prompt
stringlengths
18
524
text
stringlengths
70
11.4k
The Gulf of Mexico oil spill The explosion of BP's Deepwater Horizon rig on April 20, 2010 in the Gulf of Mexico triggered the largest oil spill in US history. Millions of gallons of oil continued to leak until July
The Gulf of Mexico oil spill The explosion of BP's Deepwater Horizon rig on April 20, 2010 in the Gulf of Mexico triggered the largest oil spill in US history. Millions of gallons of oil continued to leak until July 15. This page contains stories about the results of the spill. A person familiar with the deal also said two BP employees face manslaughter charges over those killed in the oil rig explosion that led to the spill. (AP, 9:30 a.m.) The Justice Department said on Tuesday it filed the first criminal charges in the Deepwater Horizon disaster in the Gulf of Mexico, accusing a former BP engineer of destroying evidence. (AP, 4/24/2012) Scientists judge the overall health of the Gulf of Mexico as nearly back to normal one year after the BP oil spill, but with glaring blemishes that restrain their optimism about nature's resiliency, an Associated Press survey of researchers shows. (AP, 4/18/11) BP announced that it had capped its hemorrhaging well, at least temporarily, marking the first time in nearly three months that oil was not gushing into the Gulf of Mexico. (Boston Globe, 7/16/10) The piping plover had all but disappeared by the 1980s along the East Coast, as beaches were developed and visited more often. Now, the oil spill in the Gulf of Mexico appears to be the tiny white bird’s latest nemesis. (Globe Staff, 7/2/10) The massive oil well leak in the Gulf of Mexico abruptly turned into a national crisis, when scientists realized oil is probably gushing from the seafloor at five times the rate they first thought. (By Beth Daley, Boston Globe, 4/30/10)
April 12, 2010 President Obama: Honor memory of Holocaust victims President Obama called on people to honor the memory of Holocaust victims in a statement released in honor of Holocaust Remembrance Day. “We must recommit ourselves to honoring the
April 12, 2010 President Obama: Honor memory of Holocaust victims President Obama called on people to honor the memory of Holocaust victims in a statement released in honor of Holocaust Remembrance Day. “We must recommit ourselves to honoring the memories of all the victims and ensuring that they remain a part of our collective memory… We must never tolerate the hateful stereotypes and prejudice against the Jewish people that tragically continues to this day,” Obama said in a statement released Monday that touched on familiar themes. President Obama toured Buchenwald in June 2009 with German Chancellor Angela Merkel, Elie Wiesel, and survivor Bertrand Herz and visited Yad Vashem while a presidential candidate in 2008. Wrote Obama of his visits: “I bore witness to the horrors of anti-Semitism and the capacity for evil represented by the Nazis’ campaign to annihilate the Jewish people and so many others. But even at places like Buchenwald, the dignity and courage of those who endured the horrors of the Holocaust remind us of humanity’s capacity for decency and compassion.”
3. That mind in breath, owing to the subsequent clause. That mind, i.e. mind united with all the organs unites itself with breath; not merely the function of mind. This appears from the clause following upon the text quoted above
3. That mind in breath, owing to the subsequent clause. That mind, i.e. mind united with all the organs unites itself with breath; not merely the function of mind. This appears from the clause following upon the text quoted above,'mind (unites itself) with breath.' Here, however, a further doubt suggests itself. The text 'Mind is made of earth' declares earth to be the causal substance of mind, and the text 'that (viz. water) sent forth earth' declares water to be the causal substance of earth; while the further text 'breath is made of water' shows water to be the causal substance of breath. Considering therefore that in the text'mind becomes united with breath' the term breath is naturally understood to denote the causal substance of breath, i.e. water, the appropriate sense to be given to the statement that mind is united with water is that mind is completely refunded into its own causal substance--so that the 'being united' would throughout be understood 'as being completely merged.'--The reply to this, however, is, that the clauses 'Mind is made of food, breath is made of water,' only mean that mind and breath are nourished and sustained by food and water, not that food and water are the causal substances of mind and breath. The latter indeed is impossible; for mind consists of ahamkâra, and as breath is a modification of ether and other elements, the word breath may suggest water.--Here terminates the adhikarana of'mind.'
Here are two pictures of hot coffee in a metal cup. In the infrared image (right) notice the rings of color showing heat traveling from the coffee through the metal cup. You can see this in the metal spoon as well. This is a
Here are two pictures of hot coffee in a metal cup. In the infrared image (right) notice the rings of color showing heat traveling from the coffee through the metal cup. You can see this in the metal spoon as well. This is a good example of a process called conduction. Conduction occurs when two object at different temperatures are in contact with each other. Heat flows from the warmer to the cooler object until they are both at the same temperature. To learn more about how heat can travel see our module on Heat and Temperature.
The Faculty of Science is pleased to provide the following ways of exploring science and discovering innovation: Let’s Talk Science provides a unique opportunity for you to invite a university student volunteer into your classroom to conduct curriculum-aligned, hands-on science activities with your students
The Faculty of Science is pleased to provide the following ways of exploring science and discovering innovation: Let’s Talk Science provides a unique opportunity for you to invite a university student volunteer into your classroom to conduct curriculum-aligned, hands-on science activities with your students at no cost to you or your school. We have a wide variety of activities developed both by Let's Talk Science national office and by Science Outreach here at the University of Waterloo, that are sure to engage students in kindergarten through Grade 11. Please visit http://letstalkscience.ca/uwaterloo.html or contact Heather Neufeld for more information: firstname.lastname@ex
Tags: Air admittance valves, Codes, Standards & Regulation, Disease outbreak / control, Innovation, Research & Knowledge, Water Efficiency / Dry Drains, Western Europe Page 3 of 3 | Single page ings. However, in a
Tags: Air admittance valves, Codes, Standards & Regulation, Disease outbreak / control, Innovation, Research & Knowledge, Water Efficiency / Dry Drains, Western Europe Page 3 of 3 | Single page ings. However, in a sceptical world it clearly requires proof of concept. Heriot Watt University has undertaken initial laboratory testing, and a two-year research program that commenced in January 2006 was agreed to with funding from the UK Engineering and Physical Sciences Research Council. Identification of persistent trap seal depletion would allow local installation of active control devices to prevent further failures. Air admittance valves (AAVs) could be used to limit trap seal loss due to negative transients, or variable volume containment devices installed to limit trap seal loss due to positive pressure transients. Comparison of a defect-free simulation with the measured response of the network to an applied transient will identify the presence of a defect. Simulation or measurement of the response at two monitoring stations will identify the defect location in terms of distance and travel time for a transient from the surge generator to the termination and back to the monitoring location. The accompanying chart on page 83 illustrates a simple laboratory demonstration of the principle to be developed in this research, showing the defect-free system response with an AAV or an open end as the stack termination. As the applied transient is positive, the AAV closes and becomes a closed end. Depletion of one trap seal yields a quite different system response, with the reflection returning to the transducer earlier than previously, represe
Where are you "Nongin"? - The State Bird of Manipur - - Part 1 - By:- R.K. Birjit Singh * The literal meaning of "Nongin", the state bird of Manipur (Syrm
Where are you "Nongin"? - The State Bird of Manipur - - Part 1 - By:- R.K. Birjit Singh * The literal meaning of "Nongin", the state bird of Manipur (Syrmaticus humiae) is one who follows the track, train and movement of rain and cloud. In the legendary hill folk-tale, it is believed that the souls of two newly married young couple who deeply loved each other converted into "Nongin" after their death due to poor economic condition and prolonged starvation. Another saying is that local hunters killed the two couple by mistake and their souls converted into "Nongin". After that the myth and belief in the mind of the common people is that those who killed "Nongin" will get the sin and wrath of killing the couple. It may be an olden conservationist positive thought to protect and conserve this precious and seriously endangered bird of the state. It was also the royal bird of the ancient Meetei Kingdom of Manipur. The King of Manipur used to present the feathers of this beautiful bird to the brave hunters and soldiers in recognition of their bravery and contribution to the land and kingdom. This is a resident bird of the Eastern Himalayan region and belongs to the order of Galliformes and family of Phasinadie. Its habitat ranges from grassland of deforested areas to steep rocky slopes with forest and scrubs. Male has chestnut and blue-black color with white banding along scapulars and across wings, and has strongly barred tail. The female has narrow whitish wing bars, and white tips to tail feathers. Both the sexes have long graduated tail and red facial skin. A. O. Hume, a British civil officer identified this bird scientifically during his stay in Manipur in 1883 and named the bird after the name of his wife. Thereafter, the bird is known as Mrs. Hume's Bar Pheasant. Mrs. Hume's Bar Pheasant is one of the seriously endangered bird species protected under the schedule I of the Wild Life Protection (Act), 1972. Even though this beautiful and highly endangered state bird of Manipur is protected under this act, no one could not trace the habitat of the bird for the last two decades in Manipur. At the same time, no one is serious to find the habitat and to protect it. Sometimes and in many occasions Dr. R.K. Ranjan Singh, Director, Academic Staff College, Manipur University and Dr. Kh. Shamungou Singh, Retd. Reader, Deptt. Of Zoology, D.M. College of Science used to chat with me of the status and where about of the last habitat of this precious bird in Manipur. While tracking for this bird I was landed in a workshop and come to know that "Nongin" is also the state bird of Mizoram. It was so strange and wonderful moment for me because; I did not have any idea about this before and not ready to accept it very easily. It so all happened when I was invited with Dr. R.K. Ranjan Singh to join a regional workshop at the North Eastern Hill University (NEHU), Shillong which was held on 15th to 17th December, 2007 to strengthen the Indian Bird Conservation Network (IBCN) under the aegis of the Bombay Natural History Society (BNHS), Bird Life International in association with the Royal Society for Protection of Birds (RSPB) and Darwin Initiative for Survival of Species, United Kingdom. The Bird Life International (UK) is preparing a database of the important bird areas (IBA's) of the globe in view of the serious trend of extinction of bird species and to take up protection and conservational measures. Under this initiative, 9 (nine) important bird areas of Manipur has been identified among the 466 important bird areas of Indian sub-continent. The identified IBA's of Manipur are respectively, |Ango Hill||Ukhrul District| |Loktak-keibul Lamjao Naional Park||Bishnupur District| |Bunning Wild Life Sanctuary||Tamenglong District| |Zeliad Wild life Sanctuary||-do-| |Kaila
[Note: we thank Professor Floridi for kind permission to reprint this material, which is a shortened version of a paper he gave at a UNESCO Conference in Paris, March 14-17, 1995.] Part One: Understanding The
[Note: we thank Professor Floridi for kind permission to reprint this material, which is a shortened version of a paper he gave at a UNESCO Conference in Paris, March 14-17, 1995.] Part One: Understanding The Internet The Internet: a population of several million people, interacting by means of a global network. It is the most educated intellectual community ever, a global academy constantly thinking. Yet the Internet is also a completely new, hitherto unknown phenomenon. What is the Internet exactly? What can it be used for? And what will be the effects of such a radical revolution in the way we handle the world of information? These are the three fundamental questions that will determine the future of organized knowledge. What The Internet Is -- By the word "Internet" we refer to the international system of digital communication, emerging from the agglomerate of thousands of networks that interact through a number of common protocols worldwide. It cannot be physically perceived, or meaningfully located in space and time, over and above the set of interacting networks that constitute it. It is a collaborative initiative of services and resources, each network being accountable only for its own proper functioning. Thus, nobody is ultimately responsible for it as a single enterprise, nobody is earning money from the service as a whole, nobody is running the system, and nobody will be able to control it in the future. What The Internet Can Be Used For -- This is not easy to determine. It isn't that we don't know how to use the system, but that the variety of things that one can do via Internet increases literally every single day. However, we can distinguish four rough categories of communication: email, discussion groups, remote control, and file transfer. Thus, we can exchange private messages with a friend, publish an electronic journal, set up a "slow reading group" on Voltaire's Candide, and access data in all possible forms: software, bibliographic records, electronic texts, images of paintings, statistical graphs, musical sounds, whole data banks on an enormous variety of subjects. Any exchange and manipulation of symbols, images and sounds is already possible on Internet, or soon will be. In the future even television will probably be remembered as just another episode of the computer age. How The Internet Will Affect Organized Knowledge -- This question is almost impossible to answer precisely. It is hard to give even an initial shape to our ignorance, since there may be much more we do not know than we could guess. After all, the Internet is already transforming some of our most fundamental conceptions and habits. The Internet is fostering the growth of knowledge, yet at the same time it is generating unprecedented forms of ignorance. As always in the history of technology, whenever a radical change occurs, some individuals are left behind while the new technology makes those who do master it suddenly aware of other domains still to be explored. The new model of "spineless textuality" represented by hypertext, the virtual ubiquity of documents, the appearance of online services and electronic sources that need to be catalogued, have radically changed the discipline of librarianship. Even the library itself may disappear: no longer a building, a storehouse of knowledge physically recorded on paper, the new "consulting" library will be a node in the virtual space of the digital encyclopedia, providing access to electronic information on the network. Instead of an object-oriented culture, producing multiple copies of physical books for each user, we will become a time-and-information culture, providing services charged per period of use. Concepts of citizenship and privacy are changing too. In the new electronic marketplace of the global village, publicity has assumed an international scale, while privacy means electronic privacy in our email conversations. Our good manners are evaluated on the basis of a social "netiquette." Civil rights concern the way in which information about ourselves can be created and stored in databases, and then accessed and used through the network. Crimes range from electronic pornography to viruses, from the illegal reproduction of software to illicit intrusion into electronic systems, from infringement of copyright to electronic plagiarism. Even the way we think may be affected. Relational and associative reasoning is nowadays becoming as important as linear and inferential analysis, while visual thinking is at least as vital as symbolic processing. And as the skill of remembering vast amounts of facts is gradually replaced by the capacity for retrieving information and discerning logical patterns in masses of data, the Renaissance conception of erudition is merging with the modern methods of information management. En
Valverde's Gold by Mark Honigsbaum, Farrar, Straus and Giroux, $25, ISBN 0374191700 RESEARCHING a book on malaria, Mark Honigsbaum ran across the 19th-century
Valverde's Gold by Mark Honigsbaum, Farrar, Straus and Giroux, $25, ISBN 0374191700 RESEARCHING a book on malaria, Mark Honigsbaum ran across the 19th-century English botanist Richard Spruce on his quest for cinchona trees, the source of quinine to treat the disease. Honigsbaum discovered that Spruce had also "stumbled on" a map to reach a fabulous treasure. This was the enormous amount of gold that the Incas amassed to ransom their king Atahualpa, treacherously imprisoned by the Spanish conquistador Francisco Pizarro. When Pizarro murdered Atahualpa, the shocked Incas buried the gold in the Llanganatis mountains, now part of Ecuador. In the archives of the Royal Botanic Gardens at Kew, Honigsbaum found the map in Spruce's notebooks, and was lured into an endlessly complicated hunt for the treasure. Many expeditions had failed before. Honigsbaum met adventurers, liars, dissemblers and cheats, always finding small encouragements that kept him going....
Sexually transmitted diseases (STDs) are caused by infections that are passed from one person to another during sexual contact. Often these infections do not cause any symptoms. Medically, infections are only called diseases when they cause symptoms. That is why
Sexually transmitted diseases (STDs) are caused by infections that are passed from one person to another during sexual contact. Often these infections do not cause any symptoms. Medically, infections are only called diseases when they cause symptoms. That is why STDs are also called "sexually transmitted infections." There are many kinds of sexually transmitted diseases and infections and they are very common. More than half of all of us will get one at some time in our lives. The good news is there are a number of ways to protect yourself and each other from STDs. Practicing safer sex allows you to reduce your risk of getting sexually transmitted diseases. And if you've done anything that puts you at risk of infection, getting tested allows you to get any treatments you may need. Information on specific sexually transmitted diseases
Decipherment of rongorongo There have been numerous attempts to decipher the rongorongo script of Easter Island since its discovery in the late nineteenth century. As with most undeciphered scripts, many of the proposals have been
Decipherment of rongorongo There have been numerous attempts to decipher the rongorongo script of Easter Island since its discovery in the late nineteenth century. As with most undeciphered scripts, many of the proposals have been fanciful. Apart from a portion of one tablet which has been shown to deal with a lunar calendar, none of the texts are understood, and even the calendar cannot actually be read. There are three serious obstacles to decipherment: the small number of remaining texts, comprising only 15,000 legible glyphs; the lack of context in which to interpret the texts, such as illustrations or parallels to texts which can be read; and the fact that the modern Rapanui language is heavily mixed with Tahitian and is unlikely to closely reflect the language of the tablets—especially if they record a specialized register such as incantations—while the few remaining examples of the old language are heavily restricted in genre and may not correspond well to the tablets either. Since a proposal by Butinov and Knorozov in the 1950s, the majority of philologists, linguists and cultural historians have taken the line that rongorongo was not true writing but proto-writing, that is, an ideographic- and rebus-based mnemonic device, such as the Dongba script of the Naxi people,[note 1] which would in all likelihood make it impossible to decipher. This skepticism is justified not only by the failure of the numerous attempts at decipherment, but by the extreme rarity of independent writing systems around the world. Of those who have attempted to decipher rongorongo as a true writing system, the vast majority have assumed it was logographic, a few that it was syllabic or mixed. Statistically it appears to have been compatible with neither a pure logography nor a pure syllabary. The topic of the texts is unknown; various investigators have speculated they cover genealogy, navigation, astronomy, or agriculture. Oral history suggests that only a small elite were ever literate, and that the tablets were considered sacred. - 1 Accounts from Easter Island - 2 Fanciful decipherments - 3 Harrison - 4 Kudrjavtsev et al. - 5 Butinov and Knorozov - 6 Barthel - 7 Fischer - 8 Pozdniakov - 9 De Laat - 10 Notes - 11 References - 12 Bibliography - 13 External links Accounts from Easter Island In the late 19th century, within a few years to decades of the destruction of Easter Island society by slave raiding and introduced epidemics, two amateur investigators recorded readings and recitations of rongorongo tablets by Easter Islanders. Both accounts were compromised at best, and are often taken to be worthless, but they are the only accounts from people who may have been familiar with the script first-hand. In 1868 the Bishop of Tahiti, Florentin-Étienne Jaussen, received a gift from recent converts on Easter Island: a long cord of human hair wound around a discarded rongorongo tablet.[note 2] He immediately recognized the importance of the tablet, and asked Father Hippolyte Roussel on Easter Island to collect more tablets and to find islanders capable of reading them. Roussel was able to acquire only a few additional tablets, and he could find no-one to read them, but the next year in Tahiti Jaussen found a laborer from Easter Island, Metoro Tau‘a Ure, who was said to know the inscriptions "by heart". Sometime between 1869 and 1874, Jaussen worked with Metoro to decipher four of the tablets in his possession: A Tahua, B Aruku kurenga, C Mamari, and E Keiti.[note 3] A list of the glyphs they identified was published posthumously, along with a complete account of the chants for A and B. This is the famous Jaussen list.[note 4] Though at first taken for a Rosetta Stone of rongorongo, it has not led to an understanding of the script. It has been criticized for, among other inadequacies, glossing five glyphs as "porcelain", a material not found on Easter Island. However, this is a mistranslation: Jaussen glossed the five glyphs as porcelaine, French for both "cowrie" and the cowrie-like Chinese ceramic which is called porcelain in English. Jaussen's Rapanui gloss, pure, means specifically "cowrie".[note 5] Almost a century later, Thomas Barthel published some of Jaussen's notes. He compared Metoro's chants with parallel passages in other tablets and discovered that Metoro had read the lines of Keiti forwards on the reverse but backwards on the obverse. Jacques Guy found that Metoro had also read the lunar calendar in Mamari backwards, and failed to recognize the "very obvious" pictogram of the full moon within it, demonstrating a lack of any understanding of the contents of the tablets. William J. Thomson, paymaster on the USS Mohican, spent twelve days on Easter Island from 19 December to 30 December 1886, during which time he made an impressive number of observations, including some which are of interest for the decipherment of the rongorongo. Among the ethnographic data
Ftp file transfer :A necessary skill for future site administrators Most larger websites (as well as some of the smaller ones) run on their own dedicated machine. This machine has a server, which deals with the program interpretation, database and HTTP
Ftp file transfer :A necessary skill for future site administrators Most larger websites (as well as some of the smaller ones) run on their own dedicated machine. This machine has a server, which deals with the program interpretation, database and HTTP serving. Since the administrator has direct access to the machine,there’s rarely need for file transfers. However, if you’ve ever hosted a site on a web hosting plan, you know that FTP is necessary in order to upload the files of your website to the distant machine. Here’s what we’ll try to explain here – transferring files to and from an FTP server. First off, let’s ask a simple question – what kind of program contacts and interacts with a server? That’s right, it’s a client program. Particularly, in this example, we’d need an FTP client. There are many and different clients out there, and most of them operate on the same basic principles. In order to make our example the same for Windows, Linux and Mac systems, we’re going to use FileZilla. FileZilla is an FTP client which is easy to find, easy to install and easy to use. Download it from the official Filezilla website, after which you can install it, going through the simple “Next>Next>Finish” routine, or even just unzip it and run the Filezilla.exe. Anyway, once you’ve started FileZilla, let’s start with a guide to connecting it to your FTP server, step by step : - Go to File > Site Manager, or press Ctrl+S on your keyboard - In the dialog that opens up, click New Site - On the right, you should find the fields for your FTP server’s information : - The domain name of your FTP server should be written in the Host field. - In protocol, select FTP. - If your FTP server requires accounts (which it most probably does), change the Authentication Type (in some versions Logon Type) from Anonymous to Normal. - Enter your username and password below - Click “Connect” in the field below This summarizes the steps towards connecting to your FTP server. From there on, everything is fairly simple. In most installations, your computers files are on the left, while the server’s files are on the right. If you want to upload files, mark them with your mouse, right click and select “Upload”. If you want to do the exact opposite, select files from the server, right click and press “Download”. Either of those commands saves from current folder to current folder. Which means you’ll upload the file to the server folder which is currently open. And when you download, you will download to the folder which is currently open in FileZilla. Hopefully, this simple guide has taught you the basics of transferring files using FTP. Good luck with your web design and development endeavors!
tax exemption, immunity from the requirement of paying taxes. Federal, state, and usually local law provide exemption from taxation for a wide variety of organizations, usually not-for-profit, such as churches, colleges, universities, health care providers, various charities
tax exemption, immunity from the requirement of paying taxes. Federal, state, and usually local law provide exemption from taxation for a wide variety of organizations, usually not-for-profit, such as churches, colleges, universities, health care providers, various charities, civic leagues, labor unions, trade associations, social clubs, and political organizations. Such policies date back to 1894, when the U.S. Congress passed income tax laws that provided exemptions for certain institutions. The Columbia Electronic Encyclopedia, 6th ed. Copyright © 2012, Columbia University Press. All rights reserved. More on tax exemption from Fact Monster: See more Encyclopedia articles on: Taxation
April Lanotte Inspires Students with Skills Learned as Space Foundation Teacher Liaison In the tiny farming community of Simla, Colo., (pop. 663) the science of space has taken over. When April Lanotte, a Space Foundation
April Lanotte Inspires Students with Skills Learned as Space Foundation Teacher Liaison In the tiny farming community of Simla, Colo., (pop. 663) the science of space has taken over. When April Lanotte, a Space Foundation Teacher Liaison, accepted a job as Simla's only high school science teacher in 2006, she was intimidated to say the least. "While I was fascinated with science, I had been teaching middle school English for the past decade," she explained. "It was only because of the courses I took through the Space Foundation that I had the confidence to pursue a science position." In her first year at Simla, Lanotte used a short unit in rocketry to illustrate the concepts of inertia and momentum to her high school physics class. Her students were so excited that they decided to compete in the prestigious Team America Rocketry Challenge (TARC) that same year. The rules of TARC required the students to build and fly a one-stage model rocket that would reach an altitude of 750 feet, stay aloft for 45 seconds, and return an unbroken egg to the earth. The students spent several months perfecting their rocket, which was created entirely from scratch in the school's wood and metal shops. Although their team didn't make it past the regional qualifier, their rocket was successful in meeting each of the requirements of the contest - and the students begged Lanotte to sign up again the following year. Encouraged by their enthusiasm, Lanotte introduced an upper-level science program in astronautics, comprising classes in astronomy, the basics of flight, rocketry, and the biology of living in space. "It helps the students who want to get into these great science and engineering schools because it stands out on their transcripts," said Lanotte. "Instead of the typical biology and physics classes you might see, our student
The Private Eye Library Home || Full Table of Contents || Suggest a Link || Library Help |A hands-on, investigative teaching approach that attempts to stimulate the wonder of looking closely at the world, thinking by analogy, changing scale, and
The Private Eye Library Home || Full Table of Contents || Suggest a Link || Library Help |A hands-on, investigative teaching approach that attempts to stimulate the wonder of looking closely at the world, thinking by analogy, changing scale, and theorizing. It uses everyday objects, a jeweler's loupe, and a series of simple questions, which become the foundation for hypothesizing, theorizing, and answering the question: "Why is it like that?" Program description, students' projects, "field reports," sample idea sheets and the like are all available online. Designed to develop the "interdisciplinary mind."| |Levels:||Elementary, Middle School (6-8), High School (9-12), College| |Resource Types:||Video, Manipulatives, Lesson Plans and Activities, Internet-Based Projects, Educational Vendors, Books| |Math Topics:||Measurement, Ratio/Proportion, Biology, Earth Sciences| |Math Ed Topics:||Interdisciplinary/Thematic Studies| The Math Forum is a research and educational enterprise of the Drexel University School of Education.
March 14, 2006 > Math and Science Discovery Day Math and Science Discovery Day by Miriam Keller On Saturday, March 4, mothers of third and fourth grade girls were invited to participate in math and science activities at
March 14, 2006 > Math and Science Discovery Day Math and Science Discovery Day by Miriam Keller On Saturday, March 4, mothers of third and fourth grade girls were invited to participate in math and science activities at Hopkins Junior High School. Participants signed up for several sessions and moved from adventure to adventure throughout the morning. Mothers, grandmothers, and aunts attended with the girls. They participated in a morning of fun, hands-on-math and science adventures. For 14 consecutive years Miriam Keller has created, developed, and coordinated a Mother/Daughter Math & Science Discovery Day. Traditionally girls have not been well represented in the math and science fields. Her goal is to provide opportunities to motivate them to continue their math and scientific interests. In the past girls have been kept from recognizing their ability to pursue math and science careers. Miriam wants to help break these barriers.
Because file names can contain quotes, backslashes, blank characters, and even newlines, it is not safe to process them using in its default mode of operation. But since most files' names do not contain blanks, this problem occurs
Because file names can contain quotes, backslashes, blank characters, and even newlines, it is not safe to process them using in its default mode of operation. But since most files' names do not contain blanks, this problem occurs only infrequently. If you are only searching through files that you know have safe names, then you need not be concerned about it. Error messages issued by locate quote unusual characters in file names in order to prevent unwanted changes in the In many applications, if xargs botches processing a file because its name contains special characters, some data might be lost. The importance of this problem depends on the importance of the data and whether anyone notices the loss soon enough to correct it. However, here is an extreme example of the problems that using blank-delimited names can cause. If the following command is run cron, then any user can remove any file on the find / -name '#*' -atime +7 -print | xargs rm For example, you could do something like this: eg$ echo > '# vmunix' cron would delete /vmunix, if it ran xargs with / as its current directory. To delete other files, for example /u/joeuser/.plan, you could do this: eg$ mkdir '#'eg$ cd '#'eg$ mkdir u u/joeuser u/joeuser/.plan''eg$ echo > u/joeuser/.plan' /#foo' eg$ cd.. eg$ find. -name '#*' -print | xargs echo./#./# /u/joeuser/.plan /#foo
More correctly, his theory applied not only to data but also to communication of all kinds and, combined with the pulse code modulation system of digital telecommunications transmission devised in 1937 by Englishman Alec Reeves, effectively laid the foundations for today's modern
More correctly, his theory applied not only to data but also to communication of all kinds and, combined with the pulse code modulation system of digital telecommunications transmission devised in 1937 by Englishman Alec Reeves, effectively laid the foundations for today's modern digital communications and broadcasting networks, the internet and much more. Claude Shannon's childhood was spent in Gaylord, a small town in Michigan where he had a normal state school education. Inspired by his hero, Thomas Edison (whom he later learned was a distant cousin), the young Shannon showed an early gift for science and mathematics as well as a talent for constructing models and gadgets, including a private telegraph system to a friend's house half a mile away. These interests served him well at the University of Michigan, where he graduated in 1936 with twin BSc degrees in electrical engineering and mathematics. Shannon's master's thesis, obtained in 1940 at the Massachusetts Institute of Technology, reflected work he had done at MIT and Bell Telephone Laboratories to solve the growing complexity of telephone systems. Entitled A Symbolic Analysis of Relay and Switching Circuits, it demonstrated that problem solving could be achieved by manipulating just two symbols -- 1 and 0 -- in a process that could be carried out automatically with electrical circuitry. A switch turned on could represent the symbol 1; 0 would be a switch that was turned off. That dissertation has since been hailed as one of the most significant master's theses of the 20th century. To all intents and purposes, its use of binary code and Boolean algebra paved the way for the digital circuitry that is crucial to the operation of modern computers and telecommunications equipment. Eight years later, Shannon published another landmark paper, A Mathematical Theory of Communication, generally taken as his most important scientific contribution. This paper put information theory on the map, establishing terminology and a framework that are still used today. He coined the term bit for a binary digit, and explained that the maximum effectiveness of communications channels would be achieved only when the source rate of the information carried matched the capacity of that channel, both being measured in bits per second. This "mathematical theory" relied heavily on statistical analysis, and in the process Shannon also developed a measure of the efficiency of a communications system, which he called its entropy. At the same time, he separated as different tasks the technical problem of delivering a message from the process of understanding what that message means, allowing engineers to focus on the message delivery system. Given that most communications channels are subject also to interference, Shannon established how best a message could be delivered in sub-ideal circumstances. Overlying all this was the knowledge that the nature of the information transmitted was irrelevant. Whatever its nature -- speech, text or images -- it could be represented numerically in binary form. To engineers accustomed to continuous waveforms, this revolutionary and divisive technique of splitting them into discrete units of ones and zeros was both alien and abstract, but it found favour. Indeed, the very fact that this model of communications systems was so entirely abstract was no disadvantage; on the contrary, this gave it application to a broad range of communication functions, both analogue and digital. It was adopted enthusiastically by communications engineers and prompted attempts to apply similar techniques in other branches of the sciences. Shannon applied the same radical approach to cryptography research, in which he later became a consultant to the US government. In his paper Communication Theory of Secrecy Systems, he argued that messages could survive any degree of interference -- or scrambling -- if sufficient "redundancy" (extra bits) were added. Over successive decades, this technique has developed into sophisticated error-correction codes that ensure the integrity of data prone to unwanted corruption in transmission. Many of Shannon's pioneering insights were developed before they could be applied in practical form. Along with Alec Reeves's concept of telephone conversations transmitted as pulses and Alan Turing's dream of all-purpose computing devices, Shannon's ideas had to wait for solid-state electronics to mature before they could be achieved practically. In fact, it was only the arrival of integrated circuits in the 1970s that made possible the commercial exploitation of technology based on Shannon's theories. His work was not confined to academic research, however, and his eclectic extracurricular interests and activities were notable. They included juggling while riding a unicycle down the halls of Bell Labs, devising a calculator to perform arithmetic operations in Roman numerals and designing a mechanical device for solving Rubik's cube puzzle. He was truly a remarkable man, yet unknown to most of the world. He is survived by his wife, a son and daughter. Andrew Emerson, Thursday March 8, 2001 © Guardian Newspapers Limited
One of the greatest challenges facing healthcare, and society in general, in the 21st century is developing new treatments and interventions for dealing with an ageing population. The need to sustain this population demands a new approach from science. As people
One of the greatest challenges facing healthcare, and society in general, in the 21st century is developing new treatments and interventions for dealing with an ageing population. The need to sustain this population demands a new approach from science. As people live longer, their medical needs change. Academic researchers and health care professionals from across the UK and Europe are working together with the aim of discovering new ways of treating conditions associated with ageing and developing strategies that people can adopt now to help to prevent the onset of age related diseases such as diabetes and cancer. Aston University is at the forefront of such collaborative research. It has a dedicated, ageing research centre that takes a multidisciplinary approach. Aston Research Centre for Healthy is asking how technological, therapeutic and psychosocial strategies can be employed to both understand and prevent agerelated decline. This type of research is possible thanks to the unique combination of expertise in Aston University. Aston academics from biology, ophthalmology, pharmacy, engineering, polymer chemistry, psychology, social science and economics are working together to address questions that are relevant to all aspects of the lives of our ageing population. Dr Roslyn Bill , Director of ARCHA , explains: ‘Our mission is to facilitate research that helps us to understand, predict and prevent age-related degeneration. Our Centre has a specific focus on the eye, the mind, the metabolism and healing. “We have already made a number of breakthroughs via our multidisciplinary research. For example, the most widely used drug for managing insulin resistance in the treatment of diabetes was discovered at Aston, and we have recently developed a new way of taking medication that avoids the need to swallow large pills, a particular problem for elderly patients. We have also developed implantable lenses that can restore focus in ageing eyes. “We have created a world first here at Aston, a new type of hydrogel, which once injected as a liquid into the spine, expands to form a flexible gel ‘cushion’ that prevents friction between any degraded discs.” Researchers involved with ARCHA have also taken a major step forward in the treatment of Parkinson’s Disease. Aston’s Dr Ian Stanford explains: “Evaluating the mechanism by which Deep Brain Stimulation works is a particular focus of our research. This procedure involves the insertion of a metal electrode into the brain, which is then connected to an external battery powered simulator that is placed in the chest wall. At present the most relevant target is a region of the brain called the subthalamic nucleus (STN). The involvement of the STN in motor functions is well documented, hence its neurosurgical importance for Parkinson’s patients. Research has shown that around seventy per cent of patients who undergo Deep Brain Stimulation surgery will experience some benefit.” For more information visit the Aston Research Centre for Healthy Ageing (ARCHA) webpages or download issue 1 of Aston Advances.
When it comes to cultural adornments, nothing is quite like the beautiful jewelery crafted by the various Native American tribes of the United States. Further, nothing captures the primal majesty like the Native American in his (or her) full regalia
When it comes to cultural adornments, nothing is quite like the beautiful jewelery crafted by the various Native American tribes of the United States. Further, nothing captures the primal majesty like the Native American in his (or her) full regalia – headdress, face paint (or masks), beads and hand-made clothing. Every tribe’s jewelry style differs slightly, either in the techniques by which it is crafted, or its presentation. However, Native Americans of many tribes already had a long-standing familiarity with the ingredients that went into making it (beads, shells, copper, silver, bone, turquoise, amber and other stones) by the time they first countered Europeans. Since the 1800s, when the Native Americans picked up silver smithing and other advanced techniques from the Spanish, such advancement has only improved the scope of their efforts, allowing Native American craftsmen to offer some of the most unique, evocative and memorable jewelry seen today. The inclusion of European techniques fused with traditional designs brought about the hitherto unseen yet beautiful squash blossom necklace, bracelets overlaid in silver, and turquoise inlaid rings, as well as earrings, chokers pins and pendants. Every year, markets in the Southwestern United States showcase masterwork from the Hopi, Jemez, Navajo, Taos, and Zuni tribes, and more besides. With all these advancements brought by the foreigners, it would be easy to forget the inherent skill of the tribal craftsmen. Native beadwork, especially when compared to their still-developing use of metals, was already very well established even prior to colonization. They knew then, how to finely grind turquoise, coral and shell beads, making them into elaborate Heishi necklaces. They also knew how to delicately carve the individual wood and bone beads, and the process to intricately stitch hundreds of beads together, into the flawless jewelry and museum pieces we know today. Tradition Meets Beauty As with any culture, Native Americans have traditions surrounding worship, their views on life, death and the world in which they live. Nothing symbolizes this quite so much as their regalia. A Native American in full traditional attire is a sight to behold, and though such an elaborate costume has become fodder for children’s Halloween costumes and the imaginations of eager, if ignorant tourists, there still exists an air of mystery and power when watching ceremonial dances and rituals. The problem with conception is that what many imagine a Native American looks like is inaccurate. Take for instance, the long, flowing headdress of eagle feathers. There were only a few tribes who actually wore them, though as other tribes relocated (to the Plains, for example), they adopted the headdress as a means to appease tourists and visitors who expected them to look a certain way. More common were the roaches crafted of dyed porcupine quills. These were shorter and easier to mange, sometimes worn in combat, but typically for ceremonial purposes. For certain ceremonies, kachina dancers of the southwest would often wear masks, to represent a certain aspect of the culture, natural world or cosmos. This could be either intangible things or representations of people – a revered ancestor, an element, a location, a quality, a natural phenomenon, or a concept that has a particular poignant meaning for the tribe. The Plains Indians also wore buffalo masks in some of their ceremonies. Authentic tunics, trousers (or breech cloths with leggings attach
During the years of Henry the Navigator (to 1460) and after, Portuguese explorers (see Portuguese Exploration of West Africa) had slowly stretched the boundaries of knowledge down the African coast in their attempts to find a sea route to India.
During the years of Henry the Navigator (to 1460) and after, Portuguese explorers (see Portuguese Exploration of West Africa) had slowly stretched the boundaries of knowledge down the African coast in their attempts to find a sea route to India. By 1487 Dioblo Cao (Diogo Cão) had almost reached the Tropic of Capricorn – the central coast of modern Namibia. Diaz, commanding two caravels and a store ship, was despatched from Lisbon in 1487. He passed Cao’s point of return and battled the southerly wind and current to possibly what is now Luderitz, the only decent harbour on that inhospitable coast. There he left the store ship, and continued, finally being forced to stand out to sea to seek more favourable conditions. They instead encounted a storm which blew them south. At about 40 degrees south they found the prevailing westerly wind and headed back for the coast. After several days they turned back towards the north and found land. (Mossel Bay, South Africa.) It was 3rd. February, 1488. They had rounded the southern tip of Africa. They continued east and then northeast for a while until they reached what is now the Great Fish River. There the current was warm and from the northeast. Diaz knew that he had found the route to India. He had a tired crew, and ships showing the wear and tear of months at sea. He consented when the crew asked to return home. J. H. Parry, the maritime historian, considers Diaz to be “a fortunate as well as a brave and skillful navigator”. The Agulhas current at the southernmost point of Africa is a trap for the unwary mariner skirting the coast from the northwest; Diaz had avoided it with his deep-sea rounding of the Cape, and was able to note it on the way back, thereby giving valuable information to those who would follow. Diaz was supplied with two small caravels of the type that had been used for exploration for over half a century. They were not trading vessels. Nor was Diaz a trader, diplomat or soldier. When King Manoel sent Vasco Da Gama on his historic voyage to India a decade or so later it was an expedition designed for trade and diplomacy, and able to defend itself. It knew where it was going. Diaz advised on the planning and route of that voyage. In 1500 Diaz commanded a ship in Pedro Cabral's expedition to India - his was one of four vessels lost in a storm in the south Atlantic. Reference: J. R. Parry; “The Age of Reconnaissance”.
Marek’s disease, highly contagious, often fatal malignancy of chickens that affects the nerves and visceral organs and that is caused by a herpesvirus. The classic sign of the disease is lameness in one or both legs that progresses to
Marek’s disease, highly contagious, often fatal malignancy of chickens that affects the nerves and visceral organs and that is caused by a herpesvirus. The classic sign of the disease is lameness in one or both legs that progresses to paralysis; drooping of the wings may also be noted. In young birds (six to eight weeks of age) predominant signs may be loss of appetite, depression, and sometimes tumours of internal organs and tissue that can be felt under the skin. The disease is named for Jozef Marek, a Hungarian physician who in 1907 described signs of this disease in his backyard roosters. The specific cause of the disease was not established until 1967. Exposure of healthy chickens to airborne dust or dander from infected chicken is an effective means of transmission. Examination of infected birds after death reveals nerves that may be as much as three times their normal thicknesses and lymphoid tumours in various organs. Control is primarily by vaccination, which has resulted in a dramatic reduction in losses from this disease in flocks raised for consumption and egg laying. This control method represents the first successful use of an antiviral vaccine to prevent a naturally occurring malignancy. There is no evidence that the disease is a human health hazard.
The Missing Piece in Education Reform—Dads Writing for CNN’s Schools of Thought blog, NFI's Christopher Brown and Vincent DiCaro reveal the missing piece of education reform. Brown and DiCaro point out that "There is no
The Missing Piece in Education Reform—Dads Writing for CNN’s Schools of Thought blog, NFI's Christopher Brown and Vincent DiCaro reveal the missing piece of education reform. Brown and DiCaro point out that "There is no shortage of answers about how to improve our nation’s schools, including more charter schools, school vouchers, standardized testing, lower teacher-student ratios and performance-based hiring, pay and promotion of teachers. However, what we find lacking in almost every debate about education reform is the role of families - especially fathers - and the support they can and should provide to ensure children’s educational success. If parents, educators and reformers are to make a difference in improving children’s educational success, we must expand our definition of education reform." They continue, "children in two-parent homes were more likely to stay on track in school and have higher literacy, both of which are critical to overall educational success." Pointing to research on marriage from Pew Research Center saying barely one-half - 51% - of adults today are married, down from 72% in 1960, the article says, "The decline of marriage, the rise of divorce and the increase in out-of-wedlock births - now 40% of all births - has contributed to the reality that more than 24 million children in America live in homes absent a biological father." Brown and DiCaro do not write only to complain, but to offer real solutions for educational improvement. They point out several real-life things fathers can do at home and in school to help their children succeed: - Attend school and class events, or even spend a day in the classroom—your presence communicates something to your child and to their teachers. - Read to your children every day. - Help with school work. - Don’t let mom do all the work. Some believe that school is “mom’s territory,” but fathers are just as important to their children’s educations as their mothers. Brown and DiCaro add that schools can help to create father-friendly environments by: - Including posters, reading materials and visual cues that show dads are welcome. - Distribute parenting resources targeted to dads, as well as moms. - Hold seminars for staff members to remind them how important it is for dads to be involved. - Create dad-centric events, like “Dad and Donuts Day” where fathers join children at school for breakfast. Brown and DiCaro do well to explain, "Changing parents’ and schools’ views of parental involvement are part of education reform. But most importantly, we must also address and reverse the two most disturbing trends of the past half-century - the increase in the number of children growing up in father-absent homes and the decline in marriage. These two issues are inseparable and have a direct impact on our children’s success in school." Read the full article at CNN's Schools of Thought. photo credit: dcJohn
In this week’s teaching, Ross teaches on the subject of the BIG sin. The sin of the “golden calf” was called the BIG sin in the Torah. What was it that led the people to commit this great iniquity? Ross
In this week’s teaching, Ross teaches on the subject of the BIG sin. The sin of the “golden calf” was called the BIG sin in the Torah. What was it that led the people to commit this great iniquity? Ross shows that Aaron, despite what many commentaries suggest, was very culpable in the sin of the golden calf. In this
Preventive maintenance can save considerable cost in terms of downtime, injury, lost opportunity, and lost revenue. Two very basic nondestructive testing methods, magnetic particle testing (MT) and liquid penetrant testing (PT), can be useful in
Preventive maintenance can save considerable cost in terms of downtime, injury, lost opportunity, and lost revenue. Two very basic nondestructive testing methods, magnetic particle testing (MT) and liquid penetrant testing (PT), can be useful in identifying manufactured defects in components before they go into service where they could fail and identifying service related defects that arise from damage in use. The principal maintenance applications for these nondestructive testing (NDT) methods are final inspection, receiving inspection, in-process inspection, maintenance and overhaul in the transportation industries, and plant and machinery maintenance. Semi-finished purchased parts and raw materials also can be inspected to detect any initially defective material during a receiving inspection, which can be an important application during plant expansions and overhauls. Because of severe and sudden stress applications, punch-press crankshafts, casings, frames, and flywheels may crack. Crane hooks also may develop fatigue cracks. The MT and PT tests are frequently used in planned overhaul schedules to inspect such critical components for cracks. The work schedule at many planned outages includes an MT or PT inspection of the shaft, blades, and cases of steam turbines and pumps and a weld inspection in deaireators for environmental cracking. Magnetic particle inspection Magnetic particle inspection is a method of locating surface and near subsurface discontinuities in ferromagnetic materials. It operates on the premise that when the material under test is magnetized, discontinuities transverse to the direction of the magnetic field will cause a leakage field to be formed at and above the surface of the part. The leakage field is rendered visible by the application of finely divided ferromagnetic particles over the surface, with some of the particles being clustered and held by the leakage field. These magnetically aligned ferromagnetic particles form the rough outline of the discontinuity and generally indicate its location, size, and shape. The ferromagnetic particles can be applied as dry particles or as wet particles in a liquid carrier such as oil or water. Dry particles are usually brightly colored for high visibility. The wet particles can be coated with a fluorescent to render them more visible under an ultraviolet light. The MT technique is also suitable for weld inspection in ferromagnetic materials. Magnetic particle inspection cannot be used for the inspection of nonferromagnetic materials. This includes materials such as copper and copper alloys, aluminum alloys, magnesium alloys, lead, titanium, and austenitic stainless steels. Both direct current (dc) and alternating current (ac) can magnetize a part for an MT inspection, although their fields differ in many respects. The key difference is that the fields produced by dc generally penetrate the cross-section of the part, while the fields produced by ac are confined to the metal at or near the surface of the part (known as skin effect). Therefore, ac should not be
It’s summer, and sensors are proliferating faster than weeds. Smart phones and tablets have built-in sensors such as accelerometers and magnetometers. Some mobile devices incorporate GPS receivers to provide even more sensor information to applications. Dealing with raw data
It’s summer, and sensors are proliferating faster than weeds. Smart phones and tablets have built-in sensors such as accelerometers and magnetometers. Some mobile devices incorporate GPS receivers to provide even more sensor information to applications. Dealing with raw data from these sensors can be a nightmare given their wide range of capabilities and performance levels. It’s one reason why operating systems like iOS, Android, and Windows provide a standard interface for many sensors. Unfortunately, sensor technology is progressing faster than the software can keep up. Technology demonstrations at trade shows seem impressive, but they typically bypass the operating systems by using a device driver. Applications need to be written specifically to take advantage of new features. Sensors Going Digital Handling a single sensor can be a challenge all by itself since sensors usually are analog devices. Digital versions of these analog sensors normally incorporate a microcontroller. The digital interface is easier to utilize, and there are significant advantages to adding intelligence to a sensor. The first benefit is the ability to provide data in digital form. The second is the ability to scale the results or provide them in more than one format. For example, the data may be the raw results from an analog-to-digital converter (ADC) or a digital value that may be scaled. Future devices then can provide results consistent with older chips. Third, a micro can compensate for issues such as calibration and drift. Finally, sensors use power, and a micro can handle power management. Micros Make MEMS Manageable Adding a micro to the mix brings up a host of other possibilities including sensor fusion. A single micro can easily handle multiple sensors. Interfacing is simplified because there’s a single digital device to work with and it’s possible to provide sensor fusion at the subsystem level. Sensor fusion allows sensors to work together, possibly improving calibration and handling drift. It’s also possible to generate virtual sensors that provide data that’s more usable to an application but sourced from information generated by multiple sensors. And, it’s possible to simulate a sensor like a gyro using an accelerometer, albeit with less accuracy. Sensor fusion can be done on the host. Companies like Sensor Platforms provide software to handle sensor fusion (see “FreeMotion Provides Sensor Fusion For Smart Phone”).The software can run on the host or on a microcontroller servicing the sensors. It also offers advanced sensor management, power management, and virtual peripherals. Sensor Platforms can drive standard operating systems with sensor data. The company also offers its own application programming interface (API), which is more robust. Freescale’s Windows 8 Xtrinsic Sensor is designed to plug into a tablet as a development tool (Fig. 1). The small USB dongle has a ColdFire micro that provides sensor fusion and delivers data in a fashion that is compatible with the forthcoming Windows 8 (Fig. 2). The device is a 12-axis sensor that includes a 3D accelerometer, 3D magnetometer, and 3D gyro, plus an ambient light sensor and a barometer/thermometer. Most systems employ the magnetometer to provide a compass heading, but Freescale utilizes the other sensors as well to improve the compass results instead of using raw data from a single sensor. Windows 8 defines a standard USB interface and queues for data provided by sensors (Fig. 3). Applications then can deal with sensors that are already defined and using data within the specified range and format in a standard fashion. Sensors and their capabilities will continue to grow. Hopefully sensor fusion won’t grow into confusion.
Three-year old Siphol runs the risk of being blinded for life. He has glaucoma, and has already lost the sight in one eye. There is surgery available which could save the sight in his other eye and prevent him becoming completely
Three-year old Siphol runs the risk of being blinded for life. He has glaucoma, and has already lost the sight in one eye. There is surgery available which could save the sight in his other eye and prevent him becoming completely blind, but his mother refuses to take him to the hospital. Because of his disability his father denies paternity, and his mother is in denial of his progressive sight loss. This tragedy underlies the great challenges that disabled people face in developing countries. Lack of finance, support, teachers and care as well as stigma add to the burden of being disabled in the first place. This is why the NGO Sightsavers' work in Malawi is so essential. They work to prevent blindness, restore sight and shine a light on the needs of people who don't have a voice, championing disabled people, children and parents. One billion people around the world are affected by 17 of the most neglected tropical diseases, including trachoma which causes blindness. The prevention of these drives so much of Sightsavers's work. We travelled to Malawi as part of a global campaign to ensure that an integrated approach to the organisation of services and support in a child's earliest years is at the heart of any new development framework that replaces the Millennium Development Goals in 2015. We know from our own experience in the UK with SureStart Centres that investing
The main goal of this demo is to show how you can improve your visualization and understanding of a dynamic system that has simple second order differential equations but complex to visualize due to switching between them. By using 3D animation, you can get a
The main goal of this demo is to show how you can improve your visualization and understanding of a dynamic system that has simple second order differential equations but complex to visualize due to switching between them. By using 3D animation, you can get a much better understanding of the deformation of the ball. The zip file contains: 1. PDf document: This walks through the modeling equations for free fall, the collision and the deformation. 2. The mdl file contains the Simulink® model that represents the above equations. We use Embedded MATLAB® to model contact and collision equations. 3. The WRL file contains the 3D world built with V-Realm Builder. The videos walking through these steps are available here: 1. Building a Simulink Model 2. Building a 3D World 3. Connect SImulink Model to 3D World Check out some other videos and product demos here:
From the Economist: Not so long ago, received wisdom was that most of the human genome—99% of it—was “junk”. If this junk had a role, it was just to space out the remaining 1%, the genes
From the Economist: Not so long ago, received wisdom was that most of the human genome—99% of it—was “junk”. If this junk had a role, it was just to space out the remaining 1%, the genes in which instructions about how to make proteins are encoded. That, it now seems, was far from the truth. The decade since the completion of the Human Genome Project has shown that lots of the junk must indeed have a function. Almost two-thirds of human DNA, rather than just 1% of it, is being copied into molecules of RNA. As a consequence, rather than there being just 23,000 genes, there may be millions of them. Human chromosomes (grey) capped by telomeres (white). Image source: Wikipedia, public domain. One new genetic class is known as lincRNAs. Molecules of lincRNA are similar to the messenger-RNA molecules which carry protein blueprints. However, they do not encode proteins. More than 9,000 sorts are known, and their job is the regulation of other genes. LincRNA is rather odd, though. It often contains members of a second class of weird genetic object. These are called transposable elements - “jumping genes” - because their DNA can hop from one place to another within the genome. Transposable elements come in several varieties, but one group of particular interest are known as endogenous retroviruses. These are the descendants of ancient infections that have managed to hide away in the genome and get themselves passed from generation to generation along with the rest of the genes. This Nature video takes you on an audio-visual journey, diving into a cell to show how genes are transcribed to make messenger RNA (mRNA) and how RNAi can silence specific mRNAs to stop them from making proteins: RNA-only genes: The origin of species? The Economist.
A Part of Conversation Questions for the ESL Classroom. - Have you been in the midst of danger before? - What do you do when you feel someone might be following you? - If you are in danger, what should you do? - If
A Part of Conversation Questions for the ESL Classroom. - Have you been in the midst of danger before? - What do you do when you feel someone might be following you? - If you are in danger, what should you do? - If your life was in danger, who would you call and why? - Can you explain the 'fight or flight' complex? - What makes you suspicious of someone? - What makes you suspicious of a place? - Have you tried doing anything dangerous that could risk your life? - Why are there still people who love to do dangerous sports? - Why are there people who still live in a dangerous society? - Do you think your neighborhood is dangerous? - Have you caused any danger to other people before? - What was the most dangerous thing that you have done? - Why are the rich facing a lot more danger than the poor or average people? - What time is the most dangerous time to go out? - Do you think there are dangers in your house? - What do you do when you see someone in danger? - What do you do when you see the back label of a product with a danger sign on it? - What do you do when you feel that something might happen to you? - Is there an emergency number you can call when you are in danger? - Can we stay away from danger? - Are you a person that worries about nothing or everything? Give an example of something that you worry (or don't worry) about. - What dangers exist when you drive? When you fly? When you take a train? - What dangers exist for babies? For children? For university students? For the elderly? - When can a government be a danger to its own people? - What kinds of people in your community have occupations related to danger? - What country do you consider the most dangerous in the world and why? - Which city in your country do you consider the
The following sections contain additional reference information for administering GRUB in the Oracle Solaris OS. To thoroughly grasp GRUB concepts, an understanding of the following terms is essential. Note - Some of the terms that are described in this list are not exclusive
The following sections contain additional reference information for administering GRUB in the Oracle Solaris OS. To thoroughly grasp GRUB concepts, an understanding of the following terms is essential. Note - Some of the terms that are described in this list are not exclusive to GRUB based booting. A collection of critical files that is used to boot the Oracle Solaris OS. These files are needed during system startup before the root file system is mounted. Multiple boot archives are maintained on a system: A primary boot archive is used to boot the Oracle Solaris OS on an x86 based system. A failsafe boot archive that is used for recovery when a primary boot archive is damaged. This boot archive starts the system without mounting the root file system. On the GRUB menu, this boot archive is called failsafe. The archive's primary purpose is to regenerate the primary boot archives, which are usually used to boot the system. The first software program that runs after you power on a system. This program begins the booting process. See boot archive. GNU GRand Unified Bootloader (GRUB) is an open-source boot loader with a menu interface. The menu displays a list of the operating systems that are installed on a system. GRUB enables you to easily boot these various operating systems, such as the Oracle Solaris OS, Linux, or Windows. A boot menu that lists the operating systems that are installed on a system. From this menu, you can easily boot an operating system without modifying the BIOS or fdisk partition settings. A submenu of the GRUB main menu. GRUB commands are displayed on this submenu. These commands can be edited to change boot behavior. A configuration file that lists all the operating systems that are installed on a system. The contents of this file dictate the list of operating systems that is displayed in the GRUB menu. From the GRUB menu, you can easily boot an operating system without modifying the BIOS or fdisk partition settings. A minimal, bootable root (/) file system that resides on the Solaris installation media. A miniroot consists of the Solaris software that is required to install and upgrade systems. On x86 based systems, the miniroot is copied to the system to be used as the failsafe boot archive. See boot archive for details about the failsafe boot archive. See boot archive. GRUB consists of the following functional components: stage1 – Is an image that is installed on the first sector of the fdisk partition. You can optionally install stage1 on the master boot sector by specifying the -m option with the installgrub command. See the installgrub(1M) man page and Disk Management in the GRUB Boot Environment in System Administration Guide: Devices and File Systems for more information. stage2 – Is an image that is installed in a reserved area in the fdisk partition. The stage2 image is the core image of GRUB. menu.lst file – Is typically located in the /boot/grub directory on systems with a UFS root and in the /pool-name/boot/grub directory on systems with a ZFS root. This file is read by the GRUB stage2 file. For more information, see the section, x86: Modifying Boot Behavior by Editing the menu.lst File. You cannot use the dd command to write stage1 and stage2 images to disk. The stage1 image must be able to receive information about the location of the stage2 image that is on the disk. Use the installgrub command, which is the supported method for installing GRUB boot blocks. GRUB uses device-naming conventions that are slightly different from previous Solaris releases. Understanding the GRUB device-naming conventions can assist you in correctly specifying drive and partition information when you configure GRUB on your system. The following table describes the GRUB device-naming conventions for this Oracle Solaris release. Table 15-1 Conventions for GRUB Devices Note - All GRUB device names must be enclosed in parentheses. For more information about fdisk partitions, see Guidelines for Creating an fdisk Partition in System Administration Guide: Devices and File Systems. Starting with the Solaris 10 10/08 release, the findroot command replaces the root command that was previously used by GRUB. The findroot command provides enhanced capabilities for discovering a targeted disk, regardless of the boot device. The findroot command also supports booting from a ZFS root file system. The following is a description of the device naming convention that is used by the findroot command for various GRUB implementations: Oracle Solaris Live Upgrade: The x variable is the name of the boot environment. Standard system upgrades and new installations for systems with ZFS support: The p variable is the name of the root pool. Standard system upgrades and new installations for systems with UFS support: The N variable is an integer number that starts at 0. This section
Booze: Is it friend or foe? The link between alcohol and cancer has been made starkly clear by a report in the British Medical Journal. It shows that for men 10% of all cancers can be traced back to alcohol, for
Booze: Is it friend or foe? The link between alcohol and cancer has been made starkly clear by a report in the British Medical Journal. It shows that for men 10% of all cancers can be traced back to alcohol, for women the figure is 3%. And the more you drink the greater the risk. But when you look at the wider effect on health, the message is more confusing. This centres around the red-wine effect, where a small amount is thought to benefit heart health. Government alcohol advice Men should not regularly drink more than 3-4 units a day. Women should not regularly drink more than 2-3 units a day. Source: NHS Choices However long-term excessive alcohol consumption is clearly deadly. Alcoholic liver disease accounts for approximately 5,000 deaths in the UK each year. The latest study shows that the dangers of drinking escalate quickly, especially for cancers which have already been linked to alcohol such as oesophagus, liver, bowel and breast cancers. In men who regularly drink less than a pint and a half of beer, 3% of these cancers were linked to alcohol. For those who had more, the figures go up to 18%. Professor Sir Ian Gilmore, the chair of the UK Alcohol Health Alliance, said: "I think what becomes quite clear out of this study is that there is a link between the amount that people drink and the risk, so the more that people drink the more they will be at risk."'Better with alcohol' But several studies have reported the benefits of drinking in moderation. In February, the Institute for Population and Public Health at the Univers
Microphone array aids deaf in discerning speech June 8, 2001 | Source: KurzweilAI Dramatic improvements in speech discernment using signal processing have been developed by Stanford University professor of electrical engineering Bernard Wid
Microphone array aids deaf in discerning speech June 8, 2001 | Source: KurzweilAI Dramatic improvements in speech discernment using signal processing have been developed by Stanford University professor of electrical engineering Bernard Widrow and his students. Dr. Widrow reported the breakhrough in a keynote speech at the recent annual meeting of the Acoustical Society of America. The Directional Hearing ARray (D-HEAR) uses six tiny microphones and signal-processing electronics (worn as a necklace) to enable people with profound hearing loss to distinguish speech in a noisy room for the first time. Microphones in the necklace pick up the sound and transmit it to signal-processing chips that use an adaptive signal processing algorithm to reduce noise by giving different weights to input sounds from the various microphones. The user orients his
The Super Star Destroyer (SSD) is the largest ship ever constructed and continues the tradition of the Star Destroyer series with its dagger-shaped structure. This version however is far more powerful than any model before it and its armaments dominate any
The Super Star Destroyer (SSD) is the largest ship ever constructed and continues the tradition of the Star Destroyer series with its dagger-shaped structure. This version however is far more powerful than any model before it and its armaments dominate any other ship in production along with a reinforced hull that allows the SSD to take a significant amount of damage without requiring repairs. The hull, unlike that of other Star Destroyers, is relat
Futurists know that if the average person can see a growing problem like the increase in the number of obese kids on a playground, or sense a rather immediate threat to their family from lightning from an oncoming violent storm, the threatened person
Futurists know that if the average person can see a growing problem like the increase in the number of obese kids on a playground, or sense a rather immediate threat to their family from lightning from an oncoming violent storm, the threatened person will do something to avoid the danger. However, without those visible signals, little damage control is done. The worst kind of problem for a futurist to discuss is one that is invisible. A real world example is that confronting pregnant women from an unseen pollutant in the water which gets in fish. If enough of the contaminated fish is eaten, the brain of a not yet born baby is damaged. I am talking here about the pollutant mercury, introduced into the environment from burning coal to make electricity. This practice is the major contributor to the 1 out of every 6 American women of childbearing age having unsafe levels of mercury in their blood, and it results in as many as 1 in 10 children being at serious risk for brain damage annually. How much harder it is to catch mom’s attention — she cannot see the evidence, has to trust the scientists, and if a child seems somehow impaired, she cannot know exactly why. (For more information on this problem in your neighborhood, just Google “mercury + fish + pregnancy+ your state’s name.” Sit down first.) Long ago, medical scientists were able to teach us that women who smoked and drank alcohol while pregnant could be harming their babies. You may also remember the painful lessons learned from birth defects caused by some medicines taken while pregnant. And now our knowledge of how pollution also contributes to harming children’s development has expanded. A study of 30 million births over a six year time frame conducted by California researchers found a strong association between higher rates of birth defects among women who conceived in the spring and high levels of agriculture chemicals and garden pesticides in water during those same planting months. The study showed a link between the springtime conception and higher rates of birth defects for half of 22 categories of birth defects, including spina bifida, cleft lip, clubfoot and Down’s Syndrome. What is clear is that there are probably some number of issues that surface as the child begins to enter school which are the result of exposure to pesticides or other chemicals and other forms of pollution during pregnancy. As science continues to recognize more kinds of injury that are not visible at birth, we have come to see that our system for reporting birth defects is probably not showing the full picture. There is a link between the quality of our drinking water and the quality of our health. Now consider this: In North Carolina, just about half of all homes get their drinking water from private wells that are not tested regularly. And even if they were tested to the limits of the law, that leaves much undiscovered, because while the U.S. government regulates the levels of bacteria or virus in drinking water, there are no rules for pharmaceuticals and other compounds, apart from the herbicide atrazine. (See www.newscientist. com/article/mg18825281.500-clean-drinking-water-a-doubleedged-sword.html and www.epa.gov/ppcp/lit.html). There are things you can do to help the not yet born everywhere. You can use less electricity. In your own home or office, change five light bulbs from the old kind to those with an ENERGY STAR rating. To quote the Environmental Protection Agency, “if every household in the U.S. did this, we could prevent the pollution equivalent to nearly 10 million cars.” As discussed in previous columns, keeping your car tires properly inflated increases gas mileage, significantly reducing air pollution. You can be cautious about drinking water by buying an inexpensive water filter for around $35 at many hardware stores. If you get the kind that removes heavy metal pollutants, you are reducing risk. So here is today’s exam question: Have you or your community done anything to reduce the impact of pollution on your kids? If not, what are you going to do about it? This is not about some tragedy in a foreign land. This is our country. We are powerful if we choose to be.
Home Healing & Spirituality The Big Bang theory by Akila Weerasekera, LankaWeb News, April 8, 2008 California, USA -- The notion of a beginning of the universe is fundamental to most religions and
Home Healing & Spirituality The Big Bang theory by Akila Weerasekera, LankaWeb News, April 8, 2008 California, USA -- The notion of a beginning of the universe is fundamental to most religions and also to science. The Big Bang theory, which states that the universe originated about 13.7 billion years ago, along with time and space, is supposed to be the best scientific explanation for how the universe began. In 1922 the Russian meteorologist and mathematician Alexander Friedman used Einstein's General Relativity theory to construct a model of an expanding universe. The Belgian cosmologist-priest George Lemaître independently did the same thing in 1927 and dubbed the infinitesimally small original state of the universe the "primodial atom". In 1946 the Russian-American physicist George Gamow was able to show that first 300,000 years of the universe's existence, its temperature and density were so great that none of its current structures could have existed and that it contained only elementary particles and radiation. According to the theory, prior to the "big bang" there was nothing; during and after that moment there was something: our universe. Therefore, the Big Bang theory is an effort to explain what happened during and after that moment (after the "big bang"). If our universe began as an infinitesimally small, infinitely hot, infinitely dense singularity, were did the singularity come from? The theory is incapable of explaining this. Also, the Bing Bang theory was embraced by many theologians in Europe such as Pope Pius XII. In 1951, Pope Pius XII likened God's words in the book of Genesis, "Let there be light," to the so called explosion of the "big bang" and since then the Big Bang theory has been the popular theory of the so called beginning of the universe. Is it possible for a Sinhala-Buddhist-scientist (the term "Sinhala-Buddhist" doesn't emphasize on Buddhism per se, the emphasis is on a cultural group) come up with a theory which explains the universe? According to Buddhism, time and space are just concepts created by our perception of the world, and have no existence apart from our perception. In other words, they are not "real". The idea of an absolute beginning of time is therefore flawed according to Buddhist thinking. Also, Buddhists believe that nothing, not even the apparent start of time and space, can come about without causes or conditions. In other words nothing can start to exist or cease to exist. There can only be transformations. Such a theory as the Bing Bang must then be a mere episode in a continuum without a beginning or an end. Buddhism considers that phenomena aren't really "born", in the sense that they pass from nonexistence into existence. They exists only in terms of relative or conventional (sammuthi-sacca). Conventional truth comes from our experience of the world, from the usual way in which we perceive it, that is, by supposing that things exist objectively. Buddhism says such perceptions are deceptive and that ultimately phenomena have no intrinsic existence. This is the "absolute truth" (paramattha-sacca). In these terms, the question of creation becomes a false problem since the idea of creation is necessary in an objective world. However, this does not prevent us from creating a theory for the universe in the conventional world as long as we are aware of the distinction between sammuthi-sacca and paramattha sacca. Our theory of the universe could be based upon the Buddhist concepts of samvatta-kappa, vivatta-kappa (Anguttara nikaya, Agganna sutta) and paticca-samuppada. Vivatta-kappa could be translated as the expansion in time and samvatta- kappa could be translated as the contraction in time. This cycle of samvatta and vivatta is called a kappa (kalpa in Sanskrit) which can be roughly translated as an inconceivably long period of time or an eon. In fact the cycle could be further divided in to four parts: The period of or expansion (vivatta-kappa), the period in which the universe remains in a state of expansion (vivatta-ttháyí), the period of contraction (samvatta-kappa) and the period in which the universe stays contracted (samvatta-ttháyí). It is said that the four periods in turn are each subdivided into twenty antara-kappa. Twenty anatara-kappa equals to one asankheyya-kappa (innumerable), thus each of the four parts is called asankheyya-kappa. The whole cycle (four asankheyya-kappa) is called a maha-kappa (great eon). The current time period could be belong to one of the twenty antar-kappa in vivatta-ttháyí. According to Buddhism the realms of existence could be divided into three distinct "worlds" (loka), the immaterial world, (arupa-loka), the fine-material world (rupa-loka) and the sensuous world (kama-loka). It is said that the devas living in, for example, Abhassara brahma loka have a life span of about eight maha-kappa which is greater than one whole cycle. Does this mean these devas "exist" outside (where ever that is) the three-dimensional (may be even more spatial dimensional) universe as we know it? Could it be these lokas are different universes or multi-verses (doesn't mean many possible universes but suggest a possible space-time connection between different lokas)? In our theory, the cyclic universe (it doesn't necessarily mean circular or repetitive) could be described
What is Futurism Futurism was a 20th century art movement. The Futurists loved speed, noise, machines, pollution, and cities; they embraced the exciting new world that was then upon them rather than hypoc
What is Futurism Futurism was a 20th century art movement. The Futurists loved speed, noise, machines, pollution, and cities; they embraced the exciting new world that was then upon them rather than hypocritically enjoying the modern world's comforts while loudly denouncing the forces that made them possible. Fearing and attacking technology has become almost second nature to many people today; the Futurist manifestos show us an alternative philosophy. Although a nascent Futurism can be seen surfacing throughout the very early years of that century, the 1907 essay Entwurf einer neuen?sthetik der Tonkunst (Sketch of a New Aesthetic of Music) by the Italian composer Ferruccio Busoni is sometimes claimed as its true jumping-off point. Futurism was a largely Italian and Russian movement although it also had adherents in other countries. The Futurists explored every medium of art, including painting, sculpture, poetry, theatre, music, architecture and even gastronomy. The Italian poet Filippo Tommaso Marinetti was the first among them to produce a manifesto of their artistic philosophy in his Manifesto of Futurism (1909), first released in Milan and published in the French paper Le Figaro (February 20). Marinetti summed up the major principles of the Futurists, including a passionate loathing of ideas from the past, especially political and artistic traditions. He and others also espoused a love of speed, technology and violence. The car, the plane, the industrial town were all legendary for the Futurists, because they represented the technological triumph of man over nature. Marinetti's impassioned polemic immediately attracted the support of the young Milanese painters? Boccioni, Carr?, and Russolo? who wanted to extend Marinetti's ideas to the visual arts (Russolo was also a composer, and introduced Futurist ideas into his compositions). The painters Balla and Severini met Marinetti in 1910 and together these artists represented Futurism's first phase. The painter and sculptor Umberto Boccioni (1882 - 1916) wrote the Manifesto of Futurist Painters in 1910 in which he vowed: "We will fight with all our might the fanatical, senseless and snobbish religion of the past, a religion encouraged by the vicious existence of museums. We rebel against that spineless worshipping of old canvases, old statues and old bric-a-brac, against everything which is filthy and worm-ridden and corroded by time. We consider the habitual contempt for everything which is young, new and burning with life to be unjust and even criminal." Futurism in the 1920's and 1930's Many Italian Futurists instinctively supported the rise of fascism in Italy in the hope of modernizing the society and the economy of a country that was still torn between unfilled industrial revolution in the North and the rural, archaic South. Some Futurists' glorification of modern warfare as the ultimate artistic expression and their intense nationalism also induced them to embrace Italian fascism. Many Futurists became associated with the regime over the 1920's, which gave them both official recognition and the ability to carry out important works, especially in architecture. However, some leftists that came to Futurism in the earlier years continued to oppose Marinetti's domination of the artistic and political direction of Futurism. Futurism expanded to encompass other artistic domains. In architecture, it was characterized by a distinctive thrust towards rationalism and modernism through the use of advanc
Safe Routes to School coordinators at State Street School listened to parents while developing a program anchored by walking school buses that address worries about safety of children walking and bicycling to school. Results from the locally administered parent survey showed that parents’ biggest barrier
Safe Routes to School coordinators at State Street School listened to parents while developing a program anchored by walking school buses that address worries about safety of children walking and bicycling to school. Results from the locally administered parent survey showed that parents’ biggest barrier was fear of stranger danger and traffic speed, according to physical education teacher Donna Ewald, who spearheaded the SRTS effort. Creating walking school buses provided adult supervision for students walking to school. “It was really parent-driven,” Ewald said. “They weren’t ready to have their kids walk to school on their own.” The town of Windsor has 3,756 people. It is located along the Connecticut River and had been a thriving town driven by mill-powered precision manufacturing during the industrial revolution, but in recent years it has struggled economically as major employers have left the area. Now, approximately 46 percent of the students receive free or reduced school lunch. State Street School is located in a walkable downtown, but the busy roads VT Route 44 and US Route 5 run through town, and a culture of driving remains strong. In July 2006, the school received an $18,000 non-infrastructure grant for encouragement and education efforts that paid for a consultant and incentive prizes. This grant was administered by Mt. Ascutney Hospital, which has a continuing outreach program on community health and fitness. In October 2007, the Town of Windsor and State School were awarded $200,400 for infrastructure to fix sidewalks and install radar speed feedback signs. After receiving the grant in 2006, SRTS organizers held a meeting where parents looked at mapping routes and creating walking school buses. In some cases, neighbors met neighbors for the first time, and students learned which of their friends lived nearby. Six walking school buses were created to walk to school on Wednesdays, and two others also walked on other days when parents could work out the details. Students wore safety vests, and the Windsor Police Department assisted with speed enforcement, used its radar speed cart and enforced crosswalk laws. In addition, “Slow down, kids walking” temporary signs raised driver awareness about walkers. There is also a drop-off location so children who live too far away to walk from home can participate if their parents drop them off. SRTS organizers are currently researching the issues related to having buses drop students there once a week. The biggest strength for the program has been the community itself, according to Jason Rasmussen, senior planner with Southern Windsor County Regional Planning Commission. The school is downtown, and it has an active group of parent volunteers. An unintended benefit of the program is that it led community members to build connections. In the first year of the program, the number of students walking to school doubled from 17 percent to 35 percent on walking school bus days, and there was a corresponding 20 percent decrease in traffic on Ascutney Street. Safe Routes to School organizers have tracked results with in-class tallies and parent surveys. The school is in the center of town, and “it’s a perfect school for walking,” Ewald says. Challenges come from having to cross the street, but one end of the road in front of the school has a crossing guard, and the other end has a stop light with a button walkers can push to activate the light. The concept of walking school buses connected with concerns about the environment, high gas prices and emissions. “It all came together,” Ewald says. Ewald has led the school’s participation in International Walk to School Day for seven years, and high school students participated as walk leaders on those special days. In addition, Ewald is a certified BikeSmart instructor and has been teaching bike safety to students for several years. After the school received its SRTS grant, the Vermont Agency of Transportation required grant recipients to attend SRTS training, and Ewald has now added a WalkSmart module to her class curriculum. “It’s taught our kids a lot,” she said. Walking and bicycling to school was used in the physical education and health curriculum, and sixth graders incorporated walking and bicycling into their personal fitness plans. Students also tried to log enough miles to equal the Long Trail that traverses Vermont. Now that the federal funding for the walking school bus program has ended, parent volunteers sustain five walking school buses, and bike racks are full. Parent volunteers remain active through a listserv. With the 2007 infrastructure grant, two sections of sidewalk will be constructed to connect missing sections and in another case will improve the sidewalk by moving it over to make room for a grass strip between the sidewalk and the road. The school plans to pursue funding for more bicycle racks in the future. Their success is the result of intentional efforts to recruit new parents to support the walking school buses. Current volunteers seek parents with kindergartners and first graders to carry on the work. “I think it’s going to change the culture of our town,” Ewald said. “You can walk and bike safely, and it’s helping the environment,” as well as encouraging people to become more active. SRTS Coordinator State Street School
Massachusetts and the American Revolution Start Your Visit WithHistorical Timelines General Interest Maps Massachusetts became the focal point of opposition to British imperial policies for two reasons. First, the greater Boston area was a major commercial center and was
Massachusetts and the American Revolution Start Your Visit WithHistorical Timelines General Interest Maps Massachusetts became the focal point of opposition to British imperial policies for two reasons. First, the greater Boston area was a major commercial center and was naturally sensitive to all efforts to regulate trade. Second, the colony was home to a large number of radicals who ranged from the obstreperous Samuel Adams to the intellectual John Adams. The first great outburst of colonial indignation came during the Stamp Act crisis in 1765, during which the cry of “no taxation without representation” was heard. The ensuing quiet was broken by resistance to the Townshend Duties in 1767. Radical colonists fanned public furor following the Boston Massacre in 1770 and plotted the destruction of private property in the Boston Tea Party in 1773. British officials responded by closing the port of Boston in 1774. Armed hostilities broke out in April 1775 at Lexington and Concord, and continued at Bunker Hill. Much of the early military action took place in Massachusetts until the focus of the war later shifted to New York, Pennsylvania and New Jersey. See timeline of the American Revolution. - - - Books You May Like Include: ---- First Family: Abigail and John Adams by Joseph J. Ellis. John and Abigail Adams left an indelible and remarkably preserved portrait of their lives together in their personal correspondence: both Adamses were... The Minutemen and Their World by Robert A. Gross. The Minutemen and Their World, first published in 1976, is reissued now in a twenty-fifth anniversary edition with a new Foreword by Alan Taylor and a... Passionate Sage: The Character and Legacy of John Adams by Joseph J. Ellis. Thomas Jefferson and John Adams were once considered equally important fathers of the American Revolution, but over time Jefferson's reputation became...
TABLE OF CONTENTS 1. INTRODUCTION …………………………………………………………….1 2. POLICY BRIEF TITLE………………………………………………………..2 3. PROBLEM IN FOCUS…………………………………………………………2 4. FORMULATION OF EDUCATION POL
TABLE OF CONTENTS 1. INTRODUCTION …………………………………………………………….1 2. POLICY BRIEF TITLE………………………………………………………..2 3. PROBLEM IN FOCUS…………………………………………………………2 4. FORMULATION OF EDUCATION POLICY IN TANZANIA ……………..2 5. CURRENT EDUCATION POLICY IN TANZANIA………………………..3 - 4 6. SHORT FALLS IN THE CURRENT- EDUCATIION POLICY IN TANZANIA…………………………………….4 - 6 7. PROPOSED NEW EDUCATION POLICY IN TANZANIA……………….6 - 7 8. MANAGEMENT AND ADMINISTRATION OF THE – NEW EDUCATION OLICY IN TANZANIA ………………………………...8 Soon After Independence in 1961,Tanzania declared war against three development enemies namely: Ignorance,diseases and poverty.Various plans and programs were formulated and implemented aiming at improving strengthening and expanding social services such as education, health, water, communication,transport,agriculture and the economy at large. In its efforts to eradicate poverty the government put priority in formulating and implementing policies that places the citizens at the centre of the development process. By the early 1980s over 90% of Tanzania school age children were able to enroll in primary Schools. However these achievements were negatively affected from the late 1970s and 1980s. Reasons for economic decline had been collapse of commodity prices in the International market for exported goods (largely raw materials) this in turn affected farmers income and the country’s foreign exchange earrings thus weakening the ability of the government to provide basic social services one being adequate and quality education services. Increase in the price of petrol and petroleum products which adversely affected the country’s balance of payments forcing the government to depend on foreign loans and grants which in most cases are associated with donors priorities and interest and has very little or no economic gain to the recipient country the government unable to provide adequate and Quality education services the collapse of the East African Community (EAC) which forced the government to channel resources to sustain or establish services that were jointly provided by the community the collapse of East African Community brought economic policies. The ability of the government to provide adequate and quality education services was adversely reduced during this period. The 1978/79 war against Idi Amin forced the government to divert resources to overcome the aggression During the war after the war the country was faced with acute inflation as the citizens and the state were all engaged in overcoming the Aggression. Economic activities were largely suspended leading to poor and down trend economic growth and in any case inhibit the provision of basic social services education included In the same years; 1974 onwards the country also experienced extended drought periods which drastically affected production in various sectors of the economy. This led to hunger and decline in government unable to provide basic social services education being among of them. All the above factors are said to contribute to the decline to the provision of basic social services by the government. The economic recovery of new social policies was also formulated in1995. This education policy of 1995 is more than 12years old now. During this period substantial internal and external changes has taken place in terms of internal social needs and political needs and global science and technology advancement; globalization policies global economic adjustment policies and programs, as well as global political changes. All the above social political technology and economic changes internally and externally necessitate the need for Tanzania to revisit and adapt new education policy in order to cope with the current quality and scope of education needed to overcome this century social political and economic hurdles; and put itself in a better economic and development position. This policy brief paper is geared to explore the education policy in Tanzania. The main objective is to come-up with a policy brief paper which brings forward alternative options to the existing educational policies with the ultimate aim of improving the existing one or introducing new ones in order to speed-up the elimination of illiteracy problem and poor quality education in Tanzania. This in turn will accelerate the nation development efforts through both the National poverty eradication strategy (NPES) and poverty reduction strategy paper (PRSP) which was approved in 2000. This policy brief for the education sector in Tanzania will provide the reader with the following insights:- Policy brief title Problem in focus Education policy formulation in Tanzania Shortfalls in the existing educational policy Proposed or alternative education policy options. Benefits/outcomes of the proposed policy options. Possible short-term and long term problems likely to occur if the proposed policy options are not adapted and implemented. Conclusion based on-re-emphasizing the importance of new actions or options to be adapted. POLICY BRIEF TITLE: “ADOPTION OF A NEW EDUCATION POLICY IN TANZANIA - A NECESSITY TO COPE WITH THE WORLD RAPID CHANGES IN SCIENCE AND TECHNOLOGY, ECONOMIC AND TRADE POLICIES, AS WELL AS POLITICAL LIBERALISATION.” PROBLEM IN FOCUS:- HIGH LEVEL OF ILLITERACY AND INADEQUATE HUMAN CAPACITY IN TANZANIA THE MAIN BOTTLENECK IN POVERTY ERADICATION” POLICY PROCESS IN TANZANIA: Definition of policy:- In most cases policy making and decision making are used synonymously analysist’s differentiated policy from decision they argued that policy is larger than decision and that policy usually involves a series of more specific decisions. Harrop (1992) suggest that policy involves “a buddle of decisions and how they are put into practice.” Policy is again
- slide 1 of 4 Many kinds of surveying equipment have been used in the past and present to help a surveyor measure various parameters of a land area. Each of these parameters is measured by a specific type of measuring equipment.
- slide 1 of 4 Many kinds of surveying equipment have been used in the past and present to help a surveyor measure various parameters of a land area. Each of these parameters is measured by a specific type of measuring equipment. In this article we will learn about the importance of the main types of surveying equipments, both old and new. - slide 2 of 4 Surveying Equipments - Old In ancient times surveying equipment included chains, compass, solar compass, transit, theodolite and more. Chains with equal size links were used to measure distance between two required points. A compass was used to measure the direction of a line that was being surveyed. A solar compass was used for measuring both the direction and latitude of a particular point with the help of sun and stars. A Solar Compass could also measure horizontal angles and the “true north” of a particular place. A metallic measuring tape was used to measure shorter distances. As technology gradually advanced with time, instruments used for surveying also improved. Horizontal and vertical angles were measured using a simple theodolite whereas different heights were measured by a basic level. Measuring wheels were also initially used by surveyors to measure long distances in a short duration of time. Measuring wheels came in two types: mechanical and electrical, and both worked on the same principle of rolling the wheel from the start to the end point. In the early 1900s, surveyors started to use surveying equipment such as planimeters, theodolites, automatic levels and measuring wheels. A planimeter is the best known tool for measuring asymmetrical land areas as they eliminate the need for charts or manual calculations; whereas a theodolite allows measuring of horizontal and vertical angles. A theodolite consists of a movable telescope attached over perpendicular axis. It provides precise measurement of angles and is an integral part of every surveying tool kit. A transit is a type of theodolite but has less precision. An auto level or a dumpy level is also a type of surveying equipment used for measuring horizontal levels. It consists of a telescope like device fitted on a tripod stand. Auto level, tilting level, and self-leveling level are all types of leveling instruments, each providing different rotating capabilities. Most surveying instruments are fixed on a tripod, which acts as a support. As the name suggests, tripods have three legs with length varying capab
WHEN DID BRUSSELS SPROUT? Food for Thought - December 8, 2010 - Mark R. Vogel - [email protected] - Mark’s Archive See also: Selection & Preparation; Trivia
WHEN DID BRUSSELS SPROUT? Food for Thought - December 8, 2010 - Mark R. Vogel - [email protected] - Mark’s Archive See also: Selection & Preparation; Trivia & Facts; Cooking Tips; It never ceases to amaze me how many foods and classic recipes have histories embroiled in mystery, controversy and general contrariety. Most of the time when researching a particular comestible, I find myself lost in a universe of permutations. Consider the etiology of something as seemingly simple as the Brussels sprout. After reviewing five textbooks, an encyclopedia, and a well known food history website*, I was able to determine that Brussels sprouts originated in Europe in either the 5th, 13th, 15th, 16th, 17th or 18th century. Well that narrows it down. What is known is that cabbage, the ancestor of Brussels sprouts, is indigenous to the Mediterranean and has been cultivated for at least 2,500 years. Cherished by the ancient Greeks and Romans, it was propagated by the latter throughout Europe. Whatever the temporal period, Brussels sprouts were cultivated in Belgium and hence were eponymously named after its capital city. The French introduced them to Louisiana in 1800. Today most American Brussels sprouts hail from California and end up in frozen products. Interestingly, despite their Belgian roots, the Netherlands are the key producer in Europe. Brussels sprouts have an unjust reputation for mawkishness. Many people who dislike them have only been exposed to improperly stored or cooked Brussels sprouts. While I’m sure some will recoil even under the best circumstances, you owe it to yourself to revisit them under ideal conditions. First they must be fresh. Brussels sprouts grow on stalks and sometimes supermarkets will sell them with the stalks attached. Clearly this is preferable. If sold loose or worse yet, in pre-wrapped packages, inspect them carefully. If the leaves are yellow, discolored or loose, or if the root ends are brown or appear dry, avoid them altogether. If possible, choose smaller specimens as they are tenderer than their big brothers. Once purchased, endeavor to use them promptly. Do not hold them beyond three days in the fridge or they can develop off flavors. On yet another disparate note, some sources advise storing them in a plastic bag and others do not. Just use them expediently and bypass this contention. Next is how and with what to cook them. Brussels sprouts can be cooked by water via steaming or boiling but as with most foods, dry heat methods such as roasting, sautéing, broiling, or even grilling is best. Water leeches flavor (not to mention vitamins and antioxidants), and cannot produce the intensity of flavor that dry heat methods can. Indisputably Brussels sprouts are most sumptuous when combined with a rich pork product such as bacon, prosciutto, or pancetta. Or try sautéing them in chicken or duck fat. Another decadent alternative is to cook them in a gratin smothered by butter and cheese. Quite simply, their stouter essence marries harmoniously with luxurious ingredients. This is not merely due to the fatty sidekick, but the synchronicity achieved between the flavors of the Brussels sprouts and the fat. Finally, avoid overcooking them. As with all forms of cabbage, excessive cooking generates malodorous compounds. Brussels sprouts are rich in fiber, folic acid, and vitamins A and C. They are a cruciferous vegetable, i.e., a family of veggies that are reputed to have anti-cancer properties. Others include mustard greens, broccoli, cauliflower, rutabagas, turnips, chard, and kale. Brussels sprouts are best served with more robust fare such as red meat or roasted pork and poultry. However, if your palate is amenable, they can be very thinly sliced and served raw in salads. BRUSSELS SPROUTS WITH BACON, DRIED FRUITS & ALMONDS • ¼ cup dried cherries • ¼ cup currants • 1 cup white wine • 1 lb. Brussels sprouts • 8 slices bacon, thinly sliced • ¼ cup slivered almonds • A splash of balsamic vinegar • Salt & pepper to taste • Olive oil as needed Preheat the oven to 375 degrees. Place the cherries and currants in a small saucepan and add the wine. Bring to a boil and then remove from the heat. Let the fruit steep in the hot wine for about 15 minutes. Meanwhile trim the Brussels sprouts. First make a thin slice off the root end. Then cut them in half vertically discarding any outer leaves that fall off naturally. Remove any remaining outer leaves that are discolored. If any of them are notably larger than the rest, cut them into quarters. Once cut, wash them by submerging them in a bowl of water and then drain and pat dry. Combine all of the ingredients except the oil in a bowl and toss. Add the olive oil in increments and stir, adding just enough to evenly but lightly coat everything.
Warren County, comprising 286 square miles, was created in 1793 in the east central part of the state from Burke, Columbia, Washington, and Wilkes counties. Later, parts of Warren County were used to create Glascock County
Warren County, comprising 286 square miles, was created in 1793 in the east central part of the state from Burke, Columbia, Washington, and Wilkes counties. Later, parts of Warren County were used to create Glascock County and parts of Jefferson, McDuffie, and Taliaferro counties. Georg
The Untold Story The above photo, titled Benedict J. Fernandez and featured in the 60 from the 60′s exhibit at the George Eastman House, was taken by Garry Winogrand during the riots in Newark, New
The Untold Story The above photo, titled Benedict J. Fernandez and featured in the 60 from the 60′s exhibit at the George Eastman House, was taken by Garry Winogrand during the riots in Newark, New Jersey in 1967. Prior to the riots, there was a rapid growth of tension in Newark’s African American community as a result of racially charged social unrest. This powder keg was finally set alight shortly after the arrest of a black cabdriver by two white officers; occurring outside of a large public housing project. According to a NJ.com blog written by Brad Parks, “The policemen said Smith [the cabdriver] resisted arrest and had to be subdued. Smith said the cops started beating him after he asked why they pulled him over. Either way, Smith was badly injured and could not walk by the time [the policemen] dragged him into the 4th Police Precinct on 17th Avenue – in full view of several residents of the Hayes Homes public housing project across the street. A rumor soon flew around Hayes Homes: The police beat a cabdriver to death.” What ensued was 6 da
In an effort to stop the transmission of Clostridium difficile infections (CDI), which claim the lives of at least 14,000 Americans annually, the Association for Professionals in Infection Control and Epidemiology (APIC) has issued
In an effort to stop the transmission of Clostridium difficile infections (CDI), which claim the lives of at least 14,000 Americans annually, the Association for Professionals in Infection Control and Epidemiology (APIC) has issued an updated Implementation Guide to help clinicians protect patients. The new edition of the Guide to Preventing Clostridium difficile Infections is an update to the 2008 Elimination Guide and contains both new material and revised content that reflect evolving practices and new discoveries. It is available as a free online download. Developed by a team of infection prevention experts, the guide includes sections on the changing epidemiology of CDI, strategies for prevention, considerations for specific patient populations, and new and emerging technologies. The easy-to-read format also features practical tools, checklists, frequently-asked-questions, and a glossary of terms. A sampling of topics includes: • CDI in pediatrics and skilled nursing facilities • Hand hygiene • Fecal bacteriotherapy (stool transplant) • Environmental cleaning and monitoring • Antimicrobial stewardship According to the Centers for Disease Control and Prevention, deaths related to CDI increased 400 percent between 2000 and 2007, due in part to a stronger germ strain. CDI is estimated to add at least $1 billion annually to U.S. healthcare costs. APIC Implementation Guides (formerly Elimination Guides) provide practical, evidence-based strategies for surveillance and elimination of infection. Implementation Guides are created to provide infection preventionists with practical, “how-to” information and online tools and resources that encompass the latest research and regulatory requirements. Open access ensures that this information, critical to the care of patients, is available to the widest possible audience.
AUSSI DISPONIBLE EN FRANÇAIS. Suivez ce lien: Size: 11 pages, PDF file, 940 KB, Adobe Reader needed Knowledge of the basic crochet stitches (chain stitch, single crochet). LEFT
AUSSI DISPONIBLE EN FRANÇAIS. Suivez ce lien: Size: 11 pages, PDF file, 940 KB, Adobe Reader needed Knowledge of the basic crochet stitches (chain stitch, single crochet). LEFT-HANDED VERSION ALSO AVAILABLE All you need to know to start exploring wire crochet. This tutorial will save you hours of trial and error, helping you avoid costly mistake and many painful headaches. You will learn: - What are the best kinds of wire and hooks to use; - The proper way to hold your work and your hook when working with wire; - How to maintain a good and regular tension; - How to produce well-formed and even stitches throughout your work; - How to crochet with beads; - How to finish your pieces; ... and many other useful tips You will need : - 28ga (0,32 mm) round, dead-soft wire (brass, copper or artistic wire for practice) - Hooks in various sizes, starting from 1,25 mm (# 8, US); - Assortment of beads in various sizes and shapes for practice; - Cutters (or nail-clipper) - Round-nose pliers - Chain-nose and/or flat-nose pliers (2) This tutorial includes: - 11 pages of clear instructions, tips and tricks, with close to 30 pictures. - Links to three short videos illustrating the different steps in the execution of the technique. - DOES NOT INCLUDE the jewellery displayed on this page nor the patterns to make them. They are shown only as an example of what can be done after lots of learning, practice and experimenting. SORRY, NO TUTORIAL WILL BE SENT BY REGULAR MAIL.
Jesus Fish/Darwin Fish Published: 31 January 2007 (GMT+10) This is the pre-publication version which was subsequently revised to appear in Creation 30(2):21–23. Christians have embraced many
Jesus Fish/Darwin Fish Published: 31 January 2007 (GMT+10) This is the pre-publication version which was subsequently revised to appear in Creation 30(2):21–23. Christians have embraced many symbols through the centuries. The dove, a peacock, the anchor, the lamb, wine and bread are found on frescoes, fonts, baptismal cups, in catacombs and throughout the early church. The fish, one of Christianity’s oldest, is probably also the best known (see box below). Sometimes ichthus (Greek for fish, ιχθύς) or (today) ‘Jesus’ is inserted inside the fish. Atheists use their Darwin fish to protest against the Christian faith. That they use evolution to counter biblical faith shows how foundational the issue of origins is to the Gospel, and that church leaders who dismiss it as a ‘side issue’ have their heads in the sand. Its popularity has spawned a parody: the ‘Darwin fish’. The Darwin fish redesigns the Christian symbol as a missing link, ‘evolving’ it with legs and feet in mockery of the Christian faith. Some even carry Darwin’s name in the middle, displacing Jesus in adoration of a new deity. Recent Darwinesque fish parade the word ‘evolve’ whilst the fish’s front limb holds a spanner: it has ‘evolved’ to be a tool user! Retaliation in kind has fuelled the ‘Fish Wars’. A larger Jesus fish is shown eating a Darwin fish, whilst some of the Christian fish have the word ‘Truth’ inside. Not to be outdone the Darwin fish group now sell a T. rex devouring a Jesus fish (with the advertising slogan, ‘Now, if only religion would go the way of the dinosaur …’). Then there is the double fish bind: a Darwin fish with ‘I evolved’, and a Jesus fish labeled ‘You didn’t’. The one-upmanship continues unabated! It is all rather trite, really, but it does reflect the underlying cultural war that is going on between secularists and Christians. Christianity in general is the real target of the Darwin fish, demonstrated by horned or flaming ‘Satan’ fish, pitchfork wielding ‘Devil’ fish or the ‘Reality bites’ fish where the ‘Darwin fish’ swallows the Christian symbol. ‘In several respects, displaying the Darwin fish is the symbolic equivalent of capturing and desecrating an enemy’s flag, an act of ritual aggression,’ says Dr Thomas M Lessl, an Associate Professor in the Department of Speech Communication at the University of Georgia.1 Lessl did research in several states in the U.S.A. by finding the Darwin fish symbols on cars and leaving questionnaires for the owners. The responses he received illuminated the thinking behind those who put these emblems on their cars. Lessl provided statements of some of the respondents: - ‘Mainly I did it to annoy the Christian right wing, since they are so fond of putting the fish/Christ symbols on their cars. I also use it to display the symbol of my group, which believes natural processes explain the world around us.’ - ‘I can see how some people might feel hurt by the obvious play on the traditional fish logo. I can’t speak for everyone, but I don’t see it as anything but light-hearted.’ - ‘Creationists are [expletive] idiots. Get a [expletive] education. Humans are no better than chickens, redwoods, fireflies, earthworms, goldfish, algae or infectious salmonella, just because we walk upright and have opposable thums [sic].’ Lessl commented, ‘The apparent desire to deride this audience seems to be just as important as any serious message they want to communicate.’ With considerable take-up of these plastic, chrome-coloured emblems it seems that many people wish to make their comment on what they perceive to be something worth deriding. Some Darwin fish owners are openly hostile. There is a purpose, Lessl states, ‘By inserting Darwin’s name in the place on the fish icon usually reserved for Christ, the ichthus symbol is ritually profaned or emptied of its religious meaning.’ Darwin fish symbolise naturalism’s supposed superiority. Other respondents to Lessl’s questionnaire replied along these lines2: - ‘Evolution is the underlying theme of all biology, yet is largely misunderstood, and very sadly, even rejected by people who are either too afraid or too ign
Stent in Left Coronary Artery The heart shown in this image has had a stent placed in the left coronary artery. Stents are tiny coils of wire mesh used to open up blocked arteries in a medical procedure called an angioplast
Stent in Left Coronary Artery The heart shown in this image has had a stent placed in the left coronary artery. Stents are tiny coils of wire mesh used to open up blocked arteries in a medical procedure called an angioplasty. They are often inserted laparoscopically, feeding wires up to the coronary arteries through arteries elsewhere in the body that are more accessible, without having to open the patient's chest. Stents are specially engineered to fit various diameters of arteries, allowing an individualized fit. Once in place, the previously blocked artery is now equipped with a miniature scaffolding to hold it open and allow blood to easily flow through.
Decrease Cholesterol’s purpose is to provide visitors with high-quality information for lowering cholesterol and related information. So, what is cholesterol? Cholesterol is a lipid or fatty substance that’s in the outer lining of cells in animals. Humans also have
Decrease Cholesterol’s purpose is to provide visitors with high-quality information for lowering cholesterol and related information. So, what is cholesterol? Cholesterol is a lipid or fatty substance that’s in the outer lining of cells in animals. Humans also have cholesterol in the circulation of the blood. Cholesterol in people comes from two sources: dietary intake and liver production. Cholesterol in foods come from mostly meat, poultry, fish, and dairy. Plant foods do not contain cholesterol. Total cholesterol is made up of four specific types: LDL, HDL, VLDL, and IDL which stand for lower-density, high-density, very low-density, and intermediate-density cholesterol. LDL cholesterol is generally referred to as “bad” cholesterol because of its link with increased risk of coronary heart disease. It causes cholesterol plaque to form on the walls of arteries. This plaque gets thicker over time causing the arteries to narrow. This is known as atherosclerosis. HDL cholesterol is often referred to as “good” cholesterol because it helps prevent atherosclerosis. It achieves this by removing cholesterol plaque from the artery walls and breaks it down through the liver. One popular way to lower cholesterol is through medications prescribed by doctors. Statins are the best and most often used medications to lower LDL cholesterol levels. Medications are generally used as a last resort when diet changes fail to reduce cholesterol within a desired range. So, what are normal cholesterol blood levels? While there’s no established normal levels for total or LDL cholesterol, the normal range for adults in the United States may be too high and quietly progressing to dangerous levels. This is cause for concern because many healthy adults may be at risk for developing coronary heart diseases in the future with little or no warning. Doctors should first advise you to reduce high cholesterol by altering your lifestyle. They will ask you about your diet and how much exercise your getting. Then recommend consuming fewer foods that raise cholesterol and greater amounts of foods that lower cholesterol. They’ll also recommend that you engage in cardiovascular exercise, which has a positive impact on cholesterol. Dr. Angelo Cuzalina suggests a combination of healthy eating and exercise to keep up with your health in many ways including lower cholesterol. Learning how to lose weight can also be a beneficial step to lowering cholesterol. Low cholesterol diets are the best place to start your mission to decrease cholesterol.
You are here »Home / Resources / Guess Papers / Guess Papers ( Biology, 9th Class ) Please login to rate this resource. In 19th century, the compound microscope was highly advanced and biologists observed things just a micrometer
You are here »Home / Resources / Guess Papers / Guess Papers ( Biology, 9th Class ) Please login to rate this resource. In 19th century, the compound microscope was highly advanced and biologists observed things just a micrometer apart. After this, a series of discoveries started, which provided basic information for cell theory. 1. In 1831 - 33, Robert Brown discovered nucleus in cells of plants. 2. In 1838, a German botanist Mathias Scheiden observed that all plants were made up of cells. 3. In 1839, Theoclor Schwann observed that the bodies of of animals were made up of cells which were similar to plant cells. 4. Thus, Schleiden and Schwann formulated the "Cell Theory". According to this, all organisms are made up of cells. 5. In 1840, J. Purkinji gave the name "Protoplasm" to the things found inside the cells. At that time, cell was considered as a bag of thick dense substance containing a nucleus. Later on, resolving power and quality of microscopes were highly improved. Section cutting of tissues and cells and their staining became easier and better. It revealed that cell was not a simple mass of granular substance; instead it contained many sub cellular bodies called "Organelles". Each organelle has a definite job in the cell. 6. Human is made up of about 60 trillion cells. From Amoeba and unicellular algae to whales and tallest red wood trees, all' are made up of similar basic units called cell.s All animals and plants are thus made up of cells and cell products. Moalims are a private institutional information system with over 2,500 institutes registered from all over Pakistan and growing day by day, by the grace of Allah. It is established in 2009. It will be the largest education information system of its kind in the Pakistan Inshallah. As a global network, Moalims aims to give Parents, Teachers, students and Professionals a quality information and to prepare engaged People/citizens who shape not only the communities they live in, but also the wider world. A project of Web & Network Solutions Limited
Why damaged DNA gets a case of the bends August 22, 2004 Study reveals how body's repair machinery recognizes altered DNA Our knees may become stiff when injured, but banged up DNA becomes flexible, suggests the most detailed computer
Why damaged DNA gets a case of the bends August 22, 2004 Study reveals how body's repair machinery recognizes altered DNA Our knees may become stiff when injured, but banged up DNA becomes flexible, suggests the most detailed computer model of damaged DNA to date. Further, this flexibility explains how the body's enzymes recognize and fix damaged DNA, Pacific Northwest National Laboratory's Maciej Haranczyk reported today at the American Chemical Society national meeting. "There's a lot of discussion in the literature about how damaged DNA is recognized by the repair enzymes," said Haranczyk, a staff scientist at the Department of Energy laboratory in Richland, Wash. "The current picture is that some enzymes bend damaged DNA in order to repair altered fragments. But no one knew why damaged DNA was more susceptible to bending." Haranczyk and colleagues' simulation offers an explanation. First, they programmed a chemical change to an intact DNA fragment. As with real DNA, the simulated molecule's backbone became distorted and its base pairs displaced. The structural change corresponded with a change in the molecule's shape, in its energy and how electric charges are distributed throughout the molecule. "All these features are significant in enzymatic recognition of the damaged site," Haranczyk said. "In our model, damage triggers a reorganization of the sugar-phosphate in the DNA's backbone such that the DNA becomes thinner. In damaged DNA, negatively charged phosphate groups migrate along the axis of the DNA, and that allows the molecule to bend easily. We believe it is this difference in the damaged and intact DNA that the enzymes recognize." Haranczyk said this was the first quantum chemistry simulation to survey such a large biological system-in this case, a DNA fragment made up of 350 atoms. "With a system so big, one can't do this kind of work without a supercomputer. Fortunately, we had access to one of the world's 10 most powerful computers," housed at the W.R. Wiley Environmental Molecular Sciences Laboratory on the PNNL campus. Tags: Energy, Fundamental Science, Computational Science, Chemistry, Supercomputer
A Answers (3) Your risk of aphthous stomatitis, or canker sores, an ulcer inside of your mouth, is increased by your gender and family history. Women are more prone to getting canker sores than men.
A Answers (3) Your risk of aphthous stomatitis, or canker sores, an ulcer inside of your mouth, is increased by your gender and family history. Women are more prone to getting canker sores than men. Also, if members of your family tend to get canker sores, then you are at a higher risk of developing them as well. American Dental Association answeredFatigue, stress or allergies can increase the likelihood of a canker sore (small ulcers inside the mouth with a white or gray base and a red border). Some women may be more prone to them in their premenstrual cycle. A cut caused by biting the cheek or tongue, or reactions from hot foods or beverages may contribute to canker sore development. Intestinal problems, such as ulcerative colitis and Crohn's disease, also seem to make some people more susceptible. Honor Society of Nursing (STTI) answered The cause of aphthous stomatitis (canker sore) is unknown, and anyone may develop one or more of these painful mouth ulcers. There are a couple of conditions that raise your risk factor for developing aphthous stomatitis. If other people in your family have had canker sores, your chance of getting them is higher. Also, women are more likely than men to get this type of mouth ulcer.
Territorial A-ZA | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V |
Territorial A-ZA | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | 0-9 31 results for Slaves: | See previous results See results 16 - 20 View all results Authors: Brown, John, 1800-1859 Date: January 3, 1859 Designated "Old Brown's Parallels" and dated January 3, 1859, from Trading Post, Kansas, this is one of the better-known John Brown documents from Kansas. Written for publication in the newspapers just before his final departure from the territory, Brown began by stating "two parallels"--one being the failure of government to do anything about the murder of free-state men (Marias des Cygnes Massacre) May 1858; the other being his recent raid into Missouri to free eleven slaves and take "some property." In the latter incident, only one white man, a slave owner, was killed, but "all 'Hell is stirred from beneath,'" as the governor of Missouri was demanding the capture of those "concerned in the last named 'dreadful outrage.'" Keywords: African Americans; Border disputes and warfare - Free state perspective; Border disputes and warfare - Proslavery perspective; Brown, John, 1800-1859; Buchanan administration; Civil rights; Free State Party; Fugitive slaves; Hamilton, Charles A.; Jayhawking; Linn County, Kansas Territory; Marais des Cygnes Massacre; Missouri; Press and propaganda; Slaveholders; Slaves; Trading Post, Kansas Territory Letter, J. G. Anderson to "Dear brother," J. Q. Anderson Author
Across the salinity transition: Changes in N and P biogeochemistry along an estuarine salinity gradient. Collaborative Research: Principal Investigator: Thomas E. Jordan Smithsonian Environmental Research Center Co-Principal Investigators:
Across the salinity transition: Changes in N and P biogeochemistry along an estuarine salinity gradient. Collaborative Research: Principal Investigator: Thomas E. Jordan Smithsonian Environmental Research Center Co-Principal Investigators: Jeffrey C. Cornwell and Walter R. Boynton University of Maryland Center for Environmental Sciences Horn Point Laboratory and Chesapeake Biological Laboratory Funding from the National Science Foundation Eutrophication is mainly caused by large-scale anthropogenic alterations of the cycles of nitrogen (N) and phosphorus (P). Generally, P enrichment has the greatest impact in freshwater while N enrichment has the greatest impact in seawater. In estuaries, where freshwater and seawater mix, there are spatial and temporal changes in the relative abundance of N and P, which present difficulties for prioritizing nutrient management. This project will compare the interactions of N, P, sulfur, and iron cycles along the estuarine transition from freshwater to saltwater. The research will focus on the interface of fresh and salt waters in the Patuxent River estuary where there is a well-defined salinity gradient and a wealth of background information from previous and ongoing research and monitoring. Along the salinity gradients of estuaries, biologically available N can be consumed by denitrification while available P may be enriched by the dissolution of inorganic particulate P. The objectives of this study are to assess the importance of terrigenous inorganic particulate P as a source of available P, to determine the dominant mechanisms responsible for increases in available P at the upstream edge of the salinity gradient, to determine the effects of salinity on denitrification and on releases of available N from sediments, and to compare net burial of N and P in sediment along the salinity gradient. The study will use a combination of observations and experiments to investigate the changes in N and P biogeochemistry from seasonally fresh to mesohaline waters. Mass balances of forms of N and P will be used to synthesize the results and assess the importance of different biogeochemical processes. The study will measure watershed inputs of nutrients (including different forms of particulate P) and the transport and release of P from suspended particles moving down the estuary. Denitrification and the releases of various forms of N and P from sediments will be measured by incubations of intact cores taken from along the salinity gradient. To investigate changes in the biogeochemistry and net burial of N and P, profiles of N, P, iron, sulfur, 210Pb, and 7Be in sediments will be measured along the salinity gradient. To investigate mechanisms accounting for changes rates of denitrification and release of available P along the salinity gradient, cores will be incubated with experimental manipulations of concentrations of seawater, sea salts, sulfate, and nitrate. Intellectual merit--The analysis of changes in N and P biogeochemistry along the transition from fresh to mesohaline water will provide insights into the factors accounting for the usual switch from P limitation in freshwater to N limitation in estuarine waters. The study will also provide the most detailed look ever at the origins and fates of different particulate P fractions in an estuary. Linking the results with data from other studies will form a more complete picture of nutrient dynamics in the Patuxent estuary, especially in the zone of transition from fresh to saline water. The study will employ the newest and most accurate method for measuring denitrification to observe changes across the salinity front. The experimental manipulations will reveal mechanisms responsible for the changes in rates of denitrification and benthic dissolved inorganic P release in response to changes in salinity. Broader impacts--The study has relevance to managing the widespread problems of coastal eutrophication. To reduce the impacts of nutrient loading, it is essential to understand the factors that determine which nutrient will limit primary production. It is also important to know how nutrient loading may be mitigated as potential sinks for N and P change along the estuarine salinity gradient. The study will address both these issues. The re
MATAGORDA COUNTY. Matagorda County (G-24) is in the Coastal Prairie region of Texas, bounded on the north by Wharton County, on the east by Brazoria County and the Gulf of Mexico, on the west
MATAGORDA COUNTY. Matagorda County (G-24) is in the Coastal Prairie region of Texas, bounded on the north by Wharton County, on the east by Brazoria County and the Gulf of Mexico, on the west by Calhoun and Jackson counties, and on the south by the Gulf of Mexico and Tres Palacios, Matagorda, and East Matagorda bays. The center of the county lies at 28°54' north latitude and 95°59' west longitude; Bay City, the county's seat of government and largest city, is four miles north of the center of the county at the convergence of State highways 35 and 60, fifty air miles southwest of Houston. The name Matagorda, Spanish for "thick brush," was derived from the canebrakes that formerly lined the shore. Crossed by the once highly flood-prone Colorado River, which bisects it from north to south, the county extends across 1,612 square miles of mostly open prairie. With the exception of a slight undulation in the north, most of the county is level, with elevations ranging from sea level to seventy feet. Part of Matagorda Peninsula, a narrow barrier island formed less than 5,000 years ago, runs northeast and southwest for sixty-five miles from the mouth of Caney Creek in the eastern part of the county to Pass Cavallo on the west. The peninsula protects Matagorda Bay and is cut in half by the Colorado River channel twenty-four miles from the pass. Major watercourses in the county include Caney, Peach, Peyton's, Turtle, Cash's, and Big and Little Boggy creeks, the Trespalacios and Colorado rivers, Live Oak and Linville bayous, and Little Robbins Slough. Along the rivers the soils are brownish to reddish, cracking and clayey to loamy, and along the coast soils are sandy. In the rest of the county light-colored, shallow loam covers clayey subsoils; some areas, particularly in the coastal marshes, have gray to black, cracking, clayey soils. Temperatures in the county vary from an average low of 44° F in January to an average high of 92° F in July. The growing season averages 295 days per year. Live oak, post oak, pin oak, pecan, ash cottonwood, elm, red cedar, and mulberry grow in the county's forests; mesquiteqv and prickly pear have invaded the Bay Prairie in patches where the land has been overgrazed. The area harbors a variety of wildlife, including bobcats, coyotes, otters, white-tailed deer, and numerous smaller mammals, as well as oysters, shrimp, fish, snakes, and waterfowl. A number of protected wildlife habitats, including Big Boggy National Wildlife Refuge, the Mad Island Wildlife Management Area, the Runnels Family Mad Island Marsh, and the Nature Conservance, are located in the county. In 1982, 80 percent of Matagorda County was in farms and ranches, and of this, 28 percent was cultivated. The county derives 67 percent of its agricultural receipts from crops, especially rice, sorghum, soybeans, wheat, hay, and cotton. Potatoes, peaches, and pecans were also grown there. Cattle ranching has been important to the local economy. Mineral resources include salt domes, brine, petroleum, and natural gas. In 1982, 97,440,000,000 cubic feet of gas well gas, 6,781,000,000 cubic feet of casinghead gas, and 2,903,000 barrels of petroleum were produced in the county. The Colorado Barge Canal, completed in 1959, extends fifteen miles along the Colorado River from the Gulf Intracoastal Waterway to a turning basin below Bay City and links the county to deep water at Freeport and Galveston. In the 1990s the county was served by the Union Pacific, Southern Pacific, and Santa Fe railroads. Archeological research has revealed a pattern of relatively dense occupation near inland water sources in the upper Texas coastal region, and projectile points from the early Paleo-Indian period (10,000–6,000 B.C.) have been found thinly scattered along the Texas coastal plain. By the time of European exploration in the early 1500s, the central section of the Texas coast, including Matagorda County, was home to several lingu
AHA Publishes Humanist Curriculum Manuals for Children and Adults By Bob Bhaerman The Kochhar Humanist Education Center of the American Humanist Association was established in 2008. The Center’s goal is to educate humanists and
AHA Publishes Humanist Curriculum Manuals for Children and Adults By Bob Bhaerman The Kochhar Humanist Education Center of the American Humanist Association was established in 2008. The Center’s goal is to educate humanists and the general public about the values and principles of humanism as related to culture, philosophy, history, policy, and religion. Our focus is on compiling curricula and lesson plans for educators to use for humanist education programs. Such resources aim to create understanding and build knowledge about humanism, and encourage scientific thinking, humanist values, and activism toward justice. At the recent American Humanist Association conference, the Kochhar Humanist Education Center announced the publication of two new resources, Establishing Humanist Education Programs for Children and Establishing Humanist Education Programs for Adults. The two manuals—completed after two years of research, compilation of existing humanist curricula, and the development of new curricula—were made available to chapter leaders who attended the session and will be sent to all AHA chapters. Our goal is to organize educational programs for children and establish both formal and informal adult programs in all AHA chapters. This session at the conference was a first step for local chapter leaders to begin organizing humanist education programs for children and adults for their own chapters. Two chapters, the Humanists of Greater Portland and the Humanist Society of New Mexico in Albuquerque, serve as models for establishing children’s programs and include recommendations and challenges to address. This session allowed for leaders of other humanist programs to report on their progress. I provided a report by Carol Wintermute, co-dean of The Humanist Institute (a graduate level education program for humanists, now an affiliate of the American Humanist Association), which included her perspectives on laying the foundation for adult education. Kristin Wintermute, executive director of The Humanist Institute, also shared information about educational programs from The Humanist Institute. Finally, John Shook, director of education at the Center for Inquiry, reported on adult educational programs offered by CFI. I ended the session by asking the attendees to let me know what the Kochhar Humanist Education Center can do to assist chapters in these two areas – children’s programs and adult programs. I’d like AHA chapters who are starting new children or adult programs to send periodic reports on their activities so that we can learn from them and share with other chapters. When you receive the KHEC manuals in just a few weeks, please share your feedback. I can be contacted at [email protected]. For more information
Shelfari edited the description of A Guide to the New World: Why Mutual Guarantee is the Key to our Recovery from the Global Crisis Wednesday, June 13, 2012. Why are there so few rich, and so many poor?
Shelfari edited the description of A Guide to the New World: Why Mutual Guarantee is the Key to our Recovery from the Global Crisis Wednesday, June 13, 2012. Why are there so few rich, and so many poor? Why are modern education systems producing poorly educated children? Why is there hunger when there is enough food to feed everyone? Why are there still countries without social justice? We all long to feel safe and guarantee our childrens future. For this, we must begin to practice mutual guarantee, by which all become guarantors of each others well being. A Guide to the New World explains how each of us can relate harmoniously to the global transformation that is taking place.
Histoire de l'ACPLS Recherche et projets antérieurs Yvonne Germaine Dufault Learning English as a Second Language through First Nations Character Education Teachings and Aboriginal language acquisition strategies. In
Histoire de l'ACPLS Recherche et projets antérieurs Yvonne Germaine Dufault Learning English as a Second Language through First Nations Character Education Teachings and Aboriginal language acquisition strategies. In 2003, Yvonne Dufault is engaged in ground-breaking action research in the area of ESL. She's investigating the impact of First Nations/ Aboriginal teachings on Character Education in the secondary school system, particularly with English as a Second Language intermediate secondary school students who are relatively new to Canada and know little about First Nations culture. Last year, she engaged in personal FSL Character Education Project in my classroom. The results of her research were published at the Canadian Association of Second Language Teachers' Web site in December, 2002. See http://www.caslt.org/research/dufault2.htm. Dufault's interest was sparked by a November, 2002 newspaper article and research cited below, which stressed a great need for and interest in Native Studies. Dufault is currently investigating the efficacy of using Native storytelling as a tool for encouraging the development of positive character traits, incorporating the use of multiple intelligences such as kinaesthetic learning. Only one and a half months into the project, her students are already experiencing heightened motivation, enhanced linguistic and communicative competence, significant increase in personal growth as global citizens and increased satisfaction in being the privileged "ESL" class. Students engage in personal journaling with respect to the program every day and will respond to a survey, a teacher-designed vocabulary test and concepts test at the end of the program. The results will be published in a report, in a pedagogical article and at an international researchers'conference in autumn, 2003. This project has great potential for duplication. Yvonne Germaine Dufault, (B.A., B.Ed., M.A.) has just completed her First Nations Character Education thesis topic at OISE/UT. On October 30, 2002, she was applauded by the York Region District School Board for her Curriculum Action Research Project "Incorporating Character Education into the FSL Classroom". See http://www.caslt.org/research/dufault2.htm. See http://www.caslt.org/research/dufault.htm. She is presenting her findings at the July 2003 AFMLTA Conference in Brisbane, Australia. Also see: First Nations Legends & Stories According to ESL Level and Character Traits As Determined by Teacher in Collaboration with Students - A bibligraphical listing of sources of legends that are suitable for character development through the art of storytelling. In PDF format.
One night in 1990, only two watchmen were responsible for guarding hundreds of millions of dollars of art at the Gardner Museum. One could say the job was pretty uneventful, even boring. But on St. Patrick’s Day weekend
One night in 1990, only two watchmen were responsible for guarding hundreds of millions of dollars of art at the Gardner Museum. One could say the job was pretty uneventful, even boring. But on St. Patrick’s Day weekend in 1990, the watchmen’s usual routine was dramatically changed by two thieves. Two men who were dressed as Boston Police officers rang the doorbell. Going against rules, a watchman let them into the museum. Within minutes he and the other watchman were tied up by the thieves, who had free reign over the museum. On this night, these two thieves would pull off the greatest art heist in history. It is considered by many the biggest property theft ever. By the time the burglars left the museum, over 500 million dollars of art was gone by them. More than two decades later, visitors to the museum can still see the empty frames of the stolen paintings that hang on the walls. They are reminders of a spectacular crime. To this day, the art work has never been found, the thieves never caught. And more puzzling is the fact that none of the 13 works of art have ever been sold by anyone as far as investigators can tell. Why would these criminals steal valuable works of art if they weren’t going to make any money off of them? Why they did it is a mystery that is still unanswered by the FBI. And who were these thieves? Now on the 23rd anniversary of the crime, the FBI says they know who did it. However, the 20 year statute of limitation has expired, which means the thieves can no longer be prosecuted for their crime by the government. Now, 23 years later, the museum just wants its art back. A
Sign up to be an organ donor in this year’s Michigan Libraries for Life Campaign, October 7-13 The Wayne State University Libraries are participating in this year’s Michigan Libraries for Life Campaign. If you are considering donating your organs to save
Sign up to be an organ donor in this year’s Michigan Libraries for Life Campaign, October 7-13 The Wayne State University Libraries are participating in this year’s Michigan Libraries for Life Campaign. If you are considering donating your organs to save a life please use the following link so that the Wayne State University Libraries can win this challenge as we did in the Campus Challenge last year! For more information or assistance with signing up, please contact Anne Hudson, Wayne State University Librarian, at [email protected]. For more information about organ donation, please see: https://sites.google.com/site/michiganlibrariesforlife/faq How Organ Donation Works Organ donation involves the recovery of lungs, kidneys, heart, liver, pancreas and sometimes intestines for transplantation to severely ill patients on the waiting list. Tissue donation can include corneas, bone, skin, heart valves, blood vessels, ligaments, tendons and other soft tissue. The proces
What makes a deer drop its antlers? I have heard two different reasons. 1. A buck will drop his antlers within a week to the same date every season. 2. Once all does in the area have been mated. The
What makes a deer drop its antlers? I have heard two different reasons. 1. A buck will drop his antlers within a week to the same date every season. 2. Once all does in the area have been mated. The testoserone levels in bucks drop and so do the antlers. Thanks for any replies...... Return to Deer Taxidermy Category Menu That is what I've always been told. When the rut is over, they don't need their antlers for fighting so they drop them. But there is also one other thing that puzzles me. I've read that when a buck gets older(7-8 yrs)they stop worrying about the rut and mating, but their antlers grow to astronomical proportions. If they no longer need them, why do they grow back? Post rut, there is a dramatic drop in testosterone and along with the pituitary gland activity based on shorter daylight hours, the antlers are cast. That does not mean, however, that bucks cannot breed without the antlers as they certainly remain viable. Larger bucks (read older/more mature) bucks tend to lose their antlers quicker as they expend more of their level of testosterone. So in reality, the casting time changes as the deer gets older. Deer in captivity usually keep their antlers the longest since their hormone levels are maintained longer. Stop reading hunting rags, the guys writing dont know. Antlers are supposed to be indicators of status, like Sam mentioned. Yet, like he stated, why do bucks get bigger with age? Well, antlers are also a barometer of the animals health. Once anh older buck no longer is able to compete in the mating fight, he also doesnt wear himself down physically, either. So, while the mature buck does the mating, and becomes physically worn out, the older buck keeps his health, which in theory reflects as antler growth. Antlers can shed almost to the day, year after year. They can also carry one side for a week or more. I had one buck shed one side January 1st and the other February 1st. They can shed due to stress, like injury as early as November, and as late as at least April. These dates are based on what I have seen personally, other dates probably exist. Ive seen lower hormones result in the loss of swelling, and decline of the desire to persue does, yet they hang onto those antlers. Another "theory" I dont buy is that once a buck sheds, he cant breed. Guess again! They still can, although I agree the rates arent nearly as successful. But it happens. What is the window for early born fawns to late born fawns as far as a time span? Our DNR officer told us that an early born buck is old enough to breed the same year to any doe that comes into estrus in the second rut, or a late born doe's first estrus. Will a late born doe always come in to estrus late? In addition, will the antlers drop off earlier on an early born buck as appos
Grade Range: K-4 Resource Type(s): Lessons & Activities, Worksheets Duration: 50 Minutes Date Posted: 5/21/2009 What kinds of food do you eat? How do the foods you eat today
Grade Range: K-4 Resource Type(s): Lessons & Activities, Worksheets Duration: 50 Minutes Date Posted: 5/21/2009 What kinds of food do you eat? How do the foods you eat today compare to the types of foods that sailors ate during long voyages of the past? In this activity, students will cook one or more historical maritime recipes and then compare the foods they eat to what was served on ships in the past. Included in an OurStory module entitled Life on the Water, this activity is intended to help children and adults enjoy exploring history together through the use of children's literature, everyday objects, and hands-on activities. Historical Thinking Standards (Grades K-4) Standards For English Language Arts (Grades K-12) Standards in History (Grades K-4)
A malleable, fairly soft, silvery-white, metallic element in group IVA of the periodic table; it occurs mainly as cassiterite (tin dioxide, TnO2), from which it is obtained by sm
A malleable, fairly soft, silvery-white, metallic element in group IVA of the periodic table; it occurs mainly as cassiterite (tin dioxide, TnO2), from which it is obtained by smelting with coal. Tin exhibits allotropy: white (β) tin, the normal form, changes below 13.2°C to gray (α) tin, a powdery metalloid form resembling germanium, and known as "in pest." | Cassiterite. Credit: Mineral Information Tin is unreactive, but dissolves in concentrated acids and alkalis, and is attacked by halogens. It is used to coat other metals to prevent corrosion, and forms part of numerous alloys, such as soft solder, pewter, type metal, and bronze. |relative atomic mass Compounds of tin Tin forms organotin compounds, used in biocides, and also inorganic compounds: tin (II) and tin (IV) salts. Tin (IV) oxide (SnO2) is a white powder (sublimes at 1,800°C) prepared by calcining cassiterite or burning finely divided tin; it is used in glazes and as an abrasive. Tin (II) chloride (SnCl2) is a white crystalline solid, prepared by dissolving tin in hydrochloric acid and used as a reducing agent, in tin-plating, and as a mordant. Melting point 246°C, boiling point 652°C.
This house believes that governments must do far more to protect online privacy.ENTER THIS DEBATE Today there is no meaningful check on private-sector data collection. Companies post "privacy policies" on websites and then do as they wish with the personal information
This house believes that governments must do far more to protect online privacy.ENTER THIS DEBATE Today there is no meaningful check on private-sector data collection. Companies post "privacy policies" on websites and then do as they wish with the personal information they collect. The internet is not for couch potatoes. It is an interactive medium. While internet users enjoy its offerings, they should be obligated to participate in watching out for themselves. When Facebook announced recently that it would allow users of its mobile service to alert all their friends on the social network to their whereabouts, it immediately triggered another bout of hand-wringing about the implications for people's privacy. Social networks, location-based services on mobile phones and a host of other innovations have greatly increased our ability to share large amounts of information online. But at the same time, they have increased the risk that companies, governments and criminals may exploit the same information without our knowledge. To some, worries about "Privacy 2.0" seem greatly overblown. People are indeed making more information public than ever before on the internet, they say. But that is because societal norms are changing and it has become more acceptable to share details of one's daily life online. The rise of reality TV shows such as "Big Brother" is another example of this trend. Moreover, there is plenty of evidence to suggest that folk use the detailed privacy controls provided by firms such as Facebook to limit access to their information. Several studies have shown that teenagers, who are often criticised for plastering intimate details of their lives online, use these controls as much as adults. But is self-regulation enough? Not according to some critics of internet firms who argue that economic self-interest inevitably encourages them to make more information public by default. Companies such as Google and Facebook, they say, are engaged in a form of digital data-collection arms race, with each trying to gather and exploit as much information as possible about individuals' likes, habits and tastes. The international fuss over Google's Street View service, which inadvertently collected data from private Wi-Fi systems as part of an ambitious project to photograph streets around the world, has highlighted the threat to privacy that this arms race poses. Hence growing calls for more robust government action to protect individuals' online privacy. But are new laws and regulations really needed? Or is the solution to step up industry-led and public efforts to educate people about the implications of "over-sharing" on the web? These questions lie at the heart of our latest online debate. To address them we welcome Marc Rotenberg, president and executive director of the Electronic Privacy Information Center in Washington, DC, and Jim Harper, director of information policy studies at the Cato Institute. Mr Rotenberg, who is proposing the motion, claims that the privacy policies offered by many web services are often smokescreens behind which companies do what they like with the data they gather. And he warns that as business practices become more opaque, consumers will find it ever more difficult to exercise control over their personal information. So new privacy laws and regulations specifically tailored for the online world are urgently needed. Mr Harper, who is opposing the motion, points out that some erosion in personal privacy is the price that people accept they must pay in return for enjoying the huge benefits that web-based services provide. And he argues that individuals have very different comfort levels when it comes to revealing personal information, so a state-mandated, one-size-fits-all online privacy regime would be worse than the status quo. These thoughtful and provocative opening statements lay the groundwork for a stimulating debate. But it will be contributions from our readers that help to bring it alive. Don't hesitate to make them public! Today there is no meaningful check on private-sector data collection. Companies post "privacy policies" on websites and then do as they wish with the personal information they collect. Not surprisingly, identity theft, security breaches and growing unease about online privacy are all on the rise. New service offerings are met with both enthusiasm about technology and worries about personal privacy. The pressures will only mount as competition among internet firms for advertising dollars heats up. Business practices will become more opaque and consumers will find it more difficult to exercise meaningful control over their personal information. The launch of Facebook Places this past week, with its complicated and confusing opt-out requirements for user location data, is exhibit A in our case. We will concede that many privacy threats emerge from government. In fact, EPIC has led the charge against such government-inspired surveillance schemes as the NSA's clipper chip, the FBI's digital wiretap plan and John Poindexter's Total Information Awareness project. We are currently trying to get the Department of Homeland Security to shut down the intrusive and ineffective airport body-s
Defines GUID identifiers that correspond to the standard set of tool windows that are available in the design environment. Assembly: System (in System.dll) Thetype exposes the following members. |Equals(Object)||Determines whether the specified object is equal to the
Defines GUID identifiers that correspond to the standard set of tool windows that are available in the design environment. Assembly: System (in System.dll) Thetype exposes the following members. |Equals(Object)||Determines whether the specified object is equal to the current object. (Inherited from Object.)| |Finalize||Allows an object to try to free resources and perform other cleanup operations before it is reclaimed by garbage collection. (Inherited from Object.)| |GetHashCode||Serves as the default hash function. (Inherited from Object.)| |GetType||Gets the Type of the current instance. (Inherited from Object.)| |MemberwiseClone||Creates a shallow copy of the current Object. (Inherited from Object.)| |ToString||Returns a string that represents the current object. (Inherited from Object.)| |ObjectBrowser||Gets the GUID for the object browser. This field is read-only.| |OutputWindow||Gets the GUID for the output window. This field is read-only.| |ProjectExplorer||Gets the GUID for the solution explorer. This field is read-only.| |PropertyBrowser||Gets the GUID for the Properties window. This field is read-only.| |RelatedLinks||Gets the GUID for the related links frame. This field is read-onl
[Haskell-cafe] Haskell symbol ~ ryani.spam at gmail.com Wed Aug 27 15:12:12 EDT 2008 Here is another example: > f1 n ~(x:xs) = (n
[Haskell-cafe] Haskell symbol ~ ryani.spam at gmail.com Wed Aug 27 15:12:12 EDT 2008 Here is another example: > f1 n ~(x:xs) = (n, x) > f2 n (x:xs) = (n,x) f1 5 = (5, error "irrefutable pattern match failure") f2 5 = error "pattern match failure" fst (f1 5 ) = 5 fst (f2 5 ) = error "pattern match failure" The "~" delays the pattern match until evaluation of the variables inside the pattern is demanded. If the variable is never demanded, the pattern match doesn't happen. It's especially useful for single-constructor datatypes (like pairs) if you want the code to be more lazy. On Wed, Aug 27, 2008 at 11:56 AM, Neil Mitchell <ndmitchell at gmail.com> wrote: >> At the same place, I found that example, >> but wasn't wise enough to figure out >> what it does: >> (f *** g) ~(x,y) = (f x, g y) >> Can you help me understand it? > It means exactly the same as: > (f *** g) xy = (f (fst xy), g (snd xy)) > i.e. if you call (f *** g) undefined, you will get (f undefined, g > undefined). If the pattern was strict (i.e. no ~) you would get > Please update the keyword wiki so it makes sense to you, after you > have got your head round it. > Haskell-Cafe mailing list > Haskell-Cafe at haskell.org More information about the Haskell-Cafe
Wood Could be the Future of Wind Turbine Masts In a bid to lower the costs of wind turbine masts, as well as enable taller installations, a German engineering firm is pursuing a novel method of building them - using wood instead of
Wood Could be the Future of Wind Turbine Masts In a bid to lower the costs of wind turbine masts, as well as enable taller installations, a German engineering firm is pursuing a novel method of building them - using wood instead of steel. The new design for wind turbine masts uses timber and laminated wood panels (all from sustainable and certified timber suppliers) for the structure, covered by a plastic skin to protect the wood from weather, and the company, TimberTower, claims that their wooden masts will save 300 tons of steel for each 100 meter tall tower. TimberTower believes that their new design could revolutionize the wind power industry by not only lowering the cost associated with turbine masts, but also by enabling the building of towers with turbine heights up to 200 meters high, as they can be easily transported via standard cargo containers and assembled in place. According to the company's website, one of the limitations for wind turbine masts is the bottom diameter of the steel towers, which can not be transported feasibly via highway with diameters larger than 4.2 meters, due to clearance under bridges and overpasses. Because the company's design can be transported unassembled, these limitations won't apply to their towers, and they say their towers can be completed in just 2 days. TimberTower is currently building a 100 meter tall mast that will eventually be topped with a 1.5 MW wind turbine, and they have plans to build a 140 meter tall tower near Hanover. According to DW, that extra height could allow the turbine to generate 30 to 40% more electricity than on a standard mast, while the cost of construction would be 20 percent lower. Find out more about TimberTowers at their website: TimberTowers
Although there are several blogging platforms available to you, we’re mainly going to discuss the technology and coding behind one of them here on Edit and Post, and that is WordPress. WordPress is currently the most flexible and powerful option out there and it’s
Although there are several blogging platforms available to you, we’re mainly going to discuss the technology and coding behind one of them here on Edit and Post, and that is WordPress. WordPress is currently the most flexible and powerful option out there and it’s the platform I use for Edit and Post and Elizabeth Anne Designs. WordPress is an open-source program. Open-source means that the code for the software is freely provided and can be altered and built upon by anyone. Why is this cool? Because that means there are thousands upon thousands of people working every day to enhance WordPress’s functionality by creating themes and plugins to be used with the basic code (we’ll chat more about themes and plugins soon!). WordPress requires a MySQL database to run, along with a web server. Your WordPress database is made up of several tables. Each table holds a specific element of data, such as your posts, blogroll links, comments, and settings. Your web server holds your image files, theme files, plugins, and WordPress admin files. You can think about things this way: if you upload it, it goes on your web server. If you write it or input it, it goes into your database. They use a language called PHP. Every time WordPress needs to “get” something from the database, a PHP script is run. There are several default PHP functions in WordPress, and you can also create your own. |PHP = “get”| |Want to get the post title?||<?php the_title();?>| |Want to get the content?||<?php the_content();?>| |Want to get the author?||<?php the_author();?>| Depending on the data you are gathering, the WordPress PHP function may default to “get and display” or simply “get”. Both are useful! We’ll talk about PHP a lot more in the future, but for now, just remember that PHP is how WordPress gets data from the database. After the web server has received data from the database, it turns it into HTML. HTML is the language that your browser uses to display a website. An example: In WordPress, I have a PHP function that says: <?php the_title();?> Once my web server has processed that script for the post you’re currently reading, the database will return : What Is WordPress Anyway? The web server then displays to you: What Is WordPress Anyway? You never see the PHP script and neither does Firefox, Safari, IE or whatever other browser you are using! You make HTML look pretty using a language called CSS, which stands for cascading style sheets. CSS tells your browser how to format things (fonts, colors, margins, spacing, etc). CSS is very flexible, and you can s
Mississippi is no exception when it comes to being "invaded" by such minute creatures. Those at Mississippi State University (MSU) help us learn more about such insects and also how to deal with them. "Insects such as Asian lady
Mississippi is no exception when it comes to being "invaded" by such minute creatures. Those at Mississippi State University (MSU) help us learn more about such insects and also how to deal with them. "Insects such as Asian lady beetles and other occasional invaders, are just nuisances, but they can be quite bothersome when they occur in high numbers. Pests such as cockroaches and houseflies simply want to live with us and feed on our leftovers, but we do not appreciate their company, and they can cause serious health problems." "The sawtoothed grain beetles and other stored product pests eat our food before we can. Spiders build unsightly webs in our homes, and some, such as brown recluses and black widows, are venomous. Termites and other structural pests damage our homes. Pests such as clothes moths and carpet beetles damage our clothes, and some insect pests, like fleas and bed bugs, eat us." One can go to Control Household Insect Pests for information on the identification, management, and control of cockroaches, clothes moths, flour beetles, spiders, and many other household insects. "This publication also contains information on non-insecticidal methods of managing household insects and information on how to buy and apply insecticides inside the home." - MSU Animal owners, especially, need to be aware of what insecticides to use or not to use when it comes to the safety of their pets. Enjoy video clip on the ten strongest insects.
Migraine is a common cause of headaches in adults. Population-based studies indicate that between 12% and 16% of people suffer from migraine headaches, with women being affected three times as often as men. Migraine headaches can be
Migraine is a common cause of headaches in adults. Population-based studies indicate that between 12% and 16% of people suffer from migraine headaches, with women being affected three times as often as men. Migraine headaches can be so severe that they can prevent the sufferer from carrying out her or his usual activities for many hours or days. The causes of such headaches are not completely understood, but most researchers believe they stem from a combination of genetic, neurochemical, and vascular mechanisms. Following are some typical features of migraine headaches: - A first sign may be a combination of warning signals before the headache appears, such as nausea or flashing lights. - The headache itself is usually throbbing in character. - It may involve only part of the head, such as one side. - It may last for hours to days. - It may be accompanied by some of the warning signs mentioned above, such as nausea or visual difficulties. - Light and noise may make it worse. Many people with migraines receive little relief from over-the-counter pain medications. Fortunately, newer agents appear to be making advances in the treatment of migraine. Summit Research has conducted a number of trials of some of these investigational medications. Summit Research Network participates in research studies for migraines. If you would like more information, please call us at one of the numbers listed above in the top right corner of the page, or fill out the form to the right and we will contact you.
- Dietary Supplements - Health Conditions - Healthy Nutrition - Cardiovascular Health - Skin Care - Natural Remedies Fast Food and Obesity Epidemic - White adults who consume fast food at least two times each week will increase their
- Dietary Supplements - Health Conditions - Healthy Nutrition - Cardiovascular Health - Skin Care - Natural Remedies Fast Food and Obesity Epidemic - White adults who consume fast food at least two times each week will increase their risk for obesity by 50 percent or more. - As with children, adults who eat the largest amounts of fast food are often neglecting important parts of a balanced diet. The news today is full of statistics about how the United States and many other Western countries are becoming increasingly overweight. As a result, health problems associated with excessive weight are also skyrocketing, including tremendous jumps in diabetes and heart disease. Some researchers believe the cause of this epidemic is a link between fast food and obesity. Children and Fast Food This link between fast food and obesity may be most prevalent in the youngest members of the societies in question. One-third of children between the ages of 4 and 19 are eating fast food once every day. A study conducted by Dr. David Ludwig at the Boston Children’s Hospital estimates that those rates of fast food consumption will add an extra six pounds to each child every year. Obviously such an increase could lead to obesity. As of 2003, approximately 15 percent of children under the age of 18 were classified as obese. Another reason to worry about fast food and obesity in children is that research surveys have found that children who eat a significant amount of fast food rarely eat other foods, foods that are good for them like vegetables and fresh fruit. Risk for Adults Before 2003, no studies had ever been conducted to scientifically show a link between fast food and obesity increases. That same year, a study of adults between the ages of 18 and 30 living in metropolitan areas uncovered some surprising facts. For one, white adults who consume fast food at least two times each week will increase their risk for obesity by 50 percent or more. They will also double their risk of having problems controlling glucose production, which can lead to the development of diabetes. Anyone who has looked at the ingredients list on many fast food items is probably not going to be surprised by the above findings. After all, the average caloric value for an extra-large fast food meal is about 1,600 calories. Surprisingly, the food items chosen by the people in the study mattered little, such as whether they preferred hamburgers over chicken nuggets; they were still consuming large quantities of saturated fat and calories. As with children, adults who eat the largest amounts of fast food are often neglecting important parts of a balanced diet. A study of 9,000 adults by the United States Department of Agriculture (USDA) found that one-third received most of their calories from fast food; their diets were also almost completely devoid of milk, fruit, and important vitamins and minerals. High levels of fast food consumption are also correlated with high levels of sugar, fat, carbohydrate, and protein consumption. Reason for the Fast Food and Obesity Link Some researchers are now trying to explain why so many of us – adults and children alike – are being compelled to eat fast food; something we know is not good for us. One idea comes from the fact that our early ancestors had preferences for salt and fat, which were difficult to come by during the hunter/gatherer days. These preferences still exist in us today and the availability of these items by means of countless drive-thru windows at all hours of the day only makes it easier to get caught up in the fast food craze.Click here to discuss this article on forum. The information supplied in this article is not to be considered as medical advice and is for educational purposes only. |Obesity Prevention12 Nov 2008|
Battle of Copenhagen |First Battle of Copenhagen| |Part of War of the Second Coalition| The Battle of Copenhagen, as painted by Nicholas Pocock. The British line is diagonally across the foreground, the city of Copenhagen in the background
Battle of Copenhagen |First Battle of Copenhagen| |Part of War of the Second Coalition| The Battle of Copenhagen, as painted by Nicholas Pocock. The British line is diagonally across the foreground, the city of Copenhagen in the background and the Danish line between. The ships in the left foreground are British bomb vessels. |Commanders and leaders| |Admiral Sir Hyde Parker Steen Andersen Bille |Nelson: 12 ships of the line, 5 frigates, 7 bombs, 6 others||Fischer: 7 ships of the line, 11 others Bille: 17 ships, 1 land battery |Casualties and losses| |1,600–1,800 killed and wounded 12 ships captured, 2 ships sunk, 1 ship exploded. The Battle of Copenhagen (Danish: slaget på Reden) was an engagement which saw a British fleet under the command of Admiral Sir Hyde Parker fight and strategically defeat a Danish-Norwegian fleet anchored just off Copenhagen on 2 April 1801. Vice-Admiral Horatio Nelson led the main attack. He famously is reputed to have disobeyed Sir Hyde Parker's order to withdraw by holding the telescope to his blind eye to look at the signals from Parker. But Parker's signals had given him permission to withdraw at his discretion, and Nelson declined. His action in proceeding resulted in the destruction of many of the Dano-Norwegian ships before a truce was agreed. Copenhagen is often considered to be Nelson's hardest-fought battle. The battle was the result of multiple failures of diplomacy in the latter half of the 18th century. At the beginning of 1801, during the French Revolutionary Wars, Britain's principal advantage over France was its naval superiority. The Royal Navy searched neutral ships trading with French ports, seizing their cargoes if they were deemed to be trading with France. The eccentric Russian Tsar Paul, after having been a British ally, arranged a League of Armed Neutrality comprising Denmark-Norway, Sweden, Prussia, and Russia, to enforce free trade with France. The British viewed the League to be very much in the French interest and a serious threat. The League was hostile to the British blockade, and its existence threatened the supply of timber and naval stores from Scandinavia. In early 1801, the British government assembled a fleet at Great Yarmouth, with the goal of breaking up the League. The British needed to act before the Baltic Sea thawed and released the Russian fleet from its bases at Kronstadt and Reval (now Tallinn). If the Russian fleet joined with the Swedish and Dano-Norwegian fleets, the combined fleets would form a formidable force of up to 123 ships-of-the-line. The British fleet was under the command of Admiral Sir Hyde Parker, with Vice-Admiral Lord Nelson (then in poor favour owing to his activities with the Hamiltons) as second-in-command. Parker, aged 61, had just married an eighteen-year-old and was reluctant to leave port in Great Yarmouth. Prompted by a letter from Nelson to Captain Thomas Troubridge, a friend and a Lord Commissioner of the Admiralty, a private note from St Vincent, the First Lord of the Admiralty, caused the fleet to sail from Yarmouth on 12 March. Orders were sent to Parker to go to Copenhagen and detach Denmark from the League by 'amicable arrangement or by actual hostilities', to be followed by 'an immediate and vigorous attack' on the Russians at Reval and then Kronstadt. The British fleet reached the Skaw (Danish: Skagen) on 19 March, where they met a British diplomat, Nicholas Vansittart, who told them that the Danes had rejected an ultimatum. Although the Admiralty had instructed Parker to frustrate the League, by force if necessary, he was a cautious person and moved slowly. He wanted to blockade the Baltic despite the danger of the combination of fleets; Nelson wanted to ignore Denmark and Sweden, who were both reluctant partners in the alliance, and instead sail to the Baltic to fight the Russians. In the end Nelson was able to persuade Sir Hyde to attack the Danish fleet currently concentrated off Copenhagen. Promised naval support for the Danes from Karlskrona, in Sweden, did not arrive perhaps because of adverse winds. The Prussians had only minimal naval forces and also could not assist. On 30 March, the British force passed through the narrows between Denmark and Sweden, sailing close to the Swedish coast to put themselves as far from the Danish guns as possible; fortunately for the British, the Swedish batteries remained silent. Attacking the Danish fleet would have been difficult as Parker's delay in sailing had allowed the Danes to prepare their positions well. Most of the Danish ships were not fitted for sea but were moored along the shore with old ships (hulks), no longer fit for service at sea, but still powerfully armed, as a line of floating batteries off the eastern coast of the island of Amager, in front of the city in the King's Channel. The northern end of the line terminated at the Tre Kroner (Three Crowns — De
Encyclopedia of the Middle Ages Contains articles on all aspects of the period from the fifth to the fifteenth century. It explores art, architecture, religion, law, science, language, philosophy, and theology, as well as cultural, religious
Encyclopedia of the Middle Ages Contains articles on all aspects of the period from the fifth to the fifteenth century. It explores art, architecture, religion, law, science, language, philosophy, and theology, as well as cultural, religious, intellectual, social and political history. With a focus on Europe and Christendom, the Encyclopedia also covers the rise of Islam and people of other cultures with whom Europeans came into contact. Express Link (bookmark): http://www.galileo.usg.edu/express?link=encr-geo1
The goals of this site are to provide a basic understanding of Web 2.0 technologies and to suggest ideas for instructional applications of interactive media both inside and outside the classroom for online and on campus students. The target audiences are folks working in Academic
The goals of this site are to provide a basic understanding of Web 2.0 technologies and to suggest ideas for instructional applications of interactive media both inside and outside the classroom for online and on campus students. The target audiences are folks working in Academic and Student Affairs. is the graphical representation of information. Information technology combines the principles of visualization with powerful applications and large data sets to create sophisticated images and animations. a visual representation of statistics once involved compiling data, interpreting it, parsing it, and then determining what kind of visual presentation would best elucidate what the data meant. New data visualization tools provide a shortcut—a straight line from compiling data to illustrating it. library of applications at IBM’s open-source venue Many Eyes or the Visualization Lab available from the New York Times. Wordle is a social networking site designed to connect users. Sites such as MySpace and Friendster are similar, but Facebook is generally considered the leading social networking site among college students. Facebook allows individuals to create profiles that include personal interests, affiliations, pictures, and—with some limitations—virtually anything else a user wants to post. offers a lo
Overview of A Structure of Data Relation to other APLs System Fns and Vars Overview of A This page has been reproduced from original A+ documentation provided by Morgan Stanley at www.aplusdev.org. Copyright remains
Overview of A Structure of Data Relation to other APLs System Fns and Vars Overview of A This page has been reproduced from original A+ documentation provided by Morgan Stanley at www.aplusdev.org. Copyright remains with the authors. Some Features of the A Language Summary of the A Programming Language Some Features of the A+ Language The primitive functions of A+, a variant of APL, can be classified as scalar, structural, or specialized. A scalar primitive is applied independently to the individual elements of its array arguments, but syntactically it can be applied to an entire array, providing a very efficient implicit control structure. The scalar primitives include the ordinary arithmetic functions, comparison functions, logical functions, and certain other mathematical functions. A structural primitive is one that can be defined completely in terms of the indices of its right argument: it rearranges or selects the elements of that argument but otherwise leaves them unmodified. The specialized primitive functions include, for example, ones for sorting arrays and inverting matrices. Leading Axis Operations Most A+ structural primitive functions, and functions derived from the operators called Reduce and Scan, apply to the leading axis of the right argument (cf. "The Structure of Data"). These structural A+ primitives are Catenate, Take, Drop, Reverse, Rotate, Replicate, and Expand. The subarrays obtained by The concepts of leading axis and item are generalized by treating an array as a frame defined by the array's leading m axes holding cells of rank n defined by the array's trailing n axes, where m+n is the rank of the array. A function f is applied to all cells of rank n with the expression f@n. The rank operator (@) applies uniformly to all functions of one or two arguments: primitive, derived, or defined, except Assignment and (because of its syntax) Bracket Indexing (@ does apply to Choose, which is semantically equivalent). Mapped files are files accessed as simple arrays. These files can be very large (currently of the order of a gigabyte). Only the parts of a file that are actually referenced are brought into real memory, and therefore operations that deal only with parts of files are particularly efficient. Unless the files are extremely large, the transition from application prototypes dealing with ordinary arrays to production applications using mapped files requires only minimal code modification. A workspace is where computation takes place and where all immediately available A+ objects reside - variables, functions, operators, and so on. An array can be displayed on a screen with the show function. The array in the workspace and the screen view share the same storage. Changes to the array in the workspace are immediately reflected on the screen. Changes can be made to the screen view of the array, and they immediately change the array in the workspace. (The word workspace is also used in a different sense in screen management, to denote the leading top-level window.) Callbacks are automatic invocations of functions that have been associated with variables and events. Specification of a variable or selection of a row in its screen display, for example, can trigger the execution of a callback function. Callbacks provide a complete means of responding to asynchronous events. Dependencies are global variables with associated definitions. When a dependent variable is referenced its definition will be evaluated if, generally speaking, any objects referenced in the definition have changed since its last evaluation. Otherwise, its stored value is returned. Thus dependencies, like functions, always use the current values of the objects they reference, but are more efficient than functions because they do not reevaluate their definitions until at least one referenced object has changed. Utilities and toolkits can be included in applications without name conflicts, by using contexts, which allow utility packages and toolkits to have their own private sets of names. Outside a context, names within are referred to by qualifying them with the context name. System commands and system functions provide facilities for working with contexts, such as changing the current context and listing all contexts in the workspace. Programmers are concerned w
Firstly the Tudors, who won the crown on the battlefield and changed both the nature of kingship but also the nation itself. England became a Protestant nation and began to establishment itself as a trading power; facing down impossible odds it defeated its
Firstly the Tudors, who won the crown on the battlefield and changed both the nature of kingship but also the nation itself. England became a Protestant nation and began to establishment itself as a trading power; facing down impossible odds it defeated its enemies on land and sea. Yet after a century Elizabeth I died with no heir and the crown was passed to the Stuarts, who were keen to remould the kingdom in their own image. Leading Historian, Ronald Hutton brilliantly recreates the political landscape over this early modern period and shows how the modern nation was forged in these anxious, transformative years. Combining skilful pen portraits of the leading figures, culture, economics and accounts of everyday life, he reveals insights in this key era in our nation's story. This the second book in the four volume Brief History of Britain which brings together some of the leading historians to tell our nation�s story from the Norman Conquest of 1066 to the present-day. Combining the latest research with accessible and entertaining story telling, it is the ideal introduction for students and general readers.
cliff dwellers, Ancestral Pueblo people, sometimes called Anasazi, who were builders of the ancient cliff dwellings found in the canyons and on the mesas of the U.S. Southwest, principally on the trib
cliff dwellers, Ancestral Pueblo people, sometimes called Anasazi, who were builders of the ancient cliff dwellings found in the canyons and on the mesas of the U.S. Southwest, principally on the tributaries of the Rio Grande and the Colorado River in New Mexico, Arizona, Utah, and Colorado. It was once thought that these ruins were the work of an extinct aboriginal people, but it has been established that they were built (11th–14th cent.) by the ancestors of the present Pueblo. The dwellings were large communal habitations built on ledges in the canyon walls and on the flat tops of the mesas. Access to the cliffs was very difficult and thus highly defensible against nomadic predatory tribes such as the Navajo. The cliff dwellers were sedentary agriculturists who planted crops in the river valleys below their high-perched houses. They were experts at irrigating the fields. Their lives were organized on a communal pattern, and the many kivas (see kiva) show that their religious ceremonies were like those of the Pueblo today. Many of the dwellings are now in national parks. Some of the better-known ones are those of the Mesa Verde National Park, in Colorado, where there are more than 300 dwellings; Canyons of the Ancients and Yucca House national monuments, also in Colorado; Hovenweep National Monument, in Utah; Bandelier and Gila Cliff Dwellings national monuments, in New Mexico; and Canyon de Chelly, Casa Grande Ruins, Montezuma Castle, and Wupatki national monuments, in Arizona. See W. Current, Pueblo Architecture of the Southwest (1971). The Columbia Electronic Encyclopedia, 6th ed. Copyright © 2012, Columbia University Press. All rights reserved. More on cliff dwellers from Fact Monster: See more Encyclopedia articles on: North American indigenous peoples
Ishmael begins this chapter by detailing the careful preparations that Ahab has made to ensure that he can command his own whale-boat. He has smuggled aboard his own boat crew and fitted out the bow of his whale-boat to
Ishmael begins this chapter by detailing the careful preparations that Ahab has made to ensure that he can command his own whale-boat. He has smuggled aboard his own boat crew and fitted out the bow of his whale-boat to accommodate his prosthetic leg. The appearance of the shadowy crew is a shock, but the shock doesn’t last for long, for (as Ishmael notes) in a whaler wonders soon wane … such unaccountable odds and ends of strange nations come up from the unknown nooks and ash-holes of the earth to man these floating outlaws of whalers; and the ships themselves often pick up such queer castaway creatures found tossing about the open sea on planks, bits of wreck, oars, whale-boats, canoes, blown-off Japanese junks, and what not; that Beelzebub himself might climb up the side and step down into the cabin to chat with the captain, and it would not create any unsubduable excitement in the forecastle. An exception to the rule, however, seems to be Fedallah, Ahab’s harpooneer: But one cannot sustain an indifferent air concerning Fedallah. He was such a creature as civilized, domestic people in the temperate zone only see in their dreams, and that but dimly; but the like of whom now and then glide among the unchanging Asiatic communities, especially the Oriental isles to the east of the continent — those insulated, immemorial, unalterable countries, which even in these modern days still preserve much of the ghostly aboriginalness of earth’s primal generations, when the memory of the first man was a distinct recollection, and all men his descendants, unknowing whence he came, eyed each other as real phantoms, and asked of the sun and the moon why they were created and to what end; when though, according to genesis, the angels indeed consorted with the daughters of men, the devils also, add the uncanonical Rabbins, indulged in mundane amours. Early critics of the novel followed Ishmael’s lead in associating Fedallah with the devil, seeing in the relat
MUHAMMAD BIN KIYA BUZRUG UMMID "Muhammad bin Kiya Buzrug was born in 490/1097 probably in the fortress of Lamasar. He was given training by his father,
MUHAMMAD BIN KIYA BUZRUG UMMID "Muhammad bin Kiya Buzrug was born in 490/1097 probably in the fortress of Lamasar. He was given training by his father, and proved an able and competent administrator. He was assisted by his one young brother Kiya Ali, who led many expeditions and died in 538/1144. In the early part of Muhammad bin Kiya's reign, the area in control of Alamut was extended in Daylam and Gilan, where several new castles were taken or constructed, such as Sa'adatkuh, Mubarakkuh and Firuzkuh. These castles were acquired chiefly through the efforts of an Ismaili commander, called Kiya Muhammad bin Ali Khusaro Firuz. The Ismailis are also reported to have extended their mission to Georgia, and penetrated their influence in an entirely new region, Ghor, to the east of Kohistan, between Ghazna and Herat in central Afghanistan, around 550/1155 during the period of the Ghorid ruler Alauddin (544-556/1149-1161). His son and successor Saifuddin Muhammad (d. 558/1163) was a deadly enemy of the Ismailis, and conducted a massacre of the Ismaili da'is and the new converts in 557/1162 at Ghor. Henceforward, it became a tradition of the Ghorids to hunt and kill the Ismailis in Afghanistan and India. Ghiasuddin (d. 599/1203), the nephew of Alauddin ascended the throne, who appointed his brother, Muhammad to the government of Ghazna with a title of Shihabuddin. After the death of Ghiasuddin, his brother Shihabuddin Muhammad rose to the power, assuming the title of Muizzuddin instead of Shihabuddin, who made several military operations in India. Meanwhile, the northern Iranian Ismailis were confronted with Shah Ghazi Rustam bin Ala ad-Dawla Ali (534-558/1140-1163), the Bawandid ruler of Mazandaran and Gilan. It is recounted that Shah Girdbazu, the son of Shah Ghazi, was sent to Khorasan to serve at the court of Sanjar, but he had been killed by the Ismailis in 537/1142, and in another attempt, Shah Ghazi himself was rescued. The sources at our disposal admit that the Bawandid ruler Shah Ghazi shook his hand with the Seljuqs and fought the Ismailis on numerous occasions, and also invaded Alamut, which remained foiled all the times. He however seized the castles of Mihrin and Mansurakuh from the Ismailis in Qummis. On one occasion, Shah Ghazi attacked on the Ismaili inhabitants of Rudhbar and devastated their properties. He had reportedly killed a large number of the Ismailis and erected towers of their heads. In 535/1141, the Ismailis are said to have killed their deadly enemy Jawhar, the Seljuqid commander in Sanjar's camp in Khorasan. Abbas, the Seljuq amir of Ray, had slaughtered a large number of the Ismailis in reprisal. He also raided the Ismaili localities near Alamut. His terrible operations remained continued, therefore, the Ismailis sent an emissary to sultan Sanjar in 541/1146, asking his intervention in this context. It appears that Abbas did not refrain from his hostilities despite several attempts of Sanjar. He was however killed on his way to Baghdad, and the Seljuqs sent his head to Alamut. The Seljuqid sultan Sanjar once arrived in Ray, where he had been misinformed the doctrines of the Ismailis. He sent his messenger to Alamut to know the creeds of the Ismailis. The Ismailis gave a reply to the messenger that, "It is our principle to believe in the grandeur and greatness of God, to obey His ordinances, to act on the Shariah as shown by God in Koran and by His Prophet, and to have a faith in dooms-day, reward and punishments of deeds. No one is authorized to alter these ordinances at his will." The messenger was further told, "Tell to your king that these are our beliefs. It is well if he is satisfied, otherwise send his scholar, so that we may discuss with him." It appears that Sultan Sanjar refrained from his inimical attitude towards the Ismailis after getting above reply. Juvaini (p. 682) writes that, "I saw several of Sanjar's farmans which had been preserved in their (Ismailis) library (of Alamut) and in which he conciliated and flattered them; and from these, I was able to deduce the extent to which the sultan connived at their actions and sought to be on peaceful terms with them. In short, during his reign they (the Ismailis) enjoyed ease and tranquility." T
Millipedes and Centipedes Centipede and Millipede Prevention Moisture is a large contributor to the presence of both centipedes and millipedes. Tips to prevent millipedes and centipedes: -
Millipedes and Centipedes Centipede and Millipede Prevention Moisture is a large contributor to the presence of both centipedes and millipedes. Tips to prevent millipedes and centipedes: - Keep basements, attics and crawlspaces moisture-free. - Bag and remove from your property leaf litter and other forms of decaying organic material. - Keep compost piles far from the house. - Remove logs and rotting boards from the ground, and remove old cardboard boxes from the property. Beneficial notes on millipedes and centipedes: Centipedes are predators that hunt insects. Reducing or eliminating the insects that they hunt can also reduce the number of centipedes. Millipedes eat organic, decaying material and contribute to the soil production. Centipede and Millipede Control |At Hearts, we understand that people are reducing exposure to toxins from a variety of sources, including pesticides. That is why we have organic alternatives for treating centipedes and millipedes. Hearts was the first southern California pest control company to introduce EcoWise Certified service.| Each treatment for centipedes or millipedes begins with a thorough inspection of your property. Finding millipede and centipede harborage spots is the key to reducing the amount of pesticides that are needed. After inspection, together, we will develop a pest prevention and treatment program that fits your lifestyle and environmental sensibilities. Millipede and Centipede Biology Millipedes and Centipedes are arthropods, which puts them as a very distant relation of spiders and insects. Millipedes and centipedes only vaguely resemble each other in that their bodies have many segments and many pairs of legs. Millipedes have cylindrical bodies and two pairs of legs per segment. Centipedes are flat and have only one pair of legs per body segment. They range in color from colorless and pale to the brighter reds and yellows, but most of the type found around the home are black, brown or grey. Generally, centipedes and millipedes will live, breed and hunt outside. Few species desire to go indoors, but sometimes they may accidentally wander inside. These visitors are typically harmless and can be beneficial in places like the garden. If centipedes and millipedes are present in abundance or if you’re finding them in sensitive locations within or around the home, your Hearts pest control technician can eliminate these illusive pests quickly and efficiently. Millipedes are an extremely varied genus with scores of species in just our county alone. In general th
The world's horse population is estimated to not exceed 65 million, while the human population is estimated at 7.05 billion, about 108 people for every horse. It wasn't always thus. In 1800, Europe's estimated
The world's horse population is estimated to not exceed 65 million, while the human population is estimated at 7.05 billion, about 108 people for every horse. It wasn't always thus. In 1800, Europe's estimated horse population was 14 million, with an estimated 150 million people, about 11 people for every horse. The Industrial Revolution caused the horse's relative decline. In 1800, horses were a big part of the economy. Today, horses are a luxury good, providing entertainment and sport for those who can afford to feed and maintain them. In economic terms, the marginal value of a horse's work became less than the costs of feeding the horse. At the time, people worried that the Industrial Revolution would also put people out of work, but unskilled workers' wages rose faster than wages for the skilled. That could be changing, at least in the United States. For the past decade, the gap between less-educated workers' wages and higher-educated workers' wages has grown dramatically, a result of globalization and technology. In their book, "Race Against the Machine," Erik Brynjolfsson and Andrew McAfee argue that we may soon put not only unskilled, but skilled, workers out of work. In the past, machines complemented people. They made us more productive. Now, we're talking about advances in robotics and artificial intelligence that may allow machines to replace people. Is that a problem? If it results in persistent unemployment, it's a problem. In economics, we model people as valuing consumption and leisure. We also assume more consumption or more leisure is always good. Of course, that's not the way the world really works. It turns out that work provides something people need. Populations that have everything provided for them suffer all sorts of problems, among them,
approaches to personalizing the user interface must first assess the user’s functional abilities and subsequently predict effective interface modifications. As an example, Hurst and colleagues demonstrated that machine-learning techniques could be used to distinguish between mouse movements
approaches to personalizing the user interface must first assess the user’s functional abilities and subsequently predict effective interface modifications. As an example, Hurst and colleagues demonstrated that machine-learning techniques could be used to distinguish between mouse movements performed by able-bodied individuals and individuals whose motor abilities were impaired by age-related factors or Parkinson’s disease [ 4]. The same methods were also used to automatically predict whether individuals would benefit from an adaptive software technique. One challenge with assessing functional ability is that much past work has relied on observations collected during controlled lab experiments, which Hurst and colleagues have demonstrated are not representative of real-world performance [ 5]. We believe that it is important to model text-entry and pointing abilities based on observations made unobtrusively while the users are performing their own tasks. With accurate and up-to-the-minute models of what the user can do, the computers can guide their users in the selection of the most promising adaptive settings or offer to automatically generate optimal adaptations. Automatically adapting user interfaces to a user’s abilities. Ability assessments can be used to make appropriate adaptations to the interface automatically or in collaboration with the user. Supple is an example of such a system (Figure 1) [ 6]. Supple uses to automatically generate user-optimal interfaces. Supple relies on a model of how quickly a particular user performs basic user interface operations to generate user interfaces predicted to be the • Figure 1. Ability-based adaptation in SUPPLE: (top) default interface for controlling lighting and A/V equipment in a classroom; (bottom) interface for the same application automatically generated by SUPPLE for a user with impaired dexterity based on a model of her actual motor abilities. March + April 2012
Grades PreK-1: Lesson Plans (The Lesson Plans Page) Library Home || Full Table of Contents || Suggest a Link || Library Help |Kyle Yamnitz, Univ. of Missouri| |A searchable archive of lesson plans
Grades PreK-1: Lesson Plans (The Lesson Plans Page) Library Home || Full Table of Contents || Suggest a Link || Library Help |Kyle Yamnitz, Univ. of Missouri| |A searchable archive of lesson plans for arithmetic, patterns, basic operations (addition
Is a Toxicologic Evaluation or Health Effects Evaluation? A toxicologic evaluation is based on the science of toxicology. Toxicology is the study of the adverse effects of chemicals on living organisms. A toxicologic evaluation is an evaluation of
Is a Toxicologic Evaluation or Health Effects Evaluation? A toxicologic evaluation is based on the science of toxicology. Toxicology is the study of the adverse effects of chemicals on living organisms. A toxicologic evaluation is an evaluation of human exposure to a specific chemical to determine whether people will become ill from their exposure. In the public health assessment process, a toxicologic evaluation includes reviewing information on how the chemical gets into the body what happens to the chemical after it gets into the body what effects are associated with the chemical and at what levels
Recognizing the Role of Plug-Ins in Your PC Recording Studio Plug-ins are an important part of your computer-based recording system and one of the features that sets it apart from your old tape deck. Plug-ins allow you to process the sound
Recognizing the Role of Plug-Ins in Your PC Recording Studio Plug-ins are an important part of your computer-based recording system and one of the features that sets it apart from your old tape deck. Plug-ins allow you to process the sound of your instrument in an almost unlimited variety of ways. These can range from basic effects — stuff such as reverb or delay — to tricks such as raising the overall volume of your track (called normalizing your track) or changing the pitch of an instrument. By using plug-ins, you can process your tracks in one of two ways: - Real time: Real-time processing means that your audio is processed as your song plays. This approach puts a load on your computer, so the number of plug-ins you can run at one time depends on how powerful your computer is. This is the approach you use when you actually mix songs and you want to add effects to your tracks. - Offline: Using plug-ins offline means you process the audio when your song isn't playing; you end up with a new audio file that includes your newly processed audio. This is common for some usual processing chores, such as normalizing, quantizing, transposing, and other new-fangled audio processing approaches. The ways you can process your audio offline depend on your audio recording program and the plug-ins you have loaded into your system. Some audio recording programs, such as Apple's Logic, have a freeze function that lets you apply your effect plug-ins (reverb, compression, and others) in a manner similar to that of the offline approach. The difference is that you can unfreeze your track, adjust your effect parameters, and freeze it again. This offers the advantage of leaving your processor unburdened by the weight of your effect as your song plays, thus allowing you to run more plug-ins in your song without having to get a faster computer. Figuring out formats Plug-ins come in many formats but follow only two different processing approaches. These facets of plug-ins are covered in this section. When audio recording software programs were first developed, they each used their own formats for their plug-ins. Because originally no plug-ins were made by third-party manufacturers, this wasn't a problem. As recording programs became popular, third-party plug-ins starting becoming available, and these third-party makers needed to make some decisions — including which format to develop their programs in. (Figuring
Contrary to official figures, two methods of fertilization — implanting the embryo in the uterus or in the Fallopian tube — yield comparable success rates, a study by a School of Medicine researcher concludes. The study by Dr. Steven Pal
Contrary to official figures, two methods of fertilization — implanting the embryo in the uterus or in the Fallopian tube — yield comparable success rates, a study by a School of Medicine researcher concludes. The study by Dr. Steven Palter, assistant professor and clinic chief of reproductive medicine in the Department of Obstetrics and Gynecology, contradicts statistics indicating that implantation in the Fallopian tube, which is more risky and more costly, has a higher success rate for fertilization. Those statistics were published by the Centers for Disease Control and the Society for Assisted Reproductive Technology. “Our study shows that there is no difference in implantation and pregnancy rates among women undergoing zygote intrafallopian transfer (ZIFT) and intrauterine embryo transfer (ET),” says Palter, who presented his findings at a meeting of the American Society for Reproductive Medicine in San Diego, California. “When you combine the expense and scheduling difficulties associated with ZIFT, this technique cannot be recommended for routine use.” Both the national database and Palter’s study showed that the ZIFT procedure leads to increased risk of an ectopic pregnancy in which the fertilized egg implants outside the womb, most often in the Fallopian tube. As the embryo develops the tube ruptures or other complications arise. The national database was mandated by Congress in 1992. The law requires that pregnancy success rates for assisted reproductive technology (ART) procedures carried out in fertility clinics be published. The statistics have consistently shown that the transfer of embryos to the Fallopian tube had a significantly higher success rate. Palter and his co-author, Antonia Habana, at the time a postdoctorate research fellow, analyzed 24 studies, which included several randomized controlled trials. The researchers reviewed 548 cycles, which is the number of in vitro fertilization attempts; 514 egg retrievals; and 388 transfers into the uterus or Fallopian tube. Each case was comparable in terms of mean age, the cause of the infertility, the protocol used, and the number of transfers. They found the implantation rate and pregnancy rates were n
The Influenza Pandemic of 1918 During the last four months of 1918 more than 22,000 people died from influenza and pneumonia in Massachusetts, 4,088 of them in Boston. The normal death rate
The Influenza Pandemic of 1918 During the last four months of 1918 more than 22,000 people died from influenza and pneumonia in Massachusetts, 4,088 of them in Boston. The normal death rate due to influenza should have been 1,800 for the state, 500 for the city. U.S. Public Health Service statistics are equally staggering: during 1918-1919, over 25 million people, more than one-quarter of the nation’s population, had the flu. But this is surely a conservative figure — medical record keeping then was not the sophisticated craft it is today.Before the flu passed, 548,000 people died of it in this country, 20 million worldwide — more than died in the Great War.
When the California Public Utilities Commission (CPUC) announced a three-year, $2 billion funding plan for energy-efficiency programs in September 2005, it called the effort “the most ambitious energy and efficiency campaign in the history of the utility
When the California Public Utilities Commission (CPUC) announced a three-year, $2 billion funding plan for energy-efficiency programs in September 2005, it called the effort “the most ambitious energy and efficiency campaign in the history of the utility industry in the United States.” The CPUC campaign is designed to help energy customers maximize use of the large number of energy-efficiency programs available in California. These initiatives help not only energy customers and utilities but also the state. After all, less consumption means lower energy bills for consumers. Investor-owned utilities benefit because lower energy demands from customers mean they must generate less power and will consequently need to build fewer power plants. The state, through the CPUC, has an interest in ensuring that utilities have enough power to meet the demand of all users in the Golden State. Beyond the cost of building more power plants, environmental concerns must also be addressed. The CPUC, in a statement announcing the program, estimates new energy-efficiency programs will “eliminate the need to construct three large power plants over the next three years and reduce global warming pollution by an estimated 3.4 million tons of carbon dioxide by 2008, which is equivalent to taking about 650,000 cars off the road.” Edison has an IDEEA With efficiency in mind, Southern California Edison (SCE), Rosemead, Calif., introduced the Innovative Designs for Energy Efficiency Applications (IDEEA) program in 2004. This initiative looks beyond the utility industry for new ideas to promote energy efficiency. “SCE has been involved in the promotion of energy efficiency and energy conservation since 1911,” said Steven Long, nonresidential program manager at SCE. “But we had never solicited outside parties for such a program before. In 1998, the CPUC started this idea of the third-party program. They handled most of the responsibility for the projects while utility companies like SCE administered purchase orders. We are now soliciting and administering our own programs through third-party implementers.” Since 2004, SCE has openly solicited suggestions for energy-efficiency initiatives from manufacturers, distributors, importers and many other nonutility parties. SCE's IDEEA program is an avenue to introduce new and promising technologies, innovations in program delivery, targeting niche markets, and ideas for more effective marketing and rebate programs. Several of these submissions are chosen each year for pilot programs. If a pilot proves successful, then SCE will try it mainstream. “We see the IDEEA program as a sort of program design R&D shop, an innovation incubator,” said Bill Grimm, a manager for nonresidential energy-efficiency programs at SCE. Cold-Cathode Lighting Catches SCE's Eye One current IDEEA program provides rebates to purchasers of cold-cathode fluorescent lamps (CCFL). Although cold-cathode technology is not new, this technology has only recently begun to replace incandescent lighting in some applications. Many customers are still unaware of cold-cathode fluorescent lamps and the benefits they can provide when compared with incandescent or regular fluorescent lighting. Cold-cathode fluorescent lamps are similar to normal fluorescent (“hot cathode”) lamps in many respects. Unlike traditional fluorescent lamps, however, cold-cathode lamps can dim without special dimming ballasts. The real advantages of cold-cathode lamps are seen when comparing them with incandescent lamps. Cold-cathode lamps can operate using as much as 65 percent to 80 percent less energy than comparable incandescent lamps, and they can last 20 or more times longer. Energy Controls & Concepts (ECC), Redlands, Calif., a company specializing in lighting-efficiency design consultation, received the cold-cathode program submitted to SCE. SCE selected this program for IDEEA and awarded ECC a $1 million contract to fund it. ECC has served as the program implementer. The cold-cathode lamps used in this program came from Litetronics International Inc., Alsip, Ill. Litetronics manufactures many different types of lamps and holds several patents for cold-cathode lighting technology. “We were glad to hear about Southern California Edison's interest in promoting cold-cathode,” said Greg Lechtenberg, regional sales manager for Litetronics. “ECC approached us about the plan, and we were more than happy to get involved. Outside of the lighting industry, not a lot is known about cold-cathode fluorescent technology. This was a great opportunity to introduce consumers to a product that will prove to be very beneficial.” This program offered customers rebates on cold-cathode fluorescent lighting when used in applications that would produce significant energy savings and on-peak demand reduction. After customers had replaced their incandescent lighting with cold-cathode fluorescent lamps, the installation had to be completely inspected by ECC. Some of the work was also subject to SCE inspection. SCE and ECC would then approve customers to receive a rebate, in most cases for the entire cost of the lamps. A Call for New Submissions Jonathan Baty, ECC's vice president of technology, is encouraged by the cold-cathode program and says Southern California Edison wants more people to use cold-cathode fluorescent lighting systems. Grimm said the cold-cathode program and the rest of last years' IDEEA programs finished last month. Of those programs, three will be moving forward in
BBQ, sunshine and in some cases, fireworks are all a part of a traditional 4th of July celebration in the US. It’s such a fun summer holiday but if you’re setting off your own fireworks display this year, the Consumer
BBQ, sunshine and in some cases, fireworks are all a part of a traditional 4th of July celebration in the US. It’s such a fun summer holiday but if you’re setting off your own fireworks display this year, the Consumer Products Safety Commission has a few tips to make sure your holiday is as safe as possible! - Never allow young children to play with or ignite fireworks. - Avoid buying fireworks that are packaged in brown paper because this is often a sign that the fireworks were made for professional displays and that they could pose a danger to consumers. - Always have an adult supervise fireworks activities. Some parents don’t realize that young children can suffer injuries from sparklers. Sparklers burn at temperatures of about 2,000 degrees, hot enough to melt some metals. - Never place any part of your body directly over a fireworks device when lighting the fuse. Back up to a safe distance immediately after lighting fireworks. - Never try to re-light or pick up fireworks that have not ignited fully. - Never point or throw fireworks at another person. - Keep a bucket of water or a garden hose handy in case of fire or other mishap. - Make sure fireworks are legal in your area before buying or using them. You can find these tips and others at http://www.cpsc.gov/info/fireworks/index.html. We hope you have a safe and happy holiday!!! Thanks to bayasaa for this beautiful photo!
ST. LOUIS (CBS St. Louis) — Researchers have found a new way to combat HIV – bee venom. The study, conducted by researchers from Washington University School of Medicine, shows that the toxin melittin found in bee venom destroys
ST. LOUIS (CBS St. Louis) — Researchers have found a new way to combat HIV – bee venom. The study, conducted by researchers from Washington University School of Medicine, shows that the toxin melittin found in bee venom destroys HIV while leaving the surrounding normal cells unharmed. “Melittin on the nanoparticles fuses with the viral envelope,” Dr. Joshua Hood said in a press release. “The melittin forms little pore-like attack complexes and ruptures the envelope, stripping it off the virus.” Researchers believe this finding can lead to a vaginal gel that can prevent the spread of HIV. “Our hope is that in places where HIV is running rampant, people could use this gel as a preventive measure to stop the initial infection,” Hood said. The study’s findings show that protective bumpers added to the nanoparticle’s surface, which is loaded with melittin, stops the venom from harming healthy cells. The nanoparticle appears to “bounce off” of the normal cells because of their larger size, but with HIV cells being smaller than the nanoparticle, those cells make contact with the nanoparticle loaded with the bee venom. “We are attacking an inherent physical property of HIV,” Hood said. “Theoretically, there isn’t any way for the virus to
| #2 (permalink) Thu Feb 12, 2009 16:41 pm Difference between client, customer, guest, consumer |A client, customer, and patron can be used interchangeably in almost any place that sells services
| #2 (permalink) Thu Feb 12, 2009 16:41 pm Difference between client, customer, guest, consumer |A client, customer, and patron can be used interchangeably in almost any place that sells services. A customer or a shopper is more often used in the places that sell goods (stores). I have never heard the store customers being called clients. A guest is more often used in hotels, spas, and restaurants. (hospitality services) A consumer is one that acquires goods or services for direct use or ownership rather than for resale or use in production and manufacturing. A consumer is an end user. A customer, IMHO, is the most general term. conĚtext - The part of a text or statement that surrounds a particular word or passage and determines its meaning. I'm here quite often ;-) Joined: 29 Dec 2008 Location: Texas, USA (at present)
Los Alamos builds time machine to the way the Web was - By Henry Kenyon - Aug 08, 2011 The Internet is constantly shifting, with many websites changing their content and appearance almost daily. Such a protean
Los Alamos builds time machine to the way the Web was - By Henry Kenyon - Aug 08, 2011 The Internet is constantly shifting, with many websites changing their content and appearance almost daily. Such a protean environment poses a problem for archivists or anyone interested in seeing what a home page looked like at a specific date and year. But a new application and standard could potentially turn Web browsers and other software into time machines. A team of computer scientists at the Los Alamos Research Library in New Mexico and Old Dominion University (ODU) in Virginia has written a technical specification that embeds the concept of time into Internet applications. The specification is part of the team’s proposed information framework, known as Memento, which creates an application that allows the version control of Web pages, databases and other online information sources. Work on Memento originated from collaborative work by Los Alamos and ODU on digital preservation methods to create long-term data repositories, said Herbert Van de Sompel, leader of the Los Alamos team. The interest in archiving Web pages grew out of this initial work. There are actually many Web archives, often part of a national museum or archive such as the Library of Congress or the British Museum, Van de Sompel said. But to find old Web pages, users must know where to look. Memento uses a protocol that allows searches across all of these archives, he said. The Library of Congress’ Internet Archive began in the 1990s. Much of the archiving technology currently in use relies on Web crawling software to take snapshots of Web pages for storage. Most Internet archives typically only archive/search sites in their own countries, Van de Sompel said. Content management programs such as Wikipedia also record and store versions of a page over time. Memento allows users to access a page as it appeared on a specific date. There are also other ways now available to collect and record Web pages as they appeared on a specific date, but there is no simple, one-step process to look up old pages. “There is a sizable portion of the Web of the past that is available. But accessing it is cumbersome and that’s where Memento comes in,” he said. Memento does not search at the archive level. Instead it works by time stamping a page version that allows it to be referenced at a later date. Van de Sompel said that one application could be in content management and version control systems such as Wikipedia by using a universal resource identifier, or URI. Universal resource locators, or URLs, are a subset of the URI protocols, which include http:// and ftp:// formats. Memento can also search through dates using a slider graphic. For example, a user selects a newspaper Web site and moves the slider back to a specific date, and Memento will call up the archived page. By entering a site’s URI into Memento, users can search multiple archives via an HTTP-based search tool. The technology automatically searches all of the Internet’s Web archives and directs the user to the archived copy, no matter its location. This is a considerable advantage over current searches, in which users must know the locations of the archives to access their data. “You have to consult each of [the archives] through search,” Van de Sompel said. One of the Memento team’s goals is to make the time-searching capability a standard Internet protocol. However, before it becomes widely accepted, the researchers have developed a plug in that can be used on the Firefox Web browser. There is also a mobile version for the Android operating system that is under development, Van de Sompel said. Memento has many possible government applications for archiving and storage. For example, in the Netherlands, Van de Sompel said many municipalities are actively archiving their Web presences because they anticipate legislation will soon require them to do so. This process has attracted a number of companies that are helping Dutch town and city governments archive their sites. In the United Kingdom, a law requires government Web pages to have active hyperlinks. Often, old links go dead as a site is updated and data changes. Memento could provide a solution to this by allowing administrators to track back to a time when a link was last active. Link data also changes over time, Los Alamos computer scientist Robert Sanderson said. Sites such as data.gov.uk, which list statistical and economic data such as national gross domestic product, change their information over time. So the links for a nation’s GDP would change over the years. A tool such as Memento would allow researchers to locate that specific data, Sanderson said. In the United States, the Citability group promotes accessibility to public Web sites and archived data. “This is a perfect playing field
A new calibration facility at the National Institute of Standards and Technology will boost the accuracy of remote sensing instruments used in global warming and climate research. The new Facility for Advanced Radiometric Calibration (FARCAL), established by the Optical Technology Division of N
A new calibration facility at the National Institute of Standards and Technology will boost the accuracy of remote sensing instruments used in global warming and climate research. The new Facility for Advanced Radiometric Calibration (FARCAL), established by the Optical Technology Division of NIST's Physics Laboratory, will improve the accuracy of data that will shape future environmental policy. It also will boost the accuracy of remote sensing for defense and industrial applications and resource management. ``Research in global warming is ultimately aimed at formulating new government policy and regulation that will impact the U.S. economy through many industries, such as chemical, recreational and building. Accurate estimates of the uncertainties will be critical to the decision-making process,'' says NIST physicist Carol Johnson. NIST developed the facility in response to NASA's request for assistance in assessing the reliability and comparability of measurements made on a number of different radiometers. ``As the nation's standards laboratory and a non-regulatory agency, NIST is the only institution in the United States that can fulfill basic requirements for these applications,'' Johnson says. NASA places radiometers on board Earth-orbiting satellites to gather data for climate and environmental studies. Radiometers are able to measure subtle changes in the amount of light at different wavelengths. Most are designed to measure the wavelengths of infrared and visible light, and can determine temperature based on radiated light. From radiometric measurements, scientists can determine the presence of different elements or chemical reactions. Such data can indicate physical or chemical trends in the atmosphere, within oceans and on land. In addition to assessments of Earth from space, radiometers are used in high- altitude aircraft by the Department of Defense and in examinations of the ocean and coastal regions by ships or undersea buoys. They also are used in deserts and polar regions to study environmental conditions. A national radiometric standard enables users to trace the accuracy of their data to a single source, NIST. This allows researchers to compare more reliably data collected with different instruments in different parts of the world. The new FARCAL facility will cover a wide range of radiometer calibration needs. In addition, the facility will hold training exercises and workshops for radiometer manufacturers and users. For more information, contact Carol Johnson, B208 Physics Building, NIST, Gaithersburg, Md. 20899-0001, (301) 975-2322, e-mail: [email protected]. As a non-regulatory agency of the Commerce Department' s Technology Administration, NIST promo
The news out of the National Institutes of Health is troubling: One in every two American women over age 50 will break a bone during her lifetime because of osteoporosis, a disease in which bones lose minerals and become fragile. What’s more
The news out of the National Institutes of Health is troubling: One in every two American women over age 50 will break a bone during her lifetime because of osteoporosis, a disease in which bones lose minerals and become fragile. What’s more, women who have a family history of the disease have an even higher risk of experiencing a painful bone break, usually in the wrist, spine or hip. For older women, a broken bone, especially a broken hip, can mean permanent disability, depression and even death. Your bones can begin to thin and weaken for different reasons: low estrogen levels as a result of menopause, a poor diet, the use of certain medications, being underweight, not exercising, smoking and overdoing alcohol. When bones thin to a certain point, you may have osteopenia, or reduced bone mass. Osteopenia precedes osteoporosis, characterized by more severe bone loss. But having osteopenia doesn’t mean you’ll develop osteoporosis. Studies have shown you can prevent or halt bone loss, reduce your fracture risk and even rebuild your bones. Eat a diet rich in calcium and vitamin D or take supplements. Calcium sources include milk and other dairy foods, leafy green vegetables, soybeans and tofu and calcium-fortified juice and oatmeal. Sources of vitamin D include vitamin D–fortified milk or juice and cod liver oil, as well as sunlight. Exercise each day for at least 30 minutes. Strength training (lifting weights) and weight-bearing exercises like walking, jogging and jumping rope keep your bones strong. Don’t smoke or abuse alcohol. Doing either reduces your bone mass. Prevent falls. Try activities that improve balance, like dancing and tai chi. Wear supportive, nonslip shoes. Make your home safe by banishing slippery throw rugs and removing things you may trip over. Ask your healthcare provider about medications you’re taking (such as thyroid or arthritis drugs) and whether they can weaken your bones. If so, find out how you can protect your frame. Get a bone mineral density test (also called a DEXA scan). Women over age 65 need one, as do younger women who have a family history of osteoporosis, take certain medications or have other risk factors. If you have signs of bone loss—you’ve lost height, experienced bone fractures or had a bone density test that showed reduced bone mass—talk with your healthcare provider about supplements and medicines that can help.
Affective science is the scientific study of emotion or affect. This includes the study of emotion elicitation, emotional experience and the recognition of emotions in others. In particular the nature of feeling, mood, emotionally driven behaviour, decision making, attention and
Affective science is the scientific study of emotion or affect. This includes the study of emotion elicitation, emotional experience and the recognition of emotions in others. In particular the nature of feeling, mood, emotionally driven behaviour, decision making, attention and self-regulation, as well as the underlying physiology and neuroscience of the emotions. An increasing interest in emotion can be seen in the behavioral, biological and social sciences. Research over the last two decades suggests that many phenomena, ranging from individual cognitive processing to social and collective behavior, cannot be understood without taking into account affective determinants (i.e. motives, attitudes, moods, and emotions).1 Just as the "cognitive revolution" of the 60s spawned the "cognitive sciences" and linked the disciplines studying cognitive functioning from different vantage points, the emerging field of affective science seeks to bring together the disciplines which study the biological, psychological, and social dimensions of affect. In particular affective science includes psychology, neuroscience, sociology, psychiatry, anthropology, ethology, archaeology, economics, criminology, law, political science, history, geography, education and linguistics. Research is also informed by contemporary philosophical analysis and artistic explorations of emotions. Emotions developed in human history make organisms to react to environmental stimuli and challenges.2 The major challenge for this interdisciplinary domain is to integrate research focusing on the same phenomenon, emotion and similar affective processes, starting from different perspectives, theoretical backgrounds, and levels of analysis. As a result one of the first challenges of affective science is to reach consensus on the definition of emotions. Discussion is still ongoing as to whether emotions are primarily bodily responses or whether cognitive processing should be placed central. Controversy also concerns the most effective ways to measure emotions and conceptualise how one emotion can differ from another. Examples of this include the dimensional models of Russell and others, the emotion wheel of Plutchik, and the general distinction between basic and complex emotions.3 |This section does not cite any references or sources. (February 2013)| Whether scientific method is at all suited for the study of the subjective aspect of emotion, feelings, is a question for philosophy of science and epistemology. In practise, the use of self-report (i.e. questionnaires) has been widely adopted by researchers. Additionally, web-based research is being used to conduct large-scale studies on the components of happiness for example. Alongside this researchers al
Where Girls Grow Strong Wednesday - June 29, 2005 Del.icio.us | Share Gail Mukaihata Hannemann and some of the Girl Scout ohana Today’s Echo and Millenni Boomers are
Where Girls Grow Strong Wednesday - June 29, 2005 Del.icio.us | Share Gail Mukaihata Hannemann and some of the Girl Scout ohana Today’s Echo and Millenni Boomers are growing up in a very different world than their Baby-Boomer grandparents and Generation X parents. Their lives are scheduled, structured, and managed; digitalized, downloaded, and uploaded. Yet, the truth is these youngsters face a less than certain future. What is fact today may not be tomorrow. Former Harvard University president, Neil Rudenstine, noted “that the ‘half life’ of what is learned in the humanities is eight or 10 years, and in math and the sciences it is three or four.” The U.S. Department of Labor projects that 80 percent of the jobs that will exist in 10 years, don’t even exist today. Author Thomas L. Friedman states in The World is Flat, “Clearly, it is now possible for more people than ever to collaborate and compete in real time with more other people on more different kinds of work from more different corners of the planet and on a more equal footing than at any previous time in the history of the world.” Accordingly, kids must grow up to become knowledge workers — ably skilled and socially adaptable. They will also be expected to pave their own paths in a global economy. Daunting proposition? Not if a girl is a Girl Scout. Why? Because Girl Scouts meets this challenge head on for girls ages 5-17 years. By design, Girl Scouting purposefully helps girls discover their full potential. Girls are encouraged to develop and act upon a meaningful set of values that reflect their personal beliefs and incorporate the fundamental principles of the Girl Scout Movement – respect for oneself, others, and the world we live in. The Girl Scout Program focuses on creating learning opportunities for girls based on their various physical, emotional, and psychological developmental needs. As girls grow strong, gaining more skills, experience and confidence, so too do their responsibilities. Under the guidance of our adults, they are expected to successfully take on a more active role in planning activities, making decisions, and achieving goals. In other words, girls learn how to learn and to take great pride and joy in their own self-development. A great example is the nation’s preeminent non-profit entrepreneurial program, the Girl Scout Cookie Program. Girls learn to set individual and group money — earning goals in order to fund the yearly activities of their choice. We also help girls understand how they connect to a world beyond themselves. Every Girl Scout growing up in Hawaii is part of the statewide Girl Scout Council of Hawaii that serves as a bridge to over 7,000 other Hawaii Girl Scouts. In turn, they are part of a national network of 3.8 million Girl Scouts associated with our national organization, Girl Scouts of the USA. Internationally they are connected to 10 million Girl Scouts and Girl Guides in nearly 144 countries through our international organization, World Association of Girl Guides and Girl Scouts. Nationally, we have 93 years of experience. Here in Hawaii, we are 86 years strong. In a nutshell, my job is to make certain that Girl Scouts remains relevant and viable for not only the girls in our program today but also for generations to come. Fortunately, I don’t do it alone. I have the support and guidance of a terrific board of directors and the help of an exceptional and competent staff. Together we are retooling and realigning our operations to become more efficient and effective in order to better realize our mission. Our motivation and inspiration come from the girls. How are we able to do it? Thanks to the on-going support of Hawaii’s many generous charitable foundations, businesses, and community leaders. And most importantly, with the incredible assistance of thousands of trained volunteers, family members, and friends who freely give of their time, talent, and resources to create safe and nurturing environments so girls can flourish. As a Baby Boomer, I am personally optimistic about the future. The girls’ smiles, laughter, and conversations serve as constant reminders that Girl Scouts is purposeful and relevant. My work also allows me to see the caliber of girls preparing to become tomorrow’s leaders. It’s encouraging. Everyone should find a way to get involved and make a difference in the lives of girls! Next week: Donna Farrell, general manager of Victoria Ward Centers E-mail this story | Print this page | Comments (0) | Archive | RSS Comments (0) | Most Recent Comment(s):
Functional traits are attributes that influence the fitness of a species. We use microfluidic experiments, microscale visualization and mathematical modeling to study the interplay between bacterial functional traits, such as shape and motility, and flow, which is ubiquitous in
Functional traits are attributes that influence the fitness of a species. We use microfluidic experiments, microscale visualization and mathematical modeling to study the interplay between bacterial functional traits, such as shape and motility, and flow, which is ubiquitous in bacterial habitats. For example, bacterial flagella are chiral (specifically: helical). We discovered that the coupling of chirality and shear leads to a preferentially oriented movement, bacterial rheotaxis, akin to that in fish but of a passive nature. Bacterial rheotaxis is characterized by a drift across streamlines that originates from the reorientation of the cell body due to a lift force acting on the chiral flagellum and could hamper the quest of nutrients by bacteria. We are currently performing extensive microfluidic experiments to better understand the rich interactions among bacteria
Watts Up With That? Tuesday, Sept 15th, 2009 Bill Illis writes about it: Ice sheets formed in Antarctica about 35 million years ago when CO2 was about 1,200 ppm. Ice sheets also
Watts Up With That? Tuesday, Sept 15th, 2009 Bill Illis writes about it: Ice sheets formed in Antarctica about 35 million years ago when CO2 was about 1,200 ppm. Ice sheets also formed in Antarctica about 350 to 290 million years ago when CO2 was about 350 ppm. Ice sheets also formed in Antarctica about 450 to 430 million years ago when CO2 was about 4,500 ppm. The more common denominator is when continental drift places Antarctica at the south pole. Below, Antarctica today. New data illuminates Antarctic ice cap formation From a Bristol University Press release issued 13 September 2009 A paper published in Nature New carbon dioxide data confirm that formation of the Antarctic ice-cap some 33.5 million years ago was due to declining carbon dioxide in the atmosphere. A team of scientists from Bristol, Cardiff and Texas A&M universities braved the lions and hyenas of a small East African village to extract microfossils from rocks which have revealed the level of CO2 in the Earth’s atmosphere at the time of the formation of the ice-cap. Geologists have long speculated that the formation of the Antarctic ice-cap was caused by a gradually diminishing natural greenhouse effect. The study’s findings, published in Nature online, confirm that atmospheric CO2 started to decline about 34 million years ago, during the period known to geologists as the Eocene – Oligocene climate transition, and that the ice sheet began to form about 33.5 million years ago when CO2 in the atmosphere reached a tipping point of around 760 parts per million (by volume). The new findings will add to the debate around rising CO2 levels in the Earth’s atmosphere as the world’s attention turns to the UN Climate Conference in Copenhagen which opens later this year. Dr Gavin Foster from the University of Bristol and a co-author on the paper said: “By using a rather unique set of samples from Tanzania and a new analytical technique that I developed, we have, for the first time, been able to reconstruct the concentration of CO2 across the Eocene-Oligocene boundary – the time period about 33.5 million years ago when ice sheets first started to grow on Eastern Antarctica. “ Professor Paul Pearson from Cardiff University’s School of Earth and Ocean Sciences, who led the mission to the remote East Africa village of Stakishari said: “About 34 million years ago the Earth experienced a mysterious cooling trend. Glaciers and small ice sheets developed in Antarctica, sea levels fell and temperate forests began to displace tropical-type vegetation in many areas. “The period culminated in the rapid development of a continental-scale ice sheet on Antarctica, which has been there ever since. We therefore set out to establish whether there was a substantial decline in atmospheric carbon dioxide levels as the Antarctic ice sheet began to grow.” Co-author Dr Bridget Wade from Texas A&M University Department of Geology and Geophysics added: “This was the biggest climate switch since the extinction of the dinosaurs 65 million years ago. “Our study is the first to provide a direct link between the establishment of an ice sheet on Antarctica and atmospheric carbon dioxide levels and therefore confirms the relationship between carbon dioxide levels in the atmosphere and global climate.” The team mapped large expanses of bush and wilderness and pieced together the underlying local rock formations using occasional outcrops of rocks and stream beds. Eventually they discovered sediments of the right age near a traditional African village called Stakishari. By assembling a drilling rig and extracting hundreds of meters of samples from under the ground they were able to obtain exactly the piece of Earth’s history they had been searching for. The paper:Atmospheric carbon dioxide through the Eocene–Oligocene climate transition. Paul N. Pearson, Gavin L. Foster & Bridget S. Wade. Nature online, Sunday 13th September. This article was posted: Tuesday, September 15, 2009 at 10:19 am
But helium is actually a precious resource that is being squandered with Earth's reserves of it due to run out within 25 to 30 years, experts have warned. Earth’s resources of helium are being depleted at an astonishing rate, an
But helium is actually a precious resource that is being squandered with Earth's reserves of it due to run out within 25 to 30 years, experts have warned. Earth’s resources of helium are being depleted at an astonishing rate, an effect which will spell disaster for hospitals which use it to cool MRI scanners. The world's biggest store of helium - the most commonly used inert gas - lies in a disused airfield in Amarillo, Texas, and is being sold off far too cheaply. But in 1996, the US government passed a law which states that the facility - the US National Helium Reserve - must be completely sold off by 2015 to recoup the price of installing it. This means that the helium, a non-renewable gas, is being quickly sold off at increasingly cheap prices, making it uneconomical to recycle. Nasa uses the gas to clean its rockets of fuel while liquid helium is used to cool nuclear reactors and space telescopes.
Space Energy seeks to improve the lives of millions of people, provide viable alternatives to polluting energy sources and help abate some of the challenges caused by increasing demand for energy and declining natural resources. The concept of SBSP (Space Based Solar Power
Space Energy seeks to improve the lives of millions of people, provide viable alternatives to polluting energy sources and help abate some of the challenges caused by increasing demand for energy and declining natural resources. The concept of SBSP (Space Based Solar Power) was theorized over 40 years ago by renowned scientist Dr. Peter Glaser. Since then, in response to periodic energy crises, the idea has been re-evaluated from time to time by the U.S. Department of Energy, NASA, major aerospace companies and countries such as Japan and India. Their studies generally concluded that there is no technical barrier to implementing SBSP; rather, the principal impediment has been economics -- the ability to provide SBSP at a cost that is competitive with other energy sources... However, as we rapidly run out of affordable non-renewable fossil fuel sources of energy and before competition to access what remains becomes too aggressive risking international conflict, the imperative is to find long term alternative sources of base load renewable energy that are also environmentally friendly before catastrophic Climate Change becomes irreversible. Energy generated from Uranium fuelled nuclear fission is not a viable long term alternative to fossil fuel generated energy, particularly when taking into account the costs for radioactive waste safe storage and disposal as well as lengthy decommissioning and decontamination costs that can run into billions over a period of sixty years or more after the power plant is closed down. Moreover, global non-renewable supplies of uranium are now limited. Energy derived from Thorium fuelled nuclear fission is experimental at this stage and might become an important contributor to the base load global energy mix. Energy derived from earth bound nuclear fusion remains a distant possibility but, why would we want to create a nuclear fusion reactor on earth when we already have one in the form of the sun freely pouring infinite amounts of clean energy over us? Why are we spending billions on this unproven technology when we could be harnessing the sun’s energy from space with already proven technology for a fraction of the cost? After 50 years of trying unsuccessfully to prove the science of fusion power with no conclusion as to its commercial viability, this represents an extraordinary waste of taxpayers’ money and simply does not make any sense at all. There is only one reliable, clean and secure source of renewable energy with the potential to meet all future global base load demand for energy in perpetuity and that is Space Based Solar Power. All we have to do is reach up and capture this energy. Hundreds, possibly even thousands of Communication satellites have been using similar technology for decades to broadcast Satellite TV and Radio worldwide - why not take this a step further and broadcast or narrow-cast energy to where it is needed by using microwave or laser technology to achieve SBSP from large solar