text
stringlengths
263
344k
id
stringlengths
47
47
dump
stringclasses
23 values
url
stringlengths
16
862
file_path
stringlengths
125
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
57
81.9k
score
float64
2.52
4.78
int_score
int64
3
5
I want to share some striking highlights from the 4th Global Report on Adult Learning and Education (GRALE): An Ageing Workforce: - As a result of rising life expectancy and declining birth rates, the natural growth of the labour force will not be able to make up for the number of expected retirees, which creates a need to keep older workers in the labour force. - Globally, in 2017, there were 3.5 persons aged 65 and over for every 10 persons in the labour force, a figure estimated to rise to five by 2030 (ILO, 2018d). The challenges will be strongest in regions of Europe, Northern America and Eastern Asia. - The changing demographic raises concerns about competencies within an ageing workforce. Findings from PIAAC partly support these concerns. The data show major differences in literacy proficiency across age groups, with adults aged 55 to 65 scoring some 30 points fewer than adults aged 25 to 34 (Paccagnella, 2016). - Despite lower literacy proficiency, older workers seem to be as productive as their younger counterparts. - While older workers may have been able to compensate for lower proficiency in information processing skills, changing production processes put a premium on the ability to learn (OECD and ILO, 2018) and may make it more challenging. - As a consequence of the increased demands on the future workforce, an existing bias against older workers could be reinforced. On the other hand, there are some positive trends within the EU sphere. - Using three AES surveys, 2007, 2011 and 2016, it can be inferred that the increase in participation by older workers (55–64) far surpassed the average increase. The EU average rate for non-formal job-related ALE in the 25–64 age span rose by 37%, but in the 55–64-year-old group, the increase was as high as 71%. These differences are almost exclusively a consequence of better access to employersupported ALE, especially for older workers. - These positive developments in all countries should not obscure the fact that the actual participation rates in job-related ALE in many EU countries remain at a low level. All these developments point to the importance of ALE for an ageing workforce both within and outside the workplace.
<urn:uuid:cb385ccc-be2e-4297-99ef-4d8115992340>
CC-MAIN-2020-10
https://epale.ec.europa.eu/sv/node/143960
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875143695.67/warc/CC-MAIN-20200218120100-20200218150100-00452.warc.gz
en
0.942637
459
2.75
3
PINCHED FRONT, VENTED RAFFIA WITH CONCHO, CHIN CORD, AND ELASTIC Hat size is based on the circumference of the head. In order to determine your proper hat size, you must take a measurement of your head. Using a tape measure, measure your head about one-half inch above your eyebrows where your hat will rest. Be certain that the tape measure is straight, not twisted. Alternatively, you can use piece of string to measure your head, and then measure the length of the string with a ruler. If you are not certain about size, or are between sizes, buy the larger size. Use the chart below to determine your hat size based on the measurement you take. *How To Measure Your Child’s Head - Measure around the widest part of the head, just above the eyebrows. Use a tape measure. If you don’t have a tape measure, use a string and then measure the resulting string length with a ruler. **Age of Child - The head grows to almost 80 per cent of the adult size during the child’s first year. We have found that for hat sizing purposes head measurement is more important than the child’s age. That is why that with the exception of infants, we do not list sizes by age. Our experience with Kangol Hats for Kids has shown us that the size small is very small and only fits infants. Please measure your child’s head
<urn:uuid:3e9dee31-3768-4c7f-bf99-732b3bb9bf1b>
CC-MAIN-2017-39
http://www.chaar.us/accessories/western-hats-riding-helmets/dallas-hat-con-h-fashion-tan/
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689752.21/warc/CC-MAIN-20170923160736-20170923180736-00373.warc.gz
en
0.920976
302
2.703125
3
Hitler would have loved The Singularity: Mind-blowing benefits of merging human brains and computers By Ian Morris, Professor Of Classics And History At Stanford University 11:24 GMT, 6 February 2012 Of all the tall tales in the science-fiction TV series Star Trek, what impressed me most when I was a little boy was the Vulcan mind meld. Laying his hands on the head of a human (or, in one of the films, a humpback whale), Mr Spock could, for a moment, dissolve the distance between two living things. Each experienced everything the other felt, thought, knew and saw. Now it seems scientists are about to make the Vulcan mind meld a reality – and go far beyond it. Ten years ago, the US National Science Foundation predicted ‘network-enhanced telepathy’ – sending thoughts over the internet – would be practical by the 2020s. Man and machine: Computers could soon be hardwired into the human brain and unlock amazing power. And thanks to neuroscientists at the University of California, we seem to be on schedule. Last September, they asked volunteers to watch Hollywood film trailers and then reconstructed the clips by scanning their subjects’ brain activity. ‘We’re opening a window into the movies in our minds,’ Professor Jack Gallant announced. Last week, the scientists boldly went further still. They charted the electrical activity in the brains of volunteers who were listening to human speech and then they fed the results into computers which translated the signals back into language. The technique remains crude, and has so far made out only five distinct words, but humanity has crossed a threshold. We can now read people’s minds. On Star Trek, the Vulcan mind meld had medical benefits, curing a nasty imaginary infection called Pa’nar syndrome. But the new breakthroughs promise to deliver much greater – and real – benefits. No longer need strokes and neurodegenerative diseases rob people of speech because we can turn their brainwaves directly into words. But this is only the beginning. Neuroscientists are going to make the mind meld look like child’s play. Mankind is merging with its machines. The process began centuries ago with simple devices such as eyeglasses and ear trumpets that could dramatically improve human lives. Then came better machines, such as hearing aids; and then machines that could save lives, including pacemakers and dialysis machines. By the second decade of the 21st Century, we have become used to organs grown in laboratories, genetic surgery and designer babies. In 2002, medical researchers used enzymes and DNA to build the first molecular computers, and in 2004 improved versions were being injected into people’s veins to fight cancer. By 2020 we may be able to put even cleverer nanocomputers into our brains to speed up synaptic links, give ourselves perfect memory and perhaps cure dementia. But inserting technology into human brains is not the only thing going on. Some scientists also want to insert human brains into technology. Since the Sixties, computer chips have been doubling their speed and halving their cost every 18 months or so. If the trend continues, the inventor and predictor Ray Kurzweil has pointed out that by 2029 we will have computers powerful enough to run programs reproducing the 10,000 trillion electrical signals that flash around your skull every second. They will also have enough memory to store the ten trillion recollections that make you who you are. And they will also be powerful enough to scan, neuron by neuron, every contour and wrinkle of your brain. What this means is that if the trends of the past 50 years continue, in 17 years’ time we will be able to upload an electronic replica of your mind on to a machine. There will be two of you – one a flesh-and-blood animal, the other inside a computer’s circuits. And if the trends hold fast beyond that, Kurzweil adds, by 2045 we will have a computer that is powerful enough to host every one of the eight billion minds on Earth. Carbon and silicon-based intelligence will merge to form a single global consciousness. Kurzweil calls this ‘The Singularity’, a moment when ‘the pace of technological change will be so rapid, its impact so deep . . . that technology appears to be expanding at infinite speed’. At that point, we will have left the Vulcan mind meld far behind. But even this may not be the end of the story. Much of the research behind last week’s breakthrough in brain science was funded not by universities but by DARPA, the US Defence Advanced Research Projects Agency. It was DARPA that brought us the internet (then called the Arpanet) in the Seventies, and DARPA’s Brain Interface Project was a pioneer in molecular computing. More recently, DARPA’s Silent Talk programme has been exploring mind-reading technology with devices that can pick up the electrical signals inside soldiers’ brains and send them over the internet. With these implants, entire armies will be able to talk without radios. Orders will leap instantly into soldiers’ heads and commanders’ wishes will become the wishes of their men. Hitler would have loved it. Some of the clearest thinking about the new technologies has been done in the world’s departments of defence, and the conclusions the soldiers draw are alarming. For example, US Army Colonel Thomas Adams thinks that military technology is already moving beyond what he calls ‘human space’, as robotic weapons become ‘too fast, too small, too numerous, and . . . create an environment too complex for humans to direct’. Technology, Col Adams suspects, is ‘rapidly taking us to a place where we may not want to go, but probably are unable to avoid’. As goes war, so, perhaps, goes everything else. The merging of mankind and its machines that Kurzweil predicts for the mid-21st Century may, in fact, turn out just to be a lay-by on the way to a very different destination. Later in the century, what we condescendingly call ‘artificial’ intelligence might replace us humans just as thoroughly as we humans once replaced all our evolutionary ancestors. All this will come to pass . . . unless, of course, it doesn’t. Maybe the trends Kurzweil and Col Adams identify will slow down, or even stall altogether. And maybe the critics who mockingly call the Singularity ‘the Rapture for Nerds’ will be proved right. But on the other hand, maybe the Nobel Prize-winning chemist Richard Smalley is closer to the truth when he points out: ‘When a scientist says something is possible, they’re probably underestimating how long it will take. But if they say it’s impossible, they’re probably wrong.’ The University of California’s neuroscientists have taken us one more step towards a final frontier far beyond anything dreamed of in Star Trek.
<urn:uuid:6f93683d-bbe6-48f8-8e55-78a1e85e1d72>
CC-MAIN-2020-24
https://mindcomputers.wordpress.com/tag/hitler/
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347411862.59/warc/CC-MAIN-20200531053947-20200531083947-00473.warc.gz
en
0.937254
1,498
3.15625
3
What Causes Loss of Hearing? Hearing Loss is decrease in ability of person to hear sound. Person is not able to hear sound fully or partially do to some problems which I will discuss later on. In age of 50 or 60 it is normal but if it occurs in teenage then we have to care about what causes loss of hearing and should consult with doctor immediately as you found this problem. Hearing loss causes are not special one for which we have to read books to gain knowledge about it but they are some common reasons which we do not care about in our daily routine. Human being is very lazy and careless and that’s why we get ourselves into problems for which later on we have to regret about it. If sound heard more than 110 decibel for more than 15minutes, it causes loss of hearing. Here are some reasons of What Causes Loss of Hearing? These include reason like noise, use of headphone for long hours etc. So check about them in detail given below. EARPHONES OR HEADPHONES We should not listen to music for long hours and we also have to keep ourselves away from headphones. Due to listening to loud music for long hours or listening songs on headphone causes loss of hearing. It can be both; temporary and permanent hearing loss. Infection in our ear is major reason for loss of permanent hearing which is also called Deafness. Lining in middle ear sometimes get swollen by infection. Due to this reason, Drugs which we take to cure the infection does not work and person becomes deaf. Noise effects hearing ability very badly. Noise can be everywhere like where we work, in surroundings etc. People working at noisy places should cover their ears with ear plugs so that it should not cause hearing loss. You may also like- How to get relief from severe headache? This is an inherited disease. Otosclerosis can result in conductive and/or sensorineural hearing loss. This usually will begin in one ear but will eventually affect both ears with a variable course. On audiometry, the hearing loss is characteristically low-frequency, with higher frequencies being affected later. Sensorineural hearing loss (SNHL) has also been noted in patients with otosclerosis; this is usually a high-frequency loss, and usually manifests late in the disease. The causal link between otosclerosis and SNHL remains controversial. You may also like- How to get rid of acne overnight? Excess Wax present in canal of ear also causes hearing loss. Ear Wax occurs due to dust, bacteria etc. present in environment which has bad effect on our ear. If we do not clean our ear, wax present in ear gets hard and cause disruption. Whenever you clean your ears never use pin or clip always use ear buds. So these are some causes of loss of hearing which you all know now. From now on you should take care of your ears properly and also aware people around you about them. Nobody is going to take care of your body only you have to take care of it properly.
<urn:uuid:0ad546ec-d671-4550-9fcc-614da4a778ac>
CC-MAIN-2017-34
http://inkcloth.com/what-causes-loss-of-hearing/
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886123312.44/warc/CC-MAIN-20170823171414-20170823191414-00648.warc.gz
en
0.971195
624
3.375
3
Education survival games are exciting and fun for children and adults of all ages. These games provide real-life scenarios in which students must work together to create a solution to a problem. Team building, problem solving, and creative thinking are strengthened during education survival games. Students and teachers will enjoy uniting for a common goal during education survival games. Plane Crash Survival Game During a plane crash survival game game, students would be given the scenario of a plane crash that occurs in Northern Canada during the middle of winter. The group of survivors has 12 items to use and must rank each item from most important to least important. The group's ability to decide on the importance of each item also determines their survival. Nuclear Explosion Survival Game Pick a game that assumes a nuclear explosion has occurred on the planet Earth. The participants must pick six people from a list of 20 that can be saved. Students must read through the character biographies provided and determine which people will be able to live. The characters chosen to survive must be able to live in a world with limited resources. The students must also provide a rationale for why they have chosen the six to survive. Worst-Case Scenario Game The Worst-Case Scenario Survival Game is a board game in which students are challenged to use their survival instincts to win against their opponents. Players receive a hand of cards that prompt them to consider the best way to survive a crisis, such as a forest fire or a shark attack. Students must choose the best answer on the card. If they get the answers right, they can move ahead. If the answer is incorrect, then they are left behind to possibly face danger. Lord of the Flies Survival Game The Lord of the Flies survival game is based on the novel written by William Golding. This survival game requires that the participants be placed in groups to survive on an island. Each group is given an island with different settings, such as fresh water, palm trees and sea life. The groups are also given grab bags of miscellaneous items. The object of the game is for students to work together to solve the problems that will arise on the island. - Jupiterimages/Goodshoot/Getty Images
<urn:uuid:0b396599-dcf7-4c64-a4b0-96d108e93cf6>
CC-MAIN-2020-29
https://classroom.synonym.com/education-survival-games-5958723.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655881984.34/warc/CC-MAIN-20200703091148-20200703121148-00594.warc.gz
en
0.955867
447
3.734375
4
11 Foods That Increase Your Height While genetics play a significant role in height, getting enough nutrients in your diet is critical to proper growth and development. In this article, we mention 11 Foods That Increase Your Height. Although it is impossible to grow taller once you have reached your maximum height, certain foods can help you maintain your height by keeping your bones, joints, and body healthy and strong. Protein, for example, is essential for healthy development, tissue repair, and immune function. Other micronutrients, such as calcium, vitamin D, magnesium, and phosphorus, contribute to bone health, which is essential for growth. Meanwhile, other research suggests that probiotics, beneficial bacteria commonly found in fermented foods, may help children grow. 11 Foods That Increase Your Height Milk is frequently regarded as an essential component of a well-balanced diet. It can also help support growth by providing calcium, phosphorus, and magnesium, which are essential for bone health. Furthermore, milk is high in protein, with nearly 8 grams in a single 1-cup (244-ml) serving. Furthermore, studies show that cow’s milk can stimulate increased growth in children and may aid in weight gain and muscle building. If you have a milk allergy or intolerance, you should avoid it. Chicken is high in protein and various other essential nutrients, making it an excellent addition to a healthy diet. It’s incredibly high in vitamin B12, a water-soluble vitamin essential for growing taller and staying tall. It’s also high in taurine, an amino acid that controls bone formation and growth. Furthermore, chicken is high in protein, with approximately 20 grams in a 3-ounce (85-gram) serving. Although the exact nutritional profile varies depending on the cut and cooking method, chicken is also high in niacin, selenium, phosphorus, and vitamin B6. Leafy greens like spinach, kale, arugula, and cabbage are nutritional powerhouses. While the precise amount of nutrients varies by type, leafy greens generally provide a concentrated amount of vitamin C, calcium, iron, magnesium, and potassium. They’re also high in vitamin K, a nutrient that can boost bone density and help you maintain height. One study of 103 women found that eating greens regularly was associated with a significantly lower risk of bone mass loss. Almonds are high in many vitamins and minerals required for taller growth. They are high in fiber, manganese, magnesium, and various healthy fats. Furthermore, almonds are high in vitamin E, a fat-soluble vitamin that also functions as an antioxidant. A lack of this vital vitamin can have serious consequences, including stunted growth in children. Almonds may also aid in bone health. Consuming almonds was found to inhibit the formation of osteoclasts, a type of cell that breaks down bone tissue, in a small 14-person study. Yogurt is an excellent source of several essential nutrients for growth, including protein. Seven ounces (200 g) of Greek yogurt contains nearly 20 g of protein. Certain types also include probiotics, beneficial bacteria that can aid gut health. According to some research, probiotics may help children grow by improving immune function and decreasing inflammation. Yogurt is also high in calcium, magnesium, phosphorus, and potassium, essential for bone metabolism. Beans are highly nutritious and an excellent source of protein (5Trusted Source). Protein has been shown to raise insulin-like growth factor 1 (IGF-1), an important hormone that regulates children’s growth. Beans are also high in iron and B vitamins, which can help protect against anemia, a condition in which the body lacks healthy red blood cells. Iron is required not only for tissue growth, but iron deficiency anemia may contribute to delayed growth in children. Beans also contain various other nutrients, including fiber, copper, magnesium, manganese, and zinc. Sweet potatoes are not only colorful and versatile, but they are also extremely healthy. They’re exceptionally high in vitamin A, which can help you grow taller or maintain your height. They also have soluble and insoluble fiber, which can help with digestion and the growth of good gut bacteria. Maintaining a healthy gut microbiome can also improve nutrient absorption, ensuring you get the vitamins and minerals your body requires for growth and development. Sweet potatoes contain essential nutrients such as vitamin C, manganese, B6, and potassium. Quinoa is a highly nutritious seed that is frequently substituted for other grains in the diet. It’s one of the few plant-based foods considered a complete protein containing all nine of your body’s essential amino acids. Quinoa is also high in magnesium, a mineral that is essential for bone tissue and can help increase bone mineral density. Furthermore, each serving of quinoa contains a substantial amount of manganese, folate, and phosphorus, all of which benefit bone health. Salmon is a fatty fish high in omega-3 fatty acids. Omega-3 fatty acids are heart-healthy fat that is necessary for growth and development. According to some research, omega-3 fatty acids may be involved in bone health and promote bone turnover to maximize growth. Furthermore, low levels of omega-3 fatty acids may be linked to an increased risk of sleep problems in children, which can impair growth. Salmon is also high in protein, B vitamins, selenium, and potassium. Eggs are a nutritional powerhouse. They’re exceptionally high in protein, with a single large egg containing 6 grams. They also contain many other vitamins and minerals required for growth, such as vitamin D, which can increase calcium absorption to aid in maintaining skeletal health. Over six months, one small study found that giving children with low vitamin D levels a vitamin D supplement increased growth. Furthermore, one study of 874 children found that eating eggs regularly was associated with increased monthly height gains. Berries, such as blueberries, strawberries, blackberries, and raspberries, are high in nutrients. They’re exceptionally high in vitamin C, which promotes cell growth and tissue repair. Vitamin C also promotes the synthesis of collagen, the most abundant protein in your body. Collagen has been shown in studies to increase bone density and improve bone health, which may help you grow taller or maintain your height. Berries also contain various other vitamins and minerals, such as fiber, vitamin K, and manganese. Nutrition is critical in promoting proper growth and development. Filling your diet with various nutritious ingredients can help you improve your overall health and grow or maintain your height. As a result, eating a variety of nutritious foods is critical to ensure that your body gets the vitamins and minerals it requires.
<urn:uuid:f89c99a7-829a-4957-959b-8e9f8e2659bf>
CC-MAIN-2023-40
https://en.llcig.com/11-foods-that-increase-your-height/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510387.77/warc/CC-MAIN-20230928095004-20230928125004-00096.warc.gz
en
0.930597
1,475
2.703125
3
Why is Las Ciénegas NCA important? Las Ciénegas NCA supports 5 of the rarest habitat types in the American Southwest: cottonwood-willow riparian forest, ciénega marshland, sacaton grass floodplain, mesquite bosque, and semidesert grassland. It is home to 6 endangered species and has 2 eligible wild and scenic river segments. The NCA’s intact grassland, stream, riparian, and marsh habitat are the best remaining examples of ecosystems that were historically more common in southeastern Arizona. The NCA also supports a livestock grazing operation. Located in southeastern Arizona, the 45,000-acre National Conservation Area is part of BLM’s National Landscape Conservation System. The State of Las Ciénegas NCA The Nature Conservancy began working with BLM at Las Ciénegas in 2004 to develop a “State of the NCA” report. To prepare the report we analyzed existing data and monitoring protocols for the NCA’s grasslands and watershed, riparian forest, aquatic habitat, and select special status species. We also tested and recommended alternative monitoring protocols to improve BLM’s ability to detect change without increasing the cost of monitoring. An additional report describes BLM’s Biological Planning Process. It illustrates how BLM, with input from the grazing permittee and advisory teams, is using monitoring data to make grazing management decisions. What is adaptive management? Providing timely information on natural resources Adaptive management is designed to take the guess work out of the management of our natural resources. A science-based adaptive management and monitoring program provides decision-makers with reliable and timely information on the condition and trend of resources. Combined with research studies, adaptive management helps us understand why ecosystem conditions or species’ populations change. Combining scientific monitoring with decision making Adaptive management is more than science, however. If a land manager’s decision-making processes and timeframes are not explicit, or data are not analyzed in a timely manner, decision-making and the state of our resources are likely to suffer. Adaptive management is really a process of coupling effective scientific monitoring with decision-making. Applying adaptive management at Las Ciénegas At Las Ciénegas, BLM has been working with resource advisory teams to - implement a focused and effective monitoring program - coordinate and review monitoring results, and - ensure that the science and review steps are completed in a timely manner to facilitate BLM decisions on management activities. Management steps at Las Ciénegas At Las Ciénegas, BLM is continually implementing the 6 primary steps in adaptive management - Identification of management goals and measurable thresholds in resource condition. - Development of a monitoring protocol with adequate sampling effort to detect biologically meaningful change in resource condition over a specified time period and an optimal frequency and timeframe during which monitoring should be conducted. - Consistent implementation of the monitoring protocol and analysis of data. - Timely review of data against established goals and thresholds to determine the need for changes in management. - Implementation of needed management changes (and continued monitoring). - Implementation of follow-up scientific studies to fill identified information gaps.
<urn:uuid:d5390e68-10c6-4aac-9963-f964a8f49595>
CC-MAIN-2023-40
https://azconservation.org/project/las_cienegas/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510100.47/warc/CC-MAIN-20230925215547-20230926005547-00738.warc.gz
en
0.890039
664
3.265625
3
I watched, along with viewers around the world, the recent presidential and vice presidential debates that took place in the United States. An important part of the US’s democratic process, the debates allow viewers to hear from the parties’ leaders and their deputies on the issues of the day. It’s not the first time that I’ve watched the debates take place. However, I was struck this time around by the differences between the 2020 debates and those from other years. The presidential debate, in particular, saw the candidates repeatedly speaking over each other and even over the moderator. This creates plenty of challenges for language professionals working on transcribing and interpreting the content. By the way, if you haven’t yet seen the debates in full, you can read the transcripts here: Transcribing the Presidential Debates I spoke to a member of the Tomedes team today who had transcribed part of the presidential debate. His professional opinion? “It wasn’t easy.” Transcribing the presidential debates has thrown up both practical and moral dilemmas for those charged with undertaking the work. Let’s look at each of these in turn. Practical Transcription Challenges Every seasoned transcriber has at some point had to deal with transcribing incidences of more than one person speaking at once. Both verbatim transcription and edited transcription often include a requirement to deal with such occurrences. (For a more detailed discussion on the differences between these types of transcription, click the link below.) Transcribing overlapping speech isn’t in itself a disaster. The transcriptionist merely needs to use the forward slash symbol to show when it occurs. However, the extent to which it happened during the presidential debate between Donald Trump and Joe Biden meant that transcribers really had their work cut out. Not only is transcribing overlapping conversation more time-consuming, it also means plenty more stopping and starting of the video, as the transcriptionist needs to work out what each speaker is saying. With the moderator and both candidates were all speaking at once, this task became particularly tricky. Moral Transcription Challenges The other issue for those transcribing the debates between Donald Trump and Joe Biden and Mike Pence and Kamala Harris relates to the need to remove emotion from the transcription process. Both verbatim and edited transcription require the transcriptionist to avoid paraphrasing. That means that they need to convey the speakers’ words regardless of how they will sound for the reader – including when those words may offend some of those reading. Indeed, the emotions that are fuelled by elections mean that the transcriptionist may be in a position of having to deliver words with which they strongly disagree. Irrespective of their views – even when morally outraged by the candidate’s words – they must faithfully transcribe what is being said. Interpreting the Presidential Debates If there’s one task that’s harder than transcribing the presidential debates, I think it has to be interpreting them. With the world keeping a close eye on the US election process, it was only natural that the presidential debate, at the very least, was live-streamed in various countries. For non-English speaking countries, interpreters had to do their best to deliver the discussion in real-time. I’m always impressed by interpreters’ ability to listen and speak at the same time. I’ve tried it myself and it’s definitely an art that requires practice. Speaking two languages fluently is only the beginning! Interpreting becomes even more challenging when you’re working with more than one speaker at a time. And the difficulty notches up again when those speakers overlap their words. You can imagine, then, that the Trump/Biden presidential debate was no picnic for those tasked with interpreting it. As with transcription work, interpreting also presents the issue of having to accurately convey messaging with which you may profoundly disagree. Interpreters, though, have to do so in real-time, effectively conveying the speakers’ words without sensoring them or filtering them in any way. I was interested to read about Japan’s approach to interpreting the presidential debates. Public broadcaster NHK clearly expected something of a muddle from the event and so employed three interpreters as their simultaneous interpretation solution (you can click the link below to discover more about the different kinds of interpretation). And it worked – to a point. While each interpreter was able to represent one of those present, the overlapping conversations meant that, throughout the debate, all three interpreters were often speaking at the same time. With the audio of the original speakers also audible in the background, the broadcast was not the easiest to make sense of in certain places. Interpreters charged with delivering President Trump’s words also face the added complexity of keeping up with his sometimes erratic speech patterns. The president is known for his habit of chopping and changing what he’s saying mid-sentence. This presents interpreters with a difficult choice: do they deliver precisely what the president is saying or go down the tricky route of trying to summarise and paraphrase? US Presidents and the English Language The nature of the discussions during the recent presidential debates got me thinking about how the nature of these events has changed over the years. So much so that I’ve just sat and watched the first televised presidential debate (thanks, YouTube) between Senator John F. Kennedy and Vice President Richard Nixon back in 1960. Wow, what a difference. What struck me most was the degree of respect that Kennedy and Nixon had for each other and for their moderator. The moderators of the 2020 debates – Fox News’ Chris Wallace for the presidential debate and USA Today’s Susan Page for the vice presidential one – have been heavily criticised in the press. The criticism has accused them of failing to control the candidates and their frequent interruptions, and of failing to deal with their dodging of the probing questions that were asked. But are the moderators really to blame or is the way we use language changing so substantially that there’s no longer a forum where candidates can speak respectfully and present their opinions and policies without being heckled? And, most importantly for the purposes of this article, how are language services providers supposed to handle debates where two if not three people are all talking at once? Of course, there’s more to this issue than language alone. Debating in a civil and orderly manner has to do with attitude and approach as much as it has to do with the words being used. Speaking over somebody else who is expressing a contrary opinion says more than words alone ever could. The Challenges of Localization The other challenge that I wanted to mention centres on localization. This is something which both transcribers and interpreters have to deal with, though in different ways. The presidential debates are a good example of this challenge. Joe Biden, for example, spent time talking about President Trump being opposed to Roe v. Wade. How many of those outside the US would understand this reference without a quick spot of help from a search engine? (FYI, it refers to the landmark Supreme Court ruling that a pregnant woman’s liberty to choose to have an abortion without excessive government restriction should be protected.) From an interpreter’s perspective, mentioning Roe v. Wade with no explanation means delivering information that their listeners will not understand. Staying faithful to the messaging means that the message gets lost in translation. It’s the same for verbatim and edited transcriptionists. Those providing intelligent transcription, on the other hand, do have some flexibility when it comes to delivering such highly localized content. Intelligent transcription allows the transcriber to paraphrase and summarise, meaning that they could help to shape the transcription in a way that adds some explanation. Referring to “Supreme Court ruling Roe v. Wade” at least provides some context as to what the discussion is focusing on. Incidentally, if your business is in need of intelligent transcription (or any other kind of transcription), you can click the link below to find out more about this service. Local references such as Roe v. Wade also highlight the need for both transcriptionists and interpreters to have experience of the subject matter that they are working with. Given the real-time nature of interpretation, this is particularly important if the speaker’s words are to be delivered accurately. An interpreter with knowledge of US politics, for example, would understand that “Roe v. Wade” referred to a court ruling, even if they didn’t know the details of the case. An interpreter with no knowledge of US politics, on the other hand, would likely be left floundering, trying to work out how to translate “rovey wade” when they have no idea what the phrase means. Future Presidential Debates Donald Trump and Joe Biden were originally scheduled to face each other in three presidential debates between 29 September and 22 October. At the time of writing the debate originally scheduled for 15 October is under dispute due to the president having coronavirus and rejecting the idea of taking part in a virtual debate. Whatever happens in terms of a virtual or a live debate, there is still plenty of work ahead for the transcriptionists and interpreters tasked with keeping up with the election campaign. The world is watching and waiting to see what the US people decide. At present, Joe Biden is ahead in the polls, but so was Hillary Clinton at this stage in the process back in 2016. This means that it’s still all to play for in the race to find out who will be president for the next four years. The use of language, as ever, will play a key role in deciding the outcome. Rousing speeches and emotional appeals for voter support will pile on top of manifesto promises in an attempt to get voters stirred up and motivated to vote the ‘right’ way. In terms of future debates, I hope for the sake of the language professionals involved in transcribing and interpreting them that the candidates will show somewhat more decorum and allow each other time to finish speaking before interrupting. Or at least allow the moderator to finish asking the questions before butting in. However, as election campaigns only tend to get fiercer as the big day approaches, I suspect my hopes for respectful, orderly debates are somewhat in vain. As such, I’ll end this article by wishing the very best of luck to all of those delivering interpretations of the upcoming presidential debates – and to those assigned to transcribe them. Of course, I also want to say ‘good luck’ to all of those who are tasked with translating the presidential debate transcriptions. Those translations are unlikely to be easy. However, it’s probably best if I save my thoughts on that for a whole other article. Watch this space.
<urn:uuid:77b78c5f-e0d5-4eaa-986d-1b8221f29c15>
CC-MAIN-2023-40
https://www.tomedes.com/translator-hub/us-presidential-debates-transcription-interpretation
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510238.65/warc/CC-MAIN-20230927003313-20230927033313-00725.warc.gz
en
0.962558
2,251
2.828125
3
||This chart of Queen Charlotte's Islands was published in John Hawkesworth's 1773 account of the journeys of Captain James Cook, John Byron, and Joseph Banks on behalf of the Admirality. The frigate Dolphin was under the command of Captain John Byron 1723-1786) and then Captain Samuel Wallis (1728-1795) and the Captain Cook's first Endeavor voyage. Byron was chosen to command an expedition to circumnavigate the globe and search for a north-west passage. Byron's mention of signs of a southern continent encouraged the immediate preparation of another expedition to the Pacific. Wallis took command of the Dolphin (back from Byron's circumnavigation) and had as his objective to search for the great continent 'Terra Australis Incognita.' Captain James Cook (1728-1779) made three separate voyages to the Pacific (with the ships Endeavour, Resolution, Adventure, and Discovery) and did more than any other voyager to explore the Pacific and Southern Ocean. Cook not only encountered Pacific cultures for the first time, but also assembled the first large-scale collections of Pacific objects to be brought back to Europe. He was killed in Hawaii in 1779. Mounted on page with PAI4002, and in album with PAI3938-PAI4002, PAI4004-PAI4076.
<urn:uuid:9136e5aa-9c74-43fb-ae0d-bce4c0b855fe>
CC-MAIN-2017-47
http://collections.rmg.co.uk/collections/objects/153943.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934803944.17/warc/CC-MAIN-20171117204606-20171117224606-00472.warc.gz
en
0.939131
287
3.296875
3
Fall is just around the corner, and that means it’s time to start thinking about fall forage for your livestock. As the temperature cools and the days get shorter, it’s important to ensure that your animals are getting the right nutrients to maintain their body condition going into the winter months. Let’s go over some of the benefits of fall forage. Fall forage is an excellent source of nutrition for your livestock. It’s packed with nutrients that can help them maintain their body condition and keep them healthy throughout the winter. For example, clover is a great source of protein and energy, while alfalfa is high in calcium and phosphorus. Ryegrass, on the other hand, is an excellent source of fiber and can help keep your animals’ digestive system healthy. Fall forage can be a cost-effective way to feed your animals. Growing your own forage can be cheaper than purchasing feed from a store, and it can also help you save on labor costs. Furthermore, depending on where you live, fall forage can often be grown as a double crop, meaning you can get more than one harvest per year from the same field. Growing your own fall forage is also environmentally friendly. By growing your own forage, you can reduce your carbon footprint by eliminating the need for transportation of feed. Additionally, fall forage can help improve soil health and prevent soil erosion, which can help to preserve the environment for future generations. Improves Livestock Health Fall forage can also help to improve your animals’ overall health. A diet rich in fall forage can help to boost their immune system, making them more resistant to diseases and infections. Additionally, fall forage can help to promote healthy weight gain and improve milk production in dairy cows. Finally, fall forage is incredibly versatile. Depending on your animals’ nutritional needs, you can choose to grow a variety of different forages. This means you can customize your feeding program to meet the specific needs of your animals, ensuring that they stay healthy and happy throughout the fall and winter months. Fall forage is an essential part of any livestock feeding program. It’s not only nutritionally beneficial but also cost-effective and environmentally friendly. So, as the autumn season approaches, be sure to start thinking about fall forage for your livestock. Your animals (and your wallet) will thank you for it!
<urn:uuid:cceaba01-658b-4590-8508-095a3c0b0fb7>
CC-MAIN-2023-40
https://www.farmercoop.com/the-benefits-of-fall-forage-for-your-livestock/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510994.61/warc/CC-MAIN-20231002100910-20231002130910-00572.warc.gz
en
0.942211
517
2.515625
3
Written by Tammi Sauer Illustrated by Micheal Slack Buy on Amazon Nugget is a minnow and Fang is a shark…. And how in the world can they be friends? This delightful story for younger readers is a tale of fear and of friendship. Minnow thinks Fang is the very best until he goes to school and learns that minnows are food for sharks. Now what in the world will he do without his best friend? And why do the others think he should be afraid? The author does a wonderful job with few words introducing both math concepts for first and second grade readers and fun science facts too. Younger children will enjoy the story if read aloud and will quickly learn to read this fun story independently. The bright and colorful illustrations make this story an exciting book to add to the classroom library. With both science and math concepts along with some life lessons on friendship and being different, this book gives teachers many opportunities to use this book as a springboard for other discussions and activities in the first grade classroom. Teachers and parents will love the way the book makes reading comprehension a breeze for first and second grade readers. The simple words, diagrams, and illustrations lend themselves to fun and engaging the reader from the first page. Students may even want to try their hand at writing and illustrating their own stories of friendship using math and science to make their story shine. You can find more about this author at www.tammisauer.com Visit Michael Slack at www.slackart.com - Title: Nugget & Fang: Friends Forever-or Snack time? - Author: Tammi Sauer - Illustrator: Michael Slack - Picture Book - Publisher: Harcourt Children’s Books - Reviewer: Terri Forehand - Pages: 32 Written by Julia Jarman Illustrated by Susan Varley Buy on Amazon A sweet rhyming picture book with endearing characters, Two Shy Pandas addresses a common fear for young children: making friends. Two young pandas live next door to one another. Each saw the other out playing by themselves. Each wanted to ask the other to play. Each could not get the courage to approach the other. But each was very aware of the other one especially when Pandora wanted to seesaw or to bounce her ball. Then one day it snowed and Panda made lots of snowballs. He saw that he couldn’t play with snowballs by himself so he tossed one over the fence. But Pandora wasn’t there! He began to worry if she was sick or if she had gone away. After being inside for a while, Pandora worried too that she hadn’t seen Panda. As they worried about each other, they both decided to find out what was going on and bumped into each other. After learning that each panda was still there and not sick, they became the best of friends, playing together long after the snow was gone. The text is very kid-friendly, having an easy enough reading level that second graders can read it themselves, perhaps making their own audio book as a literacy activity or a book to read to a younger book buddy. It would be a valuable class read aloud as part of a Character Counts unit, touching on most of the pillars of character. Students will be drawn in by the panda characters because they are so likeable and easy to relate to due to both the illustrations and the storytelling. - TITLE: Two Shy Pandas - AUTHOR: Julia Jarman - ILLUSTRATOR: Susan Varley - PUBLISHER: Andersen/Lerner, 2013 - REVIEWER: Risa Brown - EDITION: Hardcover, 32 p. - ISBN: 978-1-4677-1141-8 - GENRE: Picture Book
<urn:uuid:0961a5aa-f0d9-4c34-9bf0-2bbbae633d55>
CC-MAIN-2017-43
http://2ndgradereading.net/blog/2013/04/page/2/
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825227.80/warc/CC-MAIN-20171022113105-20171022133105-00464.warc.gz
en
0.956051
794
3
3
A disrespectful teenager may ignore household rules, stay out past curfew or mock family members, among other behaviors. The teenage years can be a time of great change for the entire family, and power struggles and resentment may rise to the surface. While parents may be eager to give disrespectful teenagers a taste of their own medicine, paying poor treatment back in kind will likely fan the flames of a fight. Learning how to communicate with your teenager may reduce or stop disrespectful behavior. Ask yourself if your teenager is being disrespectful, or if he has different ideas and values than the rest of his family. Disagreeing is not the same as disrespect, done correctly. A teenager may also become resentful if he feels that he cannot be independent. Give your teen a little wiggle room, like deciding what clothes or hairstyles he will wear, to avoid a power struggle. Examine your family's circumstances and other problems that may be contributing to a teenager's disrespectful behavior. Substance abuse, depression and chronic family fighting could encourage disrespectful behavior, according to the American Academy of Pediatrics. Addressing these underlying problems by talking it out as a family, visiting a doctor or seeing a family counselor could reduce disrespectful behavior. Model respectful behavior for everyone around you. Children and teenagers learn by example, and mothers and fathers who disregard others' opinions or scream at others to communicate a point may get the same treatment from their children, according to the American Academy of Pediatrics. Ask plenty of questions and keep calm when tensions rise. Give yourself a momentary time-out if a conversation gets heated, and apologize if you were disrespectful or inconsiderate of others in the family. Issue discipline that focuses on what you need from your child, rather than assigning blame. If you are upset about a teenager who broke curfew, you may tell your daughter, "I noticed you stayed out late last night. I was worried about you and I couldn't get to sleep. I hope you will come home tonight at 10 o'clock like we talked about before." Explaining yourself can help teenagers empathize with your needs, which may lead to less disrespectful behavior in the future, according to KidsHealth. Discuss disrespectful behavior at a time when everyone is in a good mood. Avoid being confrontational. Instead, you may want to tell your son, "I've noticed that our discussions lately have been heated. I am bothered by the tone and language used when we talk lately. Have you felt the same way?" Keep in mind that your teenager may also feel that you are being disrespectful. Remain non-judgmental and show your teenager that you too are willing to consider changing your behavior. - Jupiterimages/Brand X Pictures/Getty Images
<urn:uuid:d6e3814c-45e7-43fa-8d3a-604165928cc3>
CC-MAIN-2014-23
http://everydaylife.globalpost.com/stop-disrespectful-teens-3255.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510273766.32/warc/CC-MAIN-20140728011753-00105-ip-10-146-231-18.ec2.internal.warc.gz
en
0.95539
545
2.90625
3
This post courtesy BBC Earth. For more wildlife news, find BBC Earth on Facebook and Posterous. When we are at work, doing the same thing day in day out, it is easy to grow complacent about the risks that are involved. But when the daily grind involves diving to the depths of the ocean with very basic equipment, complacency could prove fatal. The Philippines ranks as the 11th highest of the world’s top seafood producers, with some coastal communities deriving up to 70 percent of their income from fishing. It is no wonder that with such high stakes risky practices are commonplace. Pa’aling divers of Palawan, Philippines. Some of the most dangerous techniques are adopted by the Pa'aling divers who inhabit the Palawan province. Diving down to 40 meters, these 100 strong crews take their lives in their hands on every trip. Supplied only with thin makeshift tubes of compressed air fed from a rusty generator on the surface, there is the potential for air supplies to become tangled and to become trapped. Not only this, but also decompression sickness, commonly known as 'the bends', a serious condition caused by the men ascending to the surface too quickly is also a serious concern. Sadly the benefits do not outweigh the risks with each fisherman reportedly earning an average of $25 for a week's work. Another occupation that risks life and limb is that of the goose barnacle collectors of northern Spain. Traditionally a female profession, today the job is mostly carried out by men. These fearless collectors of this strange looking shellfish, battle with ferocious crashing waves (also known as Atlantic Rollers) and jagged rocks to gather their prize. At up to 200 Euros per kilo it is easy to see what the attraction to this lifestyle is. Collectors battle huge waves on the Galician cliffs, Northern Spain. Located on the cliffs and rugged boulders of the Atlantic coastline, these barnacles, known locally as percebes, are only accessible when the tide goes out. So cautiously, collectors navigate their way to the most inaccessible areas armed with only a modified crowbar and a few trusty ropes, if they choose to use them. With an average of five deaths every year, it is hardly a surprise that it is considered one of the most dangerous occupations in Spain. Finally, a job that many would agree can be as terrifying as it is rewarding: fatherhood. In some communities such as those from the Zanskar region of the Tibetan Plateau the terrors are more than emotional, they are physical too. Especially here, where the school run is an epic six-day trek along the semi-frozen river Zanskar. Children and parents travel down a Himalayan ice river, Zankar, India. Each year after the winter holidays, fathers and their children begin their journey. They travel along what the locals call the Chadar, a frozen winter highway that provides a passageway through mountainous gorges when the roads are closed by snow. In the spring the smooth firm ice can start to give way, rapidly turning the trip from a habitual pilgrimage to a perilous expedition. These three communities are testament to man's ability to adapt to and conquer even the most extreme environments. While they may be dangerous, let's hope these incredibly diverse cultures that have developed continue to thrive.
<urn:uuid:4e08c971-b5ff-44c4-99f3-28a30fac12a9>
CC-MAIN-2014-35
http://www.motherjones.com/Blogs/2011/09/ch..?page=8
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500822407.51/warc/CC-MAIN-20140820021342-00153-ip-10-180-136-8.ec2.internal.warc.gz
en
0.961371
681
2.828125
3
Poulsbo Animal ClinicDiagnostic Imaging for Your Pet’s Oral Health Digital dental radiology, commonly known as x-rays, is a diagnostic imaging procedure that is helpful in evaluating your pet’s oral health. Digital x-rays are high-definition images that allow us to view areas of the mouth that are not easily seen during a routine examination, such as your pet’s gumline and jaw bone. These images help us catch signs of disease or injury that would otherwise be missed. Digital x-rays help us diagnose many types of disease or injury, including: - Tooth decay or abscesses - Fractured tooth or jaw - Reabsorption of the root on a tooth Poulsbo Animal Clinic takes great care to ensure your pet’s condition is diagnosed quickly and accurately. We use digital radiology, a modern imaging system that allows us to take high-quality images with less radiation exposure than traditional imaging tools. These images are typically taken during the dental procedure itself, which allows us to quickly identify the problem and perform oral surgery if needed, such as a tooth extraction or tooth preservation procedure. Our knowledgeable staff is available to answer questions and provide more information on our dental diagnostic procedures. Contact us today to learn more or to set up an appointment.
<urn:uuid:39dc9988-eef1-4481-bb61-4054f39b1818>
CC-MAIN-2017-34
http://www.poulsboanimalclinic.com/dental-care/dental-digital-radiology.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886108709.89/warc/CC-MAIN-20170821133645-20170821153645-00512.warc.gz
en
0.94127
267
2.640625
3
Crisp, Stephen (DNB00) CRISP, STEPHEN (1628–1692), quaker, was born and educated at Colchester. From his earliest years he was religiously inclined, and when only ten or twelve, he says in his ‘Short History’ that he went with ‘as much diligence to the reading and hearing of sermons as other children went to their play and sportings.’ When seventeen he ‘found out … the meetings of the separatists,’ to which he belonged until about 1648, when he joined the baptists and became a ‘teacher of a separate congregation’ (see Records of Colchester Monthly Meeting). Crisp probably made the acquaintance of James Parnel during the imprisonment of the latter in Colchester in 1655, and the intimacy ended in his becoming a quaker. From this time he took an active part in the affairs of the Society of Friends in Essex, although there is no reason to believe that he was a recognised minister till 1659. In 1656 he was imprisoned in Colchester as ‘a disturber of the publick peace,’ and two years later (Tuke says in 1660) was arrested at a meeting at Norton in Durham, and at the ensuing sessions sent to prison for refusing to take an oath. Immediately after his recognition as a minister he visited Scotland, and during his journey he was severely injured by the people of York. In the same year his name appears among the Friends who petitioned the parliament to allow them to take the place of their fellow-sectaries who had been long in prison. Shortly after the Restoration he was one of the quakers who wrote to the king to complain of the treatment they had received from the scholars and townsfolk of Cambridge, with the result that the council directed the Friends' meeting-house to be pulled down. In 1661 he was apprehended at a meeting at Harwich, and Besse complains that the justice took the unusual step of making out the commitment before he examined his captive. In 1663 he visited Holland, but as he then could not speak Dutch and so had to employ an interpreter, his visit was a failure. As soon as he returned to England he was arrested at Colchester and sent to prison for holding an illegal meeting, where he lay for nearly a year. Crisp now learnt Dutch and German, and in 1667 revisited Holland, whence he went into Germany. He seems to have acted as a kind of missionary bishop in these countries, and to have been highly respected by the authorities, as there is proof that in deference to his request the palsgrave took off the tax of four rix-dollars per family he had imposed on the Friends. This tax, which the quakers had refused to pay as an impost on conscience, had been the cause of much suffering, owing to the merciless way in which goods to many times its amount were seized by the collectors. From time to time Crisp visited England, and early in 1670 he was fined 5l. for infringing the Conventicle Act, and ordered to be imprisoned until it was paid; he was, however, released in three months without payment. He at once went to Denmark, but speedily returning to England made a prolonged preaching excursion in the north, after which he revisited his home at Colchester, ‘much,’ he records, ‘to the joy of my poor wife.’ Besse says that during this year he was apprehended at a meeting at Horselydown and fined 20l.; he was probably the preacher, as this was the sum the minister had been fined the week before, while the congregation had been let off with a fine of 5s. each. From this time till shortly before the death of his first wife in 1683 he spent most of his time in Holland and Germany, his principal employment being the establishment and supervision of meetings for discipline. He married again in 1685, losing his second wife in 1687. In 1688, when James II was anxious to conciliate the dissenters, Crisp was by royal command offered the commission of the peace, which he declined. In 1688 and the following year, though suffering from a painful disease, he was actively employed in efforts to get the penal laws suspended, and from this time till his death in 1692 he resided in London. He was buried in the quaker burial-ground at Bunhill Fields. It is evident from his writings that Crisp was a man of considerable culture and wide views, and the ‘testimony of the Colchester Friends’ asserts that he was charitable and 'very serviceable to many widows and fatherless.’ During the later years of his life his sermons were taken down in shorthand. His style was easy, and he had a dislike both to religious polemics and speculative theology. He wrote very little, and only two or three of his works are more than tracts; that their popularity was very great is shown by the number of times they have been reprinted. The chief are: 1. ‘An Epistle to Friends concerning the Present and Succeeding Times,’ &c., 1666. 2. ‘A Plain Path-way opened to the Simple-hearted,’ &c., 1668. 3. ‘A Back-slider Reproved and His Folly made Manifest,’ &c., 1669 (against Robert Cobbet). 4. ‘A Short History of a Long Travel from Babylon to Bethel,’ 1711 (autobiographical), republished nineteen times. He also wrote a number of tracts in Dutch. His sermons were published in three volumes in 1693-4, and republished under the title of ‘Scripture Truths Demonstrated,’ in one volume in 1707, and his works were collected and published by John Field in 1694 under the title of ‘A Memorable Account . . . of . . . Stephen Crisp, in his Books and Writings herein collected.’ He was no relation of the Thomas Crisp, a quaker apostate, against whom about 1681 he wrote a tract called ‘A Babylonish Opposer of Truth,’ in reply to the other's ‘Babel's Builders Unmask't.’[A Short History of a Long Travel, &c., 1711; Sewel's History of the Rise, Increase, &c ... of the Quakers; Gough's History of the People called Quakers, 1789-90; George Fox's Autobiography; Crisp's Works; Tuke's Life of Crisp, York, 1824; Besse's Sufferings of the Quakers; Swarthemore MSS.]
<urn:uuid:47bff658-c6b2-422f-9573-bfc993c8038f>
CC-MAIN-2017-34
https://en.wikisource.org/wiki/Crisp,_Stephen_(DNB00)
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886108709.89/warc/CC-MAIN-20170821133645-20170821153645-00411.warc.gz
en
0.991151
1,404
2.5625
3
Clay soil can be a big problem if you want to set up a garden near your Colorado home. Not only is clay soil difficult to manage, but it also retains water too easily, not allowing it to seep through so that the root can breathe and take in nutrients more easily. A lot of times, dirt with a large concentration of clay can make the root of a plant or tree rot as a result of water damage, so extra special care has to be taken when using clay dirt for gardening and getting the right nourishment through the best type of fertilizer. So what does clay soil imply anyway? Clay soil is basically a type of soil that is made up from lots of tiny particles that can mesh together to create a large mass which can be difficult to work with. Although clay soil can be hard to shovel or dig holes into it, you’ll find that it does have some advantages: it’s actually a lot more fertile than other types of soil, and it can provide an excellent foundation for plants that need additional support for their roots. Keeping all this in mind, it’s important to avoid using too much fertilizer, and to focus on using fertilizers only once every two weeks or so. Liquid or granular fertilizers are typically fine, as long as you use them in a responsible way. Always use organic products from https://www.therichlawncompany.com/.
<urn:uuid:1b300dcb-3b68-41ea-971e-34b5009d86dd>
CC-MAIN-2020-29
https://www.therichlawncompany.com/what-are-the-best-uses-of-fertilizer-for-colorado-clay-soil/
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657146247.90/warc/CC-MAIN-20200713162746-20200713192746-00010.warc.gz
en
0.964911
287
2.59375
3
On July 17, 2011, Typhoon Ma-on was located roughly 700 nautical miles (1,300 kilometers) south-southwest of Tokyo, and was moving northwestward in the direction of Japan. The U.S. Navy’s Joint Typhoon Warning Center reported that Ma-on had maximum sustained winds of 100 knots (185 kilometers per hour) with gusts up to 125 knots (230 kilometers per hour). The Moderate Resolution Imaging Spectroradiometer (MODIS) on NASA’s Aqua satellite captured this natural-color image of Ma-on on July 17, 2011. Bearing a discernible eye, the storm spans hundreds of kilometers and grazes the Ryukyu Islands in the northwest. - Joint Typhoon Warning Center. (2011, July 17). Typhoon 08W (Ma-on) Warning. Accessed July 17, 2011. NASA image courtesy MODIS Rapid Response Team at NASA GSFC. Caption by Michon Scott. - Aqua - MODIS
<urn:uuid:fbb94bea-9522-4764-a665-5c2974f86296>
CC-MAIN-2013-48
http://earthobservatory.nasa.gov/NaturalHazards/view.php?id=51369
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163052204/warc/CC-MAIN-20131204131732-00046-ip-10-33-133-15.ec2.internal.warc.gz
en
0.921174
200
2.875
3
Whether you bring a stray cat or a bearded dragon (genus Pogona) into your home, it probably won't take too long to notice the often adorable typical behaviors and quirks of said cutie. Wiggling behavior is a common sign of a young -- and hungry -- bearded dragon. Meals and Youthful Bearded Dragons Animals across the board are usually pretty fond of eating, to say the least, and bearded dragons aren't anomalous here. Youthful bearded dragons are especially exuberant and eager in showing their happiness about eating. Once the lively lizards identify their prey, they get ready to go after them by doing a lot of conspicuous wiggling and stretching out of their necks. After they're done getting ready, they swiftly dive toward their food. If you notice your bearded dragon in a wiggling frenzy before dinner, he's probably just a little excited -- just as he'd be out in nature before going in for his prey. Adult Bearded Dragons and Eating Although wiggling often signifies a young bearded dragon, adults are just as serious about eating. They tend to approach eating by rapidly forcing their bodies into the direction of their prey, all while their mouths are totally wide open. Foods for Bearded Dragons Insects are common prey animals that regularly make juvenile bearded dragons wiggle with joy. Insects are beneficial for encouraging their proper development. As bearded dragons get older, they're often fed things that are a little bigger, such as pinky mice. Fresh vegetables are also an important element of a developing bearded dragon menu, as long as they're cut up into small and manageable bits. Some examples of veggies that are appropriate for these lizards include collard greens, carrots and romaine lettuce. Work with a reptile veterinarian to set up a nutritious meal plan for your bearded dragon. Wiggling Due to Illness Wiggling sometimes can signify illness in bearded dragons, which is why annual checkups with the veterinarian are imperative. If you notice unusual twitching behavior in your bearded dragon, regardless of his age and regardless of whether it's mealtime, schedule an appointment with the vet promptly. Twitching can indicate a wide array of ailments in bearded dragons, including both metabolic bone disease and the infection atadenovirus. Twitching also frequently denotes seizures, which can be related to anything from injury to liver disease. - BananaStock/BananaStock/Getty Images
<urn:uuid:35a243d3-1ae8-4156-9a13-266b3cff0e8d>
CC-MAIN-2020-16
https://animals.mom.me/mean-bearded-dragon-wiggles-8462.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371576284.74/warc/CC-MAIN-20200405084121-20200405114121-00059.warc.gz
en
0.969776
497
2.859375
3
Provide containers/medical supplies for essential oils that are used topically to treat disease and infection within a refugee clinic in India for 380 families and over 200 orphaned Tibetan children. What is the issue, problem, or challenge? The Bon are a minority Tibetan ethnic group that fled to India when the Chinese invaded Tibet in 1959. They established a community in Dolanji, India on donated land. Today, 80 Bon families, 200-300 Indian families, and several hundred orphaned children live in Dolanji, India and rely on the clinic at the Yung Drung Bon Monastic Center for free health care. Survival is difficult in this remote area and these poor families have limited access to other health care facilities. How will this project solve this problem? Clinic staff has found that essential oils are an effective complement to traditional Tibetan and western medical practices and can be used successfully to treat disease. Essential oils and bottles are needed to re-stock dwindling supplies Potential Long Term Impact The oils will provide needed medicine to poor people in Dolanji to relieve their sickness. In the future, clinic staff hopes to explore making these oils on site and selling them for income to support the clinic and this Tibetan community in exile. Total Funding Received to Date: $2,651 This project is now in implementation and no longer available for funding. Received funds will be used to accomplish concrete objectives as indicated in the project's "Activities" section. Updates will be posted under the "Project Report" tab as they become available. Donors' contributions and pledges to this project totaled $2,651 . The original project funding goal was $2,000.
<urn:uuid:2e0e3675-ed5b-4d78-97e9-c6e1d68f628f>
CC-MAIN-2014-35
http://www.globalgiving.org/projects/medical-supplies-india/?show=gift
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535917663.12/warc/CC-MAIN-20140901014517-00086-ip-10-180-136-8.ec2.internal.warc.gz
en
0.942506
341
2.65625
3
Are you curious about the principles of psychoanalysis and how they apply to mental psychology? Look no further! In this comprehensive guide, we will delve into the fascinating world of psychoanalysis and its significance in understanding the human mind. Whether you are a student, researcher, or simply intrigued by the workings of the human psyche, this article will provide you with a valuable overview of the key principles of psychoanalysis. Join us as we navigate through the theories, techniques, and applications of this influential approach in mental psychology. Overview of Psychoanalysis Psychoanalysis is a significant school of thought in the field of mental psychology that delves into the exploration of the human mind and its intricacies. This therapeutic approach was developed by Sigmund Freud, who revolutionized the understanding of human psychology. By uncovering the unconscious motivations and desires that influence human behavior, psychoanalysis provides insights into the complexities of the human mind. Sigmund Freud and the development of Psychoanalysis Sigmund Freud, an Austrian neurologist and the founder of psychoanalysis, played a pivotal role in the development of this psychological framework. Born in 1856, Freud introduced radical ideas that challenged prevailing notions about the mind. He believed that unconscious thoughts and experiences greatly impact human behavior, and his revolutionary theories continue to shape the field of psychology to this day. Key concepts and principles of Psychoanalysis Psychoanalysis encompasses several key concepts and principles that form the foundation of this psychological approach. One fundamental concept is the existence of the unconscious mind, where repressed thoughts, memories, and desires reside. According to Freud, these unconscious elements significantly influence our thoughts, emotions, and behaviors without our conscious awareness. Another important principle of psychoanalysis is the belief that early childhood experiences play a critical role in shaping an individual’s personality and development. Freud proposed that unresolved conflicts and traumas from childhood can manifest in adulthood as psychological disturbances or disorders. By exploring these underlying issues, individuals can gain insight into their motivations and work towards resolving them. Psychoanalysis also emphasizes the significance of dreams as a window into the unconscious mind. Freud argued that dreams serve as a symbolic representation of repressed desires and unresolved conflicts. Through dream analysis, psychoanalysts can uncover hidden meanings and provide insights into the patient’s unconscious struggles. The role of the unconscious mind in Psychoanalysis The unconscious mind holds a central position in psychoanalysis. It refers to the part of the mind that contains thoughts, memories, and desires that are inaccessible to conscious awareness. According to Freud, the unconscious mind greatly influences human behavior, often contradicting or clashing with conscious thoughts and desires. Psychoanalysis aims to bring these unconscious elements to the surface, allowing individuals to gain a deeper understanding of themselves. By exploring the hidden motives and conflicts that reside within the unconscious mind, psychoanalysis seeks to alleviate psychological distress and promote personal growth. Through various techniques such as free association, dream analysis, and interpretation of slips of the tongue, psychoanalysts help individuals uncover the underlying causes of their thoughts, emotions, and behaviors. By making the unconscious conscious, patients can develop insights that lead to self-discovery, self-acceptance, and ultimately, personal transformation. In conclusion, psychoanalysis provides a comprehensive framework for understanding the human mind and its complexities. Developed by Sigmund Freud, this approach explores the role of the unconscious mind, early childhood experiences, and dreams in shaping human behavior. By delving into the hidden depths of the mind, psychoanalysis offers individuals the opportunity to gain insight, resolve conflicts, and achieve psychological well-being. Psychodynamic Theories and Approaches The Psychodynamic Approach and its Relation to Psychoanalysis The psychodynamic approach is a psychological perspective that focuses on the unconscious mind and its influence on an individual’s thoughts, feelings, and behaviors. It is closely related to psychoanalysis, a therapeutic method developed by Sigmund Freud. Psychodynamic theories emphasize the role of unconscious processes, such as desires, fears, and conflicts, in shaping human behavior. According to this approach, our actions are not solely driven by conscious decisions, but also by hidden motivations originating from early childhood experiences. Psychoanalysis, on the other hand, is a specific form of psychodynamic therapy that aims to uncover and resolve unconscious conflicts through techniques such as free association, dream analysis, and transference. It seeks to bring repressed memories and emotions into conscious awareness, allowing individuals to gain insight into their psychological issues and make lasting changes. Important Figures and Contributors to Psychodynamic Theories Several influential figures have contributed to the development of psychodynamic theories. Here are some of the key individuals and their contributions: - Sigmund Freud: As the founder of psychoanalysis, Freud revolutionized the field of psychology with his theories on the unconscious mind, defense mechanisms, and the psychosexual stages of development. His work laid the foundation for psychodynamic approaches. - Carl Jung: Jung expanded on Freud’s ideas and introduced the concept of the collective unconscious. He emphasized the importance of symbols, archetypes, and the integration of the conscious and unconscious aspects of the psyche. - Alfred Adler: Adler focused on the importance of social factors in shaping personality. He introduced the concept of the inferiority complex and emphasized the drive for superiority as a motivator for human behavior. - Karen Horney: Horney challenged Freud’s male-centric theories and proposed that cultural and social factors play a significant role in shaping personality. She emphasized the impact of early childhood experiences on adult behavior. Critiques and Controversies Surrounding Psychodynamic Theories While psychodynamic theories have made significant contributions to our understanding of human behavior, they have also faced critiques and controversies. Some of the main criticisms include: - Lack of empirical evidence: One of the primary criticisms is the limited empirical evidence supporting psychodynamic theories. Critics argue that the concepts and ideas proposed by psychodynamic theorists are difficult to test and measure objectively. - Overemphasis on the unconscious: Critics suggest that psychodynamic theories place too much emphasis on unconscious processes and give less importance to conscious thoughts and behaviors. This focus on the hidden aspects of the mind has been questioned by proponents of other psychological perspectives. - Limited generalizability: Psychodynamic theories primarily rely on case studies and clinical observations, which may limit their generalizability to the broader population. Critics argue that findings from individual cases cannot be applied universally. - Lack of diversity and cultural considerations: Some critics argue that psychodynamic theories were developed based on observations of a limited sample of individuals, primarily from Western cultures. This narrow focus may limit the applicability of these theories to individuals from diverse cultural backgrounds. Despite these controversies, psychodynamic theories continue to be influential in the field of psychology and have paved the way for further exploration into the complexities of human behavior and the unconscious mind. Application of Psychoanalysis in Mental Psychology Psychoanalysis in the diagnosis and treatment of mental disorders Psychoanalysis, developed by Sigmund Freud, has been widely used in the field of mental psychology for diagnosing and treating various mental disorders. This approach focuses on understanding the unconscious mind and how it influences an individual’s thoughts, emotions, and behaviors. By delving into a patient’s past experiences and childhood memories, psychoanalysis aims to uncover hidden conflicts and unresolved issues that may be contributing to their current psychological distress. Through in-depth psychoanalytic sessions, trained therapists help patients gain insight into their unconscious motivations and gain a better understanding of themselves. This self-awareness can be a powerful tool in identifying the root causes of mental disorders such as anxiety, depression, and personality disorders. By bringing these underlying issues to light, psychoanalysis provides a framework for addressing and resolving them. The use of free association and dream analysis in Psychoanalysis Two key techniques used in psychoanalysis are free association and dream analysis. Free association involves encouraging patients to speak freely and openly without censorship, allowing their unconscious thoughts and feelings to surface. By doing so, patients may reveal deeply buried memories, emotions, and desires that are essential in understanding their psychological struggles. Dream analysis, on the other hand, involves the interpretation of dreams as a means of accessing the unconscious mind. Freud believed that dreams were a window into the unconscious, containing hidden symbols and meanings. By analyzing the content and symbolism of dreams, psychoanalysts can uncover unconscious conflicts and desires that may be influencing a person’s mental state. These techniques provide valuable insights into a patient’s psyche and contribute to the overall diagnostic and therapeutic process in psychoanalysis. The effectiveness and limitations of Psychoanalysis in modern mental psychology While psychoanalysis has been influential in the field of mental psychology, it also has its limitations. One of the main criticisms of psychoanalysis is the length and intensity of treatment required. Traditional psychoanalysis can involve multiple sessions per week, spanning several years. This long-term commitment may not be feasible or affordable for many individuals seeking help for their mental health issues. Moreover, the subjective nature of psychoanalysis and its heavy reliance on the therapist’s interpretation can be seen as a limitation. The effectiveness of psychoanalysis heavily relies on the skills and expertise of the therapist, and interpretations can vary between practitioners. This subjectivity raises concerns about the reliability and consistency of psychoanalytic diagnoses and treatments. However, despite these limitations, psychoanalysis continues to be a valuable approach in mental psychology. Its emphasis on uncovering unconscious conflicts and addressing unresolved issues provides a unique perspective in understanding and treating mental disorders. Additionally, advancements in psychoanalytic techniques, such as brief psychodynamic therapy, have made psychoanalysis more accessible and time-efficient for individuals seeking help. Psychoanalysis plays a significant role in the field of mental psychology. Its application in diagnosing and treating mental disorders, along with the utilization of techniques like free association and dream analysis, provides valuable insights into the unconscious mind. While psychoanalysis has its limitations, its continued relevance and adaptability make it an important tool in modern mental psychology.
<urn:uuid:e8124560-d330-4248-a730-a1acdc38987c>
CC-MAIN-2023-50
https://mindfixhealth.com/principles-of-psychoanalysis-in-mental-psychology
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100499.43/warc/CC-MAIN-20231203094028-20231203124028-00057.warc.gz
en
0.910652
2,055
3.828125
4
Key concepts in general federal law in the USA (other countries using a federal system differ), at all court levels, include standing and the Case or Controversy Requirement. These apply as strongly to constitutional cases as to any others, and often a seemingly "civil rights" related issue is rejected by the courts for these reasons. They flow from Article III, Section 2 of the United States Constitution. Standing means that a person raising a constitutional issue must be someone who, if his or her assertion is correct, will personally suffer an infringement of his or her rights if the court does not intervene. This means that, except in unusual circumstances (see class action), one cannot sue on behalf of another. The Case or Controversy requirement means that there must be at least two adversarial parties and an actual problem between them. The effect is that federal courts in the United States do not issue advisory opinions or rule on hypotheticals. To these two concepts, constitutional law adds the state action requirement. Simply put, a private citizen cannot violate another private citizen's constitutional rights. A case does not become a constitutional issue unless one party can show that a local, state, or federal government agency or official was involved. For example, if a private citizen invades another citizen's house, the first citizen is liable to the second one in a lawsuit for trespass; on the other hand, if a policeman invades a citizen's home without a warrant or probable cause, the police agency can be found liable for violating the citizen's constitutional rights. The first example is merely a violation of the legal right to privacy; the second is a violation of the constitution's prohibition on unreasonable searches and seizures. (Note here: Some cases which the Supreme Court of the United States accepts and decides involve constitutional rights; others involve the interpretation of legal rights.) Generally, when a case has cleared the hurdles of Standing, Case or Controversy and State Action, it will be heard by a trial court. The non-governmental party may raise claims or defenses relating to alleged constitutional violations by the government. If the non-governmental party loses, the constitutional issue may form part of the appeal. Eventually, a petition for certiorari may be sent to the Supreme Court. If the Supreme Court accepts the case, it will receive written briefs from each side (and any amici curiae or friends of the court--usually third parties with some expertise to bear on the subject) and schedule oral arguments. The justices will closely question both parties. When the Court renders its decision, it will generally do so in a single opinion for the majority and one or more dissenting opinions. Each opinion sets forth the facts, prior decisions, and legal reasoning behind the position taken. The majority opinion constitutes binding precedent on all lower courts; when faced with very similar facts, they are bound to apply the same reasoning or face reversal of their decision by a higher court. Wikipedia article (the free online encyclopedia) reproduced under the terms of the GNU (General Public License) Free Documentation License.
<urn:uuid:f2e2b72a-ae52-4927-a94c-7704132ec4b2>
CC-MAIN-2023-40
https://www.danataschner.com/federal_jurisdiction.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506669.30/warc/CC-MAIN-20230924191454-20230924221454-00845.warc.gz
en
0.936771
613
3.375
3
Capt. Daniel Goos An Early Lake Charles Sawmiller As late as the Civil War, Lake Charles, Louisiana was still a small, frontier hamlet, even though by 1840, it had already become the seat of Imperial Calcasieu Parish. During the 1830s-1840s, families named Sallier, Ryan, Reid, Bilbo, Hodges, LeBleu, Pujo, Pithon and Clendening were already living in that vicinity. As early as 1836, Lake Charles was already a cattle stop along the “Opelousas Trail” to New Orleans, and by 1856, 50,000 heads of Texas cattle were swimming the Calcasieu River annually while on the trek to the “Crescent City.”1 As late as May, 1866, a letter from Lake Charles described the town as containing 300 inhabitants, a “dilapidated” courthouse, 1 saloon, 2 schools, 6 stores, 2 hotels, 2 sawmills, and one Catholic church.2 Very quickly, other sawmillers recognized the great potential of the place, for south of town, millions of feet of prime cypress timber lined the swamps and banks of the rivers, bayous and lakes; and five billion or more feet of prime long leaf pine trees were growing north of town. The early Southwest Louisiana residents did not consider the pine lands as worth paying the taxes on, and huge tracts of such timber were available for purchase at prices from 25 cents to $1 an acre. One man who quickly recognized the value of Lake Charles as a wood-processing center was Captain Daniel Johannes Goos, who earlier had talked to crews, docked in New Orleans, who had carried lumber or cotton from the Jacob Ryan sawmill.2 In addition to the 2 antebellum mills, Capt. George Lock built a steam sawmill on Prion Lake in 1869, and H. C. Drew built one at Lake Charles in 1876. By 1884 the Calcasieu Lumber Company (formerly the Goos mill) was slicing timber at Goosport. By 1901 the Calcasieu’s successor, Bradley-Ramsey Lumber Company (later Long-Bell), the J. A. Bel mill, Drew, and the Lake City sawmill were producing 230,000 feet of lumber daily. By Sept., 1906, seven Lake Charles sawmills, exclusive of those at West Lake, were cutting 465,000 feet daily. (Lock and Bel soon became sons-in-law of Capt. Goos.)3 Capt. Daniel Goos was born on March 23, 1815 in Wyk, on the Island of Fohr, Denmark (a channel island offshore from the province of Schleswig-Holstein), the son of Peter Andreas Goos and Anna Maria Luetjens. His father was a silver and goldsmith. As a result of the Prusso-Danish War of 1864, the island of Fohr was returned to Prussia as part of the present day German provinces of Schleswig and Holstein. Goos migrated to Philadelphia in 1835; later he drifted on to New Orleans, where he soon became connected with the lumber trade. There he also met 16-year-old Katarina Barbara Moeling, who was born on Nov. 28, 1827 in Neustadt, Prussia (now Germany), who had just emigrated to New Orleans with her siblings and her parents, Elias Moeling and Anna Maria Garij (or Nammsen) Moeling.4 In company with his young bride, Goos soon moved to Biloxi, Mississippi, where for some years he furnished boiler firewood to boats traveling between Biloxi and the Mississippi River. Later he migrated again to Ocean Springs, MS., where he engaged in the mercantile, shipping, and sawmilling businesses. He either built or bought his first schooner, the Lehmann, upon which he shipped the bulk of his worldly goods, furniture and sawmill, in 1855, and moved to Goosport, then located a mile and a half north of the village of Lake Charles.5 While living in New Orleans in 1846, Capt. Goos helped organize Germania Lodge No. 46, A. F. and A. M., on April 18, 1846. Upon reaching Lake Charles in 1855, Goos became an organizer, past master, and life member of Lake Charles Lodge No. 165, A. F. and A. M. Eventually he was buried in Goos Cemetery with full Masonic services and honors. The writer believes that Capt. Goos arrived at Goosport with three sash or muly, steam-driven saws (which cut in an up-down motion), capable of cutting as much as 10,000 feet daily. That is based on a description of other Mississippi sawmillers’ equipment, who also arrived on Sabine River in 1853.6 Goos’ son-in-law, Capt. George Lock (who married Ellen Martha Goos), founded the first sawmill at Prion Lake in 1869, and soon afterward, Goos and Lock were shipping 4 million feet of lumber annually to Galveston. The first mention of Capt. Goos in an area newspaper appeared in Galveston Tri-Weekly News, which follows: “...Capt Goos built at Lake Charles recently a staunch steamboat at a cost of $10,000 to overcome the difficulties of navigation in Calcasieu Lake and River...” With the banks of the river and lake lined with huge cypress trees, which hindered prevailing winds, the steamer Dan was intended primarily as a tow boat for the lumber schooners. According to C. E. Henry of Cameron, there were 25 lumber schooners in the Lake Charles-Galveston trade by 1870, which increased to 50 by 1880.7 With no inland rail system to connect Lake Charles with the nearest lumber market, Capt. Goos realized that he would have to build his own fleet of lumber schooners to carry his products to market. His son, Fred M. Goos, was one of his schooner captains. As a result, the new schooner Lehmann, followed by the Schooners Lake Charles, Winnebago, Cassie, and Emma Thornton, were soon built and added to Goos’ fleet. Reputedly, Goos imported about ten shipbuilders from his home island of Fohr, of whom his future son-in-law, Conrad Funk, was both a shipbuilder and schooner captain.8 Goos’ steamer Dan was built of choice white oak and cypress timbers, with a V-bottom deep-sea hull. The steamer was a 112-ton side-wheeler, 99 feet long and 23 feet wide, with a capacity of 600 bales of cotton. Early in 1860, for reason probably involving a bankruptcy sale, Goos acquired a half-interest in a cottonseed oil press at Galveston, and as a result, he sent the Dan to Brazos River in Texas to haul cottonseed to Galveston from as far north as Groce’s Ferry on the Brazos, west of Houston. When the Civil War broke out in April, 1861, Goos brought the steamer back to Lake Charles, from whence it is believed the Dan ran the blockade with cotton once or twice to Matamoras, Mexico. The Lehmann is also known to have run the blockade four times, and returned safely each time, carrying cotton cargoes worth $30,000 or more in gold, and returning with gunpowder, munitions, lead, coffee, rope, cotton and woolen cloth, muskets, and medical supplies. Ellen (Mrs. George) Lock recalled that drugs such as chloroform, calomel, morphine, ether, and quinine, were often hid in barrels of flour or coffee.9 Many of Goos’ imports through the blockade were sent to General Richard Taylor’s army, which later was fighting along the Bayou Teche and Red River. The Calcasieu River was not blockaded until after May 8, 1864. In Sept., 1862, U. S. Navy Lt. Frederick Crocker of the blockader Kensington took 14 Navy Bluejackets and a 6-pound cannon aboard a small sloop, and sailed up the Calcasieu to Houston River, where Goos had hidden the steamer Dan. After its capture by Crocker and with Confederate soldiers and pilots tied at exposed positions around the wheelhouse, Crocker steamed the Dan back downriver without a single shot being fired at the vessel. During his 96-hour escapade in the river, Crocker burned the blockade-runner Mary Ann at Goosport and the schooners Conchita and Eliza at Cameron.10 Crocker brought the steamer Dan back to Sabine Lake, where he armed the vessel with a 30-pound rifled cannon. For the next 3 months, the little Union gunboat harassed Sabine Pass and vicinity at every opportunity. On the night of January 8, 1863, First Sgt. H. N. Connor and 9 cavalrymen from Co. A rowed their whaleboat out to the Dan, which was docked at Sabine lighthouse, during a dense fog. And then they threw 40 pine knot torches aboard the Dan as fast as they could blaze them, until the gunboat caught fire and burned to the waterline.11 The following clipping, quoted verbatim, was written by Barbara “Babette” Fitzenreiter, and was sent to the writer by Goos’ great granddaughter, Mrs. Miltner of Lake Charles, as follows: “...During the war (1863) my father, Captain Goos, operated a hospital for wounded Confederate soldiers in our house in Goosport. He was also engaged in the highly-profitable business of blockade-running, buying cotton around here, and taking it down to Matamoras, Mexico aboard the old schooner Lehmann. He received $30,000 in gold for each cargo of cotton, and the schooner ran the blockade four times...” “...One day a young man about 25 or 30 years of age, very handsome and debonair, and attired in the uniform of a Confederate officer, came to our home. He had brought about 30 men with him. Father told him to come in, provided quarters for his men, and he brought the officer into the house. We entertained the officer at dinner...I played the piano, and we had an enjoyable evening...” “...In the morning after breakfast, the young officer gathered together all his men. Before they rode away, the young officer turned around and said, “Do you know who I am?” he asked. “I am Carriere, the Jayhawker!” We were all startled and retreated back in great alarm; we had all heard such terrible things about Carriere and his band. “...Last night I came here to rob you, Capt. Goos. You have $30,000 in gold in a chest under your bed, and I would have burned your house and even killed you to get it. I might even have burned your sawmill. But you have entertained us so royally that we decided not to take any of your money...” “...With that he and his men rode away. That night Mother and Father got a spade, and they took the chest of money out somewhere and buried it. Three days later a man from Texas was on his way to Opelousas...He was driving a fine horse, hitched to a new buggy. The man fell in with Carriere and his Jayhawkers, and he was never heard from again...”12 Following the Battle of Calcasieu Pass on May 8, 1864, Sgt. H. N. Connor went aboard the captured gunboat Wave, and was sickened by the amputation of legs and arms, the screams and the stench of death. Following emergency repairs, he and his cavalrymen steamed the gunboat up to Calcasieu Lake, kedged it across the Calcasieu River bar, and arrived at Lake Charles with still about 15 wounded men, both Confederate and Union, still aboard under the general supervision of Union assistant surgeon E. C. Vermeulen.13 Lake Charles residents welcomed the Confederate wounded after their arrival, but they were very angry that Dr. Vermeulen and his wounded sailors were still aboard. They refused to find a place for the Confederate prisoners to stay.14 However, when Capt. Goos heard of their plight, he ordered that all of them be brought to his residence. “Mother Katarina” Goos, with a heart as big as her head, and her daughters prepared a large room or gallery for the wounded, whitewashed, scoured, and sterilized it as best they could, and all the wounded, regardless of whether “Yank” or Rebel, were placed on cots, side by side, with clean bed clothing. And a month later, after all of them had recovered, the Confederates were returned to Sabine Pass, and Dr. Vermeulen and the captured sailors were sent to a Confederate prison camp in Texas.15 The Goos family came to respect Dr. Vermeulen a great deal, and if such were possible, they would have kept him as a house guest until the war was over. On one occasion, Vermeulen appeared at the dinner table with his uniform jacket buttoned up to his chin. The weather was warm and he was invited to unbutton his coat. The physician then confessed that he had only one dirty shirt and it was in with the Goos laundry, waiting to be washed. As a result Capt. Goos was able to locate some shirts and other clothing so that he would have a clean change of clothes.16 During the Civil War, there was no longer any demand for lumber, so Capt. Goos connected his steam engine to a grist mill. For the next four years, he used his mill principally to grind corn meal for his family and employees, the crews of his blockade-runners, friends and neighbors, and of course, for all the Confederate troops stationed in the Lake Charles vicinity.17 Late in 1865, Capt. Goos returned to his antebellum trade of sawing and shipping lumber to Galveston. He soon contracted his logging with A. J. Perkins, who cut mostly cypress logs for the Goos mill, although there were occasions when long leaf pine or white oak lumber were needed. As new sawmilling equipment was invented, Goos tore out his old upright saws, and replaced them with circular saws. By 1878 he had probably replaced them with an Allis double circular mill, manufactured in Milwaukee. Other equipment that he would of necessity have added included edger and trimmer saws, a cutoff and gang saw, steam log turners and kickers, a planing machine, and a steam “shotgun feed” to activate the log carriage, in preference to the his friction-feed method. During the early 1880s, as he accumulated wealth and old age approached, he sold out to Calcasieu Lumber Company. That firm eventually sold out to Bradley-Ramsey Lumber Company, which later sold out to Long-Bell.18 Also in 1869, Capt. Goos returned to his home island of Fohr, where he solicited 60 young men and women to emigrate to Goosport to work in his sawmill and shipyard. As a result and principally for their benefit, he founded St. John’s Lutheran Church, although his wife Katherine was Catholic. It might be worthwhile to note that it was St. John’s Lutheran Church that was instrumental in extending the Lutheran religion into Beaumont and Port Arthur.19 Between 1846 and 1869, Daniel and Katherine Goos became the parents of 15 children, 5 sons and 10 daughters, the earliest of whom were either born in New Orleans or Mississippi. The five sons were as follows: Daniel J. Goos, Jr. (1847-1921), mar. Florence Flanders; Christian H. Goos (1859-1878); Frederick Moeling Goos (1862-1936), of Co. C, 2nd Alabama Infantry, Spanish-American War; Walter Stewart Goos (1865-1943), mar. Annie Green; and Albert E. Goos (1866-1935), mar. Laura Rebecca Reeves. The ten Goos daughters are also as follows: Barbara “Babette” Goos (1847-1921), mar. Charles Fitzenreiter; Elmira M. “Ellen” Goos (1849-1921), mar. Capt. George Lock; Rosalie Alexandria Goos (1850-1889), mar. Henry O. Wachsen; Medora Goos (1852-1893), mar. 1. Conrad Funk, 2. Emil Jessen; Emma M. Goos (1853-1926), mar. Edward W. Richards; Fredericka Goos (1855-1895), mar. Reese W. Perkins; Georgiana Ruth Goos (1857-1886), mar. Earnest F. Timmins; Katherine Goos (1860-1930), mar. W. W. Flanders; Della Moeling Goos (1862-1934), mar. John A. Bel; and Anna Marie Goos (1868-1918), mar. James Lockwood Williams.20 Some of the Goos sons-in-law also followed in the wood-processing vocations. Capt. George Lock founded the third sawmill in Calcasieu Parish at Prion Lake, which eventually became the Lock-Moore Lumber Company. J. A. Bel also operated one of the major sawmills at Lake Charles, cutting 90,000 feet daily for about 25 years.21 J. Lockwood Williams operated the Williams Planing Mill at Beaumont, Tx. throughout the 1880s.22 Charles Fitzenreiter operated a sawmill at Tryon, Hardin County, Texas from 1886 until 1890, after which he moved his family back to Lake Charles.23 Frederick Moeling Goos was a longtime lumber schooner captain, after which he worked for the J. A. Bel Lumber Company.24 Lumber for the first Daniel Goos home in 1855 was cut by his own sash saws and was of upright, clapboard construction. As time permitted, Goos began construction of his 3-story home, described as “constructed of cypress and hardwood, which he cut in his own mill...The house had a large central hall down- stairs with rooms on each side. On the second story, the hall ran perpendicular to the downstairs hall, and five bedrooms opened off the sides of the hall. On the third floor was the ballroom, where brilliant social events took place...”25 After 38 years of marriage, and the nurturing, rearing and child-bearing of 15 children, Katherine (Katarina Moeling) Goos died on Feb. 11, 1884, and no obituary of her has been found by the writer. It is also unknown to this writer if Daniel Goos owned any slaves prior to 1865, but if so, he would certainly have supplied domestic help for his wife in the care of her babies, the cooking, and housekeeping; and also hired domestic help after the large, 3-story house was finished. Actually, for the mid-nineteenth century, Katherine Goos’ death at age 56 might be considered somewhat phenomenal, for a mother who had born and reared 15 children. After Daniel Goos’ retirement in the middle 1880s, he enjoyed gardening and planting trees and flowering plants in his garden. Once when he planted a pecan tree, a visitor suggested that he could plant the tree, but that he would never live long enough to reap any of the pecans. “My boy!” Goos replied. “I knew of a house over in Germany that was built by a man over 80 years old. Over the door were imprinted these words: “This house is not built for you and me, but for those who will come after us...”26 Around 1910, when many of Goos’ daughters were already aging themselves, they told many tales about life with their father. “Babette” Fitzenreiter told the tale about Goos when he was “...seven years old on the Island of Fohr. He worked all day for a neighbor, tending cows, and at the end of each week, he was paid with only a few coins; and once the neighbor gave him a large cheese, which weighed about 20 pounds, and which the lad had to carry home. When he was asked during his old age what was the happiest day of his life, Capt. Goos responded, “That day when I lay before my mother that heavy cheese, and for the first time, I saw her smile at me...” Once after his wife died, and a daughter asked him if he were lonely, Goos replied: “...I am not lonely. I sit by the fire with my pipe and a book, and as the wind blows through the nearby trees, I can hear once more my children’s romping feet and laughing voices...”27 After a long life of considerable toil and tremendous productivity, always engaged in scratching a civilization out of an unforgiving jungle and frontier, Daniel Johannes Goos died at Goosport at age 84 on May 20, 1898. Despite the fact that Jacob Ryan had operated the first small sawmill at Lake Charles, the writer still labels Capt. Goos as the “father of Southwest Louisiana sawmilling. Between 1855 and 1898, Goos saw Lake Charles’ daily production of lumber increase from about 2,000 feet to over 200,000 feet. During the Civil War, his schooners ran the blockade many times, bringing in munitions and other necessities of life; and although his steamer Dan was captured by the “Yankees” in Houston River, he lost no blockade-runners captured at sea. His wartime fleet enabled him to assemble a large accumulation of gold coins, which he needed to finance his sawmill operations, its frequent enlargement and modernization, and to raise and educate his large family. Surely no other person in Lake Charles was more highly-esteemed than was Daniel Goos, as was witnessed by the large multitude, which followed his corpse to the tomb. His “word was his bond,” and his business associates considered him to have been thoroughly honest throughout his lifetime; also his handshake was equal to a written contract. He was temperate in everything, especially alcohol, as well as anything else that detracted from a man’s life. He was generous to a fault to those in need, to his church, and to any cause for the general uplift of Lake Charles. He was especially devoted to his family and friends, his church, and the Masonic order. He had to endure the early death of many of his children. And despite some financial reverses, such as at times, the low remuneration and demand for lumber, he still left an estate of considerable value. Goos arrived in Lake Charles when it was a hamlet of a few log cabins, and even some Indians. At his death, he left Lake Charles as a city of elaborate homes, stores, churches, and schools. He had literally chopped up the frontier with his axes and saw blades, and left in its place, a domain of culture and civilization. And Lake Charles was far the better place because the immigrant from the Isle of Fohr sailed up the Calcasieu and spread his roots into the river bank. 1 Galveston Weekly News, Nov. 25, 1856; also articles in Feb., Mar., June, 1857. 2 Ibid. May 19, 1866. 3 “List of Sawmills on the K. C. S. Railroad and Southern Pacific Railroad,” Beaumont, TX. Journal, Oct. 3; Nov. 5, 1904; “Lumber Mills of Louisiana-Texas,” Southern Industrial and Lumber Review, Sept. 15, 1906, p. 29; “Sawmills at Lake Charles,” Beaumont Enterprise, Jan. 15; May 28, 1905. 4 “Daniel Goos - Pioneer Sawmiller,” Lake Charles American-Press, Feb. 16, 1917, p. 4; “Daniel Goos, Father of Southwest Louisiana Sawmilling,” p. 1; information which appears on the gravestones, etc. in Goos Cemetery website <http://www.gooscemetery.com/personnel/katarina moeling>; information furnished to this writer by Mrs. J. T. Miltner of Lake Charles, a great granddaughter of Capt. Goos; Carolyn Moffett, “Early Settler Built For The Future,” Lake Charles American-Press, June 26, 1978. 5 Lake Charles American-Press, Feb. 16, 1917, p. 4. 6 See FN5; also W. T. Block, “An Early East Texas Sawmiller: David R. Wingate,” Texas Gulf Historical and Biographical Record, XIII (Nov. 1977), 59-79. 7 Galveston Tri-Weekly News, Dec. 15, 1857; see also W. T. Block, “The Honorable Samuel P. Henry: Father of Cameron Parish,” Kinfolks, Vol. 28, No. 4, p. 193; see also W. T. Block, “Early River Boats of Southwest Louisiana,” published in Cameron, La. Pilot. 8 W. T. Block, “Samuel P. Henry: Father of Cameron Parish,” on the writer’s website. Goos’ grandson, Albert Goos Funk, married the writer’s second cousin, Marie Ella Bonsall, of Grand Chenier. 9 Block, “Daniel Goos: Father of Southwest Louisiana Sawmilling,” pp. 1-2. 10 War of the Rebellion, Official Records, Navies, Series I, Vol. XIX, pp. 217-231. 11 “Diary of First Sgt. H. N. Connor,” a copy appears on my website; “Sinking of the U. S. Gunboat Dan,” Beaumont Enterprise, Feb. 14, 1984, p. 1cc. 12 Newspaper clipping by Barbara Fitzenreiter, undated but printed by Lake Charles American, Ca. 1910, and given to me by Mrs. Miltner of Lake Charles; also see W. T. Block, “Some Notes on the Civil War Jayhawkers of Confederate Louisiana,” which appears on the writer’s website. 13 “Diary of 1st Sgt. H. N. Connor,” and displayed on the writer’s website. 14 Lake Charles American-Press, Feb. 16, 1917, p. 4. 15 See footnote 14; also article by Barbara Fitzenreiter; also “Diary of Sgt. H. N. Connor; also “Daniel Goos: Father of Southwest Louisiana Sawmilling.” 16 Lake Charles American Press, Feb. 16, 1917, p. 4. 17 Moffett, Lake Charles American Press, June 26, 1978. 18 W. T. Block, “Daniel Goos: Father of Southwest Louisiana Sawmilling,” p. 2. 19 Gossett, “Early Settler Built For the Future,” Lake Charles American Press, June 26, 1978; see also W. T. Block, “The History and Progress of The Lutheran Churches into The Golden Triangle of Texas, 1897-1988,” on the author’s website. 20 Taken from Lake Charles American Press, Feb. 16, 1917, p. 4; also information from the tombstones in the Goos Cemetery; also from other biographical data found on the internet. 21 “Sawmills at Lake Charles,” Beaumont Enterprise, Jan. 15; May 18, 1905. 22 W. T. Block, East Texas Mill Towns and Ghost Towns (3 volumes: Lufkin, 1995), Vol. I. 23 Ibid. Vol. II, pp. 31-32. 24 Obituary, Lake Charles American Press, Nov. 16, 1936. 25 Moffett, “Early Settler Built for the Future,” Lake Charles American Press, June 26, 1978. 27 Lake Charles American Press, Feb. 16, 1917, p. 4.
<urn:uuid:09b2a52f-7968-4ba2-9e47-bbfada8dd746>
CC-MAIN-2023-50
http://www.wtblock.com/DanielGoos.htm
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00770.warc.gz
en
0.976056
6,107
3.1875
3
During National Hispanic Heritage Month, we celebrate the countless contributions of more than 60 million Hispanic Americans to our culture and society. Hispanic Americans are the largest minority group in the United States today, and generations of Hispanic Americans have consistently helped make our country strong and prosperous. They contribute to our Nation beyond description. Hispanic Americans embody the best of our American values, including commitment to faith, family, and country. They serve in our military and protect us as members of law enforcement. In fact, Hispanic Americans make up half of our Border Patrol agents. The Hispanic-American community has left an indelible mark on our government, culture, and economy. As part of our commitment to promoting the success of Hispanic Americans, my Administration will always promote educational opportunity for our Nation’s Hispanic-American communities. Hispanic Americans benefit greatly from school choice programs, including the Nation’s largest school choice program in Florida, where more than one-third of the recipients are Hispanic-American students. No American student should ever be trapped in a failing public school or a school that does not meet his individual needs. Additionally, we have spurred the creation of more than 16 million education and training opportunities through our Pledge to the American Worker. My Administration is also working to increase economic opportunities for Hispanic Americans by providing pathways to in-demand jobs and investing in Hispanic-American communities. On July 9, 2020, I signed an Executive Order to establish the White House Hispanic Prosperity Initiative to promote educational and workforce development, encourage private-sector action and public-private partnerships, and to monitor how Federal programs best provide opportunities for Hispanic Americans. Additionally, this Executive Order established the President’s Advisory Commission on Hispanic Prosperity, which is dedicated to advising my Administration on ways to improve access to educational and economic opportunities for the Hispanic-American community. This year, my Administration also delivered $1 billion in funding to Minority-Serving Institutions, including Hispanic-Serving Institutions. And since I signed the Tax Cuts and Jobs Act of 2017 into law, nearly 9,000 Opportunity Zones have attracted an estimated $75 billion in new capital investment in economically distressed areas, helping to bring wealth and jobs to the neighborhoods where many Hispanic Americans live. We are already seeing the positive results of these policies in communities throughout the United States. In the 2017-2018 academic year, the graduation rate for Hispanic students at public high schools rose to 81%, the highest level ever recorded. Before the coronavirus pandemic, the median income for Hispanic Americans had reached its highest level in history. Unemployment reached the lowest rate ever recorded. The poverty rate for Hispanic Americans also hit a record low. And from 2017 to 2018, 362,000 Hispanic Americans became new homeowners, the largest net gain for Hispanics since 2005. In the past 4 months as we have recovered from the coronavirus, we added 3.3 million jobs for Hispanic Americans. It is my promise to the Hispanic-American community and to all Americans that my Administration will continue to do everything in its power to rebuild the economy, ensure opportunity, grow wages, and cut regulations so every family can achieve their own American Dream. Hispanic Americans will play an incredible role in our country’s great years to come, and my Administration proudly stands with them. Their steadfast commitment to America’s core values, their steadfast opposition to socialism, and their innumerable contributions to our prosperity enrich our Nation and add to our unmatched culture and way of life. To honor the achievements of Hispanic Americans, the Congress, by Public Law 100-402, as amended, has authorized and requested the President to issue annually a proclamation designating September 15 through October 15 as “National Hispanic Heritage Month.” NOW, THEREFORE, I, DONALD J. TRUMP, President of the United States of America, by virtue of the authority vested in me by the Constitution and the laws of the United States, do hereby proclaim September 15 through October 15, 2020, as National Hispanic Heritage Month. I call on public officials, educators, librarians, and all Americans to observe this month with appropriate ceremonies, activities, and programs. IN WITNESS WHEREOF, I have hereunto set my hand this fourteenth day of September, in the year of our Lord two thousand twenty, and of the Independence of the United States of America the two hundred and forty-fifth.
<urn:uuid:438580ff-6751-46dc-a906-991491e87cf5>
CC-MAIN-2023-23
https://trumpwhitehouse.archives.gov/presidential-actions/proclamation-national-hispanic-heritage-month-2020/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654871.97/warc/CC-MAIN-20230608103815-20230608133815-00325.warc.gz
en
0.946607
890
2.5625
3
China Releases Footage of Jade Rabbit Moon Landing Posted on December 16, 2013 China has successfully landed its Jade Rabbit rover on the Moon. The rover and lander were launched on December 2nd from the Xichang Satellite Launch Center. CNN reports that the six-wheeled rover will study soil and rocks on the moon over the next 3 months. The rover weighs 140 kilograms and contains optical telescope, ultraviolet cameras, radioisotope heater units and equipment for digging up soil samples. CNN says the Jade Rabbit name (Yutu in Chinese) was selected in an online poll. Chang'e, the Chinese goddess of the Moon, has a white rabbit as a pet. Reuters reports that China plans to continue advancing its space program and aims to collect and return home lunar samples by 2017, when it will launch its next unmanned lunar probe. Reuters says China also plans to have a working space station by 2020. Space.com has an infographic here showing Yutu's landing site. China released the following footage of the moon landing. Take a look: - Tiny Crustacean Snaps Giant Claw Shut 10,000 Times Faster Than Blink of a Human Eye - Wearable Robotic Third Arm Smashes Walls and Picks Vegetables - Hexapod Robots Walk Faster With Flexible Feet - Giant Hailstone From Argentina Could Set New World Record - It Rains Liquid Iron on Exoplanet WASP-76b
<urn:uuid:41986c70-5f66-4278-9177-00193089a166>
CC-MAIN-2023-23
https://www.sciencespacerobots.com/china-releases-footage-of-jade-121620131
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224650620.66/warc/CC-MAIN-20230605021141-20230605051141-00335.warc.gz
en
0.925149
294
2.90625
3
- Sculptor close to Donatello (Italian, Florence ca. 1386–1466 Florence) - ca. 1432 - Italian, Florence - Gilt bronze - Overall (confirmed): 24 1/4 × 8 1/8 × 11 3/4 in., 30 lb. (61.6 × 20.6 × 29.8 cm, 13.6 kg) - Credit Line: - Purchase, Mrs. Samuel Reed Gift, Rogers Fund, by exchange, and Louis V. Bell Fund, 1983 - Accession Number: This brilliant bronze figure of a boy contains clues to its original placement and function. The right leg is raised, and the weight is shifted to the left foot, which is arched to conform to a now-missing curved shape. The lad’s puffed cheeks and the remnants of interior piping indicate that water once flowed up through the left leg and the torso to spout out of the open mouth. The left arm is akimbo, but the right one rises just above the level of the mouth. The fingers of that hand curl to grasp an object that must have been positioned in the path of the jet of water. Clearly this was a fountain figure; moreover, its resemblance to some well-known Florentine Renaissance bronzes helps to explain its pose. Most relevant is Giovanni Francesco Rustici’s Mercury Taking Flight, originally atop a fountain in the courtyard of the Palazzo Vecchio, Florence. It stood on a ball and, as we know from the account of Giorgio Vasari, held a whirligig that spun as the water propelled its four blades. Judging from the posture of the Museum’s boy, he, too, balanced on a sphere and spat water at a spinning device; thus, he may have been the model for Rustici’s Mercury. These details have led several authors to connect the Metropolitan’s boy with a fountain constructed in the garden of the Casa Vecchia, a Medici edifice that preceded the Palazzo Vecchio on the via Larga. In a forthcoming book, James Draper reviews documents that indicate this fountain was topped by a spiritello — a sprite, or winged infant — and that a painter named Antonio was paid on March 26, 1432, for the gold with which it was gilt. Inventories of the Casa Vecchia made in 1503 and 1516 describe what is likely to be the same figure: respectively, "a marble column with a bronze idol on a ball" and "a marble column either fixed or built against a wall, with a ball and idol above." The Casa Vecchia bronze is not mentioned in later Medici records, but the existence of two small sixteenth-century versions of the model suggest that it remained in Florence for some time. The style of the Museum’s Sprite accords with an early fifteenth-century date. Many scholars have noted in the arrangement of the arms and in the facial features its close relation to the famous Florentine sculptor Donatello’s gilt-bronze Dancing Angel on the font of the Baptistery at Siena Cathedral. Francesco Caglioti assigns the model of Sprite to Donatello (1386/87–1466) but the execution of the bronze to a collaborator. Finding its pose less fluid than those of Donatello’s known bronzes of this period and the engraving too artless to have been done under his direct supervision, Draper regards Sprite as a work by a close collaborator of the master. For him, this is a work that follows Donatello’s inventions and displays many of his stylistic hallmarks but appears to be a step away from the master himself. If Rustici’s Mercury was a replacement for the damaged Sprite, as Draper has suggested, then this earlier work may also have represented the child Mercury. While that god is often seen with winged sandals, this figure’s shoulder wings and tail have no place in his usual description. A suggestion has been made that the Museum’s figure may represent one of the four classical wind gods, especially since images of them exist with shoulder wings and tail, supporting this interpretation. For Draper, it is the west wind, Zephyr, whose breath is gentle, that should be considered. This scholar notes that Mercury and Favonius (the Latin name for Zephyr) were sometimes conflated by medieval authors. The association of Mercury, god of commerce — so critical to the Medici fortunes — with a favorable wind is the kind of hybrid meaning admired in the Renaissance. The doubling of associations would have intrigued the viewer’s mind at the same time that the gleaming form of the boy, rising above splashing water, would have delighted eye and ear. [Ian Wardropper. European Sculpture, 1400–1900, in the Metropolitan Museum of Art. New York, 2011, no. 1, pp. 10–12.] John Pope-Hennessy. An Introduction to Italian Renaissance Sculpture. Vol. 3, Italian High Renaissance and Baroque Sculpture. 2nd ed. London, 1970, p. 342, pl. 40. Draper’s publication will be a study of Italian bronzes in the Metropolitan Museum. John Shearman. "The Collections of the Younger Branch of the Medici." Burlington Magazine 117 (January 1975), pp. 20, 27, nos. 76, 80; Carl 1990, p. 42. One, now in the Museo Nazionale Bargello, Florence (inv. no. 425), was once part of the Medici collections in the Palazzo degli Uffizi, Florence (unpublished). The other was sold from the Cyril Humphris collection, at Sotheby’s New York, on January 11, 1995, no. 101. James David Draper in The Metropolitan Museum of Art. Notable Acquisitions, 1983-1984. New York, 1984, pp. 26–27; Draper in Italian Renaissance Sculpture in the Time of Donatello: An Exhibition to Commemorate the 600th Anniversary of Donatello’s Birth and the 100th Anniversary of the Detroit Institute of Arts. Exh. cat. Detroit Institute of Arts; Kimbell Art Museum, Fort Worth; 1985–86. Detroit, 1985, pp. 126–27, no. 24. See also Buddensieg 1986. Francesco Caglioti. Donatello e i Medici: Storia del "David" e della "Giuditta." Vol. 2. Florence, 2000, figs. 341–44. Draper in Italian Renaissance Sculpture 1985, p. 127. On this point, see Charles Dempsey. The Portrayal of Love: Botticelli’s Primavera and Humanist Culture at the Time of Lorenzo the Magnificent. Princeton, 1992, pp. 38 – 40; Alessandro Nova. Il libro del vento: Rappresentare l’invisibile. Genoa, 2007, pp. 89, 208.
<urn:uuid:71c6fec5-c0ee-4e5e-bcfc-f0d5792f2418>
CC-MAIN-2017-43
https://www.metmuseum.org/art/collection/search/207394?exhibitionId=&oid=&vid=24024ccf-da9e-4a71-97b0-464271f62499&tab=audvid
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823284.50/warc/CC-MAIN-20171019122155-20171019142155-00653.warc.gz
en
0.920886
1,496
2.75
3
This is a list of important publications in economics, organized by field. Some reasons why a particular publication might be regarded as important: - Topic creator – A publication that created a new topic - Breakthrough – A publication that changed scientific knowledge significantly - Influence – A publication which has significantly influenced the world or has had a massive impact on the teaching of economics. Description: Das Kapital is a political-economic treatise by Karl Marx. Marx wrote this critical analysis of capitalism and of the political economy from the perspective of historical materialism, the view that history can be understood as a sequence of modes of production in which exploiting classes extract an economic surplus from exploited classes. Importance: Breakthrough, Influence Description: The book is usually considered to be the beginning of modern economics. It begins with a discussion of the Industrial Revolution. Later it critiques the mercantilism and a synthesis of the emerging economic thinking of his time. It is mostly known due to the idea of The Invisible Hand which is an often quoted phrase from the book. Its meaning is that people will unintentionally improve their community through pursuit of their own wants and needs. The Butcher, the Baker, and the Brewer provide goods and services to each other out of self-interest; the unplanned result of this division of labor is a better standard of living for all three. Importance: Topic creator, Breakthrough, Influence, Introduction Description: Elaborates, clarifies and corrects previous theories, and adds important new concepts Importance: Breakthrough, influence (esp on Marx), broadened scientific foundations of economics Description: Describes how poverty in the midst of plenty results from unequal rights to use natural resources, and declining wages in the face of increasing labor productivity results from the Law of Rent. Advocated Georgism, specifically a land value tax. Importance: Influence, Breakthrough Principles of Economics (Menger) Influence: Credited with co-founding of marginal utility analysis and the Austrian School of economics. Principles of Economics (Marshall) Influence: Standard text for generations of economics students. Importance:: Influential multi-level, best-selling principles textbook that popularized neoclassical synthesis of Keynesian economics and neoclassical economics. Description: See Importance. Importance: The book built on ordinal utility and mainstreamed the now-standard distinction between the substitution effect and the income effect for an individual in demand theory in the 2-good case. It generalized analysis to the case of one good and all other goods, that is, the . It aggregated individuals and businesses through demand and supply across the economy. It anticipated the aggregation problem, most acutely for the stock of capital goods. It introduced general equilibrium theory to an English-speaking audience, refined the theory, and for the first time attempted a rigorous statement of stability conditions for general equilibrium. Among the most important list of publication in macroeconomics are: Description: In this book, Keynes put forward a theory based upon the notion of aggregate demand to explain variations in the overall level of economic activity, such as were observed in the Great Depression. The total income in a society is defined by the sum of consumption and investment; and in a state of unemployment and unused production capacity, one can only enhance employment and total income by first increasing expenditures for either consumption or investment.
<urn:uuid:29902faf-7ee8-4d38-b87e-da645b56a39c>
CC-MAIN-2017-43
http://www.notthatadamsmith.com/art_grecian.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823214.37/warc/CC-MAIN-20171019012514-20171019032514-00158.warc.gz
en
0.929342
692
3.15625
3
Naming of Tropical Storms and Hurricanes Whats in a Name? How do Hurricanes and Tropical Storms get names? These are some of the questions you might wonder. Hurricane naming began back in 1950, when meteorologists wanted to give tropical storms and hurricanes an easy name to remember them by, instead of just plain "Hurricane Six" or "Tropical Storm 8b". So, in 1950, the National Hurricane Center named hurricanes from the World War 2 phonetic alphabet. Hurricanes that year were given names such as "Dog", "Barker", "Item", and "Jig". And yes, these names did sound a little funny, that is probably why they only used these names until 1952. In the Hurricane Season of 1953, they tried a different approach - giving the hurricanes human names. They started out just using female names, and this lasted over 25 years until in 1979, men's names were incorporated into the list. 1979 was also the first year that there was a full prechosen list of names. There were a total of six lists, and were repeated every six years. So there was a storm named Ana in 1979, and again in 1985. The lists would remain unchanged unless a storm would be severe enough to have the name retired. Examples of retired names include Andrew of 1992, Ivan of 2004, and David of 1979. Retired names will never be used again, and are always replaced by a name of the same letter and gender. Keep in mind that tropical depressions do not recieve names until if and when they reach tropical storm strength. Naming of Subtropical Storms and other storms |Subtropical Storm Ana in April 2003 Subtropical storms were originally not given names and were referred to as "Subtropical Storm One", "Subtropical Depression One" and so on. Then, subtropical storms were named from 1972 to 1973, when the NHC called them "Neutercanes" meaning a mixture of a tropical and an extratropical storm. During this time, they gave subtropical storms names from the Greek Alphabet. After 1973, The NHC went back to just calling them by numbers. It was in 2002, when the NHC decided to give subtropical storms names from the same list as tropical storms. The first subtropical storm to take a name was Ana in April of 2003. Subtropical Depressions were given numbers in the same order as the rest of the tropical storms. For example, Subtropical Depression 22 in 2005 was the first subtropical system of the year, but instead of taking the number "Subtropical Depression One", it took the number from the sequence of the rest of the storms. Click here to see the lists of names that are used to name tropical storms and hurricanes.
<urn:uuid:e4992a78-89e9-4368-8ebc-5688f7bcd154>
CC-MAIN-2014-15
http://hurricanehut.tripod.com/id83.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223207985.17/warc/CC-MAIN-20140423032007-00544-ip-10-147-4-33.ec2.internal.warc.gz
en
0.96435
598
3.5
4
The village lies on a peninsula that juts out from the West of the Lake Trasimeno, the body of water most likely considered “sacred” along whose shores were built Etruscan temples. The first occupation of the place is documented from the century. VI A.C. by the Etruscans of Chiusi. The name of Castiglione del Lago comes from the medieval Castilionis which indicated a place protected by ancient fortifications. Labeled Castilionis Clusinum , as included in the territory of Chiusi, it is so indicated already by the X century In X century the country and its territory are donated by Otto III to the monastery of Campoleone, located near Arezzo. Because of considerable strategic importance it is the subject of bitter disputes between Perugia, Cortona and Arezzo. In 1184 it became part of the territory of Perugia that, from the XIII century repeatedly restored its walls and, in the second half of the XII century builds Rocca. For it had been suggested an intervention of Frederick II, but the total lack of documentation about it does not allow to verify their reliability. In 1424, following the defeat suffered at l’Aquila by Braccio da Montone Fortinbras “Lord of Perugia” in its attempt to invade the Papal States, the country with its territory, the Chiugi Perugino and Lake Trasimeno are donated by Perugia to the Church who will retain ownership until the unification of Italy. In 1550, Pope Julius III granted Castiglione del Lago and the territory between the Trasimeno and the Chiana River to sister Giacoma widow of Francesco della Corgna from Perugia. Thus he began the domination of this family, appointed Marquis of Castiglione del Lago and Chiugi in 1563, and the Dukes of Castiglione del Lago in 1616, redesigns the urban structure of the town redesigned around the new and majestic residence: the palace of Corgna . The feud ended with the death of the duke Fulvio Alessandro in 1647. The town and the territory back under the control of the Papal States. THE OLD TOWN The old town is surrounded by medieval walls of the XII-XIII centuries, and is divided into two parts. The eastern part is occupied by the palace of Corgna and Rocca at which, in the early XX century was constructed the Hospital of St. Augustine. Currently there are three gates to the country: the door Fiorentina (the second half of XVI century), the door of the Perugina XIII century and port Senese, an ancient medieval postern rebuilt and enlarged in the first half of the XX century. Three streets and three squares. Along the two parallel main streets, Via Vittorio Emanuele and Via del Forte, originated from renewed urban structure wanted by the Corgna, there arise the two places of worship of Castiglione del Lago. Made between 1836 and 1860, designed by G. Caproni, the Church of Santa Maria Maddalena it is located along the main street and it houses frescoes M.Piervittori, a shovel depicting the Madonna and Child, St. Anthony Abate and Santa Maria Maddalena, built in 1500 by Eusebio da San Giorgio, a pupil of Perugino, and a fresco depicting the Madonna del Latte di Orvieto school of the XIV century. The church of San Domenico is located in Via del Forte. It was commissioned by the duke Fulvio Alessandro della Corgna in 1638 in gratitude for the healing of his wife Eleonora de Mendoza suffering from gangrene to the arm. After years of ineffective treatment Duchess healed thanks to the oil, considered miraculous, from the votive lamp placed before the image of the saint in a church in Soriano Calabro. Inside are the graves of the poet C. Caporali and the duke Fulvio Alessandro. A small museum, along with the surgical instruments used to cure the disease of the Duchess, the liturgical furnishings original church, a fresco of the first of 500 attributed to Spain and statues of the centuries XV, XVI and XVII.
<urn:uuid:17a86990-5776-4695-84d1-ba7d94aae5f1>
CC-MAIN-2020-05
https://www.palazzodellacorgna.it/castiglione-del-lago/?lang=en
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251700988.64/warc/CC-MAIN-20200127143516-20200127173516-00512.warc.gz
en
0.943941
918
2.765625
3
Even on the healthiest diet in the World, you are left with some risk of developing cancer. Every added vegetable, avoided sugary drink and skipped carbohydrate will help to reduce your risk, but not down to nothing. If you are already following a Paleo lifestyle, adding a diet that is predominately plant based and avoiding all processed wasteful foods, you have already fought half the battle. The cancer cells in your body will have been suppressed and slowed. You will be in the best position possible to follow your doctor’s additional plan to suppress the cancer further into remission. If you are unfamiliar with the Paleo lifestyle and have recently been diagnosed with cancer, there is still time to kick things into gear and give your body a fighting chance to kill off cancer along with your doctor’s guidance. Cancer develops and spreads as cells mutate. To reduce your risk of developing cancer, or having this cancer spread further, you want to reduce the risk of your cells mutating. There are a number of dietary changes you can make to ensure, you keep your levels of risk as low as possible. For example, research has shown that folate-rich foods reduce risk of mutations. Folate is a B-complex vitamin found in oranges, spinach, romaine, asparagus and brussel sprouts. In a large-scale study, researchers evaluated the effects of folate on more than 27,000 male smokers between the ages of 50 and 60. Men who consumed at least the recommended daily allowance of folate – about 400 micrograms – cut their risk of developing pancreatic cancer by half. Another example would be vitamin D. This vitamin is known for its ability to help the body absorb calcium. Recently it has been discovered that there is a link between increased vitamin D intake and reduced breast cancer risk. The easiest way to stock up on vitamin D is to take a walk in the sunshine as in only 10 tens with 40% of your skin exposed you can gather your daily recommended allowance a few times over. Members of the cabbage family are also great providers of anti-cancer care. Examples include kale, turnip greens, cabbage, cauliflower and Brussels sprouts. Recent studies on cruciferous vegetables show promising results against prostate and colon cancers. Managing your diet should always be an important part of any disease management, especially cancer treatment. Eating the right kinds of foods before, during and after treatment can help you feel better, stronger and heal faster. Keeping your diet as healthy as possible during cancer treatment is easier said than done, some common side effects that can affect your ability to eat: - Loss of appetite - Sore mouth or throat - Dry mouth - Dental and gum problems - Changes in taste or smell As difficult as it may become at times, keeping a healthy diet will reduce some if not all of the unpleasant side effects from cancer treatment. High energy foods will help against fatigue. Drinking plenty of water will help against a dry or sore mouth. The Paleolithic diet, or the Paleo diet, is a modern nutritional plan based on the diet of our ancestors. The diet consists of mostly meat, fish, eggs, tree nuts, vegetables, roots, fruit, berries, mushrooms and other foods that would have been available to hunter-gather societies in the Palaeolithic period. It is a very practical lifestyle to follow, rich in all the vegetables needed to promote cancer suppression and remission, while avoiding all processed foods, refined sugars and other foods that are usually that bit hard to stomach when you are feeling ill.
<urn:uuid:0ce89418-af44-4bfe-920d-e72c060eebe2>
CC-MAIN-2014-23
http://www.paleocancer.com/surviving-cancer/
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997900573.25/warc/CC-MAIN-20140722025820-00214-ip-10-33-131-23.ec2.internal.warc.gz
en
0.956854
728
2.71875
3
Part of Agroscope’s agricultural research remit is to provide scientifically based decision-support tools, including forecasting systems that make use of weather data to predict the occurrence of certain diseases or pests. Agricultural economists also use various model systems for their calculations that serve as decision support tools for farmers as well as for administrators, policymakers and the general population. Potatoes, outdoor-grown vegetables and maize: spring is the sowing season in the farming calendar. In choosing the crops and varieties that are best adapted to pedoclimatic conditions and market demand, farmers assume a major responsibility. These decisions as well as their choice of cultivation techniques will also determine how they will protect their crops against pests, diseases and weeds. The plant-protection strategy will influence yields, profit, and impact on the environment. Nothing works without plant protection, because it guarantees the quantity and quality of yields in cereal, fruit and vegetable cultivation, as well as in all other agricultural crops. Now Agroscope too is contributing information on this highly topical issue. Eva Reinhard, Head of Agroscope, explains what research has already achieved and what it may achieve in future.
<urn:uuid:7f665b0b-55e1-4041-a686-d8f1cbbb9818>
CC-MAIN-2020-34
https://www.agroscope.admin.ch/agroscope/en/home/topics/plant-production/plant-protection.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735939.26/warc/CC-MAIN-20200805094821-20200805124821-00310.warc.gz
en
0.959568
233
3.203125
3
for National Geographic News The 2004 Athens Olympic Games begin on Friday. Over the course of the 18-day event, 24,000 athletes, coaches, and officials will wolf down almost every food imaginable, from Brazilian fish stew to Asian stir-fried vegetables. Most competitors will follow highly specialized diets and consume sports drinks, gels, and energy bars to boost their performance. The modern Olympics have radically changed from their debut in 776 B.C., when the cook Koroibos won the only sporting event: a footrace. But even then, ancient athletes were concerned with what they ateand some even followed a meat-heavy, Atkins-style diet. Now food historians are studying ancient Greek and Roman texts to learn about the diet of the first Olympiansand about the roots of Mediterranean cuisine. Archaeologists have been able to uncover food remains from ancient Egyptian sites, thanks to the region's arid climate, said Louis Grivetti, a food historian from the University of California at Davis. And while few food remains have been found in Greek excavations, "there is a wealth of information available through ancient Greek and Latin texts," the historian said. Grivetti is focusing his own research on the ancient text The Deipnosophists (also known as The Philosophers' Banquet), a 15-volume tale of a lengthy feast written around A.D. 200. The writer, Athenaeus, was a Greek from Naucratis, an ancient city southeast of present-day Alexandria, Egypt. In his work, Athenaeus describes an unusual banquet, one where diners talk about where food comes from, discuss its quality, and note its geographic source. The meal is a feast for gourmands, and each person provides the literary citations for his comment, Grivetti said. While 1,500 texts are cited by Athenaeus, only 15 percent of those exist today. Taken together, however, these remaining works present a picture of the finest in Mediterranean cuisine, along with insights into how food was prepared, eaten, and incorporated into daily life and thought. Ancient "Atkins" Diet In the time of ancient Greece, the diet of regular folk consisted mainly of breads, vegetables, and fruits. Fish was the most common meat eaten in this seafaring region. SOURCES AND RELATED WEB SITES
<urn:uuid:2d138d6e-f182-4384-a6c5-2df425e3b22d>
CC-MAIN-2017-26
http://news.nationalgeographic.com/news/2004/08/0810_040810_olympic_food.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321497.77/warc/CC-MAIN-20170627170831-20170627190831-00588.warc.gz
en
0.962563
487
3.265625
3
Technology critical to energy policy We know this can be done because we are in the business of turning these goals into reality. And more and more entrepreneurs join our ranks every day — proof that being responsible stewards of our environment can pay. Solar power, for example, is an increasingly cost-effective form of clean energy. The 14 solar power plants that BrightSource Energy is building across the Southwest would generate 2,610 megawatts of energy — enough to power more than 900,000 homes — while providing roughly 6,000 jobs. At the same time, the plants won’t be spewing the 80 million tons of CO2 that this would usually entail. It is like taking more than 13 million cars off the road. Microalgae are single-cell organisms that can be used to convert plant material into clean, renewable diesel and jet fuels. Biorefineries that use this technology being developed by Solazyme would generate thousands of new jobs and produce enough fuels to reduce the overall carbon footprint by at least 85 percent over petroleum-based fuels. All-electric cars are also becoming more affordable. Better Place is working with automakers, battery suppliers and energy companies around the world to help production of all-electric cars by establishing a network that would make zero-oil, zero-emissions cars less expensive and more convenient to use. Reducing dependence on oil is not just an aspiration. It is an imperative to keep the United States growing and strong. Technically, we have what it takes to get there. Our companies — and hundreds like them across the nation — are proving it every day. With a stable and supportive policy framework in place, we know we can get it done. Nicole Lederer is co-founder of Environmental Entrepreneurs. John Woolard is president and chief executive officer of BrightSource Energy. Jonathan Wolfson is chief executive officer and co-founder of Solazyme. Michael Granoff is the head of oil independence policies for Better Place.
<urn:uuid:3fbf50ec-b835-4f25-b7aa-f1adece57717>
CC-MAIN-2014-35
http://www.politico.com/news/stories/0710/39581_Page2.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500834258.45/warc/CC-MAIN-20140820021354-00115-ip-10-180-136-8.ec2.internal.warc.gz
en
0.954725
405
3
3
Alternate Names : Discharge from the Vagina What can be done to prevent the condition? Prevention of vaginal discharge depends on the cause. Candida infections can be prevented by avoiding a humid environment around the genital area. This can be done by wearing loose-fitting and absorbent clothing. Women should practice good hygiene methods, such as bathing, showering, wiping front to back after urinating, and frequent handwashing. Practicing safer sex and having fewer sexual partners should reduce the chances of spreading STDs. Hormone replacement therapy can prevent atrophic vaginitis caused by low levels of estrogen. What are the long-term effects of the condition? discharge does not need treatment. Feminine hygiene products and douching should not be used. These products can mask the symptoms of an sexually transmitted disease as well as force the bacteria higher into the pelvic organs. These products may cause a contact dermatitis to the vulva and vaginal tissues. With proper treatment, there are usually no long-term effects. However, certain causes may not be completely curable. Some of these include herpes, human papillomavirus (HPV), and HIV. If a severe long-standing STD has spread to the pelvic organs, pelvic adhesions may occur. This can lead to long-term pain and infertility. What are the risks to others? Normal vaginal discharge poses no risk to others. If there is an underlying infection, such as a sexually transmitted disease, the infection may be highly contagious through sexual contact.
<urn:uuid:130adeb7-428a-4384-99f3-609b6b97a0d6>
CC-MAIN-2013-48
http://www.3-rx.com/vaginal-discharge/prevention.php
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163046759/warc/CC-MAIN-20131204131726-00028-ip-10-33-133-15.ec2.internal.warc.gz
en
0.916435
320
3.234375
3
Filed under: Boomer's Health Shigella infection (shigellosis) is an intestinal disease caused by a family of bacteria known as shigella. The main sign of shigella infection is diarrhea, which often is bloody. Shigella can be passed through direct contact with the bacteria in the stool. For example, this can happen in a child care setting when staff members don't wash their hands well enough after changing diapers or helping toddlers with toilet training. Shigella bacteria also can be passed in contaminated food or by drinking or swimming in contaminated water. Children between the ages of 2 and 4 are most likely to get shigella infection. A mild case usually clears up on its own within a week. When treatment is needed, doctors generally prescribe antibiotics. Want to know more about this article or other health related issues? Ask your question and we'll post some each week for CNN.com reader to discuss or for our experts to weight in. |Most Viewed||Most Emailed||Top Searches|
<urn:uuid:7122383e-cacd-485f-82e1-1b909d5243f4>
CC-MAIN-2013-48
http://www.cnn.com/HEALTH/library/shigella/DS00719.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163046947/warc/CC-MAIN-20131204131726-00003-ip-10-33-133-15.ec2.internal.warc.gz
en
0.955732
214
3.265625
3
It’s not just military retirees and veterans who are packing on the pounds. At a policy summit Wednesday, health and military experts said the obesity epidemic has become a significant threat to national security as the waistlines of military enlistees are expanding. Overweight and obese enlistees and soldiers are making it harder for recruiters to find physically fit candidates for military service. A 2010 report found that “every year the military discharges over 1,200 first-term enlistees before their contracts are up because of weight problems.” The cost to to taxpayers of this turnover is estimated at around $60 million a year. “You have to be fit to fight,” said Col. Heidi Warrington. “It used to be, the day you came into the Army you had to pass your fitness test or you couldn’t join the military.” Col. Warrington, the chief nurse executive for the U.S. Army Public Health Command, said that every branch of the armed forces has a limit for body fat, but the military now provides waivers, probation periods and secondary screenings to enlistees who exceed it. But today, some enlistees are so overweight “they don’t even have to meet the standard until their first true duty station, which means they’ve already gone to basic and their advanced individual training,” Warrington said. “The military is a microcosm of a larger problem,” said Marian Tanofsky-Kraff, a professor at the Uniformed Services University who studies eating disorders. “It’s a neat place [to be]. Because of the controlled health care system, we have broad opportunities to do science and go in there and have data that’s available. I think it’s a really wonderful place to start to understand how we can intervene early.” Which means maybe the rest of us won’t have to enlist to learn how to control our own weight.
<urn:uuid:e6be476d-5cbc-4a0f-ab75-7612b31b749c>
CC-MAIN-2023-50
https://kffhealthnews.org/news/is-the-u-s-military-too-soft-on-fat/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679099942.90/warc/CC-MAIN-20231128183116-20231128213116-00406.warc.gz
en
0.958438
413
2.59375
3
The En-Gedi scroll, a text that includes part of the Book of Leviticus in the Hebrew Bible that was ravaged by fire about 1,400 years ago, is now readable, thanks to a complex digital analysis called "virtual unwrapping." Rather than physically unfurl the scroll, which would have destroyed the crumbling artifact, experts digitally scanned the document, and then virtually flattened the scanned results, allowing scholars to read its ancient text. "We're reading a real scroll," lead study author Brent Seales, professor and chairman in the department of computer science at the University of Kentucky, said in a news conference yesterday (Sept. 20). "It hasn't been read for millennia. Many thought it was probably impossible to read." [Gallery of Dead Sea Scrolls: A Glimpse of the Past] RELATED: Dead Sea Scrolls Made Locally, Tests Show Archaeologists found the scroll in 1970 in En-Gedi, where an ancient Jewish community thrived from about the late 700s B.C. until about A.D. 600, when a fire destroyed the site, the researchers said. Excavations of the synagogue's Holy Ark, a chest or cupboard that holds the Torah scrolls, revealed charred scrolls of parchment, or animal skin. But each scroll was "completely burned and crushed, had turned into chunks of charcoal that continued to disintegrate every time they were touched," the researchers wrote in the study. The En-Gedi scroll is different than the original Dead Sea Scrolls, which a young shepherd discovered in caves near Qumran in the Judean Desert in 1947. However, Dead Sea Scroll has become an umbrella term for many ancient scrolls found in the area, and some researchers also call the En-Gedi artifact a Dead Sea Scroll. The scorched En-Gedi scroll fragments sat in storage for more than 40 years until experts decided to give them another look, and try the newly developed "virtual unwrapping" method for the first time on the scroll. The virtual journey began in Israel, where experts digitally scanned the rolled-up scroll with X-ray-based micro-computed tomography (micro-CT). At this point, they weren't sure whether the scroll had text within it, said study co-author Pnina Shor, curator and head of the Dead Sea Scrolls Projects at the Israel Antiquities Authority. So, they increased the spatial resolution of the scan, allowing them to capture whether or not each layer had detectable ink. RELATED: Nine Unopened Dead Sea Scrolls Found Their exhaustive attention to detail paid off: There was ink, and it likely contained metal, such as iron or lead, because it showed up on the micro-CT scan as a dense material, the researchers said. However, the text was illegible. So Shor and her colleagues in Israel sent the digital scans to Seales in Kentucky so he and his team could try the new "virtual unwrapping" technique. "It was certainly a shot in the dark," Shor said. This new method marks the first time that experts have virtually unrolled and noninvasively studied a severely damaged scroll with ink text, Seales said. The unwrapping took time and involved three steps: segmentation, texturing and flattening, he said. With segmentation, they identified each segment, or layer, within the digital scroll, which had five complete revolutions of parchment in the scroll. Then, they created a virtual geometric mesh for each layer made of tiny, digital triangles. They were able to manipulate this mesh, which helped them "texture" the document, or make the text more visible. RELATED: Burned Vesuvius Scrolls Read for First Time "This is where we see letters and words for the first time on the recreated page," the researchers wrote in the study. Finally, they digitally flattened the scroll, and merged the different layers together into one, flat 2D image that could easily be read. [In Photos: Amazing Ruins of the Ancient World] The scroll holds the beginning of the Book of Leviticus, the third of the five books of Moses (known as the Pentateuch) that make up the Hebrew Bible, biblical scholars said. In fact, the En-Gedi scroll contains the earliest copy of a Pentateuchal book ever found in a Holy Ark, the researchers said. The virtual unwrapping revealed two distinct columns of text that include, in total, 35 lines of Hebrew. Each line has 33 to 34 letters. However, there are only consonants, no vowels. This indicates that the text was written before the ninth century A.D., when Hebrew symbols for vowels were invented, said study co-author Emanuel Tov, a professor emeritus in the department of Bible at Hebrew University of Jerusalem. Radiocarbon dating places the scroll in the third or fourth century A.D., but studies based on historical handwriting place it at either the first or second century A.D., the researchers said. Regardless, the data suggest that it was written within the first few centuries of the Common Era, they said. RELATED: Puzzling Sinkholes Are Opening Up Along the Dead Sea These dates make the En-Gedi scroll slightly younger than the original Dead Sea Scrolls, which were written between about 200 B.C. and A.D. 70. "Hence, the En-Gedi scroll provides an important extension to the evidence of the Dead Sea Scrolls and offers a glimpse into the earliest stages of almost 800 years of near silence in the history of the biblical text," the researchers wrote in the study. Moreover, the En-Gedi text is "completely identical" to the text and paragraph breaks found in medieval Hebrew Bibles, which are known as the Masoretic text, a text that is still used today. In antiquity until the first century B.C., there were an "endless number of textual forms" of the Masoretic text, earning them the name "proto-Masoretic," Tov said. But the En-Gedi finding suggests that the standard Masoretic text coalesced relatively early, he said. "This is quite amazing for us," Tov said. "That in 2,000 years, this text has not changed." The study was published online today (Sept. 21) in the journal Science Advances. Original article on Live Science. Copyright 2016 LiveScience, a Purch company. All rights reserved. This material may not be published, broadcast, rewritten or redistributed. SEE PHOTOS: Peering Inside an Ancient Papyrus
<urn:uuid:41a3fc0d-50c1-4933-b098-4035fadcb2fa>
CC-MAIN-2017-26
https://www.seeker.com/dead-sea-scroll-virtually-unwrapped-2012450480.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321426.45/warc/CC-MAIN-20170627134151-20170627154151-00718.warc.gz
en
0.961446
1,366
3.375
3
Chapter 7 - Luxor Karnak, Hatshepsut's Obelisk, KV20, and Djeser Djeseru The temple of Karnak was known in ancient times as Ipet Issut - The Most Perfect of Places. It is an enormous complex of pylons (huge gateways), columns, courts, obelisks and chapels, built in stages by pharaohs from the Middle Kingdom through to the Ptolemaic period, but mainly by New Kingdom pharaohs. There are parts built by Ramses II, Seti I, Amenhotep III, Thutmose I and III, Hatshepsut, and others. Karnak was a temple dedicated mainly to Amun, the king of the gods and the god of Thebes. There are also temples or chapels to Amun's wife Mut, their son Montu, and to Osiris, Khons, and Ptah. It's a truly amazing place you can get lost in, exploring the wonderful hieroglyphs and images all over the walls and columns. My favourite part of it is the hall of columns built by Ramses II and his father Seti I. These columns are enormous - 50 people could stand on top of each one. And there are over a hundred of them crowded together, creating a feeling of a dark forest of giant redwoods. There's also a sacred pool where the priests would wash before religious ceremonies to purify themselves. This was built by Thutmose II so was not around at the time of my story. In fact Karnak was far smaller in the time of Hatshepsut than it is now. Click here to learn more: http://www.touregypt.net/karnak.htm And here: http://en.wikipedia.org/wiki/Karnak Hatshepsut had two pairs of obelisks made for Karnak Temple. The first were positioned at the far side from the entrance and supposedly were completely covered in electrum (a naturally occurring mix of silver and gold). The second pair were commissioned in year 15 of her rule and were completed about a year later. The construction and the transporting of the second pair stone was commemorated on the wall of the lower portico of Hatshepsut's temple, Djeser Djeseru. This would have been an incredible task. The obelisks were 29 metres long and weighed about 450 tons. They were a single block, so they would have been immensely difficult to move from the quarry in Aswan, onto their enormous barges, then off the barges in Thebes and in place at the temple. There are various theories as to how they were raised, such as by using levers - or try this insane idea that the Egyptians used kites. The top of one of the destroyed obelisks, showing Amun and Hatshepsut. The Inscription on the obelisk which still stands, and which features in the story, is all about Hatshepsut, her father Thutmose I, and her other father Amun, to whom the obelisks were dedicated. Read the whole inscription here. Hatshepsut's tomb is referred to as KV20 (King's Valley tomb number 20). It is in the Valley of the Kings on the west side of the river at Luxor, and was the first tomb to be built there. There are at least 63 tombs now in the Valley - a new one was discovered last year. KV20 was originally built for Hatshepsut's father, Thutmose I. It is a very long tunnel, roughly dug out, descending into the rock for some 200 metres. The bottom is 100 metres below the surface. When Hatshepsut became king she decided she wanted to be buried with her father and had an extra chamber cut via Thutmose's burial chamber. This new chamber was much neater and had three pillars in the middle along with three small storage rooms. Above: the first chamber of KV20 Entrance to KV20 In 1903 Howard Carter cleared out KV20, which was a difficult and unpleasant task as it was filled with rubble. At last Carter reached the burial chamber which had a collapsed ceiling. Here the work was worst of all. Here's a quote from Carter: '...the air had become so bad, and the heat so great, that the candles carried by the workmen melted, and would not give enough light to enable them to continue their work.' Also, dried bat poo from centuries was everywhere and created suffocating clouds wherever the men worked. Nasty. In the burial chamber Carter found two stone sarcophagi, one for Thutmose I and one for Hatshepsut, plus Hatshepsut's Canopic chest. However neither of the mummies were there, nor any treasure - just some fragments of wood, pottery, and stone vessels. There were also 15 polished limestone slabs inscribed in red and black ink with chapters from the Amduat, a book about the afterlife. These were intended to line the walls, but were lying around, abandoned by the workers (see chapter 11). Thutmose I, by the way, did not end up being buried here - Thutmose III had a new tomb built for him (KV38), perhaps because he didn't want his brilliant grandfather associated with his horrid stepmother. Eventually Thutmose I's mummy ended up in a cache (a hidden store) of lots of mummies, found near Hatshepsut's temple in the late 1800s. His body is now in the Cairo museum. Left - Hatshepsut's sarcophagus, now in the Cairo Museum Hatshepsut's temple in Deir el-Bahri was known as Djeser Djeseru in ancient times - the Holy of Holies. It's one of the most beautiful buildings in Egypt - indeed some say the world. The design is very unusual for ancient Egypt, with three terraces fronted by porticoes - rows of columns. It was clearly designed to suit its environment - the bay of cliffs which surround it like the shell of an oyster. The temple contains various chapels, to gods such as Re, Anubis, Hathor, and most importantly Amun. The most sacred part of the temple was the inner sanctuary of Amun, cut into the rock at the back of the upper terrace. There were also chapels to Thutmose I and to Hatshepsut herself. And there are numerous beautifully carved and painted reliefs and statues, which tell us much about our great queen. The walls at the back of the porticoes are painted with scenes relating to Hatshepsut's life. Lower left Portico: the transport and erection of obelisks from Aswan to Karnak. An enormous barge was used to carry both obelisks - see the line drawing of the painting here. Lower right portico: ritual hunting and fishing scenes Middle terrace left portico: Hatshepsut's famous expedition to Punt. Punt is believed to be a region on the coast of Ethiopia or Somalia. In about year 8 of her reign Hatshepsut sent ships down the Red Sea on a trading trip to get myrrh incense, and 31 living myrrh trees (planted in the temple grounds), and other exotic goods like ivory, ebony (dark wood), leopard skins, baboons, monkeys, spices, and gold. Carrying Myrrh trees Below: the fat queen of Punt Middle terrace right portico: Hatshepsut's divine birth. These scenes show Amun coming to Hatshepsut's mother and impregnating her with his breath. He then orders the god Khnum to make a body for her on his potter's wheel (see left), and her mother is shown pregnant. Upper terrace: the walls around the upper court were decorated with scenes showing the Beautiful Feast of the Valley (see chapter 9). The Inner sanctuary of Amun had scenes showing the royal family (Hatshepsut, Thutmose III, and princess Neferure) carrying out religious rites. Statues of Hatshepsut as Osiris were found along the front of the columns on the upper terrace, and also inside the inner sanctuary and in niches in the upper court. There were also sphinxes of Hatshepsut lining the path across the middle terrace, and the road leading away from the temple. Most of the statues of Hatshepsut in the temple were destroyed by Thutmose III, however. Chapel of Hathor: This was an important part of the temple. Hathor was the goddess of love, beauty, motherhood, and cemeteries. Deir el-Bahri as a whole was sacred to her, and Hatshepsut seems to identified with her. The chapel of Hathor to the left of the middle terrace is filled with beautiful statues and inscriptions. I could say a lot more about Hatshepsut's temple - it is a treasure trove of Egyptian art, history and religion. To find out more, try these websites: http://www.egyptsites.co.uk/upper/luxorwest/temples/hatshepsut.html Column with head of Hathor http://www.bluffton.edu/~sullivanm/egypt/deirelbahri/deirelbahri.html (with cow's ears)
<urn:uuid:5022232f-041c-4b4c-b041-07fc78c6b6ab>
CC-MAIN-2017-39
http://timetrips.co.uk/chapter_7.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818687484.46/warc/CC-MAIN-20170920213425-20170920233425-00083.warc.gz
en
0.972996
2,003
2.796875
3
WEDNESDAY, Oct. 24 (HealthDay News) -- Many people with incurable cancer mistakenly believe chemotherapy may save them, a new study finds. Researchers at Dana-Farber Cancer Institute in Boston found that more than 80 percent of people with advanced colon cancer and nearly 70 percent with advanced lung cancer thought chemo could cure their disease. In reality, chemo might give them several more months of life or ease troubling symptoms, but it rarely offers a cure for these diseases once they've spread to distant sites in the body. "It's really easy for people to have expectations that aren't well aligned with reality," said the study's senior author, Dr. Deborah Schrag, an attending physician in adult oncology at Dana-Farber. "They want to be the one to beat the cancer. And, doctors want to be helpful. We want to be positive. "What's clear," she added, "is that whatever we're doing right now, we need to change." These misunderstandings may keep patients from making informed treatment decisions and preparing for death, say the study authors. The study, published Oct. 25 in the New England Journal of Medicine, included almost 1,200 people who were part of the larger Cancer Care Outcomes Research and Surveillance study. The study volunteers were surveyed about four months after their diagnosis with advanced lung or colon cancer -- cancer that had spread to other areas of their body (metastasized). Almost all were receiving chemotherapy. Overall, 69 percent of the lung cancer patients and 81 percent with colon cancer reported unrealistic expectations about the likelihood that their chemotherapy might cure them. People with colon cancer were more likely to believe that chemo might provide a cure, and blacks and Hispanics were significantly more likely to think that. Patients who reported having favorable communication with their doctor we All rights reserved
<urn:uuid:7d987c8d-d7d4-4022-b771-6e965ebbbc27>
CC-MAIN-2014-15
http://www.bio-medicine.org/medicine-news-1/Many-Terminal-Cancer-Patients-Put-False-Hope-in-Chemo--Study-Finds--94726-1/
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609537376.43/warc/CC-MAIN-20140416005217-00122-ip-10-147-4-33.ec2.internal.warc.gz
en
0.971911
379
2.515625
3
A microwave sounder for geostationary orbit Bjorn H. Lambrigtsen, JPL and California Institute of Technology, Pasadena, CA The Geostationary Synthetic Thinned Aperture Radiometer (GeoSTAR) is a new Earth remote sensing instrument concept that has been under development at the Jet Propulsion Laboratory. First conceived in 1998 as a NASA New Millennium Program mission and subsequently developed in 2003-2006 as a proof-of-concept prototype under the NASA Instrument Incubator Program, it is intended to fill a serious gap in our Earth remote sensing capabilities – namely the lack of a microwave atmospheric sounder in geostationary orbit. The importance of such observations have been recognized by the National Academy of Sciences National Research Council, which recently released its report on a “Decadal Survey” of NASA Earth Science activities. One of the recommended missions for the next decade is a geostationary microwave sounder. GeoSTAR is well positioned to meet the requirements of such a mission, and because of the substantial investment NASA has already made in GeoSTAR technology development, this concept is fast approaching the necessary maturity for implementation in the next decade. NOAA is interested in GeoSTAR as a potential payload on a future series of geostationary weather satellites, the GOES-R series and has closely monitored the technology development since 2003. GeoSTAR, with its ability to map out the three-dimensional structure of temperature, water vapor, clouds, precipitation and convective parameters on a continual basis, will significantly enhance our ability to observe hurricanes and other severe storms and would significantly improve the GOES-R capabilities in these areas. We discuss the GeoSTAR concept and basic design, the performance of the prototype, and the most important science applications that will be possible with GeoSTAR. The work reported on here was performed at the Jet Propulsion Laboratory, California Institute of Technology under a contract with the National Aeronautics and Space Administration. Poster Session 1, Fifth GOES Users' Confererence Poster Session Wednesday, 23 January 2008, 2:30 PM-4:00 PM, Exhibit Hall B Previous paper Next paper Browse or search entire meeting AMS Home Page
<urn:uuid:74c20f5b-b2c0-49c0-b4fb-c3421278ed11>
CC-MAIN-2023-14
https://ams.confex.com/ams/88Annual/techprogram/paper_133848.htm
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950528.96/warc/CC-MAIN-20230402105054-20230402135054-00652.warc.gz
en
0.916815
456
2.9375
3
After nearly a month, the Obama administration's Justice Department finally decided to fight New York Judge Edward Korman's activist Plan B decision. Following Judge Korman's decision, parents across the country, dozens of national organizations, and over 50 Members of Congress called on the administration to appeal the decision in order to protect the rights of parents and ensure the safety of young girls. Even so, a recent decision by the U.S. Food and Drug Administration (FDA) could still put young girls in danger. The decision to allow all girls of "reproductive" age to purchase Plan B without a prescription was made not by a panel of skilled professionals or by the Health and Human Services Department (HHS), but by a single federal judge who brushed aside serious medical concerns and parental rights in the name of "access." While Americans waited to hear whether or not the Obama administration would appeal the decision, the FDA decided to allow Plan B to be sold right off the shelf without prescription to girls as young as 15. Unfettered access to Plan B, whether available to pre-teens or limited to girls as young as 15, poses serious safety concerns. Both decisions ignore the potential health risks to young women. Plan B is a single dose of hormones at least four to seven times the dose in birth control pills, and there is limited information on the effects such high doses of hormones would have on young girls. The evidence is also inconclusive on Plan B's mechanism of action, and could include both preventing fertilization of an egg and preventing uterine implantation of an embryo, which would mean acting as an abortifacient drug. Despite what proponents say, it is clearly not the same as taking an aspirin. What's more, when HHS secretary Kathleen Sebelius had the choice in 2011 to extend over the counter (OTC) access of Plan B to girls under 17 years of age she declined because of her serious concern that young girls do not understand how to properly use the drug. Proof of adequate drug label comprehension is a requirement for OTC access, as improper use of serious drugs can be dangerous. President Obama, a father of two girls, echoed Sebelius' concerns about potential improper use and praised her decision. Medical professional organizations such as the American College of Pediatricians and the American Association of Pro-Life Obstetricians and Gynecologists also agree. Advocates of the plan claim that increased access is good for girls. However, in this case, increased "access" is a sure-fire way to discourage girls in desperate need of medical screenings from receiving any medical care or attention. A study out of the United Kingdom in 2010, where Plan B is already available OTC for teens, shows that sexually transmitted infection (STI) rates among teens increased following OTC availability. These new STIs among teens will remain widely untreated because OTC access to contraceptives without a doctor's oversight causes women and girls to avoid necessary medical screenings during which STIs are detected and treated. In the U.S., the Centers for Disease Control (CDC) reported almost 20 million new sexually transmitted infections in 2008 (the latest year for which data is available), with most new cases occurring in young men and women ages 15-25. Additionally alarming is that Plan B "access" advocates ignore the fact that doctors and parents are often the first line of defense for girls who are being sexually abused. Removing doctors and parents from the equation will make it much easier for predators to conceal sexual abuse and to force the drug's use on minors. If Plan B is made available on retail store shelves it will be available for sale whether or not the on-site pharmacy is open. The only "safeguard" in place will be the requirement that the cashier check ID before sale. This flimsy protective measure is not acceptable. Secretary Sebelius and the administration should also refuse to accept the new FDA decision in the name of protecting young girls and the rights of parents. Schools need parental permission to give children aspirin, thus it logically follows that access to a high dose hormonal contraceptive should also require parental permission. Instead of implementing a contraceptive free-for-all among young girls, we should be focusing on ways to encourage communication between parents and teens. Communication and guidance from parents is essential to the proper development and health of children. If implemented, the decisions by Judge Korman and the FDA would both adversely impact the health and wellbeing of teenage girls and would strike a blow to the fundamental rights of parents to direct the upbringing of their children.
<urn:uuid:bffd9095-c1a0-4896-9e41-774f3f2e68a5>
CC-MAIN-2017-30
http://www.christianpost.com/news/hhs-should-appeal-plan-b-decision-95805/
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549425407.14/warc/CC-MAIN-20170725222357-20170726002357-00511.warc.gz
en
0.946473
923
2.546875
3
Shad in Schools - Resources Articles and Research Papers Fourth grade students at Leadmine Elementary in Raleigh, N.C. release American shad fry into the Neuse River. - Just Keep Swimming an article on the first shad students in North Carolina by Patty Matteson, USFWS Raleigh Field Office - Fish Farming by Monica Holland, Fayetteville Observer - Helping the Bay's Rivers Run Silver Again! by Karl Blankenship, Chesapeake Bay Alliance, Bay Journal - River of Hope by Sandy Burk, USFWS Journal - Shad Journal - Contains the following articles by students: - One Night with Shad: A night of shad research spawns a great adventure by Nick Richman and Karna Sandler - The Shad Project: Students strive to restore shad in the Potomac using a full shad system by Michael Robinson and Trevor W. Swett - Let the River Run Silver Again! by Sandy Burk is the story of how it all began with students, American shad and the Potomac River - When the Shadbush Blooms by Carla Messinger with Susan Katz Illustrated by David Kanietakeron Fadden is the story of the changing seasons and changing times as seen through a young Lenape girl. - The Founding Fish by John McPhee a comprehensive historical look at American Shad. Presentations from the Feb. 20, 2010 Teacher Training at the N.C. Museum of Natural Science: - American Shad PowerPoint Presentation by Joshua Raabe, Graduate Research Assistant, PhD candidate N.C. State University - River Restoration and Dam Removal by Lynnette Batt, Associate Director, N.C. American Rivers, River Restoration Program Links to Live Web Cams The Live webcams section will take you to sites where you and your students can view Bald eagles dining on their favorite food source. Links to North Carolina State Agencies
<urn:uuid:1c416d77-5e94-4fc1-ada0-0a9473ef82bd>
CC-MAIN-2014-15
http://www.fws.gov/raleigh/sis_resources.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609526102.3/warc/CC-MAIN-20140416005206-00424-ip-10-147-4-33.ec2.internal.warc.gz
en
0.881453
397
2.65625
3
Science: The Perfect Portal to Literacy This is a repeat from last summer’s science posts, with a few additions. Science is still one of the best ways to engage kids in their world. Although science is important in its own right, it’s also a wonderful tool for boosting literacy skills. Science has lots going for it: Science is engaging and can stretch time engaged in learning. Science prompts questions and sends you to books. Science makes you want to learn more and prompts more questions. Science invites writing: observations, cool facts, questions… Science prompts sharing and conversation: Look what I just found! Listen to this, I just read… The list could be much longer. So I suggest, how about making this a Science Summer? Monday’s books can be a good place to start. The links below can be a good place to start, too. Each site offers a ton of ideas in all sorts of science topics. Explore! Experiment! Create! Growing Readers! Literacy in the Sciences from Reading Rockets (a wonderful resource for all aspects of literacy) This link includes a long list of Literacy in the Sciences Tip Sheets, including: Steps of the Scientific Process STEM Tools at Home Recording Observations: Journals and Field Notes Recording Observations: Capturing and Sharing Images and lots more ZoomSci: Mix Hot Science with Your Cool Ideas! from PBSKids This site offers activities in chemistry, engineering, the 5 senses, force and energy, life science, patterns, sound, structures, and water. Science Activities and Experiments from Education.com This site offers activities the 5 senses, simple experiments, colors, physical science, earth and space science, life science, plants, animals and the earth, weather and seasons, nature activities, chemistry, and environmental science. Science for Kids from Science Kids There are science facts, experiments, games, quizzes, and more science fun. 24 Kids’ Science Experiments That Adults Can Enjoy, Too from BuzzFeed DIY Projects include making transparent eggs, a lava lamp, dancing oobleck, and more. Science Activities for Kids from Kid Pointz There are 169 activities that can be sorted by grade level. Summer is the perfect time to engage in science activities and explorations. Give it a try!
<urn:uuid:4d36a873-70a6-4f03-8d4f-bf8ec0653eda>
CC-MAIN-2017-39
http://gailterp.com/2014/07/science-the-perfect-portal-to-literacy-2/
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689490.64/warc/CC-MAIN-20170923052100-20170923072100-00216.warc.gz
en
0.878637
491
3.796875
4
Waiting for inspiration and creativity Sometimes we feel that however hard we try, we’re not getting anywhere. At other times, we suddenly find inspiration and achieve a breakthrough. To understand this sensation of uneven progress, it is worthwhile considering some of the ways in which we learn and find new knowledge. Types of knowledge In general terms, there are two ways that we know things. One way of knowing is when we feel that “that’s just the way things are”. The other way of knowing is when we have been taught information, which we accept as being true. For example, the knowledge that a car is about to run you over, is not verbally expressed in your thoughts. If you look up while crossing the road and you see that you are in a collision course with a car, it is unlikely that the following will go through your mind, “It would appear that given my direction of travel and the car’s direction of travel, and considering our respective velocities, it is probable that the car and myself will collide in 3 seconds, which would result in severe injury.” Instead, it is more likely that you will jump out of the way as fast as possible, without thinking about your high-school applied maths. This type of knowledge is sometimes referred to as tacit knowledge, it is “just the way things are”. On the other hand, if you perform an experiment to see if the earth orbits the sun or if the sun orbits the earth, then it is likely that you will mentally think through your conclusion, “I have proven that the earth orbits the sun, and the sun does not orbit the earth”. This is because the earth’s orbit is not something that you experience directly, so knowledge of the earth’s orbit has to be expressed verbally within your mind, for you to be able to think about it. This type of knowledge is sometimes referred to as explicit knowledge. It is information that you know and are aware of, but it is not part of your life. Most knowledge falls on a spectrum between these two extremes. To learn the piano, we need to learn some music theory, but practice extensively to get the feel of the instrument. On the other hand, studying science is mostly based on textual information, however doing practical experiments gives us a feeling for the underlying concepts. Within business and Knowledge Management, two types of knowledge are usually defined, namely explicit and tacit knowledge. The former refers to codified knowledge, such as that found in documents, while the latter refers to non codified and often personal/experience-based knowledge. in order to understand knowledge, it is important to define these theoretical opposites. Explicit Knowledge: This type of knowledge is formalized and codified, and is sometimes referred to as know-what. It is therefore fairly easy to identify, store, and retrieve… Explicit knowledge is found in: databases, memos, notes, documents, etc. Tacit Knowledge: This type of knowledge… is sometimes referred to as know-how and refers to intuitive, hard to define knowledge that is largely experience based. Because of this, tacit knowledge is often context dependent and personal in nature. It is hard to communicate and deeply rooted in action, commitment, and involvement… Tacit knowledge is found in: the minds of human stakeholders. It includes cultural beliefs, values, attitudes, mental models, etc. as well as skills, capabilities and expertise. …tacit and explicit knowledge should be seen as a spectrum rather than as definitive points. Therefore in practice, all knowledge is a mixture of tacit and explicit elements rather than being one or the other. Knowledge and reality Since knowledge is an extension of our natural understanding of reality, all of our knowledge must be somehow linked to an actual feeling or perception which we have personally felt or experienced. Theoretical knowledge cannot exist within our minds, unless it is somehow linked to a real life experience which is meaningful to us. Or in other words, all explicit knowledge must be rooted in our tacit knowledge, somehow. Explicit knowledge is [sometimes] presented as a universally comprehensible commodity, which can be stored in a knowledge archive, shared with colleagues or clicked across cyberspace… In an incisive essay entitled ‘Do we really understand tacit knowledge?’, Haridimos Tsoukas (2003) makes the crucial point that… short of a brain transplant, the capacity to know is not a transferable commodity: it is inherently personal and inherently tacit: ‘All knowledge falls into one of these two classes: it is either tacit or rooted in tacit knowledge’ (Polanyi, 1967: 195, original emphasis)… ‘The ideal of a strictly explicit knowledge is indeed self-contradictory; deprived of their tacit coefficients, all spoken words, all formulae, all maps and graphs, are strictly meaningless. An exact mathematical theory means nothing unless we recognise an inexact non-mathematical knowledge on which it bears and a person whose judgement upholds this bearing.’ (Polanyi, 1967). A Very Short, Fairly Interesting and Reasonably Cheap Book About Studying Strategy, page 62 However, if we assume that all knowledge is rooted in our personal perceptions and feelings, it is difficult to understand how we can ever learn from anyone else. The mentor’s knowledge is predicated on their own personal feelings and experiences. If so, how can we absorb the knowledge that they verbally transmit to us, when we do not share the feelings and experiences that their own knowledge is rooted in? In addition to simply transmitting knowledge, every good teacher develops a personal connection with their students. The teacher will enthuse their students with their own passion for the subject, and make them feel that they are part of a journey of discovery and exploration. One can amass textual knowledge, but without that personal connection to the teacher, without the absorption of the teacher’s way of learning… – and especially without emulating his or her way of embodying what is taught, then [the student remains] not only ignorant but [worse, when they themselves come to teach, they are like a] sorcerer! [A teacher who can repeat the words, but never understood their own mentor’s inner meaning] just mumbles magic words, produces some dazzling temporary effects, and the student is duped. We all have had teachers like this, I suspect, and know the unfortunate students… who imitate this magical mumbling. Make Yourself a Teacher, page 74 A good teacher shows their students how the knowledge that they are teaching resonates within them. When a teacher shows how their knowledge lightens up their world, the teacher allows the students to borrow their perspective on reality, in order to absorb the knowledge being taught. “If it is meaningful for the teacher, then it must be true.” In other words, the students use the teacher’s tacit knowledge as a basis for absorbing the explicit knowledge that they are being taught. It may take the students years to develop their own inner grasp of these foundational truths, however. The “aha” moment of inspiration, occurs when our natural intuitions and our technical knowledge, align with each other. When this happens, we become able to feel our way through the complexities that face us, and find the simple but brilliant solutions that result from the synthesis of instinct and intricacy. However, as long as we rely on the intuitions that were lent to us by our teachers, our own intuition cannot enhance our understanding of our academic knowledge. Only once we autonomously perceive the underlying truths of our learned knowledge, can we experience the convergence of tacit and explicit knowledge, that results in a breakthrough.
<urn:uuid:0f47d160-cb9a-4958-93b4-c9576e7d0860>
CC-MAIN-2017-47
http://fleetingswallow.com/waiting-for-inspiration/
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934807084.8/warc/CC-MAIN-20171124031941-20171124051941-00517.warc.gz
en
0.95657
1,604
2.625
3
What is Orthopedic Rehabilitation? Orthopedic Physical Rehabilitation focuses on treatment or rehabilitation of injuries to the orthopedic system, which includes muscles, bones, joints, tendons, and ligaments. Orthopedic rehabilitation is essential to restore the patients activity, strength and motion right after injury or surgery. Rest alone after surgery usually does not relieve the problems caused by inflammation and spasm. Also, the body adapts and protects the injured area long after healing has started. These protective mechanisms like fibrosis and scar tissue, alter movement of the whole musculoskeletal system and increases strain on other areas. Rehabilitation should start as soon as possible after injury to prevent unwanted scarring and hardening of what is naturally strong but flexible tissue like muscle, tendons, and ligaments. Orthopedic patients typically have deficiencies and weaknesses which could be eliminated via specific targeted exercises. Depending on the type of surgery, therapy may include: - Exercises to strengthen the muscles - Flexibility exercises to develop and extend Range of Motion, which will keep the joints mobile - Posture, balance and coordination training - Gait analysis and training - Strategies for pain reduction - Spinal injury/IVDD - Joint Replacements - Cranial Cruciate Ligament Rupture - Joint dislocation - Hip dysplasia - Elbow Dysplasia - Patella luxation - Tendon injuries - Iliopsoas strain - Muscle injuries
<urn:uuid:1ff1942f-0176-4db0-a3d4-0f5872d97f2b>
CC-MAIN-2020-10
http://petfitrehab.com/orthopedic-rehabilitation/
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875143695.67/warc/CC-MAIN-20200218120100-20200218150100-00155.warc.gz
en
0.896299
317
3.21875
3
People involved in the manufacturing industry perform many different operations. Plastic “injection” molding and machining of plastic components are the two most common processes and contrary to popular belief that these two are similar processes, they are very different. To help you better understand the differences between plastic machining and plastic injection molding, you need to know what they actually are. Plastic machining is a process of reducing the size of plastic components from a large shape, just as shaving slivers from a tree with a knife. The plastic injection molding is a process that heats up plastic pellets to their melting point and injects them into a cavity. The plastic pellets are cool when rigid, but viscous (or melted) at higher temperatures. As plastic pellets cool, they harden in the shape of the cavity. So, how are these two plastic machining services different? Plastic Machining Is More Expensive – When it comes to price, plastic machining services are less expensive than plastic injection molding. It can cost up to 20 times plastic molding and yet sometimes, machining of plastic components is the cheaper option. The cost of creating the initial mold varies in both processes, creating the cost difference. From $5,000 to over $150,000, the cost of initial mold varies greatly. If you need only a few parts and you will spend only a little money on the initial mold to create them, the plastic injection molding process might be less expensive. Plastic Mold Cannot Be Easily Changed – If you are in need of hundreds of fewer parts, plastic machining services is the right solution. After you create a plastic mold, it cannot be easily changed. Therefore, the cost of creating the mold is higher than the cost of plastic machining services. But if you are dealing with larger orders, plastic injection molding is a better choice. However, there are always exceptions. Plastic Machining Is More Accurate Than Plastic Molding – The precision is the key. With plastic molding, except results within .13 mm of specifications, while with machining, the results are highly accurate within .02 mm of specifications. There are a lot of industries and operations that require this level of accuracy. If high-quality final product is needed, plastic machining services is a better option, because the process of transferring plastic into a mold usually leaves some imperfections. If you are choosing between plastic injection molding and plastic machining services, here is what you need to consider: - For manufacturing hundreds of fewer parts – plastic machining; - To avoid the high costs of creating initial mold – plastic injection molding; - For high level of accuracy and better quality of finished products – plastic machining.
<urn:uuid:5e03565e-6ca1-4476-a8a0-185568bbf4b8>
CC-MAIN-2020-29
https://www.comparefactory.com/plastic-injection-molding-or-plastic-machining/
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655886706.29/warc/CC-MAIN-20200704201650-20200704231650-00226.warc.gz
en
0.945518
560
2.703125
3
A stable probiotic bacteria that survives stomach acid and retains its potency in the intestines Bacillus coagulans (also known as Lactobacillus sporogenes) is a lactic acid-producing bacteria that is unique in probiotic supplementation. While this beneficial bacteria is dormant in the bottle, it reverts to a growing bacteria in the intestines. As a result, it resists being killed by stomach acid; in contrast, many Lactobacillus probiotics lose much of their potency before use and do not survive their transit through the stomach. The intestinal tract contains trillions of bacteria that, when a person is healthy, coexist with us in a beneficial, symbiotic relationship. Probiotic bacteria may promote a healthy intestinal environment.
<urn:uuid:f82b7f36-9ffc-4510-b789-28214cb66967>
CC-MAIN-2023-40
https://shop.drjenniferwalden.com/products/bacillus-coagulans
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511106.1/warc/CC-MAIN-20231003124522-20231003154522-00172.warc.gz
en
0.940006
154
2.78125
3
I’ve always been a little confused by the word ‘content.’ There is something lonely and unconnected about the word somehow, when i hear it used with reference to what happens in learning. I imagine a lone student, huddled away in a dorm room, reading sanitized facts in the hopes of passing a multiple choice quiz. The content somehow merging with the learning objective and the assessment to create a world where learning is about acquiring truth from the truth box. … So what happens when we peek under the word ‘content’ to see what lives there? What does it mean for a course to ‘contain’ information? What choices are being made… what power is being used?So what can we say about content? Consider this post that I am now writing and you are now reading (different nows, but that is relevant). Is there any content in this post? If there isn't, then what am I writing and what are you reading and why? If we look at Google's dictionary, we see that the word content has two distinct clusters of meaning. The first cluster has to do with satisfaction and satisfying, being content with a situation or causing someone else to be contented. This is not the meaning Dave has in mind, but it may be relevant, so let's keep it handy. The second cluster is more to the point: the stuff contained inside something. It could be an ingredient in a mixture (contents of a cake batter), an object in a container (contents of a barrel), or an idea in a communication (contents of a blog post). I suspect that Dave means mostly the last, contents of a communication, but the others are also relevant. A course could, of course (sorry), actually contain some objects: handouts, textbooks, performances, events, classrooms, chairs, desks, pens, papers, computers, tablets, phones, and so on. It can even contain virtual objects: blog posts, Twitter, Facebook, LMSes, chatrooms, etc. All of these objects are not irrelevant, but I don't think that's the content Dave was asking about. Those objects, that content, does not seem particularly well-aligned with learning objectives, though I suspect most of us would argue that they should be IF we are going to mess with learning objectives at all. Still, I don't think Dave is asking about objects in a container, like stones in a crate; rather, he is asking about knowledge in our minds. I believe his concern is that we usually treat knowledge in our minds like stones in a crate: an object to transfer from the teacher's crate to the students' crates through the apparatus of a course of study. Knowledge is not transferred from teacher to student like a stone. There is no nugget of knowledge that I can give you, for instance, in this blog post. We speak as if there is, but it is only a convenient manner of speaking. Too often, it is a misleading manner of speaking. It leads us to ask of education: did you get the stone, the chunk of knowledge about fractions that I gave you? did you put it in the correct slot in your hierarchy of stones? and can you retrieve this stone upon demand on a test? I think this pretty much sums up traditional education. Dave doesn't seem to like it, and I don't either. It's stone age education. Actually, it isn't. Calling it stone age seriously denigrates the Stone Age. It's simple, mechanical education, and it works only in very limited situations for very limited objectives. Knowledge is not an object like a stone. Actually, I don't believe a stone is an object like a stone, but that's another post. Knowledge is not composed of discrete, individual chunks. Knowledge is more like a weather system, and I cannot give you some weather. I can give you pause to consider the weather, but I can't bottle (container) some weather (contents) and transfer it to you. Knowledge is a thing like the weather, a different kind of thing. Consider this blog post that I am currently writing and you are currently reading. This juxtaposition of two different nows points to the different kind of thing that I mean when I say knowledge. We want our things to cohere in one place and time, not to smudge across different spaces and times and scales. We don't want things to be in multiple places at multiple times on multiple scales, yet here I am writing now AND here you are reading now. Your reading is already in my writing, as my writing is already in your reading. The knowledge in this post—indulge me here—smudges across my here/now AND your here/now and in some way coheres. It is not as if the knowledge is here like a stone with me now/earlier, is transferred along the wires of the Internet, and is then with you now/later. The knowledge is here/now and enfolds both you and me, like the weather. And like the weather, I can write of raining and you can read of raining, and we will behave as if some chunk of meaning about raining was transferred from me to you, but it wasn't. It's just raining all the way from me to you, but I see only my bit of rain and you see your bit of rain. And of course, we don't see the same bit of rain nor do we see all the rain. Actually, I don't want to say it's raining all the way from me to you. It's more that we are both enfolded in the raining. That's what I mean about knowledge, about content. It isn't a collection of stones to transfer, but a weather system that enfolds us. So how do you design the weather and what are your learning objectives? And welcome to the rhizo-storm.
<urn:uuid:538485e7-ac7c-49ec-97b4-5c32a16af3b9>
CC-MAIN-2020-16
http://blog.keithwhamon.net/2015/05/content-in-rhizo15.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370497042.33/warc/CC-MAIN-20200330120036-20200330150036-00056.warc.gz
en
0.968641
1,217
2.609375
3
The Institute for Democratic Education in America (IDEA) characterizes law based instruction as discovering that prepares each to take part completely in a sound majority rules system. This definition energizes me. It is splendid in its straightforwardness, yet still significant. Before unfurling what”realizing implies in that definition, I need to address popular government and state-funded training since it influences a large portion of the youngsters in the United States. In every government-funded school, vote based system is educated, so wouldn’t that make them all law based on IDEA’s definition. It’s imperative to take note of that while vote based system is educated, understudies are not given a chance to rehearse popular government. Choice and networking This implies having the chance to settle on good choices in a network with solid results not voting in understudy chamber on proposals that are then given to a grown-up power figure to state “yes” or “no” to. As learning extremist Shilpa Jain indicated out me, “On the off chance that we don’t encounter vote based system in our schools, how might we be able ever to hope to wind up with majority rule government in the ‘genuine’ world? We should adjust our scholarly and verifiable comprehension of majority rule government with open doors for training and spaces to find out about the subtleties that occur when you should all in all go to a choice that influences your whole network. In the wake of going to a good school and showing secondary school and preschool in a just domain, I’ve come to settle on an individual meaning of what popularity based instruction is, which unfurls “student” in IDEA’s definition. I see majority rule instruction as discovering that is significant, important, glad, connecting with, and enabling. In anyone learning condition, for example, a school, and in excess of one element, for example, voting, however a way to deal with life and learning and a way to deal with connecting with all individuals from your locale in a way that regards, respects, and listens legitimately to each voice inside it For me, this is the act of genuine popular government, which can show in a wide range of routes in light of you, your locale, and your learning condition Availability and accessibility of democratic Education It must be available for everybody. It implies each person approaches quality training and has their fundamental needs met. This means tending to social issues, for example, poverty and others that influence individuals’ capacity to learn. For instruction to be the vote based, each must be esteemed, tuned in to, and take an interest effectively in their learning and the necessary leadership forms. Improvement in Democratic Education condition A majority rule instruction starts with the first conviction that each person is of limitless esteem. It moves from that point to a second center conviction: The fullest improvement of every one of us is the condition for the full advancement of every one of us. What’s more, the switch of that is valid too: The fullest advancement of all is the condition for the general improvement of each. Law based instruction is less about actualities and dates. It’s substantially more about opening windows and opening entryways gaining from the world, not about the world; increasing from nature, not about life; learning from the inquiries we can create; and learning from majority rule government, not about vote based system.
<urn:uuid:3e903fd7-a7d0-4a89-979f-0dbe8ae16b2d>
CC-MAIN-2020-05
http://idec2006.org/democratic-education/
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250610004.56/warc/CC-MAIN-20200123101110-20200123130110-00138.warc.gz
en
0.952346
717
2.9375
3
If you are under 18, please make sure you have your parents’ permission before providing us with any personal details. Homophobic, biphobic and transphobic bullying are the official terms that describe bullying motivated by prejudice against lesbian, gay, bisexual, trans or non-binary (LGBT) people. Whatever the official terms and whatever form it takes, bullying is always wrong and is never your fault. Bullying of any kind can include anything from name-calling and spreading rumours to physical, sexual or emotional abuse. The simple rule is, that if it’s making you feel upset or threatened, it’s probably bullying. The ways someone can bully another person are many and varied but here are some common signs that you’re being bullied: Behaving in an insulting or intimidating way towards someone because of their sexual orientation or gender identity is unacceptable and you have the right to report it to the police. As hard as it might sound, you need to work hard to tell yourself this is not your fault. Bullies often look for a target and don’t care who they are attacking. And they often use a ‘difference’ in you to make you believe the bullying is your fault. Bullies are often people who feel bad about themselves and they attack others as a way of hiding or distracting themselves from their own problems. Chances are they themselves have been made to feel rejected, different or inadequate and may be under stress or pressure. These are never excuses for bullying another person but if you are the victim of bullying and you are taking what the bullies say to heart, it can be a useful reminder that it probably doesn’t really have anything to do with you or your gender or sexuality. Bullying is very upsetting and can really affect your mental and physical health. Bullying can leave you feeling worried or anxious, depressed, lonely, low in self-esteem and even scared. This can result in missing school or college or avoiding the place or places where the bully exists. Bullying can also often result in LGBT people hiding or denying their sexuality, ridiculing themselves to gain acceptance amongst peers, feelings of dislike of other LGBT people or feelings of shame, anger or bitterness. This is referred to as internalised homophobia – in other words, you can end up attacking yourself. If you’re having any of the feelings described above, you know it’s time to take action to beat the bullies. You have a right to express your sexuality and your gender and you should not be bullied or discriminated against simply because you are lesbian, gay, bi, trans or non-binary. Some simple ways you can stop bullying before it gets out of hand include dismissing them, being assertive or challenging them on their remarks. If they see you are not an easy target or if you cause them to reconsider their views, they may back away. Kidscape has some brilliant simple tips on ways you can practice assertiveness through what you say and your body language. ChildLine also have some great videos which give advice on being assertive and how to build your confidence after online bullying. However, if you don’t feel able to do this, don’t worry, that is perfectly normal and there is no shame in not fighting back. It may be that it isn’t possible or safe for you tackle the problem on your own. If you feel like bullying is getting out of control, here are some simple steps you can take: If you are being bullied and don’t know what to do about it, you can contact ChildLine who are there to help you and provide advice. Call to speak to one of ChildLine’s counsellors for free on 0800 1111 or use online chat. Content reviewed by Kirstie McEwan – Lead tutor in Gender Studies, Cambridge Institute of Clinical Sexology, accredited therapist and trustee of the College of Sexual and Relationship Therapists. 100% FREE & CONFIDENTIAL
<urn:uuid:636bf79d-ae6e-43f0-9006-7681d7011078>
CC-MAIN-2020-16
https://www.brook.org.uk/your-life/homophobic-biphobic-and-transphobic-bullying/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370528224.61/warc/CC-MAIN-20200405022138-20200405052138-00381.warc.gz
en
0.956461
827
4.0625
4
Immunity is passive in nature and is provided by maternal antibodies. At the same time, its own immune system is in a state of suppression. The phagocytosis system is not developed. The newborn shows little resistance to opportunistic, pyogenic, gram-negative flora. A tendency to generalization of microbial-inflammatory processes, to septic conditions is characteristic. The child is very sensitive to viral infections, against which he is not protected by maternal antibodies. Approximately on the 5th day of life, the first cross in the white blood formula takes place and the absolute and relative predominance of lymphocytes is established. The second critical period is due to the destruction of maternal antibodies. The primary immune response to infection penetrates through the synthesis of class M immunoglobulins and leaves no immunological memory. Continue reading And this paradoxical thing once became a discovery for me. That a child needs to survive about 50 snot episodes to form a mature immune system. Fifty! Necessary! That is, the immune system is trained, tuned, tested by these snot. Take away the test material from her – she will not be able to tune. We are so afraid of any snot, we are so worried about them that we are preventing children from being healthy. A little snot – drops in the nose. A little temperature – which also sets up the immune system and teaches it to fight viruses – we get an antipyretic. For us, the normal state of the child is without snot at all. That generally never and for nothing. But if we understand that this is an important stage, that it is better to get chickenpox in childhood, as well as measles, then we can give children much more health – for a future life. Is it not the hardest thing for a mother to let her children get sick? Today, many of their diseases seem to us a tragedy. But if you look at them in the future, they can become healing. Now he will train the immune system, and then he will be able to survive in the flu epidemic. Is it not valuable? Continue reading Rubella is a viral infectious disease that is transmitted by airborne droplets. Rubella is characterized by a slight swelling of the lymph nodes. A pinkish-red rash appears on the body. Rash on the skin can be accompanied by an increase in body temperature, aggravation of the respiratory tract. The incubation period lasts for 11-23 days. Treatment. The patient should adhere to bed rest. If the body temperature has risen, it is necessary to use antipyretics, and antihistamines should be used for redness on the skin. Whooping cough is an infectious disease that is transmitted by airborne droplets and a severe cough appears. The incubation period is from 3 to 14 days. The cough is spasmodic, with mucus secreted. An acute period occurs during the first week of illness. Treatment. Doctors prescribe antibiotics, inhalations, bronchodilators. The patient often needs to be in the fresh air, especially near ponds and in the morning. Continue reading
<urn:uuid:99d04035-d713-4e47-ba96-75f1de05c586>
CC-MAIN-2020-10
http://greshampodiatry.com/list/acute-gastroenteritis
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875142323.84/warc/CC-MAIN-20200217115308-20200217145308-00351.warc.gz
en
0.95839
641
3.1875
3
Being bilingual is perceived very differently today than it was, say 30-50 years ago. I had a friend whose parents were both of South American decent, but they did not teach their children how to speak their native language because they were afraid of the stereotypes associated with it. They did not want their child growing up speaking English with an accent. Nowadays, this misnomer is clearly untrue, but in the not-so-far-away past, this idea was commonplace. Our great melting pot of a nation, as perceived by our forefathers, has had its struggles with blending together and accepting different cultures, traditions, and languages. Recent studies have shown, however, that the benefits of learning a second language are far more widespread than just being able to communicate on multiple levels. These benefits extend into the cognitive, social, and academic arenas. For example, there is evidence that language learning directly correlates with academic achievement on standardized tests. Additionally, there are correlations between language learning and the ability to problem solve and hypothesize in subjects like math and science. Medically, bilingualism has also been shown to stave off the effects of diseases like Alzheimer’s and Dementia by years. Regardless of education, gender or social stature, bilingual subjects began experiencing the effects of Alzheimer’s an average of 4 ½ years later than their monolingual counterparts. In addition to these types of statistics, being bilingual can have a positive effect on your social interactions. Bilingualism can lead to improved self-confidence, a boost in creativity, and an improved interest and ability in meeting and making new friends. It is also a big advantage when entering the workforce. The chances of being hired in today’s workforce are much greater for bilingual individuals than those who speak only one language. So, let’s just go ahead and say it…Being bilingual just makes you smarter and happier in general. In fact, being bilingual increases your attention span and improves your memory. The process of learning a second language helps you to concentrate while exercising your brain and boosting those problem solving abilities. So, if you’ve been on the fence about getting your child into that charter school that emphasizes second language development, maybe you should think again. Perhaps you’re the one who has always wanted to speak another language but have put it off, thinking it really was just a luxury you couldn’t afford. Or, maybe you’ve been afraid to teach your own child the language you grew up with for fear of overloading them at a young age. Whatever your doubts about second language acquisition, we encourage you to do some more research. And while you’re out there investigating this subject, remember that Dynamis Learning Academy is committed to helping your children with all their educational needs. We have tutors that are certified in various languages and can help your child with those specific needs. Contact us to set up a complimentary 15 minute consultation, so we can get your child on the way to learning that second language!
<urn:uuid:0d3c597f-9edf-4cb5-9cd2-448da60c86f6>
CC-MAIN-2020-34
https://www.dynamislearningacademy.com/the-benefits-of-speaking-a-second-language-2/
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738892.21/warc/CC-MAIN-20200812112531-20200812142531-00099.warc.gz
en
0.974704
616
3.34375
3
Inspiring others to join us in caring for animals and the natural world Join the efforts How You Can Help Join our efforts to provide a healthier habitat for all. Select a sustainable practice below to learn more Help Save Orangutans Without our help orangutans could be extinct in the wild within 10 years. Humans are part of the problem because palm oil is used in over 50% of all grocery store items, including peanut butter, snacks, beauty products, shampoo, makeup and more. As demand for palm oil increases, plantations expand causing orangutans to lose their homes and even their lives. How you can make a difference It’s almost impossible to completely avoid palm oil, however, you can ensure the products you’re purchasing are sustainably produced. Download a phone app where you can scan the barcode to view the company’s conservation status. For more information, please visit: To learn more about palm oil in products and how to shop sustainably, view our Sustainable Shopping guide below. Reduce, reuse and recycle tips Every little bit helps create a healthier habitat for all. Ways to reduce waste: Reduce your carbon footprint: Reuse old t-shirts for dusting Use cloth napkins instead of paper Unplug appliances when not in use Drink from reusable coffee mugs Use sponges and rags instead of paper towels Use a refillable water bottle Use lemon juice or baking soda instead of chemical cleaners Use a broom instead of hose or blower to clean driveway Power down computers overnight Recycle the non-recyclables: TerraCycle is a company based in New Jersey that specializes in upcycling or recycling household plastics, including empty toothpaste tubes, potato chip bags, juice drink pouches and cereal bag liners. TerraCycle’s goal is to eliminate all plastic household waste by recycling the “non-recyclable.” Through these efforts, TerraCycle is able to divert millions of pounds of waste from landfills and incinerators each month. Seafood Watch Program It's more than see food and eat it. With demand for seafood growing, the ocean’s supply of fish is shrinking. Fortunately, there’s something we can all do to help stop this disappearing act. Look for the Seafood Watch Guides to help you select seafood that’s plentiful and comes from environmentally responsible sources. Your wise choices will help protect the oceans – and keep fish in the picture. Learn more about the Seafood Watch Program and the Seafood Watch app below.
<urn:uuid:6f89b922-28c0-4872-b901-279624fc1d6d>
CC-MAIN-2020-05
https://www.toledozoo.org/efforts
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251669967.70/warc/CC-MAIN-20200125041318-20200125070318-00098.warc.gz
en
0.880286
554
2.953125
3
The “A Matter of Scale” report, highlights how a diverse and vibrant sector of small farms is providing employment, attracting new entrants and incubating entrepreneurs. A survey of 69 holdings of 20ha and less, undertaken by the Landworkers’ Alliance in conjunction with the Centre for Agroecology, Water and Resilience at Coventry University, provides a preliminary insight into the diversity, productivity, financial viability and multifunctional benefits offered by such farms. The report is accompanied by five short films about key themes arising from the research. A recent BBC survey revealed that “over 70% of British growers say they would reduce their UK operations if access to key labour markets is restricted post-Brexit”. However, the “A Matter of Scale” report offers an alternative vision for the future of UK horticulture. Author of the study, Rebecca Laughton says, “Many young people are attracted to the more varied, meaningful and skilled work offered by small scale organic and agroecological holdings, as opposed to industrial farm work which is perceived to be monotonous. Aspiring new entrants are motivated to learn about systems which address environmental challenges such as climate change, soil depletion and biodiversity loss, and prefer the friendlier atmosphere of small farms and market gardens, where they can learn a variety of skills”. The report shows how organic market gardens, many of which are less than 5ha (the threshold below which Basic Farm Payments are not currently available), are able to produce yields of certain crops that exceed those of non-organic growers. A dramatic increase in the number of small, agroecological market gardens, especially in peri-urban areas, could help reduce the trade gap for fruit and vegetables, while providing pleasant and meaningful all year-round employment for local people and a thriving. Furthermore, respondents in the survey suggested that the health and environmental advantages of vegetables and fruit being produced near to point of consumption and sold directly include freshness, less waste and less energy used in transport. Other key findings include: • Compared to average UK farm incomes the ‘A Matter of Scale’ (AMOS) sample were performing well financially. 78% of the sample was receiving no farm subsidies, and subsidies made up less than 20% of the income for 19% of those who were receiving subsidies. • Most of the farms were adding value either by direct marketing or processing their produce into cheese, juices or preserves. Vegetable box schemes, farmers’ markets and community supported agriculture schemes enable better incomes, while building customer trust through provision of fresh and sustainably produced food. • Barriers to productivity included: lack of capital to invest in equipment and infrastructure, meaning the efficiency of some holdings was less than optimal; affordability of land and accommodation; and lack of technology suitable for small scale farmers. Author of the study, Rebecca Laughton says, “Until now, little research has been conducted into the productivity and viability of small-scale, agroecological farms in the UK. This study shows that they deserve closer attention by both policy makers and academics as they simultaneously address many of the challenges facing twenty-first century food production, including UK provision of vegetables and fruit, fulfilling employment opportunities, reduction of greenhouse gas emissions and food waste, and the re-building of rural communities.” To download the report, click here Why study small farm productivity? In the battle for hearts and minds that underlies most public discussion about food and agricultural policy, the issues of food security and environmental management are used to support most perspectives. A debate about whether or not organic farming can feed the world has raged since the early days of the organic movement. Meanwhile, the sustainable intensification and industrial farming lobbies argue that more people can be fed from less land and fewer resources if we adopt technologies such as precision farming and genetically modified crops. These two perspectives feed into the ‘Land sharing versus land sparing debate’, in which integration of production with ecological management is differentiated from maximising productivity on some areas to free up land for wildlife conservation (Fischer et al. 2014). Productivity underlies all these arguments, and ‘agricultural efficiency’ is seen by many as a holy grail to be sought at all costs. The impact of scale, or farm size, has been an important aspect of this debate. Large farms are often viewed as more efficient because they can achieve economies of scale through using larger machinery and bulk buying inputs, giving an advantage when competing in a low-price environment (Rosset 2006, p. 10). Small farms are often viewed as an old fashioned, romantic anachronism – unprofitable, inefficient and not to be considered as serious contributors to food security or rural economic growth. Small farms are at best considered to be niche – producing ‘high end’ products for an elite market – and at worst to be simply ‘hobby farms’. This dismissive attitude to small farms ignores the fact that 70% of the world’s food is produced on small scale, family farms (ETC 2009, p. 1) and evidence that in many countries there is an inverse relationship between farm size and productivity (Cornia 1985). Peter Rosset (1999) documented the multiple functions and benefits of small farms both in the United States and worldwide and argued that even in industrialised countries small farms can outperform larger ones in terms of productivity and economic viability. It is hard to find evidence of productivity comparisons between small and large farms in the UK, despite the fact that a growing small farm sector is providing food for local people and livelihoods for farmers. Small farms are more often lauded for the wide range of environmental and social benefits they generate. However, producing food is the most important function of agriculture and all farms, large and small, need to be more than just parks for biodiversity conservation and landscape aesthetics. The purpose of this study is to discover how much food small scale farms (20 ha and less) in the UK are producing, as well as to ascertain their financial viability, and set these findings within the context of the multifunctional benefits they deliver. Measuring performance of small farms in terms of productivity, economic viability and delivery of public goods will provide evidence for policy makers about the role that small scale farms have in the UK food system and indicate how policy can support the growth of this sector. The study aims to prompt debate and encourage others to build on this work with further research on the role of small farmers in UK food system. To download the report, click here
<urn:uuid:da4ae6c6-3e5b-47f0-9d19-ca32ab053aaa>
CC-MAIN-2017-47
https://viacampesina.org/en/survey-shows-small-scale-agroecological-farms-produce-high-yields/
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934809160.77/warc/CC-MAIN-20171124234011-20171125014011-00342.warc.gz
en
0.953462
1,346
2.609375
3
Tri-I | Hot Topics | Human Trafficking: Falling for the Trap Human trafficking is a form of modern-day slavery where people profit from the control and exploitation of others and is one of the fastest growing criminal enterprises in the country. There are two main types of trafficking that occur: sex trafficking and labor trafficking. Have you ever been approached? Has anyone encouraged you or someone you know to try out for modeling, earn some extra cash or help them with a special project? Learn what they really want, and how to avoid and report it. Our guest speakers — professionals who work with victims and organizations that are trying to end human trafficking — will help you sort out what is legitimate and what is usually illegal. They will also provide awareness around victims and how they are lured into this industry. The topics for these events are chosen and facilitated by our students. Enjoy lunch on us and add your own opinion to the discussion.
<urn:uuid:2e9d49c3-7422-4a86-a7e4-389c70f8fa1a>
CC-MAIN-2020-34
https://www.ccd.edu/event/tri-i-hot-topics-human-trafficking-falling-trap
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439739177.25/warc/CC-MAIN-20200814040920-20200814070920-00496.warc.gz
en
0.964352
189
2.59375
3
Seili – Hospital Island with a View Seili is known for its history as home to Finland’s best-known leper hospital and mental asylum in the 1600s and 1700s. Seili church and surrounding graveyard still remind of the destinies of Seili’s patients. The mentally ill were treated on Seili until 1960s, when the former asylum was converted for the use of the Archipelago Research Institute, Centre for Environmental Research of the University of Turku. The long presence of humans has haft clear effect on the landscape of the island. The first fields were cleared in the Middle Ages and grazing animals have altered the surroundings. Currently Seili’s natural environment consists of the lush and rich herb-rich forest in the southern parts, the open heritage landscape in the center and the rugged north dominated by coniferous trees. The rarest habitats on Seili are the large hazelnut bush herb-rich forests on the southern part and rocky grasslands in the center.
<urn:uuid:b63089be-ed23-463e-9d2e-e746952787c2>
CC-MAIN-2023-14
https://vitharun.fi/en/seili/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296946637.95/warc/CC-MAIN-20230327025922-20230327055922-00738.warc.gz
en
0.953448
207
2.90625
3
US 20030005230 A1 In general, the cache structure overcomes the deficiency of wasted tag space and reduces associativity. The method provides for storing a single tag along with a pointer to the actual data which is stored in a separate array which includes several lines. Each data block may have a variable length and occupy several lines. These lines are linked together to form a linked list. An invalidation mechanism allows invalidation of lines of the same data block, increasing data efficiency. 1. A method comprising: storing a tag in a tag cache wherein said tag identifies a block of data; storing said block of data into a first and second lines of data in a block data array; storing a first pointer in said tag cache that points to said first line of data; and, storing a second pointer in said block data array that points to said second line of data. 2. The method of storing a last bit in said block data array to indicate whether said second line of data is the last data line of said data block. 3. The method of storing a last pointer in said tag cache to indicate location of the last data line in said block data array. 4. The method of creating a linked list of free lines in said block data array by storing a free lines pointer, a last free lines pointer, and a counter to manage said linked list of free lines. 5. The method of 6. A method comprising: receiving a request for a block of data in a cache comprising a tag cache and a block data array; identifying a tag in said tag cache that corresponds to the requested block of data; reading a first pointer associated with said tag that points to a first line of said block of data stored in said block data array; reading said first line of said block of data in said block data array; reading a second pointer that points to a second line of data in said block data array; and, reading said second line of data in said block data array. 7. The method as recited in 8. The method of 9. The method of 10. A method comprising: storing a tag in a block head cache wherein said tag identifies a block of data; storing the first line of said block of data into a first line of data in said block head cache; storing a pointer in said block head cache that points to a location in a block tail array where the second line of said block of data is stored; and, storing the second line of said block of data in said location in said block tail array. 11. The method of 12. The method of 13. The method of 14. A method comprising: receiving a request for a block of data in a cache comprising a block head cache and a block tail array; identifying a tag in said block head cache that corresponds to the requested block of data; reading a first data line associated with said tag in said block head cache; reading a second pointer associated with said tag in said block head cache that points to a second line of data in said block tail array; and reading said second line of data in said block tail array. 15. The method of 16. The method of 17. The method of 18. The method of 19. The method of 20. A system comprising: a block tag cache to store a tag associated with a block of data, and a first pointer; a block data array to store said block of data at first and second lines of data, said first line of data designated by said first pointer, and said second line of data designated by a second pointer, said second pointer to be stored in said block data array; and, a cache controller to receive a request for said data block and transfer said data block upon receiving said request. 21. The system of 22. The system of a last pointer to indicate the location of last cache line in said block data array to hold the last line of said data block. 23. The system of 24. The system of 25. A computer-readable medium including a program executable by a processor, comprising: a first subroutine to store a tag in a tag cache wherein said tag identifies a block of data; a second subroutine to store said block of data into first and second lines of data in a block data array; a third subroutine to store a first pointer in said tag cache that points to said first line of data; and, a fourth subroutine to store a second pointer in said block data array that points to said second line of data. 26. The computer-readable medium of a fifth subroutine to store a last bit in said block data array to indicate the last line to contain said data from said block of data. 27. The computer-readable medium of a sixth subroutine to store said first line of data in said tag cache. 28. A computer-readable medium including a program executable by a processor, comprising: a first subroutine to receive a request for a block of data in a cache comprising a block head cache and a block tail array; a second subroutine to identify a tag in said block head cache that corresponds to the requested block of data; a third subroutine to read a first data line associated with said tag in said block head cache; a fourth subroutine to read a second pointer associated with said tag in said block head cache that points to a second line of data in said block tail array; a fifth subroutine to read said second line of data in said block tail array. 29. The computer-readable medium of 30. The computer-readable medium of In the following detailed description of the invention, numerous specific details are set forth in order to provide a thorough understanding of the invention. However, it will be obvious to one skilled in the art that the invention may be practiced without these specific details. In other instances, well known methods, procedures, components, and circuits have not been described in detail so as not to unnecessarily obscure aspects of the present invention. The invention includes various functions, which will be described below. The functions of the invention may be performed by hardware components or may be embodied in machine-executable instructions, which may be used to cause a general-purpose processor programmed with the instructions to perform the functions. Alternatively, the functions may be performed by a combination of hardware and software. Importantly, while embodiments of the invention will be described with reference to a trace cache with 4-way set associativity, the method and apparatus described herein are equally applicable to any type of caching strategy and in any memory hierarchy. The invention relates to a method to overcome the inefficiency of wasted tag space and reduced associativity. The general concept is to store a single tag for a variable length data entity in a separate structure regardless of the size of the cache line or the data length. In one embodiment, a pointer is also stored along with the tag, which identifies the location in which the corresponding data is stored. The data itself is stored in a separate array comprising cache lines. A data array may span several lines, which are linked together to form a link list. An invalidation mechanism allows invalidation of all lines of the same data block, increasing structure efficiency. Referring now to FIG. 2, a block diagram of an exemplary computer system 200 utilizing the method pursuant to an embodiment of the invention is illustrated. The computer system 200 comprises a processor 220, a cache 230, a cache controller 240, a main memory 250, and a bus 270. When the processor 220 issues a request for data, the request is processed by the cache controller 240. The cache controller 240 determines the corresponding tag associated with a memory address, and then searches the cache 230 for a match. This look-up procedure will determine whether the requested data resides in cache. If a match results, then the cache controller 240 fetches the corresponding data from cache 230 and delivers it to the processor. If the search does not result in a match, then a cache miss has occurred and the cache controller 240 reports this miss to the processor 220 which will in turn fetch the data directly from main memory 250. Referring now to FIG. 3, an exemplary cache structure pursuant to an embodiment of the invention is shown. The cache structure 300 comprises a Block Tag Cache (BTC) 310, and a Block Data Array (BDA) 320. The BTC 310 stores three pieces of information regarding a cache line. The first entry is Tag 312 which is an abbreviated form of the main memory address of the data. The tag address may be formed in accordance with the particular mapping strategy for the cache structure 300. The caching method pursuant to the invention applies to any mapping strategy that is used. For example, the method pursuant to the invention may be implemented with a 2-way set associativity, a 4-way set associativity, or a direct-mapped mapping strategy. The second entry corresponding to the Tag 312, is a First Pointer 314, which holds the index to the first cache line of the data block. Thus, this information provides an address in the Block Data Array (BDA) where the data corresponding to Tag 312 is stored. Finally, the third piece of information corresponding to Tag 312 is a Last Pointer 316 which provides the address of the last cache line holding the remainder of the data. Referring still to FIG. 3, an embodiment of the BDA 320 is shown. The BDA 320 also contains three pieces of information for every line entry. The Data 322 is where the data referenced in the BTC 310 is stored. The Last 324 entry indicates whether this line entry is the last entry or whether the data length exceeds one cache line and thus additional lines are necessary for complete storage of the data. Finally, the entry marked Next Pointer 326, indicates the address of the next cache line within the BDA 320 holding the remainder of the data. By storing the actual data in a separate structure from the tag structure, only one tag is necessary for a look-up operation. This is because the BDA 320 is organized as a linked list of lines, that can be fetched one line per cycle. Each line includes data and a pointer to the next line in the array. The last line of the data block, which is the last line in a linked list, is marked by Last 324. Another structure is a linked list of free lines in the BDA 320. Two pointers and a counter may be utilized to manage the list. The first pointer is the Free Lines Pointer (FLP) 340. The Last free Lines Pointer (LLP) 342 holds the second of the two pointers. Thus, FLP 340 indicates the address in the BDA 320 where an empty line can be allocated for a new data block that should be stored. And, the LLP 342 indicates the address of the last free line available for storage. Finally, an Empty lines counter may be keeping track of empty lines within the BDA 320 (not shown). The First Pointer 314, and the Last Pointer 316 are utilized to manage unused lines within BDA 320. When an entry in BTC 310 is released or replaced, its corresponding data lines in BDA 320 may be freed up for newly cached data. The FLP 340 and LLP 342 which contain a free list within BDA 320 are utilized to keep track of free lines in BDA 320. In order to properly maintain the free list, a First Pointer 314, and a Last Pointer 316 are used to hold the beginning and the end of a data block within the BDA 320. Similarly, the free list within the BDA 320, also includes the FLP 340, and the LLP 342 to point to the first free line and the last free line respectively. In one embodiment, the procedure for releasing a block of data in BDA 320, when an entry is replaced in BTC 310, comprises setting the Next Pointer 326 of a line pointed to by the Last Pointer 316 to the First Pointer 314 (the first line of the freed block). Additionally, the LLP 342 will be set to the Last Pointer 316 of the freed block (whose next pointer is null). This procedure normally takes two cycles to complete regardless of the length of the data block. Referring now to FIG. 4A, a flow diagram of the method pursuant to an embodiment of the invention is shown. In functional state 408, a cache controller receives a read request from a processor. The request includes a real memory address. In functional state 410, the cache controller identifies the tag corresponding to the memory address. Once the Tag has been formed, in functional state 412, a search of the BTC 310 of FIG. 3 takes place. The Tag 312 field is searched for an entry matching the tag formed in functional state 410. If a match is found, then a cache hit has occurred. However, if no match has been found, then in functional state 414, a cache miss has occurred and the requested data needs be fetched from main memory 250. In functional state 416, after a determination has been made that the requested data is in the cache, the address in First Pointer 314 is used by the cache controller to reach the data in the BDA 320. The address in First Pointer 314 contains the address of the first line where the requested data is being stored. In functional state 418, the data in Data 322 of BDA 320 is transferred to the processor. Next, in functional state 420, Last 324 is checked to see whether it indicates that there is additional data. In functional state 422, the Last 324 indicates that the current line contained all of the data. In this case, the operation ends as all of the data has been transferred to the processor. On the other hand, if in functional state 420, Last 324 indicates that there is more data, then the address of the next line of data is read from Next Pointer 326 of BDA 320 (See FIG. 3). In functional state 424, the data is transferred from the address in the Next Pointer 326 register to the processor, and once again Last 324 corresponding to the new line is checked to see whether this is the last line. This loop will continue until all the data has been read and the Last 324 finally indicates this. Referring now to FIG. 4B, a flow diagram of a write operation to cache memory according to one embodiment of the invention is shown. During functional state 480, a determination is made to write a given data to the cache. In functional state 482, a BDA 320 entry such as entry 350 is allocated for this operation. This allocation may be done, for example, by FLP 340 which keeps track of free lines within the FLP 340. During functional state 484, the FLP 340 is updated by the Next Pointer 326 of the BDA entry 380. This reflects the allocation made in functional state 482. In order to accomplish this, the Next Pointer 326 may be utilized. In functional state 486, the First Pointer 314, and the Last Pointer 316 in the allocated line in BTC 310 is set to the line allocated in BDA 320. Next, during functional state 488, the data to be written into the cache is stored in data field 322. For example, the data may be stored in data line 350 in BDA 320. Finally, the Last 324 bit is set to indicate that this line is the only line of data for the entry at 350. During functional state 490, a determination is made as to whether there is additional data to be stored along with data 350 field. In other words, the querry is regarding the length of the data to be written into the cache. If the data length is longer than what may be fitted in one line, i.e., 350, then the result of the inquiry at functional state 490 is “yes” otherwise the write operation comes to an end as indicated in functional state 492. During functional state 494, the Last 324 is reset or cleared to indicate that there is more data to be stored. During functional state 496, a subsequent BDA 320 entry is allocated such as data 360. In functional state 497, the Next Pointer 326 of the corresponding entry is updated to reflect the linked line. In functional state 498, the Last 324 is once again set to indicate that the data 360 contains the last line of data. In functional state 499, the FLP 340 is updated once again by the Next Pointer 326 of the entry 390. This loop will continue until there is no more data left in the write operation. Referring now to FIG. 5, another variation of the cache structure 500 according to the method pursuant to an embodiment of the invention is illustrated. The cache structure 500 comprises a Block Head Cache (BHC) 520 and a Block Tail Array (BTA) 560. The BHC 520 includes a plurality of ways such as way 530, and way 532. Way 530 comprises Tag 522, First Data 524, Second Pointer 526, and Last Pointer 528. Tag 522 is the tag address corresponding to a given data. First Data 524, is the actual data associated with Tag 522. The Second Pointer 526 provides the location within the BTA 560 where the next line of data is stored. The Last Pointer 528 indicates whether there is a next line with data, or whether the current line is the last line of data. The BTA 560 comprises several entries. Each entry includes Line 562, Last 564, and Next Pointer 566. Line 562 contains the data corresponding to a Tag address. The Last 564 entry may be simply a bit which if set, it can mean that the current entry is the last entry. If, however, the Last 564 is not set, then this means that there is more data, and Next Pointer 566 provides the address of the entry in BTA 560 where the remainder of data is contained. The BTA 560 also has an entry marked Free Line Pointer (FLP) 568 which provides a pointer to the BTA 560 location with available data. In this embodiment, the tag and the first line of data is stored in BHC 520 while the remainder of the data is stored in BTA 560. Referring now to FIG. 6, a flow chart of the operation of cache structure 500 of FIG. 5 is illustrated. In functional state 600, a request to store data in cache structure 500 is made, e.g., by a cache controller device not shown. During functional state 610, a tag is formed to identify a data block to be stored within the cache structure 500. Next, in functional state 612, the tag will be stored in BHC 520 in Tag 522 field. In functional state 614, a first line of the data block is written into First Data 524 in BHC 520. The Second Pointer 526 may be set to indicate that there is additional data stored in BTA 560 at an address pointed to by the Second Pointer 526. However, if the second pointer is not set, then that indicates there is no more data. In other words, there is only one line in that data block. If the length of the data block is greater than one cache line, then the remainder of the data may be stored in the Block Tail Array (BTA) 560. The procedure from this point forward is essentially similar to the write procedure outlined for the cache structure depicted in FIG. 3 (See flow chart in FIG. 4B). Where the data block length exceeds a single line, in functional state 620, a free block within the BTA 560 is identified. The free block may be identified by a pointer address e.g., Second Pointer 526 and Last Pointer 528 within BHC 520. Accordingly, in functional state 622, the remainder of the data is stored at a location pointed to by Second Pointer 526. The structure of the BTA is similar to that of the BDA 320 in FIG. 3 where the length of the data to be stored exceeds one line in BHC 520. The advantage of the embodiment illustrated in FIG. 5 is for data blocks containing only one cache line, which need only BHC access, and only one Next Pointer 566 field is wasted. The insertion of a new block starts from allocation of an entry in BHC 520, using, for example, a Least Recently Used (LRU) algorithm. If a block contains more than one line, an empty line is also allocated in BTA 560, using the FLP 568. During an eviction of a line from BHC 520, the lines pointed by it in BTA 560 are also freed, and appended to a free list of lines using a Last free Lines Pointer (LLP) 570. Thus LLP 570 points to the last line of the newly freed list. The empty lines counter is also updated. During allocation, in case when there are no more free lines in BTA 560, a random set is chosen in BHC 520, and an LRU block is evicted and all its lines in BTA 560 are put in the free list. This operation is repeated as long as needed. Since this operation is time consuming, and can postpone data fetch process, it can start before reaching the point when there are no more free lines. Using a counter of number of free lines, we can start freeing some blocks using some threshold. An access starts by BHC 520 look-up and fetch as in a regular cache. In case, the block has more than one line, on the next cycle, a line is fetched from BTA 560 using a pointer without any tag match. Consecutive block lines are fetched from BTA 560 until the end of the block. This is equivalent to the serial cache operation. The advantages of using the linked list cache over a regular cache that stores a data block in several lines are several fold. First, no tags are wasted since, according to the method pursuant to the invention only a single tag is used for a block of data regardless of what the size of the block is. Thus for example, if a cache line is 8 bytes long, and a given data block is 68 bytes long, instead of using 9 tags (one for each of the 9 cache lines necessary to store the 68 bytes in the data block) only a single tag is utilized. This saving of 8 tags results in reducing the number of ways in the cache which represents reducing power consumption. Alternatively, the reduction in tags results in enabling higher cache hit rate due to increased effective associativity with the same number of ways. Another advantage of the method pursuant to the invention is that it avoids the case where only part of the block is evicted during a cache miss, leaving live but unreachable lines in the cache. In other words, a block is either entirely contained in the cache or it is not there at all. I hereby appoint BLAKELY, SOKOLOFF, TAYLOR & ZAFMAN LLP, a firm including: William E. Alford, Reg. No. 37,764; Farzad E. Amini, Reg. No. 42,261; William Thomas Babbitt, Reg. No. 39,591; Carol F. Barry, Reg. No. 41,600; Jordan Michael Becker, Reg. No. 39,602; Lisa N. Benado, Reg. No. 39,995; Bradley J. Bereznak, Reg. No. 33,474; Michael A. Bernadicou, Reg. No. 35,934; Roger W. Blakely, Jr., Reg. No. 25,831; R. Alan Burnett, Reg. No. 46,149; Gregory D. Caldwell, Reg. No. 39,926; Andrew C. Chen, Reg. No. 43,544; Jae-Hee Choi, Reg. No. 45,288; Thomas M. Coester, Reg. No. 39,637; Donna Jo Coningsby, Reg. No. 41,684; Dennis M. deGuzman, Reg. No. 41,702; Justin Dillon, Reg. No. 42,486; Stephen M. De Klerk, Reg. No. P46,503; Michael Anthony DeSanctis, Reg. No. 39,957; Daniel M. De Vos, Reg. No. 37,813; Sanjeet Dutta, Reg. No. P46,145; Matthew C. Fagan, Reg. No. 37,542; Tarek N. Falmi, Reg. No. 41,402; George Fountain, Reg. No. 36,374; Paramita Ghosh, Reg. No. 42,806; James Y. Go, Reg. No. 40,621; James A. Henry, Reg. No. 41,064; Wilimore F. Holbrow III, Reg. No. P41,845; Sheryl Sue Holloway, Reg. No. 37,850; George W Hoover II, Reg. No. 32,992; Eric S. Hyman, Reg. No. 30,139; William W. Kidd, Reg. No. 31,772; Sang Hui Kim, Reg. No. 40,450; Walter T. Kim, Reg. No. 42,731; Eric T. King, Reg. No. 44,188; Erica W. Kuo, Reg. No. 42,775; Steven Laut, Reg. No. 47,736; George B. Leavell, Reg. No. 45,436; Gordon R. Lindeen III, Reg. No. 33,192; Jan Carol Little, Reg. No. 41,181; Robert G. Litts, Reg. No. 46,876; Kurt P. Leyendecker, Reg. No. 42,799; Julio Loza, Reg. No. 47,758; Joseph Lutz, Reg. No. 43,765; Michael J. Mallie, Reg. No. 36,591; Andre L. Marais, under 37 C.F.R. § 10.9(b); Paul A. Mendonsa, Reg. No. 42,879; Clive D. Menezes, Reg. No. 45,493; Chun M. Ng, Reg. No. 36,878; Thien T. Nguyen, Reg. No. 43,835; Thinh V. Nguyen, Reg. No. 42,034; Dennis A. Nicholls, Reg. No. 42,036; Daniel E. Ovanezian, Reg. No. 41,236; Kenneth B. Paley, Reg. No. 38,989; Marina Portnova, Reg. No. P45,750; Michael A. Proksch, Reg. No. 43,021; William F. Ryari, Reg. 44,313; James H. Salter, Reg. No. 35,668; William W. Schaal, Reg. No. 39,018; James C. Scheller, Reg. No. 31,195; Jeffrey S. Schubert, Reg. No. 43,098; George Simion, Reg. No. P-47,089; Jeffrey Sam Smith, Reg. No. 39,377; Maria McCornack Sobrino, Reg. No. 31,639; Stanley W. Sokoloff, Reg. No. 25,128; Judith A. Szepesi, Reg. No. 39,393; Ronald S. Tamura, Reg.No. 43,179; Vincent P. Tassinari, Reg. No. 42,179; Edwin H. Taylor, Reg. No. 25,129; John F. Travis, Reg. No. 43,203; Joseph A. Twarowski, Reg. No. 42,191; Kerry D. Tweet, Reg. No. 45,959; Mark C. Van Ness, Reg. No. 39,865; Thomas A. Van Zandt, Reg. No. 43,219; Lester J. Vincent, Reg. No. 31,460; Glenn E. Von Tersch, Reg. No. 41,364; John Patrick Ward, Reg. No. 40,216; Mark L. Watson, Reg. No. P46,322; Thomas C. Webster, Reg. No. P46,154; and Norman Zafman, Reg. No. 26,250; my patent attorneys, and Firasat Ali, Reg. No. 45,715; and Justin M. Dillon, Reg. No. 42,486; Raul Martinez, Reg. No. 46,904; my patent agents, of BLAKELY, SOKOLOFF, TAYLOR & ZAFMAN LLP, with offices located at 12400 Wilshire Boulevard, 7th Floor, Los Angeles, Calif. 90025, telephone (714) 557-3800, and Alan K. Aldous, Reg. No. 31,905; Edward R. Brake, Reg. No. 37,784; Ben Burge, Reg. No. 42,372; Paul W. Churilla, Reg. No. P47,495; Jeffrey S. Draeger, Reg. No. 41,000; Cynthia Thomas Faatz, Reg No. 39,973; John N. Greaves, Reg. No. 40,362; Seth Z. Kalson, Reg. No. 40,670; David J. Kaplan, Reg. No. 41,105; Peter Lam, Reg. No. 44,855; Charles A. Mirho, Reg. No. 41,199; Michael J. Nesheiwat, Reg. No. P47,819; Leo V. Novakoski, Reg. No. 37,198; Thomas C. Reynolds, Reg. No. 32,488; Kenneth M. Seddon, Reg. No. 43,105; Mark Seeley, Reg. No. 32,299; Steven P. Skabrat, Reg. No. 36,279; Howard A. Skaist, Reg. No. 36,008; Gene I. Su, Reg. No. 45,140; Calvin E. Wells, Reg. No. P43,256, Raymond J. Werner, Reg. No. 34,752; Robert G. Winkle, Reg. No. 37,474; Steven D. Yates, Reg. No. 42,242; and Charles K. Young, Reg. No. 39,435, my patent agents, of INTEL CORPORATION; and James R. Thein, Reg. No. 31,710, my patent attorney; with full power of substitution and revocation, to prosecute this application and to transact all business in the Patent and Trademark Office connected herewith. FIG. 1 illustrates a variable data length mapping scheme according to prior art. FIG. 2 illustrates a block diagram of an exemplary computer system according to one embodiment of the invention. FIG. 3 illustrates an exemplary cache structure with data lines in a separate linked list array according to the method pursuant to the invention is shown. FIG. 4A illustrates a flow diagram of a method to process a memory request from a processor according to the method pursuant to the invention. FIG. 4B illustrates a flow diagram of a method to process a write operation to cache memory according to one embodiment of the invention. FIG. 5 illustrates an exemplary cache structure with data lines in a separate linked list array according to the method pursuant to the invention is shown. FIG. 6 illustrates a flow chart of a method to write data to an exemplary cache structure. The present invention relates to an apparatus and method for caching data in a computer system. More particularly, the invention relates to a new method of organizing tags and data blocks of variable length in a cache memory resulting in a more efficient use of hardware space and a higher cache hit ratio. A computer system, in its most essential form, typically comprises a processor, a memory unit, and an I/O device with which the computer system communicates with an end-user. The end-user provides the computer system with a program typically comprising a set of instructions or codes directing the processor to perform tasks. Generally, the tasks involve manipulating data that is provided to the computer system by the end-user. Both the data and the codes are stored in the memory unit. The processor reads the codes and the data, manipulates it according to the program, and then stores the result in the memory unit. Both processors and memory units have become faster as the technology has advanced in the field of electronics. However, the speed with which today's processors are able to execute instructions remains much faster relative to the speed with which the memory units are able to deliver stored data. This difference in speed, referred to as memory latency, causes an inefficiency as the processor remains idle while it is waiting for the slower memory to make the next piece of data available. Reducing memory latency is of great interest to computer users because it will result in improved overall performance of the computer system. One way to reduce memory latency is to utilize a faster intermediate level of memory known as Cache. A general cache consists of ways, sets and lines. A way is comprises a plurality of sets which in turn includes a plurality of lines, and a line is a container of a fixed length that stores the data. In a single clock cycle, one look-up and one fetch is done, fetching one line from the cache. Generally, cache stores a tag which identifies a corresponding data. Upon a processor receiving a request for data, a cache controller performs a look-up operation matching an abbreviated portion of the address of the requested data with one or more tags. If the search results in a match, i.e., a cache hit, then the corresponding data in cache is sent to the processor. Otherwise, a cache miss occurs, and the data is transferred from main memory. A look-up operation is costly in terms of power consumption and time savings, and if the data length exceeds the size of a cache line resulting in having to store a referenced data in multiple cache lines, then multiple look-ups are necessary to fully cache the data. There are several possibilities for organizing the cache structure. One possibility is for each cache line to contain the entire block of data. In this approach, the length of the cache line is sufficient to hold the longest possible data block. This approach can cause substantial inefficiencies in memory usage, since the average length of a block of data is smaller than the cache line length. Another approach is to divide a block of data and store it in several cache lines, as illustrated in FIG. 1. Data block 120 is 10 bytes long. However, in this example, the size of a cache line is only 4 bytes. Thus in order to store data block 120, three cache lines are needed. In line 0, the first 4 blocks of data are stored. In line 1, the next 4 bytes, and in line 3, the remaining 2 bytes. Since each line has a corresponding tag and only the first line of the block is looked-up, the remaining tags for line 1, and line 2 are wasted because the tag area is not used, and the cache lines that contain the continuation of the data block occupy lines that could be used for other blocks, hence the effective associativity of the cache is reduced. Now, if the data block contains 100 bytes, instead of 10, then 25 lines are required to cache the data block, resulting in storage of 24 additional tags which serve little or no use.
<urn:uuid:8014f755-a448-43c2-a588-3dcdf2672ec3>
CC-MAIN-2014-10
http://www.google.com/patents/US20030005230?dq=7,444,563
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394011176878/warc/CC-MAIN-20140305091936-00044-ip-10-183-142-35.ec2.internal.warc.gz
en
0.895857
7,427
2.828125
3
What is wood block printing? Celia Rufey considers our renewed love for hand block-printed fabrics using antique wood blocks – a close second to antique textiles The rarity of antique printed fabrics in a length and condition to hang as curtains or cover a sofa has made machine-printed designs copied from period textiles the main option for filling the void. Modern copies are all well and good, but what about block prints? Fabric hand printed from sets of original carved wood blocks with a known date may not offer the complete antique package, but as many blocks are more than 150 years old, this ups the provenance rating considerably. What is wood block printing? Wood block printing is the grown-up version of potato printing that children enjoy. A design is carved in reverse, colour is applied to it and the pattern is stamped onto paper or fabric. This technique, first found in ancient civilisations in China, Egypt and India, took root in England in the 17th century, when printed and painted textiles from India became more widely available. English block printing reached a high point in the 18th century and continued through the 19th, with William Morris hand block printing his designs using natural dyes. Although gradually overtaken by machine printing, block printing for designs of high esteem carried on into the early 20th century. Block prints are in the spotlight again at the moment, with several fabric companies including them in their collections. Most are one-colour motifs cut into a single block and stamped onto cotton or linen. The work is still done by hand, usually in India. Even at this basic level, block printing is exacting but there is a huge jump between printing a single motif and block printing intricate patterns with many colours from antique wood blocks. A dance sequence of multiple complex steps, or working up a difficult jigsaw puzzle, are useful comparisons. Printing from antique wood blocks continues today largely thanks to the determination of Paul Turnbull of textile printers Turnbull Designs. He describes Turnbull as custodians of block printing and the last company with the skills necessary to produce these complex historical patterns. The company has been in continuous production since 1881, and for the last 20 years it has been printing from its specialist unit in Thailand, where the historical blocks are repaired and blocks are cut for new designs. Leading fabric houses that commission Turnbull to block print designs for their collections on linen and cotton include Jean Monro, Hazelton House, Ralph Lauren, Lee Jofa and Schumacher, among others, all either based or represented in the UK. How are printing blocks made? Blocks are made from layers of hardwood, often sycamore, each put together in sections with the grain going in different directions, then backed with a softwood layer and glued together under pressure to prevent warping. Each block is about four inches deep; smaller ones fit the printer’s hand and larger blocks have hand-holds cut to help them be positioned accurately on the fabric using special copper registration pins. One block is required for each element in the design and for each colour, so a complex design can require more than 250 blocks and 15 colours for each pattern repeat. More like this How are the designs created? The design for each block is drawn on its smooth face and wood is cut away from areas surrounding the main design element. Fine details that cannot be carved accurately are created from strips of copper embedded in the wood. Larger areas of colour are applied by using sections of felt inlaid into the block, which act like an ink pad. Colour is put onto the blocks by means of a felt cloth, which is known as a sieve. During a seven-year apprenticeship, printers learn how to position and apply ink to each block. Each layer of colour is allowed to dry before being overprinted by a different colour, called the fall-on. ‘The layering of colours, coupled with the handcrafted vagaries, help to provide a unique character and depth,’ says Paul Turnbull. ‘The reason people love block-printed textiles is the way the application of each block by hand gives subtle differences in pressure and positioning. This creates a unique, one-off print mark. Block-printed textiles represent the pinnacle of handcrafted textile printing.’ SALE STARTS NOW SALE STARTS NOW | Subscribe today for Homes & Antiques magazine direct to your door. Save 55% - just £14.99 every 6 issues on Direct Debit
<urn:uuid:781628e7-f5ed-4b57-80ce-63099ee86511>
CC-MAIN-2023-23
https://www.homesandantiques.com/antiques/collecting-guides-antiques/what-is-wood-block-printing/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644571.22/warc/CC-MAIN-20230528214404-20230529004404-00369.warc.gz
en
0.953324
927
2.78125
3
Literacy development starts long before a child is able to read and write; it begins with a child’s exposure to books, paper and writing materials in the first three years of life. Literacy development encompasses much more than just reading, including spoken language and writing, all of which is developed through a variety of early skills. Parents and caregivers can use an assortment of learning activities to promote literacy development in their infants and toddlers. While reading might seem like an obvious activity, it is one that should not be overlooked. Choose age-appropriate books; while babies love board books with bright colors, toddlers love animal books that tell simple stories. When your infant picks up a book and plays with it or puts it in his mouth, this action is one of the first steps toward literacy. Developing an interest in books and beginning to understand what they are is a necessary skill to be motivated to read as a child grows. Let your child handle the book on his own whenever possible, and point to the words as you read them. Find words in other areas of life, such as a stop sign or label on a can of soup. Children with larger vocabularies often have an easier time reading because they have an understanding of what words they sound out. Teach vocabulary by narrating what you are doing or pointing to an object and naming it; when your child is 12 months or older, he can start naming objects you point to. When your child is a toddler, you can explain words that you use in conversation. If your child does not respond right away when you ask a question with a new word, ask, “Do you know what that means?” Try to have more conversations with your child rather than always giving instructions. Ask questions and give opportunities for your child to make choices and use fuller sentences. Letter Puzzles and Art Learning how letters are different from each other and the sounds they make are essential skills for literacy development. Teach letter knowledge by practicing drawing shapes with your child; children around 18 months to 3 years of age should be able to handle this skill. Play with letter puzzles or decorate a letter made out of construction paper. Read ABC books and ask your child if two letters are the same or different. Help your toddler draw his name and even spell some two- or three-letter words. Phonological Awareness Activities Phonological awareness is the ability to understand that words are made up of smaller sounds. This skill is needed for building words vocally as well as sounding out words that you read. Rhymes are effective for teaching phonemes because they rely on similar sounds at the end of different words. Singing songs also aids phonological awareness because melodies often break up each phoneme to a particular note. By age 2 or 3 years, children can carry on a conversation of a few sentences in length. While older children are able to share daily events on their own, your toddler can create stories with a bit of prompting from you. Ask questions that require more than a “yes” or “no” response. When recalling the day’s events, throw in a “lie” or some other nonsense to make it silly. Look at a picture book or even just a family photo and ask your toddler to describe what he sees, what event is happening or what the characters are feeling. - Jupiterimages/Pixland/Getty Images
<urn:uuid:1fc3d04c-19e8-4fc7-a3d4-fb8e74c1e014>
CC-MAIN-2017-30
http://oureverydaylife.com/learning-activities-promote-literacy-development-infants-toddlers-1340.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549425254.88/warc/CC-MAIN-20170725142515-20170725162515-00413.warc.gz
en
0.96262
695
3.953125
4
Along with the urbanization increase of the 1950s, the arrival of the maquiladoras in the 1960s, and NAFTA in the 1990s, came the proliferation of colonias along the US-Mexico border. Today, the United States-Mexico border region is dotted with hundreds of rural subdivisions characterized by extreme poverty, ‘substandard’ living conditions, reflecting situations and environments that one would normally associate with developing countries. In this regard, Texas, the state that holds the majority of colonias, has over 1800 of them. > Colonias are considered semi-rural subdivisions of substandard housing lacking basic physical infrastructure, potable water, sanitary sewage, and adequate roads. > Colonias are unincorporated, unregulated, substandard settlements that are burdened by the lack of environmental protection > Colonias do not have access to traditional homeownership financing methods and therefore consist of ramshackle housing units built incrementally with found material on expanses of undeveloped land > Colonias have a predominant Latino population where 85 percent of those Latinos under the age of 18 are United States citizens.” Although the majority of the colonias emerged in the 1950s, with an increase of the border population responding to new employment opportunities, the boom of colonias happened in response to NAFTA and the maquila boom of the 1990s. Facing a housing shortage a realizing many of the new border residents could not afford houses in the formal urban realms, nor had access to traditional home finance mechanisms, land developers began subdividing peri-urban areas where law enforcement was weak or nonexistent. Foreign to this type of informal urbanization and land development, the Cranston-Gonzalez National Affordable Housing Act (NAHA) created a federal definition for colonias, listing them as an “identifiable community” in Arizona, California, New Mexico, or Texas within 150 miles of the U.S.-Mexico border, lacking decent water and sewage systems and decent housing and in existence as a colonia before 1989. In colonias, land is sold under a contract for deed arrangement, which means that ownership remains with the seller until the total purchase price is paid. Most of these are undocumented and often including a high rate of interest. Most of the land developed for housing lacks basic the provision of basic services such as water, sewage, and electricity. According to assessments conducted by the Texas Water Development Board (TWDB), 24 percent of households in Texas’s colonias are not connected to treated water and use untreated water for drinking and cooking. In addition, TWDB has estimated a cost of $147.9 million to provide water services to these households, $80 million to provide indoor plumbing improvements as 44% of the homes in the colonias have outhouses or cesspools and $467.3 million to provide wastewater service. Approximately 13 percent of the border’s housing units are mobile homes, or constructions that do not meet code, yet are incremental in nature allowing families to, little by little, consolidate, grow and improve their home. Poverty in the border region is particularly high in Texas, nearly 30 percent. Poverty is not new to the border — nearly half (47 percent) of the border counties have had poverty rates of 20 percent or higher since 1960. The vast majority of these persistent poverty counties are located in Texas. Although the majority of residents are of Hispanic decent -about 97 percent- there is a misconception that a large percentage of the border population are not U.S. citizens. According to the 2000 Census only 12 percent of border residents are non-U.S. citizens, compared to 7 percent for the nation as a whole. This finding is supported by other research that estimates 85 percent of colonias residents are citizens of the United States. Rather than being illegal, colonias are considered “extra-legal,” as they circumnavigate the law rather than violating it. Approaches on how to address colonias are very polar, bringing an interesting debate to light. Although there are some who clearly choose sanitary housing over the need for housing, others more partisan to a libertarian approach, acknowledge that this urban informality brings a much needed flexibility to the system, providing alternatives to those who do not have a choice…. In my opinion Colonias are a perfect example to prompt a view South. Taken form Wikipedia, citing : > Larson, J. E. (2002). Informality, Illegality, and Inequality > United States Department of Housing and Urban Development. State Community Block Grants: Colonias. Washington DC: U.S. Department of Housing and Urban Development. Retrieved March 6, 2014 > Neal, D. E., Famira, V. E., & Miller-Travis, V. (2010). Now is the Time: Environmental Injustice in the U.S. and Recommendations for Eliminating Disparities (pp. 48-81). Washington DC: Lawyers’ Committee for Civil Rights Under Law. > Dabir, S. (2001). Hardship and hope in the border colonias. Journal Of Housing & Community Development, 58(5), 31. Larson, J. E. (2002). Informality, Illegality, and Inequality Colonia prevention: https://www.texasattorneygeneral.gov/consumer/border/colonias.shtml
<urn:uuid:87f86b3b-1fbe-44a1-b24e-6ac46723b632>
CC-MAIN-2017-26
https://favelissues.com/2014/05/09/border-maquiladoas-and-colonias-part-2/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321938.75/warc/CC-MAIN-20170627221726-20170628001726-00397.warc.gz
en
0.931965
1,118
3.609375
4
What is neuroscience? Does the word “DNA” need to be defined? Is particle physics just too hard to explain? These are the kinds of questions that come up when writing about science for kids. At this Northwest Science Writers Association meeting, panelists Emily Krieger, Beth Geiger and the CSNE's Eric Chudler will talk about their experiences creating books, articles, and educational materials for children on topics ranging from memory to comet impacts. They’ll discuss the rewards and challenges of translating complex technical concepts into stories that the under-age set can understand — and enjoy. •Eric Chudler is a Research Associate Professor in the UW Departments of Bioengineering and Anesthesiology & Pain Medicine and Executive Director of the Center for Sensorimotor Neural Engineering. He manages and maintains the award-winning website,Neuroscience for Kids. He is also the author of the Little Book of Neuroscience Haiku, published in May 2013. •Emily Krieger is a Seattle-based freelance editor, writer, and fact-checker. She’s helped edit Science News for Students (formerly Science News for Kids) since 2011, working on both features and news stories and writing companion questions for teachers. She’s also the author of the National Geographic children’s book series Myths Busted!, in which she upends scientific, historical, and pop culture myths. She occasionally fact-checks feature articles for National Geographic magazine, typically science pieces, and fact-checked David Quammen’s award-winning book about zoonoses, Spillover. •Beth Geiger was the recipient of the 2006 AAAS Science Journalist Award for excellence in Science Reporting for Children. She lives in Seattle, Washington. The Northwest Science Writers Association meets at University House in Wallingford. The event is free for members; $5 for non-members.
<urn:uuid:e827000e-ce22-4b1e-b8f6-f7b6c71da6c1>
CC-MAIN-2020-24
http://www.csne-erc.org/node/1
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590348523476.97/warc/CC-MAIN-20200607013327-20200607043327-00117.warc.gz
en
0.927717
390
3.03125
3
A blog series dedicated to Philip Lampi Exploring early American politics one reality at a time. We sail out on orders from him but we find, the maps he sent to us don’t mention lost coastlines, where nothing we’ve actually seen has been mapped or outlined and we don’t recognize the names upon these signs. Okkervil River, “Lost Coastlines“ When you first approach early American political history with the idea of seriously studying it, it can be hard to avoid the feeling that there is nothing you could possibly add. Everything that can be known about the Jay Treaty negotiations or the election of 1828 or the Webster-Hayne debates is already exhaustively covered in numerous books and articles and digested for public edification in textbooks and Wikipedia. If you’re lucky, this feeling dissipates once you get to know the details and nuances and realize that not everything really has been adequately covered. Even then, there are paths you just avoid as overly beaten or simply unmarked. Voting in the Early Republic was one of those topics for me. Reading for comps, it seemed like vote-counting was just about all that a lot of political historians ever did, and you couldn’t even do that, I read, for the early period that most interested me. The data didn’t exist: few of the states voted in the same way or at the same time, especially for president, and almost none of them saved the appropriate records before the advent of what they used to call the Age of the Common Man in 1828. Political scientist Walter Dean Burnham called early 19th-century elections the “lost Atlantis” of American politics, and the seeming lack of data licensed electoral scholars to treat the Federalist-Republican era as a prologue to the real democratic action at best.* Other political historians were increasingly explicit about conceiving early American politics as essentially coterminous with the post-Revolutionary elite better known as the Founders. The philosophical debates and personal relationships of various well-known gentlemen were all that was worth knowing about. In short, there was nothing to see there in terms of popular politics, so I moved on, at least as far as the election results are concerned. A King of New England Philip Lampi’s work shocked me out of that attitude. His story has been written up many times by now — the AAS web site has a page of Phil’s press clips — but it never ceases the boggle the mind. Common-Place co-founder Jill Lepore, writing in The New Yorker, called it “one of the strangest and most heroic tales in the annals of American historical research”: He began this work in 1960, when he was still in high school. Living in a home for boys, he wanted, most of all, to be left alone, so he settled on a hobby that nobody else would be interested in. He went to the library and, using old newspapers, started making tally sheets of every election in American history. His system was flawless. It occupied endless hours. Completeness became his obsession. For decades, at times supporting himself by working as a night watchman, Lampi made lists of election returns on notepads. He drove all over the country, scouring the archives by day, sleeping in his car by night. He eventually transcribed the returns of some sixty thousand elections. Where professional historians and political scientists shrugged off a whole era because they could not send a graduate student to the library or call up a colleague in Michigan to get the proper data, Phil Lampi committed himself to filling in the blanks of the history books, as a hobby, to be pursued in the spare hours of a rather laborious, hardscrabble life. In the process of his quest, Phil also made himself one of the country’s leading authorities on the early American press as well as its election returns. At some point, he got at a job at the American Antiquarian Society, the nation’s leading repository of early American newspapers, to be closer to his sources. After many years of photographing the old papers for microfilm and paging them for AAS patrons, making up his tally sheets and helping out interested scholars on the side, Andrew Robertson and John Hench secured National Science Foundation and National Endowment for the Humanities grants that finally allowed Phil to spend some of the work day focusing on his grand project. The grants also launched the process of organization and preservation that has eventually resulted in the immense New Nation Votes database. Phil is very much a man of the pre-blogospheric era, but in many ways he is a precursor of those self-taught experts who created some of the Internet’s most iconic sites, and the weblog itself, strictly by pursuing their personal interests. New Nation Votes realizes the dream of pioneer Internet history sites like the University of Virginia’s Valley of the Shadow — American history presented with a depth, transparency, and flexibility that no other medium can match. Certainly no other data source can. New Nation Votes users can not only find the once-missing election data, but drill all the way down to Phil’s sources and handwritten notes if they so desire. All that said, it is in some ways a disservice to overemphasize Phil’s biography. If you talk to Phil at any length, you realize that he did not choose his hobby solely for its boringness. He was also an explorer who sensed the gaps in the available political cartography. He once told me that he enjoyed looking at the voting charts he found in some of the reference books at the public library and wondered why they had so little information on the early part of American history. A true “King of New England,” in the Cider House Rules sense, Phil wondered especially about the political “home team,” as he saw it, the Federalists. Why did the Federalists seem to just disappear from the charts and tables in reference books after John Adams lost? Very early in his data collection, Phil realized that this was not remotely accurate. In New England and selected other localities, Federalists competed in elections and held offices all the way into the Jacksonian era, when party names shifted. Phil was far ahead of his time in rediscovering the Federalists, whom historians now see as a tremendous influence on early 19th-century developments in religion, culture, business, and social reform. The counter-Jacksonian America described in Daniel Walker Howe’s What Hath God Wrought?, for instance, has clear Federalist antecedents. Explaining the Series Time to move on to the series mentioned in the title of this post. Blogs being the somewhat confessional medium that they are, let me just admit that I decided to launch this series out of guilt. Here we have Common-Place throwing a special issue on politics, and no one invited electoral historians. Or at least that’s how it might seem. The truth is a bit more complicated, with the small number of people who actually work on early American elections and their lack of availability for the project being one set of reasons, and the greater speed with which other aspects of the issue came together being another. At a certain point, we just filled up, and the Common-Place staff screamed for mercy when I threatened to commission even more articles. The blogosphere seemed to be the answer to the question, how could we pay tribute to Phil — at a time when he is facing serious health issues — and also do some justice to his subject without doubling the size of our already very substantial special issue? My hope is that this last-resort method of presentation will turn out to be a feature, rather than a bug, as they say in the software business. The series will extend the politics issue chronologically past its publication date, allowing people who weren’t available for the issue proper to get involved and giving repeat visitors to the site something new to look at. This format will also be much more directly interactive. Readers and other scholars will be able to comment or elaborate on the different articles as they see fit, even refute or question or correct them if need be. Should that need arise, we can update the posts to reflect the corrections and comments, using the magic of blogging software. With luck, this might become one of the first experiments in blog-based historical collaboration. I have lined up a number of guest posters, including Rosemarie Zagarri, Donald Ratcliffe, Matthew Mason, and Andrew Shankman, plus Andrew Robertson and Philip Lampi themselves. A new post in the series will appear every 3-5 days for rest of October, and then continue on from there as needed, with the floor open for further comments and additional contributions for as long as people want to make them. (Writers interested in contributing should contact the management by private email.) The emphasis will be on little nuggets of political history, rather than political commentary, though rest assured that the larger blog will still be carrying my usual commentary as well. While I will admit to my own agenda items of the series, there is no requirement that all the posts agree with each other or fit together into one seamless interpretation. Let a hundred flowers bloom. Or six, as the case may be. I have decided to set this series up in terms of myths, keying into the “lost Atlantis” motif suggested by Burnham and picked up by Robertson and Lampi. What this means in practice may require some explanation. Myths about early American politics certainly abound, but different ones operate in different quarters of the culture. Some of these myths even seem to cancel each other out. Some citizens and high school textbooks still carry the remains of the old “rise of democracy” narrative, in which the story of America is the story of ever-expanding freedom, or the even older one holding that freedom and democracy never needed to rise because the Founding Fathers gave them to us already whole. Somewhat more knowledgeable others follow the opposite line enshrined in left-leaning popular culture, with expanding freedom still the story but slave rebels and abolitionists and feminists and rural land rioters as the new heroes. Writers in this tradition tend to have little use for any party politician whose credentials can not be burnished in terms of race or gender. Most professional early American historians in recent years have tended to practice a sophisticated version of this latter tradition. All of this is a complicated way of saying that some of the “myths” we will be tackling are traditional cultural myths, others are from the world of textbooks and popular history, while still others come out of the recent historical literature. All are fair game, but we will try to be clear about what sort of myth is being engaged in each case. One final note: while this series is dedicated to Phil Lampi and we will try to address his work and its subject directly whenever we can, the posts in this series will not be limited to voting and elections. Instead, our mission will be to broadly map some of the lost coastlines and interior features of the continent that Phil has been exploring all these years. *Burnham seems to have used this line in different ways in different writings. Andrew Robertson explains: Writing in an essay entitled “The Turnout Problem” (from A. James Reichley, ed., Elections American Style [Brookings Institution, 1987], MIT political scientist Walter Dean Burnham offered what may well be one the most evocative images of political history. “Once upon a time, in the lost Atlantis of nineteenth century politics, American participation rates in both presidential and midterm elections were very close to current participation rates abroad.” The “problem,” as Burnham saw it, was to explain how and why American voting behavior came to deviate from other countries’ practices. Burnham knows a great deal about the history of American voter turnout. He spent innumerable hours as a graduate student holed up in basement archives, poring over the official voting presidential records for elections from 1828 to 1960. More than anyone else except Philip Lampi, Walter Dean Burnham understands that historical research into nineteenth century voting behavior often seems as strange as Captain Nemo’s voyage on the Nautilus. In academia as everywhere else, imitation is the highest form of flattery. The image of a lost, submerged civilization has been widely picked up by other scholars (in the interests of full disclosure, I am one of them). Joel Silbey, in The American Political Nation, 1838-1893 [Stanford University Press, 1991] entitles his introduction to the book “The ‘Lost Atlantis.’” Following Burnham himself, in a somewhat different usage than I first encountered it, Silbey described all of nineteenth century politics as a “Lost Atlantis.” If all nineteenth century politics seems strange and exotic, nowhere is the aqua more incognita than the early republic before 1828. Many synthetic histories have taken pains to tell us so. What historians and political scientists couldn’t know had to be dismissed. In the words of one such historian, “the parties of Hamilton and Jefferson…stood as halfway houses on the road to the fully organized parties of the later Jacksonian era.” What these diehard quantifiers could not dismiss was one nagging difficulty: the “turnout problem.” If Jeffersonian politics were a mere prologue to Jackson, why were there more people (and a more diverse group of people) voting in the age of Jefferson than ever voted for Jackson? This article originally appeared in issue 9.1 (October, 2008). Jeffrey L. Pasley is associate professor of history at the University of Missouri and the author of “The Tyranny of Printers”: Newspaper Politics in the Early American Republic (2001), along with numerous articles and book chapters, most recently the entry on Philip Freneau in Greil Marcus’s forthcoming New Literary History of America. He is currently completing a book on the presidential election of 1796 for the University Press of Kansas and also writes the blog Publick Occurrences 2.0 for some Website called Common-place.
<urn:uuid:6d85c2a5-e497-4a5a-9a20-48597be81e93>
CC-MAIN-2023-23
http://commonplace.online/article/myths-of-lost-atlantis-an-introduction/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224657735.85/warc/CC-MAIN-20230610164417-20230610194417-00683.warc.gz
en
0.964403
2,948
2.78125
3
U.K. Prime Minister Theresa May recently unveiled a “new weapon” in cancer research: artificial intelligence (AI). She and medical experts say AI could prevent 22,000 cancer deaths a year by 2033. Pooled together and cross-referenced with national data, patients’ medical records, lifestyle habits, and genetic information would be used to help the computer algorithms spot cancer earlier. In a speech about using science to transform health, May said: “Late diagnosis of otherwise treatable illnesses is one of the biggest causes of avoidable deaths. And the development of smart technologies to analyze great quantities of data quickly and with a higher degree of accuracy than is possible by human beings opens up a whole new field of medical research.” May refers to the 50,000 Britons diagnosed with lung, bowel, prostate, and ovarian cancer each year. If doctors use AI technologies to reduce late diagnosis by half, estimates U.K. charity Cancer Research, then 22,000 fewer people would die within 5 years of diagnosis. This “pioneering” tech could transform medicine around the world. But does this apply to rarer cancers? How AI-Driven Diagnosis Works It takes time and specialized training to analyze medical images and data, especially now that clinical data grows at a rate beyond human ability to manage. Only a year or so ago, the concept of using AI to manage this data was unheard of. Now 50 percent of healthcare organizations hope to deploy it in the next 5 years. Powered by deep neural networks (complex mathematical systems that can learn on their own from vast amounts of data), AI can spot things humans don’t, make unbiased judgments, and ultimately analyze more data quicker. And the more data these trained computers take in, the smarter they become. The healthcare industry uses AI for 2 key applications: to accelerate drug discovery and to improve cancer diagnosis. Over in the U.S., research into the latter field has exploded. The University of Southern California and MIT are using AI to diagnose breast cancer, Weill Cornell has discovered how to distinguish types of cancer from thousands of images of cells, and Stanford is distinguishing malignant skin lesions from benign ones. The aim is to save lives and reduce healthcare costs. Cancer screenings not only take time but are also subject to error. Using AI to make more informed, accurate clinical decisions could save the U.S. $150 Billion annually. However, both here and in the U.K., challenges abound. The Challenges: Scale and Rare Disease Critics doubt May’s plans to deploy AI on a large scale. The U.K. has the technological capability to cut rates of cancer, but no system in place for “creating the right infrastructure within the health service, separating hype and genuine innovation and ensuring the public’s highly personal data is used responsibly,” according to the BBC. The U.S. faces similar challenges on an even larger scale. On top of that, we don’t have the means to diagnose rare diseases. Take mesothelioma, a rare form of cancer caused exclusively by exposure to asbestos. About 3,200 Americans are diagnosed with mesothelioma, but that’s a relatively small number compared to the 224,390 diagnosed with lung cancer. Due to the low incidence rate and lack of public awareness about the disease and how it’s caused, we have a serious lack of mesothelioma research. Without research, we have no data. Without data – and masses of it – AI can’t work effectively. So where do rare cancers come into the picture? The Future Looks Brighter with Research For a long time, mesothelioma patients have had no possible medical solutions besides surgery. Immunotherapy drugs have made advancements, but even those only extend patients’ short survival rate so much. As with other cancers, successful treatment of mesothelioma relies heavily on early diagnosis. Unfortunately, mesothelioma diagnosis takes too long. The latency period between first exposure to asbestos and first signs of disease can take anywhere from 20 to 50 years, and even then, the symptoms are often mistaken for a cold or the flu. Few people realize they were exposed to asbestos, because many men and women were first exposed to asbestos when asbestos companies hid those risks from the public. AI is still in its infancy, but experts believe the healthcare industry is only a few years away from ubiquitous use. That gives us little time to dedicate critical funds to mesothelioma research, so that the people dying prematurely from asbestos injuries can make the most of AI, too. Could we save any of the nearly 40,000 lives lost to asbestos-related diseases every year? We don’t yet know. But it’s clear AI could fundamentally change how we approach mesothelioma, one unfairly injured patient at a time.
<urn:uuid:cc127944-db54-4a24-b85c-068607acff82>
CC-MAIN-2020-24
https://www.sokolovelaw.com/blog/ai-cancer-death-prevention/
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347435987.85/warc/CC-MAIN-20200603175139-20200603205139-00012.warc.gz
en
0.938804
1,020
3.578125
4
The Barclays came to Gloucestershire from France during the Norman Conquest. Originally, their name was spelt 'de Berchelai', which may be the Anglo-Saxon spelling of 'beau' (beautiful) and 'lee' (meadow or field). Further more, there was a prepondency of the first names Roger and Ralph among the early Gloucester settlers.The Earls of Berkeley built Berkeley castle in Gloucestershire as a fortress in 1153. It was to acquire infamy in 1327 when Edward II was imprisoned and murdered by his Queen.Early in the 12th century Theobald de Berkeley settled in the North East of Scotland, and this branch of the family settled in Towie, Mathers, Gartley and Pierston in Aberdeenshire, though principally at Mathers. It was this estate that Alexander Barclay acquired on marrying the sister of the Great Marischal of Aberdeen in 1351.The Barclays played a leading role in the Wars of Independence.Walter de Berkeley was Chamberlain of Scotland in 1165, and this high office meant a close relationship with his royal master, William the Lion. Sir David Barclay was a close associate of Robert the Bruce and was present at most of his battles including Methven, where he was taken prisoner.In the mid-seventeenth century Sir David Barclay acquired the estate of Urie, near Stonehaven in Kincardineshire (Aberdeen), on his return from the Thirty Years War. He had attained the status of Colonel as a professional soldier who served in the armies of Gustavus Adolphus, King of Sweden. Officially he retired in 1647, though this was not to a peaceful retirement, for in the following year (1648) Colonel Barclay took up arms for Charles I. He served as a Scottish representative to London under the rule of Cromwell.The Restoration of 1660, however, saw a reversal of his personal fortunes.He was committed prisoner to Edinburgh castle upon charge of hostility to the government that stemmed from his support for Charles I, although he was soon liberated through the influence of powerful allies made during the civil war. This period of confinement saw the genesis of another important facet of Barclay history - David Barclay was converted to the Quaker faith, or the 'Society of Friends', by the Laird of Swinton. Such was the extent of the family's conversion that David's son, Robert Barclay (b.1648), published a Quaker tract in 1675 called:'An Apology for the true Christian Divinity as the same is held forth and preached by the people called in scorn Quakers'. This repudiated his education at the Scots College in Paris that was firmly Catholic.Beside strong links with the Quaker faith, the Barclay history is also notable for the strong shipping and trade links established with Europe.
<urn:uuid:a5acd6f9-daa8-4fc0-a218-5eb4e8b2a042>
CC-MAIN-2020-29
https://www.heritageofscotland.com/clans/Barclay/85
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657151761.87/warc/CC-MAIN-20200714212401-20200715002401-00329.warc.gz
en
0.977395
590
2.90625
3
Heat treatment, also known as annealing, is a common step in the semiconductor fabrication process. A buildup of radiation-induced localized charge within the semiconductor and insulator alters local field distribution, threshold voltage, and leakage current. NASA's patent-pending technology implements an annealing process on a system level directly on a chip for annealing defects and improving device performance with heating done in the laboratory. The annealing may be performed inside an oven or upon a hotplate. A sys-tem-on-microheater provides defect annealing capability for recovering bulk trapped charges and interface states. The healing starts simply by heating the chip in a process that can be compared to that of a human's immune system — something capable of detecting and quickly responding to any number of possible assaults in order to keep the larger system working optimally. A microheater is monolithically integrated on the backside of a generic Complementary Metal Oxide Semiconductor (CMOS) chip for an on-chip annealing system (figure, left (b)). Compared to a stacked microheater, the monolithic integration reduces the die profile that accordingly enhances the heating power efficiency and heating/ cooling rates, which was verified experimentally and numerically. The self-healing microheater is controlled by a temperature feedback circuit to maintain the desired temperature. All circuits under the treatment are unbiased in order to avoid any side effects on normal devices. A control circuit block is programmed to monitor a device parameter shift, such as the threshold voltage on the same chip, in order to determine the need for treatment. A control circuit triggers the micro hotplate and senses the temperature to adjust the target temperature and duration. The microheater and the system-on-chip are fabricated separately and stacked into a single package that can be implemented on any arbitrary commercial off-the-shelf device as a generic approach.
<urn:uuid:6f963e3c-6205-4777-99de-fad8a8d79cca>
CC-MAIN-2020-29
https://www.techbriefs.com/component/content/article/tb/techbriefs/electronics-and-computers/33388?m=1016
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655890566.2/warc/CC-MAIN-20200706222442-20200707012442-00409.warc.gz
en
0.897364
392
3.53125
4
The Witch-Cult in Western Europe The Witch-Cult in Western Europe by Margaret Murray was published in 1921, at a time when the influence and success of The Golden Bough by anthropologist James George Frazer was at its height. In those days Margaret Murray was celebrated in university circles as the expert on western witchcraft. In the period 1929-1968 she even wrote the article on witchcraft in the successive editions of the Encyclopaedia Britannica. In 1962, her main work was reprinted by Oxford University Press. Her theory, also known as the witch-cult hypothesis suggests that the things told about witches in Europe were in fact based on a real existing pagan religion that worshiped a horned god. Murray's theory, as she explained in this book and the subsequent The God of the Witches (1933), consists of the following elements: - Until the 17th century there was a religion, much older than Christianity, which all over Western Europe had supporters both among ordinary people and the ruling classes. - Central to the worship stood a horned god with two faces, known to the Romans as Janus or Dianus. (This cult of Dianus was of the type James Frazer described in detail in “The Golden Bough”). - The horned god represented the cycle of seasons and harvests. It was believed that he died and periodically returned to life. - On earth, the horned god was represented by chosen human beings. There were some celebrities among them, such as William Rufus, Thomas Becket, Joan of Arc and Gilles de Rais. They all died a tragic death as a ritual sacrifice to insure the resurrection of the god and the renewal of the earth. - In the villages the witches meetings were presided by the horned god. Pre-Christian observers of this events might have thought that these witches were worshiping the devil, when in reality they were celebrating the pre-Christian god Dianus. - The preservation of this ancient religion was entrusted to a variety of indigenous peoples, small in stature, who were driven out from their land with each new invasion. This would also explain the stories about fairies, gnomes and other ‘small people’. These creatures were very shy but were able to pass the knowledge of their religion to ordinary people. The witches were their pupils and thus the heirs of the ancient religion. - According to Murray, the (local) covens consisted of thirteen members: twelve ordinary men and women, and an officer. All members were required to hold a weekly meeting (named 'esbat' by Murray) and to attend the larger Sabbats. - There was a strict discipline in the covens, and whoever missed a meeting could be severely punished and was sometimes put to death. - The organization and structure were so good that Christianity had to wait until the Reformation before getting a stronger grip on the population. A blatant attack on the influential rival was needed, and that occurred with the great witch persecutions. Reception of the theory by modern scholars The idea of a witch cult that until early modern times managed to survive, is now largely obsolete. Most but not all modern scholars of witchcraft generally dismiss it as romantic nonsense. From the 1920s on, Margaret Murray’s theory was assailed by critics such as George Lincoln Burr, Hugh Trevor-Roper and more recently by Keith Thomas. Other scholars, however, insisted that despite the exaggerated claims she made there is still some truth in her theory. One of them, Arno Rune Berg, noted in his book Witches, Demons and Fertility (1947) a number of 'ordinary' elements that were cited in descriptions of the Sabbath. This could be an indication there had actually been meetings, which would have transformed into phantasmagoria later, under the influence of the imagination. Most modern scholars of the history of witchcraft agree that it is very unlikely that such a witch-cult really existed, or that this cult or religion came to an end because the Christian church wanted to eridicate the followers of a pagan tradition. One of these modern critics, social anthropologist Alan Macfarlane criticized Murray's work in his book Witchcraft Prosecutions in Essex, 1500-1600: A Sociological Analysis. He says that his main criticism on Murray's work is that she used all sorts of things of European folklore, pulling them out of context thus creating a totally wrong image of European witchcraft. He argued that she had taken the things that people believed as a representation of what actually happened. Although in her book she had shown that people believed in a witch-cult, she failed to show that there really had been such a thing. From his own research on witchcraft in Essex Macfarlane concluded that he did not find much of the claims she had made: no traces of a Sabbath, Coven or the demonic pact were found, except perhaps with the witch trials of 1645. In his study he had found no evidence that there had been a pagan, underground cult, nor any organization of people who where called witches. Likewise Keith, Thomas criticises Murray for her selective use of evidence and what he calls 'the deficiencies of her historical method'. Recently, however, feminist scholars have taken up Murray's thesis about persecuted witches in Medieval Europe as members of a religion of the Mother Goddess which originated in the Paleolithic era. Also, professor Tanya Marie Luhrmann's description of modern witches in her book Persuasions of the Witch's Craft: Ritual Magic in Contemporary England does not resemble in any way the devil-worshipping creatures to be feared like the ones pictured in the Malleus Maleficarum. Influence on modern witchcraft - The Triumph of the Moon - The Rise of Modern Pagan Witchcraft, Ronald Hutton, Oxford University Press, 1999, - Frazer, James George, "Chapter III: Sympathetic Magic; 1. The Principles of Magic", The Golden Bough: A study of magic and religion, Project Gutenberg - Encyclopedia of Social and Cultural Anthropology: 'Witchcraft and Sorcery' - T.M. Luhrmann, 'Persuasions of the Witch's Craft: Ritual Magic in Contemporary England', 1989. - Diane Purkiss, The witch history: early modern and twentieth-century representations
<urn:uuid:6f180eb6-c0db-4b06-8946-d72755cd946d>
CC-MAIN-2014-23
http://en.wikipedia.org/wiki/The_Witch-Cult_in_Western_Europe
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1404776427226.68/warc/CC-MAIN-20140707234027-00025-ip-10-180-212-248.ec2.internal.warc.gz
en
0.974436
1,299
3.171875
3
A case study in the Pursat Province of Tonle Sap Lake, Cambodia by Y.K. Eugenia Kwok, University of Guelph, 2017 (Advisor: Evan Fraser). Women’s contributions in small-scale fisheries of Tonle Sap Lake are often overlooked due to socio-cultural expectations of roles and responsibilities. I investigated whether there are differences between men’s and women’s perceptions of 1) fishing and non-fishing practices, 2) power, access, and control over fishing resources, and 3) conservation and conservation areas in the Pursat province of Cambodia. I interviewed fishers and key informants and found that men more frequently acknowledged unequal power dynamics, access to, and control over fishing resources than women. Both groups had contrasting ideas of community fisheries and conservation. Fisherwomen believed they faced distinct health and safety challenges in conservation areas. Gender norms and community perspectives engrained specific roles and practices for women that limited more active participation. Future programs must be designed with detailed understanding of the ways that men and women perceive their engagement in fisheries and how norms may shape both opportunities that they have to actively participate in management. Contact: Eugenia Kwok
<urn:uuid:0beca0dc-be2d-46c6-9f28-b95811a829eb>
CC-MAIN-2020-10
https://www.mekongfishnetwork.org/projects/perceptions-gender-dynamics-small-scale-fisheries-conservation/
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145438.12/warc/CC-MAIN-20200221014826-20200221044826-00364.warc.gz
en
0.941979
242
2.578125
3
Research Spotlight on Recruiting & Retaining a Highly Qualified, Diverse Teaching Workforce NEA Reviews of the Research on Best Practices in Education Over the next decade, schools in the United States will need to hire many new teachers. Four factors will affect the recruitment of these teachers: - A shrinking teaching force - A growing student population - A lack of diversity among teachers to match the diversity of students - A need for teachers in specific types of schools, geographic locations, and subject areas In addition to recruiting new teachers, schools will also need to look at the retention of teachers already in the workforce and understand the reasons teachers leave. Some sources estimate that 50 percent of the teachers currently in our classrooms will either retire or leave the profession over the next five to seven years. The statistics for teacher turnover among new teachers are startling. Some 20 percent of all new hires leave the classroom within three years. In urban districts, the numbers are worse. Close to 50 percent of newcomers leave the profession during their first five years of teaching. See The High Cost of Teacher Turnover (National Commission on Teaching and America's Future, 2007) The problem of a dwindling teacher population will be compounded by the growing student population as well as the movement toward progressively smaller class sizes. Filling the ranks of teachers also will require recruiting teachers for difficult-to-fill schools, particularly in urban and rural areas. Finding teachers for selected subject areas and for certain geographic regions. And encouraging more minorities to become teachers, as insufficient numbers of them are currently entering the profession. With 40 percent minority students and 5 percent minority teachers predicted for 2010, a critical shortage of educators and role models who reflect their race and ethnicity may be at hand. This shortage could lead to a failure of all American students to acquire the academic, personal, and social skills they need in a multicultural society. NEA believes that strong programs of teacher recruitment are necessary to maintain and enhance the teaching profession. These programs should emphasize the recruitment of underrepresented candidates and should include a policy of affirmative recruitment (NEA Handbook, 2008, Resolution D-2). Resolving the teacher shortage is not strictly a numbers game. Much has been said about the need to bring more young people into the teaching profession, but too little attention has been paid to holding onto the quality teachers already hired -- both beginning teachers as well as more experienced ones. NEA believes that retaining these teachers in our classrooms requires giving them adequate preparation, support, leadership, and autonomy as well as compensation that reflects their professional stature. Here are some related articles and research on recruitment and retention: - Eight Questions on Teacher Recruitment and Retention: What Does the Research Say? - (Education Commission of the States, 2005) - This article focuses on the characteristics of schools and districts that are most likely to be successful in recruiting and retaining a highly qualified and diverse teaching workforce. - Instructional Leadership and Monitoring: Increasing Teacher Intent To Stay Through Socialization - National Association of Secondary School Principals: NASSP Bulletin, 2006) - This study examines principal monitoring and beginning teachers' experiences through interviews. The findings indicate that socializing into an ineffective school will lead to ineffective instructional practices, thus setting up new teachers for failure. - A Possible Dream: Retaining California Teachers So All Students Learn - (California State University 2007) - This report contends that unless California understands and addresses the problem of teacher attrition and turnover, thousands of additional students in the coming years will continue to enter classrooms without qualified and experienced teachers to instruct them. - Teacher Recruitment and Retention: A Review of the Recent Empirical Literature - American Educational Research Association, 2006) - This article critically reviews the recent empirical literature on teacher recruitment and retention published in the United States. It examines the characteristics of individuals who enter and remain in the profession. Have comments or suggestions? Please contact us.
<urn:uuid:62338977-1f49-4548-a932-e0671a752604>
CC-MAIN-2013-20
http://www.nea.org/tools/17018.htm
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701562534/warc/CC-MAIN-20130516105242-00073-ip-10-60-113-184.ec2.internal.warc.gz
en
0.944307
794
2.96875
3
‘‘Fee Simple Ownership’’ is a form of real property ownership in which a property owner unconditionally controls a specified piece of land, including all structures and rights to use the property. It is the most complete interest in real property someone can have. The term is also used as ‘fee simple absolute’. Fee simple ownership has both geographic and temporal dimensions. The term not only conveys control over the three dimensions of property – across the surface and extending within the boundaries of the property upward and downward, but also conveys control of the property indefinitely into the future. Private property land rights associated with fee simple ownership include the right to develop the land, the right to till the soil, the right to cut timber, the right to exploit subsurface minerals, and sometimes to use its water resources. A fee simple owner of property is sometimes described as owning the entire ‘bundle of rights’ or holding the entire ‘bundle of sticks.’ Fee simple ownership of property may be divided in three specific ways: (1) physically; (2) by specific use rights; and (3) over time. The physical division of property into two or more parcels of land allows the fee simple owner to sell or give away physical portions of the property while retaining others. Also, the owner may partition and sell certain rights to utilize resources of the property. For instance, the right to extract minerals from the property may be sold to another person while the original owner retains rights to the other uses of the property. Finally, the fee simple owner of property may create present and future interests in the property through legal documents such as a wills or rental/lease agreements. It is important to note that while fee simple ownership bestows both material and spatial rights to the use and enjoyment of property, those rights are also limited by local, state, and Federal laws. The use restrictions conveyed by local zoning ordinances limit a property owner’s ability to utilize the property for its ‘highest and best use.’ State laws related to construction materials and practices restrict building designs for structures on real property. Finally, Federal regulations concerning the filling and dredging of wetlands limit a property owner’s use of surface and subsurface materials.
<urn:uuid:d58be9c5-2b65-4e39-abee-688e75a101d9>
CC-MAIN-2023-40
https://community-planning.extension.org/fee-simple-ownership-and-land-use-rights/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510326.82/warc/CC-MAIN-20230927203115-20230927233115-00525.warc.gz
en
0.936455
467
3.015625
3
Consideration Notes: Everything You Need To Know Consideration notes indicate the items of value that are exchanged by each party to a contract.3 min read Consideration notes indicate the items of value that are exchanged by each party to a contract. This quid pro quo transaction is essential to create a contract that can be legally upheld by the court. For example, if you promise to sell someone your car for $1,000, the money and the car each constitute consideration, thus creating a valid purchase contract. Types of Consideration When two parties exchange promises, an agreement is called a bilateral contract, executory consideration has been created. Executed consideration occurs when one party makes a promise in exchange for the action or inaction of another party. When the latter condition occurs, the consideration has been executed. Executory consideration is not yet executed. Features of Valid Consideration - To be valid, the party who agrees to do or not to do something as part of the contract terms must not have already been planning to voluntarily engage in that specific action or inaction. That's because he or she is not offering consideration. - Anyone can provide the consideration provided it is done so on behalf of the contracted party. - Consideration can be given before, at the time of, or after the contract is signed. Past consideration, for example, would be a promise to pay a debt that was already incurred. This type of consideration is often not valid because the person was already obligated to pay. However, one valid example would be if you work to plant crops for a farmer and he or she promises to pay you at harvest time. Your labor would be considered valid past consideration. Present consideration means that both items of value are provided at the same time, such as when you order food and pay for it upon delivery. Your agreement to purchase the meal constitutes a valid contract. Future consideration, also called executory consideration, is when consideration is provided at a later established date. - Consideration must exist and have some legal value, though this value does not need to be equal to the consideration provided by the other party. However, if consideration is inadequate on one side the court may consider whether the other party signed the contract of his or her free will. - Forbearance to sue is considered valid consideration provided the actions described in the contract are not illegal. - An existing legal duty or obligation is not valid consideration. - Consideration that is illegal or against policy is not valid. For example, if someone offers a third party $500 to attack their enemy but does not pay up, the person who conducted the assault cannot seek legal recourse because the consideration was illegal, rendering the contract invalid. This is true even if only part of a single consideration is illegal. Case Law Examples The 1842 case of Thomas vs. Thomas explains the concept of inadequate consideration. In this case, a property was rented for £1 even though it could have commanded a much higher price. The court ruled that the consideration was valid, indicating that even though consideration was inadequate, individuals are free to make bad bargains. This case also illustrates that consideration must have some economic value. Another case that illustrates this point is the 1853 case of White vs. Bluett, in which a father promised to forgive a debt he was owed by his son under the condition that his son would stop complaining about the terms of his will. This consideration was found invalid by the court, which ruled that a promise to stop complaining does not have economic value. The 1960 case of Chappel & Co Ltd. vs. Nestle Co. Ltd. found that candy wrappers submitted as prize entries had economic value and could act as valid consideration. However, the 1991 case of Lipkin Gorman vs. Karpnale found this was not true for casino chips. The concept of performance of an existing duty is illustrated by the 1925 case of Glasbrook Bros. vs. Glamorgan City Council, which found that civil servant services can constitute consideration if they go above and beyond what would be expected in the ordinary course of duty. For example, the police department may charge money to have its officers staff a private event after-hours. If you need help with consideration notes, you can post your legal need on UpCounsel's marketplace. UpCounsel accepts only the top 5 percent of lawyers to its site. Lawyers on UpCounsel come from law schools such as Harvard Law and Yale Law and average 14 years of legal experience, including work with or on behalf of companies like Google, Menlo Ventures, and Airbnb.
<urn:uuid:8c0bdcb4-58b5-44d7-be7e-18e4fcbeea88>
CC-MAIN-2020-10
https://www.upcounsel.com/consideration-notes
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145282.57/warc/CC-MAIN-20200220193228-20200220223228-00039.warc.gz
en
0.970316
934
2.671875
3
Houston's petrochemical industry stands to increase business due to recent updates increasing mileage standards in the fuel laws. In order to meet the requirements, auto manufacturers will have to develop more efficient engine technologies, and reduce overall vehicle weight, a shift that will open the door for lighter materials including plastics. Houston area (Baytown Texas, Freeport Texas, Seadrift Texas and LaPorte Texas) Chemical plants produce many of the raw plastics that already are being used to make vehicle components and will be instrumental in meeting auto maker needs and the updated industry standards. The Southeast Texas Chemical Refineries in and around the Houston Texas area maintain more than 1/3rd of the nation's capacity for plastic resin production including Polyethylene (aka PET, PETE or the obsolete PETP or PET-P), Polypropylene, or polypropene (PP), and Polyvinyl chloride (PVC). The new energy legislation requirements raise the federal standards that automakers must meet to an average of 35 miles per gallon for cars, sport utility vehicles (SUV'S) and small (1/2 ton or less) trucks. This relates to an average increase of 8 - 13 miles per gallon, up from the current standard of 27 miles per gallon for cars and 22 miles per gallon for trucks and SUV's. While this could result in big business for the plastics manufacturing industry, the increased fuel mileage laws signed by President Bush in December 2007, does mean that auto manufacturers will have to adjust the way many car parts are designed. In order to fully comply with the new fuel economy legislation by 2020, vehicles will need to reduce GVW by an average of 30% and recent advances in the strength and design flexibility of plastics are expected to be of major importance. Yet, while chemical companies may see this as an opportunity, consumers should be aware of the strength limits in plastics and other lightweight materials and what the effects are when it comes to safety and vehicle costs. Plastic auto parts are not new as many components which were originally made of metal, have already have replaced by a plastic counterpart. A few examples are some parts of bumpers (Polypropylene), cooling fans, door and window handles, fuel tanks (polyethylene), and many components that are concealed behind the dashboard and under the hood. According to the American Chemistry Council, the average car's gross vehicle weight (GVW), includes just over 330 pounds of plastics and similar compounds, approximately 8 percent of the GVW. The plastics industry has an answer to the misconception that reducing the weight of cars could leads to more fatalities in collisions. While plastics don't offer the same protection of steel, they more easily lose any perpetual energy which carries a vehicle further in a collision. An example would be that polyethylene fuel tanks, which can weigh as much as 30 percent less than comparable steel tanks are safer because during a collision, they wouldn't create sparks. A polyethylene tank would more easily transform in shape without reducing their size and thereby potentially raising the pressure of any fuel within the tanks. Polypropylene vehicle bumpers are advantageous because they not only reduce weight, but they can absorb the energy of a (minor) collision and then regain their original shape. Smaller cars don't offer the same overall protection as a larger vehicle would which can be a major concern during a collision but many auto manufacturers are improving safety with additional airbags, anti-lock brakes, carbon fiber components, and even heads up displays. While it is widely agreed that future cars and trucks may become lighter and smaller in response to higher fuel costs and the new fuel mileage requirements, auto manufacturers are not expected to cut corners on safety or performance. Most representatives and consumers alike are less optimistic when it comes to potential increases in sticker price. The new fuel efficiency requirements are expected to save drivers in the long run with a projected savings of $22 billion USD by 2020. This number of course is only estimated, as the next decade of technological improvements have yet to be discovered. Improvements in electric cars, hydrogen fuel cells, alternative fuels (biofuel), and even cars that run on compressed air are being developed and improved right now.
<urn:uuid:1b5d5136-6a1e-4311-90bb-9eeee85f5a5e>
CC-MAIN-2013-20
http://e85.whipnet.net/news/plastics.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702127714/warc/CC-MAIN-20130516110207-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.960423
843
2.65625
3
It’s so dark outside that at first, we can’t see anything. The first sounds are the cackling of ring-necked pheasants. Out of the darkness, an eerie sound reminiscent of a low note played on a wooden flute echoes across the prairie; this is the booming of the greater-prairie chicken. I joined Randy Arndt, preserve manager, and Hilary Haley, conservation coordinator, for The Nature Conservancy in Missouri’s Dunn Ranch Prairie before dawn in a blind this April to see the prairie chickens on their ‘booming grounds’ (also known as a lek). Prairie chickens need large prairies (at least 3,500 acres of permanent grass) to survive. Starting from 1,000 acres in northern Missouri that have never been plowed, over the years Dunn Ranch Prairie has been working to restore a fully functioning tallgrass prairie ecosystem. They now have 3,300 acres restored to 100% native vegetation – an oasis for prairie chickens. As the dawn broke, 16 shadowy figures took shape on the booming grounds. It’s easy to see why European settlers called these native grouse “prairie chickens.” In the dark, were it not for the booming sound, we could have mistaken the birds for a lost barnyard flock. Gradually, as the light brightened, the characteristics that make prairie chickens unique became apparent. Even when at rest, the males have vibrant orange eyebrows. When they start dancing, things get really wild. They inflate two air sacs in their throat to make a ‘booming’ noise – when inflated the air sacs look uncannily like an orange poking out of either side of the bird’s throat. As the male dances, vigorously pumping his feet, he also raises feathers that usually rest at the sides of his neck, giving the impression that he has large ears or horns. “The prairie chickens get very close here,” Haley whispers. “They sometimes jump up and start booming on the blind.” And sure enough, soon a male is dancing within five feet of the blind. Every once and a while, males pair off for a staring contest. They size each other up before leaping in the air and sparring. It happens in a flash, but when viewed in slow motion, it looks as complicated and choreographed as a Hollywood martial arts scene. “They fight to defend their space,” Arndt explains. “The same bird will come to the same spot every morning. If flushed, he’ll return.” We watched silently, in awe. The female prairie chickens, brown and white banded birds, appear to be unimpressed by today’s display. Males on the other hand are very excited each time a female approaches the booming grounds – they crow, then fly up in the air. Some bold males go so far as to follow the hens. The History of Prairie Chickens on Dunn Ranch Prairie As recently as the early 1900s, prairie chickens were so abundant in the Great Plains that they were hunted for the market and shipped by the trainload to New York City. A combination of intense hunting pressure and the moldboard plow — which allowed people to convert prairie to farmland more quickly and farm larger areas — spelled disaster for prairie chickens. “A 1936 survey had marked the main lek here at Dunn Ranch Prairie as prairie chicken habitat,” Arndt says, “but a second survey in the fifties didn’t find any birds.” By the 1950s there were no prairie chickens in northern Missouri. In the eighties the state of Iowa got prairie chickens from Kansas and released them in southern Iowa, about 18 miles north of Dunn Ranch Prairie. The next year they were already back at the historic lek at Dunn Ranch Prairie and they’ve been here ever since.” It hasn’t all been smooth sailing for the restored flock. In 2008-2009 after getting soaked in heavy rains, many of the chicks died from exposure. “It’s like an island here,” Arndt explains, “these prairie chickens are isolated from other populations. So, if there’s a weather event, there’s no nearby population to recruit new individuals from.” The impact of the rains was so severe that the population dropped from about 40-50 males booming on the leks in 2004-2005 to a mere 3-4 males in 2011. In 2012, Iowa and Nebraska worked together to trap 100 Nebraskan prairie chickens. Half were released at Dunn Ranch Prairie and half were released across the border at the Kellerton Bird Conservation Area, near enough that birds can travel between these two populations and help prevent inbreeding. The population is now back up to 40-50 males booming — you can immediately tell which birds were introduced from Nebraska by their silver leg bands, and a study showed that the population also retains genetic traits from the Kansas flock translocated in the eighties. The pheasants on Dunn Ranch Prairie may also have an impact on the population. Pheasants are known to sometimes lay eggs in prairie chicken nests. Prairie chickens (and pheasants) are ready to leave the nest and follow their mother soon after they hatch — a hen only remains on the nest for an average of twenty-four hours after the first egg hatches. The pheasant chicks hatch a couple of days before the prairie chickens. That’s enough that the mother prairie chicken can be fooled into abandoning the nest and raising a brood of pheasants. Making Space for Prairie Chickens in the Heartland Habitat diversity is important for prairie chickens — they need open spaces for their booming grounds and nesting habitat that isn’t too tall with areas of clumpy grass. They eat a variety of native plants and insects and also make use of waste grain from adjacent agricultural fields. Since 2007 Dunn Ranch Prairie has planted more than 2,500 acres of tallgrass prairie and they inter-seed (planting seeds from one area in another) on about 300-400 acres every year to diversify the prairie. A survey in 2000 found that Dunn Ranch prairie had 332 – native plant species. We tend to think of prairies as giant swaths of grass, but an undisturbed remnant can have up to 500 species from a variety of plant types — grasses of course, but also sedges and flowering plants. In addition to planting, Dunn Ranch Prairie has two powerful tools for creating and maintaining a healthy prairie – fire and bison. “There’s a big problem with cedar trees,” Arndt says. “Birds love the berries and spread the seeds. If you don’t burn, this land will go back to cedar.” Prairie chickens also dislike really tall vegetation. In some places you could mow the vegetation or hay it, but at Dunn Ranch Prairie the prairie mound ant makes that impossible. There are thousands of anthills on the property. That leaves fire as the best option for clearing vegetation. Bison play an important role in shaping the prairie. The areas that bison graze heavily become the open spaces prairie chickens use as booming grounds. Bison wallows provide an open space for chicks to escape the damp grass and dry out after spring rains. The open dirt of the wallows also provides an opening for new seeds to grow – and bison carry some of those seeds in their fur, dispersing them from one part of the prairie to another. Dunn Ranch Prairie works with private landowners and other conservation organizations to create a patchwork of prairie and agricultural habitat that could bring prairie chickens booming back to the area. The prairie chickens recently returned to a booming ground in Martinsville – another historic lek from the 1936 survey. Dunn Ranch Prairie has volunteer-led field trips to the lek during the booming season (which can last from March through June).
<urn:uuid:a1f7c0cf-4004-432c-9f50-6bfc16bd7b1d>
CC-MAIN-2020-34
https://blog.nature.org/science/2018/06/19/could-prairie-chickens-come-booming-back/
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439739211.34/warc/CC-MAIN-20200814100602-20200814130602-00548.warc.gz
en
0.955749
1,702
3.28125
3
Search engine optimization is a technique used to make a website popular and to bring the website or webpages to the top position in search engine results. Organic SEO technique is a long term process that stuffed with many simple techniques that can be used to achieve better ranking for long time. Website analysis is the process of analyzing and researching the existing website to restructure the web pages to make them search engine friendly. This is the first and foremost step in SEO Services. The website validation is the process of checking the web pages based on the norms and conditions defined by World Wide Web Consortium. All the pages should be written using valid html or xhtml tags. The webpage can be validated online through W3C Validation Checking tool. The tools provided by W3C are good starting place. The CSS and java scripts are used to build the web pages. But as a thumb rules both the files should be stored as an external file. The web pages should be renamed with relevant and optimized keywords. The optimized and relevant keywords can be used domain names as well as in titles. Each page should have a Meta datas. The Meta data stores the keywords and description about the page. The Meta tags should be well written as it is a summary about the page .It should not exceed more than 250 words. The keywords in Meta tag should contain most important keywords. The content optimization is another important aspect in web promotion. The optimized content should appear in first 100-200 words of the webpage. While optimizing care should be taken to avoid inserting too many keywords which may turn into spam. The content optimization is not just including the keywords into the text. The content should deliver the needed information to the visitors this will automatically attracts the traffic and ranks high in the search engines. The webpage should be clearly structured by markup such as proper title tags and minimize the usage of table tags instead of it use and tags. The site maps should be at start of the web page. It is better to use text link rather than image links. In some exceptional cases use image links with descriptive alt attributes. When a search engine spider crawls in the site it first intend to smell the special file on the site. That file is called robots.txt it points out which Web pages of your site should be indexed and which Web pages should be ignored.The link building is an important Search Engine Optimization Technique that is used for increasing traffic .The links from other website to one website. The link popularity definitely brings targeted traffic. It is the easiest way of increasing the rank in the search engine.
<urn:uuid:68f9b650-f7b0-478c-a902-4f9d9d12dc89>
CC-MAIN-2020-29
https://76marketing.com/understanding-the-basics-of-search-engine-optimization-for-effective-result/
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657151761.87/warc/CC-MAIN-20200714212401-20200715002401-00070.warc.gz
en
0.900354
514
2.5625
3
Many homes added a new puppy to the family for Christmas. It is now time to sign your puppy up for “puppy kindergarten” classes. There are certain behaviors that every dog should know to become a well-mannered pet and valued family member. You can get a head start, as well as prevent problems from developing the earlier you begin your puppy’s training. A puppy needs to learn how to walk on a loose leash. This allows you to take your puppy for walks in the park and around the neighborhood. Many behavior problems seen in young dogs, such as jumping up, destructive chewing, and uncontrolled barking, are the result of too much energy and not enough exercise. A puppy should learn how to sit on command. Impress friends by teaching a puppy to sit to greet them, instead of jumping up, when they come to visit. Jumping up on people may be cute when a puppy is little, but it isn’t very cute when the puppy becomes an 80 pound adult dog. Many household manners revolve around sitting on command. Simple tasks, such as opening doors, attaching a leash to the collar, wiping off muddy feet, and putting food and water bowls down on the floor, are much easier when the puppy is sitting still. In addition to sitting, a puppy should learn how to lay down on command. The down command will help calm an excitable puppy and is the most comfortable position for your puppy to stay in for any length of time. The next command a puppy should learn is the stay command. When combined with the down, this can be a highly useful tool in the house. Don’t want a puppy underfoot all the time? Imagine being able to ask him to lie down and stay on a mat in the corner of the room. He’s out of the way, yet can still watch all the activity. The most important command a puppy needs to know is to come when called. This command is not just a convenience, but can literally save a puppy’s life. If a puppy scoots out the front door and takes off running, a reliable come can quickly get him safely back into your arms. With a little persistence and dedication, all puppies can learn to come quickly and eagerly on the first command. Socialization is a commonly neglected skill that all puppies need to learn. Socialization is the process of getting puppies used to meeting all kinds of people, learning how to behave properly with other dogs, and being exposed to different environments. The critical period for socialization is between 7 and 16 weeks of age. Poor socialization may result in dogs that are excessively shy, fearful or aggressive as adults. In addition, there is a fear period between 9 and 12 weeks of age. Bad experiences during this period can develop into permanent fears in the adult dog. Puppy training classes, often called “puppy kindergarten,” help teach all these basic skills. Puppy classes are designed for the shorter attention span of puppies between the ages of 8 and 20 weeks. Puppies are socialized in a safe and secure environment, guided by experienced trainers. Since all puppies are kept current on their vaccination schedule, there is less risk of disease exposure in a class environment versus going to parks and other public places before finishing their full series of shots. In addition, puppy classes help prevent problem behaviors, such as jumping, biting, chewing, house soiling, and digging, before they get out of control. The Obedience Training Club of Bartlesville will have a new session of classes starting Feb. 21. Daytime and evening beginner classes are available for adult dogs of all ages, as well as puppy training classes. If a dog just needs a refresher course, there are intermediate and advanced classes available as well. All of the instructors are volunteers with many years of experience training dogs and their owners. If you have a young puppy or an older dog that is missing the essential skills discussed above, contact Jackie Bullen at 918- 331-0555 or go to www.obediencetrainingclubofbartlesville.com for class schedules, fees, and enrollment forms. Contact Lyn Johnson at [email protected].
<urn:uuid:52bc3906-a47a-4db1-9b5d-d6c8ec29286e>
CC-MAIN-2013-48
http://examiner-enterprise.com/sections/living/features/train-puppies-become-well-mannered-pets.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163961998/warc/CC-MAIN-20131204133241-00070-ip-10-33-133-15.ec2.internal.warc.gz
en
0.959488
869
2.53125
3
Solar renewable energy will soon be generated in Cambridge, Maryland on the grounds of the University of Maryland Center for Environmental Science (UMCES). UMCES has signed an agreement with Standard Solar, Inc. to install solar field on approximately 10 acres of its Horn Point Laboratory campus. The solar field will be a 2 MW system with expected approximate annual generation of 3.5 MWh of solar renewable energy. “While the work we do here helps others live more sustainably, it’s essential that we lead by example,” said UMCES President Don Boesch, who has led the University System of Maryland’s Environmental Sustainability and Climate Change Initiative since 2008. “Higher education has a key role in shaping a sustainable society. The University of Maryland Center for Environmental Science is a signatory to the American College & University Presidents’ Climate Commitment and has launched several programs aimed at reducing our environmental footprint, including setting goals for reducing greenhouse gas emissions at each of our laboratories, upgrading aging infrastructure to newer, more energy-efficient alternatives, and building all new campus buildings to at least the U.S. Green Building Council's LEED Silver standard or equivalent. The project is a Power Purchase Agreement (PPA) in which the entity, Standard Solar, installs and operates the solar panels in exchange for the use of land, and UMCES agrees to purchase the equivalent energy being generated over the next 20 years from Standard Solar. It is expected that the solar field will generate approximately 50% of the Horn Point Laboratory’s annual energy consumption with anticipated cost savings over the duration of the agreement. Design of the system has already begun on the solar project at the Horn Point Laboratory and construction is expected to begin this summer and be in service by the spring of 2018. “The solar field is another example of how we are using innovative ways to manage Horn Point Laboratory in a way that reduces our environmental footprint and engages with the community," said Mike Roman, director of the Horn Point Laboratory. "This project also contributes to increasing Maryland’s in-state distributed electricity generation capacity and reducing the dependency on electricity imported from other states." UMCES has also been selected to receive a grant from the Maryland Energy Administration’s Solar PV Canopy with EV Charger Grant Program to offset the cost of four level-II electrical vehicle charging stations on campus.
<urn:uuid:6ee42a71-38fc-44ca-9067-ba591a38a3a7>
CC-MAIN-2017-30
http://www.umces.edu/news/umces-commits-generating-solar-energy
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424154.4/warc/CC-MAIN-20170722222652-20170723002652-00612.warc.gz
en
0.924996
489
2.671875
3
In a nutshell, properties often have two types of drains: foul sewers, and surface water drains. Foul water drains are used for wastewater. That includes waste like toilet paper, pee, and poo, and waste from your washing machine and shower. Surface water is rainwater, puddles, that kind of thing. Surface drains takes that kind of water straight back into the environment. When the wastewater is connected to the surface water drain, and vice versa, it's called a misconnection. That means when a dodgy plumbing job connects a kitchen sink, for example, to the surface drain, the contents of that kitchen sink go straight into the outdoors, and not our treatment works. It also means if surface water is going into your foul drains, there's a bigger risk of flooding, especially during heavy rain. It's really serious. If we think about that misconnected kitchen sink, or a misconnected washing machine, you're pouring bleaches, detergents and washing liquids straight into the watercourses. That kind of pollution only gets worse depending on what chemicals are used, too. Our wildlife and natural habitats are all at risk. If you're a homeowner, or a landlord, you are responsible for fixing misconnections. Make sure you use a WRAS-approved plumber to carry out work. This means you're doing your bit to protect our environment.
<urn:uuid:1561eaea-0529-42aa-82da-a98762c5416b>
CC-MAIN-2020-34
https://www.nwl.co.uk/services/sewerage/misconnections/
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735958.84/warc/CC-MAIN-20200805124104-20200805154104-00279.warc.gz
en
0.948345
291
2.765625
3
Bed bugs have been common in U.S. history. Although bed bug populations dropped dramatically during the mid-20th century, the United States is one of many countries now experiencing resurgence in the population of bed bugs. Though the exact cause is not known, experts suspect the resurgence is associated with increased resistance of bed bugs to available pesticides, greater international and domestic travel, lack of knowledge regarding control of bed bugs due to their prolonged absence, and the continuing decline or elimination of effective vector/pest control programs at state and local public health agencies. Although not known to transmit any human disease, they leave a trail of potentially itchy or painful bite reactions, and costly extermination bills in their wake. Most people are not aware they have been bitten because they inject an anesthetic and an anticoagulant that prevents a person from feeling the bite. The bites look like little red bumps; sometimes resembling mosquito bites, but people who are more sensitive to the bite can have localized allergic reactions. Scratching the bitten areas may lead to infection. Bed bugs are small, flat insects that feed on the blood of sleeping people and animals. They are reddish-brown in color, wingless, and range from 1 to 7 millimeters in length. They can live several months without a blood meal. Infestations of these insects usually occur around or near the areas where people sleep or spend a significant period of time. These areas include apartments, shelters, rooming houses, hotels, nursing homes, hospitals, cruise ships, buses, trains, and dorm rooms. Bed bugs are experts at hiding. They hide during the day in places such as seams of mattresses, box springs, bed frames, headboards, dresser tables, cracks or crevices, behind wallpaper, and under any clutter or objects around a bed. Their small flat bodies allow them to fit into the smallest of spaces and they can remain in place for long periods of time, even without a blood meal. Bed bugs can travel over 100 feet in one night, but they tend to live within 8 feet of where people sleep. Bed bugs are usually transported from place to place as people travel. Bed bugs travel in the seams and folds of luggage, overnight bags, folded clothes, bedding, furniture, and anywhere else where they can hide. Most people do not realize they can transport stow-away bed bugs as they travel potentially infesting new areas, including their homes, as they relocate. One of the easiest ways to identify a bed bug infestation is by bite marks that appear on the face, neck, arms, hands, and any other body parts. However, these bite marks may take as long as 14 days to develop in some people so it is important to look for other clues when determining if bed bugs have infested an area. These signs may include the exoskeletons of bed bugs after molting, bed bugs in the fold of mattresses and sheets, a sweet musty odor, and rusty-colored blood spots from their blood-filled fecal material that is often excreted on the mattress or nearby furniture. Everyone is at risk for bed bugs bites when visiting an infested area. However, anyone who travels frequently and shares living and sleeping quarters where other people have previously slept has an increased risk for being bitten and for spreading a bed bug infestation. An integrated approach to bed bug control involving federal, state and local public health professionals, together with pest management professionals, housing authorities and private citizens, will promote the development and understanding of the best methods for managing and controlling bed bugs and preventing future infestations. Research, training and public education are critical to an effective strategy for reducing public health issues associated with the resurgence of bed bug populations. For questions about pesticide use and treatment of occupied areas for bed bugs, contact the U of A Cooperative Extension Office in your county. |Bed Bug Fact Sheet| |Bed Bug Information for Travelers|
<urn:uuid:83b5d241-d7d0-4b3a-801c-cddedb8bf425>
CC-MAIN-2023-23
https://healthy.arkansas.gov/programs-services/topics/bed-bugs
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224645089.3/warc/CC-MAIN-20230530032334-20230530062334-00403.warc.gz
en
0.948477
815
3.765625
4
What Is Pollution Prevention? Simply put, pollution prevention is any practice that reduces the volume, or toxicity, of pollution at its source. This means reducing emissions prior to treatment, control, recycling or disposal. What Are Some Common Pollution Prevention Methods? - Process Efficiency Improvement: As businesses strive to be more competitive, they are continually looking for opportunities to improve the efficiency of their operations in order to reduce costs. Pollution prevention does provide cost savings. Reducing waste from operations reduces its cost. - Raw Material Modification/Substitution: Using less toxic/hazardous raw materials can reduce the toxicity of waste materials and emissions. - Preventative Maintenance: Maintaining equipment in proper operating condition can reduce waste and unnecessary downtime. - Equipment Modification/Replacement: Modifying/replacing existing equipment can reduce inefficiencies and associated emissions. - Waste Stream Segregation: Segregating waste streams can sometimes allow for reuse of waste materials back into the operation as raw materials (I.E. combustion sources). - In-Process Recycling/Reuse: Reusing by-products/waste in the process can reduce the consumption and energy of raw materials (I.E. Filtration and reuse of materials). - Energy Conservation: Energy conservation saves money and resources. Since much of our electricity is generated from burning fuels, conserving electricity can help reduce the air pollutants that are generated from power plants. Why Implement Pollution Prevention? A major benefit of implementing a pollution prevention project is COST SAVINGS! Additional benefits include improved quality of life for the local community by reducing waste volume and/or toxicity, improved safety for workers, reducing liability, ensuring compliance with regulations, and improving public relations. Successful Pollution Prevention Projects/Opportunities The following websites provide information about pollution prevention opportunities that have proven successful for various business sectors. To find opportunities for your business, visit these sites and click on the relevant business sector listed under the topic hubs.
<urn:uuid:9d900504-569d-49fc-ac98-ff47c40eba3a>
CC-MAIN-2017-26
http://www.showmecleanair.com/pollution-prevention/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320685.63/warc/CC-MAIN-20170626064746-20170626084746-00606.warc.gz
en
0.892274
411
3.640625
4
Chimney Safety Tips Knowing BEFORE prevents tragedy AFTER: Chimney Safety Institute of America offers tips for fire safety • Keep chimney clear and capped. Make sure tree branches and leaves are at least 15 feet away from the top of the chimney. Contagious flames or sparks can jump from the fire source, quickly igniting other close objects, which can spread to neighboring premises. Installing a chimney cap can help prevent debris and animals from blocking the opening. • Choose the right fuel. For burning firewood in wood stoves or fireplaces, choose well-seasoned wood that has been split for a minimum of six months to one year and stored in an elevated, covered location. Never burn Christmas trees, treated wood or wrapping paper in your fireplace or wood stove. • Keep the hearth area clear and remove ashes. Combustible material too close to the fireplace or a wood stove, can easily catch fire. Be sure to keep furniture at least 36” away from the hearth. When you clean the fireplace, discard ashes in a closed metal container and place it away from the house until they have fully cooled. • Install smoke detectors. Place detectors throughout the house and check batteries in the spring and fall. When you change your clocks for Daylight Savings Time, remember to check your batteries. • Be on the safe side. Before using your fireplace, woodstove or furnace each season, the Chimney Safety of America recommends an inspection by a professional to ensure that your chimney’s interior has not suffered damage or significant creosote build-up that would allow heat or hazardous gases to invade your living space. • Hire a CSIA Certified Chimney Sweep®. When in doubt, ensure your home and family’s safety by hiring a chimney professional. CSIA Certified Chimney Sweeps® have earned the chimney and venting industry’s most respected credential by passing an intensive examination based on fire codes, clearances and standards for the construction and maintenance of chimney and venting systems. This knowledge allows them to expertly diagnose and solve chimney and venting problems. source information: http://www.csia.org/
<urn:uuid:76be65cf-881b-4f1e-928e-321de9119626>
CC-MAIN-2013-20
http://phhinsuranceblog.com/2012/10/18/chimney-safety-tips/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704943681/warc/CC-MAIN-20130516114903-00025-ip-10-60-113-184.ec2.internal.warc.gz
en
0.874927
450
2.515625
3
Plantaginaceae, the plantain family, formerly Scrophulariaceae, the figwort family. Plant: Small, low, creeping plant, to 12" long, with very small, blue and white striped flowers arising from the leaf axils. Common in lawns. Probably an overwintering annual. Flowers: White or light blue, with darker blue stripes, 3/8"-1/2", with four unequal petals, the lower one being narrower than the other three, and two stamens. Flowers borne singly on medium length stems in the leaf axils. Leaves: Mostly alternate, broadly ovate to round with slightly pointed tips, 1/4"-1/2", entire, practically sessile, and slightly downy-hairy. Habitat: Lawns, fields, waste areas. A common lawn weed, introduced from Europe. Blooms vigorously in early spring, and sporadically later on. Smaller than creeping speedwell (V. filiformis), which is also found in lawns here. Where to find it: Widely distributed in park lawn areas.
<urn:uuid:9f01c950-546c-4cef-9d00-7cf2a2a2a3af>
CC-MAIN-2017-43
http://www.cs.rochester.edu/users/faculty/nelson/wildflowers/make_page.php?flower_dname=flower_data/plantaginaceae/speedwell_field
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187822488.34/warc/CC-MAIN-20171017200905-20171017220905-00435.warc.gz
en
0.889013
242
2.671875
3
For most of human history, the concept of single-combat has existed – one champion vs. one champion to settle a larger dispute. The premise: rather than fighting a full-scale war over a territorial or otherwise political disagreement, during which many people would surely die, each side in the conflict would choose a champion, their greatest warriors, who would then fight, often to the death. The winner of this “single-combat” gave the entity they represented victory in the larger dispute with minimal bloodshed. There are many historical examples. According to legend (and, perhaps, history), a young Julius Caesar fought Prince Nennius of Britain in single-combat. This type of thing was not uncommon in the Roman Empire. But single-combat also appears in the Christian Bible and Jewish Torah, as well as in Islamic tradition. It appeared amongst the Samurai in Japan, in the Iliad, and in ancient Indian tradition. Tales and legends from the Middle Ages speak of it often. Even the semi-modern notions of the duel and the wild west gunfight regularly gave examples of single-combat deciding larger disputes. In Russia, there is an old expression – bash na bash, which literally means “one-on-one.” The expression represents a tradition of single-combat between regional leaders and/or their champions to avoid bloodshed and broader national strife. The reason I bring this up… on Saturday afternoon, now in fact, as I write this, there is a boxing match happening between two great undefeated champions in the finals of a multi-year tournament known as the “World Boxing Super Series.” The winner will become the undisputed champion of the cruiserweight (200lb) division. One of the competitors is a man from Vladikavkaz, Russia – a city in the southwest of the country, at the foothills of the Caucasus mountains; just east of the Black Sea, and just a few miles north of Georgia. The other competitor hails from only a few hundred miles away in the city of Simferopol, the capital of Crimea. Translation: One of the competitors was born and raised in, and still represents, a city and a region which in 2014 was annexed by Russia. The other competitor is Russian; from a city just east of the still-disputed Crimea region his opponent is from, and to the southeast of the Donbas region, where armed conflict currently rages. The man from Crimea – Oleksandr Usyk (OO-sick, great name for a boxer) – has refused a Russian citizenship since the annexation and proclaimed, “I am Ukrainian and Crimea is Ukraine.” For much of his career, he has worn his hair in a way which seems to be a middle-finger to Russia – shaved on the sides with a long lock on top, a modern version the Ukrainian-Cossack top-knot. This is sometimes referred to as a “Khokhol.” In Russia, “Khokhol” is a derogatory slur toward Ukrainians. Wearing the Khokhol as you win gold medals and world championships appears to be Usyk’s way of shoving discrimination back in Russia’s face. The fight, Usyk against his Russian adversary, is taking place at the Olympic Stadium in Moscow in front of tens of thousands of flag-waving fans. The air seems politically charged, as if with an electrical current. Looking at both of the combatants, I’m not sure I’d be eager to meet either in a dark alleyway. The situation in the Donbas region of (for now) the Ukraine – what is being called ‘The Ukraine Crisis’ – is becoming increasingly dire. Over 10,000 people have been killed in the conflict so far. Hundreds of thousands live in areas littered with landmines and subjected to daily artillery shelling. Movement is restricted for many of the region’s four million residents, food insecurity is a reality, and basic services like health care are limited or non-existent. I watched this past week as Presidents Trump and Putin had their much-publicized meeting. One of the issues they purportedly discussed was the Ukraine Crisis. Putin wants a referendum at the point of a gun in the Donbas region, just as was done in Crimea – a very American solution to this type of problem if ever there was one. It is unclear, as it usually is, just where exactly Trump stands on the issue. Since the meeting with Putin, the U.S. has announced another $200 million to the Ukraine to “strengthen its defense capabilities,” part of over $1 billion since 2014. However, whispers that Trump might consider the possibility of Putin’s referendum precipitated an uproar amongst Ukrainians. That is kind of the point though. There is always this geopolitical long-game at play, back-room meetings between steely-eyed leaders with firm handshakes, committees and non-binding resolutions, headlines, and nightly specials. By the time Putin and Trump next meet, maybe even in Washington, D.C., how many more people in Donbas will have died? How much more infrastructure will be destroyed for a generation? It is almost enough to make a person wish … Ok, if Usyk wins, Crimea and Donbas are part of Ukraine, if the Russian wins, they are part of Russia – single-combat, “bash na bash”… let’s get it on. Quote of the Week:
<urn:uuid:b643bb2c-5c7e-41f4-a6fe-9050899b29cd>
CC-MAIN-2020-05
https://progressivearmy.com/2018/07/23/iron-curtain-champions/
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250592394.9/warc/CC-MAIN-20200118081234-20200118105234-00313.warc.gz
en
0.969399
1,146
2.71875
3
In this commas worksheet, students gage their grammatical skills as they read 12 sentences and phrases that need commas and identify where each one belongs. 3 Views 2 Downloads Comma Review One Commas are helpful for separating names of cities from states, setting off interjections, and listing items in a series. Practice the many uses of commas with a set of grammar exercises designed for both elementary and middle school... 4th - 8th English Language Arts CCSS: Adaptable Using Commas with Coordinating Conjunctions Teach your kids about FANBOYS! Coordinating conjunctions, or FANBOYS, join two independent clauses to make a compound sentence, but don't forget the comma! Review this popular comma rule, and give your learners this short worksheet. An... 3rd - 6th English Language Arts CCSS: Adaptable
<urn:uuid:f3c4bba3-9462-4c16-b410-837316fb21c9>
CC-MAIN-2017-30
https://www.lessonplanet.com/teachers/commas-4
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549426639.7/warc/CC-MAIN-20170726222036-20170727002036-00014.warc.gz
en
0.925303
183
4.34375
4
Arabic Henna Designs For Hands Biography Mehandi is the application of henna as a temporary form of skin decoration in India, Pakistan, Bangladesh, Nepal and the Maldives as well as by expatriate communities from those countries. This tradition also exist among some Arab Women particularly the Cooperation Council for the Arab States of the Gulf nationals. The word mehndi is derived from the Sanskrit word mendhikā. The use of mehndi and turmeric is described in the earliest Hinduism's Vedic ritual books. Haldi (staining oneself with turmeric paste) as well as mehndi are Vedic customs, intended to be a symbolic representation of the outer and the inner sun. Vedic customs are centered around the idea of "awakening the inner light". Traditional Indian designs are of representations of the sun on the palm, which, in this context, is intended to represent the hands and feet. Mehndi decorations became fashionable in the West in the late 1990s, where they are sometimes called henna tattoos. Henna is typically applied during special occasions like weddings and Muslim festivals such as Eid-ul-Fitr and Eid-ul-Adha as well as in Hindu festivals like Karva Chauth, Diwali, Bhaidooj and Teej. In some Hindu festivals, many women have Henna applied to their hands and feet. It is usually drawn on the palms and feet, where the design will be clearest because the skin on these surfaces naturally contains less of the pigment melanin. Henna was originally used as a form of decoration mainly for brides. In the modern age, usually people buy ready=made Henna cones, which are ready to use and make painting easy. However, in rural areas in India, women grind fresh henna leaves on grinding stones with added oil, which though not as refined as professionally prepared henna cones, brings much darker colors. The term henna tattoo is figurative, because true tattoos are permanent surgical insertions of pigments underneath the skin, as opposed to pigments resting on the surface as is the case with mehndi. Likely due to the desire for a "tattoo-black" appearance, many people have started adding the synthetic dye p-Phenylenediamine (PPD) to henna to give it a black colour. PPD is extremely harmful to the skin and can cause severe allergic reactions resulting in permanent injury or death. Alata (Mahur) is a flower-based dye used to paint the feet of the brides in some regions of India. It is still used in Bengal There are abounding types of mehndi patterns girls here. Mehndi or Henna Designs are altered for altered occasions. Like Mehndi Designs for Bride is absolutely altered for the Mehndi Designs on Eid for every girl. On weddings, usually girls awning their easily up-to bend and brides up-to shoulders. Whereas on Eid or added parties girls alone use Henna on their hands. The Pakistani Mehndi designs are acclaimed in sub abstemious area as Arabic Mehndi designs are acclaimed all about the world. Arabic mehndi designs don’t alone awning the easily and feet, but aswell they are specialized in physique mehndi designs which awning the back, legs and abdomen as well. Pakistani Henna designs are added complicated appropriately alluring assorted loyalists. Arabic & Pakistani Latest Mehndi Design.
<urn:uuid:77cbb308-c6a7-4800-96bb-be90ecee0735>
CC-MAIN-2014-23
http://bestmhendidesigns.blogspot.com/2013/04/arabic-henna-designs-for-hands-henna.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997889622.85/warc/CC-MAIN-20140722025809-00127-ip-10-33-131-23.ec2.internal.warc.gz
en
0.95889
728
2.75
3
Sarah Winnemucca was the daughter and granddaughter of two well-respected Paiute Indian chiefs – Winnemucca and Truckee, respectively. She grew up with an intimate understanding of how her tribal history and native culture were quickly being lost in the mid-19th Century as U.S. government-sponsored cultural eradication policies decimated the Indian way of life. Against all odds, Sarah grew determined to change those policies and protect her people. As a lecturer, writer and educator, Sarah lobbied for Indian rights from the 1860s through the 1880s. Her efforts led to meetings with President Rutherford B. Hayes, but little came of it. She later testified before Congress to obtain the release of Paiutes exiled to the Yakama reservation in Washington Territory. Sarah appealed to popular opinion through interviews and newspaper statements, and in 1883 she authored an autobiography, “Life Among the Paiutes: Their Wrongs and Claims,” the first book written in English by a Native American woman. Like her grandfather, Truckee, Sarah Winnemucca was interested learning about the white newcomers staking claim to the tribe’s ancestral homeland. One traveler passing through the region wrote of her, “Near the sink of the Humboldt River a strange but interesting woman visited our camp. She was a full Native blood Paiute Indian woman, highly intelligent and educated and talked the English language fluently. She ate breakfast with me and became so interested in our conversation that she offered to travel with me, across the desert to Carson Valley. Her name was Sarah Winnemucca, the only daughter of Chief Winnemucca, the great chief of the Paiute Nations. There is a station on the Union Pacific Railroad named in honor of her father.” The encroachment by settlements and the transcontinental railroad pushed the Indians from their traditional hunting and gathering land south of Pyramid Lake. Chief Truckee had heartily embraced the incursion of settlers and miners into Nevada as a potential opportunity for the Paiute Indians to improve their own lives. Winnemucca disagreed with his father about these perceived benefits and he took his family and band of followers north to a remote area of northeastern California near Honey Lake. Sarah, however, remained behind with her grandfather and several other family members. While Winnemucca’s band hunted in the high-plateau sage desert, Chief Truckee took Sarah and her siblings to the Santa Cruz Mountains, where wild game was plentiful and there was space to wander freely as they had in the Great Basin. Ten-year-old Sarah taught herself Spanish while working there for several American families. In 1857, Sarah and one of her sisters moved to Genoa, Utah Territory, to live and work in the household of Maj. William Ormsby. While living with the Ormsby family, Sarah learned to read and write English on her own. In October of 1860, Chief Truckee died of an apparent insect bite. She later wrote, “I was only a simple child, yet I knew what a great man he was. I knew how necessary it was for our good that he should live.” Sarah’s language skills propelled her into a leadership role for the Paiutes as conflict deepened between the cultures. Chief Winnemucca and his two daughters, Sarah and Elma, along with a half dozen painted warriors, began doing stage shows in Virginia City and San Francisco. Sarah translated the words spoken by her father to the audience, as they pantomimed Indian life in Nevada. Winnemucca told the story of his people’s poverty and starvation from lack of food, and how they had refused to join other tribes in the war against the whites. Sympathetic members of the audience donated money to the tribe. Sarah’s reputation as a passionate and articulate spokesperson for the Paiutes gained her both friends and enemies. She was attractive, headstrong and proud; qualities that made her a lightning rod for trouble. Newspapers reported her clashes with both men and women, including one incident where Sarah knifed a man who had touched her inappropriately. In 1870, Sarah fell in love and married First Lt. Edward C. Bartlett, a handsome officer, but an irresponsible drunkard. While Sarah earned a living working as an interpreter and educator, Bartlett spent his time drinking and gambling her money away. Their relationship was short-lived, as Bartlett soon resigned from the army and left town, although he continued to write Sarah for money. Sarah already had to contend with the stresses of living in two worlds, but now her broken marriage forced her to defend her honor in a frontier society. Sarah married three more times, but unfortunately, she never found the right man. Sarah continued speaking out against corrupt and incompetent Indian agents who stole from her people. She traveled extensively on the East Coast, giving hundreds of impassioned lectures in New York, Philadelphia and Baltimore. “Sarah’s lecture was unlike anything ever before heard in the civilized world,” said the San Francisco Chronicle, “eloquent, pathetic, tragic at times; at others her quaint anecdotes, sarcasms and wonderful mimicry surprised the audience again and again into bursts of laughter and rounds of applause.” Audiences cheered and wept, but the government always found a way to avoid helping the Paiutes. Sometimes her words of hope were met with allegations by government officials that she was a drunken, gambling prostitute. During her last lecture in San Francisco on Christmas Eve 1879, Sarah implored: “I am appealing to you to help my people, to send teachers and books among us. Educate us. Every one shuns me, and turns a back on me with contempt. Some say I am a half breed. My father and mother were pure Indians. I want homes for my people but no one will help us. They will not touch my fingers for fear of getting soiled. That’s the Christianity of white people.” Despite being rebuffed by the government and others, the Paiutes did succeed in establishing the first Indian-initiated school near the town of Lovelock, Nev., where Sarah enjoyed teaching the next generation how to read and write. Sarah Winnemucca Hopkins died on Oct. 17, 1891, and was buried with no marker. In a fitting epitaph, a New York Times’ obituary observed, “She was the only Indian who ever took any prominent part in settling the Indian question, and as such her memory should be respected. She did our government great service, and she willingly helped the white settlers and her own people to live peaceably together. The name Thocmetony [Shell Flower, Sarah’s original given name] should have a place beside the name of Pocahontas in the history of our country.” Tahoe historian Mark McLaughlin is a nationally published author and professional speaker. His award-winning books are available at local stores or at thestormking.com. Check out Mark’s blog at tahoenuggets.com.
<urn:uuid:ef48dba2-914f-45e5-b406-29942037970f>
CC-MAIN-2017-43
http://thetahoeweekly.com/2013/09/sarah-winnemucca-princess-activist-part-ii/
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824293.62/warc/CC-MAIN-20171020173404-20171020193404-00159.warc.gz
en
0.979859
1,466
3.203125
3
Bulimia nervosa, also called binge and purge syndrome, is a habitual eating disorder characterized by frequent episodes of excessive food intake followed by self-induced vomiting, excessive exercise, fasting, or taking laxatives to avert weight gain. Bulimia is a big problem on college campuses. According to the National Association of Anorexia Nervosa and Associated Disorders (ANAD) approximately 25% of college-aged women engage in bingeing and purging as a weight-management technique. When it comes to eating disorders, many parents assume that they would be able to tell by their student’s extreme weight loss if they had an eating disorder, however, when it comes to bulimia, the problem is not always visible. Here are some questions you should ask yourself to help determine if your student has bulimia: Is My Child Unhappy With His/her Body? Individuals with eating disorders come in all shapes and sizes. Instead of asking if your child is too skinny, ask if they are happy with the way they look. Thin people can think they are fat and still have an eating disorder. Overweight teens are at risk for bulimia just as much as underweight teens are as well, though they are less likely to be suspected of having an eating disorder. If your teen is unhappy with their body, and regularly comments on it, this may be a sign they are suffering, whatever their weight. Contrary to the beliefs of bulimics, purging does not cause weight loss. At least half of what is consumed during a binge remains in the body after purging. The body still absorbs the calories of the food ingested. Therefore, even when an individual has been suffering with bulimia for a while, they may not lose much weight and it can be hard to tell just by looking at them if they are bulimic. What Is My Child’s Relationship With Food? It is not anyone’s fault when a child becomes bulimic. Many people blame the photo shopped images in the media or often blame the bulimic individual themselves. However, regardless of environmental factors, the individual’s relationship with their body and food is at the root. Bulimia often starts with a diet, which is intended to help the individual feel better about their body. This sometimes results in severe restrictions of food, compensating by binging, feeling guilty about overeating, and beginning a cycle of binging and purging. The cycle, once started, is difficult to stop. Does My Child Show Signs of Binging and Purging? Bulimics are good at hiding their disease. They hide food and binge and purge in secret. Some signs of purging can include frequent smells of vomit, excessive trips to the bathroom (especially around meal times), excessive exercising, eating large amounts of food with no weight change, use of diuretics and laxatives, and evidence of binges such as food wrappers and containers. Long term bulimics often have swollen glands and discolored teeth from purges. If you think your daughter or son may be suffering from bulimia, it is important to get help. Bulimia can cause long term issues including tooth decay, acid reflux, ruptured stomach or esophagus, loss of menstrual periods and fertility, and chronic constipation. Recovery is possible, and there are trained professionals that can help your child develop healthier attitudes about food and their body. Start by calling the National Eating Disorders Association’s toll-free hotline at 1-800-931-2237 for free referrals, information, and advice.
<urn:uuid:181caa4e-4cd9-479d-8977-37f9a7f1100e>
CC-MAIN-2023-40
https://doorwaysarizona.com/questions-asking-bulimia/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510983.45/warc/CC-MAIN-20231002064957-20231002094957-00576.warc.gz
en
0.967011
746
3.03125
3
Book: Good King Wenceslas by J. M. Neale, pictures by Arthur Gaskin, with an introduction by William Morris 1904, Village Press It’s Day 11 and we are coming towards the end of the 12 Days. Good King Wenceslas was written in the 19th century, and this book was made soon after, although this particular reprint is from 1904. There is a short introduction by William Morris, and the illustrations are by Arthur Gaskin, who was part of the Arts and Crafts movement. You can find an online version here. This Christmas carol (if you haven’t heard it) is about a king who sees a poor peasant gathering wood in the snow on Saint Stephen’s Day. The king is determined to personally bring the poor man meat, wine, and wood, and so he and his page travel through the wintry weather to carry them to him. While the vocabulary might be a bit tricky and old-fashioned for younger readers, that doesn’t really matter as the story is quite straightforward. The best thing about this book is that, because it is influenced by the Arts and Crafts movement, the entire design is beautiful and intentional. Its typeface is designed to look like a medieval manuscript and has detailed illuminated letters and borders. The pictures have a medieval quality and look to be engravings. The simplicity and sincerity matches to tone of the song. It’s important at this time of year to remember that caring for all those in need is not an extraneous act, but the most essential kind of justice. With the seriously wintry and bitter weather we have been having this year, remember to look out for each other! Book: The Tomten adapted by Astrid Lindgren from a poem by Viktor Rydberg, illustrated by Harald Wiberg 1990, G.P. Putnam’s Sons It’s always difficult to go back to work or school after a holiday, especially when you have to get up in the dark. On Day 10 we have the story of the Tomten, who works all the winter night. This version of The Tomten is another Swedish story, adapted by Astrid Lindgren from a poem by Viktor Rydberg. Perhaps because it’s based on a poem, this is not a very plot-heavy book, but more about mood, mystery, repetition, description, and atmosphere. The Tomten lives on an old farm. Every night he goes through the farmyard and the house, speaking to the animals and looking after them. To each animal he speaks a variation on a little poem about how Winters and Summers come and go. The whole mood is a little melancholy. The Tomten seems a little lonely because he can’t speak to the humans in the house, and they will never see him, because he only comes out at night.The Tomten has seen many hundreds of winters, so it makes sense that he would have a good perspective for the animals who are longing for summertime. And he will carry on as long as there people at the farm for him to help. This is a lovely book with evocative prose, and especially beautiful pictures of the snowy farm lit by brilliantly bright moonlight and snowlight. It certainly makes me feel better about getting up in the cold and dark! Book: Henry and Mudge and the Snowman Plan by Cynthia Rylant, pictures by Suçie Stevenson 1999, Simon & Schuster You can’t go wrong with Henry and Mudge. On Day 7 we have The Snowman Plan, which continues our snowy theme. In this story, Henry and Mudge see a sign for a snowman contest. This is obviously very exciting! Henry tells his father, who is busy painting a chair green, and has gotten green paint all over himself. But his father is as enthusiastic about the Snowman Plan as are Henry and Mudge. There are many interesting snowmen in the competition, but most especially Henry and his father’s, which is a depiction of the father painting a chair green. In the end they win third place, for “most original”. It’s nice that Henry and his father are as excited about winning third place as if they had won first. This is a very charming book, extremely positive and fun, with expressive illustrations, and small children will find it very funny. For this New Year, I hope we all find something we are as excited about as Henry is about the Snowman Plan, and as Mudge is about dessert!
<urn:uuid:0c5e49a0-e6c2-4c1c-a46e-b6ad70d3c5d1>
CC-MAIN-2020-16
https://therereaderskitchen.com/tag/snow/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371803248.90/warc/CC-MAIN-20200407152449-20200407182949-00419.warc.gz
en
0.974001
965
2.703125
3
Teachers & Coaches Chess in the Schools: Curriculum, After-School Programs, Special Programs and Camps How Does Chess Benefit Children? - The game of chess helps young people learn to concentrate, think logically, overcome obstacles, spot patterns and categorize information. - It helps with the development of problem-solving skills, planning, patience, focus of thought and self-discipline. - Chess is a competitive activity, but , good sportsmanship and fair play are taught as essential elements of the game. - Chess is a one-against-one activity, however, teamwork is also an important element. This element comes into play when Club members must practice and work on problems together. - Everyone has a chance to contribute to the team in tournament play as chess clubs may enter as many players as they wish and various skill-levels or age-based sections are generally available. - A scholastic chess club provides a challenge for students while helping build confidence and self-esteem. It offers a combination of educational and social activity. Frequently Asked Questions Do I have to be a chess player to start a chess club? No, you do not need advanced chess skills to organize a club. There are videos and simple instructional booklets that anyone can use to learn the game. You can almost always find a parent, older student or chess player in the community to help the group get started. You will want to read through a rule book and learn the basic elements of the game, but you do not have to be a skilled player yourself. Many clubs benefit from having non-playing organizers to support chess instructors. Do I have to be a teacher to start a chess club? No. A chess club may be sponsored by a parent or interested chess player in the community. Frequently, a parent and teacher will jointly sponsor a club, because being a teacher might make it easier to gain permission to use school facilities for meetings or tournaments.It is important to work with school administrators for recognition of chess clubs as a school function, part of the schools extracurricular program. While this may take some time, achievement of this goal will benefit both the chess club and the school. How much time does a Chess club take? It depends on how much time you are willing to invest. It could be as little as an hour a week, but it will vary depending on the number of students involved and their ages. Most clubs meet regularly for one to two hours per week. These meetings may be after school, in the evening or on weekends. How much money is involved in starting a club? You can start a scholastic chess program for very little money – substantially less than the cost of just one football uniform. All that is required are a few chess sets. If local funding is not available, contact the U.S. Chess Trust for assistance on getting free chess sets and US Chess Federation memberships. If you have any questions or comments, please e-mail us at [email protected]. Leave a Reply
<urn:uuid:e9ed84e0-caa0-4770-8563-08752410f4f7>
CC-MAIN-2023-23
http://www.chesseducators.com/teachers-and-coaches/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653071.58/warc/CC-MAIN-20230606182640-20230606212640-00213.warc.gz
en
0.96107
634
2.8125
3
Great Little Madison Though small in stature, James Madison was a powerful influence in our country's past. His eloquence and political intelligence greatly contributed to the shaping of the Constitution and our nation and led young America through two wars. This 159-page Jean Fritz biography recounts the industrious life of this great president through captivating text and black and white photographs. Beautiful Feet curriculum takes a multi-level, living book approach to teaching history, geography and world cultures, using easy to use Guides for the teacher and engaging, well-written literature for the student. The Guides provide book lists, chapter readings, discussion and research questions, background information, website links, answer keys, and more. See our website for lists of literature resources to accompany each guide. Most guides provide content for one year of study, with the exception of Geography through Literature and Western Expansion. The latter two are recommended to be completed together for one year of study. Numbers of lessons vary, and are scheduled 1 to 4 days per week. Recommended Timelines, Maps , or a Composition Book maybe available. See individual courses for more details. Timelines are cardstock and include the figures referenced in the study. Students will need to color, cut and assemble the timeline and figures. History and geography come alive with these well done literature guides. See our website for required books for each guide. Some guides and resources contain Christian content while others do not; contact us for additional information.
<urn:uuid:35ed90e6-5f12-4bdb-a85a-5c2053517fec>
CC-MAIN-2023-23
https://www.rainbowresource.com/product/000673/Great-Little-Madison.html?
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649293.44/warc/CC-MAIN-20230603133129-20230603163129-00438.warc.gz
en
0.882342
330
3.65625
4
Bias Incident Support Services brochure - Campus Unit: Bias Incident Support Services What is bias? - Bias Incident: an act of hate or harm targeted at an identity group or at an individual because of their assumed membership in a group - Hate Crime: a criminal act (ex: theft, assault, vandalism) that is motivated by hate or bias towards an identity group or individual based on an assumed identity. - Hate Speech: verbal speech that attacks, vilifies, or incites hatred against a person or group based on an identity. Such speech is often protected by the First Amendment. If you have been impacted by bias or are interested in combating bias, BISS is here for you! BISS is a reporting option on campus for all community members. Reports can be made anonymously or not. If the person impacted desires, BISS will reach out to offer support. The Bias Dashboard provides information on the bias reports made to BISS over time, by identity impacted and more. This data is used to analyze and assess campus needs. BISS offers support to those impacted by bias. If desired, BISS will reach out to offer space, resources, and additional support or reporting options to those who have been impacted. Support can be for individuals or communities. Note: BISS is not a judicial or sanctioning body. BISS will not contact the alleged perpetrator or share any information about the reporter. Hate-Bias Response Team The HBRT consists of staff from across campus who meet to discuss bias incidents and trends. BISS is an advocate for community members who have been impacted by bias. By analyzing trends in bias reports, BISS makes recommendations for improving campus. BISS hosts many programs and events every year: - Stop the Hate trainings - The Circle (restorative spaces) - Free speech panels - And more! Phone: (301) 405-0980
<urn:uuid:f7cb942a-0a9e-46bf-9f29-1833c06204ce>
CC-MAIN-2023-23
https://diversity.umd.edu/resources/bias-incident-support-services-brochure
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649177.24/warc/CC-MAIN-20230603064842-20230603094842-00324.warc.gz
en
0.931272
451
2.84375
3
While cleaning out her first grade son’s backpack last week, Elyse Gilbert found something that surprised her. Mixed in with the regular detritus of the school day, the crumpled sweatshirts and food wrappers, was a blatantly inappropriate Thanksgiving-themed worksheet. On the top of the page: a smiling cartoon Native American with his arm around a giant piece of corn. Below, a word scramble featuring Thanksgiving-themed vocabulary words. Her son had successfully reassembled “inIdan” to “Indian.” “I literally gasped. I had assumed they had an updated curriculum about Thanksgiving,” she said, explaining that she thought educators had moved beyond the fairy tale version of the holiday she learned three decades ago. You know, the one about togetherness and bounty that conveniently leaves out the part of the story in which Native Americans were systematically murdered and oppressed and replaces it with a second helping of pie. The incident left Gilbert, like many non-indigenous parents today, questioning how to celebrate Thanksgiving with her children. Indigenous families have been wrestling with, and resisting, the myth of Thanksgiving for as long as it has been around. Today, some Native Americans celebrate the holiday, often connecting it to their culture’s traditions of Thanksgiving, while others consider it a day of mourning. As our country reckons with the persistent racism and cultural insensitivity that has, for so, so, long, been hiding in plain sight, yesterday’s model of Thanksgiving no longer cuts it. It’s time to figure out what’s next. For the full story, visit CNN.com/Health/News. 322 total views
<urn:uuid:678a3140-8f75-4c5c-93af-76ac9f80f3a2>
CC-MAIN-2023-23
https://www.sacculturalhub.com/entertainment/articles/how-to-talk-to-kids-about-thanksgiving-so-that-they-really-get-it/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649343.34/warc/CC-MAIN-20230603201228-20230603231228-00403.warc.gz
en
0.966735
348
3.265625
3
3 Brainstorming Possible solutions to the problem 1. stop wars 2. give medical care and training3. improve local environment4. provide educational training学生分享自己的生活经历,自然进入主题。5. donate food and money6. develop renewable energy 4 Pair workLook at the four pictures and try to answer all the question by working in pairs.利用书本所提供的素材,了解其他人口迁移的原因。 6 Pair work 1. What is in the picture? A lot of grains and a hand. 2. What can food aid do to help solve the problem of poverty?Food aid can help feed people who have no food. 7 Pair work3. Do you think food aid is a short-term or a long-term solution to the problem of poverty?Food aid is a short-term solution as it gives food immediately to people who are very hungry, but it does not allow them to grow their own food in the future. 9 Pair work 1. What is the man doing in the picture? He is building something.2. Why do you think he works so hard?He works so hard because he might be poor and need the money. 10 Pair work3. Do you think training people to make a living is a short-term or long-term solution to the problem of poverty? Why or why not?Training people is along-term solution to the problem of poverty. It allows them to make a living by themselves. 12 Pair work 1. What has happened to the village? It has become a city. With the development of society, many villages have changed a lot over the years. Tall buildings have been built and motorways and bridges have been constructed. The living conditions of local people have been greatly improved. Small villages have been developed into towns or cities. 13 Pair work 2. Do you prefer living in the city or in the country? Why? 3. What problems may developing too fast cause? 14 Pair workDeveloping too fast might harm the natural environment. For example, many trees have been cut down in order to build factories, roads and bridges. Also, almost everything we do in our modern lives, be it cooking or travelling, requires the use of Earth’s natural resources, which we may run out of one day. 16 Pair work What do you think the things are used for? I think these machines are used to generate electricity by using wind power.2. What might happen to the coal, oil and other natural resources in a thousand years?The supplies of coal, oil and other natural resources might run out in a thousand years. 17 Pair work3.What is renewable energy? Can you suggest some good examples of energy for the future?Renewable energy is energy that comes from a source that will not run out. Solar, wind and hydroelectric or water energy are all sources of renewable energy that could be used in the 18 Group discussionIs Wuxi developing at a fast rate? What will it look like in twenty years’ time?找出更多迁移的原因,此处可以让学生讲他们讨论的结果写在黑板上然后进行具体阐述。 19 Group discussion Wuxi in the past 找出更多迁移的原因,此处可以让学生讲他们讨论的结果写在黑板上然后进行具体阐述。Wuxi in the past 20 Group discussion找出更多迁移的原因,此处可以让学生讲他们讨论的结果写在黑板上然后进行具体阐述。Wuxi today 21 Group discussion The Taihu Lake at present 找出更多迁移的原因,此处可以让学生讲他们讨论的结果写在黑板上然后进行具体阐述。The Taihu Lake at present 22 Group discussion找出更多迁移的原因,此处可以让学生讲他们讨论的结果写在黑板上然后进行具体阐述。 23 Group discussion The beauty of the Taihu Lake 找出更多迁移的原因,此处可以让学生讲他们讨论的结果写在黑板上然后进行具体阐述。The beauty of the Taihu Lake 24 Group discussionIs Wuxi developing at a fast rate? What will it look like in twenty years’ time?找出更多迁移的原因,此处可以让学生讲他们讨论的结果写在黑板上然后进行具体阐述。
<urn:uuid:6ec1c319-9af3-431f-8834-363a9b6ab90a>
CC-MAIN-2017-43
http://slideplayer.com/slide/232611/
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825436.78/warc/CC-MAIN-20171022184824-20171022204824-00013.warc.gz
en
0.901117
1,364
3
3
Adding composted grass clippings and mulch to your garden will create a rich, loamy and fertile soil bed, ideal for growing a garden. Over time, however, especially as you dig out soil to plant more plants, you may have more than enough soil. Although you may consider garden soil to be waste, it is not as easily disposed of as other garden waste, such as leaves, yard trimmings and grass. Nonetheless, don't fret. With a couple of phone calls and perhaps some local advertising, you can dispose of your garden waste soil in no time. Call your local government municipal waste or recycling centre. They may accept excess soil from your garden. There may be lawn waste collection days in your neighbourhood or dumpsters for this purpose. Keep in mind that many lawn waste areas of your dump or recycling centre do not accept soil. Advertise that you have free garden soil in a local community newsletter, an online site (e.g., Craiglist for your area) or another small local distribution outlet (e.g., the free ads). Many gardeners will come pick up your garden soil, especially if it is rich and fertile. If it is just fill dirt, not of much value for a garden, many people need fill dirt for outside landscape or construction projects. Contact the contractor for your local rubbish collection, if applicable. Their name is often on the bins and rubbish trucks. They may provide a service that picks up garden waste, including soil, but probably a fee will be charged.
<urn:uuid:a0986af1-60c5-49c7-821e-b9e7130337f6>
CC-MAIN-2017-47
http://www.ehow.co.uk/how_7840334_dispose-garden-waste-soil.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805362.48/warc/CC-MAIN-20171119042717-20171119062717-00582.warc.gz
en
0.947691
311
2.671875
3
This time calculator allows you to add/subtract two times. Just like any other numbers, you can add or subtract times as well. However, because time is defined differently, it is different to perform time calculations. Two different types of measurements exist today when it comes to measuring time. They include the clock and the calendar. These time measurements are based around sexagesimal number system in which 60 is the base. The origin of this number system lies in ancient Sumer inside 3rd Millennium BC. The Babylonians were the first to adopt this number system. Now it is used in its modified form to measure time, angles and the geographic coordinates. The use of base 60 is due to the status of number 60 as superior highly composite number that has 12 factors. This type of a number is just some natural number that has many more divisors when it's relative to some other number and scaled to one of its own power. With all the factors that number 60 has, it can simplify quite a few fractions that involve sexagesimal numbers. Besides, the mathematical advantage of the number is amongst many contributing factors as to why it is used today. For instance, 60 minutes or 1 hour can be divided evenly into 30, 20, 15, 12, 10, 6, 5, 4, 3, 2, and 1 minute and this illustrates the reason why sexagesimal system is used for measuring time. The devices that were used initially to measure time used to be highly varied according to location and culture. Generally, these devices were actually meant to divide day/night into various periods that could be used for regulating religious practices or work. They included candle clocks and oil lamps that were used for marking time passage between events instead of actually telling what time of day it was. Another one was water clock which, arguably, is most accurate among all ancient clocks. This clock worked with regulated water flow into or from a container where water is measured for determining passage of the time. In 14th century, the hourglasses first came to the scene and they actually worked like candle clocks and oil lamps. In the end, when the accuracy of clocks increased, they were put to use for calibrating hourglasses and measuring particular passages of times. Christiaan Huygens created first ever pendulum mechanical clock in 1656 and it was first clock ever that was regulated by natural oscillation period mechanism. The clock was later refined by Huygens for limiting the errors to under 10 seconds every day. However, these days, atomic clocks tend to be most accurate clocks that can be the modern day time calculator. These clocks make use of electronic oscillator for tracking time passage depending on the resonance of cesium atoms. While there are some other atomic clocks that exist, these cesium ones are most accurate and the most common ones around. But when it comes to adding or subtracting times, regardless of the application, a reliable time calculator is needed like this one here. Let's find out how this time calculator works. The working of this time calculator is pretty simple. As mentioned earlier, the calculator is designed for adding or subtracting time. The calculator requires you to enter two time values that you want to add or subtract. For each time value there are specific fields given for day, hour, minute and second. Enter all the units of time in order to perform the calculation. Remember here that Day doesn't mean the date of a month rather it refers to the number of days that have to be added or subtracted. Once you have entered all the values, select the operation to be performed from the given list. The list only contains addition or subtraction sign to perform the respective action. Once you have entered all the desired values and selected the operation to be performed, just hit the calculate button on this time calculator and the calculation will be performed. The result will show you the times you have entered and the sign in between and then there is an equal to sign after which calculated result is displayed. For example, if you want to add 5 days, 6 hours, 50 minutes, and 8 seconds with 3 days, 4 hours, 11 minutes and 6 seconds, the time calculator will show you the result as 8 days, 11 hours, 1 minute and 14 seconds. So, use this time calculator for adding times or subtracting them for whatever application. The results are accurate and are shown instantly. You'll really find it a healthy tool in your time calculator.
<urn:uuid:389171fe-4cb2-437a-82a7-5343373bfedc>
CC-MAIN-2020-29
https://www.calculatorall.com/time-calculator
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655897844.44/warc/CC-MAIN-20200709002952-20200709032952-00326.warc.gz
en
0.962458
911
3.75
4
Tobacco consumption is one of the greatest avoidable health risks in the European Union (EU). Many forms of cancer and cardiovascular and respiratory disease are linked to tobacco use. In the 26 EU Member States for which data are available for 2016, around a quarter of all deaths reported were due to cancer. Lung cancer accounted for 21% of all cancer-related deaths. In 2016, the share of lung cancer among all fatal cancers was highest in Hungary (27%), followed by Poland, Greece and the Netherlands (all 24%). At the opposite end of the scale, the lowest shares were recorded in Portugal (15%), Lithuania, Latvia and Sweden (all 16%) and Slovakia (17%). This information is published by Eurostat to mark World No Tobacco Day (31 May). The source dataset can be found here. For more information on the health statistics published by Eurostat, take a look at the overview accessible here. To contact us, please visit our User Support page. For press queries, please contact our Media Support.
<urn:uuid:bba6c9fe-fecd-4c7e-9b33-b9831c2f9cc6>
CC-MAIN-2020-29
https://ec.europa.eu/eurostat/web/products-eurostat-news/-/EDN-20190530-1?inheritRedirect=true&redirect=%2Feurostat%2F
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655899931.31/warc/CC-MAIN-20200709100539-20200709130539-00306.warc.gz
en
0.940272
212
2.6875
3
A View From the Baltic By Ben Keene istorians trace the origin of skiing to Fennoscandia, a region that encompasses Finland, Norway, Sweden and northwestern Russia. For more than 8,000 years, the typically long winters in this part of the world made gliding over the snow an effective and efficient mode of travel. During the warmer months, however, a much more recent European invention has steadily gained converts: the bicycle. By comparison, the emergence of long-distance cycling routes, including the international EuroVelo network, followed a relatively short time ago, with a number of Nordic countries choosing to repurpose former railroad lines as rail-trails... Read the complete article by Ben Keene: A View From the Baltic (PDF/721KB)
<urn:uuid:3c0233da-dd75-4ada-8f7c-ad1da470abf2>
CC-MAIN-2013-48
http://www.railstotrails.org/news/magazine/webExclusives/2013_Winter_View-From.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164033807/warc/CC-MAIN-20131204133353-00031-ip-10-33-133-15.ec2.internal.warc.gz
en
0.926885
161
2.578125
3
Freud once humorously remarked that "Anyone who wants to make a living from the treatment of nervous patients must clearly be able to do something to help them". It is amazing how frequently this simple precept is ignored and, when a patient does not get well, how often the failure is attributed to lack of proper motivation, diminutive ego strength, latent schizophrenia, and a multitude of assorted resistances. Difficulties that arise during therapy are not due to a deliberate conspiracy of neglect on the part of the therapist. They usually come about because of obstructive situations that develop in work with patients with which the therapist is unprepared to cope. During his psychiatric career the author, who spent time both teaching and supervising, collected and collated questions from students and graduate therapists who had raised concerns about psychotherapy that related to such obstructive situations. Originally published in 1982, this volume contains both those questions and his answers. Table of Contents Preface. 1 General Aspects of Psychotherapy 2 Psychoanalysis 3 Psychoanalytically Oriented (Dynamic) Psychotherapy 4 Behavior Therapy (Behavior Modification) 5 Group Therapy 6 Family Therapy 7 Marital (Couples) Therapy 8 Cognitive Therapy 9 Hypnosis 10 Somatic Therapy 11 Short-term Therapy 12 Miscellaneous Therapies 13 Emergencies 14 Psychotherapeutic Practices 15 Psychotherapy in Special Conditions: A. Depression B. Phobias C. Anxiety Reactions D. Alcoholism E. Schizophrenia F. Chronic Mentally Ill G. Personality Disorders H. Miscellaneous Problems 16 Transference and Countertransference 17 Theoretical Aspects 18 Development 19 Psychodynamics 20 Prognosis 21 Outcome 22 Cost-Effectiveness of Psychotherapy 23 Prevention 24 Conclusion. References. Name Index. Subject Index.
<urn:uuid:2320e496-34f4-4a49-b869-cef85d35627f>
CC-MAIN-2020-34
https://www.routledge.com/The-Practice-of-Psychotherapy-506-Questions-and-Answers/Wolberg/p/book/9781138784000
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738746.41/warc/CC-MAIN-20200811090050-20200811120050-00264.warc.gz
en
0.907281
357
2.59375
3
The Environmental Enterprise Society of Stirling (SUSEE) have announced a new project that they are working on called ‘Taste No Waste’. ‘Taste No Waste’ will be a recipe book that incorporates ingredients and food that is often thrown away or leftover from other meals. What are the aims? This project focuses on reducing the amount of food waste that we produce. Also, by using leftovers where possible, it can help people save money during this cost-of-living crisis. The SUSEE said: “As a society, we mostly have the planet and the people in mind, and food waste emits around 6 per cent of global greenhouse gases.” “Most of it goes to waste in supply chains but also a good proportion is consumer waste. We recognise that the responsibility of food waste is not just on us consumers, and even as consumers we often don’t have the energy, time, health, or knowledge to eat in a way that produces as little food waste as possible.” This project will help those aiming to reduce their food waste by teaching them how to do so. The SUSEE said: “Our overall hope is to make avoiding household food waste more convenient for students.” When will the book be released? The SUSEE are currently working on recipes for the book. It is set to launch on 21 April. As well as print copies, the SUSEE hope to make a digital copy of ‘Taste No Waste’ available too. The SUSEE discussed the process of this project, they said: “I think we are excited to put this together!” “We haven’t done a project like this before so there will probably be challenges along the way but we’re all quite optimistic. […] I believe we’re all quite happy doing this project.” Who can use it? This is a perfect book for university students to have when it is released. Being busy with deadlines and social events can often have a negative impact on what you are eating. Take-out food or skipping a meal can be more appetising than making a trip to the shops. Of course, it isn’t limited to those at university, this is a perfect recipe book for anyone who is looking to save a penny and waste less food. This book will help you make recipes that you may have never thought of before, saving you money as well. For those with dietary requirements, the SUSEE said: “… We didn’t set specific dietary requirements such as vegetarian or vegan [recipes] so more people could make use of this book. “That being said, many recipes will align with these diets or give a vegetarian or vegan option.” SUSEE are accepting recipe suggestions that fit in with this project as well. If you have a recipe that you feel might be suitable for this book, then contact the SUSEE team here. Featured Image Credit: Photo by Maarten van den Heuvel on Unsplash Second year student journalist studying Bachelor of Arts with Honours in Journalism Studies. Writer for Brig and Discovery Music You must log in to post a comment.
<urn:uuid:30c56dda-aa7d-4af2-bb3e-e11e0be0ea60>
CC-MAIN-2023-23
https://brignews.com/2023/03/29/taste-no-waste-cookbook/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653608.76/warc/CC-MAIN-20230607042751-20230607072751-00182.warc.gz
en
0.957294
681
2.734375
3
Disability History and Awareness Weeks Senate Bill 856 The purpose of this bill is to designate the first two weeks of October as Disability History and Awareness Weeks, and to provide students and the public with the opportunity to learn about the rich history and many contributions of people with disabilities. Each public school shall provide instruction on disability history, people with disabilities and the disability rights movement. The instruction shall be integrated into the existing school curriculum in a manner such as, but not limited to, supplementing existing lesson plans, holding school assemblies or providing other appropriate activities. The instruction may be delivered by qualified school personnel or by knowledgeable guest speakers. The provisions of this bill are not intended to create a burden, financial or otherwise, for public schools or teachers. This Legislation will have the following positive outcomes: - Better treatment for people with disabilities in society, especially for youth in school - Increased attention to preventing the bullying or harassment of students with disabilities - Exposure to Disability History and Awareness that will lead to students becoming more likely to hire, retain, and promote people with disabilities as employees once they become adults. - Increased self-esteem and pride among persons with disabilities, resulting in more of them going to college, entering the workforce, and contributing to their communities. - Commitment to the full inclusion in society or all individuals with disabilities. For additional information contact our Youth Advisor, Natasha Germain, at (850) 224-4670 or e-mail her at [email protected]. Providing Context: Why Disability Awareness Matters The Americans with Disabilities Act of 1990 was founded on four principles: inclusion, full participation, economic self-sufficiency, and equality of opportunity for all people with disabilities. HB 91/SB 856 supports and promotes all four of those principles. There are other compelling reasons to teach Disability History and Awareness: - The United States Census reports that as of 2000, there are 3,274,566 people with disabilities in the state of Florida out of a total population of 15,982,378, meaning 20% of Floridians have a disability. - Nation Center for Education Statistics reported that in 2002 there were 379,609 students with disabilities in Florida K-12 education system, roughly 20% of the student body. - Students in Florida K-12 public schools are required by state law to learn about the civil rights movement in class; the inclusion of persons with disabilities is also a civil rights issue and should be taught as such. - Research has shown that students with disabilities have a harder time fitting in with their peers, making friends, and becoming involved in school and community based activities and clubs; HB 91/SB 856 provides a remedy to that. - Emphasizing the contributions of Americans with disabilities throughout history will lead to increased awareness and appreciation of people with disabilities and equal member of society. - Disability History legislation has already been enacted in Idaho, North Carolina and West Virginia
<urn:uuid:db19e349-b7c4-4836-9338-6aa68ebcda6c>
CC-MAIN-2020-16
https://www.floridayouthcouncil.org/the-bill/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370497309.31/warc/CC-MAIN-20200330212722-20200331002722-00071.warc.gz
en
0.956867
607
2.828125
3
By Lisa Yount A necessary quantity within the amazing Scientists sequence, A to Z of Biologists makes use of the machine of biography for you to placed a human face on technology - a style that provides immediacy to the prose for the excessive schooler who may need an curiosity in pursuing a occupation in biology. This entire survey positive aspects greater than a hundred and eighty entries and 50 black-and-white images. each one profile makes a speciality of a specific biologist's learn and contributions to the sector and his or her impact on scientists whose paintings undefined. Their lives and personalities are mentioned to boot via incidents, quotations, and pictures. Culturally inclusive and spanning the total diversity of biologists from precedent days to the current day, the entries on ladies and minority biologists specifically articulate the various stumbling blocks that those biologists overcame within the technique of achieving their objectives. This quantity is a perfect source for college students and common readers attracted to the background of biology or the private lives of important biologists. Read or Download A to Z of Biologists (Notable Scientists) PDF Similar scientists books The aim of this publication is to envision the character of and courting among the information of farmers and of scientists, and the way those will be top built-in in plant breeding. some time past, farmers' wisdom of neighborhood biodiversity has usually been underutilized, yet at the moment there's an elevated attractiveness of the significance of farmer participation or collaboration. During this biography of Charles Holmes Herty (1867–1938), Germaine M. Reed portrays the lifestyles and paintings of an across the world recognized scientist who contributed vastly to the of his local quarter and who performed an important position within the improvement of yank chemistry. As president of the yank Chemical Society, editor of its business magazine, adviser to the Chemical beginning, and as a personal advisor, Herty promoted southern commercial improvement via chemistry. Cherished American hero Buzz Aldrin displays at the knowledge, guiding rules, and irreverent anecdotes he is accumulated via his event-filled life—both in outer area and on earth—in this inspiring guide-to-life for the subsequent new release. all over the place he is going, crowds assemble to fulfill Buzz Aldrin. he's a world-class hero, a larger-than-life figurehead, top identified of a new release of astronauts whose achievements surged in exactly many years from first guy in area to first males at the moon. - In Darwin’s Shadow. The Life and Science of Alfred Russel Wallace - Leading Personalities in Statistical Sciences: From the Seventeenth Century to the Present - Einstein on the Road - African American Women Chemists - Accounting for My Life - Ahead of the Curve: David Baltimore's Life in Science Extra info for A to Z of Biologists (Notable Scientists) Birds, Beasts, and Men: A Humanist History of Zoology. New York: G. P. Putnam’s Sons, 1972. ᨳ Boyer, Herbert Wayne (1936– ) American Biochemist Herbert Boyer and STANLEY N. COHEN were the first to transfer a gene from one species of living thing into another species and show that the gene could function in its new location, thus making genetic engineering practical. Boyer also cofounded one of the first businesses based on the new technology. Boyer, born in Derry, Pennsylvania, in 1936, was a football star in high school. He did not think that species of living things had changed, or evolved, over time, although he was willing to accept the possibility that some species had died out and new ones had arisen. Buffon was highly honored for his work. In 1739, he was elected to the Academy of Sciences, France’s top scientific organization, and also became a member of the Royal Society, a comparable organization in Britain. King Louis XV awarded him the title of Comte in 1771. He married Marie de Saint Belin-Malin in 1752, and the couple had one son. National Library of Medicine) 26 Bishop, J. ) In 1857, he purified a starchy compound that he named glycogen. He showed that the liver makes this substance from sugar and stores it. When the body needs extra energy, the liver breaks down some of its glycogen into sugar once more and releases it into the blood. Body cells then use the sugar as fuel. Scientists had not known before this time that the bodies of animals could create as well as break down complex substances. Bernard also investigated nerves and their relationship with blood vessels.
<urn:uuid:19b6203d-1641-4244-91de-b63e3c1c3ff3>
CC-MAIN-2017-47
http://blog.cristafreeman.com/index.php/library/a-to-z-of-biologists-notable-scientists
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934807650.44/warc/CC-MAIN-20171124104142-20171124124142-00752.warc.gz
en
0.953718
941
2.75
3
A news release from the Society for Neuroscience highlights recent studies that have advanced our understanding of emotions. The first study reveals the neurobiological basis of romantic love. It turns out our mammal brains include three types of circuitry involved in reproduction: sex drive, which makes us want to mate with any handy partner; attraction, which encourages the pursuit of preferred partners; and attachment, which creates a desire to remain with a partner long enough for species-specific parenting duties. What we know as romantic love results from dopamine pathways associated with the attraction circuitry. Another study revealed a hormone, oxytocin, whose level in our blood seems to correspond to the level of trust exhibited in us during social interactions. The final study used rapid event MRI scans to determine why we can hear our own name clearly from within the "din of a cocktail party or the fog of sleep".
<urn:uuid:6c3c0206-d86d-4cac-9d89-2b601a54727c>
CC-MAIN-2014-35
http://robots.net/article/1017.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500816424.18/warc/CC-MAIN-20140820021336-00181-ip-10-180-136-8.ec2.internal.warc.gz
en
0.934972
171
2.8125
3
Nuclear Fuel Cycle and Materials Management of Spent Fuel from Power Reactors Providing Technical Guidance on Good Practices for Long Term Storage of Spent Fuel 1. Data Requirements and Maintenance of Records for Long term Management of Spent Fuel The growing inventory of spent fuel in the majority of Member States, without predictable agenda for ultimate management of the downstream, has given rise to a continuing requirements for longer-term storage as well as needs for additional storage facilities, pending retrievability as an assumed condition for the future. In view of these trends, keeping good track of the information on the spent fuel has been gaining more and more importance as required for long-term management spent fuel. The objective of this task is to provide a guidance on the data that should be recorded and maintained to support the safe handling and treatment of such fuel in the future. Such need for spent fuel information management exist as a requirement in national laws or international convention. This may additionally assist regulatory authorities and help to provide assurance to the public of the nuclear industry's ability to deal with spent-fuel arisings in an acceptable fashion such that the issue is not seen as an impediment to the continued use and development of nuclear power. Another objective is to describe those issues in terms of data parameters suitable for use in database systems that could be operated either by utilities or on a national basis. As a first stage in the implementation of these objectives, the various stages in the spent-fuel-management routes from discharge from the reactor through to conditioning for disposal, refabrication or reprocessing are identified. The general content for the guidance has been formulated through a couple of consultancy meetings in the previous years. A Technical Meeting was held 30 June - 3 July 2003 to review the current status of Member States and and a consultancy meeting was held 24-28 April 2004 to elaborate a TECDOC on the subject. The TECDOC was issued in November 2006 as TECDOC-1519, "Data Requirements and Maintenance of Records for Spent Fuel Management". A Technical Meeting is planned for May 2008 to address spent fuel data management for long term storage of fuel. 2. Economics of Spent Fuel Storage Economics is one of the key factors for consideration in the selection and implementation of a storage system especially for AFR storage which are usually designed as an independent facility from the nuclear power plants. With expanding requirement and market for spent fuel storage, interest in economic aspect has been rapidly growing in recent years in an increasing number of Member States. There has been little literature, however, which would provide comprehensive guidance on the economic aspect of spent fuel storage, the only one among the IAEA publication has been being the Technical Report Series No.361, "Cost Analysis Methodology of Spent Fuel Storage" (1994). This task aims to review and revise the past TRS-361 with a view to provide the interested readers with informed guidance on economics as an important factor for consideration in spent fuel storage project. A TM was held in September 2002 where discussions were held on such issues as factors affecting the economics of spent fuel storage and cost considerations in spent fuel storage projects, as well as methodologies for economic analyses, for more comprehensive scope of the revisional work. Consultancy meetings were held 28-30 April 2003 and 4-7 October 2004 to advance work on the technical report revision on this topic. A Draft of the TRS is being finalized for publication in 2008. 3. Remote Technology Applications in Spent Fuel Management Remote systems feature is an integral part of facilities for work to be carried out inside shielding and/or containment engineered to protect workers and the environment from hostile sources like spent nuclear fuel. Remote systems technology has been extensively applied to a variety of work in spent fuel management facilities with such benefits as dose reduction to workers, enhancement of operational performance or reliability, saving of labour costs, etc. In recognition of the essential role of remote technology in spent fuel management, several technical documents have been published with information on various technical experiences in remote technology applications to spent fuel management. The first of this series , Remote Technology Related to the Handling , Storage and Disposal of Spent Fuel (IAEA-TECDOC-842), which was based on proceedings of a Technical Committee Meeting held in Alburquerque, New Mexico, 5-8 December 1994. Another publication, Remote Technology in Spent Fuel Management(IAEA-TECDOC-1061) was issued in 1999 based on the proceedings of an Advisory Group Meeting held in Vienna, 22-25 September 1997. As a regular extension of the past efforts, an updated technical document entitled "Remote Technology Applications in Spent Fuel Management" (TECDOC-1433) was issued in 2005 to provide an overview of remote technology applications to spent fuel management by compiling the information collected from a couple of consultancies and other related literature. It was noted from the survey that the potential for future applications has significantly risen with the anticipation for repository construction in several countries (e.g. US, Finland) and in research and development of innovative nuclear systems to be launched in the context of sustainable development of nuclear energy by such international initiatives as INPRO and Gen IV. 4. Selection Criteria for AFR Storage Facilities The importance of AFR storage for spent fuel management has been growing in many Member States. In the near term, additional storage facilities will be required for more and more reactor sites, the past efforts to extend the storage capacities of AR pools by higher density methods having almost been used up leaving little technical leeway for further squeezing. In the longer term, the number of reactors with lifetime operation to retirement will multiply and their decommissioning will require relocation of the spent fuel to an AFR if no other provision is available by that time. For the countries with "wait and see" policy, the step to AFR storage will sooner or later be inevitable for their spent fuel management, if the current circumstance continues for long term. Under these circumstances, some of the Member States have already implemented AFR storage and a growing number of Member States are taking actions or contemplating towards AFR storage. Looking at the technological trend for AFR storage, there is a conspicuous tendency toward dry storage in recent years, although wet storage in pool is still predominant world-wide. Several different options are available for dry storage of spent fuel and a dozen of vendors offer commercial packages to the prospective market. There are a variety of factors to be considered in selecting an option or service and careful assessment of relevant criteria would be essential in setting up successful plan for implementation of AFR storage. This task would be the first kind of systematic effort addressing the issue, although some of the related topics have been discussed in some related publications, such as TECDOC-759 "AFR Storage Concepts and Their Implementation" (1994), and TRS-240, "Guidebook on Spent Fuel Storage" (1991) . A TECDOC-1558 on "Selection of Away from Reactor Facilities for Spent Fuel Storage" was published in 2007. 5. Spent Fuel Inventories and Management One of the essential requirements for spent fuel management activities is availability of reliable, timely data on spent fuel. It is not a trivial deal, however, to set up and maintain a database for large amount of spent fuel with updated information on inventories, characteristics, locations, and projections. Systematic collection and analyses of spent fuel data on the international level is further complicated by the fact it is dependent on multiple national inputs. The IAEA has been a major source of information on related data and is a logical choice to develop a database to provide useful data to Member States and other organizations as needed. The purpose of this task is to review current status and to establish an enhanced database on global spent fuel data management. An update of the compiled data is being incorporated in the NFCIS database of the IAEA. 6. Long Term Storage of Spent Nuclear Fuel A co-ordinated research programme on the safety of storage of spent fuel was conducted from 1994 to 1997. To address new trends several meetings were held until 2000. The results are published in TECDOC 1293. Three safety publications were published earlier: "Design of Spent Fuel Storage Facilities" Safety Series No 116; :"Operation of Spent Fuel Storage Facilities" Safety Series No 117; :"Safety Assessment for Spent Fuel Storage Facilities" Safety Series No 118. This topic was also explored during a technical meeting organized by the IAEA and held in Ljubljana, Slovenia, from 18-21 October 2004. Senior representatives from regulatory and implementation authorities in Bulgaria, Croatia, the Czech Republic, Hungary, Lithuania, Romania, Slovakia, Slovenia, and the Ukraine explored the topic provisions for long term storage of spent power reactor fuel by focusing on the evolution of national approaches, operational considerations, and cooperative initiatives. The participants advised the Agency of a number of recommendations for future related activities, and notably concluded that significant progress had been made in these countries over the last few years in making provision for interim spent fuel Storage. One of the recommendations from the October 2004 technical meeting in Ljubljana was that the IAEA should organize a technical meeting focused on handling of damaged spent fuel. Accordingly, the IAEA convened a meeting to focus on the technical aspects of handling damaged spent fuel at its headquarters in Vienna 6-9 December 2005 as discussed below. 7. Handling of Damaged Spent Fuel Nineteen representatives from thirteen countries participated in a Technical Meeting on Handling of damaged spent fuel held from 6-9 December 2005 at IAEA headquarters in Vienna. Participants from Bulgaria, Chile, Czech Republic, France, Germany, Hungary, India, Italy, Lithuania, Slovenia, Ukraine, UK, and USA reviewed current status of related experience and practices as well as definitions and criteria for damage, and then three working groups developed recommendations associated with the handling of damaged spent fuel. The meeting Chairs summary emphasized that damage is not an intrinsic property of the fuel. Depending on its functional requirements, fuel considered damaged for one phase may not be considered damaged in a subsequent phase. Results from this meeting were used in a smaller consultants meetings held September 2006 and December 2007 in Vienna to produce a technical document on this topic to be issued in 2008. 8. Spent Fuel Performance Assessment and Research Spent fuel storage technology (particularly dry storage) is undergoing evolution, new fuel and material design changes are coming on stream and target burnups are increasing. As a consequence, the IAEA initiated in 1997 a Co-ordinated Research Project (CRP) on spent fuel performance assessment and research (SPAR). The final report of the SPAR project 1997-2001 was published as TECDOC-1343 in March 2003. Spent fuel dry cask storage facility. Building on results from preceding CRPs reported in TECDOCs 1343 (SPAR), 944, 673, and 414 (the BEFAST series), the IAEA has initiated a 'SPAR-II' CRP (2004-2008) to develop a technical knowledge base on long term storage of power reactor spent fuel through evaluation of operating experience and research by participating Member States. Specific research objectives include: fuel and materials performance evaluation; surveillance and monitoring programmes; and collection/exchange of relevant experience from participating countries. Expected research results include: a survey of research activities; operating experience; results from surveillance and monitoring programmes; and country-specific clarification of how the specifications for subsequent conditioning for reprocessing or disposal impact spent fuel storage requirements. Representatives from 13 organizations met at the European Commissions Joint Research Centre in Karlsruhe 6-10 June 2005 to exchange information on the SPAR-II research proposals and project structure, to review the status of national activities in the area of long term spent fuel storage, and to discuss plans for subsequent documentation of SPAR-II results. Meeting results included a preliminary table of contents for the expected CRP technical document, a matrix identifying contributors to the principal TECDOC topics, as well as a number of general conclusions based on participant presentations and subsequent discussions. Participants also had the opportunity to tour the ZWILAG interim storage facility in Wuerenlingen as well as the ECs laboratory facilities at their Institute for Transuranium Elements in Karlsruhe, Germany. Following the first research coordination meeting (RCM) held in Karlsruhe in June 2005, a smaller consultants meeting was held in November 2005 in Erlangen, Germany, to discuss plans for the second RCM as well as plans for documenting SPAR-II results. Meeting participants developed a skeleton draft of the technical document as well as an initial draft agenda for the second RCM. The second SPAR-II RCM was hosted in Japan by their Central Research Institute of Electric Power Industry (CRIEPI) and the Japan Nuclear Energy Safety (JNES) Organization from 6 to 10 November 2006. Seventeen representatives from 14 organizations participated in the meetings in Tokyo, as well as a tour to the Akagi test center in Gunma prefecture on 8 November to tour relevant facilities including CRIEPI's cask testing capability. RCM discussions focused on status updates regarding national activities as well as a review of work since the 2005 RCM relevant to subsequent documentation of SPAR-II results. Based on the results of a May 2007 consultants meeting in Vienna, the third and final RCM will be held in Hungary in mid 2008. 9. Implementation of Burnup Credit in Spent Fuel Management A Technical Meeting was convened on Requirements, Practices and Developments in Burnup Credit Applications in Madrid, Spain, from 22 to 26 April 2002. The purpose of this meeting was to explore the progress and status of international activities related to the burnup credit applications for spent nuclear fuel. This meeting was the third major meeting on the uses of burnup credit for spent fuel management systems held by IAEA. The proceedings of the Madrid meeting was issued as TECDOC-1378 in 2003. The proceedings of a 1997 AGM were published as IAEA-TECDOC-1013, the proceedings of a 2000 TCM as IAEA-TECDOC-1241. The Fourth Major IAEA Technical Meeting on Burnup Credit Applications was held in London, 29 August 2 September 2005. Sixty participants from 18 countries reviewed advances in applications of burnup credit (BUC) to enhance spent fuel transportation, storage, reprocessing, and disposition. Six sessions of technical presentations were followed by four working groups (calculations, validation, compliance, regulation) and a final panel discussion among the working group co-chairs. The meeting chair concluded that the meeting represented an encouraging step forward in application of BUC based on the technical presentations and the working group discussions. The meeting proceedings were completed in 2006 and issued in 2007 as TECDOC-1547. As recommended in the London meeting, the IAEA initiated plans for the next technical meeting on burnup credit by holding a programme planning meeting in Vienna September 2007. Tentative plans were set to hold a technical meeting on advances in burnup credit applications for spent fuel storage, transport, reprocessing, and disposition in Spain 21-24 April 2009. 10. Influence of High Burnup and MOX Fuel on Spent Fuel Management Presently and in future a wider variety and increasing number of fuel of different designs will be discharged from Nuclear Power Reactors: MOX fuel, high burnup fuel over 50 MWd/kg HM and fuel designed for advanced reactor operations. In order to ensure appropriate and safe storage technology it is essential that the knowledge is available of the influence of such fuel designs on storage technology. Spent fuel storage and transport cask, inside view. IAEA-TECDOC1293 Long Term Storage of spent nuclear fuel- survey and recommendations Final Report of a co-ordinated research project 1994-1997, published in May 2002 is containing valuable information on related issues. Consultancies were held from December 2002 to October 2006 on the "influence of high burnup and MOX fuel on spent fuel management". Objectives were to lay the foundation for a technical document (TECDOC) in 2007. The major findings are: ISSUES OF GENERAL NATURE: The time frame for spent fuel storage (SFS) has expanded considerably during the years. This is mainly due to decisions pending for final disposition of the spent fuel. Furthermore it is widely believed that there is no need for immediate actions for the latter. SFS allows for appropriate time for technology development. A usual period considered today ranges from 30 years on, like in Russia. License applications for 40-50 years SFS are regular, as in Germany. The Netherlands is envisaging 100 years for the SFS in an away from reactor (AFR) facility to be built. Experience with wet storage amounts to about 30 years, with dry storage of fuel assemblies (FA) in casks to about 15 years. New technologies are applied such as usage of concrete as construction material for casks. Thus the issue of safe storage over extended period of time has emerged. Furthermore new technology development already employed needs consideration. That applies to increasing use of MOX fuel, higher burnup fuel (also for MOX) and including higher initial enrichment and advanced reactor operation, which all aim at more economical use of nuclear power. WET STORAGE: In general considered not to pose problems, can be easily surveilled, defects discovered, low thermal loads on cladding material and fuel matrix, corrosion control by means of appropriate pool water chemistry, etc. DRY STORAGE: High burnup fuel and MOX fuel influence dry storage of spent fuel. The main impacts are an increase in decay heat and neutron source strength, an increased fission gas pressure in the fuel rods and some influence on fuel cladding creep and the fuel cladding strain capability. All these factors have to be considered carefully when evaluating the dry storage behaviour of spent fuel.
<urn:uuid:a77a73c1-b3aa-4505-8b71-21008d467430>
CC-MAIN-2014-15
http://www.iaea.org/OurWork/ST/NE/NEFW/Technical_Areas/NFC/spent-fuel-management-02-tasks.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223205137.4/warc/CC-MAIN-20140423032005-00607-ip-10-147-4-33.ec2.internal.warc.gz
en
0.953164
3,688
2.640625
3