text
stringlengths 269
235k
| id
stringlengths 47
47
| metadata
dict |
---|---|---|
The Corporate Business Organisations: International Cartels, Merits and Demerits!
Character of Corporate Organisation. The corporate form o private business enterprise is the most important and the largest type of business group. Generally, banking, insurance manufacture, mercantile enterprise and air transportation are the leading business occupations which have adopted the corporate form of organisation. Under this form of organisation the needed capital is supplied by a number of persons who become its shareholders.
Each shareholder receives his proportionate share o stock and is liable only upon the value of the shares he holds. The general management of the corporation is delegated to a Board or Directors who choose the general manager—a full time officer of the Corporation. The Corporation, before starting its work generally has to receive a license from the Government. It is regulated by the Company Act of the country.
The workers generally receive a share in the profits of the corporation in proportion to their wages or according to some other scale. The bonuses, by which profits are distributed may be given in cash or combined with a kind of retirement pay or may be transformed into shares of the same enterprise. The scheme is called profit sharing.
In recent times a form of corporate business under the name of ‘international cartel’ has come to the forefront. An international cartel is “a combination of capital groups operating in several countries to control the distribution and prices of particular articles of manufacture.” Many of these cartels have really become manipulators of prices for private financial interests of a relatively few people.
They sometimes enter into an agreement which is internationally harmful. Cartels are prone to develop totalitarian bureaucratic methods not only of national but international scope. In 1948 the United Nations provided for an International Trade Organisation to have control over international cartels and combines and to prevent them from exercising harmful practices.
The corporate business enterprise has many merits, it has eliminated competitive costs and permits the purchase of large quantities of materials at lower prices than the proprietor of the small enterprise can obtain. Secondly, such enterprises permit the undertaking of vast enterprises requiring huge wealth and extending over many years. Thirdly, goods are provided in large quantities so that the country does not suffer from want of goods. Fourthly, large units of capital bring about technological changes such as manufacture and installation of automatic machinery, development and application of electric power. Lastly, they create a spirit of cooperation among citizens.
But often big business rushes into an orgy of speculation and becomes legalized gambling on a gigantic scale. Likewise it may lead to overproduction causing slump in the market. Large corporate groups become impersonal and ignore their responsibility to the people. They get control over the government through their money power and pollute the democratic process. Some of them develop attitudes of economic superiority, of profitism, of class aloofness, and of competitive shrewdness opposing needed economic reforms. | <urn:uuid:7d6cbbce-6b94-4eda-ba48-50bfc71ca72d> | {
"dump": "CC-MAIN-2017-09",
"url": "http://www.yourarticlelibrary.com/organization/the-corporate-business-organisations-international-cartels-merits-and-demerits/24332/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171632.91/warc/CC-MAIN-20170219104611-00451-ip-10-171-10-108.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9531577825546265,
"token_count": 574,
"score": 2.65625,
"int_score": 3
} |
The vast majority of articles on SleepBetter.org cover the problems caused by not sleeping enough and the benefits of sleeping better. However, new research indicates that there is a growing population of people out there who are sleeping too much … and it’s not good for them either.
The new study was conducted by researchers at the University of Sydney. It reviewed information from surveys done in 10 countries which asked participants to record how much time they allocated to different tasks in a 24-hour period. The study included surveys from over three decades.
Researchers found that between 1970 and 2007, the percentage of survey participants who reported sleeping for more than nine hours over a 24-hour period increased from 28 percent in 1985 to 37 percent in 2007. What’s more, the percentage of people who slept for less than six hours a night decreased, from about 11 percent in 1985 to 9 percent in 2007.
Studies show that sleeping more than nine hours a night is linked to an increased risk of heart disease, cognitive issues, and other problems.
Sleep Apnea Symptoms Vary Between Races | <urn:uuid:b150bfd7-04f3-41ea-be73-05c35d077cc9> | {
"dump": "CC-MAIN-2018-39",
"url": "https://sleepbetter.org/more-people-sleeping-too-much/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267157070.28/warc/CC-MAIN-20180921112207-20180921132607-00191.warc.gz",
"language": "en",
"language_score": 0.9545318484306335,
"token_count": 219,
"score": 3.421875,
"int_score": 3
} |
|Posted on June 16, 2016 at 7:50 AM||comments (0)|
The Value of Magic as a Teaching Tool - Free PDF Teaching Tool
The Nelsons have put together a nice 25 page PDF to faciliate teaching magic to kids of all ages. Although the effects they teach are not difficult, they do serve to make their point. There are a couple of detailed articles about magic and several lists of interest to magicians. Nothing to download. The PDF will open when you click the link. Since it's designed for printing and freely distributing.. it's printer frendly.
- Learning magic involves provides practice at following and interpreting printed instructions.
- Learning magic involves reading, research and memory work. Practicing magic teaches that patience and perseverance bring rewards.
- The performance of magic involves learning how to plan and multi-task.
- Performing magic provides practice at public speaking skills.
- Learning to perform magic provides shy people with a special ability that can help boost confidence.
- Performing magic involves developing creative writing skills used in creating "patter" scripts to go along with tricks. Creative writing skills are also required for scripting actions in magic routines and recording instructions on how to perform tricks.
- Practicing small magic tricks improves dexterity in people with normal motor skills.
- For people with impaired motor skills, learning magic tricks provides the motivation to do therapeutic exercises that result in improved movement and gratification from achievement when a trick is successfully performed.
- Inventing or developing a magic trick involves problem solving, learning how to think outside the box, and inspires the use of imagination and creativity.
- Building magic tricks requires use of drawing, design, crafting and other artistic skills.
- Magic inspires us with wonder and causes us to consider what it might be possible to achieve.
- It teaches us that we can be fooled and that we don't always know or understand everything.
- Magic encourages us to think.
|Posted on April 30, 2016 at 8:30 PM||comments (0)|
Do you feel inspired to learn more about magic as a performing art o hobby?
Do you want to perform magical illusions yourself?
Now, you can teach yourself how to perform magic!
Learn Rope Magic with JULIUS MAGIC:
Learn Sponge Ball Magic:
|Posted on April 30, 2016 at 7:25 PM||comments (0)|
The world of magic first captivated Julius at a very young age. When he was a very young boy, his parents owned a Hungarian restaurant in New York City where he was born, and one day a butcher delivered a pig to her, carrying it over his shoulder.
Awed by the sight of the man dressed in a long white coat, little Julius was delighted when the butcher magically pulled a quarter out of the pig’s ear. Then made it vanish. And then pulled the coin out of Julius’ ear.
“I was fascinated,” says Julius, now a professional magician with the stage name JULIUS MAGIC.
The power of magic is not in the illusion or trick we think we see
It's in the imagination; the image the magician creates.
The way it makes us feel . . . . . . that certain sense . . . . . . . . .
of childlike . . . . . . . wonder.
Having never forgotten his feelings of wonder and amazement at that moment, he now delights in entertaining children and adults with magical illusions. He can make a black scarf turn multicolored just by waving it in the air. He can make a deck of cards vanish in front of a child’s eyes. He can put one ball into a spectator’s hand and then have it multiply into many. And he can make a rope appear to pass right through his waist, one of his favorite tricks.
“I do that one at the end of the show,” says Julius, who performs at children’s birthday parties and corporate events. “I save it for last, because it’s the most memorable.”
He engages his audience throughout his shows, striving to make it appear that they are the ones doing the magic. Which he says surprises them, and makes them laugh. "I learned that laughter is important,” he says. “The more I can make them laugh, the more they’ll enjoy the magic.”
Despite his early fascination with magic, Julius didn’t become a serious magician until later in life. He attended Yale University for three years and then 20 years later finished his bachelor’s degree, followed by a Masters Degree in Science and Management.
He’s worked in sales most of his life, and schedules magic gigs around his day job. He was always fascinated by magic, and tried to learn some tricks from books, “but it wasn’t until I was in my forties that I was lucky enough to go to a magic convention,” he says.
He took his young daughter with him, thinking magic would be a fun way to entertain her. They saw dozens of magicians and after seeing some cool sleight of hand magic performed, he bought some super soft sponge balls.
As he drove home, his daughter taught herself a sponge ball trick by reading the instructions while riding in the back seat . . . and his little girl amazed him with magic! She inspired Julius to learn, practice and begin entertaining people at work. Then he started shopping in magic stores, where he bought more tools of the trade. Shortly after learning a few more effects, he got his first paid gig as a restaurant magician! One gig led to another and now he loves performing magic for kids, families and businesses.
While many of his props are designed for magicians, much of magic can be done with unprepared props, such as real coins, he says. Learning how to perform illusions takes skill, practice, and investment in time and money. He looks forward to perhaps doing magic full time one day. “One of my dreams after I retire is to be able to travel the world and do magic shows in other countries,” he says. “It’s a dream—but you never know.”
|Posted on April 26, 2016 at 7:45 AM||comments (0)|
As a result of learning magic, people of all ages can:
help heal people
earn better grades
share their joy with others
improve their success in school
receive invitations to many parties
teach others how to perform magic
meet people and make new friends
win prizes at school fundraiser sales
make extra money in their spare time
make others feel special and appreciated
become better readers and critical thinkers
improve their public speaking skills and confidence
become the most popular guest and family favorite
"work" their way through college performing magic shows
provide therapeutic rehabilitation to others using "magic therapy"
develop more confidence & new skills learning how to perform magic
receive personal rewards and satisfaction from bringing smiles to faces
|Posted on March 6, 2015 at 6:45 AM||comments (0)|
Close-Up Magic - Sleight-of-hand magic, also known as prestidigitation ("quick fingers") or léger de main (Fr., "lightness of hand") to secretly manipulate small objects such as sponge balls, cards and coins. A magician performs close-up magic in an intimate setting usually no more than a ten-foot (three-meter) distance from the audience with the party guests all around him. The magic happens right in front of you "in your hands." This performance is best for relatively small groups of people. Sleight of hand magic is intended for more intimate environments. Perfect for kids and adult birthdays, receptions, cocktail or dinner parties, trade shows, hospitality suites and restaurants. The magic involves colorful silk handkerchiefs, money, ropes, rings, coins, cards and other small objects.
Table Magic - Performed on a table with the audience in front. This type of performance is not limited to magic that must be performed solely "in the hands" because props can rest on the magicians table or pad. This performance is also best for a relatively small group of people. Sleight of hand magic is intended for more intimate environments. Perfect for birthdays, receptions, cocktail or dinner parties, trade shows, hospitality suites and restaurants. Magic involves coins, cards and other small objects.
Stand-Up Magic - Performed while standing in front of the entire audience. This type of performance is suitable for either a small group, or with proper staging (lights, microphone, etc.), the audience can consist of several hundred people. This act features comedy and audience participation and it is particularly appropriate for large parties and banquets. Perfect for private parties, trade shows, banquets, conventions and corporate entertainment.
Mingling Magic - Performed in the magician's or guests hands while the magician mingles with the guests. This type of performing is most suitable for events where there is not a specific performing area such as a reception or cocktail party and usually involves some audience participation.
|Posted on July 14, 2013 at 5:25 PM||comments (0)|
If you were to weigh the benefits of learning how to perform magic illusions against buying another video game the comparison becomes clear. Learning Magic with your child can pay back immensely over the course of a lifetime! What benefits does another video game offer?
The last thing you want is to frustrate your child with magic tricks that are too complicated for your child's age or ability! Frustration can set in if things aren't going right for your child.
Learning tricks alone without learning how to perform them willnot move a child's confidence forward. More likely it will just increase their anxiety that they aren't good enough to show them to anyone.
I recommend "self-working" illusions for beginners and younger children. Please take the time to enjoy magic with them! Help them to understand and practice magic tricks. It's a great opportunity for you to spend more time with your child and perhaps develop a hobby that you both love!
Ask anyone who has ever seen a magic show, and you’ll hear“Magic is Fun!” Not only is magic fun to watch, but it is also fun to perform. Magic can make people smile, laugh and marvel at the mysterious wonders the magician presents, if, of course, you present the magic properly.
Above all, please understand that magic is nothing more than illusion used in an entertaining way. No mortal truly possesses magical powers. Realize that you will be learning how to entertain with illusions which make it appear that you have magical powers.Don’t claim to be supernatural or better than anyone else. Magic is designed to do two things: amaze and entertain your audience
Magic offers amazement, excitement and mystery, but it must always entertain those involved, either as spectators or as participants.Perfecting magical techniques is one thing, but it is quite another to go out and face an audience, knowing that they are waiting to be entertained. Buying a magic set or a magic book doesn’ tautomatically make you a magician, but with practice and interest,you could go a long way.
Every game, profession, or organization has certain rules to adhere to. I recommend following generally accepted "rules of magic":
Never tell your secrets. A magician never gives away the secret of a magic trick. The audience’s enjoyment of magic is to a certain extent due to the mystery of how the magic happened. To tell the secret of a trick would deny the audience of that enjoyment. Once people know how to do a trick, all of the mystery is gone. Plus, if they can do the trick too, your talent and skill is no longer special to them. People are naturally fascinated by magic as long as they don’t know how it’s done. So, keep it that way! Keep the secret!
Throughout history, magicians have maintained an oath of secrecy. This oath is a cornerstone of the magician's art, in that it both binds magicians into a world-wide brotherhood and serves as a constant reminder of their responsibilities as deceptive entertainers.
The original magician's oath was written some 2,400 years ago by Charlatates, the Greek father of modern magic. Over the years, the oath has been modified to keep up with changing times (for example, the bit about not performing for women has been removed), but its core has remained intact.
The current magician's oath, as used in the ascension ceremony though which every magician must pass before being recognized, is as follows:
The Magician's Oath
I promise I will always guard against exposing the secrets of magic, whether through lack of practice before performing, or through explanation to any person not entitled to know the secrets. I make this promise seriously,realizing that in violating it, I am not only violating my word of honor, but I am violating the trust and rights of all other magicians who, by the very nature of their form of entertainment, are entitled to the preservation of the secrets of magic.
The only exception to this secrecy rule is when students need a little extra help and ask Mom, Dad or an older sibling to help interpret instructions. Students should always guard against exposing secrets unnecessarily.
Practice, practice, practice! Practice is learning the secret, learning how to execute the trick, and then lots of rehearsal. Never perform a magic trick for someone unless you can do it really well.The best magician is a well-rehearsed magician! It is a good idea to practice in front of a mirror, to get an idea of what the audience would see.
Never repeat a trick for the same person. If they ask you to do it again…..and they will…. they are really looking for an opportunity to catch you in the secret the next time. So, DON’T DO IT AGAIN …. keep them wondering!
Anyone can do a "trick"; only magicians can perform magical illusions. Your performance affects your audience’s perception of every other magician. If you perform well, they’ll think that all magicians are good, and visa versa if you perform poorly. Make sure that your performance is high quality so you’ll be remembered for your good work.
Be a good audience member. Now that you will be learning some magical secrets, if you see someone performing, you MUST treat that person the same way YOU want to be treated. In other words, don’t let them or the audience know that you know how the tricks are done.
Most importantly, be yourself and perform magic to entertain and mystify, not to show you are better than others. Remember,always try to entertain your audience and treat them with respect. Without an audience, there is no magic.
- - - - - - - - - - - - - - -
Who do you know that has expressed a desire to learn how to perform magic tricks themselves after they've seen a magician do what appears to represent "the impossible"?
When have you or anyone you know experienced feelings of wonder during and after a magic performance?
How strong is your curiosity or desire to learn how it works?
Are you inspired to want to learn more?
Please visit http://www.juliusmagic.webs.comto learn more about how JULIUS MAGIC can benefit you, your children,and your organization.
|Posted on April 30, 2013 at 9:20 AM||comments (0)|
When you start to learn magic and gegin to amaze and delight your friends and family, many of them will beg and plead for you to reveal the secret.
You will feel tempted to tell them how it's done. Of course, you will not share the secret with them.
That would take all the mystery, wonderment and magic out of your newly acquired skills.
You will have wasted all of your hard efforts in learning how to perform magic.
All the fun will "disappear." Magic is about amusing your audience and leaving them with a feeling of awe.
Therefore, before I start sharing specifics on how to perform specific illusions in future articles, I will start by asking my readers to review and let me know whether or not they agree to uphold the Magician's Oath:.
"As a magician I promise never to reveal the secret of any illusion to a non-magician, unless that one swears to uphold the Magician's Oath in turn. I promise never to perform any illusion for any non-magician without first practicing the effect until I can perform it well enough to maintain the illusion of magic."
If you are truly dedicated to learning and understanding magic, then by taking the Magician's Oath listed above, you establish yourself as a magician along with making the promise to yourself and other magicians that you will uphold your promise and not reveal secrets of the trade either purposely or due to your inexperience with performing a trick.
Stay tuned to this blog by becoming a member and you will receive notification when there's a new article published! | <urn:uuid:7e94d1c8-0651-476a-a1ea-48e137d3c18b> | {
"dump": "CC-MAIN-2017-34",
"url": "http://juliusmagic.webs.com/apps/blog/categories/show/1677821-performing-magic",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886112533.84/warc/CC-MAIN-20170822162608-20170822182608-00304.warc.gz",
"language": "en",
"language_score": 0.9582337737083435,
"token_count": 3560,
"score": 3.015625,
"int_score": 3
} |
July 8, 2012
Fact Sheet on Infectious Salmon Anemia (ISA)
CLICK HERE to download this information sheet as a pdf.
Infectious Salmon Anemia (ISA) is a serious but manageable virus that occurs in nature and can also affect salmon farms. A recent confirmation by the Canadian Food Inspection Agency (CFIA) of ISA in Newfoundland and Labrador is the first of its kind in this province and has sparked media attention and some discussion and confusion in the community.
While all salmon farming companies view ISA as a serious virus, they have lived with and managed ISA for many years. This recent confirmation by CFIA of the presence of ISA on the Butter Cove site owned and operated by Gray Aqua Group shows that the surveillance and fish health program is working. Both levels of government and all companies are taking the necessary actions to manage the virus and to prevent its spread.
Here are quick facts on ISA:
- ISA is a natural virus, not something created by salmon farming
- ISA can be a serious threat but since we know it is in the environment we have learned how to test for it and manage it
- Although this is the first case in Newfoundland and Labrador, ISA has been confirmed recently in Nova Scotia, and through effective management strategies in New Brunswick, it has not been detected since 2006
- The confirmation of ISA in Newfoundland and Labrador shows that fish health monitoring is effective
- There remains no clinical signs of the virus on this site and so early detection allows the company to take precautionary and preventative measures to minimize the potential spread to other farming sites
- Ongoing monitoring and fish health sampling continues on all farms in the region. If further cases of ISA are detected, the same aggressive and proactive steps will be taken by industry in collaboration with the Province of NL and CFIA
- This confirmation of ISA in Newfoundland and Labrador is viewed as a part of farming on the East Coast – industry does not take this virus lightly but are confident it can be managed
- The aquaculture industry remains committed to its expansion and development plans on the South Coast of Newfoundland and Labrador
For more information, the following Q&A provides answers to some of the most common questions about ISA…
1. What is ISA?
Infectious Salmon Anemia (ISA) is a naturally occurring virus that spreads slowly and is present in wild fish in many parts of the world, including eastern Canada and the United States. While ISA is harmful to salmon, it poses no risks to human health.
2. Is the ISA virus harmful to humans?
No. While ISA is harmful to salmon, it poses no risks to human health.
3. Does ISA pose a threat to fish species other than salmon?
No. Veterinarians and scientists say that ISA poses no known threat to other fish species such as lobster, herring or cod. Although herring and cod can carry the virus, there is no adverse affect.
4. Doesn’t the fact that we suspect ISA prove that farming salmon is not safe?
No. Like all farmers we are affected by environmental conditions and the natural presence of parasites, viruses and pathogens. ISA is a virus that spreads slowly and is present in wild fish in many parts of the world, including eastern Canada and the United States. Rigorous testing and monitoring is in place to detect the presence of viruses as quickly as possible. That is what happened in NL recently.
5. What is industry doing to control ISA?
Evidence of ISA has existed in the wild fishery on the east coast for over 100 years. Since 1996 when ISA was first identified on New Brunswick salmon farms, farmers have worked with scientists, veterinarians and government to manage and prevent outbreaks and stop the virus from spreading. Through effective management strategies in New Brunswick, it has not been detected since 2006.
The New Brunswick salmon farming industry responded to the threat of ISA by developing a bay management area system and strict bio-security protocols for all farming, processing and fish transportation operations as well as the designation of wharves for specific activities and guidelines for vessel traffic. The Newfoundland and Labrador industry is learning from the experiences in other regions and are implementing strict bio-security protocols to minimize the potential threat of ISA in this province.
6. How do salmon farmers manage ISA?
Company veterinarians, biologists and oceanographic specialists and Provincial and Federal veterinarians and regulators provide advice and oversight on our everyday farming practices. Farmers follow innovative farming techniques such as area management, single year stocking, crop rotation, fallowing of farms between crops and strict bio-security protocols to keep fish healthy until they are ready for harvest. If ISA is suspected they take aggressive measures like culling a cage as a preventative measure.
7. What does this ISA virus detection mean for the public? Are the fish in the area at risk?
ISA is a naturally occurring virus that exists in the wild fishery and can also affect salmon farms. While it is harmful to salmon, ISA poses no risk to humans or to other species such as lobster, herring and cod. The ongoing testing and surveillance work of the CFIA and the provincial regulators make sure any new evidence of the virus is detected immediately and proactive measures are taken to prevent spread.
8. What does this ISA virus detection and the loss of the fish on this site mean for the development plans in NL?
While this is an unfortunate event, it is part of the farming business and industry has managed through many challenges like ISA over the years while remaining a successful Atlantic Canadian industry. The industry has strategically diversified in terms of geography, products and markets and is therefore in a strong position to deal with business and farming challenges. All companies remain committed to their NL expansion plans.
9. Why is Salmon Farming Important to NL and to Atlantic Canada for that matter?
Salmon farming has become critical to the social and economic fabric of rural Atlantic Canada. We already provide thousands of good direct and indirect jobs and have the capacity to do so much more. We not only offer high quality, healthy and nutritious food for the Canadian and US marketplace, we offer stability to a region that has been hard hit by economic decline and job losses. Aquaculture is building on the region’s marine and agriculture heritage and is becoming the new ‘traditional’ food sector.
July 1, 2012
NEWFOUNDLAND AQUACULTURE INDUSTRY ASSOCIATION
COLD HARVEST 2013
20th Annual Conference & Trade Show
February 19th – 21st
REFLECTING ON THE PAST, EMBRACING A PROMISING FUTURE
Wednesday, February 20th: Plenary Sessions, NAIA AGM
Thursday, February 21st: Plenary Sessions, Conference & Tradeshow end, Aquaculture Banquet, John Shehann Entertainment
- Industry-led Discussions of Both Shellfish and Finfish Aquaculture in NL
- Provincial Programs Update from the NL Department of Fisheries and Aquaculture
- Shellfish and Finfish Technical Sessions and much more!
- Luncheon with Guest Speaker
- 2013 Aquaculturist of the Year Award Presentation
- Annual Joe Brown Silent Auction, Social Events and more!
- Two conference registration passes (does not include banquet tickets).
- Business profile and a business card size color ad in the Cold Harvester magazine – conference program. (If space is booked before January 11th)
- Scheduled visits/networking breaks in the trade show area.
- Visitors from the Joe Brown Silent Auction which will also be held in the trade show area.
- Acknowledgement on NAIA website.
TRADE SHOW EXHIBITORS
Department of Fisheries & Aquaculture – Aquaculture Branch
Department of Innovation Business & Rural Development
Fisheries & Oceans Canada – Aquaculture Research Section
Silk Stevens Ltd.
Workplace, Health, Safety & Compensation Commission
Marine Institute of Memorial University of NL
Trinav Fisheries Consultants Inc.
(Check back soon for updates)
— A TREMENDOUS THANK YOU IS EXTENDED TO OUR PARTNERS AND SPONSORS THIS YEAR —
PLATINUM PLUS SPONSORS
Atlantic Canada Opportunities Agency
Department of Fisheries & Aquaculture
Northern Harvest Sea Farms
Barry Group Inc.
Cold Ocean Salmon Inc.
Town of Grand Falls-Windsor
Canadian Center for Fisheries Innovation
Gray Aqua Group Ltd.
Canadian Aquaculture Industry Alliance/Agriculture and Agrifoods Canada
Go Deep International
Novartis Animal Health Canada Inc.
NUTRITION BREAK SPONSORS
Gray Aqua Group (2)
Gray Aqua Group Ltd.
Northern Harvest Sea Farms
Cooke Aquaculture/Cold Ocean Salmon
Nova Fish Farms
May 25, 2011
“As the aquaculture industry sets record production values, the Newfoundland Aquaculture Industry Association (NAIA) will use a $200,633 investment from the Provincial Government to continue workforce training and skill development. The continued development of a highly-skilled workforce creates a solid foundation on which the industry can continue to grow and prosper.”
Click HERE to read the full release | <urn:uuid:0ec0f7e3-47f9-43ad-95fc-6e06313410bc> | {
"dump": "CC-MAIN-2017-17",
"url": "http://naia.ca/category/front-page-featured-articles/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122955.76/warc/CC-MAIN-20170423031202-00078-ip-10-145-167-34.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9283050894737244,
"token_count": 1924,
"score": 2.953125,
"int_score": 3
} |
When asthma makes it hard to breathe, the impact on your ability to participate in your regular activities is enormous. Life can still go about as normally as it ever would, even with something as serious as asthma holding you back. Continue reading to learn from the advice within this article, giving you a chance to live with asthma and don’t let it control you.
Keep track of how often allergies trigger asthma attacks. If you experience two or more asthma attacks a week after taking allergy medicine, switch to a different allergy medication. Doctors agree that having more than two attacks a week can be dangerous.
Keep your home clean and well swept. You should wash sheets, pillows, and blankets very frequently. By doing this, you get rid of dust and dust mites. Both of these things can trigger an asthma attack. When dust builds, the air becomes much more irritating to those with asthma and can raise the chances of an attack.
Asthma sufferers will need to gradually adjust to physical exercise, warming up adequately prior and cooling down as fast as possible afterwards. Doing both will help you avoid experiencing asthma symptoms while exercising or after exercising.
Avoid aggravating your asthma condition while sleeping by covering your mattress and pillows with plastic before putting clean linens on. You could reduce the potential impact of these asthma inducers by cleaning your sheets regularly. Fresh bed linens, washed regularly, will ensure that you can breathe a little easier while you sleep.
If you have asthma, it might be helpful for you to buy a dehumidifier. When you use a dehumidifier, it will reduce the amount of dust mites. This will reduce asthma attacks. Dehumidifiers eliminate your home’s humidity, leaving dry air.
It is important to visit with your doctor often, every two months or so, in order to stay on top of your asthma. Your physician needs to evaluate how you are right now, and decide if any changes need to be made. The responsibility of scheduling these appointments falls on you. Make sure you attend each and every one so that your doctor can stay updated on how your treatment plan is working in order to help you remain healthy.
If you tend to suffer from any allergies or asthmatic conditions, always clean vaporizers very thoroughly, as well humidifiers and any associated apparatus. Permitting bacteria to grow inside the appliance will result in irritants being dispersed into the air you breathe.
You should avoid smoking at all costs and being exposed to vapors and perfumes if you suffer from asthma. Stay away from jobs that would expose you to toxic or heavy vapors, and refrain from any tobacco use.
For those who have asthma, the safest choice is to stick with unscented products. Scented products, like air fresheners, incense and perfume, raise indoor pollution levels and can trigger asthma attacks. Newly installed carpet or fresh paint in the home are both known to release chemical irritants. Keep your indoor air clean and free of pollutants to stay healthy.
Unfortunately, asthma sufferers must realize that their condition is chronic which requires ongoing treatment. It is crucial that you have the proper medications for controlling asthma, as well as medication, such as a rescue inhaler to treat sudden attacks. A variety of options are available for the treatment of asthmatic attacks. Consult your doctor and an allergist.
Asthma usually takes an extended interval of time to fully develop, and the warning signs are rarely obvious. There are actually many people that have passed away from an asthma attack without ever knowing they were even at risk. Given that fact, if you have any kind of consistent cough or respiratory ailments, consulting a physician for testing is a good idea, since you want to know if you are suffering from asthma and if so, what to do about it.
While asthma is condition that lasts a lifetime, it can be made easier to manage by following the advice from your doctor and articles such as this one. New medications and treatments are always under development, and hopefully a cure for asthma is not far off. | <urn:uuid:d497307e-a0e4-4790-a67f-339a52ff2a89> | {
"dump": "CC-MAIN-2019-18",
"url": "http://theylife.org/try-this-great-advice-for-managing-asthma/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578526807.5/warc/CC-MAIN-20190418201429-20190418223429-00554.warc.gz",
"language": "en",
"language_score": 0.9611991047859192,
"token_count": 829,
"score": 2.71875,
"int_score": 3
} |
March 12, 2012
New Study Examines How Medical Symptoms Presented Online Makes A Difference In Health-Care Choices
A new study examines how symptoms presented online influence people's reactions to possible medical conditions
Maybe you've had a reoccurring sore throat or frequent headaches. Perhaps the pain in your leg won't go away. In the past, you might have gone to a doctor's office to diagnose symptoms.Today, people are more likely to go online to punch in their symptoms.
Details of a new study examining how symptoms presented online influence people's reactions to possible medical conditions will be presented in Psychological Science, a journal of the Association for Psychological Science. Researchers found that identifying symptoms in "streaks" - sequences of consecutive items on a list that are either general or specific - prompted people to perceive higher disease risk than symptoms that were not identified in an uninterrupted series.
The research was conducted by Arizona State University Associate Psychology Professor Virginia Kwan, Sean Wojcik of the University of California, Irvine, Talya Miron-shatz of Ono Academic College, Ashley Votruba of ASU, and Christopher Olivola of the University of Warwick.
"A recent report by the Health Information National Trends Survey examined the use of Internet in seeking cancer-related information. More than 60 percent of individuals who are feeling ill go to the Internet to search for health information. Many decide to go to the doctor or not based on what they learn online," Kwan said. "This is really an era of self-diagnosis. To our knowledge, our study is the first to examine the impact of online presentation formats on medical decision making."
The research team reviewed the symptom presentations of the 12 deadliest forms of cancer for either males or females on five reputable cancer websites. All of the sites varied in how symptoms were given with some in bullet points, others in paragraphs, severe and common symptoms listed in varied ways and the number of symptoms.
Two studies were conducted, one where a fictional type of thyroid cancer was presented to study participants with six symptoms listed. Researchers varied the way the symptoms were presented from three common and frequently experienced symptoms (i.e. — feeling easily fatigued) followed by three specific symptoms (i.e. — lump in neck); another group was presented symptoms with three specific followed by three common; and the third group received a symptoms list with common and specific interspersed. Researchers used the fictional cancer to ensure no one had prior knowledge of symptoms.
Study participants in the first two groups reported similar results, but the perceived medical risk was significantly lower for the last group that received specific and common symptoms that were interspersed.
A second study for a real type of brain cancer reported the same results as the first study, but when the symptom list was expanded to 12, effects of a list of consecutive series of symptoms was diluted.
"The length of the list matters," Kwan said. "This is analogous to a dilution effect. If you don't have that many symptoms, you may not experience concern about getting that disease if you're looking at a long list."
Medical implications of the study include insight into how symptoms may be presented online, depending on goals. For instance, if someone wants to increase awareness of an emerging medical issue that requires treatment, symptoms that are more likely to be checked off in sequence can be grouped together, Kwan said.
According to Votruba, "If there are concerns that the perceptions of disease risk are too high, possibly resulting in over utilization of health services, then symptom lists should alternate common and specific symptoms or create longer symptom lists."
"Previous research shows that perception of risk of disease is a powerful predictor of health preventative behavior (such as going to the doctor)," Kwan said. "How information is presented online will make a substantive difference in behavior."
On the Net: | <urn:uuid:5706e935-890c-4997-847b-a9339f89beac> | {
"dump": "CC-MAIN-2017-43",
"url": "http://www.redorbit.com/news/health/1112491821/new-study-examines-how-medical-symptoms-presented-online-makes-a-difference-in-health-care-choices/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824543.20/warc/CC-MAIN-20171021024136-20171021044136-00178.warc.gz",
"language": "en",
"language_score": 0.963964581489563,
"token_count": 790,
"score": 2.828125,
"int_score": 3
} |
TUESDAY, June 17, 2008 (HealthDay News) -- The diabetes drug metformin slows the onset of early puberty and reduces the risk of insulin resistance in girls at risk for both conditions, a Spanish study concludes.
"The findings indicate that we can slow down puberty. This is important, because when puberty is faster in girls, the appearance of menses occurs earlier, and this sequence of events may ultimately result in a shorter adult height," senior author Dr. Lourdes Ibanez, of the University of Barcelona, said in a prepared statement.
In addition, getting a first menstrual period before age 12 has been linked to an increased risk of breast cancer, and early puberty is a known risk factor for polycystic ovary syndrome, a common cause of infertility.
The study included 38 girls who had not yet reached puberty but developed pubic hair before the age of 8, which typically means they'll start puberty earlier than their peers. The girls in the study had another risk factor for early puberty: They'd been born small and experienced rapid catch-up growth during infancy, leading to increased belly fat. That put them at increased risk for insulin resistance, a risk factor for type 2 diabetes, according to background information in the study.
The girls were about 8 years old when they were enrolled in the study. They were divided into two groups of 19 - one that received no treatment , and one that received treatment with low-dose metformin once a day for four years.
Compared to the girls who received no treatment, the girls in the treatment group started puberty and menstruation later, gained about 50 percent less fat, and became less insulin resistant. The girls in the treatment group continued to grow taller, while most of the girls in the untreated group had already stopped growing.
The study was presented June 16 at the Endocrine Society's annual meeting, in San Francisco.
The Nemours Foundation has more about puberty. | <urn:uuid:44241574-f307-4032-837d-7dd06d725165> | {
"dump": "CC-MAIN-2019-35",
"url": "https://consumer.healthday.com/senior-citizen-information-31/misc-aging-news-10/diabetes-drug-may-prevent-early-puberty-in-young-girls-616525.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027315750.62/warc/CC-MAIN-20190821022901-20190821044901-00423.warc.gz",
"language": "en",
"language_score": 0.9778099060058594,
"token_count": 396,
"score": 2.578125,
"int_score": 3
} |
I thought a short essay on the treatment of holotypes would be worthwhile. In zoological sciences, many of us are involved in describing and naming new species - in order to maintain taxonomic stability, a type specimen must be designated in a new publication naming a new species. In plain english, the type specimen - also known as a holotype - is the specimen demonstrating the physical evidence for which a new species is named upon. Often when a new species is discovered, researchers will leap to name it - so often, we're stuck with a species named upon a single specimen. It happens frequently in paleontology; finding good fossils is (often) more difficult and more dependent upon sheer luck than going out and finding a second specimen of a newly discovered modern species. As a result, much of the vertebrate fossil record is composed of "singletons" - fossil species represented by single specimens. This problematic nature of the vertebrate fossil record is a favored talking point of young earth creationists, and has also unfortunately contributed to the bizarre opinion amongst some radical cladists that ancestor-descendant relationships are impossible to determine in the fossil record. Radical ideas by folks such as Nature editor Henry Gee come to mind, who rejects all non-cladistic methods in paleontology as being unscientific - an easy position to take if used to the fragmentary vertebrate record of singletons, but difficult to maintain in the face of the enormous and densely sampled record of fossil invertebrates (mollusks and foraminifera come to mind, in which non-cladistic methods can identify speciation events and bouts of anagenesis in vertical successions of fossil assemblages).
The typically fragmentary nature of the vertebrate fossil record, and dealing primarily with singletons, can lead one astray. Subdisciplines divorced from extant relatives and flooded with researchers who do not really look at modern species to get an idea of morphological variation - dinosaur paleontology comes to mind - may be dominated by an overabundance of taxonomic "splitters" (disclaimer: I have many friends who are dinosaur paleontologists and have a rather sober idea of morphological variation). For the uninitiated, splitters are researchers who tend to name more species than is probably likely; the opposite are "lumpers", who tend to lump species together into a more reasonable framework of fewer names. Many in biology prefer to use a third but unnamed category for the middle ground - I do not, as I consider the "lumper" category the middle ground, and "extreme lumpers" to be on the other end. One marine mammal related example of an extreme lumper is work by Caretto (1970) who lumped all known fossil balaenopterids into a single subspecies, including fossils now known to likely represent several genera. Most "lumpers" I know tend to use morphological variation in related extant species as a tool for interpreting species-level identifications/naming in the fossil record, which sounds reasonable ("eminently sensible" as my adviser would say) - and so I consider anyone reasonably taking a middle ground approach to fossil identification/naming a lumper (versus an extreme lumper).
Many smaller subdisciplines dominated by just a handful of researchers working more or less "unopposed" (i.e. without professional rivals to rigorously dispute work) may be plagued by splitting until some young turk who's spent more time playing with modern skulls comes along and rewrites everything - this has happened time and again in mammalian paleontology. I won't use any examples close to home as many of those researchers involved are still extant, so this discussion is largely going to consist of hypotheticals.
If you spend too much time looking at a relatively small group of fossils - and don't bother looking at modern specimens of extant relatives to take a stab at what sort of range of morphological variation you ought to expect - it's easy to fall into the trap of "typology". I don't necessarily mean the reliance upon type specimens (although I'll eventually get back to that), and the definition of typology is generally given as "a classification according to general type, especially in archaeology, psychology, or the social sciences." In paleontology, typology is a style of thinking in which every fossil species conforms to a different morphological/anatomical "type" (NOT to be confused with the similarly vaguely defined "kind" from young earth creationism). In other words, it should be relatively easy to identify two fossils (or, alternatively, living individuals) of the same species because according to typological thinking, they should look close to identical. For over a century, this was the founding principle of paleontology in practice: if you find something that looks a little different, it's a new species. Done. That's partially why folks like Cope, Marsh, and Leidy published so many damn papers.
The problem is, and this is a concept well known to most paleontologists - biological entities don't give a shit what you think about them. Domesticated animals and humans are some of the more extreme examples - all breeds of domesticated dogs belong to Canis familiaris and can healthily interbreed, but if the entire species was extinct and all we had were skeletons (no ancient DNA), paleontologists would readily name the skulls of a doberman and a chihuahua as different species. With humans, it's a similar case: obviously we know all extant humans can interbreed, but there is a fair amount of morphological diversity, and the human mind is hard wired to recognize familiar faces and as a result exaggerate differences between different populations of humans. Someone who is familiar with other primates would readily note that all humans share much more in common with one another relative to gorillas and chimpanzees, but someone who only looked at human faces and skulls would tend to focus more on the differences rather than the similarities.
Splitting versus lumping continues to be one of the biggest challenges in paleontology - is the new species you've named real, or is it just a morphological extreme? Or is it the opposite gender in a species that is sexually dimorphic? A recent paper just proposed that the Flores hominin - the "Hobbit", Homo floresiensis - is actually just a Homo sapiens with Down's Syndrome. As more and more paleontologists leave dark dusty fossil collections and dabble in neontology, variation is becoming more and more understood and embraced. In the 19th century, vertebrate zoology and paleontology was figuratively the Wild West (and in the case of Marsh and Cope, quite literally). New species which would later turn out to be junior synonyms were published by the bucketload; reading through Victorian era zoological papers often reeks of taxonomic anarchy, with the proliferation of all sorts of species and genus names no longer in use. In many cases, naturalists genuinely were unaware of some papers and discoveries - some species of modern whales and dolphins were independently named and "discovered" literally dozens of times (from different strandings on different continents) during the late 19th century - that's just one of the many problems facing naturalists in the pre-internet world. Some of the synonymy lists for modern dolphins are astoundingly long.
For those unfamiliar with taxonomy but have continued to read this anyway, one of the most important rules set out by the International Code of Zoological Nomenclature (ICZN) is the rule of priority: the species name published first has taxonomic priority. If you name a second species that turns out to be based on an individual from an already-named species, the earlier published name is used. This also applies to genus names - and can spark "nomenclatural wars" like the Aetogate controversy a few years back. If two researchers investigating the same fossil species, and 1) it is an already described species placed in the wrong genus and a new genus name is needed or 2) both parties have found separate fossils of the same, as yet unnamed species - whoever publishes the new name first "wins", so to speak - all other considerations (ethical or otherwise) are irrelevant according to the ICZN. This can both cause extreme tensions in an otherwise small and close knit discipline, or result in the proliferation of synonymous names published in disappointingly brief and poorly figured papers (sometimes called name grabbing, and is the paleontological equivalent of "saving a seat" for yourself).
Now that the discussion of zoological nomenclature has come full circle, it's time to address the title. When in the business of "splitting" and naming new species - particularly when dealing with a record dominated by singletons - it's sort of a no brainer to focus on differences between holotype specimens. There are other types of types - there are paratypes, if you want to clearly designate some key specimens other than a holotype, there are syntypes or cotypes, where a type series is designated but no holotype is selected. There's also lectotypes, where someone selects a single syntype as a retroactive holotype-like designation, and there's also the concept of a neotype - if a type specimen is lost, a neotype conforming enough to the anatomy of the original may be designated afterwards.
But what happens if you have a fossil record that's... better? Admittedly, many parts of the vertebrate fossil record are still awful - but many subsets of the record are pretty damn excellent. What happens when you find a new fossil you think is the same species, but better preserved than the holotype? Paleontologists call these referred specimens - any specimen possessing some evidence that it represents the same species can be considered a referred specimen (e.g. you refer the specimen to a particular taxon). Referred specimens are of immense importance because they can provide 1) information on the anatomy of parts not preserved in the holotype and provide 2) information on anatomical variation for parts that overlap with the holotype. We already know that modern species display an impressive amount of variation, and paleontology is science after all, so in theory we should be using as much evidence as possible to improve our understanding of extinct species in the fossil record.
Some researchers, however, prefer to focus only on holotypes. You can easily lead yourself into a trap where you assume that the holotype specimen either 1) faithfully represents the morphological "type" of a species or 2) faithfully represents the morphological midpoint of a particular species (and is thus not an outlier in terms of its morphology). Both of these are actually pretty terrible assumptions to make, because in the absence of additional specimens, there's no objective way to defend (or even evaluate) either assumption. I've been told to "stick to holotypes" before, and have heard some Researcher A casually dismiss the careful work of Researcher B who referred additional specimens to a species originally named by Researcher A - and the reasoning was that they were dealing with non-types! I've even had some curators and collections managers give me puzzled looks when I asked to see some obscure referred specimen that often gets overlooked by visiting researchers in favor of the (often more incomplete) holotype.
What exactly are type specimens for? What is their purpose? According to the ICZN, type specimens are nothing more than a physical record of a species to which a zoological name may be permanently attached. In fact, the use of many historical names through to the modern day demonstrates that holotypes need not even exist - the sperm whale and narwhal do not have type specimens. Extreme cases like this are "grandfathered" in, so to speak, and this practice is no longer acceptable (nor even recommended). Type specimens can even be a plaster cast of a fossil specimen that does not even exist any more, or a single feather plucked from a newly discovered and named but extraordinarily rare "living type" specimen still flying around in the jungles of Borneo. The holotype specimen of the archaeocete Zygorhiza kochii is a relatively useless and miserable shitty braincase without any redeeming features - nobody uses that specimen, and mostly everybody in our field examines USNM 11962, the "de facto reference specimen" which Remington Kellogg monographed in the 1930's.
If the utility of type specimens has no real scientific basis other than mere housekeeping, then there's no real reason we should exclude non-type specimens. I call this weird practice "holotype worship", and I think it moreso has to relate with stamp collecting rather than actual science. Holotype worship - and typological thinking, I believe, are responsible for resistance to many proposed instances of synonymy - the most famous ones that come to mind are the hypotheses that the horned dinosaur Torosaurus is simply an old adult Triceratops, advanced by my close friend John Scannella at Museum of the Rockies, that Nanotyrannus is a juvenile Tyrannosaurus (advanced by Jack Horner and others), and that the dome-headed dinosaurs Dracorex and Stygimoloch are juvenile Pachycephalosaurus, advanced by Mark Goodwin and Jack Horner. Each of these hypotheses incorporates information past holotypes and "de facto reference specimens", uses a larger body of data, and from additional sources - and as a result, arguably explains the fossil record in a superior manner to hypotheses based on fewer data. As an aside, many young folks I've met who are rabidly against John's Torosaurus-Triceratops synonymy hypothesis come from the fanboy part of the spectrum without a strong educational background in science (other than "dinosaurs are cool, ankylosaurus is my favorite"). Other cases of synonymy more relevant to the subject of this blog are the early pinnipedimorphs Pteronarctos goedertae (1989), Pteronarctos piersoni (1990), and Pacificotaria hadromma - which Annalisa Berta argued in 1994 were a single species, a conclusion I tend to follow.
George Gaylord Simpson challenged the focus on holotypes back in 1940, and even then it was apparent that holotype worship was an antiquated form of research from the prior century. Simpson proposed the concept of the Hypodigm - the complete body of all known material assignable to the species under consideration - in other words, the type and all referred specimens. Many researchers have embraced this 75-year old concept, but in some subdisciplines within paleontology there has been surprising resistance. Many older paleontologists are reluctant to let young turks synonymize some of the species they originally named in the process of cementing a long career. Another pet peeve of mine - and this is particularly relevant to large reviews of various fossil groups - but I've read many papers that flat out only discussed the type species of a particular genus, and ignored those described as additional species within formerly monotypic genera (e.g. a genus with only one species). All fossil species are important! Don't ignore some species just because they were named later (but ignore them if they are synonyms, sure), or worse - don't ignore them because they were named by somebody you don't necessarily like.
Every month I see new papers bringing paleontology into the mid-20th century (and occasionally, late 20th and even 21st centuries) in terms of methods and scope, which gives me hope. Marine mammal paleontology is advancing faster than ever before, largely due to an influx of young researchers attacking new problems with a set of new ideas and tools. Although nearly a century old now, Simpson's idea of the Hypodigm is still as relevant as ever yet hasn't caught on as much as it should. Do your part to help stop "holotype worship" - and use as many specimens as are available!
Berta, A. 1994. New Specimens of the Pinnipediform Pteronarctos from the Miocene of Oregon. Smithsonian Contributions to Paleobiology 78:1-30.
Caretto, P. G. 1970. La balenottera delle sabbie plioceniche di Valmontasca (Vigliano d’Asti). Boll. Soc.
Paleontol. 9: 3–75.
Simpson, G.G. 1940. Types in modern taxonomy. American Journal of Science. 238: 413-431. | <urn:uuid:bc1be38b-02cc-4193-8230-2f12cdf59308> | {
"dump": "CC-MAIN-2017-13",
"url": "http://coastalpaleo.blogspot.com/2014/08/holotype-worship-and-hypodigm.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189214.2/warc/CC-MAIN-20170322212949-00656-ip-10-233-31-227.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9503071904182434,
"token_count": 3431,
"score": 3.015625,
"int_score": 3
} |
In this section we will download and install the software that emulates a disk drive to the knitting machine. You can run this software on any kind of computer, mac/win/linux
Now that you have the cable running, its time to download the software. Visit the Adafruit github repository and click on Download to download the source code.
This code is based on Steve Conklin's knitting machine code which is totally awesome but doesn't support pattern insertion. Still, check out his site for a lot of detailed information.
Download the file and unzip it into a directory that is easy for you to get to. For windows, we're going to stick the folder in My Documents in a folder called brother but if you are comfortable with command lines put it where-ever you'd like!
You will need Python installed to run the code. To see if you have Python installed, open up a command line and type in python. If you're running Windows you probably don't have it, so download it from the official Python site. You'll also need PySerial (serial interface for python) from http://sourceforge.net/projects/pyserial/
Open up a command line (windows) or Terminal (mac) or xterm (linux) and cd to the brother directory and then type in ls (or dir if ls doesnt work) to list all the files
Now we need to figure out what the name of the FTDI cable is. This process differs a little for Mac, Linux and Windows people.
Under Mac, in the Terminal window, type in ls /dev/cu.* which should give the following responses or so
The name we are looking for is /dev/cu.usbserial-XXXX where the X's are going to be unique for each cable. Copy and paste the name into a text file so you'll remember it for later.
For Linux/Unix type ls /dev/ttyUSB* into a terminal window, you should see a device file called something like ttyUSB0
If you are using Windows, go to the Device Manager (From the Start Menu, select Settings→Control Panel. Double click on System and select the Hardware tab. Then click on the Device Manager button) | <urn:uuid:d6a9ca6e-b9b8-4e05-945e-c72b5b6c3445> | {
"dump": "CC-MAIN-2013-20",
"url": "http://ladyada.net/wiki/tutorials/knittingmachine/pythonstart.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704986352/warc/CC-MAIN-20130516114946-00019-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.8906116485595703,
"token_count": 459,
"score": 2.703125,
"int_score": 3
} |
Our district is bounded by the south west coast from Redgate beach to Augusta, and eastwards into the Shire of Nannup and including all of the Scott River and bounded in the east by the Donnelly River.
The majority of our district is made of the "Lower Blackwood Catchment", a group of tributaries which drain into the lower reaches of the Blackwood River.
Just before the Blackwood River drains into the Southern Ocean at Augusta, the water pools in what known as the Hardy Inlet. This estuarine system is highly valued, ecologically as a breeding habitat for freshwater fish species and migratory birds, and socially as a summertime recreation area for holiday makers.
Towards a Sustainable Lower Blackwood Region
A whole of landscape perspective
In 2017 the Lower Blackwood Catchment LCDC engaged consultants, Associate Professor Laura Stocker & Dr Gary Burke, to conduct an action research mapping project that would provide us with an overview of the past & current status the district and its community. The information gathered from this action research has given us an amazing insight into our region and, importantly, points to where we could potentially go in the future in terms of sustainable food production & consumption.
Open the viewer to read the full report.
The Full Report
Rural communities and agriculture now more than ever experiencing increased economic, environmental and social pressures. A response to this situation requires a holistic approach to sustainability in the catchment, looking at all aspects of the landscape.
The project's overall aim is to improve understanding of the past and current status of the district and its community, and to create a “Whole of Landscape” framework for better natural resource management outcomes.
Google earth Interactive Map
Material from interviews with community members have been categorised, analysed and excerpts placed into Google Earth balloons to create a fascinating story-map about the Lower Blackwood District.
If you would like to access this interactive map then get in touch, we’ll be happy to share it with you. | <urn:uuid:70d8b7e6-ca23-4905-b859-90059dec458f> | {
"dump": "CC-MAIN-2019-26",
"url": "https://lowerblackwood.com.au/our-catchment",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999964.8/warc/CC-MAIN-20190625233231-20190626015231-00461.warc.gz",
"language": "en",
"language_score": 0.928962230682373,
"token_count": 415,
"score": 2.515625,
"int_score": 3
} |
Needless to say, before the development and widespread use of photography in mass publications, illustrations provided the only visual accompaniment to religious texts, novels, books of poetry, scientific studies, and magazines literary, lifestyle, and otherwise. The development of techniques like etching, engraving, and lithography enabled artists and printers to better collaborate on more detailed and colorful plates. But whatever the media, behind each of the millions of illustrations to appear in manuscript and print—before and after Gutenberg—there was an artist. And many of those artists’ names are now well known to us as exemplars of graphic art styles.
It was in the 19th century that book and magazine illustration began its golden age. Illustrations by artists like George Cruikshank (see his “’Monstre’ Balloon” above”) were so distinctive as to make their creators famous. The hugely influential English satire magazine Punch, founded in 1841, became the first to use the word “cartoon” to mean a humorous illustration, usually accompanied by a humorous caption. The drawings of Punch cartoons were generally more visually sophisticated than the average New Yorker cartoon, but their humor was often as pithy and oblique. And at times, it was narrative, as in the cartoon below by French artist George Du Maurier.
The lengthy caption beneath Du Maurier’s illustration, “Punch’s physiology of courtship,” introduces Edwin, a landscape painter, who “is now persuading Angelina to share with him the honours and profits of his glorious career, proposing they should marry on the proceeds of his first picture, now in progress (and which we have faithfully represented above).” The humor is representative of Punch’s brand, as is the work of Du Maurier, a frequent contributor until his death. You can find much more of Cruikshank and Du Maurier’s work at Old Book Illustrations, a public domain archive of illustrations from artists famous and not-so-famous. You’ll find there many other resources as well, such as biographical essays and a still-expanding online edition of William Savage’s 1832 compendium of printing terminology, A Dictionary of the Art of Printing.
Old Book Illustrations allows you to download high resolution images of its hundreds of featured scans, “though it appears,” writes Boing Boing, “the scans are sometimes worse-for-wear.” Most of the illustrations also “come with lots of details about their original creation and printing.” You’ll find there many illustrations from an artist we’ve featured here several times before, Gustave Doré (see “Gorgons and Hydras” from his Paradise Lost edition, above). As much as artists like Cruikshank and Du Maurier can be said to have dominated the illustration of periodicals in the 19th century, Doré dominated the field of book illustration. In a laudatory biographical essay on the French artist, Elbert Hubbard writes, “He stands alone: he had no predecessors, and he left no successors.” You’ll find a beautifully, and morbidly, 19th century illustrated edition of 17th century poet Francis Quarles’ Emblems, with pages like that below, illustrating “The Body of This Death.”
Not all of the illustrations at Old Book Illustrations date from the Victorian era, though most do. Some of the more striking exceptions come from Arthur Rackham, known primarily as an early 20th century illustrator of fantasies and folk tales. See his “Pas de Deux” below from his edition of The Ingoldsby Legends. These are but a very few of the many hundreds of illustrations available, and not all of them literary or topical (see, for example, the “Science & Technology” category). Be sure also to check out the OBI Scrapbook Blog, a running log of illustrations from other collections and libraries.
via Boing Boing | <urn:uuid:9663fbd9-a5ae-4535-a2f5-1afe7e6dc71c> | {
"dump": "CC-MAIN-2023-50",
"url": "https://www.openculture.com/2015/12/old-book-illustrations.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100227.61/warc/CC-MAIN-20231130130218-20231130160218-00564.warc.gz",
"language": "en",
"language_score": 0.9601848125457764,
"token_count": 845,
"score": 3.09375,
"int_score": 3
} |
Women's Heart Health
Surpassing breast cancer, heart disease is the No. 1 cause of death for women, but it doesn’t have to be that way. Prevention is the best medicine, and there is so much women can do to avoid heart disease.
Too often, women’s heart problems go undiagnosed — because sometimes there are no symptoms or because symptoms go unchecked. Women might not check their symptoms for years, limiting their options by the time they seek treatment. Here are a few tips for women to maintain their heart health:
Get a primary care provider and schedule an annual checkup
Many women have an OB-GYN they see regularly, but it’s less common for women to have a primary care provider (usually an internal or family medicine doctor or nurse practitioner). Annual checkups include the following simple, noninvasive tests that are key to the early detection of heart problems:
- Blood pressure check. High blood pressure has almost no symptoms, but it is easily detected by a test using a blood pressure cuff and a stethoscope.
- Cholesterol check. A blood test for high cholesterol can reveal heart issues.
- Blood sugar check. Catching high blood sugar early makes it easier to treat, delaying or even preventing diabetes and heart disease.
- Weight check. Managing body weight is one of the most important factors that influence heart health. A primary care provider can help set a realistic goal and provide tools for success.
Testing for high blood pressure, high cholesterol, diabetes and heart disease is important because while these conditions may appear on their own, having one makes it more likely that another will appear.
Watch for the warning signs of heart problems
These signs include:
- Shortness of breath during physical activity that goes away while at rest.
- Feeling unusually tired without explanation.
- Unexplained dizziness, light-headedness or nausea that lasts longer than a few days.
- Family history. If any close relatives have heart problems, tell your primary care provider. You could be at greater risk.
- Heart palpitations. Under normal circumstances, you shouldn’t be able to feel or hear your own heart beating. If you do, that can be a serious warning sign, especially if your heartbeat is too fast, too slow or irregular.
You may have all of these symptoms or none at all, which is why screenings are important.
Don’t ignore symptoms
The symptoms of a heart attack can be different for women than men. Here are some heart attack symptoms that women commonly experience:
- Pain or a strange feeling in the back, shoulder, jaw or abdomen.
- Heaviness or aching in either arm.
- Unexplained fainting. This needs to be checked by a medical professional immediately.
- Unexplained vomiting, severe nausea or sweating.
- A feeling of impending doom. Many patients describe this as knowing something very bad is happening, but they can’t explain why. | <urn:uuid:f600e0f2-d915-456b-bf8b-70306e01c35f> | {
"dump": "CC-MAIN-2019-13",
"url": "https://www.owensborohealth.org/services/heart/womens-heart-health/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912203842.71/warc/CC-MAIN-20190325072024-20190325094024-00134.warc.gz",
"language": "en",
"language_score": 0.9239371418952942,
"token_count": 624,
"score": 2.671875,
"int_score": 3
} |
Learn approaches to help promote biodiversity on the farm while growing biofuel feedstocks.
Corn and soy fields in Minnesota. Photo: US EPA and National Archive and Record Administration; Wikimedia Commons.
Agriculture and Biodiversity
Biodiversity is the variation of life at all levels, from genes to organisms to populations. Healthy ecosystems tend to have greater biodiversity.
Most biofuel feedstocks come from agricultural crops grown in highly disturbed ecosystems with relatively low biodiversity. Agricultural practices that tend to make farms less diverse than wild lands include:
- large monocultures
- fertilizer and pesticide applications
- weed management
Impacts of Biofuels on Biodiversity
A surviving fragment of Amazon rainforest surrounded by cleared farmland in Brazil's Mato Grosso province. NASA image
Using more land to grow biofuel feedstock crops could lead to expansion of cultivated areas, reducing biodiversity by displacing forests, grasslands, peatlands and wetlands. Biofuel crops could also reduce biodiversity through the spread of invasive species intended for biofuel feedstock production and through pollution caused by fertilizers and pesticides used for biofuel crop production (Sala et al. 2009).
Biofuel production could also enhance biodiversity by reducing net carbon emissions from fuel burning, slowing the rate of global climate change (Sala et al. 2009).
Industrial farms tend to be less diverse than native ecosystems. Low-input farms that mimic native ecosystems -- for example, mixed perennial grasses in native grassland -- may be slightly less diverse, while those like corn monoculture in native forestland dramatically disturb their native ecosystems. Figure modified from Vandermeer and Perfecto (1995) by Michael Bomford.
A range of alternative approaches to biofuel feedstock production could conserve biodiversity:
- Establishment of biofuel production systems that mimic a region's native ecosystems (Vandermeer & Perfecto 1995, Tilman et al. 2006)
Organic and low-input production of biofuel feedstock crops (Ziesemer 2007).
- Growing mixtures of biofuel feedstock crops instead of monocultures (Tilman et al. 2006, Ranganathan et al. 2007).
- Using perennials for biofuel feedstock instead of annuals (Tilman et al. 2006).
- Growing biofuel crops on small acreages on diversified farms (Sala et al. 2009).
- Using organic waste for biofuel feedstock instead of dedicated crops.
- Rotating annual feedstock crops.
For Additional Information
- Jai Ranganathan, R.J. Ranjit Daniels, M.D. Subash Chandran, Paul Ehrlich, and Gretchen Daily. 2008. Sustaining biodiversity in ancient tropical countryside. PNAS 105: 17852-17854.
- Osvaldo E. Sala, Dox Sax, and Heather Leslie. 2009. Biodiversity Consequences of Increased Biofuel Production. pp. 127-137 In R.W. Howarth and S. Bringezu [eds]. Biofuels: Environmental Consequences and Interactions with Changing Land Use. Cornell University.
- John Vandermeer and Ivette Perfecto. 1995. Breakfast of Biodiversity: The Political Ecology of Rainforest Destruction. Food First, Oakland, CA.
- Jodi Ziesemer. 2007. Energy Use in Organic Food Systems. Natural Resources Management and Environmental Department, Food and Agriculture Organization of the United Nations.
- David Tilman, Jason Hill,and Clarence Lehman. 2006. Carbon-Negative Biofuels from Low-Input High-Diversity Grassland Biomass. Science 314: 1598-1600.
Mike Morris, National Center For Appropriate Technology (ATTRA)
- Andrew R. Moss, SARE Fellow, University of Maryland | <urn:uuid:f022b09b-de1f-4c32-a0d3-6fdc6172087f> | {
"dump": "CC-MAIN-2015-22",
"url": "http://www.extension.org/pages/27534/biodiversity-and-biofuel-production",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207929978.35/warc/CC-MAIN-20150521113209-00170-ip-10-180-206-219.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.7990503907203674,
"token_count": 787,
"score": 3.859375,
"int_score": 4
} |
Getting Started with Robot Operating System (ROS) on Raspberry Pi®
This example shows you how to generate and build a standalone ROS node from a Simulink model on the Raspberry Pi hardware.
In this example, you will configure a model to generate C++ code for a standalone ROS node that runs on the Raspberry Pi board. You will use Raspberry Pi Simulink blocks together with a ROS Subscribe block to blink the Raspberry Pi user LED. If you are new to ROS, we strongly recommend reviewing Robotics System Toolbox documentation.
ROS is a communication layer that allows different components of a robot system to exchange information in the form of messages. A component sends a message by publishing it to a particular topic, such as "/odometry". Other components receive the message by subscribing to that topic. The Robotics system toolbox provides an interface between MATLAB and Simulink and the Robot Operating System (ROS) that enables you to test and verify applications on ROS-enabled hardware such as Raspberry Pi. It supports C++ code generation, enabling you to generate a ROS node from a Simulink model and deploy it to a ROS network.
In this example, you will learn how to:
- Set up the ROS environment on the Raspberry Pi board
- Create and run a Simulink model on the Raspberry Pi board to send and receive ROS messages
- Work with data in ROS messages
- This example requires Robotics Toolbox™.
- Review the Get Started with ROS example
- Review the Get Started with ROS in Simulink®(Robotics System Toolbox) example.
To run this example you need the following hardware:
- Raspberry Pi board
We strongly recommend a Raspberry Pi 2 board when working with ROS.
Task 1 - Get Started
The Raspbian Linux image provided by the Simulink Support Package for Raspberry Pi hardware includes a ROS Indigo installation. In this task, you will start a ROS master on the host computer and send messages to Raspberry Pi hardware using ROS communication interface.
1. First, start a ROS master on the host computer:
rosinit('NodeHost',<IP address of your computer>)
For example, if the IP address of your host computer is 10.10.10.2, use the following command:
2. Use rosnode list to see all nodes in the ROS network. Note that the only available node is the global MATLAB node created by rosinit.
Next, list the available ROS topics:
The output should just list /rosout topic used for console log messages.
3. Create an interactive Linux shell terminal to communicate with your Raspberry Pi board:
r = raspberrypi openShell(r)
The commands above will log you in with your username and password. Note that in the rest of this example, we assume that you logged in with the default username for the Raspbian Linux, pi.
4. On the interactive Linux command shell, initialize ROS environment and set the ROS master to the IP address of the host computer and monitor messages coming from the host computer using:
pi@raspberrypi:~ $ source ~/catkin_ws/devel/setup.bash pi@raspberrypi:~ $ export ROS_MASTER_URI=http://<Enter your host computer's IP address>:11311 pi@raspberrypi:~ $ rostopic echo /rosout
The last command does not return and waits for a new message published to the /rosout topic. On the MATLAB command line, execute the following commands to see that your Raspberry Pi has subscribed to the /rosout topic:
rostopic info /rosout
The IP address of your Raspberry Pi board should show up in the subscriber list.
5. To publish a log message to the /rosout topic from the host computer, execute the following commands on the MATLAB prompt:
b = rospublisher('/rosout'); msg = rosmessage(b); msg.Msg = 'Hello Raspberry Pi!' send(b,msg);
When the send(b,msg) is executed, you should see that the contents of the message you sent from your host computer is printed on the Raspberry Pi Linux shell.
6. Execute a Ctrl+C On the Raspberry Pi Linux command shell to stop listening messages published to /rosout topic.
Task 2 - Configure a Model to Generate a ROS Node
In this task, you will configure a model to generate C++ code for a standalone ROS node that runs on your Raspberry Pi board.
1. Open the Raspberry Pi Getting Started with ROS model.
2. Click on Simulation > Model Configuration Parameters and follow the steps illustrated in the diagram below to configure the model to generate a ROS node for Raspberry Pi:
Review the settings in the Hardware Implementation pane of the Configuration Parameters dialog, The Hardware board settings section contains settings specific to the generated ROS package, such as information to be included in the package.xml file, ROS Catkin workspace being used for model build, etc. In
3. The model is configured to generate a ROS node in the ROS Catkin workspace, ~/catkin_ws, and automatically deploy to the Raspberry Pi board. Click on Build Model button to start deployment process.
Click on the View Diagnostics link at the bottom of the model toolbar to see the output of the build process.
Task 3 - Run and Verify the ROS Node
In this task, you will run the newly-built ROS node and verify its behavior using a MATLAB command line interface for ROS.
1. Raspberry Pi Getting Started with ROS model receives messages published on the /led topic and sets the state of the Raspberry Pi user LED based on the contents of this message. First, verify that a new topic called /led has been generated:
rostopic info /led
You should see the IP address of your Raspberry Pi in the subscribers list.
2. Create a ROS publisher for the /led topic:
b = rospublisher('/led')
The publisher b uses std_msgs/Bool message type to represent the on / off state of the LED.
3. Send messages to Raspberry Pi board to blink the user LED for 10 seconds with a period of 0.5 second:
msg = rosmessage(b); for k = 1:10 msg.Data = 1; send(b,msg); pause(0.5); msg.Data = 0; send(b,msg); pause(0.5); end
4. Once you are done verifying the ROS node, stop it by executing the following on the MATLAB prompt:
You can re-start the ROS node at any time by executing the following command on the MATLAB prompt:
The second argument specifies the Catkin workspace used to build the ROS node.
Advanced Topics and Troubleshooting
Raspberry Pi ROS Indigo Installation The Raspbian Linux image provided by the Simulink Support Package for Raspberry Pi Hardware includes a ROS Indigo installation. A the time of writing, there were no binary packages available for ROS Indigo. Hence ROS Indigo was installed from sources following the instructions provided here. To keep the ROS Indigo installation small, only roscomm, std_msgs, geometry_msgs and sensor_msgs ROS packages have been installed. An installation script has been provided to document the steps taken for installation. A ROS Catkin workspace has been created for installation in the home directory of the default user pi. This workspace is called ros_catkin_ws. A second workspace has been created to build Simulink models, catkin_ws. You should use the catkin_ws as your default Simulink model workspace to reduce compilation time. Use ros_catkin_ws only to add new packages to the existing ROS distribution (see below).
Adding New Packages to ROS A script called install_ros_package.sh has been provided to help adding new ROS packages to the existing installation. To use this script to add nav_msgs package, for example, follow the procedure below:
On the MATLAB prompt:
r = raspberrypi; installScript = fullfile(codertarget.raspi.internal.getSpPkgRootDir,'src','install_ros_package.sh'); putFile(r,installScript); system(r,['chmod u+x ' installScript]); openShell(r)
On the Linux shell:
Note that this command may take several minutes. Some ROS packages may require additional dependencies in the form of Linux packages such as collada-dom. You may need to manually install the required Linux packages. For example, to install collada-dom follow the procedure below on a Linux shell:
mkdir ~/ros_catkin_ws/external_src sudo apt-get -y install checkinstall cmake sudo sh -c 'echo "deb-src http://mirrordirector.raspbian.org/raspbian/ testing main contrib non-free rpi" >> /etc/apt/sources.list' sudo apt-get update cd ~/ros_catkin_ws/external_src sudo apt-get -y install libboost-filesystem-dev libxml2-dev wget http://downloads.sourceforge.net/project/collada-dom/Collada%20DOM/Collada%20DOM%202.4/collada-dom-2.4.0.tgz tar -xzf collada-dom-2.4.0.tgz cd collada-dom-2.4.0 cmake . sudo checkinstall -y make install
Starting a ROS Master on Raspberry Pi The raspberrypi object provides two methods to start and stop a ROS master on the Raspberry Pi board:
To start a ROS master on the Raspberry Pi, execute the following on the MATLAB prompt:
r = raspberrypi; startroscore(r);
To stop the roscore application running on the Raspberry Pi:
When using a ROS master running on your Raspberry Pi, set ROS Master network address for simulation accordingly:
This example showed you how to configure a Simulink model to generate C++ code for a standalone ROS node that runs on Raspberry Pi hardware. It also showed how to with the ROS node running on the Raspberry Pi hardware using MATLAB command line interface for ROS. | <urn:uuid:50143ef8-09bd-4480-8f64-44cc11c13577> | {
"dump": "CC-MAIN-2017-43",
"url": "http://www.mathworks.com/examples/simulink/mw/raspberrypi_product-raspberrypi_gettingstarted_with_ros-getting-started-with-robot-operating-system-ros-on-raspberry-pi-reg?s_cid=rlcnt_ME",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825057.91/warc/CC-MAIN-20171022022540-20171022042540-00567.warc.gz",
"language": "en",
"language_score": 0.7772358655929565,
"token_count": 2148,
"score": 3.296875,
"int_score": 3
} |
Speaker cautions local high school students about spending too much screen time on their devices
“The average 18-year-old is on pace to spend 94% of their remaining free time in life consuming online entertainment.”
That was a statement made by Dino Ambrosi, the founder of Project Reboot, who held a three-day seminar this week about screen time at the Mental Wellness Center in Santa Barbara. Meeting with about a dozen local high school students, Mr. Ambrosi sought to encourage them to be more mindful of the amount of time they’re spending on technology — particularly social media platforms — as well as strategies to help them in overall time management skills.
The concept of Project Reboot was born out of a course Mr. Ambrosi started and first taught as a senior at UC Berkeley, which he says has helped students cut down three-and-a-half hours on average of their daily use of technology. The course itself, which is still offered at the university, was inspired by his own struggles with phone addiction while he was a college student.
“I’m on a mission to help as many high school and college students as I possibly can build healthy relationships with tech,” Mr. Ambrosi told the News-Press Wednesday. “I had a really unhealthy relationship with my phone when I went to college. I just didn’t do a good job of handling the discomfort that came with that transition.
“Your phone is a 24/7 source of instant gratification that’s in your pocket at all times. I was just habitually turning to it, and it really messed up my college experience.”
One of the lessons that Mr. Ambrosi seeks to impart to people is that they think critically about the value they get out of using social media.
“The incentives of social media companies are not aligned with your best interests, whatsoever,” Mr. Ambrosi said. “If you don’t think carefully about how you want to interact with these platforms, you’re going to spend way more time on them than they really deserve because they have some of the world’s leading psychologists and access to trillions of points of data on user behavior to figure out how to keep you scrolling.”
“Define why you use the app in one sentence, and set a clear intention for how much of your time the value that app adds is actually worth,” he instructed.
Technology addiction has received increased attention over the years as medical professionals, tech researchers and elected officials try to make sense of how technology’s overuse is affecting people, especially teenagers and young adults.
“Young people themselves describe it in plain words that they know social media not only drains their personal time, but also their energy and that it has a direct impact on their own feelings of mental wellness,” said Mental Wellness Center CEO Annamarie Cameron. “We also hear a lot from parents about their concerns about it. So it’s clear, there’s no debate that it’s an issue that needs to be explored and given strategies.”
Dawson Kelly, a senior at San Marcos High School who will be serving as Associated Student Body president in the upcoming school year, was involved in bringing Project Reboot to Santa Barbara because he saw the impact of overusing social media in himself and among his peers.
“I believe that I have a pretty bad relationship with technology, and I think most of my peers do too,” Dawson told the News-Press. “It’s hard to recognize it when it’s so normalized. I think we’re all practicing bad habits but we’re allowing them to continue because we’re not talking about them — and when we do talk about them, we’re not actually owning up to it affecting our lives as much as it is.”
Dawson was also clear that the issue with social media overuse was much deeper than just the way it drains his and his peers’ time.
“A lot of my friends have negative images of their bodies because of social media,” he explained. “I don’t think that we as humans are meant to see so many people that aren’t in our immediate circle in such a glamorous way. You’re comparing yourself to the top people, and of course, it’s going to affect yourself when that image of what is perfect and what is ideal is constantly being shown to you.”
Reducing screen time is intended to help people effectively use their free time better and avoid the pitfalls of social media. But Mr. Ambrosi also believes that the overuse of technology and social media is preventing people from engaging in what he believes is a critical function for humans: being bored.
“I think people undervalue boredom. There have been a number of studies that show that spending more time alone with your thoughts makes you more creative,” he said. “Our brain changes based on how we use it, and when we cut out an activity like sitting alone with our thoughts, we’re decaying the neural circuits that run when we do that activity.”
“It’s almost like when you avoid thinking and processing emotions,” he explained. “It’s like you have this list of unread emails that’s piling up. And all of sudden your inbox is completely overflowing, and I feel that is at the root of a lot of the anxiety that people are feeling is that they’ve got this huge list of essentially unread messages that they’ve been avoiding by distracting themselves.”
However, Mr. Ambrosi makes clear that he’s not an advocate for completely ridding oneself of technology and social media, only that people engage with them in a healthy way.
“(Smart phones) are the best tools we’ve ever had access to, and thinking that completely getting rid of them is the right way to cope with the fact that they’re really easy to use unintentionally is a huge mistake,” he told the News-Press. “The biggest thing is to really think critically about what it is that you get out of these social media apps.” | <urn:uuid:8f8d9a7f-7666-44c1-b9f2-b3be20185f62> | {
"dump": "CC-MAIN-2022-40",
"url": "https://newspress.com/project-reboot/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335004.95/warc/CC-MAIN-20220927100008-20220927130008-00186.warc.gz",
"language": "en",
"language_score": 0.9751846790313721,
"token_count": 1336,
"score": 2.609375,
"int_score": 3
} |
Cleaning and Prevention
Oral Health for Overall Health
Proper oral cleaning and prevention does not only prevent cavities and periodontal disease but perhaps more importantly also affects our overall health and well-being.
A preventive program is a cooperative effort by the patient, dentist, and dental staff to preserve teeth supporting structures by preventing the onset, progress, and recurrence of dental disease.
This program starts at home with good oral hygiene and a balanced diet. It is continued in the dental office by our efforts to promote, restore, and maintain your oral health.
Dental cleaning and prevention also includes regular dental exams, cleanings, and x-rays.
Prevention helps avoid serious and costly dental problems and is the key to having a healthy, confident, beautiful smile.
We will perform a comprehensive dental exam at your initial dental visit. A regular check-up exam will include the following:
- Examination of diagnostic x-rays (radiographs): Essential for detection of decay, tumors, cysts, and bone loss. X-rays also help determine tooth and root positions.
- Oral cancer screening: Check the face, neck, lips, tongue, throat, tissues, and gums for any signs of oral cancer.
- Gum disease evaluation: Check the gums and bone around the teeth for any signs of periodontal disease.
- Examination of tooth decay: We check all tooth surfaces are for decay with special dental instruments.
- Examination of existing restorations: Check current fillings, crowns, etc.
Professional Dental Cleaning and Prevention
Professional dental cleanings (scaling and root planning) are performed by Registered Dental Hygienists. Your cleaning appointment will include the following:
- Removal of calculus (tartar): Calculus is hardened plaque that has been left on the tooth for some time and is now firmly attached to the tooth surface. Calculus forms above and below the gum line and can only be removed with special dental instruments.
- Removal of plaque: Plaque is a sticky, almost invisible film that forms on the teeth. It is a growing colony of living bacteria, food debris, and saliva. The bacteria produce toxins that inflame the gums. This inflammation is the start of periodontal disease!
- Teeth polishing: Remove stain and plaque that is not otherwise removed during tooth brushing and scaling.
Digital radiography (digital x-ray) is the latest technology used to take dental x-rays. This technique uses an electronic sensor (instead of x-ray film) that captures and stores the digital image on a computer. This image can be instantly viewed and enlarged helping us detect problems easier. Digital x-rays reduce radiation 40-60% compared to the already low exposure of traditional dental x-rays. Because we avoid the use of chemicals, digital x-rays are better for the environment. Dental x-rays are essential, preventative, diagnostic tools that provide valuable information not visible during a regular dental exam. We use this information to safely and accurately detect hidden dental abnormalities and complete an accurate treatment plan. Without x-rays, problem areas may go undetected. Dental X-rays may reveal:
- Abscesses or cysts
- Bone loss
- Cancerous and non-cancerous tumours
- Decay between the teeth
- Developmental abnormalities
- Poor tooth and root positions
- Problems inside a tooth or below the gum line
Detecting and treating dental problems at an early stage may save you time, money, unnecessary discomfort, and your teeth!
Are Dental X-Rays Safe?
We are all exposed to natural radiation in our environment. Digital x-rays produce a significantly lower level of radiation compared to traditional dental x-rays. Even though digital x-rays produce a low level of radiation and are considered very safe, we still take necessary precautions to limit the patient’s exposure to radiation. These precautions include only taking those x-rays that are necessary, and using lead apron shields to protect the body.
How Often Should You Have Dental X-Rays?
The need for dental x-rays depends on each patient’s individual dental health needs. Therefore, a full mouth series of dental x-rays is recommended for all new patients and is recommended to be taken every five years. Bite-wing x-rays (x-rays of top and bottom teeth biting together) are taken at recall (check-up) visits and are recommended once a year to detect new dental problems.
A sealant is a thin, plastic coating applied to the chewing surface of molars, premolars and any deep grooves (called pits and fissures) of teeth. More than 75% of dental decay begins in these deep grooves. Teeth with these conditions are hard to clean and are very susceptible to decay. A sealant protects the tooth by sealing deep grooves, creating a smooth, easy to clean surface.
Sealants are easily applied and the process takes only a couple of minutes per tooth.
The teeth to be sealed are thoroughly cleaned and then surrounded with cotton to keep the area dry. We apply a special solution to the enamel surface to help the sealant bond to the teeth. The teeth are then rinsed and dried. Sealant material is carefully painted onto the enamel surface to cover the deep grooves or depressions and then hardened with a special curing light.
Proper home care, a balanced diet, and regular dental visits will aid in the life of your new sealants.
A beautiful, healthy smile that lasts a lifetime is our ultimate goal when treating patients. Your personal home care plays an important role in achieving that goal. Your personal home care starts by eating balanced meals, reducing the number of snacks you eat, and correctly using the various dental aids that help control the plaque and bacteria that cause dental disease.
Tooth brushing: Brush your teeth at least twice a day (especially before going to bed at night) with a CDA approved soft bristle brush and toothpaste.
- Place the brush at a 45 degree angle to the gums and gently brush away from the gums, ensuring that you always feel the bristles on the gums.
- Brush the outer, inner, and biting surfaces of each tooth.
- Use the tip of the brush to clean the inside of the front teeth.
- Brush your tongue to remove bacteria and freshen your breath.
We recommend electric toothbrushes for certain patients. Research has proven that certain electric toothbrushes are more effective (if used properly) in removing plaque than manual tooth brushing.
Flossing: Daily flossing is the best way to clean between the teeth and under the gumline. Flossing not only helps clean these spaces, it disrupts plaque colonies from building up, preventing damage to the gums, teeth, and bone.
- Take 12-16 inches (30-40cm) of dental floss and wrap it around your middle fingers, leaving about 2 inches (5cm) of floss between the hands.
- Using your thumbs and forefingers to guide the floss, gently insert the floss between teeth using a sawing motion.
- Curve the floss into a “C” shape around each tooth and under the gumline. Gently move the floss up and down, cleaning the side of each tooth.
We recommend floss holders if you have difficulty using conventional floss.
Rinsing: It is important to rinse your mouth with water after brushing, and also after meals if you are unable to brush. If you are using an over-the-counter product for rinsing, it’s a good idea to consult with your dentist or dental hygienist on its appropriateness for you.
Family Dental Services in Guelph
We pride ourselves on our high standard of patient care. Being a preventative practice, we are interested in your long term oral health. We offer a wide range of treatment options utilizing the latest technology. When you join the practice you join our family. Your needs are addressed with precision, compassion and understanding.
100 Edinburgh Rd S.
Guelph, ON, N1H 5P4
Phone: (519) 824 – 5678
Monday: 8:00AM – 4:30PM
Tuesday: 8:00AM – 8:00PM
Wednesday: 8:00AM – 4:30PM
Thursday: 8:00AM – 8:00PM
Friday: 8:00AM – 4:00PM | <urn:uuid:3af576be-95a6-4b64-a864-2a164e53d92e> | {
"dump": "CC-MAIN-2021-43",
"url": "https://www.jaindentalcare.com/cleaning-prevention/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587794.19/warc/CC-MAIN-20211026011138-20211026041138-00545.warc.gz",
"language": "en",
"language_score": 0.9171844124794006,
"token_count": 1772,
"score": 3.296875,
"int_score": 3
} |
Sure, you know that all your children act differently. But have you ever considered that the reason for their difference is the order in which they were born?
In the early 20th century, psychiatrist Alfred Adler proposed that children’s personalities are directly influenced by birth order. Since then, research has been conducted that has both confirmed and denied the associated links of birth order and personality. And while birth order theory is replete with contradictions, exceptions, and generalizations, those familiar with its basic tenets can often find at least a little bit of truth in the birth order classifications.
- Natural leaders
- Perfectionist tendencies
- Achievement oriented
- Don’t like surprises
- Can be aggressive
- Can be compliant people pleasers
- Model children
- Seek approval from authority figures
- A study in contrasts
- Opposite of their older sibling
- Value relationships
- Friends are a top priority
- Love a good time
- Can be irresponsible, especially with money
The traits listed above are general guidelines, as exceptions abound. Everything from adoption, divorce, blended families, alcoholism, disabilities, and sibling death can upset the traditional roles in birth order. The gender of children, such as all girls, or an older sister/little brother situation, can impact birth order, as well as age differences between the children.
Interested in learning more, including how birth order affects parenting? Check out psychologist Kevin Leman’s The Birth Order Book. | <urn:uuid:066c3116-42eb-43d3-8878-68194837250c> | {
"dump": "CC-MAIN-2019-22",
"url": "http://grownupsmag.com/birth-order-personality/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257699.34/warc/CC-MAIN-20190524164533-20190524190533-00037.warc.gz",
"language": "en",
"language_score": 0.9469653367996216,
"token_count": 303,
"score": 2.65625,
"int_score": 3
} |
Children generally receive First Reconciliation and First Communion at St. Francis Xavier in Second Grade. Parents are expected to participate in their child’s preparation for these sacraments by attending formation meetings, sacrament workshops and liturgical celebrations planned throughout the year, as well as by working with their child to complete assignments that are given. Children learn the value of the sacraments long before they begin preparing to receive them. Be sure your children attend Mass weekly and you take them to Reconciliation regularly, once they have received First Reconciliation. The diocese requires that children have two consecutive years of religious instruction before receiving the sacraments. Students coming into Religious Education later than the usual time will be required to participate for two years before entering the sacrament program. Once prepared, older students will have a choice of receiving First Communion with the younger children or at another weekend Mass. These arrangements must be made with the Pastor. | <urn:uuid:fb457467-849e-44fe-8702-4ab45c64608b> | {
"dump": "CC-MAIN-2023-40",
"url": "https://www.sfxjoliet.org/first-reconciliation-communion/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510942.97/warc/CC-MAIN-20231002001302-20231002031302-00523.warc.gz",
"language": "en",
"language_score": 0.9673090577125549,
"token_count": 189,
"score": 2.6875,
"int_score": 3
} |
Marengo River Subwatershed
The Marengo River, a major tributary to the Bad River Watershed, originates in the heart of the Chequamegon-Nicolet National Forest north of Clam Lake, Wisconsin. After flowing through the Marengo Semi-Primitive Non-Motorized area and Marengo Lake, the Morgan Creek adds to the rivers volume. Soon, the Marengo leaves the forest to the north and east through rural farmland and is joined by the Brunsweiler River just east of the Town of Marengo. A wide, winding Marengo River joins the Bad River east of Government Road on the south side of the Bad River Indian Reservation. | <urn:uuid:918a7eed-b997-4e87-a278-16f4e7070c38> | {
"dump": "CC-MAIN-2019-13",
"url": "https://www.superiorrivers.org/marengo-river/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912204086.87/warc/CC-MAIN-20190325174034-20190325200034-00107.warc.gz",
"language": "en",
"language_score": 0.8878669142723083,
"token_count": 148,
"score": 2.75,
"int_score": 3
} |
Southeast Asia & the Pacific: Water deficits forecast for Papua New Guinea, Myanmar, & Thailand
25 May 2017
The Big Picture
The 12-month forecast through January 2018 (below) indicates water deficits in eastern Myanmar, Thailand, Borneo, and Papua New Guinea. Deficits may be extreme to exceptional in northwestern Thailand into Myanmar, and in Papua New Guinea.
Myanmar's Rural Development Director from the Ministry of Agriculture, Livestock and Irrigation estimates that 500 villages in the country may experience water shortages from lack of adequate rainfall. The government's water emergency supply program has already distributed 6.65 million gallons of water to 222 villages for 260,000 people, and has earmarked K81.5 million (Myanmar Kyat; ~USD$60,000) in fuel costs for drought-stricken townships. Villages in the States of Kayah, Rakhine, and Shan, and Mandalay Region have reported shortages of drinking water. Wells and reservoirs have dried up in 20 villages in Shan State where a youth group, police unit, and other civic organizations have donated water. In Rakhine State lakes are drying up, soldiers are delivering water, and dengue fever and diarrhea have broken out.
Across the border in Mae Hong Son Province, Thailand has also deployed soldiers to supply water to hospitals and communities. Farther south in Utai Thani Province the drought has forced farmers to take on supplemental jobs for income.
Severe drought has struck Central Java, Indonesia in recent weeks, affecting 15,000 residents. The Disaster Mitigation Agency is preparing delivery of 70 6,000-liter water tanks to Paranggupito district in Wonogiri Regency where wells and ponds - the primary sources of water - are going dry.
A new report compiled by an international research team indicates that the area of wildfires in Borneo during drought years is ten times larger than during non-drought years, increasing fire risk.
The 3-month maps (below) show the evolving conditions in more detail.
From May through July moderate to severe deficits are forecast to emerge in eastern Myanmar and western Thailand. Exceptional deficits in Papua New Guinea will downgrade but severe to extreme deficits will persist and emerge farther west into Papua, Indonesia. Moderate deficits are forecast to emerge in the western two-thirds of Indonesian Borneo. Surpluses reaching exceptional severity are expected to persist in Sumbawa and Flores Islands, Indonesia. Moderate surpluses are forecast for northeastern Borneo and southern Philippines.
From August through October deficits in the region will downgrade and surpluses will nearly disappear. Moderate deficits will continue to emerge across mainland Thailand, Indonesian Borneo, and southern Sumatra, and will emerge in central Java, Sulawesi, and north of Kuala Lumpur, Malaysia. Scattered deficits will persist in Papua New Guinea but are forecast to be less severe than in prior months.
The forecast for the latter three months – November through January – indicates that the extent and severity of deficits will increase in Southeast Asia and Papua.
(It should be noted that forecast skill declines with longer lead times.)
Search blog categories
Search blog tags | <urn:uuid:3bdf1ba4-c12b-4599-b62c-53452432a4de> | {
"dump": "CC-MAIN-2019-09",
"url": "https://www.isciences.com/blog/2017/5/17/southeast-asia-the-pacific-water-deficits-forecast-for-papua-new-guinea-myanmar-thailand",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247479627.17/warc/CC-MAIN-20190215224408-20190216010408-00252.warc.gz",
"language": "en",
"language_score": 0.9250359535217285,
"token_count": 650,
"score": 2.5625,
"int_score": 3
} |
Solar Panels generate electrical power by converting solar radiation into direct current electricity using semiconductors that exhibit the photovoltaic effect. Solar panel electricity systems, also known as solar photovoltaics (PV), capture the sun's energy using solar (photovoltaic) cells. These cells don't need direct sunlight to work - they can still generate some electricity on a cloudy day. The cells convert the sunlight into electricity, which can be used to run household appliances and lighting.
Solar Cells produce direct current electricity from sunlight, which can be used to power equipment or to recharge a battery. The first practical application of photovoltaics was to power orbiting satellites and other spacecraft, but today the majority of photovoltaic modules are used for grid connected power generation. In this case, an inverter is required to convert the DC to AC. There is a smaller market for off-grid power for remote dwellings, boats, recreational vehicles, electric cars, roadside emergency telephones, remote sensing, and cathodic protection of pipelines.
Photovoltaic power generation employs solar panels composed of a number of solar cells containing a photovoltaic material. Materials presently used for solar panels include monocrystalline silicon, polycrystalline silicon, amorphous silicon, cadmium telluride, and copper indium gallium selenide/sulfide. Due to the growing demand for renewable energy sources, the manufacturing of solar cells and photovoltaic arrays has advanced considerably in recent years.
Photovoltaic (PV) cells are formed from a wafer of semiconductor material and although there are now several types of products using different materials, the most common semiconductor used is silicon. Pure crystalline silicon is a poor electrical conductor but treats it with tiny quantities of an impurity, either phosphorous or arsenic (a process called "doping") and enough electrons of these materials are freed to enable a current to pass through. Electrons are negatively charged so this type of silicon is called N-Type. Dope silicon with gallium or boron and "holes" are created in the crystalline lattice where a silicon electron has nothing to bond with. These holes can conduct electrical current and the lack of an electron creates a positive charge so this type of silicon is therefore called P-Type.
Both types of silicon are modest electrical conductors, hence the name semiconductors. Put a layer of each kind together in a wafer, such as in a PV cell, and the free electrons in the N side migrate towards the free holes on the P side. This causes a disruption to the electrical neutrality where the holes and electrons mix at the junction of the two layers. Eventually a barrier is formed preventing the electrons from crossing to the P side and an electrical field is formed, separating both sides.
This electrical field acts as a diode, allowing electrons to pass from the P side to the N side, but not vice versa. Expose the cell to light, and the energy from each photon (light particle) hitting the silicon, will liberate an electron and a corresponding hole. If this happens within range of the electric field's influence, the electrons will be sent to the N side and the holes to the P one, resulting in yet further disruption of electrical neutrality. Apply an external pathway connecting both sides of the silicon wafer and electrons will flow back to their original P side to unite with the holes sent there by the electric field. This flow of electrons is a current; the electrical field in the cell causes a voltage and the product of these two is power. Several factors affect the efficiency of a solar cell. Some cells, mainly ones made from a single material, are only efficient in certain light wavelengths.
Single material cells can at the very most expect to convert about 25% of the light hitting it to electrical power. Research is ongoing into multi-junction cells combining two or more different materials in a single cell. These can have a theoretical efficiency of up to 70% but the cells are problematical in that too many layers can put the crystals under too much strain. The most efficient multi-junction cell so far has attained a 30% efficiency with just two layers. A recent encouraging discovery has found that alloys of indium gallium nitride have the potential to convert the full light spectrum to electrical power with the added bonus that they could also be very cheap to produce.
The 89,000 TW of sunlight reaching the Earth's surface is plentiful - almost 6,000 times more than the 15 TW equivalent of average power consumed by humans. Additionally, the solar electric generation has the highest power density (global mean of 170 W/m²) among renewable energies. Solar power is pollution-free in use. Production end-wastes and emissions are manageable using existing pollution controls. End-of-use recycling technologies are under development and policies are being produced that encourage recycling from producers. PV installations can operate for many years with little maintenance or intervention after their initial set-up, so after the initial capital cost of building any solar power plant, operating costs are extremely low compared to existing power technologies.
As of 2011, the price of PV modules per MW has fallen by 60 percent since the summer of 2008, according to Bloomberg New Energy Finance estimates, putting solar power for the first time on a competitive footing with the retail price of electricity in a number of sunny countries. There has been fierce competition in the supply chain, and further improvements in the levelised cost of energy for solar lie ahead, posing a growing threat to the dominance of fossil fuel generation sources in the next few years. As time progresses, renewable energy technologies generally get cheaper, while fossil fuels generally get more expensive:The less solar power costs, the more favorably it compares to conventional power, and the more attractive it becomes to utilities and energy users around the globe. Utility-scale solar power can now be delivered in California at prices well below $100/MWh ($0.10/kWh) less than most other peak generators, even those running on low-cost natural gas.
Lower solar module costs also stimulate demand from consumer markets where the cost of solar compares very favorably to retail electric rates. When grid-connected, solar electric generation replaces some or all of the highest-cost electricity used during times of peak demand (in most climatic regions). This can reduce grid loading, and can eliminate the need for local battery power to provide for use in times of darkness. These features are enabled by net metering. Time-of-use net metering can be highly favorable, but requires newer electronic metering, which may still be impractical for some users.
Grid-connected solar electricity can be used locally thus reducing transmission/distribution losses (transmission losses in the US were approximately 7.2% in 1995). Compared to fossil and nuclear energy sources, very little research money has been invested in the development of solar cells, so there is considerable room for improvement. Nevertheless, experimental high efficiency solar cells already have efficiencies of over 40% in case of concentrating photovoltaic cells and efficiencies are rapidly rising while mass-production costs are rapidly falling.
Solar electricity is not produced at night and is greatly reduced in cloudy conditions requiring alternate sources of power. While many buildings with photovoltaic arrays are tied into the power grid which absorbs any excess electricity generated throughout the day and provides electricity in the evening, such systems use a grid tie inverter to convert direct current (DC) alternating current (AC) incurring an energy loss of 4-12%. Off-grid systems use either storage batteries which also incur significant energy losses and require regular maintenance or engine-generators which consume costly fuel. Solar electricity production depends on the limited power density of the location's insolation. The average daily output of a flat plate collector at latitude tilt in the contiguous US is 3-7 kilowatt h/m²/day and on average lower in Europe.
Solar electricity is more expensive than most other forms of small-scale alternative energy production. Without governments mandating "feed-in tariffs" for green solar energy, solar PV is less affordable to homeowners than solar hot water or solar space heating. Photovoltaic panels are specifically excluded in Europe from RoHS (Restriction on Hazardous Substances) since 2003 and were again excluded in 2011. California has largely adopted the RoHS standard through EWRA. Therefore, PV panels may legally in Europe and California contain lead, mercury and cadmium which are forbidden or restricted in all other electronics. Much of the investment in a home-mounted system may be lost if the home-owner moves and the buyer puts less value on the system than the seller. | <urn:uuid:07ed90cc-d867-47bc-8d08-c8f45558e5b6> | {
"dump": "CC-MAIN-2020-40",
"url": "https://altangra.com/services/solar-panels.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600402132335.99/warc/CC-MAIN-20201001210429-20201002000429-00249.warc.gz",
"language": "en",
"language_score": 0.9278658628463745,
"token_count": 1775,
"score": 4.0625,
"int_score": 4
} |
The double breasted style, like many styles for men and boys,
originated from militry uniforms. It was common in the 19th Century for
soldiers to have extensive rows of buttons on their uniforms.
The effect was purely ornamental. The style was at mid-century carried
over onto boys jackets with destinctive military styling. Eventually
the militarybtyling was lost, but rows of ornamental buttons
continued on many different garments.
Double breasted styling was used with some kilts. The double-
breasted style was more common
in dresses and suits, but the fashion was also used for kilt suits.
I do not yet have any historical information. I am collecting
available images which hopefully will provide some insights on the
development of this important style.
The double breasted styling on kilt suits seems to have been most common in the 1880s
and declined in popularity during the 1890s.
The styling and materials used for double breasted kilt suits appears tomhave been
much the same as for kilt suits in general.
The double breasted styling appearsvto have been most common on
boys' clothing, a confirmation of its miltary images. Thus double breasted
kilts and dress styling can be used as an indicator of gender when long
hair and curls makes it difficult to identify a child.
Some kilt outfits came with double breasted jackets. However, this
style does no appear to have been common. I have seen double-breasted
kilts as early as the 1870s, but they may have appeared earlier. Some
kiltsuits only had the double breasted styling on the jacket. In
some cases the designer was so taken with double breasted styling
that the buttons were continued from the jacket down to the kilt | <urn:uuid:ab93bc82-56dd-4fee-8898-fe0a62dc3d11> | {
"dump": "CC-MAIN-2017-43",
"url": "http://histclo.com/style/skirted/Kilt/breast2kilt.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823114.39/warc/CC-MAIN-20171018195607-20171018215607-00643.warc.gz",
"language": "en",
"language_score": 0.9723812341690063,
"token_count": 378,
"score": 3.203125,
"int_score": 3
} |
A robot scientist that can generate its own hypotheses and run experiments to test them has made its first real scientific discoveries.
Dubbed Adam, the robot is the handiwork of researchers at Aberystwyth University and the University of Cambridge in the UK. All by itself it discovered new functions for a number of genes in Saccharomyces cerevisiae, aka brewer’s yeast.
Ross King, a computational biologist at Aberystwyth, who leads the project, said that Adam’s results were modest, but real. “It’s certainly a contribution to knowledge. It would be publishable,” he says.
Adam, which actually consists of a small roomful of lab equipment, has four personal computers that act as a brain, and possesses robot arms, cameras, liquid handlers, incubators and other equipment. The team gave the robot a freezer containing a library of thousands of mutant strains of yeast with individual genes deleted. It was also equipped with a database containing information about yeast genes, enzymes, and metabolism, and a supply of hundreds of metabolites.
To discover which genes coded for which enzymes, Adam cultured a mutant yeast with a certain gene knocked out, and monitored how well the mutant grew without a particular metabolite. If the strain grew poorly without the metabolite, Adam learned something about the function of the knocked out gene. The robot could carry out more than 1000 of these experiments a day.
In all, Adam formulated and tested 20 hypotheses about genes coding for 13 enzymes. Twelve hypotheses were confirmed. For instance, Adam correctly hypothesised that three genes it identified encode an enzyme important in producing the amino acid lysine. The researchers confirmed Adam’s work with their own experiments.
The team is now working on a new robot, called Eve, which will search for new drugs.
Adam, Eve and their ilk could soon automate routine and time-consuming scientific chores, leaving human scientists free to make higher level, creative leaps, says King. But ultimately the robots may even be capable of conducting truly independent research, he says.
Will Bridewell, an artificial intelligence researcher at Stanford University in Palo Alto, California, says Adam is operating only at the level of a graduate student. Still, the robot is moving closer to the goal of an artificially intelligent machine that can cooperate with other scientists and write up their results in natural language, he says. “That’s probably far off, but it seems likely that we will get there. This is yet another step on the way.”
In a further step in this direction, researchers at Cornell University in Ithaca, New York, have developed software that can observe physical systems and independently identify the laws that underlay them.
The software, which was not pre-programmed with any basic rules of physics or geometry, was shown images of moving systems such as a double pendulum. It then used an evolutionary algorithm to generate mathematical equations, and tested them to see if they accurately described the system it had observed. For instance, the computer produced an equation that described conservation of angular momentum.
More on these topics: | <urn:uuid:bded8dd8-1212-4533-9674-11801b86bcb6> | {
"dump": "CC-MAIN-2020-29",
"url": "https://www.newscientist.com/article/dn16890-robot-scientist-makes-discoveries-without-human-help/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655891640.22/warc/CC-MAIN-20200707013816-20200707043816-00127.warc.gz",
"language": "en",
"language_score": 0.9529632925987244,
"token_count": 643,
"score": 3.8125,
"int_score": 4
} |
Samuel Langhorne Clemens (November 30, 1835 – April 21, 1910), better known by his pen name Mark Twain, was an American author and humorist. He is most noted for his novels, The Adventures of Tom Sawyer (1876), and its sequel, Adventures of Huckleberry Finn(1885), the latter often called "the Great American Novel."
Twain grew up in Hannibal, Missouri, which would later provide the setting for Huckleberry Finn and Tom Sawyer. He apprenticed with a printer. He also worked as a typesetter and contributed articles to his older brother Orion's newspaper. After toiling as a printer in various cities, he became a master riverboat pilot on the Mississippi River, before heading west to join Orion. He was a failure at gold mining, so he next turned to journalism. While a reporter, he wrote a humorous story, "The Celebrated Jumping Frog of Calaveras County", which became very popular and brought nationwide attention. His travelogues were also well-received. Twain had found his calling.
He achieved great success as a writer and public speaker. His wit and satire earned praise from critics and peers, and he was a friend topresidents, artists, industrialists, and European royalty.
He lacked financial acumen, and, though he made a great deal of money from his writings and lectures, he squandered it on various ventures, in particular the Paige Compositor, and was forced to declare bankruptcy. With the help of Henry Huttleston Rogers he eventually overcame his financial troubles. Twain worked hard to ensure that all of his creditors were paid in full, even though his bankruptcy had relieved him of the legal responsibility.
Twain was born during a visit by Halley's Comet, and he predicted that he would "go out with it" as well. He died the day following the comet's subsequent return. He was lauded as the "greatest American humorist of his age," and William Faulkner called Twain "the father of American literature." | <urn:uuid:a4407b6a-3f99-4a1a-a958-b73aea193f63> | {
"dump": "CC-MAIN-2015-35",
"url": "http://lastwordblog.blogspot.com/2012/02/twenty-years-from-now-you-will-be-more.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644064919.24/warc/CC-MAIN-20150827025424-00033-ip-10-171-96-226.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9928063750267029,
"token_count": 420,
"score": 3.421875,
"int_score": 3
} |
Six Images You Need to See to Understand the Drought
The U.S. is experiencing its worst drought in more than 50 years, and one of the top 10 droughts on record. In terms of drought extent and intensity, it is the worst drought since at least 1956, and has been compared to the devastating droughts of the Dust Bowl era during the 1930s, although those droughts were more intense. As of July 31, 62.91 percent of the lower 48 states was in at least moderate drought, down slightly from 63.86 percent on July 24. The Agriculture Department has taken the unprecedented step of declaring more than 50 percent of all U.S. counties as natural disaster areas, making them eligible for federal assistance to help struggling farmers.
What's causing this drought, why did it develop so quickly, and how bad is it, really?
First, the causes. This drought developed due to a pronounced lack of rainfall, coupled with several unusual heat waves that struck during the spring and summer and helped to rapidly intensify the drought conditions. As you can see from this arresting image of the Morse Reservoir in Indiana, rainfall has not exactly kept pace with evaporation driven by the excessive heat. In fact, rainfall across the country has been well below average during the late spring and summer months in most of the lower 48 states. As Climate Central reported in July, the weather pattern that led to the drought may have had its roots in the tropical Pacific Ocean, related to a waning La Niña event.
This 16-second animation shows how quickly the drought intensified from late spring into summer, engulfing a large swath of the country.
The High Plains has been one of the driest areas of the country this year, with much below-average precipition and extreme heat, as can be seen in this colorful map from the High Plains Regional Climate Center. Unfortunately, the colors that farmers and ranchers want to see — greens and blues, indicating slightly above average precipitation — are almost nowhere to be found.
Although natural climate variability, such as a La Niña event that only recently dissipated, likely contributed to the drought, very warm temperatures have worsened the situation. This is the country's warmest year-to-date, with much of the nation broiling for most of the summer under the influence of a massive "Heat Dome" of High Pressure. The heat did not cause the drought, according to drought specialists, but it hasn't helped matters, since it accelerates the drying of soils and vegetation, thereby damaging crops.
In the exceedingly dry state of Oklahoma, Tulsa and Oklahoma City recorded back-to-back August days with a high temperature of 112°F. In Oklahoma City, this was the warmest it has been since the Dust Bowl, and just 1 degree shy of the city's all-time high temperature record. As you can see from this next map, the heat bullseye has been squarely focused on Oklahoma during late July into early August.
July was a particularly brutal month for farmers in the High Plains, as high temperatures were at or above 95°F nearly every day of the month. According to the U.S. Department of Agriculture, such high temperatures can damage corn and soybean crops.
As you might expect, soil moisture is running very low across much of the U.S., thanks to the 1-2 punch of the lack of rainfall and the heat. The soil moisture image below comes from the NASA GRACE Satellites, which detect small changes in the Earth's gravity field caused by the redistribution of water both on and beneath the land surface.
You can catch up with all of Climate Central's drought coverage, and read my earlier installment of exploring the drought through geeky weather maps. Please comment and offer suggestions of questions you'd like to see us tackle as the drought stretches into early fall, as well. | <urn:uuid:40807cd8-0069-4618-9939-5a20d67f1016> | {
"dump": "CC-MAIN-2016-18",
"url": "http://www.climatecentral.org/blogs/key-images-of-the-extreme-us-drought-14746",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860111455.18/warc/CC-MAIN-20160428161511-00084-ip-10-239-7-51.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.968770444393158,
"token_count": 792,
"score": 3.5625,
"int_score": 4
} |
Testing and prevention
Screening criteria and preventive strategies are more explicit. The new guidelines recommend diabetes and prediabetes testing for asymptomatic individuals who are overweight and have additional risk factors (e.g., physical inactivity, family history of diabetes, hypertension), regardless of age. As before, all individuals older than 45 should also be screened.
The section of the Recommendations on prevention and delay of type 2 diabetes now includes a table listing interventions (Table 1) and summarizing prevention trial results. Counseling is recommended for patients with impaired glucose tolerance (IGT) or impaired fasting glucose (IFG) to help them achieve the goals established by the multicenter Diabetes Prevention Program (DPP): weight loss 5%-10% of body weight and physical activity equal to 150 minutes weekly of moderate walking.
A more significant change is the addition of pharmacotherapy for prevention. The guidelines recommend that clinicians consider metformin for individuals who are obese, younger than 60 years old, and at very high risk (i.e., both IFG and IGT and at least one other risk factor). Metformin was chosen for its low cost (the drug is available generically), relatively benign side-effect profile, and performance in the DPP.
Approach to treatment
The guidelines now include treatment recommendations—general strategies rather than specific drugs—for type 1 as well as type 2 diabetes. For type 1 diabetes, the emphasis is on the use of multiple injections with a mix of basal and prandial insulin, the latter to match carbohydrate intake, premeal blood glucose, and anticipated activity. Insulin analogs should be considered, particularly if hypoglycemia is a problem.
For type 2 diabetes, the Recommendations stress prompt intervention with metformin, dietary modification, exercise, and the addition of other drugs as needed to achieve and maintain glycemic levels as close to normal as possible. Insulin should be considered early on—even at the time of diagnosis in the presence of marked weight loss or other signs or symptoms of severe hyperglycemia.
Beyond metformin and insulin, the guidelines no longer recommend a sequence or schema for choosing among specific drugs for type 2 diabetes.
The guidelines recognize the utility of continuous monitoring of interstitial glucose to supplement self-monitoring of blood glucose in type 1 diabetes, particularly for patients with hypoglycemia unawareness.
Glycemic goals remain largely unchanged, although the language has been revised. Hemoglobin A1c should in general be kept below 7%; the goal might be more rigorous—as close to normal as possible (<6%)—for selected patients and less stringent for others (e.g., with history of severe hypoglycemia or long-standing diabetes with minimal complications).
[Dr. Kirkman points out that the 2008 Recommendations were issued before release of data from the Action to Control Cardiovascular Risk in Diabetes (ACCORD) trial that associated intensive glycemic control with increased mortality. She notes that the question remains unsettled and that data from this and other trials should clarify the situation soon. “Until we know more, we aren’t changing anything,” she states.]
The section on hypoglycemia has been expanded to include discussions on prevention and hypoglycemia unawareness. Patients who have had episodes of severe hypoglycemia or who have hypoglycemia unawareness should be counseled to raise glycemic goals sufficiently to avoid further episodes for a period of at least several weeks. The same dysfunctions in counter-regulatory hormone release and autonomic response may both increase risk of and result from hypoglycemia. Such irregularities have been shown to normalize after a period in which hypoglycemia is rigorously avoided. | <urn:uuid:d1e2d85e-cc84-4a02-b649-fd9d5a432c53> | {
"dump": "CC-MAIN-2023-23",
"url": "https://www.clinicaladvisor.com/home/features/advocating-what-works-for-diabetes/2/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653764.55/warc/CC-MAIN-20230607111017-20230607141017-00318.warc.gz",
"language": "en",
"language_score": 0.9185053706169128,
"token_count": 773,
"score": 2.640625,
"int_score": 3
} |
Stonega Coke and Coal Company.
The Stonega Coke & Coal Company was a typical large southern Appalacian bituminous coal producer with mines in Virginia and West Virginia.
The Stonega Coke & Coal Company was incorporated in New Jersey on April 19, 1902, and reincorporated in Delaware on May 4, 1910. It was formed for the purpose of operating and further developing the coal properties of the Virginia Coal & Iron Company, which had opened its first mine at Stonega in Wise County, Va., in 1896. The company was controlled by Dr. John Shriver Wentz, a prominent Philadelphia anthracite and bituminous coal operator, who was also president of the Virginia Coal & Iron Company. The two firms had many stockholders and officers in common, and VC&I received a large minority interest in Stonega in 1922 to represent the value of pre-1902 facilities transferred to the new firm.
The Stonega Coke & Coal Company underwent rapid expansion, particularly in the decade beginning in 1915. In 1910 it absorbed the neighboring Keokee Consolidated Coke Company, and in 1923 it purchased the New River Collieries Company of West Virginia from the Guggenheim interests. By 1925 it was operating mines at nine company towns in Virginia and two (Sun and Eccles) in West Virginia. Output peaked in 1929 at 3.25 million tons, a figure that was not exceeded until 1964. At first, Stonega primarily shipped coke to industrial consumers and utilities in the Southeast. The work force consisted of an equal mixture of native whites, blacks from the Cotton South and European immigrants. The last two groups began to leave the region as production collapsed in the Depression.
The Stonega Coke & Coal Company created two local subsidiaries, the Virginia Wholesale Company (1910-1971) to act as a wholesaler supplying the company stores, and the Central Supply Company (1920-date), which deals in mine supplies and construction materials.
In 1929, Stonega was amalgamated but not merged with the Westmoreland Coal Company (Pa.), in which Wentz family had a substantial interest since 1917. The economics thus achieved, coupled with a severe cutback in operations, permitted both companies to weather the Depression and remain competitive by increasing mechanization. Stonega disposed of its West Virginia properties, selling a 51% interest in the Eccles mine to the Chicago, Wilmington & Franklin Coal Company in 1929 and abandoning the Sun Mine in 1932. The Eccles property was sold to Eastern Gas & Fuel Associates in 1946. Both groups of mines were organized by the United Mine Workers in 1933-34.
The Stonega Coke & Coal Company and the Westmoreland Coal Company were merged on April 30, 1964. The successor, Westmoreland Coal Company (Del.) retains Stonega's Delaware charter with the older Westmoreland name.
The records of the Stonega Coke & Coal Company are fragmentary between 1902 and 1910, but substantially complete after 1930. All major business, technical and labor issues are exceptionally well-documented.
Among the more useful series are the annual reports of the operating departments (1915-1957). These include thorough reports of most of the company's field activities, including information on construction, output, prices, wages, recruitment of labor, accidents and medical statistics. Photographs, maps, plans and drawings of all types of buildings and equipment are included. There are also several series of internal accounting statements computing unit costs for manual and mechanized mining, income, store sales, house rents and capital improvements.
Insurance records include descriptions and inventories of company buildings and equipment, along with a 1907 list of occupants of company houses.
The Philadelphia office files are generally limited to legal and corporate matters and to the development of certain mine properties in the 1950s. The Virginia office files are much more extensive and document such subjects as the transition from manual to mechanized mining, the growth of regulation, the unionization of the mines after 1933, industrial safety and welfare work, community services and company housing, and the impact of the Depression and World War II on the local community.
The records also contain maps and photos of company towns, plans of mining equipment, a short-lived employees' magazine, trade brochures, technical papers, notices, posters, union and "yellow dog" contracts, safety handbooks and hospital rules. A company-sponsored public opinion survey from the 1950s gives a unique sociological profile of both employees and the community at large as the era of the company town was ending.
Literary rights retained by depositor.
Unpublished finding aid available at the repository.
Forms part of: Westmoreland Coal Company Records.
Knode, Ralph H. (Ralph Howard), 1893-1963.
Leisenring, E. B. (Edward Barnes), 1895-1952.
Leisenring, E. B. (Edward Barnes), 1926-2011.
Mouser, Otis, 1868-1929.
Perin, Charles Page, 1861-1937.
Rogers, John D. (John Dwight), d. 1944.
Taggart, Ralph E. (Ralph Enos), 1887-1951.
Wentz, Daniel B. (Daniel Bertsch), 1872-1926.
Admiralty Coal Corporation.
Appalachian Coals, Inc.
Bituminous Coal Operators' Association.
Blackwood Coal and Coke Company.
Central Supply Company of Virginia.
Chicago, Wilmington and Franklin Coal Company.
Crab Orchard Improvement Company.
Goodman Manufacturing Company.
Harlan County Coal Operators' Association.
Imboden Coal and Coke Company.
Imboden Coal Company.
Imboden Coke Company.
Jeffrey Manufacturing Company (Columbus, Ohio)
Joy Manufacturing Company.
Keokee Coal and Coke Company.
Keokee Consolidated Coke Company.
Louisville and Nashville Railroad Company.
Morrow Manufacturing Company.
New River Collieries Company.
Southern Coal Producers' Association.
Southern Railway (U.S.).
Southern States Industrial Council.
Stonega Coke and Coal Company.
Stonega Veterans Association.
Stonegap Colliery Company.
Tennessee Valley Authority.
United Mine Workers of America.
United States. National Recovery Administration.
United States Coal and Coke Company.
Virginia Coal and Iron Company.
Virginia Coal Operators' Association.
Virginia Iron, Coal and Coke Company.
Virginia Manufacturers' Association.
Virginia Wholesale Company.
Vulcan Iron Works.
Jamestown Ter-centennial Exposition (1907).
Louisiana Purchase Exposition (1904 : Saint Louis, Mo.).
African American coal miners -- Virginia.
Coal mines and mining -- Virginia.
Coal mines and mining -- West Virginia.
Collective bargaining -- Coal mining industry.
Employee attitude surveys.
First aid in illness and injury.
Mine rescue work.
Mine roof control.
Sawmills -- Virginia.
Strikes and lockouts -- Coal mining.
Strip mining -- Virginia.
Wages -- Coal miners.
Working class -- Virginia.
Yellow dog contract. | <urn:uuid:57a7fc80-6fed-468d-86c7-94a52bbe1ee6> | {
"dump": "CC-MAIN-2014-35",
"url": "http://www.pachs.net/catalogs/hml4/29514.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535917663.12/warc/CC-MAIN-20140901014517-00086-ip-10-180-136-8.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.904902458190918,
"token_count": 1491,
"score": 2.921875,
"int_score": 3
} |
Let’s know about Time and Tide wait For None Essay.
Meaning – (Time and Tide wait For None Essay)
‘Time and tide wait for no one’ This is an old saying which means that both time and tide are beyond our control, that is, they can neither be stopped nor diverted in any way. ; Therefore, one should discharge his work by considering the fact that the time that has passed, never comes back.
This proverb tells us the true value of time and also gives the message that time is the most valuable asset. It also warns us that we should not waste time and should also be ready for every kind of incident.
Example – (Time and Tide wait For None Essay)
Example is the best way to understand the true meaning of any proverb. Keeping this in mind, I have brought for you some recent examples based on the proverb ‘Time and tide wait for no one’, which will help you to understand this proverb better.
“The clock goes on every second, and not a second that has passed never comes back, no matter what you do or how desperate you are – because time and tide wait for nothing.” “
“When fishermen go deep-sea fishing, they probably know that they have to do all their work within a certain time; also they need to return to shore before the high tide arrives. Because, time and tide do not wait for their work to be done.”
“If you don’t study regularly, it doesn’t matter how much diligence and hard work you have studied just before the exam, it will be difficult for you to get good marks. The teacher added another line by saying Also added that time and tide wait for no one.
“If we are lying idle and continuously postponing our work, then we will never achieve our goal in time because time and tide wait for no one.”
“One second should be worth asking for one who missed a life-changing opportunity by a delay of mere seconds – truth be told, time and tide wait for no one.”
There is no exact origin of the phrase ‘time and tide wait for no one’, but it is an ancient English proverb that has its origins long before modern English. This proverb is attributed to St. Marhar: “And te tide and te time pat tu iboren were, schal beon iblescet” translated into modern English is, “The tide does not stop for no man, neither does the tide stop for man, nor the tide nor any man.” (The Tide Abides for, Tereeth for No Man, Stas No Man, Tide Nar time tarrieth no man – the tide abides for, tarrieth for no man, stays no man, tide nor time tarrieth no man).
It is probably from the phrase that the saying ‘time and tide wait for no one’ has evolved over time. Since then the phrase has become increasingly popular among fishermen and the general public in general use.
Expansion of the Proverb
The saying ‘time and tide wait for no one’ tells about the importance of your strength along with time. Time is more important than anything else, and in no way can you stop or slow it down. Time keeps on moving at its own fixed speed and it is constant.
This proverb advises us not to waste time, as well as to make full use of it. If we waste time there is no other way to get it back. This is true for almost everyone. Suppose, the student who has to prepare for the exam is only spending time and not studying. Then there will come a time when he will realize that he should not have wasted that time. (Time and Tide wait For None Essay)
The reference to ‘tidal’ in this proverb shows that even natural calamities are the most powerful and human beings are helpless before them. You have to be prepared for this type of situation, keeping in mind that they won’t wait for you to finish. Rather, you have to complete it on time.
The saying ‘time and tide wait for no one’ is a very important lesson in life. It teaches us to always be ready to follow our dreams and never waste a second. The true moral meaning of the proverb is not to waste time and always be punctual. It is extremely important for students, professionals, businessmen and others to respect the time and be prepared to face any adverse situation.
When we give importance to time and are ready for every obstacle, only then we will be able to achieve success. If we waste time, we will be unprepared to face the adversities that come our way and end up as a failure.
Short Stories on ‘Time and Tide Wait for None’
Story is a better medium to understand the moral quality of a proverb. Today I bring you some stories so that you can understand better the meaning of the proverb ‘Time and tide wait for no one’.
Short Story 1
Once upon a time there lived a poor farmer in the village. His entire family was dependent on the produce he grew in the fields throughout the year. As he used to do every year, this year also the farmer had sown the crop. When the time came to harvest the crops, the farmer needed to go to the city and bring some laborers. But he kept putting it off, thinking that it was time, while all the other farmers had already harvested the crops in their fields.
Even the farmer was not going to go to the city and get the laborers despite his wife’s request several times. He was just going to postpone it, thinking that a few days’ delay will do nothing. However, one day he decided that he was going to go to the city the next day. Something happened, that very night, a very strong storm hit the village. The winds were so strong that even big trees were uprooted.
The whole crop of that poor farmer got ruined in that storm. He was filled with immense sadness and deep regret. He regretted that he did not give importance to time and also delayed the harvesting of crops. What he did to him, he had never faced such a situation till date. Still, it was pointless to regret now, because ‘time and tide wait for no one’.
Short Story 2
Once a king lived in a prosperous kingdom. He was always surrounded by his ministers who were trying to woo him. The king’s courtiers used to make every effort to please him. He often used to say that the whole world runs on the orders of the king and there is no one who has the courage not to obey his orders. The king also almost knew that his courtiers were only engaged in wooing him and he decided to teach them a lesson. One day the king asked all his courtiers to accompany him on a sea voyage.
One of the courtiers raised the question that today there is a full moon and there is a possibility of the tide rising in the sea as soon as the sun sets. Under this circumstance it would not be safe to go to sea. The king smiled and said to them – don’t worry, I have told the time to come a little late, this way the sun will never set and we will remain in the light of day; And as for the waves – I’ll order them to go back, if they show up. The courtiers realized their mistake and started apologizing to the king, saying “Time and tide wait for no one.” | <urn:uuid:e6f1b52d-f3cd-4599-b4bf-fa79446e5de8> | {
"dump": "CC-MAIN-2022-33",
"url": "https://topfuturepoint.com/time-and-tide-wait-for-none-essay/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00640.warc.gz",
"language": "en",
"language_score": 0.9754740595817566,
"token_count": 1591,
"score": 3.0625,
"int_score": 3
} |
Libraries and the Internet Toolkit
Tips for Parents
The following tips can be reproduced or edited for your library. Print them on flyers or bookmarks and distribute during Internet training classes, back-to-school nights, library open houses and other events.
- Make time to learn about the Internet and how it works. Every computer with Internet access has search engines designed specifically for children that lead to sites selected especially for kids. It's important to become familiar with the Internet so you can use this medium with your children. Many schools and libraries offer classes that teach how to guide your children on the Internet.
- Set rules and instill values. Until children are taught how to use the Internet properly, which includes how to conduct a search, how to know the difference between an Internet pal and an unsavory stranger, how to protect private information, and so forth, it would be best if their Internet use were supervised by a responsible adult or guided by for-children Web pages. There are many common sense tips that can ensure children have a positive online experience:
- Children should be taught not to give personal information, such as their names and addresses, to strangers online as well as off. They must agree not to meet someone they meet online without a parent or guardian present. Teach your children to value privacy—theirs and yours.
- Teach your children values and guidelines to use in selecting what they read and view. Not every Web site is right for every child, anymore than every book in the library is suitable for every person. It's up to you to let your children know what subjects and Web sites are off limits and to explain why.
- Encourage your child to ask the librarian for help when seeking information on the Internet.
- For an example of how to set rules and values with your children, see GetNetWise's "Make an Internet Use Agreement with Your Child" (http://www.getnetwise.org/tools/toolscontracts.php).
- Check out "Especially for Young People and their Parents" at http://www.ala.org/oif/youngpeople/children. This page includes links to online safety rules and suggestions and great sites for parents and kids.
- As the National Research Council pointed out in its 2002 report, "Youth, Pornography, and the Internet" (http://books.nap.edu/html/youth_internet/), "Swimming pools can be dangerous for children. To protect them, one can install locks, put up fences, and deploy pool alarms. All these measures are helpful, but by far the most important thing that one can do for one's children is to teach them to swim." Similarly, children taught to use the Internet wisely and effectively will be more capable of traversing the Internet than those relying solely on technology.
|Click on the button to the left to download the free Adobe Acrobat Reader required to view and print this and other PDF files available on the OIF Web site.|
This document was last updated December 1, 2003
Links to non-ALA sites have been provided because these sites may have information of interest. Neither the American Library Association nor the Office for Intellectual Freedom necessarily endorses the views expressed or the facts presented on these sites; and furthermore, ALA and OIF do not endorse any commercial products that may be advertised or available on these sites. | <urn:uuid:2a8abb50-ccc6-4089-a3ae-00bf48b665f3> | {
"dump": "CC-MAIN-2018-17",
"url": "http://www.ala.org/Template.cfm?Section=litoolkit&Template=/ContentManagement/ContentDisplay.cfm&ContentID=50651",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125948214.37/warc/CC-MAIN-20180426125104-20180426145104-00135.warc.gz",
"language": "en",
"language_score": 0.9367938041687012,
"token_count": 698,
"score": 3.75,
"int_score": 4
} |
Children's Book Portraying Homosexual Romance and Marriage —
Read to Second-grade Class by Teacher!
"The best revolutionary is a youth devoid of morals." —Vladimir Lenin
At Estabrook Elementary School, Lexington, MA, March 24, 2006. (The same school that the David Parker incident took place.) The teacher had chosen the day's theme as "weddings" — and this is the book she decided to read to the class. This book continues to be placed in elementary classrooms (including that one) in Lexington and in others around the state.
Here's the cover of the book, "King and King" that was read to second graders — without any parental notification. As you can see, it's clearly written to normalize homosexual romance and "marriage" in the minds of very young children.
The book starts out with the Queen nagging her unmarried son, the prince, that he needs to
get married: "When I was your age, I'd been married twice already." Interesting message for
The Queen brought in several princesses from various places. They're all portrayed
in a rather nasty manner. And the prince, of course, didn't like any of them. On this
princess from Africa: "Boy, those long arms will certainly come in handy when
waving to the people," said the prince.
But then one princess brings her brother along. The book describes the prince's reaction to her brother in these the two pages below: "At last, the prince felt a stir in his heart. It was love at first sight." (As the princess, naturally, looks confused.)
A few pages later (after a whirlwind courtship) the two princes are shown holding
hands a their 'wedding'. As the text describes: "The wedding was very special.
The queen even shed a tear or two." (Note: We've noticed that 'their parents shedding tears
at their wedding' is a theme that homosexual activists in Massachusetts bring up a lot.)
The book goes on to describe how they're not not just princes, but 'King and King."
And just to rub it in, the last page shows a male-to-male kiss. The message for
kids here is pretty clear. . .
By the way, this book is published by Tricycle Press in San Francisco — the same company that publishes "Who's in a Family," the book about homosexual parents that was in David Parker's son's class.
NOTE: In accordance with Title 17 U.S.C. section 107, this material is reproduced for non-profit educational
purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml
Why does the “mainstream press” condemn the Catholic Church for allowing predatory homosexuals to destroy the lives of boys, while simultaneously condemning the Boy Scouts of America for not allowing precisely the same thing in their organization? —SOURCE
The Communist Subversion of America's Kids!
That's just sick! Have they no shame at GLSEN? Can you imagine, trying to teach Ronald that it's ok to stick something in Timmy's backside? ...or that it's ok for a boy to become a girl? What has American society deteriorated to? It is tragic. Any honest child knows that God created Adam and Eve; not Adam and Steve. GLSEN are a bunch of sickos!
Public Employees Teach Teens 'Gay' Sex Techniques (Including Fisting) at GLSEN Conference At Tufts University
GLSEN Fistgate Scandal at Tufts Detailed By Massachusetts News: http://www.massnews.com/past_issues/2000/Schools/fistarc.htm
Parents Rights Coalition Exposes GLSEN's Radical Agenda: http://www.parentsrightscoalition.org/Fistgate.htmThe GLSEN Files-SteveKaneShow.com: http://www.stevekaneshow.com/glsen.htm Queering The Schools: http://www.city-journal.org/html/13_2_queering_the_schools.html
National Association For Research And Therapy Of Homosexuality: Activism In The Schools: http://www.narth.com/menus/schools.html
Crafting Bi/Homosexual Children: http://www.regent.edu/acad/schlaw/academics/lawreview/articles/14_2Reisman.PDFChild Molestation And The Homosexual Movement: http://www.regent.edu/acad/schlaw/academics/lawreview/articles/14_2baldwin.PDF
Homosexuality Behavior & Pedophilia: http://us2000.org/cfmc/Pedophilia.pdfHow To Keep Gay Straight Alliance Clubs Out Of Your Public School: http://www.newswithviews.com/Linda/harvey1.htm Critical Analysis Of GLSEN's Same-Sex Marriage Curriculum For Teens: http://www.drthrockmorton.com/samesexcur.pdf
“Who being past feeling have given themselves over unto lasciviousness, to work all uncleanness with greediness.” —Ephesians 4:19
What HAPPENS in Vegas, is RECORDED in Heaven!!!
God Will Forgive Anybody
"Ye have wearied the LORD with your words. Yet ye say, Wherein have we wearied him? When ye say, Every one that doeth evil is good in the sight of the LORD..." —Malachi 2:17
Homosexuality is a sin! Don't upset God by saying it's not!
There is a way out!
If you really love someone, you'll tell them the truth.
Do Something About the Homosexual Movement and Pedophilia!
Gay Marriage is a Sin!
God Loves People (All people!)
Sodomy (Audio sermon by Pastor Jeff Owens)
Hope for Homosexuals
Myths About Homosexuality
The Homosexual Lifestyle is No White Picket Fence
Reclaiming the Rainbow | Sodomite Ministers | Protest Gay Day!
PHILLIES LOSE; REPENT AMERICA WINS
MILITANT MOB OF HOMOSEXUALS TARGET REPENT AMERICA
Education secretary blasts PBS for cartoon with gay characters
George Bush Cheers Gay Church!
High Court to Give 'Gays' Their Own 'Roe'?
Gay Pride? | Gay Tolerance? | Was King James a Homosexual?
While homosexuals claim they make up 10% of the population, the reality is closer to 1-2%
Homosexuality 101: A Primer (.PDF) (Provides a brief history of the homosexual movement in the U.S. and its roots in Marxist ideology. This paper describes how homosexuals terrorized the psychiatric community and have created a marketing strategy to vilify their opponents.)
Homosexuals Recruit Public School Children (.PDF)
Homosexual Behavior Fuels AIDS and STD Epidemic (.PDF)
A Gender Identity Disorder Goes Mainstream (.PDF)
Homosexual Propaganda Campaign Based on Hitler’s “Big Lie” Technique (.PDF)
Homosexual Sex = Death from HIV Infection (.PDF)
Traditional Values Coalition Exposes Homosexual Agenda (.PDF)
There is a way out!
If you really love someone, you'll tell them the truth.
Comment from webservant of Jesus-is-Savior.com...
I do NOT condone hatred towards anyone. In fact, the Bible never directs us to hate anyone (not even the Devil). However, the Bible does teach us to hate evil (Psalm 97:10). The Word of God clearly teaches in Romans 1:26-32 that homosexuality is a horrible sin. According to 1st Corinthians 6:9-10, homosexuals will not be allowed into heaven. For that matter, no sinners will be allowed into Heaven. That's why we need Christ's righteousness to get to Heaven, which is by faith (Romans 4:5). The only hope is through the blood of Jesus Christ which washes our sins away (Colossians 1:14). I do NOT seek to be unkind to anyone, but the Word of God is not going to change (Matthew 5:18). Sodomy (the Bible's term for homosexuality) is sinful in God's eyes! If you don't like it, then get mad at God.
I realize that no homosexual wants to hear a Bible-thumper proclaiming the Word of God that homosexuality is a wicked sin... but homosexuality is a sin! To no surprise, homosexuals are now publishing their own perverted Bibles and creating perverted websites, trying to claim that God permits homosexuality. Now we even have Sodomite ministers. Society can't go much lower. The Bible foretold of these wicked people who would change the Word of God into a lie...
"Wherefore God also gave them up to uncleanness through the lusts of their own hearts, to dishonour their own bodies between themselves: Who changed the truth of God into a lie..." —Romans 1:24-25
Have you believed a lie? Please do not be deceived my friend... homosexuality is a wicked sin that will bring the judgment of God upon you. If you are a homosexual, I do not hate you at all. In fact, I care about you very much, which is why I made this webpage. This webpage isn't intended to make you mad or hurt your feelings (although the truth usually does step on people's toes), it is intended to open your eyes to the truth about homosexuality and to enlighten you concerning the stern Biblical warning against homosexuality.
The proper way for you to deal with homosexuality is to face it for what it is... sin. Ask God to forgive you and to help deliver you from the sin of homosexuality. I do not condemn anybody, for I am a sinner as much as anyone. The Apostle Paul called himself "the chief" of sinners (1st Timothy 1:15). Jesus DIDN'T come into the world to condemn anybody (John 3:17), and neither should we. God's Law condemns all of us (Romans 3:10-23). Jesus came to save us; not to condemn us (John 3:16-17).
I'll close with the beautiful Words of the Savior spoken to the woman accused of adultery by the hypocritical Scribes and Pharisees...
"When Jesus had lifted up Himself, and saw none but the woman, He said unto her, Woman, where are those thine accusers? hath no man condemned thee? She said, No man, Lord. And Jesus said unto her, Neither do I condemn thee: go, and sin no more." —John 8:10-11
Salvation is free and simple... we are the SINNERS and Jesus is the SAVIOR.
Evils in America
America is Proud!
Ye Must Be Born Again! | <urn:uuid:18a680bf-17b0-4443-959e-48f29edc0bc1> | {
"dump": "CC-MAIN-2014-49",
"url": "http://www.jesus-is-savior.com/Evils%20in%20America/Sodomy/homo_romance.htm",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416400380409.19/warc/CC-MAIN-20141119123300-00137-ip-10-235-23-156.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9219508767127991,
"token_count": 2319,
"score": 2.546875,
"int_score": 3
} |
Solitude is not loneliness. Loneliness or solitude? Know the difference.
Loneliness is at every age. No age bracket is immune from it.
I got that from William Shakespeare. In his “The Seven Ages of Man.”
He depicted in his own way how loneliness is present from childhood to old age.
Loneliness assumes a different form in each developmental stage of life.
I’ve observed in my practice that loneliness in people mostly begins very early in life.
Keanu, for example, felt “generalized loneliness” in his middle age years. He pointed to his childhood in explaining it.
He shared that he’s lonely for his parents spent so little time with him when he was a little boy.
This very little time of his parents for him then created an emotional vacuum in his heart.
Keanu’s loneliness finds expression in his anti-social behaviors. Temper tantrums in public. Pointing a gun at others.
“The worst loneliness,” writes Mark Twain, “is not to be comfortable with yourself.”
That got my attention.
Metabolizing loneliness at any age is to develop the ability to be comfortable with yourself.
Are you harming yourself in your loneliness? it’s a sign that you’re not being comfortable with yourself. Not one bit.
A best treatment to loneliness then is to begin with self compassion. It comprises of speaking kindly to yourself.
From that point, you can turn the loneliness into solitude – a state where you enjoy being comfortable with yourself.
Paul Tillich puts it best,
“Language … has created the word ‘loneliness’ to express the pain of being alone. And it has created the word ‘solitude’ to express the glory of being ‘alone.’ “
”Loneliness is the result of absence of personal intimacy or meaningful activity. Solitude is not being in the company of others. Loneliness is always and essentially a negative experience, while solitude is often positive and renewing. Loneliness … is involuntary, unwanted. The other is voluntary and deliberately chosen.” — J. Oswald Sanders | <urn:uuid:d78d43b7-6c92-47a1-9c80-8489347d2f75> | {
"dump": "CC-MAIN-2021-25",
"url": "https://www.myonlinepsychotherapyph.com/solitude-is-not-loneliness/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487608702.10/warc/CC-MAIN-20210613100830-20210613130830-00513.warc.gz",
"language": "en",
"language_score": 0.9655985236167908,
"token_count": 458,
"score": 2.640625,
"int_score": 3
} |
Replanting Buddleia Bushes
Buddleia or Buddleja, commonly known as the butterfly bush, describes multiple species of evergreen, semi-evergreen or deciduous shrubs that are prized for their clusters of colorful, butterfly-attracting flowers. These shrubs, which grow 5 to 10 feet tall, transplant well and grow rapidly when the new site is prepared suitably and excellent care is provided before and after planting. Avoid planting shrubs or other plants during hot, dry weather.
New Site Preparation
Butterfly bushes perform best in an area where they receive full sun or only partial shade and can grow in various soil types, though they do require excellent drainage. Dig a planting hole two to three times wider than and the same depth as the shrub's root ball. To improve drainage and fertility, work an amendment like well-rotted compost or aged manure into the site's soil or soil for backfill so the amendment makes up no more than 50 percent of the amended soil. Butterfly bushes can perform well in containers as long as the container has ample drain holes and the plant will receive adequate, frequent irrigation, as the soil in containers tends to dry out faster than soil in the landscape.
Digging up the Buddleia
Thoroughly soaking the soil around the butterfly bush two to three days before digging it up makes it easier to work with the soil. Tie back branches with twine or string to keep them out of the way and prevent injury to them. Dig up the root mass, severing roots with a sharp spade. In general, a shrub will recover fastest in its new position if the root ball created for transplant has a diameter about two-thirds the diameter of the shrub's branch spread and measures about a foot deep, although butterfly bushes generally re-establish easily with a smaller root system. When the bush is not planted in the ground in the new site immediate or requires transportation, either cover the root mass with moist mulch or wrap it in burlap and place the shrub in the shade, never allowing the plant's roots to dry out.
Planting the Bush
Place the bush at the same level it was previously planted at in the ground or container and, if possible, orient it in the same direction to minimize the likelihood of sun damage. Fill in the space around the root mass with soil or amended soil, tamping it down gently to eliminate major air pockets. Thoroughly watering the soil around the newly-planted buddleia removes remaining air pockets and allows the soil to settle in around the roots.
Care Following Planting
Following planting, provide the buddleia with ample -- but not excessive -- water. If rainfall is inadequate, irrigate the bush every 10 to 14 days or when soil 3 inches below the ground surface feels dry to the touch. A 3- to 4-inch layer of organic mulch applied around the shrub, leaving a mulch-free area immediately next to the stem, regulates soil temperature and conserves soil moisture. No fertilizer is warranted for at least a year following planting, if not for several years. Removing the buddleia's spent flowers or seed heads as they appear keeps this bush looking tidy and encourages additional growth and flowering.
- University of California Statewide Integrated Pest Management Program: Buddleja—Buddleja (=Buddleia) spp.
- University of Florida Cooperative Extension Service: Buddleia spp.
- North Dakota State University Extension Service: Transplanting Trees and Shrubs
- North Carolina State University Cooperative Extension Service: Buddleia davidii
- The University of Georgia Cooperative Extension: Transplanting Woody Plants
- Hemera Technologies/AbleStock.com/Getty Images | <urn:uuid:39fcaeac-9be5-45d1-aa4e-a5d223211e3b> | {
"dump": "CC-MAIN-2020-34",
"url": "https://homeguides.sfgate.com/replanting-buddleia-bushes-34211.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439737039.58/warc/CC-MAIN-20200806210649-20200807000649-00131.warc.gz",
"language": "en",
"language_score": 0.9314964413642883,
"token_count": 772,
"score": 2.8125,
"int_score": 3
} |
Kunnandarkoil (‘kunn-naN-daar-kO-yil’) has a rock-cut temple belongs to
8th century AD, which in course of the centuries developed with
structural addition in to a big complex. Unlike other temples this
temple has a number of portraits sculptures. The hundred pillared
mandapam is of the Vijayanagara style,
and is designed to the present a
chariot on four wheels drawn by a pair of horses. A temple has a number
of important inscriptions also.
Kunnandarkoil is about 35
kilometres from Pudukkottai in Pudukkottai-Andakulam-Killukkottai
(புதுக்கோட்டை-அண்டக்குளம்-கிள்ளுக்கோட்டை) route. Also It can be reached
from Kiranur and Adhanakkottai. Frequent city bus and taxi services are
available from Pudukkottai.
A view of the temple complex
The monument: cave temple
referred to in inscriptions as Thiruk-kunrak-kudi (திருக்குன்றக்குடி),
has a rock cut temple, which may be assigned to the time of Nandi-varman
II Pallava-malla (நந்திவர்மன் II பல்லவமல்லன்) (C. 710-775 AD). In the
course of the centuries, it developed, with structural additions, into a
big complex. In plan it is similar to the Gokarnesvara temple
(கோகர்னேஸ்வரர் கோயில்) at Thirugokarnam (திருக்கோகர்னம்).
It is a
fascinating monument to study. Its main artistic gifts are a hundred
and one pillared ‘ratha’ (ரதம், chariot) mandapam, and two splendid
portrait sculptures doing duty as dvara-palaka-s (துவாரபாலகர்) before
the main shrine.
The temple has some fine bronzes also.
The Temple Architecture:
rock has been excavated in two sections. In the bigger is the shrine of
the principal deity, Parvatha-girisvara (பர்வத கிரீஸ்வரர்). To the
left, separated by wall, is a smaller section in which there are three
shrines dedicated to Thandavar (தாண்டவர்), Subrahmanya (சுப்பிரமணியர்)
and Ayyanar (அய்யனார்). Facing them, on the side, is a fourth small
excavation containing an image of Chandrasekhara (சந்திரசேகரர்). These
images of sub-deities are later additions.
the main shrine, on the rock face, to the south of the cave is a figure
of Ganesa with his trunk curled to the right, and to the north is a
Somaskanda group (சோமஸ்கந்தர்) in which Subrahmanya, who is generally
placed between Siva and Uma, is placed to the left of Uma. The
Dvara-palaka-s are portrait-sculptures. The figure to the south is that
of a chief, probably the Pallava king himself, or a Muttaraiyar
(முத்தரையர்) vassal of his.
small oblong ardha-mandapam (அர்த்தமண்டபம்) fronts the shrine. The
facade has not been worked upon. Nor there is a prakaram around the
shrine. The structural Maha-mandapam, of later construction, contains a
number of portrait sculptures. The image of a Pattavan (பட்டவன்) here
represents a man who lost his life fighting some robbers, while watching
the temple property, and offerings are occasionally made to him.
the gopuram stand several structures. The shrine of the Goddess
Umayambigai (உமையாம்பிகை), is here. Opposite to it, and facing the
shrine of the Lord, is a nandi mandapam (நந்திமண்டபம்). Adjacent to it
is a small mandapam with four pillars.
little farther off is the striking Ratha (chariot) mandapam. It is of
the Vijayanagara style. On an elevation stands a big hall with hundred
and one pillars in six rows. To the basement are added stone wheels to
simulate a running chariot.
There are nearly forty inscriptions in the temple.
two oldest inscriptions in the temple belong to the reigns of
Nandi-varman (நந்திவர்மன்) and Danti-varman (தன்டி வர்மன்), and refer to
the feeding of Brahmins and other persons during the Aardra festival
(ஆருத்ரா தரிசன விழா). The other inscriptions belong to the reigns of the
Chozha-Chalukya after Pandya-s and Vijayanagara kings. One of the
Pandya inscriptions is a royal order instituting a daily service in the
temple called Rayarayan Sundara Pandyan Sandhi (இராயராயன் சுந்தர
பாண்டியன் சந்தி). Another relates to a sale of lands to Vyapaka Siva
(வியாபக சிவன்), a disciple of the spiritual head of the Naduvil-matham
(நடுவில்மதம்) at Tiruvanaikovil (திருவானைக்கோவில்). There is a record
here, which related to a covenant among Araiyar-s who agreed not to
cause any damage to the villagers, and not to molest wayfarers and
tenants whenever they were engaged in internecine feuds. An undated
inscription on the unfinished gopuram in modern script relates to a toll
of 1/16 panam levied for the benefit of the temple on every package of
goods coming from or going to Thanjavur (தஞ்சாவூர்) and Tiruchirappalli
Kunnandarkoil is one of the earlier
Karala-Vellalar (காராள வெள்ளாளர்) settlements in the state. It is also
an important Kallar settlement. It is said that the northern part of the
village belongs to the Kallar of the Vadamalai-nadu (வடமலை நாடு), and
the southern to those of the Temmalai-nadu (தெம்மலை நாடு). The joint
meetings of the Panchayats of the two nadu-s are held in the
Kunnandarkoil temple. An inscription in the temple dated about 1394 AD
tells of a joint meeting of assemblies, artisans and agriculturists to
which learned and influential men were invited from Srirangam
(ஸ்ரீரங்கம்) and Tiruvanaikovil (திருவானைக்கோவில்) to consider the loss
of life and property that the Kallar-s (கள்ளர்) had caused and to afford
protection to the people, who in return were asked to make to the
temple an annual payment, and an offering of a ring for every marriage | <urn:uuid:4b9c6c58-92e7-4033-a87c-cbcc4bff0e6a> | {
"dump": "CC-MAIN-2017-17",
"url": "http://pudukkottai.org/tag/kallar-of-vadamalai-nadu/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125654.80/warc/CC-MAIN-20170423031205-00145-ip-10-145-167-34.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.8279579877853394,
"token_count": 2652,
"score": 2.8125,
"int_score": 3
} |
Latin American women have long written essays on topics ranging from gender identity and the female experience to social injustice, political oppression, lack of educational opportunities, and the need for female solidarity in a patriarchal environment. But this rich vein of writing has often been ignored and is rarely studied.
This volume of twenty-one original studies by noted experts in Latin American literature seeks to recover and celebrate the accomplishments of Latin American women essayists. Taking a variety of critical approaches, the authors look at the way women writers have interpreted the essay genre, molded it to their expression, and created an intellectual tradition of their own. Some of the writers they treat are Flora Tristan, Gertrudis Gómez de Avellaneda, Clorinda Matto de Turner, Victoria Ocampo, Alfonsina Storni, Rosario Ferré, Christina Peri Rossi, and Elena Poniatowska.
This book is the first of a two-volume project that will reexamine the Latin American essay from a feminist perspective. The second volume, also edited by Doris Meyer, contains thirty-six essays in translation by twenty-two women authors.
Doris Meyer is the Roman S. and Tatiana Weller Professor of Hispanic Studies at Connecticut College. She is the author of numerous articles and books, including Victoria Ocampo: Against the Wind and the Tide. | <urn:uuid:1bd67374-7a9b-43f4-b16c-50836de3183a> | {
"dump": "CC-MAIN-2014-23",
"url": "http://utpress.utexas.edu/index.php/books/meyrei",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510256737.1/warc/CC-MAIN-20140728011736-00393-ip-10-146-231-18.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9312754273414612,
"token_count": 280,
"score": 2.640625,
"int_score": 3
} |
posted on Nov, 29 2012 @ 08:17 AM
Black holes suck material toward them, but some of it gets spit out rather than swallowed. Many black holes eject jets that move away from the
accretion disk at nearly the speed of light. These jets have been observed most spectacularly from the centers of nearby galaxies (for example, M87)
but also appear in microquasars - in quick, enormously energetic spurts and sputters, as if someone had taken a video of a quasar jet and pressed the
The processes by which these jets are formed are not well understood, but seem to require magnetic fields - whose presence causes instabilities in the
accretion disk that allow material to fling upwards - as well as rapidly rotating black holes, which can feed some of their energy to the magnetic
field and to the jet material itself. | <urn:uuid:90e51831-051b-4e1e-bd63-4e185cb0a4e7> | {
"dump": "CC-MAIN-2014-15",
"url": "http://www.abovetopsecret.com/forum/thread903444/pg1",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609538824.34/warc/CC-MAIN-20140416005218-00095-ip-10-147-4-33.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.961697518825531,
"token_count": 175,
"score": 3.09375,
"int_score": 3
} |
Please remember; even if your child comes to school every school day this year he will still be out of school more days than he will be in school.
> that mathematics is the sport of the mind, and that just as with any sport the more effort you expend in practice the more likely you will excel on game day (Mastery is a function of effort.)
> that to play the game you first have to show up
> that teaching is like affection, if the person who is the object of your teaching/affection is unwilling to accept what you offer your efforts will be fruitless
> that I can be a math learning facilitator, or math coach, but I can't teach anyone who is determined to avoid learning (You can lead a kid to knowledge, but you can't make him think.)
> that you can't learn how to pull the wagon by riding on it
> that learning can take place with an ineffective teacher, but learning cannot take place in a student with a poor attitude, or poor work habits (Just as in any sport success is contingent upon effort more than talent.)
> that the key to a good education is more in learning how to learn than learning what to learn
> that every student is capable of mastering all of the fundamentals of arithmetic, algebra, and geometry, and that basic skills must be mastered first
> that every college bound student needs four years of math in high school regardless of what level he begins with in 9th grade
> that my responsibility is to provide a safe, secure learning environment that challenges every student, and that offers the maximum number of opportunities for every student to experience success every day; to present in a variety of ways all the information that students need to know; to provide a reasonable number of fair evaluations; to communicate with parents when their child is living up to his responsibilities, as well as when he isn't; and, because most problems in life don't come with an instruction manual, to work towards helping students become independent problem solvers
> that the greatest assets a person who wants to get into the game of algebra can have are: stamina, perseverance, tenacity, a commitment to excellence, basic skills, and a desire to learn. (Isn't it interesting that the sport of the mind has the same requirements for excellence as other, less cerebral, more physical endeavors?)
In order to fulfill my
> will be prepared to teach an effective and useful lesson every day
> will treat all students fairly, equally, with dignity, and without abuse
> will work closely with parents to ensure students succeed
> will continually grow in my profession
> will encourage participation by all students
> will challenge every student
> will affirm and nurture all students
> are responsible for coming to class every day
> are responsible for bringing appropriate materials, and completed assignments to class
> are responsible for coming to class prepared to learn
> are responsible for their own learning
> are responsible for their own behavior
> are responsible for your child's attitudes about school, teachers, and education
> are responsible for insuring that your child is prepared to learn
> are responsible for getting your child to school every day
> are responsible for ensuring that your child knows that you expect him to do his best in school every day
> are responsible for providing, daily, a time and place for your child to complete his homework
> are responsible for balancing your child's school responsibilities with his extra curricular activities during the school year
If you and your child accept your responsibilities as I have accepted mine this will be an extremely successful and productive year for all.
I attribute most of whatever teaching skills I might have to my friend and mentor, John Veltman. He taught me more about mathematics, kids, teaching, and what it means to be a part of a team than any other person in my life. Any student I am able to touch has also been touched by this special person. Thanks John!
Others who have influenced me, as a teacher, are Paul Foerster (even before I met him) all of my past students (each one of whom has had some influence on making me the teacher that I am) Betty Travis, David Molina, and LuAnn Weynand and all the other great math teachers from North East who I had the pleasure of working with in the after school workshops at Central Office.
I attribute my work ethic, ethics, and integrity to my best friend, Al Smith (deceased).
Please click the following link for more about my math teaching philosophy: Math teaching.
Evolution of Teaching General Information | <urn:uuid:e0634181-8a5f-431b-8597-bf69ec0b83d3> | {
"dump": "CC-MAIN-2018-30",
"url": "http://www.algebraguy.com/teachingph.htm",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676590329.25/warc/CC-MAIN-20180718193656-20180718213656-00137.warc.gz",
"language": "en",
"language_score": 0.973406970500946,
"token_count": 943,
"score": 2.84375,
"int_score": 3
} |
Edith Clarke was an electrical engineer that specialized in electrical power system analysis. She studied mathematics and astronomy in college and graduated in 1908. Clarke then taught mathematics and physics at a private school. She soon after moved on and worked at AT&T for a summer job. In 1918, she continued her career by enrolling in an EE program at MIT. She got her M.S. in electrical engineering the next year. With this, she got a job as a “computer” at AT&T, then in 1921, invented and filed a patent for her Clarke Calculator, a graphing calculator to be used in solving problems with voltage, current, and impendence in power lines. Her technology calculated these problems ten times faster than other systems. Many electrical companies benefited from her invention. Edith Clarke died on October 29, 1959. She led a great life in engineering and many engineers look up to her with the work she did. | <urn:uuid:fc9544fd-b5ab-4a40-a91c-7b4748b08ab1> | {
"dump": "CC-MAIN-2021-49",
"url": "https://www.futurescienceleaders.com/surrey1/2019/02/05/finkbeiner-test-edith-clarke/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363149.85/warc/CC-MAIN-20211205065810-20211205095810-00323.warc.gz",
"language": "en",
"language_score": 0.9839031100273132,
"token_count": 191,
"score": 3.203125,
"int_score": 3
} |
There was a time when taking a perfect shot in a game of billiards could cause the ball to explode.
That’s because the balls were made of celluloid, an early plastic that was, unfortunately, combustible. It was patented on this day in 1869, just a few years after the first human-made plastic, Parkesine.
Although it later came to be associated with film (where its combustibility was also famously an issue), celluloid, like many other early plastics, originated as part of an attempt to solve a non-mathematical billiards problem: the ivory problem.
In the mid-nineteenth century, writes Lauren Davis for iO9, “there was a common, although erroneous, belief that ivory was in short supply.” At the same time, according to Roman Mars on the podcast 99% Invisible, billiards was extremely popular.
It was the huge popularity of billiards, combined with this fear of a dwindling ivory supply, that led to the development of plastic, a material that “came to define the modern world,” says Mars.
“The billiard ball has to have certain physical properties. It has to rebound properly. It has to be of a certain density,” one billiards expert explained to Mars. The only material that would do everything the game required was top-grade ivory, which according to Mars “was actually called billiard-ball ivory.”
In the search for a substitute to this expensive and difficult-to-obtain material, a major company that made billiards supplies, Phelan and Collender, offered a $10,000 reward (several hundred thousand dollars in today’s money) to anybody who could invent one.
Although Alexander Parkes managed to produce the first material that approximated ivory, Parkesine was didn’t lend itself to commercial-scale manufacture. Celluloid, developed by John Wesley Hyatt, did.
“Celluloid and its predecessors were all made with nitrocellulose, also known as pyroxylin, flash paper and gun cotton,” Davis writes. “As you might guess from that string of names, these plastics were highly flammable, and when used in billiard balls, they had some, well, interesting results.”
Occasionally, as Hyatt himself recalled, two balls hitting each other would produce “a mild explosion like a percussion guncap.”
“We had a letter from a billiard saloon proprietor in Colorado, mentioning this fact and saying that he did not care so much about it, but that instantly every man in the room pulled his gun.”
This cavalier attitude to personal safety also showed up with other celluloid products. Besides billiard balls, celluloid was used to make lady’s combs and other fashion products like buttons, collars and dentures. The material’s easy flammability was a problem in all those places, too, writes Ria Misra for i09.
Today, billiard balls are made out of resin, and elephant numbers are in decline due to poachers seeking ivory—now a banned substance. | <urn:uuid:335006b2-4feb-4f4f-8ef6-02f2c8d77ad8> | {
"dump": "CC-MAIN-2019-30",
"url": "https://www.smithsonianmag.com/smart-news/once-upon-time-exploding-billiard-balls-were-everyday-thing-180962751/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195524879.8/warc/CC-MAIN-20190716201412-20190716223412-00323.warc.gz",
"language": "en",
"language_score": 0.9775293469429016,
"token_count": 674,
"score": 3.15625,
"int_score": 3
} |
26 June, 2021
The need for plentiful, sustainable energy that doesn’t disrupt the delicate balance of the Earth’s atmosphere may be the single most important issue facing this generation. The decisions we make and the technologies we develop over the next few decades will have profound implications for geopolitics, wildlife, food production, and almost every sphere of human endeavor.
Building a sustainable energy future calls for leaps forward in both technology and policy leadership. State governments, major corporations and nations around the world have pledged to address the worsening climate crisis by transitioning to 100% renewable energy over the next few decades. Turning those statements of intention into a reality means undertaking unprecedented efforts and collaboration between disciplines ranging from environmental science to economics.
There are highly promising opportunities for green initiatives that could deliver a better future. However, making a lasting difference will require both new technology and experts who can help governments and organizations transition to more sustainable practices. These leaders will be needed to source renewables efficiently and create environmentally friendly policies, as well as educate consumers and policymakers. To maximize their impact, they must make decisions informed by the most advanced research in clean energy technology, economics, and finance.
Current Trends in Sustainability
The imperative to adopt renewable power solutions on a worldwide scale continues to grow even more urgent as the global average surface temperature hits historic highs and amplifies the danger from extreme weather events. In many regions, the average temperature has already increased by 1.5 degrees, and experts predict that additional warming could drive further heatwaves, droughts, severe hurricanes, wildfires, sea level rises, and even mass extinctions.
In addition, physicians warn that failure to respond to this dire situation could unleash novel diseases: Dr. Rexford Ahima and Dr. Arturo Casadevall of the Johns Hopkins University School of Medicine contributed to an article in the Journal of Clinical Investigation that explained how climate change could affect the human body’s ability to regulate its own temperature while bringing about infectious microbes that adapt to the warmer conditions.
World leaders have accepted that greenhouse gas emissions are a serious problem that must be addressed. Since the Paris Agreement was first adopted in December 2015, 197 nations have signed on to its framework for combating climate change and preventing the global temperature increase from reaching 2 degrees Celsius over preindustrial levels.
Corporate giants made their own commitments to become carbon neutral by funding offsets to reduce greenhouse gases and gradually transitioning into using 100% renewable energy. Google declared its operations carbon neutral in 2017 and has promised that all data centers and campuses will be carbon-free by 2030. Facebook stated that it would eliminate its carbon footprint in 2020 and expand that commitment to all the organization’s suppliers within 10 years. Amazon ordered 100,000 electric delivery vehicles and has promised that its sprawling logistics operations will arrive at net-zero emissions by 2040.
Despite these promising developments, many experts say that nations and businesses are still not changing fast enough. While carbon neutrality pledges are a step in the right direction, they don’t mean that organizations have actually stopped using fossil fuels. And despite the intentions expressed by Paris Agreement signatories, total annual carbon dioxide emissions reached a record high of 33.5 gigatons in 2018, led by China, the U.S., and India.
“The problem is that what we need to achieve is so daunting and taxes our resources so much that we end up with a situation that’s much, much worse than if we had focused our efforts,” Ferraro said.
Recent Breakthroughs in Renewable Power
An environmentally sustainable infrastructure requires innovations in transportation, industry, and utilities. Fortunately, researchers in the private and public sectors are laying the groundwork for an energy transformation that could make the renewable energy of the future more widely accessible and efficient.
Some of the most promising areas that have seen major developments in recent years include:
Driving Electric Vehicles Forward
The technical capabilities of electric cars are taking great strides, and the popularity of these vehicles is also growing among consumers. At Tesla’s September 22, 2020 Battery Day event, Elon Musk announced the company’s plans for new batteries that can be manufactured at a lower cost while offering greater range and increased power output.
The electric car market has seen continuing expansion in Europe even during the COVID-19 pandemic, thanks in large part to generous government subsidies. Market experts once predicted that it would take until 2025 for electric car prices to reach parity with gasoline-powered vehicles. However, growing sales and new battery technology could greatly speed up that timetable.
Cost-Effective Storage For Renewable Power
One of the biggest hurdles in the way of embracing 100% renewable energy has been the need to adjust supply based on demand. Utilities providers need efficient, cost-effective ways of storing solar and wind power so that electricity is available regardless of weather conditions. Most electricity storage currently takes place in pumped-storage hydropower plants, but these facilities require multiple reservoirs at different elevations.
Pumped thermal electricity storage is an inexpensive solution to get around both the geographic limitations of hydropower and high costs of batteries. This approach, which is currently being tested, uses a pump to convert electricity into heat so it can be stored in a material like gravel, water, or molten salts and kept in an insulated tank. A heat engine converts the heat back into electricity as necessary to meet demand.
Unlocking the Potential of Microgrids
Microgrids are another area of research that could prove invaluable to the future of power. These systems can operate autonomously from a traditional electrical grid, delivering electricity to homes and business even when there’s an outage. By using this approach with power sources like solar, wind, or biomass, microgrids can make renewable energy transmission more efficient.
Researchers in public policy and engineering are exploring how microgrids could serve to bring clean electricity to remote, rural areas. One early effort in the Netherlands found that communities could become 90% energy self-sufficient, and solar-powered microgrids have now also been employed in Indian villages. This technology has enormous potential to change the way we access electricity, but lowering costs is an essential step to bring about wider adoption and encourage residents to use the power for purposes beyond basic lighting and cooling.
Advancing the Future of Sustainable Energy
There’s still monumental work to be done in developing the next generation of renewable energy solutions as well as the policy framework to eliminate greenhouse gases from our atmosphere. An analysis from the International Energy Agency found that the technologies currently on the market can only get the world halfway to the reductions needed for net-zero emissions by 2050.
To make it the rest of the way, researchers and policymakers must still explore possibilities such as:
- Devise and implement large-scale carbon capture systems that store and use carbon dioxide without polluting the atmosphere
- Establish low-carbon electricity as the primary power source for everyday applications like powering vehicles and heat in buildings
- Grow the use of bioenergy harnessed from plants and algae for electricity, heat, transportation, and manufacturing
- Implement zero-emission hydrogen fuel cells as a way to power transportation and utilities
However, even revolutionary technology will not do the job alone. Ambitious goals for renewable energy solutions and long-term cuts in emissions also demand enhanced international cooperation, especially among the biggest polluters. That’s why Jonas Nahm of the Johns Hopkins School of Advanced International Studies has focused much of his research on China’s sustainable energy efforts. He has also argued that the international community should recognize China’s pivotal role in any long-term plans for fighting climate change.
As both the leading emitter of carbon dioxide and the No. 1 producer of wind and solar energy, China is uniquely positioned to determine the future of sustainability initiatives. According to Nahm, the key to making collaboration with China work is understanding the complexities of the Chinese political and economic dynamics. Because of conflicting interests on the national and local levels, the world’s most populous nation continues to power its industries with coal even while President Xi Jinping advocates for fully embracing green alternatives.
China’s fraught position demonstrates that economics and diplomacy could prove to be just as important as technical ingenuity in creating a better future. International cooperation must guide a wide-ranging economic transformation that involves countries and organizations increasing their capacity for producing and storing renewable energy.
It will take strategic thinking and massive investment to realize a vision of a world where utilities produce 100% renewable power while rows of fully electric cars travel on smart highways. To meet the challenge of our generation, it’s more crucial than ever to develop leaders who understand how to apply the latest research to inform policy and who can take charge of globe-spanning sustainable energy initiatives.
About the MA in Sustainable Energy (online) Program at Johns Hopkins SAIS
Created by Johns Hopkins University School of Advanced International Studies faculty with input from industry experts and employers, the Master of Arts in Sustainable Energy (online) program is tailored for the demands of a rapidly evolving sector. As a top-11 global university, Johns Hopkins is uniquely positioned to equip graduates with the skills they need to confront global challenges in the transition to renewable energy.
The MA in Sustainable Energy curriculum is designed to build expertise in finance, economics, and policy. Courses from our faculty of highly experienced researchers and practitioners prepare graduates to excel in professional environments including government agencies, utility companies, energy trade organizations, global energy governance organizations, and more. Students in the Johns Hopkins SAIS benefit from industry connections, an engaged network of more than 230,000 alumni, and high-touch career services. | <urn:uuid:57576588-0f47-4a11-997d-c526079df9c2> | {
"dump": "CC-MAIN-2023-06",
"url": "https://energy.sais.jhu.edu/articles/the-future-of-sustainable-energy/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499695.59/warc/CC-MAIN-20230128220716-20230129010716-00381.warc.gz",
"language": "en",
"language_score": 0.9394198060035706,
"token_count": 1959,
"score": 3.5,
"int_score": 4
} |
To provide best user experience for you we sometimes store small data files called cookies. It is commonly used at most web sites.
What are cookies?
Cookies are a kind of short term memory for the web. They are stored in your browser and enable a site to 'remember' little bits of information between pages or visits.
- remember you preferencies like saturation, font size, filter settings, categories, products in basket etc.
How to control cookies
You can manage or delete cookies as you like - you can visit aboutcookies.org for more information.
We will accept if you change your default cookies settings in your browser, but refusing some cookies can lead to some funcions of our web sites will not be functional. | <urn:uuid:03cd8018-8a68-4cdc-a8d7-5f733f55cbf3> | {
"dump": "CC-MAIN-2019-35",
"url": "https://www.dema.bike/info/cookies",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027315936.22/warc/CC-MAIN-20190821110541-20190821132541-00218.warc.gz",
"language": "en",
"language_score": 0.9217773079872131,
"token_count": 152,
"score": 2.78125,
"int_score": 3
} |
Tynker is a platform that can be flexibly integrated into a classroom or school. While some schools use it in their formal computer programming curriculums, other schools use it to enhance learning in classes like math, science, art and so forth. Still others have used it in extracurricular coding clubs, like this Lunchtime Club. Kids from across grades get together in a room, and experiment – there is no formal structure or curriculum, just a gentle direction, and the rest is up to the kids’ imagination. Read more on how this school successfully runs this club.
Smita Kolhatkar is the Educational Technology TOSA at Barron Park Elementary School in Palo Alto. She uses Scratch and Tynker in her school’s lunchtime programming club, which sparked similar programs at other schools in the Bay Area.
School: Barron Park Elementary School, Palo Alto
Using Tynker since: October, 2012
Total Number of Students on Tynker: 93
Number of Projects created by students using Tynker: 283
Q: Can you describe the programming club that you run?
A: Sure. We run the club during lunch three times a week. Around 20-40 students come in, grab a computer, and start working on their projects. They have a lot of fun.
Using programming platforms like Tynker is a low-stress way for me to teach kids how to code. What I like about Tynker is that it’s very intuitive for students to use. Most can get it up and running with little help from me.
Q: What are the benefits of introducing Tynker as a lunchtime club?
A: Getting the program started during lunch is a lot easier than trying to structure it within a full classroom schedule. This was also my entry into teaching computer science — I wanted to help kids learn without relying on the classroom teachers, who already have a very busy schedule.
An added benefit is that you’re able to give kids more freedom. You don’t need to create a lot of structure for the lunchtime club. Students are able to create projects that interest them, instead of following a strict curriculum. We want the children to see this as a fun learning activity, not a task that they are forced to do.
Q: So what is your role at Barron Park Elementary? What is your background?
A: Currently, I am the Educational Technology TOSA at Barron Park Elementary. Here I work to integrate technology into the curriculum in meaningful ways, as well as to facilitate differentiation.
Prior to this, I taught the fourth and fifth grades. Before turning to education, I worked at high-tech companies like Oracle for fifteen years.
Q: How about your students? Did they come in knowing how to code?
A: There was only one kid who had had any experience with Scratch. The majority of students had no experience with coding. It’s funny — many of the parents work as developers in tech companies in the Silicon Valley, but few know that there are programming platforms like Tynker or Scratch that are geared towards their children.
Fortunately, the students picked it up very quickly. While a few first- and second-grade students needed extra support, the older kids are able to figure out how to use Tynker on their own.
Q: What are the kids making?
A: All the students are creating projects on subjects that interest and fascinate them. One of the boys is trying to build a simulation of an Apple computer. It’s very realistic. He’s even included little details in his project, like the power button on the keyboard of a Mac. There are some other really interesting projects as well.
Do you want to start a Tynker lunchtime club at your school? It’s really easy. Here’s a quick guide to getting it up and running:
1. Sign up (its free!) at Tynker.com. It will only take minutes to set up and start using your Tynker educator account.
2. Find a classroom where you can host the club, and publicize your club to the teachers and students at your school, preferably across grade levels.
3. Set up a classroom on Tynker called “Tynker Lunch Club,” add students, and assign projects according to your students’ skill level (if student skill/grade level varies a lot, you could even create separate classrooms so you can assign different levels of projects).
4. That’s it! Your club should be up and running. Don’t forget — share your students’ projects in your showcase! | <urn:uuid:e2178635-83ce-4c91-8871-28846bf1e556> | {
"dump": "CC-MAIN-2018-51",
"url": "https://www.tynker.com/blog/articles/success-stories/tynkering-at-lunchtime/?replytocom=1139",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376829997.74/warc/CC-MAIN-20181218225003-20181219011003-00207.warc.gz",
"language": "en",
"language_score": 0.9648337364196777,
"token_count": 974,
"score": 2.796875,
"int_score": 3
} |
- Reviews (0)
With this current meter it is easy to measure the consumption of something, for example, to protect something from too high a current.
- GND (earth/min/ground)
- Out (analog output voltage)
By reading the voltage you can measure the current. This is approximately 66mV/A.
This version is suitable for currents from -30A to 30A, so the current can be read both sides from 0 to 30A.
There is an LED on the module that indicates whether the module is on or not.
- Total output error: 1.5% at TA = 25°C
- Sensor IC: Allegro ACS712ELC-xxB-T
- Internal conductor resistance: 1.2 mΩ
- Power operation: 5V
- Temperature: -40°C to 85°C
- Output Signal: Analog
Only logged in customers who have purchased this product may leave a review. | <urn:uuid:17d14cc8-e0f7-4468-bd5e-59aa051b6c34> | {
"dump": "CC-MAIN-2019-30",
"url": "https://store.createlabz.com/product/20-004a/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195525829.33/warc/CC-MAIN-20190718211312-20190718233312-00089.warc.gz",
"language": "en",
"language_score": 0.8581945300102234,
"token_count": 203,
"score": 2.75,
"int_score": 3
} |
Panskepp et al have studied two inbred mouse strains whose infants on weaning show high versus low levels of gregarious social behavior, They controlled a host of behavioral variables during the course of adolescent development to demonstrate specific differences in social motivations among juveniles of the two mouse strains — behavioral variations that could only be explained by genetic differences. Young mice from the gregarious strain seek environments that predict the possibility of a social encounter and avoid places where they have experienced social isolation. The review by Devitt edited for this post quotes the senior author Lahvis: "There is an association between high-pitched calls in mice and positive experience. The quality and quantity of the call are tightly associated with the nature of the interaction itself."
As the mice neared sexual maturity, the genetic influence on social behavior ebbed and the animals became much more responsive to social cues such as gender...the initial genetic predisposition apparently gets masked by reproductive maturity.
Their work suggests that genetic influences on juvenile social behavior may be quite distinct from genetic factors that affect adult social behavior, a finding the potentially useful for understanding social evolution, as well as developing more realistic animal models of pervasive developmental disorders, such as autism. | <urn:uuid:85afe4ec-aeda-4a4e-a45c-237096583b7b> | {
"dump": "CC-MAIN-2021-31",
"url": "https://mindblog.dericbownds.net/2007/04/gregariousness-of-early-adolescent-mice.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046150000.59/warc/CC-MAIN-20210723175111-20210723205111-00365.warc.gz",
"language": "en",
"language_score": 0.9451163411140442,
"token_count": 242,
"score": 3.453125,
"int_score": 3
} |
Stacey Cole's Nature Talks: Is avian conjunctivitis why sparrows, goldfinches are dying?
Not long ago I received a letter from a North Woodstock reader who wrote in part: "I have had more than 50 sparrows and goldfinches die so far this summer. Some say it is a virus, their eyes get sticky so they can't see the food. Thought first it was a neighbor's cat. No. Thought it might be my bird seed or feeders. Changed all my bird seed and cleaned the feeders with bleach, rinsed well. Received my Birds and Blooms. They had an article of doves coming in with virus. We have plenty of doves. Chickadees and others are doing fine. Just sparrows and goldfinches are dying."
Although the symptoms our reader described were those of a bird infected with avian conjunctivitis, I had not heard of doves contracting the virus.
Avian conjunctivitis, is a bacterial infection, that, in some areas, has desiccated flocks of house finches. Other birds including purple finches, evening grosbeaks and pine grosbeaks, all members of the Fringilidae family, also have been susceptible to this virus. I believe our first column in Nature Talks about the eastern population of house finches dying by conjunctivitis appeared in 1996. It told about house finches and it has been and continues to be the one species of birds most severely affected. Occasionally we noted a few cases of the disease confirmed in American goldfinches. Also, for a number of years, the Cornell Laboratory of Ornithology, located at Sapsucker Woods in Ithaca, N.Y., has been closely tracking the spread of the bacterial infection causing conjunctivitis-ike symptoms in affected house finches. This project, referred to as "The House Finch Disease Survey," was unfortunately dropped a few years ago for lack of money to fund it.
The complaint, commonly referred to as the "house finch disease (avian conjunctivitis)," was first known to affect house finches during the winter of 1993-'94 in the states of Virginia and Maryland. Mycoplasmal conjunctivitis, as the disease is currently known, is caused by a parasite bacterium previously known to infect only poultry. Its spread was rapid through eastern house finch populations so that by November 1994 the epidemic had widened, mainly north, and covered a triangular region between Virginia, southern Ontario and southern New Hampshire. By November 1995 the disease had spread into the south, reaching Georgia and to Illinois in the Midwest. It has continued northerly as far as Quebec, Canada. The next year it had moved into Missouri, Iowa, and Minnesota. The disease has continued its spread.
In the Autumn, 2004, issue of "Birdscope," a publication of the Cornell Laboratory of Ornithology, it was reported: "Ten years after house finch eye disease was discovered in the East an epidemic breaks out on the opposite side of the continent. The data shows that the disease began spreading epidemically in the Northwest (British Columbia, Alberta, Washington, Idaho, Montana, Oregon and Wyoming) in early 2004. In February through April, 2004, disease prevalence had reached 15 percent in the Northwest, half again the highest level previously observed."
Although epidemic outbreaks appear to have pretty much skipped the middle of our country since it swept through house finch populations here in the eastern United States, it is not expected to disappear any time soon. It is always possible that the disease may make inroads into other members of the Fringilidae family.
When a sick or dead bird is found within a bird feeding area it should be a strong reminder that keeping such areas uncontaminated is of vital importance. A thorough cleaning can be quite a chore, especially during the heavy winter feeding time.
Bird feeders should be cleaned in a solution of nine parts of tepid water and one part bleach, soaked for two or three minutes in the solution, rinsed and thoroughly dried.
While feeders are down, the feeding area beneath should be cleaned as best as can be done. If possible, allow any wet areas to thoroughly dry.One should watch for signs of disease by observing the actions of the birds that visit feeders. Diseased birds are usually lethargic and sit quietly with their feathers all puffed up. It does not take long for the bacteria to spread through its body and a bird will die quickly.
In the case of a serious disease outbreak, feeders should be taken down immediately and kept down for a period of 2 to 3 weeks. If a second outbreak occurs shortly after the feeders are replaced they should once again be taken down and remain so for the rest of the season.
If regular or electrically heated bird baths, or any type of watering device is used in winter, they also should be washed and disinfected. A good sanitation program is a must for anyone who feeds birds.
Stacey Cole's address is 529 W. Swanzey Road, Swanzey, 03446. | <urn:uuid:85e20e37-a3d1-4a6c-801c-81f277b6427c> | {
"dump": "CC-MAIN-2016-07",
"url": "http://www.unionleader.com/article/20131101/NEWHAMPSHIRE0302/131109903/0/NEWHAMPSHIRE0311",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701148428.26/warc/CC-MAIN-20160205193908-00163-ip-10-236-182-209.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9739769101142883,
"token_count": 1061,
"score": 2.96875,
"int_score": 3
} |
As if our national love affair with Confederate imagery couldn’t get any more bizarre, a high school in Michigan is having trouble dealing with its historically inaccurate namesake. What exactly do I mean? Lee High School has adopted various aspects of Confederate symbolism over the years, including a dedication to R.E. Lee in the 1936 yearbook, and in the 1960’s the battle flag appeared as part of the marching band’s uniform, and another much larger battle flag graced the school’s hallway wall. According to the principal the school’s name has nothing to do with the Confederate general:
According to Britten’s research, the school took its name from the street on
which it stands. It was renamed Lee Street from State Street in 1914, possibly
because the first family to live there was named Leyla. The district was named
for the high school and the Godfrey School that preceded it.
The board and the high school sports boosters commissioned former student Arturo
Araujo to paint the Lee High School Rebel mascot on a gym wall. The board
of education threatened to withhold payment because the artist painted the
Confederate Rebel with a dark skinned face, unlike the sketch he provided when
he was hired.
Here is the artist’s justification of his work:
I was shooting to represent the whole student body," says artist Arturo Araujo.
"75 percent colored, 25 percent caucasion. That was the whole idea of painting
the mural. So the whole school is represented by it’s mascot.
Don’t you just love the idea of a multi-cultural Confederate rebel? I hope they don’t remove this mural, though I am just a bit concerned that those who are pushing the black Confederate story will use this as just another piece of evidence. I can hear it now: "You see, even some Yankees in Michigan have acknowledged the existence of the black Confederate. What more evidence do you need?" | <urn:uuid:c35d2fe4-13b2-482f-b2aa-42a98f54fafb> | {
"dump": "CC-MAIN-2017-13",
"url": "http://cwmemory.com/2006/07/13/a-michigan-high-schools-black-confederate-mural/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189686.56/warc/CC-MAIN-20170322212949-00271-ip-10-233-31-227.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9683667421340942,
"token_count": 416,
"score": 3.09375,
"int_score": 3
} |
What is encryption?
In computing, encryption is where data is converted from a readable form to an encoded version that can only be opened or read if it’s been decoded by a decryption key.
How it works?
Data, whether a single file or all your files, is encrypted using an algorithm and an encryption key. This process then codes your files into an unreadable state of random characters. The process of decrypting your files is to simply reverse the encryption, using the same method when encrypting, the encryption key is applied to convert the files back into their original form. The benefits of encryption The primary purpose of encryption is to protect the confidentiality of your data that is stored on computer systems. It prevents anyone without the encryption key from being able to read or access your data.
How will this affect you?
It is advisable that all staff laptops should be encrypted using something like Microsoft BitLocker. This will encrypt the data that is on the laptop and protect it from attacks. Newer laptops have a special chip inside them called a TPM chip that stores the encryption key for you, as a user, you won’t notice any difference as the laptop will encrypt and decrypt the data for you unless it notices an unauthorised change. On older laptops, the user will need to input a password prior to Windows booting to allow access to the encrypted drive. BitLocker won’t protect your files once Windows is running, it would be advisable to make staff use a complex password with a lock screen timeout. | <urn:uuid:60a6f8ab-51b7-41ce-8fee-1ed487f96603> | {
"dump": "CC-MAIN-2020-16",
"url": "http://pauldredge.co.uk/deviceencryption/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370506121.24/warc/CC-MAIN-20200401192839-20200401222839-00485.warc.gz",
"language": "en",
"language_score": 0.9107717275619507,
"token_count": 316,
"score": 3.671875,
"int_score": 4
} |
The Dupont's Lark (Chersophilus duponti), is the only lark in the genus Chersophilus. It breeds across much of north Africa, from Algeria to Egypt, and in Spain and France. It is a non-migratory resident.
This is a bird of open sandy semi-desert or steppe with some grass. Its nest is on the ground, with 3-4 eggs being laid. Its food is seeds and insects.
Like most other larks, Dupont's Lark is an undistinguished looking species on the ground. It is 17-18 cm long, slim, with a long neck, long legs and a fine slightly curved bill. It has a thin pale crown stripe and a dark-streaked breast.
There are two races. C. d. duponti of Europe and northwest Africa is mainly brown-grey above and pale below. C. d. margaritae, which occupies most of the rest of the African range, has rufous upperparts.
This is a very shy species, which runs for cover when disturbed. Its song is a nasal whistle, given mainly at dawn and dusk or at night.
This bird was named after the French naturalist Leonard Puech Dupont, who was the first to collect a specimen.
This Alaudidae-related article is a stub. You can help Wikipedia by expanding it. | <urn:uuid:87c858f6-1eca-4b9b-b3fd-f5db7d885947> | {
"dump": "CC-MAIN-2022-27",
"url": "https://www.kiwifoto.com/galleries/birds/duponts_lark/index.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103669266.42/warc/CC-MAIN-20220630062154-20220630092154-00145.warc.gz",
"language": "en",
"language_score": 0.9635250568389893,
"token_count": 293,
"score": 3.140625,
"int_score": 3
} |
Study finds new ADHD genes, links susceptibility with autism and other neuropsychiatric conditions
Aug 11, 2011
New research has identified more genes in attention deficit hyperactivity disorder (ADHD) and shows that there is an overlap between some of these genes and those found in other neuropsychiatric conditions such as autism spectrum disorder.
Brain imaging research reveals why autistic individuals confuse pronouns
Aug 01, 2011
A new brain imaging study published in the journal Brain provides an explanation as to why autistic individuals' use of the wrong pronoun is more than simply a word choice problem. Researchers at Carnegie Mellon University's Center for Cognitive Brain Imaging found that errors in choosing a self-referring pronoun reflect a disordered neural representation of the self, a function processed by at least 2 brain areas—1 frontal and 1 posterior.
Weak synchronization in toddler brains may be a biological marker for autism
Jul 25, 2011
Scientists have found, for the first time, a method that can accurately identify a biological sign of autism in very young toddlers. By scanning the brain activity of sleeping children, the scientists discovered that the autistic brains exhibited significantly weaker synchronization between brain areas tied to language and communication, compared to that of nonautistic children.
New clinical trial to examine medication to treat social withdrawal in fragile X and autism patients
Jul 20, 2011
Children and adults with social withdrawal due to Fragile X syndrome, the most common cause of inherited intellectual disability and the most common known single gene cause of autism, may benefit from an experimental drug under study by pediatric neurologists at Rush Children’s Hospital at Rush University Medical Center.
Biomarker for autism discovered
Jul 12, 2011
Siblings of people with autism show a similar pattern of brain activity to that seen in people with autism when looking at emotional facial expressions. University of Cambridge researchers identified the reduced activity in a part of the brain associated with empathy and argue it may be a 'biomarker' for a familial risk of autism.
Study of twins suggests genetic component of autism spectrum disorders may be moderate
Jul 05, 2011
After evaluating twin pairs in which at least one child has autism or autism spectrum disorder, researchers suggest that the shared environment may play a more substantial role in development of the condition than shared genes do.
Research provides important insight into ‘systemizing’ theory of autism
Jun 20, 2011
A new study from Cambridge University has for the first time found that autism diagnoses are more common in an information-technology rich region. The study, published today in the Journal of Autism and Developmental Disorders, has important implications for service provision in different regions and for the ‘hyper-systemizing’ theory of autism.
Researchers discover many genetic keys needed to unlock autism
Jun 08, 2011
Hundreds of small genetic variations are associated with autism spectrum disorders, including an area of DNA that may be a key to understanding why humans are social animals, according to a multisite collaborative study led by researchers at Yale University.
Research reveals effectiveness of seizure treatments for children with autism
Jun 03, 2011
Physicians will have a better guide for more effectively managing treatment of children experiencing seizures related to autism with the results of a study by researchers at Arizona State University and the University of Texas-Houston.
Sporadic mutations identified in children with autism spectrum disorders
May 16, 2011
Scientists at the University of Washington Department of Genome Sciences have identified several sporadic or "de novo" genetic mutations in children with autism spectrum disorder.
The mirror neuron system in autism: broken or just slowly developing?
May 03, 2011
A new study published in Biological Psychiatry reports that the mirror system--a brain circuit that enables us to better understand and anticipate the actions of others--in individuals with autism is not actually broken, but simply delayed.
Study finds autism-related early brain overgrowth slows by age 2 years
May 03, 2011
Scientists using MRI observed that the brains of children with autism spectrum disorder are larger than those without autism, but this difference appears related to increased rates of brain growth before 2 years of age, according to a report in the May issue of Archives of General Psychiatry.
Screening very preterm infants for autism at 18 months often inaccurate
May 02, 2011
Extremely premature infants who screen positive for autism spectrum disorder at 18 months of age may not actually have autism. Rather, they may fail screening tests due to an unrelated cognitive or language delay, according to research presented at the Pediatric Academic Societies annual meeting in Denver.
Social bonding in prairie voles helps guide search for autism treatments
Apr 29, 2011
Researchers at the Center for Translational Social Neuroscience at Emory University are focusing on prairie voles as a new model to screen the effectiveness of drugs to treat autism.
5-minute screen identifies subtle signs of autism in 1 year olds
Apr 28, 2011
A 5-minute checklist that parents can fill out in pediatrician waiting rooms may someday help in the early diagnosis of autism spectrum disorder, according to a study funded by the National Institutes of Health.
New data shows half of all children with autism wander and bolt from safe places
Apr 20, 2011
A just released wandering and elopement survey found that approximately half of parents of children with autism report that their child elopes, with the behavior peaking at age 4 years. Among these families, nearly 50% say that their child went missing long enough to cause significant concern about safety.
Mortality rate is increased in persons with autism who also have epilepsy
Apr 15, 2011
A comprehensive investigation of brain tissue donated to the Autism Speaks Autism Tissue Program (ATP), a postmortem brain tissue donation program, determined that one third of the brain donors with autism also had epilepsy, and co-morbidity data from the California State Department of Developmental Services revealed a higher than expected rate of mortality in individuals with both autism and epilepsy than for individuals with autism alone.
A world first: the discovery of a common genetic cause of autism and epilepsy
Apr 08, 2011
Researchers from the Centre hospitalier de l'Université de Montréal Research Centre have identified a new gene--synapsin gene (SYN1)-- that predisposes people to both autism and epilepsy.
Treatments show promise in reducing autism-related behaviors, but some have significant side effects
Apr 06, 2011
Some medical and behavioral treatments show promise for reducing certain behaviors in children with autism spectrum disorders, but more research is needed to assess the potential benefits and harms, according to a new report funded by HHS' Agency for Healthcare Research and Quality (AHRQ). The research results were published online in the journal Pediatrics.
Interest in toys predicts effectiveness of autism treatment in toddlers
Mar 22, 2011
Toddlers who played with a limited number of toys showed more improvement in their communication skills following parent-guided treatment than those receiving other community-based treatments. | <urn:uuid:ba35a08c-dad3-48b6-9801-13ddf6221dad> | {
"dump": "CC-MAIN-2018-39",
"url": "http://www.medmerits.com/index.php/public/news/C130",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267161214.92/warc/CC-MAIN-20180925063826-20180925084226-00286.warc.gz",
"language": "en",
"language_score": 0.9323431253433228,
"token_count": 1413,
"score": 2.671875,
"int_score": 3
} |
Pegasus in popular culture
This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages)(Learn how and when to remove this template message)
The winged, divine horse Pegasus has been a prominent figure in modern popular culture.
- Pegasus, an 1888 sculpture that depicts the creature being tamed by Bellerophon, is the most famous work of French sculptor Émile Louis Picault, of which only 800 were made.
- Statues of Pegasus, Mexico City
Corporate and commercial uses
- Pegasus was chosen for the academic seal of the University of Central Florida, in 1963, by its first president, Dr. Charles Millican, who co-designed it.
- The Pegasus logo has been used for over 29 years by Courier Company Pegasus Express Ltd, and is seen on all vehicles and trailers, and depots in Scotland and England.
- Pegasus has been the symbol of the Mobil brand of gas and oil, marketed by the Exxon Mobil Corporation, since the 1930s and, more recently, FBR Capital Markets, an investment bank based in Arlington, Virginia. As such, it has also been a symbol of Dallas, Texas, gracing its skyline atop the Magnolia building and in Pegasus Plaza.
- Pegasus appears prominently in the logo of UB Group, an Indian business conglomerate.
- Pegasus is the name of an air-launched vehicle that carries satellites to orbit.
- Pegaso was a Spanish maker of trucks, buses and sport cars, although its logo portrayed the silhouette of a wingless, leaping horse.
- The Poetry Foundation also uses Pegasus as its logo.
- The Buell Motorcycle Company uses Pegasus as a visual branding element.
- Reader's Digest also has a Pegasus logo.
- A Pegasus is the emblem of the Honourable Society of the Inner Temple, which names its bar the Pegasus. Pegasus is the University of Exeter's Classics and Ancient History Departmental journal. It has had many entries from notable Classicists as well as two articles from J. K. Rowling, a former student of the University's Classics and Ancient History Department.
- It was featured in the cover of Fleetwood Mac's single "Family Man".
- Pegasus was featured on the covers of three albums by The Steve Miller Band: Book of Dreams in 1977, Greatest Hits 1974-78, and Living in the 20th Century in 1986.
- The Taiwanese company Asustek (manufacturer of the Asus brand computer, networking and consumer products) took its name from the creature, omitting the first three letters in order for the company to appear first in telephone listings. Likewise, its former fabrication subsidiary Pegatron took the first four letters from the name of the creature.
- Mascot of the Kentucky Derby Festival, a community celebration leading up to the Run for the Roses (aka: the Kentucky Derby) in Louisville, Kentucky, USA.
- Turkish Pegasus Airlines uses the emblem of Pegasus, and Pegasus also appears in the turbines of all Air France aircraft.
- PEGASYS (Hoffmann–La Roche) for the treatment of hepatitis C, is a once-a-week injection that works to reduce the amount of hepatitis C virus in the body.
- Pegasus is the mascot of TriStar Pictures.
- Pegasus is also the mascot of Metropolitan Filmexport.
- Pegasus is the name of a medevac helicopter based at the University of Virginia Medical Center. Pegasus transports critically injured patients within 120 NM (220 km; 140 mi) of Charlottesville, Virginia. The name was chosen because it was different from most other medevac programs, and there are stories of Pegasus carrying wounded soldiers from battle.
- Pegasus is also featured on the coat of arms of Robinson College, part of the University of Cambridge in Cambridge, England. The University of Strathclyde, in Glasgow Scotland, uses an online service called PEGASUS (Portal Engine Giving Access To Strathclyde University Systems) to provide its students with crucial information.
- Nike Inc. has produced a brand of running shoe named the Air Pegasus.
- Pegasus Mail is the name of an email client.
- A pegasus was used as the Pontiac Fiero's emblem.
- Middle Tennessee State University's Mascot "Lightning" is based on Pegasus.
Pegasus has appeared in several films, including the animated films Fantasia, Hercules, and Barbie and the Magic of Pegasus along with the stop motion film, Clash of the Titans, its remake Clash of the Titans and, as a name only, in Johnny English and its sequel Johnny English Reborn.
In Disney's Fantasia, Pegasi are featured during the visualized "Pastoral Symphony" segment, along with other mythical creatures including unicorns and centaurs and in Hercules he is the winged horse sidekick and friend to Hercules, the main character. In Clash of the Titans, Pegasus is captured by Perseus before Perseus visits and kills Medusa the Gorgon. This version, changes the method of Pegasus' birth - although no further details are given, save a comment from Zeus that Pegasus is the sole surviving winged horse from a herd of the creatures, the rest killed by Thetis' son, Calibos. In Barbie and the Magic of Pegasus, Pegasus is the winged horse who helps Princess Annika.. In the film Johnny English, starring Rowan Atkinson, Pegasus, played by Tim Pigott-Smith, is the codename of the head of MI7; in the sequel, Johnny English Reborn, the head of the organisation is now a woman, played by Gillian Anderson, who also uses the codename Pegasus (possibly in a nod to the James Bond film series, in which M was traditionally played by a man but was then played by Judi Dench). A pegasus can be seen on the TriStar logo. A pegasus can also be seen on the Metropolitan Filmexport logo.
Pegasus (or possibly more than one) has appeared in two Marvel Cinematic Universe films. During a flashback sequence in Thor: Ragnarok, Valkyrie is briefly seen riding one. In Avengers: Endgame, she rides one again in the final battle against Thanos. It is not clear whether this is the same individual horse seen in the earlier film.
Pegasus is also the name of a secret military project in the MCU. The project was a cover story for a faster-than-light drive built using Kree technology. The ship crashes, and Carol Danvers destroys the engine to prevent the Skrulls from salvaging it. Unknown to Carol, the Pegasus engine was powered by the Tessaract. She absorbed the energy of the explosion and gained superpowers from it, eventually becoming Captain Marvel.
- In the anime and manga series One Piece, during the Skypiea arc, Pierre, a bird of Gan Fall could transform into a horse and a horse bird hybrid due to eating a devil fruit, which give the users of devil fruits enormous power but also a prime weakness to water and an element that opposes their fruit's element like a lightning fruit could be weak against a rubber fruit as rubber is an insulator of lightning.
- Pegasus has been featured in Stargate Atlantis as a galaxy.
- Both versions of Battlestar Galactica included the Battlestar Pegasus, which survived the fall of the Twelve Colonies of Kobol.
- It was a starship, the USS Pegasus, in an episode of Star Trek: The Next Generation. The episode is Season 7 Episode 12: "The Pegasus".
- In the Japanese anime Digimon Adventure 02, Patamon can digivolve into Pegasusmon using the Digi-Egg of Hope.
- In the anime Beyblade: Metal Fusion, the hero Ginga Hagane uses the powerful bit-beast Pegasus.
- In the anime series Gundam, one of the main spaceships, White Base, is a Pegasus-class battle ship.
- In the anime series Fairy Tail one of the main guilds is called Blue Pegasus, the guild's mark represents the name of the guild.
- In Sailor Moon SuperS, the spirit of Helios, the keeper of the Golden Crystal, disguises himself as a pegasus. Drawing on the metaphor of inspiration, he flees to live in a particular character's 'dream mirror', a literal reflection of a character's dreams and goals.
- In the anime Yu-Gi-Oh!, the main antagonist of the first season (and creator of the card game Duel Monsters) is a man named Maximillion Pegasus.
- In Dengeki Sentai Changeman, Yuma Ozora's motiff is a pegasus.
- In Gosei Sentai Dairanger, Shoji of the Heavenly Gravity Star's motiff is a pegasus.
- Pegasus frequently appears in the 1960s cartoon The Mighty Hercules, as the winged steed of the titular character.
- In Fate/Stay Night, Pegasus is the Mythical Beast that is used by the Servant Rider when she uses one of her Noble Phantasms, Bellerophon. As a further reference to the original myth where it was born from the blood of the decapitated Medusa, Rider (whose true identity was Medusa) first summoned the Pegasus by stabbing herself through the neck.
- The Hasbro owned toy line My Little Pony includes ponies that are based on Pegasus. In the first animated special Rescue at Midnight Castle the pony Firefly is a pegasus pony. In the animated TV series My Little Pony: Friendship Is Magic, pegasus ponies are one of three distinct species of ponies featured (unicorns and earth ponies being the other two). Two of the main characters Rainbow Dash and Fluttershy are pegasus ponies.
- The Pegasus is a recurring motif in the manga and anime Saint Seiya. In this series, the main character, Seiya, becomes the Pegasus Saint. Also, the show's theme song is titled "Pegasus Fantasy" by the Japanese group Make-Up.
- The titular character and protagonist of the 2000 Kamen Rider Series, Kamen Rider Kuuga can use a green-colored form known as "Pegasus Form".
- In the Broadway production of Xanadu, protagonist Kira rides on Pegasus to Mount Olympus during the number "Suspended in Time."
- Authors include Julia Golding, in her Companions Quartet, including Secret of the Sirens, The Gorgon's Gaze, Mines of the Minotaur and The Chimera's Curse; and Anne McCaffrey, who wrote a series of books, To Ride Pegasus, Pegasus in Flight, and Pegasus in Space.
- In the anime/manga of Yu-Gi-Oh!, the creator of the Duel Monsters card game was named Pegasus J. Crawford (Maximillion Pegasus in the dub and English manga). Also, there is a Duel Monster called Firewing Pegasus, and another called Sapphire Pegasus. In the classic anime/manga Saint Seiya, the Pegasus is the title character's destined constellation, and Seiya dons an ancient Greek armor in the form of the winged horse.
- Pegasus is the title character in the Pegasus book series written by Kate O'Hearn.
- Frequently mentioned in Rick Riordan Percy Jackson and the Olympians and The Heroes of Olympus series, Pegasus finally appears in the final book, The Blood of Olympus, as the father of pegasi, among them Percy Jackson's friend, Blackjack.
- A pegasus is depicted living with Wonder Woman aboard the Wonderdome, and would make recurring appearances aiding her in her battle against the Gorgons and the Underworld.
- In the video game God of War II, the protagonist Kratos is bidden by Gaia (mother of earth), the mother of the Titans, to find the Sisters of Fate in order to change his past. She gives Kratos the aid of a Fire Pegasus to traverse the distance to the Island of Creation, where the Fates' temple is located.
- Pegasus is the Poseidon captured victim in Heracles: Battle With The Gods on the Nintendo DS. Pegasus is freed and reunited with Heracles after Poseidon's defeat.
- In multiple games in the Fire Emblem series, pegasi are mounted by knights and called Pegasus knights, or Falcon Knights in their upgraded form. In Fire Emblem: Awakening, the class Dark Flier, which certain characters ride on a black Pegasus, is introduced.
- In the computer game Age of Mythology, Pegasus appears in game as a flying scout unit.
- Pegasus appears in the final scene of the 2600 game No Escape.
- Heroes of Might and Magic 3 features Pegasi as recruitable troops from the Rampart town.
- In the video game Kingdom Hearts II, the protagonist, Sora, duels the Hydra from the back of Pegasus.
- In Quest for Glory V: Dragon Fire the Hero has to obtain some Pegasus feathers for the main quest.
- In the video game Mega Man Star Force, one of the three versions, as well as the featured "Satellite Admin" that the player fights and obtains the power of, is named Pegasus, and resembles one.
- The time machine in the Journeyman Project series is called the Pegasus Temporal Catapult, or simply the Pegasus Device.
- In Inazuma Eleven, one of the hissatsu techniques is called "Pegasus Shot" and involves summoning a blue Pegasus. A combination version involving three users is called "Tri-Pegasus", where a large white Pegasus is summoned.
- Inazuma Eleven's follow up, Inazuma Eleven GO, and its two sequels, feature protagonist Matsukaze Tenma whose personality is based on Pegasus. His keshin, a magical deity which can be summoned by its user, is a "Majin Pegasus". The evolved version of his soul, an ability that lets the user transform into an animal, is Pegasus. The name "Tenma" when written in kanji translates to "heavenly horse".
- In Assassin's Creed Odyssey, the player can purchase a cosmetic skin for their horse that turns it into Pegasus.
- In Fate/stay night, the Servant Rider can summon a pegasus that she rides with her Noble Phantasm Bellerophon.
- "Pegasus" by The Allman Brothers Band
- "Pegasus" by System F
- "Pegasus", a California based rock band, 1977–1986, with Tedd Armstrong, Steve Caton, James Bender
- "Pegasus" by The Hollies
- "Pegasus" by Ulrich Roth
- "I am Pegasus" by Ross Ryan
- "Neon Pegasus" by Parry Gripp
- "Perplexing Pegasus" by Rae Sremmurd
- "Wild Pegasus" was the ring named used by professional wrestler Chris Benoit during his time wrestling in Japan. Benoit won the Super J-Cup while competing under this name.
- Fusaichi Pegasus, a racehorse, won the 2000 Kentucky Derby.
|Wikimedia Commons has media related to Pegasus.| | <urn:uuid:0efdff2f-c4d8-49d5-86c7-0800de8ac80a> | {
"dump": "CC-MAIN-2019-51",
"url": "http://www.let.rug.nl/~gosse/termpedia2/termpedia.php?language=dutch_general&density=7&link_color=000000&termpedia_system=perl_db&url=http%3A%2F%2Fen.wikipedia.org%2Fwiki%2FPegasus_in_popular_culture",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540482038.36/warc/CC-MAIN-20191205190939-20191205214939-00261.warc.gz",
"language": "en",
"language_score": 0.9370189905166626,
"token_count": 3152,
"score": 2.578125,
"int_score": 3
} |
Mainly the government provides education in the United States, and three levels of control and financing, ie the federal, state and local governments. Curricula, funding, education and other policies in primary and high school levels of school districts are set through locally elected school boards with jurisdiction. With independent officials and budgets are other local jurisdictions separately from school districts. State governments usually make education and standardized testing decisions.
in different countries, attending school is different and children are required to attend school until the age of 16-18. But age attend school in many countries, until the age of 18. The age range of 14-18 are also excluded in some states. For attending schools, students have options public schools, private schools, or home school. Three education is available in many public and private schools, ie elementary school, junior high school (MIDDLE SCHOOL) and senior high school. Depending on the region, grade levels vary.
When we look around us about 76.6 million students received the registered from kindergarten to high school. When assessing these students was made on the basis of academically “on track”, it was concluded that students have a range of 12 to 17 was 72 percent. In the students attend private schools for primary schools was 10.4 percent, which resulted in 5.2 million students. When we review the adult population of the country, was a high school education competed for more than 85 percent and a bachelor’s degree have reached about 27 percent. Graduates of the college and university average salary is $ 45,400, and according to the US Census Bureau study in 2002, wages increased by $ 10,000 more than the national average.
in the country, have children over the age of 15 a literacy 98%, and it is understood below from science and mathematics understanding. Similar to the no child left behind law, the efforts of public and private efforts pushed down low performance. According to the average of other developed countries is 35%, adults entering the public from the workforce is slightly below it is 33%) and there is a high rate of participation to get the retraining of the workforce is high. According to recent studies, explains that “A slightly higher percentage of American adults get more scientifically literate than European or Japanese adults”.
In the United States, at the age of five or six preschool education is your duty to start schooling. Depending on the age of the children are different grades provided the group, beginning with the first grade, and culminated in the twelfth grade. Unlike Canada and Australia, where preference is given to Cardinal figures, the United States, to name a ratings are relative numbers used.
In the United States, you will find something mot required education for the public pre-kindergarten or Crèche programs. The Head Start preschool program is funded for the federal government for children of low-income families, but most families are financing their own preschool or child care program. | <urn:uuid:e3a24952-a9ab-4320-9683-6f15f90b167f> | {
"dump": "CC-MAIN-2019-04",
"url": "http://ebookblogs.org/index.php/2015/10/13/education-in-the-united-states/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583722261.60/warc/CC-MAIN-20190120143527-20190120165527-00336.warc.gz",
"language": "en",
"language_score": 0.9648798108100891,
"token_count": 599,
"score": 3.28125,
"int_score": 3
} |
Science, Tech, Math › Animals & Nature Niche Share Flipboard Email Print Pink skunk clownfish. Photo © Kim Yusuf / Getty Images. Science, Tech, Math Amphibians Birds Habitat Profiles Mammals Reptiles Wildlife Conservation Insects Marine Life Forestry Dinosaurs Evolution View More By Laura Klappenbach Ecology Expert M.S., Applied Ecology, Indiana University Bloomington B.S., Biology and Chemistry, University of Illinois at Urbana-Champaign Laura Klappenbach, M.S., is a science writer specializing in ecology, biology, and wildlife. our editorial process Laura Klappenbach Updated June 11, 2015 The term niche is used to describe the role an organism or population plays within its community or ecosystem. It encompasses all relationships that the organism (or population) has with its environment and with other organisms and populations in its environment. A niche can be viewed as a multi-dimensional measurement or range of conditions within which the organism operates and interacts with other components of its environment. In that sense, a niche has boundaries. For example, a species may be able to survive in a small range of temperatures. Another might live only within a certain range of elevations. An aquatic species may be successful only when they live in a certain range of water salinity. | <urn:uuid:edd0c7ca-0c85-4cb4-a1ba-5bf6a693ea68> | {
"dump": "CC-MAIN-2020-45",
"url": "https://www.thoughtco.com/what-is-a-niche-p2-130450",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107900860.51/warc/CC-MAIN-20201028191655-20201028221655-00272.warc.gz",
"language": "en",
"language_score": 0.8806489706039429,
"token_count": 264,
"score": 3.390625,
"int_score": 3
} |
VHDL - Programming the Field Programmable Gate Array (FPGA)
Introduction to VHDL
VHDL (VHSIC-HDL, Very High Speed Integrated Circuit - Hardware Description Language) is a hardware description language used to describe the behavior of digital circuit designs such as field-programmable gate arrays and integrated circuits. A digital system can be represented at different levels of abstraction.
The highest level of abstraction is the behavioral level of VHDL that describes a digital system in terms of how it behaves. A behavioral description specifies the relationship between the input and output signals instead of describing its components and interconnection between the components. The behavioral description could be a Boolean expression or a Register Transfer Level of abstraction.
The structural level abstraction describes a system as a collection of gates and components. A structural description could be compared to a schematic of interconnected logic gates. It is a representation that is usually closer to the physical realization of a system.
VHDL Constructs - Data Types In VHDL, every signals, variables, and constants must have a data type declaration. Some data types are synthesizable, while others are only for modeling purpose. User-defined types are created with type declarations. Predefined types can be divided into several categories: scalar, composite, access, and file. In addition, there are non-predefined types established by the IEEE standard 1164. Each of these types is listed below.
1. Scalar Types - Enumerated Data Type: An enumerated type is a data type in which the exact values are defined. - bit - "0 or 1" - boolean - "true or false" - character - "literals: 128 characters of the ASCII character set" - Severity_level (literals: note, warning, error, failure) - Numeric - Integer - Physical - Floating_point
2. Composite Types - Array - String (1-dimensional array of type character) - Bit_vector(1-dimensional array of type bit) - Record - Access Types (see access) - File Types (see file)
3. Non-predefined Types: In addition to the predefined types, IEEE standard 1164 adds the following types that are commonly used for modeling digital logic: - Std_ulogic (an enumerated type with the values 'U', 'X', '0', '1', 'Z', 'W', 'L', 'H', '-') - Std_logic (same as std_ulogic except that this is a resolved type) - Std_ulogic_vector (an array of std_ulogic) - Std_logic_vector (an array of std_logic)
4. Predefined-Types: Types defined by the IEEE standard 1076.3 are: - Unsigned (an array of std_logic) - Signed (an array of std_logic) - Overloaded arithmetic and conversion operators for types unsigned and signed are defined in the package numeric_std. More information on selecting a data type can be found in the Design Considerations section of the IEEE VHDL Reference Manual.
VHDL Ports The inputs and outputs of a VHDL system are called ports. Each port needs to have its name, mode, and type specified at the entity level using port declarations and the keyword port.
Port directions IN Input port OUT Output port INOUT Bidirectional port BUFFER Buffered outputs (can be read by the architecture of the entity)
Model Constructs 1. Libraries and Packages A library can be considered as a place where the compiler stores information about a design project. VHDL libraries provide a set of packages, components, and functions that simplifies the design. The keyword "library" is used to shows that library packages are going to be added into the VHDL design file. Packages provide a collection of sub-libraries. For example "std_logic" is defined in the package ieee.std_logic_1164 in the ieee library. In order to use the std_logic, we needs to specify the library and package at the beginning of the VHDL file as follows:
library IEEE; use IEEE.std_logic_1164.all;
2. Entity An entity is a specification of the design interfaces. The entity declaration in VHDL defines the name of the entity and lists the input and output ports. The mode describes the direction data is transferred through the port and can take on values of either in, out, inout, or buffer. The type is one of the legal data types described above. Port names with the same mode and type can be listed on the same line separated by commas.
entity entity_name is port (port_name1 : <mode> <type>; port_name2 : <mode> <type>); port_name3 : <mode> <type>); end entity;
Line #1 shows the IEEE standard package Line #2 includes a package from the library Line #4 defines the NAME of the entity Line #5 thru 8 shows the input and output ports and the data types. Line #9 shows that an entity declaration always ends with the keyword end
3. Signal Declarations Signals represent wires within the system and they do not have a direction or mode. Signals that are used for internal connections within a system are declared inside the VHDL architecture. Signals cannot have the same name as a port in the system and each signal must be declared with a type. Syntax: signal name : <type>; Examples: - signal A : bit; - signal x, y, z : integer; - signal F : bit_vector (15 downto 0); - signal C_int : integer range 0 to 255;
4. Architectures The architecture in VHDL describes the behavior of a system. It is a specification of the design's internal implementation. The architecture is where the majority of the design work is conducted. Besides, a single entity can have multiple architectures.
Line #11 shows the architecture_name followed by the entity associated with this architecture. line #13 thru 16 shows the behavioral description of the system inside the "begin" and "end" keywords.
1. D Flip-Flop With Positive-Edge Clock
IO Pins Description D -> Data Input C -> Positive-Edge Clock Q -> Data Output
D Flip-Flop RTL Schematic
2. D Flip-Flop With Negative-Edge Clock and Asynchronous Reset
IO Pins Description D -> Data Input C -> Negative-Edge Clock CLR -> Asynchronous Reset (Active High) Q -> Data Output
D Flip-Flop with clear RTL Schematic
3. D-Flip-Flop With Positive-Edge Clock and Clock Enable
IO Pins Description D -> Data Input C -> Positive-Edge Clock CE -> Clock Enable (Active High) Q -> Data Output
Counters in VHDL
4-Bit Unsigned Up Counter With Asynchronous Reset IO Pins Description C -> Positive-Edge Clock CLR -> Clock Reset (Active High) Q -> Data Output (4-bit) | <urn:uuid:58aca9be-7125-4f13-bc68-450738f1d8f4> | {
"dump": "CC-MAIN-2022-05",
"url": "https://www.fwdskillzone.com/intro_to_vhdl.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320303717.35/warc/CC-MAIN-20220121222643-20220122012643-00665.warc.gz",
"language": "en",
"language_score": 0.8371400237083435,
"token_count": 1491,
"score": 3.90625,
"int_score": 4
} |
Zero-based Budget Spreadsheet Template
The zero-based budget template refers to the budget that is prepared mainly in order to justify the expenses for each of the new periods where the budget starts from zero unlike in case of a traditional budget where the adjustments are made in the previous budgets. Zero-based budgets are prepared in such a manner where the difference between the income from all the sources and the expenses from all the sources comes to zero.
About the Template
- It highlights the income of the person from all the sources for the period under consideration along with the expenses of the period for the same period and lastly the difference between the income and expense which should be equal to zero.
- In the case of the zero-based budget, in the end, the budget should be balanced fully and one should have zero budget as leftover. The template which is given above shows the budgeted income and costs expected to be incurred by the company along with the income and costs actual balance for the period.
Following are the different details that are present generally in the template:
#1 – Heading at the Top:
In the template, the heading ‘Zero base budget Template’ will be mentioned. It will remain intact for all the template users. The heading is mentioned in order to tell the user the purpose of the creation of such a template.
#2 – Summary of the Budget:
This summary detail of the budget is shown at beginning of the template which contains details of the Total Income during the period, Total Expenses during the period and the total balance during the period on actual as well as a projected basis. These figures will be populated automatically from the values derived from the below steps.
#3 – Fixed Expenses:
Under this, all the fixed expenses in budgeted and actual values from all the areas will be mentioned.
#4 – Variable Expenses:
Under this, all the variable expenses in budgeted and actual values from all the areas will be mentioned
#5 – Balance:
Balance left will be calculated automatically after subtracting the total of the fixed and the variable expenses from the total income. This balance of projected figures should be equal to zero i.e., the budget should be balanced fully.
How to Use this Zero Based Budget Template?
Following are the steps that have to be followed in order to use the Zero base budget template:
- A person using this template has to enter all the details as required in the fields that are not already pre-filled.
- For this, firstly all the sources of income are to be identified and entered in the point Income /Funds Received during the period. The amount is entered should be net take-home pay and not the gross pay as the budgets are prepared considering what the person is actually expecting to receive.
- After the details of income, all the expenses that the company expects to incur for the period under consideration will be entered. These expenses are further categorized into fixed and variable expenses to provide a clear picture of the nature of the expenses. However, the category can be modified in the template as per the requirement of the person.
- After that template will automatically calculate the balance left after subtracting the total expenses from the total income of the person. Since this is the zero-based budget, the difference between the income and expenses of the period should be equal to zero. So, till the time this balance comes to zero people have to make modifications in order to get this difference as zero.
- After the budgeted details, the figures for actual income received and actual expenses incurred for the period against each activity should be entered.
- From the above figures variance will be calculated automatically by deducting actual figures from the budgeted figures for all the activities individually and for the total budget as a whole.
This has been a guide to Zero Based Budget Template. Here we provide you with a free downloadable zero-based budget spreadsheet in order to justify the expenses for each of the new periods. Also, you can download and use this template in Excel, Google Sheets or in PDF format.
You can also take a look at our other useful articles- | <urn:uuid:fbe814a2-6619-4c8c-a6d5-63d7e07f1810> | {
"dump": "CC-MAIN-2020-10",
"url": "https://www.wallstreetmojo.com/zero-based-budget-template/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145742.20/warc/CC-MAIN-20200223001555-20200223031555-00235.warc.gz",
"language": "en",
"language_score": 0.9279777407646179,
"token_count": 846,
"score": 2.640625,
"int_score": 3
} |
A common misconception has it that Los Angeles is an "unplanned" city. To disprove this, one must look no further than any of the dozens of influential architectural and development histories written about the city, the forthcoming book Planning Los Angeles, or to the Residence District Ordinance (RDO) adopted by the Los Angeles City Council in 1908.
In fact Los Angeles has been a land use and planning pioneer, as the RDO can attest: "'Los Angeles was one of the first large cities in the U.S. to adopt a kind of modern zoning to keep the industrial away from the residential,'" [Occidental College professor Mark] Vallianatos says. Indeed, the Residence District Ordinance is sometimes credited as being the nation's first such broad land use edict," notes Rosenberg.
While the ordinance cannot be entirely blamed for the sprawl that characterizes the contemporary city, it certainly contributed to the horizontal growth that followed. Speculating about the form of Los Angeles without the segregating effects of the single-use zoning ordinance, which of course became commonplace across the country, Vallianatos sees a denser city.
"If the city would have more mixed use, with people living closer to retail and workplaces, Los Angeles would feel like another city, with less of its land area dedicated to low density, single family residential neighborhoods, and more streets with shops and businesses on the ground floor and homes above." | <urn:uuid:60d362d9-bec6-44b3-96b3-2613cc89985b> | {
"dump": "CC-MAIN-2015-22",
"url": "http://www.planetizen.com/node/55505",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207928562.33/warc/CC-MAIN-20150521113208-00065-ip-10-180-206-219.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9600076079368591,
"token_count": 291,
"score": 2.609375,
"int_score": 3
} |
Kenneth Geddes Wilson (born 1936) won the Nobel Prize in physics in 1982 for his work applying renormalization group analysis to previously unsolved problem in theoretical physics concerning critical points and phase transitions. Affiliated with Cornell University for a number of years, Wilson was also involved with getting government support for supercomputers on campuses. He later was a physics professor at Ohio State University, again doing research in physics and becoming involved in education reform.
Kenneth Geddes Wilson
Wilson was born on June 8, 1936, in Waltham, Massachusetts. He was the first of six children born to Edgar Bright Wilson, Jr., and his wife Emily Fisher (nee Buckingham). Wilson was born into an academic family. His father was a professor of chemistry at Harvard University and an expert on microwave spectroscopy. His maternal grandfather had taught mechanical engineering at the Massachusetts Institute of Technology. Wilson's mother had done some graduate work in physics. All five of his siblings also became either academics or scientists.
Wilson himself was an exceptional student from an early age. His grandfather taught him how to do math in his head, and while waiting for the bus a young Wilson would do cube roots. He was given an education at private schools in his home state, in cities such as Wellesley and Woods Hole, Massachusetts, and the Shady Hill School in Cambridge, Massachusetts. While still a teenager, Wilson also attended Magdalen College School at Oxford University in Oxford, England, for a year.
Entered Harvard University
When Wilson graduated in 1952 from The George School (a Quaker school) in Pennsylvania, he was only 16 years old. He then entered Harvard University, where he studied mathematics and physics. Wilson was not, however, just an academic. He was also a member of the track team, where he won a varsity letter as a mile runner. He graduated from Harvard with his B.A. in physics in 1956.
After graduating from Harvard, Wilson entered graduate school at the California Institute of Technology. There he studied physics, primarily quantum field theory with Murray Gell-Mann as his advisor. Wilson's thesis was entitled An Investigation of the Low Equation and the Chew-Mandelshtam Equations. It concerned renormalization group analysis, an area of work that would eventually win Wilson the Nobel prize.
Renormalization group analysis was a mathematical process that was developed to address certain kinds of problems in the area of quantum electrodynamics, related to the mathematical representation of aspects of this theory when applied elsewhere. In his thesis, Wilson solved a problem dealing with K-mesons or kaons. Wilson used these mathematical methods to create a knowledge of the magnetic properties of atoms.
Wilson earned his Ph.D. from Cal Tech in 1961. In this time period, he was given two postdoctoral fellowships. The first was at Harvard, where he was a Junior Fellow at the Harvard Society of Fellows from 1959 to 1963. From 1962 to 1963, Wilson worked on a Ford Foundation Fellowship at the European Organization for Nuclear Research (CERN) in Geneva, Switzerland. After Wilson completed the fellowship at CERN, he was hired for a tenure track position in the physics department at Cornell University, where he would spend the next 25 years.
In Wilson's early theoretical work at Cornell, he continued to study renormalization groups, but this time, he applied them to critical phenomena and phase changes and transitions such as when liquids change to gases and in alloys. With critical phenomena, materials behave differently under defined environmental conditions. They experience changes that are very different. The conditions under which these changes happen are known as the critical point. Near this point, the complexities of what happens with critical phenomena, in terms of short-range actions and bigger connection between the whole body of the material, including the various ranges and scales of interaction, were nearly unmanageable. Wilson was one of many scientists trying to address the problem by reducing the complexity while keeping the theory being addressed valid.
Wilson successfully solved this problem by applying renormalization group analysis to it. The way Wilson proposed using renormalization group analysis involved computers and using an averaging procedure on the broken-down parts of the system. Wilson applied the analysis to properties of the material near the critical point. He used a lattice-like network of first smaller blocks on a smaller scale, then with each step, larger-scale system fluctuations, before the entire system was addressed. These small blocks made the problems easier to solve and removed infinities from the equation.
During the course of his work, Wilson learned that near critical points, a number of systems could be universally defined by a limited number of parameters. His theory was later expanded and applied elsewhere. Thus Wilson's method became a general theory which allowed observations about individual atoms to predict the properties of a systems of many interacting atoms.
Much of this work was published in two articles in Physical Review in 1971. Many scientists believed that Wilson's work answered some of the biggest unsolved problem in theoretical physics. He later tried to apply his renormalization theory to quarks (that is, what makes up protons, neutrons, and other subatomic particles) in the mid-1970s.
Won Nobel Prize
In 1982, Wilson was award the Nobel Prize in Physics for this work, applying renormalization group analysis to previously unsolved problem in theoretical physics concerning critical points and phase transitions. The prize was not unexpected. Wilson's father told Bayard Webster of New York Times, "Of course I'm very happy for him. People in physics have been telling me for a long time that it was going to happen. It is nice when it really does happen."
In his acceptance speech, published at the Nobel emuseum, Wilson emphasized the importance of supporting science research. He said, "The scientist's inquiry into the causes of things is providing an ever more extensive understanding of nature. In consequence, science is more important than ever for industrial technology. Industry now should become a full partner of government in supporting long-range basic research."
While Wilson was working on his Nobel Prize-winning theory, he continued to have a strong academic career. In 1970, Wilson was given a full professorship at Cornell. Four years later, he was named to an endowed chair, the James A. Weeks Chair. It was the combination of academics and research that influenced his next area of research.
Promoted Building of Supercomputers
After 1976, much of Wilson's theoretical work was concerned with computer simulations and modeling. He promoted the idea of building supercomputer centers for scientists so they would have access to the greatest amount of technology because of the limits of computer technology of the time. His goal was to continue to improve the scientific community as well as the computer industry.
Beginning in 1981, he was part of a group of leading scientists that worked to get federal funding to get supercomputers on college campuses. Wilson did less research and honed his public speaking skills as he lobbied Congress, federal officials, and executives of corporations. Wilson gave about a speech a week to promote this cause. People would listen to him more than other scientists, it seemed, because he had won the Nobel Prize. In his speeches, Wilson claimed that without national supercomputers, the United States would not continue to be the leader in this technology.
In 1985, Wilson got his wish when the National Science Foundation gave $200 million over five years to four universities to create four supercomputer centers on their campuses, including Wilson's home university of Cornell. (The other supercomputer centers were located at Princeton, University of Illinois, and University of California.) Later, the federal government via the National Science Foundation did not provide the funding at the rate promised. In 1985, before the funding failed to be delivered, he served as the director of the Center for Theory and Simulation in Science and Engineering.
Moved to Ohio State University
In 1988, Wilson left Cornell to become a professor at Ohio State University. He did this in part because of his wife, Alison Brown, whom he married in 1982. She was a computer specialist and had been the associate director for advanced computing and networking at Cornell's Theory Center. She was hired to be the associate director of a new entity at Ohio State, the Ohio Supercomputer Center, as well as the associate director of research computing.
As for Wilson, he had reached his goal of getting the Theory Center off the ground and wanted to return to doing his own research. At Ohio State, he was named the Hazel C. Youngberg Trustees Distinguished Professor of Physics. His research continued to be related to computers, focusing on computer simulations and the modeling of physical phenomena.
Wilson also had interests outside of physics. He became especially concerned with education and education curriculum. After 1990, Wilson was involved in national policy for science. He was involved in the National Academy of Science's Committee on Physical Science, Mathematics and Applications as well as Committee on the Federal Role in Educational Research. In 1992, he was named the co-leader in Project Discovery, a five-year project funded by the National Science Foundation. It was to develop new techniques of teaching science and math. By 1993, Wilson was the chair of Ohio Model Science Curriculum Advisory Committee for the Ohio Department of Education.
With co-author Bennett Daviss, Wilson published a book on the subject, Redesigning Education (1994). It outlines Wilson's ideas for reforming America's educational process. After the end of Project Discovery, in 1996, Wilson was named co-director of Learning by Redesign. He continued to be involved in education reform into the 2000s.
McGrath, Kimberly, ed., World of Scientific Discovery, Gale, 1999.
Muir, Hazel, ed., Larousse Dictionary of Scientists, Larousse, 1994.
Narins, Brigham, ed., Notable Scientists: From 1900 to the Present, Volume 5, Gale, 2001.
Wasson, Tyler, ed., Nobel Prize Winners: An H.W. Wilson Biographical Dictionary, H.W. Wilson Company, 1987.
Weber, Robert L., Pioneers of Science: Nobel Prize Winners in Physics, Adam Hilger, 1988.
Houston Chronicle, October 28, 1992.
New York Times, October 19, 1982; March 16, 1985.
Plain Dealer, February 21, 1993.
Science, April 1, 1988.
"Kenneth G. Wilson-Banquet Speech," http://www.nobel.se/physics/laureates/1982/wilson-speech.html (March 24, 2003).
"Kenneth Wilson Curriculum Vitae," http://www.physics.ohio-state.edu/~kgw/kgwcv.html (March 24, 2003).
"Profile of Kenneth Wilson," http://www.physics.ohio-state.edu/~kgw/kgw.html (March 24, 2003).
"Redesign Education Home page," http://www.physics.ohio-state.edu/~kgw/RE.html (March 24, 2003).
"Redesigning Education-Kirkus Reviews," http://www.physics.ohio-state.edu/~kgw/kirkus.html (March 24, 2003). | <urn:uuid:b4bcf115-ff31-4205-a71b-fbd66d2a54e6> | {
"dump": "CC-MAIN-2020-50",
"url": "https://biography.yourdictionary.com/kenneth-geddes-wilson",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141182794.28/warc/CC-MAIN-20201125125427-20201125155427-00275.warc.gz",
"language": "en",
"language_score": 0.9743696451187134,
"token_count": 2315,
"score": 2.65625,
"int_score": 3
} |
A few days back, American Rivers released their annual list of the ten most endangered rivers in the U.S., sending out a call for action to help protect these waterways from a number of threats, including pollution, mining, and over damming. For more than 26 years, American Rivers has worked hard to raise awareness of these issues, while also striving to restore rivers across the country for the benefit of the communities that live on them, as well as the wildlife and environments that surround them.
This year's list of ten most endangered rivers is as follows:
1. Susquehanna River
2. Bristol Bay Rivers
3. Roanoke River
4. Chicago River
5. Yuba River
6. Green River
7. Hoback River
8. Black Warrior River
9. St. Croix River
10. Ozarks National Scenic Riverways
Special Mention - Mississippi River
Clicking on the individual links will take you to the special report on each specific river as organized by American Rivers. Those are some pretty serious waterways to be endangered, and chances are, one or more, of them have an effect on where you live.
Obviously, climate change is having a direct effect on the world's water supply, and maintaining healthy water is becoming an even more important issue for the years ahead. The hope is that by naming these rivers as "endangered," we can do some things now to protect them for the future. | <urn:uuid:29049090-5d9a-4265-9343-a55c0ad2fa7a> | {
"dump": "CC-MAIN-2018-13",
"url": "http://cycling-4-life.blogspot.com/2011/05/america-most-endangered-rivers.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257650188.31/warc/CC-MAIN-20180324093251-20180324113251-00488.warc.gz",
"language": "en",
"language_score": 0.9563651084899902,
"token_count": 298,
"score": 3.203125,
"int_score": 3
} |
If you or someone you know is experiencing suicidal thoughts or behaviors please call 1-800-273-TALK(8255) or go to your nearest emergency room.
We know that an early diagnosis of bipolar disorder is often uncertain. Bipolar disorder causes extreme shifts in mood, energy and daily life functions. There can be other psychiatric disorders such as anxiety, panic disorder and substance abuse to complicate diagnosis and treatment. This can be very frightening for the person with bipolar disorder and those who love them.
But the greatest risk of bipolar is no treatment! The National Alliance on Mental Illness (NAMI) reports that only half of all people with bipolar disorder receive treatment. This raises the risk factors, particularly for suicide. With diagnosis there is treatment with durable management and recovery from symptoms and a very real possibility of a full and productive life. Treatment typically includes a combination of medication, therapy, stress management, skills training, attention to lifestyle and a support network.
We urge you to seek diagnosis and treatment for yourself or your friends or family members if needed. There is a great document available on the NAMI website: Understanding Bipolar Disorder and Recovery.
There are many resources available. We encourage you to become familiar with these and learn more about bipolar disorder. We want anyone with bipolar disorder to be the strongest voice in their own treatment plan!
Research and Information
www.nami.org: National Alliance on Mental Illness, a great place to start when looking for information, help, and support.
www.samhsa.gov Substance Abuse & Mental Health Services Administration, a federal website identifying a wide variety of national programs and campaigns dealing with mental health
www.nmha.org National Mental Health America is a 100 year old organization focusing on advocacy, education and service.
www.nimh.nih.gov: National Institute of Mental Health, a wonderful source for current research and studies surrounding mental disorders. This site aims to “transform the understanding and treatment of mental illness through research”.
www.narsad.org The National Alliance for Research on Schizophrenia and Depression is the worlds leading charity dedicated to the research of mental health. The site provides information about psychiatric illnesses, support groups, local mental health organizations, and provides educational materials on request.
www.dbsalliance.org Depression and Bipolar Support Alliance provides almost everything you need to know about depression and bipolar.
www.imhro.org International Mental Health Research Organization is committed to funding research and raising awareness to help people with brain disease, and, ultimately, find cures for schizophrenia, depression and bipolar disorder.
www.healthyplace.com: Information on psychological disorders and psychiatric medications from both a consumer and expert point of view. They have an “active mental health social network for support, online psychological tests, breaking mental health news, mental health videos, documentary films, a live mental health tv show, unique tools like their “mediminder” and more.”
www.ncmhjj.com: (National Center for Mental Health and Juvenile Justice) A centralized national focal point that pulls together and links the various activities and research for youth with mental health disorders in contact with the juvenile justice system.
www.dbsalliance.org: (Depression and Bipolar Support Alliance) Almost everything you need to know about depression and bipolar.
www.nationaleatingdisorders.org: (National Eating Disorder Association) Non-profit organization working to support those experiencing and recovering from eating disorders, and support for their families.
www.suicidepreventionlifeline.org: (National Suicide Prevention Lifeline) Suicide Hotline 1-800-273-TALK(8255)
www.save.org: (Suicide Awareness Voices of Education) Great site promoting awareness, education, and help for those struggling with or affected by suicide.
www.afsp.org: (American Foundation for Suicide Prevention).
Youth and Young Adult Resources
us.reachout.com Reach Out is an information and support service using evidence based principles and technology to help teens and young adults struggling with mental health issues. Audio and video stories share personal experiences with mental health issues from teens and young adults and how they got through those issues.
www.halfofus.com Half Of Us is a joint campaign launched by MTVU and the Jed Foundation to raise awareness about the prevalence of mental health issues on campus and connect students to the appropriate resources to get help.
www.transitionyear.org/ Transition Year is an online resource center to help parents and students focus on emotional health before, during and after the college transition.
www.activeminds.org Active Minds is an organization working to utilize the student voice to change the conversation about mental health on college campuses. By developing and supporting chapters of a student-run mental health awareness, education, and advocacy group on campuses, the organization works to increase students’ awareness of mental health issues, provide information and resources regarding mental health and mental illness, encourage students to seek help as soon as it is needed, and serve as liaison between students and the mental health community.
www.thetrevorproject.org The Trevor Project is the leading national organization focused on crisis and suicide prevention efforts among lesbian, gay, bisexual, transgender and questioning (LGBTQ) youth.< br/>
www.whatadifference.samhsa.gov A chat site for young adults living with mental health problems and to friends of those living with mental health problems. The forums provide a means to share experiences, ask questions and find answers.
Services- (web-communities, groups and meet-ups, organizations)
www.thebalancedmind.org (Child and Adolescent Bipolar Foundation) Covers information about the illness, including education and legal issues. The site provides message boards, chat rooms, and support groups for parents and young adults.
www.karlasmithfoundation.org KSF believes there is hope for a balanced life. Even if there is an untreated person with mental illness in the family, even in the aftermath of suicide, there is hope. KSF helps discover and nurture that hope.
www.ffcmh.org The National Federation of Families for Children’s Mental Health is a national family-run organization linking more than 120 chapters and state organizations focused on the issues of children and youth with emotional, behavioral, or mental health needs and their families.
www.wellsphere.com One of Linea’s most frequented sites. Has a community where you can get information, ask questions, or simply build a profile and interact with other consumers with similar health goals. Visit Linea’s profile here (http://www.wellsphere.com/linea-profile/119590 ).
www.facingus.org A fun and extremely site, in which you can track your moods, journal, get tips on how to find a happy and healthy life, and build a wellness plan to help you accomplish that goal.
www.dailystrength.org This site has online support groups for everything from mental health to personal challenges.
www.aa.org The online site for Alcoholics Anonymous for anyone dealing with self-medication induced alcoholism.
www.draonline.org (Dual Recovery Anonymous) Recovery and support group for those with both a mental or emotional disorders and a drug addiction.
www.projecttransition.com Apartment-based communities that support adults suffering from psychiatric problems that have been recurrent. It has many resources on helpful organizations, treatment programs, and educational articles.
tip.fmhi.usf.edu (Transition to Independent Process) Organization devoted to helping youth with mental and/or behavioral problems transition to adulthood smoothly and safely.
www.bringchange2mind.org A mental health awareness campaign started by Glenn Close and her sister Jessie who are working to fight stigma and change the vocabulary surrounding mental illness.
capwiz.com/nami/home/ NAMI Advocacy Action Center
www.nami.org/template.cfm?section=fight_stigma NAMI “Fight Stigma” page
takeaction.mentalhealthamerica.net/site/PageServer?pagename=action_alerts Mental Health America Action Alerts
www.cartercenter.org/health/mental_health/index.html Under the leadership of former First Lady Rosalynn Carter, the nation’s foremost champion for the rights of people with mental illnesses, the Carter Center’s Mental Health Program works to promote awareness about mental health issues, reduce stigma and discrimination against those with mental illnesses, and achieve greater parity for mental health in the U.S. health care system.
www.who.int/mental_health/en/ World Health Organization Mental Health page
www.mindsontheedge.org Minds on the Edge: Facing Mental Illness provides a link to an excellent video seminar that discusses recovery and solutions to the mistreatment, misrepresentation, and misunderstanding of those suffering with a mental health condition. It also provides a place to share your story and information on how to get involved with the Minds on the Edge movement.
www.theicarusproject.net The Icarus Project is one of Linea’s personal favorites. A wonderful community in which people can share stories, questions, and art relating to their life and “illness.” This has great resources for those of you who are focused on alternative forms of medication.
www.everyminute.org Every Minute is an organization focused on “accelerating mental health research” by educating people about suicide and mental health. This is a wonderful site for advocacy and has all the latest updates on any news relating to these issues.
www.mindfreedom.org MindFreedom International “is an independent nonprofit coalition defending human rights and promoting humane alternatives for mental and emotional well being.” Their vision is to, “Unite in a spirit of mutual cooperation for a nonviolent revolution of mental health human rights and choice.”
An Unquiet Mind: A Memoir of Moods and Madness by Kay Redfield Jamison (Paperback – Jan 14, 1997). This is a classic and written by a psychiatrist with bipolar disorder. This is the first book Cinda read about bipolar disorder.
Crazy: A Father’s Search through America’s Mental Health Madness, Pete Earley. Veteran Journalist Pete Earley explores the interconnection between mental illness in America and the criminal justice system. Not only educational for anyone wanting to know more about the system but extremely personal and loving as he tells the story of his own son’s struggles.
Within our Reach, Rosalynn Carter with Susan K. Golant and Kathryn E. Cade. Former First Lady Carter and her colleagues provide an assessment of the state of mental health. This is a favorite of both Linea’s and Cinda’s in providing a well-written overview and gives insight to issues facing us all and ultimately hope for a better future.
Madness: A Bipolar Life, Marya Hornbacher. A passionate and intense memoir of one woman’s journey with bipolar disorder. Marya’s honest words and powerful voice really allow people to see a glimpse into the life of a woman who experienced rapid cycling bipolar from a very young age.
Detour: My Bipolar Roadtrip, Lizzie Simon. One young woman’s journey to better understand herself and her new diagnosis of bipolar disorder. The story brings in other voices and lives as Lizzie attempts to grasp this intangible illness.
The Van Gogh Blues: The Creative Person’s Path through Depression, Eric Maisel (Paperback – Dec 28, 2007). Since we are all artists in our family this is one that Cinda likes very much.
Mind Race: A Firsthand Account of One Teenager’s Experience with Bipolar Disorder (Adolescent Mental Health Initiative), Patrick E. Jamieson and Moira A. Rynn (Paperback – Aug 15, 2006). This is a wonderful book for teenagers, young adults, parents and educational professionals. Linea said that the first ten pages describe her feelings so accurately.
The Bipolar Teen: What You Can Do to Help Your Child and Your Family, David J. Miklowitz and Elizabeth L. George (Paperback – Nov 15, 2007). Teens may not find this too interesting but it is a good resource for parents and teachers.
How I Stayed Alive When My Brain Was Trying to Kill Me: One Person’s Guide to Suicide Prevention, Susan Rose Blauner (Paperback- June 30, 2003). A great book for anyone who has experienced or is experiencing suicidal thoughts. Provides great skills and resources to help one cope with the agony and horror of suicide.
Nothing Was the Same, Kay Redfield Jamison. A beautifully written book that helps understand the difference between grief and depression and also is a true love story.
Unlisted, Delaney Ruston, www.unlistedfilm.com A film following filmmaker Delaney Ruston as she reconnects with her father after years of separation through her choice to be “unlisted” in the phone book. Very inspiring and shows the importance of family in times of mental instability.
Minds on the Edge, Fred Friendly Seminars, www.mindsontheedge.org. A roundtable discussion of the many intricacies of living with a mental illness. With topics ranging from access, to family, to the criminal justice world this seminar will give anyone a beginning understanding of the scope of the mental health world and its many topics. | <urn:uuid:589a1d49-1937-4115-9a23-3c28e0c73bba> | {
"dump": "CC-MAIN-2017-34",
"url": "http://lineacinda.com/resources/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886106754.4/warc/CC-MAIN-20170820131332-20170820151332-00429.warc.gz",
"language": "en",
"language_score": 0.9046481847763062,
"token_count": 2836,
"score": 2.71875,
"int_score": 3
} |
WHAT IS A COOKIE AND WHAT IS IT FOR?
A “Cookie” is a small file that is stored on the user’s computer, tablet, smartphone or any other device with navigation information.
The set of “cookies” of all users of a website allows us to optimize its quality, controlling which pages are useful, which are not and which can be improved.
Cookies are essential for the functioning of the Internet, providing countless advantages in the provision of interactive services, facilitating the navigation and usability of a website. Under no circumstances could cookies harm your computer. On the other hand, the fact that they are active helps to identify and resolve errors.
WHAT TYPES OF COOKIES ARE THERE?
ACCORDING TO THE ENTITY THAT MANAGES IT
- Own cookies: These are those that are sent to your computer from the service provider’s own computers or domains.
- Third-party cookies: These are those that are sent to your computer from a computer or domain that is not managed by the service provider, but by another collaborating entity. Like, for example, those used by social networks, or Google Analytics.
ACCORDING TO THE PERIOD OF TIME THEY REMAIN ACTIVATED
- Session cookies: These are temporary cookies that remain in your browser’s cookie file until you leave the website, so none are recorded on your computer’s hard drive. The information obtained through these cookies is used to analyze traffic patterns on the web. In the long run, this allows you to provide a better experience to improve the content and ease of use.
- Persistent cookies: They are stored on your hard drive and are read by the website each time you visit again. A permanent cookie has a specific expiration date. The cookie will stop working after that date.
ACCORDING TO ITS PURPOSE
- Technical cookies: These are those necessary for the navigation and proper functioning of a website. They allow, for example, controlling traffic and data communication, using security elements, storing content to be able to broadcast videos or share content through social networks.
- Personalization cookies: These are those that allow you to access the service with predefined characteristics based on a series of criteria, such as the language, the type of browser through which the service is accessed, the regional configuration from which it is accessed. to the service, etc.
- Analysis cookies: These are those that allow the number of users to be quantified and thus carry out statistical measurement and analysis of the use made by users of the services provided. To do this, your navigation on a website is analyzed in order to improve the range of products and services offered.
- Advertising cookies: These are those that allow the management, in the most efficient way possible, of the advertising spaces that could be included on a website.
- Behavioral advertising cookies: These cookies store user behavioral information obtained through continued observation. Thanks to them, your browsing habits on the Internet can be known and you can be shown advertising related to your browsing profile.
COOKIES USED IN PANACE-VET.ES
Below we detail the cookies used on our website, listed alphabetically:
HOW CAN YOU CONFIGURE OR DISABLE YOUR COOKIES?
You can allow, block or delete cookies installed on your computer by configuring your Internet browser options. If you do not allow the installation of cookies in your browser, you may not be able to access some of the services and your experience on our website may be less satisfactory. In the following links you have all the information at your disposal to configure or disable your cookies in each browser: | <urn:uuid:48565237-e4bc-4116-a26e-ef6258a4a722> | {
"dump": "CC-MAIN-2024-10",
"url": "https://panacea-vet.com/en/cookies-policy/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475757.50/warc/CC-MAIN-20240302052634-20240302082634-00522.warc.gz",
"language": "en",
"language_score": 0.9262084364891052,
"token_count": 750,
"score": 3.234375,
"int_score": 3
} |
Please boost your Plan to download papers
Choosing Between Wants and Needs
Pages 8 (2008 words)
Running Head: Marketing Choosing between Wants and Needs An Analysis of Buying Decision and Consumer Behavior Name Course Title Name of Professor Date of Submission Introduction Consumer decision making is influenced by diverse social factors. It is also rooted in a person’s character and value system…
Decisions stemming from standards of living are learned as an outcome of numerous factors like the family, social class, subculture, and culture (Chaudhuri, 2006). Ideas, concerns, and endeavors show how consumers face the difficulty of reaching an appropriate purchasing decision. This paper discusses the effect of self-perception and motives on the conflict between ‘wants’ and ‘needs’. The discussion seeks to identify the most effective marketing strategy in terms of consumers’ buying decision and behavior. Self-perception Views or perceptions serve as a primary component in the assumed risk of buying a product. Assumed risk embodies the uncertainties of the consumer, or the conflict between consumer wants and needs. Several distinct techniques may be employed to lessen risk (Michman, Mazze, & Greco, 2003). Primarily, assumed risk can be lessened by a search for product reviews prior to the purchase. Moreover, the consumer can transfer from one form of assumed risk to another form that is of less effect on the understanding of purposes if this technique is unsuccessful. Also, the buying transaction can be delayed, hence postponing a risk scenario. Lastly, the risk can be fully taken in by making the purchase. The way consumers make use of risk-mitigation or decision making techniques relies somewhat on lifestyle and character factors (Michman et al., 2003). ...
Not exactly what you need? | <urn:uuid:bdff07f2-ecab-4ffb-94f4-9d5ec0d010d4> | {
"dump": "CC-MAIN-2017-04",
"url": "https://studentshare.net/marketing/43753-consumer-behavior",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282631.80/warc/CC-MAIN-20170116095122-00415-ip-10-171-10-70.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9116560220718384,
"token_count": 363,
"score": 2.828125,
"int_score": 3
} |
The term homeopathy comes from the Greek words homeo, meaning similar, and pathos, meaning suffering or disease. Homeopathy takes a different approach from conventional medicine in diagnosing, classifying, and treating medical problems. Homeopathy seeks to stimulate the body’s defense mechanisms and processes so as to prevent or treat illness. Treatment involves giving very small doses of substances called remedies that would produce the same or similar symptoms of illness in healthy people if they were given in larger doses. Treatment in homeopathy is tailored to each individual person. Homeopathic practitioners select remedies according to a total picture of the patient, including not only symptoms but lifestyle, emotional and mental states, and other factors.
In the late 1700s, Samuel Hahnemann, a physician, chemist, and linguist in Germany, proposed a new approach to treating illness. This was at a time when the most common medical treatments were harsh, such as bloodletting, purging, blistering, and the use of sulfur and mercury. At the time, there were few effective medications for treating patients, and knowledge about their effects was limited. Hahnemann was interested in developing a less-threatening approach to medicine. The first major step reportedly was when he was translating an herbal text and read about a treatment (cinchona bark) used to cure malaria. He took some cinchona bark and observed that, as a healthy person, he developed symptoms that were very similar to malaria symptoms. This led Hahnemann to consider that a substance may create symptoms that it can also relieve. This concept is called the “similia principle” or “like cures like.”
In the fourth century B.C., Hippocrates, the father of modern medicine, observed that large amount of certain natural substances can produce symptoms in healthy people resembling those caused by the disease, while smaller doses of these same substances can relieve those symptoms. Another way to view “like cures like” is that symptoms are part of the body’s attempt to heal itself–for example, a fever can develop as a result of an immune response to an infection, and a cough may help to eliminate mucus — and medication may be given to support this self-healing response. Hahnemann tested single, pure substances on himself and, in more dilute forms, on healthy volunteers. He kept meticulous records of his experiments and participants’ responses, and he combined these observations with information from clinical practice, the known uses of herbs and other medicinal substances, and toxicology, eventually treating the sick and developing homeopathic clinical practice.
There are over 2000 homeopathic remedies, which are made from naturally occurring plant, animal, or mineral substances and such exotic sources as bee stings, snake venoms, arsenic, gold and silica, and even compounds from diseased tissue. Persons using homeopathy do so to address a range of health concerns, from wellness and prevention to treatment of injuries, diseases, and conditions. Studies have found that many people who seek homeopathic care seek it for help with a chronic medical condition.
The World Health Organization noted in 1994 that homeopathy had been integrated into the national health care systems of numerous countries, including Germany, the United Kingdom, India, Pakistan, Sri Lanka, and Mexico.
Copyright 2007 Raquel Lazar-Paley | <urn:uuid:5f6ee4ce-cddd-42cd-b0af-4c9d8d8a4116> | {
"dump": "CC-MAIN-2017-17",
"url": "http://consciouswoman.org/category/wellness/homeopathy/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121216.64/warc/CC-MAIN-20170423031201-00286-ip-10-145-167-34.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9617417454719543,
"token_count": 681,
"score": 3.546875,
"int_score": 4
} |
This episode focuses on adult psychiatric outcomes of students who were bullies or victims during their school years.
We are featuring a journal article this week titled Adult psychiatric outcomes of bullying and being bullied by peers in childhood and adolescence. The authors wanted to see if bullying or being bullied in school translated to having psychiatric problems as young adults. They used data from close to 1300 children who were followed into young adulthood from the Great Smoky Mountain Study.
The authors found that children who were victims of bullying and those who were both a bully and a victim or bully-victims were more at-risk for developing psychiatric disorders as young adults than those who were bullies or were not involved in bullying. More specifically, bully-victims had the worse outcomes in young adulthood as they had the highest level of risk for a variety of anxiety and depressive disorders compared to their peers. They also had the highest levels of suicidality.
Childhood victims of bullying were found in adulthood to have higher levels of depressive disorders, anxiety disorders, generalized anxiety, panic disorder, and agoraphobia though lower levels than those found in bully-victims. Bullies were at increased risk for antisocial personality disorder in young adulthood.
The authors went one step further in their analysis in the hopes of finding out whether childhood psychiatric disorders and family hardships could be the underlying issue for the development of psychiatric disorders in young adulthood rather than being bully-victims or victims of bullying. After removing the influence of childhood psychiatric disorders and family hardship, the authors found that bullying could still account for most of the risk in young adulthood for bully-victims while the bullying still accounted for the risk of anxiety disorders in victims but not depressive disorders.
The takeaway is that bullying victimization continues to have a negative impact on a child all the way into young adulthood. Schools efforts to minimize bullying and create an inviting school environment remains of utmost importance. Schools should also create a method of tracking those children who have been victimized so supports can remain in place throughout their schooling in order to minimize the long-term impact.
That concludes this webcast of the School Mental Health Minute. Come back next week and thanks for watching.
Copeland, W.E., Wolke, D., Angold, A., & Costello, E.J. (2013). Adult psychiatric outcomes of bullying and being bullied by peers in childhood and adolescence. JAMA Psychiatry, E1-E8. | <urn:uuid:993a8a7f-1069-4609-aaf6-f9fb94c0ec6e> | {
"dump": "CC-MAIN-2022-49",
"url": "https://mindpsi.net/adult-outcomes-bullied-school/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710924.83/warc/CC-MAIN-20221203043643-20221203073643-00726.warc.gz",
"language": "en",
"language_score": 0.9762466549873352,
"token_count": 495,
"score": 2.921875,
"int_score": 3
} |
The average life expectancy for a person living in the United States is shorter than the life expectancy for a person living in other developed nations, according to a recent study conducted by the Centers for Disease Control and Prevention (CDC). CDC researchers found that rises in gun violence, illegal drug use and car accidents in the U.S. are largely responsible for the longevity gap.
The CDC study, which was published in the Journal of the American Medical Association (JAMA), examined data and found that the leading causes of untimely deaths in this country include motor vehicle crashes, violence, and drug overdoses. Meanwhile, several other developed nations have significantly lower death rates. The other countries that CDC researchers looked at include the United Kingdom, Italy, Japan, Spain, Portugal, Sweden, Denmark, Norway, Finland, the Netherlands, Germany and Austria.
Gender as a Determining Factor in Injury-Related Deaths
In 2012, the average life expectancy for men in the U.S. was 76.4 years. Meanwhile, women had a life expectancy of 81.2 years. A major reason for this large disparity is likely the willingness of males to take unnecessary risks when it comes to their health. According to CDC researchers, injury-related deaths were largely responsible for the untimely deaths of males in the U.S.
Perhaps not unexpectedly, both men and women in other developed nations tend to live, on average, two years longer than men in the U.S. As far as the average life expectancy of men in the U.S. and these other countries, CDC researchers attributed almost half of the difference to injury-related deaths. One of the most startling examples of this comes from gun deaths. While the U.S. had a rate of 18.4 gun-related deaths per 100,000 men, the other countries examined in the study saw just one gun death per 100,000 men. At the same time, the prevalence of fatal car accidents in the U.S. was also a major factor.
For additional information about data on United States fatality rates, access the Yahoo.com article, “Gun, Drug, Car Deaths Loom Large in US Longevity Gap: Study.”
At Andres & Berger, we are passionate about helping our clients get the compensation they need, want and deserve after a car, truck or motorcycle accident. We’re on your side and we will fight for you and your family. Contact our Cherry Hill, NJ office today for a free consultation about your case. | <urn:uuid:99c38e59-3909-44b6-8b38-554ec81e7610> | {
"dump": "CC-MAIN-2020-50",
"url": "https://www.andresberger.com/blog/auto-accidents-gun-violence-lead-u-s-life-expectancy-gap/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141191692.20/warc/CC-MAIN-20201127103102-20201127133102-00072.warc.gz",
"language": "en",
"language_score": 0.9579112529754639,
"token_count": 514,
"score": 2.6875,
"int_score": 3
} |
The World Health Organization has issued a list of the top dozen bacteria most dangerous to humans, warning that doctors are fast running out of treatment options.
In a press briefing, the U.N. health agency said its list is meant to promote the development of medicines for the most worrying drug-resistant bacteria, including salmonella and Staphylococcus aureus.
WHO’s Marie-Paule Kieny said that if such priorities were left to market forces alone, “the new antibiotics we most urgently need are not going to be developed in time.” She estimated that it would take up to a decade for new medications.
WHO said the most-needed drugs are for germs that threaten hospitals, nursing homes and among patients who need ventilators or catheters. The agency said the dozen listed resistant bacteria are increasingly untreatable and can cause fatal infections; most typically strike people with weakened immune systems.
At the top of WHO’s list is Acinetobacter baumannii, a group of bacteria that cause a range of diseases from pneumonia to blood or wound infections.
WHO’s list was developed in collaboration with the University of Tubingen in Germany and according to criteria assessed by international experts.
Among the experts’ and WHO’s most pressing concerns were how deadly the infections were, whether treatment required a long hospital stay, and how many current medicines exist.
In recent years, health officials have detected a few patients resistant to colistin, the antibiotic of last resort. So far, doctors have been able to treat them with other drugs.
But experts worry that the colistin-resistant bacteria will spread their properties to other bacteria already resistant to more commonly used antibiotics, creating germs that can’t be killed by any known drugs.
According to the U.S. Centers for Disease Control and Prevention, at least 23,000 people die each year in the U.S. from infections caused by resistant bacteria. | <urn:uuid:e8827cc2-6f87-4a70-8359-d90b818fd630> | {
"dump": "CC-MAIN-2022-05",
"url": "https://www.medicaldesignandoutsourcing.com/the-dirty-dozen-un-issues-list-of-12-most-worrying-bacteria/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320303956.14/warc/CC-MAIN-20220123015212-20220123045212-00563.warc.gz",
"language": "en",
"language_score": 0.9474899172782898,
"token_count": 412,
"score": 3.5625,
"int_score": 4
} |
Quogue is home to one of the East Ends hidden gems. Located down a side street sits a Wildlife Refuge which is host to numerous educational activities as well as an extensive trail system that takes you through some of Long Islands most pristine forests and ecology.
The idea of Quogue Wildlife Preserve came to fruition after several exceptionally cold winters in the early 1930’s, when there was a decline in the Black Duck population in the area, which had alarmed many local duck hunters. During a meeting at the Hampton Bays Firehouse, Charlie Belt explained the severity of the waterfowl plight, and had made a suggestion of establishing a refuge for waterfowl. The refuge would be a place for the waterfowl to propagate this way they would be able “… to put two ducks in the air for everyone we take”.
From this meeting , the Southampton Township Wildfowl Association, STWA for short, was formed. The Association was comprised of 45 charter member, which consisted of duck hunters and conservationists from the town. Currently the charter hangs over the fireplace in the Charles Banks Belt Nature Center at the refuge and contains all of their signatures.
The Associated had required land in order to build this refuge. They sought to obtain the land that was used by a Ice Company
that was called ‘The Quogue Ice Company’, but had only obtained the eastern 104 acres by a donation from Richard and George Posts, whom were sons of a charter member, Abram Post. The donated land was then given to the Incorporated Village of Quogue who had appointed the STWA Trustees as the official stewards of the donated land.
In 1938, the STWA had rallied their friends to help purchase the remaining 107 acres from the Quogue Ice Company for $1,400 from another charter member, Erastus Post. The final piece of land that was added to the refuge, was in the 1980’s, when the Town of Sothampton had added another 100 acres.
Feeding the waterfowl was a top priority for the refuge and required two men for at least two hours a day. The men who fed the wildlife had volunteered their time to cut ice from the pond and feed the flocks of birds. One year alone the refuge had used over thirty tons of grain and potato mix!
In 1936, the STWA was awarded First Prize in a National Waterfowl Contest, which was sponsored by Ducks Unlimited, Inc. The prize was awarded for the amount of work that was accomplished by the volunteers efforts. A silver cup was engraved and still sits on a mantle in the refuge.
Looking back at old maps, you would notice that the refuge was referred to as the Quogue Waterfowl Sanctuary, but due to the extent of preservation and wildlife aid the refuge was renamed as the Quogue Wildlife Refuge. Over time the refuge has evolved and currently conducts educational programs through the year and cares for permanently injured animals in it’s outdoor wildlife complex.
305 acre’s of the refuge remain dedicated to preserving a safe place for plants and animals.
Today the Refuge not only includes the wildlife preserve for plants and animals, but also is home to a diverse selection of wildlife that were permanently injured and require human care for survival, these animals are housed in an outdoor ‘Distressed Wildlife Complex’. The complex is located at the preserve’s entrance where anyone can visit during the day..
A Nature center, named “Charles Banks Belt Nature Center” sits partially over the old Ice Pond, and offers spectacular views through large window. The Nature Center building houses a Variety of exhibits, turtles, snakes, a touch table, a children’s room, and a sitting area with comfortable chairs to take in the breathtaking views.
The center is also available for meetings and events, and is the gathering spot for the preserves educational programs that are offered for adults, children and families.
Some events hosted at the Preserve include an Easter Egg Hunt, Summer Ecology Program, Halloween trails, and more.
The Quogue Wildlife Preserve is not only home to it’s nature center and injured animal complex, but is also home to an extensive trail system that allows it’s visitors to explore a variety of habitats that include, the Pine Barrens itself, bogs, wetlands, a field, and a tidal estuary. The Preserve’s primary trail is wheelchair and stroller friendly.
The Trail system at the preserve is open all year round, no matter what season it is and can even be used for cross-country ski and snowshoe. | <urn:uuid:965ff5c2-ab83-45e8-ac14-f3d90cb9eda0> | {
"dump": "CC-MAIN-2019-47",
"url": "https://liparks.net/parks/quogue-wildlife-refuge/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496668782.15/warc/CC-MAIN-20191117014405-20191117042405-00543.warc.gz",
"language": "en",
"language_score": 0.9779943227767944,
"token_count": 943,
"score": 2.609375,
"int_score": 3
} |
This study explains why the traditional approach to road safety is inferior to a more modern risk assessment system. Historically, risk on roads were determined by previous crashes. If a crash occurred at a location, that location was assessed to have risk. A superior system, however, is assessing roads for risk based on their design and use before a crash actually occurs. Australia adopted this approach under their Safe System. | <urn:uuid:ec4f0c5a-ef85-4d3a-a5e8-5200f2fc84fb> | {
"dump": "CC-MAIN-2019-18",
"url": "http://www.erm-portal.com/resource/why-do-we-need-to-take-a-risk-assessment-based-approach-in-road-safety/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578531462.21/warc/CC-MAIN-20190421120136-20190421142136-00505.warc.gz",
"language": "en",
"language_score": 0.981988787651062,
"token_count": 79,
"score": 3.09375,
"int_score": 3
} |
Today we are looking at air pressure. Air pressure is the force exerted by air on any surface in contact with it.
We are going to demonstrate air pressure by using it to force an egg into a bottle.
What you need:
A boiled egg
A glass bottle or jar with a neck a little smaller than an egg
What to do:
- Place the cooled boiled egg on top of the glass bottle, making sure there is no way the egg fits through.
- Ask an adult to light two matches and drop them inside the glass jar, quickly place the egg back on top.
- Watch as the egg drops inside the jar.
Ignore the carrot in our jar, we didn’t have any matches so had to fashion a carrot and some cocktail sticks!
The Science Bit
The matches heat up the air inside the glass jar. The air then expands and some escapes out of the jar. Once the matches go out, the air starts to cool, making the pressure drop. The air outside the jar now has a higher pressure than the inside, and forces its way inside the jar, forcing the egg downwards as it does so.
Our jar was quite small, so it would be interesting to see what would happen if a larger one was used. If you try please let us know!
Pop back over next week to see how to make a barometer to measure air pressure. | <urn:uuid:e36e74da-b068-45b0-bfb8-796f3d1d2176> | {
"dump": "CC-MAIN-2014-23",
"url": "http://www.science-sparks.com/2011/09/19/investigating-air-pressure-more-eggs/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510273513.48/warc/CC-MAIN-20140728011753-00020-ip-10-146-231-18.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9458686113357544,
"token_count": 288,
"score": 3.453125,
"int_score": 3
} |
Have you ever wondered where the delightful expressions “hit the hay” and “hit the sack” came from?
While their origins are really just a bit of mattress and bedding trivia, it’s quite interesting to discover that these sayings go right back to beginnings of the bed as we know it today.
History of the Bed
In the days of the Anglo-Saxons in what is now Great Britain, people would make their beds just before they wanted to sleep. There wasn’t a frame or base, and the bed was simply a sack stuffed with straw or hay. In those days the houses had a central “great hall” which was where everyone – the family, servants and livestock – lived, ate and slept. So when it was time to go to bed, everyone would quite literally “hit the hay” or “hit the sack”!
By the mid-11th century, beds had become a lot more comfortable, and those used by the gentry were rather grand, often with canopies hanging from the ceiling to keep in the warmth.
Grand designs continued to be made by craftsmen for several centuries, probably the best known internationally being the Great Bed of Ware, now housed in the Victoria and Albert Museum in London. It is an enormous creation, measuring some 11 feet or 3.25 meters square.
By the 17th century, beds in Europe had become lighter and more elegant in design. The cords or rope used to make mattresses were stretched using a tool known as a bed twitch. The base was still often stuffed with straw, but the top layer was commonly stuffed with soft feathers, just as duvets and some quilts are today. The feathered-filled part of the mattress could be opened and aired, and feathers added when it was necessary to add more bulk.
Early pioneers in North America slept on jack beds that were made with slats of wood supported by cabin walls on two sides and one wooden leg at the corner where there was no other form of support. The earliest mattresses were, not surprisingly, also sacks of straw.
Gorgeous canopied “tent beds” made an appearance in America during the 18th century, while beautifully designed wooden beds became popular in Europe. Mahogany was a favorite with famous furniture designers and manufacturers like Chippendale and the Adam brothers appealing to the upper classes.
It is said that bed bugs and fleas lead to the return of metal (which is believed to have been used in Roman and Byzantine times) being used as a material for beds in the 19th century. Plain designs were common in servants’ rooms as well as in prisons and hospitals for maintenance and hygienic reasons. But decorative iron and brass beds soon became sought after items of furniture, and today are copied by some bed manufacturers.
As far as the mattress is concerned, hair and woven cane were used during the 18th century, and by the early 19th century coil springs had taken the place of metal laths. At first vertical coil springs were used, until someone came up with the idea of packing each spring into a separate fabric cylinder.
Today, of course, there is lots of choice, both in terms of bed design and mattress design. These range from mattresses bases made with plain wooden slats topped with a solid foam mattress, to manufactured bases topped with gloriously spring mattresses.
Unusual Bed and Mattress Designs
Other less usual types of mattresses use air and water instead of straw and other fillings.
The water bed that became so popular during the 1970s, in fact dates back to the 19th century when it was used in hospitals to support patients with bed sores, bone fractures and even those who were paralyzed. The reason for this is that the water totally eliminates pressure points.
“Modern” 20th century water beds were generally made from heavy-duty vinyl, with sealed seams and a safety liner. Some incorporated an electric pad that warmed the water, and therefore the bed.
Air beds go even further back in time to the 2nd century when Roman emperor Helioabalus had one made for himself. Centuries later (in the 1470s) the French King Louis XI copied the Roman emperor’s bed design, calling it his lit de vent.
Air beds haven’t enjoyed any lasting popularity, largely because they aren’t particularly comfortable. But inflatable mattresses are a great idea for additional guests who cannot be accommodated elsewhere. When not in use they can simply be folded and packed away in a cupboard. When needed all you do is use a hand or foot pump to fill them with air.
Another unusual type of bed is one that hangs. While certainly never the norm, they have a novelty value, and can even be designed so that the bed is hoisted to the ceiling when not in use, making it an option in smaller spaces. Unlike a hammock which is slung between two supports, this type of bed is generally made by attaching chains to both the specially designed bed and the rafters or joists in the roof. Of course it is essential that the hanging mechanism is attached securely and is strong enough to take the weight of whoever will be sleeping in the bed.
Folding beds have been popular over time, and are ideal for small homes with multifunctional rooms. Also not a particularly new concept, centuries ago North American pioneers sometimes had beds that were positioned in a recess with doors that were closed during the day, and hinged folding beds that were hidden behind curtains.
If you ever get the chance to watch a silent movie starring Charlie Chaplin, chances are you’ll see him folding himself away along with the bed he was sleeping on. There’s other mattress and bedding trivia relating to folding beds and movie stars too. For instance in one of the popular James Bond movies, Bond and a friend used Charlie Chaplin’s trick to escape a hail of bullets.
Folding beds may fold horizontally or vertically and, like those devised by early American settlers, may be curtained off or stowed away into a wall or recess. | <urn:uuid:79006626-286c-4a42-b9bb-c8ba97d4e4b1> | {
"dump": "CC-MAIN-2020-05",
"url": "http://www.professorshouse.com/mattress-and-bedding-trivia/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251694908.82/warc/CC-MAIN-20200127051112-20200127081112-00442.warc.gz",
"language": "en",
"language_score": 0.9800349473953247,
"token_count": 1271,
"score": 3.40625,
"int_score": 3
} |
The Missing Ingredient For Watchfficient Muscles
Reported February 4, 2011
(Ivanhoe Newswire) — After taking a small dose of inorganic nitrate for three days, healthy people consume less oxygen while riding an exercise bike. A recent study traces that improved performance to increased efficiency of the mitochondria that power our cells. These results may offer one explanation for the well-known health benefits of fruits and vegetables, and leafy green vegetables in particular.
“We’re talking about an amount of nitrate equivalent to what is found in two or three red beets or a plate of spinach,” which Eddie Weitzberg of the Karolinska Institute in Sweden, was quoted as saying. “We know that diets rich in fruits and vegetables can help prevent cardiovascular disease and diabetes but the active nutrients haven’t been clear. This shows inorganic nitrate as a candidate to explain those benefits.”
Up until a short time ago nitrate wasn’t thought to have any nutritional value at all. It was even suggested that this component of vegetables may be toxic. Ultimately, Weitzberg and his colleague Jon Lundberg previously showed that dietary nitrate feeds into a pathway that produces nitric oxide with the aid of friendly bacteria found in our mouths. Nitric oxide has been known for two decades as a physiologically imperative molecule.
The study offers yet another benefit of nitrate and the nitric oxides that stem from them. It seems that the increased mitochondrial effectiveness is owed to lower levels of proteins that generally make the cellular powerhouses leaky. “Mitochondria normally aren’t fully efficient,” Weitzberg explained. “No machine is.”
These novel results show that increased dietary nitrate can have a rather immediate effect, however, it’s not yet clear what might happen in people who consume higher levels of inorganic nitrate over extended periods of time. It will be a natural next step to repeat the experiment in people with conditions linked to mitochondrial dysfunction, including diabetes and cardiovascular disease, to see if they too benefit from nitrates.
“Among the more consistent findings from nutritional research are the beneficial effects of a high intake of fruit and vegetables in protection against major disorders such as cardiovascular disease and diabetes,” the researchers concluded. “However, the underlying mechanism(s) responsible for these effects is still unclear, and trials with single nutrients have generally failed. It is tempting to speculate that boosting of the nitrate-nitrite-NO pathway may be one mechanism by which vegetables exert their protective effects.”
As an interesting aside, Weitzberg says that the benefits of dietary nitrates suggest that powerful mouthwashes may have a downside. “We need oral bacteria for the first step in nitrate reduction,” he says. “You could block the effects of inorganic nitrate if you use a strong mouthwash or spit [instead of swallowing your saliva]. In our view, strong mouthwashes are not good if you want this system to work.” | <urn:uuid:d318b686-c54f-46a4-b32f-bc486c0fa26c> | {
"dump": "CC-MAIN-2019-22",
"url": "http://psychedelichosting.info/news-flash/the_missing_ingredient_for_more_efficient_muscles/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232259126.83/warc/CC-MAIN-20190526105248-20190526131248-00414.warc.gz",
"language": "en",
"language_score": 0.9524682760238647,
"token_count": 635,
"score": 2.765625,
"int_score": 3
} |
“Tuberculosis is the single largest infectious disease killer in the world,” says David G. Russell, Microbiology and Immunology. “It’s a huge problem in Southern Africa, Asia, and Eastern Europe. There’s a tremendous underappreciation in the Western world for how big a problem it really is.”
Russell studies infectious diseases, and a large portion of his work revolves around tuberculosis (TB). There is no vaccine for the disease. Researchers lack understanding of immune correlates, or measurable signs of protection from Mycobacterium tuberculosis (Mtb) bacterium, which is one reason why a vaccine continues to elude them. “We don’t understand what immune protection from TB is,” Russell says, “nor what failure of immune protection is.” He and his collaborators decided to start over in the pursuit of a vaccine by looking at the factors that determine the progression of the disease.
Why Don’t People Know They Have TB?
“More than 90 percent of people infected with TB don’t go on to present the disease,” Russell says. “They’ll die of something else without ever knowing they’re TB positive. Why is this? What dictates disease progression in some individuals when the majority of people control the infection?” In an effort to answer that question, the Russell lab developed fluorescent strains of Mtb. By fluorescing under certain conditions, the bacterium can report to the researchers its fitness and its ability to replicate in various environments within the macrophage host cells of mouse models. The goal is to see which host cell phenotypes control the disease and which allow it to progress.
“We’ve identified different macrophage subsets that allow bacterial growth or control it,” Russell says. “These subsets coexist within the infected mouse at the same time, so we think that it’s the ratio, or balance, of these host cell subsets that determines the progression or control of the disease.”
Russell is working with collaborators in South Africa and Malawi, who are testing the reporter bacterial strains on tissue and cells taken from TB-infected human patients in those countries. The next step will be to tie the basic science work done on mouse models in the Russell lab together with human subjects work in Africa. That will require a limited testing of the reporter bacterium strains in primate models. “We can work up the procedures in mouse models, but mice are not a great model for human disease,” Russell says. “Having a limited amount of primate work is very important to test and validate the system.”
Disease Progression and Drug Discovery
Russell has just received a grant for $3.8 million from the National Institutes of Health (NIH) to pursue the integration of mouse-primate-human work, with the goal of further understanding TB disease progression. This grant joins the many others Russell and his collaborators have already received from the NIH and the Bill & Melinda Gates Foundation to fund various aspects of their TB research.
One of the earlier grants, $2.5 million from the Gates Foundation, is funding another facet of Russell’s work: TB-related drug discovery. Creating a vaccine for TB is the ultimate goal, but currently the disease is treated by antibiotics that must be taken for eight to nine months. A common problem is noncompliance or failure of the treatment, as patients go off the medication too soon or don’t take it regularly. Added to that is the alarming increase in antibiotic-resistant bacteria and the trend for pharmaceutical companies to close down their antimicrobial divisions, resulting in no new antibiotics being developed.
“If you invent an antibiotic that cures someone of an infection, then that person doesn’t have to take the drug anymore.” Russell says. “Yet the pharmaceutical companies have to spend the same amount of money developing an antibiotic as they do developing something like an anti-cholesterol medication that a person has to take for life. For companies that must make profits, this does not make fiscal sense. So they’ve stopped doing antibiotic discovery. It’s a huge problem. We are moving toward a post-antibiotic era where we’re going to have infections we can’t treat. At the moment we have TB. What are we going to do about that?”
“Our drug discovery platform found this new target pathway. Before, there were no inhibitors out there for cholesterol metabolism in TB bacteria. This is a totally new drug target.”
An Effective Drug Discovery Platform, a Collaborative Effort
Working with the California Institute for Biomedical Research (Calibr), a not-for-profit organization that seeks to discover and develop therapies for unmet medical needs, the Russell lab is screening Calibr’s library of compounds, looking for those that negatively affect Mtb inside the host cell. So far they’ve screened 1.5 million compounds. The Gates Foundation grant funds this drug discovery component of the Russell lab with the understanding that any resulting drugs will be co-owned between Cornell and Calibr and developed and shared with the world. The Gates Foundation also de-emphasizes the publication requirement that is usual with most grant funders. “I’ve hired people specifically to do drug discovery with the view that there will not necessarily be publications at the end of this but with the hope that there will be drugs,” says Russell.
The Russell lab initially identified a panel of compounds that affected Mtb’s ability to metabolize cholesterol. This led to the discovery that Mtb is genetically wired to realign its metabolism to cholesterol and fatty acids when it’s inside the host cell. Not only do these components of the host nourish the bacterium, allowing it to thrive and reproduce, but they also serve as environmental signals, telling the bacterium where it is and how to modify its metabolism. “Our drug discovery platform found this new target pathway,” Russell says. “Before, there were no inhibitors out there for cholesterol metabolism in TB bacteria. This is a totally new drug target.”
The researchers have now identified several promising compounds that inhibit Mtb’s ability to breakdown cholesterol when it is inside the macrophage cell of an infected mouse model. “Whether these compounds develop into proper drugs, we’ll have to wait and see,” Russell says, “but they do restrict bacterial growth.”
The TB-HIV Connection
Along with work on TB, Russell also spends a portion of his time studying human immunodeficiency virus (HIV) and the connection between it and TB. “TB is the largest single cause of death in people living with HIV,” he says. “In Malawi, about 85 percent of the TB cases in hospital are HIV positive. There’s a collision between the two infections in sub-Saharan Africa.” Currently Russell and his collaborators in Malawi are studying the presence of Mtb and HIV in alveolar macrophages in the lung.
Working on TB and HIV in Africa for more than 20 years has given Russell a different perspective on his work. He says, “There’s been a transition for me from an intellectual pursuit to something much, much deeper. Spending time in Africa has had a huge impact on my attitude toward my research. I believe Western universities need to step up to fill the void that’s been left by pharmaceutical companies in the drug discovery arena. Universities have a responsibility. It’s not just about education, or about research for research’s sake. It is about addressing real world problems that kill people.” | <urn:uuid:d31247be-2010-421d-82cd-76f028c19099> | {
"dump": "CC-MAIN-2017-34",
"url": "https://research.cornell.edu/news-features/pursuing-cure-tbs-unsolved-mysteries",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886103579.21/warc/CC-MAIN-20170817151157-20170817171157-00473.warc.gz",
"language": "en",
"language_score": 0.950695812702179,
"token_count": 1616,
"score": 3.5,
"int_score": 4
} |
Certain patterns of electrical activity in the brain may signal autism in children with tuberous sclerosis complex (TSC), a related genetic condition. Toddlers who have both TSC and autism have brain waves that are unusually out of sync across hemispheres, a new study suggests1.
The study offers a potential marker for autism well before traditional diagnostic tests would pick up the condition.
The oscillation speed of certain brain waves, as recorded by electroencephalography (EEG), also tracks with cognitive ability in children who have TSC, regardless of autism status.
“We were able to identify, in the first two years of life, very robust EEG markers of both cognitive impairment and autism in TSC,” says lead researcher Shafali Jeste, associate professor of psychiatry, pediatrics and neurology at the University of California, Los Angeles.
TSC is often diagnosed before birth or in early infancy. Most children with TSC also have epilepsy, and roughly half have autism. Predicting which babies will be diagnosed with autism is important for getting therapy to those most likely to need it.
Unlike children with TSC alone, those with both TSC and autism show social-communication difficulties in their first year of life2. They also show a decline in nonverbal intelligence between the ages of 1 and 3 years. Researchers have been looking for objective measures of some of these early signs of autism.
“Having something that we can objectively measure for individuals at risk [of autism] has really been lacking,” says Darcy Krueger, director of the Tuberous Sclerosis Clinic at Cincinnati Children’s Hospital Medical Center in Ohio, who was not involved in the study. “This is addressing a primary need within the field as a whole.”
Jeste and her colleagues used EEG to measure the brain activity of 35 children with TSC and 20 typical children at ages 12 and 24 months as the children sat in their caregivers’ laps watching a research assistant blow bubbles. The researchers focused on alpha waves — low-frequency electrical signals produced by the resting brain.
Alpha oscillations typically get faster as children get older. “It’s a really robust marker of healthy brain development,” Jeste says.
At 12 months of age, infants with TSC and controls have comparable peak oscillation speeds, the team found. But at 24 months, children with TSC have slower alpha waves than typical children do.
Oscillation speed at 24 months tracks with later cognitive function, the researchers found; 2-year-olds with higher peak alpha frequencies scored higher on tests of cognitive function at age 3 than the other children.
Jeste and her colleagues also measured the synchronization of alpha waves between brain regions in different hemispheres. At 24 months, they found, synchrony is lower in the children with TSC later diagnosed with autism than in those with TSC alone.
“It’s a really nice, technically well-done study,” says Peter Davis, a neurologist at Boston Children’s Hospital who was not involved in the study. “They confirm that kids who later have autism have differences that you can see very early on in life.”
Out of sync:
Brain regions with synchronized oscillations are better connected than those with oscillations that are out of sync. So the findings suggest that brain hemispheres in 2-year-old children with TSC and autism are less connected than in those with TSC alone.
Oscillations between brain hemispheres are also less synchronized in 1-year-olds with TSC than they are in controls, suggesting that TSC by itself is associated with weak connections between hemispheres. The findings appeared online in August in Autism Research.
Given the study’s small sample size and overlap between groups, however, it is not yet possible to forecast the developmental trajectory of individual children. “It’s still not quite at a predictive level,” Davis says. “You can’t take a kid who comes in and do this analysis and say, ‘Oh they’re going to develop autism.’”
It’s also not clear whether the pattern extends to autistic children who do not have TSC.
Jeste and her colleagues are trying to identify EEG biomarkers of autism in children younger than 1 year. “The earlier we can identify those markers, the earlier we can start monitoring them more closely, and even recommending intervention,” she says. | <urn:uuid:c6b5f613-12fc-4680-b176-e3dbaf3efab1> | {
"dump": "CC-MAIN-2020-05",
"url": "https://www.spectrumnews.org/news/slow-disorderly-brain-waves-may-flag-autism-in-toddlers/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00095.warc.gz",
"language": "en",
"language_score": 0.9694059491157532,
"token_count": 935,
"score": 3.6875,
"int_score": 4
} |
There's only one source of renewable energy that can provide all of the world's needs and that's the Sun. In fact, enough sunlight falls on the Earth's surface in just a couple of hours each day to meet the whole world's energy needs for one year. The question is: how can we effectively and economically harness this solar energy, without mass-producing very expensive conventional solar cells, which would ultimately require vast tracts of land in order to do their job? Nanotechnology could provide the answer in the form of a new kind of solar cell, one which would be relatively inexpensive to manufacture and highly flexible in design. In fact, you maybe surprised as to just how flexible these cells might be! Find out more by watching this movie.
mPhase Technologies, the company behind a nanotechnology-enabled battery with unlimited shelf life, has posted a video demonstration of its Smart Nanobattery on YouTube.The video illustrates in layman's terminology some fundamental concepts behind the smart nano battery. The company has proven it is possible to fabricate nanotech-based "smart" batteries, which can store reserve power for decades and generate electric current virtually on demand. | <urn:uuid:30eccd80-10cc-4ff7-86cb-4d08b723dd19> | {
"dump": "CC-MAIN-2013-20",
"url": "http://www.nanowerk.com/nanotechnology/videos/nano_videos.php?cat=energy",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706121989/warc/CC-MAIN-20130516120841-00086-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9590824246406555,
"token_count": 233,
"score": 3.515625,
"int_score": 4
} |
a1 Program Quality Advisor, Program Effectiveness, World Vision Australia and Honorary Fellow, School of Health and Social Development, Deakin University, Australia
Context This paper reports on findings from the ex-post evaluation of the Maewo Capacity Building project in Maewo Island, Vanuatu, which was funded by World Vision Australia.
Objectives To examine the extent to which the infrastructure and systems left behind by the project contributed to the improvement of household food security and health and nutritional outcomes in Maewo Island, using Ambae Island as a comparator.
Setting Two-stage cluster survey conducted from 6 to 20 July 2004, which included anthropometric measures and 4.5-year retrospective mortality data collection.
Participants A total of 406 households in Maewo comprising 1623 people and 411 households in Ambae comprising 1799 people.
Main outcome measures Household food insecurity, crude mortality rate (CMR), under-five mortality rate (U5MR) and malnutrition prevalence among children.
Results The prevalence of food insecurity without hunger was estimated at 15.3% (95% confidence interval (CI): 12.1, 19.2%) in Maewo versus 38.2% (95% CI: 33.6, 43.0%) in Ambae, while food insecurity with hunger in children did not vary by location. After controlling for the child's age and gender, children in Maewo had higher weight-for-age and height-for-age Z-scores than children of the same age in Ambae. The CMR was lower in Maewo (CMR=0.47/10 000 per day, 95% CI: 0.39, 0.55) than in Ambae (CMR=0.59/10 000 per day, 95% CI: 0.51, 0.67) but no difference existed in U5MR. The major causes of death were similar in both locations, with frequently reported causes being malaria, acute respiratory infection and diarrhoeal disease.
Conclusions Project initiatives in Maewo Island have reduced the risks of mortality and malnutrition. Using a cross-sectional 'external control group' design, this paper demonstrates that it is possible to draw conclusions about project effectiveness where baseline data are incomplete or absent. Shifting from donor-driven evaluations to impact evaluations has greater learning value for the organisation, and greater value when reporting back to the beneficiaries about project impact and transformational development in their community. Public health nutritionists working in the field are well versed in the collection and interpretation of anthropometric data for evaluation of nutritional interventions such as emergency feeding programmes. These same skills can be used to conduct impact evaluations, even some time after project completion, and elucidate lessons to be learned and shared. These skills can also be applied more widely to projects which impact on the longer-term nutritional status of communities and their food security.
(Received April 04 2005)
(Accepted November 17 2005)
c2 †Correspondence address: World Vision Australia, 1 Vision Drive, East Burwood, Victoria 3151, Australia. | <urn:uuid:968c0481-7941-46f0-bf33-3a74a7ec7ebf> | {
"dump": "CC-MAIN-2015-32",
"url": "http://journals.cambridge.org/action/displayAbstract?fromPage=online&aid=587116&fileId=S1368980006001327",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042988511.77/warc/CC-MAIN-20150728002308-00195-ip-10-236-191-2.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9312896132469177,
"token_count": 636,
"score": 2.515625,
"int_score": 3
} |
|ANTIQUITY OF JAINISM||
THE DIGAMBARA SUB-SECTS
The division of the Jaina religion into two sects was only the beginning of splitting the religious order into various sub-sects. Each of the two great sects, viz., the Digambara sect and the Svetambara sect, got sub-divided into different major and minor sub-sects according to the differences in acknowledging or interpreting the religious texts and in the observance of religious practices. These major and minor sub-sets gradually sprang up for the most part on account of different interpretations the pontiffs put on the canonical texts from time to time and due to revolt or opposition by sections of people against the established religious authorities and the traditional religious rites and rituals.
The Digambara sect, in recent centuries, has been divided into the following sub-sects:
Major sub-sects -
The followers of Bisapantha support the Dharma-gurus, that is, religious authorities known as Bhattarakas who are also the heads of Jaina Mathas, that is. religious monasteries. The Bisapanthas, in their temples, worship the idols of Tirthankaras and also the idols of Ksetrapala, Padmavati and other deities. They worship these idols with saffron, flowers, fruits, sweets, scented 'agarabattis', i.e., incense sticks, etc. While performing these worships. the Bisapanthis sit on the ground and do not stand. They perform Arati, i.e., waving of lights over the idol, in the temple even at night and distribute prasada, i.e., sweet things offered to the idols. The Bisapantha, according to some, is the original form of the Digambara sect and today practically all Digambara Jainas from Maharashtra, Karnataka and South India and a large number of Digambara Jainas from Rajasthan and Gujarat are the followers of Bisapantha.
Terapantha arose in North India in the year 1683 of the Vikram Era as a revolt against the domination and conduct of the Bhattarakas. i.e. religious authorities, of the Digambara Jainas. As a result in this sub-sect. the Bhattarakas are not much respected. In their temples, the Terapanthis install the idols of Tirthankaras and not of Ksetrapala, Padmavati and other deities. Further. they worship the idols not with flowers, fruits and other green vegetables (known as sachitta things), but with sacred rice called 'Aksata', cloves, sandal, almonds, dry coconuts, dates, etc. As a rule they do not perform Arah or distribute Prasada in their temples. Again, while worshipping they stand and do not sit.
From these differences with the Bisapanthis it is clear that the Terapanthis appear to be reformers. They are opposed to various religious practices. As according to them. These are not real Jaina practices. The Terapantha had performed a valuable task of rescuing the Digambaras from the clutches of wayward Bhattarakas and hence the Terapanthis occupy a peculiar position in the Digambara Jaina community. The Terapanthis are more numerous in Uttar Pradesh, Rajasthan and Madhya Pradesh.
It is pertinent to note that even though the name Terapantha sub-sect appears both among the Digambara and the Svetambara sects. Still the two Terapanthis are entirely different from each other. While the Digambara Terapanthis believe in nudity and idol-worship, the Svetambara Terapanthis are quite opposed to both.
The sub-sect Taranapantha is known after its founder Tarana-Svami or Tarana-tarana-Svami (1448-1515 A.D.). This sub-sect is also called Samaiyapantha because its followers worship Sarnaya, i.e., sacred books and not the idols. Tarana-Svami died at Malharagarh, in former Gwalior State in Madhya Pradesh, and this is the central place of pilgrimage of Taranapanthis.
The Taranapanthis strongly refute idolatry but they have their own temples in which they keep their sacred books for worship. They do not offer articles like fruits and flowers at the time of worship. Besides the sacred books of the Digambaras, they also worship the fourteen sacred books written by their founder Tarana-Svami. Further, Taranapanthis give more importance to spiritual values and the study of sacred literature. That is why we find a complete absence of outward religious practices among them. Moreover, Tarana-Svami; was firmly against the caste-distinctions and in fact threw open the doors of his sub-sect even to Muslims and low-caste people.
These three main traits of the Taranapanthis, namely, (a) the aversion to idol worship, (b) the absence of outward religious practices, and (c) the ban on caste distinctions, were evolved as a revolt against the religious beliefs and practices prevailing in the Digambara Jaina sect, and it appears that Tarana-Svami might have formulated these principles under the direct influence of Islamic doctrines and the teachings of Lonkashaha, the founder of the non-idolatrous Sthanakvasi sub-sect of the Svetambara sect.
The Taranapanthis are few in number and they are mostly confined to Bundelkhand, Malwa area of Madhya Pradesh and Khandesh area of Maharashtra.
The Gumanapantha is not so important and in fact very little is known about it. It is stated that this sub-sect was started by Pandit Gumani Rama or Gumani Rai, who was a son of Pandit Todaramal, a resident of Jaipur in Rajasthan.
According to this Pantha, lighting of candles or lamps in the Jaina temples is strictly prohibited, because it regards this as a violation of the fundamental doctrine of Jaina religion, viz., non-violence. They only visit and view the image in the temples and do not make any offerings to them.
This pantha became famous in the name of shuddha amnaya, that is pure or sacred tradition, because its followers always stressed the purity of conduct and self-discipline and strict adherence to the precepts.
Gumanapantha originated in the 18th. Century A.D. and flourished mainly during that century. It was prevalent in several parts of Rajasthan, and it is found now in some areas of Rajasthan around Jaipur.
The Totapantha came into existence as a result of differences between the Bisapantha and Terapantha sub-sects. Many sincere efforts were made to strike a compromise between the Bisa (i.e. twenty) Pantha and the Tera (i.e.. thirteen) pantha and the outcome was sadhesolaha (i.e., sixteen and a half)-Pantha or 'Totapantha'. That is why the followers of Sadheso!aha Pantha or Totapantha believe to some extent in the doctrines of Bisapantha and to some extent in those of Terapantha.
The Totapanthis are extremely few in number and are found in some pockets in Madhya Pradesh.
In connection with the account of the major and minor sub-sects prevailing among the Digambara sect, it is worth while to note that in recent years in the Digambara sect a new major sub-sect known as 'Kanji-pantha', consisting of the followers of Kanji Swami is being formed and is getting popular especially among the educated sections. Saint Kanji; Swami (from whom the name Kanji-pantha' is derived), a Svetambara-Sthanakvasi by birth, largely succeeded in popularizing the old sacred texts of the great Digambara Jaina saint Acharya Kunda-Kunda of South India. But Kanji Swamis efforts, while interpreting Acharya Kunda kunda's writings, to give more prominence to nischaya-naya, that is, realistic point of view, in preference to vyavahara-naya, that is, practical view point, are not approved by the Digambaras in general as they consider that both the view points are of equal importance. However, the influence of Kanjipantha is steadily increasing and Sonagarh town in Gujarat and Jaipur in Rajasthan have become the centers of varied religious activities of the Kanajipanthis. | <urn:uuid:96fcf737-3875-4e47-b112-b3a629dc2545> | {
"dump": "CC-MAIN-2018-17",
"url": "http://www.jainworld.com/jainbooks/antiquity/digasubs.htm",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125949036.99/warc/CC-MAIN-20180427041028-20180427061028-00091.warc.gz",
"language": "en",
"language_score": 0.9488310813903809,
"token_count": 1834,
"score": 3.15625,
"int_score": 3
} |
Despite an increasing number of automated tools to evaluate websites for accessibility, manual accessibility testing is more important than ever for evaluating real world accessibility of websites. This is because many accessibility barriers can escape detection with automated accessibility scanners. Also, testing with assistive technology devices is the best way to get a real-world picture of accessibility, and to determine compatibility with common assistive technology devices including screen readers, braille displays, screen magnifiers, and other AT software/devices.
Also, manual tools can be used to:
- Evaluate the extent and impact of WCAG failures on website accessibility
- Identify accessibility improvements needed to ensure the best experience for assistive technology users
- Complete a conformance evaluation and make a conformance claim (aligns with W3C recommendations for evaluating websites for accessibility).
Strengths of Automated Accessibility Scanners
Automated tools are great for getting a mile-high view of website accessibility. They are also excellent tools for identifying programmatic errors that might impact accessibility such as missing alternate text, duplicate element IDs, empty buttons and links, and other errors. Premium automated tools (i.e. Siteimprove) also have the benefit of scanning larger selections of pages than might be impractical to test manually using assistive technology devices.
Here is a list of some free tools to identify HTML/CSS errors and WCAG 2.0 failures:
- Wave Accessibility Tool – Automated accessibility checker developed by Web-AIM.
- Achecker – Automated accessibility checker.
- HTML Validators – automated HTML validation tool provided by the W3C.
- CSS Validator – automated CSS validation tool provided by the W3C.
Also, there are many premium tools to evaluate website accessibility conformance and to document WCAG failures. Siteimprove, SortSite and Compliance Sheriff allow users to scan a much larger selection of pages to identify WCAG failures.
Strengths of Manual Accessibility Testing
Manual testing involves testing websites with assistive technology devices to evaluate compatibility and identify any accessibility barriers. Manual accessibility testing is the best way to get a real-world picture of accessibility compliance, and to identify significant barriers for assistive technology users.
There is no replacement for real-world testing for accessibility compliance, and manual testing can identify many errors that automated tools might miss including:
Keyboard Accessibility problems – missing keyboard focus, forms and menus that do not work with a keyboard only, inaccessible dialogs, and other accessibility errors.
Contrast Errors – Automated tools are an excellent tool to identify potential contrast problems, but they have some inherent limitations. Automated tools like Wave’s contrast tool do not account for background images, text styling, and other effects that might impact the readability of text.
Error Reporting – problems with form field validation and error reporting can only be evaluated properly using assistive technology devices.
Here are some great free tools that we use for manual accessibility testing and evaluation:
- NVDA Screen Reader – Free screen reader developed by NVAccess (donations are strongly encouraged)
- Chrome Developer Tools – Developer tools for Google’s Chrome Web browser.
To effectively evaluate website accessibility with assistive technology devices, the W3C also recommends employing both expert AT users and people with disabilities to get a complete picture of accessibility.
Evaluating websites for accessibility requires both manual and automated testing to get a complete picture of accessibility.
Automated tools are an excellent choice for identifying programmatic errors that might impact accessibility, while manual testing is essential to evaluate compatibility of websites with assistive technology devices. Together these tools can be used to evaluate website accessibility, and to verify and document accessibility compliance with the W3Cs Web Content Accessibility Guidelines (WCAG 2.0).
Need help with your Website?
Check out our industry-leading audit and evaluation services, or contact us for a free consultation or quote. | <urn:uuid:e395f17a-ab6e-4538-a2b6-e790362898d3> | {
"dump": "CC-MAIN-2020-45",
"url": "https://www.aurorahawaii.com/tips/why-manual-testing-is-critical-for-accessibility-compliance/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107910204.90/warc/CC-MAIN-20201030093118-20201030123118-00284.warc.gz",
"language": "en",
"language_score": 0.8639799952507019,
"token_count": 800,
"score": 2.578125,
"int_score": 3
} |
Pain is a complex physical and psychological experience that may or may not reflect injury or tissue damage. In fact, the paradox of pain is that it may often exist without recent injury or tissue damage.
Acute pain is usually a sign of actual or potential injury or trauma, often associated with anxiety or sympathetic nervous system hyperactivity, lasting a short time - from one to six months, according to different definitions. Chronic pain lasts longer than this period taken for the healing of acute tissue damage. Other symptoms commonly become associated with the chronic stage of pain: anxiety, depression, insomnia, weight loss, appetite disturbance, constipation and decreased libido.
Pain can have a somatogenic or organic cause, involving a physiological mechanism, or can be psychogenic, caused by psychological issues. Unfortunately, doctors too often ascribe chronic pain to psychological causes when organic pathology is not apparent; the correct description in this case should be idiopathic pain, i.e. pain of unknown origin. Somatogenic pain can be further classified as nociceptive, involving activation of somatic or visceral pain-sensitive nerve fibers, or neuropathic, from dysfunction of the peripheral or central nervous system. In the case of nociception, organ pain can be felt as an aching or pressure sensation, as in cancer pain. Neuropathic pain can be from compression of a peripheral nerve or central nervous system pathology, such as stroke or spinal cord injury. There may be peripheral polyneuropathies, as in diabetes. Several of these factors can co-exist in a chronic pain problem such as headache or cancer pain, which can involve, at the same time, nociception and psychological issues. (1) In a medical evaluation, an organic cause is always sought first, through physical exam, laboratory testing and X-ray, MRI or CATSCAN imaging. In evaluation of a chronic pain disorder, one would also have to take into consideration cultural, social and economic factors and the possibility of secondary gain (for example, from disability payments).
The Gate Control Theory of Pain
The Gate Control Theory of pain, formulated by Melzack and Wall in 1965, postulated a valve or gate for pain perception, through a specialized cluster of nerve cells in the substantia gelatinosa of the spinal column, probably involving activation of the endorphins, the natural morphine-like substance. Gating occurs also through the activation by such pain control techniques as acupuncture, acupressure, massage or electrical stimulation of large-diameter (A-beta) nerve fibers that suppress the slower transmission of pain impulses through small diameter (A-delta and C) nerve fibers, mediated by the pro-inflammatory Substance P (2). A higher level gate may operate in the reticular or limbic structures of the brain, involving the sensory discrimination, cognitive and emotional interpretation of the experience (3).
Signs & Symptoms of Pain
Since pain is predominantly a subjective experience, the best reflection of the existence and severity of the condition is the list of words commonly used to describe pain, compiled by the psychological researchers Melzack and Torgerson and classified by them as sensory (throbbing, pounding, shooting, pricking, sharp, stabbing, pinching, pressing, gnawing, crushing, burning, searing, stinging, smarting, wrenching, etc.); affective or emotional (sore, tender, sickening, blinding, etc.); or evaluative (excruciating, intense, unbearable, etc.) (4)
Pain Management Options
Conventional Pain Management Therapy
Conventional treatment of pain has been primarily through pharmaceutical medications.
Non-opioid analgesics, including acetaminophen and non-steroidal anti-inflammatory drugs (NSAIDs), such as ibuprofen, naproxen and apirin, treat mild to moderate pain. Excess doses can cause toxic effects on the liver and kidney.
Opioid (narcotic) agents bind to opioid receptors in the central nervous system and can control severe, acute pain after injury or surgery, or chronic pain, such as cancer pain. For acute pain, morphine is usually delivered intravenously or intramuscularly. Other opioids include codeine and the synthetic agents methadone and oxycodone. Opioids are administered with caution for the elderly, infants and those with kidney, respiratory or liver disease, and in all cases dosage is guided by frequent monitoring of pain levels, respiratory rate and blood pressure. Excess or adverse effects of morphine and other opioids can be constipation, nausea or respiratory depression. Physical dependence can also be a danger (5). Non-drug alternatives for pain relief in conventional medicine can range from non-invasive approaches like physical therapy, including manual therapy, therapeutic exercise and modalities like ultrasound, to spinal surgery and surgical implants of electrical stimulators.
Natural Pain Management Therapy
Acupuncture has provided analgesia for acute and chronic pain for thousands of years in China and elsewhere. Clinical and experimental studies generally show a 70 percent level of pain control in comparison to placebo (6) (7). Objective evidence of this analgesic effect has also been provided by EEG evoked-potential studies (8).
Electrical stimulation of different types has been used successfully for pain control, and in particular transcutaneous electrical nerve simulation (TENS) has become increasingly popular for home therapy, utilizing pads attached over the area of pain, or clips attached to the ear lobe (for central nervous system control), and a small control unit attached to the belt. (9).
Massage and other manual therapy methods probably work similarly to acupuncture and TENS through autonomic nervous system control of pain, according to a counter-stimulus mechanism such as that postulated in the Gate Control Theory.
Psychological strategies for pain management include cognitive and behavioral skills, such as attention focusing and relaxation training, as well as preparatory information, to develop control in conditions like chronic low back pain, irritable bowel syndrome, cancer, migraine headaches and rheumatic conditions (10). Hypnosis has also been successful in inducing a deep relaxation state that can be directed specifically to an area of pain (11).
Botanical agents have traditionally been used to provide pain relief throughout the world for thousands of years and now provide safer alternatives to pharmaceutical drugs. Capsaicin, the active ingredient of cayenne or red pepper has been successfully applied topically (0.025% or 0.075% in a cream base) in a number of pain conditions. Research supports its effectiveness in reducing the pain of post-herpetic neuralgia (the chronic pain persisting after the healing of shingles lesions), trigeminal neuralgia (facial pain), post-mastectomy pain, pain due to chemotherapy or radiation, diabetic neuropathy, cluster headaches, and arthritis (12). Kava, an herb known for its sedative effect, was demonstrated also to have analgesic effect, although through a mechanism different from opiate or non-steroidal anti-inflammatory drugs (13). The analgesic effect of ginger in experimental studies on animals is thought to operate like capsaicin in inhibiting the release of the neurotransmitter Substance P (14). In studies on rheumatoid arthritis and migraine headache, ginger had marked anti-inflammatory effect, with 75% of arthritis patients and 100 % of patient with muscular discomfort experiencing relief in pain or swelling (15). Curcumin, the active ingredient of turmeric, has been used in the Ayurvedic medical tradition of India as a topical pain-reliever, also operating like capsaicin to deplete the nerve endings of Substance P (16). The Chinese herb angelica (known in Chinese as tang-kuei), through its pain-relieving and muscle-relaxing acitivity, has demonstrated analgesic action 1.7 times that of aspirin (17). Historically, angelica has treated such conditions as uterine cramps, trauma, headaches and arthritis (18). The Chinese herb yan hu suo or corydalis has traditionally acted like opiates such as morphine and codeine to control neurological pain, and pain of headaches, low back, abdomen, arthritis and dysmenorrhea (19). The active ingredient of white willow bark is salicin, from which aspirin (acetylsalicylic acid) is formed. White willow bark has been a traditional native American herbal agent for control of painful conditions like osteoarthritis (20).
The amino acid D-phenylalanine, through its promotion of the endorphin pathway, has demonstrated positive effects in relieving post-surgical low back pain, osteoarthritis, whiplash, rheumatoid arthritis, fibrositis and migraine headaches (21). L-tryptophan, another amino acid, has raised pain tolerance threshold in numerous experimental and clinical studies of acute and chronic pain conditions (22).
Traditional Chinese herbal formulas are prescribed for pain according to a pattern described in the language of traditional Chinese medicine. For example, the formula Du Huo Ji Sheng Wan, which includes the herb angelica, is indicated for the traditionally described syndrome of Wind Dampness and Kidney Deficiency, or the Western biomedical symptoms of chronic joint and muscle pain, stiffness, spasm and cramp associated with osteoarthritis of the low back or lower limb or sciatica (23).
Homeopathic remedies are similarly prescribed according to distinctive symptom patterns, for example pain with stiffness or cramping or on movement, or accompanied by tearfulness, or aggravated by injury, or better with continued movement (24).
The Merck Manual, 17th edition, Beers M and Berkow R.,ed. 1999: 1363.Melzack R, Wall PD. Pain mechanisms: a new theory. Science 1965; 150: 971-979.Melzack R., Casey KC. Sensory, motivational and central control of pain. In Kenshalo DL, ed. The skin senses. Springfield IL: CC Thomas. 1968: 423-443.Melzack R. and Torgerson WS. On the language of pain. Anesthesiology 34. 1971: 50-59.The Merck Manual, 17th edition. Beers M and Berkow R, ed. 1999:1364-70.Lewith GT, Machin D. On the evaluation of the clinical effects of acupuncture. Pain. 1983: 16: 111-127.Reichmanis M, Becker RO. Relief of experimentally-induced pain by stimulation at acupuncture loci, a review. Comp Med East West. 1973; 5: 281-288.Chapman CR, Kitaeff R, et al. Evoked potential assessment of acupunctural analgesia. Pain. 1980; 9: 183-7.Shealy CN, Maurer D. Transcutaneous nerve stimulation for control of pain. Surg Neurol. 1974; 2: 45-57.Kitaeff R. Non-pharmacological control of pain. Textbook of natural medicine, vol I, second edition: 501-2Chaves JF. Recent advances in the applications of hypnosis to pain mangement. Am Soc Clin Hypnosis. 1994; 34: 117-129.Murray M and Pizzorno J. Textbook of natural medicine, vol I, second edition. Pizzorno J. and Murray M ed. 1999: 630-1.Jamieson DD, Duffield PH. The antinociceptive action of kava components in mice. Clin Exp Pharmacol Physiol 1990; 17: 494-508.Onagi T., Minami M., Kumishi Y, Staoh M. Capsaicin-like effect of (6)-shagoal on substance P-containing primary afferents of rats. A possible mechanism of its analgesic action. Neuropharmacol. 1992; 31: 1165-1169.Murray M, Pizzorno J. Textbook of natural medicine, vol I, second edition. Pizzorno J. and Murray M. ed. 1999:1028-9.Patacchini R., Maggi CA and Meli A. Capsaicin-like activity of some natual pungent substances on peripheral nerve endings of visceral primary afferents. Arch Pharmacol 1990, 342: 72-7.Tanaka S., Kuno Y, Tabata M., Konoshima M. Effects of "toki" (angelica acutiloba Kitagawa) extracts on writhing and capillary permeability in mice: analgesic and anti-inflammatory effects. Yakugaku Zasch 1071; 91: 1098-1104.Murray M., Pizzorno J. Textbook of naturopathic medicine, vol I, second edition. Pizzorno J. and Murray, M. ed. 1999: 591.Yeung H. Handbook of Chinese herbs and formulas, vol. I. Institute of Chinese medicine. 1983: 566.Mills SY, Jacoby RK, Chackfield M, Willoughby M. Effect of a proprietary herbal medicine on the relief of chronic arthritic pain: a double-blind study. Br. J. Rheum 1996; 35: 874-8.Ehrenpreis S et al. Naloxone reversible analgesia in mice produced by D-phenylalanine and hydrocinnamic acid, inhibitors of carboxypeptidase A. Adv Pain Res & Therapy, vol 3. 1978.Werbach M. Nutritional influences on illness. Keats. 1988: 344-5.Maclean W. The clinical manual of Chinese herbal patent medicines. Pangolin.2000: 268.Locke A. and Geddes N. The complete guide to homeopathy. Darling Kindesley. 1995: 154-7.
Dr. Richard Kitaeff is the founder and director of New Health Medical Center | <urn:uuid:c5a740e0-f384-494e-97a0-36ffcf82c122> | {
"dump": "CC-MAIN-2021-49",
"url": "https://www.sedonaspotlight.com/post/natural-prescription-for-pain",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964362923.11/warc/CC-MAIN-20211204003045-20211204033045-00473.warc.gz",
"language": "en",
"language_score": 0.880280077457428,
"token_count": 2872,
"score": 2.9375,
"int_score": 3
} |
Dehydration or hypohydration refers to the loss of water within the body. It can occur at any time, within any sport and should be avoided as it can cause further complications within the body. It is caused by a prolonged physical activity, among other things, where water has not been consumed at an adequate level.
Although in the water, swimming is a strenuous sport that can induce dehydration – especially when one is swimming for long periods of time. It is important to keep hydrated to maintain endurance, health and balance through the body while partaking in the sport. Here are some ways that can help to prevent dehydration while swimming.
It is important to know the symptoms of dehydration – and check for these symptoms regularly should you be immersed in the water for extended periods of time. These symptoms are the increased urge to urinate, a dry mouth, or swollen tongue – and weakness, dizziness and fatigue. Although there is an increased urge to urinate, there may be little urination that actually occurs. When one is dehydrated, the urine is often stronger in color when one is suffering from dehydration.
The first way that we can prevent dehydration while swimming is to ensure that proper amounts of water are being consumed. Breaks should be taken every fifteen to twenty minutes to consume at least eight ounces of water, or another beverage – a healthy beverage. Drinking water from the pool, lake or ocean should be avoided as these water sources can contain salt, chemicals and bacteria that can induce further dehydration. Just because we are in the water, does not mean we have to stop drinking water. Swimming is exercise, and with any exercise we are losing moisture from the body – and it is important to replenish this moisture.
They say that swimmers are more prone to dehydration because it causes high levels of exertion in the body, but swimmers do not feel the urge to drink because they are immersed within the water and therefore the brain is not aware of the need for water, and other liquids. To prevent this, take specified breaks from the exercise to drink water, and ensure that at least a half gallon of water is being consumed each day – to prevent these swimming dehydration risks.
When treating dehydration at home, it is important to replenish the liquid that has been lost from the body – but not too quickly, as this can cause uncomfortable feelings within the stomach. Using ice chips or sports drinks high in electrolytes will help replenish and rejuvenate the system that has suffered from dehydration.
With the combination of heat and humidity, and water – your body is more than likely losing water while swimming. This combined with the perspiration, and high heart rate is combinations that can create dehydration. Be sure to keep hydrated while participating in swim meets, especially children – and especially at an outdoor pool in high temperatures.
Dehydration is a dangerous illness that causes severe electrolyte imbalance. The treatment for severe dehydration is intravenous fluids – therefore, medical attention should be sought for any child or adult suffering from prolonged dehydration, as to avoid any damage to the body. | <urn:uuid:cff42145-7278-48a0-a29f-5daa082c16af> | {
"dump": "CC-MAIN-2019-04",
"url": "http://www.atlantic-medical.com/2017/04/how-to-prevent-dehydration-while-swimming/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583660258.36/warc/CC-MAIN-20190118172438-20190118194438-00124.warc.gz",
"language": "en",
"language_score": 0.9637085795402527,
"token_count": 624,
"score": 3.6875,
"int_score": 4
} |
Researchers are using a Pacific island plant called Amborella trichopoda to help solve "Darwin's abominable mystery"—what was it, exactly, that caused the explosion of flowering plants in the fossil record around 145 million years ago? Amborella's genome, it turns out, holds clues to explaining how flowers managed their incredible diversification and sudden dominance. The Scientist explains why Amborella is a key candidate for doing this:
A. trichopoda is the sister species of all other flowering plants, or angiosperms. It is the last survivor of a lineage that branched off during the dynasty’s earliest days, before the rest of the 350,000 or so angiosperm species diversified.
After sequencing the plant's genome, researchers analyzed it and found that
Of the 300,000 flowering plants known today, Amborella is the only one that directly traces back to that common ancestor of them all, the researchers write in a statement. "In the same way that the genome sequence of the platypus — a survivor of an ancient lineage — can help us study the evolution of all mammals, the genome sequence of Amborella can help us learn about the evolution of all flowers," they say.
More from Smithsonian.com: | <urn:uuid:8b7ab61f-186f-4b0f-9293-05930413687a> | {
"dump": "CC-MAIN-2015-35",
"url": "http://www.smithsonianmag.com/smart-news/this-200-million-year-old-plant-species-helps-explain-the-origin-of-all-flowers-180948187/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645220976.55/warc/CC-MAIN-20150827031340-00152-ip-10-171-96-226.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9146185517311096,
"token_count": 263,
"score": 4.09375,
"int_score": 4
} |
There is a new paper (h/t to Steve Milloy) that further documents that
1. Carbon Dioxide is but one of a diverse range of human climate forcings
2. That it is atmospheric and ocean circulation pattern changes that are of much more importance than a long term trend in the global annual average surface temperature.
We reported on these two issues, for example, in
Pielke Sr., R., K. Beven, G. Brasseur, J. Calvert, M. Chahine, R. Dickerson, D. Entekhabi, E. Foufoula-Georgiou, H. Gupta, V. Gupta, W. Krajewski, E. Philip Krider, W. K.M. Lau, J. McDonnell, W. Rossow, J. Schaake, J. Smith, S. Sorooshian, and E. Wood, 2009: Climate change: The need to consider human forcings besides greenhouse gases. Eos, Vol. 90, No. 45, 10 November 2009, 413. Copyright (2009) American Geophysical Union.
where we wrote
In addition to greenhouse gas emissions, other first-order human climate forcings are important to understanding the future behavior of Earth’s climate. These forcings are spatially heterogeneous and include the effect of aerosols on clouds and associated precipitation [e.g., Rosenfeld et al., 2008], the influence of aerosol deposition (e.g., black carbon (soot) [Flanner et al. 2007] and reactive nitrogen [Galloway et al., 2004]), and the role of changes in land use/land cover [e.g., Takata et al., 2009]. Among their effects is their role in altering atmospheric and ocean circulation features away from what they would be in the natural climate system [NRC, 2005].
Ozone depletion in the stratosphere can be added to this list.
The new paper is
S. M. Kang, L. M. Polvani,J. C. Fyfe, M. Sigmond, 2011: Impact of Polar Ozone Depletion on Subtropical Precipitation Scienc Express.org / 21 April 2011
The abstract reads [highlight added]
“Over the past half-century, the ozone hole has caused a poleward shift of the extratropical westerly jet in the Southern Hemisphere. Here, we argue that these extratropical circulation changes, resulting from ozone depletion, have substantially contributed to subtropical precipitation changes. Specifically, we show that precipitation in the Southern subtropics in austral summer increases significantly when climate models are integrated with reduced polar ozone concentrations. Furthermore, the observed patterns of subtropical precipitation change, from 1979 to 2000, are very similar to those in our model integrations, where ozone depletion alone is prescribed. In both climate models and observations, the subtropical moistening is linked to a poleward shift of the extratropical westerly jet. Our results highlight the importance of polar regions on the subtropical hydrological cycle.”
An excerpt from the paper reads
“In a broader perspective, the impact of polar ozone depletion on tropical precipitation discussed here provides one more instance of how changes in high latitudes are able to affect the tropics. Other well-known examples are the effect of Arctic sea ice … and of the Atlantic thermohaline circulation … on the position of the Intertropical Convergence Zone (ITCZ). Hence the need to deepen our understanding of polar to tropical linkages in order to accurately predict tropical precipitation.”
In a news article on this paper by Richard Black of the BBC,
it is written
“This study does illustrate the important point that different mechanisms of global change are contributing to the climate impacts we’re seeing around the world,” observed Professor Myles Allen of Oxford University, a leading UK climate modeller.
“It’s very important to unpack them all rather than assuming that any impact we see is down simply to greenhouse gas-mediated warming.”
Myles Allen has succinctly and accurately summarized the significance of this study in his quote. | <urn:uuid:56494166-6e8b-4b2f-8f25-8e08649baa60> | {
"dump": "CC-MAIN-2016-40",
"url": "https://pielkeclimatesci.wordpress.com/2011/04/22/implications-of-a-new-paper-impact-of-polar-ozone-depletion-on-subtropical-precipitation-by-kang-et-al-2011/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738661213.28/warc/CC-MAIN-20160924173741-00286-ip-10-143-35-109.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.8731603622436523,
"token_count": 875,
"score": 3,
"int_score": 3
} |
Download 5.23 Mb.Pdf ko'rish
P a g e
Up until 1657, Shivaji maintained peaceful relations with the Mughal Empire.
Shivaji offered his assistance to Aurangzeb in conquering Bijapur and in return, he was
assured of the formal recognition of his right to the Bijapuri forts and villages under his
possession. Shivaji's confrontations with the Mughals began in March 1657, when two
of Shivaji's officers raided the Mughal territory near Ahmednagar. This was followed by
raids in Junnar, with Shivaji carrying off 300,000 hun in cash and 200 horses.:38
Aurangzeb responded to the raids by sending Nasiri Khan, who defeated the forces of
Shivaji at Ahmednagar. However, Aurangzeb's countermeasures against Shivaji were
interrupted by the rainy season and his battle of succession with his brothers for the
Mughal throne following the illness of Shah Jahan.
Upon the request of Badi Begum of Bijapur, Aurangzeb sent his maternal uncle
Shaista Khan, with an army numbering over 150,000 along with a powerful artillery
division in January 1660 to attack Shivaji in conjunction with Bijapur's army led by Siddi
Jauhar. Shaista Khan, with his better-equipped and -provisioned army of 300,000
seized Pune and the nearby fort of Chakan, besieging it for a month and a half until
breaching the walls. Shaista Khan pressed his advantage of having a larger, better
provisioned and heavily armed Mughal army and made inroads into some of the
Maratha territory, seizing the city of Pune and establishing his residence at Shivaji's
palace of Lal Mahal.
In April 1663, Shivaji launched a surprise attack on Shaista Khan in Pune;
accounts of the story differ in the popular imagination, but there is some agreement that
Shivaji and band of some 200 followers infiltrated Pune, using a wedding procession as
cover. They overcame the palace guards, breached the wall, and entered Shaista
Khan's quarters, killing those they found there. Shaista Khan escaped, losing his thumb
in the melee, but one of his sons and other members of his household were killed. The
Khan took refuge with the Moghul forces outside of Pune, and Aurangzeb punished him
for this embarrassment with a transfer to Bengal.
An Uzbek general, Kartalab Khan, was sent by Shaista Khan to attack and
reduce the number of forts under Shivaji's control in the Konkan region on 3 February
1661. The 30,000 Mughal troops left Pune, marching through the back-country in an
attempt to surprise the Marathas. In the Battle of Umberkhind, Shivaji's forces
ambushed and enveloped them with infantry and light cavalry in the dense forests of
Umber Khind pass near present-day Pen. In retaliation for Shaista Khan's attacks, and
to replenish his now-depleted treasury, in 1664 Shivaji sacked the city of Surat, a
wealthy Mughal trading centre.
Treaty of Purandar
Aurangzeb was enraged and sent Mirza Raja Jai Singh I with an army numbering
around 150,000 to defeat Shivaji. Jai Singh's forces made significant gains and
P a g e
captured many Maratha forts, forcing Shivaji to come to terms with Aurangzeb rather
than lose more forts and men.
In the Treaty of Purandar, signed between Shivaji and Jai Singh on 11 June
1665, Shivaji agreed to give up 23 of his forts and pay compensation of 400,000 rupees
to the Mughals. He also agreed to let his son Sambhaji become a Mughal sardar, serve
the Mughal court of Aurangzeb and fight alongside the Mughals against Bijapur.[citation
needed] One of Shivaji's commander, Netaji Palkar joined the Mughals, was rewarded
very well for his bravery, converted to Islam, changed his name to Quli Mohammed
Khan in 1666 and was sent to the Afghan frontier to fight the restive tribes. He returned
to Shivaji's service in 1676 after ten years with the Mughals, and was accepted back as
a Hindu on Shivaji's advice.
Arrest in Agra and escape
In 1666, Aurangzeb invited Shivaji to Agra, along with his nine-year-old son
Sambhaji. Aurangzeb's plan was to send Shivaji to Kandahar, now in Afghanistan, to
consolidate the Mughal empire's northwestern frontier. However, in the court, on 12 May
1666, Aurangzeb made Shivaji stand behind mansabdārs (military commanders) of his
court. Shivaji took offence and stormed out of court, and was promptly placed under
house arrest under the watch of Faulad Khan, Kotwal of Agra.
Shivaji feigned severe illness and requested to send most of his contingent back
to the Deccan, thereby ensuring the safety of his army and deceiving Aurangzeb.
Thereafter, on his request, he was allowed to send daily shipments of sweets and gifts
to saints, fakirs, and temples in Agra as offerings for his health. After several days and
weeks of sending out boxes containing sweets, Sambhaji, being a child had no
restrictions and was sent out of the prison camp and Shivaji, disguised as labourer
carrying sweet basket escaped on 17 August 1666, according to the Mughal
documents. Shivaji and his son fled to the Deccan disguised as sadhus (holy men).
After the escape, rumours of Sambhaji's death were intentionally spread by Shivaji
himself in order to deceive the Mughals and to protect Sambhaji. Recent research has
proposed that Shivaji simply disguised himself as a Brahmin priest after performance of
religious rites at the haveli grounds on 22 July 1666, and escaped by mingling within the
departing priestly entourage of Pandit Kavindra Paramananda. Sambhaji was removed
from Agra and taken to Mathura later by Shivaji's trusted men.
After Shivaji's escape, hostilities ebbed and a treaty lasted until the end of 1670,
when Shivaji launched a major offensive against Mughals, and in a span of four months
recovered a major portion of the territories surrendered to Mughals. During this phase,
Tanaji Malusare won the fort of Sinhgad in the Battle of Sinhagad on 4 Feb 1670, dying
in the process. Shivaji sacked Surat for second time in 1670; while he was returning
from Surat, Mughals under Daud Khan tried to intercept him, but were defeated in the
Battle of Vani-Dindori near present-day Nashik.
P a g e
In October 1670, Shivaji sent his forces to harass the British at Bombay; as they
had refused to sell him war material, his forces blocked Bombay's woodcutting parties.
In September 1671, Shivaji sent an ambassador to Bombay, again seeking material,
this time for the fight against Danda-Rajpuri; the British had misgivings of the
advantages Shivaji would gain from this conquest, but also did not want to lose any
chance of receiving compensation for his looting their factories at Rajapur. The British
sent Lieutenant Stephen Ustick to treat with Shivaji, but negotiations failed over the
issue of the Rajapur indemnity. Numerous exchanges of envoys followed over the
coming years, with some agreement as to the arms issues in 1674, but Shivaji was
never to pay the Rajpur indemnity before his death, and the factory there dissolved at
the end of 1682.
In 1674, Prataprao Gujar, the then commander-in chief of the Maratha forces,
was sent to push back the invading force led by the Adilshahi general, Bahlol Khan.
Prataprao's forces defeated and captured the opposing general in the battle, after
cutting-off their water supply by encircling a strategic lake, which prompted Bahlol Khan
to sue for peace. In spite of Shivaji's specific warnings against doing so Prataprao
released Bahlol Khan, who started preparing for a fresh invasion.
Shivaji sent a displeased letter to Prataprao, refusing him audience until Bahlol
Khan was re-captured. In the ensuing days, Shivaji learnt of Bahlol Khan having
camped with 15,000 force at Nesari near Kolhapur. Not wanting to risk losing his much
smaller Maratha force entirely, Prataprao and six of his sardars attacked in a suicide
mission, buying time for Anandrao Mohite to withdraw the remainder of the army to
safety.[verification needed] The Marathas avenged the death of Prataprao by
defeating Bahlol Khan and capturing his jagir (fiefdom) under the leadership of Anaji
and Hambirao Mohite. Shivaji was deeply grieved on hearing of Prataprao's death; he
arranged for the marriage of his second son, Rajaram, to Prataprao's daughter.
Anandrao Mohite became Hambirrao Mohite, the new sarnaubat (commander-in-chief
of the Maratha forces). Raigad Fort was newly builtby Hiroji Indulkar as a capital of
nascent Maratha kingdom.
Shivaji had acquired extensive lands and wealth through his campaigns, but
lacking a formal title he was still technically a Mughal zamindar or the son of an
Adilshahi jagirdar, with no legal basis to rule his de facto domain. A kingly title could
address this, and also prevent any challenges by other Maratha leaders, to whom he
was technically equal; it would also provide the Hindu Marathas with a fellow Hindu
sovereign in a region otherwise ruled by Muslims.
P a g e
Shivaji was crowned king of the Marathas in a lavish ceremony at Raigad on 6
June 1674. In the Hindu calendar it was on the 13th day (trayodashi) of the first fortnight
of the month of Jyeshtha in the year 1596. Pandit Gaga Bhatt officiated, holding a gold
vessel filled with the seven sacred waters of the rivers Yamuna, Indus, Ganges,
Godavari, Krishna and Kaveri over Shivaji's head, and chanted the coronation mantras.
After the ablution, Shivaji bowed before Jijabai and touched her feet. Nearly fifty
thousand people gathered at Raigad for the ceremonies. Shivaji was bestowed with the
sacred thread jaanva, with the Vedas and was bathed in an abhisheka. Shivaji was
entitled Shakakarta ("founder of an era") and Kshatriya Kulavantas ("head of
Kshatriyas"), and Chhatrapati ("paramount sovereign"). He also took the title of
His mother Jijabai died on 18 June 1674, within a few days of the coronation.
Considering this a bad omen, a second coronation was carried out 24 September 1674,
this time according to the Bengali school of Tantricism and presided over by Nischal
The state as Shivaji founded it was a Maratha kingdom comprising about 4.1% of
the subcontinent at the time he died, but over time it was to increase in size and
heterogeneity, and by the time of the Peshwas in the early 18th century the Marathas
were dominant across the northern and central regions of the Indian subcontinent.
Conquest in Southern India
Beginning in 1674, the Marathas undertook an aggressive campaign, raiding
Khandesh (October), capturing Bijapuri Ponda (April 1675), Karwar (mid-year), and
Kolhapur (July). In November the Maratha navy skirmished with the
Siddis of Janjira, and in early 1676 Peshwa Pingale, en route to Surat, engaged the
Raja of Ramnagar in battle. Shivaji raided Athani in March 1676, and
by year's end besieged Belgaum and Vayem Rayim in modern-day northern Karnataka.
At the end of 1676, Shivaji launched a wave of conquests in southern India, with a
massive force of 30,000 cavalry and 20,000 infantry. He captured the Adilshahi forts at
Vellore and Gingee, in modern-day Tamil Nadu. In the run-up to this expedition Shivaji
appealed to a sense of Deccani patriotism, that the "Deccan" or Southern India was a
homeland that should be protected from outsiders., His appeal was somewhat
successful and he entered into a treaty with the Qutubshah of the Golconda sultanate
that covered the eastern Deccan. Shivají's conquests in the south proved quite crucial
during future wars; Gingee served as Maratha capital for nine years during the Maratha
War of Independence.
Shivaji intended to reconcile with his half-brother Venkoji (Ekoji I), Shahaji's son
by his second wife, Tukabai (née Mohite), who ruled Thanjavur (Tanjore) after Shahaji.
The initially promising negotiations were unsuccessful, so whilst returning to Raigad
Shivaji defeated his half-brother's army on 26 November 1677 and seized most of his
possessions in the Mysore plateau. Venkoji's wife Dipa Bai, whom Shivaji deeply
respected, took up new negotiations with Shivaji, and also convinced her husband to
P a g e
distance himself from Muslim advisors. In the end Shivaji consented to turn over to her
and her female descendants many of the properties he had seized, with Venkoji
consenting to a number of conditions for the proper administration of the territories and
maintenance of Shivaji's future Memorial (Samadhi).
The question of Shivaji's heir-apparent was complicated by the misbehaviour of
his eldest son Sambhaji, who was irresponsible and "addicted to sensual pleasures."
Unable to curb this, Shivaji confined his son to Panhala in 1678, only to have the prince
escape with his wife and defect to the Mughals for a year. Sambhaji then returned
home, unrepentant, and was again confined to Panhala.
In late March 1680, Shivaji fell ill with fever and dysentery, dying around 3
1680 at the age of 52, on the eve of Hanuman Jayanti. Rumours followed his death,
with Muslims opining he had died of a curse from Jan Muhammad of Jalna, and some
Marathas whispering that his second wife, Soyarabai, had poisoned him so that his
crown might pass to her 10-year-old son Rajaram.
After Shivaji's death, the widowed Soyarabai made plans with various ministers
of the administration to crown her son Rajaram rather than her prodigal stepson
Sambhaji. On 21 April 1680, ten-year-old Rajaram was installed on the throne.
However, Sambhaji took possession of the Raigad Fort after killing the commander, and
on 18 June acquired control of Raigad, and formally ascended the throne on 20
July. Rajaram, his wife Janki Bai, and mother Soyrabai were imprisoned, and
Soyrabai executed on charges of conspiracy that October.
Shivaji died in 1680, leaving behind a state always at odds with the Mughals.
Soon after Shivaji's death, the Mughals attempted to invade it, but could not subdue the
Marathas and it resulted in a war of 27 years from 1681 to 1707 ending in the defeat for
Shahu, a grandson of Shivaji was kept prisoner by Aurangzeb during the War of
27 years. After the latter's death, his successor released Shahu. After a brief power
struggle over succession with his aunt Tarabai, Shahu ruled the Maratha Empire from
1707 to 1749. During this period, he appointed Balaji Vishwanath Bhat and later his
descendants as the Peshwas or the prime ministers of the Maratha Empire. After the
death of the Mughal Emperor Aurangzeb, the empire expanded greatly under the rule of
the Peshwas. The empire at its peak stretched from Tamil Nadu in the south, to
Peshawar (modern-day Khyber Pakhtunkhwa) in the north, and Bengal and Andaman
Islands in the east. In 1761, the Maratha army lost the Third Battle of Panipat to Ahmed
Shah Abdali of the Afghan Durrani Empire which halted their imperial expansion in
P a g e
North western India. Ten years after Panipat, young Madhavrao Peshwa reinstated the
Maratha authority over North India.
In a bid to effectively manage the large empire, he gave semi-autonomy to the
strongest of the knights, which created a confederacy of Maratha states. They became
known as Gaekwads of Baroda, the Holkars of Indore and Malwa, the Scindias of
Gwalior and Ujjain, Bhonsales of Nagpur. In 1775, the British East India Company
intervened in a succession struggle in Pune, which became the First Anglo-Maratha
War. The Marathas remained the preeminent power in India until their defeat in the
Second and Third Anglo-Maratha wars (1805
1818), which left the British East India
Company in control of most of India.
Promotion of Marathi and Sanskrit
Though Persian was a common courtly language in the region, Shivaji replaced it
with Marathi in his own court, and emphasised Hindu political and courtly traditions. The
house of Shivaji was well acquainted with Sanskrit and promoted the language; his
father Shahaji had supported scholars such as Jayram Pindye, who prepared Shivaji's
seal. Shivaji continued this Sanskrit promotion, giving his forts names such as
Sindhudurg, Prachandgarh, and Suvarndurg. He named the Ashta Pradhan (council of
ministers) as per Sanskrit nomenclature with terms such as nyayadhish, and senapat,
and commissioned the political treatise Rajyavyavahar Kosh. His rajpurohit, Keshav
Pandit, was himself a Sanskrit scholar and poet.
Shivaji was a devout Hindu, but respected all religions within the region. Shivaji
had great respect for other contemporary saints, especially Samarth Ramdas, to whom
he gave the fort of Parali, later renamed as 'Sajjangad'. Among the various poems
written on Shivaji, Ramdas' Shivastuti ("Praise of King Shivaji") is the most famous.
Shivaji's son Sambhaji later built a samadhi for Ramdas Swami on Sajjangad upon the
latter's death. Samarth Ramdas had also written a letter to Sambhaji guiding him on
what to do and what not to do after death of Shivaji.
Shivaji allowed his subjects freedom of religion and opposed forced conversion.
Shivaji also promulgated other enlightened values, and condemned slavery. He applied
a humane and liberal policy to the women of his state. Kafi Khan, the Mughal historian
and Francois Bernier, a French traveller, spoke highly of his religious policy. He also
brought converts like Netaji Palkar and Bajaji back into Hinduism.
P a g e
Shivaji's contemporary, the poet Kavi Bhushan stated: Had not there been
Shivaji, Kashi would have lost its culture, Mathura would have been turned into a
mosque and all would have been circumcised‖.
Though many of Shivaji's enemy states were Muslim, he treated Muslims under
his rule with tolerance for their religion. Shivaji's sentiments of inclusivity and tolerance
of other religions can be seen in an admonishing letter to Aurangzeb, in which he wrote:
Verily, Islam and Hinduism are terms of contrast. They are used by the true
Divine Painter for blending the colours and filling in the outlines. If it is a mosque, the
call to prayer is chanted in remembrance of Him. If it is a temple, the bells are rung in
yearning for Him alone.
Shivaji had several noteworthy Muslim soldiers, especially in his Navy. Ibrahim
Khan and Daulat Khan (both were African descendants) were prominent in the navy;
and Siddi Ibrahim was chief of artillery. Muslim soldiers were known for their superior
skills in naval and artillery combat skills.
Shivaji demonstrated great skill in creating his military organisation, which lasted
till the demise of the Maratha empire. He also built a powerful navy. Maynak Bhandari
was one of the first chiefs of the Maratha Navy under Shivaji, and helped in both
building the Maratha Navy and safeguarding the coastline of the emerging Maratha
Empire. He built new forts like Sindhudurg and strengthened old ones like Vijaydurg on
the west coast. The Maratha navy held its own against the British,
Portuguese and Dutch. He was one of the pioneers of commando actions, then known
as ganimi kava (Marathi: "enemy trickery") His Mavala army's war cry was Har Har
Mahadev ( Har and Mahadev being common names of Hindu God Shiva). Shivaji was
responsible for many significant changes in military organisation:
A standing army belonging to the state, called paga.
All war horses belonged to the state; responsibility for their upkeep
rested on the Sovereign.
Creation of part-time soldiers from peasants who worked for eight
months in their fields and supported four months in war for which
they were paid.
Highly mobile and light infantry and cavalry excelling in commando
The introduction of a centralized intelligence department; Bahirjee
Naik was the foremost spy who provided Shivaji with enemy
information in all of Shivaji's campaigns.
A potent and effective navy.
Download 5.23 Mb.
Do'stlaringiz bilan baham:
ma'muriyatiga murojaat qiling | <urn:uuid:42dbdf50-95a9-47b9-9a29-6e4731ddb4db> | {
"dump": "CC-MAIN-2021-10",
"url": "https://fayllar.org/medieval-and-early-modern-periods-1206.html?page=27",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178385378.96/warc/CC-MAIN-20210308143535-20210308173535-00631.warc.gz",
"language": "en",
"language_score": 0.9663325548171997,
"token_count": 4978,
"score": 3.03125,
"int_score": 3
} |
Social investment, also known as socially responsible investment (SRI) is where investors align their investment strategies with social and/or environmental values.
In other words, social investing involves evaluating an investment opportunity with reference to social and environmental factors as well as their growth/profit potential. The principal aim of socially responsible investment is to avoid companies which have negative social and/or environmental impacts.
Social investors often use the environmental, social and governance (ESG) factors as the core framework for their investment analysis and decision-making.
However, there are many definitions of what is considered an acceptable framework for social investment. Each investor will have their own understanding of what it means to them (mission investing, green investing, ESG-driven investing, impact investing etc), based on their own take on the notion of social responsibility.
A social investor is, therefore, anyone (individual or institution) who tries to align their investment strategies with their own idea of social responsibility. They are still motivated by the prospect of strong financial returns, but in their analysis of investment opportunities, they seek to avoid companies which have negative social and/or environmental impacts. For example: a social investor may avoid investments in companies that sell alcohol, tobacco, or guns. This process of ‘negative screening’ which informs the analysis of social investors, differentiates them from ‘impact investors’ who aim to invest in companies which have an active positive impact on the world.
It follows, therefore, that a social entrepreneur is someone who seeks to apply their entrepreneurial skill set to creating practical, innovative and sustainable solutions to social/environmental problems. Their aim is to enact large-scale social change for the benefit of society or specific segments of it.
You have passed the test and you may continue your with your investment. | <urn:uuid:d36386af-7c25-4c1b-8efd-b0e9c5931947> | {
"dump": "CC-MAIN-2019-39",
"url": "https://www.seedtribe.com/social-investment",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573570.6/warc/CC-MAIN-20190919183843-20190919205843-00509.warc.gz",
"language": "en",
"language_score": 0.9611680507659912,
"token_count": 364,
"score": 2.53125,
"int_score": 3
} |
By Nola Thury
A name can tell a story, make a claim, and reflect a relationship. Beyond that, the way we refer to a place dictates the people and experiences welcomed into its space.
For centuries, people in the United States have contested the naming of places, from cities to streams to national parks. Renaming and restoring Indigenous place names involves a recalibration of how we think about history as well as the future. Locally, movements to remove the inappropriate names of “Mount Rainier” and “Pierce County” are gaining traction.
Professor of North American History, Doug Sackman, described the history and motives behind the mountain’s name. In the late 1700s, the British explorer George Vancouver sailed around what is now referred to as the “Puget Sound,” named for his Lieutenant, Peter Puget. According to Sackman, Vancouver was searching for a passage through the continent. He went around naming anything he wanted after his friends– in 1792 he named “Mount Rainier” after another friend of his, Peter Rainier, an admiral in the British Navy who fought against the United States in the Revolutionary War. Sackman said, “So he’s kind of a Johnny Appleseed of nomenclature around here, bestowing imperial names. And he’s literally networking when he chooses a name. ‘Big mountain, gonna name it after my well-positioned friend.’”
Sackman said of the naming, “It exposes a deeper arrogance really. Vancouver is lost, basically. He’s looking for something, he talks to the Puyallup people. They tell him he’s not gonna find what he’s looking for, which is a water route across North America, the Northwest passage. And then he decides that he gets to name everything around.”
The Puyallup Tribe has always contested Vancouver’s naming of the mountain and recently renewed discussions on formally recommending an alternative name, according to KIRO7 News. Members of the Tribe told The Trail that they are waiting until the Council’s internal process concludes to comment on the issue.
To the Puyallup peoples, the mountain is called təqʷuʔməʔ (pronounced “Taquoma.”). Brandon Reynon, the historic preservation officer for the Puyallup Tribe, told KIRO7 News that the Twulshootseed name for the mountain translates as ‘mother of all waters’. Sackman thinks this name “reflects something ecologically and socially real about the mountain. The name in that sense reflects a relationship, rather than something more superficial.” To Sackman, restoring the name of the mountain is “highly, highly overdue. Naming it after Peter Rainier is a toponymic abomination in my opinion.”
Another local effort is underway to rename “Pierce County.” The name of the 14th president of the US, Franklin Pierce, is found all around Tacoma. Sackman described Franklin Pierce as “basically an anti-abolition president.” During his Presidency from 1853 to 1857, Pierce “enforces the fugitive slave law, which makes all parts of the United States a terror to live in if you are African American” Sackman said. Sackman affirms that “Pierce as a president is largely forgotten. But he stands on the side of white supremacy as the national policy in this country.”
One advocate for renaming Pierce County runs a Twitter account called @TahomaCountyNow. “A county name pays tribute to its namesake – the person, place, or thing it’s named after. Pierce County is named after — and honoring — a president who supported retaining the institution of slavery,” they said. The user proposes “Tahoma” (one anglicized version of təqʷuʔməʔ) as an alternative county name.
“Tahoma County, to me, would signify respect for Salish peoples, the natural environment, and all the people who live here. It could change the self-image of the county from one that accepts what it can get to one that demands progress – environmentally, socially, culturally, and economically,” they said.
Washington State set a precedent for this in 2005 when they reattributed King County’s name from Rufus King, Pierce’s slave-owning Vice President, to the more befitting Martin Luther King Jr. The name change brought to Sackman’s mind Dr. King’s quote “the arc of the moral universe is long, but it bends toward justice.” Sackman pontificated that the name change might signify this “bending of the arc of the moral universe” that Dr. King imagined. Sackman said, “I think if we want to update our history and a sense of who we are and where we might be going, take the lead from what they did in King county.”
To @TacomaCountyNow, renaming Pierce County might trigger further changes in our community. “It might also restart a serious effort to restore the name of Mount Rainier to Tahoma or another historic native name. But renaming a county is easier than renaming a mountain.”
Doug Sackman said “Naming can reflect values. It can exert a kind of power.” Renaming and restoring Indigenous place names on its own won’t make a place more inclusive, however, some see it as a step in the right direction. Restoring the name of təqʷuʔməʔ doesn’t atone for the fact that “Mount Ranier National Park” is on stolen land. But perhaps, if Tahoma can reckon with the history of slavery and the genocide of Native Americans through names, it can better address the legacies of these histories for current residents. | <urn:uuid:4e4ac9e5-0873-46da-b0c0-8c07d6a73fa0> | {
"dump": "CC-MAIN-2023-23",
"url": "https://trail.pugetsound.edu/?p=17725",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647614.56/warc/CC-MAIN-20230601042457-20230601072457-00281.warc.gz",
"language": "en",
"language_score": 0.9391347169876099,
"token_count": 1281,
"score": 3.359375,
"int_score": 3
} |
Positioning is central to a wide range of industrial applications, from the placement of electronic com-ponents on a printed-circuit board to labeling and packaging operations.
Applications Engineering Manager
EDITED BY Miles Budimir
Servomotors, on the other hand, avoid this problem by incorporating a feedback loop for position control. However, because servomotors are often unstable, they require gain control. A relatively high gain gives quick response to position deviations but often generates overshoot as well. Lowering the gain reduces overshoot but increases response time. Gain settings are therefore adjusted to strike a balance between response time and overshoot. Also, gain settings add a delay to the total move time.
But the AlphaStep motor/drive combination from Oriental Motor melds the best of both motor types. It combines the quick response and high torque of stepper motors with the feedback power of servomotors to compensate for missed steps. It uses a high pole-count stepper motor and incorporates a resolver for position feedback. A control algorithm makes corrections for position deviations on the fly and doesn't miss steps. Also, a smaller NdFeB magnet is used in place of AlNiCo because neodymnium has a much higher flux density while producing the same amount of torque.
Most stepper motor rotors have 50 teeth, with an angle between each tooth of 7.2°. The stator has eight pole pieces; four set 90° apart make up one phase and the other four make up the other phase. When phases are energized, a torque vector develops and the magnetized rotor tooth moves to align with the torque vector. A pulse input to the driver energizes some phases and deenergizes others, generating another torque vector. The rotor then moves a quarter of a tooth pitch, or 1.8°, to align with this new torque vector. The process continues as each successive pulse is input to the driver. Thus, each phase is contributing a sineshaped torque/displacement curve with a period of 7.2°. Maximum torque is produced when the rotor tooth is 1.8° to the left or right of the stable equilibrium point. This is called full stepping and it involves an eight-step electrical sequence.
Microstepping involves more torque vectors. Instead of fully energizing a phase or leaving it off, digital-to-analog converters are used so that the phases are partially on or partially off, dividing each 1.8°step into many smaller steps. Some microstepping systems are capable of a 250-step electrical sequence producing up to 125,000 steps/rev. The main advantage to microstepping is higher resolution and lower vibration.
One limitation of stepper motors is that they are designed for open-loop control. The driver is given a certain number of pulses to move the motor. However, excessive load or high vibration can cause the motor to lose synchronism with the input pulses and miss steps. A stepper motor misses steps because the rotor has to move so much that the next tooth, or some other tooth, moves to align with the torque vector. When an external force or vibration is encountered, one or several rotor teeth can be skipped in either direction. Because the torque/displacement curve is 7.2°, the rotor has to be displaced a little more than 3.6° in either direction. The rotor will then move forward or backward, losing synchronism.
For position verification, encoders can be placed on the back shaft of the motor. One problem with this is that the position is often corrected at the end of a move after the encoder counter has been compared to the input pulse counter. If the motor misses steps, a correction introduces delays and additional steps.
The AlphaStep incorporates a resolver for position feedback to compensate for missed steps. A resolver is used instead of a digital encoder primarily because it is a relatively simple construction with no internal circuitry or fragile glass masks. The variable reluctance resolver is a two-phase device.The output consists of two sine waves 90° out of phase. By sending the sine waves through a resolver-to-digital converter, the motor position is known at all times. Once the data has been digitized, the information increments or decrements a rotor position counter. Resolvers are also more suitable for hot environments and applications with vibration. Furthermore, they are less susceptible to electrical noise and require less wiring.
As the motor steps, the input pulses and resolver counts are fed into a pulse counter and a position counter, respectively. The two are constantly compared for deviations. If there are no deviations, the motor phases are normally excited. This is called the open-loop mode. However, if any deviation greater than 1.8° is detected, the unit goes into the closed-loop mode. In the closed-loop mode, the torque vector at the 1.8° displacement is energized, producing the maximum amount of torque to bring the rotor back into synchronization. If the motor has missed several steps, each successive torque vector at the 1.8° displacement is energized, until the deviation is brought to within 1.8°. At that point, the motor returns to the open-loop mode and steps normally.
After the final step, the rotor tooth returns to align with the torque vector and the accuracy becomes +5 arc min (0.083°). The only way for the motor to miss steps is to be in the closed-loop mode for more than 5 sec. In other words, if an excessive load is encountered for more than 5 sec, the driver will fault and send out an alarm signal.
The motor also incorporates a jerklimiting filter into the driver. Jerk is the derivative of acceleration and causes vibration at velocity transitions. Limiting jerk with a filter produces smoother motion. However, adding the filter does increase move time. The ideal jerk limiting time is one cycle of the lowest resonance frequency, so it is typically around 5 to 10 msec. Therefore, the move will be that much longer, but repeatable.
The AlphaStep incorporates all of this functionality into the drive and not the pulse generator. Typical closed-loop stepper-motor systems include a complicated controller or pulse generator. The controller senses the encoder or resolver feedback and does the comparing. If the motor has missed steps, it is the function of the controller to make up the difference. It is also a function of the pulse generator to send out the pulses at a specific time to limit jerk. Because all of this is included in the AlphaStep drive, no complicated frontend system is required. Pulses can be generated by a simple pulse generator, a PLC, a computer board, or logic chips. | <urn:uuid:acc5e2e8-3dcc-45bf-8b1a-262abcc52367> | {
"dump": "CC-MAIN-2016-26",
"url": "http://machinedesign.com/archive/stepper-motor-closes-loop-around-tough-moves",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396147.66/warc/CC-MAIN-20160624154956-00040-ip-10-164-35-72.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9145868420600891,
"token_count": 1387,
"score": 3.109375,
"int_score": 3
} |
Your email address will be used for Wildy’s marketing materials only. We will never give your email address to any third party.
Special Discounts for Pupils, Newly Called & Students
Browse Secondhand Online
The new edition of Farber, Eskridge, Frickey and Schacter's Cases and Materials on Constitutional Law exploits the two most exciting developments in Constitutional Law teaching in the last thirty years: the judiciary's dramatic engagement with social movements and key political debates, and academic and judicial deployment of original meaning as a central methodology. Thus, the new edition presents a most systematic introduction of original meaning methodology for law students, starting with the evolution of “originalism” in response to the academic debates over Brown v. Board of Education, and continuing with in-depth examination of what original meaning teaches us about the Fourteenth Amendment, as well as the First and Second Amendments, the Commerce Clause and other authorizations for congressional regulation, the federalist structure of the Constitution, and the separation of powers.
The new edition provides in-depth treatment of the most exciting issues in constitutional law today—including the validity of affirmative action, exemplified by state discriminations based upon sexuality or gender; the imperial First Amendment, threatening to impose a new Lochner-type era of judicial review of economic legislation; the increasingly prominent federalism limitations on congressional and state authority, powerfully illustrated by the ObamaCare Case and the Arizona Immigration Case; and the limitations on the imperial presidency posed by the War on Terror Cases. | <urn:uuid:8bd9254d-2504-4c7e-97d8-7d3c506c4243> | {
"dump": "CC-MAIN-2016-44",
"url": "http://www.wildy.com/isbn/9780314278302/cases-and-materials-on-constitutional-law-themes-for-the-constitution-s-third-century-5th-ed-west-academic-publishing",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988717954.1/warc/CC-MAIN-20161020183837-00505-ip-10-171-6-4.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9172874689102173,
"token_count": 308,
"score": 2.59375,
"int_score": 3
} |
Science behind the perfect roast potato: Slice the spud at 30-degree angles to increase its surface area and make it extra crispy, say researchers
- Cutting the spud diagonally increases surface area by 65%, researchers said
- Researchers found the 'edge cut' was tastier, crunchier and looked better
- The traditional cut has long been touted by chefs such as Heston Blumenthal
16 January 2018, MailOnline
To read the full story please click here. | <urn:uuid:d769e770-a17f-411e-8cd3-48442af93fee> | {
"dump": "CC-MAIN-2021-17",
"url": "https://www.samuelwhitbread.org.uk/news/?pid=34&nid=1&storyid=5",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038060927.2/warc/CC-MAIN-20210411030031-20210411060031-00488.warc.gz",
"language": "en",
"language_score": 0.952447772026062,
"token_count": 98,
"score": 2.53125,
"int_score": 3
} |
History of Public Safety
In 1975, Escanaba embarked on developing a fully integrated public safety operation where each officer was cross-trained in police and fire work. The police and fire departments were combined to create one public safety department headed by a Public Safety Director.
A great deal of work was done with the cooperation of fire and police employees to make this concept work. Mr. Gil Truax, who had retired from the Detroit Police Department, became the Public Safety Director and was charged with the responsibility of developing the newly formed department.
Police and fire personnel were offered the option of receiving cross-training or remaining with their original area of responsibility. Those who took the dual training were offered incentive pay referred to as "public safety pay". Most officers opted for the cross-training and served as Public Safety Officers, or PSOs.
All of these original officers have since been retired after having served the residents of Escanaba for twenty-five to more than thirty years.
Now all new sworn members of the department are highly trained in both police and fire fighting. | <urn:uuid:cb7d54bd-bf59-4a7a-ad58-0cb5c1e35c6f> | {
"dump": "CC-MAIN-2018-22",
"url": "http://www.escanaba.org/new-history",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794863684.0/warc/CC-MAIN-20180520190018-20180520210018-00372.warc.gz",
"language": "en",
"language_score": 0.9902603626251221,
"token_count": 216,
"score": 2.734375,
"int_score": 3
} |
The 2008 financial crisis and its aftermath introduced Americans to a new world of financial jargon and acronyms.
•Subprime: That was the banking industry's designation for mortgages made to borrowers with shaky credit. As the housing market boomed in the 2000s, lenders were willing to make increasingly risky mortgages and then sell them to Wall Street.
Soaring defaults on billions of dollars in subprime loans were an underlying cause of the financial crisis.
•Contained: A word used repeatedly by
It was wishful thinking.
•TBTF: Too big to fail is the idea that a financial institution or other corporate entity is so large, its collapse could threaten the entire financial system or economy.
The term is said to have been popularized by Rep. Stewart McKinney in 1984 during a Capitol Hill hearing on the government's rescue of giant bank Continental Illinois. But it became an indelible part of the American lexicon with the 2008 crisis, as the government stepped in to save not only the biggest U.S. banks but also
•TARP: The Troubled Asset Relief Program was conceived in September 2008 as a Treasury fund that would buy distressed assets such as bad mortgages from banks, with the hope of halting the meltdown of those assets.
But TARP's mission was almost immediately shifted to making capital investments in banks to bolster their net worth. The goal was to give banks more wherewithal to lend money in a credit-starved economy. Congress later capped TARP at $475 billion. Most of the aid has since been paid back, but debate still rages as to whether the program made things better or worse.
•ZIRP: Zero-interest-rate policy. That's what you have when central banks reduce their benchmark short-term rate to zero or just above it, and therefore lose the biggest tool they normally have to boost the economy — cutting rates further.
The Bank of Japan was the first to go to ZIRP in 1999. The Fed followed in late 2008. The
•QE: Quantitative easing is what central banks resort to once their usual tools of economic stimulus are exhausted. Under QE, a bank creates money from thin air to buy assets such as bonds from banks and other investors. The goal is to shovel money into the economy to make credit more available and cheaper, such as by pushing bond interest rates lower.
The Fed adopted its first QE program in November 2008, then followed that with another round beginning in November 2010. A third round began in September 2012 and was expanded three months later. All told the Fed has purchased about $2.5 trillion in bonds since late 2008.
•The 99%: This slogan was adopted by the populist Occupy movement that began in September 2011. It was derived from the criticism of a concentration of wealth among the top 1% of income earners. | <urn:uuid:f2ce3265-4627-4950-bc36-a9849f815566> | {
"dump": "CC-MAIN-2018-22",
"url": "http://www.latimes.com/business/la-fi-0915-crisis-side-20130915-story.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794864798.12/warc/CC-MAIN-20180522151159-20180522171159-00294.warc.gz",
"language": "en",
"language_score": 0.9765327572822571,
"token_count": 581,
"score": 2.9375,
"int_score": 3
} |
What to do with drug waste
What to do with drug waste
By: Patrick Moore, OpEd Contributor
April 2, 2009
While Americans are doing everything they can in these uncertain times to save money and reduce costs, environmental activists have been busy pushing an agenda that is likely to raise the cost of medical care.
Across the U.S., environmental activists are raising alarm over the presence of trace amounts of pharmaceuticals in the water supply even though the medicines are found at extremely low levels.
In fact, the trace amounts are at such low levels that they are measured in parts per trillion – that’s roughly equivalent to one drop of water in 20 Olympic-sized swimming pools.
Nothing in the scientific literature suggests such low levels are in the least bit harmful to human health or the environment.
Yet at the worst possible time, these activists are calling for elaborate and expensive drug take-back programs that will likely result in increased medical costs that Americans can’t afford – and with no added benefit to human health or the environment.
So what’s the best way to safely dispose of medications and protect the environment without resorting to expensive take back programs?
The pharmaceuticals industry started research on the issue a decade ago by looking at all the ways disposed medication might enter into the environment through surface waters.
One possible pathway they looked at was consumers disposing of unused medication in household trash, where it would then be sent to municipal solid waste landfills. What they found is important:
First, medication in surface waters was found only at trace levels. These levels pose no risk to human health.
Second, the study emphasized the benefit of disposing of unused medicine in the regular household trash because it can then be held securely in landfills and virtually none of the medicine ends up in surface water.
The study found that if all unused medicines were disposed of in household trash – instead of being flushed down the toilet – the trace amounts of medicine being found in the environment would decline even further.
Third, the trace amounts of medication found in surface water as a result of medication being flushed down the toilet can be stopped by better educating the public.
The evidence clearly shows that disposing of waste pharmaceuticals in the household trash is a safe and effective means of disposal.
In its simplest form, the findings point to some easy-to-remember do’s and don’ts:
Do: Discard your unused medications in the municipal waste collection system. It will be processed safely under the current system, just as it should be.
Don’t: In most cases, flush unused medications down the toilet and into the sewer system . While it is true a very small amount of un-metabolized medication will likely pass through patients into municipal sewers, these are safe levels and drug take-back programs would have zero impact in this area.
In these difficult economic times, the last thing America needs is complicated and expensive drug take back programs that are likely to contribute to rising healthcare costs.
Instead, let’s keep things simple: Throw your unused prescriptions in the trash and don’t flush them down the toilet.
Dr. Patrick Moore is a co-founder and former leader of Greenpeace, and chair and chief scientist of Greenspirit Strategies Ltd. at www.greenspiritstrategies.com | <urn:uuid:a8f5fa54-da40-443f-9291-aa3bef5e2a16> | {
"dump": "CC-MAIN-2021-43",
"url": "http://greenspiritstrategies.com/what-to-do-with-drug-waste/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585518.54/warc/CC-MAIN-20211022181017-20211022211017-00364.warc.gz",
"language": "en",
"language_score": 0.9462771415710449,
"token_count": 690,
"score": 2.6875,
"int_score": 3
} |
|What animal made these tracks?|
If we look at an animal's tracks we can learn many things about it.
- How large is it?
- Is it heavy or light?
- Was it moving fast or slow?
- How was it moving?
Mammals in Michigan move on the ground in one of four ways: walking, waddling, hopping, or bounding.
Walkers typically have long legs and narrow bodies. Their footprints are usually round or oval shaped and always have an even number of toes. Their tracks usually form a fairly straight line with front and rear prints staggered from one side to the other. Examples of walkers include deer, foxes, bobcats, etc.
Waddlers usually have wide bodies and shorter legs. Their feet are generally wide at the heal and get wider toward the toes forming a trapezoid shape. Their tracks are spread wider apart than those of walkers and would straddle a straight line rather than being on it. Like a walker, waddlers' footprints are also staggered. Some examples of waddlers include black bear, opossum, and raccoon.
Hoppers move by pushing off with their long springy hind feet. When they are moving fast all four feet are in the air at the same time. They land front feet first and their back feet will actually land in front of the position of their front feet. When following their tracks their smaller front prints will be behind their paired larger rear footprints. Their feet are generally shaped like long skinny triangles. Some examples of hoppers include rabbits, squirrels, and mice.
The mammals in Mid-Michigan that bound are all members of the weasel family. This includes mink, otter, marten, and fisher. These mammals all have long skinny bodies and very short legs. Their footprints are oval or teardrop shaped and might be mistaken for a mammal that walks except for the number of toes. Bounders have 5 toes on both their front and hind feet. Bounding is similar to hopping in a way. Their footprints are also paired, but the front prints are often obscured by the rear feet which will land in the same location as the front prints.
So how did the mammal in the top photo move? Here is a closeup of one of the sets of prints.
The tracks are in pairs. They are shaped like long skinny triangles (especially the rear feet). The rear footprints are in front of the front feet. All four prints are clearly visible. These clues tell us that this mammal hops. Without anything for scale it is difficult to tell exactly which animal made these tracks, but we can make some guesses. Rabbits can be eliminated as the source of the tracks - rabbit feet tend to be very furry-these tracks are clearly defined. The sets of tracks are very close together - this probably eliminates squirrels which will usually hop further between sets of tracks. These tracks appear to belong to a mouse, probably either a Deer Mouse of White-footed Mouse. | <urn:uuid:1c16b8ce-0b49-49bc-9bcb-cc4235f9cf73> | {
"dump": "CC-MAIN-2017-43",
"url": "http://midmichigannatureandscience.blogspot.com/2013/01/tracks-in-snow.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187822488.34/warc/CC-MAIN-20171017200905-20171017220905-00647.warc.gz",
"language": "en",
"language_score": 0.9697246551513672,
"token_count": 618,
"score": 3.875,
"int_score": 4
} |
1896–Anti-Semitic Cartoon–Dennis O’Neill
The election of 1896 was heavily based around the currency situation in the United States. For some people, mainly Democrats and Populists, free silver was the obvious choice. For the republicans, the appropriate choice was abiding by the gold standard. This issue alone is a primary staple of the election of 1896’s legacy.
This political cartoon would be entirely too controversial and inappropriate to be printed in any newspaper today. This is a fantastic example of how the times have changed and how the ideals of the American people have changed; a lot less propaganda and rhetoric is tolerated in today’s society. This cartoon is titled “History Repeats Itself.” The anti-Semitic undertones of this cartoon are unpleasant and offensive, but regardless of the offensive content it certainly gets the message across. If something with this type of content was printed today it would gain an existentially larger amount of publicity because of the shock value alone, but it would not be as effective due to its offensiveness.
Social prejudice was much more widely accepted in the nineteenth century and early twentieth century. In the late nineteenth century, Anti-Semitism was actually a plausible variation of social prejudice, if there even is such a thing. Anti-Semitism was especially prominent in the western societies, and had been for years. The political party that exercised their distaste for the Jewish people the most was the Populists. The Populists placed blame on the Jewish people for many of the hardships that their people have faced, such as farmers who are in a serious amount of debt. These farmers helped induce the growth and stability of the Populist Party. It is especially disgusting to consider the attitudes of these western Populists, because their exposure to people of the Israeli culture was limited. This means that the majority of these harsh judgments made by the Populist Party were based on stereotypes alone.
In the top left corner of the cartoon there is an image of a man hanging himself and a caption that says: “What Judas ought to do.” Also, above the cross that Uncle Sam is being crucified upon there is a sign that reads: “This is U.S. in the hands of the Jews.” Both of these anti-Semitic visuals on the cartoon are awful to consider, but during the late nineteenth century they spread the message of the Populist Party effectively. The title alone sends a strong message about how the Jewish people ought to be seen. “History repeats itself” this image and idea draws many parallels to Bryan’s Cross of Gold speech. This cartoon is once again comparing the crucifixion of Jesus Christ to what the Jewish people in America are doing to Uncle Sam and all that he represents. But what initiated the prevalence of this anti-Semitism in American culture during the late nineteenth century?
A book titled “A Tale of Two Nations” written by a man named “Coin” Harvey, told a story that drew much attention to the negative effects of Jewish men having any control over money in the United States. The character development is basic, but some characters possess obvious personality traits to people involved in the election. The story told is about a London Banker who comes up with a fine plan to prevent the U.S. from ever using Silver as currency. He sends a man named Rogasner to the states to persuade the United States congress to abide by the gold standard. Unfortunately, Rogasner gets sidetracked by falling in love with a woman who is in love with a Nebraska congressman who happens to be pro-silver. Rogasner is supposed to represent a dark Jewish man who is out to destroy the Caucasian race. As ludicrous as this sounds, it actually did have an impact on the minds of many Western Americans. “Coin” Harvey saw the Jewish Banking Houses as the main reason for the working mans problems. This led to a negative generalization of the Jewish people. You see in this cartoon that there are republicans on one side and democrats on the other. They are both essentially doing the same thing to Uncle Sam, but notice the bucket of debt on the side of the Republicans. This is a clear representation of they debt that they do not seem to be clearing. Nowhere on this cartoon is the word Populist, so I assume this was a pro-Populist cartoon. Regardless of political position, this is an interesting yet offensive cartoon to publish in papers, but the message does get sent for all to interpret. | <urn:uuid:81b8a82d-1655-487a-918f-0ecc77797f06> | {
"dump": "CC-MAIN-2017-13",
"url": "https://campaignrhetoric.wordpress.com/2011/05/01/1896-anti-semitic-cartoon-dennis-oneill/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218188553.49/warc/CC-MAIN-20170322212948-00129-ip-10-233-31-227.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9748176336288452,
"token_count": 934,
"score": 3.484375,
"int_score": 3
} |
What is Internal Medicine?
Doctors of internal medicine focus on adult medicine and have had special study and training focusing on the prevention and treatment of adult diseases. At least three of their seven or more years of medical school and postgraduate training are dedicated to learning how to prevent, diagnose, and treat diseases that affect adults. Internists are sometimes referred to as the “doctor’s doctor,” because they are often called upon to act as consultants to other physicians to help solve puzzling diagnostic problems.
Internists are equipped to deal with whatever problem a patient brings — no matter how common or rare, or how simple or complex. They are specially trained to solve puzzling diagnostic problems and can handle severe chronic illnesses and situations where several different illnesses may strike at the same time. They also bring to patients an understanding of wellness (disease prevention and the promotion of health), women’s health, substance abuse, mental health, as well as effective treatment of common problems of the eyes, ears, skin, nervous system and reproductive organs. | <urn:uuid:9333dc58-1d79-4b9b-80d5-7231b9ffb2bf> | {
"dump": "CC-MAIN-2017-13",
"url": "http://www.doctorgrossmann.com/what-is-internal-medicine",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218190295.65/warc/CC-MAIN-20170322212950-00637-ip-10-233-31-227.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9746127724647522,
"token_count": 211,
"score": 3.390625,
"int_score": 3
} |
Spinach has been on the table for over 1700 years, with the first spinach meal likely served up in ancient Persia (now Iran). History books suggest that the King of Nepal introduced spinach to China in the 7th century and spinach was on the plate in Europe by the 11th century. Catherine de Medici of Florence, Italy, brought her cooks to France when she married the King Henry II of France, because her cooks could prepare the delicate spinach greens to her liking. Since that time, any dish presented on a bed of spinach is “a la Florentine.”
Spinach and Iron
Older Americans remember a cartoon figure named Popeye that gained incredible strength by eating canned spinach. The cartoon character came to life in 1929, soon after demand for canned vegetables skyrocketed after WWI, so it was only fitting that Popeye would promote a safe and inexpensive health food in that era. However, the cartoon strip published by Segar on July 3, 1932, attributed Popeye’s strength to the Vitamin A content in spinach and not iron. Segar’s intention was to increase the health of children by increasing vitamin intake, not iron intake, from spinach.
In 1934, the University of Wisconsin published a paper that may have exaggerated the iron content of spinach, possibly reporting the iron content of dried spinach as the iron content of fresh spinach.1 The information may have been corrected in a subsequent paper in 1936.2 In 1981, Hamblin was asked to write an article on spinach and iron content for the British Medical Journal, where he made a humorous reference to Popeye. The rest is history, as the medical community explored the bioavailability of plant and animal sources of iron, and we all connected Popeye’s strength to iron instead of Vitamin A.
The facts about spinach and health!
Spinach is a vitamin and mineral powerhouse — you could almost say that spinach is a chewable multi-vitamin and the Supplement Facts label would read like this if raw spinach was sold as a vitamin and mineral supplement:
Serving Size: One cup raw
|Amount per svg:||% DV||Amount per svg:||% DV|
|Vitamin A||2813 IU||56%||Pantothenic Acid||0.0mg||0%|
|Vitamin C||8.4 mg||14%||Choline||5.4 mg|
|Vitamin D||0||0%||Calcium||29.7 mg||3%|
|Vitamin E||0.6 mg||3%||Iron||0.8 mg||5%|
|Vitamin K||145 mcg||181%||Magnesium||23.7 mg||6%|
|Thiamin||0.0 mg||2%||Phosphorus||14.7 mg||6%|
|Riboflavin||0.1 mg||3%||Potassium||167 mg||5%|
|Niacin||0.2 mg||1%||Sodium||23.7 mg||1%|
|Vitamin B-6||0.1 mg||3%||Zinc||0.2 mg||1%|
|Folate||58.2 mcg||15%||Copper||0.0 mg||2%|
|Vitamin B-12||0 mg||0%||Selenium||0.3 mcg||0%|
While spinach is not a significant source of protein, 12 percent of the calories in spinach are derived from plant proteins. Cooked spinach provides 250 mg calcium (compared to 300 mg calcium in 1 cup of cow’s milk); however, the calcium in dairy foods is better absorbed (28 percent of the calcium in a cup of milk is absorbed, compared to 5 percent of the calcium absorbed in spinach). This is because another chemical in spinach, oxalate, binds to the calcium in the spinach, making it harder for us to absorb the calcium found in the leaves of this plant.
Spinach is available year round in the United States, and can be purchased in many forms — fresh, frozen and canned. It is at peak from March to May and from September to October. Malabar spinach grows well in Texas and it tolerates the summer heat better than traditional spinach varieties.
Pre-washed spinach is a great fast food — sautéed in olive oil with a little black pepper, spinach can go from the vegetable drawer to the table in 10 minutes. Be sure to rinse the pre-washed spinach to decrease bacterial loads found in fresh greens. If you buy unwashed spinach, place the leaves in tepid water after removing the roots and larger stems, then drain the washed spinach and rinse with cool water until no sand or dirt is observed in the bowl (up to 2-3 rinses to dislodge the dirt). It should be noted that soaking spinach in water could result in losses of water-soluble vitamins.
You can add spinach to soups, stir-fried dishes, lasagna, salads, or place some spinach leaves on any sandwich. Spinach is a great addition to smoothies and can be added to plain yogurt with seasonings to make a low-fat dip. Fresh spinach also scrambles up nicely with eggs in the morning.
Spinach and chronic disease
There is interest in nutritional approaches to decreasing the risk for chronic disease. The Center for Disease Control has identified that healthy lifestyles (food and exercise) can greatly reduce the risk for many chronic diseases. The Academy of Nutrition and Dietetics has identified that not only can diet choices manage chronic diseases like diabetes and heart disease, but diet choices can prevent or delay disease in persons at risk. While specific foods are not magical, the higher the nutrient content of a food like spinach, the more likely it will contribute to disease risk reduction when it is a regular part of your diet. Because spinach is a great source of many nutrients it may contribute, as part of a healthy diet and lifestyle, to risk reduction for the following disease conditions:
Asthma Prevention: Research has linked beta carotene and Vitamin A to decreased risk for asthma exacerbation. More research is needed, but there may be a benefit with leafy greens in those prone to asthma.
Bone Health: Vitamin K protects against bone fractures and helps us better absorb calcium needed to build the matrix that keeps our bones strong. There is no question that spinach is an excellent source of Vitamin K.
Cancer Prevention: Plant chemicals found in green vegetables (including spinach) may block the carcinogenic effects of heterocyclic amines that are formed when we grill meat at a high temperature.
Diabetes: Research has shown that alpha-lipoic acid (ALA) supplementation can lower blood glucose levels, increase insulin sensitivity, and possibly decrease peripheral neuropathy in persons with diabetes. While food sources of ALA have not been studied, there is interest in ALA and health.
Eye Health: Lutein and zeaxanthin are two carotenoids that are found in high amounts in spinach. These carotenoids work as antioxidants in the eye to decrease damage that can lead to macular degeneration.
Hypertension: The DASH research showed that high potassium intake lowers blood pressure. Spinach is a high potassium vegetable.
When spinach is not the best choice
The nutrients in spinach can pose concerns for some individuals:
- Because spinach is high in purines, persons prone to kidney stones or persons with gout, because spinach can increase uric acid production in these individuals.
- Persons on certain blood pressure medications or persons with end-stage kidney disease may need to limit potassium intake. Spinach would not be the best possible choice because it is so high in potassium.
- Persons on Coumadin are usually asked to limit intake of spinach and leafy greens, because the Vitamin K in greens works against the medication.
Talk to your doctor or a registered dietitian if you have concerns about spinach consumption as part of your personal diet plan.
Sherman SC, Elvehjem CA, Hart EB, Further Studies of the availability of iron in biological materials. The Journal of Biological Chemistry. 1934: 107(3): 383-394.
Kohler G, Elvehjem C, Hart E, Modifications of the bibyridine method for available iron. Journal of Biological Chemistry. 1936 (Vol 113):49-53. | <urn:uuid:a125bcd0-9cff-4fb1-bbad-3c685e5bddee> | {
"dump": "CC-MAIN-2017-17",
"url": "http://scrubbing.in/spinach-as-a-superfood-it-worked-for-popeye-or-did-it/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917127681.84/warc/CC-MAIN-20170423031207-00593-ip-10-145-167-34.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9150429368019104,
"token_count": 1752,
"score": 3.03125,
"int_score": 3
} |
The use of so-called genetic fingerprinting now allows scientists to identify changes in the evolution of the virus and thereby dispute accusations, such as the one Libya made against Bulgarian nurses, that one group or another was spreading the virus.
“With the exception of one serious outbreak in China, virtually all the strains of HIV now circulating in Asia - from Manipur, India, all the way to Vietnam, from mid-China all the way down to Indonesia, come from a single country,” Laurie Garrett, author of the 67-page report, told a news conference.
“Several research teams have proven that these various HIV strains can be tracked along four major routes, all originating in Burma,” she said, referring to Myanmar’s former name.
The highest infection rates are among prostitutes and heroin users in Myanmar, ranked as the world’s top opium producer until 2003 when Afghanistan moved to first place.
“Burma is a failed state, rife with civil war and rival gangs of drug, gem and sex-slave smugglers,” said the report, entitled “HIV and National Security: Where Are The Links?”
Garrett said the new technology, known as molecular epidemiology, could counter accusations of who spread the epidemic. For example, a year ago, India charged that “promiscuous Pakistanis” spread HIV in Kashmir.
More serious is Libya’s jailing in 1999 of five Bulgarian nurses and a Palestinian doctor, accused of deliberately infecting 426 children with HIV. Bulgaria countered that Libya failed to screen its blood transfusion supplies.
“Were the Libyan government willing to comply, a study of the HIV strains found in the 426 infected children might offer proof of their origin,” Garrett’s report said.
Using genetic techniques, researchers have also proved that the rapidly growing HIV epidemic in the former Soviet Union - Russia, Ukraine and the Baltic states - appears to stem from one strain spread by drug users nearly a decade ago.
“Nearly all of the HIV viruses circulating in that region…closely match one another genetically, were introduced into the area in 1996-97 and are being spread through injection by drug users,” Garrett wrote.
Revision date: June 22, 2011
Last revised: by Andrew G. Epstein, M.D. | <urn:uuid:be6ba292-e0bc-4154-bc05-4617d06e4f45> | {
"dump": "CC-MAIN-2020-40",
"url": "http://www.health.am/aids/more/aids_in_asia_spread_from_myanmar/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400198287.23/warc/CC-MAIN-20200920161009-20200920191009-00699.warc.gz",
"language": "en",
"language_score": 0.9444541931152344,
"token_count": 481,
"score": 2.828125,
"int_score": 3
} |
4.2 Joshua -- Rahab
This remarkable incident is the first "wrinkle" in God's decree of destruction upon Canaan.
Joshua sent two spies into the city of Jericho. They stayed at the home of Rahab the prostitute. One wonders if this was on official business. "There is no place like a harlot's house for people coming and going. There is no indication whatever that they went there for any immoral purpose."1 Still, they were inept spies, because the King of Jericho knew who they were (Josh 2:2-3). However, Rahab hid them and saved their lives, and informed them of the low morale of her fellow citizens:
"All who live in this country are melting in fear because of you" (Josh 2:9-11).
She asked the men that the lives of her family be spared. They told her to tie a red cord in her window, and not to let any of her family go outside her house. This corresponds to the Israelites putting the lamb's blood on the doorposts of their houses in Egypt (Ex 12:21-23). And indeed, when the walls of Jericho fell, and the Israelites invaded, the whole city was burned, but Rahab and her family were spared (Josh 2:24-25).
Rahab is another of these interesting outsiders who keep intervening in critical places in the Biblical narrative: Melchizadek, Hagar, Asenath, Pharaoh's daughter, Jethro and Zipporah. She was not a moral woman, obviously, and her motivation for helping the spies was enlightened self-interest. Rahab is an affront to religious sensibilities:
"Rahab was a harlot in a heathen land. Some people have been embarrassed by this and have tried to tone it down, but it is impossible to do so. That is really what she was. It is the only thing the Hebrew word in Joshua 2:1 can mean....We miss the whole point of the story...if we become embarrassed and soften it" (Schaeffer, pp. 73, 75).
The NIV (and Josephus) try to sanitize her by giving the alternate translation "innkeeper" (footnote to Josh 2:1). But the New Testament references to her are explicit: "Rahab the prostitute" (Heb 11:31, James 2:25).
In the New Testament, Rahab is listed as an ancestor of David, and thus of Jesus Christ (Mat 1:5). Note that this genealogy omits many generations between Rahab and David (almost the entire period of the Judges is missing). If the Rahab of Joshua is the same person as the Rahab of Matthew, it means she married Salmon, an Israelite of the tribe of Judah. Rahab also appears in the list of "heroes of the faith" (Heb 11:31) and is praised for her righteous deeds (James 2:25). | <urn:uuid:0e330172-acf0-4466-a185-8c74153120d4> | {
"dump": "CC-MAIN-2023-06",
"url": "https://www.racialpeace.org/copy-2-of-section-4-foundation-of-i",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500094.26/warc/CC-MAIN-20230204044030-20230204074030-00743.warc.gz",
"language": "en",
"language_score": 0.9689669609069824,
"token_count": 611,
"score": 2.6875,
"int_score": 3
} |
Health risks of alcohol use
Beer, wine, and liquor all contain alcohol. Drinking an excessive amount of alcohol can put you at risk for alcohol-related problems.
Alcoholism - risks; Alcohol abuse - risks; Alcohol dependence - risks; Risky drinking
Definition of Alcohol Use
Beer, wine, and liquor all contain alcohol. If you are drinking any of these, you are using alcohol. Your drinking patterns may vary, depending on who you are with and what you are doing.
Drinking an excessive amount of alcohol can put you at risk for alcohol-related problems if:
- You are a man under 65 years old who has 15 or more drinks a week, or often have 5 or more drinks at a time.
- You are a woman or a man over 65 years old who has 8 or more drinks a week, or often have 4 or more drinks at a time.
One drink is defined as 12 ounces (355 milliliters, mL) of beer, 5 ounces (148 mL) of wine, or a 1 1/2-ounce (44 mL) shot of liquor.
Alcohol Use and Your Health
Long-term excessive alcohol use increases your chances of:
- Bleeding from the stomach or esophagus (the tube the food travels through from your mouth to your stomach).
- Swelling and damage to the pancreas. Your pancreas produces substances your body needs to work well.
- Damage to the liver. When severe, liver damage often leads to death.
- Poor nutrition.
- Cancer of the esophagus, liver, colon, head and neck, breasts, and other areas.
Video: Alcoholic liver disease
Excessive drinking can also:
- Make it harder to control high blood pressure with medicines if you already have high blood pressure.
- Lead to heart problems in some people.
Alcohol can affect your thinking and judgment each time you drink. Long-term excessive alcohol use damages brain cells. This can lead to lasting damage to your memory, thinking, and the way you behave.
Damage to nerves from alcohol use can cause many problems, including:
- Numbness or a painful "pins and needles" feeling in your arms or legs.
- Problems with erections in men.
- Leaking urine or having a hard time passing urine.
Drinking during pregnancy can harm the growing baby. Severe birth defects or fetal alcohol syndrome (FAS) may occur.
How Alcohol Use Can Affect Your Life
People often drink to make themselves feel better or to block feelings of sadness, depression, nervousness, or worry. But alcohol can:
- Make these problems worse over time.
- Cause sleep problems or make them worse.
- Increase the risk for suicide.
Families are often affected when someone in the home uses alcohol. Violence and conflict in the home is much more likely when a family member is abusing alcohol. Children who grow up in a home where alcohol abuse is present are more likely to:
- Do poorly in school.
- Be depressed and have problems with anxiety and low self-esteem.
- Have marriages that end in divorce.
Drinking too much alcohol even once can harm you or others. It can lead to any of the following:
- Car accidents
- Risky sex habits, which may lead to unplanned or unwanted pregnancy, and sexually transmitted infections (STIs)
- Falls, drowning, and other accidents
- Violence, sexual assault or rape, and homicide
What You Can Do
First, ask yourself what type of drinker you are?
Even if you are a responsible drinker, drinking too much just once can be harmful.
Be aware of your drinking patterns. Learn ways to cut back on drinking.
If you cannot control your drinking or if your drinking is becoming harmful to yourself or others, seek help from:
- Your health care provider
- Support and self-help groups for people who have drinking problems
Centers for Disease Control and Prevention website. Fact sheets: alcohol use and your health. www.cdc.gov/alcohol/fact-sheets/alcohol-use.htm. Updated December 30, 2019. Accessed January 23, 2020.
National Institute on Alcohol Abuse and Alcoholism website. Alcohol & your health. www.niaaa.nih.gov/alcohol-health. Accessed January 23, 2020.
National Institute on Alcohol Abuse and Alcoholism website. Alcohol use disorder. www.niaaa.nih.gov/alcohol-health/overview-alcohol-consumption/alcohol-use-disorders. Accessed January 23, 2020.
O'Connor PG. Alcohol use disorders. In: Goldman L, Schafer AI, eds. Goldman-Cecil Medicine. 26th ed. Philadelphia, PA: Elsevier; 2020:chap 30.
Sherin K, Seikel S, Hale S. Alcohol use disorders. In: Rakel RE, Rakel DP, eds. Textbook of Family Medicine. 9th ed. Philadelphia, PA: Elsevier Saunders; 2016:chap 48.
US Preventive Services Task Force. Screening and behavioral counseling interventions to reduce unhealthy alcohol use in adolescents and adults: US Preventive Services Task Force recommendation statement. JAMA. 2018;320(18):1899–1909. PMID: 30422199 pubmed.ncbi.nlm.nih.gov/30422199/. | <urn:uuid:4d71df56-01ee-46bc-a50f-8d2f7a333cf1> | {
"dump": "CC-MAIN-2022-40",
"url": "https://ufhealth.org/health-risks-alcohol-use",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337529.69/warc/CC-MAIN-20221004215917-20221005005917-00522.warc.gz",
"language": "en",
"language_score": 0.8839683532714844,
"token_count": 1138,
"score": 3.109375,
"int_score": 3
} |
We provide a learning environment that is open ended, flexible, and meaningful to the children, based on their interests, strengths and experiences, and which is rich in opportunities that encourage the development of skills, knowledge and creativity. The ideas and opinions of John Dewey have become the foundation for many current views of play.
He believed that educators need to observe children to determine the experiences they are interested in and are ready for. Educators need to be able to guide children’s learning, engage their minds, and work collaboratively with children and not just instruct. The curriculum needs to be purposeful and assist children to make sense of the world. He believed that children’s own instincts, activities, and interests should be the starting point of education.
Our play based programs are child initiated and directed, encompass intentional teaching and are responsive to spontaneous teaching moments.We encourage children to be active participants and believe they learn best through ‘doing’ and experimenting themselves. We encourage them to take the initiative, be independent, and make own choices. This practise is supported by Psychologist Lev Vygotsky, who viewed children as active learners. He believed children must be given opportunities to explore, discover and experiment.
We believe that all children are successful, competent and capable learners. We offer opportunities to discover, explore, question, problem solve, imagine, create and reflect. We provide children with long periods of uninterrupted play and time to explore at their own pace, and in their own individual way.
We believe the ‘process’ is more valuable than the end product because of the learning that takes place. All children have the right to equal opportunities, resources and adult interaction regardless of their gender, race or culture.
We believe the development of a healthy self-esteem is paramount to a child’s development and is vital to learning, being happy and coping well with challenges. We respect each child as a unique individual, and celebrate children’s individuality, efforts and achievements.
Children have the right to get messy, muddy, dirty wet, slimy and gooey in their play. Children will be supported, encouraged and empowered to take risks, climb trees, try new things and use real tools inside and outside. We value the natural world and all the learning that can take place in a nature-based environment.
We promote an awareness of environmental practises in our programs. We demonstrate a strong commitment to sustainability and taking care of our environment, by using recycled materials, composting food scraps into the worm farm, growing herbs and vegetables and using environmentally friendly cleaning products.
We believe that the ‘kinder photos’ embrace our philosophy to show case children in play, in the moment and in their environment. | <urn:uuid:e52b7ece-6a43-4f78-a321-74b397de710a> | {
"dump": "CC-MAIN-2024-10",
"url": "https://www.eveshamroad.kindergarten.vic.gov.au/about-us/working-with-children/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474573.20/warc/CC-MAIN-20240225003942-20240225033942-00817.warc.gz",
"language": "en",
"language_score": 0.9513463377952576,
"token_count": 558,
"score": 3.9375,
"int_score": 4
} |
Icelandic Sign Language
|Icelandic Sign Language|
|(no estimate available)|
The Icelandic sign language (íslenskt táknmál) is the sign language of the deaf community in Iceland. It is based on the Danish Sign Language; until 1910, deaf Icelandic people were sent to school in Denmark, but the languages have diverged since then. It is officially recognized by the state and regulated by a national committee.
Icelandic Sign Language is distinct from spoken Icelandic; in 1999, the Icelandic Ministry of Education stated that, in the Icelandic basic curriculum, Icelandic Sign Language is the first language of deaf people, while spoken Icelandic is a second language. Therefore, deaf Icelanders should learn Icelandic Sign Language as their first language and Icelandic as their second language.
For more information on the recognition of Icelandic Sign Language and the comparison with other countries, see Legal recognition of sign languages.
A lexical comparison of signs from Icelandic Sign Language with their counterparts in Danish Sign Language was undertaken (Aldersson 2006) to try to determine the degree of current lexical similarity. It was found that whilst the two sign languages are certainly related, 37% of signs analysed were completely different in structure and a further 16%, whilst similar, still contrasted in one of the four parameters of hand-configuaration, location, movement or orientation.
Sign Language Studies | October 1, 2008 | Aldersson, Russell R; McEntee-Atalianis, Lisa J | 700+ words
|This Iceland-related article is a stub. You can help Wikipedia by expanding it.| | <urn:uuid:fcc7dbf5-322a-4f9c-875e-4d66f683490a> | {
"dump": "CC-MAIN-2015-11",
"url": "http://en.wikipedia.org/wiki/Icelandic_Sign_Language",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462070.88/warc/CC-MAIN-20150226074102-00092-ip-10-28-5-156.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9368370175361633,
"token_count": 329,
"score": 3.21875,
"int_score": 3
} |
A design method which includes the effect of the torsional-flexural buckling mode of failure is proposed.
The results give a continuous spread of compressive strengths for practical ranges of slenderness parameters. The results show that torsional–flexural buckling and plate buckling need not be considered simultaneously even for unequal angles if they are designed according to CAN/CSA-S16.1-94. Key words: angle, buckling, codes and standards, compression, design strength, flexural buckling, local buckling, specifications, steel, torsional–flexural buckling.
Because steel angles are singly symmetric or asymmetric, torsional-flexural buckling is an important mode of failure.
Compared to 90° angles of the same size, these angles are weaker in torsional-flexural buckling.
We distinguish Euler buckles that develop in beds without cross fractures, block-flexure buckles that form with smooth buckled bedding surfaces in beds with cross fractures, and block buckles that develop with large rotations of rock blocks in rock layers more than 0.1 m thick.
Experimental failure loads are compared with the loads computed according to the general theory of torsional–flexural buckling, ASCE Manual No. 52, and the ECCS recommendations.
Recent experimental studies have shown that the design of 60° angles will be quite safe, if design is carried out using the expressions for factored axial compressive resistances given in CAN/CSA-S16.1-M89, taking into account only the effect of local buckling and flexural buckling about minor axis, and neglecting torsional-flexural buckling.
These two latter properties are required for determining failure loads of angles subjected to torsional–flexural buckling.
The paper presents the results of an experimental investigation consisting of 34 hot-rolled steel angles under concentric compression (slenderness ratios between 50 and 150) failing in torsional?flexural buckling.
Showing page 1. Found 11 sentences matching phrase "flexural buckling".Found in 0 ms. Translation memories are created by human, but computer aligned, which might cause mistakes. They come from many sources and are not checked. Be warned. | <urn:uuid:4422abe1-cc7f-499a-b74c-2155c798ba16> | {
"dump": "CC-MAIN-2016-18",
"url": "https://glosbe.com/en/en/flexural%20buckling",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461862134822.89/warc/CC-MAIN-20160428164854-00179-ip-10-239-7-51.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.8921254277229309,
"token_count": 476,
"score": 2.8125,
"int_score": 3
} |
Definition - What does Eavesdropping mean?
The term eavesdropping refers to observing or listening to a private conversation illegally or listening to a conversation that they are not included in. It may also be defined as to intercept and listen stealthily.
Justipedia explains Eavesdropping
Eavesdropping is a common law offense which includes listening to the conversation of others while keeping yourself hidden (from places like eaves or windows of a house). The term eavesdropping is only used when the act is not accompanied by a special court order or a warrant. | <urn:uuid:02e08b4e-4bdb-46c1-a823-e633a3d28f1f> | {
"dump": "CC-MAIN-2019-51",
"url": "https://www.justipedia.com/definition/2514/eavesdropping",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540584491.89/warc/CC-MAIN-20191214042241-20191214070241-00449.warc.gz",
"language": "en",
"language_score": 0.9437126517295837,
"token_count": 110,
"score": 2.703125,
"int_score": 3
} |
Creating Healthier Communities
By Turning Inward
By: Britt Brown LMT
In this article we’ll be expanding on what we discussed about mindfulness in the Body Care Breakdown Podcast, and dive deeper into how simple mindfulness habits can have a massive impact on our personal health, and help us improve the health of our communities as a whole. So, just what is mindfulness anyway, and why do we practice it? Well, Oxford Languages (one of the world’s leading dictionary publishers) defines mindfulness as; “a mental state achieved by focusing one’s awareness on the present moment, while calmly acknowledging and accepting one’s feelings, thoughts, and bodily sensations, used as a therapeutic technique.” As for why we practice it, well, that reason is personal to each individual, but ultimately we’re practicing it to better care for ourselves, and the world around us.
One way we can understand why we might want to practice mindfulness, is to understand why practicing mindfulness is recommended in the first place. Why should we practice self-awareness, setting intentions, and being in the present moment? Is it all just woo-woo misinformation being used to market self-help products that don’t actually help, or is there scientific evidence to back up claims that mindfulness has a measurable impact on our health and well-being? As it turns out, there is in fact, a LOT of scientific evidence that supports the claims that mindfulness practices have a measurable and positive effect on our overall health. So let’s talk about what those practices are, how we can incorporate those practices into our everyday lives, and the science behind why we should.
“We spend precious hours fearing the inevitable.–Maya Angelou
It would be wise to spend that time adoring our
families, cherishing our friends and living our lives.”
When researching recommended mindfulness habits, the practice of “being present” was brought up over and over again. It was the most recommended mindfulness habit, followed closely by self-awareness and meditation practices. Although many of us might be thinking “being present, being in the moment, that’s a life changing habit?” And the answer is yes, yes it will absolutely change your life, and probably for the better.
One of the most profound impacts of practicing “being present” on a regular basis is that it really can help with emotional regulation, and our ability to think rationally during times of chaos. Regularly pausing to ask ourselves “how am I feeling right now,” and “how do I feel when I am around this person” or ”how does my body feel when I eat this food item” gives those parts of ourselves a voice. When we listen to that voice we can sometimes find that the things we thought we knew about ourselves, or the reasons we have for responding to certain situations the way we do, are no longer valid or maybe even inaccurate. We can start to realize that maybe we don’t know ourselves as well as we thought we did, and we can move forward in our self-care and community interactions with our new information.
As a silly and simple example – let’s say you’re like me and you REALLY love your morning coffee, like it’s darn near the reason you crawl out of bed and greet the day, right? Let’s say you’re also like me and upon self-reflection you realize that caffeine winds your anxiety up something fierce, and drinking a hot cup of it first thing in the morning isn’t a great way to start the day, no matter how delicious it tastes. You (and I) have a few choices at this point – we can ignore our body and keep up with the coffee – piling on more anxiety coping mechanisms to keep the balance, or we nix the coffee altogether and say goodbye to the happy morning brew, or we split the difference and go decaf. For those wondering – I chose to split the difference and go with decaf coffee.
That practice of “being present” with oneself and asking our bodies, minds and spirits what they’re really needing is often the first step to making life-long changes in our self-care routines. For me, the simple act of listening to my body and switching to decaf coffee has made a huge impact in how I move through my day. I find it’s easier for me to focus, that I’m less irritated by small inconveniences, and communication feels more enjoyable and less like a chore. I feel healthier, and I know that’s reflecting back into my community, because I know I’m responding more to the situation in front of me rather than just reacting to it.
As you might have already noticed, the practicing of one mindfulness habit often leads to the practicing of another, and I often find that being present with oneself in the moment often leads to a practice of self-awareness. When we pause to reflect on how our actions, emotions and energy are affecting our lives and the world around us, we start to draw awareness to our power to affect change. There are many ways we can go about practicing self-awareness, but probably the easiest and most effective way to practice self-awareness is through journaling.
If you’re not already familiar with the practice of journaling and coming up with your own prompts for self-reflection, feel free to take a moment and write down your answers to the self-reflection questions I’ve listed below:
- What is the story I’m telling myself, about myself, right now?
- What is one action I can take today, that my future self will thank me for later?
- Three activities that bring me joy are…
- What would my [insert body part here] say right now, if it could talk?
- How might I rephrase some of my negative self-talk, what are some positive things I can say about myself right now?
Asking yourself introspective questions like those you see above, and answering them with honesty, can help you make healthier life choices and take actions to achieve the goals you set for yourself. Practicing self-awareness can also help you realize where your personal limitations are, where you might be “burning the candle at both ends”, and help you recognize when you should reach out to your support network for help. Self-awareness helps us to appreciate the unique things we offer our community, and appreciate where our community shows up to support us.
Meditation is a wonderful tool for processing through tough emotions, centering into oneself. For drawing our attention inward to our physical, emotional and spiritual bodies. It can help us regulate our emotions, reduce our perceived stress and anxiety, and deepen our understanding of ourselves and how we wish to relate to the world around us.
Meditation is also a practice that seems simple, and yet feels simultaneously overwhelming. Many people report having difficulty quieting their minds, or that they have trouble being still, or they may find it difficult to stay present and that their minds tend to wander. As a result, many people give up on meditating after their first few attempts, and may never try it again. As someone who used to subscribe to the idea that “my mind doesn’t shut off, so I can’t meditate” I can confirm that busy minds can meditate, but how we approach meditation really does matter.
If you’re like me, you might choose to start with a guided meditation you’ve found on Insight Timer or YouTube. You might choose to set an intention for your meditation, giving your wandering mind something tangible to focus on. Or maybe you’ll choose something that involves more movement, like yoga or tai-chi. Laying still, and being present with your thoughts is a great form of meditation, it’s true, but it’s certainly not the only form of meditation out there, and all forms of meditation offer health benefits. Check out the body scan meditation video in the link below to get a better idea of what a guided meditation can look like:
If you’re wanting to learn more about the health benefits of meditation, its effects on the body, and all about the many ways in which you can meditate – I highly recommend the “Headspace: Guide To Meditation” series on Netflix.
Practice Routine Self-care…
Practicing routine self-care; being mindful of what you’re eating, of your quality of sleep, of your daily personal hygiene, of your mental and spiritual well-being… All of that is essential for maintaining your overall health. So when your diet is all out of whack, and you’re staying up until 1:00AM playing video games and eating sugary snacks, and you know you’ve got to wake up at 6:00AM so you can get to your classes by 7:30AM… you probably shouldn’t be surprised if you feel like you have to drag yourself through your day.
When we aren’t giving our body the tools that it needs to care for itself on a regular basis – healthy (for you) foods, healthy (for you) sleep patterns, and healthy (for you) levels of activity – our body ends up running off of whatever we give it, and puts out whatever it can, which isn’t going to be its top performance. Furthermore, if we’re feeling down and out of it, if we aren’t bringing our “A-Game” to our personal lives, we certainly aren’t bringing our “A-Game” to class, to work, to our partnerships, or wherever else we might need it. If we sell ourselves short in our self-care routines, we end up selling ourselves short everywhere else, and that never feels good.
If you’re struggling to know where to start on building a self-care routine, talk to your primary care provider, and schedule a physical check-up. Get a basic idea of where your body is at, let your primary care provider know about anything you think feels a little “weird” or “off” in your body, and ask them for recommendations and referrals. If you have specific areas of self-care you know you need to work on, but maybe you’re having a hard time committing to making new habits, try reaching out and asking a friend or two to be your accountabili-buddy. Getting into a self-care routine, especially if you’re not used to caring for yourself, can feel intimidating but it doesn’t need to. We all have a community of people we can turn to when we need support, and we can all find a self-care routine that fits with our lives and our everyday needs!
Practice Gratitude and Lovingkindness…
It is so easy to let ourselves become bitter from pickling in the hateful brines of today’s society, it really is. As a person who identifies as non-binary, and as a part of the LGBTQIA+ community, practicing gratitude and lovingkindness in the face of all of the hate I see being hurled at my community has been a real struggle. I have definitely been lapsing on my gratitude journaling, and spending more time on the pity-pot than I traditionally do, and when things get really bad I have a hard time wanting to even participate in society.
In the times when I have been able to really pause, and hone in on the simple and beautiful things I am grateful for – making it through my bout of COVID, having a really good D&D campaign going, and being in a really healthy ENM relationship – I find my day gets a little easier. I remember that the world isn’t just a jar filled with angry people pickling to death in hate and suffering, and I feel motivated to keep doing my best to make the world a lighter and happier place.
Practicing gratitude and lovingkindness may not always be easy – but my favorite ways to practice them are probably the easiest. I like to journal lists of what I am grateful for. I deliberately reach out to the people I know and love, and make time to tell them directly how much I love, and appreciate and value their presence in my life. I send random handmade cards and letters filled with art and stickers to my friends and loved ones when it strikes my fancy. I go out and I volunteer for non-profit organizations and community projects I really love to support. I donate my time and my skills to charity events that I support. In essence – I say thank-you, and I do my best to give back.
Mindfulness habits matter. They are often the starting points from which we reach a deeper understanding of ourselves, our needs and those of the world around us. They are habits that cost nothing but our time and commitment to being our best selves. Mindfulness is a self-care habit that has countless benefits, and no known side effects. So regardless of what reason you might be considering adding mindfulness habits to your daily life, it’s a good one. | <urn:uuid:a05a954b-6bbb-4f66-acef-2b7d450c3900> | {
"dump": "CC-MAIN-2023-23",
"url": "https://wellgotinyspa.com/2023/03/24/mindfulness-expanded/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655092.36/warc/CC-MAIN-20230608172023-20230608202023-00632.warc.gz",
"language": "en",
"language_score": 0.9525905847549438,
"token_count": 2777,
"score": 2.59375,
"int_score": 3
} |
Lingala is a Bantu language spoken throughout the northwestern part of the Democratic Republic of the Congo and a large part of the Republic of the Congo, as well as to some degree in Angola and the Central African Republic. It has over 10 million speakers. Standard Lingala (called lingala littéraire or lingala classique in French) is mostly used in educational and news broadcastings on radio or television, in religious services in the Roman Catholic Church and is the language taught as a subject at all educational levels. Standard Lingala is historically associated with the work of the Catholic Church and missionaries. It has a seven-vowel system /a/ /e/ /ɛ/ /i/ /o/ /ɔ/ /u/ with an obligatory tense-lax vowel harmony. It also has a full range of morphological noun prefixes with mandatory grammatical agreement system with subject–verb, or noun–modifier for each of class. Standard Lingala is largely used in formal functions.
- From Wikipedia | <urn:uuid:3ec24837-9c40-41ab-843f-6601421818a7> | {
"dump": "CC-MAIN-2016-40",
"url": "https://www.livelingua.com/fsi-lingala-course.php",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738659680.65/warc/CC-MAIN-20160924173739-00038-ip-10-143-35-109.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9390786290168762,
"token_count": 213,
"score": 3.234375,
"int_score": 3
} |
Subsets and Splits