography of leaves after feeding of radiolabelled with CO2 could indicate any active phloem-loading steps (Turgeon and Medville 1998; Rennie and Turgeon 2009). Finally, the sugar concentration in the cytosol and the vacuoles of the pre-phloem pathway shall be assessed in order to identify those interfaces, where active transport might contribute to pre-phloem transport and phloem loading.
Boddi S, Bonzi LM, Calamassi R (2002) Structure and ultrastructure of Pinus halepensis primary needles. Flora 197(1):10–23
Burch-Smith TM, Stonebloom S, Xu M, Zambryski PC (2010) Plasmodesmata during development: re-examination of the importance of primary, secondary, and branched plasmodesmata structure versus function. Protoplasma
Canny MJ (1993) Transfusion tissue of pine needles as a site of retrieval of solutes from the transpiration stream. New Phytol 123(2):227–232
Canny MJ (1995) Apoplastic water and solute movement: new rules for an old space. Annu Rev Plant Physiol Plant Mol Biol 46:215–236
Carde JP (1973) Le tissu de transfert (=cellules de Strasburger) dans les aiguilles du pin maritime (Pinus pinaster ait.), I. Étude histologique et infrastructurale du tissu adulte. J Microsc 17:65–88
Carde JP (1974) Le tissu de transfert (=cellules de Strasburger) dans les aiguilles du pin maritime (Pinus pinaster Ait.), II. Caractères cytochimiques et infrastructuraux de la paroi et des plasmodesmes. J Microsc 20:51–72
Carde JP (1978) Ultrastructural studies of Pinus pinaster needles—endodermis. Am J Bot 65(10):1041–1054
Davidson A, Keller F, Turgeon R (2010) Phloem loading, plant growth form, and climate. Protoplasma
de Bary A (1877) Vergleichende Anatomie der Vegetationsorgane der Phanerogamen und Farne. Wilhelm Engelmann, Leipzig
Ehlers K, Kollmann R (1996) Formation of branched plasmodesmata in regenerating Solanum nigrum-protoplasts. Planta 199(1):126–138
Ehlers K, Kollmann R (2001) Primary and secondary plasmodesmata: structure, origin, and functioning. Protoplasma 216(1):1–30. doi:10.1007/bf02680127
Esau K (1965) Plant anatomy, 2nd edn. Wiley, New York, 767pp
Esau K (1977) Anatomy of seed plants, 2nd edn. Wiley, New York, 550pp
Faulkner C, Akman OE, Bell K, Jeffree C, Oparka K (2008) Peeking into pit fields: a multiple twinning model of secondary plasmodesmata formation in tobacco. Plant Cell 20(6):1504–1518. doi:10.1105/tpc.107.056903
Faulkner C, Oparka K (2009) Plasmodesmata. Encyclopedia of life sciences (ELS). Wiley, Chichester
Gadek PA, Quinn CJ (1988) Pitting of transfusion tracheids in cupressaceae. Aust J Bot 36(1):81–92
Gamalei Y (1989) Structure and function of leaf minor veins in trees and herbs. Trees 3:96–110
Gambles RL, Dengler RE (1982) The anatomy of the leaf of red pine, Pinus resinosa 2. Vasc tissues Can J Bot 60(12):2804–2824
Gil L (2010) Sucrose transporters play a role in phloem loading of CMV-infected melon plants that are defined as symplastic loaders. Presentation given at the International conference on Plant Vascular Biology 2010. Columbus, Ohio
Glockmann C, Kollmann R (1996) Structure and development of cell connections in the phloem of Metasequoia glyptostroboides needles. 1. Ultrastructural aspects of modified primary plasmodesmata in Strasburger cells. Protoplasma 193(1–4):191–203
Glockmann C, Schulz A (1999) Phloem loading and transport in gymnosperms: an enigma. In: International conference on assimilate transport and partitioning, Newcastle, Australia, August 15–20 1999. Apstract 7-07, p. 99.
Harris WM (1972) Ultrastructural observations on Pinaceae leaf phloem. 1. Spring condition. New Phytol 71(1):169–173
Heimerdinger G (1951) Zur Mikrotopographie der Saftströme im Transfusionsgewebe der Koniferennadel. 2. Entwicklungsgeschichte und Physiologie. Planta 40(2):93–111
Itaya A, Woo YM, Masuta C, Bao YM, Nelson RS, Ding B (1998) Developmental regulation of intercellular protein trafficking through plasmodesmata in tobacco leaf epidermis. Plant Physiol 118(2):373–385
Kaku S (1971) Possible role of endodermis as a barrier for ice propagation in freezing of pine needles. Plant Cell Physiol 12(6):941–948
Kim I, Zambryski PC (2005) Cell-to-cell communication via plasmodesmata during Arabidopsis embryogenesis. Curr Opin Plant Biol 8(6):593–599. doi:10.1016/j.pbi.2005.09.013
Kühn C, Quick WP, Schulz A, Riesmeier JW, Sonnewald U, Frommer WB (1996) Companion cell-specific inhibition of the potato sucrose transporter SUT1. Plant Cell Environ 19(10):1115–1123
Lazzaro MD, Thomson WW (1996) The vacuolar-tubular continuum in living trichomes of chickpea (Cicer arietinum) provides a rapid means of solute delivery from base to tip. Protoplasma 193(1–4):181–190
Lederer B (1955) Vergleichende Untersuchungen über das Transfusionsgewebe einiger rezenter Gymnospermen. In: Huber B (ed) Vergleichend-anatomische Untersuchungen. Gustav Fischer, Jena, pp 1–42
Lucas WJ, Ham B-K, Kim J-Y (2009) Plasmodesmata—bridging the gap between neighboring plant cells. Trends Cell Biol 19:495–500
Münch E (1930) Die Stoffbewegungen in der Pflanze. Gustav Fischer, Jena
Pallas JE, Mollenhauer HH (1972) Electron-microscopic evidence for plasmodesmata in dicotyledonous guard cells. Science 175(4027):1275–1276
Parameswaran N, Liese W (1970) Cytology of Strasburger cells in conifer needles. Naturwissenschaften 57(1):45–46
Pina A, Errea P, Schulz A, Martens HJ (2009) Cell-to-cell transport through plasmodesmata in tree callus cultures. Tree Physiol 29(6):809–818. doi:10.1093/treephys/tpp025
Rennie EA, Turgeon R (2009) A comprehensive picture of phloem loading strategies. P Natl Acad Sci USA 106(33):14162–14167. doi:10.1073/pnas.0902279106
Roden JS, Canny MJ, Huang CX, Ball MC (2009) Frost tolerance and ice formation in Pinus radiata needles: ice management by the endodermis and transfusion tissues. Funct Plant Biol 36(2):180–189. doi:10.1071/Fp08247
Sack L, Holbrook NM (2006) Leaf hydraulics. Annu Rev Plant Biol 57:361–381
Scholz F, Bauch J (1973) Anatomische und physiologische Untersuchungen zur Wasserbewegung in Kiefernnadeln. Planta 109(2):105–119. doi:10.1007/bf00386118
Schulz A (1990) Conifers. In: Behnke H-D, Sjolund RD (eds) Comparative structure, induction and development. Springer, Berlin Heidelberg New York, pp 63–88
Schulz A (1992) Living sieve cells of conifers as visualized by confocal, laser-scanning fluorescence microscopy. Protoplasma 166(3–4):153–164
Schulz A (1995) Plasmodesmal widening accompanies the short-term increase in symplasmic phloem unloading in pea root-tips under osmotic-stress. Protoplasma 188(1–2):22–37
Schulz A (1999) Physiological control of plasmodesmal gating. In: van Bel AJE (ed) Plasmodesmata—stucture, function, role in cell communication. Springer, New York, pp 173–204
Schulz A (2005) Role of plasmodesmata in solute loading and unloading. In: Oparka K (ed) Plasmodesmata. Blackwell, Oxford, pp 135–161
Shiroya T, Lister GR, Slankis V, Krotkov G, Nelson CD (1962) Translocation of the products of photosynthesis to roots of pine seedlings. Can J Bot 40:1125–1135
Soar I (1922) The structure and function of the endodermis in the leaves of the abietineae. New Phytol 21(5):269–292. doi:10.1111/j.1469-8137.1922.tb07604.x
Soda C, Bussotti F, Grossoni P, Barnes J, Mori B, Tani C (2000) Impacts of urban levels of ozone on Pinus halepensis foliage. Environ Exp Bot 44(1):69–82
Strasburger E (1891) Ueber den Bau und die Verrichtungen der Leitungsbahnen in den Pflanzen. Gustav Fischer, Jena
Turgeon R (2010) The role of phloem loading reconsidered. Plant Physiol 152(4):1817–1823. doi:10.1104/pp.110.153023
Turgeon R, Medville R (1998) The absence of phloem loading in willow leaves. Proc Natl Acad Sci USA 95:12055–12060
Turgeon R, Medville R (2010) Amborella trichopoda, plasmodesmata, and the evolution of phloem loading. Protoplasma
Turgeon R, Medville R, Nixon KC (2001) The evolution of minor vein phloem and phloem loading. Am J Bot 88(8):1331–1339
Voicu MC, Cooke JEK, Zwiazek JZ (2009) Aquaporin gene expression and apoplastic water flow in bur oak (Quercus macrocarpa) leaves in relation to the light response of leaf hydraulic conductance. J Exp Bot 60(14):4063–4075. doi:10.1093/jxb/erp239
Walles B (1973) On the ultrastructure of needles of Pinus silvestris. l. vol 106. Studia forestalia, suecica. Allmänna Förlaget, Stockholm
Wille AC, Lucas WJ (1984) Ultrastructural and histochemical studies on guard-cells. Planta 160(2):129–142
Willenbrink J (2002) Assimilate transport in phloem: regulation and mechanism. Russ J Plant Physiol 49:8–15. doi:10.1007/bf00225352
Willenbrink J, Kollmann R (1966) Über den Assimilattransport im Phloem von Metasequoia. Z Pflanzenphysiol 55:42–53
Worsdell WC (1897) Transfusion-tissue: its origin and function in the leaves of gymnospermous plants. Botany 5:301–319
Wu XQ, Zhu JM, Huang RZ, Wang QL, Zheng WJ, Hu YX, Lin JX (2001) Evidence of Casparian strip in the foliar endodermis of Pinus bungeana. Acta Bot Sin 43(10):1081–1084
Wu XQ, Lin JX, Zhu JM, Hu YX, Hartmann K, Schreiber L (2003) Casparian strips in needles of Pinus bungeana: isolation and chemical characterization. Physiol Plant 117(3):421–424
Wu XQ, Lin JX, Lin QQ, Wang J, Schreiber L (2005) Casparian strips in needles are more solute permeable than endodermal transport barriers in roots of Pinus bungeana. Plant Cell Physiol 46(11):1799–1808. doi:10.1093/Pcp/Pci194
Zhang CK, Turgeon R (2009) Downregulating the sucrose transporter VPSUT1 in Verbascum phoeniceum does not inhibit phloem loading. P Natl Acad Sci USA 106(44):18849–18854. doi:10.1073/pnas.0904189106
Zwieniecki MA, Boyce CK, Holbrook NM (2004) Functional design space of single-veined leaves: role of tissue hydraulic properties in constraining leaf size and shape. Ann Bot Lond 94(4):507–513. doi:10.1093/Aob/Mch173
Zwieniecki MA, Brodribb TJ, Holbrook NM (2007) Hydraulic design of leaves: insights from rehydration kinetics. Plant Cell Environ 30(8):910–921. doi:10.1111/j.1365-3040.2007.001681.x
We thank Line Svensson Kirk and Astrid S. Andersen for the light microscopic preparations of Ginkgo and Pinus parviflora, respectively (Fig. 2), and Christl Glockmann, University of Kiel, for electron microscopic preparation and micrographs of Gnetum gnemon (Fig. 1b). All comments and suggestions from the anonymous reviewers which led to the improvement of the manuscript are gratefully acknowledged.
Conflict of interest
The authors declare that they have no conflict of interest.
Handling Editor: Manfred Heinlein
About this article
Cite this article
Liesche, J., Martens, H.J. & Schulz, A. Symplasmic transport and phloem loading in gymnosperm leaves. Protoplasma 248, 181–190 (2011). https://doi.org/10.1007/s00709-010-0239-0
|
<urn:uuid:df8427c2-7c55-420f-89a1-869aba369fd6>
|
CC-MAIN-2023-50
|
https://link.springer.com/article/10.1007/s00709-010-0239-0
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.855379 | 11,049 | 2.8125 | 3 |
The rotator cuff refers to a group of tendons in the shoulder. The purpose of the rotator cuff is to help stabilize and move the shoulder joint. A rotator cuff tear can occur due to injury, for example, when playing sport, or it may also occur because the tendons have been worn down over time.
Here at LMcG Orthopaedics, one of the many injuries that Dr McGonagle treats is rotator cuff tears. Our Geraldton team has therefore created a patient guide to further explain this injury and help you better understand the potential causes, symptoms, treatments and shoulder surgery.
Rotator cuff tear symptoms
Rotator cuff tears become more common as you get older. Sometimes you won’t necessarily feel a torn rotator cuff—but some common symptoms to look out for include:
· Weakness in your shoulder
· Issues or pain when raising your arm
· Difficulty lifting items
· Pain when lying on your shoulder
What causes a rotator cuff tear?
The rotator cuff may tear from an injury, such as a fall, or trying to lift a heavy object overhead. They can also tear through degeneration and aging of the tissues.
Rotator cuff tear treatments & shoulder surgery
Depending on the extent of the rotator cuff tear, potential treatments include rest, rehabilitation or shoulder surgery. It is important to seek professional treatment as soon as possible to ensure you aren’t further damaging your shoulder. Shoulder surgery to repair a torn rotator cuff involves reattaching the tendon to the top of the humerus bone. After surgery you will see a physiotherapist and slowly get the shoulder moving again. The rehabilitation process takes several months. This allows the tendon healing process to mature fully and to minimize the risk of re-tear.
Here at LMcG Orthopaedics, Dr McGonagle regularly assists patients suffering from shoulder injuries, including the common rotator cuff tear. For more information, please get in touch with our Geraldton clinic today on 08 9921 4847.
|
<urn:uuid:0368effc-32b2-4abd-9bc6-9923cb3ef4a6>
|
CC-MAIN-2023-50
|
https://lmcg.com.au/rotator-cuff-tear-patient-guide/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.925953 | 420 | 2.65625 | 3 |
C++ is the programming language that comes into existence as an extension of the c language. It was developed by Bjarne Stroustrup in 1979. C++ is an intermediate-level programming language that supports advanced programming concepts such as object-oriented, procedural, functional, and many more. This is the reason, it is considered the most famous and frequently used programming language in the world. Its popularity graph shows that it ranks number 2 among all the programming languages.
Uses of C++ programming
- Simplicity: It is easy to understand and the best fit for beginners.
- Popularity: One of the most popular programming languages that attract learners
- Object-oriented: Support object-oriented concepts that enhance reusability
- Portability: C++ is portable as its application compatible with cross-platforms.
- User Interface: Provides a Strong Graphical user interface to design modern GUI-based applications.
- Speed: With its intermediate nature, its execution speed is very fast.
- Cost-Effective: With its code reusability, c++ applications are always cost-efficient.
C++ is extensively used and its applications cover the different areas of our lives.
- General GUI-based software development
- Banking systems
- Game Development
- Developing a new programming language
- Compiler constructions
- Used in the medical field
- Graphic designing tools development
- Used in all major operating systems
- Used in browsers
- Used in database management software
C++ is the best option for newbies to start learning any programming language. Our C++ tutorials are specially designed for beginners to learn C++ programming concepts more efficiently.
|
<urn:uuid:1a64cb01-bd1a-448f-9310-6c6b09e86839>
|
CC-MAIN-2023-50
|
https://logictoprogram.com/cpp-get-started/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.899598 | 342 | 3.546875 | 4 |
Wireless technologies have advanced by leaps and bounds over the last several decades. Speeds have increased dramatically, connectivity has improved, and wireless network protocols—including Wi-Fi and cellular—have become ubiquitous. Today, a reasonably fast, persistent wireless connection is available in most parts of the world.
Yet, despite all the gains, today's wireless networks are still relatively limited in terms of how they handle large volumes of data. Connection speeds are adequate for basic tasks like Web browsing, videoconferencing, e-commerce, gaming, streaming videos, and exchanging messages. However, as new and more resource-intensive technology enters the picture and the Internet of Things (IoT) expands, the need for bandwidth is growing—in some cases, by an order of magnitude.
|
<urn:uuid:2fc0e575-6382-4003-bf45-c49aac8fe091>
|
CC-MAIN-2023-50
|
https://m-cacm.acm.org/news/248193-terahertz-networks-move-closer-to-reality/abstract?mobile=true
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.946932 | 158 | 2.8125 | 3 |
Powder Coating Performance Characteristics
Manufacturers can’t succeed if their products don’t live up to customers’ expectations. This is true no matter the industry, but it’s amplified when it comes to sectors such as aerospace, automotive and defense. These industries demand more of their equipment. Whether it’s the extreme stresses placed on it through intensive use or the punishing conditions of the environments in which they’re used, the products have to endure a lot.
This is why industrial manufacturing companies and their employees rely on durable powder coatings to help protect what they build. The rugged nature of these finishes makes them superior to liquid paint in multiple ways, because they offer added protection from damage and wear. However, there are numerous types of powder coatings, and not all are created equal. Each one brings something different to the table.
Understanding a powder coating’s unique characteristics is essential for finding the right one for the specific application. For instance, choosing an epoxy finish makes the final product extremely resistant to chemicals. This finish is not UV-stable, though, so it must be used indoors to get the best performance. Its qualities are well-suited for finishing vessels or pipelines that would be used inside a chemical processing facility. Although polyurethane is more stable than epoxy, it must be cured with much higher temperatures. This limits the number of applicators that may be able to provide such services.
Manufacturers and industrial workers rely on powders to help protect their equipment, but choosing the wrong one can be counterproductive. For more information on powder coating characteristics, see the accompanying guide.
|
<urn:uuid:4092da2e-28f2-4fdd-ac32-27e7ef8fc3d4>
|
CC-MAIN-2023-50
|
https://manufacturingtimes.co.uk/guide-to-powder-coating/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.937443 | 336 | 2.6875 | 3 |
Following our cryptography related article series, this article addresses Hash Functions and their importance to blockchain and cryptography in general. Starting with a simple definition, a cryptographic hash function is a one-way function that can map data of any arbitrary size to data of fixed size. The input to the hash function is called pre-image and the output is called hash. The one-way property, also known as pre-image resistance, means that it is computationally infeasible to recreate the pre-image if one only knows the output hash. A brute-force approach would be practically impossible, given that the search space tends to infinite.
Therefore, a cryptographic hash function should have the following properties:
• Determinism: A given input message always produces the same hash output.
• Pre-Image resistance: One-way property.
• Easy to compute: Computing the hash of a message is efficient, due to its linear complexity (The bigger the message, the lower the efficiency).
• Avalanche Effect: Any kind of change to the message should change completely the hash output, so that there is no correlation between outputs.
• Irreversibility: As previously described, computing the message from its hash is infeasible.
• Collision resistance: A strong collision resistance means that two different input messages should not have the same output
• Large output space: Output space large enough to make a brute force search infeasible.
With these properties, Hash Functions can be used on several applications, such as: Data fingerprinting, Message integrity (error detection), Proof of Work, Authentication, hash tables, pseudorandom number generators, peer-to-peer file sharing etc. They also have a vital role in blockchain, being used twice on the PoW function on Bitcoin in order to verify the computational effort spent by miners; digital signatures also have hash functions present on their algorithm; and the blocks of the blockchain are chained by block headers that contain the hash of the previous block header, therefore any change on the blocks will be immediately detected due to the change of the hash output.
There are several different classes of hash functions and algorithms, the most relevant for blockchain technology are the Secure Hash Algorithms (SHA), SHA-256 and SHA-3. Both algorithms are used in Bitcoin and Ethereum respectively. SHA-256 has a maximum input message of less than 264 -bits and the output is a 256-bit digest. The algorithm consists of an iterated hash function approach, in which the input message is compressed in multiple rounds on a block-by-block basis in order to produce the compressed output. SHA-3, also known as Keccak-256, has a different structure from the previous algorithm. It uses a newer approach called sponge and squeeze construction, which is a random permutation model. The Ethereum addresses are unique identifiers derived from public keys using the Keccak-256 hash function. As described on the previous Public Key article, the public key is derived from the private key using a Elliptic Curve Cryptography algorithm, and then Keccack-256 is applied to the public key, and then the 20 least significant bytes are considered as the Ethereum Address.
With this, one can verify how important cryptographic algorithms are for all of the blockchain advantages and characteristics. These technologies are in constant development and study and are also being applied for scalability purposes, with Zero Knowledge Proofs (ZKPs) being used on Ethereum Rollups. These proofs are used to prove the validity of an assertion without revealing any of its information, and will be the theme of future articles.
|
<urn:uuid:7623e162-3340-456e-a42f-ca339d65ba0c>
|
CC-MAIN-2023-50
|
https://medusaprotocol.medium.com/hash-functions-3a3bbe607737?responsesOpen=true&sortBy=REVERSE_CHRON&source=author_recirc-----4da9ad8d4f19----1---------------------6fc81159_d2f9_4d7d_b8f6_d37c115b4866-------
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.907334 | 730 | 3.5 | 4 |
Stablecoin is a type of cryptocurrency that has its value backed into something. The value of this form of cryptocurrency can be pegged to fiat money, commodity, or other assets. Stablecoins (as the name suggests) aim to be stable, and, with that, to act like a medium of exchange or a reserve of value in a volatile environment, the Crypto Market.
With this stability, stablecoins can act as the medium of exchange in the Crypto Market scenario, but not all of it is stable as the name suggests. This occur based on what the stablecoin is backed by.
There are, mainly, four types of stablecoins: fiat-backed, crypto-backed, commodity-backed, and algorithmic.
Fiat-backed: stablecoin with its value underlied by cash, cash equivalents, or other assets, commonly more liquid assets. So, it can be backed by US Dollars and US Treasuries. Examples of fiat-backed stablecoin: Tether (USDT) and USD Coin (USDC).
Crypto-backed: stablecoin backed by other cryptocurrencies. Due to the volatility of the other cryptocurrencies, this type uses frequently over-collateralization to maintain its value. In other words, it has more underlying components than the price that it aims to have. For example, if the aimed price is USD 1, it will have more than the proportion 1 to 1 in backed assets. Bitcoin (BTC) and ether (ETH) are used commonly in this kind of stablecoin. Example of crypto-backed stablecoin: DAI (DAI).
Commodity-backed: stablecoin backed by commodity (ies). The principle is the same, although now with its value underlied by a commodity. Commodities have less volatility than a stock or a cryptocurrency, but it is still volatile. Example of commodity-backed stablecoin: Paxos Gold (PAXG) — stablecoin of gold.
Algorithmic: stablecoin that its peg relies on algorithms to change its own supply of tokens or the asset underlying its value. This type of stablecoin can have the total supply burned (diminished) or increased to maintain the peg, the same occurring with the balancer asset (it can be another cryptocurrency); all of this functioning only with an algorithm behind. Example of algorithmic stablecoin: terraUSD with its balancer token Luna.
One important consideration is that the price of stablecoins is not supposed to be USD 1 (proportion 1:1), this is only supposed to happen when a specific stablecoin aims to be pegged to US Dollar. Another one is that stablecoins do not have their own blockchains; so, they use blockchains (Layer 1) such as Ethereum, Solana, and Avalanche.
Another common mistake is confusing Central Bank Digital Currency (CBDC) with Stablecoin. Simplifying:
• CBDC — issued by central banks, domestic use with possibly cross-border uses, and total control by the central bank issuer;
• Stablecoin — issued by banks or other finance agents, global use accordingly to the blockchain used, and controlled by single or multiple issuers with the possibility to be supervised by economics agents.
The Stablecoins are important not only for the Crypto Market as a medium of exchange or reserve of value, but also as a DeFi (Decentralized Finance) facilitator who includes more people in the monetarized world, improving their lives.
|
<urn:uuid:c175a52c-9806-4e3c-9c7f-1a7c4dab846c>
|
CC-MAIN-2023-50
|
https://medusaprotocol.medium.com/stable-coins-explained-4da9ad8d4f19?responsesOpen=true&sortBy=REVERSE_CHRON&source=author_recirc-----2d7935f0921c----0---------------------3159ab6f_b86b_4880_9e00_4a2fa9a050fd-------
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.937564 | 709 | 3.15625 | 3 |
Sodium hydrogen sulfate, solution 0.5 M
- Molecular formula:
- Chemical compound:
- sodium hydrogen sulfate
- Common name:
Sodium hydrogen sulfate NaHSO4 is a white, crystalline solid. Due to its acidic nature, many of its applications are based on its ability to make something more acidic (lower its pH). It is used in various household cleaning products (for example, in some polishes and toilet bowl cleaners). It is also used as a food additive, for instance, as a leavening agent in baked goods, as a component of anti-browning products applied to fresh-cut fruits, and in various sauces.
- Sodium hydrogen sulfate, solution 0.1 M
- Sodium hydrogen sulfate, solution 0.5 M
- Sodium hydrogen sulfate, solution 1.2 M
- Sodium hydrogen sulfate, solution 1 M
- Sodium hydrogen sulfate, solution 2 M
- Sodium hydrogen sulfate, solution 3 M
Experiments with similar reagents
- Causes serious eye damage.
- Wear protective gloves/protective clothing/eye protection/face protection.
- IF IN EYES: Rinse cautiously with water for several minutes. Remove contact lenses if present and easy to do – continue rinsing.
|
<urn:uuid:84091456-2adc-42cc-8218-b21e8695f966>
|
CC-MAIN-2023-50
|
https://melscience.com/SG-en/chemistry/reagents/151/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.896205 | 266 | 2.921875 | 3 |
The reaction between hydrochloric acid and zinc
Properties of zinc and specifics of its interactions with HCl
Physical properties of metallic zinc
Zinc is a brittle, silvery-blue metal. It is quite ductile and malleable at temperatures ranging from 100-150 °С.
Zinc likely gained its name from the fact that its crystals resemble needles (from the German “Zinke,” meaning “prong”). Zinc is so brittle that you can even hear an audible crack if a zinc rod is bent at normal temperatures. At temperatures of 100-150 °С, zinc becomes ductile, and thus can be used as a solder. However, the silvery metal becomes brittle again at higher temperatures.
Chemical properties of zinc
The 30th element in the periodic table is a strong reducer. The metal burns at high temperatures, forming amphoteric white zinc oxide. Its combustion is accompanied by a blue flame:
2Zn + O₂ → 2ZnO
Zinc reacts quite violently with sulfur, burning with a yellow-green flame:
Zn + S → ZnS
Zinc reacts with halogens in the presence of moisture:
Zn + Cl₂ → ZnCl₂
Zinc also reacts with water vapor at 600-800 °С to form hydrogen and zinc oxide:
Zn + 2H₂O = ZnO + H₂↑
If a piece of zinc is immersed in diluted sulfuric acid, bubbles of hydrogen are released:
H₂SO₄ + Zn = ZnSO₄ + H₂↑
Zinc is a heavy metal compared with lithium, for instance, so the bubbles don’t rise to the surface.
Look here for some awesome experiments with zinc.
Reaction of zinc and hydrochloric acid
Let’s examine the example of the interaction between zinc and hydrochloric acid. Zinc also reacts with HCl, releasing small bubbles of hydrogen and forming zinc chloride ZnCl₂.
Zn + HCl → ZnCl₂ + H₂↑
|
<urn:uuid:b7090242-14bd-4adf-8d7f-e15eeb5f7324>
|
CC-MAIN-2023-50
|
https://melscience.com/US-en/articles/reaction-between-hydrochloric-acid-and-zinc/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.900384 | 463 | 3.703125 | 4 |
Prehistory of the Oregon Coast: The Effects of Excavation by R Lee Lyman PDF
By R Lee Lyman
Read Online or Download Prehistory of the Oregon Coast: The Effects of Excavation Strategies and Assemblage Size on Archaeological Inquiry PDF
Best native american studies books
The Kuna of Panama, this day the best identified indigenous peoples of Latin the United States, moved over the process the 20th century from orality and isolation in the direction of literacy and an lively engagement with the kingdom and the area. spotting the fascination their tradition has held for lots of outsiders, Kuna intellectuals and villagers have collaborated actively with international anthropologists to counter anti-Indian prejudice with confident money owed in their humans, hence turning into the brokers in addition to matters of ethnography.
Millions of individuals in Alberta and Montana converse Blackfoot, an Algonquian language. however the numbers are diminishing, and the survival of Blackfoot is in a few risk. to aid guard the language whereas it's nonetheless in day-by-day use, Donald G. Frantz and Norma Jean Russell collaborated at the Blackfoot Dictionary, released in 1989 to frequent acclaim, and revised in a moment variation in 1995.
Addressing, for the 1st time, the enigma of ways Franz Boas got here to be the principal founding father of anthropology and a driver within the popularity of technology as a part of societal lifestyles in North the US, this exploration breaks in the course of the linguistic and cultural obstacles that experience avoided students from greedy the significance of Boas's own heritage and educational actions as a German Jew.
Sarah Winnemucca Hopkins (Northern Paiute) has lengthy been well-known as a huge nineteenth-century American Indian activist and author. but her acclaimed performances and talking excursions around the usa, besides the copious newspaper articles that grew out of these excursions, were mostly missed and forgotten.
- The Struggle for Self-determination: History of the Menominee Indians since 1854
- The Indian Chief as Tragic Hero: Native Resistance and the Literatures of America, from Moctezuma to Tecumseh
- Savage preservation : the ethnographic origins of modern media technology
- Native American DNA : tribal belonging and the false promise of genetic science
Additional info for Prehistory of the Oregon Coast: The Effects of Excavation Strategies and Assemblage Size on Archaeological Inquiry
For example, in one report we read "the greater part of the archaeological fieldwork carried out during this project was focused on the recovery of the artifacts and faunal materials present in the central area of the site before these archaeological remains were destroyed by construction" (Minor et al. 1985:20). While this project was the result of CRM activities and thus may have had certain limitations placed on it, such approaches tend to limit the utility of the data collected (Dunnell 1982; Gibbon 1984; Hill 1972).
On the basis of his extensive (but not so intensive) survey of the northern 400 km of the Oregon coast, Collins (1953) expressed favor for Kroeber's (1939) hypothesis of an interior origin for Oregon's coastal peoples. He 20 Prehistory of the Oregon Coast suggested generalized hunter-gatherers from the interior "followed some of the major waterways to the coast and [there] developed a maritime culture which later became subjected to influences from the Northwest Coast, California, and the interior" (Collins 1953:74).
AGS 17), with basal fresh water sediments containing alder, pine and 14 Prehistory of the Oregon Coast sedge pollen. The lake was subsequently brackish, as indicated by Ruppia (ditch grass) pollen, and later became fresh water again with pollen of sedge (Cyperaceae), pine, Sitka spruce and alder dominating (Heusser 1959, 1960, 1985). 2). P. for this core. An early period with high amounts of Sitka spruce, lodgepole pine, and hemlock is followed by a middle period with abundant alder. The late period contains more spruce, pine, hemlock, and fluctuating amounts of alder.
Prehistory of the Oregon Coast: The Effects of Excavation Strategies and Assemblage Size on Archaeological Inquiry by R Lee Lyman
|
<urn:uuid:ca530e2e-b194-4292-ba53-4e6e69796a00>
|
CC-MAIN-2023-50
|
https://mhmscal.org/download/prehistory-of-the-oregon-coast-the-effects-of-excavation-strategies-and
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.925502 | 893 | 2.609375 | 3 |
Mindful Eating During the Holidays
Lael Agard, BS Nutrition Science & Dietetics Student
Sherri Isaak, MS, RD, CDCES, BC-ADM, DipACLM
The holiday season is such a unique time of the year, often filled with lots of food and fellowship for many. This is a time to try many new dishes and recipes as well as new ways of eating, such as mindful eating. According to psychologist Joseph Nelson, mindful eating is “an approach to food that focuses on individuals’ sensual awareness of the food and their experience of the food.” Rather than being as concerned with caloric intake and keeping track of macronutrients, mindful eating allows the individual to fully enjoy their eating experience by being fully aware during the entire experience.
When practicing mindful eating, one is able to increase their satisfaction and enjoyment of the food. Rather than telling yourself, “I should save this for later,” or “I should not eat this,” eating that food when there is a taste for it allows the individual to experience more pleasure in that moment instead of another time. Along with enjoying your food, be aware of your level of internal hunger and fullness as well as healthy options that may allow for the same satisfaction.
Have you ever noticed that food tends to taste better when you are hungry? This “better taste” is an important component of satisfaction. However, according to Resch, if one is experiencing extreme hunger, they may not enjoy the food as much. When over hungry, it’s easy to eat too quickly and then less savoring and enjoyment of your food occurs. During the holiday season, it is common to hold off on earlier meals to eat a larger amount at a holiday event. This may lead to overeating , which could cause feelings of sluggishness and feelings of guilt.
Here are some helpful questions and suggestions to consider when practicing mindful eating:
- Try not to skip meals. Skipping meals can cause intense hunger and you may be more likely to overeat. Bring portioned snacks when shopping such as some nuts, a whole grain granola bar, apple slices, etc.
- Are you taking your time to eat? If rushing when eating, it may result in a less enjoyable experience and cause you to eat more than your body needs.
- Appreciate your food. Take a moment to observe your surroundings, including the people who may be eating with you. Use all your senses to observe how the food makes you feel.
- Eat your food slowly. Taking the time to eat your food allows you to fully take in the experience and be in tune with the way it makes you feel.
- It’s okay not to clean your plate. Many times, people feel pressured to clean their plate. If you are feeling full and still have food left, consider putting it aside and saving it for later. Remember, food tastes better when you are hungry!
- Consider foods that are important to you. Enjoying your food is an important part of eating. Include some of your favorite foods, in moderation, in your meals.
Mindful eating may not come easy to everyone. There will be some meals where you overeat and that’s normal! Learn from your experiences and note what works for you and what doesn’t. Overall, remember to be patient with yourself throughout your journey to become a more mindful eater.
- Nelson JB. Mindful Eating: The Art of Presence While You Eat. Diabetes Spectr. 2017;30(3):171-174. doi:10.2337/ds17-0015
- Dennett C. Holiday eating – Today’s Dietitian Magazine. Today’s Dietitian. https://www.todaysdietitian.com/newarchives/1116p22.shtml. Accessed November 17, 2021.
- Tribole E, Resch E. Intuitive Eating: A Revolutionary Program That Works. 3rd ed. New York, NY: St. Martin’s Press; 2012.
- 8 steps to mindful eating. Harvard Health. https://www.health.harvard.edu/staying-healthy/8-steps-to-mindful-eating. Published January 16, 2016. Accessed November 23, 2021.
- Segal J, Robinson L, Cruz M. Mindful eating. HelpGuide.org. https://www.helpguide.org/articles/diets/mindful-eating.htm. Published October 4, 2021. Accessed November 23, 2021.
- Mirgain S. Eating mindfully can help manage holiday temptations. News | UW Health. https://www.uwhealth.org/news/eating-mindfully-can-help-manage-holiday-temptations. Published November 16, 2018. Accessed November 23, 2021.
Roasted Root Vegetables
Recipe by Shelby Huse, MS Nutrition & Wellness Student
3 whole carrots, cubed
2 russet potatoes, cubed
3 sweet potatoes, cubed
1 beet, cubed
1 parsnip, cubed
1/8 cup olive oil
6-7 cloves of garlic, minced
3 sprigs of rosemary
1 tsp salt
1 tsp black pepper
Preheat oven to 400ºF. Wash and cube carrots, russet potatoes, sweet potatoes, beet, and parsnip and place in a large bowl. Add olive oil, salt, pepper, and minced garlic and toss to thoroughly mix. Spread out on a large baking pan. Place sprigs of rosemary on top of the root vegetables. Cook for 30-35 minutes until golden brown!
|
<urn:uuid:b00c4e33-ef4b-4b50-bb9f-4042337bb9f4>
|
CC-MAIN-2023-50
|
https://michianavegfest.org/mindful-eating-during-the-holidays/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.94572 | 1,193 | 2.9375 | 3 |
Methanosaeta thermophila: Difference between revisions
From MicrobeWiki, the student-edited microbiology resource
No edit summary
|Line 1:||Line 1:|
Revision as of 18:51, 19 August 2010
A Microbial Biorealm page on the genus Methanosaeta thermophila
Phylum: Euryarchaeota Class: Methanomicrobia Order: Methanosarcinales Family: Methanosaetaceae Genus: Methanosaeta Species: Methanothrix thermophila Genus Species Strain: Methanosaeta thermophila PT Name History: Synonyms: Methanothrix thermophila PT Methanothrix thermophila DSM 6194 Equivalent names: Methanosaeta thermophila strain PT Methanosaeta thermophila strain PT
Description and Significance
Methanosaeta thermophila are nonmotile, nonsporulating, and thermophilic, which means they thrive at temperatures of 50ºC or higher. The addition of Methanosaeta to the methanoarchaeal genome sequence compilation offered an opportunity to gain significant insight into this intricate microbe and the unique use of comparative genomic approaches allows one to address the nature of these specific microbes and their biological influence and capability. Because these microbes are methanogens, they serve an important role as the producers of natural gas and have potential as creators of biofuels (fuels derived from a biomass).
The Methanosaeta thermophila genome has been entirely sequenced.
These microbes possess circular chromosomes and do not contain plasmids. (The following genome sequence information is from reference # 11) Genome Sequence: RS: NC_008553 Genome Sequence Length: 1879471 Statistics: Number of nucleotides: 1879471 Number of protein genes: 1696 Number of RNA genes: 51
Cell Structure and Metabolism
Methanosaeta thermophila is circular (coccus), with one inner membrane and one cell wall. This microbe does not interact with other organisms, grows extremely slow, does not contain plasmids, does not possess flagella, but they do however produce gas vacuoles to help them move in aquatic environments. Gas vacuoles are cavities within the cytoplasm, which contain a gas similar to that of their surrounding atmosphere. These vacuoles serve as flotation devices because they decrease in size when subjected to increased hydrostatic pressure. So although they are nonmotile, their gas vacuoles allow some degree of flexibility in regards to how much movement they have in aquatic environments. Methanosaeta thermophila obtain their energy as a “thermophilic obligately-aceticlastic methane-producing archaeon,” which means that they produce methane from acetate (4). Although approximately two-thirds of all methane is derived from the methyl group of acetate, Methanosaeta are able to utilize acetate as a substrate for methanogenesis. Methanosarcina is the only other genus of methanoarchaea that are capable of utilizing acetate as a substrate, as well as using H2/CO2, dimethylsulfide, and and methanethiol compounds as substrates. Unlike the faster-growing Methanosarcina, which prefers methylated compounds to acetate, Methanosaeta is a slow-growing specialist that utilizes acetate only.
The environment at which Methanosaeta thermophiles are found is aquatic (living and growing in water) and they exhibit optimal growth between 55-60°C. Methanosaeta species are the most prevalent methanogenic archaea of the microbial population in numerous environments, including rough sludge digesters, solid wastes, sewage slush,and anaerobic reactors. During activation of anaerobic bioreactors, Methanosaeta species are widespread due to the high acetate concentration. However, as bioreactors become stable and attain their peak performance, the acetate concentration decreases, as well as the Methanosaeta population.
Methanosaeta thermophilaare not pathogens and therefore are not disease causing microbes. To this date, there are no known archaea that are pathogens.
Although Methanosaeta continues to be comprehensively studied both biochemically and genetically, studies have decreased due to its slow growth (up to 12 days doubling time) and lower growth yield than other microbes. One current study of this microbe by Alber, B.E. and Ferry J.G., determined that Methanosaeta thermophila archaea produce a carbonic anhydrase, which is an enzyme that catalyzes the reaction of water with carbon dioxide. The carbonic anhydrase(abbreviated CA) from acetate-grown Methanosaeta thermophila was purified. The molecular mass of the enzyme (CA) was determined via gel filtration chromatography. The results indicated that this particular CA represented a distinct class of CA’s and provided a foundation to determine the unique roles for CA in acetotrophic anaerobes. Another study detected central glutamates in the acetate kinase from the Methanosaeta thermophila. Acetate kinase is an enzyme which catalyzes the reversible phosphorylation (adding a phosphate group) of acetate. The suggested mechanism denoted an unspecified glutamate residue was phosphorylated, and the “alignment of the amino acid sequences for the acetate kinases from E. coli (Bacteria domain), Methanosarcina thermophila (Archaea domain), and four other phylogenetically divergent microbes revealed high identity which included five glutamates,” (9). These glutamates were substituted in the M. thermophila enzyme to determine if they were required for catalysis. The substituted enzymes were tagged and created in E. coli and purified by metal affinity chromatography. The substituted enzymes produced undetectable kinase activity. These results imply that the glutamates in the acetate kinase were in fact required for catalysis, which supports the original suggested mechanism.
1) Copeland A., Lucas S., Lapidus A., Barry K., Detter J.C., Glavina del Rio T., Hammon N., Israni S., Pitluck S., Chain P., Malfatti S., Shin M., Vergez L., Schmutz J., Larimer F., Land M., Hauser L., Kyrpides N., Kim E., Smith K.S., Ingram-Smith C., Richardson P.; "Complete sequence of Methanosaeta thermophila PT."; Submitted (OCT-2006) to the EMBL/GenBank/DDBJ databases. 2) Identification of Essential Glutamates in the Acetate Kinase from Methanosarcina thermophila. Singh-Wissmann K, Ingram-Smith C, Miles RD, Ferry JG. J Bacteriol. 1998 Mar; 180(5): 1129-1134. 3) Carbonic anhydrase is an ancient enzyme widespread in prokaryotes. Smith KS, Jakubzick C, Whittam TS, Ferry JG. Proc Natl Acad Sci U S A. 1999 Dec 21; 96(26): 15184-15189. 4) A carbonic anhydrase from the archaeon Methanosarcina thermophila. Alber BE, Ferry JG. Proc Natl Acad Sci U S A. 1994 Jul 19; 91(15): 6909-6913. 6) NCBI, Joint Genome Institute, Unpublished, October 25, 2006, Richardson P http://www.genomesonline.org/DBs/goldtable.txt 7) http://www.genome.jp/kegg-bin/show_organism?org=mtp 8) ftp://ftp.ncbi.nih.gov/genomes/Bacteria/Methanosaeta_thermophila_PT/ 9) http://genome.jgi-psf.org/draft_microbes/metth/metth.info.html 10) NCBI/RefSeq:NC_008553 http://www.ncbi.nlm.nih.gov/entrez/viewer.fcgi?val =NC_008553 11) Map of Chromosome: http://img.jgi.doe.gov/cgi-bin/pub/main.cgi?section=TaxonCircMaps&page =circMaps&taxon_oid=639633038&pidt=25318.1178126134 12) http://genome.jgi-psf.org/finished_microbes/metth/metth.home.html 13) http://genome.jgi-psf.org/finished_microbes/metth/metth.home.html 14) http://expasy.org/sprot/hamap/METTP.html 15) http://www.ncbi.nlm.nih.gov/Taxonomy/Browser/wwwtax.cgi?id=349307
|
<urn:uuid:9605c1bd-46b1-4573-a5cb-66031ee67e43>
|
CC-MAIN-2023-50
|
https://microbewiki.kenyon.edu/index.php?title=Methanosaeta_thermophila&diff=next&oldid=44655
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.860711 | 1,909 | 2.796875 | 3 |
Hot Dog; Hot dogs are a popular food item that can be found in many different places. They are often associated with baseball games, picnics, and other outdoor events. A hot dog is a type of sausage that is typically grilled or steamed and served in a partially sliced bun.
The origins of the hot dog are somewhat disputed, but it is generally agreed that it originated in Germany in the 15th century. It was brought to the United States by German immigrants in the late 1800s and quickly became a popular street food. Today, hot dogs are enjoyed all over the world and are available in many different varieties.
Despite their popularity, hot dogs have been the subject of some controversy over the years. Some people are concerned about the quality of the meat used in hot dogs, while others worry about the health effects of consuming too much processed meat. However, many experts agree that hot dogs can be part of a healthy diet when consumed in moderation.
History of the Hot Dog
The hot dog has become an iconic American food, but its origins can be traced back to Europe. The exact history of the hot dog is somewhat disputed, but it is generally believed that it was first created in Germany in the late 17th century. The modern hot dog is often associated with American culture, but it was actually brought to the United States by German immigrants in the 1800s.
One popular story is that the hot dog was invented in Frankfurt, Germany, in 1487. The city claims that the word “frankfurter” is proof of the hot dog’s roots in the city. In fact, in 1987, Frankfurt threw a huge celebration honoring the 500th anniversary of the hot dog.
Another theory is that the hot dog was invented in Vienna, Austria, in the late 1700s. The sausage was called a “wiener” after the city’s name, and it was eventually brought to the United States by Austrian immigrants.
Regardless of its true origins, it is clear that the hot dog became popular in the United States in the late 1800s. The first hot dog stand was opened by a German immigrant named Charles Feltman on Coney Island in 1867. The hot dog quickly became a popular food at baseball games and other sporting events, and it remains a staple of American cuisine to this day.
Hot Dog Ingredients
Hot dogs are a popular food item that can be found in many places around the world. They are typically made up of three main components: the sausage, the bun, and the toppings. Each of these components plays a crucial role in creating the perfect hot dog.
The sausage is the most important part of a hot dog. It is typically made from a mixture of emulsified meat trimmings of chicken, beef, or pork, which is then blended with other ingredients like preservatives, spices, and coloring into a batter-like substance. The emulsified meat is then stuffed into casings, which are typically made from processed collagen or collagen from animal intestines.
If a hot dog is labeled “all beef” or “all pork,” it must be made from 100% muscle tissue of that animal. Other ingredients are included for preserving and flavoring the links, but that can vary depending on the manufacturer. Some common ingredients in hot dog sausages include:
- Corn syrup
- Sodium phosphate
- Sodium erythorbate
- Sodium nitrite
The bun is the second most important part of a hot dog. It serves as the vessel that holds the sausage and toppings. Hot dog buns are typically made from wheat flour, water, sugar, salt, and yeast. Some manufacturers may add additional ingredients like dough conditioners, enzymes, and preservatives to improve the texture and shelf life of the buns.
Hot dog buns can come in different shapes and sizes, but they are usually long and soft. They are often sliced down the middle and toasted or steamed before being filled with the sausage and toppings.
The toppings are the final component of a hot dog. They can vary depending on the region and personal preference. Some popular toppings include:
These toppings can be added in any combination to create a unique flavor profile. Some people prefer their hot dogs with just a few simple toppings, while others like to pile on as many as possible.
In conclusion, hot dogs are a simple yet delicious food item that has been enjoyed for generations. By understanding the ingredients that go into making a hot dog, you can better appreciate the taste and texture of this classic dish.
Varieties of Hot Dogs
Hot dogs are a popular food item that originated in Germany in the late 19th century. Since then, they have become a staple food in many countries, and there are now many different varieties of hot dogs available. In this section, we will discuss some of the most popular types of hot dogs.
American hot dogs are perhaps the most well-known variety of hot dogs. They are typically made from beef or pork and are served on a bun with a variety of toppings. Some popular toppings include ketchup, mustard, onions, and relish. In some regions of the United States, hot dogs are also served with chili, cheese, or sauerkraut.
German hot dogs, also known as “frankfurters,” are the original type of hot dog. They are typically made from pork and are served on a long roll with mustard or ketchup. In Germany, they are often served with sauerkraut or potato salad.
Mexican hot dogs, also known as “hot dogs estilo Sonora,” are a popular street food in Mexico. They are typically made from beef and are served on a bolillo roll with a variety of toppings. Some popular toppings include bacon, beans, onions, tomatoes, and jalapenos.
Overall, there are many different types of hot dogs available, and each has its own unique flavor and style. Whether you prefer a classic American hot dog or a spicy Mexican hot dog, there is sure to be a variety that will suit your taste buds.
Hot Dog Consumption Stats
Hot dogs are a popular food item in the United States, and their consumption is significant. According to the National Hot Dog and Sausage Council (NHDSC), Americans purchase 350 million pounds of hot dogs at retail stores, which equates to 9 billion hot dogs. However, the actual number of hot dogs consumed by Americans is probably much larger.
The NHDSC also reports that 95% of American homes eat hot dogs, and the average U.S. resident consumes about 70 hot dogs per year. Additionally, U.S. soldiers around the world consumed 2.4 million hot dogs in 2020.
In 2019, Los Angeles Dodger fans consumed 2.7 million hot dogs, and across the major leagues, fans enjoyed 18.3 million hot dogs during the 2019 season. This shows the widespread popularity of hot dogs as a snack food at sporting events.
The most commonly consumed type of hot dog in the United States is the all-beef frankfurter, with 197.03 million Americans consuming it in 2020. Other popular types of hot dogs include chicken and turkey franks, which were consumed by 57.41 million Americans in 2020.
Overall, these statistics demonstrate the significant role that hot dogs play in American food culture.
Hot Dog Preparation Methods
There are several ways to prepare hot dogs, each with its unique benefits and drawbacks. Here are some of the most popular methods:
Boiling is a classic method for cooking hot dogs. To boil hot dogs, fill a large saucepan with enough water to cover the hot dogs and bring it to a boil. Add the hot dogs one at a time using tongs. Reduce the heat to low and allow the hot dogs to simmer for 3 to 6 minutes. The longer they simmer, the crispier they’ll be. Boiling hot dogs is a quick and easy way to cook them and is ideal if you’re cooking for a large group.
Grilling is another popular method for cooking hot dogs. Preheat your grill to medium-high heat and place the hot dogs on the grill. Turn them occasionally until they’re heated through and have grill marks on all sides. Grilling hot dogs adds a smoky flavor and a satisfying crunch to the outside of the hot dog. It’s perfect for backyard barbecues or a summer picnic.
Pan-frying hot dogs is a great way to achieve a crispy exterior and a plump interior. Put half an inch of water in a frying pan and let it come to a simmer on medium-high heat. Add the hot dogs and cook for 3 to 5 minutes, turning them occasionally, until they are browned on all sides. Pan-frying hot dogs is an excellent option if you don’t have a grill or want to cook indoors.
Air frying hot dogs is a healthier alternative to other cooking methods. Preheat your air fryer to 400°F and place the hot dogs in the basket. Cook for 5 minutes or until they are heated through. Air frying hot dogs gives them a crispy exterior without the need for oil. It’s perfect for those who want a healthier version of their favorite snack.
Microwaving hot dogs is the quickest and easiest way to cook them. Place the hot dogs on a microwave-safe plate and cook on high for 30 to 45 seconds per hot dog. Microwaving hot dogs can be convenient, but it doesn’t give them a crispy exterior like other cooking methods.
No matter which method you choose, make sure to cook hot dogs to an internal temperature of 165°F to ensure they are safe to eat.
Cultural Impact of Hot Dogs
Hot dogs have become a staple food in American culture, with their popularity dating back to the late 1800s. Today, hot dogs are not only a popular food item but also a cultural icon that has left a significant impact on American society.
One of the most significant cultural impacts of hot dogs is their association with American sports culture. Hot dogs are commonly sold at baseball games and other sporting events, and have become a symbol of the American pastime. In fact, the National Hot Dog and Sausage Council estimates that Americans consume over 20 billion hot dogs each year, with a significant portion of those being consumed at sporting events.
Hot dogs have also become synonymous with American summertime traditions such as barbecues and picnics. They are often served alongside other classic American foods such as hamburgers, potato salad, and corn on the cob. This cultural association has made hot dogs a popular food choice for many Americans during the summer months.
In addition to their association with sports and summertime traditions, hot dogs have also become a symbol of American patriotism. During World War II, hot dogs were often used as a way to promote American morale and patriotism. The image of a hot dog wrapped in an American flag has become an iconic symbol of American pride.
Overall, the cultural impact of hot dogs on American society is significant. They have become a symbol of American sports culture, summertime traditions, and patriotism. Their popularity has only continued to grow over the years, solidifying their place as a beloved American food icon.
Health and Nutrition
Hot dogs are a popular food item that can be found at sporting events, barbecues, and other events. While they are a tasty treat, it is important to understand the health and nutrition implications of consuming hot dogs.
One beef hot dog without a bun or condiments contains about 189 calories, 16.9 grams of fat, and 493.1 milligrams of sodium Livestrong. The high sodium content in hot dogs can be a concern for individuals with high blood pressure, heart disease, and other health conditions.
Additionally, hot dogs often contain nitrates and nitrites, which are preservatives used to extend the shelf life of the product. These preservatives have been linked to an increased risk of cancer Consumer Reports.
However, there are healthier options available for individuals who enjoy hot dogs. Some brands offer grass-fed beef hot dogs, which are lower in pro-inflammatory omega-6 fats and higher in health-boosting nutrients Men’s Health. Additionally, there are vegetarian and vegan options available for those who prefer a plant-based diet EatingWell.
It is important to consume hot dogs in moderation and to choose healthier options when available. Pairing a hot dog with a side of vegetables or a salad can help balance out the meal and provide additional nutrients.
Hot Dog Controversies
Hot dogs are a popular food item in America and around the world. However, they have been the subject of many controversies over the years. Here are some of the most notable ones:
Is a Hot Dog a Sandwich?
One of the most debated controversies surrounding hot dogs is whether they are a sandwich or not. According to the National Hot Dog and Sausage Council, a hot dog is not a sandwich. They argue that a sandwich is defined as “two or more slices of bread or a split roll with filling in between.” A hot dog bun, on the other hand, is one piece of bread that is not fully sliced.
Despite the council’s official stance, the debate continues to rage on. Some people argue that a hot dog is a sandwich because it has a filling between two pieces of bread. Others believe that a hot dog is its own unique food item and should not be classified as a sandwich.
Another controversy surrounding hot dogs is their kosher status. Kosher hot dogs are made according to Jewish dietary laws, which prohibit the consumption of certain animals and require specific preparation methods.
However, not all hot dogs are kosher, and there have been instances where non-kosher hot dogs have been sold as kosher. This has led to outrage among Jewish consumers who rely on kosher certification to ensure that their food is prepared according to their religious beliefs.
Hot dogs have also been linked to health concerns, particularly in relation to their high sodium and nitrate content. Sodium is a major contributor to high blood pressure, while nitrates have been linked to an increased risk of cancer.
While some hot dogs are now available with reduced sodium and nitrate content, they are still considered by many to be an unhealthy food choice.
In conclusion, hot dogs are a food item that has been the subject of many controversies over the years. From debates over whether they are a sandwich to concerns about their kosher status and health implications, hot dogs continue to be a topic of discussion among consumers and health experts alike.
In conclusion, the question of whether a hot dog is a sandwich remains a topic of debate among food enthusiasts and culinary experts. While some argue that a hot dog is a type of sandwich due to its bread and filling components, others maintain that it is a distinct food item in its own right.
Despite the lack of consensus, it is clear that the hot dog holds a special place in American cuisine and culture. From ballparks to backyard barbecues, hot dogs are a staple of summertime gatherings and a symbol of American culinary traditions.
Whether you consider a hot dog to be a sandwich or not, there is no denying its popularity and enduring appeal. With a variety of toppings and condiments to choose from, hot dogs offer a versatile and customizable meal option for people of all ages and backgrounds.
So next time you bite into a juicy hot dog, take a moment to appreciate its unique place in the culinary world and the cultural significance it holds for so many people.
Frequently Asked Questions
What is hotdog made of?
Hot dogs are typically made of a combination of beef, pork, and chicken. The meat is finely ground and mixed with water, spices, and other ingredients to create a smooth paste. This paste is then stuffed into a casing made of animal intestines or synthetic materials.
Are hot dogs pork or beef?
Hot dogs can be made from a variety of meats, including beef, pork, and chicken. Some hot dogs are made from a mixture of these meats, while others are made from only one type of meat.
Are hot dogs OK for you?
Hot dogs are high in sodium and fat, which can be unhealthy if consumed in large quantities. However, they can be enjoyed in moderation as part of a balanced diet. It is important to choose high-quality hot dogs made from lean meats and to avoid those that contain added preservatives or fillers.
Why is it called hot dog?
The origin of the term “hot dog” is unclear, but it is believed to have originated in the United States in the late 19th century. Some historians believe that the term was coined by sports cartoonist T.A. Dorgan, who saw vendors selling sausages at a baseball game and compared them to the dachshund dogs he saw on the field.
Where do hot dogs come from on a pig?
Hot dogs are not made from any specific part of a pig. They are typically made from a combination of beef, pork, and chicken, and the meat is finely ground and mixed with other ingredients to create a smooth paste.
What is the definition of a hot dog?
A hot dog is a type of sausage that is typically served on a bun with various condiments, such as ketchup, mustard, and relish. It is a popular food in the United States and around the world, and is often associated with sporting events and outdoor gatherings.
- Dog Park Near Me: Finding the Best Options in Your Area
- Korean Corn Dog: A Delicious and Popular Street Food in Korea
- Hot Dog Machine: A Comprehensive Guide to Choosing the Best One for Your Business
- Brändi Dog Online: Your Ultimate Guide to Purchasing the Best Dog Food
- Dog Chef: How to Treat Your Pup to Gourmet Meals at Home
|
<urn:uuid:25f42558-daf0-4937-8947-1b8327879a83>
|
CC-MAIN-2023-50
|
https://millkun.com/hot-dog-a-classic-american-street-food/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.962022 | 3,709 | 2.921875 | 3 |
Kimmo Hentinen, Geological Survey of Finland, P.O. Box 1237, FI-70211 KUOPIO, FINLAND, kimmo.hentinen[at]gtk.fi
Numerical methods stands for numerical methods for solving differential or partial differential equations. Mathematical modelling leads often to partial differential equations (PDE). In ‘realistic’ models these equations are very hard or impossible to solve (Wang & Anderson 1982). Numerical methods provide a way to achieve approximative solution for these equations. Most common methods are finite difference method (FDM), finite element method (FEM) and finite volume method (FVM). There are also some other methods closely related to ones mentioned before (Diersch 2014).
In each of these numerical methods computational domain is divided into finite number of elements or nodes. The solution of the governing PDE is estimated in these discrete elements or points depending on the method in use. This article will describe the ideas behind FDM and FEM, but won’t go into details of these methods. These methods are selected because they are probably most widely used. FVM is left out because it is closely related to FEM and has many similar properties to FEM (Diercsh 2014).
Description of the methods
Finite difference method (FDM) is the classic numerical approach and it was the first widespread numerical method e.g. in groundwater modelling. In FDM the computational domain is covered with rectangular grid and using this grid the derivates in partial differential equations are estimated (Kovarik 2000). Estimation is done using the actual values in the nodes of the grid. This procedure generates a system of linear equations which can be written in matrix form. This method requires an initial guess from where the approximative solution is processed forward using iterative methods until we have a solution for the matrix equation which is accurate enough. (Wang & Anderson 1982).
In finite element method (FEM) the computational domain is divided into finite number of elements. These elements can be e.g. in triangular shape. For each of the elements solution of the governing PDE is estimated using certain basic functions and coefficients for each function. This estimative solution is inserted into the governing PDE and with some modifications to the governing equations the coefficients can be solved from a system of linear equations (Hämäläinen & Järvinen 2006). This is transformed in to a matrix equation which is again solved with iterative methods. Approximative solution is achieved from the basic functions and their coefficients. This is the normal procedure but FEM has to be ‘tweaked’ a bit according to the governing equations (Hämäläinen & Järvinen 2006). In FVM the idea is the same but the process from the governing equations to the matrix equation is different from FEM.
Finite difference method has some restrictions compared to FEM. Grid used in FDM has to be rectangular and thus domain boundary can’t be matched exactly. This is not a problem in groundwater flow because the boundary itself isn’t known exactly anyway (Kovarik 2000). Rectangular grid generates also another problem. Local refinement of the grid generates refinement also in areas where it isn’t necessary and thus increasing computational cost. In FEM triangular grid can be unstructured and thus domain boundary has more realistic shape and local refinement can be done more effectively.
Finite difference method is also restricted to simple boundary condition where FEM can handle quite arbitrary boundary conditions (Diercsh 2014). Mathematically and computationally FEM is heavier than quite simple FDM, but it is more versatile. With modern computational capacity FEM being heavier is usually not a problem. Mathematical models tend to be more accurate and FEM is considered to be most general and powerful compared with other numerical methods (Diercsh 2014).
Kovarik, K. 2000, Numerical Models in Groundwater Pollution. 221 pages.
Wang, H.F. & Anderson, M.P. 1982. Introduction to groundwater modeling, Academic Press. 237 pages.
Diersch, H-J.G. 2014, FEFLOW Finite Element Modeling of Flow, Mass and Heat Transport in Porous and Fractured Media, Springer. 996 pages.
Hämäläinen, J. & Järvinen, J. 2006. Elementtimenetelmä virtauslaskennassa, CSC – Tieteellinen laskenta Oy. 215 pages.
|
<urn:uuid:bd6d6c92-6bff-4688-a9d8-123cd189a03e>
|
CC-MAIN-2023-50
|
https://mineclosure.gtk.fi/numerical-methods/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.885239 | 960 | 3.09375 | 3 |
Exploring The World of Eagles
Only two kinds of eagles live in North America, the bald eagle and the golden eagle. These majestic birds belong to the same family and share many physical traits and behaviors, but there are also important differences between them. In this fully illustrated introduction, young readers will discover why the bald eagle lives along the coastlines of oceans, lakes and rivers while the golden eagle prefers mountainous regions, prairies and plains. They'll learn about the impressive nest-building skills of these two raptors and their courtship displays, mating patterns and fierce hunting styles. Full-color photographs provide close-ups and action shots of these aerial performers, while the engaging text, sidebars and captions offer insights into the life history of two of the world's most powerful winged predators. Paperback - 24 Pages. Age Range - 9-12.
- Dimensions: 8" H x 8" W
|
<urn:uuid:dde8dc24-5413-4e32-a18b-91a77570813c>
|
CC-MAIN-2023-50
|
https://mommashomestore.com/products/exploring-the-world-of-eagles
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.891653 | 185 | 3.296875 | 3 |
Things had never looked so bleak for the American people as in the early 1930s. By 1932, unemployment had skyrocketed to more than 20 percent, and the despairing country was ready for a change in leadership. To that end, the people elected Franklin D. Roosevelt, who immediately set to work implementing programs aimed at alleviating the hurting economy. And we do mean immediately -- he called Congress into an emergency session to push through such programs during his first 100 days in office. Though not all of these initiatives worked out as well as he had hoped, one stands out as especially successful and popular: the Civilian Conservation Corps (CCC).
The CCC was a kind of pet project for FDR, who had already established his dedication to conservation projects when he was the governor of New York. As the CCC Legacy Web site explains, the program was a way of solving the problems of two "wasted resources": unemployed youths and the environment [source: CCC Legacy]. The idea was to put young men to work on special projects that pertained to land conservation.
Not only could needy families benefit from a son's steady paycheck, but the work itself could offer a facelift to communities while improving the local environment. What's more, the program was one solution to authorities' worries about the dangers of idle youths. Officials reasoned that if they kept young boys busy with work in the great outdoors, it would prevent these young men from slipping into an "underworld" life of crime [source: Barry]. It seems to have worked, as some officials credit the CCC with lowing the crime rate in communities [source: CCC Legacy].
Most consider the CCC a smashing success. In its nine years' existence, the CCC put nearly 3 million men to work. It also earned high approval ratings from the public on both sides of the political aisle. But, because such a program was unprecedented and needed to be put together so fast, it was no easy task.
|
<urn:uuid:405bf510-1211-4156-93c4-ef253022d9eb>
|
CC-MAIN-2023-50
|
https://money.howstuffworks.com/economics/volunteer/organizations/civilian-conservation-corp.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.980649 | 401 | 3.84375 | 4 |
Thyroid Cancer: External Radiation Therapy
What is external radiation therapy?
Radiation therapy involves high energy X-rays or particles that kill cancer cells or slow their growth. In external radiation therapy, the radiation is aimed at the cancer from a source outside the body.
External radiation is a local therapy. This means it affects the cancer cells only in treated areas. This type of radiation may be given alone, with chemotherapy, or with hormone therapy. It is sometimes used before surgery to shrink tumors. It may be used after surgery to kill cancer cells left behind. External radiation may also be used to treat cancers that can’t be removed with surgery.
When is external radiation therapy used to treat thyroid cancer?
External beam radiation therapy is not a common treatment for thyroid cancer.
It may be used to treat thyroid cancers that don’t take up iodine, such as anaplastic or medullary cancer. It is also helpful when radioactive iodine was tried, but the cancer cells didn’t absorb the iodine well.
It can be used to treat areas where the cancer has spread, such as the bones or the brain. It may be used to treat pain or other symptoms. This is called palliative radiation.
What to expect during external radiation therapy
Radiation treatment is a lot like getting an X-ray. The radiation comes from a large machine. The machine doesn't touch you during the treatment. The treatments don't hurt and they are quick.
This therapy is often given once a day, 5 days a week, for about 5 to 6 weeks. The actual treatment time you spend receiving the radiation is often just a few minutes. But it takes more time to get you into place and set up the procedure.
Before you start treatment, imaging scans will be done in the area of your cancer. This is a called a simulation scan. This is done to measure the exact location of the tumor so the beams of radiation can be focused there. Small marks may be put on your skin to mark the treatment area. This makes sure that the radiation reaches only the tumor, and not healthy parts of your body. On the day of treatment, you are carefully put into the right position. You may see lights from the machine lined up with the marks on your skin. These help the therapist know you are in the right position. The therapist will leave the room while the machine sends radiation to your tumor. During this time, they can see you, hear you, and talk to you. When the machine sends radiation to your tumor, you will need to be very still, but you don't have to hold your breath. The treatment itself is a lot like getting an X-ray and is very quick. The whole process will likely take less than an hour.
Side effects of external radiation therapy
Radiation therapy affects normal cells as well as cancer cells. Talk with your healthcare provider about what you might feel like during and after radiation therapy. Ask what short- and long-term side effects you can expect. Side effects often get worse as treatment goes on. But remember, many of these side effects can be treated. Common side effects of external radiation for thyroid cancer can include:
Severe tiredness (fatigue)
Loss of appetite
Low blood counts
Skin that feels and looks like it's sunburned (dry, red, and blistered) in the treated area
Most of these side effects will get better or go away over time after you finish treatment. Your healthcare provider will talk with you about how to manage these and other possible long-term side effects. This includes injury to the esophagus, which might need a feeding tube, which is usually temporary.
Working with your healthcare team
Ask your healthcare provider about what symptoms to watch out for and when you should call your healthcare team. For instance, your healthcare provider may want you to call if you have signs of infection, such as fever, or pain that gets worse. Make sure you know what number to call with questions. Is there a different number for evenings, holidays, and weekends?
It may be helpful to keep a diary of your side effects. Write down any physical, mental, and emotional changes. A written list will make it easier for you to remember your questions when you go to your appointments. It will also make it easier for you to work with your healthcare team to make a plan to manage your side effects.
|
<urn:uuid:6adcec67-8362-49b4-aa0a-1aeb32e64ed5>
|
CC-MAIN-2023-50
|
https://myhealth.ucsd.edu/RelatedItems/34,17676-1
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.958734 | 904 | 3.234375 | 3 |
What if we told you that your toilet roll tubes are so much more than just toilet roll tubes?
What if we told you that you could grow fresh vegetables in them?
Yes, stay with us. It might sound bizarre at first, but it actually makes total sense. Here’s how to grow leeks in toilet rolls.
Growing leeks inside toilet roll tubes is an entertaining and easy way to explore the art of gardening. Before you rush to your nearest garden centre and spend heaps of money on intricate bits and bobs, start by growing leeks in toilet rolls.
Plus, it’s never a bad idea to recycle an item in a fun and creative way. Why throw the toilet paper tube in the bin when there’s so much more enjoyment to be had?
Once this crafty project comes to an end, you’ll have delicious, fresh leeks ready to take your soup, stew, or casserole to a whole new level. And yes, all from an eco toilet roll tube!
What you’ll need
Before you get started, you’ll need the following materials and tools:
- Toilet roll tubes
- Leeks seeds
- Potting mix
- Watering can
- Garden fork
Toilet roll tubes are a great way to grow leeks as they provide the ideal amount of space for the roots to develop.
Because the toilet roll tube is not deep enough to support multiple plants, it’s recommended you only grow one leek per toilet roll. If you’re hoping to grow more than one, simply collect more toilet roll tubes.
Get the whole household involved!
Step one: Prepare the toilet roll
First things first: use the scissors to cut your toilet roll tubes in half lengthwise, creating two collars that will be placed around the base of the leeks.
Step two: Potting mix
Take the potting mix and fill your toilet roll tubes until they’re about half full.
Step three: Plant the seeds
Sow the leeks seeds in the potting mix, spacing them about one inch apart. You can find leeks seeds in any local garden centre or home store.
Step four: Water
Use your watering can to sprinkle some water across the leeks. Be gentle.
Step five: Place the collars around the leeks
Once the leeks have germinated and are about 2 inches tall, place the collars around the base of the plants. This will help to keep the stems white and tender.
Patience is a virtue here. Leeks typically take around one to two weeks to germinate and a further two to three weeks to reach 2 inches tall. Of course, the actual time will vary and is determined by the variety of leek, temperature, and soil conditions.
Step six: Place them in a sunny spot
Plants rely on sunlight to produce the nutrients they need to survive, and leeks are no different. Once yours have germinated, place the toilet roll tubes in a spot that’s rich in sunlight.
Step seven: Water regularly
In a similar way to sunlight, water is another essential nutrient for plants. As your leeks grow, ensure you water them regularly – especially during hot weather.
Step eight: Transplant in the garden
When your leeks reach roughly 6 inches tall, it’s time to rehome them. Find a lovely sunny spot in the garden and transplant your leeks with well-drained soil.
It’s at this point you can say goodbye to the trusty toilet paper tube. Thank it for all its hard work, and pop it to one side for the next arts and crafts activity!
Step nine: Look after them
Treat these leeks with the same care and consideration you’d give to your children. Maybe even more so.
Water the leeks regularly and fertilise them every few weeks. Oh, and don’t forget to sing to them, tell them how much you love them, and give them plenty of compliments. Trust us, they’re listening.
Step ten: Harvest them!
When your leeks are around 12 inches tall, they’re ready to harvest. Yay, all your hard work will finally pay off.
Use a garden fork to loosen the soil around the plants, gently lifting them out of the ground. Top tip: Be super careful here, as we don’t want to damage the roots.
From there, trim off the roots and the top leafy growth so that you’re left with the white part of the stem (the edible part).
Now go ahead and make the meanest, greenest, leanest soup or casserole dish there ever was! All from a toilet roll tube… who would have thought it?
Discover our environmentally friendly, quality toilet roll today.
|
<urn:uuid:67e36566-73fa-4a8c-80ae-0d1b5a6dba5b>
|
CC-MAIN-2023-50
|
https://myoceans.co.uk/blog/how-to-grow-leeks-in-toilet-rolls/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.890909 | 1,020 | 2.609375 | 3 |
You’ve probably heard a lot about kindergarten for fouryearolds. Why is early kindergarten beneficial? Who can enrol their child in this program?
Children generally start kindergarten at the age of five. However, in 2019, Quebec schools began phasing in full-day kindergarten classes for four-year-olds. How could early kindergarten benefit your child?
What are the benefits of kindergarten for four-year-olds?
Kindergarten for fouryearolds supports children’s overall development with the goal of preparing them for school. For example, children learn to socialize and develop their motor skills and self-esteem. They also begin to explore oral and written language.
Early kindergarten also promotes a love of learning, primarily through play. Children do a variety of activities in class, like singing nursery rhymes, reading as a group, playing games that require logical reasoning, etc.
Each activity is tailored to the needs and abilities of the students in the group.
Teachers meet children where they are and help them go further. For example, they might teach a child how to hold a pair of scissors for the first time. There are no report cards in early kindergarten, but written reports are given to parents to inform them of their child’s progress.
Daycare or early kindergarten?
High-quality daycares already offer a varied program of activities for young children that includes the Accueillir la petite enfance program. Kindergarten for four-year-olds is considered a complement to a high-quality daycare program. The curriculum aligns with and builds on what children learn in daycare. Both programs aim to support the overall development of young children.
Early kindergarten is part of the school system and helps children develop the mindset and habits they will need to succeed in school.
The program can be particularly beneficial for children who have never been to daycare. Teachers use educational approaches to help students develop to their full potential. They are trained to spot children who may be struggling in kindergarten and refer them to the right resources.
Who is it for?
Kindergarten is not mandatory. Parents get to decide whether they will enrol their child in early kindergarten. All children who are at least four years old by September 30 of the current school year are eligible.
To have access to the program, you must live in an area with a school that offers the program. If a school has too many registrations, a child who hasn’t had access to any educational services may be given priority.
If you live in an area with school offering early kindergarten, contact the school directly to enrol your child. Enrolment usually opens in February, at the same time as regular kindergarten. It’s best to enrol your child before schools close for the summer at the end of June.
To learn more about the new Preschool Cycle Program (kindergarten for four and fiveyearolds) that was introduced in September 2021, check out our fact sheet: What do kids learn in kindergarten.
Early childhood specialists who have done a comparative analysis of early childhood education services in daycares and kindergartens advise parents to ask themselves three questions before making their decision:
- Is my child happy in daycare? If your child is happy and doing well in their current environment, it may not be a good idea to put them through the stress of moving them to a new facility.
- Does my child feel stimulated? If your child is bored, it may be a sign that they’re ready to move on to something new.
- Are you ready to make the transition yourself? The transition from daycare to school can also be a source of anxiety for parents because of the changes and the mental and emotional burden that come along with it. It’s a good idea to assess whether you’re ready to take the plunge.
Parents should also remember that if they register their child for early kindergarten, they may need to plan and budget for childcare after school and during the summer months.
Source: “CPE ou maternelle 4 ans? Voici une analyse comparative.” The Conversation (in French).
Things to keep in mind
Kindergarten for fouryearolds supports children’s overall development and fosters a love of learning.
In early kindergarten, children learn and are engaged through play.
To enrol your child in this program, you must live in a neighbourhood with a school that offers it.
Scientific review: Stéphanie Desmarais, Assistant Director, Educational Resource Services, Marie-Victorin School Board
Research and copywriting: The Naître et grandir team
Updated: October 2021
Note: The links to other websites are not updated regularly, and some URLs may have changed since publication. If a link is no longer valid, please use search engines to find the relevant information.
The Conversation. “CPE ou maternelle 4 ans ? Voici une analyse comparative.” September 28, 2021. theconversation.com
Le Carrefour Pédagogique Montérégie. “Mon enfant commence la maternelle : comment l’accompagner?” carrefourmonteregie.ca
Ministère de la famille. Accueillir la petite enfance: programme éducatif pour les services de garde du Québec. 2019. mfa.gouv.qc.ca
Ministère de l’éducation. Preschool Cycle Program. www.education.gouv.qc.ca
Table régionale de l’éducation en Mauricie (TREM). Bonjour la maternelle!www.trem.ca
|
<urn:uuid:3d2a7de2-061d-4da9-91df-3d21816b1959>
|
CC-MAIN-2023-50
|
https://naitreetgrandir.com/en/step/3-5-years/daycare/kindergarten-four-year-olds/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.934036 | 1,202 | 3.21875 | 3 |
A hydatidiform mole is a benign gestational trophoblastic disease characterized by abnormal growth of the placenta, and the embryo develops into a mass of cysts.
In most cases, the mother does not realize she is pregnant until she experiences vaginal bleeding and passes the tissue out through her vagina.
If you are experiencing these symptoms, it is important to seek medical attention right away. This blog post will provide you with more information about hydatidiform moles, including causes, symptoms, and treatment options.
What is a hydatidiform mole?
Hydatidiform mole, also known as a molar pregnancy, is a benign gestational trophoblastic disease that can occur during pregnancy. It is characterized by abnormal growth of the placenta and can lead to problems with the pregnancy.
The hydatidiform mole may be benign (not cancerous) or malignant (cancerous). If you have a hydatidiform mole, it’s important to be monitored closely by your healthcare provider.
How common is a hydatidiform mole?
Hydatidiform moles are rare across Britain. One molar baby birth per 714 births. It is estimated that the United Kingdom has around 11,000 hydatidiform moles per year.
All females who have a sex history have a higher risk of developing molar pregnancy. Women from Asian backgrounds also have more molar pregnancy chances.
Types of hydatidiform mole
There are two types of molar pregnancy, complete molar pregnancy and partial (incomplete) molar pregnancy.
Complete molar pregnancy
Complete molar pregnancy is when the entire placenta is abnormal, and there is no formation of fetal tissue.
Partial molar pregnancy
It occurs when there is an abnormal placenta, and there may be a fetus present.
Partial and complete hydatidiform moles will not produce a live baby. They are ‘non-viable’ pregnancies.
What are the symptoms of a hydatidiform mole?
A molar pregnancy may appear to be a typical pregnancy at first, but it typically results in distinctive signs and symptoms:
- Vaginal bleeding during the first trimester
- Enlarged breasts
- Nausea and vomiting
- Increase in urinary frequency
- Expulsion of grape-like vesicles or cysts per vagina
- Pelvic pressure or pain
In some cases, there may be no symptoms. If you have a hydatidiform mole, it’s important to seek medical attention right away. Other signs include:
What causes hydatidiform mole?
The exact cause of hydatidiform mole is unknown. However, it’s thought to be related to abnormal development of the placenta.
What are the risk factors of a hydatidiform mole?
There are several risk factors associated with hydatidiform mole. These include:
- Advanced maternal age: A molar pregnancy is more probable in women who are older than 35 years old or younger than 20 years old.
- Having a family history of molar pregnancy
- Having certain genetic conditions, such as Down syndrome or Edwards syndrome
- History of previous molar pregnancy
What are the risks of a hydatidiform mole?
After a molar pregnancy has been removed, molar tissue may remain and continue to grow. This is called persistent gestational trophoblastic neoplasia (GTN). This occurs in about 15% to 20% of complete molar pregnancies and up to 5% of partial molar pregnancies.
Hydatidiform mole can also cause problems with the pregnancy, such as:
- Sepsis (infection)
- Preterm labor
- Heavy vaginal bleeding
- Hemorrhage and shock
- Invasive hydatidiform mole
If you have a hydatidiform mole, it’s important to be monitored closely by your healthcare provider. In some cases, the molar pregnancy may resolve on its own. However, in other cases, treatment may be necessary.
How is hydatidiform mole diagnosed?
Hydatidiform mole is typically diagnosed during a pelvic exam. Your health care provider will perform a pelvic exam, which may show signs similar to a normal pregnancy. They will look for abnormal growth of the placenta and an enlarged uterus.
If your doctor suspects a molar pregnancy, they will order blood tests, including one to measure the level of human chorionic gonadotropin (HCG), a pregnancy hormone in your blood.
Ultrasound may also be used to diagnose hydatidiform mole. This imaging test uses sound waves to create a picture of the inside of your body.
Prevention of hydatidiform mole
There is no known way to prevent hydatidiform mole. However, if you have a family history of molar pregnancy, you may be at increased risk. If you have a molar pregnancy, it’s important to be monitored closely by your healthcare provider.
Before getting pregnant again, speak with your doctor or a prenatal care provider if you’ve had a molar pregnancy. Your doctor may advise you to wait a certain amount of time (six months to one year) before trying to conceive again.
The chance of recurrence is minor but greater than that of women without a prior molar pregnancy history. Your care provider will do early ultrasounds during any subsequent pregnancies to monitor your condition and offer hope. Your provider may also discuss prenatal genetic testing, which can be used to diagnose a molar pregnancy.
Treatment for hydatidiform mole
Depending on the outcome of these tests, you will receive the most appropriate therapy. If you need treatment, you will be given further information. You are slightly more likely to need ongoing treatment if you had a complete hydatidiform mole. Treatment is usually chemotherapy given by injection into a muscle or through a drip.
Hydatidiform mole is typically treated with surgery. This may be done through a procedure called dilation and curettage (D&C). D&C involves dilating (opening) the cervix and removing the tissue from the uterus.
In some cases, a hysterectomy (surgical removal of the uterus) may be necessary. This is usually only done if there are complications, such as cancer or severe bleeding.
After treatment, it’s important to be monitored closely by your healthcare provider. You may need follow-up appointments and blood tests to check your HCG levels.
What follow-up is needed after a hydatidiform mole?
It’s also possible for a person with a hydatidiform mole to be infected with cancerous cancer. This could cause an increase in cancer cells in the lung, liver, and brain. So it should be closely monitored when hydatidiform moles are discovered.
When the first diagnosis with hydatidiform moles is made, your HCG levels increase. When hydatidiform moles have been treated (removal), they should usually return to normal hCG levels.
A repeat molar pregnancy happens, on average, in 1 out of every 100 women.
If you have a molar pregnancy, it’s important to be aware of the signs and symptoms. This condition can be treated, but it’s important to catch it early. If you have any concerns, be sure to speak with your healthcare provider.
|
<urn:uuid:8a8d9fc6-d0f2-4e62-b964-1088d9f82271>
|
CC-MAIN-2023-50
|
https://neeluprajapat.com/2022/05/16/hydatidiform-mole-what-you-need-to-know/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.930839 | 1,558 | 3.15625 | 3 |
Swine day, 1991; Kansas Agricultural Experiment Station contribution; no. 92-193-S; Report of progress (Kansas State University. Agricultural Experiment Station and Cooperative Extension Service); 641; Swine; Disease; Diagnosis; Diarrhea; Pneumonia
Causes of pre- and postweaning diarrhea, pneumonia, and bacterial septicemia in pigs were summarized for fiscal year 1991 (July, 1990 to June, 1991) for submissions to the Kansas State University Veterinary Diagnostic Laboratory. Escherichia coli was the most common cause of both pre- and postweaning diarrhea in pigs (33.5% and 25.0%, respectively, of submissions for diarrhea). Other commonly diagnosed causes included transmissible gastroenteritis (24.4%) and coccidiosis (16.5%) for preweaning diarrhea, and proliferative enteritis (19.2 %) and salmonellosis (13.2 %) for postweaning diarrhea. The most commonly diagnosed causes of pneumonia in nursing, growing, and finishing pigs were Pasteurella multocida, Mycoplasma, and Actinobacillus (Haemophilus) pleuropneumoniae. Streptococcus and Salmonella were common causes of bacterial septicemia in Kansas pigs.; Swine Day, Manhattan, KS, November 21, 1991
Frank, R K. and Vorhies, M W.
"Causes of diarrhea, pneumonia, and septicemia in swine for 1991 submissions to the KSU Veterinary Diagnostic Laboratory,"
Kansas Agricultural Experiment Station Research Reports:
|
<urn:uuid:ad25e7c3-3d95-43a7-9e39-de17912ca7db>
|
CC-MAIN-2023-50
|
https://newprairiepress.org/kaesrr/vol0/iss10/469/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.867162 | 328 | 2.796875 | 3 |
Mucosal antibodies in the airways provide durable protection against SARS-CoV-2
High levels of mucosal IgA antibodies in the airways protect against SARS-CoV-2 infection for at least eight months. Omicron infection generates durable mucosal antibodies, reducing the risk of re-infection. These are the findings of a study published in The Lancet Infectious Diseases by researchers at Karolinska Institutet and Danderyd Hospital in Sweden. The results raise further hope for the feasibility of future nasal vaccine platforms to protect against infection.
The COMMUNITY study enrolled 2,149 healthcare workers in the spring of 2020 at Danderyd Hospital, Sweden. Study participants and their immune responses against SARS-CoV-2 have since then been followed through regular samplings from blood and airways along with PCR screenings. A sub-study during January and February 2022 screening 338 triple-vaccinated healthcare workers for SARS-CoV-2 infection found that participants with high (upper quartile) mucosal IgA antibodies in the airways had half the risk of being infected with Omicron compared to those with no or low levels of antibodies in the airways. The researchers have now continued to follow these participants and find the protection to be durable over at least eight months.
90 percent lower risk of re-infection
Participants who were infected with Omicron had a more than 40-fold increase in mucosal IgA antibodies, even if the infection was mild. The current follow-up study now reveals a good durability of these antibodies, and a majority of participants still have protective levels seven months after the infection. Those who were infected with the Omicron variants BA.1 or BA.2 had a 90 percent lower risk of being re-infected with the Omicron variant BA.5.
“Antibodies in the blood protect from severe disease, but if we aim to limit infection, viral transmission and the emergence of new SARS-CoV-2 variants, we need to reinforce our immunity at the mucosal surface, which is the viral point of entry”, says Charlotte Thålin, M.D. and associate professor at the Department of Clinical Sciences, Danderyd Hospital, Karolinska Institutet who led the study. “This is not achieved by currently employed intramuscularly-delivered vaccines. But the hope is that a nasal vaccine may generate mucosal immune responses similar to those seen after infection, and thereby block the transmission chain”.
The researchers have also investigated the impact of repeated infections and found that participants with a prior SARS-CoV-2 infection generated a stronger mucosal immune response to Omicron breakthrough infection.
Development of nasal vaccines
“The results show us that it is possible to recall protective and durable mucosal IgA antibody responses in the airways, and that these responses increase with the number of infections. Although these findings are not surprising, they are important for the development of nasal vaccines”, says Ulrika Marking, M.D., PhD student at Karolinska Institutet and first author of the paper.
The COMMUNITY study continues with regular samplings from blood and mucosa, monitoring immune responses after repeated SARS-CoV-2 infections and vaccinations. The study is being conducted in close collaboration between Danderyd Hospital, Karolinska Institutet, Uppsala University, the Public Health Agency of Sweden, KTH Royal Institute of Technology, and SciLifeLab.
The research has been funded by the Jonas and Christina af Jochnick Foundation, the Public Health Agency of Sweden, Region Stockholm, the Knut and Alice Wallenberg Foundation, Leif Lundblad and family, the Swedish Research Council, the Swedish Heart-Lung Foundation, the Bill and Melinda Gates Foundation, Karolinska Institutet and SciLifeLab.
“7-month duration of SARS-CoV-2 mucosal immunoglobulin-A responses and protection”. Ulrika Marking, Oscar Bladh, Sebastian Havervall, Julia Svensson, Nina Greilert-Norin, Katherina Aguilera, Martha Kihlgren, Ann-Cristin Salomonsson, Maja Månsson, Radiosa Gallini, Cecilia Kriegholm, Philip Bacchus, Sophia Hober, Max Gordon, Kim Blom, Anna Smed-Sörensen, Mikael Åberg, Jonas Klingström, Charlotte Thålin. The Lancet Infectious Diseases, correspondence, online January 11, 2023, doi: 10.1016/S1473-3099(22)00834-9.
|
<urn:uuid:a6fad32c-81f0-4245-a3fb-4fd45d6118d3>
|
CC-MAIN-2023-50
|
https://news.ki.se/mucosal-antibodies-in-the-airways-provide-durable-protection-against-sars-cov-2
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.90775 | 989 | 2.84375 | 3 |
By creating a small electrical field that removes salts from seawater, chemists at The University of Texas at Austin and the University of Marburg in Germany have introduced a new method for the desalination of seawater that consumes less energy and is dramatically simpler than conventional techniques. The new method requires so little energy that it can run on a store-bought battery.
The process evades the problems confronting current desalination methods by eliminating the need for a membrane and by separating salt from water at a microscale.
The technique, called electrochemically mediated seawater desalination, was described last week in the journal Angewandte Chemie. The research team was led by Richard Crooks of The University of Texas at Austin and Ulrich Tallarek of the University of Marburg. It’s patent-pending and is in commercial development by startup company Okeanos Technologies.
“The availability of water for drinking and crop irrigation is one of the most basic requirements for maintaining and improving human health,” said Crooks, the Robert A. Welch Chair in Chemistry in the College of Natural Sciences. “Seawater desalination is one way to address this need, but most current methods for desalinating water rely on expensive and easily contaminated membranes. The membrane-free method we’ve developed still needs to be refined and scaled up, but if we can succeed at that, then one day it might be possible to provide fresh water on a massive scale using a simple, even portable, system.”
This new method holds particular promise for the water-stressed areas in which about a third of the planet’s inhabitants live. Many of these regions have access to abundant seawater but not to the energy infrastructure or money necessary to desalt water using conventional technology. As a result, millions of deaths per year in these regions are attributed to water-related causes.
“People are dying because of a lack of freshwater,” said Tony Frudakis, founder and CEO of Okeanos Technologies. “And they’ll continue to do so until there is some kind of breakthrough, and that is what we are hoping our technology will represent.”
To achieve desalination, the researchers apply a small voltage (3.0 volts) to a plastic chip filled with seawater. The chip contains a microchannel with two branches. At the junction of the channel an embedded electrode neutralizes some of the chloride ions in seawater to create an “ion depletion zone” that increases the local electric field compared with the rest of the channel. This change in the electric field is sufficient to redirect salts into one branch, allowing desalinated water to pass through the other branch.
“The neutralization reaction occurring at the electrode is key to removing the salts in seawater,” said Kyle Knust, a graduate student in Crooks’ lab and first author on the paper.
Like a troll at the foot of the bridge, the ion depletion zone prevents salt from passing through, resulting in the production of freshwater.
Thus far Crooks and his colleagues have achieved 25 percent desalination. Although drinking water requires 99 percent desalination, they are confident that goal can be achieved.
“This was a proof of principle,” said Knust. “We’ve made comparable performance improvements while developing other applications based on the formation of an ion depletion zone. That suggests that 99 percent desalination is not beyond our reach.”
The other major challenge is to scale up the process. Right now the microchannels, about the size of a human hair, produce about 40 nanoliters of desalted water per minute. To make this technique practical for individual or communal use, a device would have to produce liters of water per day. The authors are confident that this can be achieved as well.
If these engineering challenges are surmounted, they foresee a future in which the technology is deployed at different scales to meet different needs.
“You could build a disaster relief array or a municipal-scale unit,” said Frudakis. “Okeanos has even contemplated building a small system that would look like a Coke machine and would operate in a standalone fashion to produce enough water for a small village.”
|
<urn:uuid:ac2f238d-2612-420a-b371-07286faaf402>
|
CC-MAIN-2023-50
|
https://news.utexas.edu/2016/02/10/turning-seawater-into-drinking-water/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.935599 | 890 | 3.671875 | 4 |
1948: Israel declares independence
- British mandate for Palestine ends.
- Israel declares to be a sovereign independent state.
- Israel – Arab war – 1948/49.
- Arab countries ally with the Palestinian State.
- Israel emerges winner | controls large territory of the area.
- Thousands of Palestinians were forced to flee.
1956 & The Suez Canal Crisis
- Suez Canal – vital trade route | operational since 1869.
- 193 Kms long – connects the Mediterranean and Red Sea.
- Shortest shipping route from Europe to Asia.
- Israel-Egypt war post Egypt nationalizes the canal.
- Forces of Israel, Britain and France invade Egypt.
- Ends with Peace Deal signed | backed by USSR and USA.
1967: The Six-Day War
- The outcome: Israel’s control of the area grows.
- Gaza Strip, Sinai, the West Bank, the Golan Heights, and East Jerusalem.
- War began – with Egypt’s continued blockade of shipping into the Gulf of Aqaba.
- Israel invaded Egypt – June 1967 | completely overpower the Egypt-Jordan forces.
- Thousands of Palestinians are again displaced.
1973: When Arabs attack Israel
- Surprise attack by Arab nations in Oct 1973.
- Isael, with help from the US and other allies, pushes it back finally.
1987: First Intifada
- Palestinian uprising (Intifada) begins| continued till 1993.
- Main areas – West Bank, Gaza, and Israel.
- Fatalities on both sides – Israel and Palestine.
2000: Second Intifada
- Continued till 2005 | hundreds of dead on both sides.
- Ariel Sharon’s visit to Jerusalem results in riots | followed by second Intifada.
2006: Militant group Hamas comes to the center-stage of the conflict
- Hamas emerges winner in 2006 Gaza elections.
2008: Israel hits back after Hamas attack
- Dec – Rocket attacks on Isael by Hamas militants.
- Israel’s counter-offensive for 3 weeks.
- Fatalities| 13 Israeli soldiers | 1100+ Palestinians.
2012: Israel’ big win
- Nov – kills Hamas’ military chief Ahmed Jabari.
- Fatalities | 6 Israeli soldiers | 150+ Palestinians.
2014: the year of big fatality numbers
- 7-week conflict.
- Israel – 6 civilians + 67 soldiers | 2200+ Palestinians in Gaza.
- Hamas kidnaps and kills 3 Israeli teenagers |in response Israel attacks Gaza.
|
<urn:uuid:014f4123-5731-4aba-b6e8-dd00201f6a16>
|
CC-MAIN-2023-50
|
https://nine145.com/2023/10/08/israel-vs-palestine-arab-conflict/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.792787 | 533 | 3.359375 | 3 |
In recent years, blooms of jellyfish, such as these moon jellies (Aurita aurita) in the Chesapeake Bay, have become more common around the world for a number of different reasons. One result of these blooms is that there is less food for fish and more for bacteria. This is because the large numbers of jellyfish eat zooplankton—potential fish food—but most fish don't eat jellyfish. Instead, the jellyfish release this extra energy back into the water, where it feeds bacteria. This energy, in the form of dissolved organic matter, is essentially lost, disrupting local food chains and cutting off a food source for larger, more productive animals.
|
<urn:uuid:fa479c6e-c41b-4b2e-a774-49da8140689d>
|
CC-MAIN-2023-50
|
https://ocean.si.edu/ocean-life/invertebrates/bloom-moon-jellies
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.945239 | 144 | 3.265625 | 3 |
Welcome Introduction Assignment Using Padlet
Amber Norwood, an Instructor from CSU Northridge, uses uses Padlet as a way for students to get to know each other the first week of the course. In this activity students create a post, with an optional picture, and share a little about themselves. This includes their pronouns, what they like to be called, as well as future goals.
QLT Objectives Met
QLT Section 4: Student Interaction and Community
- Objective: 4.1 At the beginning of the course, instructor provides an opportunity to have students self- introduce themselves to develop a sense of community.
- Material Type: Social Networking Tool
- Author: Amber Norwood , Instructor
- Institution: California State University, Northridge
- Date Created: 2021-01-11
- Course Format: Online
QM Standard Equivalents
- QM General Standard 1: Course Overview and Introduction
- Standard: 1.9 Learners have the opportunity to introduce themselves.
|
<urn:uuid:09d96a90-d41f-46a3-8d1d-b7923e7a954a>
|
CC-MAIN-2023-50
|
https://ocs.calstate.edu/quarry/exemplar/96?rubric=qlt&sort=2&page=1&pageSize=5&q=&mt=201&inst=223&obs=238&obss=265
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.878431 | 208 | 2.5625 | 3 |
Medicinal cannabis is routinely recommended for a wide variety of conditions. For example, in California, patients can qualify for cannabis medicine if they have AIDS, anorexia, arthritis, cachexia, cancer, chronic pain, glaucoma, migraines, muscle spasms, seizures, nausea, or other chronic symptoms. This begs the question – how can cannabis be recommended for so many different conditions? The answer is the endocannabinoid system.
What is the Endocannabinoid System (ECS)?
Before discussing the functions of the endocannabinoid system (ECS), it is important to understand its components. The ECS is comprised of cannabinoid receptors, endogenous ligands (binding molecules) for those receptors, and enzymes that synthesize and degrade the ligands.
The most well known cannabinoid receptors are CB1 and CB2. Studies in the early 1990s provided initial evidence of the existence and purpose of CB1 and CB2 receptors. Both types of cannabinoid receptors are found throughout the entire body, but are distributed differently. CB1 receptors are concentrated primarily in the brain, while CB2 receptors are mainly found in the immune system. However, CB1 receptors are also distributed in a variety of peripheral areas like adipose (fat) tissue, and CB2 receptors are expressed to some degree in the brain.
The primary endocannabinoids are anandamide and 2-arachidonoyl glycerol (2-AG). Anandamide was discovered in 1992 and determined to be the endogenous ligand for the CB1 receptor. Its chemical structure is very similar to tetrahydrocannabinol. 2-AG was discovered in 1995, and unlike anandamide has a high affinity for activating both CB1 and CB2 receptors.
Anandamide and 2-AG are synthesized from arachidonic acid, an Omega-6 fatty acid, although the specific pathways and synthesizing enzymes vary. Anandamide is degraded by fatty acid amide hydrolase (FAAH), and 2-AG by monoacylglyceride lipase. Both endocannabinoids are manufactured “on demand” [as needed], using precursor molecules from cell membranes.
The Primary Function of the Endocannabinoid System
The overall role of the ECS is described best by Dr. Dustin Sulak, the Director of Integr8 Health in Maine. His firm has treated thousands of patients with medicinal cannabis, and Dr. Sulak is one of the most sought-after speakers for medicinal cannabis conferences.
As Dr. Sulak discussed in an endocannabinoid introductory article, the primary function of endocannabinoid activity is to maintain a stable internal environment despite changes in the external environment. This stability is known as homeostasis, which endocannabinoids promote at the most basic levels. These endocannabinoids regulate homeostasis through a wide variety of mechanisms, including facilitation of intercellular communication between different cell types.
“At the site of an injury, for example, cannabinoids can be found decreasing the release of activators and sensitizers from the injured tissue, stabilizing the nerve cell to prevent excessive firing, and calming nearby immune cells to prevent release of pro-inflammatory substances. Three different mechanisms of action on three different cell types for a single purpose: minimize the pain and damage caused by the injury,” said Dr. Sulak.
When cells communicate, neurotransmitters normally flow from presynaptic neurons to postsynaptic neurons. Endocannabinoids are unique, being able to travel in the opposite direction and deliver feedback to the presynaptic cell. This process is a fundamental mechanism by which endocannabinoids maintain homeostasis. For example, if a neuron is firing messages too quickly, then endocannabinoids (usually 2-AG) instruct it to slow down by traveling upstream and activating presynaptic CB1 receptors.
The Endocannabinoid System in Disease Pathology
Dr. Robert Melamede, the former Chairman of the Biology Department at University of Colorado, dedicated his career to cannabinoid research. He has described endocannabinoid as “multi-scaled, global homeostatic regulators of cells and society.”
Evidence suggests the earliest components of the ECS evolved 600 million years ago in sea squirts. Furthermore, diseases often emerge when there is a deficiency or dysfunction of the ECS. These facts alone demonstrate the importance of proper ECS function to the healthy existence of higher-level organisms.
This originally appeared at: https://www.medicaljane.com/2015/02/28/a-brief-overview-of-the-endocannabinoid-system/
|
<urn:uuid:a79fae4d-03f8-4bbd-a5c1-57b72f513317>
|
CC-MAIN-2023-50
|
https://opensourcetemple.com/the-endocannabinoid-system-helps-maintain-homeostasis/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.921214 | 964 | 2.890625 | 3 |
16.1 Organizational Structures and Design
- What are mechanistic versus organic organizational structures?
The organizational structure is designed from both the mechanistic and the organic points of view, and the structure depends upon the extent to which it is rigid or flexible. Flexible structures are also viewed as more humanistic than mechanistic structures. The mechanistic organizational structure is similar to Max Weber’s bureaucratic organization. Organic structures are more flexible in order to cope with rapidly changing environments. These structures are more effective if the environment is dynamic, requiring frequent changes within the organization in order to adjust to change. It is also considered to be a better form of organization when employees seek autonomy, openness, change, support for creativity and innovation, and opportunities to try new approaches.
All organizations need structures to accomplish their work, and they need an ability to change in order to sustain and renew themselves over time
16.2 Organizational Change
- What are the fundamental dimensions of change?
It is often said that the only constant is change. Managers need to have the ability to understand the dimensions of change, know what drives change, and know how to implement changes to meet and exceed organizational goals. The three types of change are structural, technological, and culture changes. Managers need to understand change as organizations evolve and grow over time.
One of the key responsibilities of management is to design organizational structures that will allow an organization to accomplish its primary objectives. The structure should always match the need for coordination. Often, managers cannot tell what form the organization should take until they experience the informal organization that determines how work is actually accomplished. Only then can they understand how to draw on the concepts of bureaucracy to appropriately design a structure that will maximize the likelihood of organizational success.
16.3 Managing Change
- How do managers deal with change?
As an organization grows and matures, change becomes necessary to its sustained viability. Thus, another key responsibility for most leaders is the task of designing and managing change. We have reviewed several questions that should be considered when designing a change process, and we have explored several approaches that may be used to guide the development of organizational change.
The field of knowledge about how to change and develop organizations is vast and can be somewhat confusing to the novice learner. The material presented in this chapter provides an overview of key ideas, but there is so much more to learn. Should you wish to become an influential leader of change, it is important to learn more about this very important field of research and practice.
|
<urn:uuid:3d13d4da-db5f-40b7-abd6-4e8f2675b3aa>
|
CC-MAIN-2023-50
|
https://openstax.org/books/organizational-behavior/pages/16-summary-of-learning-outcomes
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.958098 | 512 | 3.25 | 3 |
Helping Save The Tiger
Posted on 30 Aug 2023
"You may, if you like, free a tiger from his bars; but do not free him from his stripes." - Gilbert K. Chesterton
The Wild Tiger is one of the world’s most enigmatic, evocative and unfortunately, most endangered of the world’s species. The effects of global warming and changing ecosystems have made survival increasingly difficult for this beautiful animal. Tigers have been in existence for about two million years, however in just the last 150 years, their population has dwindled by nearly 95%, with an estimated 3,900 tigers left in the wild today. An interesting thought is that there are more tigers kept in captivity in the USA, than there are in the wild globally.
Although poaching has posed a significant threat to the number of tigers in the wild, the largest threat has come from climate change, and the destruction of the natural environment where tigers have survived for centuries.
The Bandhavgarh region of India has seen increased levels of drought in recent years. Normally, the seasonal monsoons that occurred during the hottest months would naturally suppress any wildfires. However, with erratic rainfall and unseasonably high temperatures, forest fires have been more prevalent, and increasingly challenging for the local authorities to effectively manage. The forest fires that engulfed the region in 2021 devastated between a third and half of pristine tiger habitat, with over 35000 other animals also being affected.
This has jeopardized the natural regeneration of the forest as small animals like birds, insects, and reptiles play a huge role in maintaining the forest through seed dispersal and pollination. In addition to the increasing number of forest fires, the lack of water has reduced vegetation, and the natural shade that protects the wild tigers during the hottest periods of the year.
The Siberian tiger is the biggest and most powerful species of the Felidae family. On average, it is four to eight cm taller than a Bengal tiger and has longer and thicker fur, helping it survive in some of the harshest and coldest of environments.
Rising temperatures have triggered the melting of glaciers and the shrinking of ice-covered territories. In Siberia, tigers must travel greater distances to find food, further depleting their already dwindling energy reserves. In the 1990s, the severity of the situation was so great that the Siberian tiger nearly faced extinction, and had been categorized as a Critically Endangered animal. Thankfully, through the efforts of wildlife conservation in Russia, organizations such as WCS (Wildlife Conservation Society) and Russia’s Siberian Tiger Project have significantly increased the numbers. Although still endangered, the increase in numbers is encouraging, giving hope for the future of tigers in the area.
The Human Factor
Although there are a number of effective conservation organizations, the effect of human intervention can still be seen as a threat to this, and indeed other endangered species.
As natural habitats shrink, tigers are forced to hunt closer to human settlements, increasing the likelihood of human-wildlife conflicts. Through their survival instinct, tigers may encroach on farmlands or even hunt livestock, leading to retaliatory killings by frustrated villagers. Invasive species also pose a threat to wild tiger populations close to human settlements, for example wild dogs might hunt tiger cubs.
Rising Sea Levels
Climate change has led to the melting of ice caps, causing sea levels to rise and threatening low-lying coastal areas. Sundarbans, an area that lies between India and Bangladesh is home to the famous Bengal Tiger. This important area provides a vital habitat, but also faces a growing impact of flooding. The mangrove forests, an essential refuge for tigers, are experiencing the threat of encroaching waters, making the survival of wild tigers increasingly difficult.
How OpenWeather can, and is helping
OpenWeather is working with the WWF to adopt a tiger, and help support their work in restoring the habitats and ecosystems that wild tigers rely upon, as well as working with governments in building a sustainable future for both humans and animals.
The wide range of OpenWeather products can also be used by conservation organizations, governments and individuals to help prevent the loss of natural habitats.
For example, our Fire Weather Index product is designed to help users estimate current and forecast forest fire danger, and reduce the risk of the incredibly damaging effect of this increasingly common phenomenon. This gives a rating for the potential frontal fire intensity by combining the rate of fire spread, the amount of fuel being consumed and the prevailing weather and ground conditions.
As the loss of the natural habitat of the wild tiger is closely related to climate change, organizations, such as the WWF, focus much of their efforts on energy conservation and sustainability. Solar energy is becoming increasingly important for a wide range of uses due to its flexibility, ease of installation and simplicity. Our Solar Irradiance & Energy Prediction service helps solar energy users predict the energy generated by a particular solar panel before installation, or check for potential issues with the existing panels. This understanding of the potential energy generation levels for a proposed site can help with planning and financing of the installation.
The future of the wild tiger is becoming brighter, the sustained efforts of wildlife preservation societies, and greater understanding of their varied habitats is helping safeguard this wonderful force of nature.
OpenWeather provides weather data for any location on the globe using a proprietary hyperlocal forecasting model with a resolution from 500 m to 2 km, globally. More than 5,000,000 customers from logistics, agriculture, insurance, energy, retail, and many other sectors, are working with the company's weather products.
OpenWeather cooperates with global meteorological agencies such as MetOffice and NOAA, and enhances its model with data from radars, weather stations and satellites. The company provides great availability of service at 99.9% for enterprise-level products.
The products can be easily integrated into complex IT systems and are ideal for ML analytic systems. OpenWeather is a member of Royal Meteorological Society and an Achilles-certified supplier. OpenWeather ethical initiatives include support of educators and students, not-for-profit subscriptions for the general public to increase weather awareness, and recent Ukrainian donation programme, and donations to COVID researchers.
For more information on how to gain access to our OpenWeather products, please email us.
|
<urn:uuid:f066103d-76ea-4b11-baac-78faf921c02f>
|
CC-MAIN-2023-50
|
https://openweather.co.uk/blog/post/helping-save-tiger
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.944363 | 1,275 | 3.5625 | 4 |
We wait for summer all year long. Races, swimming, frisbee in the park, and that perfect day at the beach. It really is the best time of year.With all our activities are in full swing, we try to see how much we can fit in these short Spokane summers.
This past month in Washington State, record high temperatures have been the norm. Last month, Spokane hit 105 degrees, breaking the record temperature for the hottest day in the month of June. With extreme temperatures becoming more and more common, it’s easy to see why heat-related illness is on the rise. Heat-related injuries occur when people don’t respect the temperatures and push their bodies too hard in the heat. Common heat-related injuries are heat exhaustion and heatstroke. Heat exhaustion happens when your body temperature reaches a maximum level and begins to shut down. Symptoms of heat exhaustion include; dizziness, fainting, agitation, nausea, headache, slowed or weakened heartbeats, intense thirst and muscle cramps. If heat exhaustion is left untreated, heatstroke can develop. Heatstroke is when the body’s cooling system stops working. It can come on suddenly, without any of the symptoms of heat exhaustion, and can result in loss of consciousness and even death. On average 675 people die each year from complications resulting from heat-related illness.
Although no one is immune to the effects of extreme heat, there are some who are more vulnerable than others. The elderly, infants and small children, and those with chronic medical conditions worsened by the heat are those who are most at risk. Although the risks are very real, no one wants to hide out indoors during the most active time of year, so here are a few pointers on keeping your cool all summer long.
Staying hydrated is first on the list because it’s the most important. Your body needs water to survive – over half of our body weight is from water! When temperatures get hot, more water is required in order to keep your body at optimum temperature. Sweating is the body’s first defense against the heat, which can quickly lead to dehydration if you are not replenishing fluids. Symptoms of dehydration include:
- Little or no urine, or urine that is darker than usual
- Dry mouth
- Sleepiness or fatigue
- Extreme thirst
- Dizziness or lightheaded feeling
If you feel any of these symptoms, especially on a hot day, drink water immediately. You may have heard the daily recommended amount of water is 6-8, 8-ounce glasses of water a day, which is a great amount to strive for. The truth is, different people require different amounts of water, depending on fitness levels and activities. The best way to monitor if you’re getting enough water is to watch the color of your urine. If your urine is colorless or light yellow, you are getting an adequate amount of water. If it’s darker, it’s time to drink more. Try carrying water with you wherever you go, or if you are doing something more strenuous, drink an electrolyte-based drink such as Gatorade or Powerade. Electrolytes, which contain potassium and sodium, are essential in regulating hydration levels because they help retain fluid in your body longer.
There’s a reason heavy foods don’t sound as appealing on a hot day. Foods with a lot of fat and calories tend to heat up our bodies and make us feel sluggish afterward. Instead of ordering that hamburger and fries, try eating a salad instead. Foods that are easily digestible, like fruits and vegetables, will keep you going in the heat without making you hot and drowsy.
After all, this is what summer is all about right? Swimming is the perfect remedy for a hot day and will keep your entire body cool. Nothing beats a clean, cold lake on a near-triple-digits kind of day. Better yet, it’s a great way to exercise in the heat. Unlike running outdoors, you can maintain intensity without overheating in the summer sun. Just remember to wear plenty of sunscreen! If you don’t have a lake or local pool nearby, remember that your shower can be used as an emergency cool-down device. A cold shower on a hot afternoon could be just the trick to resetting your body temperature.
Dress for the weather
As the mercury climbs, the clothes you wear should be lighter and loose fitting. Darker colors absorb heat, potentially turning your shirt into a hotbox. Loose fitting clothes give your body the opportunity to sweat in the heat, whereas tighter fitting clothes constrict your body’s first defense against the heat, causing your body temperature to rise.
Chill out during the day
In the summer, 11 a.m. to 4 p.m. is the hottest part of the day. Instead of training for your next 5k at noon, wake up early and do it. Four a.m. to 7 a.m. is the coolest part of the day and much easier on your body for physical activity.
Lose the shoes
Our ankles are like thermostats. If blood flow around them is hot, it will circulate that heat all throughout your body. Whenever possible, lose the shoes and you’ll notice your body will get instantly cooler. Even better, try dipping your feet in cold water for quick cool down.
Now lose the booze
Cheers to summer! But as nice as it might sound to kick back with an ice-cold beer on your porch in the middle of the day, alcohol is the last thing your body needs to beat the heat. Even though alcohol can be a cold liquid, it dehydrates the body once it’s processed, stealing from your water reserves. But if you must partake, replace fluid levels immediately. The general guideline is matching beer and water ounce for ounce, or one beer on the porch equals one glass of water once you’re back in the house. And try to keep it under a few. Alcohol not only dehydrates but also depletes potassium levels which are used to regulate fluid absorption.
The other enemies of hydration in the summertime are caffeine, sugar and salt. Caffeine is a diuretic, meaning it will cause your body to pass more urine, leading to dehydration. Sugar and salt have a similar effect when it comes to fluid levels They absorb water inside of your body, making it unusable to regulate heat. Although small amounts of salt can be good for retaining water or treating heat exhaustion, consuming too much it a fast track to dehydration.
Cool down the house
Obviously air conditioning keeps houses colder and can be a tremendous refuge from the summer heat, but if that’s not an option for you, there are a few tricks you can use keep your living space as cool as possible. Whenever the temperature gets below 77 degrees outside, open up all the windows and let the outside air in. The optimal time for this is at night after the air is cool and in the morning before the sun starts to intensify. Close down everything before mid-morning and make sure the curtains are drawn as well. This will keep as much cool air in as possible to help those hot afternoons stay more bearable. Even if you’re lucky enough to have air conditioning, you can still use this technique to save energy.
This may sound kind of basic, but if your body’s primary heat defense is sweating, why not save some sweat and use a spray bottle instead? Simply spray water on your face, wrists and ankles whenever you feel overheated in order to prevent your body from sweating. This is great way to keep your hydration in check and to feel refreshed.
By simply being aware of the effects rising temperatures have on our physical performance, we can make sure to avoid heat-related injuries. Most cases of heat exhaustion and heatstroke come from being unprepared. Before leaving on a long hike, make sure you have plenty of water. Before going outside for that run, ask yourself what time of day it is and if you can manage the heat. Your good sense won’t steer you wrong when it comes to avoiding heat-related injuries. Stay in the shade, sit by the fan, and chill out! But let’s be sure to not just survive the summer, let’s live it and enjoy it. After all, it’s only here for a short time.
|
<urn:uuid:7d6bdbc7-ec69-4c4c-ba86-533fee3e01b2>
|
CC-MAIN-2023-50
|
https://orthospecialtyclinic.com/2015/07/27/surviving-the-heat/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.940427 | 1,752 | 2.828125 | 3 |
While browsing the internet, you’ve probably seen that some websites are marked as “not secure”. And if you took a closer look, you might have noticed that the URLs for those sites begin with http://, while others begin with https://.
What’s the difference between HTTP and HTTPS, and why should you care? Let’s take a look at the difference between both protocols and why HTTPS is a better option for most use cases.
Before we dive into the nuances of HTTP vs. HTTPS, let’s first get a general understanding of what these protocols are and how they work.
HTTP stands for Hypertext Transfer Protocol and is the standard application layer network protocol used for communication and data transfer between browsers and web servers on the internet. An HTTP request is generated by user interactions on a web browser and sent to a web server, which generates an HTTP response and sends it back to the user.
You might ask is HTTP encrypted? Well, HTTP requests and responses are sent over the internet in plain text format. As a result, anyone monitoring the connection can easily read the encrypted data in those messages. So, is HTTP secure? It’s safer to say no. Thus, HTTP protocol is not ideal for use cases where users must send sensitive data such as passwords or bank details over the internet.
So what does HTTPS mean? And is HTTPS secure? HTTPS stands for Hypertext Transfer Protocol Secure and is an extension of HTTP protocol that uses the Transport Layer Security (or Secure Sockets Layer) protocol to establish an encrypted connection between a server and a web browser. As a result, HTTPS protocol is sometimes referred to as HTTP over TLS or HTTP over SSL protocol. Basically, it is a secure version of HTTP.
When HTTPS is used, the HTTP requests and responses are encrypted, making it impossible for an attacker or eavesdropper to access any sensitive information contained within them.
HTTPS is an extension of HTTP with encryption. The key distinction between these two protocols is that HTTPS operates over TLS (SSL) to encrypt standard HTTP requests and responses. Therefore, HTTPS is way more secure than HTTP. Websites that use HTTP start with http:// in their URLs, and websites that use HTTPS start with https:// in their URLs.
The main difference between HTTP and HTTPS may be summarized as follows:
Encryption and authentication
HTTP traffic is not encrypted and susceptible to eavesdropping and man-in-the-middle attacks. HTTPS, on the other hand, uses the TLS (or SSL) security protocol to create a secure connection and only transmits encrypted data over the network. This method of encrypting data involves using a public key and a private key to generate a short-term session key that is then used to encrypt the data transfer between the client and the server.
In public-key encryption, the owner of a private key can encrypt data which anyone can then decrypt with the public key. Also, anyone with the public key can verify that any data received from the private key owner is from an authentic source.
In HTTPS, the public key is stored in a website’s TLS/SSL certificate. These certificates are issued and signed with a private key by a Certificate Authority (CA), any trusted third-party organization that gives SSL certificates. Every web browser has a list of trusted CAs, and most browsers alert users when they receive invalid security certificates.
During a TLS/SSL handshake, public-key encryption is used to authenticate the origin server’s public-key identity and the digital signature on the SSL certificate. Once this process is completed, the client and the server will generate session keys for secure symmetric encryption.
All subsequent communication between the server and the client is then encrypted with the session keys. So if anyone intercepts the HTTPS requests and responses, they’ll only see the ciphertext and not any sensitive information. HTTPS also helps protect against malicious activity such as on-path attacks, DNS hijacking, BGP hijacking, and domain spoofing. Therefore, HTTPS is a more secure protocol.
HTTPS requests and responses are encrypted
As we have already discussed, when it comes to data security, HTTPS is undoubtedly the safer option. In fact, according to the PCI Data Security Standard, using HTTPS instead of HTTP is a requirement for websites that collect and process payment information.
Internet users are getting more aware of the importance of entering sensitive data only on websites that use the HTTPS protocol. For example, since July 2018, Google Chrome and other browsers have begun to flag HTTP sites without valid SSL certificates as “not secure” in the URL bar. Thus, it’s become necessary for businesses to implement HTTPS on their websites to build trust with visitors and avoid a negative impact on their brand.
In its bid to encourage the switch to HTTPS, Google began using HTTPS as a ranking signal in 2014. As a result, using HTTPS is now a vital part of any effective SEO strategy. In addition, HTTPS is also essential for creating Accelerated Mobile Pages (AMP), which can boost rankings on mobile devices.
Modern browsers now also limit functionality for unsecured HTTP sites. For example, features such as geolocation, push notifications, and advanced web applications (PWAs) require HTTPS to function correctly.
Even concerns such as cost and performance, which may have deterred some from switching to HTTPS in the past, are no longer significant issues. Thanks to the adoption of HTTP/2, which decreases latency and improves page loading speed, switching over to HTTPS now results in performance improvements. Also, it is now possible to get domain validation TLS/SSL certificates for free from organizations such as Lets Encrypt, Cloudflare, and Amazon.
HTTPS is essential for a successful SEO strategy and high ranking
Transitioning a website from HTTP to HTTPS is relatively straightforward but involves several essential steps. Before you get started, it’s good practice to perform a complete back-up of your site so that you can easily revert if you run into problems. The process includes the following steps:
To enable HTTPS, you’ll need to obtain an SSL certificate from a trusted Certificate Authority.
Once you’ve got an SSL certificate, you’ll need to install and configure it on your site’s server.
Update all internal links from HTTP to HTTPS and references to images and scripts on your website.
You’ll also need to update your sitemap and robots.txt file to reference the updated sitemap. Then, you can submit the updated sitemap to Google with the Search Console Sitemaps report tool.
Don’t forget to update your code libraries and third-party plugins present on your website.
Change external links in directory listings to HTTPS.
To avoid losing your search ranking when migrating your site, you’ll need to implement 301 redirects on your HTTP site. If your website is hosted on Apache, you can do this by modifying the .htaccess file in the root folder of your website. Implementing 301 redirects will help you preserve your HTTP site’s link equity on the new HTTPS URL.
You should also use canonical tags on the HTTPS version of your site only. These tags will make it clear to search engine crawlers that you want secure web pages to appear in search results.
Check your landing pages and paid search links and change them to HTTPS.
Make sure to update old redirects.
Allow HSTS so that your browser would always use HTTPS.
HTTPS adoption has been on the rise in recent years, and it’s already become the standard protocol on the internet. Hopefully, this article helped you understand the difference between HTTP and HTTPS and the need to move over to HTTPS.
About the author
Senior Content Manager
Maryia Stsiopkina is a Senior Content Manager at Oxylabs. As her passion for writing was developing, she was writing either creepy detective stories or fairy tales at different points in time. Eventually, she found herself in the tech wonderland with numerous hidden corners to explore. At leisure, she does birdwatching with binoculars (some people mistake it for stalking), makes flower jewelry, and eats pickles.
All information on Oxylabs Blog is provided on an "as is" basis and for informational purposes only. We make no representation and disclaim all liability with respect to your use of any information contained on Oxylabs Blog or any third-party websites that may be linked therein. Before engaging in scraping activities of any kind you should consult your legal advisors and carefully read the particular website's terms of service or receive a scraping license.
Get the latest news from data gathering world
Enjoy secure scraping with Oxylabs
Let's discuss how Oxylabs can help you improve your scraping speeds by providing dedicated solutions.
Scale up your business with Oxylabs®
GET IN TOUCH
Certified data centers and upstream providers
Connect with us
Advanced proxy solutions
|
<urn:uuid:36582b5c-ef07-4128-a9f5-95c8d303fdca>
|
CC-MAIN-2023-50
|
https://oxylabs.io/blog/http-vs-https
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.912353 | 1,843 | 3.796875 | 4 |
This machine has a very rich history. The name of the computer originates from the acronym of the video IC used to display output on the computer. The IC, numbered 6560/61 and named Video Interface Chip, was originally developed by Commodore in the late 1970's for sale to computer manufacturers. The video interface chip was originally design for small screen applications like ATM machines. That's why it only has 22 characters. However, no manufacturer would buy the IC, so Commodore finally decided to recoup losses by developing their own computer system to utilize it. Thus, the VIC-20 was born.
The number 20 is actually a rounding down of the number of kilobytes of memory (RAM and ROM) in the system: 22K. And the VIC acronym was changed slighly to stand for "Video Interface Computer". The actual computer system included a keyboard, a CPU, a BASIC interpreter, and ports for attachment of tape and disk drives, printers, monitors, and a television.
The back of the VIC-20
Datassette, SN; S 760738
|
<urn:uuid:1aed1cd1-41ac-45ec-a3da-b7ddaa6b19a7>
|
CC-MAIN-2023-50
|
https://pcmuseum.tripod.com/vic20.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.950045 | 223 | 2.703125 | 3 |
It isn’t every day that the Pope leads evening prayer anywhere in the U.S. So when his schedule included St. Patrick’s Cathedral in New York City, a multi-year renovation of the church was quickly wrapped up in time for the occasion. This article explains the process of repair and restoration that took place before the visit of Pope Francis on Sept 24.
The Gothic Revival mother church of the New York City’s Catholic archdiocese, was last renovated in the 1970s on the centennial of the building’s opening. Since then, four decades of candle smoke turned the painted ceiling plaster from its original ocher-painted color to a dull olive green.
Outside, Cracks had appeared in the exterior marble, and air pollution had turned its natural white to a dirty gray. “You would have seen chips [of marble] falling off the building,” said Jeffrey Murphy, AIA, a founding partner of Murphy Burnham & Buttrick (MBB) who led the $177M restoration.
These conditions led New York’s archbishop, Cardinal Edward Egan, to call in 2006 for a three-year, three-phase renovation of the cathedral, which is on the National Register of Historic Places. The project team would touch every surface and feature of the landmark building. “There’s woodwork, stained glass, protective glazing, bronze doors, wood doors, and six types of stone, which all require different treatments,” Murphy said. Delayed by the 2009 recession, the work did not begin until 2011. But that gave the team time to research. As few digital records of the building existed, the team developed digital drawings and input them into building information modeling software (Autodesk BIM360). This would prove to be an advantage when the project completion date was moved up to accommodate the Pope’s visit.
A tour through the restoration project at St. Patrick’s Cathedral
Cleaning The Exterior
A team of 150 restoration specialists worked on the building, performing many of the repairs by hand. Workers began by cleaning and repairing the marble stones of the twin 330-foot tall spires, working their way down to the ground.
The marble façade was cleaned using micro-abrasion to gently scrub the surface using low-pressure water, air, and crushed glass. The reconditioned façade now reveals four different varieties of marble that were used in construction.
Hasty repairs to the marble joints in the 1970s were made with Portland cement, which cured much darker than the stone. Furthermore, the mortar, which was harder than the marble itself, caused some of the blocks to crack. These joints were cleaned and re-pointed as a part of the restoration.
Brightening The Interior
Inside the cathedral, a two-bay-wide, rolling scaffold system was erected around the church’s triforium, spanning the nave and its aisle. As workers moved the scaffolding from east to west through the interior, specialists from local restoration firm Building Conservation Associates meticulously inspected the cathedral’s stained and deteriorating ceiling to recommend repairs. The ceiling consists of plaster affixed to wood lath ribs – a precursor, of sorts, to cast stone. After the ceiling was cleaned with a chemical latex peel, three tints of cream paint were applied to the ceiling to reflect the design vision of architect James Renwick, who designed the building in 1858.
Updating the historic (but technically obsolete) ceiling construction to meet modern fire-safety standards was a twofold challenge. After the plaster and adjacent attic space were cleaned and repaired, the team installed a high-pressure, nitrogen-propelled, misting sprinkler system that requires a fraction of the water used by conventional sprinkler systems to suppress a fire. To Murphy’s knowledge, St. Patrick’s is the first U.S. cathedral to use this system.
Anticipating The Papal Visit
Throughout construction, the project was managed with Autodesk BIM360. The 150 restoration specialists uploaded notes, progress photos, and project documentation for the cathedral’s 30,000 exterior and interior repairs to the cloud-based program via iPads. This workflow permitted real-time updates to the project team at large. The project was largely complete in the summer of 2015 when word came that Pope Francis would be visiting the cathedral on his US visit. The project schedule was expanded to include Saturday shifts.
“When we heard the Holy Father might come,” Msgr. Robert T. Ritchie, the rector of St. Patrick’s, said, “our very hard-working restoration team really went above and beyond, and achieved the milestone of having a scaffolding-free interior so that we could fit as many people as possible into the cathedral to see Pope Francis.”
The bronze doors were polished, and during the renovations, the doors were left open, to bring more light into the interior, and also as a symbolic gesture of welcome to the cathedral’s approximately 5 million yearly visitors.
On the morning of September 24th, crowds formed behind barricades lining Fifth Avenue for a glimpse of the Pope, who arrived that afternoon in a modest Italian car with a yellow papal flag.
The evening prayer service included the St. Patrick’s Cathedral Choir and Orchestra performing selections from the mass by Palestrina, as well as works by Mozart and others. In his homily, The Pope remarked, “This beautiful Cathedral of Saint Patrick, built up over many years through the sacrifices of many men and women, can serve as a symbol of the work of generations of American priests and religious, and lay faithful who helped build up the Church in the United States.”
PDH Academy helps keep you at your professional best for your important projects. Check out our courses for architects when your next professional development hours are due.
|
<urn:uuid:35f11e35-3bac-4a0c-9731-a5385d4c24ee>
|
CC-MAIN-2023-50
|
https://pdhacademy.com/2015/10/12/how-st-patricks-cathedral-prepared-for-the-pope/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.969791 | 1,226 | 2.828125 | 3 |
Gambling involves putting something of value at risk in the hope of winning something else of value. It is an activity that has many social and personal effects. Those impacts can be monetary or non-monetary, and can affect the gambler as well as his or her family members, friends, and colleagues. In addition, gambling can also lead to problem gambling. Problem gambling is characterized by a series of harmful behaviors that disrupt the gambler’s personal, work, and family lives.
The psychological impact of gambling is well known and is primarily a result of the human body’s natural production of feel-good hormones, dopamine and adrenalin. These hormones are released when a bet is placed and when the bet is successful, which can lead to a sense of pleasure. The psychological impact of gambling is not just restricted to winning bets, however; the same chemicals are produced when a bet is placed and lost.
In addition to this, gambling can have a number of positive economic impacts. When it is legal and regulated, it can provide jobs and tax revenue to governments. This can be especially beneficial for poorer communities, where the money from gambling can help to provide much needed resources.
The economic benefits of gambling are also a result of the jobs created within the industry itself, both for those working in land-based casinos and those working online. The betting industry alone requires a large amount of staff, from croupiers and teller assistants to customer service and marketing personnel. In addition, the gambling industry creates a number of other jobs, such as for trainers, breeders, jockeys and racing stewards.
There are a number of ways to deal with problems related to gambling, such as seeking professional help, limiting the amount of money you bet and staying away from sites that offer reload bonuses. In addition, it is important to strengthen your support network by spending time with friends who do not gamble and finding new ways to socialize. Those with problems can also find support in self-help groups such as Gamblers Anonymous or Alcoholics Anonymous. Lastly, you can try to relieve unpleasant feelings by practicing healthier habits, such as exercising, eating healthy food, and getting enough sleep.
|
<urn:uuid:95f589fb-6fef-4403-a0c7-fa73802d4e2b>
|
CC-MAIN-2023-50
|
https://perfectbrowsbymaggie.com/the-economic-and-psychological-impact-of-gambling/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.967032 | 443 | 2.640625 | 3 |
Ever since the first windmills were developed by the Persians in the sixth century AD, man has been fascinated by the power of these simple but effective instruments which can do so much to utilise and harness efficiently the powerful natural elements surrounding us …
Those comparatively primitive machines were designed to automate the essential tasks of grain-grinding and water-pumping, the forerunner of today’s high-tech turbines being the vertical axis system. The modus operandi then was simple and straightforward with the grinding stone fixed to the vertical shaft and the machinery usually encased inside a simple building, which featured a wall or shield to prevent incoming winds from slowing the side of the drag-type rotor which would advance towards the wind.
We have made many giant leaps since those first pioneering days. If only some of those early Persian engineers could take a trip in a time machine and see some of our incredible offshore wind farms now, one wonders what they might make of the impressive spectacle. Or perhaps they might just say: “Goodness! You must have an awful lot of grain to grind.”
But Europe’s wind industry is far from free-standing. An army of support staff and logistics industries are on permanent standby, offering ancillary services to the ever-growing flotilla of on and offshore wind farms scattered around the continent. Providing this support to our wind industry is a multi-million dollar concern that shows every sign of growing and developing, bucking the lamentable downward trend of the economies of Europe. In Germany alone, for instance, there are around 38,000 jobs directly linked to the industry, but when we expand that figure to include indirect jobs, it more than doubles to an impressive 84,300. And this is very much an industry for the future; in the Spanish region of Navarre, for instance, 70 per cent of the electricity comes from wind energy.
So how do these jobs impinge on the wind industry and what are the problems of servicing a multi-million dollar business that carries on its shoulders so many of the poignant hopes of an ecologically-sound future for our planet?
|
<urn:uuid:74ac5aba-71a5-45b0-846e-30794b4682df>
|
CC-MAIN-2023-50
|
https://pes.eu.com/wind/what-makes-the-wind-industry-tick/?pg=14
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.956698 | 435 | 2.609375 | 3 |
Boring insects may spend most of their life cycle feeding inside a host or spend part of their life cycle as borers and part as a defoliator on the same host. Beetles, wasps, and moths that are borers, undergo complete metamorphosis and pass through egg, larva, pupa, and adult stages of development. Boring insects, while feeding, construct tunnels (galleries) in plant tissue. Feeding by borers may deform, weaken, or stunt tree growth. Their galleries may girdle a portion of or an entire tree, or involve an entire bud, branch tip, seed, or fruit. Recovery of a tree from boring damage or replacement of a dead or damaged tree is slow and may take years.
Whether small or big, each house has something wooden inside in the form of furniture, doors, or windows. Just imagine what will happen if these wooden pieces get infested by small bugs called wood borers - the beetles that simply love residing inside moist wood?
Taking a wood borer infestation in your house lightly will prove to be a grave mistake. They can gradually build up a whole colony inside your wooden works laying eggs, and larvae eating up all your wood deep inside.
If you detect signs of wood borer infestation at home, make sure to search for wood borer pest control near me to enjoy the following benefits:
Proper inspection and detection of wood borers inside your home
Preserves your wooden objects and entire property from wood borer infestation
Saves time on trying DIY wood borer pest control methods
Saves money on wooden repairs
Complete peace of mind
|
<urn:uuid:d7b9bc6b-918b-499d-9849-d8c40ea03c9f>
|
CC-MAIN-2023-50
|
https://pestcontrolcareindia.com/wood-borer-management.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.93685 | 337 | 2.875 | 3 |
Can Birds Eat Watermelon? Is Watermelon Safe for Birds?October 9, 2023
Why Do Hummingbirds Have Long Beaks? The Truth DiscoveredOctober 10, 2023
If you have birds, you might have observed their delightful reactions to music. Their behaviors, like bobbing their heads or flapping their wings, suggest they share some of our emotional responses to melodies. But does this really mean that birds genuinely like music?
Yes, many birds do appear to enjoy music. Observations show that certain birds respond positively to melodies by dancing, mimicking sounds, or flapping their wings. The type of music and its tempo can influence their reactions, with some tunes prompting more active responses than others. However, individual preferences can vary; what one bird enjoys, another might not.
In this article, we will discuss how birds respond to music and other safety concerns related to music and birds!
Related Read: Why Won’t My Bird Stop Screaming? Identifying Reasons
Do Birds Like Music?
Like humans and songbirds, birds possess a gene activated upon hearing pleasing sounds. Given the generally cheerful nature of birds, it’s reasonable to conclude that they appreciate music.
Many birds not only enjoy listening but also engage in singing and dancing, often moving to the rhythm. However, it’s essential to discern the specific music types they prefer.
While music can either soothe or invigorate birds, it’s also worth noting that specific tunes or high volumes can induce stress in them.
What Is Music For Birds, And Why Do They Respond To It?
Music for birds is similar to what it is for humans: a series of sounds, rhythms, and melodies. Birds have highly developed auditory systems, which allow them to interpret and respond to these sounds. They often react to music because of its rhythmic and melodic properties.
Many birds use song and sound to communicate, mate attraction, and territory establishment. Therefore, when they hear external music, it might resonate with their natural tendencies to respond to auditory stimuli.
Different birds might have varying reactions, with some showing visible enthusiasm, like head bobbing, while others might sing along or mimic the tunes.
Recommended Read: Why Birds Hit Windows? Is It Considered Spiritual?
Birds’ Biological Response To Music
Birds have a notable biological response to auditory stimuli, including music. Their reactions may arise from the resemblance of musical melodies to natural bird songs. Research indicates that certain melodies can influence bird behavior and vocal patterns, with some aiding in the vocal development of young birds by mimicking adult bird sounds.
Different music genres can evoke varied responses. Calming classical tunes tend to soothe birds, while lively beats might prompt movements akin to dancing in some species. These reactions likely have roots in evolutionary adaptations spanning millions of years.
While the exact reason birds are drawn to music remains unclear, it’s speculated that their natural affinity for sounds, especially during mating displays, plays a role. Nonetheless, music can engage and affect our avian counterparts.
What Kind Of Music Do Birds Like?
Typically, birds appreciate music with catchy tunes and rhythmic beats similar to contemporary pop and rock tracks. However, individual preferences can vary. Some might dislike specific music genres, evident through recognizable negative behaviors.
While some birds might lean towards lively tunes, others might be inclined towards serene, classical melodies. This preference diversity highlights that birds, much like humans, have distinct personalities and tastes.
The Gray Parrot Study
A research study involving two African Gray Parrots revealed distinct musical preferences. While both birds liked rock music, they seemed indifferent to electronic tunes. Surprisingly, electronic music seemed to unsettle them, causing them to vocalize loudly in distress.
They were generally receptive to pop music and notably enjoyed tracks from Joan Baez, UB40, and U2, as well as some classical compositions by Johann Sebastian Bach.
Also, Read: How Much Is A Peacock Worth? A-Z Guide
Do Birds Dance To Music?
Research indicates that birds are unique animals with the capability to move in rhythm with music. Some suggest birds genuinely experience the music, akin to humans, while others believe they might be sensing air vibrations.
However, when a bird bobs its head to a tune, it’s a sign of enjoyment and engagement with the music. Evidence of birds having distinct musical preferences suggests they perceive and resonate with music beyond mere vibrations.
Another perspective is that birds are merely imitating their owners. While mimicry is a known trait in many birds, owners have observed that their birds often dance only to preferred songs.
If they were solely mimicking, they’d dance regardless of any music. They would stop their movements once the owner is absent. Thus, it’s evident that birds genuinely enjoy dancing to music.
Editor’s Pick: Why Are Birds So Cute? 10 Reasons Why Birds Are Cutest
Music And Bird Safety
As a pet owner, your bird’s well-being is paramount. While many birds enjoy music, it’s essential to consider their preferences.
- Avoid playing loud music, as consistently high volumes can harm their auditory senses.
- Opt for serene and gentle music over loud or harsh tunes.
- Use music to mask potentially distressing noises, like fireworks.
- If playing nature sounds, ensure there are no predator calls included.
- Stick to tracks that your bird has shown an affinity for.
- When introducing new songs or leaving music on, be present to change or turn off tracks your bird might not like.
- While dancing or singing along with your bird can be delightful, ensure they get rest, especially if they seem tired.
Birds, much like humans, have a good relationship with music and can even show preferences for specific genres. Typically, birds favor classical and pop tunes, while electronic dance music might unsettle them due to its rapid beats.
They can sense the music’s rhythm and move accordingly. To determine your bird’s favorite tracks, play a variety and observe its reactions.
Positive indicators include whistling and head-bobbing, while loud vocalizations suggest you might want to switch songs. It’s good to provide birds with background music occasionally, but always be mindful of the volume and keenly observe their responses.
With a lifelong love for animals, I’m on a mission to empower pet parents with knowledge, heartwarming stories, and practical tips to create a world where our beloved friends thrive in happiness and health.
|
<urn:uuid:8ba751b2-6cdc-4f06-993b-e898b0dadb02>
|
CC-MAIN-2023-50
|
https://petsfm.com/do-birds-like-music/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.935969 | 1,358 | 3.765625 | 4 |
Heavy Metal Detoxification, Digestive Aid
✓ Digestive aid
✓ Stimulates secretion of the gastric juices
✓ Crosses blood brain barrier
✓ Mercury detox from neurological structures
Cilantrex containing cilantro (Coriandrum sativum) plays an essential role in the body by supporting heavy metal detoxification. Many conditions related to nervous system disorders are directly linked to heavy metal poisoning. Cilantrex mobilizes heavy metals (including mercury, aluminum, lead and tin) from tissues, so that they can be further excreted from the body using binding chelation agents (such as chlorella).
Cilantro is also a well-known herb used as a digestive aid and to support the health of the intestines. Cilantro has a carminative, slightly spasmolytic and stimulating effect on the secretion of the gastric juices.
|
<urn:uuid:c005596e-307d-436c-a277-a4fb3a09af8e>
|
CC-MAIN-2023-50
|
https://photentialhealth.ca/product/cilantrex/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.884721 | 181 | 2.59375 | 3 |
Best renewable energy resources in Lowell - power system with solar & wind ( non nuclear )
Renewable energy is the future of electronic technology. It is clean, safe, and sustainable. Types of renewable energy are solar, wind, water, and biomass. This technology is used to generate electricity, heat, or motive power.
Our online course can take you through the basics of types of renewable energy and the technology used to generate it. You'll learn about:
- Solar Energy: Solar panels collect sunlight and convert it into electricity.
- Wind Energy: Wind turbines harness the power of the wind to generate electricity.
- Water Energy: Hydroelectric dams capture the energy of moving water to generate electricity.
- Biomass Energy: Biomass power plants burn organic material to generate electricity.
Renewable energy is a critical part of the fight against climate change. Burning fossil fuels like coal, oil, and natural gas release greenhouse gases into the atmosphere, trapping heat and raising the Earth's temperature. This "global warming" can lead to more extreme weather, droughts, floods, and hurricanes. It also threatens the habitats of plants and animals around the world.
Renewable energy doesn't produce greenhouse gases, so it's a vital part of the solution to climate change. And as renewable energy technology gets more advanced and less expensive, it's becoming an increasingly viable option for individuals, businesses, and governments.
There are many types of renewable energy, but they all have one thing in common: they derive from natural processes that are continually replenished. That means we can never "run out" of renewable energy sources, unlike fossil fuels.
Renewable energy facts:
-It is a clean energy source that does not produce greenhouse gases or other pollutants.
-It is a sustainable source of energy that can be used indefinitely.
-It is a renewable source of energy that can be replenished.
If you are ready to become a renewable energy expert,
✅ TIP: ᐅ How to cut power bills by 65%?
Are you or do you know a Renewable energy ♻️ 🔋 ☀️ in Lowell? Add a company for free
|
<urn:uuid:4a2dcf90-d97a-4b2f-b193-763bc6a60893>
|
CC-MAIN-2023-50
|
https://pplrenewableenergy.com/oregon/lowell/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.91363 | 451 | 2.953125 | 3 |
The third Engineering lesson for the Papillion/LaVista Middle School High Ability Learners was on different forms of alternative energy. The students built towers out of spaghetti and marshmallows, taking special care to make them structurally sound. After that, they built wind turbines using paper cups, plastic spoons, masking tape, and a leaf blower. Students learned […]
Check out our Virtual STEAM site to host your own STEAM Night using our kits!
|
<urn:uuid:e0c40cb5-d1d3-4e54-93f1-0f5bb292e678>
|
CC-MAIN-2023-50
|
https://prairiestem.org/tag/house/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.923939 | 95 | 2.5625 | 3 |
What is the rule for capitalisation here? The Cirque in the first line is capitalised but in the last line is marked incorrect when capitalised.
Freeform Writing Exercise B1
Thank you for pointing this out G, the capital letter has been added to 'Cirque' in the last sentence.
Bonne Continuation !
Sign in to submit your answer
Don't have an account yet? Join today
Test your French to the CEFR standard
|
<urn:uuid:96b4ea9b-53d9-4e93-b00b-1a45f15abb23>
|
CC-MAIN-2023-50
|
https://progress.lawlessfrench.com/questions/view/cirque-ou-cirque
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.928646 | 96 | 2.765625 | 3 |
Trees matter to all of us. Trees provide shade, mitigate floods, absorb carbon dioxide, filter air pollution, and provide habitats for birds, mammals and other plants. The rich biodiversity within a rainforest is also incredibly important to the well-being of humans and of the planet.
In an effort to preserve the existing flora and fauna in its 400-hectare township in Cagayan de Oro, Pueblo de Oro Development Corporation (PDO) signed in 2005 a memorandum of agreement for the first Urban Rainforest in the Philippines with the ICCP Group Foundation, Inc., the Bukidnon local government, and the Department of Natural Resources (DENR). Pueblo de Oro started its preservation efforts by planting more endemic plant seedlings, or “wildlings,” sourced from the rainforests of Mt. Kitanglad and other nearby mountains in Bukidnon. By propagating them in areas such as the ridges and knoll of the urban rainforest, native animal species were encouraged to build their nests and thrive.
The Pueblo de Oro urban rainforest is a 40-hectare rainforest in the heart of Cagayan de Oro’s growth area, abundant with different plants animals. According to PDO management, having a township wherein trees are abundant is not just for aesthetic purposes, but also benefits the species living within the area.
In the years since the project kicked off, PDO has sought and joined forces with other partners and agencies in its efforts to preserve the urban rainforest to welcome and nurture the species that settled in the township.
As a result of the preservation efforts, the grasslands and creeks in the forest are now home to numerous species of animals — from small insects to beautiful flights of birds. PDO has made it a mission to protect and multiply these endemic species. The developer is concerned about the reality that our wildlife is affected by the loss of its natural habitats.
Coupled with the efforts of PDO to preserve and nurture the urban rainforest, the protection of watersheds is also a part of their commitment to the care of the environment. Protecting the watersheds promotes sustainable agriculture, ecological security and water resource preservation.
Giant bamboo and mahogany seedlings were planted by employees along the Calaanan Creek to help protect the soil in the Iponan Watershed, of which it is a part, and prevent it from washing downstream. Maintaining a forest cover as well as following environmentally-enhancing practices leads to a sustainable watershed.
People often think of “land-based” climate solutions or nature as being something that’s far removed from the urbanism that more than half of the population lives in. But forests can be the unseen heroes of natural climate solutions where green spaces provide health and community benefits, as well as, shelter us from the full effect and impacts of climate change.
|
<urn:uuid:d9c119de-7dfb-4e59-8a62-874e800dcca0>
|
CC-MAIN-2023-50
|
https://propertyreport.ph/uncategorized/2019/09/06/7682/pueblo-de-oro-urban-rainforest-protects-cdos-biodiversity/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.956105 | 598 | 3.28125 | 3 |
According to the latest survey results from the US Department of Health and Human Services’ Substance Abuse and Mental Health Services Administration, a staggering 61.2 million people aged twelve or older in the US used illicit drugs in 2021.
That is more than a fifth of the population.
Why do so many people continue to take illegal drugs and become dependent on them?
There are multiple different factors that can affect how likely it is that someone will develop a substance abuse disorder. Let us take a look at six of the key ones.
1. A Family History of Addiction
People who grow up in households in which family members are dependent on drugs are more likely to become addicted themselves. That is due to both genetic and environmental factors.
2. A Lack of Family Involvement
It is not only families with a history of addiction that is a factor in the likelihood of someone developing an addiction problem. Growing up in challenging family situations that cause a lack of bond with parents and siblings can also increase the likelihood of drug addiction.
3. Peer Pressure
Peer pressure is often a leading factor that causes people to begin experimenting with drugs
That is especially true for teenagers and young adults, as the pressure to fit in is much greater than it is in social circles as an adult. Once young people begin using drugs, they are likely to become dependent on them.
In some areas, drugs are commonly available, such as in deprived neighborhoods. When drugs are more commonly available, it is more likely that people in the area will start using them.
Again, when people begin taking drugs, they are more likely to develop an addiction.
5. A Mental Health Disorder
Many people who have mental health disorders take drugs, often in the belief that they are self-medicating to help ease their physical and psychological symptoms. People with conditions like depression, anxiety, ADHD, and PTSD are particularly more likely to develop a substance abuse problem.
While many people with mental health disorders take drugs to cope with painful feelings like anxiety and loneliness, the drugs can actually make those problems worse.
6. Taking Drugs That Are Highly Addictive
While some people are able to take drugs recreationally just every now and then, most people who try drugs end up taking them regularly. In turn, they develop substance abuse problems. But the type of drug that someone takes is also a factor in how likely he or she is to become addicted. Some drugs are more addictive than others.
For instance, marijuana is nowhere near as addictive as heroin. Cocaine and opioid painkillers are also known for being highly addictive. Furthermore, if someone smokes or injects drugs rather than consuming them orally, they increase the potential for addiction.
Treatment Options for Substance Abuse
The good news is, there are effective treatments available for drug addiction. If you have developed a substance use disorder or if you have a loved one who has become addicted to drugs, withdrawal therapy could be the best treatment option. It involves detoxing gradually while also getting other treatments like talk therapy and counseling sessions. Sometimes, detoxing can involve temporarily substituting drugs with other substances.
Before beginning any form of treatment, it’s very important to have a substance abuse evaluation carried out by an addiction professional. Detox or other types of substance abuse therapy may be the best course of action, which is determined by the results of this evaluation. As there is no one-size-fits-all approach to detox, it must always be customized to each person’s unique requirements and circumstances. It is crucial that anyone seeking therapy does so with the assistance of a qualified professional in order to ensure safety and success, regardless of the sort of cleansing procedure they choose.
Spending time at a trusted addiction treatment center that utilizes evidence-based substance abuse treatment, such as Allendale Treatment, is often the best way to detox and get the support and resources required for overcoming addiction. Other treatment options include behavior therapy, self-help groups, and medicine. If you have developed a dependency on drugs, visit your doctor to find out which treatment options are available and which would be best for you.
There are various reasons why someone can become addicted to drugs, such as having a family history of addiction, having a lack of family involvement, peer pressure, easy availability, having a mental health disorder, and taking drugs that are highly addictive.
If you have developed a substance abuse problem, make sure you take back control. The first step is to talk to a professional about your problem.
|
<urn:uuid:a799f7af-ca7f-428c-8ec9-62075168fb8b>
|
CC-MAIN-2023-50
|
https://psychtimes.com/addiction/6-factors-that-affect-how-likely-it-is-that-someone-will-develop-a-substance-abuse-problem/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.963822 | 916 | 3 | 3 |
Emancipation Day is an official public holiday in Saint Kitts and Nevis, as in many other nations and dependencies across the Caribbean. the dual-island nation celebrates the day on the first Monday of August, even though the actual date of emancipation was 1 August. The first Tuesday in August is also a holiday to give more time to celebrate and party during the festive events of “Culturama”.
|2024||5 Aug||Mon||Emancipation Day|
|2025||4 Aug||Mon||Emancipation Day|
|2026||4 Aug||Tue||Emancipation Day|
|Please scroll down to end of page for previous years' dates.|
For the British Caribbean colonies, the end of slavery came gradually at first. The direct slave trade was abolished in 1807, and in 1812, it became illegally to buy slaves from other European powers as well. Then followed a series of acts of Parliament that gave certain rights to slaves and demanded planters treat them with a degree of respect, within limits.
But this was not enough. And rebellion broke out in Jamaica in 1831 and led to much bloodshed. At this point, the colonies themselves began to willingly press for abolition to avoid further revolts, but they demanded compensation. Finally, on 1 August, 1832, slavery was abolished in all British realms, the final bill having been drafted by a former resident of Saint Kitts named James Stephen.
Tensions continued as the former slaves were still bound as indentured servants for another six years and social tolerance and equality had yet to be achieved. But emancipation was a major breaking point that has led to further positive changes over the years, and it is a time of great celebration and jubilation in Saint Kitts and Nevis.
|2023||7 Aug||Mon||Emancipation Day|
|2022||1 Aug||Mon||Emancipation Day|
|2021||2 Aug||Mon||Emancipation Day|
|2020||3 Aug||Mon||Emancipation Day|
|2019||5 Aug||Mon||Emancipation Day|
|2018||6 Aug||Mon||Emancipation Day|
|2017||7 Aug||Mon||Emancipation Day|
|
<urn:uuid:fd7ad23a-e40a-4ab5-9541-7f03c4904631>
|
CC-MAIN-2023-50
|
https://publicholidays.la/saint-kitts-and-nevis/emancipation-day/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.945528 | 481 | 3.5625 | 4 |
Common components analysis (CCA) may be an efficient method to identify specific program components related to the prevention of child maltreatment. We used adapted CCA to examine home visiting programs designed to reduce or prevent child maltreatment and identify which program components are most likely to contribute to the prevention of child maltreatment. To carry out this process, manualized home-visiting programs were first identified through web-based program repositories. Then, program characteristics and components (i.e., sustainability, service delivery, and program content) were coded. Common components across these coding categories were identified and compared in programs with supporting research evidence and programs without research evidence. Our analyses indicate that problem-solving strategies were a key ingredient of evidence informed programs. Information on home cleanliness, accident prevention, first aid, and social support were also common components of evidence informed home visitation programs to prevent child maltreatment. Using CCA in this manner may assist providers in identifying potentially promising practices and programs among programs with and without evidence that match the needs of their populations.
All Science Journal Classification (ASJC) codes
- Developmental and Educational Psychology
- Sociology and Political Science
|
<urn:uuid:20300e5b-fccf-4e4a-8cf9-384c1860b3d2>
|
CC-MAIN-2023-50
|
https://pure.psu.edu/en/publications/common-components-of-evidence-informed-home-visitation-programs-f
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.943333 | 233 | 2.6875 | 3 |
A new type of bending actuator, “monomorph”, is proposed by using a single plate of semiconductive piezoelectric ceramics. The principle of bending originates from the nonuniform distribution of the electric field in a single plate caused by the semiconductor-metal electrode contact. Monomorph characteristics are exemplified in lead zirconate based and barium titanate ceramics. A bend curvature comparable to that of conventional piezoelectric “bimorphs” can be obtained.
All Science Journal Classification (ASJC) codes
- Physics and Astronomy(all)
|
<urn:uuid:6972ea37-0207-4505-be4d-3dbc411d384f>
|
CC-MAIN-2023-50
|
https://pure.psu.edu/en/publications/monomorph-actuators-using-semiconductive-ferroelectrics
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.860988 | 132 | 2.640625 | 3 |
Traditional dilated ophthalmoscopy can reveal diseases, such as age-related macular degeneration (AMD), diabetic retinopathy (DR), diabetic macular edema (DME), retinal tear, epiretinal membrane, macular hole, retinal detachment, retinitis pigmentosa, retinal vein occlusion (RVO), and retinal artery occlusion (RAO). Among these diseases, AMD and DR are the major causes of progressive vision loss, while the latter is recognized as a world-wide epidemic. Advances in retinal imaging have improved the diagnosis and management of DR and AMD. In this review article, we focus on the variable imaging modalities for accurate diagnosis, early detection, and staging of both AMD and DR. In addition, the role of artificial intelligence (AI) in providing automated detection, diagnosis, and staging of these diseases will be surveyed. Furthermore, current works are summarized and discussed. Finally, projected future trends are outlined. The work done on this survey indicates the effective role of AI in the early detection, diagnosis, and staging of DR and/or AMD. In the future, more AI solutions will be presented that hold promise for clinical applications.
All Science Journal Classification (ASJC) codes
|
<urn:uuid:e7d13d8f-32ac-42d5-b9c6-5606dfeb6a39>
|
CC-MAIN-2023-50
|
https://pure.psu.edu/en/publications/the-role-of-medical-image-modalities-and-ai-in-the-early-detectio
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.898546 | 256 | 2.53125 | 3 |
BUT! Then you hear or read of those who proclaim that St. Patrick was never officially declared a Saint by the Catholic Church - and most of us then say, um, WHAT?! While it is true that St. Patrick was not declared a Saint, in the same manner, most other Saints have been so declared - one must look at the REASON his canonization was different. The fact is, in the first millennium the formal canonization process had not been fully developed. However, to proclaim he was never officially canonized is simply NOT TRUE! The fact of the matter is, in ancient times, starting about 787 A.D., a new church had to have a relic from a Saint before it could be consecrated.
In 1177, a knight named John de Courcy built a new monastery and he, with Bishop Malachy, applied to Pope Urban III for permission to have the remains of Sts. Patrick, Brigid, and Columcille moved to the new monastery. An investigation was conducted and a Solemn Translation (elevato corporis) was approved. Pope Urban sent Cardinal Vivian with his official commission for the verification of the sanctity of the persons (Patrick, Brigid, and Columcille), followed by an all-night vigil prior to moving the remains. For the day, this WAS an official declaration of sainthood by and through the Catholic Church (McCormick, 2011).
The process of declaring one a saint has changed many, many times throughout the ages, most recently in 1983 and 1997 (McCormick, 2011). So, while St. Patrick's official canonization was not according to the modern means - he was most definitely recognized as a Saint of the Catholic Church and BY the Catholic Church in 1177 A.D.
McCormick, M. (2011). St. Patrick IS a Saint! Ancient Order of Hibernians. https://aoh.com/2011/03/01/st-patrick-is-a-saint/
|
<urn:uuid:d2d72f56-bc2c-463a-ab70-699f34a197bc>
|
CC-MAIN-2023-50
|
https://quilocutus.blogspot.com/2021/03/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.968848 | 415 | 2.53125 | 3 |
Pollution can come from nature, but is mostly produced by humans. It is a problem that requires rapid solutions, both within Australia and internationally, due to the growing human population and the increase in size of cities. Pollution explores the problem, as well as explaining the steps that need to be taken to combat it. FEATURES OF THIS BOOK INCLUDE: • Informative and comprehensive text with photographs • An overview of different types of pollution and what is being done • Labelled diagrams relevant to the text • Fact boxes to highlight interesting information • A resource list for further information • A glossary and an index
Australia is currently facing several significant environmental issues. The Australia's Environmental Issues series provides an overview of environmental issues affecting Australians and our environment. Each title in the series outlines the cause of the issue and focuses on solutions.
|
<urn:uuid:d9ba1d16-ea60-4519-92a6-3fa4793cc002>
|
CC-MAIN-2023-50
|
https://redbackpublishing.com.au/book/9781925860115/pollution
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.940075 | 168 | 3.5625 | 4 |
By Chris Chipello
Neutron stars, the extraordinarily dense stellar bodies created when massive stars collapse, are known to host the strongest magnetic fields in the universe – as much as a billion times more powerful than any man-made electromagnet. But some neutron stars are much more strongly magnetized than others, and this disparity has long puzzled astrophysicists.
Now, a study by McGill physicists Konstantinos Gourgouliatos and Andrew Cumming sheds new light on the expected geometry of the magnetic field in neutron stars. The findings, published online April 29 in Physical Review Letters, could help scientists measure the mass and radius of these unusual stellar bodies, and thereby gain insights into the physics of matter at extreme densities.
Some previous theoretical studies have suggested that the magnetic field of a neutron star should break into smaller loops and dissipate as the star ages – a phenomenon known as “turbulent cascade.” Yet, there are several “middle-aged” neutron stars (roughly one million to a few million years old) that are known to have relatively strong magnetic fields, leaving scientists at a loss to reconcile the theoretical models with actual observations.
To better understand how the magnetic field changes as a neutron star ages, Gourgouliatos and Cumming ran a series of computer simulations. These showed the magnetic field evolving rapidly at first, in line with previous predictions. But then the evolution took a surprising turn: in all the simulations, no matter what the magnetic field looked like when the neutron star was born, the field took on a particular structure and its evolution dramatically slowed.
“A cascade in a magnetic field is akin to what happens when you add cream to your coffee and stir it: the cream rapidly gets broken up into pieces and mixes into the coffee,” Cumming explains. “The original prediction was that neutron star crusts would do the same to their magnetic fields; so if you could walk around on the surface with a compass trying to walk towards magnetic north, you would end up walking around in random directions. Instead, we find in these new simulations that the magnetic field actually remains quite simple in structure – as if the cream refused to mix into the coffee – and you could, indeed, use a compass to navigate around on the surface of the star.”
The McGill researchers call this final magnetic-field configuration the “Hall attractor” state, after the so-called Hall effect, which is thought by astrophysicists to drive magnetic field evolution in neutron-star crusts. “This result is also significant because it shows that the Hall effect, a phenomenon first discovered in terrestrial materials and which is thought to help weaken a magnetic field through turbulence, can actually lead to an attractor state with a stable magnetic-field structure,” Gourgouliatos says.
Read the original article here.
|
<urn:uuid:bb09941c-912f-4954-8266-6372734b2a14>
|
CC-MAIN-2023-50
|
https://reporter.mcgill.ca/neutron-star-magnetic-fields-not-so-turbulent-after-all/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.95039 | 593 | 3.265625 | 3 |
Source: (2011) Indigenous Justice Clearing House. Brief 10, March 2011.
A range of measures (including diversion and juvenile conferencing programs) has recently been implemented to reduce the over-representation of Indigenous
juveniles in detention, and minimise the contact of juveniles with the formal criminal justice system. Diversionary measures can only have a limited impact, however, and reducing offending and reoffending have been identified
as critical factors to address if the over-representation of Indigenous juveniles is to be reduced (Allard et al. 2010; Weatherburn et al. 2003). While acknowledging that other measures designed to reduce the over-representation of Indigenous juveniles are important, this paper reviews the evidence on policies
and programs that reduce offending by Indigenous juveniles in Australia. Where relevant, research from comparable jurisdictions, such as New Zealand and Canada, is also discussed. (excerpt)
Your donation helps Prison Fellowship International repair the harm caused by crime by emphasizing accountability, forgiveness, and making amends for prisoners and those affected by their actions. When victims, offenders, and community members meet to decide how to do that, the results are transformational.Donate Now
|
<urn:uuid:0c63bc7f-f5ac-4fbf-ba18-8af25ef42f1f>
|
CC-MAIN-2023-50
|
https://restorativejustice.org/rj-archive/promising-interventions-for-reducing-indigenous-juvenile-offending/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.940909 | 241 | 3.03125 | 3 |
Extensor tendons are just under the skin. They lie next to the bone on the back of the hands and fingers and straighten the wrist, fingers and thumb (Figure 1). They can be injured by a minor cut or jamming a finger, which may cause the thin tendons to rip from their attachment to bone. If not treated, an extensor tendon injury may make it hard to straighten one or more joints.
Common Extensor Tendon Injuries
- Mallet Finger : refers to a drooping end-joint of a finger. This happens when an extensor tendon has been cut or torn from the bone (Figure 2). It is common when a ball or other object strikes the tip of the finger or thumb and forcibly bends it.
- Boutonnière Deformity : describes the bent-down (flexed) position of the middle joint of the finger. Boutonniere can happen from a cut or tear of the extensor tendon (Figure 3).
- Cuts on the back of the hand can injure the extensor tendons. This can make it difficult to straighten your fingers.
Figure 01: Extensor tendons, located on the back of the hand and fingers, allow you to straighten your fingers and thumb
Figure 02: The mallet finger deformity causes a droop of the fingertip. This is caused by an extensor tendon injury at the last finger joint.
Figure 03: A boutonniere deformity, a type of extensor tendon injury, with progressive bending of the middle joint may result in a stiff finger in this position if not treated. The end joint also bends backward across the finger.
Tears caused by jamming injuries are usually treated with splints. Splints hold the tendon in place and should be worn at all times until the tendon is healed. The tendon may take eight to twelve weeks to heal completely. Longer periods of splinting are sometimes needed. Your doctor will apply the splint in the correct place and give you directions on how long to wear it.
Other treatment for an extensor tendon injury may include stitches (for cuts in the tendon). Also, a pin may need to be placed through the bone across the joint as an internal splint. Surgery to free scar tissue is sometimes helpful in cases of severe motion loss.
After treatment, hand therapy may be necessary to improve motion. Consult your hand specialist for the best form of treatment.
|
<urn:uuid:e5c73a29-6f87-43f4-ad8c-40d50175eea4>
|
CC-MAIN-2023-50
|
https://richardsgilbertmd.com/hand/extensor-tendon-injuries-and-lacerations/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.906028 | 503 | 3.09375 | 3 |
An Evaluation of the Publications in the Field of Geography Education: Bibliometric Analysis Based on the Web of Science Database
Keywords:Geography Education, Bibliometrics, Web of Science
The purpose of this study is to examine scientific publications about Geography Education in terms of bibliometric indicators. Case study method, one of the qualitative research methods, was applied in this study. The scanning range of bibliometric data obtained from the WoS database generated by Clarivate Analytics covers the dates between 1975 and March 2020. The bibliometric analysis technique was conducted in the study. As a result of the analyses, it was revealed that 559 of 64,874,978 studies registered in the WoS database between 1975 and 2020 were the studies related to Geography Education. It was also observed that 196 (35.06%) of these records were in the education / training research category. Through the analyses, it was concluded that the most common type of publication related to Geography Education was the articles with a total number of 196. Moreover, it is seen that approximately 106 of the published articles have been published during the years between 2016 and 2020. This rate indicates that the educational researches related to Geography Education have increased in recent years. In addition, at the end of the analyses, it was comprehended that there are 330 different authors contributing to the related field. It was determined that a total of 535 different keywords were utilized in 196 articles, and the most effective journal was the “Journal of Geography and Environmental Education”. Besides, it is observed that the researchers from 25 different countries have published some articles that contribute to the field. In this regard, the most active country is the United States, and it is respectively followed by Britain, Australia, and Turkey. That Turkey with 18 articles takes place at the 4th rank among the 25 different countries indicates that some comprehensive studies related to this field are carried out.
|
<urn:uuid:3e3cb870-8496-466e-b79f-eaf35be3cbb3>
|
CC-MAIN-2023-50
|
https://rigeo.org/menu-script/index.php/rigeo/article/view/327
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.970487 | 395 | 2.78125 | 3 |
Drug Used for Sleep Disorders Is Linked to Higher Risk of Overdose in Teens, Young Adults
Benzodiazepine treatment is associated with an increased risk of overdose compared with other prescription sleep medications, Rutgers researchers say
Teens and young adults who are treated for sleep disorders with benzodiazepines such as Xanax – a medication commonly prescribed to treat anxiety and insomnia – may be at a higher risk of overdose, according to Rutgers researchers.
The study, published in JAMA Network Open, examined how often young people with sleep disorders had a drug overdose in the months after starting a prescription sleep medication.
According to the National Institute on Drug Abuse, benzodiazepines were involved in 12,290 overdose deaths in 2020, up from 6,872 in 2011 and 1,135 in 1999. However, Rutgers researchers said the risks of drug overdose in youth populations prescribed a benzodiazepine treatment for insomnia was unclear.
Researchers found young people using benzodiazepines for common sleep conditions had an increased risk of overdose during the six months after starting treatment compared with other prescription sleep medications, including trazodone, hydroxyzine and z-hypnotics.
“The risk of drug overdose with benzodiazepine treatment is an important safety consideration when treating adolescents and young adults,” said Greta Bushnell, an author of the study and a faculty member at the Center for Pharmacoepidemiology and Treatment Sciences at the Rutgers Institute for Health, Health Care Policy and Aging Research (IFH). “We hope these results can inform prescribing decisions and encourage close monitoring in this young patient population.”
Using a commercial claims database covering privately insured young people ages 10 to 29 years old, researchers identified nearly 90,000 people newly receiving benzodiazepine or an alternative prescription treatment for a sleep disorder. Researchers then examined drug overdoses in this group in the six months following the start of treatment.
Researchers also found the risk of overdose was highest among young people starting treatment with benzodiazepines who recently were prescribed an opioid.
“Given the frequent co-use of benzodiazepines with other substances, it is important to discuss with young people the potential associated harms,” said Bushnell, who is an assistant professor at the Rutgers School of Public Health. “Because other substance use may be unknown to the prescriber, adolescents and young adults should be screened for substance use and a history of overdoses before treatment.”
Bushnell said continued research is needed to determine how specific benzodiazepine treatment details, such as dosage, alter the risks of overdose.
Coauthors of the study include Tobias Gerhard of the Center for Pharmacoepidemiology and Treatment Sciences at IFH and the Ernest Mario School of Pharmacy at Rutgers and collaborating faculty at Columbia University Mailman School of Public Health, Columbia University Irving Medical Center and New York University School of Medicine. Research was supported by the National Institute on Drug Abuse (5K01DA050769).
|
<urn:uuid:e0e56977-b6c5-4b7f-b57d-27ed73e15b34>
|
CC-MAIN-2023-50
|
https://rutgershealth.org/news/drug-used-sleep-disorders-linked-higher-risk-overdose-teens-young-adults
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.935531 | 612 | 2.734375 | 3 |
The ARM Cortex-M is technically a microprocessor, but it is designed to enable microcontroller implementation and is commonly used as the core for microcontrollers. The key difference between a microprocessor and microcontroller is that a microcontroller integrates memory and peripherals along with a processor core in a single chip, while a microprocessor is just the processor core. The Cortex-M is the processor core that ARM offers for microcontroller development.
What is a Microprocessor?
A microprocessor is the central processing unit (CPU) or processor core of a computer system. It is a single integrated circuit (IC) chip that contains arithmetic, logic, control and interfacing functions to process data and execute instructions. A microprocessor does not contain built-in memory or peripherals. It requires external memory, peripherals and interfaces to function as part of a complete microcomputer system.
Microprocessors are designed to be general purpose so they can be used in many different applications. Popular microprocessor families include Intel x86, ARM, MIPS, PowerPC, SPARC and RISC-V. Microprocessors power everything from personal computers to smartphones to embedded systems.
What is a Microcontroller?
A microcontroller is a self-contained system-on-a-chip with a processor core, memory and programmable peripherals. Microcontrollers integrate key components of a microprocessor system onto a single chip. They contain memory and interfaces needed to function, requiring minimal external components.
Microcontrollers are designed for embedded applications so they are compact, low power and inexpensive. They are widely used in automatically controlled devices and products like home appliances, remote controls, toys, office machines, medical devices, power tools and motor vehicles.
Leading microcontroller architectures include 8051, PIC, AVR, ARM Cortex-M and MSP430. Microcontrollers may use 4-bit to 32-bit processor cores, with lower power 8-bit and 16-bit cores being common in basic models.
ARM Cortex-M Microcontrollers
The ARM Cortex-M is a family of 32-bit RISC processor cores designed specifically for microcontroller applications. Cortex-M cores are ARM implementations intended for deeply embedded, real-time, low-power, cost-sensitive devices. The Cortex-M is the most widely used 32-bit microcontroller architecture.
Though a microprocessor itself, Cortex-M cores have features tailored for integration into microcontroller ICs. The cores are compact, power-efficient, include memory protection capabilities and have a fast interrupt response. They are coupled with embedded flash memory, SRAM, peripherals and analog components to create complete microcontroller chip solutions.
ARM licenses Cortex-M processor IP to semiconductor companies who fabricate and sell Cortex-M based microcontrollers. Major vendors include NXP, STMicroelectronics, Microchip, Cypress, Silicon Labs, Renesas and Nuvoton. There are over 15 billion Cortex-M chip shipments across a diverse range of products and electronics.
Cortex-M Core Design
The Cortex-M is a 32-bit reduced instruction set computer (RISC) processor utilizing the ARMv6-M/ARMv7-M/ARMv8-M architectures. It uses a load-store architecture with only LDR, STR and LDM ARM instructions able to access memory. Data processing occurs using registers only. This allows simple, low cost microcontroller implementation.
Key attributes of Cortex-M cores include:
- 3-stage pipeline to achieve high performance at low power
- Nested Vectored Interrupt Controller
- Optional Memory Protection Unit
- Thumb-2 instruction set for improved code density
- Deterministic real-time response with low interrupt latency
- Integrated sleep modes and wake-up interrupt controller
- Processor core, bus interfaces, debug logic and interrupts packaged as IP modules
The NVIC enables low latency interrupt handling with configurable priority levels and vector tables. The MPU provides memory partitioning and access control. Thumb-2 gives Thumb instruction compression with additional 16 and 32-bit instructions. Idle sleep modes reduce power consumption. Module-based implementation allows custom SoC integration.
There are multiple Cortex-M core variants designed for different applications. The cores scale from small, low-cost microcontrollers to higher performance applications. Some notable Cortex-M cores include:
- Cortex-M0/M0+ – Ultra low power 32-bit core for cost sensitive and power constrained MCUs.
- Cortex-M3 – Mainstream MCU core delivering balance of performance and cost.
- Cortex-M4 – Digital signal control with DSP instructions and floating point unit.
- Cortex-M7 – Highest performance MCU core with microcontroller features.
- Cortex-M23/M33 – Real-time cores with microcontroller features plus ARMv8-M architecture.
Vendors implement Cortex-M cores in various microcontrollers with different memory sizes, peripherals and interfaces tailored for target applications. Cortex-M cores are even combined with application specific hardware accelerators in some microcontrollers.
Microprocessor vs Microcontroller Summary
- A microprocessor consists of just a processor core and must be combined with external components to function as a microcomputer system.
- A microcontroller integrates a microprocessor core along with memory, peripherals and interfaces in a single chip.
- The ARM Cortex-M is a microprocessor core designed specifically for microcontroller implementation.
- Cortex-M cores are widely used in MCU chips across a broad range of embedded applications.
So while the Cortex-M is technically a microprocessor, it was created for microcontroller development. Microcontroller vendors incorporate Cortex-M cores along with other components into complete MCU solutions. This enables the ARM Cortex-M to effectively serve as the processing brain within microcontroller ICs targeting the embedded computing market.
|
<urn:uuid:39e22f50-e9cf-4314-ad20-c20b924d513a>
|
CC-MAIN-2023-50
|
https://s-o-c.org/is-the-arm-cortex-m-a-microprocessor-or-a-microcontroller/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.858276 | 1,215 | 3.65625 | 4 |
It’s a fact of life as old as the art of hunting and gathering. Hurling rocks, hurling spears, discus, logs, people, tables, boulders, seeds. There’s no judgment here as to what you hurl. But I will say, some methods for hurling things are better than others. Our arms can only get so strong; our bodies are limited machines when it comes to launching large objects over great distances. This is not what human beings were made for. So we made machines that were made to hurl things.
- Catapult technology, basic as it may seem compared to our computers and modern firearms, is still totally relevant today.
- The ancient Greeks developed the catapult, and it was present throughout almost every conflict in history from that point forward, and is still used in the modern age.
- But catapults are good for more than just destruction and the siege of cities. Even in a survival situation catapults can find a useful application.
“Catapults are more than simple siege engines – they are tools, and just like any tool they can be used for a wide variety of purposes.”
|
<urn:uuid:db6dc81f-93a8-4d15-a36e-9049b2362c95>
|
CC-MAIN-2023-50
|
https://safetytechspy.com/survival-catapults-applications-and-designs-through-the-ages/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.970621 | 242 | 3.03125 | 3 |
Not to abolish, but to fulfill
The Evangelist Matthew wrote his Gospel for Jewish converts to Christianity. His main purpose was to prove that Jesus was the promised Messiah, prophesied in the Old Testament. At the beginning of the Sermon on the Mount, Matthew addresses the concerns of Jewish Christians – does Jesus fit well into the scheme of Mosaic law and teaching? Matthew uses Jesus’ own words to affirm: “Do not think that I have come to abolish the law or the prophets; I have come not to abolish but to fulfil.” (Mt. 5 17).
Jews divided the Old Testament into three sections – Law, Prophets, and Writings. Sometimes, as mentioned in today’s scripture passage, the Old Testament was divided into just the Law and Prophets, in which the section of prophets also included the writings. In its strictest sense, The Law (in Hebrew – Torah) means the Ten Commandments of God. In a broader sense, this section includes all five books of Moses – Genesis, Exodus, Leviticus, Numbers, and Deuteronomy.
When Jesus said that He had not come to abolish but to fulfill the law, He was speaking about the essence or the true purpose of the law. The Old Testament was interpreted by the scribes through many oral laws which were called scribal laws. These laws were later codified and came to be known as Mishnah. These interpretations of the laws were extremely legalistic and were binding for religious Jews. Then, many Rabbis wrote further commentaries on these scribal laws (Mishnah), called Talmud. There are 60 volumes of Babylonian Talmud.
For Jesus, the Torah was meant to bring life. The purpose of the law was to bring us closer to God. The law taught us only one thing and that is to centre our lives in God, by giving Him our reverence. The Torah helped us to respect God, our fellow human beings, and ourselves. It gave us a unique dignity to be the children of the ‘Most High’ God. The Sermon on the Mount is the teaching of Jesus to restore the relationship with God by restoring the meaning of Torah.
There is always some limitation within the law. The Mishnah and then the Talmud tried to reduce these limitations, in fact, they augmented them. Jesus was trying to set before the people, not just the law of God but rather what it stands for – the Love of God. The demands of the law can exhaust, but the demands of love are eternal. There should be no limit to the love of a true disciple of Christ.
-Fr Ranjan D’Sa, OCD
|
<urn:uuid:96f9020a-70bc-454e-865f-57f6942d1886>
|
CC-MAIN-2023-50
|
https://saintdominic.ca/sermon/6th-sunday-in-ordinary-time-reflection-february-12-2023/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.981059 | 549 | 3.359375 | 3 |
Digital object identifiers (DOIs) are permanent digital tags that can be used to uniquely identify pieces of intellectual property on digital networks. DOIs are widely used to identify academic and professional publications, such as journal articles, books and book chapters, reports, and datasets.
The DOI system was introduced in 2000. The system is governed by the International DOI Foundation (IDF). The DOI system’s purpose is to prevent information objects from becoming lost as they move and their URLs change on the internet. Registration agencies such as Crossref in academic publishing coordinate the assignment of DOIs, with 275 million DOIs assigned to date. There are over 5,000 assigner organizations, including academic publishers, that make sure that the DOI points to the current location of the published item.
For academic publishers, the ability to attach a DOI at any level of granularity, whether to a journal article, book, book chapter, or even to a citation, enables academic publishers to make content permanently accessible. Identifying objects rather than locations means that content never gets lost.
The DOI has two parts, a prefix and a suffix, separated by a slash, for example 10.2478/jdis-2021-0030. The prefix identifies the organisation that registered the DOI. This usually takes the form 10.NNNN where NNNN is a four digit number greater than or equal to 1000 and the “10” identifies it as part of the DOI system. In this case, the prefix is 10.2478 and identifies the article as published by De Gruyter, of which Sciendo is a part. The suffix jdis-2021-0030 identifies the specific piece of intellectual property. In this case, it identifies article 30 published in 2021 in the Journal of Data and Information Science. This suffix is decided by the publisher.
The primary benefit of a DOI is that it is permanent. The DOI is unique and remains fixed over the life of an object. The DOI can be attached to metadata about the object and won’t change, whilst the location of the objective and other metadata may change. If an object moves, the DOI infrastructure is updated by the assigner organisation to reflect the move. This means that readers are always directed to the object when they click the DOI, even if an object has moved to a new location or website.
Referring to an online document through its DOI provides a more stable and permanent link than directly using a URL.
DOIs make it easier to measure impact from research, such as numbers of views and downloads, use in government documents and news sources, and mentions on social media. Many of the tools that measure impact use DOIs to capture data related to content usage across different platforms. Whereas it can take months to years for traditional citations to appear in the academic literature, mentions in social media can provide an immediate measure of impact. So by including the DOI in all references to a publication, whether a social media post or a citation, it helps to improve the visibility and usage of any research.
Research shows that journals and books with DOIs have a higher average number of citations than those without a DOI. They are more visible and more easily found. DOIs also address one of the major historic problems with research citations, which is broken links. Many web addresses disappear within a few years of being cited, an effect known as ‘link rot’. The persistent nature of the DOI prevents this. By using a DOI in your referencing of your and others’ works, and having other academics reference your work with the DOI, you can be sure that citations will always be accurate and point to the published version of the article. The DOI is a guaranteed location for the item cited because it will always resolve to the current web address.
In a previous article entitled Publishing your first academic book, we advised early-career researchers to start publishing articles in reputable journals as a way to get experience and build up a career as academic authors. Open-access journals are particularly helpful because they are not behind a paywall and can reach a wider audience.read more
The research process expects ethical behaviour and good practice. As plagiarism and self-plagiarism are on the increase, scientific publishers are using software to detect these instances of scientific misconduct.read more
The presented study is the result of the research project ‘Open Online Learning for Digital and Networked Society (3.3-LMT-K-712-01-0189)’, funded by the European Social Fund according to the activity ‘Improvement of researchers’ qualification by implementing world-class R&D projects’ of Measure No. 09.3.3-LMT-K-712 under the grant agreement with the Research Council of Lithuania (LMTLT).read more
|
<urn:uuid:41eacdf4-5d14-4f1e-b323-a191d53bb919>
|
CC-MAIN-2023-50
|
https://sciendo.com/blog/how-the-introduction-of-doi-numbers-changed-academic-publishing
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.92635 | 979 | 3.21875 | 3 |
In an ideal and picturesque world, retirement is a golden epoch in an individuals life, where they are able to relax and enjoy the twilight years of their life in the company of their family and friends. In addition to this, they are rewarded for their years of hard work and significant contributions to the economy with a deserved pension, which is available to them in conjunction with any additional savings they may have earned over time. With the advances in medicine improving health conditions and the longevity of life, it is supposed to be a durable and well earned reward for the hard working individuals of the US.
However, the harsh reality of existence rarely reflects an individual ideology, and the instance of retirement is a case in point. There is a global phenomenon of people retiring at an increasingly elderly age, and particular employment reforms in the US are ensuring that this trend is being reflected throughout the nation. The UK and France are also seeing modifications to their legislation which is deferring the average age of retirement, creating a generation of individuals who are forced to delay enjoying the fruits of their labors.
Given the combined and individual levels of debt that continue to strange the life out of contemporary societies, it is little wonder that people are being forced to work harder and longer for their retirement purse. The recent global recession has not helped the matter, and governments are being coerced into delaying the standard retirement age to ensure the stability of social security, and also help to maintain an able economy. However, while the concept of a national debt is one thing, this issue is compounded when the levels of consumer debt remain so high and prevalent.
These individual but interwoven types of debt create a marriage of inconvenience, combining restricted governments who are forced to consider raising the retirement age with individuals who are required to work to ensure their financial security. This enables the government to serve the dual purpose of reducing the states burden of pension repayments and striving to energize the economy, all without too much objection from union bodies and workers and themselves will benefit from the reforms.
It also places the burden of financial security with each individual and household, making every one responsible for their own fiscal circumstances. While it is only fair that workers receive a state pension based upon their years of contributions to the economy, this should not be a sole source upon which an individual bases their retirement plans. With consumer debt at an untenable and unprecedented rate in the US, it is wise for governments to impart a level of responsibility on their citizens to manage their independent wealth.
Perhaps the main issue to deferring the retirement age is the concept of fairness to a specific demographic. While there are individuals who are burdened with their own consumer debt and drives their need to work until their 70’s and beyond, there are others who have managed their work and financial responsibilities diligently that are being denied their pension when it should be due to them. By imposing a general rise in the age of retirement, and administering financial penalties to public sector workers who decide to retire earlier, a government could be accused of treating factions of its public unfairly.
This issue of fairness is important, especially as legislation is amended at different periods through an individuals working life. This means that a worker will begin their career with an expected retirement age and state pension sum, only to see these modified through the course of time and financial hardship. This creates a volatile and unsteady environment for people in regular employment, as they are unsure as to the validity and nature of their pension and its repayments. These changes do not necessarily reflect the amount of contributions and wealth that an individual has reinvested into the economy.
The most suitable way for an individual to achieve their own financial security is to take ultimate responsibility for their savings and expenditure. By developing and retaining a tight control on their own financial activity, a person can strive to develop a sizeable savings fund and therefore have no further need to rely on a state or government pension. In this instance, and regardless of the state of the US economy at any given time, financial independence can be maintained across a broad range of society.
This independence serves two specific purposes. Not only does it help to create a generation of individuals who are financially aware and deposed to save their money for their own future requirements, but also means that the government can use legislation to reduce their burden of pension repayments in accordance to a citizens affluence and level of savings. It is through the encouragement and development of responsibility amongst citizens that financial security can be assured without them having to delay their retirement.
|
<urn:uuid:eba91060-dc69-432c-ad1c-ea6a7caac2fb>
|
CC-MAIN-2023-50
|
https://search.excitingads.com/retirement-and-the-burden-of-debt/?v=2ac843586882
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.972046 | 908 | 2.71875 | 3 |
Most people think of the conical, Colorado-native, pin-needled tree when they hear the term “blue spruce.” When you compare this large tree with the ground-loving Sedum Blue Spruce plant, the two almost couldn’t be any more different. Yet if we were the size of small insects, Sedum Blue Spruce might seem as big as blue spruce trees.
If you’re curious about this fast-growing sedum, you’ve come to the right place. We’ll discuss what Sedum Blue Spruce looks like, how to care for it, and what issues you may encounter. Sedum Blue Spruce makes a colorful, calming addition to any garden, even if you don’t have the world’s greenest thumb.
What is Sedum Blue Spruce
A member of the Crassulaceae family of the genus Hylotelephium, Sedum Blue Spruce originally grew in the highest elevations in North America and drier parts of South America. A popular stonecrop, Sedum Blue Spruce is a perennial succulent that requires little in the way of water and lots in the way of sun. This plant provides tight ground cover and spreads rapidly as it grows.
Sedum Blue Spruce has often been used as a lawn substitute. It lives for about 10 years and turns purple when temperatures begin to drop. As the inclusion of “blue spruce” in the name suggests, Sedum Blue Spruce leaves look similar to blue spruce or conifer needles.
Sedum Blue Spruce is also known by the following names:
- Sedum reflexum
- Sedum rupestre
- Blue Spruce Sedum
- Stone Orpine
- Jenny’s Stonecrop
- Blue Spruce Stonecrop
- Crooked Yellow Stonecrop
Did you know that Sedum Blue Spruce is an edible plant? You can use it as an herb or add it to your favorite salads for a pop of color.
Plants Similar to Sedum Blue Spruce
Believe it or not, many other blue-colored sedum plants exist, some of which bear additional resemblance to Sedum Blue Spruce, including:
- Sedum cauticola (Showy Stonecrop)
- Sedum acre (Moss Stonecrop)
- Sedum erythrostictum (Frosty Morn)
- Sedum kamtschaticum
- Sedum rupestre (Angelina)
- Sedum spurium (Elizabeth)
- Sedum cyaneum (Rose Carpet)
Many other miscellaneous succulent plants share similar characteristics with Sedum Blue Spruce.
Sedum Blue Spruce Characteristics
Like many other sedum for groundcovers, Sedum Blue Spruce exemplifies what it means to be a hardy plant. This sedum can be grown in a border or a sedum tapestry. It’s easily identifiable by soft, pale blue needles. Despite their prickly look, Sedum Blue Spruce needles don’t poke like blue spruce tree needles.
This stonecrop grows anywhere from 12 to 18 inches across when fully mature, though it can quickly spread out from there unchecked. Height varies from three to four inches up to six inches tall when in bloom. Sedum Blue Spruce typically grows in stony, rocky areas with little water.
Slower-growing sedums beware of Sedum Blue Spruce, which quickly overtakes unclaimed soil to extend its reach. During the summer, Sedum Blue Spruce sprouts clusters of bright yellow flowers attractive to bees and butterflies. These flower cluster spikes can push the plant’s height to nine to 10 inches during June and July.
Sedum Blue Spruce Care
If you plan on using Sedum Blue Spruce as a bedding plant, it’s best to plant them about 10 inches apart. Doing so will help them spread out and still fill the spaces between other plants without overcrowding. Sedum Blue Spruce doesn’t require a lot of ground cover, as the roots can easily take hold at a shallow depth.
If you foster Sedum Blue Spruce plants in pots or containers, pinch or trim them for bushier growth. Read on to learn more about how to care for your Sedum Blue Spruce plant.
Sun and Soil
Full sun and well-drained soil make any Sedum Blue Spruce plant happy. You can grow this particular sedum in USDA Zones 3 through 9 in any pH-level soil. Sedum Blue Spruce prefers full sun but tolerates shade once in a while. This sedum thrives in gravelly or sandy soil without much need for fertilization.
Indeed, too rich of soil will create floppy tendrils in a Sedum Blue Spruce. Many gardeners fill out green roofs, rock gardens, and mass plantings with Sedum Blue Spruce. The dynamic shaping of the leaves and the green-blue coloring give this plant depth among other vibrant sedums and succulents.
Sedum Blue Spruce survives on very little water. This drought-resistant sedum requires watering from below the ground or at ground level only, especially during the growing season. Avoid planting Sedum Blue Spruce where water can pool, as damp conditions offer plentiful breeding grounds for all kinds of infections. When you do plant Sedum Blue Spruce, water only enough to where the soil settles. Refrain from watering again until temperatures climb.
You can propagate Sedum Blue Spruce via cuttings, root ball division, layering, or sowing seeds. If you plan on sowing seeds—indoors or out—wait until the frost has gone. You can also break part of the healthy plant off in early or late summer and plant it in the soil. Roots will begin to take hold, and a new Sedum Blue Spruce will appear.
Common Sedum Blue Spruce Issues
Common pests that affect Sedum Blue Spruce plants include:
Bacterial and fungal infections typically occur in damp conditions where soil retains water for extended periods. Overcrowding and overwatering can push plants to decline further. However, Sedum Blue Spruce is rabbit and deer-resistant.
A reader name Roger from North Carolina wrote in asking if his Sedum Blue Spruce was dying after notice discoloration and brittleness among the stems.
I planted some Blue Spruce Sedum a few weeks ago and now some of the plants are getting red at the lower end of the stems and they break off when you touch them. I fear they are dying. Can you tell me what this might be caused by and how I can cure it?Roger from Cornelius, NC
If your Sedum Blue Spruce exhibits red stems that are brittle to the touch, the plant may be going through an adjustment phase. The coloring also indicates a physiological response to brighter light, higher temperatures, and drier conditions. Sedum Blue Spruce should regulate itself with some time, but keep a close eye on it in case anything changes.
Now that you know more about Sedum Blue Spruce, visit your local nursery to purchase a few plants of your own. This sedum plays well as a backdrop plant, ready to provide muted blue colors to an otherwise vibrant garden. Add a few more sedum plants, and you’ve got the beginnings of your own xeriscaped garden.
|
<urn:uuid:1c3e12e1-8fd1-4936-b7bf-b9c8db659f52>
|
CC-MAIN-2023-50
|
https://smart-plants.com/sedum-reflexum-blue-spruce/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.903333 | 1,557 | 2.765625 | 3 |
Confused about carbs? Our nutritionist Stefanie clears things up and throws in some tasty healty carb-loaded recipes as well…
Everyone’s confused about carbs?
Well, why shouldn’t you be? One day you’re told carbs are bad, the next day they’re good. This friend lost 20 lbs on a low carb diet; another one lost 15 lbs on a high carb diet.
So, what is a carbohydrate?
Carbohydrates are a macronutrient derived from plant foods ONLY (very few exceptions). Plant foods consist of all fruits, vegetables, grains (i.e. wheat and rice), legumes (i.e. beans, peanuts and cashews), nuts and seeds. When ingested they are broken down into their simplest form, glucose, which is the main energy source for all cellular processes.
What’s the different between complex and simple carbs?
When consuming carbohydrates, it is best to consume complex carbs — those in their most natural unrefined form (i.e. whole fruits, vegetables and grains). These are digested slowly and enter the bloodstream at a moderate rate for a period of several hours.
When refined (simple) carbohydrates (i.e. white flour, white sugar products and processed foods) are consumed, they tend to enter the bloodstream in a rush causing a sudden spurt in blood sugar levels. Thus, the body’s regulation mechanism kicks into high gear flooding the bloodstream with insulin and other hormones to bring the blood sugar levels down to acceptable levels.
High consumption of refined carbohydrates can disrupt the finely tuned regulation process which can lead to high blood glucose levels and, ultimately, diabetes. In addition, a diet high in refined carbohydrates will also be deficient in vitamins, minerals and enzymes, those body-building elements that keep the glands and organs in good repair.
Try these HEALTHY TASTY CARB RECIPES
Hummus* (8 servings)
2 cans 14-oz chick peas drained-keep liquid
4 lemons juiced
1/4 cup Extra virgin olive oil
1 clove small garlic whole
salt to taste
Put all ingredients in food processor and purée. If consistency is too thick, slowly add chick pea liquid. Add salt to taste.
Vegetable Fried Rice (4 servings)
1 cup short grain brown rice
2 cups water
1 strip kombu
3 small zucchini, small dice
4 scallions, sliced thin
1 tablespoon sesame oil
2 tablespoons soy sauce
2 tablespoons mirin
1 teaspoon toasted sesame oil
Rinse rice with water in fine mesh strainer. Place in a small pot with
water and kombu. Cover and bring to a boil on high heat; once boiling, turn
to simmer and cook for about 30 minutes. Meanwhile, prep vegetables; heat
sesame oil in saute pan on medium flame and saute vegetables until slightly
browned. Add finished rice (removing and discarding kombu), tamari and
mirin; saute for about 5 minutes. Turn off flame and add toasted sesame oil;
mix thoroughly. (Recipe By: Stefanie Bryn Sacks)
Cascadian Farms frozen vegetable Blends:
Great to stir fry; then throw OVER rice.
Warm Shaved Fennel with Spring Onions* (4 servings)
6 fennel bulbs sliced thin
2 tablespoons extra virgin olive oil
3 spring onions (or scallions) sliced thin
4 basil leaves picked and chopped
1/2 cup pine nuts toasted
to taste salt
to taste pepper
Slice fennel paper thin (if possible). Heat olive in pan on medium heat and saute fennel until slightly clear. Meanwhile, toast pine nuts in a dry pan (watch carefully for they burn easily), wash and slice spring onions; wash, pick and roughly chop basil. In a large bowl, add all ingredients, mix well and salt and pepper to taste.
*NOTE from SNOETY: We tried these and loved them.
(Source of recipes: Stefanie Bryn Sacks)
|
<urn:uuid:845e5c0b-c831-42f4-97de-f03eb0f56a83>
|
CC-MAIN-2023-50
|
https://snoety.com/2008/04/10/carbs-the-good-the-bad-the-tasty/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.852748 | 870 | 2.5625 | 3 |
The purpose of this study was to compare effectiveness of a word study phonics technique called word sorts on word recognition, pseudoword recognition, phonological awareness, and spelling between a group of children with mental retardation and a group of struggling young readers without identified disabilities. Word sort instruction involved categorizing words into groups based upon common sound and spelling patterns. As sessions progressed, both groups of children were successful at completing the sorts. A MANCOVA revealed that there were no significant differences between the groups on posttest measures of word recognition, pseudoword recognition, phonological awareness, and spelling while holding pretest performance on these variables constant. There was variability in performance within groups, especially within the group of children with mental retardation. Some children within the groups made more substantial gains from pretests to posttests than others. Children without disabilities made greater gains on a pseudoword naming task. Implications are discussed for how the word sort technique provides an analogy-based approach for helping children read words unknown to them.
|
<urn:uuid:5815010f-38ca-449d-8f63-23ad5c460d7e>
|
CC-MAIN-2023-50
|
https://speechbite.com/article/15060/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.947333 | 205 | 3.40625 | 3 |
Have you seen our freebie page? Helen and I have made a range of handouts that you can download for free.
- Comprehension. Our first handout gives general advice on how to support a child’s understanding of language. The advice is general, but there should be something useful for all ages.
- Expression. As with the comprehension handout, the expressive handout gives ideas and tips for all levels and abilities.
- Speech sounds. Here we give advice about how to interact and support a child with unclear speech. It can be tricky to know what to say when you haven’t understood something a child has said to you, but here are some tips on what to do.
- Signing. In this handout we discuss why and how to sign with a child. Many parents are concerned about using signing with their child in case it stops them from speaking. This is not true! For more advice have a look at the handout!
- Questions to ask on school visits. Picking a school for your child is always a really hard job. This is even more true if your child has some additional needs. Here we run through some questions that it might be useful to ask when you visit prospective schools.
- Useful websites. There is so much information out there nowadays, it can be hard to know what is good information that can be trusted. Here are some trusted websites.
- First words series. We then have 3 handouts looking specifically at encouraging early words – more, go and up. They go through how to teach the words and get a child to use them.
Helen has mentioned that soon (fingers crossed) we will have a shop on the blog and are hard at work finishing our first book. Our book is going to be a guide for parents on how to access Speech and Language Therapy and make the most of it. Also general hints and tips about how to support your child’s communication. Although the book is aimed at parents, we know there is lots of useful information in it for Speech Therapists and other professionals.
We also intend to sell resources and other useful Speech Therapy related items in the near future.
Click on the picture below to join our mailing list. You will receive updates about the book, new handouts and other news from the site.
|
<urn:uuid:432dc5fa-5c94-490e-a0ca-8b1cc6a28960>
|
CC-MAIN-2023-50
|
https://speechbloguk.com/downloadfreebies/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.954441 | 478 | 2.984375 | 3 |
Ashwagandha (Withania somnifera) is commonly known as Indian ginseng, or winter cherry, and it is one of the most important herbs used in Ayurveda (a system of Indian medicine developed in ancient times). In traditional Hindu philosophy, it is treated as a rejuvenating agent, the so-called Rasayana. Ayurveda describes Rasayanas as compounds which counteract the effects of old age and disease.
The ASHWAGANDHA 600 Sport Edition, with KSM-66, has a very broad spectrum of actions:
- it supports the functioning of the nervous system (it improves the memory),
- it supports the functioning of the reproductive system (it boosts sexual functions),
- it supports the functioning of the immunological system (it improves cell immunity),
- it has antioxidating properties, which help protect cells against reactive forms of oxygen
- its ingredients and dosages are identical to those used in clinical trials
- one pack provides up to a month of supplements
- it applies a holistic mechanism in its action on the body of an athlete
Withania somnifera, originally known as an adaptogen, increases the resistance of the body to stress.
KSM-66 is a patented Ashwagandha extract with the highest concentration of active compounds in the world. The manufacturer needed as many as 14 years to develop the extraction process for the purpose of the isolation of such a rich raw material.
|
<urn:uuid:fc347152-6eb3-4800-92b3-c633f50f742d>
|
CC-MAIN-2023-50
|
https://supplementmad.co.uk/products/ashwagandha-600-sport
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.940841 | 303 | 2.71875 | 3 |
The Digital Millennium Copyright Act (DMCA) is a United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization (WIPO). It criminalizes production and dissemination of technology, devices, or services intended to circumvent measures (commonly known as digital rights management or DRM) that control access to copyrighted works. It also criminalizes the act of avoiding an access control, whether or not there is actual infringement of copyright itself. Overall, the DMCA heightens the penalties for copyright infringement on the Internet.
Written by RedUpdated over a week ago
|
<urn:uuid:d5f162a0-699a-4d0a-83d2-74fc1a159df9>
|
CC-MAIN-2023-50
|
https://support.cherry.tv/en/articles/5366663-what-is-dmca
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.872919 | 113 | 2.859375 | 3 |
While food cravings are a well-known symptom of pregnancy, surrogate and otherwise, it’s still not quite understood what causes them. Some experts believe they’re meant to indicate nutritional deficiencies in a woman’s diet, while others believe that the types of food being craved are indicative of the baby’s gender.
In a recent survey, 80% of pregnant women said they’d experienced food cravings. 40% of them craved something sweet, 33% wanted salty foods, 17% craved spicy foods, and 10% craved sour and citrus fruits.
Based on these results, the top ten foods included ice cream, pickles, tomatoes and tomato sauce, lemon, cheese and chocolate. It seems relatively common for women to want animal fats – steak and pork fat, for instance.
Some women want strange combinations – black olives on cheesecake, pickles wrapped in cheese, and eggplant on pizza have all been reported. Exclusively craving a single food is also common – pickled onions, salsa and peaches seem especially popular in that regard.
Following the birth of their baby, many women for some reason experience an aversion to those same craved-for foods.
As stated, experts are divided on the explanation for these cravings – there are several theories. The more popular ones are:
1. Hormonal changes may alter a woman’s senses of taste and smell, making her want food she normally wouldn’t have enjoyed. This theory could also explain why menopausal women often experience food cravings/aversions.
2. They’re a reaction to nutritional deficiencies. For instance, a craving for pickles may indicate low sodium levels in the blood, while a vitamin B deficiency may drive a craving for chocolate. Desire for red meat could indicate a need for protein, while cravings for peaches could be a result of low beta carotene levels.
3. Emotional changes are known to be connected with food intake – a pregnant woman may crave certain foods, consciously or subconsciously, as a response to emotional needs. Often pregnant women want foods that remind them nostalgically of their childhoods, or perhaps their cultural/religious backgrounds, particularly if they haven’t eaten those foods in a while.
Remember that there’s no scientific consensus on this – no data to prove that cravings are related to biological needs, and none to prove that they (generally) are harmful.
But it’s important regardless to watch your diet while pregnant. Find healthy substitutes for the tastes your body is craving, and never deprive yourself of food in general. If problems do arise that prevent you from eating balanced meals and gaining weight as you should, check with your doctor – it may be indicative of something more serious. As a surrogate mother, your intended parents will most definitely appreciate your taking care of yourself.
|
<urn:uuid:f92293bf-787f-4dde-aa75-d29afcb943f3>
|
CC-MAIN-2023-50
|
https://surrogacyinutah.com/food-cravings-during-pregnancy-explained/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.951499 | 593 | 2.578125 | 3 |
Jesus demonstrated that He was the new Moses when He delivered from a mountain the updated law to live by.
He told the gathered crowd, “Judge not, that ye be not judged.”
Jesus elaborated on this principle with an unforgettable metaphor (slightly updated for clarity).
“For with what judgment ye judge, ye shall be judged: and with what measure ye mete, it shall be measured to you again. And why beholdest thou the mote [sliver] that is in thy brother’s eye, but considerest not the beam [telephone pole] that is in thine own eye? Or how wilt thou say to thy brother, Let me pull out the mote [sliver] out of thine eye; and, behold, a beam [telephone pole] is in thine own eye? Thou hypocrite, first cast out the beam [telephone pole] out of thine own eye; and then shalt thou see clearly to cast out the mote [sliver] out of thy brother’s eye.” (Matthew 7:2-5)
Mote and Beam or Sliver and Telephone Pole?
Those familiar with the King James Version rendering know the words “mote” and “beam” well. But our deep familiarity with these scriptural words, that are not used very often in our modern day speech, may keep us from fully visualizing the exaggerated metaphor Jesus employs.
Can you imagine how extraordinarily hypocritical it would be for someone who has a telephone pole sticking out of their eye to criticize someone else for having a small sliver in their eye?
No one could survive with a telephone pole sticking out of their face.
I’m confident Jesus never saw such a scenario in real life.
In fact, Jesus exaggerated in order to make a point.
Great teachers use compelling, unforgettable stories, metaphors, and examples to help learners firmly grasp principles and ideas.
Exaggeration can be an important tool in the teacher’s bag of resources. Of course, we should never exaggerate for unrighteous purposes.
But exaggeration used in appropriate circumstances, making something larger than it really is, to help learners better see the idea or principle, can be a powerful teaching tool.
Great teachers, like Jesus, selectively and purposely employ exaggeration to magnify principles of truth that reverberate across the centuries.
Learning at the Feet of the Savior
I hope you found these insights valuable and empowering. If so, you may find more such insights in one of my recent books.
Together with my co-author David Ridges, we wrote Learning at the Feet of the Savior: Additional Insights from New Testament Background, Culture, and Setting to encourage people to ask questions and to use the scriptures and the example of Jesus to learn how to learn and to better understand how the scriptures apply to their lives.
Join my newsletter and receive a free humorous eBook Memoirs of the Ward Rumor Control Coordinator is a light-hearted look at our beloved
Mormon Church of Jesus Christ of Latter-day Saints culture. When you join my newsletter, it’s a bit like voting for Pedro. Your wildest dreams might come true!
Study the Scriptures like never before with this free app that I helped create: ScripturePlus!
|
<urn:uuid:658655ab-6e04-4b58-974e-4b1e9fecd8af>
|
CC-MAIN-2023-50
|
https://taylorhalverson.com/2019/02/15/do-good-teachers-exaggerate/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.921249 | 684 | 3.203125 | 3 |
Everyone starts at some point to learn something new. However, this concept is valid and invalid for programmers, learning new languages. As every time learn a new programming language, the ritual of writing the first Hello World program remains the same. So it’s always a great thing to start learning any new programming language with a hello world program. Therefore today we’ll start the journey of HTML programming. By learning how to print Hello World in HTML.
One of the easiest and simple programs, you’ll ever write in HTML. The reason is that whatever program you’ll write next is going to be a level up than this one.
What’s The Approach?
- Create basic HTML boilerplate.
- Inside the body tag, simply write
HTML Program To Print Hello World
<html> <header><title></title></header> <body> Hello World </body> </html>
|
<urn:uuid:5429b489-161e-40f9-8d6d-f2b969619e6a>
|
CC-MAIN-2023-50
|
https://techdecodetutorials.com/how-to-print-hello-world-in-html/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.785082 | 189 | 3.25 | 3 |
Directory Services Overview
- Active Directory on Wikipedia
- Lightweight Directory Access Protocol (LDAP) on Wikipedia
- Samba (Software) on Wikipedia
- NetIQ eDirectory
on Wikipedia (previously Novell Directory Services)
- Overview of Novell Directory Services from Novell
- Kerberos (Protocol)
- RFC 1510 - Kerberos from IETF
- Directories, Directory Services, and LDAP from Apache
- Understanding Workgroups and Domains from eTutorials.org
This video presents a brief overview of directory services and related concepts. This information is very helpful in understanding the larger role that many of these services play in modern computer networks.
At its core, a directory service is simply a piece of software that can store and retrieve information. The information stored could take many forms, including user accounts, groups, system information, resources, security settings, and more. By providing a centralized location to store that information, it becomes much simpler to share that information across a large enterprise network.
We’ve already worked with one example of a directory service in this course. The modern Domain Name Service is, at its core, a directory service. It stores a directory of domain names matched to IP addresses, as well as additional information about a domain such as the location of the mail server. It can then provide that information to the systems on a large network, providing a level of consistency that is difficult to achieve if each computer has to store a local version of the same information.
Directory services for computers have also been around for quite a while. This page gives a brief timeline of events, starting in the late 1980s and culminating with the release of Microsoft’s Active Directory Domain Services in 1999. Let’s look at each of these items in detail.
First, the X.500 set of standards was released in 1988, and was one of the first projects that aimed to provide a consistent directory of user account information. It was actually developed as a directory for the X.400 set of standards for email, which at that time was the dominant way that email was handled on the internet. Those standards were developed using the OSI networking protocols. However, with the rise of the TCP/IP set of internet protocols, these systems were quickly made obsolete. X.400 was replaced by the SMTP standards used today to send email between MTAs, while X.500 forms the basis of many later protocols. What is most notable about X.500 is that it actually defined several underlying protocols, including a Directory Access Protocol (DAP), as well as a Directory System Protocol (DSP) and others. Today, we primarily use protocols based on the original DAP defined by X.500.
Soon after the release of the X.500 standards, work began on an implementation of the DAP protocol using the TCP/IP internet protocols. It was eventually named the Lightweight Directory Access Protocol, or LDAP. LDAP is the underlying protocol used by many of todays directory services, including Microsoft Active Directory.
However, it is very important to understand that LDAP is not a complete implementation of the original X.500 DAP. Instead, it implements a core set of features, and then adds some additional features not present in the original protocol, while several parts of the original protocol are not implemented. The maintainers of the X.500 standard are very quick to point out this difference, but in practice most systems fully support LDAP as it stands today.
LDAP also has uses beyond just a directory service for user accounts on workstations. For example, LDAP can be used to provide a user lookup service to an email client, or it can be linked with a website to provide user authentication from a central repository of users.
LDAP, along with many other directory services, defines a tree structure for the data. In this way, the data can be organized in a hierarchical manner, closely resembling the real relationships between people, departments, and organizations in an enterprise. For example, in this diagram, you can clearly see nodes in the tree for the overarching organization, the organizational unit, and the individual user.
LDAP uses several short abbreviations for different fields and types of data, and at times they can be a bit confusing to new system administrators. This slide lists a few of the most common ones, as well as a good way to remember them. For example, an
ou in LDAP is an organizational unit, which could be a department, office, or some other collection of users and systems.
You can see these abbreviations clearly in this sample LDAP entry. Here, we can see the distinguished name includes the canonical name, as well as the domain components identifying its location in the tree. We can also see the common name and surname for this user, as well as the distinguished name for his supervisor. As you work with LDAP throughout this module, you’ll see data presented in this format several times.
Switching gears a bit, in the early 1990s, there were many different software programs developed to help share files and users between systems. One of the first was Samba. Samba is an open source project that originally reverse engineered the SMB (hence the name) and CIFS file sharing protocols used by Windows. By doing so, they were able to enable file sharing between Linux based systems, including Macs, and Windows. Eventually, Microsoft worked with the developers of the project to allow them to fully implement the protocol, and in more recent versions, a computer running Samba can even act as part of an Active Directory domain. We’ll work with Samba a bit later this semester when we deal with application servers.
Around the same time, Novell released their Directory Services software. This was one of the first directory services targeted at large organizations, and for many years it was the dominant software in that area. It was built on top of the IPX/SPX internet protocols, so it required computers to run special software in order to use the directory service.
Much like the LDAP example earlier, NDS also supported a tree structure for storing information in the directory. It also had some novel features for assigning permissions across different users and
ous, which made it a very powerful tool. Many older system administrators have probably worked with Novell in the past. I remember that both my high school, as well as some departments at K-State, used NDS until they switched to Microsoft Active Directory in the mid 2000s.
Before we discuss Active Directory, we should first discuss Windows Workgroups and Homegroups. Most home networks don’t need a full directory service, but it is very helpful to have a way to share files easily between a few computers connected to the same network. Prior to Windows 7, Windows used a “Workgroup” to share these files.
Computers with the same Workgroup name would be able to discover each other across a local network, and any shared files or resources would be available. However, user accounts were not shared, so you wanted to access a resource shared from a particular computer, you’d have to know a username and password for that system as well. For smaller networks, this usually wasn’t a problem at all. However, as the network grows larger, it becomes more and more difficult to maintain consistent user accounts across all systems.
That all changed in 1999 with the introduction of Microsoft Active Directory. It coincided with the release of Windows 2000, one of the first major Windows releases directly targeted at large enterprises. Active Directory uses LDAP and Kerberos to handle authentication, and provides not only a central repository of user accounts and systems, but it can also be used to share security configurations across those systems as well. It was really ideal for large enterprise networks, and gave administrators the level of control they desired. Active Directory quickly became the dominant directory service, and most enterprises today use Active Directory to manage user accounts for their Windows systems. In fact, both K-State and K-State Computer Science primarily use Active Directory to manage their user accounts across a variety of systems and platforms.
With a shared domain, the user account information is stored on the central domain controller, instead of the individual workstations. In this way, any user who has a valid account on the domain and permissions to access a resource can do so, regardless of which system they are connected to. This is what allows you to use the same user account to log on to computers across campus, as well as online resources such as webmail and Canvas. One of the major activities in this lab will be to install and configure an Active Directory Domain, so you can get first-hand experience of how this works.
Lastly, no discussion of directory services would be complete without discussing Kerberos. Kerberos is named after Cerberus, the three-headed dog from ancient Greek mythology. It allows a client and a server to mutually authenticate each other’s identity through a third party, hence the three-headed mascot.
Kerberos was originally developed at MIT in the 1980s, and fully released in 1993 as RFC 1510. It is one of the primary ways that directory services today handle authentication, and it is used by many other types of security software on the internet today.
The Kerberos protocol is quite complex, and it uses many different cryptographic primitives to ensure the communication is properly secured and authenticated. However, this diagram gives a quick overview of the protocol and how it works.
- First, the client will communicate with the authentication server.
- The server responds with two messages, labelled A and B in this diagram. Message A is encrypted by the server using the client’s key. When the client receives that message, it attempts to decrypt it. If it is successful, it can use the contents inside the message to prove its identity.
- Then, it can send two new messages, C and D, to the ticket granting server, which in practice is usually the authentication server, but it doesn’t have to be. Message C includes the contents of message B along with information about what the client would like to access, and message D is the decrypted contents of the original message A. The ticket granting server then looks at those messages and confirms the user’s identity.
- If it is correct, it will then send two more messages, E and F, to the client. Message E is the ticket that can be given to the server containing the desired resource, and message F contains a key that can be used to communicate with that server.
- So, the client finally can contact the destination server, sending along message E, the ticket from earlier, as well as a new message G that is protected with the key contained in message F.
- Finally, the server decrypts message G and uses it to create and send back message H, which can be confirmed by the client to make sure the server is using the same key.
If everything works correctly, both the client and server know they can trust each other, and they have established keys that allow them to communicate privately and share the requested information. Kerberos is a very powerful protocol, and if you’d like to learn more, I highly recommend reading the linked resources below this video. Kerberos is also discussed in several of the cybersecurity courses here at K-State.
That’s all the background information you’ll need for this module. Next, you’ll work on installing Microsoft Active Directory on Windows and OpenLDAP on Ubuntu, as well as configuring clients to use those systems for authentication.
|
<urn:uuid:2e384bc0-faa7-4360-af74-2d957f28b12d>
|
CC-MAIN-2023-50
|
https://textbooks.cs.ksu.edu/cis527/4-directory-services/02-directory-services-overview/index.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.951871 | 2,404 | 3.40625 | 3 |
Edited by Jack Tichenor, Manatee County Agriculture and Extension Service
MANATEE COUNTY -- Smart Irrigation Month is a public awareness campaign to promote efficient water use. Focused on July, traditionally the month of peak demand for outdoor water use nationally, the campaign highlights simple practices and innovative technologies to:
* Make maintaining green spaces easy and convenient.
* Minimize overwatering while keeping lawns, gardens and landscapes beautiful and healthy.
* Save money on utility bills.
* Help protect community water supplies for today and the future.
Property owners and managers typically overwater, unintentionally wasting money every time they take out the hose or turn on the sprinklers. The University of Florida/Manatee County Extension Service Water Conservation Program (Extension Service) promotes smart water-saving practices year-round and offers these suggestions for Smart Irrigation Month:
* Plant and maintain low water use landscapes that will thrive in our local climate and site conditions. Called Hydrozoning, plants can also be grouped into low, medium or high water needs and irrigated accordingly to save water and improve plant health.
* Use low volume micro-irrigation to precisely apply very small amounts of water to gardens, trees and shrubs in mulched beds, minimizing evaporation and waste
* Incorporate non-irrigated hardscapes and mulched areas such as patios, service areas and pathways into the landscape.
* Periodically inspect irrigation system in operation for overspray onto streets, drives, buildings, etc., for leaks, dry areas and broken sprinklers, and for overgrown grass, shrubs and limbs that block spray patterns.
* Check irrigation controller for correct date, time and for compliance with the current watering restrictions.
Your browser may not support display of this image.
* Make conventional irrigation controllers smarter by installing water-saving technology:
o rain sensor shut off switch that prevents watering after an adequate rain,
o soil moisture sensor control device that prevents irrigation when soil moisture is adequate,
o real-time weather based irrigation control that automatically adjusts for weather and seasonal changes.
* Audit irrigation system to make sure water is being used effectively and make necessary adjustments. Contact the Extension Service
to schedule this free, personalized irrigation system evaluation.
* Make use of Manatee County Utilities Dept. rebates for qualifying customers for making recommended water-saving improvements.
* Learn how to apply the above practices and more at free classes and from educational materials provided by the Extension Service.
For more information about how the Manatee County Agriculture and Extension Service can help Manatee homeowners, businesses and property managers, visit http://manatee.ifas.ufl.edu, call (941)722-4524 or visit the office at 1303 17th Street W., Palmetto, FL 34221.
Smart Irrigation Month is an initiative of The Irrigation Association, a non-profit industry organization dedicated to promoting efficient irrigation. Visit www.smartirrigationmonth.org
to learn more. This article contains some material from The Irrigation Association and from IFAS/University of Florida.
|
<urn:uuid:b46a8792-f1b6-4ab4-b616-ec209f238198>
|
CC-MAIN-2023-50
|
https://thebradentontimes.com/stories/smart-irrigation-month-puts-nation-wide-focus-on-saving-water-and-money,11050
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.878288 | 652 | 2.953125 | 3 |
By Denise Loock
Arbitrary capitalization wreaks havoc in written communication. Numerous nouns have been exalted to proper status even though they’re common and should remain common. Revolutionary
writers cry, “Aren’t all nouns created equal?”
We editors should proclaim, “No, they’re not.”
Basic capitalization rules haven’t changed since we learned them in elementary school. Capitalize proper nouns—names of particular people, places, things, or ideas (Queen Elizabeth, Protestant Reformation). Don’t capitalize common nouns—names of people, places, things, or ideas in general (queen, reformation).
Simple. So why do many writers ignore these rules?
The current capitalization chaos may have been passed down to us unintentionally by our forefathers. In centuries past, writers used initial uppercase letters to emphasize and embellish. Thomas Jefferson began the Declaration of Independence this way: “When in the Course of human Events, it becomes necessary for one People …”
Authors, bloggers, and tweeters worldwide have revived this outdated practice. Who’s to say what should be capitalized? If I believe chocolate deserves proper noun status, why should it remain common? Chocolate holds a lofty position in my world, far above any other confection. That iconoclastic mindset leads to the capitalization of words such as patriotism or democracy. Christian writers often capitalize nouns they value: cross, truth, and believer.
Several other capitalization dilemmas plague Christian writers. For example, heaven identifies a particular place—as does hell. Should they be capitalized? The Chicago Manual of Style, Merriam-Webster Dictionary, and The Christian Writer’s Manual of Style (CWMS) say no.
CWMS devotes fourteen pages to “Capitalization of Religious Terms.” Some of its recommendations surprised me: chosen people (Jews), church (body of Christ and a local congregation), the devil (Satan), and the exodus (from Egypt). Also unexpected were garden of Eden, ark of the covenant, and gentile. Other words remain uncapitalized: temple, tabernacle, patriarch, and magi.
Many Christian writers capitalize pronouns that refer to God—such as He, His, You, and Me. But most publishers, Christian and secular, discourage this practice. The running text may conflict
with Scripture quotations if the Bible version cited doesn’t capitalize the pronouns. Some readers, unfamiliar with this means of honoring God, may be more confused than enlightened by the uppercase letters.
The deity pronoun issue becomes more convoluted in novels. Should the pronouns be capitalized regardless of who’s speaking—atheist, skeptic, or Christian? To avoid confusion, editors should recommend lowercase pronouns in dialogue and narrative.
Writers value independent thought and creative license, but individualism creates chaos in the capitalization world. To harness your clients’ uppercase urges, recommend the following:
- Create emphasis with word choice and sentence structure instead of uppercase letters.
- Admit that personal preferences aren’t the standard, and yield to the recognized authorities in the publishing industry.
- Purchase the online edition the Merriam-Webster Collegiate Dictionary.
- Purchase the 2016 edition of The Christian Writer’s Manual of Style.
Capitalization is a helpful tool, but let’s defer to style manuals and the dictionary on proper usage. Since the goal of writing is clear communication, nouns should remain unequal. Sorry about that, Thomas Jefferson.
Denise Loock is a general editor for LPC Books also accepts freelance projects. She teaches Editing Devotionals 101 and Sentence Diagramming 101 for The PEN Institute. As the director of PENCON 2021, she’s committed to helping editors and proofreaders learn new skills, grow their business, and network with other industry professionals.
Contact – [email protected]
General Editor – LPCBooks
Owner – Lightning Editing Services
Founder – Dig Deeper Devotions
Author – Open Your Hymnal Again and Open Your Hymnal
|
<urn:uuid:6d4979e3-4484-4842-94df-7787eb7df265>
|
CC-MAIN-2023-50
|
https://thechristianpen.com/are-all-nouns-created-equal/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.870423 | 880 | 2.6875 | 3 |
What's inside a golf ball?
If you are like most of the rest of us, then yes you have. There was a time when it was an easy question to answer, for golf ball construction was a simple thing.
Evolution of Golf Ball Construction
With the first recognizable form of the game of golf being played in Scotland in the early 1400's, the common golf ball has had nearly 600 years to evolve. Golf ball construction has been through many upgrades and enhancements throughout the history of the game.
Golf Balls Throughout the Ages
There are four distinct stages in the evolution of the golf ball.
Wooden Golf Balls...
With the game of golf getting its roots on the East Coast of Scotland, the first golf balls were made of wood. Wooden clubs were also often used in conjunction with these balls.
Wooden golf balls were used from the mid fifteenth century until the seventeenth century, when the feathery ball was invented.
Feather Stuffed Leather Covered Golf Balls...
In 1618 a new type of golf ball was created by handcrafting a cowhide sphere stuffed with goose feathers. The 'Featherie' golf balls were manufactured while the leather and feathers were wet.
The time-consuming processes involved in creating a Feathery golf ball ensured that the price was out of reach of the masses. Though expensive, this type of ball had great flight characteristics and made the wooden ball virtually obsolete. For over three centuries the Featherie was the standard, only to be replaced with the advent of the Gutta Percha ball.
Gutta Percha (Gutty) Golf Balls...
In 1848 Dr. Robert Adams began creating golf balls out of Gutta Percha "Gutty". The Gutty golf ball was derived from the dried sap of the Sapodilla tree. It had a rubber-like feel and was formed into ball shapes by heating it up and shaping it while hot.
Almost by accident, it was discovered that golf balls with improperly smoothed surfaces often flew straighter and further than their smooth counterpart. This gave birth to the hand Hammered Gutta Ball. These golf balls were hammered with a consistent pattern throughout with a sharp edged hammer.
Rubber Core Golf Balls...
The advent of the rubber core golf ball changed the face of the game of golf as we knew it. This new design was invented in 1898 by Coburn Haskell in association with the BF Goodrich Company. This new and unique golf ball construction and design featured a solid rubber core, high tension rubber thread wrapped around the core, and a Gutta Percha cover.
This new breed of golf ball also featured a much larger variety of outer designs for improved airflow. The mesh, reverse mesh and Bramble designs gave way to the dimple pattern first used in 1908.
Modern Golf Ball Construction
The first automatic winding machine was patented in 1900 by John Gammeter. This allowed the rubber core golf ball to be economically mass produced. From the original wooden ball to the modern rubber-cored , the evolution of the golf ball has changed the way we play the game of golf.
Wound Golf Ball Construction
Wound golf ball construction is when golf balls have rubber thread wound around
one of two kinds of cores: a liquid center, where the core is liquid-filled; or a solid center, in which the core is made of synthetic rubber. This is then wrapped in either a balata, surlyn or another cover whereas Balata covers are rarely made nowadays. The answer to golf ball construction is no longer simple. Many golf ball manufacturers today use different types of materials in the core and even the cover of their balls.
The characteristics of wound golf balls is greatly influenced by the combination of the core and cover material. Generally speaking wound balls are excellent when it comes to spin effect but perform poorly when it comes to carry or distance. Moreover, due to the soft cover materials used to increase the effect of the winding around the core, wound golf balls lack durability.
One Piece Golf Ball Construction
One piece golf balls are golf balls made of a single, high-restitution synthetic rubber
Two Piece Golf Ball Construction
Two piece golf balls are dual-structure golf balls in which a high-restitution core is wrapped in a cover. This configuration enables the energy at
impact to be transferred efficiently to the ball in flight.
While the core of a two piece golf ball is made of a resin type material, the cover has an extremely durable surlyn coat. Manufacturers keep putting an enormous amount of money into the development of new materials that could be used for core and cover such as titanium for example. A harder golf ball will not be compressed as much on impact, which is usually the case with a 2-piece ball, and will tend to slide further up the face of the club head resulting in an higher take-off angle.
Multi-layer Golf Ball Construction
Multi layer golf balls are multi-layer golf balls in which the core material is wrapped in multiple covers. As a result of the latest advances in technology, manufacturers are now able to flexibly combine materials, degrees of hardness, specific gravity, and so on, in ways that enhance a variety of performance features
Three Piece Golf Ball Construction
3-piece golf balls or Multi-Layer Balls are usually made of a large synthetic core, a thin mantel and a coat.
For optimized weight centering some manufacturers use Tungsten-weights in the centre of the synthetic core. A golf ball which is compressed more on the clubface like most wound balls will not slide up the face as much. Because of the ball's greater deformation the reshaping process is more dynamic and the ball has a flatter take-off angle, a higher rate of rotation, more lift and therefore a higher trajectory.
A three-piece golf ball is generally spins more sideways than a 2-piece ball.
Four Piece Golf Ball Construction
4-piece golf balls or Multi-Layer Balls have a small inner core surrounded by the actual core (synonymous with the 3-piece ball design).
This inner core is surrounded by a thin inner mantel which transmits the relevant distance characteristics from the coat to the core and is thus responsible for that special Balata-feeling.
Golf Ball Dimples and Aerodynamics
All golf balls are designed with dimple patterns on the cover to optimize the balls aerodynamics. The dimples can control many different aspects of shots like distance, velocity, spin control, straightness and trajectory.
Golf Ball Drag
There is two types of drag behind a sphere when it is airborne, laminar and turbulent. Laminar flow occurs over a non-dimpled golf ball and the air separates very early in front of the ball, resulting in less carry. A turbulent flow will occur with a dimpled golf ball because it causes the air to not split as soon and increases the pressure drag. Pressure drag is the air separated behind the golf ball.
Golf Ball Lift
A golf ball's dimples also assist with the ball's lift because they can keep the flow 'attached' while the golf ball spins backward. The backspin increases the speed of the upper surface of the golf ball with less friction than the bottom of the golf ball, which decreases in speed due to more friction. The air that passes over the golf ball gets dragged around to the back of the ball, producing its lift.
|
<urn:uuid:1cbd0203-9ecc-4add-a1e4-4659d441dd5a>
|
CC-MAIN-2023-50
|
https://thegolfballcompany.com/pages/golf-ball-construction
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.950019 | 1,521 | 2.828125 | 3 |
QUESTION: Bullying is negatively impacting the mental health of my children. What resources should I look into?
ANSWER: Bullying is intentionally aggressive behavior that occurs within the context of an imbalance of power or strength. It is repeated behavior that can be physical, verbal or social. Boys may bully others physically while girls often bully others verbally and through social exclusion. This is a growing and deeply serious problem and can happen whenever children are together, which is most often at school or online. Preventing and stopping bullying requires a commitment from teachers, parents and students to create a safe environment where children can flourish and prosper socially and academically without being made to feel afraid.
In terms of resources, there are several evidence-based bullying prevention programs that have been successfully implemented in school systems around the country. The most effective are school-wide programs which include curriculum for teaching students appropriate strategies for dealing with bullying, as well as for training teachers and administrators how to provide support to students who report bullying, how to improve observation in areas of the school where bullying most often happens, and how to effectively interrupt bullying. Some of the most frequently implemented and studied programs include the Bullying Prevention program by the U,S. Department of Education’s Center on Positive Behavioral Interventions and Support, Second Step: Social and Emotional Learning Program from the nonprofit Committee for Children, and Clemson University’s Olweus Bullying Prevention Program.
It is important for parents to learn the signs and symptoms a child is being bullied so they can watch for these in their own children and to learn the best ways of responding if necessary and appropriate. Since bullying very frequently happens online and out of the view of others, parents should always be aware of and pay attention to their children’s social media activity. They should also collect their children’s phones at bedtime to prevent overnight bullying (and to help improve their kids’ sleep). Finally, a child who is being bullied can benefit significantly from talking with a licensed behavioral health therapist who can provide support, understanding and suggestions in a private, confidential setting.
This question from a reader was answered by Ed Jones, MA. She practices at Robert C. Byrd Clinic in Lewisburg.
|
<urn:uuid:cd058a62-0a9b-4e84-924b-68989b7ee01d>
|
CC-MAIN-2023-50
|
https://therealwv.com/2023/04/27/ask-the-doc/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.969799 | 450 | 4.15625 | 4 |
Cities in NORTHERN IRELAND
Popular destinations UNITED KINGDOM
English is the main language in Northern Ireland. After all, most inhabitants are descendants of English and Scottish settlers who colonized Northern Ireland in previous centuries. The English spoken here has a typical local accent.
Gaelic (Irish) is still spoken here and there by the Catholic people, although the many Gaelic place names in Northern Ireland suggest otherwise.
A bilingual street sign in Northern IrelandPhoto: Nogger at English Wikipedia CC 3.0 Unported no changes made
There are also minor differences in pronunciation between the Catholic and the Protestant population. The best example of this is the letter "h," which Protestants pronounce as "aitch," as in British English, and Catholics as "haitch," as in Hiberno.
The Ulster Scots (also known as Scotch-Irish, Ullans or Hiberno-Scots) are descended from the Lowland Scots and are still spoken in a few places in Northern Ireland. Ulster-Scots was officially recognized as a European regional language by the European Charter for Regional and Minority Languages at the end of the last century.
As far as the immigrant residents in Northern Ireland are concerned, Chinese is the most widely spoken language, although the Chinese population of 8,000 people is not very large.
Cahill, M. J. / Northern Ireland
Chelsea House Publishers
Day, C. / North of Ireland
CIA - World Factbook
BBC - Country ProfilesLast updated November 2023
Copyright: Team The World of Info
|
<urn:uuid:27c71409-25f2-4600-9f71-11e7cd3c2a66>
|
CC-MAIN-2023-50
|
https://theworldofinfo.com/northern-ireland/language/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.941743 | 322 | 3.359375 | 3 |
Americans love to eat frozen desserts. It has been estimated that more than 90% of all households around the country routinely indulge in sweet, frozen desserts such as ice cream and frozen yogurt. Developed in the 1970s, at the end of 2013, there were about 2,582 stores selling frozen yogurt and frozen yogurt supplies around the nation. Frozen yogurt is a lot like its cousins, ice cream and gelato but is a little different.
- Frozen yogurt has live bacteria in it. To be classified as a yogurt, the United States federal government requires a product have live bacteria cultures in it. That is what makes it yogurt. Most yogurt, including frozen yogurt has Streptococcus thermophilus and/or Lactobacillus bulgaricus. These are what give the yogurt the health benefits so often associated with it as these strains of bacteria are good for promoting digestive health and well being. Not all frozen yogurt has live bacteria. The Food and Drug Administration (FDA) does allow frozen yogurt to be heat treated and that will kill the bacteria. If you are looking for the health benefits, find a frozen yogurt with live bacteria.
- There is a frozen yogurt machine in the Supreme Court. The newest addition to the United States Supreme Court, Justice Elena Kagan, got the people at the cafeteria there to put in a frozen yogurt machine and provide frozen yogurt supplies. She is even sometimes referred to as the “frozen yogurt justice.”
- The first frozen yogurt was called “Danny.” In the mid-1970s, the traditional yogurt maker, Dannon, tried out its first frozen yogurt concoction. The product was a total failure as consumers thought that it tasted too much like regular yogurt. This forced the developers of frozen yogurt back to the drawing board to create something that tasted more like ice cream and less like traditional yogurt.
- The first big, nationwide frozen yogurt company was TCBY. “The Country’s Best Yogurt” or “TCBY” hit the scene in 1981. These shops sold frozen yogurt that was served from the same kinds of machines as soft serve ice cream. It rose to become the largest, frozen yogurt retailer on the planet. The company profited from the health craze at the time that had people working out more and looking for foods that had less fat in them. In 1986, TCBY reported sales that exceeded $25 million.
- Frozen yogurt makes up about 10% of all frozen treat sales in the United States. After the frozen yogurt formula was redone to be more like ice cream and gelato, its popularity took off. The 1990s were good for the frozen dessert as more and more companies saw its potential. Sales of frozen yogurt and frozen yogurt supplies surpassed $300 million in the mid-1990s.
- Not all frozen yogurt is sweetened with sugar. Some varieties of frozen yogurt are sweetened with artificial sweeteners such as stevia or alternative, natural sweeteners such as nectar or honey.
Frozen yogurt has come a long way in a very short amount of time. While it took thousands of years for the process of making ice cream and gelato to be perfected and honed to what it is today, frozen yogurt has only been around for about 40 years. In that short amount of time, it has gone from being rejected by consumers to being embraced and loved.
To prove that point, you only have to walk down the frozen desserts section in your local grocery store to see all of the different brands, styles and flavors of frozen yogurt that you can buy. Another bit of proof comes from the success of the California frozen yogurt company, Pinkberry. The company was founded in 2005 and can now be found in 20 countries. They grew from one small store in 2005 to more than 260 in 2016. The company specializes in a more tart frozen yogurt that has developed a following around the world.
Despite the humble origins, frozen yogurt and frozen yogurt supplies are now popular around the globe. This is one treat that is definitely here to stay.
|
<urn:uuid:755118fa-9a5a-49e4-945f-cd6f9a4c2374>
|
CC-MAIN-2023-50
|
https://thursdaycooking.com/fun-facts-about-frozen-yogurt/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.972359 | 828 | 2.78125 | 3 |
Every modern conventional army is becoming increasingly reliant on unmanned aerial vehicles. These unmanned drones can come in nearly all shapes and sizes. From man-portable units to high-altitude surveillance drones, militaries across the world depend on these additional sets of eyes and ears to monitor the battlefield. Boeing’s Laser Avenger is one of the only weapons in the world that excels at taking out these small aircraft in a cost effective way.
Laser Avenger Unique Edge
Shooting down a UAV is completely possible with current ballistic technology. But, in an actual battlefield, trying to shoot down a UAV can often reveal the position of the shooter. This puts that crew or vehicle at increased risk. What if there were a way to fire a projectile that was completely invisible to the naked eye?
The Boeing Laser Avenger is designed to be mounted on the back of a HMMWV (“Humvee”) platform. With an infrared laser capable of up to 10 kilowatts of power, the Laser Avenger is designed to shoot down UAVs mid-flight. In order to do this, Boeing had to design a very complex tracking system that would pick up on extremely small objects moving at low to medium altitudes. A laser operates at Line-of-Sight (LOS). Therefore, it’s possible to shoot a straight, narrow beam capable of burning through the unmanned drone. If all goes according to plan, this will knock it out of the air.
Modern militaries are worried about more than just surveillance. The capacity for UAVs to deliver bombs or ordnance on target is what is worrisome. According to the program director of the Boeing Directed Energy Systems, UAVs are a real threat facing the troops of the 21st century.
“Small UAVs armed with explosives or equipped with surveillance sensors are a growing threat on the battlefield,” said Gary Fitzmire, Vice President and Program Director of Boeing Directed Energy Systems. “Laser Avenger, unlike a conventional weapon, can fire its laser beam without creating missile exhaust or gun flashes that would reveal its position. As a result, Laser Avenger can neutralize these UAV threats while keeping our troops safe.”
The great thing about laser weapons like the Laser Avenger is that they do not give away the position of the shooter. A single Avenger Laser system can independently target and shoot down multiple unmanned flying vehicles. Best of all, it does this without a single gunshot being fired.
Testbed For Laser Weapons
Advances in technology, like the Boeing Laser Avenger, have led to the United States Army experimenting with the use of static laser turrets to protect against cruise missiles and other flying projectiles. These are in testing but the technology appears promising.
While lasers are very expensive and ineffective as kinetic combat weapons against personnel, they can be extremely effective against electronics and aviation equipment. The best part? No loss of human life. An unmanned vehicle getting shot down results in precisely zero direct deaths.
The Laser Avenger system from Boeing is an effective solution to blinding the enemy’s airborne assets before he can maneuver his forces into position.
Naval And Airborne Variants
It’s yet another reason why Popular Science reports that the U.S. Navy is adding energy weapons to its destroyers and other fleet ships. The ability to shoot down unmanned vehicles paves the way to potentially shooting down cruise missiles and incoming ballistics. The technology that enables a laser turret to be mounted to the back of a Humvee and successfully target an inbound missile can be adapted to cover a variety of needs in the air, at sea, or in the sky.
A variation of an infrared laser weapon system may also see action aboard other unmanned aerial vehicles. Imagine a massive dogfight happening in the sky overhead, only no one gets hurt. Drones will one day be equipped with energy weapons for destroying each other.
For now, we’ll depend on the Avenger platform on a humvee to save the day.
|
<urn:uuid:6462817e-b6d4-4729-bcf8-4cca69d0af64>
|
CC-MAIN-2023-50
|
https://thuysanplus.com/boeings-laser-avenger-defense-system/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.929041 | 822 | 2.828125 | 3 |
ELEM: IE Family Unit
IE Introductory students are studying My Family Unit.
They are reading different books about family, family members and traditions. After each reading, they discuss and share their answers and thoughts.
They are learning how to spell family words correctly and write some simple sentences about different activities they like to do with their families.
Also, they are making a family poster, and they will present it to their class.
|
<urn:uuid:39e60a0d-315b-4365-adb6-798502024fae>
|
CC-MAIN-2023-50
|
https://tirana.qsi.org/about-us/default-board-post-page/~board/alb/post/elem-ie-family-unit
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.978072 | 90 | 2.609375 | 3 |
What is the origin of lungwort plant?
Common lungwort, or Pulmonaria officinalis is a plant also known as Mary’s tears. Its natural habitat includes the southern parts of Europe, although it grows in Asia as well. A part of its Latin name, pulmo, refers to lungs. Hence, the name of the plant - it’s because lungwort was traditionally used for treating lung-related issues.
Currently, lungwort is cultivated in gardens mostly because of its ornamental value. Regardless, some people still appreciate it for certain benefits.
What does lungwort look like?
Lungwort is a plant growing up to 15-30 cm (6-12 in) tall. It forms quite dense and thick clumps. They sometimes develop long stems covered in tiny hair. The leaves are very green and covered in silver spots. Around March, first bell-shaped flowers appear on the stems. Initially, they are red, but later they usually turn purple.
Lungwort – the most popular varieties
Lungwort us a very popular plant. It’s commonly grown in yards. Three of its cultivars are particularly noteworthy:
- Sissinghurst White,
- Blue Mist,
Sissinghurst White is a variety with single-colored white flowers, which harmonize perfectly with the green, silver-spotted leaves. It grows into dense clumps, which can be used for property line landscaping, or as a general garden decoration. It blooms from April to May.
Blue Mist is a variety developing flowers in two colors. Just like the previously mentioned cultivar, it has highly saturated green leaves with silver spots. It grows from 30 to 40 cm (12-16 in) tall. It’s one of the most impressive types of pulmonaria plant.
Opal forms very thick clumps. They are relatively low, as they grow up to 15 cm (6 in) tall. The flowers have a uniform white color.
What’s the best location for lungwort – sun or shade?
If you decide to plant a lungwort in your garden, make sure to pick a good location for it. The plant doesn’t like being exposed to strong sun. It prefers half and full shade – it’s a shade-loving species. If the spot has too much sunlight, the color of the flowers might be less intense.
The soil should be rich in humus and lightweight. Common lungwort grows best in soils of a slightly acidic or neutral pH level. A mixture of clay soil and sand is a perfect option.
The plant is resistant to frost, which is a big advantage. Thanks to this, it can survive winter in the ground, without the need of additional protection.
When to plant lungwort?
In accordance to the rules of horticulture, lungwort seeds have to be planted in spring. When preparing the ground for sowing, make sure to remove any weeds. We also recommend mixing the soil with compost to enrich it and quicken the plant’s growth.
The seeds have to be planted keeping a spacing of 30 cm (12 in). Mulching with tree bark is also recommended. You can use leaves instead.
How to care for lungwort?
Lungwort requires regular watering. The soil in which the plant grows has to be constantly moist. But make sure water is not standing in the ground. It’s dangerous to underground parts of the plant, which might begin to rot as a result.
The matter is particularly important when the plant is developing buds and begins blooming. The watering should be limited during this period.
Fertilizing is as crucial as watering. The plant requires intense nourishment – but only once per season. A multi-ingredient product designed for blooming plants is the best option.
In late autumn, the plant has to be cut. All stems should be shortened to about 10 cm (4 in) above ground. This way, the plant can safely survive winter without worrying it will get attacked by pests or diseases.
Lungwort – benefits of the plant
Are you wondering about the benefits of pulmonaria officinalis? The plant has certain medicinal properties. It positively affects mucous membranes of the respiratory tract. The allantoin and soluble silicates have anti-inflammatory properties. Saponin and mucilage are expectorants. The plant is also rich in tannins, which inhibit microbial diseases.
Pulmonaria officinalis – contraindications
Common lungwort is valued for its medicinal benefits, but one should avoid it in some cases. A brew made from the plant soothes the digestive system and helps with food poisoning. But when drunk in excess, it might cause harm and lead to constipation. Patients suffering from stomach issues and excretory problems shouldn’t use this plant without a prior medical consultation.
Common lungwort is also an expectorant. But note that any lung diseases require extra caution. Treating any serious conditions with herbs usually isn’t the best solution.
Where to purchase lungwort plants?
Common lungwort is a popular and easily available plant. Its seeds can be purchased in any larger garden shop. You might also get them in a supermarket with a garden section. A packet of lungwort seeds is typically fairly cheap. It’s a perfect solution for anyone who loves beautiful flowers, but doesn’t want to spend too much money on them.
📍 What does common lungwort look like?
Common lungwort can bloom in two colors at the same time. The plant has characteristic green leaves with silvery spots. Thanks to them, the plant stands out from other species in the garden.
📍 Where does lungwort grow?
Lungwort is a perennial which grows basically everywhere in the middle and southern parts of Europe. Because of its colors and properties, it's becoming an increasingly popular garden plant in the world.
📍 Where to buy a lungwort plant?
Lungwort is available in most garden stores – thanks to its popularity. You can also look for this species online. After buying lungwort seeds, you can plant them and enjoy the beauty of the plant in a short time.
|
<urn:uuid:5a24f5fc-3720-499d-b67b-b3b8ccfe3a49>
|
CC-MAIN-2023-50
|
https://treehouse.co/us/blog/how-to-grow-lungwort-pulmonaria-officinalis-benefits-and-care
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00700.warc.gz
|
en
| 0.953673 | 1,323 | 3.390625 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.