text
stringlengths
263
344k
id
stringlengths
47
47
dump
stringclasses
23 values
url
stringlengths
16
862
file_path
stringlengths
125
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
57
81.9k
score
float64
2.52
4.78
int_score
int64
3
5
We said that TCP provides reliability guarantees, but UDP doesn’t. Yet, many applications run over UDP that one would imagine want reliability — DNS is a perfect example. How is it possible for an application (like DNS) to run over UDP, yet still enjoy reliable data transfer? 2) RDT Tools For each of our RDT tools, describe what their mission is. Also describe their shortcomings. 3) ACK vs. NAK I’d like you to think about why a protocol might use ACKs instead of NAKs. Imagine a protocol that only uses NAKs. What would happen if the sender infrequently sends segments? Would NAK be better? Now, suppose the sender has lots of data to send. Is that better? Why or why not? Does it depend on the error rate? What if there are few errors? Which is better? 4) Sequence Numbers Think about the GBN protocol with a window size of 4 and a 10-bit sequence number (i.e. sequence numbers are in the range 0 – 1023). Suppose that the receiver’s expected sequence number is k. Assume the network doesn’t re-order messages. What are the possible ranges of sequence numbers in the sender’s window? Why? What are all possible values in any ACK messages currently in flight back to the sender? Why? Looking for solution of this Assignment? WHY CHOOSE US? We deliver quality original papers |Our experts write quality original papers using academic databases.| |We offer our clients multiple free revisions just to ensure you get what you want.| |All our prices are discounted which makes it affordable to you. Use code FIRST15 to get your discount| |We deliver papers that are written from scratch to deliver 100% originality. Our papers are free from plagiarism and NO similarity| |We will deliver your paper on time even on short notice or short deadline, overnight essay or even an urgent essay|
<urn:uuid:251226d1-3fb5-460f-bb4d-05da62be990c>
CC-MAIN-2023-40
https://myprivateresearcher.com/computer-networks-homework-3/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510238.65/warc/CC-MAIN-20230927003313-20230927033313-00154.warc.gz
en
0.908851
469
2.65625
3
Bird watching is a recreational activity where the bird watcher’s gain is the intrinsic rewards of being in sync with nature. Bird watchers enjoy birds. Use common sense when out bird watching. You must always respect wildlife, the environment and the rights of others. As stated in the American Birding Association’s Principles of Birding Ethics, “the welfare of the birds and their environment comes first.” There are some simple birding ethics that bird watchers must follow. Here are a few of the common sense rules that should be obeyed while bird watching. Make sure that you are not disturbing birds, disturbing other people or harming the environment. Be sure not to interrupt or disrupt other people from enjoying birding. Respect people’s property and the privacy of others. Aside from people, also avoid disturbing the birds themselves. Don’t disturb or stress birds, especially those who are breeding, as this may cause them to leave or abandon their eggs or chicks. Avoid harassing them with excessive bird calls. Never disturb a nest or handle eggs. Leave nothing but your footprints on your bird watching adventures. Avoid damaging the environment and littering. Make sure to take back any garbage upon leaving. Feeding wild birds inappropriate food is not acceptable. Avoid leaving food scraps or any left-over food that may attract bird predators. When leaving your birding position for a bathroom break take your garbage with you. Wrappers, cans and bottles left behind can attract birds. These misplaced wrappers and items if eaten by the birds may make the birds sick or even cause them to die. It is best to put your trash into your backpack and dispose of it properly. Also avoid interfering with birds that seem to be in distress. An example is baby birds that are on on the ground. They may not be abandoned but just out of the nest and learning how to fly. Some birds just wait for humans to leave before they rescue or return for their young. Another example are hummingbirds in a state of torpor. They may look like they’re dead, but actually they are resting to replace the energy. Birds who are stunned because they hit a window or something will come around. Leave them alone. What you can do is to make sure that there are no bird predators around. Birds carry diseases. There are birds who carry the West Nile Virus and others who have ticks that carry diseases like the Lyme disease. Bird mites can get into humans, although they would not stay, they can cause you some misery. Report sick or dead birds to the local authorities who can appropriately address these cases, but avoid handling the birds. One of the most important rules is to share the birding code of ethics with beginners. The beginning birder may not be aware of the ethics involved with birding. It is up to the present bird watchers to share this knowledge, what you have learned along the way, with beginning bird watchers. You may just make a new birding friend or two. In a nut shell, most of the bird watching code of ethics is common sense. Respect fellow bird watchers and respect the environment. Bird watching can be great fun. Bird watching as a recreational activity can go a long way. By abiding with the code of ethics everyone can benefit from this great sport.
<urn:uuid:0831d476-e266-4aee-8dc3-df12a4ffb1ff>
CC-MAIN-2020-29
http://www.yourbirdfeeder.com/tag/birds/page/3/
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655886121.45/warc/CC-MAIN-20200704104352-20200704134352-00301.warc.gz
en
0.952707
678
3.4375
3
The U.S. Supreme Court draws the line at child slavery. Almost always in the corner, if not the vest pocket, of big business, the court on Monday rejected a bid by Nestle and other food giants Cargill and Archer-Daniels-Midland to dismiss a suit brought by plaintiffs from Mali who had been child slaves in Ivory Coast, where their labor was used to harvest the cacao beans used to make chocolate. If you are unfamiliar with the fact of cacao slavery, here is a too-brief introduction. Ivory Coast is a country of coffee and cocoa farms. In fact, the coffee bushes are often grown in the shade of the cocoa trees. Like most slavery operations, cocoa slavery victims are drawn from nearby poor countries with false advertising promising a good job and enough income to send money home. Ivory Coast slave owners draw their victims from the impoverished countries of Mali and Birkina Faso. The slaves are boys who, like all slaves, are immediately “broken”–broken physically and mentally—to make them docile. Boys who are rebellious or are caught trying to escape tend to disappear. Cacao beans are a fungible product, meaning one bean is like any other, and large distributors do not separate beans by farm or region. The result is that, for decades, beans bought from Ivory Coast have had about a 70% chance of having been grown and harvested with slave labor. American and European food companies like Hershey and Nestle benefited from the low cost of cacao and did not inquire into the conditions of labor in the places from which the cocoa was sourced. Then in 2000, two Knight-Ridder reporters, Sumana Chatterjee and Sudarsan Raghavan, broke the story of cacao slavery, sending a brief shock wave through the chocolate industry. Human rights groups became active on behalf of the enslaved children, and enough consumers took notice to give rise to a niche industry in “fair trade” chocolate. For the most part, though, relatively few people learned of cacao slavery, and many of those who did were not moved enough to give up their Snickers and Kisses. At any rate, the sky did not fall, and the bottom did not drop out of the chocolate market. As for government response, Hershey and other cacao buyers were let off the hook in 2001 with a promise to wean themselves off their dependence on slave-sourced cacao in five years. But with perpetual civil war and strife in Ivory Coast, anything resembling thorough and reliable inspection has been an impossibility. The question recently before the Supreme Court involves a suit brought by Malian plaintiffs under the 1789 Alien Tort Statute, a law that permits suits brought by foreign nationals for violations of international law occurring in United States territory. The relevant precedent for the present suit, called Nestle Inc. v. John Doe, is the court’s ruling in the 2013 case Kiobel v. Royal Dutch Petroleum. In this case, the court dismissed a case brought by 12 Nigerian citizens alleging that the British and Netherlands-based company aided in state-sponsored torture and murder in Nigeria. In his opinion, Chief Justice John Roberts claimed that suits brought under the Alien Tort Statute for violations occurring outside the U.S. must “touch and concern” U.S. territory “with sufficient force to displace the presumption.” The 9th Circuit ruled that the plaintiffs in the suit against Nestle deserve the opportunity to update their complaint to fit the requirements of Kiobel. Should the Malian plaintiffs win their suit against Nestle, it will mark one small victory in the long battle against chocolate slavery in West Africa. But after 16 years of chocolate-company evasions and government foot-dragging, it will only be a small victory. And almost certainly, no food company executive will see the inside of a jail cell for knowingly sourcing slave cacao beans. Justice in the U.S., where corporate executives are concerned, is most merciful. But for now, the U.S. courts seem to have drawn a line in the sand for corporations, just in front of the atrocity of child slavery.
<urn:uuid:fcf06a12-b72b-467d-9e25-07742aa6dda2>
CC-MAIN-2023-50
https://www.legalreader.com/scotus-allows-child-slavery-suit-nestle-proceed/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679099514.72/warc/CC-MAIN-20231128115347-20231128145347-00317.warc.gz
en
0.963644
858
3.09375
3
Mohandas Gandhi? Jean Cocteau? Robbie Williams? Julian Beck? Earl B. Morgan? Tony Benn? Peter D. Jones? Louis Agassiz? Arthur Schopenhauer? Dear Quote Investigator: Mahatma Gandhi famously employed nonviolent strategies during the struggle for Indian independence. A quotation often attributed to him asserts that popular movements pass through four stages: First they ignore you. Then they laugh at you. Then they attack you. Then you win. I have been unable to find a good citation. Are these really the words of Gandhi? Quote Investigator: Several researchers have attempted to find these words in Gandhi’s oeuvre without success. The saying was ascribed to him by 1982, but Gandhi died decades earlier in 1948. The earliest known substantive match occurred in a speech delivered by Nicholas Klein at a convention of the Amalgamated Clothing Workers of America in 1918. Emphasis added to excerpts by QI: 1 And my friends, in this story you have a history of this entire movement. First they ignore you. Then they ridicule you. And then they attack you and want to burn you. And then they build monuments to you. And that is what is going to happen to the Amalgamated Clothing Workers of America. Typically, a successful social movement is based on a proposition extolled as a truth. For example, the Gandhian movement was based on the assertion that India should be an independent nation. These propositions face opposition and a harsh reception. QI believes that the saying under analysis fits into a large and evolving family of statements about the multi-stage difficulties obstructing new ideas and truths. Below are additional selected citations in chronological order. Continue reading First They Ignore You, Then They Laugh at You, Then They Attack You, Then You Win - 1918, Documentary History of the Amalgamated Clothing Workers of America: 1916-1918, Proceedings of the Third Biennial Convention of the Amalgamated Clothing Workers of America, (Held in Baltimore, Maryland on May 13 to May 18, 1918), Address given in Fourth Session on Wednesday, May 15, 1918, Address of Nicholas Klein, Start Page 51, Quote Page 53, Published by Amalgamated Clothing Workers of America. (Special note on dating: The dating on the document was confusing. In some locations the year 1919 was listed. In other locations 1918 was listed. I checked the day of the week for May 15, 1918 and May 15, 1919 and only the earlier date matched the specified weekday of Wednesday) (Google Books Full View) link ↩
<urn:uuid:7e3e1b1e-2dd9-4377-8e82-150f31cc9b0c>
CC-MAIN-2020-16
https://quoteinvestigator.com/category/arthur-schopenhauer/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370528224.61/warc/CC-MAIN-20200405022138-20200405052138-00439.warc.gz
en
0.955145
535
2.546875
3
May the 1st, 2013, marks exactly 100 years since the printing of Australia’s very first banknote – the 1913 Ten Shilling note. Unveiled in 1913 as part of Australia’s first national banknote issue, and bearing Australia’s first banknote signature combination, Collins/Allen, this groundbreaking 100-year-old banknote issue is among the most historic, most significant of all Australian banknotes. Not only does this note bear Australia’s first signature combination, it was also the first note issued by a Commonwealth nation with a face value of less than £1 – beating Britain’s famous Bradbury Ten Shilling banknote by over a year! The 1913 10/- Collins/Allen is known in contemporary numismatics by its extreme rarity. This rarity is largely attributable to the comparatively tiny number issued. The Australian population was less than five million in the pre-World War I era, and the print-run of Australia’s first Ten Shilling note was approximately 600,000 – an incredibly small number for a denomination that was destined to one day be issued in the tens if not hundreds of millions. Of that tiny print-run, the ravages of time has seen the number of existing examples estimated to be no more than 100 notes. Unsurprisingly, the 1913 10/- Collins/Allen is among Australia’s most desirable banknote issues – hotly pursued by passionate collectors and eagle-eyed investors alike. It still surprises some that, 100 years after printed, a note of such mind-blowing rarity is occasionally seen on the open market, and is not the exclusive province of museums and history books. Tangible evidence of Australia’s very first national banknote issue – and, by definition, tangible evidence of a new era of numismatics in Australia – we have two examples of this excessively rare banknote available. If you are interested in this mouth-watering opportunity to dine at the top table of Australian numismatics, visit Downies.com, or call our rarities expert David Jobson on (02) 9299 4131.
<urn:uuid:a43cf6e3-da2e-4235-aea4-3b008380d49f>
CC-MAIN-2017-39
https://downies.wordpress.com/2013/05/01/australias-first-banknote-turns-one-hundred/
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689572.75/warc/CC-MAIN-20170923070853-20170923090853-00574.warc.gz
en
0.941051
435
2.984375
3
We at Presidium, believe in mixing learning with fun and keep organizing playful activities with big lessons. Recently, an enriching and brain-storming club activity for the little students of grades nursery and prep was organized with an aim to make them recognize the things which they can and can't eat. They were shown the real life objects like apple, chips, eraser, pen, peanuts and mobile phones and were asked to differentiate the eatable items from the non-eatable ones. The tiny tots participated enthusiastically and were deeply engrossed in the task. A related worksheet based on the activity was also given to them to do independently. Glad to be a part of this enjoyable activity, the little cherubs happily shared their individual experience with their respective teachers.
<urn:uuid:e4f41343-182a-4123-8720-ad0ff091a24c>
CC-MAIN-2020-34
http://www.presidiumrajnagar.com/news_details/1335/news_updates.php
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439739211.34/warc/CC-MAIN-20200814100602-20200814130602-00286.warc.gz
en
0.984098
155
2.609375
3
Under cover of darkness, dozens of climate activists snuck into the forest in the small town of Harvard, Massachusetts. The air was buzzing with nervous excitement as the group filed along a dirt path next to the railroad tracks, carrying heavy metal scaffolding. After half a mile of walking, the group set up camp and assembled the scaffolding into a 16-foot-tall metal structure above the train tracks. Once the scaffolding was secured in place, the group formed a circle and joined hands. One of the activists announced that he had just placed a call to the railway’s emergency number, alerting the dispatcher that there were people and a metal structure on the tracks. Four people were stationed a ways ahead, waving red flags to make sure the coal train would stop. And stop it did — waiting several costly hours for police to arrive and arrest the four activists who had climbed onto the scaffolding and refused to come down. This blockade, which lasted through the night on Jan. 2, was just the latest action for a coalition of regional climate groups and activists calling themselves the #NoCoalNoGas campaign. With the aim of shutting down fossil fuel infrastructure — starting with Merrimack Station, New England’s last coal-fired power plant without a shutdown date — the campaign has been leading actions across Massachusetts and New Hampshire since August. “If [the Harvard blockade] had been an isolated action, then maybe it would feel like we didn’t accomplish much. But #NoCoalNoGas is a long-term strategic campaign.” As the blockades have surged in recent months, so too has the campaign. By escalating from symbolic actions to obstructing Merrimack Station’s ability to operate — leading to dozens of arrests in the process — the #NoCoalNoGas campaign is mounting the most serious challenge to the plant since it opened in Bow, New Hampshire in 1960. “Part of what we’re trying to do is to show that burning coal at this stage is completely unacceptable and won’t be tolerated,” said Tim DeChristopher, one of the activists arrested at the Harvard blockade. “Coal trains can’t roll through our communities anymore without being impeded.” DeChristopher’s group, the Climate Disobedience Center, or CDC, helped form the campaign, collaborating with 350 New Hampshire Action and a regional coalition of other climate action groups and individuals, including many first-time activists. From thoroughly researching and identifying a vulnerable target to prioritizing the process of community-building among participants, the #NoCoalNoGas campaign is a strong example of how to develop an effective strategy, while also creating an inclusive environment for new activists to join. Building on the growing sense of urgency to address the climate crisis, organizers have harnessed public outrage into action. “A lot of people even in the town [of Bow, New Hampshire] itself don’t know we’re still burning coal in New England, much less in their own community,” said Emma Schoenberg, a nonviolent action trainer with the CDC. “We started really thinking about ways in which we can bring awareness to the fact that this coal plant exists, and to eventually shut it down with a really prominent goal of building community.”Previous Coverage The campaign’s initial success at mobilizing large numbers of participants has led journalists and older activists to draw parallels with the Clamshell Alliance campaign of the 1970s, which fought to stop construction of the Seabrook Nuclear Power Plant in New Hampshire. In 1977, during the largest of several acts of mass civil disobedience, 1,415 people were arrested while occupying the construction site. While the Clamshell Alliance wasn’t able to stop Seabrook, it sparked a national anti-nuclear movement that deserves credit for largely shutting down further nuclear construction, as well as inspiring a greater public understanding of nonviolent direct action. Today, the #NoCoalNoGas campaign could do for coal what Clamshell did for nuclear energy: build a blueprint for shutting down a dangerous industry through coordinated direct action. From #BucketByBucket to #TrainByTrain Although many participants in the #NoCoalNoGas campaign are new to civil disobedience, the campaign’s core organizers are veterans of nonviolent struggle. DeChristopher, who is a co-founder of the CDC, famously posed as a bidder at an oil and gas auction in 2008 to protest the sale of public lands — a stunt that landed him in prison for 21 months. It thus comes as no surprise that the #NoCoalNoGas campaign began with a bit of surreptitious action, when a core group of activists decided to scout out the coal plant’s layout firsthand. In August, five of them walked straight onto the grounds of the power plant to see it for themselves. “After having a good look around, we went in and talked with some of the managers of the plant,” DeChristopher said. “We explained to them that we need to shut this plant down for the sake of the climate and our survival. They were pretty surprised that we were able to just walk right into the plant.”350 New Hampshire Action Field Organizer Emma Shapiro-Weiss poses at the fuel pile at Merrimack Station in New Hampshire. (Twitter/Shapiro-Weiss) On August 20, the campaign launched its first action when eight activists removed over 500 pounds of coal in buckets from the power station grounds. Three days later, they dumped buckets of coal in front of the New Hampshire State House in Concord, New Hampshire and told the media they were laying the responsibility for ending coal usage on the government’s doorstep. A month later, on Sept. 29, dozens of people dressed in white tyvek suits and carrying plastic buckets tried to approach the coal pile at Merrimack Station. Met by police in riot gear, 67 were arrested and charged with criminal trespassing. They sang and drummed on buckets throughout the action, while 300 more rallied in the field across the street from the plant. According to the organizers, it was one of the largest environmental civil disobedience actions in New England since the Clamshell actions at Seabrook 40 years ago. Seventy-six year old Espahbad Dodd was one of the bucket-bearing activists arrested that day. Having never taken such a risk before, he noted, “It just got to the point where it was time. I figured I don’t have grandchildren, but I have lots of friends that do. I don’t want to think about any responsibility I have for not leaving them a world in which they can live.” “We can stop these trains fairly easily. It’s a very simple thing to do, and it needs to become commonplace.” The next major action took place two months later in early December. Shifting from #BucketByBucket to a rallying cry of #TrainByTrain, activists began blockading railroad tracks as trains carried shipments of coal through New England to Merrimack Station. The first blockades happened during the night of Dec. 7 and into the next day. Over 100 activists blockaded the train tracks at three different points along the route, beginning in Worcester and Ayer, Massachusetts and culminating with a third blockade in Hooksett, New Hampshire. The coal train was delayed for several hours, resulting in 20 arrests on trespassing charges. Two people were further charged with resisting arrest after refusing to come down from a railroad bridge. Activists attempted to blockade the tracks again on Dec. 16 in West Boylston, Massachusetts. However, despite calling the emergency dispatcher and waving red flags to signal the conductor, the coal train did not stop, and almost two dozen activists had to jump out of the way as the train barreled towards them. The group remained undeterred, organizing another train blockade Dec. 29, when over 20 people in Worcester stood across the tracks. Ten were ultimately arrested, setting the stage for the scaffolding blockade in Harvard on Jan. 2. “If [the Harvard blockade] had been an isolated action, then maybe it would feel like we didn’t accomplish much,” said Cody Pajic, who was arrested at the blockade on Jan. 2. “But #NoCoalNoGas is a long-term strategic campaign, and when Bow finally shuts down, we’ll know that the train blockades were part of the path that got us there.” “We are building Dumbledore’s Army. We will grow in deep relationship with one another in a movement network across the region.” These train blockades embody one of the campaign’s guiding principles: that ordinary people can take matters into their own hands to disrupt fossil fuel infrastructure and address the climate emergency. “We can stop these trains fairly easily,” DeChristopher said. “It’s a very simple thing to do, and it needs to become commonplace.” Developing strategy and an inclusive campaign culture Participants like Barbara Peterson, who has long studied nonviolent direct action, have emphasized the campaign’s strategic sophistication as a key reason for getting involved. From thoroughly researching a target to providing intensive training in nonviolent direct action and regularly evaluating previous actions, #NoCoalNoGas has been intentional about shaping a campaign that is smart and effective. “We do a process of evaluation of the tactic after we’ve used it,” Schoenberg said. “For me, it’s important to ask, ‘Did this meet our goals? Did our strategy shift from the data and information we received? Does a different tactic make sense? Or do our people need rest?’”Previous Coverage Asking these questions allows activists to shift focus from civil disobedience to community-building when needed. For example, in the coming weeks the campaign may place more emphasis on supporting activists facing court proceedings than conducting direct actions. In this way they would also be able to work on advancing the use and acceptance of the “climate necessity defense” — a legal argument that would allow activists to explain their unlawful actions as being for the greater good. Nevertheless, organizers are clear on the campaign’s three goals: The first is to develop community and ownership of the campaign among participants as they put their bodies on the line; the second is to show people in New England and around the country that it is possible to shut down a plant like Merrimack Station with direct action; and the third is to shut down the plant itself, while also preventing the plant from being converted into a natural gas facility. The community-building aspect is considered more important for building power in the long-term than simply shutting down the plant. “We are building Dumbledore’s Army,” said CDC Co-Founder Jay O’Hara. “We will grow in deep relationship with one another in a movement network across the region, and therefore we will grow in power. Once we are done with [Merrimack Station], we will move onto the next thing.” O’Hara said the campaign embraces an approach of “emergent strategy,” which allows for a flexible, ever-evolving series of actions that are not centrally planned and imposed. “We don’t get together and write a strategic plan that has these predetermined peak moments of escalation, timelines and how we’re going to mobilize various resources,” he explained. “It’s not that we don’t think about those things, but we don’t start from there, because when we start from there we start to think of human beings as the pieces we’re trying to plug into our plan. From my perspective, that is the central problem of the domination system we’re trying to get out from underneath.”Barbara Peterson is arrested during the #NoCoalNoGas campaign’s first nonviolent direct action on Sept. 29. (Twitter/DrPeace) Peterson said that despite the challenges of doing direct actions, being a participant in the campaign feels deeply purposeful and important. “I suppose everyone’s different, but for me it’s not fun getting arrested,” she said. “It’s not fun going against the system. It’s frightening, it’s incredibly inconvenient — you have to sleep out overnight. I’m not woodsy. I’m not a camper. We do it because we can’t not do it.” The #NoCoalNoGas campaign builds on a longer history of climate activism in the region, including a number of other campaigns to shut down coal plants in New England. Part of the campaign’s strength comes from this approach of building solidarity and joy among participants. One way activists are doing this is by cultivating a culture of singing into their organizing and direct actions. “It seems like a sign that we are building a transformational movement when people sing together,” Schoenberg said. “We haven’t seen that in many movements since the civil rights movement, when black spirituals that people sang at home and in church were brought into social justice spaces. That seems like a sign that we are really building a transformational movement when people sing together, because that comes from people’s homes.” Building a regional movement against coal power While three coal-fired power plants still remain in New England, one (Bridgeport Station in Connecticut) is scheduled to be closed in 2021 and the other (Schiller Station in New Hampshire) has been partially converted to run on wood chips. This has made Merrimack Station — the only fully coal-fired power plant without a shutdown date — the target of #NoCoalNoGas. What’s more, Merrimack Station is also quickly becoming obsolete. Owned by Granite Shore Power, a partnership between two Connecticut-based companies, it operates infrequently under the direction of ISO New England, which manages the regional power grid.#NoCoalNoGas activists march to the coal pile at Merrimack Station on Sept. 29, signing and drumming on buckets. (Facebook/350 New Hampshire Action) “[Merrimack Station] is vulnerable because it’s unnecessary,” DeChristopher said. “If we can give a bit of an extra push in terms of making it more inconvenient and expensive to run that plant, we can put it over the edge in shutting it down.” The plant also receives millions of dollars in “capacity payments” from New England rate-payers even when it’s not operating, so it can stay prepared to produce energy if needed. “The fossil fuel industry is working up agreements with companies like ISO New England, saying ‘You’re gonna need us. What if there’s a cold snap?’” Schoenberg said. “Pushing back on that narrative is going to be critical.” “We are building a regional New England identity. That’s the same level at which our energy grid operates.” New England operates an auction-style energy grid, in which distributors purchase that energy from producers. Generating negative media attention and public outrage against the Merrimack Station and coal production could dissuade distributors from purchasing energy from the plant, organizers said. The #NoCoalNoGas campaign builds on a longer history of climate activism in the region, including a number of other campaigns to shut down coal plants in New England. One such effort took place back in 2013 with the Lobster Boat Blockade, during which two environmental activists, including the CDC’s Jay O’Hara, blocked a freighter from delivering a shipment of coal to the Brayton Point Power Station in Massachusetts. Brayton Point was the largest coal-fired power plant in New England until it shut down in 2017. In an effort to continue building momentum to drive coal out of New England, O’Hara and Marla Marcum of the CDC helped to lead the 2015 “Pipeline Pilgrimage” with a group of young Quakers as part of the Young Adult Friends Climate Working Group. They marched for 12 days along the 150-mile route of a fracked-gas pipeline that was proposed to run through Massachusetts and New Hampshire. In 2017, Quakers led another pilgrimage from the Schiller power plant in Portsmouth, New Hampshire to Merrimack Station, 50 miles away. The Schiller station has since converted one of its three coal-fired boilers to burning wood chips instead. Another plant, the Pilgrim nuclear power plant in Plymouth, Massachusetts was shut down in 2019 after local outrage at the poor maintenance and dangerous conditions of the plant. The #NoCoalNoGas campaign is part of a larger regional movement to shut down fossil fuel infrastructure, and has developed stronger linkages between various environmental campaigns in New England, including the campaign opposing the natural gas compressor station in Weymouth, Massachusetts and protests against JPMorgan Chase Bank, which has underwritten billions of dollars of funding for new coal-fired power plants. Step by step, bucket by bucket, and train by train, a multigenerational movement is growing to tackle the climate crisis. “We are building a regional New England identity,” Schoenberg said. “That’s the same level at which our energy grid operates. Each state is trying to pass a deal around the climate emergency in their own way, and we’re building a network of people helping each other with resources and skills.” The campaign may have lasting ripple effects on New England’s energy grid. State officials in Connecticut say the state may withdraw from the regional energy grid and reconsider pro-natural gas policies. Meanwhile, Massachusetts lawmakers are discussing the possibility of implementing carbon pricing. As the #NoCoalNoGas campaign continues, activists will use the growing regional network to apply pressure on key actors, from elected officials to presidential candidates to corporate executives. Lessons 50 years after Seabrook It’s not hard to see the Seabrook protests as ancestors of the campaign to shut down Merrimack Station. Both campaigns showed commitment to nonviolence, used blockades and occupations, employed creative expression, devoted energy to nonviolent action training, and organized participants into affinity groups. Both campaigns also understood the corporate connection. The Clamshell protesters knew they were up against New Hampshire’s largest electric utility company, Public Service Co. of New Hampshire, with ties to a web of local and regional financial interests. Their actions included occupying the board room of a major Boston bank and a blockade of the New York Stock Exchange in 1979 on the 50th anniversary of the market crash. Yet, as much as the climate activists of today are taking lessons from Seabrook, they are also aiming to forge something radically new. “What makes something powerful is not to try and re-inhabit or re-deploy the tactics of a previous generation,” O’Hara said. “What makes something powerful is the underlying spirit that infuses the group taking action.” As New England’s climate activists gear up for this next year, shutting down the region’s last coal-fired power plant is only one step along the way. Step by step, bucket by bucket, and train by train, a multigenerational movement is growing to tackle the climate crisis — and the campaign to close Merrimack Station is only the beginning.
<urn:uuid:1610cecf-73ff-4e6e-9d9c-7056c05d09f2>
CC-MAIN-2020-05
http://www.umass.edu/resistancestudies/aggregator/sources/1
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251696046.73/warc/CC-MAIN-20200127081933-20200127111933-00155.warc.gz
en
0.959127
4,106
2.75
3
a room not thirteen feet either way, slept twelve men and women, two or three in bunks set in a sort of alcove, the rest on the floor." These homeless children "are to be found all over the city …. where the neighbourhood offers a chance of picking up a living at daytime and of "turning in" at night with a promise of security from surprise. In warm weather a truck in the street, a convenient out-house, or a dug-out in a hay-barge at the wharf make good bunks." quotes easily describe conditions in slums and squatter settlements in any city in any developing country today, but, in fact, they were written over a hundred years ago by Jacob August Riis. He emigrated to North America from Denmark in 1870, and when Riis finally managed to get a job as a police reporter, he described the squalor and humiliation he experienced in the slums and tenements of New York. Riis went onto to become a leading social reformer, and his landmark book published in 1890, 'How the other half lives', inspired New Yorkers, including Theodore Roosevelt, to initiate long needed reforms in providing housing and shelter for the poor. is not the only journalist to have given a voice to the homeless and to have fought for their right to better housing. In the 19th century, industrialization in Europe and America led to rapid urbanization. The population of London went from about 800,000 in 1800 to over 6.5 million in 1900; during the same period, Paris grew from one-half to over 3 million; and by 1900 New York's population had swelled to 4.2 million. This explosion meant that the poor lived in dark, airless and unsanitary tenements, often without windows, where they were regularly exploited by rapacious landlords and politicians. With the advent of the mass media, the cause of the poor was taken up by many illustrious journalists and authors. Dickens, Mayhew and Zola, amongst others, wrote articles and novels that revealed to their readers the appalling conditions in human settlements. Such writers were instrumental in changing the policies of their time. over a hundred years later, the task is not over. At the start of the urban millennium, when over half of humanity will live in cities and towns, there is a pressing need for the public to be made aware of the problems of urbanization. Though rates of urbanization in the developed world and in Latin America and the Caribbean have stabilized at around 75 per cent or above, Africa and Asia -- which are both still predominantly rural -- face an explosive demographic shift, as their urban populations surge from about 35 per cent to over 50 per cent in the next 30 years. It is estimated that, between 1990 and 1995 alone, the cities in the developing world grew by 263 million people -- the equivalent of another Los Angeles every three months. Every day there are an additional 180,000 people in cities and towns all over the world. process of urbanization must be viewed against the backdrop of globalization and the industrialization of the developing world. In today's international economy, cities are forced to compete with one another to attract capital. Local authorities everywhere are investing heavily in infrastructure and housing to attract multi-national investment. But evidence suggests that, even in cities like New York and London, globalization has led to an increasing polarization between the rich and the poor. the developing world, where migrants continue to flock to urban areas for jobs, the situation is worse. Over 50 per cent of the population in cities in the developing world live in unplanned, spontaneous settlements and slums. It is also estimated that at least 36 per cent of all households, and 41 per cent of all woman-headed households, live below the locally-defined poverty level. Though it is difficult to estimate, it appears that the urbanization and feminization of poverty have resulted in almost a billion poor people living in urban areas without adequate shelter and basic services. just as a century ago, there is a need for journalists to inform the public about the living conditions of the urban poor; to ask why such conditions continue; and to exchange ideas on possible solutions and proven best practices. + 5, the special session of the United Nations General Assembly that will be held in New York from 6 to 8 June 2001, is dedicated to raising awareness about the problems and prospects of urbanization. This is a critical time for the future of human settlements. The success of Istanbul + 5 depends as much on the participation of journalists as on Governments, representatives of local authorities and civil society actors like non-governmental organisations, the private sector and academic researchers. As gate-keepers to the global and local media, journalists are essential partners in informing the world about the event and the issues involved. This is not just a matter of discussing the diplomatic background to the negotiations of international instruments in New York, it is about alerting local citizens to the conditions in their backyards and to what can and should be done. Important questions should be asked and answered: Have Governments delivered on the commitments made at Habitat II? If not, why not? We call on investigative journalists in the developed and developing worlds to find out more about the state of their cities and towns and the living conditions of Executive Director of the United Nations Centre for Human Settlements, I invite the media to join Habitat in the challenging task of ensuring adequate shelter for all and sustainable human settlements in the urban millennium. I call upon journalists to continue working in the tradition begun by people like Jacob Riis, Charles Dickens, Henry Mayhew and Emile Zola. We honour them best by giving a voice to the voiceless. by the Executive Director: …The environmental future of the planet is closely linked to the management of our cities, towns and villages. …The relationship between the environment and human settlements is like the proverbial chicken and egg paradox. Good environmental governance requires good urban governance and vice versa. are in the business of promoting a culture of solidarity and inclusiveness in all human settlements. Cities will not become liveable places without learning from the solidarity which is practised in villages where everyone is provided for, however modestly. In my village, I never saw anyone sleeping under a tree. humanity enters the 21st century-the urban millennium, a consensus is emerging that good governance will mean the difference between success and failure. …There is a need for a sea change in the management approach of many city governments. We need a revolution in local government attitudes so that they become demand driven and flexible, as opposed to bureaucratic and unresponsive. … The welfare of over a billion people who are homeless or live without adequate shelter and basic services depends on the combined efforts of all our partners, Governments, local authorities, parliamentarians, non-governmental organizations and the private sector. Together we can improve the living conditions in our cities, towns and …The exclusion of the poor from the benefits of urban life is a daily reminder of the urgent need for greater social and civic responsibility. …Partnership is indeed the key for successful implementation of the Habitat Agenda. …It cannot be a matter of "our agenda versus theirs". We must collaborate if we are to succeed. …Poverty elimination starts with listening to the poor, fostering their initiatives and giving them a chance. Unless this is done poverty reduction efforts will continue to remain illusory. …Good urban governance implies that Governments respond to and are accountable to all urban residents, including is making the 21st century the century of cities. The challenge is how to make cities a better place for the majority of the people. …The poor are not just passive objects. Most often they are solving their own problems, but Governments are failing to recognise their efforts. Instead of harnessing their energy they are discouraging the poor from participating in the improvement of their own living conditions. further information, please contact: Sharad Shankardass, Spokesperson, or Zahra A. Hassan, Media & Press Relations Unit, Tel: (254 2) 623153, 623151, Fax: (254 2) 624060,
<urn:uuid:9cac26f9-7e31-47f2-8afb-e3e6162e24c7>
CC-MAIN-2017-30
http://www.un.org/ga/Istanbul+5/bg1.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549426372.41/warc/CC-MAIN-20170726182141-20170726202141-00281.warc.gz
en
0.923681
1,827
3.328125
3
A geocacher named Warren Rieutort-Louis, rieuwa, stepped foot where few Westerners ever walk. GPS devices and cell phones are not allowed. Geocaching doesn’t exist there. Warren says, “It’s obviously a destination that is off the beaten path and travel is heavily regulated but it was a once in a lifetime opportunity. Fewer than 1500 Western tourists visit it every year.” Warren’s journey to North Korea was arranged through a tour company based in China. The voyage began with Warren emptying his pockets of items which rarely strayed from his side. There were no cell phones or GPS devices permitted on tourists in North Korea. But Warren wanted to keep a piece of something that has helped guide his personal exploration over the past four years. He brought along a Geocaching.com Travel Bug. He named the Travel Bug, “Asia Explorer.” It was a momentous gesture. Geocaching.com Travel Bugs have spent more time in space, than in North Korea. A Travel Bug is a trackable tag that you attach to an item. This allows you to track your item on Geocaching.com. The Travel Bug is moved from geocache to geocache around the world. You can follow its adventures online. Warren says, “I knew beforehand that there were no geocaches in North Korea, but I still wanted to take a Travel Bug with me as a symbolic item.” A friend introduced Warren to the real-world treasure hunt of geocaching in 2008. He says, “[My friend] only found a few geocaches, but when he told me about it, I instantly knew I would love it. Wherever I am, I try to grab a few caches, whether it’s here at home in the US where I’m currently a graduate student in electrical engineering at Princeton, or in my ‘real’ homes, the Netherlands or southern Portugal, or in my travels.” Warren decided to explore one of the least traveled countries in the world with his family in summer of 2011. Their private tour took the geocachers to remote North Korean villages. The Travel Bug could not be placed in a geocache and wait for another geocacher to move it along, but Warren says the Travel Bug may have helped crossed cultural barriers. He says, “The day I took the picture with the Travel Bug in front of the ‘Monument to Party Foundation’ in the capital Pyongyang, I noticed a look of surprise from the guide who toured with us for two weeks. She was my age. I explained to her the concept of geocaching, and she found it absolutely fascinating. She couldn’t believe that people would carry these from cache to cache around the world.” He says the rest of his travels through North Korea offered, “…an informal opportunity to develop closer bonds with the population, and to discover awe-inspiring cultural, natural and architectural richness of the country. Overall we discovered a warm people, infinitely curious about the world outside.” He says while the Travel Bug didn’t log any kilometers, it now carries a rich experience in a rarely traveled country. “It’s a unique glimpse into a society that we would find hard to understand its existence… without witnessing it.” Warren says his other Travel Bugs have traveled the world. “I love traveling, so how could I not love Travel Bugs? I have five around the world at the moment, including my North Korea one, having traveled a total of over 40,000 kilometers.” He hopes his “Asia Explorer” Travel Bug will make a return trip north of the 38th parallel. He says, “And who knows, maybe one day the Travel Bug will be able to head to North Korea… I am sure there will be a day when we will be able to introduce wonderful things like geocaching to our North Korean friends, whilst they share with us their cultural richness.”
<urn:uuid:dfac390d-639a-47d3-b19f-f9e798641ff3>
CC-MAIN-2017-30
https://www.geocaching.com/blog/2012/02/geocaching-steps-into-north-korea/
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549425144.89/warc/CC-MAIN-20170725102459-20170725122459-00360.warc.gz
en
0.966446
851
2.546875
3
Sudan, South Sudan, and Darfur What Everyone Needs to KnowBook - 2012 For thirty years Sudan has been a country in crisis, wracked by near-constant warfare between the north and the south. But on July 9, 2011, South Sudan became an independent nation. As Sudan once again finds itself the focus of international attention, former special envoy to Sudan anddirector of USAID Andrew Natsios provides a timely introduction to the country at this pivotal moment in its history. Focusing on the events of the last 25 years, Natsios sheds light on the origins of the conflict between northern and southern Sudan and the complicated politics of this volatilenation. He gives readers a first-hand view of Sudan's past as well as an honest appraisal of its future. In the wake of South Sudan's independence, Natsios explores the tensions that remain on both sides. Issues of citizenship, security, oil management, and wealth-sharing all remain unresolved. Humanrights issues, particularly surrounding the ongoing violence in Darfur, likewise still clamor for solutions. Informative and accessible, this book introduces readers to the most central issues facing Sudan as it stands on the brink of historic change. Published: Oxford ; New York : Oxford University Press, 2012. Branch Call Number: 962.404 NAT Characteristics: xxviii, 250 p. ;,21 cm.
<urn:uuid:5b6d4336-1f22-4b97-8ca6-0843b77f98de>
CC-MAIN-2017-39
https://dbrl.bibliocommons.com/item/show/490635018_sudan,_south_sudan,_and_darfur
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818696182.97/warc/CC-MAIN-20170926141625-20170926161625-00640.warc.gz
en
0.905973
287
2.859375
3
It is hurricane season,so it is prudent to have a disaster plan, disaster preparations, emergency supplies that are ready to grab and go, and a prearranged inland location to meet family and group members if an evacuation become inevitable. Disaster Plan – Decide where to meet, include written contacts, phone numbers, and other information in your ready to go kit. This information must in writing, because the hurricane’s damage, combined with the personal shock of the disaster, could cause a temporary memory loss. Cell phones may be lost, stolen, damaged, or unable to acquire a signal. There is much to consider when making a disaster plan. You can get more information at FEMA.govFamily Emergency Communication Plan Disaster Preparations– Have an emergency survival kit that includes food, water and emergency supplies pre-packed and ready to go at short notice. Pack what is necessary to sustain each person for a minimum of three days and up to two weeks. Each member of your family also should have their own emergency survival kit. Keep the emergency kits or grab and go bags manageable in weight. For more information click onPlanning, Preparing, Procurement and Providing.When there, scroll down to the Table of Contents for more specific topics. How Hurricanes are Named The National Hurricane Center, National Oceanic and Atmospheric Administration use a rotating list of 21 names per year, for six years, to identify hurricanes. Each year has its own set of names and is reused again in six years. The only time that there is a change in the list is if a storm is so deadly or costly that the future use of its name on a different storm would be inappropriate for reasons of sensitivity (Tropical Cyclone Names, National Hurricane Center). For example, Hurricane Sandy’s name is retired. 2016 Storm Names When there are more than 21 named storms, the Greek alphabet is used. Fiona and Gaston are currently making their way across the Atlantic. This makes seven named storms this year. Hurricanes have strong winds, storm surges, hail, torrential rains, and lightning. They can produce tornados, flooding and wide spread damage. They create dangerous conditions after they pass too, such as injuries, spreading of diseases, mold, destruction of personal and business property, and the contamination of drinking water and food supplies. Shock, confusion and chaos are common after a major catastrophic event such as a hurricane or a tornado. Becoming separated people worry anxiously about their absent loved ones. FEMA, the Red Cross, the CDC and the Emergency Disaster Preparedness industry all recommend having an emergency preparedness plan and supplies and provisions of food and water. Before a Storm Approaches PLAN aheadhave a written list of phone numbers so you can communicate with your family. Put this list in a waterproof container and put it in your survival kits. Remember to text instead of talk. The reason is that talking takes up more phone time and jams the systems. Have a pre-arranged meeting place. If you or a family member become separated and or lose phone service, your loved ones can meet you at this location. (Family Emergency Communication Plan) PREPARE an emergency kitor survival kit for each family member. The essential contents of the emergency kit will contain many items; it could be beneficial if there is duplication of some items. For a list of recommended contentsclick here. Provideenough food, water and supplies for a disaster for at least three days and up to two weeks. It is highly recommended to have a week or two weeks’ worth of long-term food and water. Once the power goes out, food will spoil rapidly. Contaminated water will ruin your boxes of food. Having canned goods will be too heavy to take with you if you must evacuate. A family of four requires 84 meals per week (3 meals per day x 4 people x 7 days). Water weighs about eight pounds per gallon and takes up a lot of space. For example, a family of four using one gallon of water per person, per day, will consume 28 gallons of water per week. One practical solution is to have lightweight, dehydrated or freeze-dried USDA quality food, which is contained in Mylar pouches and further protected by food grade plastic buckets. Long-term food can have a shelf life from five to 25 years. A variety of foods exists from breakfasts, lunches and dinners to desserts and drinks. Some varieties can be cooked in the pouch with serving sizes as small as two servings per pouch. Water, is a necessity for life, and while lugging 28 gallons of water from place to place may not be practical, carrying a few bottles of water and having a lightweight portable water filtration or water purification system with you is. Have water bottles or lightweight water packets with your supplies. Flooding and power outages may make water unsuitable to drink. Municipal water sources may be contaminated. Therefor it is in your best interests to have your own supply of water and a backupwater filtration or a water purification system. Visit Just Us Enterprises for all your emergency, disaster, preparedness and outdoor supplies. We provide links to reputable disaster agencies and closely follow or exceed their recommendations. In recent years, a multitude of government agencies, such as fire departments, local, state and federal agencies and the preparedness industry are asserting the requirement for emergency and disaster preparedness. No matter whom you are, rich or poor, a storm such as a hurricane can and does affect thousands of people. Storms are not particular, the violent wind and rain combined with flood waters not only wreak havoc with you, your family and your possessions; they equally adversely hinder and involve the lives of rescue and relief organizations. The media stresses how important it is to be prepared for an emergency or a disaster. Rescue and relief personnel providing assistance face the same circumstances that you are in. They are not playing a video game waiting to be notified that they have a call. They are preparing and readying themselves, their gear and their equipment to come to someone’s rescue. These courageous men and women will voluntarily risk their lives to save the lives of unknown people. They leave their own families in the face of danger in order to accomplish their duty. Help is on the Way Help and rescue must overcome many obstacles; it still takes time to come to someone’s rescue. Emergency and Disaster Preparedness organizations, including preparedness supply companies such as Just Us Enterprises – Emergency Disaster Preparedness, are at the ready to help. However, as in most situations, they must take care of themselves, their equipment and take stock of the (remaining) supplies before they can come to a rescue. Once the storm passes, then they must logistically organize the relief effort. Because hurricanes meander, while doing their destruction, areas hardest hit becomes a focus in order to save lives. Herein lies the problem: the storm throws and scatters debris from homes, businesses, sheds, garages, trees and anything else it can pick up. These obstructions block roads, destroy bridges and hinder rescue and relief efforts. The Storm Victim Time, is not on the side of the victims in a disaster area. This critical period, from the time it is safe enough for rescue organizations to begin the effort to the time help arrives in the devastated region can take up to a week or more. The most life-threatening period, that of during and immediately after the storm’s impact, is the most important time to be prepared. Being prepared does not have to mean preparing for an Apocalypse or even an alien invasion, but being prepared for two weeks to a month is beneficial. Look at a brief timeline of what happens: Alert Day Hurricane watches and alerts with possible landfall predictions Warning Day Hurricane warnings state a coastline landfall is imminent. Preparing Day A wide area is targeted – people race to pick clean the store shelves of water, food, batteries and other necessary items. There may be nothing left by the time you get to the store. Storm Day Hurricane force winds hit the area, storm surges pound the coastline, torrential rains flood inland regions, razed buildings and downed trees block roads electrical power is out due to downed power lines, and the municipal water supply is contaminated by the floods that include a multitude of harmful bacteria and pollutants. Storm Day 2 The Hurricane continues to batter the coastline and the inland; its size only adds to its destructive forces. The Day After The storm passes and leaves unbelievable ruin in its wake. The time for emergency, rescue and relief efforts commences. Once they determine what is needed, they have to figure out how to get to your location from their location. Remember they are as boxed in as you might be. A victim of the storm may only be a few miles from help, but like a needle in a haystack, they cannot help you if they cannot get to you. Devastation and destruction, no lights, no phone, no internet, damage as far as the eye can see and further. Floodwater engulfs entire neighborhoods. Food and water are hard to come by, but you managed to salvage a few items from the destruction. Day 2 A helicopter flies over and you assume they are looking for victims, how do you hail them to let them know you are there, a speck among tons and tons of strewn debris? What of the injured, what becomes of them? The helicopter was only surveying the extent of the damage, not necessarily there to help the thousands of injured sufferers who are mostly in a state of shock. Day 3 You share what you and others either found or were fortunate enough to acquire. Day 4 In the distance, a rumble of thunder, a low flying plane drops some supplies to far away to get to because of the rubble. The supplies you gathered are running out, the injured may have perished or infection is starting to set in. Water surrounds you, but it is contaminated. Days 5 & 6 Food runs out, drinkable water is scarce if any is available, still no power, and anarchy starts to set in. Day 7 The sounds of chainsaws and trucks are only a couple of miles away, but the devastation prohibits moving the injured. What supplies there were are gone. Day 8 Hunger, thirst, illness, infection and weather conditions afflict the helpless storm victims. Day 9 Rescue arrives, but at what cost? How many lives could have been saved if the victims had their own emergency disaster preparedness kit or a survival kit? As previously stated, time is not on the side of the victims. Time is also not on the side of the first responders and emergency personnel. The victims of the hurricane must provide for themselves with enough food, water, water filtration, first aid kit, and much more. Click here for a complete list with link to ready.gov. Start getting prepared for the well-being of you and your loved ones. Have the supplies you need on hand with enough provisions for two to four weeks, to prepare for just such a scenario. With over 250 emergency and disaster preparedness supplies and outdoor products, contact Just Us Enterprises – Emergency Disaster Preparedness. A BBB Accredited (A+) business. Emergency and Disaster Supplier is asked what’s the difference between preparedness companies. The end of the world? A well-educated man asked a question today about emergency preparedness to which the answer seemed to surprise the inquirer. The gentleman asked if Just Us Enterprises – Emergency Disaster Preparedness was a “survivalist” company. He suggested that many survivalist internet companies are preparing for an end of the world scenario and he does not believe that will occur. He was not sarcastic or demeaning in any way, just interested in the type of company we are. He wanted to compare our company to the many survivalist and apocalyptic preparedness companies on the internet. He stated that they seem to base their businesses on fear, such as a nuclear attack or the Apocalypse itself. He asked, politely but inquisitively, what makes our company so much better since they all seem to be the pretty much the same. His question made me realize many people think all emergency and disaster preparedness companies are the same. There is an obvious, although apparently not well known difference between Just Us Enterprises and other “survivalist” companies. I must admit when viewed from the gentleman’s perspective, most prepper websites appear to give the impression that TEOTWAWKI (the end of the world as we know it) is going to happen soon and you must be prepared for it. Therefore, they instill fear, show cataclysmic events, and speak of doomsday. They sell merchandise not always designed or manufactured with quality and durability in mind, despite the chaos that they predict. They might sell weapons so you can defend your stash of survival supplies. Chaos and anarchy seem to be predominant themes. I am not suggesting that all prepper websites and survivalist sites are this way, but many are or appear to be fear-mongering entities. They emphasize buying this product or that item for use after the (name the country of your choice) drops the bomb on us. You need to buy this product so when the financial collapse happens you can survive Armageddon. You must have these supplies for whatever hysterical or mysterious purpose suits the seller’s sales pitch. The gentleman’s question, though poignant, was an example of how misunderstood emergency preparedness actually is. Therefore, I explained the difference between us and the other types of survival preparedness establishments that are out there. We consider ourselves practical and conservative, and we tend to advise people to prepare for a major event according to their own budget and peace of mind. We know from experience that real emergency relief can take from a few days up to several weeks before the aftermath of a catastrophe is under control. There are alternative websites, albeit not apparently very many, real legitimate businesses that do not prey on fear, destruction, and mayhem. Just Us Enterprises is an emergency disaster preparedness and outdoor supplier with a reputable character with the Better Business Bureau (A+ accreditation), member of the New Bern Chamber of Commerce, named a top disaster preparedness supplier and a member of FEMA’s Preparedness Community. We follow government guidelines for people to be prepared for an emergency or a disaster. We offer over 250 quality preparedness products, food, water and water filtration, first aid kits and many outdoor supplies. We do not base our business on fear, but we do believe in helping people be prepared in case of an emergency or a disaster. For that matter for outdoor activities too, such as camping, boating and hiking. Just Us Enterprises sells only quality products primarily for both the short term, (and to those who want to prepare for the alien invasion) and for camping, RVing and outdoors. We disassociate ourselves from the scare tactics that some use and concentrate on a more reasonable, sensible and practical application of what emergency and disaster preparedness means. We enjoy helping others to be prepared for an event because we experienced a time when we were unprepared and needed emergency supplies. Unfortunately, we waited until the last minute and found empty store shelves. Our emergency only lasted a few days because the blizzard closed roads and stores, but it would have been nice to have the supplies we needed to sustain our family for that short span of time. We had no electricity, no heat and very little food. We learned our lesson and that is how we look at emergency and disaster preparedness. When a severe storm hits, such as a hurricane or the severe blizzard that we endured, it may take several days to a week or two for relief efforts to get to you. Just like those who lived through hurricanes Sandy and Katrina, and had to wait for roads and bridges to open, electricity to be turned back on and to have clean water running through the pipes, you too, also need to have provisions and supplies. Providing supplies, food and water, and emergency essentials from when the disaster strikes until the time disaster relief arrives is our business. Having quality adequate supplies on hand and prior to a crisis to last until assistance arrives to your location is your business. Everyone needs to be prepared for an emergency or a disaster at least for a short duration, a few days to a few weeks. Anything more than that is optional to the individual’s desires. Briefly, I explained to the gentleman, you do not need to go overboard with supplies or prepare for a long-term catastrophe, unless you want to, but you do need food, water, a first aid kit and emergency supplies for you and your family if the need arises for short-term preparedness. A pre-made survival kit, emergency kit or preparedness package such as those that we provide, are compact and easily portable. Remember: Your own emergency disaster preparedness plan is the key to survival, and your survival depends on how well prepared you are. Let us know what you think, make a suggestion, give us a compliment or ask us a question. You will not be solicited by emails, phone calls or a salesperson. We will just respond and let you decide what to do. By the way, all of our info is fact based and we will give you links when appropriate. Thanks for reading. During this holiday season, we reflect on the events of the year as we prepare for the season of giving. Our thoughts try to drum out the avalanche of bad news as we gather for the feasts of family and friends. We cannot help but ponder how terrible the events of the world are affecting us. You might be thinking of Paris or San Bernardino, or a loved one who has befallen hard times or became ill with a dreaded illness. Those of us, who moved beyond the immediate reach of a couple of hours ride, wonder how those that we left behind are doing. Yes, we have Facebook and Skype, Twitter and the old-fashioned voice by phone, but the personal eye-to-eye contact, the almost imperceptible nuances of body language, and the inflections of each individual’s character is lost in this greatly changing world of the internet. We have become glued to a machine, some of us now talk to our phones and computers, and sadly, the machine takes up most of our time. You can see your grandson or child, but you cannot put your arms around them, nor can you stop them from injury, but you can watch as they hug the puppy or drop the glass of milk and step barefoot on the shattered glass on the floor. The point is, the personal touch is missing and that personal touch is the feeling you have when you hold someone’s hand or give a hug. When was the last time you hugged your computer? You may have given the image of a person a smooch, but not directly to the person to whom it was intended. The computer could care less. Images of people we associate with are not the only ones on the internet. We also have muggers, rapists, thieves and of course, terrorists. The computer is full of politicians, uncouth scoundrels and enough porn and solicitations to corrupt (possibly) the Pope himself. Our financial system relies almost entirely on the internet. We are shocked at the number and frequency of fraud, credit card thieves and stolen identities, but we continue to do business as usual. Hoping that we are not the next victims. My Father once told me “No matter how much you have, someone will always have more. Be satisfied with what you have, but always strive to be better, because good comes to good.” With that statement he added, “I worked hard all my life, I may not have much but I have what I need. I have the love of my family.” Life’s lessons taught us the value of my Dad’s words. I too, have what I need. The love of the woman who sits beside me gives me the strength to get up every morning with a smile. Our children have blessed our lives with children of their own. Our thoughts are with our family, our friends old and new, and to those we do not even know, but try to help them to the best of our ability. When we were younger, we did not prepare ourselves for the events of our lives that shaped our fate. We did not expect illness, financial woes or disaster to affect our future, but it did. We were not prepared for the unexpected but it happened. Unprepared. We learned, the hard way. We have endured our emergencies and disasters so we decided to help others be prepared for disasters, emergencies and crises. That is how our business, Just Us Enterprises got its name. Just Us, resonates our response to the wickedness and disasters that are occurring more and more frequently. People, make up the only species that we know of, which uses intelligence for the betterment or the detriment of themselves, that group of people is us. Just us! Just Us Enterprises started out as a family business, and now we are including all Americans in our name – Just Us Enterprises. Just Us also is similar to “Justice,” also in our motto -” Justice in Quality, Fairness in Price.” This is who we are, a family business built on integrity, with moral values that loves and cares for others. We want to help people prepare for the unpredictable future because being prepared could save a life, maybe your own. Your own emergency disaster preparedness is the key to survival, and your survival depends on how well prepared you are. The government recommends what people should have in preparation for a disaster and we provide those essentials. We offer over 250 emergency and disaster products, supplies and provisions in addition to survival kits, food and water purification systems, therefore we add Emergency Disaster Preparedness to our name. We are grateful to all of those who have helped us in the past, we are thankful to our valued customers throughout the country from Oregon to Florida, Ohio to Texas and everyone in between. We wish, hope and pray that all Americans will have a safe, healthy and prosperous New Year. Just Us Enterprises – Emergency Disaster Preparedness Chapter 2.3 and 2.4 Preparing– lists, gathering supplies 3. How much do you need? 4. Why prepare, is this just a waste of time and money? PREPARING FOR AN EMERGENCY OR A DISASTER Preparing – lists, gathering supplies How much do you need? Determining how much you will need is measured by the number of people in your group, how long you want to be prepared for and of course the unknown variable of the disaster itself. To explain this further, if someone, alone, is going to work and has a breakdown, an Auto Emergency Kit should provide for their needs until help arrives. However, if a hurricane like Katrina or Sandy hits, it could be weeks before you have a resolution to the crisis. Finally, if you believe that a crisis of major magnitude will happen, such as a war, financial collapse, a solar disruption of the electrical grid, or Armageddon itself, than you would want a much longer-term supply of food, water and emergency supplies. For the two examples used previously for a family of four you will need 4,380 meals per year and a minimum of 1,460 gallons of water. Minimum because no one will ever spill or waste any food or water, that is, in a perfect world. Therefore, the answer to “How much do you need?” is in the following three questions. Do you want to prepare for a few days, weeks, months or years? How many people and pets are you preparing for? How long do you want to survive after a disaster or TEOTWAWKI (The End Of The World As We Know It)? Remember, you are the only person that you can rely on to prepare for your probable crisis. Why prepare, is this just a waste of time and money? When confronted with this question, the best response is to point out the fact, that every day you are preparing for something. Here are a few examples; you take a shower to keep your body clean. Why, because you are preparing for work, the doctor, or a night out, but the most important reason is to prevent germs from attacking you. Animals will prepare by storing food in the fall for a long and unknown winter season, because they, like us, have a basic instinct, which is to survive; some animals, like humans, seem to over-do-it, others under-prepare. The ones that under-prepare may suffer from starvation, malnutrition, diseases and possibly death. The military will train their men and women to prepare them for the rigors of combat even during a time of peace. This is a case of readiness. You will generally check the fluids, windshield wipers and emergency auto kit in your car when you are going on a long road trip because you do not want to have problems. Even the Boy Scout’s motto is “Be Prepared.” Preparing is a natural instinct. Therefore, it is natural to prepare for the unknown and unpredictable future. No, it is not a waste of time or money, preparing can save your life. Chapter 2.1 and 2.2 Preparing– lists, gathering supplies 1. Who do you prepare for? 2. What do you need? PREPARING FOR AN EMERGENCY OR A DISASTER Preparing – lists, gathering supplies Once you have defined the Planning part of your emergency disaster preparedness plan, you can start to prepare. With a Plan in place (discussed under No Simple Answers – Planning, with multiple parts), starting the preparing stage of gathering information and emergency essentials also begins with lists of Who, What, How and Why Who do you prepare for? Prepare for the number of people in your family, group or organization and add a cushion of emergency preparedness supplies. This seems like a simple answer, however, disasters affect more than those in the immediate group. Others from outside the group will also need supplies. If you planned adequately, you should have more than just enough for you and your group. Make lists; or have copies of these documents, include phone numbers, addresses, email and social media contacts. In times of extreme stress, memories can be inaccurate or even become forgetful, and it is impossible to remember everybody’s email address from doctors, financial institutions and businesses that you use. Put this secure information in a watertight container with your survival kit, so if you have to evacuate, you will have the information with you. Contacts of relatives, close friends and people you can trust Doctors, attorneys, investment brokers and co-workers Financial Institutions and account numbers – banks and investments Important documents – vehicle registrations, deeds, titles, marriage and birth certificates insurance policies Medications – if you have to leave the area having the correct name and dosage will be helpful, include the prescribing doctor’s name and the pharmacy information Insurance Companies and policy numbers Place(s) to meet – if communications are lost or a member is separated from your party, you will have a predetermined meeting location Supplies, food and water; these may need to be rationed Maps; GPS systems may not be functioning What do you need? The most important survival categories are food and water, shelter and warmth and protection for medical reasons and from assailants. There are several more categories, including equipment, tools and essential supplies that require attention as priorities. What you need is dependent on two things, the “who” (or how many people), and the type of emergency or disaster that you are preparing for. Emergencies and disasters, like footwear, come in an abundance of varieties, types and dreads. You probably will not wear slippers or high heels to a rodeo; likewise, you probably would not have a basic bug out bag for one person, while getting a family of four ready for evacuation when a hurricane or flood is inevitable. You may not know the type of emergency you probably will encounter, but to your advantage, you do have knowledge in your favor. You know the number of people that you are preparing for. Additionally, you can take an educated guess as to the types of disasters that occur in your area, and you can acquire your emergency supplies based on your budget, knowledge and experience. Battery-powered or hand crank radio and a NOAA Weather Radio with tone alert and extra batteries for both Cell phone with chargers, inverter or solar charger Dust mask to help filter contaminated air and plastic sheeting and duct tape to shelter-in-place First Aid Kit Flashlight and extra batteries Food, at least a three-day supply of non-perishable food [per person] Manual can opener for food Moist towelettes, garbage bags and plastic ties for personal sanitation Supplies for Unique Needs, [medications, crutches, wheelchair] Water, one gallon of water per person per day for at least three days, for drinking and sanitation Whistle to signal for help Wrench or pliers to turn off utilities Once you have gathered the supplies for a basic emergency kit, consider adding the following items: Books, games, puzzles or other activities for children Cash or traveler’s checks and change Complete changes of clothing including a long-sleeved shirt, long pants and sturdy shoes. Consider additional warm clothing if you live in a cold-weather climate. Emergency reference material such as a first aid book Feminine supplies and personal hygiene items Household chlorine bleach and medicine dropper – When diluted, nine parts water to one part bleach, bleach can be used as a disinfectant. Or in an emergency, you can use it to treat water by using 16 drops of regular household liquid bleach per gallon of water. Do not use scented, color safe or bleaches with added cleaners. Important family documents such as copies of insurance policies, identification and bank account records in a waterproof, portable container. You can use the Emergency Financial First Aid Kit – EFFAK (PDF – 977Kb) developed by Operation Hope, FEMA and Citizen Corps to help you organize your information. Infant formula and diapers Matches in a waterproof container Mess kits, paper cups, plates, paper towels and plastic utensils You may not have the desire or the time to build your own emergency disaster preparedness kit. There are many different styles of emergency kits, from a basic, single person survival kit to deluxe and élite kits and specialty survival kits for campers and outdoor activities. There are also Emergency Kits made for hurricanes, tornadoes, earthquakes and wildfires along with those for auto, children, pets and lockdown situations. In addition to the survival and emergency disaster preparedness kits, Emergency Survival Preparedness Packages that contain multiple survival and emergency kits are also available. Emergency Disaster Kits and Emergency Survival Preparedness Packages like the Emergency Preparedness Package – 4 Person w/ Food Storage has survival supplies that your family of four will need for a week. Containing food, water, first aid kits, space blankets and much more than can be listed here, this Emergency Preparedness Package includes a basic Auto Kit, a Mini Survival Kit, a 56 Serving Grab n Go Food Bucket and a 4 Person Bucket Survival Kit. This package is compact, has what is needed, and it is portable. This is a quality preparedness package, designed by professionals and provides emergency essentials for the family in a time of crisis. A great value and it will last for many years even if not used immediately, because the food is long-term. Take this scenario. A plumber has a family of four, lives in Ohio, has limited resources and it is late spring. He knows that the river floods every spring due to the melting snow, warmer temperatures and spring rains. He also knows that tornado season is soon to follow. The storm shelter will protect his family from the storm. This is what we know. There are four people and two common types of potential disasters in his area (flooding and tornadoes). He needs to prepare in advance for the probability of either the flood or a tornado (or both), which are common events in his area, to affect his family. He also must provide them with enough emergency essentials until help arrives, and take into consideration the possibility of providing for other victims. Basic emergency calculations The basics of preparing for an emergency are food, water (and/or a water filtration and purification system), shelter and protection. In addition, we recommend a first aid kit, cooking utensils, warmth, clothing, tools, medications, a means to make a fire and your lists (as previously noted). These essentials multiplied by the number of people will give you an approximate total of what you will need per person per day. Food: To figure out the number of meals you will need, take the total number of people, multiply it by the number of meals per day, and multiply that times the number of days you want to be prepared for. For example, assuming a family of four eats three meals per day and you want to have enough food for a week, the formula to use is 4 (people) x 3 (meals) x 7 (days) = 84. Simply put, multiply the (number of people) in the group times (number of meals each person eats per day) times (number of days) equals the number of meals needed. Water: Another example, using a family of four and FEMA’s recommendation of 1 gallon of water per day per person is calculated as: 1 (gallon/day) x 4 (people) x 7 (days) = 28 gallons Or for a year’s supply of water 1 (gallon/day) x 4 (people) x 365 (days) = 1460 gallons Many people have stated that they do not drink a gallon of water per day. Remember you will also need clean water for brushing your teeth, washing, cleaning dishes, cuts, scrapes and injuries and cooking. Water, left in the open, becomes contaminated with bacteria, viruses, cysts, microorganisms, dirt, bugs and other pollutants. You should have a water filtration and purification system that does not require electricity. To purify water, use household bleach only as previously recommended, do not use unscented, color safe or bleaches with added cleaners. The minimum amount of water for this family of four for a year is 1 x 4 x 365 or 1,460 gallons of water. By comparison, the Water Filtration and Purification systems available from Just Us Enterprises will produce 1,200 to 1,800 gallons of water. These systems eliminate over 99.99% of contaminants, is portable and lightweight and comes in different sizes. An optional Nano Filter is also available to filter out smaller particulates. Food and water are major considerations when preparing for a disaster. Survival kits and bug out bags will supply emergency essentials for a short-term, about 3 days. Larger emergency kits, Preparedness Packages and long-term foods are now available for more people and for longer durations. Make your own emergency kit with personal effects made from scratch or purchase an emergency kit and customize it with your own belongings. Even though emergency disaster preparedness planning and supplies may not be at the top of the “Most Wanted” list, it should be. Thank you for following Just Us Enterprises, the Emergency Disaster Preparedness company, and liking us on social media. We now provide emergency, disaster and preparedness products to schools, OEM and fire departments. Chapter 1.6 & 1.7 Planning – the compiling of lists 6. Where do you store your emergency disaster supplies? 7. When is emergency disaster preparedness necessary? Planning for an Emergency or a Disaster Where do you store your emergency disaster preparedness supplies? This is another complicated answer. Your supplies must be in a place protected from moisture, weather, animals, water, insects and other variables like freezing temperatures, heat, and the elements just to name a few. Protect your supplies from contaminants that may leach into your supplies, and put the food in food safe storage containers. There are plastic containers that are not food safe, and metal will rust overtime. Your life sustaining merchandise must be accessible to retrieve in the time of need, but secure from thieves. A bunker would be ideal, but a bunker is not practical for the average person. Unless you are privy to insider information as to the type, place and time of the disaster, having many years of a food supply, water and emergency essentials stored in a bunker buried in a mountainside, may be futile if it takes hours to get there. It may be impractical, because of the uncertainty of road conditions and any number of circumstances that may prevent you from getting there. For example, a bridge to the BOL (bug out location) site may have washed away by floodwaters or destroyed by an earthquake preventing travel to the location. The road could be littered with unknown hazards such as fallen trees by a tornado, a landslide or drifts from a blizzard. There is another problem. People! When disaster strikes, civilization, as we know it breaks down and anarchy takes over. People who want your stash are willing to do any number of things, including murder, so they can have it. They will take what they want by any means at their disposal. Proven time after time, people are their own worst enemies. People will beg, borrow, rob and steal from those who have what they want, even if they do not need it. I watched a video after Katrina hit New Orleans. The city was flooded, there was no electricity and yet, looters were stealing large screen TVs from a store. Looters run the gamut after a disaster, be mindful of this when deciding where to stash your emergency supplies. On the other hand, if you and your party were able to make it to your BOL, safely, it definitely would be worth having. When is emergency disaster preparedness necessary? Look around, the media always exploits the bad news, the more negative, the more sensationalized, the better the network ratings. Listed below are a few reasons to prepare for an emergency sooner, rather than later. The weather forecasts of tornadoes and severe storms in the Midwest are in stark contrast with the California drought. Spring rains and this winter’s snowmelt threatened the Ohio Valley, the Northeast and the lower Mississippi River with flooding. This past winter, Boston’s snowfall recorded over nine feet of snow. Wildfires, there were 6,526 fires covering 100,217 acres from the first of 2015 until March 13, 2015 (source: National Interagency Fire Center). Most of these wildfires were in the West. Natural phenomena such as earthquakes (Nepal, Haiti, and Japan), volcanos (Kilauea in Hawaii, Italy, Indonesia, and Chile) and landslides are causing devastating damage. Solar flares recently threatened and have the ability to disrupt electrical power grids, internet and communications, satellite and phone services. Violence is rampant in our great land, from a dean at a Boston public high school accused of shooting a student in the head, to a man in Mesa, Arizona who shot four victims in multiple locations. Great cities are succumbing to fear and anger, because of the inequality in justice issue, causing anarchy to rise. Wars and terrorism add to our complex lives, should we be preparing for a war here in the United States? Some say war will never come to our country. Some say ISIS, or some rogue semi military extremists will invade our country in small groups at first, while making our leaders believe they are focusing on foreign targets. Others believe a revolution has already begun between civil groups as evidenced by the recent intense hostility between authorities and the people of Ferguson, Missouri, and in Florida, Chicago and Baltimore. Some even further believe the revolution has already begun because of money, “the root of all evil.” When the market crashed in 2008, hundreds of thousands lost their jobs, only to regain lower wage earning jobs. Some never reentered the workforce. The statics claim the jobless rate is down, but so are wages. As wages decreased, prices rose causing those earning less to pay more for the same item. The huge and widening gap between the wealthy and the average and low wage earner is creating resentment. This ever-growing rift, between the rich and the poor, is causing a mindset in some people that they resort to violence to achieve feeding their families, or obtaining what they want. This type of animalistic and infantile approach to solving a problem is creating terrorism in our neighborhoods.
<urn:uuid:327dbbc6-24c7-467e-8a1f-77e275f60629>
CC-MAIN-2017-26
https://justusenterprises.wordpress.com/tag/emergency-supplies/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321025.86/warc/CC-MAIN-20170627064714-20170627084714-00328.warc.gz
en
0.955709
8,479
3.140625
3
Here you can find information about internet of things if you are digging deeper to discover what is internet of things. Not only the technologies used in internet of things are the future, they are also the current trend on both physical and cyber worlds, whether you are a business owner, or for personal use, the internet of things brings convenience to you with the connection to global network. Light fixtures that intuit your desired brightness throughout the day, voice-controlled entertainment systems and appliances, self-adjusting room temperature controls that learn your preferred settings, and smart lock systems that detect your presence. These are just some of the incredible automations that Wi-Fi-controlled smart home equipment and smart home technology have to offer. Have you ever dreamed of way to make everyday tasks easier in your life at no extra cost to your energy bill? With a smart home, this dream is possible. Through Energy saving smart home devices, energy management, remote monitoring, home automation, and personal assistant devices, a smart home owner is able to save and reduce energy consumption all while enjoying a greater sense of convenience. These are just some of the results of smart home devices that save money. Through effective means of surveillance, motion alerts, medical alert devices, automated thermostats and lights, and smart locks, automated smart homes provides care, comfort and security to those who may need it most. These are just a few of the benefits of smart home technology. Smart homes can and will become incredible tools in our everyday lives. Convenience, security, and safety are put some of the benefits, but do not forget that every smart home relies smart home management and 3 networks that are indispensable; wireless speakers, smart thermostats, and smart bulbs and all Different types of smart home technology used to better our lives. Homes need proper maintenance. Gutters must be cleaned out, AC filters must be cleaned, furnaces inspected. Just like a regular home, smart home automation products are also subject to regular maintenance and upgrades. Through proper smart home maintenance and care, your automated smart home should always run smoothly, hassle free. The key to proper maintenance lies checking and monitoring your network and insuring your security through periodic inspection and of course, through updating outdated devices. Use of robots in business may sound like science fiction, but their application in the work setting is something businesses and consumers alike need to accept. With commercial robots providing service assistance or human interaction through automation and reflexive learning, it is simply a matter of time before robotics in business becomes ubiquitous in the world of commerce. The application of robots in manufacturing industries is nothing new to the factory floor. For years, people have been using machines to assist in the production process, helping factories produce new products of the future. As the field of robotics improves at accelerated speeds, the capabilities of industrial robots is pushing manufactures to new frontiers. What sets smart manufacturing apart from normal production? Integration. Smart manufacturing is manufacturing that goes beyond what a normal factory can do. Machines in smart manufacturing applications are not just automated or programmed to perform tasks, they’re processing data, learning, computing and communicating. It takes what robotics does in the industrial space and combines it with smart devices, to form a smart factory that is fully integrated. This is what defines industry 4.0 and smart manufacturing. In the age of the smart machine, how does smart machinery benefit you? Connected through a wireless network, smart devices can be integrated and connected to a business, office, or factory. By utilizing business application on internet through video cameras, businesses can monitor energy usage, productivity, safety, and security. Would you like to convert your "dumb" home into a smart home? Check out our list of the best smart home devices. Our simple breakdown will show you how to build a smart home with the best smart home devices 2018. These home automation devices and connected home devices can help you get started. Different kinds of business found within a country or city, each with their own transportation needs. Perhaps this is why the smart transportation vehicle sector is one of the fasted growing Internet of Things (IoT) sector. But how is artificial intelligence used in transportation? How will transportation change in the future? Let’s breakdown how smart transportation using IoT and IoT in transportation is changing how we do business. For those of the "sandwich generation", that is, people in their 30s to 40s who have to take care of their children and their elderly parents at the same time, the complexities of aging become more serious and dangerous. But do not despair, as there are a multitude of products to help elderly at home nowadays. For instance, smart home systems for elderly are being used to help with these increased needs. A smart home for elderly and disabled family members not only improves quality of life, it gives caregivers peace of mind. Let’s go over how new and innovative technology for older adults can help. Security cameras are an important part of our day-to-day lives. But dud you know there are different kinds of security cameras? Do you now difference between IP camera and CCTV? Can you compare IP cameras and CCTV? This introduction will help you do a security camera quality comparison so you’ll know which one is the best security camera for your home. Let’s start with the basics. When you walk into a supermarket, you might notice some cameras above your head. These are CCTV. Nowadays, people are moving away from CCTV and owards IP cameras. Let’s take a look at why IP cameras are the best for in home use. Robot butlers were once only seen in science fiction movies. The idea of a robot assisting with day-to-day chores was only a fiction on the silver screen. But advancements in the field of robotics have now brought us closer than ever before to that kind of future robotic technology once only dreamed about. It won’t be long until we can imagine a world where robots replace human jobs considered undesirable. These smart robots will assist us many ways, from helping elders, caring for children, or keeping us safe. Without a doubt, the importance of machines in human life is great. Let’s discuss some of the best smart robots available, and how robots affect our everyday life. Using robots in manufacturing is not breaking news anymore. In fact, the industrial robotics market is many decades old. However, there are a number of novel ways that the robotics in automotive manufacturing is being used. These robots contribute to the automation in the automotive industry. But apart from automation in automotive manufacturing, these robots are making things safer and more efficient in the factory Vision guided robotics years ago may have seemed like a fantasy. With the improvements of cameras and vision guided robotics, machine vision and applications are becoming a reality.Machine vision in robotics is the combining of cameras and vision guidance programing, with robotic automation, allowing machines to perform more complex tasks What happens when you combine smart manufacturing with big data? In fact, this combo is the basis of smart manufacturing and Industry 4.0. As we will soon discuss, there are many different benefits in bringing together the Internet of Things and manufacturing. For many factories, the Internet of Things smart factory is already a reality. Let’s take a closer look at how Industry 4.0 and big data are changing the way the world manufactures What are the IoT applications in healthcare? Some readers may already know the many utilities of the Internet of Things in healthcare. It’s becoming more common these days for people to use the power of their phones to facilitate a doctor visit or an examination. In fact this is the projected future of IoT in healthcare. It is the basis of what’s to come. Imagine a future where IOT devices collect data and share it to their cloud. Then, medical professionals and medical devices communicate with each other to provide a clearer portrait of a person’s health. This is actually the current model of internet of things medical application. Let’s take a closer look. Nowadays, sensor technology for smart homes has become more commonplace. In fact, most readers will already have a cursory understanding of the important role that the sensors used in internet of things play. But IoT sensor technology can expand beyond the smart home. Let’s discuss some applications of internet in business.
<urn:uuid:fcfb90ee-123d-4a24-95c4-df595c842b10>
CC-MAIN-2023-23
https://www.taiwantrade.com/seo/introduction-to-internet-of-things.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224643585.23/warc/CC-MAIN-20230528051321-20230528081321-00018.warc.gz
en
0.935404
1,705
2.5625
3
The dopamine hypothesis is a long standing explanation for psychosis and schizophrenia. The theory developed aside the abundance of research into dopamine during the 1960’s and 1970’s which was encouraged by dopamine being recognized as an important neurotransmitter in the brain (Carlsson , Lindqvist, Magnusson, & Waldeck, 1958). It suggests that schizophrenia is the result of an imbalance of the neurotransmitter dopamine, which is related to the brains reward and pleasure pathways. Individuals with schizophrenia have been found to have abnormally high numbers of D² receptors on their neurone synapses leading to increased neurone firing and thus higher levels of dopamine. Van Rossum (1966) suggested the theory of schizophrenia and psychosis is the result of over active dopamine pathways in the brain. His research provided evidence that neuroleptic drugs block dopamine receptors in the central nervous system indicating that these drugs are successful due to their ability to reduce levels of dopamine (Van Rossum, 1966). Supporting research includes antipsychotic drugs, such as thorazine and haldol, which reduce psychotic symptoms by blocking dopamine activity in the brain. (gleitman, Gross & Reisberg, 2011).Van Rossum and Hurkmans (1964) showed that the psychomotor stimulating effects of dexamphetamine and cocaine were due to direct and/or indirect stimulation of dopamine receptors suggesting a link between psychotic behaviour and dopamine. Temporary psychosis has been induced in mentally sound individuals when over dosing on high amounts of amphetamines (of which stimulate dopamine activity) (gleitman, Gross & Reisberg, 2011). Also, evidence derives from individuals with Parkinsons disease as many are found to have low levels of dopamine. Individuals that were given the drug L-dopa, that increases dopamine levels, were found to develop symptoms similar to that of schizophrenia (Grilly, 2002). However, more current research suggests that the symptoms of schizophrenia are more likely to be influenced by both deficits and excesses of dopamine in the brain rather than merely over active dopamine production (Abi-Dargham, 2004). The updated dopamine hypothesis indicates that there is a co-existing deficit of dopamine in the cortex and an excess in the sub cortex of individuals with schizophrenia (Abi-Dargham, 2004). The revised theory is still not conclusive as other neurotransmitters have also been found to produce schizophrenic type symptoms such as glutamate. The blockage of glutamate receptors by the illegal drug Phencyclidine induces schizophrenic-like symptoms (Gorelick & Balster, 1995). Also, the increase in glutamate levels has been found to alleviate positive and negative symptoms of schizophrenia (Goff & Coyle, 2001). Therefore this suggests that the dopamine hypothesis is too basic to explain schizophrenia and rather a theory that incorporates the effect of a variety of neurotransmitters and/or their pathways is more plausible. Abi-Dargham, A. (2004). Do we still believe in the dopamine hypothesis? New data bring new evidence. International Journal of Neuropsychopharmacology, 7(1), 1-5. doi: 10.1017/S1461145704004110 Carlsson A, Lindqvist T, Magnusson T, Waldeck B. (1958). On the presence of 3-hydroxytyramine in brain. Science, 127, 471. Gorelick, D. A., & Balster, R. L. (1995). Phencyclidine (PCP). In F. E. Bloom & R. L. Kupfer (Eds.), Psychopharmacology: The fourth generation of progress (pp. 1767-1776). New York: Raven Press. Goff, D.C., & Coyle, J.T. The emerging role of glutamate in the pathophysiology and treatment of schizophrenia. Am J Psychiatry, 158, 1367–1377. Gleitman, H., Gross, J., Reisberg, D. (2011). Psychopathology. In Snavley, S. L. (8. Ed.) Psychology Eighth Edition (pp 664-666). New York, London: Norton & Company, Inc. Grilly, D. M. (2002). Drugs and human behavior. Boston: Allyn & Bacon. Van Rossum JM, Hurkmans JAThM (1964) Mechanism of action of psychomotor stimulant drugs. Significance of dopamine in locomotor stimulant action. International Journal Neuropharmacology, 3, 227-239. Van Rossum, J. M. (1966). The significance of dopamine-receptor blockade for the action of neuroleptic drugs. In: Excerpta Medica International Congress Series No. 129 Proceedings of The Vth International Congress of The Collegium Internationale Neuropsychopharmacologicum Washington, 28-31, 321-329.
<urn:uuid:cf2e1ac8-5e4f-4e0e-9880-93d9d7e26d91>
CC-MAIN-2014-10
http://sophpsych.wordpress.com/2012/04/29/the-dopamine-hypothesis/
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394010557037/warc/CC-MAIN-20140305090917-00091-ip-10-183-142-35.ec2.internal.warc.gz
en
0.854413
1,009
3.25
3
Today local Euro MP Catherine Bearder took part in celebrations to mark the 20th anniversary of the fall of the Berlin Wall. On 9th November 1989 over a million people in East Germany took part in a protest that ended with the Berlin Wall tumbling down. This set off a chain of events that led the countries of Eastern Europe to "return to Europe"*. "The Berlin Wall was a physical barrier that represented the divisions we Europeans have built between ourselves for centuries." "When people gathered in East Germany and demanded their right to live without these divisions imposed upon them, they beckoned in a new era of European history." "Since 1989 Eastern and Western Europe have been united under the banner of the European Union. The EU was founded on a spirit of cooperation. There are so many people working in the European Union so that Europe will not be divided again."
<urn:uuid:b1e29bd7-9a93-4e45-87bb-acec3a8a0141>
CC-MAIN-2020-16
http://www.bearder.eu/europe_20_years_on
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370505826.39/warc/CC-MAIN-20200401161832-20200401191832-00146.warc.gz
en
0.962215
176
2.703125
3
2) 1 renews T ?wsletter of the iuCY/SSC Sfrenia Specialist group NUMBER 2 OCTOBER 1984 EDITORIAL: TO BREED OR NOT TO BREED? Most readers of this newsletter are aware that several aquaria (at Miami, Amsterdam, Nirnberg, and Beijing) have in recent years successfully bred West Indian manatees in captivity. The Miami Seaguarium has even been able to release two captive- bred animals to a semi-wild environment (see news item in this issue). However, another byproduct of this success which has received much publicity over the last few months is a proposal to place 50 or more wild manatees in captivity for breeding purposes, with the eventual aim of restocking to offset mortality in the wild (see below, abstract by Cardeilhac et al. and cited articles by DiPerna and White). All biologists applaud these breeding successes, and hope that such efforts will continue. And if there develops a surplus of captive-bred animals not needed for research or display, it is certainly desirable for them to be released into the wild. The suggestion at which biologists balk, however, is that large numbers of manatees should be removed from already-depleted wild populations for the purpose of captive breeding. A variety of objections to such a project have been raised: the danger of death or injury to animals during capture and transport, the possibility of accidents during captivity (two fatal accidents have already befallen the Miami Seaquarium's captive-bred manatees), the potential dangers of inbreeding, the UNION INTERNATIONAL POUR LA CONSERVATION OE LA NATURE ET OE SES RESOURCES INTERNATIONAL UNION FOR CONSERVATiON OF NATURE AND NATURAL RESOURCES Commission de la seuvegarde des espbes---Species Survival Commission Sirenews Is edited by Daryl P. Domning, Dept. of Anatomy, Howard University, Washington, D.C. 20059 USA. It Is supported by the Species Survival Commission of IUCN, the U.S. Fish and Wildlife Ssrvine. and the U.S. Marine Mammal Commission. question of captive-bred animals' ability to adapt to the wild, and the sheer cost of large-scale, labor-intensive captive maintenance. Still worse is the danger that some people, especially government officials with management responsibilities, may come to view wild manatees as expendable if they think they can be "replaced" easily from captive stock. Yet to my mind there are even more fundamental flaws in the idea. I would ask: what problem is such a program designed to solve, and what is the philosophical basis (and hence the wider implications) of the proposed solution? Only after answering these questions can we intelligently judge the likelihood of success. To put breeding animals in "protective custody" might be a logical response to conditions which make breeding difficult or impossible in the wild. But Florida manatees are breeding perfectly well in the wild; faster, probably, than in captivity. Aerial and ground surveys report healthy numbers of calves. Florida manatees are threatened not by an insufficient birth rate but by excessive mortality. The proper response, therefore, would seem to be concentration of effort on reducing mortality, while allowing the population to reproduce naturally. Moreover, there is good evidence that natural winter mortality hits hardest the weaned but immature animals, which apparently lack the experience to find warm-water refugia in a timely manner. Captive-reared manatees might be expected to fare even worse, both at this task and at that of avoiding motorboats. If the environment is so dangerous for adults that protective custody is called for, will it not be equally dangerous for their newly released offspring? I conclude that captive breeding to restock wild manatee populations is a solution in search of a problem. More bothersome still, in my opinion, is the philosophy that invariably the best remedy for ill effects of human activity is more human activity. When a species has become endangered through man's meddling with its environment, it is safer and wiser to back off as far as possible toward the natural situation, rather than move toward a still more artificial one. We know that the species can survive in its original environment; it has done so for millions of years. But experience should have taught us that the conditions we ourselves create are rarely stable, never provide all the benefits advertised, and always have unpredicted and unwelcome side effects. No well-informed species would choose to depend on man's care, however conscientious and well- intentioned. If we are honest we must admit that we lack the wit to guarantee even our own survival, let alone that of other Heroic attempts at captive propagation have been resorted to with critically endangered species like whooping cranes and golden lion marmosets, but it is too soon to tell whether these efforts will succeed. Far better that manatees are never allowed to decline to the point where such massive intervention is needed. Responsible stewardship of nature must be based on the principle of nature's right to autonomy: we are obligated to set aside enough space and resources for wild populations to survive on their own, without coming to us for handouts of food or shelter. Aesthetics aside, we humans are neither wise enough nor trustworthy enough to meet their needs for centuries or millenia to come. Let us, in this area at least, put aside our technologist mentality and stop tinkering. Let us respect nature's ability to get along without us, and in so doing let us learn a little humility. DPD Having been among the earliest modern workers on the Sirenia, we are specially glad to see the birth of Sirenews and congratulate its editor, Daryl Domning. When we started study on the Manatees in Guyana in 1962 and the Dugongs in Queensland in 1965, there was almost no knowledge about Sirenia (except of their anatomy), nor workers on them and little known even of local distribution let alone world distribution, growth or breeding rates. The need for conservation measures everywhere for them was little in the minds of scientists and not at all on the conscience of the informed public. Progress has, by the diligence particularly of workers in Florida, Manaus and Queensland, been greatly encouraging. Yet sadly it should be recognized that during this little more than a score of years, probably the total of individual Seacows alive in the world has diminished. Concurrently quite certainly the total of our own species, their ultimate predators, has increased by 1000 million. That is the true measure of the need for conservation effort world over. As we ourselves retire through age from direct effort on behalf of the Sirenia, we wish our friends and fellow workers full vigout and success. Kate Ricardo Bertram [EDITOR'S COMMENT: Newcomers to sirenian research and conservation may not realize how recent a phenomenon is the worldwide interest and activity reflected in this newsletter. Scarcely fifteen years have passed since Colin and Kate Bertram were virtually the Qaily people on earth speaking out urgently and consistently for the study and protection of sirenians. The fact that so many hands have turned to this work in the ensuing years is a tribute to the effectiveness of their pleas. Their voices in the wilderness prepared the way for the present flowering of sirenian biology, and they are the spiritual parents of all of us who work in this field. We owe them our gratitude, and wish them long life and happiness in their retirement.] THE SIRENIA SPECIALIST GROUP AND ITS FUNCTION The Sirenia Specialist Group should serve as a primary source of the scientific and technical information required for the conservation of the Sirenia, as well as recommending and promoting measures for their conservation. Within this context, we must gather, review systematically, and assist in the dissemination of information on the status of each sirenian species, and identify which are endangered or vulnerable or are likely to become so. We must ensure the accuracy of the species accounts in the Red Data Book. As necessary, we must identify the causes of actual or potential threats to the survival of the species and devise ways to obtain information needed. We must prepare, or advise on the desirability and practicality of, specific proposals for management that would reduce or eliminate threats to species survival. We must identify regions and ecosystems where there are significant numbers of endangered species. We must advise on controversial issues regarding the management of species. We must identify situations where international cooperation is needed in the conservation of sirenians and other non- domesticated fauna, and recommend the form of cooperation that should be undertaken. We must participate in the development of the World Conservation Strategy, the programme of IUCN, and, as necessary, in the development and screening of projects, and maintain a roster of experts from which individuals or groups can be selected to assist in those and other specific tasks. We must facilitate communication within the professional community concerned with the role of the Species Survival Commission. Robin Best Dr. Masaharu NISHIWAKI 14 April 1984,- in Tokyo, of a heart attack at the age of 69. Mass Stranding of Dugongs. On 23 March 1984, Cyclone Kathy crossed the coast of the Gulf of Carpentaria in northern Australia, severely damaging the isolated township of Borroloola, wrecking several trawlers and killing one fisherman. The accompanying storm surge swept across the vast complex of saline coastal flats and mangrove-lined channels that compose the McArthur River delta. The retreating water stranded hundreds of large sea turtles, numerous large fish and rays and at least 27 The stranded animals were not observed until five days after the cyclone. When officers of the Conservation Commission of the Northern Territory established that most of the dugongs and sea turtles were still alive, the Commission decided to mount a three-day rescue operation. Many Borroloola residents postponed their own post-cyclone cleanup to help. The Australian National Parks and WIldlife Service funded the travel expenses of dugong and turtle biologists so that they could offer specialist advice and collect data from the stranded animals. In the area affected by the storm surge, enormous tracts of mangrove trees were bereft of leaves. The mudflats were very wet, making walking extremely difficult, but were criss-crossed with the tracks of hundreds of turtles going nowhere, and studded with the carcasses of dead fish and huge rays. Most dugongs were in wallows about 3 m in diameter, containing water up to about 30 cm deep. Only the backs of these animals were protruding. Even this region was kept moist as the dugongs spun around their longitudinal axes occasionally. This is the same behavior which renders dugongs particularly susceptible to drowning in nets. We first thought that this wallow-making behavior was amazingly adaptive, but it soon became obvious that the wallows were the inevitable result of the animals' thrashing around in the mud. Some dugongs had moved up to about 20 m across the mudflats. Such movement seemed to be by rolling. We saw no evidence of dugong flipper marks. The only practicable means of reaching the animals was by helicopter. The dugongs were very distressed by the engine noise and reacted by frantically pounding their tails. We located seven dugongs on the first day of the rescue, one week after the cyclone. Five were in wallows; the other two were in drier areas but covered in mud. We were amazed at how good their condition was. There was little evidence of superficial skin damage apart from some slight cracking, but the undersides, especially of the larger animals, were extensively bruised. Large "dugong tears" dribbled from the eyes of animals once they were out of the water. Not surprisingly, some of the dugongs had apparently lost weight; the outlines of the spinal processes of two males were visible and the large females seemed to have lost condition around the belly area. Most of the dugongs thrashed about vigorously on approach and were quite difficult to handle. At the suggestion of a local fisherman, we tied a rope around each dugong's tailstock prior to hauling it onto the helicopter cargo net, which we lined with a tarpaulin in an attempt to prevent rope burns. Getting the dugongs into the net was not easy, especially in the case of large animals, and I ended up with a spectacular black eye caused by a blow from the tail-fluke of one large female. Once cocooned in the cargo net, each animal was lifted off with the helicopter, carried to a nearby watercourse, lowered and released. The first three dugongs were small (2 m long or less), and stranded relatively close together. The operation to rescue and release them took only 40 minutes. We then rescued a large (2.8 m) female and another young female. All swam off strongly and we began to feel quite blas6. The fourth animal was an adult male. He was very strong and vigorous, and we were very wary of his tusks as he fought to stay out of the cargo net. We finally managed to restrain him and he was lifted to the bank of a nearby creek. We were shocked to learn that he was dead on arrival. A large female with long nipples and bulging vulval region was next. She became quite frantic when approached, spinning around and around, and whipping her tail. She quietened down in the net after wriggling into a head-down position so that her nostrils were covered for much of the five-minute journey. She too was dead on arrival. We necropsied both animals soon afterwards, racing against the dusk. The male was fairly old, but not in breeding condition. The female was very fat, pregnant with a 30 cm foetus, and lactating: the first pregnant, lactating dugong I have seen. Neither animal showed any evidence of injury or disease. In both cases, the alimentary canal, including the stomach, was packed with seagrasses. Apparently the digestive system had shut down after the stranding. We collected a range of specimens for The only other dugong necropsied was another lactating female which we found dead eight days after the cyclone. She had been dead for about two days. Again, there was no evidence of injury or disease and the alimentary canal was packed with By day two of the rescue operation, we had evolved quite an efficient rescue technique. Once a dugong was located, the "capture team" of four or five people was landed by the Jetranger helicopter as close to the animal as possible. The "release team" of three was then landed adjacent to the nearest suitable watercourse. The "capture team" measured and sexed the animal, and manhandled it onto the cargo net. We would then go and wait away from the dugong for the helicopter to reappear. There seemed to be a lot of waiting, and we found that the dugong would lie much more quietly if we kept our distance. When the helicopter returned, one of the team would hook the net up as the helicopter hovered overhead, while I directed the pilot using hastily- learned standard signals. We would then watch nervously as the dugong was raised by the helicopter. Although the 2.8 m-square cargo net was fine for juveniles, it was barely adequate for the adults which ranged up to 2.9 m in length with an estimated weight of nearly 400 kg. Two animals wriggled so much that they nearly dropped out of the net. In one instance, I was so horrified at the prospect of a dugong falling from 50 feet that I put my hand over my mouth, much to the consternation of the helicopter pilot who couldn't understand this new hand signal. Amazingly, we had no more deaths. The "release team" found it best for the dugongs to be lowered directly into the water by the helicopter. On one occasion, they had to scare a crocodile away before the dugong was lowered. Most dugongs swam off strongly. One large female seemed disoriented and lay quietly for a few minutes before swimming away. The two smallest animals, calves just a few months old, swam around aimlessly as if looking for their mothers. Their survival prospects seemed very slim. We sighted a total of 27 stranded dugongs. Only two of these were already dead. Twenty-three of the remainder were successfully released over three days. By the end of the third day the general condition of the dugongs had markedly deteriorated. Their skin was cracking and peeling. Some animals were almost moribund in the wallows, which were rapidly drying up. I measured the water temperature in one wallow; it was 35 Centigrade at 11 A.M. Even if we had had the funds for another day's helicopter time, I doubt that we would have found many more dugongs alive. The total number of dugongs stranded by the surge is unknown as we were unable to search the whole area. We found dugongs scattered over about 200 square km and up to 8 km from the sea. One large female was behind a clump of mangroves about 3 m high. Of the 25 stranded dugongs sexed, 12 were male. All but two of these were juveniles, including one animal only a few months old. I find it amazing that such a young dugong could survive for more than a week without food. It is also interesting that the only three dugongs that we heard calling were all young calves who made soft bird-like chirping noises. Six of the stranded females were also juveniles. Of the seven adult females examined, three were probably both pregnant and lactating, while another three were probably lactating. Thus it seems that a high proportion of the animals stranded were mothers and calves. One of the most rewarding aspects of the whole exercise was that it provided the opportunity for people from very diverse backgrounds to work together. Fishermen, native hunters, other Borroloola residents, wildlife rangers and scientists, all learned a great deal about each others' points of view. We also gained valuable information about dugongs and sea turtles. - - Helene Marsh The First South American Workshop on Marine and Freshwater Mammals, held in Buenos Aires in June and organized by Lic. Hugo P. Castello, was well attended by aquatic mammal biologists from Argentina, Brazil, Chile, Peru, and Uruguay as well as from non- South American countries. In terms of manatees, the contribution was completely Brazilian, and a total of four papers was presented: on aging techniques using X-ray analysis of the flipper, radio-tracking techniques, the physiological ecology of the Amazonian manatee, and a survey of the population status of and current research on manatees in Latin America. On the last day of the meeting a round-table discussion was held to decide research and conservation priorities for both manatees and otters in South America. It is hoped that a proceedings volume will result from this first meeting and that it will become a biennial As for [the manatee project in] Manaus, we're bigger than we were in the old days but the financial problems and instability are taking their toll.... We have 20 manatees at present and no funding whatsoever to do research. Our [support] for the CuruA- Una [weed control and radio-tracking] project has run out and there are no prospects of restarting it again. We have applications with the Brazilian government for major financing of the manatee .project which is starting to seem a bit more positive, but nothing is guaranteed; also with WWF and OAS - again the same picture. We are also waiting for some action from the FAO/UNEP Global Plan of Action for Marine Mammals, but to date nothing concrete has happened. It is quite disappointing to be sitting on such potential [for] research and not be able to Ironically, we are doing more dolphin than manatee work, as we frequently receive accidentally-killed animals, and also behavioral observations can be made within a few minutes' canoe trip from Manaus. In between bouts of writing new proposals or defending old ones, we are trying to get the osteological collection completely documented and organized and to finish as many of the unfinished projects in hand [as possible] so that if we are forced to abandon ship we will not lose everything ... Essentially our status is endangered whereas the manatee is vulnerable Robin Best [EDITOR'S COMMENT: Those responsible for funding and implementing the FAO/UNEP Global Plan please take note of the above. The 73- page compendium of Research Proposals for Sirznians, drawn up by sirenian specialists a year ago under UNEP auspices, emphasized (on pp. 7-8) the vital importance of maintaining the three existing centers of sirenian research. If the Manaus project is allowed to fold, we will lose one-third of the world's present sirenian research capacity, as well as a facility with unique research capabilities and opportunities and, incidentally, the only one located in a Third World country. This is not the sort of signal that conservation workers in the Third World need to receive from international agencies. The time to do something about it is NOW.] Galen Rathbun reports the sad news that Butterball, the Amazonian manatee long resident at the Steinhart Aquarium in San Francisco, died on 22 September 1984 after just over 17 years in captivity. Details of the circumstances of death are not available at this writing, but postmortem examination is said to have indicated lung and liver pathology. In addition to entertaining and edifying a generation of Steinhart visitors, Butterball provided data for at least four scientific papers on veterinary care, karyotype, vocalizations, and feeding behavior. In death, he may make his most valuable contribution yet: he was by far the world's oldest tetracycline- marked sirenian of known age. After his arrival at Steinhart in 1967, he was treated for a harpoon wound with tetracycline antibiotics. Examination of his skeleton for tetracycline marks should furnish data of great use in the effort to develop age- determination techniques for manatees. He will be missed. The following items were contributed by the Gainesville lab: 1984 Manatee Mortality in Florida. A record high number of winter season. Resightings compiled during the three years of the catalog's operation provide information on the movements and site fidelity of manatees in Florida. Resightings of cataloged manatees in different years at the same aggregation sites have documented site fidelity for 80 individuals. The greatest site fidelity has been demonstrated for Riviera Beach, Fort Myers, Crystal River, and Blue Spring during winter months and Brevard County during the summer. Nine manatees are known to have used the same sites in four or more years, with one individual, BC-09, resighted at Riviera Beach in six different years. Thirteen manatees, however, changed winter aggregation sites between winter seasons and three changed within a single winter season. A total of 36 manatees have been resighted at different aggregation sites, with the greatest movements, in both number and distance, occurring on the east coast. Movements have been documented between Jacksonville and all major aggregation areas on the east coast except Miami. Three individuals are known to have travelled nearly 600 km between Jacksonville and Port Everglades over one-, two-, and three-year periods, respectively, indicating that long-distance movements by manatees are not uncommon. Seasonal north-south migrations have been documented for eight individuals travelling from Riviera Beach or Port Everglades to Brevard County, including one animal, BC-09, known to have seasonally migrated from Riviera Beach to Brevard County in four consecutive years. The only movement documented along the west coast has been that of a manatee, TB- 22, known to have migrated from Tampa Bay to the mouth of the Suwannee River between the winter and summer of 1983. The technique of photographic documentation of scar patterns to identify individuals has proved to be an effective tool for long-term studies of manatees. The viability of the identification catalog is demonstrated by BC-04, photographed initially on 5 April 1978 and reidentified on 29 February 1984. Future Plans. The Fish and Wildlife Service will be reducing its manatee research effort due to cutbacks in funding. A nine-month program of transferring carcass salvage activities, including funding, coordination, and fieldwork, to the Florida Department of Natural Resources will begin on 1 October 1984. The Service will continue its research on manatee life history and biology, which currently includes developing radio tracking technology and gathering information on movement patterns, distribution, reproduction, cow-calf relationships, and Manatee Belease. The July/August 1984 issue of Marine Mammal News reports that Dr. Jesse White of the Miami Seaquarium has carried out the first release of manatees born and raised in captivity. A male-female pair of two-year-old, 600-pound manatees, named "Sunrise" and "Savannah", were released into the Homosassa River on Florida's Gulf Coast in August. Dr. White, the chief veterinarian at the Seaquarium, said that they will remain in a two-acre area at Homosassa Springs Nature World for two years, "while they master the eating and mating habits of their wild cousins." They are part of a colony of seven manatees bred dead manatees have been reported for the first eight months of 1984. One hundred and two animals have been recovered from the southeastern United States: 100 from Florida, one from North Carolina, and one from Puerto Rico. The causes-of-death categories for January through August 1984 and the number of cases for each factor were: boat or barge collision, 26; crushed or drowned in a floodgate or canal lock, 2 (one in floodgate, one in canal lock); dependent calf, 17; natural, 25 (cold stress accounted for 20, and one each of peritonitis, aborted fetus, old age, pneumonia, and mycotic disease); and undetermined, 32 (mostly too decomposed for Salvage Highlighta. Another pair of twin fetuses was recovered from a salvaged carcass in June. A Blue Spring manatee (Walter, BS-47, M-386) was found dead, from wounds inflicted by a boat propeller, in the St. Johns River in May, adding another tetracycline-marked animal to the collection. At least one animal was butchered in May; however, the case is still in litigation and the animal has not been included in the 1984 figures at this time. Six animals have been rescued this year; however, only two have survived and are undergoing rehabilitation in captivity. Aerial Survevs. Bimonthly aerial surveys to assess the distribution and movements of manatees in Lee County, Florida were begun in December 1983. The manatee population in southwest Florida, thought to be one of the largest in the state, is receiving increased attention from U.S. Fish and Wildlife Service researchers. A total of 819 manatee sightings have been made through August 1984, averaging 45.5 manatees each survey (SD=23.3). Counts ranged from 105 (5 January) to 19 (16 April). Calves made up an average of 12.6% (SD=4.1) of the manatees seen on each survey. It was previously known that large numbers of manatees gather in the Orange and Caloosahatchee Rivers during the winter months, using the warm-water discharge of the Fort Myers Power Plant as a thermal refuge. The ongoing aerial surveys indicate that the Caloosahatchee River is used by manatees during warm months to a greater extent than expected. Manatees have been sighted in the Caloosahatchee on every survey, and on 13 of the 18 surveys more manatees were sighted in the rivers than in the surrounding coastal areas. Of the coastal areas surveyed, Matlacha Pass appears to show greater manatee use than Pine Island Sound, San Carlos Bay, or Estero Bay. Annual Updatfe th tMnatn. Identification Catalog. - Photographs of distinctively scarred manatees taken during the winter of 1983-84 have been used by the staff of the Sirenia Project to update the statewide manatee identification catalog. Seven of the nine areas covered by the catalog were visited (Blue Spring, Jacksonville, Brevard County, Port Everglades, Miami, Fort Myers, and Crystal River); Riviera Beach and Tampa Bay were not covered. Ninety-eight manatees not previously identified have been added to the catalog, which now includes 746 individuals. Forty-one cataloged manatees were resighted during the 1983-84 at the Seaquarium. Dr. Paul Cardeilhac, a University of Florida specialist in aquatic animal reproduction, is a medical consultant in the program. One of his objectives is to speed up the manatee's slow reproduction rate through captive breeding. Manatee Ranae Extension. Gene Montgomery writes, under date of 11 May 1984: "I learned last week of a manatee which has been seen several times below the 1st lock [of the Panama Canal] before the Pacific (Miraflores locks), thus manatee have entered the eastern Pacificifl I have not had the time or resources to do the survey necessary to know how many individuals have done so, how far they have moved from the mouth of the canal, etc. I am in the process of trying to find funding to support such a survey, including the possibility of including such a survey in a new study which would precede construction of a sea-level canal." SIRENIA WORKSHOP ITC IV (13-20 August 1985) There was an encouraging response to the first circular advertising this Workshop, with over 50 replies. The second circular, which has been mailed to those who responded positively to the first, calls for titles for poster presentations by 30 The Workshop will emphasize poster presentations because they allow a larger number of presentations and greater opportunity for one-to-one contact. Spoken presentations will be limited to a keynote address by Daryl Domning and a series of six invited review papers which will provide the background for a Interested persons not on the mailing list and those with queries should contact one of the convenors: Helene Marsh Galen Rathbun and Tom O'Shea Zoology Department U.S. Fish & Wildlife Service James Cook University 412 N.E. 16th Ave. Townsville 4811 Gainesville, Fla. 32601 Institute Nacional de Pesquisas da Amazinia As noted above, I have been asked to address the sirenian workshop at ITC IV. I have been giving some thought to what I might say, and there is one subject I want to discuss on which I would like some prior input from the sirenian research community. Science is a process of seeking answers to questions, and the science done will be no better than the quality of the questions asked. I believe we are entering an era when the basic, obvious questions about sirenians (distribution, status, gross anatomy, reproductive and life history parameters, etc.) have been or soon will have been answered. Will biologists then lose what little interest in sirenians they now have, or will larger and more interesting questions emerge to attract their attention? To gauge the likelihood of the latter outcome, I am hereby soliciting responses to the following question: WHAT DO YOU THINK ARE THE MOST IMPORTANT UNANSWERED QUESTIONS THAT WE AS SCIENTISTS CAN ASK ABOUT SIRENIANS? Suggest as many questions as you like. No prizes will be awarded (and you need not be present to wint), but I will summarize the results in a future issue. DPD MARINE ANIMAL SYMPOSIUM A Symposium on Endangered Marine Animals and Marine Parks will be held at Cochin, South India from 12-16 January 1985. The focal theme is conservation, management and habitat protection in the form of reserves, national parks or sanctuaries for endangered or vulnerable marine animals. The symposium will review the present status of research and development efforts, resources, conservation programs, future strategies, and national policies in the Indian Ocean region. A call for papers has already gone out and final manuscripts are due by 1 October 1984, in order that the papers can be published at the time of the symposium. For further details, contact The Convener, Symposium on Endangered Marine Animals and Marine Parks, Marine Biological Association of India, Post Box No. 1244, Ernakulam, Cochin-682 011, Kerala, India. DUGONG VOLUME REPRINTED The Du2gaoni Proceedings of a Seminar/Workshop held at James Cook University 8-13 May 1979 (H. Marsh, ed.). James Cook University has reprinted this volume in order to meet a steady demand for copies. Copies can be ordered from: The Bookshop, James Cook University of North Queensland, Townsville, Qld. 4811, Australia. Cost: $10 Australian plus postage per copy. Postage rates: Surface Airmail Aust. Within Queensland $1.10 $2.00 Rest of Australia $1.35 $2.00 Other countries $1.40 All orders from overseas should be accompanied by payment in Australian dollars by bank draft or international money order made payable to the above. Information on the status of the West African manatee and the dugong populations on the east coast of Africa is needed for inclusion in the IUCN Mammal Red Data Book, Part 2 Africa. Please send any relevant data to Jane Thornback, Compiler, Mammal Red Data Book, IUCN Conservation Monitoring Centre, 219(c) Huntingdon Road, Cambridge CB3 ODL, United Kingdom. Hemopoiesis in the West Indian Manatee, Trichechus manatus (M.D. Bazzini, J.E. Reynolds III, and R. Essman). West Indian manatees (Trichechus manatus) and other members of the order Sirenia, unlike most mammals, possess amedullary long bones. Histological examinations of the visceral organs, sternum and vertebral bodies showed that the primary site of hemopoiesis in the manatee is the vertebral bodies. The vertebrae contained the bone marrow and several diagnostic cell types including megakaryocytes, erythroblasts and myelocytes. [From Florida Scientist 47 (Suppl. 1), p. 19, 1984.] Reproductive Potential of a Captive Breeding Colony at Florida Manatees (P.T. Cardeilhac, J.R. White, and R. Francis- Floyd). Recent interest in saving the manatee has encouraged the ongoing program of captive breeding at the Miami Seaquarium. This colony has ranged in size from two to nine manatees. Studies were made on reproductive parameters of the colony in order to project reproductive potential of a captive manatee colony. Age at puberty was found not to occur before approximately 7.5 years based on colony history and serum progesterone concentrations determined in two subadult females. The youngest age at conception found for 2 animals was 7.5 years. The second female became pregnant at approximately 8 years. A range for the gestation period has been determined by establishing minimum and maximum values. A minimum period (12 months) was determined by establishing the beginning of pregnancy, using physical signs confirmed by significant elevation in serum progesterone concentration, followed by a date for the observed birth. A maximum value for gestation period was the shortest determined calving interval (14 months). A range for gestation period was thus determined to be 13 (1) months. The postpartum period of infertility for five captive births ranged from 2 to 77 months with a mean value of 29 months. Calving intervals for five captive births ranged from 15 to 91 months with a mean value of 42. Using these values, the average adult female in this colony should produce 6 calves by thirty years of age with an annual reproduction efficiency for females of 0.2 (calves/year/female). Calf production would be about 120 per acre per year using high intensity production techniques as practiced with this colony. A sixty-fold increase in the size of the system used at Miami Seaquarium would approximately replace the current annual losses suffered by the wild population of manatees in Florida. A 10 to 20 fold increase in the size of the Seaquarium system would probably insure that the manatee population of Florida remained in positive reproductive balance, provided experimental release of captive-produced animals is feasible. The experimental release into the wild of 2 subadult manatees is planned for the summer of 1984. [From abstracts of the 15th Annual Conference and Workshop, International Association for Aquatic Animal Medicine, Tampa, Fla., Apr. 30-May 2, 1984.] Aizu Fossil Research Group. 1982. On a fossil Sirenia [sic] from the Shiotsubo Formation, Takasato, Yama, Fukushima Prefecture, Northeast Japan. Earth Sci. (Chikyu Kagaku) 36(5): 282-284. [In Japanese. Report of Pusisiren cf. D. jordani; Late Miocene.] Anderson, P.K. 1984. Suckling in Dugong dugon. J. Mammal. 65(3): Best, R.C. 1984. Trichechus inunguis vulgo peixe-boi. Ci4ncia Hoje 2(10): 66-73. Colmenero Rol6n, L.C. 1984. Nuevos registros del manati (Trichechus manatus) en el Sureste de Mexico. An. Inst. Biol. Univ. Nac. Autdn. Mexico (Ser. Zool.) 54(1): 243-254. DiPerna, P. 1984. Manatee management: a question of freedom. Calypso Log 11(3): 16-17. Sept. 1984. Domning, D.P. 1984. Sea cow discovery. Nature 308(5959): 500. Domning, D.P. 1984. Sea cows of the Chesapeake Bay. Bugeye Times (Calvert Marine Museum, Solomons, Md.) 9(1): 5-6. Domning, D.P., and L.-A. C. Hayek. 1984. Horizontal tooth replacement in the Amazonian manatee (Trichechus inunglis). Mammalia 48(1): 105-127. Hall, A.J. 1984. Man and manatee: Can we live together? Nat. Geogr. 166(3): 400-413. Sept. 1984. [Portfolio of underwater Hudson, B.E.T. 1983. Dugongs of the northern Torres Strait, Australia: Aerial surveys, observations during a tagging project, catch statistics with recommendations for conservation and management. Pacif. Sci. Congr. Proc. 15(1- Hudson, B.E.T. 1984. So long, dugong. BBC Wildlife, June 1984: 298-301. [Popular account of the linkage between dugong decline and cultural change among the Kiwai of Papua New Jones, S. 1980. The dugong or the so-called mermaid, Dugong dugon (Mdller) of the Indo-Sri Lanka waters problems of research and conservation. Spolia Zeylanica 35 (I-II): 223-260. 6 Klein, E.H. 1979. Review of the status of manatee (Trich.ech.bsh manatus) in Honduras, Central America. Ceiba 23(1): 21-28. Lainson, R., R.D. Naiff, R.C. Best, and J.J. Shaw. 1983. Eimeria trichechi n. sp. from the Amazonian manatee, Trichechus inunguis (Mammalia: Sirenia). Syst. Parasitol. 5: 287-289. Manzij, S.F., and O.Y. Piliptshuk. 1984. Morphologie und Funktionsanalyse des Axialskeletes des amerikanischen Lamantins Trichechus manatus Lin., 1758, Mammalia, Sirenia. Zool. Jahrb. Anat. 111(3): 257-295. [English summary.] Montgomery, G.G., N.B. Gale, and W.P. Murdoch, Jr. 1982. Have manatee entered the eastern Pacific Ocean? Mammalia 46(2): Packard, J.M., and J.D. Nichols. 1983. Sample size estimates: A preliminary analysis of sample sizes required for mark- recovery and mark-resighting studies of manatees (Trichechus manatus) in Florida. Florida Coop. Fish & Wildlife Research Unit, Gainesville: Tech. Report No. 8, Manatee Population / Research Report No. 4: 1-14. [Available from Coop. Fish & Wildlife Research Unit, 117 Newins-Ziegler Hall, Univ. of Florida, Gainesville, Fla. 32611.] Powell, J.A., and G.B. Rathbun. 1984. Distribution and abundance of manatees along the northern coast of the Gulf of Mexico. Northeast Gulf Science 7(1): 1-28. Rathbun, G.B. 1984. Sirenians. Pp. 537-547 in: S. Anderson and J.K. Jones, Jr. (eds.), Orders and Families of Recent Mammals of the World. New York, John Wiley & Sons. Sleeper, B. 1984. Manatee: North America's most unusual mammal struggles for survival. Pacif. Discovery 37(1): 14-23. Snipes, R.L. 1984. Anatomy of the cecum of the West Indian manatee, Trichechus manatus (Mammalia, Sirenia). Zoomorphology (Berlin) 104(2): 67-78. Sokolov, V.E., and L.M. Mukhametov. 1982. [Electrophysiological investigation on sleep in the manatee Trichechus manatus.) Zh. Evol. Biokh. Fiziol. 18(2): 191-193. [In Russian; Tisdell, C.A. 1983. Conserving living resources in Third World countries: Economic and social issues. Int. J. Environ. Stud. 22(1): 11-24. [Dugongs used as example.] Villa-Ramirez, B., and L.C. Colmenero Roldn. 1981. Presencia y distribucidn de los manaties o Tlacamichin Tricbhecbi manatu Linneo 1782, en Mdxico. An. Inst. Univ. Nac. Autdn. M6xico (Ser. Zool.) 51(1): 703-708. White, J.R. 1984. Man can save the manatee. Nat. Geogr. 166(3): 414-418. Sept. 1984. In the last issue, Kanwisher's name was inadvertently omitted from the authorship of the following paper: Gallivan, G.J., R.C. Best, and J.W. Kanwisher. 1983. Temperature regulation in the Amazonian manatee Trichechus innguis. Physiol. Zool. 56(2): 255-262. >>> COPY DEADLINE FOR NEXT ISSUE: APRIL 1, 1985 <<<
<urn:uuid:c05638d3-d7eb-45db-bae7-07d455e48f26>
CC-MAIN-2013-48
http://ufdc.ufl.edu/UF00099157/00002
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164977792/warc/CC-MAIN-20131204134937-00092-ip-10-33-133-15.ec2.internal.warc.gz
en
0.92141
10,013
2.671875
3
August 18, 2021 Back pain can present itself in varying ways; a dull aching in the lower section of the spine, sharp pain that occurs only with certain physical activities, or other distressing symptoms. And the intensity of the pain varies from one person to the next. Understanding the causes and symptoms of back pain enables pain management physicians to determine the most effective treatment plan for their individual patients who suffer from this type of pain. Differentiating between the varied types of back pain first requires familiarity with common causes, risk factors and symptoms associated with pain in the upper, lower or middle back regions. Here are some of the most common causes for these pain conditions: - Sprains / strains – These may occur from twisting or lifting something improperly, lifting something too heavy, or overstretching. Symptoms of these conditions may include muscle spasms, lower back stiffness and/or pain that may radiate into the buttocks. - Spinal stenosis – A narrowing of the spinal column, which puts pressure on the spinal cord and nerves. Spinal stenosis causes pain or numbness with walking and may eventually cause sensory loss and weakness in the legs. - Disc degeneration – Occurs when the discs in the back deteriorate as part of the body’s aging process, losing their cushioning capability and leading to inflammation or instability. Pain is most often experienced when the degenerating disc affects the muscles, joint, nerve roots or other structures in the spine, resulting in muscle tension, spasms and/or tenderness in these structures or in the back or neck areas. - Arthritis – Swelling, inflammation and/or stiffness in the back may be symptoms of this joint disease. Osteoarthritis, which typically affects people of middle age and older, is the result of a breakdown of bones and cartilage. These conditions produce pain, aching, stiffness and/or swelling in and around one or more joints. - Sciatica – Caused by compression of the sciatic nerve, (the large nerve that runs through the buttocks and down the back of the leg.) This compression causes shock-like or burning pain in the lower back as well as pain through the buttocks and down one leg, sometimes extending to the foot. - Inflammation / wear of the sacroiliac joint: Caused by swelling and wearing away of the joint cartilage that may be the result of an injury, arthritis, infection, or other factors. This often leads to pain in the lower back or buttocks and can extend down one or both legs. - Herniated / ruptured discs – Typically caused by wear and tear on the spine, this condition can occur when the intervertebral discs become compressed and bulge outward or rupture, putting pressure on the nerves and causing pain in the lower back and/or hips. - Radiculopathy (pinched nerve) – Caused by compression, inflammation and/or injury to a spinal nerve root. Pressure on the nerve root results in pain, numbness, or a tingling sensation may occur with this condition. - Spondylolisthesis – Caused by vertebra in the lower spine slipping out of place and pinching the nerves exiting the spinal column. This may be the result of a traumatic injury such as a car accident, a fall, or sports injury, causing irritation and compression of the spine. Common symptoms include pain in the lower back or buttocks that may be exacerbated by movement, pain that travels from the back down one or both legs, leg weakness and difficulty walking. - Skeletal imperfections – These include conditions such as scoliosis, (curvature of the spine,) lordosis, (spinal curve that arches too far inward,) and other congenital anomalies of the spine. These anomalies may cause excess pressure on the spine, resulting in pain and discomfort in the lower back and neck. - Lifestyle factors – Certain daily habits and conditions may adversely affect your back, such as lifting heavy objects, being overweight, lack of exercise, or even slouching. Muscle tension in the back may be caused by emotional states such as stress, depression and anxiety. Do You Recognize Any of These Pain Symptoms? If you experience back pain due to any of the above conditions, or other types and causes of back pain not listed here, the pain management specialists at Riverside Pain Physicians can help. We will work with you to determine the cause of your pain and develop an individualized treatment plan to relieve your pain and restore quality of life. Reach out to us today at Riverside Pain Physicians by calling 904.389.1010, or clicking here to make an appointment online. Tags: Back Pain Symptoms, Chronic Pain Treatment Jacksonville, Pain Management Jacksonville, pain-management
<urn:uuid:92226d84-331f-47a6-8388-37ac8cbb001f>
CC-MAIN-2023-23
https://riversidepainphysicians.com/common-conditions-may-causing-chronic-back-pain-symptoms/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652116.60/warc/CC-MAIN-20230605121635-20230605151635-00033.warc.gz
en
0.91893
982
2.984375
3
By: Kathy Boccella The nurses of the Civil War helped make nursing a respected occupation. Before the Civil War, nursing was limited to mothers nursing their family members. At the start of the Civil War most nurses were uneducated women who volunteered their services. As the war progressed the nurses were trained and received minimal pay and army rations for their services. They feed the soldiers, dressed their wounds, helped with amputations and did what they could to comfort the soldiers (Roper, 2009). Walt Whitman, Dorothea Dix, Clara Barton, Nancy Hill and Sally Louisa Tompkins are just some of the nurses who made a difference in the Civil War. Walt Whitman saw the need to care for the wounded soldiers when he found his brother shot on the battlefield. He stayed with his brother for a week and became aware of the soldier’s suffering. Moved by what he saw on the battlefield, Whitman decided to be a volunteer nurse in a Washington hospital. He had no formal education in nursing, he learned by watching the other nurses. He spent a lot of his time comforting the soldiers and writing condolence letters to their families. Whitman not only cared for the soldier’s physical wounds, but also their psychological wounds. He took a holistic approach to nursing by caring for the whole person. During his seven years of service, Whitman cared for over 80,000 soldiers. Many of Walt Whitman’s poems, including “Drum Taps”, were written about his nursing experiences in the Civil War. In 1870, Whitman left nursing because of symptoms related to post-traumatic stress disorder. Until his death 20 years later, Whitman continued to suffer psychological consequences because of the horror that he experienced during the war (Roper, 2009). Dorothea Dix was appointed Superintendent of Union Army Nurses. She was the first female to hold that position. Dix was in charge of Armory Square, one of Washington’s largest Civil War hospitals. The most seriously wounded soldiers were brought to this hospital. Dix was a strong willed person who often ignored orders. Her perseverance gave her the nickname “Dragon Dix”. She recruited over 2,000 female nurses. Nursing was greatly improved and her nurses were taken care of under her appointment. After the war, Dorothea Dix became an advocate for the mentally ill (Raatma, 2005). Nancy Hill was known for her sound judgment and bravery. In 1864, while working at Armory Square Hospital in Washington, Hill ignored Army orders and admitted 250 wounded soldiers. The soldiers did not have the proper paper work and they were not allowed to enter the hospital without it. Hill escorted the soldiers into the hospital and began treating them. The next day when the soldiers’ paper work arrived, Hill was commended for her actions. During the Battle of the Wilderness, Hill nursed the wounded soldiers on the battlefield. She was lady nurse of Ward F and continued to nurse wounded soldiers until the end of the war. Hill later received her medical degree. She helped to establish the Industrial Training School to educate unwed mothers, which evolved into the Hillcrest Family Services that continues to help families today (Cherba & Deckert, 2006). Clara Barton is probably the most famous Civil War nurse. She wanted to join the Department of Female Nurses in the Union Army, but knew that she couldn’t tolerate Dorothea Dix. Barton began working for a charity that fed and comforted the soldiers. Independently, she gathered medicine and supplies and delivered them to the battlefields. Soon Barton began staying on the battlefields and nursing the wounded soldiers. She nursed with skill and empathy. Towards the end of the war, Barton would search for and identify missing Union soldiers (LaFantasie, 2005). After serving in the International Red Cross, she began the American Red Cross, which continues to feed and shelter people today. Although there are many Confederate nurses, there is little attention focused on them. Sally Louisa Tomkins used her inheritance to establish and supply Robertson Hospital in Richmond, Virginia. Robertson Hospital attended to 1,333 Confederate soldiers. It had a 94.5 percent survival rate (Raatma, 2005). Tomkins’s generosity and good care saved the lives of many Confederate soldiers. Without the bravery and compassion of the Civil War nurses many more American lives would have been lost during the war. They truly wanted to help the wounded soldiers, regardless of their stipend. In 1892, Nancy Hill and other volunteer nurses were awarded a twelve dollar per month pension. Walt Whitman, Dorothea Dix, Nancy Hill, Clara Barton, and Sally Louisa Tomkins are just a few of the Civil War nurses who made nursing a necessary and respectable occupation. Their tenacity continued after the war to serve the less fortunate. Cherba, C., & Deckert, E. (2006). Nancy hill-Civil War nurse, pioneering doctor. Civil WarTimes, 5(8), 15-20. Retrieved from http:/web.ebscohost.com.ezproxy.mc3.edu:2048/ehost/delivery?sid=a9df9f7a-7f2f-4349-b8 LaFantasie, G., (2005). Clara Barton. America’s Civil War, 18(2). Retrieved from http:/web.ebscohost.com.ezproxy.mc3.edu:2048/ehost/detail?vid=2&hid=9&sid=ae454865 Raatma, L., (2005). Great Women of the Civil War. Minneapolis,MN:Compass Books. Roper, R., (2009). Collateral Damage: The Civil War only enhanced George Whitman’s soldierly satisfaction; for his brother Walt, however, the horrors halted an outpouring of great poetry. American Scholar, 78, 75-82. Retrieved from http:/web. ebscohost.com.ezproxy.mc3.edu:2048/ehost/delivery?sid=5632f7fa-69ca-4c43-9
<urn:uuid:e937bb88-0572-41ed-b7da-50284cbb6808>
CC-MAIN-2017-30
https://warnursing.wordpress.com/2012/04/16/civil-war-nurses-2/
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549426693.21/warc/CC-MAIN-20170727002123-20170727022123-00229.warc.gz
en
0.970293
1,279
4.03125
4
1911 Encyclopædia Britannica/Tshi |←Tsetse-fly||1911 Encyclopædia Britannica, Volume 27 |See also Tshi on Wikipedia; and our 1911 Encyclopædia Britannica disclaimer.| TSHI, Tchwi, Chi, or Oji, a group of Negro peoples of the Gold Coast (q.v.). The chief of these are the Ashanti, Fanti, Akim and Aquapem. Their common language is the Tshi, from which they gain their family name.
<urn:uuid:92c5aaaf-5cfa-42f6-a488-ddae35ac49c5>
CC-MAIN-2014-41
http://en.wikisource.org/wiki/1911_Encyclop%C3%A6dia_Britannica/Tshi
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1412037663637.20/warc/CC-MAIN-20140930004103-00458-ip-10-234-18-248.ec2.internal.warc.gz
en
0.730803
119
2.671875
3
The question of who built Stonehenge, how they did it, and why remains open for exploration. In his 1999 book, Ancient Celtic New Zealand, Martin Doutré argues that the angles and measurements of prominent details of Stonehenge indicate that the site actually contains a scale model of the Great Pyramid of Giza. The diagram above (click for greater detail) presents a rough illustration of Mr. Doutré's theory. The concentric blue circles and the horizontal line indicate the positions of: 1. the inner trilithon horseshoe, 2. the Sarsen circle, 3. the Y-holes, and 4. the Aubrey circle. The red lines indicate the outline of the Great Pyramid based upon Doutré's discovery that the diameter of the outermost perimeter of the site measures 378 feet: exactly half of the 756 feet that each side of the Great Pyramid measures. Based upon this, he discovered indications that the apex of a half-scale two-dimensional representation of the Great Pyramid rested in the avenue leading to the Heel Stone as indicated. His entire argument, which goes into much greater detail about this and many other important aspects of Stonehenge should really be read in its entirety in his book, Ancient Celtic New Zealand, which belongs in the library of everyone interested in the subject of our earth and mankind's ancient past upon our earth (which is everyone, right?). This discovery is just one piece of evidence that the Great Pyramid might actually predate Stonehenge, and that Stonehenge might well have been built by the people who once occupied Egypt and left, or by their descendents. It is also an indication of the advanced technological, mathematical, and astronomical advancement of very ancient mankind, as both the Great Pyramid and Stonehenge incorporate elements which indicate a sophisticated understanding of pi and phi and even (as many have noted before) knowledge of the size of the spherical earth itself. The Great Pyramid is a model of the earth, on a scale of 1:43,200. The base perimeter of the Great Pyramid is 3,023.154 feet, which multiplied by 43,200 yields 130,600,523 feet -- a number that approximates within an error of 1% the circumfrence of the earth (as Robert Bauval and Graham Hancock demonstrate in Keeper of Genesis). Anyone wishing to argue that this is mere coincidence must contend with the fact that 43,200 is a clear precessional number, as explained in this previous post. If Stonehenge is a one-half representation of the Great Pyramid, then it too is an accurate scale model of the earth. For these and other reasons, Stonehenge is a critical source of clues to the truth about mankind's ancient past. In the Mathisen Corollary, I argue that the hydroplate theory of Dr. Walt Brown, which deals primarily with geological evidence of a catastrophic flood within human memory, provides an excellent explanation that fits the archaeological and mythological evidence of man's past as well. He explains why precession (which is encoded by the number 43,200 at the Great Pyramid and at Stonehenge, as we have just seen) was caused by this ancient catastrophe, and even suggests: "Perhaps changes in earth's spin axis in the centuries after the flood motivated construction of ancient observatories such as Stonehenge" (7th edition of In the Beginning, page 117). These connections are important to examine very closely.
<urn:uuid:055db76e-d63c-4f43-9456-818939634f8d>
CC-MAIN-2017-34
http://mathisencorollary.blogspot.in/2011/04/
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105297.38/warc/CC-MAIN-20170819031734-20170819051734-00021.warc.gz
en
0.935673
710
4.0625
4
Charon, The Ferryman – 3D print model STL 3D Print File Format: STL Charon, often referred to as “The Ferryman,” is a figure from Greek mythology associated with the transportation of souls to the underworld. He plays a crucial role in the afterlife beliefs of ancient Greece. Here are key details about Charon: 1. **Role:** Charon is the ferryman of the river Styx, which separates the world of the living from the underworld (Hades). His primary duty is to transport the souls of the deceased across the river to the realm of the dead. 2. **Fare for Passage:** In Greek mythology, it is believed that Charon required payment, traditionally an obolus (a small coin), from the souls he ferried. The living would place a coin under the tongue of the deceased before burial to ensure that the soul had the means to pay Charon for the journey. 3. **Appearance:** Charon is often depicted as an elderly and grim figure. He is typically shown as a shrouded, hooded figure with a lantern or torch to guide the way in the dark waters of the Styx. 4. **Ceremonies and Beliefs:** In ancient Greece, funerary practices and rituals were essential to ensure a smooth passage to the afterlife. The concept of Charon and the river Styx was an integral part of these beliefs. 5. **Mythological Accounts:** While Charon is a prominent figure in Greek mythology, he does not feature as prominently in stories or narratives as some other mythological beings. His role is more symbolic and practical, representing the transition from life to death. 6. **Influence on Later Beliefs:** The concept of a ferryman or guide who transports souls to the afterlife is not unique to Greek mythology. Similar ideas are found in the beliefs of other cultures and religions, such as the Egyptian god Anubis or the concept of the Grim Reaper in Western folklore. 7. **Modern Usage:** The image of Charon as the ferryman of the dead has been used in various forms of art, literature, and popular culture as a symbol of the transition between life and death. Charon’s role as the ferryman of the river Styx remains an enduring and evocative element of Greek mythology, reflecting the ancient Greeks’ beliefs about the journey to the afterlife.
<urn:uuid:5ff1fe2b-1297-4946-b07e-d23ddca7a697>
CC-MAIN-2023-40
https://assetsfree.com/charon-the-ferryman/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510994.61/warc/CC-MAIN-20231002100910-20231002130910-00284.warc.gz
en
0.943173
499
3.484375
3
In 1917, a year after his general theory of relativity was published, Einstein tried to extend his field equation of gravitation to the universe as a whole. The universe as known at the time was simply our galaxy—the neighboring Andromeda, visible to the naked eye from very dark locations, was thought to be a nebula within our own Milky Way home. Einstein’s equation told him that the universe was expanding, but astronomers assured him otherwise (even today, no expansion is evident within the 2-million-light-year range to Andromeda; in fact, that galaxy is moving toward us). So Einstein inserted into his equation a constant now known as “lambda,” for the Greek letter that denoted it. Lambda, also called “the cosmological constant,” supplied a kind of force to hold the universe from expanding and keep it stable within its range. Then in 1929, Hubble, Humason, and Slipher made their monumental discovery using the 100-inch Mount Wilson telescope in California of very distant galaxies and the fact that they were receding from us—implying that the universe was indeed expanding, just as Einstein’s original equation had indicated! When Einstein visited California some time later, Hubble showed him his findings and Einstein famously exclaimed “Then away with the cosmological constant!” and never mentioned it again, considering lambda his greatest “blunder”—it had, after all, prevented him from theoretically predicting the expansion of the universe. Fast forward six decades to the 1990s. Saul Perlmutter, a young astrophysicist at the Lawrence Berkeley Laboratory in California had a brilliant idea. He knew that Hubble’s results were derived using the Doppler shift in light. Light from a galaxy that is receding from us is shifted to the red end of the visible spectrum, while a galaxy that is approaching us has its light shifted to the blue end of the spectrum, from our vantage point. The degree of the shift is measured by a quantity astronomers call Z, which is then used to determines a galaxy’s speed of recession away from us (when Z is positive and shift is to the red). But Perlmutter knew much more than that. As an astrophysicist he had studied the light curves (the way the intensity of a light source changes through time) that characterize immensely powerful celestial explosions called a Type Ia supernova. This kind of explosion is so powerful—six times more so than the more common Type II supernova, such as the one that created the Crab Nebula–that its light can be as intense as that of an entire galaxy. This allowed him to detect such mammoth, yet rare explosions in very faraway galaxies. Using telescopes in Hawaii, Chile, the Canary Islands, and space, his research team took pictures of hundreds of distant galaxies at a time, repeating the process at intervals of three weeks. In an entire galaxy, a Type Ia supernova will occur only roughly once a century—but once such an explosion is captured, it yields extremely important information. Since the light curve of such a supernova is the same, regardless of where it takes place, the intensity of the light from the explosion can be used as a “standard candle” for measuring the distance to the galaxy in which it takes place (in the same way that the size of the flame of a candle could be used to estimate how far a candle is from the observer since all candle flames are essentially of the same size). Thus Perlmutter’s team, the Supernova Cosmology Project at Berkeley, was able to establish for each galaxy in which they were fortunate to observe a Type Ia supernova, both a distance estimate (through analysis of the light curve), and a speed of recession (from the redshift, Z). An analysis of the data revealed a stunningly unexpected result: the universe is accelerating its expansion! The reason no one had expected such a finding was that the widely held assumption in cosmology had been that the mutual gravitational attraction among galaxies would eventually win out against the expansion, slow it down to a stop, and lead to a re-collapse of the universe on itself (and then perhaps a new big bang, a rebirth)—similarly to how a stone thrown up in the air will slow down, stop, and fall back to Earth. The study’s result led to a major rethinking in cosmology, and it was then that physicists rediscovered Einstein’s lambda. In the same way that the cosmological constant had originally been used to hold down a universe that wants to expand, the same mathematical device, lambda—acting in the opposite way—can now be used to accelerate the universal expansion. The cosmological constant, Einstein’s “blunder,” was back with a vengeance! The energy that is believed to cause the accelerated expansion is called “dark energy,” and also “quintessence.” Dark energy is now believed to comprise as much as 73% of the entire mass-energy of the universe. What it actually is, nobody knows; mathematically, its action is performed by Einstein’s old lambda term. “Imagine a lattice in three dimensions,” Saul Perlmutter told me when I interviewed him about his groundbreaking work completed in 1998, “At each corner of the lattice there is a galaxy. Now imagine that the lattice itself is growing in size—the distances from our corner, our galaxy, to all other corners of the lattice keep increasing.” These distances increase at a rate that is increasing all the time. Eventually, therefore, the universe will likely become very large and very diffuse—something that no one had expected. There will probably never be a recollapse and a rebirth. Our present universe seems to be a one-time event. Saul Perlmutter shared this year’s Nobel Prize in physics for his discovery with Brian P. Schmidt of the Australian National University and Adam G. Riess of Johns Hopkins University and the Space Telescope Science Institute, who headed a competing research team, the High-Z Supernova Search, which obtained similar results at the same time. Their research changed the way we view the universe. Amir D. Aczel is a researcher at the Center for the Philosophy and History of Science at Boston University and the author of 18 books about mathematics and physics, as well as numerous research articles. He is a Guggenheim Fellow and a frequent commentator on science in the media. See more at his website or follow him on Twitter: @adaczel.
<urn:uuid:4e3c5782-cf87-4fbf-9e06-36ccc020bd18>
CC-MAIN-2013-48
http://blogs.discovermagazine.com/crux/2011/10/06/from-einsteins-blunder-to-this-years-nobel-prize/
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163052912/warc/CC-MAIN-20131204131732-00039-ip-10-33-133-15.ec2.internal.warc.gz
en
0.967484
1,361
3.71875
4
What is more basic to a school than library books? No money? No books. Not true, because when talking about the most precious element of a school, where there’s a will, there’s a way. Teachers and school systems can get very resourceful. Pilot Mountain School in the 1940’s had little money to establish a library. The few books that were available stayed in the classroom of the teacher who brought them from home. The school system contracted with the county public library system for a bookmobile to make bimonthly stops at the outlying county schools such as Pilot Mountain. The original bookmobile, an old clunker of a converted delivery truck, sat disabled on the side of the road all too often. Next came a government surplus vehicle that had seen its fair share of battles during World War II. This library on wheels arrived at Pilot Mountain School every other week, on schedule, for the children to exchange their books for new ones. Speaking of World War II, there were several army bases in North Carolina that were no longer needed after the war. There were libraries on each base. In fact, during the war, there had been a home front/war effort drive to collect gently used books to supply these base libraries. Now those same books were government surplus and available to schools. Pilot Mountain received several shipments of books. A good thing, isn’t always a good thing. Imagine the delight! Books. Finally. Boxes and boxes of books. But also, there was no librarian to check through the books for appropriate language and content. These books were for mature readers. These children had never seen such words in print. They didn’t know things like that could happen. Sixty some years later, those former students still remember those books and chuckle. Catch of the day,
<urn:uuid:800472cb-8c89-41d5-8612-c3ed599c7b0e>
CC-MAIN-2017-39
http://gretchengriffith.blogspot.com/2010/10/what-is-more-basic-to-school-than.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818686034.31/warc/CC-MAIN-20170919202211-20170919222211-00196.warc.gz
en
0.985707
379
3.125
3
Cultural Nationalism in Colonial Korea, 1920-1925 Michael Edson Robinson With a new preface by the author - $35.00s paperback (9780295993898) Add to Cart - hardcover not available - Published: April 2014 - Subject Listing: Asian Studies, Korean Studies - Bibliographic information: Orig. pub. 1989. 232 pp., 6 x 9 in. - Territorial rights: World - Series: Korean Studies of the Henry M. Jackson School of International Studies By studying the early splits within Korean nationalism, Michael Robinson shows that the issues faced by Korean nationalists during the Japanese colonial period were complex and enduring. In doing so, Robinson, in this classic text, provides a new context with which to analyze the difficult issues of political identity and national unity that remain central to contemporary Korean politics. Michael Edson Robinson is professor of East Asian languages and cultures at Indiana University. “Robinson’s study helps us understand the climate that developed in Korea under the Japanese and why, after Liberation, the Koreans themselves seemed to split so readily along cold war lines.” - American Historical Review “The book is valuable enough because it provides a background to contemporary or recent events. More than this, though, it is invaluable since it provides an unbiased dissection of a five-year-long intellectual movement. It should be essential reading for anyone concerned with Korean history.” - Bulletin of the School of Oriental and African Studies
<urn:uuid:c7c55fba-b81e-4888-b05b-a661111d5e4d>
CC-MAIN-2014-15
http://www.washington.edu/uwpress/search/books/ROBCU2.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609533957.14/warc/CC-MAIN-20140416005213-00335-ip-10-147-4-33.ec2.internal.warc.gz
en
0.906882
310
2.765625
3
At East Bentleigh Dental Group, we care just as much about your overall health as we do about your oral health. That’s because dental issues can be indicative of pre-existing conditions that can go undiagnosed and untreated. For instance, dental problems that cause infections can precipitate a potentially fatal stroke due to the body’s inflammatory response. This blog post offers more information about the common signs of stroke to help victims and bystanders identify them as soon as possible. If and when you have a stroke, it’s important to get to a neurologist within three hours to prevent permanent damage. Getting diagnosed and treated in time can be difficult however, especially if victims fail to recognise or identify the warning signs. The most common indicators of a stroke include one side of the body going numb, confusion, difficulty speaking, loss of balance and coordination, and severe headache with no discernible cause. If you experience one or more of these symptoms, you should get in touch with emergency services immediately for a higher chance of making a full recovery. A stroke can occur suddenly and without warning, so it’s important that bystanders recognise the signs so that they can call emergency services – especially if the victim is unable to call themselves. To identify a stroke, ask the individual to smile, talk, speak a simple sentence coherently, and raise both their arms. If they’re unable to do any of these simple tasks properly, this could be a sign that they’ve suffered a stroke. You can also ask them to stick out their tongue to see if it looks crooked. Conducting these tests to identify stroke symptoms can ensure a fast response that could prevent severe brain damage from occurring. East Bentleigh Dental Group hopes that this information will be useful if you ever need to identify the signs of stroke in yourself or another person.
<urn:uuid:db593177-fc85-44a3-84e9-7102dcf45781>
CC-MAIN-2020-34
https://www.ebdg.com.au/blog/common-signs-stroke/
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735939.26/warc/CC-MAIN-20200805094821-20200805124821-00020.warc.gz
en
0.940104
382
2.640625
3
Every year, World Wars I and II get further and further away. They seem more and more like part of the distant past and less like an unfortunate part of our own time. Still, many people alive today have grandparents, great-grandparents, and even possibly parents who served in World War I. Looking for military heroes in our past keeps us connected to these tumultuous global events personally, even if we never experienced them. The British Army WW1 service records from 1914-1920 are available for those who are interested enough to learn in detail how their personal histories were connected to broader, global history. Hundreds of thousands of men voluntarily joined the war effort in the earliest stages of WW1. The extensive British propaganda effort, a terrible job market, and general feelings of cultural malaise all contributed to the mass enlistment, in addition to the noble ideas of serving one’s country. Propaganda used many tactics, including shaming, appeals to fear, and appeals to the conscience. The Somme campaign and its horrifying 500,000 casualties contributed to falling volunteer soldier rates. In 1916, conscription began, first for single men, and then expanding to include all men aged 18 to 41 as possible draftees. As such, WW1 directly affected multitudes of families throughout the United Kingdom and beyond, and many families today would have ancestors who were directly or indirectly affected by it. Women were also able to join the war effort in a non-combatant role as nurses or cooks. Military heroes need not be limited to the soldiers. Social changes occurred in the wake of World War One, in recognition of the service military heroes performed. Millions of soldiers left for the battlegrounds unable to vote, and the Representation of the People Act 1918 changed all that. Men over the age of 21 who were householders were granted suffrage. The hypocrisy of denying the right to vote in a democracy for those who had risked their lives defending it was untenable. Women over 30 who owned certain property were also granted suffrage. The United Kingdom rallying around its servicemen and women was but a minor part in the tremendous aftermath of the war. Official reports indicate that there were over nine hundred thousand casualties, including killed in action, dying of wounds, taken as prisoners of war, or missing in action. Uncovering the legacies of these military heroes would be a daunting but rewarding task. Good military records in the 1910s have made ancestry detection easier than it has been for other times and places. Tracing your ancestry to the very early past is very difficult. People from certain socioeconomic backgrounds may not have left very good records. There was no assurance that everyone would have birth records until the early to mid-twentieth century. Finding ancestors in the military can be a direct route to finding many of your ancestors, given the stability and detail of military records. Their accomplishments will not be forgotten by anyone. Filed under: Genealogy World Like this post? Subscribe to my RSS feed and get loads more!
<urn:uuid:f8c53721-d026-429b-b25a-3a9c29ee0a6d>
CC-MAIN-2020-24
https://familyhistoryshow.net/uncover-your-ww1-military-heroes
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347432521.57/warc/CC-MAIN-20200603081823-20200603111823-00068.warc.gz
en
0.975439
611
3.859375
4
Mastery Across the Curriculum This dynamic course inspires teachers to provide primary children with meaningful opportunities to move their learning to greater depth. It unpicks the complexities of “mastery” by providing a wide range of practical activities and strategies to encourage children to think for themselves. Gain a clear idea of the pedagogy of thinking in greater depth and how this reflects on our classroom practice. With a focus on English and Maths and links to teaching and learning strategies for the wider curriculum, you will leave at the end of the day with a deeper understanding of the term “mastery”, along with a renewed vigour for supporting children on their mastery journey. DATE: carried forward to 2020/2021 TIME: 1.00 pm - 5.00 pm COST: HALF PRICE £132.50 to schools in Peterborough and Paragon TSA Executive Members FULL PRICE £265.00 to schools outside Peterborough VENUE: Hampton Hargate Primary School, Hargate Way, Hampton Hargate, Peterborough. PE7 8BZ MASTERY ACROSS THE CURRICULUM downloadable flyer
<urn:uuid:7ff369a4-b9d1-48cc-ab6e-868bbf6ca893>
CC-MAIN-2020-24
https://www.paragontsa.co.uk/ttedmastc
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347388012.14/warc/CC-MAIN-20200525063708-20200525093708-00245.warc.gz
en
0.921518
244
2.828125
3
According to the Second Vatican Council’s Dogmatic Constitution on the Church: “The family, is so to speak, the domestic church.” (Lumen Gentium 11) This means that it is in the context of the family that we first learn who God is and to prayerfully seek His will for us. –United States Conference of Catholic Bishops The single biggest determining factor in a child’s faith is how the faith is lived out at home, in the “domestic church.” It is in the home that children see the faith lived out. It is where they form their ideas of God, faith, prayer, and right and wrong. The parish’s religious education programs aid this development, but home is where it happens. Parents can use all the resources they can get to learn different ways to present and live the faith and to find answers to the tough questions. Here you can find resources to help answer any questions you have as well as activities to experience with your children. (And don’t forget your Director of Religious Education is a resource, too!) Reference – These resources will assist you in answering any question about Catholicism United State Conference of Catholic Bishops – This is a great resource to find information on the Church or the readings for the upcoming Sunday. The Bible – Looking for a bible verse on the go? Use your electronic Bible. Catechism of the Catholic Church – This book has a summary of our beliefs. This is a great reference for any questions you have about why we believe what we do. New Advent – A huge resource! It contains links to Catholic news and blogs, and searchable online versions of the Bible, the Catholic Encyclopedia, the Summa Theologiae, key works of the Church Fathers, and many Church documents (encyclicals, exhortations, etc.). Catholic Answers – the biggest Catholic apologetics website, providing answers to the difficult questions. Shield the Vulnerable -Shield the Vulnerable is dedicated to raising the awareness and prevention of the mistreatment of the vulnerable. We work hard to accomplish this goal by training young people and adults about abuse, neglect, predators, bullying, boundaries, respect, and the perils of cyberspace. Curriculum – If you want to continue a conversation your kids started in RE you can find help here. Finding God (Text used in the classroom) Saints – This sources give you a quick biography of any saint you are looking for. Prayers – EWTN is a great place to go for current events and the faith. Activities – Looking for a rainy day activity? OR something to help reinforce a lesson? Check out these websites and blogs for inspiration Crafts – Catholic Icing has really great crafts and activities to do at home with your kids! Blogs – These are some great blogs to help keep you inspired and informed. Joy – Amazing blogging by a mother of 9 adult children who writes on spirituality, saints, and the church. The Source for Parents – Great blog and resource for parents of middle school and high schoolers.
<urn:uuid:9f4a8d6b-d5e8-43db-bc39-5ab853eb65da>
CC-MAIN-2020-16
http://mountcarmelmv.org/RE/resources/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370505366.8/warc/CC-MAIN-20200401034127-20200401064127-00142.warc.gz
en
0.944474
643
2.6875
3
In the past, textbooks in ophthalmology have been written to appeal to both the undergraduate student and the graduate. This volume is a textbook which offers at the end of each subdivision an adequate and thoroughly up-to-date bibliography, sufficiently broad to enable one seeking further literary references to obtain the necessary clues. The first volume is entirely devoted to the fundamental sciences on which a thorough understanding of ophthalmology rests. It contains eight sections, on the phylogeny of the visual apparatus, the anatomy and comparative anatomy of the visual apparatus, the ontogenic development of the visual apparatus, the physiology and biochemistry of the eye, optics, the physicochemistry of vision, and the physiology of vision including visual sensations. Owing to the size of the volume, it is obviously impossible to discuss it in detail. The various sections are well written, give evidence of careful thought and judgment, present the modern proved
<urn:uuid:c3e0af0c-23c3-4601-a301-3bfaf984ffb5>
CC-MAIN-2013-48
http://jama.jamanetwork.com/article.aspx?articleid=243734
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164033438/warc/CC-MAIN-20131204133353-00089-ip-10-33-133-15.ec2.internal.warc.gz
en
0.920159
182
2.796875
3
10 Things You Can Do Here are 10 things you can do to take care of yourself, and others, with a short description for each one. Clicking on the underlined text will then take you to a page with more suggestions – about how to put that idea into action. 1) Be Mindful + Follow what health experts are asking you to do. For example, “social distancing”. But think of it with a slight twist: Creating Physical distance + Social/Emotional connection It's a way of preventing the spread of the virus the spread of caring and compassion. When we get fearful or stressed, our body tenses up and our thoughts race. Remember to breathe. Find ways to relax your body and calm your thoughts + emotions. Practice self-care and self-love. Regularly ‘feed’ your body, mind, spirit. Take time to really enjoy your food. Uplift yourself mentally + emotionally. Look for beauty. Find humor. And nurture yourself with nature (even online). It’s tempting to look away from things that worry or scare us, like the spread of the virus, loss of jobs and income, and loss of life. But the more we are able to see and feel them, the easier it actually is to cope. Get in touch with people who come to mind. Talk with others about how you are feeling. And send out thoughts of love + support to others. Depending on your belief system, pray, meditate, or contemplate ideas like wisdom, beauty or grace. Connect with something larger than yourself. Read favorite quotes or sayings which inspire you. Inform and educate yourself. But be aware when it becomes too much. Don’t get caught up in the frenzy or 'grip' of the news. Watch for small signs of progress with the virus, finances, and the economy. Look for stories of people doing inspiring work, sharing things they love, and giving to others. 9) Help Others Do what moves you. Share your gifts, assist people, and contribute in ways you can. Be inspired by what others are doing. Every bit helps. Giving strengthens our immune system, and others' well being too. Take the time to pause + reflect on what’s important. Connect with those who matter to you. Consider how this might be used as a wake-up call, about the things we need to change in our lives. And Some Final Thoughts... We will get through this ! Find what YOU can do... to take care of yourself in the best possible way... and help others do the same. To share these 10 ideas with others, send this link: click on the button below to get a copy of this list.
<urn:uuid:4b5eaa58-1484-4f4a-9c9f-1ea4f3b3aecf>
CC-MAIN-2020-29
https://erichellman.wixsite.com/take-care-of-you/10-things
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657163613.94/warc/CC-MAIN-20200715070409-20200715100409-00362.warc.gz
en
0.931558
578
2.53125
3
Manual horoscope (2018) Information Design / Product Design The manual horoscope is a board that simulates the structure of astrological charts and allows users to experiment with its structure. It was developed as a visualization tool for learners and practitioners of horoscopic astrology. This tool was built in MDF wood via laser cutting. Horoscope in raw MDF Horoscope finished with color scheme Horoscope in raw MDF As a self-taught student of astrology, I had a lot of difficulty understanding how astrological charts work due to their highly abstract nature. There are many softwares on the internet that allow for quick generation of astrological charts, but they always require geographic and time data. My proposal was therefore to create an analog tool to simulate the chart's structure without requiring real data. This way, users would be able to create and experiment with any chart, regardless of whether it is real or imagined. The biggest visual inspiration for this project is the Ptolomaic model of the solar system. Though scientifically disproven, it is an interesting visual representation of how the planets are distributed in relation to the earth from closest to furthest. From: Peter Apian, Cosmographia (1539). Reprinted in Alexandre Koyre, From the Closed World to the Infinite Universe (Baltimore; Johns Jopkins, 1957). The structure of this object contains both fixed and rotatable parts. Astrological charts are circular diagrams which basically define radial positions along a circle (namely, the zodiac). Therefore, it made sense to create a fixed base structure that allows for the rotation of moving elements. The zodiac is represented as the outer ring. As the main reference for astrological positions, it contains 12 divisions which are known as the signs, each sign therefore being divided in 30 degrees. Rotating the zodiac using the horizontal line as reference defines the position of the rising sign. The planets are represented as rings with a circle marker. The circle marker is used to define its position along the zodiac. They are distributed in order from closest to furthest in relation to the Earth. By rotating them, it also becomes clear which ones move the fastest or slowest. The horizon is represented as a fixed horizontal arrow. The position where the arrow crosses the zodiac defines the ascendant. The meridian is represented as a semi-rotatable vertical arrow and defines the midheaven position along the zodiac. The houses are represented in the very center of the object as a circle divided by 12 counter-clockwise from the horizon. This division is extended through the base of the object and can be seen between the planets' rings. Aspects are usually an optional feature in astrological charts. Geometrically speaking, they represent specific angular distances calculated from a specific point. In the object they are represented in each of the planets' rings as their correspondent symbols. A color scheme was developed to differentiate between the visual elements.of the object. The signs of the zodiac where colored according to the elements. Additionally, each planetary ring has its own color. The color scheme was chosen trying to respecit their traditional associations in western astrology. They were applied with colored varnish.
<urn:uuid:f4acf86e-fb6b-45c2-8434-d624004fe89a>
CC-MAIN-2023-14
https://www.cesardaher.com/manual-horoscope
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948708.2/warc/CC-MAIN-20230327220742-20230328010742-00584.warc.gz
en
0.93838
699
2.65625
3
Spring 2012 quarter - Kevin Francis history of science and technology , David Paulsen cognitive science, philosophy , Rachel Hastings linguistics, mathematics - Fields of Study - anthropology, biology, consciousness studies, linguistics and philosophy - Preparatory for studies or careers in - biology, cognitive science, linguistics, philosophy and psychology. What does our ability to speak and understand language reveal about the human mind? How much of our knowledge of language can be attributed to an innate language capacity and how much is dependent on individual experience? How are children able to develop a detailed and abstract understanding of their native language at a very young age? And how did human language evolve in the first place? In this program we will study theories of cognition, brain structure, and consciousness as they relate to the complex phenomena of language evolution, acquisition and use. We will explore diverse kinds of evidence that shed light on the evolution of language, including recent work in evolutionary biology, animal behavior, neurobiology, cognitive neuroscience, and the evolutionary genetics of language. To understand the nature of linguistic processing we will look at the structure of language and ask what capacities must be present within human cognition in order for us to produce and understand human languages. We will study the ideas of Noam Chomsky and others who argue for a "universal grammar" as an explanation of rapid language acquisition and similarity among languages. We will also examine the parallels between human language and communication in other animals. Finally, we will reflect on the strategies adopted by scientists to reconstruct events in the deep past. Program activities will include seminar, lectures and workshops. We will devote significant time to providing background material in linguistics, evolutionary biology, and cognitive neuroscience that pertains to the evolution of language. We will read scientific and philosophical material that addresses fundamental questions about consciousness, the relationship between mind and brain, and the relation between cognition and the human capacity for language. As part of this program, students should expect to participate actively in seminar, write several essays, and complete a final research project. - Academic Website - Online Learning - Enhanced Online Learning - Greener Store - Offered During
<urn:uuid:f263215b-5b3c-47d4-82b8-ba790a00401a>
CC-MAIN-2014-15
http://evergreen.edu/catalog/2011-12/programs/languageandtheevolutionofmind-1324
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223211700.16/warc/CC-MAIN-20140423032011-00535-ip-10-147-4-33.ec2.internal.warc.gz
en
0.902991
432
2.8125
3
In its essence, a business process is a bridge between a service/product provider and receiver (a customer or client.) The simplest business process definition is: “A business process is an accumulation of activities, tasks, and communication points that, if executed successfully and logically, produce successful service or product.” Every business process is particular and intrinsically logical, developed with the purpose of ensuring efficient and smooth workflow. Consequently, the successful implementation of the well-sought business process improves business outcome. Most importantly, business processes prepare companies for unexpected and rapid changes in ever-changing and vibrant global market. Some large business processes (such as mortgage business process) are often divided into subprocesses, core and non-core business processes. Generally speaking, a business process can be subdivided into three vital processes: Operational processes are processes that are essential to the company. These processes often consist of specific tasks or set of tasks (such as communication with customers, helping clients open up their accounts, etc.) Simply put, this is where personnel executes their given roles and performs activities regarding their roles. Management processes are “insurance” procedures, that is, activities which ensure that projects flow as they should. While operational processes “get things done,” management processes oversee and ensure that operational processes “get things done.” Supporting processes are all processes that provide on-demand support and resolve issues and hiccups that occur during everyday activities of a particular company. Some examples are maintenance, accounting, customer service, etc. A core business processes are all activities that are essential to the company. Should a company fail on core activities, its existence would be either threatened or fundamentally changed. Each company can, within its walls, determine which processes it considers to be core. Also, the rational division between core and non-core processes allows companies to invest their resources in those processes it deems vital to its existence. Consequently, a company can further strengthen and improve its core methods, as well as to outsource non-core processes to third-party agents and services (to reduce expenses, running costs, workforce, etc.) As an example, the sale of product or services is a core business process as organizations existence depends on it. If there is any failure in this area then the company will have a severe threat. A non-core business process is any method or activity that isn’t essential to the company. While core processes are considered to be the primary source of earnings for a company, non-core operations stand outside of that “main source of income” circle. Sometimes companies would outsource their non-core services to third parties. Naturally, a company would outsource their services to those that specialize in given sector, field or activity. For instance, a company may outsource its accounting services to accountants, HR functions to HR specializing company and so on. Non-core services are widespread in virtually all businesses. They are important for any company even though they aren’t considered essential or central to the company. Moreover, even if a non-core service doesn’t directly lead to profit, it, in some indirect way, enables that profit to be made. Ensuring that non-core processes don’t suffocate the company is imperative in the modern business environment. An end-to-end business process (or e2e business process) monitors and evaluates each step, process, and subprocess that a company performs to achieve a specific goal. It normally starts from the first point of contact with the customer (usually an enquiry) and then ends with say invoice collection. So it may cover all the steps like sales, Delivery of the services, Invoice generation and final collection. Because of its nature (From start to finish) its called a end to end business process. A company can also digitize their activities, or include methods (such as the BPM) to accelerate and further their e2e process. The implementation of digitization helps to improve productivity. End to end business processes can be further subdivided into two types as follows An end to end business process that starts with sales inquiry, then moves to delivery of services then moves to invoicing department is essentially a cross-departmental business process. And while each department has its own set of rules, tasks, and activities, in a cross-department business process, it becomes a part of a project that transcends it. Therefore, a goal of each department is not only to effectively carry out its functions internally but to communicate its requirements, prompt changes, client needs (and so forth) externally. Cross-department business processes can get very confusing and complicated, even for major firms. And while small businesses often have fewer departments, their lack of experience with cross-department business processes and methods often confuses them, ultimately causing setbacks and failures. Communication between departments need to be managed well and updates and list of work should be very easy to identify. Many companies choose to decompose their processes into several subprocesses These subprocesses are then divided into sets of work processes, and then into specific activities. Cross-geography business processes are even more complicated than cross-department business processes since it involves cooperation between several teams which are geographically apart. Such a process can involve teams that are of different nationalities, cultures, even languages. It is, therefore, a job of each team to overcome those differences and join together around the same cause and achieve set goals. It is needless to say that cross-geography business processes are considerably complicated to oversee, monitor, manage and enhance. Moreover, building and maintaining an adequate process model is critical for all entities involved in a cross-geographical partnership. Each successful model must insist on understanding and consolidation since these two factors lead to interoperability between the involved parties. If the parties involved in this process achieve healthy interoperability, this could lead to more successful cooperation and transcendence of boundaries and differences (that often slow down the cooperation and progression.) Defining a smooth set of steps for operating cross geography team is of paramount importance. It could significantly affect the quality of the cross-geography business process. Business process management is a system that helps to implement, maintain and improve business processes. This may include analysis of specific activities (such as of e2e processes), modeling and remodeling (experimentation, alternative scenarios, modeling after successful scenarios), monitoring of those scenarios, etc. BPM is, therefore, a set of methods and activities that serve a particular purpose, a never-ending process of improvement. Today, BPM is hard to imagine without BPM software. Despite the fact that a BPM in itself is not a technology, it is inseparable from it; together, business process and IT change the way businesses work. BPM is particularly useful for end-to-end business processes since it provides an insight into a broader picture and allows companies to understand their own organizations on a day to day basis. Naturally, software is an ideal candidate for such job, due to its unbiased and strict data-oriented perspective. Unfortunately, most BPM software overcomplicate the things that they should be actually simplifying, causing headaches to its users. As a consequence of that, jamming may occur in a complex workflow, causing problems for anyone that is involved in it. Small companies suffer most from complicated BPM software, for they often don’t have the human resources to handle complex workflows. Moreover, their staff usually can’t handle the pressure of such workflows, nor do they have the knowledge and the ability to stick to specific models and designs. And even if a company manages to overcome the challenges of complex workflow, there’s no guarantee that the workflow itself is errorless. Furthermore, most software don’t deal on low case level, and most lack the tools to offer a fine-tailored solution to practical problems of clients and customers. Solastis CRM + BPM tool brings process digitalization without redundant complexity. While most other BPM tools offer little to no flexibility regarding specific cases, activities and tickets, Solastis allows its users to not only change but develop their own case types. Without this simple ticket & case functions, a platform will not be able to efficiently and promptly resolve customer issues and inquiries. For example, the processes of authorization or reporting are non-existent without fine-tailored case types. Other BPM software offers a complex workflow. Not only does this slow down the entire process, but it also leads to frustration on both sides (employee and customer.) In Solastis CRM + BPM we have removed this complex workflow rules altogether and implemented a basic sequential step workflow which is easy to define for anybody. Your manager can define a process in 5 minutes and deploy it. Solastis CRM + BPM also has lot of other features like advanced authorization and reporting to manage a multi-organisational and multilocational BPM environment effortlessly.
<urn:uuid:8d9ad1db-9c3b-4ef9-b7e7-b6171341bee1>
CC-MAIN-2020-16
https://www.solastis.com/what-is-a-business-process-and-bpm/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370497042.33/warc/CC-MAIN-20200330120036-20200330150036-00306.warc.gz
en
0.957912
1,863
3.078125
3
Marvin Minsky on Education Six essays by artificial intelligence pioneer Marvin Minsky on how education can foster inventiveness, paired with commentary by Minsky's former colleagues and students. Marvin Minsky was a pioneering researcher in artificial intelligence whose work led to both theoretical and practical advances. His work was motivated not only by technological advancement but also by the desire to understand the workings of our own minds. Minsky's insights about the mind provide fresh perspectives on education and how children learn. This book collects for the first time six essays by Minsky on children, learning, and the potential of computers in school to enrich children's development. In these essays Minsky discusses the shortcomings of conventional education (particularly in mathematics) and considers alternative approaches; reflects on the role of mentors; describes higher-level strategies for thinking across domains; and suggests projects for children to pursue. Each essay is paired with commentary by one of Minsky's former colleagues or students, which identifies Minsky's key ideas and connects his writings to current research. Minsky once observed that in traditional teaching, “instead of promoting inventiveness, we focus on preventing mistakes.” These essays offer Minsky's unique insights into how education can foster inventiveness. Commentary by Hal Abelson, Walter Bender, Alan Kay, Margaret Minsky, Brian Silverman, Gary Stager, Mike Travers, Patrick Henry Winston Hardcover$30.00 S | £25.00 ISBN: 9780262039093 232 pp. | 5.375 in x 8 in 110 b&w illus. “Marvin Minsky is best known as one of the founders of the field of artificial intelligence, but his true goal was understanding human intelligence. In these lovely essays, Marvin shares his distinctive, often contrarian ideas about children, learning, and education. As you read these essays, you'll find yourself thinking about your own thinking—and, more important, gain insights into why and how children should do the same.” LEGO Papert Professor of Learning Research, MIT Media Lab; author of Lifelong Kindergarten “Let's face it, writings on education tend to be plodding, stultifying affairs for the most part. What a joy then to have Marvin Minsky, who spent a lifetime thinking hard about thinking, weigh in on the subject. Put aside all your preconceptions about age-graded and clock-based classes, all your concerns about the current education industry, and get ready to think about a radically different education where children learn to become self-aware about their own thinking.” Hector J. Levesque Professor Emeritus, University of Toronto “In a time when education visionaries and magical solutions for our outdated schools are a dime a dozen, reading Marvin Minsky reminds us of what thinking outside of the box truly means. Even after 50 years, his ideas are still rebellious and radically innovative, and the revolution he started with Seymour Papert lives on. But these essays are also a reminder of how far we are from realizing Minsky's vision of education as the most fascinating, deep, and ambitious challenge humanity has created for itself. There is much work to be done, and this book might just be the first step.” Associate Professor, Columbia University
<urn:uuid:f4dba50b-6ac4-4bfa-93f0-de6576669cb3>
CC-MAIN-2020-16
https://mitpress.mit.edu/books/inventive-minds
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371606067.71/warc/CC-MAIN-20200405150416-20200405180916-00507.warc.gz
en
0.946021
675
2.90625
3
Facts about Trojan.Gentromal Trojan.Gentromal is one most typical malware infection, which belongs from the family of Trojan. It is a recently detected threat. It has been creates by the rogue cyber criminals in order to take full advantage of the security vulnerabilities of your computer system and make some quick profit illegally. Being a noxious malware infection this particular system virus really very deceitful for your Windows system which can make your system completely ruin and good for nothing in just no time. It secretly executed in your computer system's background and executes several harmful tasks along with the authentic process of your PC. This malicious threat Trojan.Gentromal has been designed in such a complex way that it can easily avoid all of the security hurdles of your compromised system and is fully able to severe damage. This threat is a harmful for all Windows systems. This virus can intrude on your system very easily and create some severe problems on your system. It can compromised with your antivirus program to safe reside for a longer time on your PC. Intrusion ways of Trojan.Gentromal Trojan.Gentromal virus install on your system without your permission. Generally this Trojan enters on your PC by some of the following ways : If you don't pay attention while installing a new software on your system because the hackers may drops virus infection within the software package and after installation you get infected. If you download software from freeware or shareware program bundles. This may also gets you infection. If you visit any legitimate websites which has hacked, once you open any infected websites this virus comes on your system. This virus also propagates via opening of spam email attachments which sends by unknown. It also get on your PC after clicking on ads, banners and pop-ups and browsing malicious websites. Risk Associated With Trojan.Gentromal This dubious threat is a vicious computer infection that can do severe damage. It can cause several problems on the compromised device that can result into slow and sluggish computer. Some of the major risk associated with this threat are :- Trojan.Gentromal can drop infection on your system silently. It's malicious activities can slow down your computer speed and degrade your system performance. Conceal your private and sensitive information. This virus can grab your banking and account transaction details. It can send your private information to the hackers. It can compromise with your antivirus and make your system more vulnerable. It can corrupt your files or applications and delete your important data. Trojan.Gentromal also make a backdoor for the remote hackers. This threat can help the hackers to remote access your system. It can also bring other spyware and harmful threats on your system. How to Remove Trojan.Gentromal from Compromised PC (Manual Steps) (This guide is intended to help users in following Step by Step instructions in making Windows Safe) The first step which need to be followed is to Restart Windows PC in Safe Mode Reboot in Safe Mode (For Windows XP | Vista | Win7) - Restart Computer - Tap on F8 continuously when the PC starts booting and select the option to enter Safe Mode with Networking. For Windows 8/8.1 - Press on the Start Button and then Choose Control Panel from the menu option - Users need to opt for System and Security, to select Administrative Tools and then System Configuration. 3. Next, Click on the Safe Boot option and then choose OK, this will open a pop-up window, next Select Restart Option. For Windows 10 - Start Menu is to be selected to Open it - Press the power button icon which is present in the right corner, this will display power options menu. - Keeping the SHIFT Key pressed on the keyboard, select the restart option. This will reboot Win 10 - Now you need to select the Troubleshoot icon, followed by advanced option in the startup Settings. Click on Restart. This will give the option to reboot, now select Enter Safe Mode with Networking. Step 2. Uninstall Trojan.Gentromal from Task Manager on Windows How to End the Running Process related to Trojan.Gentromal using Task Manager - Firstly, Open Task Manager by Pressing Ctrl+Shift+Esc in Combination - Next, Click on processes to Find Trojan.Gentromal - Now Click and select End Process to terminate Trojan.Gentromal. Step3: How to Uninstall Trojan.Gentromal from Control Panel on Windows for Win XP| Vista and Win 7 Users - Click and Select on Start Menu - Now Control Panel is to be selected from the list - Next Click on Uninstall Program - Users need to Choose suspicious program related to Trojan.Gentromal and right clicking on it. - Finally, Select Uninstall option. For Win 8 - Click and Select “Charms bar” - Now Select Settings Option - Next Click on Control Panel - Select on Uninstall a Program Option and right click on program associated to Trojan.Gentromal and finally uninstall it. For Windows 10 - The first Step is to Click and Select on Start Menu - Now Click on All Apps - Choose Trojan.Gentromal and other suspicious program from the complete list - Now right Click on to select Trojan.Gentromal and finally Uninstall it from Windows 10 Step: 4 How to Delete Trojan.Gentromal Created Files from Registry - Open Registry by Typing Regedit in the Windows Search Field and then press on Enter. - This will open the registry entries. Now users need to press CTRL + F together and type Trojan.Gentromal to find the entries. - Once located, delete all Trojan.Gentromal named entries. If you are unable to find it, you need to look up for it on the directories manually. Be careful and delete only Trojan.Gentromal entries, else it can damage your Windows Computer severely. HKEY_CURRENT_USER—-Software—–Random Directory. HKEY_CURRENT_USER—-Software—Microsoft—-Windows—CurrentVersion—Run– Random HKEY_CURRENT_USER—-Software—Microsoft—Internet Explorer—-Main—- Random Still having any problem in getting rid of Trojan.Gentromal, or have any doubt regarding this, feel free to ask our experts.
<urn:uuid:03fe8097-29f6-4424-8b40-afaea62962f3>
CC-MAIN-2017-43
http://www.removemalwarevirus.com/step-by-step-guide-to-remove-trojan-gentromal-virus-removal-guidance
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187822930.13/warc/CC-MAIN-20171018104813-20171018124813-00682.warc.gz
en
0.8699
1,354
2.515625
3
|All That Glitters is not Gold Essay in 100 Words| This is a very famous English proverb that we hear from childhood. It actually means about the inner darkness of humans. Gold is a very valuable thing and it glitters always. But there are lots of other similar stones or things like gold which glitters like gold. But they are not gold. Like this, there are so many attractive and beautiful people around. Actually, they are not good. Some of them are really evil inside. We have to understand the inner motive or desire of someone. We shouldn’t judge someone with outer appearance. This is a very short essay on all that glitter is not gold in 100 words. This essay is only for children from class 1, 2, 3, and 4. They can learn this short essay easily. It is an important topic for the exam. More 100 Words Essay:
<urn:uuid:8000f19e-caeb-43fa-8af0-e33523530eca>
CC-MAIN-2023-23
https://www.paragraphbuzz.com/all-that-glitters-is-not-gold-essay-in-100-words
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652494.25/warc/CC-MAIN-20230606082037-20230606112037-00024.warc.gz
en
0.96725
188
2.859375
3
More than 1 in 10 people have dyslexia but it is still often misunderstood. It is a learning difference which affects reading and writing but also has an impact on information processing and organisational skills. However, thinking differently can have many positive effects too. Many dyslexic people have strengths in creativity and reasoning. Celebrating Strengths and Empowering Those With Dyslexia Dyslexia Awareness Week (7-13 October) 2019 is designed to encourage schools and businesses to celebrate the strengths of individuals with dyslexia and empower them to achieve to their fullest. This year, the British Dyslexia Association is asking schools and workplaces to put aside half an hour to discuss and explore how to best empower those with dyslexia and to educate others around this topic. In July, we shared Elodie Shemwood’s amazing video about her experiences with dyslexia and why we should see more characters with dyslexia in books at our Representations event. This would be a perfect video for sharing with pupils in assemblies or PHSE lessons as part of a discussion about the positive sides of having dyslexia. Thank you so much Elodie for this video and to Inclusive Minds to introducing us to Elodie through their Inclusion Ambassador Scheme! Recommendations for Resources and Books for Students with Dyslexia Barrington Stoke publish books that are super readable, meaning that everyone can enjoy a high quality story. The books are shorter than the average novel with double spacing, a dyslexia friendly font and good quality tinted paper which is heavy enough to stop the ‘ghost’ of the print coming through from the other side. Their books include those from award-winning authors, meaning that pupils can be reading works written by the same writers as their peers and the stories are unpatronising, aimed at the age of the reader and not their reading age. Some of our favourites from the Barrington Stoke range are: Norman the Norman from Normandy- Philip Ardagh, illustrated by Tom Morgan-Jones (5-8 years) Shona, Word Detective- John Agard (8-12 years) The Liar’s Handbook- Keren David (11+ years) Grave Matter- Juno Dawson (14+ years) Mind The Gap- Phil Earle (14+ years) The Reading Realm app is designed to encourage a love of reading by immersing pupils in extracts from high quality literature. The app uses a dyslexia friendly font making it an accessible choice for use for individuals, classes or intervention groups. It’s a great way to get pupils to try a range of different books and get them hooked into wanting to read the whole text! Maggot Moon- Sally Gardner Maggot Moon is a great book for secondary age pupils. Standish Treadwell is bullied for the difficulties he has with reading and writing but he sees the world in a different way… and maybe this is what the world needs. Especially when the world you live in is a dystopian totalitarian led state with individuality and difference are crushed. There is also an interactive i-book version where readers can see animated videos that replicate what it is like for some people to have dyslexia. This is a great article where Sally Gardner talks about her own experiences of dyslexia. Let us know how you are starting conversations about dyslexia for Dyslexia Awareness Week.
<urn:uuid:a769bafb-2b53-4b89-9785-5129dcfc6cbe>
CC-MAIN-2020-34
http://www.liverpoollearningpartnership.com/reading/dyslexia-awareness-week/
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735867.94/warc/CC-MAIN-20200804131928-20200804161928-00058.warc.gz
en
0.948851
710
3
3
Bedtime is the perfect time to let your imagination wonder. Bedtime stories are not only fun but are critical to your child’s development. Aside from creating special parent-child bonds and preparing your child to fall asleep, researchers are noticing a connecting between other “powers” to this nighttime routine. Whether you are helping Princess Cupcake Jones find her missing tutu or hoping to get her to go to school, you are actually boosting your child’s brain development. “Neural research shows that when parents and caregivers interact verbally with children — which includes reading to them — kids learn a great deal more than we ever thought possible,” according to G. Reid Lyon, Ph.D., Chief of the Child Development and Behavior Branch of the National Institute of Child Health and Human Development in Bethesda, MD. The benefits of reading to your child go beyond improving logic skills, it can help lower stress levels as well. Recent studies have shown that bedtime stories can rewire children’s brains to quicken their mastery of language. Why You Should Read Outloud Children learn to love the sound of language before they even notice the existence of printed words on a page, as noted in a Reading Is Fundamental (RIF) article. By reading outloud parents are stimulating their child’s imagination and expanding their understanding of the world. Doing so helps with language development and listening skills as well prepares them for easier understanding of the written word. As noted in the RIF piece, “when the rhythm and melody of language become a part of a child’s life, learning to read will be as natural as learning to walk and talk.” Need a new bedtime story for your little one? Check out the Princess Cupcake Jones series by Ylleya Fields. Click here to read a recent MomViews segment with the author on teaching your child the importance of cleaning up.
<urn:uuid:6e06bc20-c041-4958-861c-f45e61a877ac>
CC-MAIN-2020-05
https://motherhoodthroughmyeyes.com/the-importance-of-reading-to-your/
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250594333.5/warc/CC-MAIN-20200119064802-20200119092802-00268.warc.gz
en
0.948279
398
3.265625
3
Another word for patience patience long-suffering resignation forbearanceSearch Thesaurus These nouns denote the capacity to endure hardship, difficulty, or inconvenience without complaint. Patience emphasizes calmness, self-control, and the willingness or ability to tolerate delay: Our patience will achieve more than our force (Edmund Burke). Long-suffering is long and patient endurance, as of wrong or provocation: The general, a man not known for docility and long-suffering, flew into a rage. Resignation implies acceptance of or submission to something trying, as out of despair or necessity: I undertook the job with an air of resignation. Forbearance denotes restraint, as in retaliating, demanding what is due, or voicing disapproval: “It is the mutual duty of all to practice Christian forbearance, love, and charity towards each other” (Patrick Henry). Another word for patiencenoun The capacity of enduring hardship or inconvenience without complaint:forbearance, long-suffering, resignation, tolerance. See accept
<urn:uuid:238268fb-7c39-454b-b275-a0039ead654f>
CC-MAIN-2017-47
http://thesaurus.yourdictionary.com/patience
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806317.75/warc/CC-MAIN-20171121055145-20171121075145-00543.warc.gz
en
0.892076
217
2.609375
3
By Gina Mattes, PharmD Student Cedarville University Today almost 80% of Americans have back pain, but often the treatments used are ineffective and costly. 1 However, there is another way that people can relieve back pain that is relatively cheap or free and you can do it right at home! Exercise is being proven to be more beneficial for your heart, but it’s also better for pain.1 In an article posted in The New York Times a study was cited that showed even going for a walk every day can help reduce back pain.1 This conclusion was made because there was no statistical difference between the exercise group and the walking group with significant improvement in walking distance from the beginning to the end in both groups.2 The six minute walk test was the main outcome for the study. Both groups participated in a six-week program that was twice a week. Both groups started with 20 minutes during each session and increased by 5 minutes every week. The walking group spent time on a treadmill starting at a low intensity, increasing intensity, then had a cool down with low intensity at each session. The exercise group focused on active movement and strengthening exercises, beginning with a five minute warm up, low loaded exercise increasing the number of exercise repetitions over the course of the 6 weeks, and a five minute cool-down.2 Another way to reduce chronic pain The New York Times article proposes is doing yoga. One study showed that yoga for short-term effectiveness helped tremendously, but only moderate outcomes for long-term effectiveness.3 The reason exercise has been helping rather than hurting is because you are strengthening the muscles in your back and abdomen, in doing this you are able to regain function of your back without pain because of the endurance your body has built up.2 In the study presented by the Clinical Journal of Pain Cramer and colleagues looked at 10 randomized clinical studies that collectively had 967 chronic back pain patients that showed strong evidence for short term relief and moderate evidence for long-term relief.3 There is no simple solution or usually a reason for back pain to be occurring, but even if there is no reason for the pain people don’t have to be in pain instead they can go for a walk and build up those muscles. I agree with this article. It’s easier and way cheaper to go outside and walk around the block a few times, going to the gym, or looking up youtube yoga videos to do some yoga and help yourself than taking medications that probably won’t help in the long run. Studies have show that the standard of care for lower back pain such as steroid shots, has often been ineffective for chronic pain. 3, 4 Additional evidence shows that people doing yoga to relieve chronic back pain is much more helpful.1,2,3 In a study done by Saper he came up with a 12 week hatha yoga program.5 The study included a 12 week yoga program with each session lasting about 75 minutes, led by a 2 year yoga expert.5 The program was broken up into four, three week segments with each week containing a different theme.5 The participants were strongly encouraged to practice yoga for 30 minutes each day, the participants were given all material needed to practice at home.5 Improvement was evaluated by questionnaires that participants filled out at 6 and 12 weeks of intervention.5 At the end the study showed that participants’ pain decreased resulting in the decrease of using pain medications and muscle relaxants.5 However, the study did have a high number of drop out rates and a low number of follow up at 26 weeks.5 Even with the issues of the study it still shows a significant difference in people who did a yoga program versus the people who did not.5 The increase in studies that exercise in some form helps chronic pain patients long-term are overwhelming. Even a short day trip in a study done in Japan where people went to an amusement park for the day had pain relief, but the relief quickly faded after that day.2,3 This study included several age groups and measured back pain at different times (10 minutes, 1 hour,and 3 hours after arriving), but had a low number of participants in the study making it more questionable.3 In light of this new evidence I would highly recommend to my patients to try and build those lower back and abdomen muscles by going for a walk or maybe even looking up a few easy exercises online instead of jumping to steroid shots. In the end walking around the block would likely be more beneficial to health holistically than medication therapy. So which would you rather have, going for a walk every day or sitting in the doctor’s office waiting for a shot that may not have long term effectiveness? 1. Reynolds, G. Alternatives for back pain relief. The New York Times. July 18, 2013:MM18. October 21, 2013 http://well.blogs.nytimes.com/2013/07/18/looking-for-alternatives-for-back-pain-relief/?_r=0 2. Shnayderman I, Katz-Leurer M. An aerobic walking programme versus muscle strengthening programme for chronic low back pain: a randomized controlled trial. Clinical Rehabilitation [serial online]. March 2013;27(3):207-214. 3. Centre for Reviews and D. A systematic review and meta‐analysis of yoga for low back pain (Provisional abstract). Clinical Journal Of Pain [serial online]. 2013;:450-460. 4. Staal J, Nelemans P, de Bie R. Spinal injection therapy for low back pain. JAMA: The Journal Of The American Medical Association [serial online]. June 19, 2013;309(23):2439-2440. 5. Saper R. Yoga for Chronic Low Back Pain in a Predominantly Minority Population: A Pilot Randomized Controlled Trial. Alternative Therapies In Health & Medicine [serial online]. November 2009;15(6):18-27. 6. Sakakibara T, Wang Z, Kasai Y. Does going to an amusement park alleviate low back pain? A preliminary study. Journal Of Pain Research [serial online]. January 1, 2012;5:409-413.
<urn:uuid:3ed5a0e9-90a8-4d16-956b-796e4f3db4e0>
CC-MAIN-2017-39
http://selfcarepharmacy.cedarville.edu/?tag=pain
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818686705.10/warc/CC-MAIN-20170920071017-20170920091017-00221.warc.gz
en
0.951776
1,269
2.609375
3
(RxWiki News) Women's hearts are not the same as men's when it comes to a condition called atrial fibrillation (Afib). A new study from an international team of researchers found that, in women, an irregular heartbeat may be a stronger risk factor for stroke and other problems than it is in men. Connor A. Emdin, a PhD student in population health at the George Institute for Global Health at the University of Oxford in England, led this study. He and his colleagues studied a particular kind of irregular heartbeat called Afib. AFib occurs when the heart's electrical system sends disorganized impulses to the upper chambers of the heart. These chambers, called atria, respond by trying to beat rapidly and irregularly. This condition increases the risk of stroke and death in both men and women. The risk factors for heart disease don't always affect women and men in the same way, however. The authors of this study wanted to look at the differences in how Afib affected men and women. Emdin and colleagues looked at 30 past studies that included more than 4 million patients. The study data included links between gender and death from any cause, as well as death from heart disease, stroke, heart attacks and heart failure. These researchers found that Afib in women appeared to increase the risk of death from any cause by 12 percent more than it did in men. AFib in women also appeared to increase the risk of stroke, death from heart disease, heart attacks and heart failure. Emdin and colleagues noted that their results don't indicate Afib causes death and heart disease in women — just that these factors are linked. A specific risk score for Afib should be developed for women, these researchers said. They also called for further research to study the underlying reasons for differences between the sexes when it comes to Afib. This study was published in the January issue of The BMJ. This study received no outside funding. Study co-author Dr. Mark Woodward reported consultancy fees from Amgen and Novartis, which make drugs used to treat heart disease.
<urn:uuid:7c3a7325-2d7e-4c19-9ca4-37e7454e8a32>
CC-MAIN-2017-39
http://www.rxwiki.com/news-article/atrial-fibrillation-women-may-increase-stroke-heart-disease-heart-failure-risk?utm_source%3De43ddbb1-9b99-4387-9b5f-25579f6a5fa6%26utm_medium%3Drss%26utm_campaign%3Dshort=
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818686043.16/warc/CC-MAIN-20170919221032-20170920001032-00693.warc.gz
en
0.969586
431
3.125
3
concern. Policy responses intended to reduce one nation’s vulnerability to climate events may sometimes increase the vulnerability of other countries. These kinds of climate-security connections could prove highly significant and deserve serious attention in security analysis, both by monitoring the development of such policies and by analyzing their implications for stresses in other places both when they are put in place and when a stressful climate event subsequently occurs. Focus on Disruptions Outside the United States Our study focuses largely on developments and vulnerabilities external to the United States, while recognizing that climate change is a global phenomenon and that events occurring within the United States can be disruptive in other countries, and vice versa. We examine some of these connections but not others. For example, a drought in U.S. agricultural areas that led to a spike in the global price of corn or wheat could lead indirectly to a humanitarian or political crisis elsewhere that could become a national security issue for the United States. Our study does examine such scenarios, but it does not examine the social and political consequences such events might have within the United States, nor does it examine the social and political consequences within the United States of climate events occurring elsewhere that disrupt global systems such as public health or the supply systems for critical commodities. We emphasize, however, that such a separation between domestic and foreign impacts reflects only the division of missions among federal agencies, not the characteristics of climate phenomena or their consequences. In particular, observations, analyses, and fundamental knowledge that need to be developed in order to understand changing vulnerabilities to harm from climate events, which can offer valuable information to the U.S. intelligence community, are equally important for informing other federal agencies and decision makers below the national level, particularly including agencies responsible for domestic security and disaster management. They are also critical for informing international organizations. In Chapter 6 we discuss the needs for monitoring and analysis within a whole-of-government approach to developing an understanding of the effects of the changing risks of climate events. Focus on the Next Decade Given the risks and difficulties of projecting political, economic, and technical developments more than a decade into the future and the fact that countries are—and should be—starting now to contemplate steps to reduce vulnerability to climate change effects, this study focuses primarily on the
<urn:uuid:8b5d4338-704d-4dce-90da-0f9ac7f458a8>
CC-MAIN-2014-35
http://www.nap.edu/openbook.php?record_id=14682&page=32
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535921957.9/warc/CC-MAIN-20140901014521-00076-ip-10-180-136-8.ec2.internal.warc.gz
en
0.950908
454
2.984375
3
15 Feb 2012 15:55:00.000 Plant and computer scientists can now study the underground world of plants with more accuracy and clarity. The revolutionary technique will improve our chances of breeding better crop varieties and increasing yields. Developed at The University of Nottingham by a team of experts from the Schools of Biosciences and Computer Science , the new approach is based on the same X-ray technology used in hospital CT scans and incorporates new image analysis software which, for the first time, can automatically distinguish plant roots from the other materials found in soil. The results of this research, which has already been demonstrated on the roots of maize, wheat and tomato, have been published in the international scientific journal Plant Physiology Click here for full story The interdisciplinary team of scientists from the Centre for Plant Integrative Biology ) used X-ray Micro Computed Tomography (Micro-CT ) to look at the shape and branching pattern — the architecture — of roots in soil. The data was then fed into the new RooTrak software which overcomes the problem of distinguishing between roots and other elements of the soil. Breakthrough for food security Dr Sacha Mooney, an expert in soil physics in the School of Biosciences, said: “This technique is a hugely important advance. The application of X-ray CT for visualising roots has been limited because we simply couldn’t see a large portion of the root structure. RooTrak has enabled us to overcome this and has opened up the use of the technology for exploring the key questions regarding how we can manipulate plants and soils for improving our food security.” The RooTrak software works by taking a stack of virtual slices through the root-bearing soil. It treats each slice as a frame in a movie, so that static roots in each slice are treated as moving objects which can be tracked. This allows the software to differentiate between root and water or organic elements in the soil much more effectively than previous techniques. The detailed accurate root architecture can then be seen in three dimensions. Tony Pridmore, Data Director at CPIB and an expert in tracking and analysis software, said: “Thinking of Micro-CT data as a sequence of images allows us to solve the problems caused by variations in the appearance of plant roots and the similarity of some roots to the surrounding soil. This is important because we can now extract descriptions of root architecture quickly and objectively.” Malcolm Bennett, Professor of Plant Sciences and an expert in root biology, said: “Root architecture critically influences nutrient and water uptake. A key impediment to genetic analysis of root architecture in crops grown in soil has been the ability to image live roots. Recent advances in microscale X-ray Computed Tomography (MicroCT) and RooTrak software at Nottingham now make this possible.” Ambitious project wins a further £3m in funding The team has just been awarded a €3.5m (nearly £3m) five year European Research Council (ERC) Advanced Investigator Grant to use this new software in conjunction with an innovative microCT-based imaging approach to image wheat roots and select for new varieties with improved water and nutrient uptake efficiencies. This ambitious project will be undertaken by a multidisciplinary team of scientists in the Centre for Plant Integrative Biology (CPIB) led by Professor Bennett. To undertake this research project help from collaborators across Europe, Mexico and Australia is also required to ensure that the most advanced techniques and biological resources are exploited to radically impact efforts to improve crop performance. The CPIB is funded by the Systems Biology joint initiative of the Biotechnology and Biological Sciences Research Council (BBSRC) and the Engineering and Physical Sciences Research Council (EPSRC). The research was led by PhD student Stefan Mairhofer, with funding from The University of Nottingham’s Interdisciplinary Doctoral Training Centre in Integrative Biology. Global Food Security is also a key project within the University’s new appeal, Impact: The Nottingham Campaign, which is delivering the University’s vision to change lives, tackle global issues and shape the future. More information is available at: http://tiny.cc/UoNImpact — Ends — Notes to editors: The University of Nottingham, described by The Sunday Times University Guide 2011 as "the embodiment of the modern international university", has 42,000 students at award-winning campuses in the United Kingdom, China and Malaysia. It is also the most popular university in the UK by 2012 application numbers, and ‘the world’s greenest university’. It is ranked in the UK's Top 10 and the World's Top 75 universities by the Shanghai Jiao Tong University (SJTU) and the QS World University Rankings. More than 90 per cent of research at The University of Nottingham is of international quality, according to the most recent Research Assessment Exercise. The University aims to be recognised around the world for its signature contributions, especially in global food security, energy & sustainability, and health. The University won a Queen’s Anniversary Prize for Higher and Further Education in 2011, for its research into global food security. Impact: The Nottingham Campaign, its biggest ever fund-raising campaign, will deliver the University’s vision to change lives, tackle global issues and shape the future. More news… For up to the minute media alerts follow us on Twitter
<urn:uuid:7bf9a92f-d875-4d7f-b5da-f08a27d0f146>
CC-MAIN-2014-15
http://www.nottingham.ac.uk/news/pressreleases/2012/february/the-underground-world-of-plants.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223204388.12/warc/CC-MAIN-20140423032004-00320-ip-10-147-4-33.ec2.internal.warc.gz
en
0.919238
1,123
3.78125
4
These 150 Victory Drill Book Worksheets and answer pages are designed to give page-by-page practice for mastering the phonetic rules that govern pronunciation and spelling. These worksheets are the result of time-proven practice and mastery lessons designed by teachers who are especially skilled in the Victory Drill Reading Program. Each page of the Victory Drill Book includes worksheets designed to meet specific needs and to emphasize the sound or rules taught on that page. The Victory Drill Book Worksheets are geared to primary grade levels, but offer a variety of difficulty levels, offering teachers the choice of worksheets that will best meet the needs of their students. That means the Victory Drill Book Worksheets can be used effectively in kindergarten, junior kindergarten, and elementary grades. Victory Drill Book Worksheets are designed to be photocopied to provide a worksheet for each student. VDB Worksheet Book Cover Having trouble viewing book cover? > Download the latest Adobe PDF Viewer
<urn:uuid:034de8e9-f20e-475c-b4ce-fa9b052e981a>
CC-MAIN-2023-40
https://www.victorydrillbook.com/product/worksheets-activities/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510214.81/warc/CC-MAIN-20230926143354-20230926173354-00489.warc.gz
en
0.898159
207
2.796875
3
Beat High Blood Pressure By: Steven Stiefel More Health Lists Do this: Mix up a DIY salt substitute. Australian scientists determined that diluting regular salt with potassium salt and Epsom salt lowers arterial blood pressure by six points. Cooking with the concoction reduces overall sodium intake and boosts blood levels of potassium, a nutrient that naturally regulates blood pressure. Pour 65 percent table salt, 25 percent Morton Salt Substitute (potassium chloride), and 10 percent Epsom salt into a small bowl, mix well, and funnel into a saltshaker. You won't taste the difference. Not that: Skip the saltshaker altogether. You need some sodium in your diet to survive. (One recent study revealed that too little of the mineral can actually increase your risk of death by 37 percent.) Instead, focus on eliminating supersources of salt, such as processed foods. One frozen dinner can contain as much as 2,000 mg sodium, a cup of cottage cheese packs 918 mg, and a single slice of deli ham packs 240 mg.
<urn:uuid:efecf4b8-c63e-4e30-bf9c-c0945f6e093c>
CC-MAIN-2014-10
http://www.menshealth.com/mhlists/lower_blood_pressure/Salt.php
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394011249133/warc/CC-MAIN-20140305092049-00083-ip-10-183-142-35.ec2.internal.warc.gz
en
0.885982
214
2.609375
3
Orthodontics was formerly known as orthodontia. The first dentistry specialty was concerned with studies and the treatments of malocclusions. Orthodontics is due to tooth irregularity, jaw relationships which are disproportionate or maybe both at times. This kind of a treatment focuses only on dental displacement. It can also deal with the modification and control of one’s facial growth. In the case of facial growth, the term given to it or the definition is dentofacial orthopaedics’. The orthodontics treatment is done to improve the appearance of the patient’s teeth. Yet it is not always limited to this, sometimes it involves reconstructing the face. The method used for this kind of a treatment is the wires through braces. The wires are usually made of metal materials. They are inserted inside the brackets that are orthodontic brackets, made with stainless steel. Even aesthetic materials of ceramic can be used. Orthodontic treatment is a kind of a lifelong treatment though the digital labs have made the work much easier but once it is done, usually care needs to be taken throughout one’s life. The whole procedure involved a lot of human effort in the past but surely the new digital lab system has improved the conditions. Now, the work is done much faster and with lesser effort on the part of the doctor in terms of physical efforts. It is much easier and faster these days and many people go for it due to the modern method introduced. The patients first need to go through thorough check ups to know the right procedure to go in for. Once the right procedure is found, the treatment is started. It may take long to set it right, maybe a month in simple cases and a year or more in complicated cases. No matter what in both cases, initially for a long period the braces of orthodontics should be worn on a regular basis without fail. It does look embarrassing at times but the result after the prescribed times is worth the embarrassment. The patient needs to wear them for a year or more for a good setting so that the problem does not occur again. After the prescribed time, the patient is usually advised to wear them on a part time basis while at home or while they sleep at night. This would avoid future problems which surely are not that certain. Yet it is advised by doctors to at least try to wear them occasionally to avoid any other problem or gaps within the teeth again. Proper care is very much required. Orthodontics is surely a very old method in the field of dentistry and it is now becoming more technological with the modern equipments used and the degrees the dentists have along with their experience. It is best to approach the best or most referred dentist and take his advice for such a problem and treatment. A good dentist can make the whole orthodontics treatment a delight and faster. However, the advices need to be followed well and suitable medications should be taken if prescribed because at the end, it is treating the teeth which can make or break our smile.
<urn:uuid:c6a01e1d-3df9-47f6-af7a-76085242b81a>
CC-MAIN-2017-34
http://www.dental-treatment-guide.com/braces
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886102393.60/warc/CC-MAIN-20170816191044-20170816211044-00312.warc.gz
en
0.967768
636
3
3
Our sense of taste and smell are very closely linked. Problems with either of them can have a real impact, especially on the way we eat and drink. How can your taste and smell change after stroke? A stroke can affect your taste in a number of different ways, so you may: not be able to taste things as well as you did before, so flavours may not be as obvious or strong get a salty, bad or metallic taste in your mouth lose your sense of taste completely. If a stroke affects your sense of smell you may: not be able to smell things as well as you did before, so smells may not be as strong become oversensitive to smell, so that smells become really strong have a distorted sense of smell lose your sense of smell completely. Why does it happen? Your taste and smell can change because of damage to your brain. If the part of your brain that controls and receives information from your senses is affected by your stroke, then this can cause problems with your taste and/or smell. Other problems can also add to these changes. Although it can be difficult to maintain good oral hygiene when you’ve had a stroke, if your teeth and mouth aren’t clean and healthy this can affect your sense of taste. A virus or infection can also have an effect on your sense of taste and smell. Because there is so much to deal with after a stroke, it’s normal for your behaviour to change in some way. Why does behaviour change after a stroke? The way we behave often depends on the way we feel. So if your emotions change after stroke, then your behaviour is likely to change too. But it’s not just about the way we feel. Sometimes a stroke can also affect the way you respond to what’s going on around you. This can make you behave differently too. Other effects of stroke will also affect your behaviour. Tiredness can mean you’re less active or talkative, for example. Or frustration at not being able to do things for yourself can build up and make you aggressive towards others. In what ways can behaviour change? It’s difficult to see changes in yourself. So, if you’re acting differently your friends and family are probably going to be the ones to notice. These are some changes that other people may notice: you get cross or annoyed very quickly you’re more stressed, angry or aggressive you’ve become withdrawn and don’t talk very much you don’t show any interest in the things you used to enjoy you make decisions without considering what will happen afterwards you’re less inhibited, which can make you more out spoken or seem self-centred and can also change your sexual behaviour. People may tell you that your personality has changed or that you’ve ‘become a different person’, which can be upsetting. However, what they’re really noticing are changes to your behaviour, not who you are as a person – a stroke can’t change this.
<urn:uuid:bebda38c-aa65-409d-8db5-b669dc7af4be>
CC-MAIN-2017-34
https://physioaround.wordpress.com/page/2/
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886109470.15/warc/CC-MAIN-20170821172333-20170821192333-00033.warc.gz
en
0.960215
652
2.9375
3
Boreal forests are one of the largest biomes on Earth and of considerable global importance in regulating climate and carbon storage. Boreal regions have experienced considerable warming and have been considered a potential tipping element of the Earth system with further climate change. This project therefore aims to increase crucial knowledge about the response of boreal forests to these changing conditions and their potential feedbacks with future climate change. It is likely that such responses will first be observable at or near the distribution boundary of boreal tree species. Here, altered growing conditions and disturbance regimes may lead to expanding or contracting species ranges. We attempt to explore these changes by observing continental-scale boreal tree cover along the southern and northern distribution boundaries using remote sensing products. In a next step, the response of regional boreal forests along the forest-tundra ecotone in Norway will be assessed through field and remotely sensed data. The aim is to identify the drivers of forest recovery following insect outbreaks. Lastly, we will assess the relationship between insect-induced tree mortality and associated changes in albedo. These changes have implications for regional climate within the forest-tundra ecotone. We provide a disciplinary and multidisciplinary research programme aimed at advanced understanding of environmental problems and advanced training of PhD candidates in this field.
<urn:uuid:e003b648-fdc3-49be-8b9c-85da86a7f750>
CC-MAIN-2023-14
https://sense.nl/research/climate-change-and-boreal-forest-resilience/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945433.92/warc/CC-MAIN-20230326044821-20230326074821-00216.warc.gz
en
0.932468
264
3.09375
3
Maven is a popular tool used for building, managing, and deploying Java projects. It is widely used in the software development industry and is considered a standard tool for Java projects. In this article, we will discuss how to install Maven in Mac using Brew with code examples. Brew is a package manager for Mac that simplifies the installation and management of software packages. It is similar to Linux's package managers such as apt and yum. To install Maven, we will use Brew. Step 1: Install Brew If you do not have Brew installed on your Mac, you can install it by opening the terminal and running the following command: /bin/bash -c "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/master/install.sh)" This command will download and install Brew on your Mac. Step 2: Install Maven Once you have Brew installed, you can use it to install Maven. Open the terminal and run the following command: brew install maven This command will download and install Maven on your Mac. It may take a few minutes to complete the installation process depending on your internet speed and system resources. Step 3: Verify the Installation After the installation process is complete, you can verify that Maven is installed by running the following command in your terminal: This command will display the current version of Maven that is installed on your Mac. If you see the version information, it means that Maven is successfully installed on your Mac. Code Example: Build a Maven Project Now that Maven is installed on your Mac, you can use it to build your Java projects. Here is an example of how to build a Maven project: Step 1: Create a Maven Project Open the terminal and navigate to the directory where you want to create your Maven project. Run the following command to create a new Maven project: mvn archetype:generate -DgroupId=com.example -DartifactId=my-project -DarchetypeArtifactId=maven-archetype-quickstart -DinteractiveMode=false This command will create a new Maven project with the group ID "com.example" and artifact ID "my-project". It uses the Maven Quickstart archetype to generate a basic Maven project structure. Step 2: Build the Maven Project Navigate to the directory where your Maven project is located. Run the following command to build your Maven project: This command will compile your Java code, run tests, and package your application into a jar file. The jar file will be located in the target directory of your Maven project. Step 3: Run the Maven Project To run your Maven project, navigate to the target directory of your project and run the following command: java -cp my-project-1.0-SNAPSHOT.jar com.example.App This command will run the main class of your application that is located in the com.example package. It will print "Hello World!" to the console. In this article, we discussed how to install Maven in Mac using Brew. We also provided a code example of how to build and run a Maven project. With Maven, you can easily manage your Java projects and streamline the build and deployment process. I would be happy to expand on the previous topics. Which topics would you like me to cover in more detail? Can you please provide some more information? Sure! Here are 5 frequently asked questions about installing Maven in Mac using Brew along with their answers: Q1: What are the system requirements for installing Maven with Brew on Mac? A: To install Maven with Brew on Mac, you need Mac OS X 10.10 Yosemite or higher. You also need to have the Xcode command line tools installed. If you don't have the Xcode command line tools installed on your Mac, you can install them by running the following command in your terminal: Q2: How can you update Maven to the latest version using Brew on Mac? A: You can update Maven to the latest version using Brew on Mac by running the following command in your terminal: brew upgrade maven This command will upgrade Maven to the latest version available in the Brew repository. Q3: Can you install a specific version of Maven using Brew on Mac? A: Yes, you can install a specific version of Maven using Brew on Mac by specifying the version number in the installation command. For example, if you want to install version 3.6.3 of Maven, you can run the following command in your terminal: brew install [email protected] Q4: How can you uninstall Maven installed with Brew on Mac? A: You can uninstall Maven installed with Brew on Mac by running the following command in your terminal: brew uninstall maven This command will completely remove Maven and all its related files from your Mac. Q5: Can you use Maven to build non-Java projects on Mac? A: Yes, Maven can be used to build non-Java projects on Mac as well. Maven supports the building of projects in other languages such as C#, Ruby, and Scala, among others. You need to use the appropriate Maven plugins for building non-Java projects.
<urn:uuid:f3ba752c-f762-4422-962c-6308f714949c>
CC-MAIN-2023-40
https://kl1p.com/instal-maven-in-mac-brew-with-code-examples/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510326.82/warc/CC-MAIN-20230927203115-20230927233115-00394.warc.gz
en
0.878915
1,161
2.5625
3
|Botanical Name||Quercus robur| |Common Name||English oak| |Location||Byes, Gilchrist's Field| |Notes||The quintessential tree of England, even the National Trust has it as its emblem. Planted over centuries for their timber which was used for ship building and house frames. Oaks support more other species, insects, birds, mammals and fungi, than any other UK tree. | This large tree sits on an old hedge bank and is about 400 years old. More about English Oak if you click here.
<urn:uuid:d474c8d0-84cd-4ea2-86ea-7e4405bf80c6>
CC-MAIN-2020-34
http://sidmoutharboretum.org.uk/tree_details.php?tree_id=TREE00000023
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738892.21/warc/CC-MAIN-20200812112531-20200812142531-00458.warc.gz
en
0.865704
117
2.828125
3
Endangered Species Monday: Bombus occidentalis “1/3 bites of food we eat comes from a plant that was pollinated by a bee” What are we humans doing to Planet Earth?, We are destroying so many pollinating animals, that soon they’ll be none left. When or if that day occurs, when there are no more pollinators, we ourselves will be fighting to stay alive, can you imagine that? Human extinction is slowly in the making… …No matter how many vegans or vegetarians there are, we all require plants. No plants = No life! That’s a Scientific Fact of Life! Dr Jose Depre This Monday’s Endangered Species Post (E.S.P) I document on the Western Bumble Bee. Scientifically identified as Bombus occidentalis this particular species of bee is listed as (vulnerable), and is now nearing complete extinction within the wild, despite conservation efforts aimed at reducing dangers, things certainly are not looking good for the bee, or crops the species pollinates either. Image credits: Rich Hatfield The species was identified back in 1858 by Dr Edward Lee Greene, Ph.D, (August 10, 1843 – November 10, 1915) was an American botanist known for his numerous publications including the two-part Landmarks of Botanical History and the naming or redescribing of over 4,400 species of plants in the American West. Endemic to: Canada (Alberta, British Columbia, Northwest Territories, Saskatchewan, Yukon); United States (Alaska, Arizona, California, Colorado, Idaho, Montana, Nebraska, Nevada, New Mexico, Oregon, South Dakota, Utah, Washington, and Wyoming). To date we still don’t know what the “exact current rate of decline is”, or even if the Western Bumble Bee is going to be with us within the next decade. Its ‘likely that based on current surveys the species will be extinct within the next 10 years (max)”. Since 2008-2014 there has been quite a significant rate of decline st 11%-12%, sparking concerns that the Western Bumble Bee ‘may eventually be listed as critically endangered’ within the United States and Canada. Scientists confirmed that in one area which is [unknown], possibly the United States via field surveys the species was not found during the years of 2003-2007 (which is of course quite concerning), especially when the species is a major pollinator, and has been seen only in very low numbers at (one to seven per year) each year from 2008 to 2014. A study conducted focusing on ‘range decline’ relating to some eight separate species native to the United States, showed that the Western Bumble Bee species alone had decreased in population size within its (range), by some 28% (EST) between the years of 2007-2008. A further study conducted by conservation scientists concluded that by 2007-2009 surveys detected the species only throughout the Intermountain West and Rocky Mountains; it was largely absent from the western portion of its range. Further declines have been reported within the [US] states’ of Oregon and Washington, however populations seem to be somewhat stable within (northeastern Oregon). Populations are also to a degree stable within Alaska and the Yukon. Average decline for this species was calculated by averaging the change in abundance, persistence, and EOO. - Current range size is estimated to be at some 77.96% - Persistence in current range relative to historic occupancy: 72.56% - Current relative abundance relative to historic values: 28.51% - Average decline: 40.32% From viewing all data records I can confirm that the (exact rate of decline) within the species range, and its persistence total some 20%, with a 70% rate of decline in ‘abundance’. Surveys have also proven the this decades rate of decline is bar far lower than the last decades, which again raises some rather large concerns about a near future extinction occurring. Image: Western Bumble Bees’ extant zones. In the past, B. occidentalis was commercially reared for pollination of greenhouse tomatoes and other crops in North America. Commercial rearing of this species began in 1992, with two origins. Some colonies were produced in rearing facilities in California by a company which imported the technology for rearing bumble bees and applied it to rearing B. occidentalis locally in California. This same year, a distributor for a competitor which did not have rearing facilities in North America at the time was granted permits by the US Department of Agriculture – Animal and Plant Health Inspection Service (USDA-APHIS) for a three year window of time (1992-1994) to export queens of B. occidentalis and B. impatiens to European rearing facilities for colony production. Following rearing, these colonies were then shipped back to the U.S. for commercial pollination. In 1997, commercial producers began experiencing problems with disease (Nosema) in the production of B. occidentalis. Eventually, the availability of B. occidentalis became critically low, and western crop producers who had become dependent on pollination provided by this species began requesting that APHIS allow the shipment and use of B. impatiens in western states. In 1998, the USDA-APHIS issued permits to allow B. impatiens to be used in the western U.S. However, within a few years, the USDA-APHIS stopped regulating the interstate movement of bumble bees altogether, citing their lack of regulatory authority. Bombus occidentalis is no longer bred and sold commercially and B. impatiens is used widely in the western U.S. One has to wonder though that since the the US Government stopped granting permits for Bombus occidentalis mostly due to species decline, primarily due to human ignorance, will the same rate of decline now be seen with the species B. impatiens? Currently to date the only ‘known conservation actions that are under way is that of management, research and surveys’, meanwhile its likely that come the next decade we’ll have lost the species due to a lack of improving/increasing populations, and habitat while failing to decrease disease and virus. Populations of this declining species have been associated with higher levels of the microsporidian Nosema bombi and reduced genetic diversity relative to populations of co-occurring stable species. The major decline of the subgenus Bombus was first documented in B. occidentalis, as Nosema nearly wiped out commercial hives, leading to the cessation of commercial production of this species. Wild populations crashed simultaneously and the closely related B. franklini has been pushed to the brink of extinction. However, Koch and Strange (2012) found high levels of infestation by Nosema in interior Alaska where this bumble bee was still quite common. In addition to disease, this species is faced with numerous other stressors including habitat loss and alteration due to agricultural intensification, urban development, conifer encroachment (resulting from fire suppression), grazing, logging and climate change. Modifications to bumble bee habitat from over grazing by livestock can be particularly harmful to bumble bees by removing floral resources, especially during the mid-summer period when flowers may already be scarce. In addition, livestock may trample nesting and overwintering sites, or disrupt rodent populations, which can indirectly harm bumble bees. Indirect effects of logging (such as increased siltation in runoff) and recreation (such as off-road vehicle use) also have the potential to alter meadow ecosystems and disrupt B. occidentalis habitat. Additional habitat alterations, such as conifer encroachment resulting from fire suppression, fire, agricultural intensification, urban development, and climate change may also threaten B. occidentalis. Insecticides, which are designed to kill insects directly, and herbicides, which can remove floral resources, both pose serious threats to bumble bees. Of particular concern are neonicotinoids, a class of systemic insecticides whose toxins are extraordinarily persistent, are expressed in the nectar and pollen of plants (and therefore are actively collected by bumble bees), and exert both lethal and sublethal effects on bumble bees. Since B. occidentalis has recently undergone a dramatic decline in range and relative abundance, reduced genetic diversity and other genetic factors make this species especially vulnerable to extinction, and may lead to increased pathogen susceptibility. Recent research indicates that populations of B. occidentalis have lower genetic diversity compared to populations of co-occurring stable species. It is therefore regrettable, that despite research, management and surveys – extinction is imminent, when though, we simply don’t know, however when it does happen, it means that yet another pollinator that we humans and animals depend on will be gone for good. Image: Female B. occidentalis Humans will never learn or understand just how critically important our wildlife is, until its gone. They’ll then be fighting over themselves, fighting to stay alive. By that time, human extinction will already be in the process. Dr Jose C. Depre Chief Environmental & Botanical Officer. Follow me on Twitter here: https://twitter.com/josedepre11 VEGAN COSTA RICAN STUFFED TORTILLA Staying on track with our month long South American vegan and vegetarian Monday’s and Friday’s, we bring to you a beautiful Costa Rican Stuffed Vegan Tortilla. Every week we host a vegan Monday and Friday day for anyone to try. While we understand that most vegans believe (everyday should be a vegan day), its really not that simple. Many people may not want to go vegan, and those that are trying their hardest may not want to go all the way. However if we can lose them two days; I.e Monday and Friday where no meat or dairy is consumed, then we believe we’re onto a winning track, and you never know, encouragement, education and awareness may eventually lead a consumer to adopt more days. We can only try, and one thing we’ll not practice, or even encourage is pushing our beliefs or diets (or others) down other peoples throats. That’s just wrong, furthermore market research has shown that when companies consistently push their foods or beliefs onto others obsessively. The consumer, or general Joe in the short run continues their own way of doing things, meanwhile ignoring the big brands, markets or pushy salesperson. Invite the friends, and family around this Friday, spread the word, and lets make Friday a no meat and dairy day for all, one day, that’s all it is. Monday makes two days. There you go, you are on the road to at least trying, and we for one welcome that and take our hats off to you for at least trying 1 lb left-over / fresh vegetables, cooked and shredded (optional) salt & pepper (low salt) 20 corn tortillas (check for any type of palm oil) hot pickled banana peppers 2 cups cabbage, shredded 1 cup diced tomato 3 tablespoons fresh coriander, chopped 2 teaspoons lemon juice, fresh 2 teaspoons olive oil (check for palm oil) salt & pepper (reduced salt) Mix all the ingredients together (cabbage, tomato, coriander, salt, pepper, and olive oil). Make this slaw just before serving the tortillas. Place a tablespoon of the shredded vegetables on a warm tortilla, top with the cabbage salad. Top with as many hot peppers as you like. Roll up & Serve, with or without the shredded vegetables. Hey, don’t forget to follow our >Vegan and Vegetarian Recipe Online Book on Facebook< ENJOY AND HAVE A NICE DAY.. CHECK THE VIDEO OUT BELOW FOR MORE WONDERFUL IDEAS AND RECIPES. Dr Jose C. Depre Environmental & Botanical Scientist. VEGAN FRIDAY: Central America | Brazil | Brazlilian Vegetable Curry With Spicy Tomato and Coconut Sauce Brazlilian Vegetable Curry With Spicy Tomato and Coconut Sauce Brazilian Vegetable Curry with Spicy Tomato and Coconut Sauce can be served with rice, and/or large flat breads for guests or the family to tear-and-share. Furthermore you can also once cooked (freeze the leftovers or the entire cooked meal), for another day. We [strictly advise], that if you reheat rice please do so properly, and always ensure that your rice is reheated only once, and is [piping hot]. If unsure we [highly recommend that you DO NOT reheat rice, but reopen and start a fresh bag of rice]. Rice can be [very dangerous to ones health] if not reheated properly, or if the rice is spoiled then reheated. Those of you that hate tomatoes as I do, can swap the tomatoes and replace them with black beans as seen within the image (above). RECIPE AND INSTRUCTIONS 1 butternut squash, peeled and 2 cm dice 2 red onions, roughly chopped 1 aubergine, chopped 2 red peppers, diced 1 (400 g) can chickpeas 2 garlic cloves, crushed 1/2 inch ginger-root, chopped 1 red chili, de-seeded and chopped 400 g chopped tomatoes 200 ml coconut cream 4 tablespoons chopped fresh coriander 3 tablespoons olive oil [PALM OIL FREE] Toss veg in a roasting tin with 2 tbsp of the the oil. Roast at 200C for 40 minutes. Meanwhile begin making the sauce. Put the chili, garlic, ginger and onion in a food processor and process to a rough paste. Heat the remaining oil and fry the onion paste until the onions have softened. Add the tomatoes and simmer for 10 minutes. Add the coconut cream and and cook for another 5 mins, if the sauce becomes too thick, thin with a little water, leave to one side until the veg is ready. When the veg is ready add the veg and the chickpeas to the sauce and heat through. DONE. (SERVE AS IT IS, OR ON A BED OF STEAMED or FRIED PLAIN RICE)… Simple. From the United Kingdom, to Europe, Africa, and on to Central America. Vegan and vegetarian recipes come in all sorts, shapes and delicacies. We (I.A.R.F) believe its pivotal to cater for all, ensuring that we document not only in a multitude of mixed foreign languages for all to read, but to share local, and international vegan and veggie recipes too. This month is CENTRAL AMERICAN vegan and veggie delights, starting from Brazil, a fine county that I have visited so many times now I am addicted. Fine wine, fine food, people and delicacies. Please share, and don’t forget to > follow our vegan and vegetarian page hereto on Facebook < Dr Jose C. Depre. This recipe is not my own, however I do highly recommend to anyone that is suffering from constipation, lacking vitamins, suppressed immune system, or is suffering from common cold/influenza type symptoms to try. Chinese Potato Pancake Since 2014 we have been running our vegan and vegetarian (Monday’s and Friday Recipe sharing posts). We run these posts every Monday and Friday and not every day as we don’t believe in pushing such diets, cultures, or way of eating down the general public’s throat. We also believe its the best option for any would-be starter planning on going vegan or vegetarian. If everyone gave up meat once a week, and then consumed their normal diet during the remainder of the days, it does indeed have a big impact (on you and the planet around us). Once you’ve tried Monday, you may then want to try a non-meat or dairy day on Friday. There is no such thing as can’t, give it a try, one day a week, if you like it then try Friday. And if you just don’t like it full stop – then simply stop. We’re not going to moan, shout, scream, bully, make you feel guilty, or show you horrific and graphic images of “dead and diseased slaughterhouse animals”, simply because you don’t want to take the vegan or veggie plan up. That’s just crazy, and bullying, furthermore pressuring someone into doing something that they do not want to do, has shown in market and sociology research that the individual is likely to never return again (should they have that little inkling they may want to give it a try in the future). You are not at liberty whatsoever to view anyone the recipes hereto, or even on our Facebook vegan and vegetarian page here Think of it like giving up smoking, one gradually reduces day by day, your body becomes used to the gradual withdrawal and eventually if you like it, you move away from the habit, or in this case from meat and dairy products full stop. (Please note that eating meat or consuming dairy is not a habit either) and we’re not under any circumstances going to block you, de-friend you, hate you, or anything other (because you are no different to us). We see that behavior as a little “extreme” if not bordering food/diet racism. We don’t do racism, nor hate. And if you a vegan or veggie behaving in this way >> doors that way, we’ve not time for that nonsense and extreme behavior. Hence why we’ll continue these meat and dairy free Monday’s and Fridays every week aimed at over 7.9 million supporters internationally on all our platforms worldwide. We will share, copy or include our own recipes. If you have your very own recipe then please feel free to share that with us via contacting the organisation below. Its your body, and your world, do as you see fit, and what you feel suits you. Ingredients and Instructions Use a slice to shape the pancake so that they can be uniform in thickness. At the first part of frying, use medium fire so that the pancake can form quickly and then remember to slow your fire, otherwise the pancake might be burnt easily. 2 middle size potato, shredded 1/2 cup of starch (I use sweet potato starch) 1/2 teaspoon salt or as needed 1 pinch of ground black pepper powder 1 teaspoon Chinese five spice powder Around 1/2 tablespoon vegetable oil 1 tablespoon Hunan Chopped chili sauce 1 teaspoon light soy sauce 1 tablespoon boiled water or stock 1/2 teaspoon sesame oil Peel the potatoes and cut into thin shreds. You may use a shredding tool. Try to make them similar in size so the cooking time can be similar too. In a large bowl, add salt, ground black pepper powder, five spice powder and starch. Mix well and set aside for around 5 minutes. Brush some oil in a pan, fry one side of the pancake over medium fire for around 1 to 2 minutes until shaped and slightly brown. Turn it over and continue frying the second side. Then slow down your fire and turn over the pancake several times to fry the two sides until crispy and brown. Serve directly or with the dips you want.It can be matched with sweet chili sauce or tomato sauce. Decide your dipping sauce firstly and adjust the salt accordingly. For more recipes check this amazing site out here: http://www.chinasichuanfood.com/ (credited) “HAVE A NICE DAY” Sharks are one of a kind of Chondrichthyes that have swam the planets oceans for millions of years dating back to the prehistoric realms of the dinosaurs, living through the ice ages, colossal seismic activity that saw many millions of oceanic species wiped out. The shark though a silent stalker and predator remained unscathed. They were not in any real danger to of traditional Chinese medicine demand or pollution and swam within the oceans with little if any predators, sadly this is hastily no longer factual and the entire species of sharks are being wiped out for a “soup” or medicine used frequently within the Asian medicine market just for tongue and texture. The species of Shark are not mammalians they are classed as Chordates which is the only unique species of their type separating them from mammals, Chordate are deuterostome animals possessing a notochord, a hollow dorsal nerve cord, pharyngeal slits, an endostyle, and a post-anal tail for at least some period of their life cycles that then develop into the species of which the Deoxyribonucleic acid is programmed to make them into. Being relatively blind they are agile swimmers yet superb deep sea divers that can smell through an array of senses a drop of blood in the ocean from half way around the world which scientifically is factual although they cannot exactly home in on this being some thousands of miles away there smell is unique from any other form of fish, human or other mammal predator. The shark noses use ‘smell stereo’ to detect tiny delays no more than half a second long in the time that odours take’s to reach one nostril compared to the other one and that truly is amazing. All species including the deep sea sharks use a combination of directional cues based on scent and the flow of water – to keep them orientated and find what they are searching for. So the theory that they are human eating man eaters which coincidentally is what the Asians believe hence why they like to consume as well parts the Panthera tigris as in their fake book of counterfeit medicine it states the shark “is a beast and man eater with much energy” that should they consume the shark it will make them a fiery hunter in bed. Its utter nonsense, scientifically untrue, and fairy land tails. If the delay between the scent reaching one nostril and the other is between a tenth and half a second, the sharks turn their heads to the side where they first smelled the bleeding or anxiously suffering prey such as the squid one of the sharks favorite foods. If a shark experiences no delay in scent detection or a delay that lasts too long a full second or more they are just as likely to make a left-hand turn as they are to make a right, which makes them rather interesting and a species we must all PROTECT”. The popular notion that sharks and other animals follow scent trails based on differences in the concentration of odour molecules hitting one nostril versus the other are based on 2010 scientific analyses. It seems that theory doesn’t hold water when one considers the physics of the problem. Most creatures come equipped with two odour sensors – nostrils or antennae, for example – and it has long been believed that they compare the concentration at each sensor and then turn towards the side receiving the strongest signal. ‘But when odours are dispersed by flowing air or water, this dispersal is incredibly chaotic.’ This recent research on sharks predatory hunting behaviour living has led to findings that has also lead to underwater robots that are better equipped to find the source of chemical leaks, like the oil spill that plagued the Gulf Coast in 2010, 2012 has already seen this research placed to use in many “deep-sea” submersibles now actually using this research to develop state of the technological maritime breakthroughs that have seen many documentaries recorded and sea bed chemical leaks from pipes that are not that easily traceable by other older technologies that can break down at the blink of an eye lid. Previous robotic submersibles were programmed to track odours by comparing odour concentrations, and they failed to function as well or as quickly as live animals. The oil spill in the Gulf of Mexico, and main oil slick was easily visible and the primary sources were easy to locate, smaller sources of Odour-guided robots are an asset for these types of situations with great thanks to the sharks. The smell organs in the noses of some sharks are able to detect one droplet of blood in one million drops of sea water. They are often attracted to chemicals found in the guts of animals and loiter near sewage outlets so this great research has helped many in the maritime industrial. Sharks have swam the oceans as far back as we can tell for about 400-500 million years of which there was an estimated 480 species that belong to the subclass of Elasmobranchii, which is in non-scientific jargon cartilaginous fish such as rays which makes them quite different from normal species of fish such are whales that are a sub class of Eutheria distinguished from noneutherians by various features of the feet, ankles, jaws and teeth. One of the major differences between placental and nonplacental eutherians is that placentals lack epipubic bones although fish don’t have feet, some species that moved from land to waters thousands of years ago have then later evolved in to this “subclass” which the shark species are a subclass of their own from what we know of million year old fossil investigations through archaeology. Most sharks such as the Carcharodon carcharias, Galeocerdo cuvier, to the Sphyrna lewini are classed as “apex hunters” which basically means they are at the top of the human food chain, they are feared by ourselves even though attacks are rare and just to give you an example of shark attacks verse the bathroom toilet. Shark attacks for 2011 where 75 global shark attacks, a number closely matching the decade average and the number for 2012 was from what I located to be 62 although that is still to be confirmed surfers and others involved in board sports took the brunt of the attacks, accounting for 60 per cent of unprovoked shark attacks, swimmers 35 percent and divers about 5 per cent. However the bathroom toilet is quite amusingly odd in 1945, the German submarine U-1206 was sunk after the toilet malfunctioned, and a crewman’s botched repair forced them to the surface killing all on board. King Wenceslaus III of Bohemia was murdered with a spear while sitting in the garderobe (toilet) on August 4, 1306. George II of Great Britain died on the toilet on October 25, 1760 from an aortic dissection. According to Horace Walpole’s memoirs, King George “rose as usual at six, and drank his chocolate for all his actions were invariably methodic. A quarter after seven he went into a little closet. His German valet de chambre in waiting heard a noise, and running in, found the King dead on the floor.” In falling he had cut his face. Bathing and showering appear to be particularly dangerous. Overall, about two-thirds of accidental injuries happen in the bathtub or shower — which makes sense, because each can become slippery. But many injuries involve the toilet: standing up, sitting down, or using it. (Yes, about 9% of the total injuries were from overexertion.) Still believe that shark attacks are common and they are “aggressive out of control people eaters” ridiculously untrue please read on. Overall, mishaps near the bathtub, shower, toilet and sink caused an estimated 234,094 nonfatal injuries in the U.S. in 2008 among people at least 15 years old, the Centres for Disease Control and Prevention reported online in its weekly Morbidity and Mortality Weekly Report. And the injury rate rises with age. Researchers used emergency room data on accidental, nonfatal injuries and some statistical number crunching to reach their conclusions. Their report is full of statistics (which makes it good bathroom reading, if you have 15 minutes and an Internet connection) on the slips, sprains, contusions, fractures and concussions that can happen in the bathroom, to even death. - About 81% of the injuries were caused by falls (from the bathroom toilet) - Women were more likely to be hurt than men - Two-thirds of all injuries occurred in the tub or shower, though only 2.2% occurred while getting into the shower or tub - Overall, only 1% of accidental nonfatal injuries occurred in the bathroom, but for those 65 and older, 2.5% occurred in the bathroom. The report can be located here http://www.cdc.gov/mmwr/preview/mmwrhtml/mm6022a1.htm?s_cid=mm6022a1_w how prevailing and odd but very true, so the next time someone states to you that sharks are people eaters and aggressive please remember when you go to the bathroom that your actually “risking your life” Shark attacks though are very unheard of however the reason why they are classed as man eating killing machines is because the press adore to give them a rather bad name. Such as “GREAT WHITE TORE MAN’S LEG OF” I suppose the headlines “MAN FELL FROM TOILET SEAT AND DIED” just don’t make GREAT reading which is why the press love to make such a mountain out of a molehill over something that could actually be a probing nip which is what a shark will do before “any such attack” takes place. http://mauinow.com/2011/06/07/study-details-hunting-behavior-of-tiger-sharks/ http://www.livescience.com/12783-shark-attacks-hit-10-year-high.html shark attacks on humans only hit a ten year high from recent accident and emergency reports gained from”2011” from all global hospitals. Extraction from the report states; “Scientists investigated 115 alleged incidents of struggles between humans and sharks worldwide in 2010. They confirmed that 79 of these were unprovoked shark attacks on live humans”. “Unprovoked attacks are ones that occurred with the predators in their natural habitats without human instigation. The other 36 incidents included 22 provoked attacks — such as assaults after divers grabbed sharks — including three cases of sharks biting boats, four incidents dismissed as non-shark attacks, five scavenging incidents of human corpses and two cases where there was not enough information to determine if an unprovoked shark attack had occurred”. Please read the report as it gives scientific reasoning as to why they have attacked more within the 365 day period. http://dsc.discovery.com/sharks/why-do-sharks-attack.html What does all this have to do with sharks and the species under threat though? Good question as most of this does as of lack of awareness, the fright factor, and then of course traditional Chinese medicine the NUMBER ONE REASON. There are MORE attacks on sharks than there are on any other species of fish, and now we need to start taking note of this as we are losing these amazing species rapidly due to counterfeit Asian pharmaceuticals and the disgustingly tasting shark fin soup. I have always been a firm lover of wild and “predatory dangerous” animals such as mammals from the big lion to Tiger’s, reptilians from Python to Crocodile, and marine aquatic species mainly the shark. In 2010 I traveled to Shenzhena bustling rather smog filled sky scraped city that had many restaurants and street quick food fixes mainly selling animal parts to eat of which shark fin was on the menu. Thousands of Sharks lay dead in a Singapore fishmongers. Within central China it is said by many, and even activists that the sharks are only craved for, for their fins. This is untrue and this picture was taken three days ago in Singapore’s market. The market sells the shark meat and the fins for major profit making Singapore one of the richest Asian islands in the world. Being a firm lover of sharks and great studier of the species I wanted to see what all the fuss was about and why sharks where being wrenched out of the water like candy from a baby then de-finned and thrown back to the seabed from which they died a slow agonising death from asphyxiation. Being a vegan for thirty years I really couldn’t care at that point as the main objectives was to try this dish to see if this was indeed a great reason why it is used in Asian medicine, to try and ascertain why one of my favorite species of animals was being slaughtered, The soup smelt repulsively strong and acidic, and when tasting it without almost vomiting, one can only explain that even with a sprinkle of chive that entire first spoon and that being the last, tasted revolting, and more like hot water with the odd lump of shredded fish cuisine within. Oh yes I forgot the tender informed me that it would make me fit and strong even though I already was in 2010 being a healthy vegan for over 30 years. DISGUSTING AND BLOODY CRUEL – THIS IS ONE RESTAURANT THAT NEEDS BOYCOTTING The soup did nothing, and there was no magical dragon like hallucinogenic that gave me the power of a thousand men. “Shark fin soup does not under any circumstances improve erectile dysfunction (not that I tried), enhance muscle power, to even warding of any diseases/illness that I actually picked up from visiting the shite hole city of smog and environmental pollution, it does nothing and has no proven health qualities at all. The one spoon fall of fowl tasting crap was enough to show to me that one of the most majestic creatures on earth was being slain for “monetary gain” and not any magical belief. Utterly unbelievable. Chinese Shark Fin soup is a “luxury” food served (mainly) at banquets, weddings, parties and cultural masses, however it’s killing the species of and rapidly. The Chinese claim “The shark fins provide texture while the taste comes from the other soup ingredients. The soup originated centuries ago during the Ming Dynasty. However demand for the soup has increased as income levels of Chinese communities worldwide have risen. International concerns over the sustainability and welfare of sharks have impacted consumption and availability of the soup. So because the Asian consumers require “texture” to their soup then sharks have to be slaughtered in their thousands. There is such thing as we croutons or (toasted bread) that add more texture to this pile of watered down crap which contains one of my favorite animals. It is estimated that 100 to 200 million sharks annually are killed for their fins alone that’s seen many species now pushed to the brink of extinction and just to give an insight of how bad a problem this is please view the link http://www.foxnews.com/world/2013/01/04/hong-kong-traders-dry-thousands-shark-fins-on-roofs-to-avoid-scrutiny/ Sharks that are caught and their fins cut off are not always dead when their bodies are thrown back into the sea. Without its fins the shark simply sinks to the bottom of the ocean where it dies. Such a horrible death for such a magnificent creature and diet, the whole entire practice is unethical, environmentally damaging and will cause havoc in the biodiversity predatory hunting circle if we lose our species of sharks. Shark fins, once they are harvested, are then dried to be sold in markets to individuals and restaurants to be made into shark fin soup and sold to the public (especially tourists) for as much as $350 per bowl! The shark fins don’t even add any flavor to the soup. Chicken or pork are used to flavor, the fins are for texture only. The shark fin soup industry uses a wide variety of relatively large sharks. The majority of these sharks are now under threat. They are slow to mature and breed sharks give birth to a few live young or lay a small number of large eggs depending on species, rather than produce thousands of eggs at a time in the manner of many bony fish. Large sharks also do not mature until they are several years old. These characteristics mean that shark populations cannot support high levels of exploitation = nearing extinction to species vaporisation for a bowl of lousy fowl tasting soup. The order Lamniformes includes some of the best-known and biggest sharks. Among them are the great white shark, the basking shark and the thresher sharks. All these species are targeted for their fins, and all are either endangered or vulnerable. The great white shark, for example, might be the most feared species of shark, especially after starring in the ’70s thriller “Jaws.” However, they are more threatened by humans than humans are by them. Carcharhiniformes is another order boasting well-known sharks, such as the bizarre looking hammerheads, whose fins command high prices. The order also includes the family of requiem sharks. These are sharks are your typical sharks, with streamlined bodies and sharp teeth. Tiger sharks, bull sharks and the spinner sharks, which jump out of the water, are all requiem sharks, and they are all taken for their fins. The order Squaliformes includes all the sharks known as dogfish, the bramble sharks and the rough sharks. They are generally small, benthic, seabed-dwelling sharks that lay eggs and reproduce relatively quickly. Their fins are not of much value, although these animals are often targeted for their meat. The tails of some species of dogfish are used for cheap versions of shark fin soup. Of the five remaining orders of sharks, carpet sharks, bullhead sharks, angel sharks, frilled sharks and saw sharks, few species are used for shark fin soup. They are mostly small sharks, with small or undesirable fins, and they are not valuable in the shark fin market. Some species, notably the critically endangered angel sharks and the whale shark — a species of carpet shark and the largest fish in the world — are targeted for their meat or oil, but not the fins. If we don’t take urgent notice now and demand that CITES Convention on International Trade in Endangered Species of Wild Fauna and Flora take more action and demand that law enforcement cease this repulsive and degrading trade then we will see an ocean without any sharks that will unfortunately create a massive aquatic biodiversity nightmare in the aquatic hunting food chain. Sharks eat many prey, these prey need to be naturally controlled to preserve OTHER species of smaller aquatic marine fish, and should the shark numbers carry on dwindling at massive proportions then we are heading for a global catastrophe. PLEASE DEMAND CITES TAKES MORE ACTION NOW BEFORE MARCH OF THE FOLLOWING SPECIES LISTED ABOVE AND BELOW. Hammer Head Shark PLEASE CONTACT / DEMONSTRATE / PETITION / – 33 DAYS LEFT BEFORE COP 16TH MEETING CONVENTION ON INTERNATIONAL TRADE IN ENDANGERED SPECIES OF WILD FAUNA AND FLORA; International Environment House 11 Chemin des Anémones CH-1219 Châtelaine, Geneva Email: [email protected] (email them hard to get a response) CONTACT IUCN (International Union for Conservation Nature) IUCN Conservation Centre Rue Mauverney 28 1196, Gland, Switzerland Opening hours: 8:00 to 17:30 Monday to Friday (except Swiss public holidays). Phone: +41 (22) 999-0000 Fax: +41 (22) 999-0002 Dr J C Dimetri V.M.D, B.E.S, Ma, PhD , MEnvSc Please support our fundraiser for Benue http://fnd.us/c/3PFe2 Kami ingin mengingatkan orang-orang yang mengirimkan pesan yang tidak diinginkan bahwa situs Anda akan menutup jika Anda tidak berhenti. We wish to remind all that visit that should you spam “your sites and the server sending to individual registering shall be reported with IP shut down regardless of whom you are” we take spamming seriously and we advise you to cease now. CHINA STATED IN 2010 AND 2011 THAT THEY WHERE GOING TO BAN CIRCUSES AND THE DOG AND CAT MEAT TRADE (LIES) ANOTHER ASIAN GOVERNMENTAL LIE – MEDIA FALL FOR THEIR LIES – CHINA CANNOT EVEN REMOVE THE RHINOCEROS HORN OR IVORY THIS VIDEO BELOW IS JUST A PRIME EXAMPLE TO SHUT ACTIVISTS UP – THEY WILL CARRY ON AND STILL IMPORT.. 11 months ago CNN stated that China was going to ban SHARK FINS – What China meant was (they where going to hide them from activists which is a common lie from Asia) video taken over three ago.. How coincidental.
<urn:uuid:58b12b5f-53e8-4122-820d-66c3bd655941>
CC-MAIN-2017-47
https://speakupforthevoiceless.org/tag/food/
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934807044.45/warc/CC-MAIN-20171123233821-20171124013821-00649.warc.gz
en
0.941276
8,641
2.65625
3
Surprise attack: Coastal residents took cover, but inland the danger was realized too late. Dates: Sept. 6-20, 1928 Deaths (U.S.): 1,836 When the San Felipe hurricane roared ashore at Palm Beach, Fla., in September 1928, many residents of the Miami area were prepared. But inland, along Lake Okeechobee, few conceived the disaster that was brewing. The storm struck first in Puerto Rico, killing 1,000 people. (In Spanish-speaking areas, it was traditional to name hurricanes for the saint's day on which they hit. The 1928 hurricane hit Puerto Rico on Sept. 13 and become known as the San Felipe hurricane.) The storm hit Florida about 6 p.m. Sept. 16 with 125 mph winds. For two hours it ripped apart boats and battered homes. But most residents had taken cover, and deaths were few. Forty miles west, rain filled Lake Okeechobee to the brim, then a wind from the north began pushing tons of lake water to the south. The dikes crumbled, and water rushed onto the swampy farmland. Homes and people were swept away. Almost 2,000 people perished.
<urn:uuid:aeecbb25-11bf-4fbd-b0bb-70b01db3ebe7>
CC-MAIN-2017-43
http://www.sun-sentinel.com/sns-hc-history-1928-story.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187820487.5/warc/CC-MAIN-20171016233304-20171017013304-00668.warc.gz
en
0.980888
252
2.9375
3
According to a new study in the Journal of American Medicine (JAMA), your mind may be more powerful than you might think. The study took 340 people who had regular low back pain and divided them up into three groups. The aim of the study was to see if mindfulness or behavior training would help reduce their low back pain. Group One: received a Mindfulness-Based Stress Reduction (MBSR) training that included yoga and meditation two hours a week for two months. Group Two: received Cognitive Behavioral Therapy (CBT) for two hours a week for two months. The CBT was taught by psychologists who instructed the participants in guided imagery, abdominal breathing, changing of emotional belief systems and coping skills for pain. Group Three: received a check for $50 and no training or therapy affiliated with the study. The three groups were re-evaluated 4 months after the therapies (or non-therapies). - 44 percent of the mindfulness and CBT groups reported less low back pain - Only 22 percent of group three experienced less low back pain In addition, 60 percent of the mindfulness and CBT group experienced better low back function, while 44 percent of the no-therapy group three did. Yoga as Therapy Yoga Therapy is an important branch of yoga, and there are thousands of certified yoga therapists in the states. From a purely structural perspective, gentle yoga relaxes, strengthens and lengthens tight muscles, allowing healthy blood flow to better circulate more deeply into the belly of the muscles. Tight muscles lack blood supply and lay down fibrous tissue or scar tissue to protect the muscle from tearing from the lack of blood; blood being the muscle lubricant. A sedentary lifestyle is a common culprit that causes muscles to lose adequate blood supply, tighten and lay down non-elastic protective scar tissue that renders the muscles rigid, stiff and painful. Yoga is a powerful tool to help reverse this process naturally. Meditation as Therapy In addition to a sedentary lifestyle, stress may be the second most deleterious cause of muscular aches and pains. When we are under stress, cortisol levels rise as part of the body’s fight-or-flight response to stress. These stress-fighting hormones may save your life, but they are extremely degenerative in the long run. They were more designed to flee from a lion rather than be a part of our 24/7 chemistry. Stress chemistry, whether it be physical, chemical, mental or emotional, produces the same degenerative hormones that, over time, tighten muscles and break the body down. There may be no better way to help the body cope with stress than regular meditation. The One Minute Meditation A simple way to start meditation is with One Minute Meditation – it only takes one minute and it can be done 5-10 times a day for best results. Here are some quick instructions: Step One: Sit up straight in a chair or in crossed legged position. Breathe deeply in and out through the nose using a breathing technique called bhastrika or bellows breath. Continue this for 30 breaths. Step Two: sit still with the eyes closed for 30 seconds. Source: the heartysoul.com
<urn:uuid:181a744b-4c01-486e-a5be-9496a1e72fc5>
CC-MAIN-2017-47
http://goodhealthtalk.com/reduce-back-pain-naturally-the-1-minute-meditation-you-can-try-right-now/
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806310.85/warc/CC-MAIN-20171121021058-20171121041058-00030.warc.gz
en
0.944221
661
2.875
3
Roman "Curse Tablet" Discovered in England for National Geographic News |December 5, 2006| Archaeologists in Leicester, England, have recently uncovered a treasure trove of Roman and medieval artifacts, including a 1,700-year-old Roman "curse tablet." Curse tablets were metal scrolls on which ancient Romans wrote spells to exact revenge for misdeeds, often thefts of money, clothing, or animals. Such tablets have been discovered previously in Britain, often near ancient Roman temple sites, but this is the first one to be found in Leicester (see United Kingdom map). The Leicester tablet, which was uncovered near the ruins of a large Roman townhouse dating from the second century A.D., was found unrolled. Curse tablets were typically rolled up and nailed to posts inside temples or shrines. The newfound tablet appears to have been written by, or on behalf of, a man named Servandus, whose cloak had been stolen. The writer inscribed a curse into a sheet of lead, asking the god Maglus to destroy the thief. Measuring around 8 inches (20 centimeters) long and 3 inches (7 centimeters) wide, the tablet reads: "To the god Maglus, I give the wrongdoer who stole the cloak of Servandus. Silvester, Roimandus that he destroy him before the ninth day, the person who stole the cloak of Servandus " A list of the names of 18 or 19 suspects follows. Richard Buckley, co-director of the University of Leicester Archaeological Services, which is conducting the excavation, said the discovery provides crucial clues about life in Roman Britain. The names on the lead sheet are of particular interest, he noted. "Some of [the names] are Celtic, and some are Roman. It helps us to understand the cultural makeup of the population," he said. The tablets are thought to have been issued by ordinary people, rather than the wealthy, Buckley added, which helps explain why a missing garment called for action from the gods. "If a cloak is all that you have, then it is pretty important," he said. Roman Homes, Medieval Churches Found The excavations are part of a major dig involving a team of 60 archaeologists from the University of Leicester. Over the last three years nearly 10 percent of the city center has been excavated prior to the construction of new commercial and residential development. The dig has produced a wealth of artifacts from the period when the Roman Empire ruled Britain, from about A.D. 43 to 410. In addition to Servandus' curse tablet, the Roman townhouse excavation has produced another curse tablet that has yet to be translated, along with thousands of shards of pottery, Roman weighing scales, coins, brooches, gaming pieces, animal bone, and hairpins. At other sites in the city the archaeologists have uncovered medieval churches dating from the 11th to the 16th centuries, as well as graveyards with more than 1,600 burial sites. The archaeologists also found a medieval street frontage of four properties, one of which had evidence of a brewery in its backyard. Free Email News Updates Best Online Newsletter, 2006 Codie Awards Sign up for our Inside National Geographic newsletter. Every two weeks we'll send you our top stories and pictures (see sample). |© 1996-2008 National Geographic Society. All rights reserved.|
<urn:uuid:e3f7af93-d4fe-4364-b8ba-8d0fe674087d>
CC-MAIN-2014-15
http://news.nationalgeographic.com/news/pf/1227855.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609537271.8/warc/CC-MAIN-20140416005217-00157-ip-10-147-4-33.ec2.internal.warc.gz
en
0.957587
705
3.171875
3
The removal of a large, beautiful, and well-known valley cottonwood at the southern entrance to the village, to accommodate road-widening for a commercial enterprise, acted as a trigger for legislation to protect Corrales' trees. The Tree Preservation Ordinance (#06-01) was passed on April 11, 2006. The stated purpose of the ordinance is "to enhance and preserve the rural character, environmental and aesthetic qualities, and land values in the Village of Corrales by providing for the nomination, designation, and protection of particularly significant trees, herein designated as landmark trees, either on public property or, with the consent of the owner, on private property." The original ordinance was updated on July 14, 2009 to allow for the nomination of a "stand of trees", defined in the ordinance as "a group of trees of the same species related by age or proximity located within a limited and definable geographic area." The new ordinance (#09-010) includes language intended to facilitate the nomination process for trees on public utility easements and on Middle Rio Grande Conservancy District property where many of Corrales' most venerable old cottonwoods live.
<urn:uuid:b70ed308-8779-4a54-86cc-78763cab36f6>
CC-MAIN-2014-15
http://www.corralestrees.com/
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609521558.37/warc/CC-MAIN-20140416005201-00244-ip-10-147-4-33.ec2.internal.warc.gz
en
0.937608
233
2.78125
3
Horse's muscle power and fatigue Updated: Jul 12, 2019 Do you know what happens in the body of your horse while training? A lot more happens than you might think. In this blog we explain how the muscle works, where does it get's its energy from and why does a horse gets tired? · The muscle of a horse needs glucose and oxygen to contract. · A light training uses mostly the aerobic pathway, an intensive training mostly the anaerobic pathway. · The brain signalizes fatigue through organs or muscles who are in danger. How does a muscle works? In order to move his body the horse needs to contract his muscles. To generate this power the muscles need energy. A muscle generates energy by using glucose and if available oxygen. We call this respectively anaerobic an aerobic metabolism. During the course of a training the pathway changes depending of the amount of oxygen and glucose that is available. We will discuss 4 stages: 1. A first explosion If a horse would suddenly have to run off, for example because it spooks in the field. The muscle uses the glucose that is stored in the muscle. There is no oxygen yet, so the muscle uses the less efficient anaerobic pathway. This is way it is important in regular training to start with a warming up. This allows the body to prepare the muscle and increase the blood flow with extra oxygen to arrive at the muscles. 2. Light training In a light training, after warming up there will be enough oxygen transported to the muscle to allow for the highly efficient aerobe metabolism of glucose (see figure above). A horse can keep this up for a long time. In for example a 2-hour training in walk, the heartrate of your horse stays under 100 beats per minute. The heart rate is a good indicator for the demand of oxygen in the muscle: The more oxygen is required, the more blood needs to be pump to the muscle to bring the oxygen, the higher the heartrate will be. 3. Intensive training As a training gets more intensive the muscles will first run out of oxygen. On average this happens at a heart rate of around 180, for example when you ride in canter for 6-8 minutes or you ride uphill or in a rough terrain. When a specific muscle runs out of oxygen varies greatly between horses and depends on the training level of the horse. The fitter the horse to better it is able to bring oxygen to the muscles, the longer it can rely on the more efficient aerobe metabolism. If the muscle runs out of oxygen it will switch to the less efficient anaerobic metabolism. It can now only generate 2 energy molecule in stead of 36 in that process extra acid (H+) is produced,. causing acidification and fatigue of the muscle. It is a misconception that lactate is the cause of acidification, lactate actually has many benefits for the muscles in this stage. What does lactate do? Lactate helps against acidification. Lactate functions as a signal substance. Lactate ensures more energy. During intensive exercise lactate functions as an energy source for organs like the heart. After training In an average of 3 hours the body will break down the lactate. 4. Fatigue in the brain More and more research confirms that it are probably not the muscles causing the onset of fatigue and being the limiting factor in performance. Long before the muscles truly run out of glucose and lactate as their source of energy the body will have send warning signals to the brain. A lack of oxygen, overheating and a drop in glucose in the blood are all signals to the brain to slow the body down. This prevents the body from overtraining or injuries and is vital for the survival of the body. It is very hard for any athlete to ignore these signals and keep training passed the barriers of ‘central fatigue’ in the brain. Keeping the brain motivated in training is there for a very important aspect of training. Creating a high standard of wellbeing and positive emotional state will translate directly in to better performance. And since horses do not care much for golden medals other motivational rewards need to be in place and applied in perfect timing with training. Horse are very sensitive to a pressure release or motivational stroke. Burgerhout, W. G. (2008) Afscheid van melkzuur, deel 1 27: 322. https://doi-org.has.idm.oclc.org/10.1007/BF03077607 Burgerhout, W. G. (2009). Afscheid van melkzuur, deel 2. Stimulus, 28(1), 37–49. https://doi.org/10.1007/s12491-009-0005-8 Burghout, W. (2017). Visies op vermoeidheid Deel 1: Waarom houdt dat verzuren maar niet op? Sportgericht, 71(5), 20–22. Campbell, N. A., Reece, J. B., Urry, L. A., Cain, M. L., Wasserman, S. A., Minorsky, P. V., & Jackson, R. B. (2014). Biology: A Global Approach. In 10.5 Fermentation and anaerobic respiration enable cells to produce ATP without the use of oxygen (pp. 253–256). Essex: Pearson Education Limited. Cairns, S. P. (2006). Lactic Acid and Exercise Performance. Sports Medicine, 36(4), 279–291. https://doi.org/10.2165/00007256-200636040-00001 Gladden, L. B. (2004). Lactate metabolism: a new paradigm for the third millennium. The Journal of Physiology, 558(1), 5–30. https://doi.org/10.1113/jphysiol.2003.058701 Hall, M. M., Rajasekaran, S., Thomsen, T. W., & Peterson, A. R. (2016). Lactate: Friend or Foe. PM&R, 8(3S), S8–S15. Hinchcliff, K. W., Kaneps, A. J., & Geor, R. J. (2008). Equine Exercise Physiology: The Science of Exercise in the Athletic Horse. Edinburgh: Saunders/Elsevier. Noakes, T. D. (2004). From catastrophe to complexity: a novel model of integrative central neural regulation of effort and fatigue during exercise in humans. British Journal of Sports Medicine, 38(4), 511–514. https://doi.org/10.1136/bjsm.2003.009860 Nybo, L., & Rasmussen, P. (2007). Inadequate Cerebral Oxygen Delivery and Central Fatigue during Strenuous Exercise. Exercise and Sport Sciences Reviews, 110–118. https://doi.org/10.1097/jes.0b013e3180a031ec
<urn:uuid:7920d093-e6aa-4216-a7eb-877f13ef3a3d>
CC-MAIN-2020-16
https://www.ipostechnology.com/post/horse-s-muscle-power-and-fatigue
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370510352.43/warc/CC-MAIN-20200403061648-20200403091648-00312.warc.gz
en
0.853709
1,485
3.296875
3
Navy’s First Escape Exercise from a Nuclear Submarine (above) A sailor from the international submarine community in a SEIE participates in a submarine escape exercise during SORBET ROYALE 2005. U.S. Navy Photo. by Petty Officer 1st Class (SW) Cynthia Clark, USN Seven personnel practiced escaping from the attack submarine USS Los Angeles (SSN-688) and ascending to the surface wearing special suits designed to enable a free ascent from a stricken submarine. Escape Exercise (ESCAPEX) was held Dec. 2 at the U.S. Navy’s Southeast Alaska Acoustic Measurement Facility in Ketchikan, Alaska. While several foreign navies practice the maneuver routinely, the U.S. Navy had not conducted it in more than three decades, and never from a nuclear-powered submarine. The Navy’s renewed interest in submarine escape comes as U.S. submarines operate more frequently now in shallow coastal waters, said Submarine Development Squadron (CSDS) FIVE commodore Capt. Butch Howard, who oversaw the exercise. “Today, submarines spend a greater amount of time in the littorals or shallow water, which supports the overall concept of escaping from a possible distressed submarine,” said Howard. “It’s imperative our sub crews be familiar and comfortable with this operating procedure no matter how remote the potential for its use.” The MK 10 Submarine Escape Immersion Equipment, or SEIE, allows survivors to escape a disabled submarine at depths down to 600 feet, at a rate of eight or more men per hour. It is designed to enable a free ascent from the submarine and provide protection for the submariner upon reaching the surface until rescued. The assembly is comprised of a submarine escape and immersion suit, an inner thermal liner, and a gas inflated single seat life raft, all contained in an outer protective stowage compartment. For the exercise, Los Angeles embarked six U.S. Navy divers, as well as a British diver from the Royal Navy. The submarine submerged to 130 feet, where each of the seven divers donned the SEIE suits, entered the escape trunk, and ascended. Chief Petty Officer (DSW/SW) Sean Daoust, a submarine escape instructor at the Naval Submarine School in Groton, Conn., was the first to ascend. Daoust said he was honored to be the first to escape from a U.S. nuclear-powered submarine, and couldn’t wait to return to his students with his firsthand knowledge. “I teach this procedure on a daily basis,” said Daoust. “I have a lot of confidence in the system. Now I can show them the data and the statistics so it will benefit them, because if you see one of your shipmates being blasted out of a submarine, it’s the best way to assure them the system works.” |Submariners can have an added degree of confidence in knowing that the SEIE suits on U.S. submarines can save them in the unlikely event of a stranding. USS Los Angeles (SSN-688) moored at the Southeast Alaska Acoustic Measurement Facility Static Site in Ketchikan, Alaska as part of ESCAPEX 2006. Photo by Petty Officer 1st Class Cynthia Clark Petty Officer 2nd Class Gary Halsey emerges from the Northern Pacific as the first U.S. Navy Sailor to execute a tandem open ocean escape from a nuclear-powered submarine. Photo by Petty Officer 1st Class Cynthia Clark After Daoust, there were three tandem escapes. Los Angeles crew member Petty Officer 2nd Class (SS) Gary Halsey was one of the Sailors given the chance to participate in a tandem escape. While thrilled at the experience, Halsey also said it was reassuring to know that the escape system works. “Not many people get to do things like this in their whole Navy career,” said Halsey. “The SEIE worked great which instilled confidence, not to mention being very comforting to all of us working on submarines.” Cmdr. Erik Burian, commanding officer of Los Angeles, attributed the exercise’s success to his crew’s tremendous skill and professionalism. He said he was grateful that the namesake of the Los Angeles-class was the boat selected to do the exercise. “I think it’s absolutely fitting the ‘first and finest’ pulled this off,” said Burian. “It’s just perfect.” Submariners can have an added degree of confidence in knowing that the SEIE suits on U.S. submarines can save them in the unlikely event of a stranding, said Howard. “As a result of ESCAPEX, we’ve confirmed the procedures and our SEIE suits work,” he said. “The ship and the folks at SEAFAC [Southeast Alaska Acoustic Measurement Facility] did a great job.” In addition to the team from CSDS FIVE, Los Angeles and SEAFAC, the ESCAPEX team was made up of members of numerous commands, including Commander, Submarine Force Pacific Fleet, Naval Sea Systems Command, and Explosive Ordnance Disposal Mobile Unit ELEVEN. Petty Officer 1st Class (SW) Cynthia Clark, USN serves in the SUBPAC public affairs office in Pearl Harbor, Hawaii. |Submarine Escape Immersion Equipment (SEIE) suits seen here aboard the USS Virginia (SSN-774) in 2004. Photo by Petty Officer 1st Class James Pinksy
<urn:uuid:8a87998c-77b2-4462-9924-b258f46a2c3d>
CC-MAIN-2013-20
http://www.public.navy.mil/subfor/underseawarfaremagazine/Issues/Archives/issue_33/escapex.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708145189/warc/CC-MAIN-20130516124225-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.937946
1,188
2.984375
3
Type 2 diabetes has become increasingly common as society suffers from higher obesity rates than ever before. It is also the most common type of diabetes. Type 2 Diabetes is usually caused by a lifestyle that involves a lack of exercise, being overweight and a high fat and sugar diet. It is something people are more at risk of as they grow older, particularly if they have a family history of developing it, however it is also a highly preventable disease. Here we give some interesting facts about Type 2 Diabetes; Certain ethnic groups are more prone to developing
<urn:uuid:3aa494de-e89f-44d0-9912-e5dea7d781ff>
CC-MAIN-2020-34
https://quirky-world.com/category/health/
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738380.22/warc/CC-MAIN-20200809013812-20200809043812-00206.warc.gz
en
0.98289
110
3.09375
3
What quirky activities have you done that your fitness tracker or smart watch falsely counted as steps? What about playing the drums, folding napkins, or directing a choir? How about opening and closing the refrigerator door or washing your hands? These are all activities that netted people “steps.” If you’re like the majority of people in a survey, you consider accuracy to be the most important feature of wearables. Unfortunately, activity trackers can be notoriously inaccurate. The ease with which activity trackers can be fooled into counting steps has turned into an entertaining game for people trying to drum up big numbers to win friendly bets and workplace rewards. There are videos and tutorials on how to cheat step counters (see video below). To rack up fake steps you can sit on a couch and shake your wrist; toss your fitness tracker in the dryer; or attach your tracker to an electric saw blade, power drill, paint can shaker, ceiling fan, metronome, dog, bike wheel, or hamster wheel. Examples of how to get false steps Why it’s so easy to trick fitness trackers Most popular activity trackers and smart watches (such as products from Apple, Amazfit, Coros, Fitbit, Garmin, Honor, Huawei, Polar, Samsung, Suunto, Withings, and Xiaomi) use an accelerometer to sense movement. This detects acceleration, which is your change in speed relative to time. Devices typically measure acceleration in 3 planes, hence they are known as triaxial or 3D. The planes are X, Y, and Z, which are your accelerations from front to back, side to side, and up and down. (To view great examples of raw accelerometer data for several activities, visit Unfit Bits: Research.) If you wear a fitness tracker on your wrist and you move your arms around (even if you aren’t taking any steps) the sensor detects accelerations, which may be counted as steps. Hence steps for napkin folding (confessed by a waitress), drum playing, and more. Conversely, if the sensor can’t detect your changes in speed, it may not count steps. Thus a wrist-based tracker may not measure activity done while your arms are motionless (cycling, carrying groceries, or pushing a stroller or lawnmower). However, if you’re moving over an uneven surface, the sensor may pick up wrist vibrations, giving you step counts that may or may not correspond with your actual steps. This is a key reason that a tracker’s location on your body is very important. How trackers count steps and why they vary Trackers use algorithms to analyze the raw data from the accelerometer to determine what gets counted as a step. Many data characteristics may be considered, including the amplitude and frequency of the 3D accelerations and the patterns of stepping bouts and pauses. Each company has different algorithms (typically proprietary) with different thresholds for what ultimately gets counted as steps. Hence different trackers can give a range numbers for the same activity. Lots of research studies have analyzed tracker accuracy. The studies typically compare a variety of consumer trackers to some sort of gold standard. Research studies on activity tracker step accuracy have generally found: - Trackers are less accurate at slow walking speeds (<2 mph) - Trackers worn on the wrist may not detect steps if the arms are stationary while walking - Trackers may greatly underestimate steps taken during household chores (such as vacuuming and making a bed) - Trackers may not accurately count steps done during sports agility tasks (such as shooting free throws and ladder drills) - Trackers may detect continuous large arm movements (such as folding laundry) as steps, resulting in huge over-estimations - Trackers can be less accurate in people with gait issues (such as people who use a lower-limb prosthesis or have had a stroke) - Trackers do a poor job of estimating energy expenditure (the number of calories you burn) - The over-and under-estimations can add up significantly over days and weeks. This can throw off estimates of distances covered, calories burned, and other metrics Why you shouldn’t be able to fool trackers Tracker accuracy relies on pattern recognition. In a clever study, researchers gave participants smartphone-based activity trackers that used an accelerometer and a gyroscope (for rotational velocity around each axis). Participants were instructed to find ways to intentionally “cheat” the trackers (for example, by shaking a phone while seated to get the tracker to detect walking). The researchers were able to take the patterns of deceptive behaviors from all the participants and use them to “train” the tracker to recognize them as false, thus greatly improving activity recognition. With improvements in algorithms and machine learning, trackers will become much better at pattern recognition and thus become much more accurate. And as more sensors are added (gyroscope, magnetometer, altimeter, GPS; plus measures for posture, heart rate, heat flux, galvanic skin response, etc.) more contextual information will be built into the algorithms to distinguish factors such as movement intensity (light, medium, high) and body position (lying, sitting, standing). In the future you may be able to adjust your own tracker to tailor analysis of your movement patterns with just a few pushes of a button. Steps you can take to improve your tracker’s accuracy Although you currently can’t change the sensors and algorithms in your tracker, you don’t have to take the inaccuracy issues lying down. Here’s what you can do to improve your tracker’s accuracy: - Do any calibration steps that are specified. - Provide accurate personal data (such as height, weight, gender, and stride length). If one of these changes a lot (such as weight) update your information. These data are used in calculations to estimate parameters such as calories burned and distance walked. - If you have an option of attaching your tracker near your hip, rather than on your wrist, do it. The closer it is to your center of mass, the more accurate it will be (especially for estimating calories burned). - Think through your daily activities. If you wear a wrist-based tracker and regularly knead bread, shake cocktails, or direct an orchestra, consider removing your tracker while doing those activities. Alternatively, make a note of the bonus steps you’re getting during the activity. - Securely fasten your tracker so it doesn’t bounce around. - Pay attention to the updates, as they may improve the algorithms. - Wear your tracker on your non-dominant wrist to reduce potential extra step counts from arm movements. (Some trackers may ask you to input whether you wear it on your dominant or non-dominant wrist as the algorithm factors in this variable.) Overall, the ability of trackers to accurately count steps depends on the type of movements you make throughout your day. The most important movements you make, however, may be just to stand up and start walking. What crazy activities have you done that your tracker falsely counted as steps? Related popular posts Is your activity tracking gadget accurate? Do you care? Self-tracking meets ready-to-wear: Make room in your closet for smart clothes The Future of Activity Monitoring: Innovating Beyond Steps, Sleep, and Speed What if Wearable Tech was like Press-on Nails? Self-tracking meets ready-to-wear Key Questions to Ask Before You Have Bodily Fluids Tested for Athletic and Health “Insights” Wearable Tech Pinterest Board (Extensive listing of tracking gadgets, gizmos and garments) - Boudreaux BD, Hebert EP, Hollander DB, Williams BM, Cormier CL, Naquin MR, Gillan WW, Gusew EE, Kraemer RR. Validity of Wearable Activity Monitors during Cycling and Resistance Exercise. Med Sci Sports Exerc. 2018 Mar;50(3):624-633. - Chen MD, Kuo CC, Pellegrini CA, Hsu MJ. Accuracy of wristband activity monitors during ambulation and activities. Med Sci Sports Exerc. 2016 Oct;48(10):1942-9. - Clay L, Webb M, Hargest C, Adhia DB. Gait quality and velocity influences activity tracker accuracy in individuals post-stroke. Top Stroke Rehabil. 2019 Sep;26(6):412-417. Epub 2019 May 29. - Evenson KR, Goto MM, Furberg RD. Systematic review of the validity and reliability of consumer-wearable activity trackers. Int J Behav Nutr Phys Act. 2015 Dec 18;12:159. - Freedson, P. Editorial: validation of a popular consumer activity tracker. J. Measurement of Physical Behaviour, 1(3), Sept, 2018. - Fuller D, Colwell E, Low J, Orychock K, Tobin MA, Simango B, Buote R, Van Heerden D, Luan H, Cullen K, Slade L, Taylor NGA. Reliability and validity of commercially available wearable devices for measuring steps, energy expenditure, and heart rate: Systematic review. JMIR Mhealth Uhealth. 2020 Sep 8;8(9):e18694. - Lynn R, Pfitzer R, Rogers RR, Ballmann CG, Williams TD, Marshall MR. Step-Counting Validity of Wrist-Worn Activity Monitors During Activities With Fixed Upper Extremities. J Measurement of Physical Behaviour. 2020 3(3) 197–203. - Nelson MB, Kaminsky LA, Dickin DC, Montoye AH. Validity of consumer-based physical activity monitors for specific activity types. Med Sci Sports Exerc. 2016 Aug;48(8):1619-28. - O’Driscoll R, Turicchi J, Beaulieu K, et al. How well do activity monitors estimate energy expenditure? A systematic review and meta-analysis of the validity of current technologies. Br J Sports Med. Published Online First: 07 September 2018. - Rosenberger ME, Buman MP, Haskell WL, McConnell MV, Carstensen LL. Twenty-four hours of sleep, sedentary behavior, and physical activity with nine wearable devices. Med Sci Sports Exerc. 2016 Mar;48(3):457-65. http://www.ncbi.nlm.nih.gov/pubmed/26484953 - Saeb S, Körding K, Mohr DC. Making activity recognition robust against deceptive behavior. PLoS One. 2015 Dec 11;10(12):e0144795. - Smith JD, Guerra G, Burkholder BG. The validity and accuracy of wrist-worn activity monitors in lower-limb prosthesis users. Disabil Rehabil. 2020 Nov;42(22):3182-3188. - Storm FA, Heller BW, Mazzà C (2015) Step detection and activity recognition accuracy of seven physical activity monitors. PLoS ONE 10(3): e0118723. - Stackpool CM, Porcari JP, Mikat RP, Gillette C, Foster C. (2014) The accuracy of various activity trackers in estimating steps taken and energy expenditure. Journal of Fitness Research 3(3), December 2014. - Svarre FR, Jensen MM, Nielsen J, Villumsen M. The validity of activity trackers is affected by walking speed: the criterion validity of Garmin Vivosmart® HR and StepWatch™ 3 for measuring steps at various walking speeds under controlled conditions. PeerJ. 2020 Jul 14;8:e9381. Note; This is a updated, revised version of a post that was originally published October 16, 2016. For those especially interested in this field, take a look at the Journal for the Measurement of Physical Behaviour launched in 2018. It publishes “high quality research on fundamental measurement problems, and use and application of wearable technology to assess physical activity, sedentary behavior, movement disorders, and sleep.” Image: Walkers – courtesy of Elliot Margolies via Flickr Creative Commons (image has been slightly cropped)
<urn:uuid:f4ac6ea0-687b-482d-bfc9-5d6502c097e0>
CC-MAIN-2023-40
https://caroltorgan.com/activity-tracker-accuracy/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510300.41/warc/CC-MAIN-20230927135227-20230927165227-00277.warc.gz
en
0.896766
2,559
2.6875
3
REBOL Programming/Design Guide/Scripts start with a header Headers provide a consistent way to to give your script an official title and filename. Take advantage of them. They can save you and others time by explaining: - what a script does - who wrote it - when it was last modified - how it should be used - its change history, and more. Headers also provide reliable search information for libraries, archives, and search engines.
<urn:uuid:20ab18a7-8780-47ef-aa49-b5144dc62436>
CC-MAIN-2017-30
https://en.wikibooks.org/wiki/REBOL_Programming/Design_Guide/Scripts_start_with_a_header
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423903.35/warc/CC-MAIN-20170722062617-20170722082617-00656.warc.gz
en
0.936494
99
2.671875
3
Profession swaging machine operator Swaging machine operators set up and tend rotary swaging machines, designed to alter round ferrous and non-ferrous metal workpieces into their desired shape by first hammering them into a smaller diameter through the compressive force of two or more dies and then tagging them using a rotary swager, a process through which no excess material is lost. Would you like to know what kind of career and professions suit you best? Take our free Holland code career test and find out. - Realistic / Conventional - Forging processes The various processes in the metalforming practices of forging, such as swaging, open-die forging, automatic hot forging, cogging, impression-die forging, roll forging, upsetting, press forging, and others. - Swaging machine types Types of machines used for swaging processes in forging, such as the tagging machine, the butt swaging machine, the creeping spindle swaging machine and others. - Swaging processes Processes related to the forging practices of swaging, such as tube swaging, rotary swaging, roller swaging, butt swaging and others. - Hold metal work piece in machine Manually position and hold a, potentially heated, metal work piece for the machine to perform the necessary metalworking processes on it. Take the forming character of the machine into account in order to optimally place and maintain the processed work piece. - Tend swaging machine Tend a swaging machine, designed for forming usually cold metal by use of a high energy force and swage blocks, monitor and operate it, according to regulations.
<urn:uuid:46722b45-757d-4878-9c14-10896c8d909c>
CC-MAIN-2020-16
https://www.123test.com/professions/profession-swaging-machine-operator/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370510287.30/warc/CC-MAIN-20200403030659-20200403060659-00406.warc.gz
en
0.899984
339
2.921875
3
Tesla Turbine Concept After extensive researches on the current wind technologies our conclusion was that these technologies face overwhelming problems for their installation in urban areas. Extending our researches to find efficient turbines, a long forgotten remarkable technology caught our attention: the bladeless steam turbine produced in 1913 by Nikola Tesla. Rather than using blades and friction, the Tesla Turbine uses parallel, closely spaced disks that are set in rotation by the adherence of the fluid on the disks surface, steam or oil in Tesla experiments. In the Tesla design, the disks were enclosed in a volute casing and the fluid was projected with very high pressure on the tangent of the disks. The Tesla turbine is recognized for its high efficiency and its robustness. Tesla turbine, on Wikipedia Tesla turbine, on PESWiki
<urn:uuid:f271ba5b-18d6-488b-9b59-bacd0a5aa0de>
CC-MAIN-2014-10
http://www.tesnic.com/tesla_turbine.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999654345/warc/CC-MAIN-20140305060734-00028-ip-10-183-142-35.ec2.internal.warc.gz
en
0.873085
176
3.671875
4
Are you someone who dreams of becoming financially free and retiring early, but feel overwhelmed by financial jargon and complicated investing strategies? What if I told you that there’s a fun, educational, and interactive way to develop the mindset and skills you need to achieve financial success? What is the CASHFLOW game? Let me introduce you to CASHFLOW, a popular board game designed by Robert Kiyosaki, author of the best-selling book “Rich Dad Poor Dad.” Not only does this game provide entertainment, but it also teaches financial literacy and strategic thinking. But beyond the fun of playing a game, CASHFLOW has real-life benefits that can help us make better decisions when it comes to managing our money. What can you learn from the CASHFLOW game? Have you ever heard the term “cash flow” before? To make money work for you, you need cash flow, and cash flow is not a concept reserved only for board games. In the game, players learn that positive cash flow is essential for financial stability and growth. By managing their income and expenses in the game, players can better understand how to manage their finances in real life and achieve financial freedom to retire early. Let me break down the most beneficial financial concepts you can take away from CASHFLOW: - Cash flow management: The game teaches you the importance of managing your cash inflows and outflows to achieve financial stability and growth. - Asset acquisition: You can learn how to acquire assets such as stocks, real estate, and businesses to build wealth. - Debt management: The game teaches you how to manage debt and leverage it to acquire assets and generate income. - Strategic thinking: You have to make strategic decisions about how to invest your money and grow your wealth, which helps to develop critical thinking skills. - Financial literacy: The game introduces important financial concepts such as assets, liabilities, expenses, and cash flow, which are valuable for understanding personal finance and can be applied in real-life situations. How to play the CASHFLOW game Now that you know what you can learn from the game, let’s talk about how to play it. CASHFLOW simulates real-life financial scenarios and is played in two stages: the Rat Race and the Fast Track. 1. Rat Race - You start with money and a job card that determines your monthly income. - Roll the dice, land on spaces that offer opportunities or challenges related to money and can buy/sell assets like real estate, stocks, and businesses. - You must manage expenses, including unexpected bills. - When you accumulate enough passive income, you can exit the Rat Race. 2. Fast Track - You can move onto the Fast Track when you have enough passive income to cover your expenses. - In the Fast Track, you can invest in bigger deals, including real estate and commodities. - The objective is to accumulate enough wealth to reach your financial goal, determined at the start of the game. To achieve success in the CASHFLOW game, players must also keep track of their balance sheet. Below is the sample of the balance sheet that you will be using in your game: The balance sheet gives you a clear understanding of your financial position. It includes assets, liabilities, income and expenses. By monitoring your balance sheet, you can make informed financial decisions, such as identifying areas of overspending and underspending or determining which assets generate the most income. The balance sheet is an essential tool in the game, helping you to achieve your financial objectives and generate enough passive income to become the winner. Why is cash flow important? After learning about the benefits of playing the CASHFLOW game, you may be wondering why cash flow is so important in the first place. The truth is, cash flow management is a fundamental aspect of personal finance and investing. Sometimes, what you think are assets may be a liability to you. This is why understanding cash flow is essential to achieving financial freedom. I have explained this concept extensively in my book, FIRE Your Retirement, the approach to achieving financial freedom and generating wealth is through cash flow. You should focus on building assets, such as businesses or investments, that generate cash flow, rather than just relying on a traditional job for income. The process is illustrated in the diagram below. This looks simple but is not easy to comprehend. And what’s a better way to learn than to connect and meet other like-minded individuals who also aspire to achieve financial freedom? Join our CASHFLOW Game Night in person We host regular CASHFLOW Game Nights. Leave your email below to be notified of the next event. Not only will this be an entertaining night, but you will also learn valuable financial concepts such as: - The importance of cash flow - The difference between assets and liabilities - The power of passive income - The importance of taking calculated risks Plus, you’re going through this journey not by yourself but as a community. Don’t miss out on this opportunity to improve your financial literacy and have fun doing it. Register your interest below.
<urn:uuid:08ebf103-1ad8-444d-8b62-2988ce0afba7>
CC-MAIN-2023-23
https://www.sgmoneymatters.com/cashflow-game-financial-freedom/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646181.29/warc/CC-MAIN-20230530230622-20230531020622-00155.warc.gz
en
0.947489
1,085
2.640625
3
Desert or semidesert vegetation is found from the interior to the west coast. This vegetation is composed of tough, spiny grasses (such as spinifex and porcupine grass), such shrubs as saltbush, and other drought-resistant plants. As the rainfall increases, the vegetation pattern changes. Beyond the desert area are grasslands interspersed with trees, mostly acacias (wattles). There are more than 600 species of acacias in Australia. Beyond the grasslands toward the east are subtropical and temperate woodlands and rain forests. Here eucalyptus trees predominate. In Australia there are about 550 species of these trees, many of which are widely used for hardwood timber. Tropical plant life, consisting of conifers, palms, tree ferns, lianas, and a great variety of orchids, is found around the northern coast. Mediterranean vegetation is found in the southwestern tip of Australia, and jarrah and karri trees are abundant. Tasmania's vegetation consists mainly of subtropical and temperate forests and woodlands, with eucalyptus trees, palms, tree ferns, conifers, and beeches predominating.
<urn:uuid:6645942e-5ec5-4a04-8fa5-2d8f3554e65b>
CC-MAIN-2014-23
http://geography.howstuffworks.com/oceania-and-australia/geography-of-australia2.htm
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510267729.10/warc/CC-MAIN-20140728011747-00166-ip-10-146-231-18.ec2.internal.warc.gz
en
0.931533
255
3.65625
4
Unrest existed in many areas of the West, particularly west of the Alleghenies. Primary contributing issues included a lack of federal courts in the West, which necessitated long trips to Philadelphia, lack of protection against Native American attacks and a high federal excise tax on domestically produced distilled spirits. At Alexander Hamilton`s urging, Congress in 1791 enacted a tax on spirits at twenty-five percent of the liquor`s value. Large producers were not pleased with the tax, but generally complied; the small producers were irate and began to organize opposition. In the western counties of Pennsylvania, the Scots-Irish farmers were particularly hard-hit - most were grain growers and many were distillers. Mobs tarred and feathered a tax collector and burned the home of another. Shots (of ammunition) were exchanged. Washington called upon the rebels to disperse, but his plea was ignored. The president then ordered the governors of the surrounding states to summon their militias. Washington invoked the wording of a statute authorizing the federal government to call up the militias, along with the written finding by James Wilson, then an associate justice of the Supreme Court, that the necessary conditions existed, to justify his action. A force of nearly 13,000 men was raised and marched into western Pennsylvania. Opposition quickly faded away, but Hamilton (never reluctant to press federal power) actively directed the capture of more than 100 participants. Eventually two were convicted of treason, but later received presidential pardons. The Whiskey Rebellion was the first test of federal authority in the young republic. It demonstrated the willingness and ability of the federal government to enforce its laws. It also established a precedent when the president called up state militias for federal purposes.
<urn:uuid:34098433-087b-48cc-8324-2522de4ecea6>
CC-MAIN-2014-35
http://www.u-s-history.com/pages/h447.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535925433.20/warc/CC-MAIN-20140901014525-00229-ip-10-180-136-8.ec2.internal.warc.gz
en
0.977077
347
3.96875
4
IGCSE will only be available for the coming academic year 2017/18. What are CIE IGCSEs? Cambridge International General Certificate of Secondary Education (IGCSE) is the world’s most popular international curriculum for 14-16 year olds, leading to globally recognised and valued Cambridge IGCSE qualifications. It is part of the Cambridge Secondary 2 stage. Cambridge IGCSE encourages learner-centred and enquiry-based approaches to learning. It develops learners’ skills in creative thinking, enquiry and problem solving, giving learners excellent preparation for the next stage in their education. Cambridge IGCSE is compatible with other curricula and is internationally relevant and sensitive to different needs and cultures. Cambridge IGCSE is taken in over 100 countries worldwide and is widely recognised by higher education institutions and employers around the world as evidence of academic ability. In some parts of the world, schools use Cambridge IGCSE as an international alternative to the local government's examination. The resulting qualification provides a foundation for higher level courses in the International Baccalaureate Diploma Programme (IBDP). The Cambridge IGCSE Programme has an excellent reputation amongst international schools worldwide. The IGCSE is benchmarked using eight internationally recognised grades: A*, A,: A*, A, B, C, D, E, F and G. Grade A* is the highest level of achievement and grade G is the minimum awarded. Most post-16 institutions require students to have a minimum of five IGCSE grade Cs or above, though more realistically students require a B grade or higher in those subjects that they intend to study at post-16 level in order to do well. Learning & Teaching Cambridge IGCSE offers a flexible and stimulating curriculum, supported with excellent resources and training. In students it helps improve performance by developing skills in creative thinking, enquiry and problem solving. Cambridge IGCSE develops learner knowledge, understanding and skills in: Cambridge International Certificate of Education (ICE) is the group award of the International General Certificate of Secondary Education (IGCSE) and requires the study of subjects drawn from the five different IGCSE subject groups. It gives schools the opportunity to benefit from offering a broad and balanced curriculum by recognising the achievements of students who pass examinations in at least seven subjects, including two languages, and one subject from each of the other subject groups. A wide range of IGCSE subjects is available and these are grouped into five curriculum areas, as follows: Candidates hoping to gain the Cambridge ICE group award must enter and sit for at least seven subjects selected from the five IGCSE curriculum areas. The subjects selected must include two (different) languages from Group I (i.e. only one of First Language English and English as a Second Language may count towards Cambridge ICE) and one subject from each of Groups II, III, IV and V. The seventh subject can be taken from any of the five subject groups. Since most RWA students take 8 subjects including 2 languages, most of our students, meet the ICE requirements. For further information on the Cambridge IGCSE Programme and ICE group award, please visit www.cie.org.uk . The option blocks at RWA are set up in such a way as to encourage all students to select a blend of subjects that will allow them to qualify for ICE. At RWA students will study a total of around eight IGCSE subjects from the lists below. Further details of the IGCSE programme can be found in the IGCSE options booklet.
<urn:uuid:d2e05034-e8bb-4a37-a449-8016b96d0b5a>
CC-MAIN-2017-34
http://www.rwadubai.com/learning/international-general-certificate-of-secondary-education/
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886106367.1/warc/CC-MAIN-20170820092918-20170820112918-00402.warc.gz
en
0.921109
735
3.265625
3
Chocolate has had romantic and sexual connotations essentially since its birth, or at least dating back to “the European conquest of Mexico,” which was dually a conquest of the Aztec Empire (Coe & Coe, 29). Even in ancient use, chocolate was seen as both an aphrodisiac and a necessary facet of marital ceremonies. Such an association has accompanied chocolate to the modern world, though not without undergoing transformations in its exact manifestation in social customs and thus marketing. These transformations are not unfounded; instead, they took place alongside and were the result of historical change. One such change, which substantiates the focus of this paper, is the demonization of obesity which consequently led to the demonization of chocolate. Chocolate entered the Western world as almost a healthy option, which doesn’t come as a surprise given that it was considered a medicine in both ancient and early European societies. This thought survived only until the 17th century, when William Harvey’s work advanced knowledge of the cardiovascular system which disproved the Galenic medical model in which chocolate was included. But even after that, chocolate was revered for its ability to sustain and give energy. Take, for example, its role as a “fighting food” in World War II. Chocolate enjoyed this favorable role until around the mid-twentieth century, when chocolate and candy were exposed for their role in weight gain during a post-WWII stigmatization of obesity. The unhealthy aspects of chocolate were brought to light, and public attitudes toward it were fundamentally changed. And although a focus on women had always been congenital to the marketing of chocolate, this shift brought with it a change in exactly how this focus was manipulated. Women in chocolate advertisements went from being depicted as wholly domestic and in charge of family matters to being depicted as overly sexual and out of control. This shift was made in order to overcome chocolate’s newly immoral image by equating it to sex, which is socially acceptable but also technically sinful. But since women remained central to chocolate marketing, this pairing exudes deeper implications about women in relation to chocolate and sex, which are ultimately unfounded and yet have profoundly impacted public sentiment. I was brought to such a conclusion through an interview regarding chocolate that I conducted with a good female friend of mine at Harvard College. We sat down in a café and had the following conversation. Q: What is your favorite kind of chocolate? A: Mostly white chocolates, but I also love the Cadbury Curly Wurly and Reese’s in particular. Q: What kind of chocolate do you consider high quality? A: Dark chocolates, or I guess specific brands like Lindt, or Lindor truffles…definitely not Hershey’s or Snickers. Do you know Milka? I think that’s European and it’s different but I’d probably consider that nice. The kinds that people give as gifts are usually nice. Q: To whom do you gift chocolate, if ever? A: You! Haha. But also my little sisters and anyone I feel bad for. It’s a nice quick way to make someone feel better. It’s easy, convenient, and everyone likes chocolate. Q: Do people ever give you chocolate? A: My family at holidays, and sometimes guys. Q: In what situations do you eat the most chocolate? A: Holidays and if I feel bad or upset about something. Chocolate is nice because it makes you feel happy. I think there are studies on that, that it makes you feel happy because of the sugar. Some people are addicted to it I think. Q: Understandable. Lastly, in what context do you see chocolate most often advertised? A: Oh! Wait. This is something I can really go on about because it’s so weird to me, and so interesting. Advertisements use women and eating, and sexualize the women eating it, which makes it seem doubly attractive because of both the woman and the chocolate. It makes you think of sex and like, sinning, because chocolate’s unhealthy and sex is associated with sin. Not that sex is something to be ashamed of, but they’re associated. If you’re writing a paper on this you should do it on that! My friend’s influence on my topic is pretty evident from my last question, which excited her to the extent that she insisted I use the interview to highlight that correlation. But even her answers to other, non-explicitly gender-based questions contribute evidence to the sexualization of women in chocolate advertising, its exact form, and the misconceptions it generates even to someone so obviously aware of it. To elaborate, her responses demonstrate how higher quality chocolate in particular is gifted to women by men or by other woman, but rarely to men. Furthermore, she clearly buys into the indulgent role of chocolate, and its ability to make her feel better instantly. This thought, unbeknownst to her, is also partially the result of chocolate advertising. But the advertising does not function this way arbitrarily; it acts on associations which, despite having morphed over time, are in fact grounded in chocolate’s roots. Chocolate’s ancient romance-based role as an aphrodisiac and a factor in betrothal may be the starting point of the focus on women in particular since these connotations include heteronormative and monogamous assumptions. Women are therefore necessarily involved. In Mayan culture, kings purportedly sent messengers equipped with beaten chocolate out to found them wives (Coe & Coe, 61). And at the ceremony itself, the bride and groom would give each other five grains of cacao (Coe & Coe, 61). The first instance clearly illustrates that chocolate would, in that case, be expected to woo such a bride. Thus, chocolate’s supposed love-inducing power on women is seen even here. This concept was somewhat exempt from some of the early to mid-twentieth century chocolate advertising campaigns, which had other intentions, but it resurfaces in the current environment. The aforementioned campaigns, which took place in the first half of the twentieth century, lack this concept because they sought to situate women and chocolate in the domestic realm. They were particularly prolific following the First and Second World Wars, due to the fact that women had worked traditionally male jobs in place of men who had been drafted. Female empowerment and the beginnings of an understanding of equal ability regardless of sex had emerged, and a heady effort was made to re-establish gender roles and thus reduce any competition with women for jobs. One way of doing this was to trumpet the image of the “housewife,” generally in an overwhelmingly positive light, so that women understood that this was still their primary role. Naturally advertising campaigns are an efficient way of making public statements, and so it isn’t surprising that cocoa and chocolate ads in this era worked to this end. Instead of focusing on women in a sexual manner, they focused on them in their roles as “the main shopper of the family, or at least the coordinator of the all the family shopping” (Robertson 23). A Rowntree poster depicts a woman carrying cups of cocoa for her children while they play with her outfit, which is starkly reminiscent of a maid’s uniform. This design is purposeful, and is included to insinuate that the purpose of wives and mothers is directly comparable to that of a maid. And a 1937 Baker’s Chocolate ad shows happy children and, separately, a woman eating dessert with her husband with a description that exclaims, “Gee, Mother’s a parent with swell ideas! (She’s smart, too, to make her soufflé with Baker’s Chocolate.” Ultimately, this illustration of women gives them some kind of power, even if it comes from a distinct “feminine knowledge” which was gleaned through being relegated to full-time housewife status (Robertson 23). In the 1940s and 50s in America, however, nutritional health concerns suddenly became paramount and obesity was increasingly stigmatized. Although being overweight was viewed as unappealing in previous decades, “psychiatrically-oriented postwar medical thinking about obesity was more stigmatizing…newer biomedical theory linked fatness to the already stigmatized condition of addiction and authorized attribution of moral blame to the fat” (Rasmussen 880). This new psychiatric attitude also directly blamed mothers for the obesity of children. Hilde Bruch, a New York psychoanalyst claimed that the “key element of a family environment promoting obesity…was a domineering mother too invested in mothering…this overmothering involved overfeeding” (Rasmussen 883). Given this blame-oriented reaction to unhealthiness and fat, chocolate advertisements naturally needed to alter their methodology and move away from the idea that smart mothers feed their children large amounts of chocolate and cocoa. Because although chocolate served as a sustainer, in its most popular form it also contained large amounts of sugar and fat. But the question then became one of what the new appeal of chocolate would be. This was an especially difficult issue, for the reason that unhealthy foods like candy and chocolate were not only stigmatized…they were essentially demonized (Lecture note, 8. March 2017). This is largely due to timing and grouping— “addiction and fatness attracted widespread popular stigma at about the same time—and for the same set of reasons based in a Protestant morality strained by the abundance of industrial capitalism” (Rasmussen 881). Opiate and cocaine addiction came to the forefront of societal concerns at the beginning of the twentieth century, and addicts were gradually seen as incurable and even criminal (Rasmussen 881). And those involved in the temperance movement which was in full swing until the repeal of Prohibition in 1933 continued to condemn alcohol consumption largely for the addiction it was so disposed to cause. Now that obesity was also thought to be the result of addiction, but to food, the overweight were similarly denounced and eating junk food was, through this parallel, equated to committing a sin. The best way to conquer this new face of chocolate was ultimately to embrace this idea of sin by pairing it with sex and lust. This pairing made sinning out to be a good thing, grounded in the understanding that sex is technically a “sin,” or morally perverse, and yet people engage in it regardless and with pleasure. If chocolate had instead been paired with a sin that has virtually no nuance and which is inhumane as opposed to immoral for religious reasons which not all people agree with, such as murder or theft, such a method would plainly fail. Needless to say, no advertising agency would assume this position—the comparison seeks only to elucidate how the choice of lust is one of few ways to save a name which had been thrust into the realm of immorality. From the pairing of sex and chocolate, emerges a concept of dual indulgence in both. The thought is that although eating chocolate is wrong for health reasons, it is addictive and pleasurable and understandable in the eyes of modern society, as is sex. This manifested itself in commercials and posters of beautiful women eating chocolate in a notably seductive fashion, and acting as though the chocolate itself is as pleasurable as sex. Some advertisements even make a point of acting as though the women are so drawn to the chocolate that it makes them irrational and out-of-control. This idea is pervasively linked to romance, where women are also stereotypically (albeit unfairly) thought to be irrational when inextricably involved with men. And sex in particular is thought to be a cause of this irrationality. The other common form of chocolate advertising features men gifting chocolate to women with “implied meanings of gratitude and sexual submission” (Robertson 33). Random gifting takes on the insinuation of seduction, or of chocolate’s ability to literally seduce a woman both in its intrinsic role as an addictive delicacy and in its role as reasoning to be grateful to a man and therefore be willing to indulge him. And in another chocolate-gifting trope, chocolate is given to appease a woman who is angry with her significant other. In these scenarios, the woman “overcome[s] such faults as a bad temper…the man is never really bad and there is a reason for his moodiness” (Robertson 30). Therefore, here too is the idea that women are inherently irrational, and that they can be either “subdued by the gift of chocolate” or simply seduced by it (Robertson 32). Regardless, they are often portrayed as out of control through images of them being both driven crazy by and placated by chocolate. It is important to note that this type of advertising was originally restricted mostly to nice chocolates and chocolate assortments—Emma Robertson qualifies that “at least until the 1970s, the link between sex and chocolate had become circumscribed according to the type of chocolate being marketed” (30). Cocoa powder and chocolate geared toward children remained innocuous. This is still the case on some level, which is why my friend equated nice, dark chocolates with the kinds one would gift. But this is a qualifier mostly only when concerning gifting—modern advertisements such as those first described tend to link women and sexiness regardless of quality. The sexual connotation now comes across in most marketing of chocolate. Clearly, even before the health revolution of the 1950s, women were a focus of advertising efforts. Marketing is often gendered—commercials for traditionally “masculine” commodities such as cars and razors and cologne focus conversely on men to promote a masculine association with their product. An example of this which ironically coincides with gendered chocolate marketing is this Axe commercial. While still primarily featuring a man, it insinuates that the passion women ostensibly have for chocolate and the passion they will have for men that wear Axe deodorant are equivocal. For this to be appealing to men, this passion is necessarily sexual. Aside from highlighting the toxic masculinity that emerges in advertising from companies such as Axe, this campaign functions for our purposes on two levels. As previously touched upon, it proves that chocolate has been shaped into something that the public feels women are literally attracted to in a sexual manner. The man is happy because, in his role as a man made entirely of chocolate, he is a recipient of the sexual desire men crave. Secondly, the fashion in which women respond to him is intentionally almost animalistic, so crazed are they by chocolate. While this implicitly lends proof to the earlier idea that gifted chocolate is meant to elicit a sexual response, it also speaks to the broader theme of female irrationality and impulsiveness at the hands of both chocolate and sex. This theme can be proven to be artificially manufactured, however, at least in terms of chocolate. Societal views on female irrationality regarding sex are more nuanced and deserve to be more deeply analyzed separately. The trajectory of chocolate and a lack of control began when chocolate and other junk foods, after being caught up in the wave of altered medical and psychiatric thought of the mid-twentieth century, were classified as addictive. But the chocolate industry clearly decided to use this to their benefit. By subsequently linking chocolate to sex, the addictive classification was exacerbated. Sex is also considered classically addictive—Jamal Fahim notes that we “typically associate addictive behavior with drugs, alcohol, or sexual behavior” (13). So the link to sex compounded the addictive label and implied that chocolate can elicit reactions similar to those elicited by drugs and alcohol—chemical and unnatural. This made chocolate into a necessary indulgence, which is one way of increasing sales. Advertising is therefore necessarily involved, since it is the realm in which the association grew. It is also interesting to note that, in an age where addictions to such substances were under heavy criticism, “tobacco and alcohol are socially deemed masculine luxuries” (Fahim 12). Thus, it appears that the addictions plaguing the public were largely those associated with masculinity. It is therefore convenient that a new addiction emerged which was almost concretely linked to women through the media. Though it cannot be stated with any certainty, it is possible that likening chocolate to an addiction and then placing it in the female realm redistributed blame for a societal problem which previously had more of a male affiliation. After all, women were also targeted in Hilde Burch’s aforementioned concept that the overfeeding mother is responsible for child obesity. Regardless, claims of the addictive properties of chocolate are for the most part unsubstantiated— “studies on chocolate have indicated that the amounts of these mood-enhancing chemicals, such as alkaloids or Phenethylamine, are at such a low level that it is unlikely that they are the reason behind the euphoria one feels when they consume chocolate” (Aaron and Bearden 2008:169, as qtd. in Fahim, 14). Yes, chocolate tastes good and the alkaloids that it contains (caffeine and theobromine) may have some positive effects on mood and stimulation, but it is not addictive in the same way that drugs and sex are. Research that portrays it in such a manner in order to “validate a deeper relationship to sex [is] so negligible and trivial that one must conclude that it is only chocolate marketing that perpetuates chocolate’s association with love and sex and its implied special relevance to women” (Fahim 15). The lack of scientific evidence to back chocolate addiction theories doesn’t change the fact that the stereotypes crafted by the advertising world have genuinely imbedded themselves in society. This is evident in the interview with my friend. For example, the gender-based one-way gifting is validated by her anecdotal evidence, in that she recalls giving gifts to me and her sisters alone, while receiving them from men. She also has a little brother, and so it is significant that she didn’t mention him while describing giving chocolate to little siblings. The history of chocolate’s public image makes the gifting of chocolate to boys and men seem almost outlandish. She also touched upon her tendency to eat chocolate when she’s upset because it makes her feel happier, even adding that this is why some people are possibly addicted to it. This made me realize that misconceptions put forth by the marketing of chocolate have been widely accepted by the public, because her description of chocolate betrays a belief that chocolate has powers similar to that of a drug in enhancing mood. And this notion has been strongly influenced by advertising’s exaggerated depictions of the female reaction to chocolate. There is, however, probably some validity to the natural mood-enhancing capabilities of chocolate. Recent years have yielded an abundance of literature heralding positive effects of chocolate on maladies such as depression, blood pressure, and inflammation. It is important to keep in mind that, in such research, “reported results are based upon dark rather than milk chocolate” (Coe & Coe, 30). But since entirely dark chocolate is not sweet like milk chocolate, it has not been incredibly popular with the public. Thus, even if such research is valid, it wouldn’t apply to the vast majority of the mainstream chocolate onto which the media projects its fabricated claims. What is most interesting to me about the marketing of chocolate is its loyalty to a feminine focus. When the basis of the domesticity-based chocolate and cocoa campaigns was uprooted by the obsession with thinness and the stigmatization of obesity of the mid-twentieth century, marketers of chocolate turned to sex in connection with women in particular to make chocolate similarly alluring and deserving of indulgence. The link to sex also purposefully deepened chocolate’s addictive connotation, so that consumers would feel chocolate was a necessary purchase. But the new methodology didn’t fail to maintain the strong feminine association of the domestic campaign. Although men are implicit in the sexually-tinged gifting policies, it is women that appear in almost all advertisements and often alone with their chocolate, being seduced by it and also seducing the viewer. This propensity to preserve the pairing of women and chocolate, combined with what appears to be growing acknowledgement of dark chocolate and its health benefits, leads me to wonder what kind of marketing we can expect to see if chocolate’s image shifts again. One might think that the focal point of its advertising strategy would simply revert back to domestic life as in the early twentieth century and earlier, but I would argue that the economic equality of women, although not complete, has advanced to the extent that this would not be the new structure. Instead, I think it would be based on the modern focus on women and a societal expectation that they will maintain their health and their body image. For example, I can picture marketing similar to that of this Special K commercial, but trumpeting mental health or blood pressure as opposed to weight loss. Because unfortunately, it appears that the marketing of chocolate is insistent on keeping a gendered focus. But we can at least hope that, if dark chocolate’s health benefits become fact and are widely understood by the public, chocolate consumption will lose the connection to immorality which likens it to sex, and that women in chocolate advertising will thus cease to be over-sexualized. Granted, this could be replaced by the gendered double standards of health maintenance, but I consider those to be the lesser of two evils. Lastly, needless to say, in the best case scenario the gendered focus of the advertising would be eradicated entirely—but given no guarantee of this, I aim only to predict a slightly better alternative. Coe, Sophie D., and Michael D. Coe. The True History of Chocolate. 3rd ed. New York: Thames and Hudson, 2013. Print. “Chocolate Advertisements.” Slate Magazine. N.p., n.d. Web. 3 May 2017. <http://www.slate.com/content/dam/slideshows/double_x/doublex/2012/02/13/chocolate-advertisements/jcr%3Acontent/slideshow/6/images%252Fslides%252FChocolate_7.jpg >. Robertson, Emma. Chocolate, Women and Empire: a Social and Cultural History. Manchester and New York: Manchester U Press, 2009. Print. Distributed in the United States exclusively by Palgrave Macmillan. Elsey, Brian. Retro Image, Rowntree’s Chocolates and Cocoa. N.p., n.d. Web. 01 May 2017. <http://www.historyworld.co.uk/retroimage.php?opt=retro&pic=123>. Rudolph, Janet. “Dying for Chocolate.” Thanksgiving Weekend: Baker’s Vintage 1937 Ad & Recipes. N.p., 27 Nov. 2011. Web. 01 May 2017. <http://dyingforchocolate.blogspot.com/2011/11/thanksgiving-weekend-bakers-vintage.html>. Rasmussen, Nicolas. “Weight stigma, addiction, science, and the medication of fatness in mid-twentieth century America.” Sociology of Health & Illness 34.6 (2012): 880-95. Web. 27 Apr. 2017. Lecture Notes: information recorded in class, provided by Professor Carla D. Martin. Bmt27. N.d. YouTube. YouTube, 19 Oct. 2006. Web. 01 May 2017. <https://www.youtube.com/watch?v=kcbhHOZZXnI>. Elliott, Stuart. “Godiva Rides in a New Direction.” The New York Times. The New York Times, 15 Nov. 2009. Web. 01 May 2017. <http://www.nytimes.com/2009/11/16/business/media/16adnewsletter1.html>. “BLACK MAGIC CHOCOLATE ADVERTISEMENT 1939.” Flickr. Ed. Star1950. Yahoo!, 17 July 2008. Web. 01 May 2017. <https://www.flickr.com/photos/castlekay/2678319672>. Matheuscp. N.d. YouTube. YouTube, 30 Jan. 2008. Web. 02 May 2017. <https://www.youtube.com/watch?v=4ZK7HS9J46Y>. Fahim, Jamal, “Beyond Cravings: Gender and Class Desires in Chocolate Marketing” (2010). Sociology Student Scholarship. http://scholar.oxy.edu/sociology_student/3 Johnklin. N.d. YouTube. YouTube, 29 Sept. 2009. Web. 04 May 2017. <https://www.youtube.com/watch?v=aPJpkgqLQ_M>.
<urn:uuid:acbfe3a8-b033-4fd9-8da3-b5644fe96c8f>
CC-MAIN-2017-30
https://chocolateclass.wordpress.com/2017/05/05/chocolate-demonization-and-the-growth-of-sexualized-chocolate-marketing-in-the-western-world/
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549436321.71/warc/CC-MAIN-20170728022449-20170728042449-00272.warc.gz
en
0.964859
5,205
3.015625
3
No one is more passionate about the BioBlitz than John Francis, vice president of research, conservation, and exploration at National Geographic and head of the large team that helps the Park Service organize the annual event. This morning Francis turned what for most people would have been merely a restorative pit stop into yet another opportunity for exploring biodiversity. While visiting the men’s room in the education center at Barataria Preserve, Francis noticed a remarkable bug in the urinal. “I did not flush,” he says. Instead, he walked down the hall to the room where a team of entomologists from the Louisiana State University Arthropod Museum in Baton Rouge were hard at work, identifying specimens that had been collected in the park—outside, for the most part. An undergraduate researcher named Brian Reily rushed to the men’s room with a pair of tweezers. (Not that entomologists are squeamish: One of the traps the LSU team was sifting through during the BioBlitz was baited with rotting chicken gizzards.) Back in the lab, Reily, post-doc Mike Ferro, and research associate Stephanie Gil quickly ascertained the identity of Francis’s bug. It turned out to be a “true bug,” the common name for any member of the order Hemiptera, which includes things like stink bugs, aphids, cicadas, and bedbugs, but not beetles. More precisely, it was the first member of the family Coreidae collected at Barataria this year, and thus an important addition to the inventory. Even more specifically, the bug is Acanthocephala declivis. First cousin to an assassin bug, it’s a kind of insect that lands on a leaf and pierces it with hollow, straw-like mouthparts called stylets. “They inject enzymes that turn the leaf into mush and suck it up,” says Gil. “I like them. They don’t have time to sit and eat. They just suck up their smoothie on the run.”
<urn:uuid:6e3a0153-3480-43c2-8f66-0857aedb1c63>
CC-MAIN-2014-15
http://newswatch.nationalgeographic.com/2013/05/18/the-blitz-never-quits/
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609539665.16/warc/CC-MAIN-20140416005219-00157-ip-10-147-4-33.ec2.internal.warc.gz
en
0.960915
438
2.640625
3
American and French police will now use 3D scanners to archive crime scenes and better analyze it afterwards. The technology we see in the police films, will soon be a reality! Some units of U.S. and French Police have started using a new technology to analyze crime scenes thoroughly, down to the minute details. This technology is the 3D scanner technology that is also being used in the field of architecture. Which allows the workers, civil engineers and architects to familiarize them perfectly with the terrain. One of these scanners is the FARO Focus 3D which is being used by the police of city of Roswell, in the U.S. state of New Mexico. This device transmits several laser beams at the crime scene. The reflected laser beams are then processed by the device to models the scene on the computer. Officers and forensic experts can now virtually navigate throughout the different points in the crime scene and visualize the place of the victim, as well as that of murderer/abuser. This 3D modeling environment also allows them to discover things they had not seen before, such as bullets hidden in corners, etc. This kind of 3D scanner is a true innovative tool for investigators, particularly in the context of criminal investigations. We hope this technology will help to solve many more crimes! Do you think this technology will be a game changer for police investigations?
<urn:uuid:2125d3e5-d0ab-4241-a7db-86af5659b561>
CC-MAIN-2017-47
http://www.technocrazed.com/police-investigators-will-now-use-3d-scanner-to-document-the-crime-scene-video
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806316.80/warc/CC-MAIN-20171121040104-20171121060104-00020.warc.gz
en
0.954672
278
2.5625
3
- With a special break-away safety buckle - Made from soft, lightweight materials ideally suited to cats - Specially designed to snap apart if the cat is in any difficulty - With a bell to help reduce bird kills All collars come with a warning bell to help protect wildlife. The RSPB estimate that UK domestic cats are responsible for over 275 million kills each year. 55 million of these are birds! Did you realise that a cat wearing a collar with a bell will catch 41% fewer birds and 34% fewer mammals. Source: www.rspb.org.uk When fitting this collar, please ensure that you can get 2 fingers between your cat and the collar for safety and comfort. Warning – if using liquid flea treatments, please remove collar as chemical may react with material on buckle and collar
<urn:uuid:b44bba14-a0ba-4d9d-8b04-441ae610f296>
CC-MAIN-2017-43
https://oneboutique.co.uk/gloss-reflective-cat-collar-with-safety-buckle-silver/
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823220.45/warc/CC-MAIN-20171019031425-20171019051425-00478.warc.gz
en
0.933546
170
2.828125
3
Primarily, money is the number one medium for all trade system of goods and services. Even in the virtual world, things that can be classified as money in case it is able to perform the major roles of money like medium of trade, stocks value, and the account unit. Knowing this, it is very evident that there are different money types available in history and earn an old coins and banknotes. Four Major Types of Money Here is a summary of the differences of each money type: Money Type #1: Commodity Money This type of money is the simplest and generally the oldest one. From the scarce resources, commodity money represents as a medium of exchange, stocks value, and an account unit. The barter system is where commodity money originates. Moreover, the barter system and commodity money operates in the same way in which either the goods or services can be exchanged for other goods and services as well. However, what’s note-taking with this type of money is that the intrinsic value of the commodity is its real value. Gold coins, shells, beads, and spices are some of the examples of commodity money. Money Type #2: Fiat Money Unlike commodity money, fiat money’s value comes from the order of the government. It simply means that fiat money is defined as a legal note by the government which should be accepted by the people and the establishments of the country as a mode of payment. Failure to comply with this may be subjected to fine or imprisonment. Furthermore, the intrinsic value of the fiat money is relatively lower than to its face value. Also, the fiat money’s value comes from the connection of the supply and demand. This money type is generally utilized by most of the modern day economies. Coins and bills are the most common examples of fiat money. Money Type #3: Fiduciary Money Fiduciary money is not allowable as a means of payment by the government unlike the fiat money. Person who issues fiduciary money commits to exchange it for either fiat money or commodity money in case the recipient may request for it. Fiduciary money may include banknotes, cheques, or drafts Money Type #4: Commercial Bank Money The type of money that can be used as claims against financial establishments giving assistance, like that of the one handled by the bankruptcy attorney San Diego, is called as the commercial bank money. This money type can be utilized in exchange for purchasing the goods and services. Commercial bank of money is generally produced using the fractional reserve banking which is typically debt generated.
<urn:uuid:5e4370ac-f20c-472e-b363-b5fdb3f226cc>
CC-MAIN-2020-29
http://www.coins-and-banknotes.com/2020/03/
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655890181.37/warc/CC-MAIN-20200706191400-20200706221400-00265.warc.gz
en
0.953824
528
3.484375
3
Back at the dawn of the Space Age in 1958, the limited “throw-weight” of U.S. boosters used to loft payloads into Low Earth Orbit (LEO) meant that the first American satellites were diminutive compared to the early Russian Sputniks (“Traveling Companions”) of the day. Despite their small size, however, those early Explorer and Vanguard-series satellites made some of the most important early discoveries about the nature of the near-Earth environment, including finding the Van Allen Radiation Belts. However, when larger American boosters became available in the 1960s, the need to keep the weight and volume of satellite payloads began to take second place to increased functionality. Satellites became bigger, especially those associated with military space and intelligence roles and missions. This has culminated in intelligence payloads reportedly the size of school buses, requiring a Space Transportation System (STS – space shuttle) or high-end Evolved Expendable Launch Vehicle (EELV – Delta 4/Atlas 5) launch to lift them into orbit, resulting in high-risk multi-billion dollar missions/payloads that can take up to a decade to get into LEO. With the reality of looming fiscal cuts on the horizon, a number of efforts to reduce the costs of satellites and boosters are ongoing within the U.S. military and intelligence communities. One of the most interesting and promising of these is the nanosatellite program being run by the U.S. Army’s Space and Missile Defense Command/Army Forces Strategic Command (SMDC/ARSTRAT) at the Redstone Arsenal in Huntsville, Ala. The SMDC-ONE nanosatellite is just what it sounds like: a small, 10 inch/25.4 centimeter long payload about the size of a small loaf of bread, lightweight (10 pound/4.5 kilogram) short lifetime (35 days on its first mission) LEO payload that amazingly, is designed to only cost between $300,000 and $400,000. The first SMDC-ONE nanosatellite was launched Dec. 8, 2010 on a SpaceX Falcon 9 rocket as a “piggyback” payload to their Dragon spacecraft prototype. Interestingly, SMDC-ONE was the first U.S. Army satellite launched in over 50 years, the first of eight such prototypes scheduled to be flown. Once SMDC-ONE separated from the Falcon 9/Dragon stack, it began its designed mission of overflying the SMDC/ARSTRAT headquarters building, and began uploading the data recorded by an untended ground-based network of sensors monitoring the parking lot outside the Von Braun Laboratory in Huntsville. The network included three sets of seismic motion and passive infrared sensors, which were seeded in concealed positions, feeding into a small ground station. Even in its relatively low orbit (200 miles altitude), SMDC-ONE had a horizon footprint with a 1,200 mile/1,970 kilometer radius, allowing it line-of-sight to another small ground station located at the SMDC/ARSTRAT Battle Lab in Colorado Springs, Colo. Then, 12 to 15 times a day, SMDC-ONE would overfly the ground stations (with line-of-sight windows of roughly 5 minutes per site), upload the packetized image/text data from the Von Braun Lab parking lot sensor net, and download it to the terminal at the SMDC-ONE Battle Lab. A secondary objective of the SMDC-ONE mission was the relay of real time voice and text message data relay between tactical radio systems. SMDC-ONE continued on its mission until January 12, when a power failure terminated its onboard functions. The next day its orbit decayed, and SMDC-ONE burned up in the atmosphere. But despite the short duration of SMDC-ONE’s mission, it is widely considered to be a completely successful evolution, which accomplished more than had ever been expected at launch. The impressive success of SMDC-ONE has SMDC/ARSTRAT readying additional nanosatellites for launch, four of which will reportedly be orbited in 2012. With the basic concept of nanosatellites now validated, SMDC/ARSTRAT are actively pursuing other roles and missions for these cheap, simple, and highly effective little birds. At the same time, SMDC/ARSTRAT is also pursuing the other aspect of getting nanosatellites into orbit: launch options. While SMDC-ONE was able to get a ride on an adapter shroud of the SpaceX Falcon 9/Dragon stack, they want to be able to make launching and replenishment of nanosatellite constellations independent of tradition LEO launch services. To this end, SMDC/AFSC is developing the Multipurpose NanoMissile System (MNMS), based upon hardware from the well-proven ATACMS/MLRS family of rocket artillery. Able to be stacked and put on a launcher in less than 24 hours and costing under $1 million a launch, NanoMissile is planned to carry up to 22 pounds/10 kilograms into LEO. This would allow regional military commanders to launch or augment their own nanosatellite constellations at will, providing assured space-based services at their discretion.
<urn:uuid:989a4567-d0a7-4107-a5eb-1cc08996d36e>
CC-MAIN-2013-48
http://www.defensemedianetwork.com/stories/nanosatellite-size-matters/
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163955638/warc/CC-MAIN-20131204133235-00037-ip-10-33-133-15.ec2.internal.warc.gz
en
0.950317
1,082
3.015625
3
Cut a circular piece of plywood to fit inside the lid of the largest tin to form a sturdy base. Using a compass, find the center of each tin, the lid, and the plywood piece. Drill holes into the centers of all the pieces large enough to fit the threaded rod. Put the plywood into the tin lid and place it onto the threaded rod, securing it with a washer and nut on the bottom. Thread on a nut a few inches above from the base and add the largest tin. Repeat for the two other tins. Adjust the heights of the tins to accommodate easy access to their contents. Mark the threaded rod inside the top tin, allowing an extra 3/4 inch for a washer and nut. Cut the threaded rod to this measurement with a hacksaw. File any sharp edges. Measure the distances between the tins to determine the lengths for the copper pipe. Using a pipe cutter, cut the copper pipe into sections using these measurements. Disassemble the stand, place the sections of copper pipe over the exposed threaded rod, and reassemble the stand.
<urn:uuid:3668cd70-8341-4716-960f-a19ddc8b01d0>
CC-MAIN-2014-35
http://www.bhg.com/crafts/easy/1-hour-projects/tin-crafts-supplies-organizer/
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535922763.3/warc/CC-MAIN-20140909044405-00154-ip-10-180-136-8.ec2.internal.warc.gz
en
0.872234
229
2.609375
3
The adult human eye ball is nearly a spherical structure. The wall of the eye ball is composed of three layers. Cornea: The external layer is composed of a dense connective tissue and is called the sclera. The anterior portion of this layer is called the cornea. Choroid: The middle layer, choroid, contains many blood vessels and looks bluish in colour. The choroid layer is thin over the posterior two-thirds of the eye ball, but it becomes thick in the anterior part to form the ciliary body. Ciliary Body: The ciliary body itself continues forward to form a pigmented and opaque structure called the iris which is the visible coloured portion of the eye. Lens: The eye ball contains a transparent crystalline lens which is held in place by ligaments attached to the ciliary body. In front of the lens, the aperture surrounded by the iris is called the pupil. The diameter of the pupil is regulated by the muscle fibres of iris. Retina: The inner layer is the retina and it contains three layers of cells – from inside to outside – ganglion cells, bipolar cells and photoreceptor cells. Photoreceptor Cells: There are two types of photoreceptor cells, namely, rods and cones. These cells contain the light-sensitive proteins called the photopigments. The daylight (photopic) vision and colour vision are functions of cones and the twilight (scotopic) vision is the function of the rods. The rods contain a purplish-red protein called the rhodopsin or visual purple, which contains a derivative of Vitamin A. In the human eye, there are three types of cones which possess their own characteristic photopigments that respond to red, green and blue lights. The sensations of different colours are produced by various combinations of these cones and their photopigments. When these cones are stimulated equally, a sensation of white light is produced. Optic Nerve: The optic nerves leave the eye and the retinal blood vessels enter it at a point medial to and slightly above the posterior pole of the eye ball. Photoreceptor cells are not present in that region and hence it is called he blind spot. At the posterior pole of the eye lateral to the blind spot, here is a yellowish pigmented spot called macula lutea with a central pit called the fovea. The fovea is a thinned-out portion of the retina where only the cones are densely packed. It is the point where the visual acuity (resolution) is the greatest. The space between the cornea and the lens is called the aqueous chamber and contains a thin watery fluid called aqueous humor. The pace between the lens and the retina is called the vitreous chamber and is filled with a transparent gel called vitreous humor. Mechanism of Vision - The light rays in visible wavelength focussed on the retina through the ornea and lens generate potentials (impulses) in rods and cones. - Light induces dissociation of the retinal from opsin resulting in changes in the structure of the opsin. This causes membrane permeability changes. As a result, potential differences are generated in the photoreceptor cells. This produces a signal that generates action potentials in the ganglion cells through the bipolar cells. - These action potentials (impulses) are transmitted by the optic nerves to the visual cortex area of the brain, where the nervous impulses are analysed and the image formed on the retina is recognised based on earlier memory and experience.
<urn:uuid:f196726b-f131-47c5-aea5-b3a50d9d5d4f>
CC-MAIN-2023-14
https://www.excellup.com/InterBiology/nervouscontrol_3.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948976.45/warc/CC-MAIN-20230329120545-20230329150545-00352.warc.gz
en
0.924142
754
4.125
4
"Ecological artworks are imaginative expressive "forms", through the medium of Nature, of our cosmic space, of a eulogized space we call "home", subjective images of our "interaction" with its natural processes. Ecological Art is a meditation on our existence in Nature through Nature, and so, the symbol is Nature itself, or is contained in it. The interested observer will not say: "this means Nature" but.."Look, this is Nature". An identification of symbol and meaning underlines this relationship.The principle of "creation" is the same in all the arts, because every work of art is wholly a creation. But a far-reaching principle may be considered in order to understand cross-relationships among the arts: Langer's principle of assimilation--poetry and music united in song, plastic art and music in dance, poetry and painting in a play with scenery, or all the arts creating opera. Ecological Art assimilates the "poetic imagination" and incorporates it among its formal elements."
<urn:uuid:5c64f10d-63bd-4c81-857c-c1ecfe6522c3>
CC-MAIN-2017-43
http://bigthink.com/articles/ecological-art-creative-process-by-nohra-corredor
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824894.98/warc/CC-MAIN-20171021190701-20171021210701-00893.warc.gz
en
0.937198
211
2.71875
3
On Thursday 23 July, from 17.00-19.00 BST, the Wilberforce Institute will host a webinar on the subject of Tacky’s Revolt. Tacky’s Revolt, or the Slave Rebellions in Jamaica, 1760-61, was the largest and most significant revolt in eighteenth-century British America and the most important revolt undertaken by enslaved people in the Caribbean before the Haitian Revolution of 1791-1804. It was a series of attacks made by enslaved people, many of whom were African and usually thought to have been Coromantee people from the Gold Coast of West Africa, in several parts of Jamaica. Jamaica at that time was Britain’s most valuable tropical colony and one in which the population was divided starkly between a small minority of privileged and often very wealthy whites and a large majority of harshly treated enslaved people of African descent. The rebels who joined in the revolts killed many whites, destroyed much plantation property and showed they were a formidable internal foe of British imperial rule. They very nearly succeeded in overturning white rule on the island. The rebellions were put down only with maximum effort and through the combined actions of British regulars, Jamaican Maroons (autonomous communities of people of African heritage) and the white militia. The imperial state’s retribution against rebels was ferocious, reflecting the terror a population of white Jamaicans experienced about how close they and their island society had come to disaster. This webinar will involve a stellar cast of invited academics, all with specialist knowledge in this area. Diana Paton, William Robertson Professor at the University of Edinburgh (author of The Cultural Politics of Obeah)will chair the session, which will see five academics discussing their understanding of the revolt. Our panellists are as follows: Vincent Brown, Charles Warren Professor of History at Harvard University (author of Tacky’s Revolt); Edward Rugemer, Associate Professor of History at Yale University (author of Slave Law and the Politics of Resistance); Lissa Bollettino, Associate Professor of History at Framingham State University (author of the forthcoming Slavery, War and Britain’s Eighteenth Century Atlantic Empire); Robert Hanserd, Assistant Professor of History at Columbia College, Chicago (author of Identity, Spirit and Freedom in the Atlantic World); and our very own Trevor Burnard, Wilberforce Professor in the Wilberforce Institute (author of Jamaica in the Age of Revolution). Erica Charters, Associate Professor of History at the University of Oxford (author of Disease, War and the Imperial State), will offer a final commentary, before we open the floor for questions. The aim is for each of the panellists to talk for a maximum of 10 minutes, beginning with a short discussion of their sources and the problems they present, before moving on to reveal the causes of the rebellion. The aim then is to give everyone present an opportunity to think about the different ways in which an event as important as Tacky’s Revolt can be interpreted when historians have only some of the sources they would like at hand. This webinar has now taken place. If you would like to see a recording of the event, please click on the link below. This will take you to a library of all our recorded webinars.
<urn:uuid:f63d3bd9-54ca-48ca-a312-a048e2567cea>
CC-MAIN-2023-14
https://wilberforceinstitute.uk/2020/07/20/wilberforce-institute-event-tackys-revolt/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950110.72/warc/CC-MAIN-20230401160259-20230401190259-00321.warc.gz
en
0.949932
703
3.171875
3
By the Water & Sanitation Rotarian Action Group (WASRAG) WASRAG, the Water & Sanitation Rotarian Action Group, reminds Rotary members of the vital role hygiene and sanitation play in disease containment. Good hygiene, especially hand washing, helps contain the spread of viruses like COVID-19 and polio. WASRAG encourages people to observe the hand washing techniques … More Collaborate with water, sanitation, and hygiene experts By the Water and Sanitation Rotarian Action Group World Polio Day was just celebrated on October 24. It was established by Rotary International to commemorate the birth of Jonas Salk, who led the first team to develop a vaccine against poliomyelitis. Use of this inactivated poliovirus vaccine and subsequent widespread use of the oral poliovirus … More How can clean water help eradicate polio? By Brian Carman, Past President of the Rotary Club of Vero Beach Sunrise, United States This project began as most Rotary projects do. I was invited to participate in a new effort by the Rotary Club of Vero Beach Sunrise to visit the Dominican Republic and learn about local efforts to improve drinking water. Three … More Changing lives through international service By the Water and Sanitation Rotarian Action Group (WASRAG) At this moment, 900 million people in the world do not have access to a source of safe water within 1 km of their home and 2.5 billion lack access to adequate sanitation. Women in developing countries walk an average of 6 km daily to … More Leap into action on World Water Day By Rotary Service and Engagement According to the United Nations, 2.1 billion people around the world still lack access to safely managed drinking water services and 4.5 billion people lack safely managed sanitation services. Unsafe hygiene practices are widespread, effecting people’s health. More than 340,000 children under five die annually from diarrheal diseases due to poor sanitation, … More Take action to provide water and sanitation By Azka Asif, Rotary Service and Engagement Staff Dr. Vasanth Prabhu from the Rotary Club of Central Chester County (Lionville) in the United States and Galo Alfonso Betancourt Criollo from the Rotary Club of Santa Rosa in Ecuador have been working together on humanitarian projects for over ten years. They first met at the District 4400 (Ecuador) … More Ecuador Project Fair leads to a long-term international partnership By Rotary Service and Engagement According to the United Nations, there are still 663 million people around the world that don’t have access to clean drinking water.* When people, especially children, have access to clean water, sanitation, and hygiene, they lead healthier and more successful lives. Rotary members integrate water, sanitation, and hygiene into education … More 5 ways to improve water quality and access to water By Azka Asif, Rotary Programs Staff Clean water is a basic human right that many are often denied. There are 2.5 billion people in the world that lack access to improved sanitation and 748 million people that don’t have clean drinking water. Nearly 1400 children die each day from diseases caused by lack of sanitation … More Celebrate Rotary Water and Sanitation Month! By Dickson Mugendi David Ntwiga, President of the Rotary Club of Meru, Kenya As we prepare to celebrate our eighth anniversary this year, the Rotary Club of Meru looks back at the journey traveled so far with enthusiasm and hope for the future. The positive impact our club has made in the Meru community (and … More Living “Service Above Self” in Kenya
<urn:uuid:a0ce2945-f180-42eb-aafb-d393b6d5a7e4>
CC-MAIN-2020-24
https://rotaryserviceblog.org/tag/clean-drinking-water/
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347432521.57/warc/CC-MAIN-20200603081823-20200603111823-00415.warc.gz
en
0.923945
748
2.578125
3
Plodda Falls, Glen Affric History, tourist information, and nearby accommodation HERITAGE HIGHLIGHTS: Set in a glorious late Victorian Douglas fir plantation Plodda Falls is a dramatic waterfall on the Abhainn Deabhag, a tributary of the River Affric. The falls are deep in glorious fir woodland on the south side of Glen Affric. The main falls plunge 151 feet (46m) almost straight down from a rocky outcrop to the river far below. A viewing platform juts out over the top of the falls so that visitors can look almost straight down from the top of the plume. Plodda forms part of the Glen Affric Nature Reserve and is managed by Forestry Commission Scotland. In the 19th century, the area formed part of Lord Tweedmouth's Guisachan estate. The manor house, now abandoned, stands between Tomich and Plodda. The estate name derives from the Gaelic words for 'the place of the pines'. Over the years 1895-1900 Lord Tweedmouth planted it with Douglas firs, highly prized for ship masts and for construction projects because of their long, straight trunks. Trees from Plodda were used for the mast of Captain Robert Falcon Scott's ship Discovery on his ill-fated Antarctic expedition. Lord Tweedmouth only saw these firs as saplings but now they are some of the tallest and most impressive in Scotland. Plodda is a bit different from other natural areas of Glen Affric. In all other areas the Forestry Commission is gradually removing non-native species but at Plodda non-native trees are the main attraction (apart from the waterfall itself). The area around Plodda is full of Douglas firs that make the forest an extraordinary experience to explore. There are two trails through the woodland at Plodda. The Plodda Falls Trail, as its name suggests, takes you to the waterfall itself. There are a few steep sections but generally, the going is moderate. The trail is about 1 mile (1.6km) and will take only 30 minutes to return. A longer option is the Tweedmouth Trail, stretching 1.5 miles (2.4km) and taking you through a glorious stand of Douglas fir trees planted by Lord Tweedmouth for his form Guisachan estate. This route will take about 1 hour in total and for part of the way it takes you along the old carriage drive to Lord Tweedmouth's mansion. Plodda Falls appears in our list of 22 Beautiful Scottish Waterfalls. The easiest way to access the falls is from the A831 from Drumnadrochit, heading north towards Cannich. Just before you reach Cannich the road takes a sharp right bend at the bottom of a hill. Turn left here onto a minor road signposted to Tomich. Look for the striking memorial to Lord and Lady Tweedmouth on the south (left) side of the road at the far end of the village. After Tomich, the road diminishes into a dirt road, but the route to Plodda is very well signposted. The road here is narrow and rough in places, with irregularly spaced passing places to let other vehicles past. About five miles past Tomich you will reach a large Forestry Commission car park at Plodda. Be aware that unlike most Forestry Commission car parks the park at Plodda is not free! A signposted trail leads through pleasant woodland to the viewing platform erected by the Forestry Commission to replace an earlier bridge built by Lord Tweedmouth in 1880. You could simply admire the falls from here, though I highly recommend following the path downhill to a viewing area at the base of the falls. Here you get a view of the whole plume as it plunges precipitously down the cliffs. Be careful, though. If there is any wind the spray from the waterfall can drench you! It is also very hard to take photos from the bottom of the waterfall as the camera lens is immediately covered in water droplets. Plodda Falls is one of four Forestry Commission sites in Glen Affric and the only one on the south side of the glen. The other three sites - Dog Falls, River Affric, and Loch Beinn aMheadhain - are all on the north bank of the River Affric, reached from Cannich or by a connecting road just east of Tomich. About Plodda Falls Address: Glen Affric, Tomich, Highlands, Scotland, IV4 7LY Attraction Type: Countryside - Waterfall Location: On a dirt road signposted from Tomich village in Glen Affric. Paid parking. Website: Plodda Falls Forestry Commission Scotland Photo Credit: David Ross and Britain Express NEARBY HISTORIC ATTRACTIONS Heritage Rated from 1- 5 (low to exceptional) on historic interest Glen Affric & Dog Falls - 2.7 miles (Countryside) Corrimony Chambered Cairn - 7.6 miles (Prehistoric Site) St Columba's Holy Well, Invermoriston - 9.9 miles (Historic Church) Allt na Criche Waterfall - 10.6 miles (Countryside) Fort Augustus Clansman Centre - 11 miles (Museum) Bridge of Oich - 13.1 miles (Historic Building) Divach Falls - 13.4 miles (Countryside) Falls of Foyers - 13.7 miles (Countryside) Nearest Holiday Cottages to Plodda Falls: Nearby accommodation is calculated 'as the crow flies' from Plodda Falls. 'Nearest' may involve a long drive up and down glens or, if you are near the coast, may include a ferry ride! Please check the property map to make sure the location is right for you.
<urn:uuid:5158808a-673e-4b8f-8eea-beec3d172654>
CC-MAIN-2023-50
https://www.britainexpress.com/scotland/Highlands/countryside/plodda-falls.htm
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100762.64/warc/CC-MAIN-20231208144732-20231208174732-00722.warc.gz
en
0.916003
1,241
2.75
3
Was Mary Poppins right when she said that a spoonful of sugar helps the medicine go down? She may have been onto something, but sadly, sugar offers zero nutritional value and no added health benefits. It’s basically empty calories that you’re filling your body with. That’s why it’s sometimes called sweet poison 😲 Sugar is also known as Sucrose (table sugar), which is a combination of two monosaccharides – glucose and fructose. Unfortunately, sugar is present in a lot more foods that we generally don’t think of as being sugary. Did you know that one of the main ingredients in most of your pantry foods and refrigerated sauces is sugar? Usually, sugar is added to foods under several different names. - Barley malt - Brown rice syrup - Corn syrup - Corn syrup solids - Diastatic malt - Ethyl maltol How is sugar jeopardizing my health? 💔 Refined sugar can wreck your health from head to toe. Let’s see how: - Brain: Sugar makes the brain produce a hormone called dopamine. The reward center in your brain releases dopamine in response to pleasurable experiences that lead to addiction. Additionally, excessive sugar does not allow the brain to function properly, which leads to depression, dementia, anxiety, and mood swings. - Heart: Consumption of extra sugar produces extra insulin in your bloodstream that can affect your arteries. Sugar causes the walls of your arteries to become inflamed, grow thicker than normal, and stiffen. This process stresses your heart and damages it over time, which ultimately leads to things like heart failure, heart attacks, and strokes. - Skin: As sugar is an inflammatory food, it causes inflammation within the body. Excess sugar can aggregate skin conditions such as eczema and acne. When sugar enters your bloodstream, it binds to proteins. When this happens, proteins incorporate the sugar as part of their structure, aging your skin and causing wrinkles. - Teeth: This is something our dentists have always told us, but in case you didn't know (or wanted to forget about it 😬), tooth decay is caused by bacteria in the mouth that feed on sugary foods and drinks to produce acids that damage the enamel of your teeth. - Liver: A high intake of carbohydrates (fructose) has been linked to an increased risk of fatty liver build up and cirrhosis. - Kidneys: Excessive sugar increases the kidney size and produces kidney stones. It also damages the kidney’s delicate filtration system. - Joints: If you’re suffering from joint pain, skip the sugar, as it can cause inflammation, worsen your pain, and eventually lead to arthritis. - Fertility: High blood sugar can cause infertility in both men and women. It also leads to erectile dysfunction in men and sexual arousal dysfunction in women. How to avoid excess sugar intake: - Eat whole and unprocessed foods - Check the food labels for different names of sugar - Avoid sugary drinks, and swap them out for herbal teas, water, or unsweetened options - Use stevia as a sweetener instead of sugar or syrups - Replace any sugary snacks with homemade natural snacks - Avoid takeaway food, and prepare your own meals at home If you’re ready to discuss a meal plan, and would like some guidance on healthy eating, make an appointment with one of our nutritionists today!
<urn:uuid:f8028cae-e049-4a12-bb46-9bdec0856d1c>
CC-MAIN-2023-40
https://www.eative.com/blog/sweet-poison-why-sugar-is-ruining-your-health
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506646.94/warc/CC-MAIN-20230924123403-20230924153403-00580.warc.gz
en
0.932123
749
3.1875
3
The city of Islamabad, though relatively young, has thousands of years of pre-construction history. Islamabad Capital Territory, located in the Potohar Plateau, is regarded to be one of the earliest sites of human settlement in Asia. Situated at one end of the Indus Valley Civilization, this area was the first habitation of the Aryan community from Central Asia. Islamabad was one of the routes though which the armies from North and North West passed to invade Indian Subcontinent. Many great armies such as those of Alexander the Great, Genghis Khan, Timur and King Abdali have used this route on their way to Indian Subcontinent. Relics and human skulls have been found dating back to 5000 B.C. that show this region was home to Stone Age man who used the banks of Swaan River as their settlement. Modern Islamabad is based on the old settlement known as Saidpur.
<urn:uuid:cbe5a50f-560c-4476-b897-41e81e8ac677>
CC-MAIN-2017-34
http://welc0m2myworld.blogspot.com/2009/08/islamabad-brief-history.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886120573.0/warc/CC-MAIN-20170823132736-20170823152736-00643.warc.gz
en
0.970334
185
2.8125
3
Proper plant care, including adequate sunlight, well-drained soil, and appropriate watering are essential for the success of this plant. Barbara Karst Bougainvillea is best grown outdoors in a warm, sunny location and requires regular pruning to maintain its shape and size. Plant in a location that receives full sun for a vivid bright red bract color. Light intensity affects the hue of Barbara Karst, shade will boost the blue tones leaning towards red-violet. Bougainvillea roots are highly sensitive to disturbance, be careful when planting; the root ball will be loose and crumbly as the roots do not stitch together with the soil. Do not pull the plant out of the pot as this will damage the roots. First, cut and remove the bottom of the plastic pot with shears, then position the plant & plastic pot in a hole, and slowly slide the pot over the plant, filling in with soil as you remove the nursery pot. If you are unable to slide the pot over the plant, then make some vertical cuts to the plastic pot that will allow you to easily remove from the plant and fill the hole with soil as you remove the container. Best in fast draining sandy soil. Water deeply and frequently the first few weeks to establish roots then reduce frequency. Thereafter, watering should be done infrequently but deeply. Water when the soil is dry. Bougainvillea in patio planters may require more frequent watering. Fertilizer may not be required but if you want to feed your bougainvillea, fertilize in spring during active growth. A second application may be needed for plants in containers in early summer. To maintain the shape and size of the Barbara Karst Bougainvillea Staked, prune it back to the desired height and shape. In frost free climates, prune after flowering. In colder regions prune after the danger of frost has passed. Prune selectively during the growing season to shape and direct growth if needed. Make sure to use sharp, clean pruning shears and cut just above a leaf node. Bougainvillea have 1-2 inch long thorns, use care when pruning. Native to tropical and subtropical areas of South America, Bougainvillea are evergreen in frost free climates and semi-evergreen in mild climates with minimal frost. Bougainvillea may drop most of its leaves during winter. Plants purchased in late fall through winter will not be lush with growth but can still be planted, following instructions above. Bougainvillea is a sprawling woody vine and does not naturally attach itself to structures. The use of ties or wires are needed to attach Bougainvillea to a structure that can withstand strong gusts of wind. It is important to note that the Barbara Karst Bougainvillea Staked is not suitable for indoor growth as it requires full sun exposure and can reach a height of over 20ft. They are best grown outdoors in a warm, sunny location.
<urn:uuid:c436a38c-5be5-4f9a-a31f-338fe73961f9>
CC-MAIN-2023-50
https://plantsexpress.com/products/barbara-karst-bougainvillea
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679102612.80/warc/CC-MAIN-20231210155147-20231210185147-00103.warc.gz
en
0.919111
618
2.53125
3
How To Surf The Dark Web Only a tiny portion of the internet is accessible through a standard web browser—generally known as the “clear web”. The terms “deep web” and “dark web” are sometimes used interchangeably, but they are not the same. Deep web refers to anything on the internet that is not indexed by and, therefore, accessible via a search engine like Google. Deep web content includes anything behind a paywall or requires sign-in credentials. It also includes any content that its owners have blocked web crawlers from indexing. Infamous criminal sites live there, but so do popular, well-known sites and brands. To maintain anonymity, all transactions on the dark web are conducted with Bitcoin, a virtually untraceable digital currency, and other types of digital currencies. As a result, dark web users can interact, communicate, share files and conduct business confidentially. The dark web is also unregulated, meaning that it is run and upheld by a vast network of individuals around the world. This network contains thousands of volunteers who operate proxy servers to route dark web requests. Alphabay Market Onion Link If you need a great Tor VPN, I recommend ExpressVPN— all its servers allow Tor traffic, it has excellent security and privacy features, and it provides fast browsing speeds. That’s helpful because Tor can suffer IP leaks and malicious actors can run Tor servers. Basically, if a Tor IP leak occurs before you connect to the VPN, your real IP address will be exposed. But if you connect to the VPN before connecting to Tor and an IP leak occurs, only the VPN’s IP address will be exposed. Start using .onion links to surf your favorite sites on the dark web. Some people use this anonymity for illegal reasons, but the dark web’s privacy protections are crucial for activists and whistleblowers. Dark web domains can be vital for those living in countries where free speech is limited or banned and who want to share information or organize without being prosecuted. The legality of accessing the dark web varies from country to country. - For those who have endured harm at the hands of others, they may not want their attackers to discover their conversations about the event. - If you want to see if any of your information is floating around the dark web, try running a scan of the dark web. - Basically, the sites you use daily — from your favorite news site to a local restaurant — are part of the surface web. - These websites may look similar to any other surface or deep website you’d encounter. You can buy a wide range of legal goods and services on dark web marketplaces. There are also some illegal things for sale, as detailed in the Dark Web Price Index 2021. When making purchases on the dark web, protect yourself by using anonymized account information and cryptocurrency whenever possible. The dark web was created not long after the first message was sent in 1969 over the original internet, ARPANET. Covert networks — or darknets — emerged quickly to provide users with private networks to communicate on. Dark Web Onion Links Do not make the mistake of thinking the TOR browser guarantees full anonymity and safety, the Reality is far from that and very complex. I will write about the dangers of compromised exit nodes in the TOR Network in a future. It’s really strange that the world’s largest social media platform would have a .onion address, but there you are, Facebook it is. This part of Facebook was supposedly developed by them to cater to those who want a social network that’s anonymous. However, the hidden web browser gets the job done, and is a great alternative if you’re looking for something other than the Tor darknet Browser. All you need to do is access the settings and route your browser to connect through the Tor Network, instructions for which you should be able to find online. Below, we’ve listed eight of the best Dark/Deep Web browsers, making it easy for you to choose the hidden web browser that’s right for you. Overlay network that is only accessible with specific software or authorization. Change your passwords – criminals could gain access to your accounts and steal sensitive information if your password is compromised. Be sure to use strong, unique passwords for each account. Accessing the Darknet / Dark Web Google and other popular search tools cannot discover or display results for pages within the dark web. Venturing further into the deep web does bring a bit more danger to the light. For some users, portions of the deep web offer the opportunity to bypass local restrictions and access TV or movie services that may not be available in their local areas. Others go somewhat deeper to download pirated music or steal movies that aren’t yet in theaters. You might want to hide your Tor Browser download using a VPN and your existing browser’s private/incognito mode. You can access the dark web on mobile with a dedicated dark web browser app. Install a mobile dark web browsing app — like Tor browser for Android or the Onion browser for iPhone — and enter a onion URL to start browsing. Then individual applications must each be separately configured to work with I2P. On a web browser, you’ll need to configure your browser’s proxy settings to use the correct port. Always exercise extreme caution when using publicly posted onion URLs. How To Enter The Dark Web Tor was originally developed to help safeguard US Intelligence online communications. Today, it is one of the few ways to access Dark Web Sites. I manually manage music, but podcasts and apps are synced so that everytime I connect my iPod it downloads the latest podcast, for example. Think twice before you click any link as you do not know who operates the website and where any of these links lead to.
<urn:uuid:084b892f-4988-4c6e-9b82-86605778ba70>
CC-MAIN-2023-14
https://tormarketslink.com/how-to-surf-the-dark-web/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949387.98/warc/CC-MAIN-20230330194843-20230330224843-00322.warc.gz
en
0.912042
1,202
2.609375
3
This course examines the interaction between different racial groups in the U.S. from the 19th century to the present. Conventionally, such studies focus solely on the hackneyed Black-white paradigm of U.S. race relations. This seminar explodes that dichotomy, searching for a broader historical model, including yellow, brown, red, and ethnic white. We will critically interrogate the history of contact that exists between these diverse “groups,” and whether conflict or confluence dominates their interaction. If conflict, what factors have prevented meaningful alliances? If confluence, what roles have these groups played in collectively striving for a multiracial democracy?
<urn:uuid:9c685b80-8382-4b9b-8f25-17d86d87f962>
CC-MAIN-2014-10
http://www.lsa.umich.edu/cg/cg_detail.aspx?content=1610CAAS104001&termArray=f_06_1610
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394011192582/warc/CC-MAIN-20140305091952-00099-ip-10-183-142-35.ec2.internal.warc.gz
en
0.930257
134
3.5
4
A fire emergency evacuation plan (FEEP) is a written document which includes the action to be taken by all staff in the event of fire and the arrangements for calling the fire brigade. It can include any relevant information in relation to the FEEP. General Fire Notice For small premises this could take the form of a simple fire action sign posted in positions where staff and relevant persons can read it and become familiar with its contents. Staff Fire Notice High fire risks or large premises will need more detailed emergency evacuation plan which takes account of the findings of the risk assessment, e.g. the staff significantly at risk and their location. In addition notices giving clear and concise instructions of the routine to be followed in case of fire should be prominently displayed. An Example Fire Escape Plan The following fire escape plan was provided by silverbearfire.co.uk In certain cases you should nominate persons to implement the fire action plan and give them adequate training in fire fighting and evacuation procedures. The following items should be considered where appropriate; - Fire evacuation strategy - Action on discovering a fire - Action on hearing the fire alarm - Calling the fire brigade - Power/process isolation - Identification of key escape routes - Fire wardens/marshals - Places of assembly and roll call - Fire fighting equipment provided - Training required - Personal Emergence Evacuation Plan - Liaison with emergency services Fire evacuation strategy You need to consider how you will arrange the evacuation of the premises in the light of your risk assessment and the other fire precautions you have or intend to put in place. In most premises, the evacuation in case of fire will simply be by means of everyone reacting to the warning signal given when a fire is discovered, then making their way, by the means of escape, to a place of safety away from the premises. This is known as a simultaneous evacuation and will normally be initiated by the sounding of the general alarm over the fire warning system. Vertical Phased Evacuation. In some larger complex premises, the emergency arrangements are designed to allow people who are not at immediate risk from a fire to delay starting their evacuation. It may be appropriate to start the evacuation by initially evacuating only the area closest to the fire and warning other people to stand by. This is normally done by immediately evacuating the floor where the fire is located and the floor above. The other floors are then evacuated one by one to avoid congestion on the escape routes. The rest of the people are then evacuated if it is necessary to do so. The fire warning system should be capable of giving two distinctly different signals (warning and evacuation) or give appropriate voice messages. Horizontal Phased EvacuationIn hospitals, and care homes the floor maybe divided into a number of fire resisting compartments and the occupants are moved from the compartment involved in fire to the adjacent compartment and if necessary moved again. Depending onto the fire situation it may eventually be necessary to consider vertical evacuation. Because of the extra time this type of evacuation takes, other fire precautions maybe be required. These include: - voice alarm systems - fire control points - compartmentation of the premises using fire-resisting construction - sprinklers in buildings where the top floor is 30 metres or more above ground level Staff Alarm Evacuation (Silent Alarm) In some cases it may not be appropriate for a general alarm to start immediate evacuation. (Cinemas and Theatres) This could be because of the number of members of the public present and the need for the staff to put pre-arranged plans for the safe evacuation of the premises into action. In such circumstances a staff alarm can be given (by fire records, personal pagers, discreet sounders or a coded phrase on a public address system etc). Following the staff alarm, a more general alarm signal can be given and a simultaneous or phased evacuation started. The general alarm may be activated automatically if manual initiation has not taken place within a pre-determined time. Defend in Place This strategy may be considered in blocks of flats were each flat is a minimum 60 minutes fire resisting compartment. It may also be considered in hospitals or nursing homes were patients are connected to life supporting equipment and cannot be moved. The concept allows the occupants to stay put and allow the fire service to extinguish the fire. If the fire spreads and it cannot be controlled then they will initiate a full evacuation. In the case of patients connected to life supporting equipment then a decision would have to be made which option is the best, stay or move, either way the patient would be at serious risk. You should only plan to use defend in place or phased evacuation schemes, or a staff alarm system, if you have sought the advice of a competent person and the fire and rescue service. Action on discovering a fire: On discovering a fire, it is the duty of every person to sound the nearest fire alarm immediately. The plan should include the method of raising the alarm in the case of fire. Action on hearing the fire alarm The plan should instruct all personnel upon on hearing the fire alarm to act in accordance with the agreed FEEP strategy and if a fire warden’s scheme is in force they, on hearing the alarm, should proceed to pre-determined positions to assist members of the public and staff to leave the building by the nearest safe route. Lifts and escalators should not be used due to possible electrical failure unless they are part of a Personal Emergency Evacuation Plan. Personnel should not re-enter the building with the possible exception of the Fire Team. Calling the fire brigade The Fire Service should also be informed immediately, either by switchboard operator or person discovering fire, dependant on conditions. - Work Time – Switchboard operator to be conversant with the emergency evacuation plan, also should ensure necessary extensions switched through, when switchboard is unattended. - Other Times – Remainder of Staff (Cleaners, caretakers etc) also to be conversant with procedure. In any case the senior official should ensure that Fire Service is called in the event of an outbreak of fire. Close Down Procedure – Adopt your own ‘ Close Down’ procedure as appropriate Identification of key escape routes In premises where members of the public or persons unfamiliar with layout of the premises are present there should be means available to identify the key escape routes. They could include schematic drawings supplemented with a satisfactory emergency escape signs. The Responsible Person where necessary to safeguard the safety of employees should nominate employees to implement certain fire safety measures which will include the fire evacuation. The general term used for these people are fire wardens or fire marshals. The need for fire wardens depends on the size and complexity of the premises. You may require one on each floor or department with a chief fire warden coordinating their actions to make sure all persons are accounted for in the event of a fire. They also require special training above the needs of the normal employee, this training could be in house or by an external fire training organisation. They should be competent in the use of fire extinguishers and be capable of extinguishing small fires. They should have some knowledge of fire prevention and be able to identify possible fire hazards to prevent fire from occurring. Finally they should have an in depth knowledge of the FEEP and their role in implementing it. The duties and responsibilities of Fire Wardens/Marshals A senior official in each building [Chief Fire Warden] should be given the responsibility of maintaining a high standard of fire precautions and the overall responsibility for the action in the event of fire. He/she should have a nominated deputy. Evacuation fire wardens should be appointed for each room/department/floor as applicable and each warden should have a nominated deputy. Fire Wardens/Marshals should be responsible for - Fire routine and evacuation drill procedure - Ensuring personnel know location of fire alarm points. - Ensuring regular use of primary and secondary escape routes. - The close down procedure - Procedure for nominated staff to assist employees and members of the public to nearest exits. A senior fire warden/marshall should be made responsible for ensuring that notices are correctly sited the fire emergency evacuation plan is properly distributed and under stood by all. Places of assembly and roll call Personnel should assemble at a pre-determined assembly point. - Pre-determined assembly points should be arranged and a roll call of staff to be taken. The person who is in charge of the assemble point should report to the person who as been nominated the fire service liaison person indicating all persons accounted for or whose missing and where they were last seen. - Another consideration when selecting the location for an assemble site is to fully understand the fire emergence evacuation plan. Calculate the number of staff that would need to assemble and if it was a multi-occupied building you would need to co-operate with the other occupants. - It is also very important to be familiar with the surrounding topography. - The assemble point should be far enough away from the building not to put staff in danger of radiated heat and falling debris. Give ample room so you do not interfere with fire fighting operations and do not jeopardise the actions of the fire service. - Be close enough to ensure that the nominate person who is in charge of the assemble point; can communicate with the nominated fire liaison person who should be located near the main entrance. This could be simple talking to him direct, or the use of runners or electronic communications (pack sets, mobile phone) - The area chosen should be larger enough to accommodate all the staff, if this cannot be found you may have to consider additional sites. Open areas are ideal like pedestrian areas also car parks could be considered but be aware of the dangers. - It should not be in an enclosed area and the staff should be able to disperse without the need to pass close to the premises on fire. - Inclement weather needs to be considered and some form of shelter or other weather protection may be necessary as the staff are most likely to have evacuated without collecting their out of doors clothing. - Use appropriate signs where this is feasible as it leaves no doubts in the minds of staff Fire fighting equipment provided A nominated fire team if available or any trained competent person should where possible attack fire with appropriate equipment however fire fighting is always secondary to life safety. DO NOT PUT ANY PERSONS AT RISK. The emergency evacuation plan should be the subject of frequent training so all employees are familiar with its contents and there should be regular evacuation drills. You are required to carry out this fire training and it is recommended that you keep a record of the results of that training. This will assist you if you are ever required to prove your actions in the future. The fire emergency evacuation plan must be included in the instruction and training you need to give your employees. Effective fire routine is dependant on regular instruction, training, practice, etc. Regular drills should be carried out using varying escape routes assuming the normal evacuation route is not available. Fire drills should consider the following points: - Regular intervals - Records kept - There should be drills completed at least once a year, from sounding of alarm to roll call procedure - Fire Alarms and Fire Fighting Equipment should be tested at weekly intervals and records kept - Fire equipment regularly serviced I would suggest you seek the advice of a competent person and do not finalise your proposals until you have his/her comments. Personal Emergency Evacuation Plan (PEEP) In order to assist disabled or sensory-impaired people to escape from fire it may be necessary for staff to be trained in the correct procedures to cope with this eventuality. Advice on the specific needs of disabled and sensory-impaired people can be obtained from organisations representing the various groups. The address and telephone number of these organisations can be found in the telephone directory, listed under the appropriate disability. You must take account not only of the people in your premises (employed or otherwise) who may be able to make their own escape, but also those who may need assistance to escape, e.g. by having adequate staffing levels especially in premises providing treatment or care. Liaison with emergency services You should arrange all the necessary contacts with external emergency services and make them familiar with your fire action plan. There should be senior person nominated to meet the fire and rescue service when they arrived to provide them with any information they require. S/he should have an intimate knowledge of the premises and be in contact with the person conducting the roll call at the assemble point.
<urn:uuid:cc51638c-fb96-4147-99ed-22e955f66c97>
CC-MAIN-2014-35
http://www.firesafe.org.uk/fire-emergency-evacuation-plan-or-fire-procedure/
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535917463.1/warc/CC-MAIN-20140901014517-00442-ip-10-180-136-8.ec2.internal.warc.gz
en
0.939041
2,600
2.875
3
(President Lyndon Johnson signing the 1965 Voting Rights Act) Reading Jon Meacham’s latest historical work, THE SOUL OF AMERICA: THE BATTLE FOR OUR BETTER ANGELS at the same time as the federal government is separating immigrant families into “relocation centers” reminiscent of Japanese internment camps during World War II is extremely disturbing. It is not a stretch to label the Trump administration’s immigration policies as racist when one considers the language and comments of those like Steven Miller and company, especially the president. However you describe the facilities that parents and children are separated and housed in together, it is un-American for the media and members of Congress to be barred from investigating what is going on behind those chain linked fences. President Trump may tweet his racist rationalizations and comments that have little or no basis in fact all he wants, but what is clear is that he has a different agenda than the majority of the American people. Meacham’s overall thesis is that the current political turmoil we find ourselves in is not unprecedented and as a nation we have survived worse. Let us hope that he is correct but after events like Charlottesville, talk of Mexican rapists, vicious attacks on anyone who disagrees with the administration, the Mueller investigation, the fecklessness of Congressional Republicans, and President Trump’s admiration for dictatorships around the world, at the same time as he is exhibiting disdain for America’s democratic allies, I fear that Mr. Meacham may be overly optimistic. For those who have read Meacham’s works on Roosevelt and Churchill, Andrew Jackson, George H.W. Bush, and Thomas Jefferson his current effort should not disappoint. Meacham’s monograph is well written and researched as are all his previous books. He has the ability to expose the reader to a useful overview of American history that assists in our understanding of events. The author points out that he has not written his work because past presidents have always risen to the occasion, but because President Trump rarely, if ever does. A major theme of the book is that America will usually choose the right path when encouraged from the top. Meacham’s discussion of the historical roots of fear in our history are apropos as in today’s politics as President Trump seems to rest each statement and policy on ginning up his base through the application of fear. We must remember that “fear divides, hope unifies.” Meacham concentrates on the twin tragedies in our nation’s history, the subjugation of people of color, and the justification of policies that infringe upon the rights of citizens justified through the concept of the “expansion of liberty.” The creation of the presidency by the Founding Fathers was “an act of faith in the future and an educated wager on human character.” The problem is that throughout our history such hopes have not always been realized. |March on Washington for Jobs and Freedom| After reviewing a number viewpoints dealing with the presidency, the ideas of Thomas Jefferson sum it up best; “in a government like ours it is the duty of the Chief-magistrate, in order to enable himself to do all the good which his station requires to endeavor, by all honorable means, to unite in himself the confidence of the whole people,” not just those who voted for him. Meacham delves into the philosophical foundations of America’s creation in detail. He explores the likes of John Locke, Adam Smith, James Madison, Thomas Jefferson, and John Adams concluding that the president is a reflection of the needs and wants of the American people. The character and temperament of the Chief Executive are of paramount importance when trying to unite the general population behind a program that is supposed to meet the needs of all. By discussing the approaches taken by men such as Thomas Jefferson, Andrew Jackson, Abraham Lincoln, Theodore Roosevelt, Franklin Roosevelt, and Lyndon Johnson it makes it difficult to accept the demeanor and character of the current occupant of the White House. The author does an excellent job introducing each case study at the outset of each chapter. He places events and characters in their proper historical context and allows the reader insights into the issue at hand, and creates continuity for the examples he puts forth. This is evident in perhaps Meacham’s best chapters dealing with immigration and white nationalism. He makes the important point that to understand the resurgence of white nationalism today, furthered by Trump’s “dog whistle” approach to race one must return to the immediate post-Civil War period and the failure of Reconstruction. The parallels with the latter part of the 19th century, the 1920s, and today in terms of racial issues and hatred, are very discomforting. Many white American feared a post slavery society in which emancipation led to equality, and they successfully ensured through lynching’s, denial of equal education and voting rights, that no such equality would come to pass. Immigration has also been seen as a threat to white Americans as millions arrived between 1890 and 1910. The reaction that produced the Ku Klux Klan is important to contemplate because some of the issues that prevailed in America are similar to today. For the post-Civil War period that produced the first Klan, and the 1920s that produced the second Klan we witness massive industrialization and urbanization which transformed the old agrarian world. The Klan promised racial solidarity and cultural certitude. The issue of jobs, neighborhoods, religious rights, immigration all affected how Americans felt about the future, a future where whites believed that they were losing their country to non-whites. The Klan and men like Huey Long and Father Coughlin in the 1930s gave their adherents a social and political program that spoke to their fears at the moment and to the “mythology of identity.” The 1920s sought a wall against southern Europeans, today Trump wants a wall against Mexicans and Central America. Perhaps the man who most epitomizes the tactics, character, and temperament of President Trump is Senator Joseph McCarthy. While Trump wishes he had his own Roy Cohn, McCarthy actually had him. Cohn, a New York lawyer who advised McCarthy and later worked with Trump describes McCarthy; “he was impatient, overly aggressive, and overly dramatic. He acted on impulse. He tended to sensationalize the evidence he had….He would neglect to do important homework and consequently, would on occasion, make challengeable statements.” McCarthy was a master of the news cycle and probably the author of “fake news “as he dominated politics between 1950 and 1954, and caused so many who were accused as being soft on communists or communists themselves to lose their jobs and place in society, but as Meacham might argue we as a nation overcame his negative impact and moved on. Since Cohn’s description fits Trump to a tee, hopefully once he is out of office the same thing will occur. The most important chapter in the book deals with Lyndon Johnson. After not heeding the warning that he could lose the south for the Democratic Party for a generation he pushed through the 1964 Civil Rights Act. Further, Johnson, a white southerner led the fight that resulted in the 1965 Voting Rights Act. Johnson’s work reflected an unusual character and temperament that allowed him to beat back the George Wallace’s of the age and show what the true “soul of America” could be. As he stated in his address to Congress on March 15, 1965, “For with a country as with a person, what is men profited, if he shall gain the whole world, and lose his own soul?” Today, I wonder what the evangelical leadership thinks when they support Trump’s tweet and actions when they consult Jesus from the Gospel of St. Mark? For Meacham, his book is one of optimism and hope arguing that after each period of reaction and racism it has been followed by elements of the good in our society. He makes it sound like the business cycle and that it is inevitable that the evil purported by the Trump administration will eventually be replaced by what really made America great once he is out of office. Meacham‘s work is an easy read, but do not mistake the substance that lies behind it. (President Lyndon Johnson signing the 1965 Voting Rights Act)
<urn:uuid:4b829d9c-424d-4fb9-9c32-c5359b45251a>
CC-MAIN-2020-05
https://docs-books.com/2018/06/27/the-soul-of-america-the-battle-for-our-better-angels-by-jon-meacham/
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250592261.1/warc/CC-MAIN-20200118052321-20200118080321-00289.warc.gz
en
0.96889
1,713
2.734375
3
At this point Tubman came up with the idea of the Underground Railroad. After she escaped she successfully she was determined to pave the way to freedom to others. Tubman carefully planned and accomplished thirteen missions to rescue approximately seventy enslaved families and friends using the network of antislavery activists and safe houses now known as the Underground Railroad. She later assisted abolitionist John Brown to recruit men to participate in the raid on Harpers Ferry. In addition to her assisting John Brown, Tubman was an active participant in the post-war era in the struggle for women 's Undoubtedly, Harriet Tubman was the most influential abolitionist of the early to mid-1800s. Born a slave in 1820, Tubman escaped her plantation in 1849, and returned 19 times to rescue over 300 enslaved people. Tubman was called “Black Moses” because she, like Moses of the Old Testament, led her people out of persecution and into freedom. She had narcolepsy (a mental disorder that causes one to fall asleep randomly) but still served as a nurse, a scout, and a spy for the Union during the Civil War. Firstly, Tubman took the risk of returning to her old plantation 19 times to rescue upwards of 300 slaves, and didn’t lose a single one in the process. This shows legitimate bravery because she could’ve easily been captured, or worse, killed, She is an important activist who wanted slaves to be free. In 1820-ish, she was born to enslaved parents, she knew what is was like to be a slave. Her owners sold her siblings to other plantations. After her three sisters were sold, Tubman’s mother wouldn’t tolerate any more of her family members to be sold. This set an important example for Tubman. She received many injuries do to getting hit. “Harriet later recounted a particular day when she was lashed five times before breakfast … encountered a slave who had left the fields without permission. The man’s overseer demanded that Tubman help restrain the runaway. When Harriet refused, the overseer threw a two-pound weight that struck her in the head.” (bio.com) She than had many seizures and headaches from then on. Harriet successfully escaped to the North, despite her physical problems, when she was about 29 year old. She landed in Philadelphia, where she felt wonderful. It was like her world lit up. Then she did something you probably wouldn’t do, she went back! Instead of staying safe, she left to rescue family and non-family. This was a huge risk because the reward for her was a HUGE amount. She didn’t let that bother her as it did with her brothers. She believed that every slave should be free and equal so she made many more trips to rescue people. But then the law made it slightly more difficult for Harriet. In 1850 they passed a law that said the escaped slaves could be recaptured in the North. But she then simply led the slaves to Canada, where they couldn’t be recaptured. She believed hard enough that slaves should be free and equal that the government law shouldn’t be followed or Harriet Tubman was an extraordinary heroine. She was brave herself in saving many lives, including her parents. She was a heroic person doing heroic actions; saving people when her life depended on it. At one point, since Harriet was saving so many people, she was worth around $40,000. Yet Harriet was not taught math and science, in fact, she was an illiterate person, but she was smarter than the slave overseers and the masters. Harriet was a heroine; hero, for being such a kind, translucent person. Harriet knew her weaknesses and her strengths, but her strengths hid her weaknesses in the shadows. It was as if nobody knew her weaknesses, but there was one that everyone knew; a serious brain injury. Harriet was not just an ordinary or extraordinary Harriet tubman played a very important role in slavery. She had a major role by helping free slaves she was the conductor of the underground railroad which was used to help free slaves she was also very caring by helping create fundraisers for slaves without shelter or food.Harriet Tubman has made a difference in many people 's lives, not only by freeing slaves.Born a slave in Dorchester County, Maryland, Harriet Tubman was beaten and whipped by most of her masters as a child. One time she suffered a traumatic head wound when a slave owner threw a heavy metal weight that was supposed to hit another slave but hit her instead. The injury caused dizziness, pain, and spells of hypersomnia, which occurred throughout her life. Harriet Tubman was a Christian and experienced strange visions and vivid dreams, which she said was from God.Harriet Tubman is one of the most In conclusion, this essay is important to know about because this stuff still happens today. Human trafficking exists and people like Harriet Tubman are able to take a stand and work on the problem. People are put into a form of slavery and forced to work there. The modern day underground railroad was established by victims like Harriet Tubman and still works. I hope this inspired you to make a difference and continue her dream of no slavery. That is why she is very important and also why she will be on the 20 dollar In Harriet’s younger days she received a severe blow which was severe for a long time, and made her very sluggish or underactive. At some point during her formative years, Araminta took her mother's name, Harriet. In 1844, she adopted the surname of her first husband, a free African American named John Tubman. The couple had only been married for five years when Harriet decided that she too would enjoy the taste of freedom, by running away. Born a slave on Maryland’s eastern shore, she endured the harsh existence of a field hand, including brutal beatings. “Mah people mus’ go free,” her constant refrain, suggests a determination uncommon among even the most militant slaves. Harriet Tubman was a very important person in the history of slavery. She played a major role in helping free slaves. Harriet Tubman has made a difference in many slaves’ lives. She was a helpful and caring person. Tubman believed in the equality of all people, black or white, male or female, which made her sympathetic to the women’s rights movement. Tubman’s role was not that of a leader but that of a strong supporter. As a woman In conclusion Harriet Tubman was one of the bravest women of the nineteenth century. She risked her life to helps other enslaved Africans that were in need of help, to achieve their freedom. “Harriet Tubman devoted her life towards the abolition of slavery. She is an inspiration to many for her relentless struggle for equality and civil rights. She is one of the most notable figures in Have you ever hear or read about these three articles called “ How Jackie Robinson Changed Baseball “ , “ The Underground Railroad “ , and “ The Story of Ida B. Wells “ ? If you haven’t well you will hear about them right now . These stories are actually kinda inspiring. Jackie Robinson was known for changing baseball. The non colored people would treat him terrible for being black , he didn’t care nor fight back . He would continue to play baseball like normal , he was a true role model for many people.Harriet Tubman was a slave herself but escaped and still helped others escape through the underground railroad . Ida B. Wells faced discrimination and spoke against it . Although Jackie Robinson , Harriet Tubman and Ida B. Wells had many different Harriet Tubman (born Araminta Ross c 1822 -. 10/03/1913), was African American, humanitarian, and, during the American Civil War spy abolitionist Union. Born into slavery, Tubman escaped and subsequently made thirteen missions to rescue his friends and about seventy slave family, using the network antislavery activists and safe houses known as subways. Abolitionist later helped John Brown recruit men for his attack on Harpers Ferry, and in the postwar era struggled for women 's Harriet Tubman mostly known for her abolitionist work was a very influential woman that saved many slaves’ lives. She was born into slavery with siblings and parents by her side. She died on March 10, 1913, but is still remembered for all of her work. Harriet Tubman had a hard life in slavery, worked in the Civil War, rescued slaves, worked on the underground railroad and can be compared to Nat Turner who also lived in the period of time when there was slavery. Is Harriet Tubman really a courageous woman ?Harriet Tubman was an African American super woman who escaped from slavery in the South to become a leading abolitionist. Although we aren’t dealing with the issue of slavery today, there are a lot of other modern- day issues going on in society where we could use a leader like Tubman. Its people like her that really leave a mark in this world and are not lost in an abyss of all the others. Not because of a huge world war she was a part of, but because she helped put an end to some form of corruption, because she helped. One of the things that really stands out to me when I think of Harriet Tubman though, is that she gave many other people the chance to help society out too. She gave them all the chance to leave a mark on this world. She is not only a leader, but a teacher. She was and is a role model that everyone should The Civil War was a horrid event that greatly affected our modern day lives. From 1861 to 1865 the Union and the Confederates fought to protect what they thought was right. Throughout the war many people turned up and encouraged change in areas they believed were lacking thought such as, abolition, women 's rights, and suffrage. One of this people was Harriet Tubman. Harriet Tubman was an abolitionist, which means that she was against slavery. She helped develop the underground railroad, which helped many slaves escape to freedom. The American Civil war lasted for four years from 1861-1865. The war occurred because of a controversy on differences of beliefs, with the primary reason being slavery and state’s rights. The war resulted in the killing of over 600,000 soldiers. The war had a lot of advances in American culture. This began the first military draft, advances in war via ships, and newer forms of guns. The war divided the North (Union) and the South (Confederate) by states and the war ultimately ended with the victory of the North.
<urn:uuid:d34d9642-3e4f-472e-99bb-7e71cd6f2cde>
CC-MAIN-2023-23
https://www.ipl.org/essay/Why-Is-Harriet-Tubman-A-Hero-FJMBP44RU
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646350.59/warc/CC-MAIN-20230610200654-20230610230654-00200.warc.gz
en
0.987117
2,209
3.96875
4
This month’s CES saw the introduction of max speed DDR5 memory from SK Hynix. Micron and other vendors are also reportedly sampling similar devices. You can’t get them through normal channels yet, but since you also can’t get motherboards that take them, that’s not a big problem. We hear Intel’s Xeon Sapphire Rapids will be among the first boards to take advantage of the new technology. But that begs the question: what is it? Broadly speaking, there are two primary contenders for a system that needs RAM memory: static and dynamic. There are newer technologies like FeRAM and MRAM, but the classic choice is between static and dynamic. Static RAM is really just a bunch of flip flops, one for each bit. That’s easy because you set it and forget it. Then later you read it. It can also be very fast. The problem is a flip flop usually takes at least four transistors, and often as many as six, so there’s only so many of them you can pack into a certain area. Power consumption is often high, too, although modern devices can do pretty well.
<urn:uuid:af892504-21a7-4c8d-a6c0-a41564e1bcb3>
CC-MAIN-2023-23
https://hackaday.com/tag/ddr5/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644683.18/warc/CC-MAIN-20230529042138-20230529072138-00263.warc.gz
en
0.966238
249
2.765625
3
Unfair Competition Defined Unfair competition is the ”common law” branch of trademark and other intellectual property infringement, wherein dilution and trademark infringement are the more specialized and statutory forms of unfair competition related to trademarks. Unfair competition acts as an umbrella for all statutory and non-statutory causes of action arising out of business conduct that is contrary to honest business practices. Unfair competition results in being more of a catch all for unregisterable market distinctiveness that holds a competitive advantage. Given that fair competition is legal and necessary for a strong economy, unfair competition attempts to facilitate an avenue for a cause of action when an individual or entity uses another’s assets or competitive advantage or passes it off as his or her own. This does not necessarily have to involve a trademark, but could be almost anything of value to a competitor; this goes along with the saying that one should not reap what they have not sown. This involves an offender passing off its own goods, as the goods of another, or alternatively what is termed “reverse passing off” is taking the goods of another and changing the name marking to the offender’s name marking or not having any name marking present i.e. unbranded products. Passing off and reverse passing off also requires that that the offender has intent to deceive or confuse the public. Includes the pirating of information from another, even if the source pirated from is correctly identified, if the offending individual or entity uses the pirated information for their own benefit, is misappropriation and thus no passing off has occurred. Note, that no element of deceit or confusion is required, only the use of the skill, labor, or expenditures of a competitor. Limitations of the Application of Unfair Competition lawAs can be seen from the above unfair competition has a very broad application and is limited by the preemption of federal law that would have a potential conflict, such as the areas of patent, trademark, and copyright law. Thus, unfair competition is usually applied on various forms of intellectual property that are not registerable under existing federal patent, trademark, or copyright laws. This would include items such as trade secrets, unregistered trademarks such as celebrity names, a famous signers voice, a famous face, etc.
<urn:uuid:cc9cf83c-8060-4748-8b1d-620f5f52cdfd>
CC-MAIN-2013-20
http://www.jacksonesquire.com/trademarks/trademark-unfair-competition.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703306113/warc/CC-MAIN-20130516112146-00054-ip-10-60-113-184.ec2.internal.warc.gz
en
0.949282
464
3.078125
3
What Is a Stroke? A stroke is an episode of decreased blood flow to the tissues of the brain. This decreased blood flow can be caused by a blockage in a blood vessel (an ischemic stroke) or from damage to a blood vessel that causes bleeding from the blood vessel and prevents the area supplied by that vessel from receiving adequate blood flow (a hemorrhagic stroke). - “Ischemic” or “ischemia” is from the Greek language, meaning a decrease in blood supply to a part of the body, caused by constriction or blockage of the blood vessels (“isch” = restriction/thinning; “hema” or “haema” = blood). - “Hemorrhagic” or “hemorrhage” is also from the Greek language, meaning excessive discharge of blood from the blood vessels or, literally, “blood bursting forth” (“hema” or “haema” = blood; rhegnumai = to break forth). What Happens During a Stroke? During a stroke, the part of the brain that is affected receives insufficient oxygen and nutrients. This tissue is ischemic, meaning it receives insufficient blood flow to function normally. Ischemic tissue is injured but not dead, and the tissue injury from ischemia can be reversible. If the ischemia is prolonged or severe, the involved tissue may become infarcted, meaning that some of the tissue has died. Injury from infarction is not reversible, and any damage from infarcted tissue is permanent. Based on the function provided by the area of the brain involved in a stroke (muscle movement, speech, sense of touch, or sight), a stroke can result in loss of certain normal functions: - If an area in the brain is infarcted, some brain tissue has died, and the effects of the stroke will be permanent. - If an area in the brain is ischemic, meaning it is injured but not dead, there may be some recovery of function. - If the stroke-like episode lasts less than 24 hours and the symptoms resolve, the event is called a transient ischemic attack, or TIA. Strokes can affect vision in a number of ways, including decreased vision and double vision: - Decreased vision is caused by damage to the fibers that transmit visual information from the eyes to the brain. This can occur in a variety of locations, since the nerve fibers that transmit vision have a long course from the eyes to the rearmost part of the brain, called the occipital lobe. - Double vision is caused by damage to nerves responsible for moving the eyes and ensuring that both eyes are aligned (i.e. looking at the same place). A stroke can also cause problems with the higher order processing of visual input, including neglect, agnosia, agraphia, or alexia. The term “higher-order processing” refers to the strategies required for judgment, decision-making, reasoning, problem-solving, and processing complex information: - In persons with neglect, the visual pathways and brain are capable of seeing certain areas in space but automatically ignore them. Persons with neglect may not notice people or objects on one side of the room or may not eat food on one half of their plate because they are not aware that the food is there. - In persons with agnosia, the visual pathways and brain are capable of seeing objects or people, but cannot recognize them. - Persons with agraphia are unable to write, while those with alexia are unable to read. Master Sgt. Jeffrey Mittman, Wounded by a Roadside Bomb in Iraq Master Sgt. Jeffrey Mittman was wounded by a roadside bomb on July 7, 2005 in Baghdad, Iraq. In that attack, along with suffering a traumatic brain injury, his left eye was destroyed, his right arm was badly damaged, and he lost his nose, his lips, and most of his teeth. “My first concern was how I was going to recover and take care of my family,” he said, since he could no longer lead soldiers in combat. Read about Sgt. Mittman’s long and arduous journey through healing, vision rehabilitation services, and employment. Jeff adds, “When I decide to go for something, I go! What’s the alternative? You have to be proactive. I set objectives, but the main challenge is to select options for meeting them. There’s a solution to almost everything – you just have to find it.” Learn more about brain injury, veterans’ services, and rehabilitation: - Veterans, Brain Injury, and Vision Loss: traumatic brain injury and visual dysfunction - Vision Rehabilitation Services: a wide range of professional services that can restore functioning after vision loss - Learn to get around safely indoors and outdoors. - Check out our Getting Started Kit for more ideas to help you live well with low vision. - Sign up with VisionAware to receive free weekly email alerts for more helpful information and tips for everyday living with vision loss. How Does a Stroke Decrease Vision? An understanding of the visual pathways can help clarify how a stroke can affect vision. Retinal and optic nerve fibers on the right side of each eye see the left side of the world (the left part of the visual field), while fibers on the left side of each eye see the right side of the world (the right part of the visual field). Similarly, superior retinal and optic nerve fibers on the upper part of each eye see the lower part of the world (the bottom part of the visual field), while the inferior retinal and optic fibers on the lower part of each eye see the upper part of the world (the top part of the visual field). After the optic nerve exits the eyeball from the back of each eye, it travels a short distance before the nasal fibers (the optic nerve fibers on the side of the eye closer to the nose) from each eye cross over to the opposite side (make an “X”) as they continue traveling toward the brain. Here is what happens in the eye and brain when we look at an object: - In the right eye, the nasal fibers (shown in orange in the diagram above), which see the far right part of the visual field, cross over to the left side of the brain, while the temporal fibers (those on the side of the eye closer to the temple) which see the far left part of the visual field, do not cross over (in purple). - In the left eye, the nasal fibers (in purple), which see the far left part of the visual field, cross over to the right side of the brain, while the temporal fibers (those on the side of the eye closer to the temple) which see the far right part of the visual field, do not cross over (in orange). Therefore a stroke, lesion, or injury at the point where the nasal fibers from each eye cross (where the fibers make an “X”, called the optic chiasm), would cause loss of the right visual field in the right eye and loss of the left visual field in the left eye. Further back along the visual pathway (after the fibers have already crossed at the optic chiasm and made an “X”), a stroke, lesion, or injury to the right side of the brain would cause loss of the left visual field of each eye, and an injury to the left side of the brain would cause loss of the right visual field of each eye. An example of an injury to the right side of the brain, causing loss, or unawareness, of the left visual field. Source: Henry Ford Center for Vision Rehabilitation and Research Depending on precisely where in the brain these strokes, lesions, or injuries occur, the effect can involve a smaller or larger area of the visual field and can affect either central (or straight-ahead) vision, peripheral (or side) vision, or both. Multiple strokes or lesions can cause multiple patterns of visual field loss. How Are the Visual Effects of a Stroke Treated? Any person with signs or symptoms of a stroke, including loss of visual field, new double vision, weakness of one or more muscles, difficulty speaking, difficulty walking, or other neurological symptoms, should immediately seek care through rescue services or a local emergency department. Early treatment of strokes has been shown to dramatically reduce the severity of the stroke and to improve survival rates. In the emergency room, the patient will undergo imaging to identify the type of stroke (ischemic or hemorrhagic) and the area(s) of the brain involved, as well as blood tests and other studies to identify any risk factors for stroke. A patient with an ischemic stroke who is identified soon enough after symptom onset, and who is safe to undergo the procedure, may receive thrombolytic therapy, in which a medication is administered that helps dissolve the blood clot that caused the stroke. Patients may also be treated with aspirin or blood-thinners. Other medications or interventions may be administered, based on the underlying cause or risk factors identified for the stroke. Do the Visual Effects From a Stroke Improve Over Time? In the long term, in some cases, visual field defects from stroke may improve, although there are often permanent deficits. After a stroke, the patient should undergo formal visual field testing by an eye doctor or neurologist to identify precisely the part of the visual field that has been affected. This allows documentation of the deficit and provides a baseline for comparison, should the patient note a change or new visual field loss in the future. While visual fields that have been lost permanently from stroke cannot be returned via any treatment, there are a variety of strategies that enable patients to adapt to their loss of visual field, and to make the most of the vision they do have: - A primary strategy is learning to move the head and eye more deliberately and frequently, in order to better see the area of visual field that has been lost. - People who have double vision from stroke may alleviate this symptom by covering one eye or applying opaque tape to one lens of their eyeglasses. - Prisms can also help resolve double vision. Prisms move or redirect the direction of light entering the eye. They can be ground into the person’s eyeglasses or are available as “stick-on patches” (called Fresnel prisms) that can be placed on the eyeglass lenses. - If the double vision persists and is significant enough, strabismus surgery can reposition the muscles that are attached to the eye to straighten the eye position, improve eye movement, and treat double vision. - A comprehensive low vision examination, along with optical and non-optical low vision devices and vision rehabilitation services and training, can be helpful for some individuals with double vision or field loss from stroke.
<urn:uuid:d2ebb508-a9ad-4d7d-86c3-bccd4bf02aa3>
CC-MAIN-2023-23
https://visionaware.org/your-eye-condition/guide-to-eye-conditions/stroke/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648245.63/warc/CC-MAIN-20230602003804-20230602033804-00550.warc.gz
en
0.928641
2,308
3.59375
4
Allusions to Hebrew or Yiddish song are most frequently assumed to connote popular, folk, folklike, commercial, pedagogic, or theatrical genres and, in the case of Hebrew, kibbutz, ḥalutz (pioneer), aliya, and other Zionist-related songs of a folk character that are known collectively as “songs of the Land of Zion” (shirei eretz yisra’el). Rarely, if at all, outside a small and dwindling group of aficionados, however, do unmodified references to Hebrew or Yiddish song evoke association with the classical genre of lieder—or art song—that constitutes serious vocal chamber music for solo voice and piano as an interactive ensemble. It is this last genre that is the exclusive focus of this volume. From a purely philological or linguistic standpoint, the German word lieder translates simply and generically as “song” (with reference to music, since it can also mean a lyrical, usually strophic poem in other contexts). The German equivalent of the English designation “art song”—referring to the type of classically cultivated solo song for voice and piano that rose to prominence in the Romantic era and has continued to be a staple genre of serious vocal music linked to poetic literature—is Kunstlieder. As a musical term, however, by the 19th century lied (and especially its plural, lieder) came to imply Kunstlied, so that although in theory the two words might be viewed as interchangeable, it long ago became customary in classical music parlance to refer to what we would call art songs simply as lieder. In fact, the term has entered the English language with that meaning in the classical context. (A folksong, on the other hand, might require its full German equivalent, Volkslied, for clarification or differentiation—as it would in Yiddish as well.) While at one time the term lieder was generally used only for art songs in German (or written originally in German), it has come more inclusively to transcend German culture and to embrace art songs generically. It can thus apply not only to a recital devoted exclusively to German lieder, but equally so to a mixed program of songs by composers of German, French, Russian, English, American, or other nationalities and cultural backgrounds whose songs are settings of poetry in the corresponding languages. Some, however, would still prefer to call such a mixed program simply a “song recital,” assuming that the word “recital,” along with the venue and context of the event, indicates classical music as opposed to folk or popular songs. “Art song” is used in this essay interchangeably with the term lieder. Curator's Note: The term “art song” is used throughout this website as a genre tag to denote songs of the lieder variety, as well as closely related works—not necessarily comprising a voice and piano duo—that display a similar compositional approach to setting poetry and/or folk songs (i.e., Jean Berger’s Two Songs from Ecclesiastes or Harold Shapero’s Three Hebrew Songs, both for tenor and orchestra, or Herbert Fromm’s Yemenite Cycle for mezzo-soprano and chamber ensemble). |Ultimately, it was under Weiner’s pen that the American Yiddish art song—and quite possibly Yiddish lieder of any geographical or cultural origin—attained its most profound expression and reached its richest bloom. Like virtually every art form associated with a particular period of origin, the seminal German lied of the Romantic era had its forerunners and antecedents. Those include the polyphonic lied of the late medieval period and the Renaissance; the Baroque continuo lied; and the Classical period art songs—all of which are now relatively obscure repertoires outside the academy, which do not, for the most part, represent the more enduring, significant legacies of those same periods. Beginning in the first quarter of the 19th century, however, with Schubert’s more than six hundred songs (cycles as well as individual pieces) and Beethoven’s song cycle, An die ferne Geliebte (op. 98, 1815–16), as well as some individual songs, lieder became firmly established as a major genre within classical music. As an intimate, introspective, expressive medium for solo voice and piano in a duo ensemble capable of exploring and interpreting serious poetry, it has attracted the talents of composers in nearly every generation since. The lieder genre was a creature of the confluence of literary, sociological, aesthetic, commercial, and even technological developments that had emerged in Europe by the 19th century. Chief among these were the steep escalation of interest in Romantic lyric poetry as part of a wider, heightened attention by the educated public to serious poetry in general; the growth of middle and upper-middle classes for whom participation in music in the home became an important activity; the increased availability of music through commercial publishing; and the technical progress and improvements in the piano, whose greater range of sonorities, variety of fresh coloristic possibilities, depth of tone, and dynamic facility now suited it well to interplay and partnership with the human voice as part of a balanced artistic dyad. We must bear in mind the piano’s critical generic role not only in German lieder but in other, analogous song repertoires of the 19th and 20th centuries. Although technical demands on the pianist can vary from one composer to another—and among songs by a single composer—the piano parts are, in principle, not accompaniments. Rather, they should be regarded as parts of a duo ensemble, ideally equal in importance to the vocal parts in expressing and interpreting the sentiments, evocations, and other meanings of the poetry. In this sense, the piano parts function like those in purely instrumental duos, such as, for example, the Beethoven piano sonatas for violin and piano—which in fact were so titled by the composer. (In this respect, true art song differs conceptually from other classically oriented song genres, including but not limited to those emanating from pre-Romantic eras; in those songs, the accompaniment primarily provides support to the singer.) If promotional billing of lieder recitals or recordings ignores this artistic parity by not listing the artists in alphabetical order without visual emphasis of one over the other, it is largely out of commercially driven considerations; the pianist usually has less public name recognition than the singer. Command of the language and a thorough ability to interpret the words are skills ideally possessed by pianists who are seriously devoted to participation in lieder or other art song performance. Hans Heinz, one of the great voice teachers of his generation at The Juilliard School, used to give master classes exclusively for pianists interested in broadening their scope to include lieder. His annual admonition at the outset of each series was that formal study of at least German, French, and Russian (as a basis) must be a prerequisite not only for lieder singers but for the pianists as well—along with profound engagement with the poetry. In his view, as a partner in the duo the pianist must be sensitive to every shade and nuance of the sung language; translations are insufficient. Jennie Tourel, one of the supreme vocal artists of the second half of the 20th century, who was also a major presence on Juilliard’s faculty, took the same position in her sessions for pianists. In practice, the ideal of pianistic unity with the vocal part is not always realized in lieder. Lazar Weiner’s Yiddish songs, which make up a substantial portion of this volume, meet the standard to near perfection. They are indeed paradigms for the quintessential lieder model, not only in their sophistication and their intricate probing of the poetry, but also in their fusion of piano and voice in synergetic expression. Ofer Ben-Amots’s Shtetl Songs, a song cycle, is also a masterpiece of pianistic and vocal coordination that treats folk elements with artistic techniques. Other songs, however, such as those by Henoch Kon, Michl Gelbart, Maurice Rauch, Paul Lamkoff, Solomon Golub, and Samuel Bugatch, among others represented here, are far more simple in both their vocal lines and their piano writing. Their simplicity in no way negates their artistic persona. They are regarded as lieder in the classical song tradition because of the nature of their poetry as well as their intended function. There is no reason that songs such as those in this volume by Weiner, Ben-Amots, Helen Greenberg, or Max Helfman—and perhaps some of the others as well—should not, on their merits, join the Western canon of lieder or art songs. The Hebrew or Yiddish poetry need not preclude that inclusion. Greig’s lieder—to cite only one example of songs in languages other than those assumed (or once assumed) to be encompassed either by Western liberal arts education or by standard conservatory training for singers—are routinely programmed by artists with neither command nor knowledge of Norwegian. In those cases their preparation must be extended to include not only advance familiarization with the Norwegian language and the nuances and sensibilities it evokes in the songs beyond simplistic translations, but also some orientation pertaining to their cultural contexts. The same applies to any language and culture foreign to performers. Yet, to continue the example of Grieg, Norwegian ancestry or ethnicity would certainly not be required of the performers, any more than German ancestry is a prerequisite for singing Schumann. (We might recall in this connection that some of the greatest Wagnerian sopranos were not German; Kirsten Flagstad, a Norwegian, and Birgit Nilsson, a Swede, come to mind. Among the acknowledged giants of Italian opera interpretation in the 20th century we can cite the sopranos Joan Sutherland, an Australian, and Victoria de los Ángeles, a Spaniard; the tenors Jussi Björling, a Swede, and Richard Tucker, an American Jew; and the baritone Leonard Warren [Warenoff], by birth also an American Jew.) The Western art song canon to which we refer can be exemplified by the German lieder of Schubert, Schumann, or Brahms; the French songs of Duparc, Debussy, or Ravel; the Russian songs of Rachmaninoff or Mussorgsky; English songs of Britten or Vaughn Williams; American songs of Ned Rorem or Samuel Barber; and songs in other languages by composers such as Dvořák, Grieg, or Sibelius. That this canon in fact has a Jewish counterpart in serious Hebrew and Yiddish lieder almost always comes as a jolting surprise to classical music devotees, Judaically educated circles, ardent adherents of secular Yiddish and Hebrew cultures, and otherwise knowledgeable participants in Jewish music alike. Equally enlightening is the revelation that a significant part of the collective Jewish repertoire is a product of the American experience. The genres of cultivated Yiddish and modern Hebrew lieder, based on serious Jewish literary sources and modeled in great measure on artistic principles of Western classical song, were born in the first decade of the 20th century in Russia. Their genesis was a function of the New National School in Jewish music (a.k.a. the New Jewish School) that was associated with—and embodied by—the Gesellschaft für jüdische Volksmusik (Society for Jewish Folk Music) in St. Petersburg (founded in 1908) and its branches in Moscow and other cities in the Czarist Empire (see the biography of Joseph Achron.) Consistent with the goals, aspirations, and influence of the Gesellschaft, affiliated composers such as Moses Milner (1886–1953), Joseph Achron (1886–1943), Joel Engel (1868–1927), Alexander Krein (1883–1951), Mikhail Gniessen (1883–1957), Solomon Rosowsky (1878–1962), and Lazare Saminsky (1882–1959), among a number of others, began the road from folk to art song by fashioning artistic piano accompaniments to well-crafted arrangements of Jewish folksongs that were known throughout large swaths of the Pale of Settlement. In that transformed state, genuine Jewish folksongs could be presented as quasi–art songs on classical concert stages for general (i.e., non-Jewish as well as Jewish) audiences. |On some levels, composers’ interest in Hebrew songs during the first half of the 20th century was—consciously or not—a continuation of the goals and mission of the New Jewish School The natural next phase of the mission of those composers involved composition of original lieder in Yiddish and Hebrew. Conceived as a manifestly Jewish expression of an increased and often newly discovered national-cultural consciousness, these songs were based concretely on historically authentic eastern European Jewish sources; yet at the same time they were addressed with learned compositional techniques and procedures, and written with the piano and vocal parts flowing in genuine partnerships. In that endeavor, in addition to invoking folk verse, some of those composers also turned for the first time in any concerted way in musical history to serious Yiddish and modern Hebrew literature, often by established, recognized poets. Many of those classically oriented lieder exhibit the deliberate incorporation and development of an authentic Jewish folk melos (modalities, intervals, inflections, tunes, tune fragments, and motives) that informed large segments of Yiddish-speaking folk culture, which, although severely threatened by the encroachments of modernity, was still alive in the empire at that time—especially outside cosmopolitan centers. Also included in the source material for those secular lieder were echoes of modern Hebrew culture in settings of poetry by such leading modern Hebrew poets as Ḥayyim Naḥmun Bialik and Saul Tchernikovsky, as well as references to traditional sacred musical motifs—including prayer tunes and biblical cantillations. In America, quite a few Yiddish-speaking immigrant and immigrant-era composers wrote original Yiddish songs (in addition to, and apart from, their folksong arrangements). Though intended for the recital stage as well as for more intimate yet organized musical and social gatherings, these songs by such composers as Solomon Golub, Paul Lamkoff, Hanoch Kon, and others of their milieu are admittedly far less advanced and often more lowbrow than the Russian-born models of the New Jewish School—the existence of which neither they nor their audiences appear even to have known, and whose contributions to classical music and Jewish culture alike have generally escaped the awareness of Yiddishist circles in America altogether. Curiously, the few Gesellschaft veterans who resettled in the United States focused on the larger forms: symphonic works, concertos, dance scores, and chamber music—as well as liturgical settings. Achron, for example, produced major works in America that were recorded for the Milken Archive, but his important songs date to his years in Russia. The relatively few songs written by other Gesellschaft-affiliated composers after immigration to America are usually simpler than most of their other opera. Lazar Weiner stands virtually sui generis among his generation as the uncompromising American (immigrant) exponent and advocate of Yiddish lieder as high art. Ultimately, it was under Weiner’s pen that the American Yiddish art song—and quite possibly Yiddish lieder of any geographical or cultural origin—attained its most profound expression and reached its richest bloom. Many of the Yiddish as well as Hebrew songs by other composers in America during the first six decades of the 20th century—and for the most part until a renewed interest in the serious side of these genres sprouted in the 1970s—were aimed at broader segments of the Jewish public than those of circumscribed inner circles that could digest more highly developed musical vocabularies and more difficult poetry. On the other hand, some of these popularly targeted songs are settings of texts by poets to whom Weiner turned as well. Often, these simpler—albeit tasteful, innocent, and often charming—settings have harmonically and technically conventional piano roles (or, in a few cases such as Mikhl Gelbart, none) that are more like accompaniments than the ideally homologous and artistically complementary piano parts associated with classical lieder. Yet they fall under the lieder umbrella as intimate expressions of worthy poetry. Encouraged and inspired by the modern revival of the Hebrew language that was associated with cultural Zionism and national-cultural consciousness, a number of American song composers have addressed Hebrew lieder as a relevant genre. Some of them included Hebrew along with Yiddish art songs as part of their dual efforts; others who were not attuned to Yiddish culture confined themselves to Hebrew lieder. Golub published songs in both Hebrew and Yiddish versions, regardless of the original language of the poems, which widened his audience base. On some levels, composers’ interest in Hebrew songs during the first half of the 20th century was—consciously or not—a continuation of the goals and mission of the New Jewish School, which viewed both Jewish languages as part of the national-cultural resurgence and, in many cases, accorded them equal status as vehicles for creative exploration. The volume of the Hebrew repertoire in America, however, has been far smaller than its Yiddish counterpart. It is in modern Israel that the Hebrew art song attained greater maturity as a unique classical music establishment became grounded there. Still, Hebrew lieder constitutes a valued part of the American Jewish experience. Beginning in the last two decades of the 20th century, Hebrew and Yiddish poetry has caught the attention of a number of young composers as part of an overall renaissance. Some of them have turned to the lieder genre in a diverse array of styles and musical languages. This suggests that in Jewish cultural terms, this genre retains its power to speak to contemporary generations.
<urn:uuid:16084b0d-1c8c-4212-adcd-bd9c5d8d6832>
CC-MAIN-2013-48
http://www.milkenarchive.org/articles/view/introduction-to-volume-9
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163046801/warc/CC-MAIN-20131204131726-00048-ip-10-33-133-15.ec2.internal.warc.gz
en
0.959064
3,799
2.6875
3
Our nation is increasingly becoming divided into opposing groups. And these divisions are becoming more and more entrenched. So, why is this occurring? Similarity Brings Comfort Psychologists say it is easiest to stick with people who we see as similar to ourselves. It requires more effort to step outside our bubble. So, we tend to associate with people who look or think like ourselves. We then we take the similarity even one step further by assuming that people who are similar to us on one characteristic are similar to us on many other characteristics. For example, if a person belongs to the same political party or religion that we do, we might think they also like the same activities that we do. Thus, we have a strong tendency to categorize people with a broad brush. We also want assurances that we will be liked before we attempt to interact with someone else. People who are similar to us tend to be liked by us and tend to like us more so than is the case with dissimilar people. Again, then, we isolate ourselves from the challenge of being with dissimilar people. The process of seeing our group as the best group is known as ingroup bias. Ingroup Bias is Hardwired Viewing others in the same way we view ourselves is a function of a part of our brain known as the medial prefrontal cortex. Other parts of our brain also predispose us to ingroup bias. We see the same behaviors of people not in our group as different from those of people in our group. A group of psychologists presented Democrats and Republicans during the U.S. Presidential election of 2004 with an initial statement (e.g., a politician said they were going to lower taxes) from a presidential candidate of their own or another political group. Participants were subsequently shown a statement which involved an action which contradicted the initial statement (e.g., the politician is now not lowering taxes). Participants perceived less contradiction between the initial statement and the action that contradicted the statement from their own group leader. This biased processing of information from ingroup versus outgroup leaders showed up as activation in certain areas of the brain. When feeling threatened by an outgroup member, another part of our brain is activated. Australian psychologists asked Non-Muslim participants to decide to either shoot a photograph of a Muslim (outgroup member) or a Non-Muslim (ingroup member) who, in the photograph, was holding a gun. When confronted by the photograph of the outgroup member with a gun and while deciding to shoot the photograph of this member, the lateral orbitofrontal cortex of the Non-Muslim participant was activated. But it was not activated when deciding whether to shoot the photograph of the ingroup member. Ingroup Bias is Amplified by Social Media Social media increases our isolation from others. We tend to subscribe to popular media which only confirms our point of view. People outside our group may have a different point of view but we are not exposed to it. And when we are not exposed to outgroup members, our ingroup bias is intensified. Stereotypes of outgroup members run rampant. We even then begin surmising what other people think. People who dress like Muslims might think like or (gasp) be terrorists. People who are trying to immigrate to the United States might think they can be freeloaders. These stereotypes all come from seeing people outside our group as not only making us uncomfortable but as being a threat. It is the way we see people not like us that creates fear and hate—not the actual reality. Yes, some people from our group as well as some people outside our group are, at best misinformed, and even terrorists and freeloaders, but most people are not. Yet we continue to have a perception of people not like us in terms of stereotypes. See Others as Individuals, Not as Members of a Group To change our perception, we must be exposed to people not like us in positive contexts. We cannot just stay in our safe shell. We have to actively seek out people who are not similar to us. We will then see others as individuals, not just as members of an outgroup. One way to develop positive images is through travel where we interact with others—this could be travel within or outside the United States. Another way is for positive images and stories about people from groups other than our own to be presented in popular media (social media, television, magazines, newspapers), schools, churches, even stores. There are many benefits to taking the risk of being with people different from ourselves. One benefit is changing attitudes toward outgroup members. The change in attitudes reduces conflict, which benefits one’s well being as well as society. Another benefit of interacting with outgroup members is self-expansion. Self-expansion means we develop a wider view of who we are and of what we are able to do. We are motivated to expand ourselves. And one of the best ways to do so is to engage in activities with members of an outgroup. We begin to incorporate some of the positive characteristics and resources of others into our view of our self. Yes, we need to reach out and speak to people other than ourselves. But, most of all, we need to listen to them. Aron, A., McLaughlin-Volpe, T., Mashek, D., Lewandowski, G., Wright, S.C. & Aron. E.N. (2004) Including others in the self, European Review of Social Psychology, 15(1), 101-132, DOI: 10.1080/10463280440000008 Domínguez D, J.F., van Nunspeet,F., Gupta, A., Eres, R., Louis, W.R., Decety, J., & Molenberghs, P. (2018). Lateral orbitofrontal cortex activity is modulated by group membership in situations of justified and unjustified violence, Social Neuroscience, 13 (6), 739-755. DOI: 10.1080/17470919.2017.1392342 Hampton, A.J., Fisher Boyd, A.N., & Sprecher, S. (2019). You’re like me and I like you: Mediators of the similarity-liking link assessed before and after a getting-acquainted social interaction. Journal of Social and Personal Relationships, 36 (7), 2221-2224. DOI:10.1177/0265407518790411 Locke, K.D., Craig, T., Baik, K.D., Gohil, K.(2012). Binds and bounds of communion: effects of interpersonal values on assumed similarity of self and others. Journal of Personality and Social Psychology. 103(5), 879-897. Molenberghs, P., Louis, W. R. (2018). Insights from fMRI studies into ingroup bias. Frontiers in Psychology, 9 (1868), 1-12. DOI: 10.3389/fpsyg.2018.01868 Paolini, S., Wright, S., Dys-Steenbergen, O., & Favara, I.. (2016). Self‐Expansion and intergroup contact: Expectancies and motives to self‐expand lead to greater interest in outgroup contact and more positive intergroup relations. Journal of Social Issues. 72, 450-471. DOI: 10.1111/josi.12176. Westen, D., Blagov, P. S., Harenski, K., Kilts, C., and Hamann, S. (2006). Neural bases of motivated reasoning: an fMRI study of emotional constraints on partisan political judgment in the 2004 US presidential election. J. Cogn. Neurosci. 18, 1947–1958. DOI: 10.1162/jocn.2006.18.11.1947Click To Tweet
<urn:uuid:85caaaff-e3ab-466f-a55a-11ffe32f00a7>
CC-MAIN-2020-24
https://lovelifeprof.com/2020/01/19/why-are-we-so-divided-and-what-can-we-do-about-it-psychological-research-has-some-clues/
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347458095.68/warc/CC-MAIN-20200604192256-20200604222256-00001.warc.gz
en
0.945132
1,637
3.546875
4
Have you ever wondered, “How can I stop my child from misbehaving?” The first step is to build and keep a great relationship with your child. Young children have a lot to learn about what “good behavior” is. Very often, the poor behavior choices that children make come from their not knowing a better way. When your child makes mistakes, he needs you to teach him what to do instead. You will be more successful in teaching good behavior choices if you have a strong and loving relationship with your child. Consider these suggestions for ways to strengthen your relationship with your child. Spend time together. Find time to play together. Let your child choose what to do together and be excited about it! Talk with your child about something she is interested in. There are lots of cheap, fun games and activities to do together like a go on a picnic, play at a park, or play a board game. No money required! Listen to your child. Ask your child to tell you about what he is doing or thinking, and then just listen. When you talk and listen, be sure to: Respond to your child in a way that lets him know you were listening. For example, “It sounds like you are really excited about playing with your friend!” Be careful not to criticize or judge. Express affection in word and action. Tell your child how happy you are to see her. Let your child know every day that you love her. Show affection often in the way your child most likes. These tips will help your relationship grow stronger by building trust, good will, and positive feelings. It’s important to be realistic, though. Even in strong relationships, children will do things their parents don’t want them to do. But because your child has learned to trust you, you will be more effective in teaching him better ways to behave. For further information: Author: Allen Sabey, Dept. Human Development and Family Studies, Auburn University
<urn:uuid:8ef8b08c-90a6-4a04-baff-e8202bb7d5da>
CC-MAIN-2014-35
http://www.extension.org/pages/65236/encouraging-good-behavior
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500830834.3/warc/CC-MAIN-20140820021350-00159-ip-10-180-136-8.ec2.internal.warc.gz
en
0.96505
422
3.203125
3
From hurricanes to disease outbreaks to wildfires, some part of the United States is usually facing an imminent natural disaster that could potentially endanger lives and cost millions of dollars. Hurricane Katrina destroyed 300,000 homes and caused more than $100 billion in damage. The Ebola strain, which devastated parts of West Africa in 2014, infected or killed several people in the U.S., and under different circumstances, could have been much deadlier. Wildfires raging in Alberta, Canada currently cover land mass roughly the size of Rhode Island, and similar fires burn millions of acres and kill Americans every year. The federal government, through the Federal Emergency Management Agency, plays a significant role in providing support and coordinating relief efforts in crisis situations. State governments, however, also play meaningful roles in taking on the challenge of responding to a disaster, and not all states are equally prepared. 24/7 Wall St. reviewed a number of policies and spending habits on the state level to determine which states are the most and least prepared for natural disasters. To determine which states are best prepared for an environmental disaster or a public health emergency, 24/7 Wall St. rated states based on criteria determined by the National Health Security Preparedness Index, a program of the Robert Woods Johnson Foundation. For each state, we reviewed certain disaster preparedness policies, such as whether the state mandates child-care facilities to have emergency evacuation plans, whether state public health labs have enough staff to properly combat a serious disease outbreak, and whether the state has a firm plan to combat issues that can stem from climate change. Currently, just 15 states have such a plan. We also reviewed states on measures including the number of physicians and emergency medical technicians per capita, as well as changes in emergency management funding. > All-hazards preparedness funding for FY 2015:$22,758,630 > Pct. change in hazard preparedness funding FY 2014-FY 2015: 0.1% > EMTs per 100,000 residents: 65.6 (13th lowest) > Most common natural disasters: Winter storms There does not appear to be a clear reason why some states adopt more recommended emergency preparedness policies while others do not, or why some states spend more than others and have more staff on hand to deal with potential disaster. States that tend to be more friendly to larger government involvement, including New York and Maryland, ranked as relatively well prepared. However, so did states with smaller governments and budgets, such as Mississippi and Kentucky. Some states are relatively less affected by natural disasters, while some states are significantly more disaster-prone, be it to hurricanes, tornadoes, wildfires, or disease outbreaks. This may explain why states such as Utah and Michigan, which have relatively few reported major disasters that required FEMA intervention, tend to rank worse for emergency preparedness. However, some of the states that tend to be particularly at risk, including Florida and Texas, rank among the worst for implementing policies that can help avoid the worst effects of a disaster. Editor’s note: A previous version of this article incorrectly stated that Hurricane Katrina had destroyed more than 300,000 million homes. It has been corrected to read “300,000 homes.”
<urn:uuid:cdbf4b75-b2df-4290-b3c3-4bbcdb9ad596>
CC-MAIN-2017-43
http://detroitstats.com/the-states-least-prepared-for-natural-disaster/
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187827662.87/warc/CC-MAIN-20171023235958-20171024015958-00294.warc.gz
en
0.956527
654
3.3125
3
The Picts: Markinch the Capital of Fife? The belief that Markinch was the Pictish capital of Fife has persisted since MacKay's scholarly work on Fife written in 1895. The theory entered the realm of legend with Dorothy MacNab Ramsay's gripping novels centred around a Pictish palace on Dalginch Hill overlooking Markinch. Certainly, Dalginch is named in a 12th century manuscript as one of northern Scotland's seven principal locations for the dispensation of justice. The others included Perth, Aberdeen and Inverness. In the later Pictish period, Markinch was on the border beween the two sub-kingdoms of Fife and Fothriff and may well have been used as a neutral ground where disputes were settled and contracts entered into. The later 12th century reference could be a carry-over from its earlier Pictish function. Even the town's oldest monument, the Stob Cross (above), is difficult to ascribe with any certainty to the Pictish period. Its line and form resemble elaborately carved Pictish slab crosses such as the Aberlemno Cross in Perthshire. However, no traces of Pictish ornamentation can be seen - it has even been suggested that these were deliberately effaced during the Reformation. Even as late as 1884 the Kirk was reburying carved stones with "rude sculptures" dug up when the building was being refurbished. Perhaps there is much evidence of the Picts yet to be discovered in Markinch. What is clear from old charters is that the Celtic Church, represented by the Celi De or Culdees of Loch Leven, had a church near to the present building from an early period - but this was not confirmed by charter until the 11th Century. The 12th Century: the Great Tower is built: a Celtic Pig changes hands From the time of David I in the early 12th Century the Pictish and Gaelic warlords began to come under the feudal rule of their monarch. It can be said that feudalism in Scotland began when the great Earls of Fife, with their strongholds in the valley of the Leven, pledged their military service to David in return for land tenure, protection and a secure inheritance for their sons. Later, Markinch and Balbirnie and surroundings became bargaining chips as feudal estate was carved out along the Leven for the premier Earl. It was probably during David's reign, around 1130, that Markinch's oldest and most imposing building was constructed, although it may be earlier. The tower of the present-day Markinch Parish Kirk (above) is one of the best preserved of Scotland's Norman towers. Typical Romanesque carving can be seen along the banding of the courses and around the window arches Two arches long hidden inside the 19th century reconstructions have been surveyed in recent months. A few stones with saltire markings from the demolished Norman church can be seen built into the south wall of the existing building and traces of the old nave and chancel have recently been discovered. David and his successors also encouraged the Roman Church to continue its gradual domination over the Celtic Church. Bishop Robert of St. Andrew's decreed that the estates of the old Celtic church in Markinch (including 20 cheeses and a pig) be transferred to the priory of St. Andrew's. Earl Duncan agreed to the transfer and his son later added an acre of ground where the original manse now stands at Mansefield (below). The 13th Century: Markinch Church Re-branded Despite the stubborn resistance of the Celi De, the Roman influence gradually triumphed over the old Celtic church. The Church of St. Drostan was rededicated to St. John the Baptist by the Bishop of St. Andrew's in 1243 in a final attempt to efface all evidence of the old Celtic saint Drostan. However, the attempt was not entirely successful and it merely provided the town with two patron saints and two festivals (June for St. John and December for St. Drostan) that were both celebrated up until modern times. However, it was not only the ecclesiastical order that was changing. The feudal implantations of southern nobility, begun in the previous century, continued to ease out or marry into the old Celtic aristocracy. Sir William de Valoniis of Dalginch granted the glebelands to the church in return for prayers being offered up for the souls of his father and the late Earl of Fife The century ended with a brief visit from Edward I of England, fresh from his victory over Balliol and the Scottish army. His comments on the town were dismissive and it is clear that, given the size of the tower, and perhaps the ancient reputation of the town, he had expected a more impressive settlement. You can use the links below to visit our other history pages (C) MHG. Researching the past for our future......
<urn:uuid:90a0f513-d24c-421b-a355-4b25a8802452>
CC-MAIN-2020-10
http://www.markinchheritage.org.uk/mobile/index.asp?ID=189&MainID=5250
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145729.69/warc/CC-MAIN-20200222211056-20200223001056-00518.warc.gz
en
0.978456
1,016
3.328125
3
In Indian culture, milk is considered a highly nutritious and essential food item. It is used in various recipes and consumed by people of all ages. Boiling milk is a common practice in households all over India. There are several reasons why Indian people boil milk. One of the primary reasons behind boiling milk is to eliminate harmful bacteria and germs that may be present in raw milk. Boiling milk kills all the bacteria and makes it safe for consumption. This is especially important in the hot and humid climate of India, where milk can quickly spoil if not stored properly. Another reason why Indian people boil milk is to enhance its nutritional value. Boiling milk breaks down complex proteins, making it easier for the body to digest. It also increases the concentration of calcium, which is essential for healthy bones and teeth. Boiling milk also changes its taste and texture. It makes milk creamier and thicker, which is ideal for making desserts such as kheer and payasam. In addition, boiling milk with spices such as cinnamon and cardamom adds a unique flavor that is popular in Indian cuisine. Lastly, boiling milk is a part of many Indian cultural practices and rituals. For instance, in Hinduism, boiled milk is offered to deities during puja ceremonies. It is also believed that boiling milk in a new house before moving in brings good luck and prosperity. Boiling milk is an integral part of Indian culture and is done for several reasons – safety, nutrition, taste, and tradition. While many modern households may use packaged and pasteurized milk, boiling milk remains a popular practice in India. Table of Contents Should milk be boiled India? Milk plays an important role in Indian cuisine, and it is an essential ingredient in many dishes. However, there is some debate about whether milk should be boiled in India. Some people argue that boiling milk destroys its nutritional value and alters its taste, while others claim that boiled milk is safer to consume and has more health benefits than raw milk. One reason why people in India boil milk is to kill any bacteria or germs that might be present in it. Milk is a highly perishable food and is prone to contamination if not handled properly. Boiling milk helps to destroy harmful bacteria and makes it safer to consume, especially for children, the elderly, and people with weakened immune systems. Boiling milk can also improve its taste and texture. When milk is boiled, its natural sweetness increases, and the protein and fat content can thicken and create a creamy texture. This is especially desirable for dishes like chai tea, where the milk serves as a prominent flavor and texture enhancer. On the other hand, some people argue that boiling milk destroys its nutritional value. They claim that the heat denatures the proteins in milk, making them less digestible and reducing the bioavailability of important vitamins and minerals. They also argue that boiling milk alters its taste, making it less appealing to some people. Despite these concerns, most health experts recommend boiling milk in India for safety reasons. Raw milk can contain harmful bacteria like E. coli and Salmonella, which can cause serious illness. Boiling milk can kill these pathogens and make it safer to consume. Additionally, if you prefer not to boil milk, you can choose to consume pasteurized milk, which has already been heated to kill bacteria. While there are some differing opinions on whether milk should be boiled in India, boiling milk is generally recommended for safety reasons. Boiling milk can kill harmful bacteria, improve its taste and texture, and make it safer to consume, especially for vulnerable populations. However, if you have concerns about the nutritional value or taste of boiled milk, you can choose to consume pasteurized milk instead. What is the significance of boiling milk? Boiling milk has a significant impact on the nutritional composition and safety of the milk. In many cultures, boiling milk is a common practice to ensure the safety of the milk before consumption. Boiling the milk helps to destroy harmful bacteria and germs that might be present in the milk, potentially causing a range of diseases such as typhoid, tuberculosis, and diarrhea. Consuming raw or unpasteurized milk can also lead to a higher risk of bacterial infections. Furthermore, boiling milk can help to extend its shelf life, as it destroys the bacteria that promote spoilage. This can be beneficial in places where refrigeration is not readily available, such as in rural regions or during natural disasters. Boiling milk also affects the nutritional composition of the milk. Boiling degrades some of the heat-sensitive vitamins, such as vitamin C and thiamine. However, it also helps to break down some of the proteins in the milk, making it easier to digest for individuals with lactose intolerance. This can make milk more accessible to a broader range of people, providing them with the necessary nutrients for their daily lives. It is important to note that boiling milk can cause it to curdle, forming a layer of cream on the top. This is due to the separation of fat from the milk, and it is perfectly safe to consume. However, if the milk is overheated or boiled for too long, it can have adverse effects and affect the taste and quality of the milk. Boiling milk is significant due to its bactericidal effects, helping to eliminate harmful bacteria, its ability to extend its shelf life, and its impact on the nutritional composition of the milk, making it easier for individuals to digest. It is essential to exercise proper care when boiling milk to avoid over-boiling and diminishing its quality. Why do we boil milk after buying it? Boiling milk after buying it is a commonly accepted practice among many households. This is primarily done to enhance the safety and health benefits of the milk. In most cases, the milk that is purchased from the market goes through various packaging and transportation processes, which can involve different levels of exposure to the environment, including dust, dirt, and bacteria. Boiling milk helps to kill the bacteria and other microorganisms present in it. This is because milk is a highly nutritious medium that can harbor different types of bacteria, including harmful pathogens like E. coli, Listeria, and Salmonella. These bacteria can cause severe illnesses like food poisoning, diarrhea, and vomiting, particularly in people with weakened immune systems. Boiling milk also helps to improve its nutritional value. When milk is heated, the heat breaks down the lactose sugar present in it into simpler sugars, which makes it easier to digest. This is particularly helpful for people who are lactose intolerant- meaning that they are unable to digest lactose, the sugar present in milk. Furthermore, boiling milk has several other benefits as well. It helps to thicken the consistency of the milk, making it useful in the preparation of several dishes like custards, puddings, and other desserts. Boiling milk also destroys the enzymes that cause spoilage, thereby preventing the milk from turning sour and extending its shelf life. The practice of boiling milk after buying it is an essential and necessary step in ensuring the safety and nutritional benefits of the product. It helps to kill harmful bacteria, improve digestibility, and prevent spoilage, making it a crucial step in maintaining the quality of the milk. What happens if you don’t boil milk? Milk is a staple food item that is widely consumed across the world. It is a rich source of calcium, protein, and various other essential nutrients required for the healthy functioning of the human body. However, milk is also extremely perishable and can quickly spoil. Therefore, it is often recommended to boil milk before consuming it to kill any harmful bacteria that may be present in it. If you don’t boil milk, several consequences may arise, including: 1. Increased Risk of Foodborne Illness: Raw milk may contain harmful bacteria such as salmonella, E. coli, and Listeria that can cause severe foodborne illnesses. These bacteria can survive in milk for several days, and if left unboiled, they can enter your body, causing severe sickness, vomiting, diarrhea, and even death. Boiling milk eliminates these bacteria and reduces the risk of foodborne illness. 2. Reduced Shelf Life: Unboiled milk has a shorter shelf life and can go sour or spoil quickly. Microorganisms find milk to be an excellent breeding ground, and as soon as it is exposed to air, these microorganisms start multiplying rapidly, leading to spoilage. Boiling the milk kills these microorganisms, extending its shelf life, and making it safer to consume. 3. Lowered Nutritional Value: When milk is not boiled, it retains a lot of moisture, which can dilute its nutritional value. It also can lead to the growth of unwanted microorganisms that can further deteriorate the nutrient value of the milk. Boiling the milk not only kills these microorganisms but also helps the nutrients become more bioavailable, leading to better assimilation by the body. Boiling milk is essential for ensuring it remains safe to consume, has a longer shelf life, and retains its nutritional value. It is highly recommended to boil milk before consumption to protect your health and enjoy all the benefits that milk offers. Why does milk not get spoiled when it is boiled? Milk is a nutrient-dense liquid that can easily become contaminated with microorganisms such as bacteria, viruses, and fungi. These microorganisms thrive in the rich nutrients present in milk and can cause spoilage, leading to unpleasant odors, flavors, and potentially harmful health effects. As a result, milk is typically pasteurized, a heat treatment process that kills most of these microorganisms and extends its shelf life. Boiling milk is another way to heat treat it and kill off microorganisms. When milk is heated to boiling point (around 100 degrees Celsius), it kills the bacteria that cause spoilage and other pathogens that may be present. However, boiling milk for too long can also cause it to spoil as it turns the lactose sugar in milk into glucose, which can fuel the growth of other bacteria that can cause spoilage. Therefore, boiling milk should be done for a short time to ensure that bacteria are killed without causing any further spoilage. Additionally, boiling or heating milk has been known to reduce the risk of foodborne illnesses such as typhoid fever, Escherichia coli, and salmonella because high temperatures kill bacteria that cause such diseases. The heat of boiling milk breaks down proteins, fats, and carbohydrates in the milk, making it easier for our digestive system to break it down further. This process also causes vitamins such as vitamin D and thiamine to be destroyed, and the calcium and protein in the milk may precipitate, forming a solid layer on top of the boiling milk. Therefore, boiling milk does affect its nutritional value and may not be the best option for those looking to get the maximum nutrients from their milk. Milk does not get spoiled when boiled because boiling it kills bacteria and other microorganisms that cause spoilage. However, it is essential to boil milk for a short time and avoid overheating it as it may lead to further spoilage. While boiling milk may affect its nutritional value, it is a useful way to heat treat milk to extend its shelf life and reduce the risk of foodborne illnesses. Should we drink Amul milk without boiling? The answer to whether we should drink Amul milk without boiling depends on various factors. Amul is one of the most popular milk brands in India, and many people consume it without boiling. It is said that Amul milk is processed in such a way that it kills most of the harmful bacteria that may be present in raw milk. However, it is always better to take precautions and boil the milk before consuming it. Boiling the milk helps to kill off any remaining bacteria that may be present in the milk. Heating the milk also improves its digestibility and nutrient absorption. Milk that is not boiled may contain harmful bacteria such as E.coli, Salmonella, and Listeria, which can cause serious illnesses such as food poisoning, gastroenteritis, and even kidney failure. In India, where the milk supply chain is not always reliable, boiling milk is an age-old practice, and it is considered to be the best way to make sure the milk is safe to drink. Moreover, boiling the milk also helps in improving its shelf life. Boiling the milk kills the bacteria that spoil the milk, preventing it from going sour quickly. If you wish to keep the milk fresh for a longer time, it is essential to boil it. Another important factor to consider is the quality of the milk. Despite rigorous quality checks, the milk may sometimes not be completely safe to consume. Therefore, it is always best to boil it before consumption to eliminate any risk of contamination. While many people consume Amul milk without boiling, it is always better to take precautions and boil the milk before consuming it. This helps to ensure that the milk is free from harmful bacteria and is safe to consume. the decision to boil milk or consume it raw depends on individual preferences and health concerns. For individuals with weakened immune systems, children, and the elderly, it is highly recommended to boil the milk before consumption to avoid any health risks. Is milk in India pasteurized? Milk in India is available in both pasteurized and unpasteurized forms. Pasteurization is a process of heating the milk to a specific temperature for a certain duration of time to eliminate harmful bacteria and increase the shelf life of the milk. However, not all milk in India is pasteurized as it is a more time-consuming and expensive process compared to selling raw milk directly. In recent years, there has been a push towards mandatory pasteurization of milk in India due to concerns over the safety of unpasteurized milk. However, despite these efforts, there is still a considerable amount of raw milk being consumed and sold in the country, particularly in rural areas. There are also some concerns over the effectiveness of pasteurization in India, as the process is not always carried out with the necessary rigor and quality control in some areas. As a result, consumers are advised to purchase milk from reputable vendors and always check the packaging for information on pasteurization and expiry dates. While pasteurization of milk is gaining popularity in India, it is still not universally enforced or accepted. Consumers should exercise caution and make informed decisions when purchasing milk in the country. Is Amul milk already boiled? Amul milk is a popular brand in India and is one of the most preferred options for dairy products. Amul milk is available in different variants such as full cream, toned, double-toned, and skimmed milk. However, the most commonly asked question by consumers is whether Amul milk is already boiled or not. The answer to this question is that Amul milk is not boiled before packaging. The milk is pasteurized, which means it is heated at a specific temperature to kill harmful bacteria and viruses. Pasteurization is a method that helps to extend the shelf life of milk while maintaining its nutritional value. Amul milk undergoes the process of high-temperature short-time (HTST) pasteurization, which heats the milk to approximately 72°C for 15 seconds, followed by a rapid cooling process. HTST pasteurization is a safe and effective method to reduce the risk of food-borne illnesses that can occur due to the presence of microorganisms in milk. It is important to note that pasteurization of milk does not eliminate all bacteria present in the milk. Therefore, it is advisable to store the milk in the refrigerator at a temperature of 4°C or below and consume it within the recommended time frame mentioned on the packaging. Amul milk is not boiled before packaging, but it is pasteurized to make it safe for consumption. Pasteurization helps to extend the shelf life of milk while maintaining its nutritional value. It is recommended to store the milk properly and consume it within the recommended time frame to ensure its freshness and safety. How to boil milk according to Ayurveda? Ayurveda, the ancient Indian system of medicine, believes that certain foods and cooking techniques have a significant impact on the body and its constitution. It considers milk to be a sattvic or pure food that nourishes the body and balances the doshas (the energy types) of Vata, Pitta, and Kapha. Therefore, boiling milk is an essential process that one should follow to enhance its nutritional value and digestibility. Here are the steps to boil milk according to Ayurveda: 1. Choose high-quality milk: Ayurveda recommends using fresh, organic, and whole milk from cows that are grass-fed and not injected with hormones or antibiotics. Such milk is rich in nutrients, healthy fats, and enzymes that promote digestion and absorption. 2. Use a heavy-bottomed pot: Boiling milk in a heavy-bottomed pot helps distribute heat evenly and prevent milk from sticking to the bottom, which can result in burnt milk and loss of nutrients. 3. Heat milk on low to medium flame: Ayurveda suggests heating milk on low to medium flame to avoid scorching, over-boiling, or curdling. High heat can also destroy the beneficial enzymes and nutrients in milk. 4. Stir it continuously: Continuously stirring milk while boiling helps prevent the formation of the cream layer on top and ensures that milk heats evenly. It also reduces the likelihood of burning or boiling over. 5. Add spices/ herbs (optional): Ayurveda suggests adding spices or herbs such as turmeric, cinnamon, ginger, or cardamom to milk while boiling to improve its taste, aroma, and therapeutic properties. These spices are known to balance the doshas and boost immunity, digestion, and vitality. 6. Allow it to cool: After boiling milk for 5-10 minutes, let it cool down to room temperature before consuming or refrigerating. This step helps balance the heat produced by milk and prevents it from disturbing the doshas. By following these steps, one can boil milk according to Ayurveda and reap its numerous health benefits while enjoying its delicious taste. It is also important to note that milk should not be consumed with incompatible foods, such as acidic fruits or sour foods, as it can lead to indigestion or allergies. Why is it important to boil milk? Boiling milk has been practiced for centuries due to its benefits in reducing the risk of foodborne illness and enhancing the nutritional value of milk. Firstly, boiling milk can kill harmful bacteria, viruses, and other microorganisms that may be harmful to human health. Some of these microorganisms that milk can harbor include Salmonella, Escherichia coli, and Listeria, which are responsible for causing food poisoning or diarrhea. Boiling milk destroys these microorganisms, making it safe for human consumption. Secondly, boiling milk also alters its nutritional value. It destroys enzymes and bacteria that can break down vitamins and other nutrients, making them unavailable for absorption by the human body. When milk is boiled, it loses some of its thiamine (vitamin B1) content, but it enhances the bioavailability of other vitamins like vitamin D, which is essential for strong bone health, and vitamin B12, which is essential for nerve function and cell metabolism. Moreover, boiling milk can prolong its shelf life, making it last longer without spoiling. When milk is boiled, bacteria and other microorganisms that can spoil the milk are destroyed, increasing its shelf life. This helps in reducing food waste and saves money for consumers. Boiling milk is essential for maintaining public health and ensuring that milk is safe for human consumption. It eliminates harmful bacteria and other microorganisms that cause foodborne illness, enhances the nutritional value of milk, and prolongs its shelf life. Therefore, it is essential to always boil milk before consumption to prevent food poisoning and obtain all the necessary nutrients from milk. Is it necessary to boil milk? Boiling milk has been a common practice for many years, with many households seeing it as a necessary step before consumption. While there is no definitive answer on whether or not it is necessary to boil milk, it is a good idea to understand the benefits and drawbacks of boiling milk. One of the primary reasons for boiling milk is to kill harmful bacteria that may be present in the milk. The heat from boiling the milk eliminates these bacteria, thus ensuring that the milk is safe for consumption. This is especially important when dealing with raw or unpasteurized milk that may contain pathogens. Another benefit of boiling milk is that it helps to extend its shelf life. By killing the bacteria in the milk, the milk can maintain its freshness for a longer period, which can be crucial, especially in places where access to fresh milk may be limited. However, boiling milk also has drawbacks. One of these drawbacks is that it can cause a loss in nutritional value. The process of boiling milk can cause some of the nutrients in the milk to break down due to the high temperatures, which may lead to a loss in vitamins and minerals. Additionally, boiled milk may also have a change in taste and texture compared to raw milk. The heating process can cause the milk to develop a cooked flavor or a layer of cream on top, depending on the type of milk being used. This change in taste and texture could be undesirable for some individuals. While it may not be necessary to boil milk, it can be beneficial to do so to ensure its safety and prolong its shelf life. However, it is essential to consider the potential drawbacks such as a loss in nutritional value and changes in taste and texture to determine if boiling milk aligns with one’s individual needs and preferences. Which milk need not be boiled? Not all types of milk need to be boiled before use. Pasteurized milk, which is most commonly available in grocery stores, has already undergone a high-temperature treatment that kills harmful bacteria, making it safe for consumption without boiling. Additionally, ultrapasteurized milk has gone through an even more intense process of heating and cooling that gives it a longer shelf life and can also be consumed without boiling. It is important to note, however, that raw milk – milk that has not undergone pasteurization – should always be boiled before consumption to make it safe. Raw milk may contain harmful bacteria such as E. coli, salmonella, or listeria that can cause serious illness. Boiling it destroys these bacteria and makes the milk safe to drink. It is also important to refrigerate milk properly and check its expiration date to ensure its freshness and safety for consumption. If milk is left at room temperature for too long, it can spoil and develop harmful bacteria that can cause food poisoning. So, regardless of whether it’s boiled or not, always handle milk with care to ensure that it is safe for consumption. Does boiling milk destroy calcium? Boiling is a common method used to make milk safe for consumption by killing any harmful bacteria that may be present. While some people believe that boiling milk will destroy its calcium content, this idea is actually a misconception. Calcium is an essential mineral that is critical for strong bones and teeth, healthy nerve and muscle function, and many other important bodily functions. Milk is a rich source of calcium, and it is important for people to consume enough of it to meet their daily needs. When milk is heated, it undergoes a chemical change known as denaturation. During this process, the proteins in the milk break down and change their structure. However, this has no effect on the calcium content of the milk. In fact, boiling milk can actually increase the amount of calcium that is available to the body. This is because the heat breaks down the milk’s protein molecules, freeing up calcium molecules that were previously trapped within them. This means that boiling milk can actually make it easier for the body to absorb calcium. It is worth noting that some studies have suggested that heating milk for extended periods of time can result in a small loss of calcium. However, the amounts involved are very small and are unlikely to have a significant impact on overall calcium intake. Boiling milk does not destroy calcium. In fact, it can even increase the amount of calcium that is available to the body. So if you want to enjoy the many health benefits of milk, don’t be afraid to boil it before consuming it. Is boiled milk better than cold milk? There is no clear answer to whether boiled milk is better than cold milk, as each type of milk has its own unique set of benefits and drawbacks. Boiling milk can kill harmful bacteria and pathogens that may be present in raw milk, making it safer to consume. It can also increase the shelf life of milk, making it last longer before it spoils. Additionally, boiling milk may potentially improve its taste and texture, as the process denatures some of the proteins and breaks down some of the complex sugars in milk. However, boiling milk can also have some downsides. It can lead to a loss of certain vitamins and minerals, such as vitamin B12 and potassium, which can be destroyed by heat. Over-boiling milk can also result in a burnt or off-tasting flavor, which can be unappealing to some. On the other hand, cold milk has its own benefits. It retains its full nutrient profile, as it is not subjected to high heat or other processing methods that can alter its composition. Cold milk is also refreshing and can be used in a variety of recipes, including smoothies, coffee drinks, and desserts. However, cold milk can also harbor harmful bacteria and pathogens if it has not been properly handled or stored. It also has a shorter shelf life than boiled milk, as it can spoil more quickly. The choice between boiled and cold milk depends on personal preference, as well as the specific health and dietary needs of each individual. It is important to ensure that any milk consumed is pasteurized and handled safely to minimize the risk of foodborne illnesses.
<urn:uuid:c4330398-04fd-4d6c-8564-0c1a721b7eaf>
CC-MAIN-2023-23
https://www.newzealandrabbitclub.net/why-do-indian-people-boil-milk/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649986.95/warc/CC-MAIN-20230604125132-20230604155132-00180.warc.gz
en
0.953982
5,379
3.15625
3
Make elections accessible, disability rights groups tells Election Commission of India The Election Commission of India (ECI) has made inclusive elections a key priority of the upcoming national election. All efforts are being made to ensure people with disabilities who are eligible to vote, do so in a free and fair manner. For instance recently in Bihar, the ECI made sure that polling booths are on the ground floor so that wheelchair users can go inside the booth using ramps. Mobile ramps have also beens et up to enable easy access. Another step is the launch of a mobile app so that disabled people can register for pick up and drop facilities to polling booths. There are dummy ballot papers in Braille to create awareness about elections amongst visually impaired people. Disability rights groups hope that all these measures will be introduced across India. Professor Raghuraman, a disability rights activist in Chennai, hopes the ECI will go beyond just ramps. It was the late Javed Abidi who spoke up for accessible elections. He has strived a lot to make this a reality. In 2005, the Supreme Court of India had ordered accessible elections to come into immediate effect. Unfortunately, even today, the ECI has not worked towards completing it. There is much to do like introducing tactile paths and railings etc. There are 21 types of disabilities mentioned in RPWD Act, 2016. Are all of them fulfilled? Do authorities even know what the requirements of these disabilities are? – Professor Raghuraman, Disability Rights Activist Strong words but sentiments shared by people of various disability types. Dr Lyse Bin Muhammad of the All Kerala Wheelchair Rights Federation, says the ECI is moving in the right direction but lots more needs to be done. “It is high time that the ECI takes accessible elections seriously. Disabled people also have the right to vote. More facilities must be introduced for those who are visually impaired and those with severe disabilities”, says Muhammad. Come May, the ECI will be tested on these promises. The disabled community too is closely watching to ensure the commission walks the talk.
<urn:uuid:273e09db-60d3-441b-9246-c718bd9c2132>
CC-MAIN-2020-05
https://newzhook.com/story/21618/
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250592565.2/warc/CC-MAIN-20200118110141-20200118134141-00442.warc.gz
en
0.960862
430
2.515625
3
NAZIR (Heb. נָזִיר; "Nazirite"), fourth tractate in the order Nashim, in the Mishnah, Tosefta, and the Babylonian and Jerusalem Talmuds. It deals, as its name indicates, with the laws of the *Nazirite (Num. 6:1–21), and its position after the tractate *Nedarim ("Vows") is determined by the fact that the assumption of Naziriteship was by vow. In the Babylonian Talmud it comes before Sotah ("The Unfaithful Wife")–although in the Bible it follows it–because "whosoever sees the degradation of an unfaithful wife will forbid himself the use of wine as leading to such behavior" (2a). The tractate consists of nine chapters. Chapter 1 deals with the various verbal formulas used in undertaking the vow and their implications, and the duration of the three forms–the ordinary, the Samson, and the lifelong Naziriteship. Chapter 2 continues the same theme and discusses whether it is possible to limit Naziriteship to only part of its obligations. Chapter 3 deals with multiple Naziriteships, the procedure of polling the head at the end of the Naziriteship, and the intervening of ritual uncleanness terminating the Naziriteship. In Mishnah 6 of this chapter, there is the story of Queen *Helena of Adiabene who fulfilled a vow that if her son returned safely from war, she would take a Nazirite vow for seven years; this incident confirms the statement of Josephus (Wars, 2:313) that it was the custom for someone in trouble or danger to undertake a Nazirite vow. Chapter 4 deals with Naziriteship made dependent upon that of another, a stranger, husband, or wife; the consequences of annulling a Naziriteship; the father's power to impose Naziriteship upon his son; and the son's right to utilize his deceased father's Nazirite money. Chapter 5 discusses vows made in error and the situation which arose when the destruction of the Temple made the adoption of the complete Nazirite vow impossible. Chapter 6 discusses the duties of a Nazirite in greater detail, as well as the sacrifices to be brought either when the Naziriteship is interrupted by uncleanness or when it is completed in cleanness. Chapter 7 discusses on which occasions the Nazirite may defile himself for the dead, and which sources of uncleanness interrupt the Naziriteship. Chapter 8 deals with uncertain breaches of the vow. Chapter 9 discusses the fact that gentiles cannot, but women and slaves can, become Nazirites and whether the prophet Samuel was a Nazirite. It can be demonstrated that several mishnayot of Nazir belong to the Second Temple period. Among them are 1:1, which predates the schools of Shammai and Hillel (Tosef., Naz. 1:1 and 2:1), and mishnayot 7:2–3, the laws of which were The Babylonian Talmud to Nazir differs from the rest of the Talmud in language and is similar to that of the Jerusalem Talmud (cf. Pseudo-Rashi on Nazir 32a, S.V. amar mar). Epstein claims that it was compiled in Maḥoza and Pumbedita, where a special Aramaic dialect was used (Amoraim, 72–83), and that the anonymous discussions in the Jerusalem Talmud were taken from Rava's discussion in the Babylonian Talmud. A. Weiss, however, maintains that there is an essential difference in style, content, and the names of the rabbis quoted, and attributes the differences to the fact that the study of Nazir was neglected, and therefore lacks the post-amoraic embellishments given to the other tractates. The Babylonian Talmud has an important passage (23a) dealing with the importance of motive in action. It also contains the dictum (23b): "A man should always occupy himself with the Torah and its precepts even though it be for some ulterior motive, for the result will be that he will eventually do it without ulterior motive." The rabbinic attitude to *asceticism can be seen in the dictum of Eleazar ha-Kappar (19a); that the Nazirite is called "a sinner by reason of the soul" (Num. 6:11) because he denied himself wine: "If then one who denies himself wine only is termed a sinner, how much so then one who is an ascetic in all things!" Support for this point of view is also found in the Jerusalem Talmud (Kid. 4:12, 66d): Man is destined to be called to account for everything (permitted) he saw (and desired) but did not partake of. After the destruction of the Temple, since it was impossible to complete Naziriteship by offering the sacrifices on its conclusion, the practice fell into disuse. Tractate Nazir was not studied in the academies of the geonim, nor were there any halakhot on it in the Halakhot Pesukot, Hilkhot Re'u, or Halakhot Gedolot (B.M. Lewin, Oẓar ha-Ge'onim, 11 (1942), 8, and Epstein, Tannaim, p. 72). The commentary to Nazir attributed to Rashi was apparently written by his son-in-law Meir b. Samuel, who recorded the commentaries of Isaac b. Eleazar ha-Levi, Rashi's teacher. According to Epstein the tosafot to Nazir were written by the disciples of Perez of Corbeil. The talmudic tractate in the Soncino edition was translated into English by B.D. Klien (1936). Halevy, Dorot, 3 (1923), 48ff.; A. Weiss, Hithavvut ha-Talmud bi-Shelemuto (1943), 128–57; Epstein, Tanna'im, 383–93; Epstein, Amora'im, 72–83; Ḥ. Albeck, Shishah Sidrei Mishnah, Seder Nashim (1954), 189–93; Z.W. Rabinowitz, Sha'arei Torat Bavel (1961), 299ff.; D. Halivni, Mekorot u-Masorot (1968), 353–433. Source: Encyclopaedia Judaica. © 2008 The Gale Group. All Rights Reserved.
<urn:uuid:16da60ad-bc86-47d5-b420-27e8218c89c5>
CC-MAIN-2014-10
http://www.jewishvirtuallibrary.org/jsource/judaica/ejud_0002_0015_0_14636.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999677441/warc/CC-MAIN-20140305060757-00074-ip-10-183-142-35.ec2.internal.warc.gz
en
0.950659
1,402
2.78125
3
A Brief History This article presents a chronological list of notable events that happened on January 10th. For each date below, please click on the date to be taken to an article covering that date’s event. On January 10, 49 B.C., Julius Caesar crossed the Rubicon River as he marched toward the city of Rome with his legions. On January 10, 1776, the pamphlet Common Sense by American patriot Thomas Paine was published. On January 10, 1810, Napoleon Bonaparte, Emperor of the French, divorced Josephine, Empress of the French, the only woman Napoleon ever really loved. On January 10, 1927, Austrian/German filmmaking legend Fritz Lang released his movie based on a story by Thea von Harbou called Metropolis, a dystopian view of the future in which enormous differences exist between social classes. On January 10, 1927, Fritz Lang’s classic film Metropolis was released in Germany. On January 10, 2015, a southern African funeral in the country of Mozambique was the horror scene of a mass (believed intentional) poisoning in which 75 people died and another nearly 200 were hospitalized. On January 10, 2020, the latest World War I combat epic film, simply titled 1917, makes its widespread opening across the United States. On January 10, 2020, a not so latest science fiction/horror movie, Underwater, was released across the country after sitting in whatever box movies sit it while they await release for the past couple years. Question for students (and subscribers): Which event that occurred on today’s date would you like to learn more about? Please let us know in the comments section below this article. Your readership is much appreciated! For more information, please see… Andrews, John and Matt Baker. Timeline of World History. Thunder Bay Press, 2020. You can also watch video versions of this article on YouTube.
<urn:uuid:db0207fb-b3fb-4b8d-853e-05bb50c0c915>
CC-MAIN-2023-40
https://www.historyandheadlines.com/this-day-in-history-on-january-10th/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506632.31/warc/CC-MAIN-20230924091344-20230924121344-00015.warc.gz
en
0.955236
409
3.171875
3
Temperature changes 2000-2009 relative to the 1951-1980 mean. Warmer areas in red, cooler blue. The largest increases occurred in the Arctic and part of the Antarctic. Image courtesy NASA. Click to Enlarge. The decade 2000-2009 was the warmest since modern recordkeeping began, and 2009 was tied for the second warmest single year, a new analysis of global surface temperature shows. The analysis, conducted each year by the NASA Goddard Institute for Space Studies (GISS), an affiliate of the Earth Institute, also shows that in half the world--the Southern Hemisphere--2009 was the warmest year yet recorded. "There's always an interest in the annual temperature numbers and on a given year's ranking, but usually that misses the point," said James Hansen, the director of GISS, which conducts a similar analysis each year. "There's substantial year-to-year variability of global temperature. But when we average temperature over five or ten years to minimize that variability, we find that global warming is continuing unabated." 2008 was the coolest year of the decade, due to strong cooling of the tropical Pacific Ocean, but 2009 saw a return to near-record global temperatures. The past year’s temperatures were only barely surpassed by 2005, the warmest recorded year, and tied with a cluster of others — 1998, 2002, 2003, 2006 and 2007 — as second warmest. Through the last three decades, the GISS surface temperature record shows an upward trend of about 0.2°C (0.36°F) per decade. The greatest increases in 2000-2009 came in the Arctic and part of Antarctica. Except for a leveling off between the 1940s and 1970s, Earth’s surface temperatures have increased steadily since 1880, when modern scientific instrumentation became available to monitor temperatures precisely. In total, average global temperatures have increased by about 0.8°C (1.5°F) since 1880. At least in the United States, the near-record temperature of 2009 would seem to be all the more striking because it includes a notably frigid December in much of North America, with heavy snowstorms and freezing of crops in the south. High air pressures in the Arctic decreased the east-west flow of the jet stream, while also increasing its tendency to blow from north to south. This resulted in an unusual effect, in which cold air from the Arctic rushed into North America and warmer mid-latitude air shifted toward the north. Of course, the contiguous 48 states cover only 1.5 percent of the world area, so the U.S. temperature does not affect the global temperature much,' said Hansen. Global annual surface temperatures 1880-2009. Long-term trends are most apparent when averaged over five-year periods (red line). Image courtesy NASA. Click to Enlarge. The long-term rise since 1880 is “the important number to keep in mind," said Gavin Schmidt, another GISS climatologist. "In contrast, the difference between, say, the second and sixth warmest years is trivial since the known uncertainty, or noise, in the temperature measurement is larger than some of the differences between the warmest years." Climate scientists agree that rising levels of carbon dioxide and other greenhouse gases trap incoming heat near the surface of the earth and are the key factors causing the rise in temperatures. However, these gases are not the only factors that can affect global temperatures. Other key factors--changes in the sun's irradiance, oscillations of tropical sea-surface temperature such as the El Niño-La Niña cycle, and changes in the levels of airborne particles — can also cause slight increases or decreases in the planet's temperature. But overall, the evidence suggests that these effects are not enough to account for the global warming observed since 1880. El Niño and La Niña are prime examples of how the oceans can affect global temperatures. These terms describe abnormally warm or cool sea surface temperatures in the South Pacific, caused by changing ocean currents. Global temperatures tend to decrease in the wake of La Niña, which occurs when upwelling cold water off the coast of Peru spreads westward in the equatorial Pacific Ocean. La Niña lingered during the early months of 2009 and gave way to the beginning of an El Niño phase in October that is expected to continue in 2010. An especially powerful El Niño cycle in 1998 is thought to have contributed to the unusually high temperatures that year, and Hansen's group estimates that there is a good chance 2010 will be the warmest year on record if the current El Niño persists. At most, scientists estimate that El Niño and La Niña can cause global temperatures to deviate by about 0.2°C (0.36°F). Northern hemisphere (red line) and Southern hemisphere, 1880-2009. Last year was the hottest ever recorded in the south. Click to Enlarge. Warmer surface temperatures also tend to occur during particularly active parts of the solar cycle, known as solar maximums, while slightly cooler temperatures occur during lulls in activity, called minimums. A deep solar minimum has made sunspots a rarity in the last few years. Such lulls in solar activity, which can cause the total amount of energy given off by the sun to decrease by about a tenth of a percent, typically spur surface temperature to dip slightly. Overall, solar minimums and maximums are thought to produce no more than 0.1°C (0.18°F) of cooling or warming. "In 2009, it was clear that even the deepest solar minimum in the period of satellite data hasn't stopped global warming from continuing," said Hansen. Small particles in the atmosphere, called aerosols, can also affect the climate. Volcanoes are powerful sources of sulfate aerosols that counteract global warming by reflecting incoming solar radiation back into space. In recent years, large eruptions at Mount Pinatubo in the Philippines and El Chichón in Mexico have caused global dips in surface temperature of as much as 0.3°C (0.54°F). But volcanic eruptions in 2009 did not have a significant impact. Meanwhile, other types of aerosols, often produced by burning fossil fuels, can change surface temperatures by either reflecting or absorbing incoming sunlight. Hansen's group estimates that aerosols probably counteract about half of the warming produced by manmade greenhouse gases, but he cautions that better measurements of these elusive particles are needed. To conduct its analysis, GISS uses publicly available information from three sources: weather data from more than 1,000 meteorological stations around the world; satellite observations of sea-surface temperatures; and Antarctic research station measurements. These three data sets are loaded into a computer program (available for public download from the GISS website). The program calculates trends in temperature anomalies — not absolute temperatures, but rather changes relative to the average temperature for the same month during the period of 1951-1980. Other research groups also track global temperature trends, but use different analysis techniques. The Met Office Hadley Centre, based in the United Kingdom, uses similar input measurements as GISS, for example, but omits large areas of the Arctic and Antarctic, where monitoring stations are sparse. Although the two methods produce slightly different results in the annual rankings, the decade-long trends in the two records are essentially identical. Previously, the World Meteorological Organization issued a similar report in December 2009, saying that 2000-2009 would rank as the warmest decade on record, and 2009 would probably be among the warmest years. "There's a contradiction between the results shown here and popular perceptions about climate trends," Hansen said. "In the last decade, global warming has not stopped."
<urn:uuid:3d8021dc-3032-4623-80f6-1c648cab8895>
CC-MAIN-2014-10
http://www.earthinstitute.columbia.edu/articles/view/2620
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999679238/warc/CC-MAIN-20140305060759-00000-ip-10-183-142-35.ec2.internal.warc.gz
en
0.93802
1,569
3.78125
4
Forensic reconstruction of Nebiri Forensic reconstruction of the head of the dignitary Nebiri,by forensic artist Philippe Froesch. Nebiri was an Official who worked under King Thutmose III of the 18th Dynasty. Despite his body being pretty much destroyed, most likely due to tomb robberies in antiquity, the immaculate way in which he was mummified, showcases his status in society, his embalming being not too dissimilar to the later 18th Dynasty mummies of Yuya and Tuya, parents of Queen Tiye. Despite only small fragments of his remains being left, including his head (which still has wrappings in some places), due to such profound embalming, the modern forensic team were able to find out Nebiri suffered from gum disease among other ailments. Nebiri was found within the Valley of the Queens, and alongside his remains were Canopic jars. Studies by the forensic team, showcased that Nebiri’s lungs still held signs of heart failure, “aggregates of cells” are still noticeable to this day. Egyptologists, using modern science, such as C.T. scans, can now discover likely age and ailments the deceased had. By studying specific parts of the human remains such as, teeth, fragments of facial tissues, organs (if able) and bone density, almost entirely accurate approximations can be made regarding age. Tooth-ware, is one of the most common determinations, and joint analysis too, however, for Nebiri, it was seemingly the tissue upon his face which was a factor in determining his age range. The head was constructed by forensic visual artist Philippe Froesch. He has done multiple other works and is distinguished in his field. Thank you to modern science and artists such as Froesch, we are allowed to somewhat stand face to face with our past. Watch video form of this post here: https://youtu.be/UtoFz89-dnQ
<urn:uuid:fd13c58a-d1b4-4f45-aa5b-ec4262cb993d>
CC-MAIN-2023-40
https://egypt-museum.com/forensic-reconstruction-of-nebiri/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511055.59/warc/CC-MAIN-20231003060619-20231003090619-00439.warc.gz
en
0.983079
410
2.96875
3
The programming world, could be very huge, and you must do a number of research, to ensure that you to have the ability to grasp, any programming language in its entirety. They harness the facility of computers to make programming easier 6 by permitting programmers to specify calculations by getting into a components directly (e.g., Y = X2 + 5X + 9). FORTRAN , the primary extensively used high-stage language to have a functional implementation, got here out in 1957 7 and many other languages had been quickly developed – specifically, COBOL aimed at industrial data processing, and Lisp for laptop research. If you’re going to be taught C++, it’s imperitive that you learn the Modern model to maximise your career alternatives and to ensure your abilities are updated. Study the fundamentals of programming with Karel the Dog, a fun, accessible and visible introduction to coding, the place giving instructions to a pc is just like giving instructions to a dog. Why “BC” was most popular over the opposite programming languages. Microsoft home windows uses this kind of raw signaling, drive the programmers to read and process every signal. In this video we learn how to compare C++ parts in C++ utilizing the == operator. Nevertheless, the Xbox and Windows variations are totally developed, which is why it is the only “abandoned” youngsters programming language on this checklist. It is vitally difficult to determine what are the preferred of modern programming languages. In this video we describe easy methods to use a simple textual content editor and the command-line to compile and run C++ programs on Mac OSX. This presentation will give an outline of the potential of neural nets in game improvement, in addition to provide an in depth look at how you should use neural nets mixed with reinforcement studying for brand spanking new varieties of sport AI. Any longer, neural nets shall be a strong new tool in the software program engineering toolbox. C++ is a highly efficient and versatile language, first created again in 1985. Revel Programming engages students on the point of studying, which leads to a deeper understanding of the course materials. So, as you have seen, higher-level programming languages provide comparable functionality and in a kind that’s closer to the English language.
<urn:uuid:27e91573-abf7-43ff-ac49-69c07c5d0ac0>
CC-MAIN-2023-50
https://www.xtreme-wheelz.com/programming-by-coincidence-2.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00176.warc.gz
en
0.92191
467
2.8125
3