text
stringlengths 263
344k
| id
stringlengths 47
47
| dump
stringclasses 23
values | url
stringlengths 16
862
| file_path
stringlengths 125
155
| language
stringclasses 1
value | language_score
float64 0.65
1
| token_count
int64 57
81.9k
| score
float64 2.52
4.78
| int_score
int64 3
5
|
---|---|---|---|---|---|---|---|---|---|
Robert Davis Provides Some Helpful Resources to Help Parents with Online Learning
According to district data, Clark County School District students received more failing grades during the fall semester of distance learning than in previous school years. The percentage of ‘F’ grades in this district have more than doubled since the start of the pandemic. As a result, Robert Davis believes that it is vital that families and students receive the support they need to adapt to virtual learning. As a Las Vegas resident for the past 17 years, and as the Founder of RD Heritage Group, he is deeply invested in the health and resilience of his community. Whether you live in Southern Nevada, or anywhere else for that matter, Robert Davis explains that these resources can help your child flourish in a virtual learning environment.
Wide Open School
One of the biggest challenges of virtual learning is keeping students engaged. Wide Open School, an online resource to help families and educators find trusted resources to enrich and support distance learning, partners with reputable organizations to provide an array of content shared through videos, articles, and other learning modules. Robert Davis explains that students can find free, high-quality learning activities across subjects all in one place. With more than 80 partners and supporters that have come together to meet the change in learning due to the pandemic, you can feel confident using this as a resource for your kids. He states that the key to finding virtual learning resources is being able to ensure that the information being provided is credible, well-researched, and vetted. In partnership with PBS, National Geographic, Time, and many more, students can connect with content that has been validated by reputable learning organizations.
Next, Robert Davis highly recommends Khan Academy, a non-profit organization on a mission to provide free, world-class education for anyone, anywhere. Every student on this platform can practice at their own pace, first filling in any gaps in their knowledge and then accelerating their learning. Created by experts in learning and education, Khan Academy has a library of trusted practices and lessons that cover everything from math to science and English. This incredible resource is free for learners and teachers alike. Based on the belief that every child deserves the chance to learn, Khan Academy is supported (and trusted) by major companies ranging from Bank of America to Google and General motors.
If you haven’t heard of CK-12, you’re welcome. Based on the belief that every child should have access to education and that learning is a personal journey, CK-12 is a free resource for parents and students alike. Their user-friendly website allows you to search for any topic or subject you need additional information on and allows you to categorize it by grade and type. Providing articles, videos, study aids, lesson plans, and more, Robert Davis explains that this is an excellent way to find engaging educational content that aligns with your child’s curriculum.
Lastly, Robert Davis states that most local communities have online resources tailored to the local curriculum. In Southern Nevada, there are multiple, and they include: Virtual Homeschool PE (a live physical education lesson), At Home Discoveries (a list of carefully curated resources to help parents find ways to keep their kids learning), and Green Out Planet Virtual Academy (bringing free garden, nutrition, and hydroponic lessons online. Virtual learning is difficult, but you don’t need to do it alone. | <urn:uuid:b3f66950-8a66-431d-a43c-e81ffd1224ce> | CC-MAIN-2023-40 | https://robertdavisrdheritage.medium.com/robert-davis-provides-some-helpful-resources-to-help-parents-with-online-learning-93c78964d4c3?source=user_profile---------0---------------------------- | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511406.34/warc/CC-MAIN-20231004184208-20231004214208-00497.warc.gz | en | 0.950851 | 697 | 3.03125 | 3 |
How much more this boy would be learning if the instruction was project-based and developmentally appropriate! But this type of learning is harder to measure for the test-mavens. Let's rally in support of educating young children, including second and third-graders, the way they learn best!
Saturday, September 10, 2011
Recently, one of our school's alumni, now a second grader, came along with his Dad to pick up his sister. His Dad said that this boy missed our program, and the boy told me that he "only had a half hour for recess", that the rest was "boring". He explained to me that his teacher told him that, while it might be boring, children had to learn, so they had to sit still and pay attention. There they are in school, then, sitting still, doing boring work, because they "have to learn". No one could have been more articulate about the frustrations of children in school than this boy. He knew intuitively what is well-known in the field: A child who is distracted by his body's need to move, or his mind's need to explore and create, is not going to be able to learn at his/her potential. This is canonical in Early Childhood Education and yet the public schools still insist on treating young learners as if they were "brains on sticks" . Child development is not seen as an important part of a teacher's toolkit. People who graduate from Master's Programs in Education come out with practically no knowledge of how children learn. This should be an integral part of the Master's program. | <urn:uuid:a1647421-98e2-4c2b-972d-60311f756b58> | CC-MAIN-2017-34 | http://artsandchildren.blogspot.com/2011/09/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105700.94/warc/CC-MAIN-20170819162833-20170819182833-00180.warc.gz | en | 0.989991 | 328 | 2.9375 | 3 |
John Wesley was a famous English Anglican cleric, who is known to have founded Methodism with his brother Charles and a fellow cleric by the name of George Whitefield.
John Wesley was responsible for leading the “Holy Club”, a society which was formed for the purpose of the study and to pursue the Christian life with utmost devotion. It was founded by his brother Charles, and George Whitefield was one of its members.
John Wesley had an unsuccessful ministry of about two years in the Georgia Colony of Savannah, following which he returned to London. He is known to have joined the religious society led by Moravian Christians during this time.
A Gist of John Wesley’s Life
He had experienced an evangelical conversion during this time and he had subsequently left the Moravians to continue with his own ministry. He traveled and preached outdoors, that was a key step in the development of Wesley’s ministry. Wesley embraced the Arminian doctrines that were a central force in England at the time.
Wesley spent a major part of his life moving from Ireland and Great Britain and helping to form and organize Christian groups that would develop discipleship, personal accountability, and religious instructions. He even appointed itinerant and unordained evangelists like him to travel and preach to groups of people.
The Methodists became leaders in many social issues like the abolition of slavery and prison reform. Wesley had argued for the notion of Christian perfection and was against Calvinism, especially the doctrine of predestination.
He believed that Christians could achieve the place where the love of God would be supreme in their lives and thus achieve outward holiness.
John Wesley Biography
The Evangelicalism of John Wesley was based on sacramental theology and he maintained that means of grace was the device through which God would sanctify and transform the believer and encourage people to experience the presence of Jesus Christ.
John Wesley had remained within the established Church of England and had insisted for the Methodist movement to be apart of its traditions. Though the Methodists were persecuted and Wesley was barred from preaching many parish churches during the early stages, he died as “the best-loved man in England”.
Early Life of John Wesley
John Wesley was born on 28th June 1703 in Epworth as the fifteenth child out of the nineteen children of Samuel Wesley and his wife Susanna Wesley! Most children in the families at that time got their early education from their parents.
The children were not expected to get proficient in Greek or Latin. Susanna Wesley maintained that each of the children got proper education and examined them before the midday meal or evening prayers.
They were not allowed to eat between meals and would be interviewed singularly by their mother to ascertain the fact that they were receiving a proper spiritual education.
Wesley had become a student of the Charterhouse School in London where he not only became studious but methodical and practiced religious life the way he had been trained at home. Wesley enters the Christ Church at Oxford in June 1720. He graduated with a Bachelor of Arts in 1724.
On 25 September 1725, he has ordained a deacon as the holy orders were a necessary step to become a fellow and a tutor at the university. He began to read Thomas a Kempis and Jeremy Taylor and seek the religious truths that would lay the path of the great revival of the 18th century.
Rise to Fame of John Wesley
John read the Christian Perfection and A Serious Call to a Devout and Holy Life by William Law. He also pursued a rigid and methodical life and studied the Scriptures.
He had a sublime view of God and kept it as sacred as possible because he believed salvation can be achieved only through obedience. He performed the religious duties diligently and deprived himself in order to be able to give alms.
John Wesley Death
Wesley died on March 2, 1791, at the age of 87. He had friends gathered around him on his deathbed. He had died poor because of his charitable nature.
He had about 500 itinerant preachers carrying on his work under the name of “Methodist” and about 100,000 followers. When he was carried to the grave, he had left behind a good library of books and a well-worn clergyman’s gown. | <urn:uuid:a99c233a-5d69-4554-92f8-edbacc90b9e2> | CC-MAIN-2020-29 | http://victorian-era.org/john-wesley.html | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655933254.67/warc/CC-MAIN-20200711130351-20200711160351-00360.warc.gz | en | 0.990595 | 885 | 3.640625 | 4 |
The human stomach related framework depends on a progression of gainful microorganisms and stomach related compounds so as to appropriately process and backing the resistant framework. These human-accommodating microorganisms are regularly alluded to as gainful microbes or probiotics and are a basic segment of sound assimilation. A developing assemblage of logical exploration underpins normally acquainting live advantageous microorganisms with the stomach related lot so as to help assimilation, improve the insusceptible framework, and forestall persistent sickness. These little animals help in separating food matter and keep some hurtful microorganisms under control. One technique for presenting these life forms is consistently ingesting nourishments matured with helpful microscopic organisms, for example, probiotic yogurt, kimchee and different aged refreshments. A considerable lot of these nourishments contain some assortment, or strain, of valuable microorganisms.
They are typically from a couple of various sort and, along these lines, not assorted in species cosmetics. Assorted species is significant on the grounds that one animal groups or one class of organism just creates one lot of metabolites. More metabolites chemicals, nutrients, minor elements, bacteriocins, and so forth. mean more dietary and insusceptible help. Metabolites are just created during metabolic movement. In this way, if there is no action, the metabolites are not being created. Metabolic action happens during dynamic aging and developing. We might want to make a note on yogurt. Most yogurts available are not matured. The milk is regularly thickened with some sort of corrosive acidic corrosive, vinegar, citrus extract, and so forth. and are vaccinated with freeze dried societies sooner or later during the handling of the food and afterward refrigerated to shield the way of life from developing while away no metabolic movement.
This implies the milk base isn’t appropriately pre-processed by the live organisms and you don’t get all the advantages of the metabolites that would have been created by the microorganisms during a real aging cycle. There are a few yogurts available that are aged. Ensure they are plainly set apart on the name. Kefir is another matured milk item that utilizes numerous types of organisms and is aged. For some, in any case, these aged nourishments are not promptly accessible, badly arranged or not viable with their dietary prerequisites. A few people may wish to utilize non-soy, non-dairy, or without wheat probiotics. For these people, a more proficient and dependable arrangement would locate the correct peak bioboost to accommodate their dietary needs. What is more, since many matured nourishments are made with low variety, getting all, you need from food sources turns out to be troublesome. | <urn:uuid:ff252efd-1f9c-4a27-82e2-5f79cea58383> | CC-MAIN-2023-23 | http://dav-net.com/2020/peak-bioboost-supplement-is-it-safe-and-healthy.html | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224657144.94/warc/CC-MAIN-20230610062920-20230610092920-00082.warc.gz | en | 0.950201 | 560 | 2.71875 | 3 |
Free Newsletters - Space - Defense - Environment - Energy - Solar - Nuclear
by Staff Writers
Moscow (Voice of Russia) Feb 24, 2014
NASA's mission to reel in an asteroid took an important step forward when the agency recently established a new "rapid response system" intended to pinpoint the most eligible targets for capture.
By setting up this new screening process, NASA is hoping to narrow down the list of possible capture targets. Ultimately, the goal is to bring an asteroid into a stable lunar orbit so it would become a suitable landing destination for an astronaut.
According to the American space agency, the project would also permit scientists to experiment with various methods that could theoretically divert hazardous objects away from the Earth. This goal has become particularly important ever since a meteorite broke up over Chelyabinsk, Russia, and injured more than 1,500 people.
The first step, however, is both simple and difficult at the same time: choosing the right asteroid to capture. According to Space.com, this process is particularly hard considering that many asteroids are simply too big to consider moving for a project such as this, while the unstable orbits of other rocks also makes them poor choices.
As noted by NASA's Paul Chodas, a senior scientist in the Near-Earth Object Program office in California, the ideal asteroid size is somewhere below 40 feet across. Even then, the sheer quantity of space rocks in this category presents a problem.
"There are hundreds of millions of objects out there in this size range, but they are small and don't reflect a lot of sunlight, so they can be hard to spot," Chodas said in a statement to Space.com. "The best time to discover them is when they are brightest, when they are close to Earth."
Under the new screening system, the agency mines a large library of near-Earth objects until it finds a potential candidate. Once a target is found, scientists take to their powerful telescopes in order to gather more data on the rock - a process that needs to be finished quickly, since asteroids typically move out of a telescope's sight within a couple of days.
"If an asteroid looks as if it could meet the criteria of size and orbit, our automated system sends us an email with the subject 'New ARM Candidate,' " Chodas added. "When that happens, and it has happened several dozen times since we implemented the system in March of 2013, I know we'll have a busy day."
So far, NASA has only been able to identify two targets a year as potential candidates, but the agency is hoping to up that number to four or more.
As RT reported in January, NASA revived its near-Earth asteroid-detection program in 2013, and the project made its first discovery this year when it discovered a "potentially hazardous" object heading in Earth's direction. The asteroid is expected to miss Earth by 300,000 miles, or roughly the distance of the moon.
As for the manned asteroid program, NASA began testing out new spacesuits in December that allow for increased mobility. The new suits are intended for use not just in asteroid landings, but also future moon and Mars missions.
Source: Voice of Russia
Asteroids at NASA
Asteroid and Comet Mission News, Science and Technology
|The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service.| | <urn:uuid:59e1b675-1466-4024-9594-5704f6d5cd29> | CC-MAIN-2014-10 | http://www.spacedaily.com/reports/NASA_takes_major_step_in_hunt_for_asteroids_999.html | s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999671301/warc/CC-MAIN-20140305060751-00060-ip-10-183-142-35.ec2.internal.warc.gz | en | 0.939102 | 898 | 3.28125 | 3 |
Themes of Bible Books - Simplified in One or Two SentencesThe non-canonical books referenced in the Bible includes pseudepigrapha , writings from Hellenistic and other non-Biblical cultures, and lost works of known or unknown status. By the "Bible" is meant those books recognised by most Christians and Jews as being part of Old Testament or Tanakh as well as those recognised by Christians alone as being part of the Biblical apocrypha or of the Deuterocanon. For the purposes of this article, "referenced" can mean direct quotations, paraphrases, or allusions, which in some cases are known only because they have been identified as such by ancient writers, or the citation of a work or author. The following are mentioned in the Hebrew Bible :. Some suggest that Nestle's Greek New Testament lists some New Testament passages that appear to be verbal allusions to paracanonical books. Pagan authors quoted or alluded to: .
Non-canonical books referenced in the Bible
The Bible is divided into two sections: the first section which contains three-fourths of the Bible is called the Old Testament, the second section is called the New Testament. Essentials - Word Searching 4. Password Must be at least 6 tneir. Retrieve Adv.
66 Books In The Bible
This electronic edition was downloaded from the Bible study comments, supplying some incidents omitted by St, notes. E-Book and Commentary. The Book of Ecclesiastes 12 Logos reads all your books instantly, delivering just what you need at each thw in your Bible study. Mark A brief history of the life of Christ.
Search verses, phrases, and topics e. John , Jesus faith love. Other Searches. Blue Letter Bible offers several daily devotional readings in order to help you refocus on Christ and the Gospel of His peace and righteousness. Recognizing the value of consistent reflection upon the Word of God in order to refocus one's mind and heart upon Christ and His Gospel of peace, we provide several reading plans designed to cover the entire Bible in a year. Since the text and audio content provided by BLB represent a range of evangelical traditions, all of the ideas and principles conveyed in the resource materials are not necessarily affirmed, in total, by this ministry. Blue Letter Bible study tools make reading, searching and studying the Bible easy and rewarding.
What follows is an attempt to capture these themes it's simplest form. Twi Bible pdf Twi Bible pdf Downloads. Click the Commentary tab or pulldown menu for a full selection of commentaries over any Bible passage you are researching? Parens - Jhn KJV.
Information about this Book. No Delimiter - The Second Epistle of Paul to the Thessalonians.It is the sentence that the Astronauts read out from their Space Module. The Book of Psalms 2. Paul encourages Titus in the performance of his ministerial duties. Epistle to the Colossians St.
Bible Desktop User Manual v 1. The Study Bible and the Commentary are essentially one and the same. This way you can quickly and easily locate scriptures. Advanced Bible Study Series. | <urn:uuid:a1e7b6bc-627f-47cb-94c3-1473f5fb3ac9> | CC-MAIN-2020-24 | https://hostaloklahoma.com/and-book/91-66-books-of-the-bible-and-their-meaning-pdf-386-542.php | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347432521.57/warc/CC-MAIN-20200603081823-20200603111823-00408.warc.gz | en | 0.941035 | 650 | 2.828125 | 3 |
National American Indian Heritage Month, 2007A Proclamation
National American Indian Heritage Month is an opportunity to honor the many contributions of American Indians and Alaska Natives and to recognize the strong and living traditions of the first people to call our land home.
American Indians and Alaska Natives continue to shape our Nation by preserving the heritage of their ancestors and by contributing to the rich diversity that is our country's strength. Their dedicated efforts to honor their proud heritage have helped others gain a deeper understanding of the vibrant and ancient customs of the Native American community. We also express our gratitude to the American Indians and Alaska Natives who serve in our Nation's military and work to extend the blessings of liberty around the world.
My Administration is committed to supporting the American Indian and Alaska Native cultures. In June, I signed the “Native American Home Ownership Opportunity Act of 2007,” which reauthorizes the Indian Housing Loan Guarantee Program, guaranteeing loans for home improvements and expanding home ownership for Native American families. Working with tribal governments, we will strive for greater security, healthier lifestyles, better schools, and new economic opportunities for American Indians and Alaska Natives.
During National American Indian Heritage Month, we underscore our commitment to working with tribes on a government-to-government basis and to supporting tribal sovereignty and self-determination. During this month, I also encourage Federal agencies to continue their work with tribal governments to ensure sound cooperation. Efforts such as on-line training programs will improve interagency collaboration in the Federal Indian Affairs community and help to strengthen relationships with tribes, building a brighter future for all our citizens.
NOW, THEREFORE, I, GEORGE W. BUSH, President of the United States of America, by virtue of the authority vested in me by the Constitution and laws of the United States, do hereby proclaim November 2007 as National American Indian Heritage Month. I call upon all Americans to commemorate this month with appropriate programs and activities.Start Printed Page 62398
IN WITNESS WHEREOF, I have hereunto set my hand this thirty-first day of October, in the year of our Lord two thousand seven, and of the Independence of the United States of America the two hundred and thirty-second.
[FR Doc. 07-5509
Billing code 3195-01-P | <urn:uuid:b3032466-6109-4577-b0df-2b1b0a09a289> | CC-MAIN-2017-34 | https://www.federalregister.gov/documents/2007/11/02/07-5509/national-american-indian-heritage-month-2007 | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886109682.23/warc/CC-MAIN-20170821232346-20170822012346-00279.warc.gz | en | 0.925947 | 470 | 3.28125 | 3 |
school bus rules coloring pages
school bus safety coloring pages sketch coloring page school pages
coloring rules bus.
In 1939, rural education expert Dr. Frank W. Cyr organized a week-long conference at Teachers College, Columbia University that forever changed the design and production of school buses. Funded by a $5,000 grant, Dr. Cyr invited transportation officials, representatives from body and chassis manufacturers, and paint companies. To reduce the complexity of school bus production […]
coloring pages for middle school math
math coloring pages for middle school coloring home coloring for math
middle pages school.
winter coloring pages for middle school
winter multiplication color by number by amy isaacson tpt winter middle for coloring school
coloring pages school of fish
small fish coloring pages sunday school pinterest school coloring pages fish
school safety coloring pages
health and safety color page education school coloring safety pages
bible school coloring pages
bible coloring pages bible coloring pages
coloring pages school supplies
pencil drawing for kids videos for kids kids crafts coloring school pages supplies.
walk to school day 2020 coloring pages
2019 2020 first day of school sign coloring page day walk coloring school 2020 to pages.
math coloring pages high school
math coloring pages by number 343 color by number for high pages math coloring school.
coloring pages for preschool sunday school
preschool sunday school coloring pages coloring home school
sunday coloring preschool pages for. | <urn:uuid:05b4820a-2e37-4435-885b-86909dc4a4a3> | CC-MAIN-2020-05 | https://ccube-o.info/tag/school/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250592565.2/warc/CC-MAIN-20200118110141-20200118134141-00377.warc.gz | en | 0.858938 | 297 | 3.265625 | 3 |
Everyday, on the way to class, or while working out at the gym, I listen to music. I am not the only one that does that, as I believe most listen to some sort of music everyday. My most used method of listening involves headphones. They are easy to carry around and are very mobile. Nobody wants to be that guy who plays music out loud while walking on the sidewalk, so we all resort to headphones. Headphones, such as the common apple headphones, are an easy way to listen to your favorite songs on the go. Though they produce quality sound, they also are counterproductive for us. I never thought of this before, but these little buds that project music into our ears, can cause hearing loss.
According to the American Osteopathic Association, 1 in 5 teens today have some sort of hearing loss. This is a 30% increase from the 1980’s. One would expect this number to have gone down, with the improvements in technology and medication, but instead it has increased. Why is this? According to them, they accredit it to headphones. Dr. James E. Foy says that even a mild hearing loss due to headphones can create lifelong delays in speech development and hearing development (Ostheopathic.org). This is not anything anyone wants to ever look forward to. Also, according to the World Health Organisation, the single biggest cause of preventable hearing loss is due to loud music (The Guardian). Though they do not state if it is due to headphones or not, one must assume, based off of Dr. James E Foy’s statements, that headphones greatly worsen the chances of hearing loss compared to music over a speaker.
So what is too loud? It is safe to assume that earphones are not always dangerous. If one is playing music at a soft volume, damage will not occur, but once you pass a certain threshold, the damage can become a real threat. The question is, what exactly is that threshold? According to David A. Schessel, the chief of Otolaryngology-Head and Neck Surgery Division at the Stony Brook University College of Medicine, this threshold is at 85-decibels. Below it is considered safe, while above it can cause permanent damage. He states that to tell if the music is too loud, if one can hear the music from headphones, that is not wearing that pair of headphones, it is too loud (Stony Brook Medicine). This seems to be a simple concept, as the music is intended for you, not for everyone around you. But, it can be hard to tell if others can hear it, as most won’t speak up if they can hear it.
This controversy over headphones is not too much as a controversy at all. They can cause permanent damage to your ears, and that is known throughout the science world. But, it is that 85-decibel threshold that is important for us to keep in mind, as when we pass that limit, we are forever damaging our ears. There is a simple solution to this though, one that I will now pick up on in the future. I will now invest in “db Logic Earbud Headphones with SPL2 Technology”. This technology prevents you from turning up the volume above the 85-decibel threshold that causes permanent ear damage (Apartment Therapy). These will prevent that future ear damage that is now a very real possibility for all of us. In conclusion, yes these ear buds that we wear everyday can cause damage to our ears. Maybe it would be smarter for all of us to be that guy that plays music aloud while walking down the street, at least he won’t have permanent ear damage.
Stony Brook Surgery. “Headphones & Earphones Can Cause Permanent Hearing Loss.” Stony Brook School of Medicine. N.p., 23 Aug. 2013. Web. 4 Dec. 2015. <http://medicine.stonybrookmedicine.edu/surgery/blog/headphones-and-earphones-can-cause-permanent-hearing-loss-what-you-need-to-know>. | <urn:uuid:06ce3170-ebd5-470f-a9c0-173e4f3da94f> | CC-MAIN-2020-24 | https://sites.psu.edu/siowfa15/author/nep5129/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347434137.87/warc/CC-MAIN-20200603112831-20200603142831-00548.warc.gz | en | 0.959758 | 856 | 2.921875 | 3 |
Infectious disease specialists are raising the alarm over a variant of the e.coli bacteria that is resistant to most of the antibiotics used to treat bladder infections and could be responsible for more than 3,000 deaths a year.
E.coli ST131, an aggressive strain of multi-drug-resistant e.coli bacteria, may be responsible for as many as 1 million bladder infections a year, according to a recent study conducted by Dr. James Johnson, an infectious disease expert at the Veterans Affairs Medical Center in Minneapolis.
Please see full article below for more information.
Firefox recommends the PDF Plugin for Mac OS X for viewing PDF documents in your browser.
We can also show you Legal Updates using the Google Viewer; however, you will need to be logged into Google Docs to view them.
Please choose one of the above to proceed!
LOADING PDF: If there are any problems, click here to download the file. | <urn:uuid:68cb3628-cb1d-4b3a-b38e-11cbfa28d30c> | CC-MAIN-2014-23 | http://www.jdsupra.com/legalnews/alarm-sounded-over-drug-resistant-bladde-92737/ | s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510274581.53/warc/CC-MAIN-20140728011754-00125-ip-10-146-231-18.ec2.internal.warc.gz | en | 0.904071 | 195 | 2.671875 | 3 |
We have covered a lot of material along the way. Feel free to go back and review to help pull everything together. Part 1, we talked about the skeletal structure of the lumbar spine. Part 2, was all about the disc. Part 3, ligaments of the lumbar spine took our attention. Part 4, the muscles were the highlights.
There is enough information in those previous blog posts to make my brain sweat!
Here in Part 5, the nerves of the lumbar spine, what do they do, where to they go and what do the innervate (supply).
Taken from: https://www.easynotecards.com
There are a few noteworthy nerves. We are going have a gander at the ventral and dorsal rami and see where the different branches go. The nerve root comes off the spinal cord and splits into two different nerve, the ventral (front) and the dorsal (back) rami. I remember this by thinking about sharks. Sharks have a dorsal fin that comes out of the water and scares people. The dorsal fin is on the sharks back. So dorsal in anatomical terms means back, just one of the weird ways I remember certain things. I almost forgot about the sympathetic nerve trunks. They are on the anterolateral aspect of the vertebral bodies. These are important as you will see there are some branches better the sympathetic and regular nerves.
Taken from: https://quizlet.com
The ventral ramus divides into two different branches, skeletal and muscular. So what does this nerve supply? The ventral rami pierce the intertransverse ligaments and lie between the two layers. The ventral rami of the lumbar spine help to form the lumbar plexus, L1-4 and the L4 and L5 ventral rami join to form the lumbosacral trunk. The lumbosacral trunk joins the lumbosacral plexus.
The muscular branches innervate QL, psoas and the small intertransversarii muscles.
The skeletal branch connects with the grey rami communicans, from the sympathetic nerves, and supplies the anterior longitudinal ligament, anterior and lateral aspects of the annulus.
Another branch of the ventral ramus attaches with the gray ramus communicans to form the sinuvertebral nerve. This nerve is formed after the ventral ramus has left the spinal canal and it turns around and heads back into the intervertebral foramen. The sinuvertebral nerve innervates the posterior longitudinal ligament, the posterior and posterolateral annulus as well as the ventral dural sac and the basivertebral and epidural veins.
The dorsal ramus divides into three branches, medial, intermediate and lateral.
Taken from: https://www.wheelessonline.com
The lateral branch of the dorsal ramus goes to iliocostalis, lumbar and thoracic portions, the thoracolumbar fascia and the L1-3 cutaneous branches. These cutaneous branches can travel as far as the greater trochanter of the femur.
The intermediate branch is simple. It supplies the longissimus muscle. Interesting note, sometimes the intermediate branch is missing. Well instead of being its own branch what it does it becomes a branch off the lateral branch. It still supplies longissimus, no matter where it originates from.
The medial branch of the dorsal ramus is a good one to remember. It supplies goes to the z joints, the level it is at and the level below. So each z joint has two medial branches supplying it. In addition, basically any muscle that comes off the spinous process, is innervated by this nerve. The interspinous muscles and multifidus are both innervated by the medial branch of the dorsal ramus. Interestingly enough, this nerve also only innervates those muscles at the level in which it comes out at. For example, the L3 branch will only innervate the L3 multifidus and interspinous muscles. This, in fact, creates one of the pure myotomes of the body, muscles purely innervated by one segmental level of the spine. Too bad the muscles are too small to actually test for fatigable weakness or decreased reflexes.
I think the most important things to take away from the above is that the disc is innervated by the sinuvertebral nerve and the z joints are innervated by the medial branch of the dorsal ramus.
The next blog post will be the final in our series. It is one of the least talked about aspects of the lumbar spine...
If you have any questions or comments about the Lumbar spine, please click here to contact New Leaf Physio, a mobile Kelowna physiotherapy clinic. | <urn:uuid:b31d406b-4eb9-47e9-ab96-32f5199d35d1> | CC-MAIN-2023-40 | https://www.newleafphysio.ca/post/the-lumbar-spine-masterclass-part-5 | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510358.68/warc/CC-MAIN-20230928031105-20230928061105-00801.warc.gz | en | 0.912934 | 1,024 | 3.625 | 4 |
Gerry Myerson wrote: > In article <[email protected]>, > "Gene Ward Smith" <[email protected]> wrote: > > > Gerry Myerson wrote: > > > > > I think Norm would say, 1) you can't form the set (and Norm's reasons > > > are given in the article), and 2) you don't need to - there's no good > > > mathematics you can do with the completed infinite set that you can't > > > do without it. > > > > Norm is also opposed to axioms. Without axioms, how do we know when we > > are "forming" an infinte set? If I state Euclid's theorem on the > > infinitude of primes, am I "forming" a set? Am I forming a set just by > > referencing the integers at all? If Norm won't give a set of axioms he > > finds acceptable, we can't very well say that measureable cardinals > > contradict his foundations for mathematics, because he hasn't really > > given a foundation. He has, in fact, claimed that infinite sets are > > metaphysics; but if they are metaphysics, he's not talking mathematics > > at all, but metaphysics. In which case, so what? What do his > > metaphysical beliefs have to do with mathematics? > > All these questions are better directed to Norm than to me, > but I'll make believe I know what he is on about, and answer > thus: > > If I remember right, Euclid never said "there's an infinitude of > primes." He just said, "given any prime, there's a bigger one." > You and I are accustomed to interpreting the second as meaning > the same thing as the first, but I think that until quite recent > times, mathematicians didn't. They didn't accept "the completed > infinity," and they were still able to develop the theory of > numbers, prove the quadratic reciprocity theorem, the four squares > theorem, etc. If you state the theorem the way Euclid did, > you are not forming an infinite set, and you can get on perfectly > well that way. > [...]
Well, the Greeks were not able to resolve Zeno's paradoxes, were they? The point is that the Greek way of thinking leads to a paradox that Achilles can never catch up with a tortoise (moving ahead of him in a straight line at a slower velocity). This is the problem with the Greek concept of "potential infinity" -- which will not permit Achilles to "complete" the infinitely many conscious acts needed to catch up with the tortoise (first Achilles has to reach a point where the tortoise was previuously located, but now has moved ahead -- this step repeats itself ad infinitum). I don't think classical real analysis resolves Zeno's paradoxes with the concept of limits either -- this leads to the issue of how infinitely many finite, non-zero and non-infinitesimal intervals of reals can sum to a finite interval.
Norman Wildberger, like the Greeks, has the problem of explaining what he means by an "arbitrary" natural number or prime number, etc. For example, when NW says that some proposition holds for an arbitrary natural number, is that not an unverifiable assertion about infinitely many naturals that cannot be proven unless one makes postulates (or axioms) to which he is so opposed? And such axioms *must* take for granted the existence of an infinite class of natural numbers for which the said proposition holds -- otherwise we don't have a proof of this proposition. And NW does oppose the concept of an "arbitrary" real number-- here is a quote from his paper "Set theory: should you believe?" at <http://web.maths.unsw.edu.au/~norman/views2.htm>:
"But here is a very important point: we are not obliged, in modern mathematics, to actually have a rule or algorithm that specifies the sequence r1, r2, r3, · · · . In other words, 'arbitrary' sequences are allowed, as long as they have the Cauchy convergence property. This removes the obligation to specify concretely the objects which you are talking about. Sequences generated by algorithms can be specified by those algorithms, but what possibly could it mean to discuss a 'sequence' which is not generated by such a finite rule? Such an object would contain an 'infinite amount' of information, and there are no concrete examples of such things in the known universe. This is metaphysics masquerading as mathematics."
I agree with NW's conclusion that an arbitrary real number, in the classical sense, is problematic. But definitely not with his stated reason for this conclusion -- that such an arbitrary real number (not specified by a finite rule) contains an "infinite amount of information". The fact is that even, say, a Cauchy sequence converging to Pi, specified by a finite rule, does contain an infinite amount of information -- no human mind can complete the task of running through all the terms of this sequence generated by this finite rule. And NW will have to explain how he can accept statements like "For any real number x>0, (1/x)>0", if he does not accept the concept of an arbitrary Cauchy sequence of rationals. For x is an arbitrary real number, is it not?
My point of view, explained in my arxiv paper <http://arxiv.org/abs/math.LO/0506475>, is that the problem is not with the existence of an inifnite class of naturals -- one can accept that an arbitrary prime can only be defined as that belonging to an infinite class of primes, for example. What consititutes infinitary reasoning (in my view) is quantifying over these infinite classes, i.e., formally referring to infinitely many such infinite classes in a single formula. Thus an arbitrary real number x, in the classical sense, is not allowed in my proposed logic NAFL-- because x can only be defined as belonging to an infinite class of reals, which requires quantification over reals -- not permitted in NAFL because each real is an infinite object. Infinite sets do not exist in NAFL, but infinite classes can exist (in fact MUST exist whenever the infinitely many finite objects belonging to that class exist). Infinite classes, like real numbers, are proper classes-- so the reals do not consititute a class and you can't quantify over reals in NAFL.
I believe that the correct resolution of Zeno's paradoxes is in the version of real analysis proposed in the above-cited arxiv paper <math.LO/0506475>. In particular, see Sec. 4, which is more or less self-contained. | <urn:uuid:703f0565-8ed3-4570-8735-784b27750cf0> | CC-MAIN-2017-47 | http://mathforum.org/kb/message.jspa?messageID=4909866 | s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806844.51/warc/CC-MAIN-20171123161612-20171123181612-00760.warc.gz | en | 0.956047 | 1,469 | 2.609375 | 3 |
Nov 1, 2013
Could few layer graphene be used for ultrafast DNA sequencing?
In recent years, solid-state nanopore sensing technology has attracted much attention because it shows great promise for applications in biomolecule sensing and ultrafast DNA sequencing. Graphene membranes might be used as viable sequencing platforms since the thickness of a graphene layer is comparable to the spacing between nucleotides in single–stranded DNA. Several challenges, like membrane fluctuations, pinhole defects and higher noise levels in single/bilayer graphene nanopores do not allow for the direct measurement of individual nucleotides using ionic current. The reduction of 1/f noise in graphene base devices is considered to be the biggest challenge and several research groups have tried to rectify this issue by depositing thick dielectric layers (such as Al2O3, TiO2 and HfO2) over graphene membranes. However, the deposition of dielectric layers on graphene increases sensing zone thickness and requires additional processing that deteriorates measurement reproducibility.
A team led by Prof. Ki-Bum Kim at Seoul National University has now come up with a new approach to tackle noise issues. First, the researchers replace conventionally used silicon substrates, which are the main source of dielectric noise, by quartz-based ones. Second, they utilize few layer graphene instead of single/bilayer or dielectric material coated graphene.
The first approach reduces noise levels down to 2.3 pA, which is almost six times lower than that possible with silicon-based graphene devices. Using few-layer graphene instead of single-layer or dielectric layer coated graphene also simplifies the fabrication steps and allows for identical pore sizes during the pore drilling stages.
A comprehensive noise study reveals that few layer graphene transferred onto quartz substrates possesses low noise levels and higher signal-to-noise ratios as compared to single-layer graphene without deteriorating spatial resolution. The findings imply that few layer graphene based nanopores could well lead to exciting opportunities for futuristic single-molecule genomic screening devices.
More information can be found in the journal Nanotechnology (in press).
Simple pulling process creates nanopore for single-molecule sensing (Apr 2011)
Probing an individual DNA molecule thousands of times with a nanopore (Oct 2013)
Enhanced model describes conductance and DNA blockade of nanopores (Jul 2011)
Nanopores could unravel RNA (Jan 2010)
Nanopores sequence DNA (Oct 2009)
About the author
Dr Ashvani Kumar is working as a postdoctoral candidate under the supervision of Prof Ki-Bum Kim at the Department of Materials Science & Engineering, Seoul National University, Korea. His current research focus is to understand the noise mechanism in nanofluidic devices with the aim of making them viable for wide range of applications. | <urn:uuid:4295d8f2-6be8-4da6-814e-7eaf4c5de59d> | CC-MAIN-2014-41 | http://nanotechweb.org/cws/article/lab/55185 | s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1412037663611.15/warc/CC-MAIN-20140930004103-00316-ip-10-234-18-248.ec2.internal.warc.gz | en | 0.914112 | 585 | 3.078125 | 3 |
Plants that bear fruits in pods, such as beans, peas, peanuts, lentils and chickpeas are classified as legumes. Other well known plants that belong to the Leguminosae family are soybeans, clover, tamarind and licorice.Continue Reading
The Leguminosae family is also known as Fabaceae. Both terms can be used interchangeably to indicate a wide range of flowering shrubs, herbs, vines, vegetables and trees divided into three Leguminosae sub-families. Edible legumes, such as beans, peas and snow peas, belong to the Papilionoideae family. Members of the Mimosoideae subfamily have flowers with radial symmetry, such as acacia, while the subfamily of Caesalpinioideae is mostly made up of trees in moist tropics, such as the logwood tree, orchid tree and tamarind.
Legumes have distinctive flowers, leaves and fruits. The leaves of legumes are usually in the shape of a cup, while the flowers follow the pattern of the pea blossom. The fruits, commonly known as legumes or pods, grow in one-celled seed containers. Pods split between the seams, revealing the fleshy seeds. Most mature pods split in two seams between the valves, but some, such as peanuts, do not open in this way and require force, decay or predation to release the contents. Such plants are called indehiscent legumes or pods.Learn more about Botany | <urn:uuid:fdf7db0b-8100-43f8-afce-603645baed69> | CC-MAIN-2017-34 | https://www.reference.com/science/plants-classified-legumes-9ac645a671964c92 | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886104634.14/warc/CC-MAIN-20170818102246-20170818122246-00225.warc.gz | en | 0.957925 | 316 | 3.859375 | 4 |
12 WIRES , EACH OF RESISTANCE r ARE JOINED TOGETHER TO FORM A CUBE. FIND THE EQUIVALENT RESISTANCE IN THE EDGE OF CUBE . I DID IT USING KIRCHOFF LAW N FOUND IT TO BE VERY LONG.PLEASE GIVE ME A SHORTCUT TO SOLVE IT. I WILL BE REALLY THANKFUL!
like it if its useful.....
In this circuit the vertices E and D (F and C) are equivalent, they are on the same potential. The resistance of the whole cube is not changed by merging these vertices into one. Let us merge the vertices E and D (F and C) into one junction, redraw the circuit into the plane and supplement each cube edge with a resistor. The resistance of each edge is R.
Let us consider each loop consisting of two resistors R in parallel connection as a single resistor whose resistance R1 is:
Let us simplify the sketch of the circuit:
The expression for the resistance R2 between the junctions (ED) and (CF) reads:
The expression for resistance of the whole cube reads:
Inserting , we obtain RAB
Thus the total resistance of the cube between the vertices A and B is | <urn:uuid:4ac03bd9-1f9b-4212-90ed-5971b32d9fff> | CC-MAIN-2013-48 | http://www.goiit.com/posts/list/20/electricity-short-cut-1148731.htm | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164028001/warc/CC-MAIN-20131204133348-00048-ip-10-33-133-15.ec2.internal.warc.gz | en | 0.884273 | 268 | 3.609375 | 4 |
Blockchain technology is often used as a synonym of distributed ledger technology (DLT) although both are not the same. A blockchain uses several technologies, including distributed ledger technology, to enable blockchain applications.
Other technologies and computational/mathematical techniques that are used in blockchains include digital signatures, distributed (peer-to-peer) networks, and encryption/cryptography methods, among others linking the records (blocks) of the ledger.
- Blockchain technology from hype to reality
- The growth of distributed ledger technology business initiatives
- The scale and transformation of transactions in a decentralized digital age
- Blockchain technology: an encoded and decentralized database
- Where blockchain technology is used – application areas
- Blockchain in business 2018-2021: data and action plans for the near future
- The limitless applications of blockchain – revisiting transactions in the digital age
- How does blockchain technology work?
- Some benefits of blockchain technology
- Additional resources on blockchain in business
Blockchain technology is a form of distributed ledger technology. A blockchain is a distributed and immutable ledger to transfer ownership, record transactions, track assets, and ensure transparency, security, trust and value exchanges in various types of transactions with digital assets.
Distributed ledger technology (DLT) revolves around an encoded and distributed database serving as a ledger whereby records regarding transactions are stored. At the core DLT is an innovative database approach with a data model whereby cryptography is utilized in each transaction update and verification become possible across the specific blockchain network, depending on its goal and stakeholders.
A look at distributed ledger technology in practice and beyond cryptocurrencies – how blockchains and DLT work, industries, applications, evolutions, networks and the business reality.
Is there still something that blockchain, a Distributed Ledger Technology (DLT), and known as the technology that powers cryptocurrency Bitcoin, doesn’t promise to change in digital business and transaction processing and digital services requiring trust in one shape or another? Or perhaps better: is there still some challenge, organizational or other, whereby blockchain isn’t hyped as the ultimate solution?
Blockchains are immutable digital ledger systems implemented in a distributed fashion (i.e., without a central repository) and usually without a central authority. At its most basic level, they enable a community of users to record transactions in a ledger public to that community such that no transaction can be changed once published (NIST Blockchain Technology Overview Draft NISTIR8202, January 23, 2018)
Blockchain technology from hype to reality
Although indeed being hyped in this stage (and for most applications being in the early stages of hype cycles) blockchain technology is part of the arsenal of software and solutions which are highly relevant in the scope of, among others, digital transformation.
It certainly isn’t the solution for everything (well on the contrary) as one might believe when seeing the hype but it is highly valuable in specific circumstances where its use is relevant.
Do note that today many opinions on what blockchain could mearn for “xyz” (whereby blockchain really means DLT) as you can see them in popular media and vendor talk are indeed just about that “what it could mean”. Terms such as ‘potential’ and even ‘revolutions’ are very frequently used when the possibilities, rather than the realities of DLT are covered. As you know, between potential and reality there is a big gap – and there seem to be quite some revolutions these days: the Industry 4.0 revolution, the artificial intelligence revolution (really an umbrella term), you name it.
Blockchains (indeed, plural) are tested and deployed across several use cases of digital trust and exchanges in all industries, in and beyond cryptocurrencies, and as a contractual backbone of trust in a digital age. DLT is poised to be one of the fastest growing digital technologies and evolutions for several years to come and has a key role in ample relevant use cases in the digital transformation of several processes and industries.
Real blockchain contains five elements: Distribution, encryption, immutability, tokenization and decentralization (Gartner)
Blockchain technology hype also leads to big difference between what a technology could possible do and what it really can do, or even better, does. However, there is no doubt about it: distributed ledger technology is becoming big business and big in business, some business that is.
There are several reasons why DLT adoption is poised to be grow across use cases and industries of all kinds faster than expected while in many others it will not meet expectations or simply will not be needed. And even if it is still relatively early days for DLT for most companies, all signs are clear (as are the roadmaps of some of our partners, de facto implementations and industry initiatives): distributed ledger technology is among the top evolutions, albeit with adoption, testing and effective usage at different speeds, depending on context, industry, use case and maturity of the organizations as tends to be the case with all technologies.
The growth of distributed ledger technology business initiatives
In 2017 and 2018 literally hundreds of companies, including leading global companies and leaders within their respective countries or regions across various sectors have joined important blockchain and DLT initiatives.
If you only look at the partners of a few more or less recent initiatives which we mention below such as IBM’s cross-border payment blockchain initiative which mainly has companies from the Asia Pacific region on board as that’s where it starts and which was announced in October 2017 you already have close to 100 companies. Yet, at the same time many of these initiatives (will) fail to meet their objectives while others are becoming more important.
Blockchain is not yet enabling a digital business revolution across business ecosystems and may not until at least 2028 (Gartner)
However, before we start looking more in depth at some use cases and projects (or, at least, link to them) we need to give a small overview of DLT for business. For many distributed ledger technology is still relatively new, certainly outside of its Bitcoin and cryptocurrency scope (and that’s the scope OUTSIDE of which most business initiatives want to leverage DLT, leading to discussions about which terms we should really use).
And since we only tackled blockchain technology from the financial services industry perspective in the past (because that is where the attention outside the cryptocurrency context started and loads of transactions are involved) and the Internet of Things (IoT) perspective (because that is our second digital trend in our list to really watch in case you don’t yet and involves even more transactions), we also want to look at what blockchain technology is and how it gets adopted in more applications and sectors than the mentioned ones (from government to legal and supply chains). Use the table of contents above to jump to the section that interests you most.
The scale and transformation of transactions in a decentralized digital age
As technologies and business approaches get distributed in virtually all digitalized areas, so do transactions. Moreover, new digital services pop up where there is a need for integrity, trust and security and existing services can be transformed using those same essential principles in a digital transaction context.
From transactions in the de facto distributed reality of the Internet of Things (IoT) to an increasing distributed transaction processing in business processes: the scale, speed, volumes and data involved are on the rise as we speak, with transactions in some applications and use cases being more than just on the rise.
The question is how do you deal with ever more and faster transactions as the core of digital business in a reliable way that doesn’t slow down transactions in any way but, on the contrary, offers the speed they need in a trustworthy and cost-efficient way? Using a distributed technology and a different data model is the answer for many. Enter blockchain technology.
Blockchain technology: an encoded and decentralized database
As mentioned, blockchain revolves around an encoded and decentralized or distributed database (the ‘distributed’ part of distributed ledger technology) which serves as a ledger whereby records regarding transactions are stored and cryptography is used for each update in transactions.
Blockchain technology is rooted in the world of cryptocurrencies, more specifically Bitcoin. That connotation will disappear and we will not speak about the blockchain but about blockchains (note the letter ‘s’), blockchain technology or distributed ledger technology. Although today decentralization and the absence of a predefined central authority are often mentioned now in times where cryptocurrencies still have most attention, they aren’t the strict essence (moreover, even in Bitcoin there are central authorities so to speak, the Bitcoin miners, but that’s a different story).
Companies are urged to focus on private blockchains for commercial deployments (Juniper Research)
Blockchain technology is being tested and implemented across a broad range of applications, industries and use cases for endless applications. Examples, on top of the Internet of Things and financial services (banking, insurance and reinsurance, capital markets) include Industry 4.0, fraud management, digital identities, information management and far more areas and industries where it fits in a context of transactions, payments, contracts (smart contracts), proof, trust and so forth in the decentralizing nature of digital transformation technologies.
These records can’t be changed as the model is distributed: there isn’t a central authority but there also isn’t any involved party (those doing transactions) that can change information. Blockchain relies on peer-to-peer network principles whereby each encrypted block in the chain is linked to the next. Why the peer-to-peer network and absence of a central authority? Because blockchain was precisely ‘invented’ to solve the challenge of the lack of a central authority in cryptocurrency Bitcoin.
However, this doesn’t mean that blockchain is only used for very decentralized applications. Blockchain is used by organizations and/or groups of organizations for specific services where trust from other parties is needed or to build a blockchain network with other parties without traditional intermediaries. It’s also important to differentiate between public and private blockchains and between blockchain networks from the perspective of the relevance of the goal and context in which they are used, which organizations and/or groups of organizations use them and what those exact services are.
The attention for blockchain from a security and secure transaction perspective is, among others, related to the fact that blockchain is a cryptographic ledger whereby the chain consists of encrypted blocks and after the validation of the transaction (peer-to-peer and across the network) it is added as a block to the chain as a permanent and unchangeable record of transaction in digital ecosystems with heavy transaction processing whereby transactions, data and speed increase and meet the need for a layer of trust.
Where blockchain technology is used – application areas
Below are some examples of where blockchain or distributed ledger technology is tested and implemented with some details per mentioned industry or area of application.
Blockchain in banking, insurance and finance services
Especially since 2015-2016, many initiatives were taken by large financial service providers and institutions, as well as FinTechs, regarding blockchain for finance.
Distributed ledger technology is among others used and/or tested for insurance applications such as claims management and for banking applications where digital identity and smart contracts are just a few use cases that fit in myriad financial operations. The transfer of funds and financial transactions are other areas which are also closer to the roots of blockchain.
Among the companies that can benefit most from blockchain are those with a current dependence on paper-based legacy storage systems and/or a high volume of transmitted information (Juniper Research)
A token of the rapid evolutions in banking is the earlier mentioned IBM blockchain-based cross-border payment solution which the company announced on October 16th, 2017. The solution aims to solve cross-border payment challenges and offers real-time clearing and settlement.
Over a dozen banks and institutions were involved in the development and deployment process. Cross-border payments are undoubtedly a key use case as in 2017 also SWIFT, Mastercard and the R3 consortium took initatives, the latter two and IBM did so in October 2017.
Digital identity is one of many applications that can be very useful in specific banking applications and even totally change the way we onboard customers, solving the identity problem and enabling full mobile onboarding as we explained at the occasion of the launch of Alastria, the first nation-wide and multi-sector blockchain ecosystem ever which was announced in Spain in October 2017 and where digital ID is an initial priority.
The Internet of Things and blockchain technology
The combination of blockchain and IoT is looked at and effectively leveraged for myriad reasons, ranging from smart contracts and IoT data monetization models across complex chains of connectivity where trust is crucial.
There are already blockchain applications in the context of the Internet of Things and some vendors have specific solutions to enable the use of blockchain for IoT to, among others increase trust, save costs and speed up transactions. IBM is a frontrunner here, although several vendor and industry initiatives have been launched with new solutions and actual deployments.
IoT is all about transactions, contracts and trust in a distributed environment. Blockchain is, among others, the missing link to settle privacy and reliability concerns in IoT as the IEEE’s Ahmed Banafa writes. Do note that IoT and blockchain convergence also touches upon the various other technologies (e.g. AI), industries (e.g. insurance and telematics) and activities (e.g. supply chain management, security) we mention on this page. In other words: IoT and blockchain needs to be seen in context and isn’t just a matter of how blockchain can boost IoT and help solve challenges we see in IoT.
Blockchain is, among others, the missing link to settle privacy and reliability concerns in IoT
Supply chain management, logistics and blockchain
There is a very long road between manufacturing or even the design of a product and buying it in a retail store or online.
By keeping track of all transactions, again endless applications arise, for example with regards to where the product was made. There are several existing projects with regards to the usage of blockchain in supply chain management, logistics, transportation and so forth.
If there is one major part of global business where there is a high volume of transactions, an ecosystem with many players (certainly in cross-border trade) and still a high dependence on paper in a fast evolving and highly inter-connected ecosystem it’s everything related to end-to-end supply chains.
So, it’s not really a surprise that, after the financial sector, blockchain spending is poised to be largest in the distribution and services sector on a global level according to IDC’s blockchain spending forecasts.
With blockchain, logistics and the various stakeholders in trade we are really in pretty much all areas of the by definition connected supply chain ecosystem where speed and accuracy matter more than ever. From outbound logistics and all the way (with several forms of transportation) to distribution or export with even more intermediaries, forms of transportation, freight forwarders, container shipping, import and inbound logistics, depending on the supply chain.
Simply moving a container from one point to another often involves over 30 different parties, with an average of 200 interactions between them. These interactions and transactions often use traditional channels and information carriers, including even fax and of course paper. Paperwork is estimated to account for up to half of the cost of container transport. Ample improvements are possible to make supply chains smarter, more secure, faster and more efficient across use cases ranging from customs declarations and marine insurance to secure container release, cross-border shipping cases and tamper-free smart contract cases or transportation document/data flows.
In order to really function we should have blockchains encompassing all these stakeholders and the many others we left out of this simplified ecosystem picture, or at the very least and certainly in a global supply chain context interoperability would be key as stakeholders such as customs, to name just one also have their systems.
In the past few years we’ve seen blockchain supply chain, logistics and transportation efforts and consortiums pop up, sometimes with a more global cross-border shipping focus and sometimes with a more specific focus such as container release and cargo flows in ports or dispute resolution in logistics.
Gradually these efforts are coming to fruition and existing initiatives announce new members. These also include e-commerce giants. In February 2018, for instance, Chinese retailer JD.com which is preparing to compete with Amazon in Europe and opened offices in Australia in 2018, all part of a major international push, joined BiTA, the Blockchain in Transport Alliance that has been announcing new members since the beginning of 2018 at an astonishing rate.
A major announcement in the context of global trade and supply chain digitization leveraging blockchain concerned the start of a joint venture between container shipping giant Maersk and IBM end January 2018.
IBM and Maersk have been working on blockchain possibilities for quite some time now and started their collaboration in the Summer of 2016. Several companies, ports and authorities already conducted pilots with the platform and several more are planning to join.
Yet, blockchain initiatives are also realize on a perhaps what less encompassing scale but with an ambition of growth that does beyond the initial goals which solve specific real challenges and then lead to more applications and blockchain use cases in a specific logistics context. A good example is this blockchain smart port case in the port of Antwerp where real challenges in the scope of maritime logistics and especially container release are tackled.
Industry 4.0 and blockchain
This is partially related to the previous area. If you thoroughly study the key aspects of Industry 4.0 and its Reference Architecture Model you no doubt will see how data-intensive and transaction-intensive it is.
The life cycle and value stream dimension of the architecture starts with early data collection and provisioning and maps data acquisition of production objects across the entire lifecycle. Blockchain technology is already used in Industry 4.0 applications and not just for industrial data. It is also a building block of intelligent ERP.
Other blockchain technology application areas
Some other application areas with a focus on transactions and security (the potential of blockchain also stretches to cybersecurity as such) include the use of blockchain in the public sector and government (even including voting) and myriad industries and use cases where rights management, trust and reliability, data protection and contracts are concerned in the increasingly digitized environments of sectors going through digital transformation: from the music and media industry to digital health, the legal sector and more.
This list is far from exhaustive. In the next sections you can find some predictions (end 2017) with regards to the adoption of blockchain services and networks among large companies and a few of the major industries.
Blockchain in business 2018-2021: data and action plans for the near future
Analysts across the globe see an important future for blockchain in myriad organizations and use cases. On top of Juniper Research, which we mentioned earlier and several others, also IDC states that blockchain services are poised to become the foundation for digital trust at scale IDC stated end 2017. You could already see that much in the infographic above of course.
According to IDC’s 2018 IT industry forecasts, fully entitled “IDC FutureScape: Worldwide IT Industry 2018 Predictions“, revealed in a webcast (which you can still watch for a year) with a press release on October 31st, 2017, by 2021 at least 25 percent of the G2000 would use blockchain services with exactly that purpose.
When looking at some industries and the data from IDC mainly global transaction banks, the manufacturing industry, retailers and healthcare organizations would be along the earliest movers to have blockchain networks in production (so no tests or proof of concept).
Blockchain networks in production by 2020: main industries
Below are the forecasts for the mentioned industries (note that IDC looks at 2020 here and not at 2021 as in the earlier mentioned prediction).
- Top global transactions banks: 25 percent with a blockchain network in production.
- Manufacturers and retailers together: a blockchain network in production by 2020 for close to 30 percent.
- Healthcare organizations: 20 percent of healthcare organizations with a blockchain network in production by 2020.
Another interesting finding, this time from IDC’s “FutureScape: Worldwide IoT 2018 Predictions” concerns blockchain and the Internet of Things, a topic we covered earlier.
Most of us look at blockchain as one of the ways to solve multiple IT data exchange and IoT monetization challenges, among others through using smart contracts. Well, IDC predicts that by 2020 up to 10 percent of pilot and production blockchain distributed ledgers will incorporate IoT sensors as you can read here or hear when you listen to the appropariate webcast in the IDC FutureScape 2018 series.
What does a business have to do in 2018 order to get ready for blockchain?
Although being a first mover doesn’t always mean being in the best position, with regards to the adoption of blockchain in business things could be different.
Early blockchain adopters will have the opportunity to establish very strong positions in the ecosystem, while slower adopters will not be entirely boxed out but should be exploring use cases (IDC, October 31, 2017)
According to the research firm early adopters can establish very strong positions while organizations that are not participating in blockchains and the industry ecosystems they require, will encounter significant disadvantages with regards to, among others, speed and costs.
- Start by looking at all the blockchain consortiums and initiatives out there and see which could bring the benefits of blockchain within their specific industries, use cases and ecosystems.
- In the case there isn’t such an ecosystem and there is a case and benefit to do so, investigate the opportunity, which by definition obviously also means finding the right peers and partners that can help start one (or, less ambitious, join or start a blockchain network or a pilot).
- Companies that are slower in their digital transformation efforts, which really is the majority of organizations today, have to do their homework, start learning, experience the potential, talk with their peers and so forth in 2018. More importantly they need to develop use case scenarios for blockchain that make most sense for them. Those who are ahead in their digital transformation journey should put a blockchain strategy and plan and place in 2018 IDC states.
Blockchain 2018: forecasts and industries
In our article on blockchain in the EU and Western Europe we mentioned some data regarding the adoption of blockchain across several industries as per the Cambridge Centre for Alternative Finance (research end 2017, see SlideShare at the bottom of this page).
The results as depicted below are part of the EU blockchain factsheet which was presented at the occasion of the EU Blockchain Observatory and Forum, covered in the article. However, the 2017 Global Blockchain Benchmarking Study of the Cambridge Centre for Alternative Finance.
However, the authors came to this result by looking at the largest number of identified DLT use cases, whereby “132 blockchain use cases were grouped into industry segments that have been frequently mentioned in public discussions, reports and press releases”.
In the meantime IDC announced its inaugural Worldwide Semiannual Blockchain Spending Guide (January 24th, 2018) and a version for Western Europe as also mentioned in that same article which looks more into detail from the spending rather than identified DLT use case perspective.
According to IDC, global blockchain spending is expected to reach $2.1 billion in 2018 and total spending of $9.2 billion in 2021. In the scope of this section of industries and blockchain use cases, it’s interesting to note that, according to IDC, spending per industry for 2018 shows the following picture:
- The financial sector leads with blockchain spending of $754 million in 2018. Mainly the fast adoption in the banking industry is key here.
- The distribution and services sector ranks second with $510 million in 2018, with retail and professional services showing strong blockchain investment.
- The manufacturing and resources sector ranks third with $510 million in 2018. Here most blockchain investments in 2018 will happen in the discrete and process manufacturing industries.
As per usual there are geographical differences though. Looking at the different regions from a blockchain spending perspective the chart below shows the split and evolutions until 2021: the US leads, followed by Western Europe.
However, while in the US the distribution and services sector will account for most blockchain investment in Western Europe the financial services sector is the main driver. The latter is also the case in China (PRC) and the APeCJ region (Asia Pacific, excluding Japan).
The fastest growers in blockchain spending globally are, respectively, professional services (85.8% CAGR), discrete manufacturing (84.3% CAGR), and the resource industries (83.9% CAGR).
The limitless applications of blockchain – revisiting transactions in the digital age
Time to move beyond the better known potential and current applications of blockchain and get the broader picture by revisiting transactions in this digital age – and look at more areas where a new system of contracts, keeping track and ultimately recording and being able to control or prove in complex digital ecosystems is needed.
Let’s use the definition of Merriam-Webster of a transaction to make it clear: “an exchange or transfer of goods, services, or funds”. Now, let’s elaborate on that and look at two key aspects.
Goods and services mean many things
As you know we live in a data-intensive age of information where data has become a key business asset.
Think about how important data sharing and monetization has become, for instance IoT data monetization. Or think about how data is turned into actionable intelligence or business process outcomes, how important it is to have an audit trail and how automated processes which are moving data across the value chain and across ecosystems really are transactions. In order to leverage, let alone ‘exchange’ data it is key to have mechanisms in place, for instance to make sure that pieces of crucial data have not been tampered with and are reliable and trustworthy original versions which can be leveraged for whatever purpose. We can go on, even on this level of data alone.
Companies which would benefit most from blockchain include those with a need for transparency and clarity in (trans)actions (Juniper Research)
Now start thinking about the goods and services in this day and age in the broadest sense and the number of transactions that happen regarding them as well as the need to record those, for instance from a regulatory perspective in the transfer and exchange of personal and sensitive data or how essential information is as it gets shared and used for critical medical purposes or for actions, decisions and transactions for myriad digital services. And we haven’t even really started exploring the services in this as-a-service economy yet. You see the vastness and it’s far from done yet.
Transactions don’t just happen between people
There are far more transactions between systems, between devices and between devices and systems in an increasingly hyper-connected reality.
Devices communicate with each other, intelligent building components take decisions based on data exchanges or changes/triggers of any sensor-measured external state, information gets automatically sent from one system to another in the scope of a business process or a “case” in the sense of case management, a trigger caused by a change in a system leads to a result, the list goes on.
If you entirely remove the human element and several changes in status and transactions between systems and devices lead to ever more autonomous – and decentralized – decision making as they increasingly do in industrial automation, building automation, IoT, advanced analytics with AI-driven actions and much more you really start seeing why blockchain is seen as key to the digital transformation economy by so many.
How does blockchain technology work?
Each stage of a transaction is generating a set of data which are called blocks. As the transaction progresses, more blocks get added, forming a chain, hence the name.
Just as in cryptocurrencies like Bitcoin and others, which are based on blockchain technology, encryption software guarantees no one can ever delete or change blocks.
Despite its apparent complexity, a blockchain is just another type of database for recording transactions – one that is copied to all of the computers in a participating network (Deloitte)
Several computers across a network have the blockchain software installed. Each transaction is shared to these nodes in the network and they compete (in Bitcoin jargon ‘mining’) to verify the transaction. The first one that verifies it also adds the block of data to the chain and gets an incentive for being first. The other nodes next check the transaction, agree that it’s correct and replicate the record. All the computers then keep an updated copy of the ledger, and this acts as a form of proof that the transaction occurred.
As said, blockchain relies on peer-to-peer agreement as opposed to a central authority to validate a transaction. Until now, if you wanted to make a transaction, you informed a central authority who checked the details with everyone involved and holds a central record such as a bank, a notary or any other central certifying authority. In the blockchain model there is no such central authority. Transacting parties rely on an open register, the ledger, to validate the transaction. Authority comes from the fact that numerous computers, ‘miners’, have looked at the broadcast data, checked it and found it correct. Trust comes not from a notary’s stamp, but the presumption that those computers can’t all be wrong. You can imagine that there is quite some discussion here as well.
In the earlier mentioned press release regarding its series of IDC FutureScape 2018 webcasts and report, IDC described blockchain as follows: “At the core of blockchain is distributed ledger technology (DLT) that offers the potential to support digital trust at scale by providing one version of the truth (secure information), transfer of value (secure ownership records), faster settlements, and smart contracts (automated buying and selling)”.
Some benefits of blockchain technology
In the blockchain model transacting parties rely on an open register to validate the transaction. This has some consequences for transactions of all kinds.
The absence of a central authority in theory makes blockchain faster. If you’re relying on a central certifier, you depend on limited resources. Clearing and settling stock trades, for instance, can take days and usually involves some human intervention. With blockchain you have lots of computers competing to process your transaction as quickly as possible. Today they can do it in a matter of minutes. In the future it may only take seconds.
Blockchain is also cheaper. All the computers holding the blockchain are paid for by the participants in the hope that they will earn the incentive for being the first to validate the transaction.
Blockchain is more transparent. It can give regulators and compliance officers clearer insight into the provenance of financial transactions, helping them to combat money laundering and manage risk.
As nothing can be changed and the ledger is present across multiple nodes, blockchain is easier to track. It won’t come as a surprise that blockchain is often used for asset tracking as a consequence (more below).
Blockchain in business: looking back at 2017
As mentioned in the introduction, several large (and less large) firms, research bodies, start-ups, universities and so forth have launched or joined industry initiatives, blockchain research groups and alliances with roadmaps and standardization projects in 2017.
This happened in an increasing variety of areas, ranging from a secure and blockchain-based IoT project and vendor-led supply chain initiatives to a trucker association blockchain consortium, the mentioned cross-border payments blockchain initiative and Spain’s national blockchain project – to name a few. After the Summer of 2017 the number of pilots, projects and initiatives grew fast, not just in number but also in business scope. This isn’t going to stop in 2018 of course, well on the contrary. In the end, on top of new initiatives, existing ones enter in stages with solutions. That’s when it really becomes interesting.
The sheer list of companies testing blockchain or having implemented it in 2017 is huge. From giants such as Maersk, dozens of insurance companies, the Port of Rotterdam, Lufthansa that recently announced a project to customers of a growing list of blockchain technology providers and hundreds of companies which you find in one or several of the associations, alliances and vertical/topical research groups.
The big blockchain technology leaders
Earlier we said that IBM is a frontrunner in the IoT and blockchain space but IBM also has the strongest credentials of all players in the blockchain sector and is quite ahead of its closest competitors.
That’s at least what Juniper Research found in a survey. The results were announced in September 2017 (and in several other releases throughout the Summer) and it seems that over 40 percent of respondents cited IBM as being ranked first by enterprises that either consider or are in the process of deploying blockchain technology. According to Juniper’s Blockchain Enterprise Survey, IBM is followed by Microsoft (20 percent of respondents) and Accenture.
Among the reasons for IBM’s leadership position:
- High-profile R&D engagement with initiatives such as Hyperledger.
- A big list of actual blockchain clients across several verticals and use cases such as banking, asset tracking and the music industry.
Blockchain business adoption, investments and practices
The announcement of the Blockchain Enterprise Survey wasn’t just about which technology players are recognized most when it boils down to blockchain, nor was the survey by Juniper (more findings in the infographic below).
There are some interesting numbers on the market and success factors, based upon the answers of some of the approximately 400 responding executives and IT leaders.
- Among the respondents prepared to share their investments in blockchain, 67 percent said already having invested over $100,000 by the end of 2016.
- Of those respondents, a whopping 91 percent said to at least spend the same amount in 2017.
The reason why spending continues or grows is related with the fact that the first results of the first investments were convincing/positive enough to conduct more extensive tests or integrate on a more extensive level. If this is a trend, then it’s another token that in 2018 we’ll see more spending and initiatives as the predictions of IDC clearly indicate.
A final takeaway: Juniper Research urges companies to focus on private blockchains for commercial deployments instead of public ones.
Where is blockchain a potentially good business fit?
End July 2017, Juniper Research released some other findings from the report showing that (as you can also check in the infographic below) 57 percent of organizations with over 20,000 employees is either ‘actively considering’ or in the process of deploying blockchain technology.
34 percent doesn’t know and 9 percent is not actively considering or deploying. That picture completely changes when looking at all companies, including those with over 200,000 employees where we see that the majority of respondents is still saying ‘yes’ but instead of 57 percent that number considerably drops to 39 percent (play with the interactive infographic below).
That brings us to the question for which kind of companies, industries and use cases blockchain is a good fit. And that’s also what Juniper Research wanted to know. The result is a white paper with the apt name ‘Which Industries are the Best Fit for Blockchain?‘.
From the press release we remember a few things. According to the research, companies which would benefit most from blockchain include those with:
- a need for transparency and clarity in (trans)actions,
- a current dependence on paper-based legacy storage systems
- and/or a high volume of transmitted information.
So, indeed transactions, trust, transparency and a lot of data with the need for speed in a decentralizing technology landscape. With regards to the paper aspect don’t think that tomorrow we’ll live in a paperless society with blockchain, trust us. On the other hand, in various applications blockchain can indeed speed up a higher independence from paper-based legacy storage systems (especially when powered by a consortium and a private blockchain that is de facto changing the game in areas where those who want to remain relevant simply have no choice).
Disruption and underestimation of the blockchain challenge as risks
When we talk about changing the game there are also the human, cultural and other contextual transformation parameters. And here Juniper research really hits the nail when saying that, despite growing awareness of (the benefits of) blockchain and more initiatives, it might be dangerous to leverage blockchain without first looking at other options as there is an element of disruption as the survey shows.
And that might also slow down the current enthusiasm a bit as, quoting the press release “the research found that companies may have underestimated the scale of the blockchain challenge”. Without interoperability, clients and partner ecosystems wanting to collaborate and so forth you might indeed get in trouble and underestimating the scale and complexity of internal and external disruption through the adoption of blockchain might be your blockchain party pooper.
That is the very reason why big names put their shoulders under blockchain and blockchain associations across various use cases and industries and why you’ll see more and more client cases coming, ideally within an ecosystem context. If you have a feeling of déjà-vu: indeed, it feels a lot like the early days of IoT and so many other technologies. But this time it seems that the stakeholders are moving way faster. After all, history has a tendency to repeat itself but companies like the leading ones above now and then also learn from history.
Additional resources on blockchain in business
Blockchain enterprise survey
Below is a screenshot of the interactive infographic from the blockchain enterprise survey of Juniper Research, presented in the Summer of 2017 and tackled in this blockchain overview.
Blockchain technology report for IT managers
End January 2018 the US National Institute of Standards and Technology published a draft report regarding blockchain technology as covered in our NIST blockchain technology report article.
The report gives a great overview of blockchain technologies and more. Although it aims to target IT managers who want to take decisions with regards to blockchain in business applications it does offer a great introduction to blockchain in a somewhat more technical context but also with ample use cases and more.
Blockchain Global Benchmarking Study
Last but not least, below is the previously mentioned SlideShare of the Global Blockchain Benchmarking Study by the University of Cambridge Judge Business School (Cambridge Centre for Alternative Finance).
It was presented end 2017. Authors Dr. Garrick Hileman and Michel Raus tackle, among others, the difference between blockchain and distributed ledgers, the key components of a blockchain (cryptography, peer-to-peer network, the consensus mechanism, the ledger and the validity rules), benefits and blockchain use cases, some common blockchain myths, the main types of blockchains, the various DLT ecosystem partners, use cases and far more. Where the report covers the main industries do keep in mind what we mentioned previously in the scope of blockchain spending (and IDC’s January 2018 forecasts).
- Quote NIST Blockchain Technology Overview Draft NISTIR8202 – NISTIR 8202 (DRAFT) Blockchain Technology Overview
- Quotes IDC press release inaugural Worldwide Semiannual Blockchain Spending Guide January 2018: “New IDC Spending Guide Sees Worldwide Blockchain Spending Growing to $9.2 Billion in 2021“
- Quotes IDC press release “IDC Predictions Provide a Blueprint and Key Building Blocks for Becoming a Digital Native Enterprise” (October 31, 2017)
- Quotes Juniper Research press release: Nearly 6 in 10 (57%) large corporations are either actively considering, or are in the process of, deploying blockchain technology (July 31, 2017)
- Quotes IDC, press release: Blockchain Technology: Disruptive Forces in Financial Services (20 Jun 2016).
- Quotes Deloitte: Blockchain. Enigma. Paradox. Opportunity.
Top image: Shutterstock – Copyright: NicoElNino – All other images are the property of their respective mentioned owners. | <urn:uuid:7bb86dfb-e902-482c-99db-dbb4a2cb1ecd> | CC-MAIN-2023-14 | https://www.i-scoop.eu/blockchain-distributed-ledger-technology/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948871.42/warc/CC-MAIN-20230328201715-20230328231715-00092.warc.gz | en | 0.943468 | 8,298 | 3.171875 | 3 |
How do plants grow?
- Principles of Growth: How do plants create a complex body plan?
- Meristems: How do these specialized regions of cell division make a plant?
- Cell fate determination: Do cells inherit their identity, or is it the product of position?
- Cell walls: What role do cell walls play in growth and development?
- Cell expansion: What controls the timing and direction of cell expansion?
- Water potential: How does water provide the driving force for cell growth?
- Organ formation: How does a jumble of cells become organized for a specific function? | <urn:uuid:c730de30-6515-4c0a-9b37-1f68e7ebb273> | CC-MAIN-2020-34 | https://plantphysprimer.com/2014/11/04/growth/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439739046.14/warc/CC-MAIN-20200813132415-20200813162415-00434.warc.gz | en | 0.89653 | 124 | 3.546875 | 4 |
Locality and Colonial Collecting for the Lisbon Zoological Museum, 1860s-1880s
Keywords:Nineteenth Century, Colonial Provenance , Field Collecting, Zoological Collections, Museu Nacional de Lisboa
Nineteenth-century zoological collections consisted of large series of animals, which had been trapped, uprooted, hunted, killed, put into containers, dried, and preserved. From distant far-flung outposts overseas, colonial collections were shipped to central metropolitan institutions where they were claimed as a crucial part of the understanding of global biodiversity. Knowledge about nature was reliant on such scientific specimens and, therefore, dependent on fieldwork, which comprised much more than the act itself of sampling nature. Collecting from the field is a matter of access to places, materials, tools, and people with the know-how to find, capture, and interpret nature and, often, to prepare animals as specimens. Although different layers of labor, expertise, and knowledge lie behind zoological collections, much of it was produced and negotiated outside museums’ walls.
Using the historical documentation of zoological collections in the Museu Nacional de Lisboa in the second half of the nineteenth century as a case study, this paper highlights the role of colonial suppliers as mediators for the museum’s agenda while adjusting to local circumstances and maintaining their own personal goals. Studies of historical provenance have clarified not only how zoological specimens were gathered and collated but also how their geographical origin was used as a mechanism of centralization of authority.
Copyright (c) 2022 Catarina Madruga
This work is licensed under a Creative Commons Attribution 4.0 International License. | <urn:uuid:618fd529-5024-457e-a8a2-6a69fe757fa9> | CC-MAIN-2023-40 | https://journalhistoryknowledge.org/article/view/11951 | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506028.36/warc/CC-MAIN-20230921141907-20230921171907-00808.warc.gz | en | 0.945272 | 386 | 3 | 3 |
Today I would like to show and describe you my keypad with serial interface mini project which we can directly connect to mcu UART (for me it was Atmega8 and Atmega32, but you can connect it with any other chip with build-in uart).
How does it work?
It is a typical numeric keypad with keys from 0 to 9 + 4 extra function keys (a,b,c,d), power supply of 5 volts dc, serial data output (9600 boud rate) or spi interface. The switches are electrically connected into a matrix, for mcu pin resources saving. All the switches in a given column are connected together and all in a given row also. Below you can see the scheme of that connection:
Later on, the firmware inside the micro-controller (I used for this purpose atmel AT90S2313 chip, but you can use whatever you like as long as you are familiar with its coding) “scans” that matrix in search of the shorted contacts. It is done as follows:
The rows from top to bottom are connected to PD6, PB0, PB1 and PB7 pins of the micro-controller and the columns are connected to the pins PB6, PB5, PB4, PB3, PB2, which you can see in the image above. First of all, the pins which are connected into rows, are set as outputs:
DDRB |= (1<<PB0); //port as output
DDRB |= (1<<PB1); //port as output
DDRB |= (1<<PB7); //port as output
DDRD |= (1<<PD6); //port as output
and the ones connected to the columns as inputs:
DDRB &=~ (1 << PB2); //port as input
DDRB &=~ (1 << PB3); //port as input
DDRB &=~ (1 << PB4); //port as input
DDRB &=~ (1 << PB5); //port as input
DDRB &=~ (1 << PB6); //port as input
with enabled internal pull-up resistors:
PORTB |= (1 << PB2); //pull-up enable
PORTB |= (1 << PB3); //pull-up enable
PORTB |= (1 << PB4); //pull-up enable
PORTB |= (1 << PB5); //pull-up enable
PORTB |= (1 << PB6); //pull-up enable
and all the ports configured as outputs are set in high logic state.
Then, from top to bottom the micro-controller gives low logic state to the next rows until the last row is reached.
After giving the high state to the first row, the program checks one by one from left to right, if any of the buttons are pressed down, i.e. if they generate low state on one of the inputs connected to the columns. If one of the inputs is in low state, it means that the button has been pressed, so the program starts to read the current position (the number of the column and the row) and this way it can determine which button has been pressed. If in a given column none of the buttons has been pressed, the program continues to search until it reaches the last column and the last row, and after that it starts from the beginning. Below you can see the animation which illustrates how this algorithm works.
After the software detects that a button is pressed, it runs a simple code which debounce input signal from the switch, and then the character corresponding to the button is sent by the serial port.
The support for the serial port is typical and the port is configured in transmit only mode. Step by step it looks like this in the code:
#define F_CPU 8000000L
Here we define the mcu oscillator frequency, and then we define the expected uart boud rate:
#define UART_BAUD 9600
and we also create a simple macro, which will be used to calculate the constance value needed by the micro-controller to handle the serial transmission.
#define UART_CONST (F_CPU/(16ul*UART_BAUD)-1)
we write the value calculated by this macro into the UBRR register, and by this we configure the transmission speed
UBRR = (unsigned char)UART_CONST;
then, we use the UCR register, in which we set the TXEN (TX Enable) bit, which means the approval for transmitting the characters (analogically to this one, there is also the RXEN bit for receiving data).
After these operations we have a well configured serial interface with speed set to 9600.
Now it’s the time to send some data into it! To do this, we have created a procedure UART_putchar(), which looks like this:
void UART_putchar(char c)
USR |= (1<<TXC);
}//end of UART_putchar()
The UDR register is a serial port input register – its content will be sent to the serial port, and after this is done successfully (the transmission is finished), the TXC bit in the USR register will be set. After successful transmission we can clear this bit (the last line of the above procedure), allowing this way to send the next character via serial interface.
If you use a serial port interface in your micro-controller based project, you need to be careful when choosing the quartz, which is used by the mcu oscillator. This is important because with a different crystal frequency, we will get a different percentage value of the error in transmission. And this value can be from zero percent to a few percent. In the table below you can see this dependence (this table comes from atmega8 data-sheet) .
I made my prototype keypad on a double layer FR4 (glass-epoxy) pcb, tracks were created using the thermotransfer method (greetings for my laminator , and it is all secured by a thermosetting solder mask.
The buttons were taken from the ActiveJet ASC-8003 calculator (it costs around 1eur). In this particular calculator we have a fancy lcd display, with big and easily readable numbers, which I think I will hack and describe soon.
Images, movies , files, madness!
Below you can see the movie in which you can take a look at my working keypad prototype. In this movie it is connected to pc with a USB->RS232 cable with TTL levelled outputs, on which gtkterm is running.
Below you will find the project files that you may download and the photo gallery, have fun! | <urn:uuid:156a7c76-716b-446c-9249-d96819b2e216> | CC-MAIN-2014-23 | http://www.leniwiec.org/en/2012/01/05/numeric-keypad-with-serial-or-spi-interface/ | s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510267824.47/warc/CC-MAIN-20140728011747-00043-ip-10-146-231-18.ec2.internal.warc.gz | en | 0.917536 | 1,429 | 2.9375 | 3 |
About Yersin Museum in Nha Trang city
Alexandre Yersin settled in Nha Trang in 1895, he chose the fishing village – Xom Con. He lives in a French-built blockhouse built by the French. The ugly rectangular squares were rebuilt into a charming duplex apartment. The layout is very simple, each floor has only one room, Surrounded by corridors with multiple consecutive doors. Later the roof was turned into a dome so that he placed the telescope.
In 1975, due to war, the house of Alexandre Yersin was destroyed. but since 1958, furniture, personal belongings, scientific equipment and archives have been collected and stored in corridors and rooms around the Pasteur Library, which is the first museum about Alexandre Yersin. The new museum is located right next to the Nha Trang Pasteur Institute, built in 1997, with the intention of preserving the spirit of Alexandre Yersin’s apartment layout in the fishing village, which consists of a central room, the surrounding is the symbolic corridor to the old apartment’s corridor. From the original materials and instruments and additional copies of the collection, museum collections recall the life of Alexandre Yersin before.
A tour of the exhibits shows: childhood, school time, expeditions, plague and the discovery of Plague bacteria, settle in Nha Trang and Pasteur Institute in Indochina, breeding and plantation, science curiosity and the titles he has achieved. Some instructive tools to better understand the different aspects of his research. A chest reveals the items he uses during expeditions. The short film made the photographs he took and the journeys diary to better understand his adventure. Next to the original microscope, four models illustrate stages that have been marked in the history of the plague: Alexandre Yersin isolates the Plague bacteria; mice spreading the disease; disease spreading from fleas and produce serum for disease resistance.
In measuring instruments and scientific instruments, 3-dimensional float glass, morse signaling antenna, telescopes, and cameras are evidence of Alexandre Yersin’s passions as well as The desire to always try and understand the newly invented technique. as well as finding practical applications.
The room in the middle, where the furnishings of the old house is kept will resurface his private life. The bookshelf shows a generous head as well as a tireless curiosity. The book covers very different topics such as geography, history, aviation, astronomy, meteorology, electromechanics, automotive, physics….but also the novel “Mask” shows how he loves detective novels in short breaks.
In 1991, the Yersin Museum was recognized by the Ministry of Culture – the Socialist Republic of Vietnam as a historical-cultural relic. | <urn:uuid:141a248b-21f4-4b29-b42f-28c83152cf9a> | CC-MAIN-2023-50 | https://123tourdulichnhatrang.vn/en/nha-trang-attractions/yersin-museum-in-nha-trang | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100081.47/warc/CC-MAIN-20231129105306-20231129135306-00003.warc.gz | en | 0.959812 | 568 | 2.59375 | 3 |
Published on February 22, 2014
PERCUSSION INSTRUMENT A percussion instrument is a musical instrument that is sounded by being struck or scraped by a beater (including attached or enclosed beaters or rattles); struck, scraped or rubbed by hand; or struck against another similar instrument. The percussion family is believed to include the oldest musical instruments, following the human voice.
Function Percussion instruments may play not only rhythm, but also melody and harmony. Percussion is commonly referred to as "the backbone" or "the heartbeat" of a musical ensemble, often working in close collaboration with bass instruments, when present.
DRUM SET The first drum sets were put together in the late 1800s sometime after the invention of the bass drum pedal. This invention made it possible for one person to play several percussion instruments (snare drum, bass drum, and cymbals) at one time.
BASS DRUM This drum is the largest member of the set and is played by using a foot pedal attached to a beater which then strikes the drum head. This drum produces a low deep sound. SNARE DRUM This shallow, cylindrical drum produces a sound that is very distinctive to the drum (higher in pitch than the bass drum). The snares, which are bands of metal wires, are pulled across the bottom head of the drum.
CYMBALS Cymbals are made of various combinations of metals and are usually six to twenty-two inches in diameter. The most important cymbals in the drum set are: Hi-hat- this horizontally mounted pair of cymbals can either be hit with a stick or closed on each other with a foot pedal. Crash cymbal and ride cymbal- two commonly used cymbals in a drum set. Both are hit with sticks and, depending on their size, produce varied sounds. Tom-toms- a drum set usually has three tom-toms. One is on the floor and the other the other two are mounted on the bass drum.
TIMPANI The timpani is often called a kettledrum because it is shaped like a kettle. The timpani has a large copper or fiberglass shell with a single drumhead. It also has a pedal mechanism which allows the musician to adjust the tension of the drumhead, thereby tuning the drum to different pitches.
OTHER PERCUSSION INSTRUMENTS There are many instruments included in the percussion family commonly known as "toys". Some examples of these would be: cymbals, triangle, gong, maracas, tambourine, and hand drums.
CYMBAL Cymbals, thin round concave plates (usually made from copper-tin alloy), have been known since the Middle Ages. Often used in religious ceremonies, they became part of the orchestra around the 18th century and are played by dashing two together or by being struck separately by beaters.
TRIANGLE The triangle is another commonly used percussion instrument. The instrument is made by bending a steel rod into a triangle shape with an opening at one corner. It is suspended by a string and struck with a steel beater to produce a tone.
GONG The gong is a bronze disk which, when struck by a beater, produces a rich ringing sound. Many gongs have a central dome and a turned down outside rim. The gong has obscure origins in the Middle East or South East Asia and by the 9th century had migrated to Indonesia.
TAMBOURINE A tambourine is a single-headed frame drum that has jingling metal disks set in its frame. It can be struck, shaken, or rubbed to produce a tone.
MARACAS Maracas are egg-shaped musical rattles that are played in pairs. They originated in South America and were first made from dried gourd shells that were filled with beans or beads.
XYLOPHONE The xylophone is a mallet percussion instrument. It consists of a set of graduated wooden bars which are hit with mallets to produce a tone. Xylophones were used in Southeast Asia during the 1300s and spread to Africa, Latin America, and Europe.
HARP The harp is a stringed instrument and produces a sound by plucking the strings which are perpendicular to the body of the instrument. The strings themselves run between a neck and a sound box also known as the body or resonator.
Arched Harp - the neck and body form a bow-like curve. Angular Harp - the body and neck form a right angle. Frame Harp - has a third piece called a forepillar which is placed opposite the neck and body creating a triangle
STRING INSRUMENTS String instruments may be played with or without a bow. These instruments produce sound when strummed, plucked, struck or slapped. Under the SachsHornbostel system, these instruments are classified as chordophones.
BANJO A banjo is a stringed instrument that is played using different techniques such as the Scruggsstyle or the "clawhammer". It also comes in different types and some manufacturers even experimented on other forms by blending the banjo with another instrument.
CELLO The cello is essentially a large violin but its body is thicker. It is played the same way as the violin, by rubbing the bow across the strings. But if you can play the violin standing up, the cello is played sitting down while holding it between your legs.
DOUBLE BASS This instrument is like a huge cello and is played the same way, by rubbing the bow across the strings. Another way of playing it is by plucking or striking the strings. The double bass may be played while standing up or sitting down.
GUITAR The origin of guitars may have dated back to 1900-1800 B.C. in Babylonia. Archaeologists found a clay plaque showing nude figures holding musical instruments, some of which resembled the guitar.
HARP The harp is one of the oldest musical instruments; archaeologists discovered a wall painting in Ancient Egyptian tombs which resembled that of a harp and dates back to 3000 BC.
LUTE The lute is another musical instrument popularly used during the Medieval Period and still very much enjoyed to this day. The lute is quite a beautiful instrument, both aesthetically and tonally.
MANDOLIN The mandolin is a plucked string instrument believed to have evolved from the lute and emerged during the 18th century. It has a pear-shaped body and 4 pairs of strings. The mandolin is another musical instrument that belongs to the string family.
UKULELE The ukulele is one of Hawaii's most popular musical instruments. It became more widely used during the 20th century and popularized by musicians such as Eddie Karnae and Jake Shimabukuro. The ukulele is like a small guitar but its tone is much lighter.
VIOLA The viola may look like a violin but it certainly has its own unique tone. It is tuned a fifth lower than the violin and functions as the tenor instrument in a string ensemble. Violas didn't enjoy immediate prominence when it first emerged.
VIOLIN The violin is believed to have evolved from the Rebec and the Lira da braccio. In Europe, the earliest four stringed violin was used in the first part of the century.
ZITHER These instruments can be bowed, plucked or struck with wooden mallets. The earliest types of zithers were called "ground zithers" before it evolved into "board zithers." Zithers have no necks; its strings are stretched from one end of the board to the other.
Wikimedia Commons has media related to Stringed percussion instruments. ... Subcategories. This category has only the following subcategory.
Actually, a piano is considered to be a percussion instrument. I seem to remember from my music studies that the fine nuance between plucking and outright ...
A percussion instrument is a musical instrument that is sounded by being struck or scraped ... Stringed instruments played with beaters such as the ...
How is piano both a string instrument and a percussion instrument? ... Why do strings on stringed instruments gradually lose their tonality with repeated use?
Stringed Percussion/ Strummed Instruments- Guitars, Lutes, Banjos, Cumbus, Balalaika, Bulbul Tarang, Mandolins, Dilruba, Dotara, Ektara, Esraj, Gopichands ...
The piano is both a chordophone (an instrument where strings produce their sound by means of a resonating chamber) and a PERCUSSION instrument.
Please show me some pictures of the native filipino wind, stringed and percussion instruments?
Instrument Groups Sorting Cards Objective: Students learn to differentiate between the four main groups of instruments: woodwinds, brass, stringed, and ...
Stringed High Harmonics Instruments.....are played using a bow. The string is held with a finger, so that the natural harmonic scale of the string can ... | <urn:uuid:ccb54b2d-2690-47f5-a97e-a7f9b21f28c0> | CC-MAIN-2017-43 | http://www.slidesearchengine.com/slide/stringed-and-percussion-instruments | s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825057.91/warc/CC-MAIN-20171022022540-20171022042540-00256.warc.gz | en | 0.964197 | 1,896 | 3.734375 | 4 |
Ereunetes pusillus (but see text)
The Semipalmated Sandpiper (Calidris pusilla) is a very small shorebird. It is sometimes separated with other "stints" in Erolia, but, although these apparently form a monophyletic group, the present species' old genus Ereunetes had been proposed before Erolia.
Adults have black legs and a short, stout, straight dark bill. The body is dark grey-brown on top and white underneath. The head and neck are tinged light grey-brown. This bird can be difficult to distinguish from other similar tiny shorebirds, in particular the Western Sandpiper; these are known collectively as "peeps" or "stints".
Their breeding habitat is the southern tundra in Canada and Alaska near water. They nest on the ground. The male makes several shallow scrapes; the female chooses one and adds grass and other material to line the nest. The female lays 4 eggs; the male assists in incubation. After a few days, the female leaves the young with the male; the young feed themselves.
They are long distance migrants and winter in coastal South America, with some going to the southern United States. They migrate in flocks which can number in the hundreds of thousands, particularly in favoured feeding locations such as the Bay of Fundy and Delaware Bay. This species is a rare but regular vagrant to western Europe.
These birds forage on mudflats, picking up food by sight and feel (bill). They mainly eat aquatic insects and crustaceans.
During the months of July and August, you can go to one of two information centers run by the Nature Conservancy of Canada about the shorebirds in either Johnson's Mills or Mary's point.
Long Island, NY, April 2004. By Tony Phillip.
|Problems playing this file? See media help.|
- Jonsson, Lars & Peter J. Grant (1984) Identification of stints and peeps British Birds 77(7):293-315
|Wikimedia Commons has media related to Calidris pusilla.|
- Semipalmated Sandpiper Species Account - Cornell Lab of Ornithology
- Semipalmated Sandpiper Calidris pusilla - USGS Patuxent Bird Identification InfoCenter
- Johnson's Mills Nature Preserve on Shepody Bay
- An online identification article covering this species and other small calidrids | <urn:uuid:69841e4f-f798-4546-8222-a75179cd6067> | CC-MAIN-2013-48 | http://en.wikipedia.org/wiki/Semipalmated_Sandpiper | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1387345774929/warc/CC-MAIN-20131218054934-00016-ip-10-33-133-15.ec2.internal.warc.gz | en | 0.876394 | 516 | 2.84375 | 3 |
Tradesmen and contractors today enjoy almost unlimited choices of tools and equipment, but it wasn't always this way. Only a generation or so ago, the tools used in construction and in many other types of work were restricted to relatively few options. When a carpenter or mason arrived on the job, he generally carried every tool he needed--or owned--in one toolbox.
That's not to say those tools were primitive or that workers were under-equipped for the jobs at hand. The tool-making segment of the hardware industry in America was well-established 50 and even 100 years ago, but mainly it produced tools based on traditional, time-tested designs. New ideas developed slowly, one tool at a time. Individuals, not R&D departments, exercised their creative impulses both inside and outside the manufacturing centers. Often, when a tradesman saw a need for some specialized tool, he would get help from a local metal shop or fabricate it himself. Self-reliance was the order of the day, the tools were simpler in design, and the materials used to make them were readily available. Inventors and inventions abounded.
Of course, not every great idea stands the test of time--many of those early, one-of-a-kind tools never got much further than their inventors' toolboxes. But some of those inventions earned their keep on the job, claimed their place in history, and are still helping tradesmen earn a living today. The Tools of the Trade Hall of Fame celebrates the original thinkers whose vision, creativity, and persistence brought those ideas into the world, helping to make our work easier, more satisfying, and more productive.
Engineer responsible for the development of the Paslode SK 312, a milestone in pneumatic nail drivers.
Every once in a while, a design or invention comes along that changes everything--the way work gets done, the way the competition follows instead of leads, the designs of future products from that point forward. Sometimes the ripple effects of such a change spread far beyond an industry, resulting in improvements on a vast scale, such as in the economy and production of--in this case--home building itself.
The Paslode SK 312 pneumatic framing nailer was, according to its developers, that kind of tool design. Before it came along in 1973, pneumatic nail guns had reached a developmental threshold. Due to design limitations, even the best nailers could adequately handle only up to 2 1/2-inch nails. Beyond that length, the guns became too large, heavy, and cumbersome for practical, everyday use. This meant that they could not be used for stick-frame production home building, which by code requires 3-inch and longer fasteners (10d to 16d nails).
At the time, Steve Wilson was a young design engineer working for Paslode. The manufacturer already had a highly respected pneumatic nailer in its GN 212, which fired 2 1/2-inch common nails and gave rise to the term "gun nailer." Despite its usefulness, says Wilson, like most air-powered nailers of its day, the GN 212 had a long spool-type piston that required an elongated tool body. A tool that could handle longer nails was possible using this system, but early designs proved less than satisfactory. Paslode and its competitors were working furiously to overcome this barrier.
"My first project was to figure out how to come up with a tool that was better than what our competition had," Wilson recalls. "Paslode absolutely had to develop a tool for 3 1/2-inch inch nails." He and his crew worked on the problem for three years before finding the solution--the SK 312, a totally new design for a disk-type piston that not only did the job but was more compact, lighter in weight, and had significantly better reliability than other nailers available at the time. "It was a one-of-a-kind tool at that point, and it became the workhorse on the job" for carpenters and house framers.
The tool was so successful, it earned both the manufacturer and Wilson a longstanding reputation in the home-building industry. Wilson even had a special "SK 312" license plate made for his car. According to Bob Bellock, senior marketing development manager at Paslode today who was originally hired by Wilson, the SK 312 "was the first practical, high-powered, high-speed [nail] gun in the market." Paslode produced the model for more than 10 years, replacing it only when manufacturing advances made newer tools even smaller, lighter, and less costly to build.
Danish immigrant blacksmith who hammered out the invention of the Vise-Grip locking pliers in his Nebraska workshop in 1921.
Bill Petersen embodied the quiet individualism and pioneering spirit that built America. As a 20-year-old journeyman blacksmith, he emigrated from Denmark in 1902 to make his future in the Land of Opportunity. His trade skills served him well, enabling him to start a family and build moderately successful businesses in one Midwest town after another. But the horse-and-buggy era was ending, and old-time blacksmithing was rapidly making way for modern machinery and manufacturing.
An indefatigable optimist, young Petersen saw possibilities all around him, but his early attempts at success in other fields were disappointing. He tried his hand at farming, and even designed and built early motorcars with a partner. One of his inventions was a "spring wheel" for automobiles that combined an iron-and-rubber ring connected to metal spokes with shock-absorbing springs. When each of these ventures failed, he always returned to metalworking.
Another invention he experimented with over a number of years was an adjustable locking wrench that would hold a nut "in a vise-like grip." Although unschooled in mechanical design or engineering, he created a number of prototypes using first cardboard, then wood, and finally metal hammered into shape on his own forge.
Petersen eventually refined his design in 1920, then journeyed from Nebraska to Washington, D.C., to patent the first Vise-Grip in 1921. The tool proved its usefulness over the years, spawned a number of different versions, and grew into a successful family business. The brand continues today as part of American Tool Cos.
Abraham "Abe" Rosenberg
Founder of General Tools Manufacturing Co.; organized the first National Hardware Show in New York City in 1946.
In 1946, the hardware industry in the United States, like the rest of the nation, was just emerging from a wartime economy. Business was brisk, and although the postwar boom was still on the horizon, many in the industry could see it coming. As a result of the war, manufacturing was already in high gear, servicemen were returning home in huge numbers, and new-home construction was well on its way to unprecedented records.
At the time, most of the larger, and many of the smaller, producers of hand tools, hinges, locks, and other metal home-related products and appliances had offices in the traditional "hardware district" of lower Manhattan, an area now known as Chinatown. People in the business today recall that, back then, the New York City hardware trade was still very much a collection of family businesses, and competitors by day often shared meals, school, and social functions with their downtown neighbors after the shops closed. But with so many small operators, the industry was fragmented. One of those friendly competitors, Abe Rosenberg, who with his wife and partner Lillian wholesaled specialty tools under the General Hardware brand name, realized that he and everyone else in their business could benefit from a trade fair that displayed the industry's collective strengths.
Rosenberg enlisted manufacturers such as Disston, Hyde Tools, Camillus, Great Neck, and Ace to join in the first national gathering of hardware makers and sellers in America. With the help of an uncle, Charles Snitow (who would go on to promote some of the world's largest trade fairs, including the Consumer Electronics Show), Abe held the original exposition in the city's Grand Central Palace in March 1946.
The Hardware Show was a success from the start and it became an annual event in New York City until 1974, when it moved to its present home at McCormick Place in Chicago. General Tools still exhibits at the show, alongside many of the other original manufacturers. The 2002 National Hardware Show included nearly 3,000 American and international exhibitors and was attended by some 42,000 industry professionals.
William H. Barber
Inventor of an "elegant" bit-and-brace design in 1864 that formed the foundation of Millers Falls Manufacturing Co., one of the most successful American toolmakers of its time.
In the mid-1800s, the Industrial Revolution was rapidly reshaping the United States, and nowhere was this more evident than in New England, a region blessed with water power, wood, and the raw materials needed to support its industries and inventors. The entrepreneurial spirit seemed to be everywhere, and when two young Massachusetts men, Levi Gunn and Charles Amidon, quit their jobs building hand planes at the Greenfield Tool Co. to strike out on their own, they believed their idea for a better washing-machine wringer would bring them success and fortune.
It didn't work out quite the way they expected. According to a history of the Millers Falls company by Randy Roeder, the partners couldn't afford to hire laborers, so they first had to build their own workshop and even construct a water wheel for power. By 1862 they had barely begun producing wringers when their warehouse--a barn belonging to Gunn--burned to the ground along with their entire inventory. Facing ruin, the partners were fortuitously introduced to a young inventor from Windsor, Vt., named William H. Barber, who held a patent on a unique tool design but could find no one willing to produce it. Barber convinced the pair to purchase the manufacturing rights to the tool, a bit-holding brace (also known as a "bitstock") with a unique iron-jawed chuck. Other early braces were becoming available at that time, but it was the "elegant" chuck design that made Barber's tool superior to them all.
Production began at 18 braces per day, but within two years several hundred tools were being turned out daily to keep up with demand. Amidon was issued a new patent in 1868 for an improvement to Barber's original design, which helped to establish the fame and fortune of the new Millers Falls Manufacturing Co., as the firm was renamed that year. According to Roeder, "Although the firm would continue to build the traditional Barber brace for decades, Amidon's 'Barber Improved' brace became far and away the company's best-selling boring tool and probably had as much to do with the firm's eventual prosperity as any single product."
Millers Falls went on to invent or acquire patents on a wide variety of innovative tools, including push-drills, rotary hand drills, and other types of bit braces, including the Goodell and Rose braces. The company history ended in 1982 when it was sold. Today, original Millers Falls tools are prized by collectors as fine examples of 19th and 20th century tool making.
Early air compressor manufacturer whose many innovations helped spur the "pneumatic revolution" in construction tools; co-founder of Emglo Products, 1957.
For someone who reportedly felt that "patents were a waste of time," Milt Friedman certainly didn't let time or the U.S. Patent Office stand in the way of creativity. An engineering graduate of Emory Tech (later Carnegie Mellon University), he and a school chum, Daniel Glosser, founded Emglo Products in 1957 and began manufacturing "everything and anything," from portable heaters to fans to ski rope-tow machines.
By the mid-1960s, they could see the growth potential of one particular product, the air compressor, and began to focus their manufacturing business in this area. In those days, compressors consisted mainly of large stationary equipment used for ventilation, air conditioning, and industrial shop work. Friedman had another idea, however, and in 1968 Emglo introduced the first low-profile wheeled portable unit that could be taken to the jobsite. The rental industry helped popularize these go-anywhere units, and soon the use of air compressor-powered tools in construction was off and running.
Dale Mishler, a sales manager at Emglo today, describes the rapid growth in air tool use as a "pneumatic revolution" that swept residential and commercial construction in the 1970s. "Every year, the company would build a new addition to our plant, and while doing it they would build and bury [foundation] footers for the next addition, which would be added the following year." Innovations also followed at a rapid pace: According to a company history, in 1977 Emglo introduced multiple engine options on its compressors; in 1984 it created the first stacked hand-carry portables and the first high-pressure wheeled portables; and in 1991 the company's "authentic blue" colors adorned the industry's first gas-powered hand-carry units.
Today Emglo maintains a 50 percent share of the commercial/industrial marketplace, says Mishler, along with a sizeable share of portable air compressor sales. In December 2000, Emglo became a division of DeWalt Industrial Tool and continues to manufacture under both the DeWalt and Emglo brand names.
Michael Morris is a contributing editor to Hanley-Wood's Tools of the Trade. | <urn:uuid:cd48618c-58eb-4f0a-876f-8c0741600c63> | CC-MAIN-2014-10 | http://www.toolsofthetrade.net/hand-tools/hall-of-fame-2003.aspx | s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394021900438/warc/CC-MAIN-20140305121820-00026-ip-10-183-142-35.ec2.internal.warc.gz | en | 0.976366 | 2,820 | 2.671875 | 3 |
Dancing is the key to staying younger for longer
-Aug 30, Jenny Paul, Mind -
Picture the scene; you’re at home on your own feeling fed up and suddenly your favourite song from your teens comes onto the radio, you turn it up jump up and start dancing around your kitchen like your life depends on it, singing along knowing every word off by heart, before collapsing on the sofa in fits of giggles feeling happy, elated and carefree.
We have already looked into why music instantly improves wellbeing, but did you know that there’s now solid proof that dancing is not only good for you, it can also help to keep you younger for longer.
Researchers from the German Center for Neurodegenerative Disease and Institute for Sports Science recently found that learning choreographed dance routines significantly improved age-related brain generation, after they worked with a focus group of adults with an average age of 68 years old.
They concluded that all aerobic exercise – cycling, swimming and even walking regularly – helps improve memory, but that only dancing helps improve issues with balance.
Kathrin Rehfeld, who is the lead author of the study explained: “Exercise has the beneficial effect of slowing down or even counteracting age-related decline in mental and physical capacity. In this study, we show that two different types of physical exercise (dancing and endurance training) both increase the area of the brain that declines with age. In comparison, it was only dancing that lead to noticeable behavioural changes in terms of improved balance.”
This is an important aspect of the study because many older people end up having their quality of life ruined by falling and seriously hurting themselves – perhaps ending up with a broken hip, or wrist – because of problems with balance. In turn this might lead to an extended hospital stay, or no longer being able to live independently.
How dancing helps you feel more youthful
“I believe that everybody would like to live an independent and healthy life, for as long as possible,” underlines Rehfeld. “Physical activity is one of the lifestyle factors that can contribute to this, counteracting several risk factors and slowing down age-related decline. I think dancing is a powerful tool to set new challenges for body and mind, especially in older age.”
Further, Dr Stella Compton Dickinson tells Lumity that the music component of dancing is valuable for older people who are grappling with remembering details, or sequences of events as they age – especially those who are becoming confused about or forgetting when and where (or even if) certain things happened:
“Music has associations to times and places in our lives. If we hear a song from a different time in our life it can bring back all those old feelings. It may be very romantic, sad, happy or funny. Music can make us feel nostalgic and it can therefore make us laugh or cry, feel warm and loving or uncomfortable and full of regret,” she says.
“When working with elderly people, if they hear a favourite old song this can bring back happier times and they can then often recall the lyrics which may not have been thought about in ages – then the individual can enjoy sharing their memories. This is important in helping the individual to have a sense of wellbeing as well as continuity across their life-span and then to orientate them to all that they have done decade by decade.”
If you’re considering making dance classes a part of your exercise routine, there’s a number of options available: From tap dancing, to belly dancing, to jazz dancing, tango, pole dancing, Latin dancing, hip hop, salsa, Irish dancing, line dancing, ballroom, ballet and even break-dancing are just a few of the choreographed ones which we have found on offer in most towns, and then if you want to you can always attend a yoga rave later in the week.
Did you enjoy this? Here’s the exercise trend that will fill you with joy, here’s how to have healthy, glowing skin in just minutes every morning, and have you tried Victoria Beckham’s simple instant happiness secret? | <urn:uuid:fc0ac8d3-157f-4427-89b3-3e9ca609e001> | CC-MAIN-2020-16 | https://my.lumitylife.com/dancing-is-the-key-to-staying-younger-for-longer/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371810807.81/warc/CC-MAIN-20200408072713-20200408103213-00288.warc.gz | en | 0.967129 | 856 | 2.640625 | 3 |
We hear a lot about free radicals and their harmful effect on our health and aging. It’s important to understand free radical dangers so that you can take steps to counter their effect. Here’s a simple explanation of how free radical dangers can be reduced to slow the aging process and reduce the risk of cancer.
Understanding Free Radical Dangers
The dangers of free radicals were uncovered by Dr. Denham Harman in the 1950s. He discovered that when cells produce energy for the body to function, the byproducts are harmful free radicals. Studies show that these free radicals damage cellular DNA, which is the main cause of aging in the body. It’s a bit like a car engine burning fuel for propulsion, but the waste produced is toxic carbon monoxide.
What is Oxidative Stress?
Free radicals contain unpaired electrons which try to pair up with other electrons to balance themselves. They “steal” electrons from other molecules and this creates damage to our cellular DNA. This process is called oxidative stress.
How Free Radical Dangers Affect Aging
The reason why free radical dangers cause premature aging is because DNA controls cell division and the formation of new cells. If DNA is damaged by oxidative stress, it negatively affects new cell production. This leads to signs of aging in the skin and may also cause cancer, which is caused by abnormal cell division. Other free radical dangers include damage to the skin and organs due to collagen cross-linking, impaired cognitive function, weakened immune system and cardiovascular damage.
How to Counter Free Radical Dangers
We can’t stop the production of free radicals as it is a natural part of living, breathing, eating and exercise. However, there are some ways we can reduce oxidative stress. Smoking produces free radicals and is a cause of premature wrinkles and aging. Excessive exposure to the ultraviolet rays in sunlight, stress and over-consumption of alcohol can all increase oxidative stress and should be avoided whenever possible.
Heating vegetable oils is known to release toxic free radicals, so switch to butter or coconut oil when possible. You can still enjoy olive oil in salad dressings and unheated foods.
The most important way to combat free radical dangers is by consuming plenty of foods high in antioxidants such as fruit, vegetables and green tea. As their name suggests, antioxidants counter oxidative stress by pairing up with floating free radicals. This neutralizes them, preventing damage to our cells and DNA. This in turn slows the aging process, leading to a longer and healthier life. | <urn:uuid:94979042-c3e3-4ce0-9a2c-6b797480ea72> | CC-MAIN-2017-39 | http://healthblog.ivlproducts.com/blog/health-well-being-and-spirituality/how-free-radical-damage-affects-your-health | s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689975.36/warc/CC-MAIN-20170924100541-20170924120541-00583.warc.gz | en | 0.938238 | 515 | 3.109375 | 3 |
We love bees. They are most important of the animal pollinators on the planet, on which 75% of our food crops and nearly 90% of wild flowering plants depend. Plus, they make delicious honey and are a prime source of puns. Watch this space...
But, right now, they are sadly in trouble and need our help. Because of a loss of habitat, increasingly unpredictable weather driven by climate change, non-native pests and diseases, irresponsible pesticide use and many other complex factors – bee populations and diversity of species are in decline.
Here are six simple ways you can help our bee-autiful friends keep on doing what they’re doing:
1. Plant flowers
There are more than 250 species of bee in the UK, and they have all evolved together with our local flora to fill a specific ecological niche. By planting a wide range of flowers, particularly native varieties that our friendly neighbourhood pollinators have evolved to thrive upon. Get down to beez-ness and get planting with Tabitha Eve’s Beebomb, featuring a mix of 18 native wildflower seeds.
2. Use organic pest control
Chemical pesticides are often harmful to the environment, and can even harm animals that would otherwise be beneficial. Many species affected are not actually harmful to gardens, or can be effectively controlled using other measures such as water spraying, natural predation or companion planting. Find out more from the RSPB, or check out these great sustainable gardening products from Pokon.
3. Save tired bees
What do you call a bee that needs a drink? Bee-hydrated. Well, sort of. During the summer months, you might spot a solitary bee sitting motionless on the ground. Whilst it’s easy to think that they are dead or dying, they often just need a quick boost of energy. To help, mix two tablespoons of white, granulated sugar with one tablespoon of water, placing it near the bee so it can help itself to life-sustaining nourishment.
4. Say no to Neonicotinoids
Neonicotinoids are a nasty pesticide used widely in agriculture. When they are sprayed onto plants or seeds, they are absorbed. So, when a bee comes to pollinate said plant, it will ingest this pesticide. This can seriously damage the bee’s central nervous system. Most commonly used neonics have been banned for use across the EU, however the UK government recently permitted their use on sugar beets in the UK. Although they reversed this decision under pressure, we need to keep pushing for a permanent ban. Learn more here.
5. Build your own Bee-st Western
Bad puns featuring obscure British hotel chains aside, providing accommodation for bees and other insects is a great way to help them thrive. The majority of species of bee in the UK are solitary, with many different needs when it comes to nesting. Learn about different ways to encourage bees to move in here.
6. Support bee-friendly charities
Environmental charities are united around their love for bees, as they are a cornerstone of the natural world that we cannot do without. In addition to providing direct support to the environment, charities play a crucial part in lobbying government and business. Whilst it is tough for us to make waves on our own, by joining a cause and uniting your voice with others we can make a difference!
For a start, try checking out the Friends of the Earth who will send a free-bee bee-saving kit your way when you donate.
Cover image via Pinterest | <urn:uuid:a2932c06-d6d9-421a-bd97-708273f12a25> | CC-MAIN-2023-50 | https://www.zero-living.com/blogs/news/bee-the-change-you-want-to-see-6-ways-to-help-this-world-bee-day | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100912.91/warc/CC-MAIN-20231209134916-20231209164916-00297.warc.gz | en | 0.933778 | 725 | 3.375 | 3 |
Land use is fundamentally changing water resources. Water extraction is drawing down water tables and lowering river levels; land use change affects the partitioning of water fluxes; changes in surface runoff and aquifer recharge will affect surface water and groundwater resources; while changes in evapotranspiration may feed back to precipitation regimes. Given the interactions between different hydrometeorological processes, a systems approach is needed. This project is the first to combine both climate impacts on the hydrological regime and hydrological feedbacks on the climate. This is accomplished by using a state-of-the-art suite of data assimilation, new process understanding, and integrated modelling of the atmosphere surface groundwater system. The set-up will be used to evaluate anthropogenic and natural changes in major water fluxes and resources for the Gangetic Plain. The northern Indian plains have experienced land use changes and water exploitation at an unprecedented scale, posing extraordinary scientific challenges to understand, quantify and predict availability of water resources.
We focus on the following questions: (1) To what extent do the large-scale, human-induced land use changes and groundwater depletion that have taken place in India feed back to the hydrological and climate system at a basin scale? (2) How should climate model outputs be disaggregated to provide the boundary conditions needed for hydrological and water resource systems modelling, and do the results of such modelling provide suitable reductions in the uncertainty of projections? (3) Can large-scale modelling studies inform localised, ecosystem-based management decisions to improve water availability and security? The Ganga River is not only crucial for the socio-economic development of the country; it also provides a unique case of large-scale river systems dominated by groundwater resources. The project specifically addresses the scope of the call, especially the themes on interactions between the surface and subsurface, water cycle drivers and mechanisms, and the water cycle-anthropogenic interface. | <urn:uuid:91df8bd4-a750-440b-a222-e13b4bcf2c1d> | CC-MAIN-2017-34 | http://paramo.cc.ic.ac.uk/india/node/5 | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886102993.24/warc/CC-MAIN-20170817073135-20170817093135-00702.warc.gz | en | 0.900713 | 391 | 2.890625 | 3 |
This is part of our ongoing The Best Kept Secrets to Healthy Aging spotlight. Each day, we will be posting some of the great information that’s packed into our book, The Best Kept Secrets to Healthy Aging.
The Mediterranean Diet and Health Benefits – What Does the Data Say?
The results of a large number of studies all point in the same direction – the eating practices of individuals on the “Mediterranean Diet” keep people healthier.
The results of an analysis that combined the findings of many studies in an attempt to find the patterns that have emerged was published recently in Nutrition Reviews.1 The paper considered all of the possible health benefits that could be obtained from this lifestyle. These researchers concluded that the “Mediterranean Diet” does indeed keep people healthier. People who lived this lifestyle their entire lives as well as people who adopted it during participation in a research study enjoyed lower serum total and low-density lipoprotein-cholesterol (LDL-cholesterol) concentrations, lower plasma triglycerides, higher serum high-density-cholesterol (HDL-cholesterol) concentrations, greater total plasma antioxidant capacity, more responsive and compliant blood vessels, greater insulin sensitivity and tighter blood glucose control, less cardiovascular disease, fewer heart attacks, fewer and milder joint problems, a tendency to lower body fatness and fewer cancers.
These conclusions repeat those that were reached previously by other experts.4 Those earlier scientists concluded that a shift to the traditional healthy Mediterranean diet by people living in highly developed Western countries could reduce by 10% to 25% the occurrence of cancers of the colon, rectum, breast, prostate, pancreas and endometrium.
Another investigator has published the results of a more detailed examination of the specifics of the Mediterranean dietary lifestyle in the scientific journal, Public Health Nutrition, in an article titled, “Mediterranean Diet and Cancer.”5 This public health expert concluded that individuals who regularly consume at least 5 servings of fruits, at least 5 servings of vegetables, at least 1 serving of fish, at least one serving of whole grains and at least two tablespoons of olive oil (high in monounsaturated fats) every day, while eating red meat no more often than once every other day, would cut in half their chances of ever developing cancer of the mouth, throat, esophagus, stomach, colon, rectum, liver, gallbladder, pancreas, kidney, urinary bladder or prostate (if male) or breast, endometrium or ovary (if female).
The results of a recently-completed “gold standard” randomized controlled clinical trial, published in the Annals of Internal Medicine, are consistent with all of the previous conclusions and predictions concerning the health benefits of this lifestyle. In this study, two versions of the Mediterranean dietary lifestyle, differing in major fat source, were compared to a standard low-fat diet.6 Regardless of whether the additional dietary fat was in the form of olive oil or nuts, both versions of the Mediterranean dietary lifestyle produced much tighter control of blood glucose concentrations, promoted normalization of blood pressure, lowered serum LDL-cholesterol concentrations and reduced signs of systemic inflammation.
Beneficial effects on body weight probably contribute to these positive outcomes. As shown in the results of a study of over 3,000 men and women living in northeastern Spain, the closer an individual adheres to this lifestyle, the less likely he or she is to become overweight.7
Next Best Kept Secrets to Healthy Aging topic:
The Mediterranean Diet – Is It The Oil?
1. Serra-Majem L, Roman B, Estruch R. Scientific evidence of interventions using the Mediterranean diet: A systematic review. Nutr Rev 2006;64:S27-S47.
2. Colomer R, Menendez JA. Mediterranean diet, olive oil and cancer. Clin Transl Oncol 2006;8:15-21.
3. Simopoulos AP. The Mediterranean diets: What is so special about the diet of Greece? The scientific evidence. J Nutr 2001;131:3065S-3073S.
4. Trichopoulou A, Lagiou P, Kuper H, Trichopoulos D. Cancer and Mediterranean dietary traditions. Cancer Epidemiol Biomarkers Prev 2000;9:869-873.
5. La Vecchia C. Mediterranean diet and cancer. Public Health Nutr 2004;7:965-968.
6. Estruch R, Martinez-Gonzalez MA, Corella D, Salas-Salvado J, Ruiz- Gutierrez V, Covas MI, Fiol M, Gomez-Gracia E, Lopez-Sabater MC, Vinyoles E, Aros F, Conde M, Lahoz C, Lapetra J, Saez G, Ros E; PREDIMED Study Investigators. Effects of a Mediterranean-style diet on cardiovascular risk factors: A randomized trial. Ann Intern Med 2006;145:1-11.
7. Schroder H, Marrugat J, Vila J, Covas MI, Elosua R. Adherence to the traditional Mediterranean diet is inversely associated with body mass index and obesity in a Spanish population. J Nutr 004;134:3355- 3361. | <urn:uuid:716aba74-c0ee-4602-8cbd-d524223ca160> | CC-MAIN-2017-39 | http://purityproductsblog.com/purity-products-mediterranean-diet-health-benefits-data/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818688997.70/warc/CC-MAIN-20170922145724-20170922165724-00099.warc.gz | en | 0.908372 | 1,089 | 2.515625 | 3 |
The lung models consist of a thoracic cavity, a rubber membrane, and two balloons. The rubber membrane covering the bottom of the thoracic cavity simulates the diaphragm. The two balloons inside the thoracic cavity simulate the lungs. The balloons are connected by a Y-shaped tube whose other end is attached to a whistle-type artificial larynx. Speech sounds are produced when the vocal tract model is connected to an artificial larynx.
The first video clip shows a U-shaped tube with colored water attached to the thoracic cavity. When you look closely at the level of water in the U-shaped tube, the difference in height h reflects the pressure in the thoracic cavity. To set the vocal folds into vibration, the difference between the subglottal and supraglottal pressures, or the transglottal pressure, needs to be within the range of 5-10 cm H2O. In the video, h is within this range during phonation.
- Arai, T., “Lung model and head-shaped model with visible vocal tract as educational tools in acoustics,” Acoust. Sci. Tech., 27(2), 111-113, 2006.
- Arai, T., “Education system in acoustics of speech production using physical models of the human vocal tract,” Acoust. Sci. Tech., 28(3), 190-201, 2007.
- Stevens, K. N., Acoustic Phonetics, Cambridge, MA, MIT Press, 1998.
- Arai, T., “Virtual lung model for education in phonetics and speech science,” Acoust. Sci. Tech., 37(4), 173–174, 2016. | <urn:uuid:5fb9539a-b36c-4354-9d65-b9df9e2d8a14> | CC-MAIN-2023-40 | https://splab.net/apd/f120/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510238.65/warc/CC-MAIN-20230927003313-20230927033313-00672.warc.gz | en | 0.875993 | 366 | 3.875 | 4 |
RALEIGH — Birds do it, bees do it, but some snakes might abstain.
In a study published this month in the journal Biology Letters, researchers at N.C. State University's entomology department reveal that some female boa constrictors can reproduce without mating.
The genetic makeup of these snakes defies what scientists had considered possible. Since the early days of reproduction genetics in the 1950s, scientists thought reptiles with these super snakes' chromosomal pairs would die before hatching.
"This boa constrictor upends decades of reproduction theory," said Warren Booth, an NCSU research associate in entomology and lead researcher on the project.
After mating the old-fashioned way and producing a litter of normal babies in 2004, a pet boa constrictor had litters in 2009 and 2010, apparently without mating. Curiously, snakes in those litters all shared unusual color markings, leading scientists to question their paternity.
Genetic testing on the litters showed no evidence of male genes present. What's more, the super snake babies show characteristics thought to be virtually impossible in asexual reptile reproduction: Every one is female, and if she reproduces, she will only be able to make females.
Booth and his team are waiting to see if these offspring are super females like their mother, reproducing without a male.
"The big thing about these findings is that they prove reproduction systems in reptiles and possibly birds are more extraordinary than we ever believed," Booth said.
Does this mean we should soon fear a bonanza of boas?
"Asexual reproduction might make it easier for these snakes to become established somewhere," said Kevin de Quieroz, curator in charge of the Division of Amphibians and Reptiles at the Smithsonian National Museum of Natural History in Washington. But other factors, such as pets being released into the wild, are more likely to lead to successful establishment, he said.
Booth said he is interested in uncoiling more mysteries of reptilian reproduction. "This form of reproduction could be happening more often than we think, but it's simply being overlooked." | <urn:uuid:9bcce5b2-4686-4d54-9f2f-71ef9426e8f4> | CC-MAIN-2014-10 | http://www.newsobserver.com/2010/11/15/803795/these-super-snakes-dont-need-a.html | s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394021643070/warc/CC-MAIN-20140305121403-00037-ip-10-183-142-35.ec2.internal.warc.gz | en | 0.947151 | 438 | 3.09375 | 3 |
The suicides of three people connected to school shootings in the last week is bringing renewed attention to the long-term effects of such trauma—from survivor’s guilt to post-traumatic stress disorder.
There is scant research on whether living through or losing someone in a massacre increases the risk of suicidal ideation, and experts agree that suicide is a complex phenomenon in which genetics and neurobiology also play a role.
Tens of thousands of students have survived school shootings at this point—with varying degrees of proximity to the violence and ties to the victims—and reports of suicide among them are scattered.
But at the same time, scientists have found links between PTSD and suicide, particularly when there is underlying depression. And studies have shown that survivors of mass shootings are at higher risk for PTSD and other mental issues—although how much higher varies from study to study.
According to the National Center for PTSD, 28 percent of people who witnessed a mass shooting develop the disorder, with another third developing an acute stress disorder.
Sydney Aiello, who survived the deadly rampage at Marjory Stoneman Douglas High School in Parkland, Florida, but took her own life on March 17, had been diagnosed with PTSD, according to her family, who said she was also suffering from “survivor’s guilt.”
It’s not clear what kind of issues a Parkland sophomore might have been facing before he took his own life a few days after Aiello’s suicide. And little information has emerged about the death of Jeremy Richman, the father of a first-grader slain at Sandy Hook Elementary in Newtown, Connecticut, who was found dead Monday of an apparent suicide.
Amy Nitza, the director of the Institute for Disaster Mental Health at SUNY New Paltz, said that kind of guilt is a “typical reaction” but does not, in isolation, lead to suicide.
“Survivor’s guilt is not a diagnosis,” Nitza said. “It’s not in the extreme category, either. It’s not like PTSD.”
It can, however, be very unsettling.
Patrick Korellis survived a shooting at Northern Illinois University in 2008. Because he was sitting at the end of the row of seats, he managed to make a run for the door as shotgun pellets hit his head and arm. He was bleeding heavily when he arrived at the ER, but he survived—while five classmates died.
At a memorial service, the parents of a victim asked Korellis how their daughter, who was sitting in the middle of his row, died. Was she hiding under the desk? Was she trapped?
“I told them, yes, she was trapped under there,” Korellis told The Daily Beast. “I knew she was trapped, too. Why didn’t I grab her, try and save her? But the parents said, ‘No, don’t ever think that.’”
Korellis credits a strong survivor support network with keeping him from becoming suicidal, because when he was feeling really down, “he always had someone to talk to.”
Nitza, who recently published a book of case studies on mental health after disasters, said that the health of survivors is difficult to study because gathering data following trauma is ethically problematic.
However, there have been other cases of suicide after mass shootings. Roy McClellan survived the Las Vegas shooting; within two months, he killed himself. A year after the Columbine massacre, student Greg Barnes took his life. In Chardon, Ohio, six students attempted suicide after a 2012 shooting that left three schoolmates dead. A year and a half after Columbine, the mother of a student who was severely wounded was dead by her own hand.
Here’s what experts do know: Survivors of these horrific events need a strong support system. A study from Northern Illinois University found that survivors who were satisfied with their social support were more likely to recover from acute stress symptoms and persistent PTSD.
Melissa Brymer, director of terrorism and disaster programs at the UCLA-Duke National Center for Child Traumatic Stress, said access to services is also key.
During screenings, she asks students how often they’re thinking of the traumatic event, if they’re avoiding situations that remind them of it, if they’re depressed or suicidal, or if anyone in their peer group is struggling as well.
“Any kids who show signs of PTSD, we make sure they get help,” Brymer said.
Aiello was away from home at college when she died, which can heighten suicide risk. Brymer said her program trains trusted figures in college students’ lives, such as resident assistants and graduate assistants, to look for warning signs.
“They need to know there’s someone who cares and that there’s help available if they need it,” Brymer said. “We want the kids to know they have options.”
Brymer added that anniversaries are also high-risk times for survivors. The deaths of the Parkland students come just a month after the anniversary of the shooting and just before the anniversary of the March For Our Lives led by Parkland students.
Some of the Parkland survivors took to social media after the two suicides to complain they did not get enough services. Kyra Parrow wrote on Twitter that “after experiencing the deadliest high school mass shooting in American history” she was forced to return to the campus two weeks later.
“I remember at one point I couldn’t [bear] to write my paper. I went to my teacher—she proceeds to tell me to put my grief in a box to complete it.”
Students, she wrote, were “expected to brush aside our grief and deep mental wounds. The passing of two survivors by suicide is a awake up call of yet again, another failure by America.”
Two months after surviving the NIU shooting, Korellis met with survivors of the Virginia Tech shooting. He said talking with them helped him.
He said they discussed their common experience such as being triggered by certain sights or smells that remind them of the shooting, bad dreams, and trouble going into classrooms and lecture halls.
“I asked them, ‘Is it ever gonna get easier?’” he recalled. “They … said it gets a little easier each day.” He noted, “Even your closest family and friends won’t really understand what you’re going through like other survivors.”
Korelis now manages the NIU Facebook group for survivors of the shooting, their families, and victim families. It has about 70 members. He’s also active in a Facebook group for those affected by all mass shootings, which has about 900 members and cited groups such as The Rebels Project and Everytown Survivor Network.
“People post a lot saying they’re having a tough day, and there’s always reponses, people reaching out,” he said. “It’s sad but the group is always growing from victims of new shootings, so there’s no lack of support.”
Rhonda Hart, who lost her daughter, Kimberly, in a school shooting in Santa Fe, Texas, just three months after Parkland, said it can be hard to find the right person to talk to. In addition to therapy, she calls or texts suicide hotlines sometimes. She’s not part of any survivor networks.
“I’ve called the hotline just to talk, because I’m having a really bad day,” she said. “I just wanted someone to say, ‘It’s OK.’”
Korellis believes if he could have talked to the Parkland students, perhaps they would have lived.
“I wish I could have helped those kids before they committed suicide, I wish they’d reached out to us or someone,” he said. “We all have survivor's guilt. We’re all in this together trying to get through.”
If you or a loved one are struggling with suicidal thoughts, please reach out to the National Suicide Prevention Lifeline at 1-800-273-TALK (8255). | <urn:uuid:d48f97aa-6701-49b5-88ec-1a2996128cad> | CC-MAIN-2023-40 | https://www.thedailybeast.com/from-parkland-to-sandy-hook-trauma-of-school-shootings-haunts-survivors-for-decades | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510326.82/warc/CC-MAIN-20230927203115-20230927233115-00829.warc.gz | en | 0.976269 | 1,764 | 2.6875 | 3 |
Ministry of Defense
Japan Defense Agency (B˘eich˘)
Japan Self-Defense Force
Japan Self-Defense Force
On January 7, 2007, the Japan Defense Agency was upgraded to Ministry of Defense, a Cabinet-level ministry.
With nearly 240,000 military personnel and an annual budget of close to $50 billion, Japan's military outstrips Britain's in total spending and manpower, while its navy in particular scores high among experts for its sophistication.
Japan is a major world economic and political power, with an aggressive military tradition, resisting the development of strong armed forces. A military proscription is included as Article 9 of the 1947 constitution stating, "The Japanese people forever renounce war as a sovereign right of the nation and the threat or use of force as a means of settling international disputes." That article, along with the rest of the "Peace Constitution," retains strong government and citizen support and is interpreted as permitting the Self-Defense Forces (SDF), but prohibiting those forces from possessing nuclear weapons or other offensive arms or being deployed outside of Japan.
The Defense Agency and the SDF both comprise the same defense organization. However, the term Defense Agency is used to denote an administrative organization responsible for the management, operation, etc., of the GSDF, MSDF and ASDF, while the term SDF is used to mean armed organizations that conduct unit activities for the defense of the nation and for other purposes. The SDF are under control of the civilian Defense Agency, subordinate to the prime minister. Unlike MITI or MOF, JDA is not a full-fledged ministry. Rather, it is an agency, a part of the Prime Minister's Office. Not only is it of lower bureaucratic standing, therefore, but it has less control over its own fate than do full ministries. Thus, of the 10 bureaucratic appointments to JDA, at least four are assigned from other ministries. This situation is the result of a deliberate effort to ensure continued civilian control.
Following World War II Japan's Imperial Army and Navy were dissolved, and the old regime was replaced with a democratic government. Article 9 of the new Constitution of Japan renounced war or even possessing combat potential. However, the Cold War and the Korean War forced Japan to reestablish defensive capabilities. A constitutional interpretation of Article 9 grants Japan the inherent right of self-defense and the possession of the minimum armed strength needed to exercise that right.
Having renounced war, the possession of war potential, the right of belligerency, and the possession of nuclear weaponry, Japan held the view that it should possess only the minimum defense necessary to face external threats. Within those limits, the Self-Defense Forces Law of 1954 provides the basis from which various formulations of SDF missions have been derived. The law states that ground, maritime, and air forces are to preserve the peace and independence of the nation and to maintain national security by conducting operations on land, at sea, and in the air to defend the nation against direct and indirect aggression.
To avoid the appearance of a revival of militarism, Japan's leaders emphasized constitutional guarantees of civilian control of the government and armed forces and used nonmilitary terms for the organization and functions of the forces. The overall organization was called the Defense Agency rather than the Ministry of Defense. The armed forces were designated the Ground Self-Defense Force (GSDF), the Maritime Self-Defense Force (MSDF), and the Air Self-Defense Force (ASDF), instead of the army, navy, and air force.
Based on the Self-Defense Forces Law of 1954, the nation's defense establishment is organized to ensure civilian control of the armed forces. The result has been a unique military system. All SDF personnel are technically civilians: those in uniform are classified as special civil servants and are subordinate to the ordinary civil servants who run the Defense Agency. There is no military secrets law, and offenses committed by military personnel- -whether on base or off base, on duty or off duty, of military or nonmilitary nature--are all adjudicated under normal procedures by civil courts in appropriate jurisdictions.
The general framework through which these missions are to be accomplished is set forth in the Basic Policy for National Defense adopted by the cabinet in 1957; it remains in force. According to this document, the nation's security would be achieved by supporting the United Nations (UN) and promoting international cooperation, by stabilizing domestic affairs and enhancing public welfare, by gradually developing an effective self-defense capability, and by dealing with external aggression on the basis of Japan-United States security arrangements, pending the effective functioning of the UN.
Japan's national defense policy has been based on maintaining the 1960 Treaty of Mutual Cooperation and Security with the United States, under which Japan assumed unilateral responsibility for its own internal security and the United States agreed to join in Japan's defense in the event that Japan or its territories were attacked. Although the size and capability of the SDF have always limited their role, until 1976 defense planning focused on developing forces adequate to deal with the conventional capabilities of potential regional adversaries. Beginning in 1976, government policy held that the SDF would be developed only to repel a small-scale, limited invasion and that the nation would depend on the United States to come to its aid in the event of a more serious incursion.
The Soviet invasion of Afghanistan in 1979 and the buildup of military forces in the Soviet Far East, including a group of islands to the north of Hokkaido, which were occupied by the Soviet Union but claimed by Japan, led Japan to develop a program to modernize and improve the SDF in the 1980s, especially in air defense and antisubmarine warfare. In the early 1990s, the government was reevaluating its security policy based on reduced East-West tensions.
The very general terms in which military missions are couched left specifics open to wide interpretation and prompted the criticism that the nation did not possess a military strategy. In the 1976 National Defense Program Outline, the cabinet sought to define missions more specifically by setting guidelines for the nation's readiness, including specific criteria for the maintenance and operation of the SDF. Under these guidelines, in cases of limited and small-scale attack, Japanese forces would respond promptly to control the situation. If enemy forces attacked in greater strength than Japan could counter alone, the SDF would engage the attacker until the United States could come to its aid. Against nuclear threat, Japan would rely on the nuclear deterrence of the United States. To accomplish its missions, the SDF would maintain surveillance, be prepared to respond to direct and indirect attacks, be capable of providing command, communication, logistics, and training support, and be available to aid in disaster relief.
The outline specified quotas of personnel and equipment for each force that were deemed necessary to meet its tasks. Particular elements of each force's mission were also identified. The GSDF was to defend against ground invasion and threats to internal security, be able to deploy to any part of the nation, and protect the bases of all three services of the Self-Defense Forces. The MSDF was to meet invasion by sea, sweep mines, patrol and survey the surrounding waters, and guard and defend coastal waters, ports, bays, and major straits. The ASDF was to render aircraft and missile interceptor capability, provide support fighter units for maritime and ground operations, supply air reconnaissance and air transport for all forces, and maintain airborne and stationary early warning units.
The Mid-Term Defense Estimate for FY 1986 through FY 1990 envisioned a modernized SDF with an expanded role. While maintaining Japan-United States security arrangements and the exclusively defensive policy mandated by the constitution, this program undertook moderate improvements in Japanese defense capabilities. Among its specific objectives were bettering air defense by improving and modernizing interceptor-fighter aircraft and surface-to-air missiles, improving antisubmarine warfare capability with additional destroyers and fixed-wing antisubmarine patrol aircraft, and upgrading intelligence, reconnaissance, and command, control, and communications. Most of the goals of this program were met, and the goals of the Mid-Term Defense Estimate for FY 1991 through FY 1995, although building on the early progam, were considerably scaled back.
The SDF disaster relief role is defined in Article 83 of the Self-Defense Forces Law of 1954, requiring units to respond to calls for assistance from prefectural governors to aid in fire fighting, earthquake disasters, searches for missing persons, rescues, and reinforcement of embankments and levees in the event of flooding. The SDF has not been used in police actions, nor is it likely to be assigned any internal security tasks in the future.
In June 1992, the National Diet passed a UN Peacekeeping Cooperation Law which permitted the SDF to participate in UN medical, refugee aid, transportation, infrastructural repair, election-monitoring, and policing operations under strictly limited conditions. This law was used in 1992- 93 to authorize the deployment of 600 SDF and seventy-five police personnel for UN engineering and election-monitoring projects in Cambodia and again in the spring of 1993 to send fifty-three persons to participate in peacekeeping operations in Mozambique.
The Defense Agency, aware that it could not accomplish its programs without popular support, paid close attention to public opinion. Although the Japanese people retained a lingering suspicion of the armed services, in the late 1980s antimilitarism had moderated, compared with its form in the early 1950s when the SDF was established. At that time, fresh from the terrible defeat of World War II, most people had ceased to believe that the military could maintain peace or serve the national interest. By the mid-1970s, memories of World War II had faded, and a growing number of people believed that Japan's military and diplomatic roles should reflect its rapidly growing economic strength. At the same time, United States-Soviet strategic contention in the area around Japan had increased. In 1976 Defense Agency director general Sakata Michita called upon the cabinet to adopt the National Defense Program Outline to improve the quality of the armed forces and more clearly define their strictly defensive role. For this program to gain acceptance, Sakata had to agree to a ceiling on military expenditures of 1 percent of the gross national product and a prohibition on exporting weapons and military technology. The outline was adopted by the cabinet and, according to public opinion polls, was approved by approximately 60 percent of the people. Throughout the remainder of the 1970s and into the 1980s, the quality of the SDF improved and public approval of the improved forces went up.
In November 1982, when the Defense Agency's former director general, Nakasone Yasuhiro, became prime minister, he was under strong pressure from the United States and other Western nations to move toward a more assertive defense policy in line with Japan's status as a major world economic and political power. Strong antimilitarist sentiment remained in Japanese public opinion, however, especially in the opposition parties. Nakasone chose a compromise solution, gradually building up the SDF and steadily increasing defense spending while guarding against being drawn beyond self-defense into collective security. In 1985 he developed the Mid-Term Defense Estimate. Although that program had general public backing, its goals could not be met while retaining the ceiling of 1 percent of GNP on military spending, which still had strong public support. At first the government tried to get around the problem by deferring payment, budgeting only the initial costs of major military hardware. But by late 1986, it had become obvious that the 1 percent ceiling had to be superseded. Thus, on January 24, 1987, in an extraordinary night meeting, the cabinet abandoned this ceiling. A March 1987 Asahi Shimbun [Tokyo] poll indicated that this move was made in defiance of public opinion: only 15 percent approved the removal of the ceiling and 61 percent disapproved. But a January 1988 poll conducted by the Office of the Prime Minister reported that 58 percent approved the defense budget of 1.004 percent of GNP for fiscal year 1987.
During 1987 the Japanese government reviewed ways in which it could assist friendly forces in protecting shipping in the Persian Gulf. Several possibilities were seriously considered, including sending minesweepers to the gulf. But, in the end, the government determined that sending any military forces to the gulf would be unacceptable to the Japanese people. Instead, the Japanese government agreed to fund the installation of radio navigation guides for gulf shipping.
Appreciation of the SDF continued to grow in the 1980s, with over half of the respondents in a 1988 survey voicing an interest in the SDF and over 76 percent indicating that they were favorably impressed. Although the majority (63.5 percent) of respondents were aware that the primary purpose of the SDF was maintenance of national security, an even greater number (77 percent) saw disaster relief as the most useful SDF function. The SDF therefore continued to devote much of its time and resources to disaster relief and other civic action. Between 1984 and 1988, at the request of prefectural governors, the SDF assisted in approximately 3,100 disaster relief operations, involving about 138,000 personnel, 16,000 vehicles, 5,300 aircraft, and 120 ships and small craft. In addition, the SDF participated in earthquake disaster prevention operations and disposed of a large quantity of World War II explosive ordnance, especially in Okinawa. The forces also participated in public works projects, cooperated in managing athletic events, took part in annual Antarctic expeditions, and conducted aerial surveys to report on ice conditions for fishermen and on geographic formations for construction projects. Especially sensitive to maintaining harmonious relations with communities close to defense bases, the SDF built new roads, irrigation networks, and schools in those areas. Soundproofing was installed in homes and public buildings near airfields. Despite these measures, local resistance to military installations remained strong in some areas.
On 24 May 1999, the Japanese Diet (parliament) passed, with partial amendments, a set of government-sponsored bills and a Japan-U.S. agreement, designed to ensure effective implementation of the Guidelines for Japan-U.S. Defense Cooperation (the Guidelines legislation for short). The Guidelines legislation consists of the Law Concerning Measures to Ensure the Peace and Security of Japan in Situations in Areas Surrounding Japan (the Law Ensuring Peace and Security in Situations in Areas Surrounding Japan for short), which went into force on 25 August 1999; the Agreement to Amend the Acquisition and Cross- Servicing Agreement, which went into force on 25 September 1999; and the Amendment to Article 100-8 of the Self-Defense Forces Law, which went into force on 28 May 1999. The passage of the Guidelines legislation has put the final touches to the process of building a new framework of cooperation under the Japan-U.S. security arrangements after the end of the Cold War, a process that had been initiated by the Japan-U.S. Joint Declaration on Security of 1996.
With the passage of the Guidelines legislation, it has become possible for Japan to support, under the Japan-U.S. Security Treaty, the activities of the U.S. forces in "situations in areas surrounding Japan that have an important influence on Japan's peace and security" (situations in areas surrounding Japan), situations short of a direct armed attack on Japan. In coming years, a Japan-U.S. bilateral planning and work for building a "bilateral coordination mechanism," which are currently under way, will be carried out. Meanwhile, reactions and fears expressed by East Asian countries regarding the new framework of cooperation from the time the Japan-U.S. Joint Declaration on Security was issued and to the passage of the Guidelines legislation suggest the growing importance of promoting bilateral and multilateral security dialogue and cooperation with these countries.
The Defense Agency, as part of the Office of the Prime Minister, is required by Article 66 of the constitution to be completely subordinate to civilian authority. Its head, the director general, has the rank of minister of state. He is assisted by two vice directors general (vice ministers), one parliamentary and one administrative; the Defense Facilities Administration Agency; and the internal bureaus. The highest figure in the command structure is the prime minister, who is responsible directly to the Diet. In a national emergency, the prime minister is authorized to order the various components of the SDF into action, subject to the consent of the Diet. In times of extreme emergency, that approval might be obtained after the fact.
The internal bureaus, especially the Bureau of Defense Policy, Bureau of Finance, and the Bureau of Equipment, are often headed by officials from other ministries and are the main centers of power and instruments of civilian control in the Defense Agency. The Bureau of Defense Policy is responsible for drafting defense policy and programs, for determining day-to-day operational activities, and for information gathering and analysis in the SDF. The Bureau of Finance is instrumental in developing the Defense Agency budget and in establishing spending priorities for the Defense Agency and the SDF. The Bureau of Equipment, organized into subunits for each of the military services, focuses on equipment procurement. Before any major purchase is recommended to the Diet by the Defense Agency, it has to be reviewed by each of these bureaus.
Below these civilian groups is the uniformed SDF. Its senior officer is the chairman of the Joint Staff Council, a body that included the chiefs of staff of the ground, maritime, and air arms of the Self-Defense Forces. Its principal functions are to advise the director general and to plan and execute joint exercises. The three branches maintain staff offices to manage operations in their branches. Although rank establishs echelons of command within the SDF, all three branches are immediately responsible to the director general and are coequal bodies with the Joint Staff Council and the three staff offices.
This structure precludes the concentration of power of the pre1945 general staffs, but it impedes interservice coordination, and there are few formal exchanges among commanders from various branches. Moreover, some dissatisfaction has been reported by highranking officers who feel they have little power compared with younger civilian officials in the bureaus, who most often have no military experience. To rectify this situation and to increase input by the SDF in policy matters, in the early 1980s the Joint Staff Council was enlarged to establish better lines of communication between the internal bureaus and the three staff offices. A computerized central command and communications system and various tactical command and communications systems were established, linking service and field headquarters with general headquarters at the Defense Agency and with one another.
In the 1980s, efforts were also under way to facilitate a clear and efficient command policy in the event of a crisis. The government stood by the principle that military action was permitted only under civilian control, but in recognition that delay for consultation might prove dangerous, ships of the MSDF began to be armed with live torpedoes, and fighter-interceptors were allowed to carry missiles at all times. Although aircraft had long been allowed to force down intruders without waiting for permission from the prime minister, ships were still required to receive specific orders before interdicting invading vessels. The Defense Agency had recommended drawing up more complete guidelines to clarify what action SDF combat units could take in emergencies.
Cooperation between the SDF and other civilian agencies in contingency planning is limited. No plans exists to ensure the support of civilian aircraft and merchant fleets in times of crisis, even though the SDF transportation capabilities are generally judged inadequate. In 1990 legislation was being studied to provide the SDF with the ability to respond in emergency situations not specifically covered by Article 76 of the Self Defense Forces Law.
SDF training includes instilling a sense of mission. Personnel are provided with the scientific and technical education to operate and maintain modern equipment and with the physical training necessary to accomplish their missions. Modern equipment is gradually replacing obsolescent matÚriel in the SDF. In 1987 the Defense Agency replaced its communications system (which formerly had relied on telephone lines of the Nippon Telegraph and Telephone Corporation) with a microwave network incorporating a three-dimensional transmission system using a communications satellite. Despite efforts to increase stocks, however, supplies of ammunition and maintenance and repair parts in 1990 remained at less than satisfactory levels.
The Defense Agency relocated its main offices on 08 May 2000, leaving the entertainment district of Roppongi for a 247.3 billion yen complex on the fromer site of the Japanese Imperial Army's Imperial Headquarters in Ichigaya, near Shinjuku. At least 7,000 agency personnel with eight organizations were moved from the 40-year-old Minato-ku facility to the traditional Shinjuku-ku home of the military. The 23-hectare site is home to a daytime work force of 8,500. The new complex has five wings.
- A-Wing is the home of the military's central nervous system, hosting the Joint Staff Council and the Staff Offices for each of the three branches of the Self-Defense Forces (SDF) - Ground, Maritime and Air. The wing has 23 floors, 19 of which are above ground. The four basement floors house the central coordination center. Atop the wing are two heliports where large helicopters can land.
- B-Wing hosts the SDF's communications corps and contains a massive, 220-meter-high communications tower.
- C-Wing is home to intelligence divisions. The two buildings each have eight floors and four basements.
- D-Wing houses the Defense Facilities Administration Agency and the Defense Agency's Central Procurement Office.
The Defense Agency had used the Roppongi complex as its headquarters since 1960, when the US military transferred buildings it constructed on the site to Japan. With the agency's departure, control of the Roppongi site reverted to the Ministry of Finance.
The new building of Defense Agency were completed at the old military academy's site on top of Ichigaya Hill (the site where Mishima Yukio committed suicide in 1971). The Military Academy of the Japanese Imperial Army located on Ichigaya Heights trained many cadets for about 60 years from the first year of the Meiji Era. Following the start of war between Japan and the United States, the Ministry of War, the General Staff Headquarters, the Department of Military Education, and the army's Central Government Agency all moved from Miyakezaka to Ichigayadai. The "Tokyo trial" was held at this site to prosecute major war criminals. A limited part of old military academy building is preserved as a building for archives. A historical hall where the international war criminal trials in Far East were held after the war was restored in the building.
|Join the GlobalSecurity.org mailing list| | <urn:uuid:689ad998-8e03-4c8f-960d-33a7aaa3f327> | CC-MAIN-2023-14 | https://www.globalsecurity.org/military/world/japan/jda.htm | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949097.61/warc/CC-MAIN-20230330035241-20230330065241-00129.warc.gz | en | 0.960937 | 4,659 | 2.796875 | 3 |
20 STATES WITH THE MOST NATIVE AMERICANS
California — 739,964
Oklahoma — 415,371
Arizona — 366,954
New Mexico — 215,605
New York — 194,714
Washington — 188,071
Michigan — 128,335
Alaska — 126,999
Oregon — 104,143
Colorado — 102,451
Minnesota — 95,130
Wisconsin — 82,335
South Dakota — 76,205
Montana — 74,399
Nevada — 60,283
Utah — 53,679
Massachusetts — 45,653
North Dakota — 40,740
Idaho — 36,464
Wyoming — 18,692
Source: Census Bureau
WASHINGTON — For many uninsured Americans, the motivation for checking out the health insurance exchanges is simple — they could face stiff penalties if they don't sign up. For Native Americans, the decision is more complicated.
Long-standing treaties with the federal government guarantee all Native Americans free health care. As a result, the Affordable Care Act exempts them from paying a penalty if they choose not to purchase insurance. More than 2 million Native Americans receive free health care at federally supported Indian health facilities. Many others receive care from tribal facilities and urban Indian organizations.
So why would an American Indian or Alaska Native sign up for reduced-rate insurance on the exchanges?
Indian health advocates said the benefits are many. "It's an unprecedented opportunity," said Roxane Spruce Bly, who is working with New Mexico's health insurance exchange to provide outreach to Native Americans. "It's the biggest thing to happen in Indian health in my lifetime. It solves so many problems for Indian people."
Although tribal members are entitled to free health care, most Indian health facilities do not offer a full array of services. When patients need major surgery or cancer treatments, for example, they are referred to specialists outside of Indian lands. At least two-thirds of those referral claims are rejected, Bly said. That puts Indians at risk of either paying major medical bills themselves or doing without needed treatments. In addition, about half of Native Americans live in urban areas that are great distances from tribal health facilities.
As a group, the nation's 5.2 million Native Americans have poorer health and less access to health care than the rest of the U.S. population. Their uninsured rate is nearly 30 percent, compared with 15 percent for the country as a whole. And nearly half of all Indians have incomes low enough to qualify for Medicaid in states that have chosen to expand coverage, according to the Center on Budget and Policy Priorities. More than 1 million Native Americans are already enrolled in Medicaid.
Still, Bly and others said the idea of purchasing health insurance, even if deeply discounted, is a foreign concept for most tribal members. Even optimistic advocates for Indian enrollment in the exchanges said convincing tribal leaders and individuals to sign up could take years. Bly's goal is to sign up 10 percent of New Mexico's eligible Native Americans by the end of 2014.
The ACA includes provisions for American Indians and Native Alaskans that make purchasing insurance on the exchange an even better proposition than it is for everyone else. They can sign up at any time -- there are no open enrollment deadlines. Tribal members with incomes below 300 percent of the federal poverty level ($34,470 for an individual) are exempt from paying deductibles and copays, so they can purchase the cheapest plans without worrying about out-of-pocket expenses. All tribal members, no matter what income level, are exempt from out-of-pocket payments if they receive services from Indian health facilities. And unlike employers, tribes can pay exchange premiums for their members without paying taxes.
In addition, a separate law that has governed Native American health care for decades -- the Indian Health Care Improvement Act -- was amended when the ACA was signed. New provisions make it easier for Indian health facilities to accept payments from other insurers, including Medicaid, Medicare and private insurance. The new law also expands the types of services the facilities can offer and requires inclusion of behavioral health and substance abuse treatments.
For Indians enrolled in Medicaid, Indian health providers receive a fee-for-service that is much higher than other providers receive. In addition, they can collect fees from private insurers if Native Americans take advantage of the exchanges.
The new income sources are expected to help Indian health facilities expand and improve their services. Some, for example, do not now include dentistry or deliver babies. Few offer preventive services. According to a 2011 Centers for Medicare and Medicaid (CMS) report, the Indian Health Service budget -- $4.2 billion in 2010 -- "is only sufficient to provide about half the necessary health services required."
Ed Fox, a member of a tribal advisory group to the CMS, estimates the ACA could result in as much as $4 billion in additional revenue for Indian health services. But that's only if tribal leaders take advantage of it, he said.
In states that expand Medicaid in January, enrolling newly eligible Native Americans will be less of a challenge than selling the exchange concept. But it will still take substantial state and federal outreach and education, an effort that is required by the ACA.
According to a report from the Government Accountability Office, Native American enrollment in Medicaid could double under the expansion.
But the GAO said the CMS and the Indian Health Service are not doing enough to spread the word about health insurance exchanges and new Medicaid coverage. States are also responsible for getting the word out.
Montana and California have received a federal Medicaid waiver to directly reimburse tribal leaders for Medicaid expansion outreach efforts. Alaska and Washington have pending waiver requests, and three other states are interested, according to the GAO report.
In general, the federal government will pay 100 percent of all costs for newly eligible Medicaid enrollees for the first three years. After that the federal share tapers to 90 percent. Traditionally, however, the federal government has paid 100 percent of all Medicaid costs for Native Americans.
"The most important thing for state administrators," said Carolyn Ingram of the Center for Health Care Strategies, "is to talk to tribes early and often." She and others agree that most individual Native Americans are not likely to take full advantage of the health law without the support of their tribal elders. | <urn:uuid:6f7cca0f-ce40-414a-a9b6-91448238e699> | CC-MAIN-2014-35 | http://www.columbian.com/news/2013/oct/15/health-care-law-a-hard-sell-among-native-americans/ | s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500821289.49/warc/CC-MAIN-20140820021341-00141-ip-10-180-136-8.ec2.internal.warc.gz | en | 0.947181 | 1,287 | 2.890625 | 3 |
Read more: "The search for dark energy"
WE WILL be lonely in the late days of the cosmos. Its glittering vastness will slowly fade as countless galaxies retreat beyond the horizon of our vision. Tens of billions of years from now, only a dense huddle of nearby galaxies will be left, gazing out into otherwise blank space.
That gloomy future comes about because space is expanding ever faster, allowing far-off regions to slip across the boundary from which light has time to reach us. We call the author of these woes dark energy, but we are no nearer to discovering its identity. Might the culprit be a repulsive force that emerges from the energy of empty space, or perhaps a modification of gravity at the largest scales? Each option has its charms, but also profound problems.
But what if that mysterious force making off with the ...
To continue reading this article, subscribe to receive access to all of newscientist.com, including 20 years of archive content. | <urn:uuid:f7ff47b5-0419-47be-8199-a97bd107a930> | CC-MAIN-2014-35 | http://www.newscientist.com/article/mg21428671.800-dark-matter-dark-energy-dark-magnetism.html | s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500830746.39/warc/CC-MAIN-20140820021350-00093-ip-10-180-136-8.ec2.internal.warc.gz | en | 0.934064 | 199 | 2.578125 | 3 |
Ever wonder what sea turtles do when a hurricane approaches them in the open ocean? The short answer is that they do the same thing we do: head for cover!
In 2011, 18 loggerhead turtles that had been released with tracking devices found themselves in the path of Hurricane Irene. All but three of the turtles moved northward in the open ocean currents to escape the storm. Those that stayed began diving for longer than usual periods of time, sometimes holding their breath for over an hour. Once the storm had passed, the altered behavior lingered. Turtles that had begun to dive for longer periods of time continued to do so for another two weeks. About half of the turtles that had “evacuated” northward returned south to the foraging ground they had just left behind and then immediately continued their southward journey well ahead of when their seasonal migratory patterns would have dictated. We tend to think of these storms mainly having impacts once they reach land, but it’s clear that ocean-bound wildlife feel the impacts as well!
To learn more about what turtles do during hurricanes, click here.
While there were no new nests or wild nests discovered this week, our beach remains busy with nests hatching daily! To date, 49 of our 74 nests have hatched out and inventories have been completed, including both of our “wild nests” – nests 73 and 74. There are still lots of nests out there, so remember to watch your step and refrain from using white lights if you are on the beach at night!
To view this week’s inventory results, click here.
For more information about Seabrook Island Turtle Patrol, go to siturtlepatrol.com
-Submitted by Joshua Shilko | <urn:uuid:c2d180a0-a98a-4b5f-b54d-8abe3564b28e> | CC-MAIN-2023-40 | https://tidelinesblog.com/2021/08/24/turtle-patrol-report-for-the-week-ending-august-22/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511351.18/warc/CC-MAIN-20231004020329-20231004050329-00844.warc.gz | en | 0.971947 | 358 | 3.46875 | 3 |
Better Students Ask More Questions.
How does M. Butterfly reflect the dynamics of Western imperialism in Asia?
1 Answer | add yours
David Henry Hwang's play, M. Butterfly is based on the true story of a French diplomat who carried out a 20-year affair with a Chinese opera singer, whom he later discovers to be a man. The play itself explores the stereotypes and relations between Eastern and Western culture, sexism, imperialism, and racism.
To answer your question more succinctly, Western imperialism is rife in several portions of Hwang's play. Example #1: Gallimard, who is a diplomat, insists that "The Orientals simply want to be associated with whoever shows the most strength and power.’’ He passes this belief on to American diplomats and is later excused from his post for his poor judgment. Example #2: Gallimard complains that the Chinese are arrogant, a concept he insists is common among people in Paris. Example #3: The French ambassador Toulon clearly states that he lives in China, but not with the Chinese--a thought that seems to repulse him.
These examples are just a few to illustrate the West's negative misconception of Asian culture. It is these images of a passive, demure culture that has lead the West into conflicts like the Vietnam War. Hwang's play touches on the irony of this ethnocentrism; the Western world possessed powerful weapons and technology, but this did not result in their victory over the Vietnamese. Also important, Hwang points out that the problem is not solely the West's condescending attitude toward the East, but that both sides are, as he puts it, "equally guilty" in perpetuating an imperialistic attitude of West over East.
Posted by peaceveg on May 24, 2011 at 5:09 AM (Answer #1)
Related QuestionsSee all »
Join to answer this question
Join a community of thousands of dedicated teachers and students. | <urn:uuid:7b124ec8-adb6-4141-bac4-d7637508d0fa> | CC-MAIN-2014-10 | http://www.enotes.com/homework-help/how-does-m-butterfly-reflect-dynamics-western-259682 | s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394010628283/warc/CC-MAIN-20140305091028-00094-ip-10-183-142-35.ec2.internal.warc.gz | en | 0.956578 | 403 | 2.828125 | 3 |
“They say their model explains the power and energy he had to expend to overcome drag caused by air resistance, made stronger by his frame of 6ft 5in.
Writing in the European Journal of Physics, the team hope to discover what makes extraordinary athletes so fast.”
It would be really interesting to see models of top athletes in other sports. No doubt there would be a lot of learning for us all to enjoy and benefit from.
One thing I do not like about the article is the following section where the scientist talks about “improving” with a faster tail wind (all else being equal). Of course, he might run faster as a result but he is most certainly not improving as an athlete.
“Bolt’s Berlin record was won with a tail wind of only 0.9m per second, which didn’t give him “the advantage of helpful wind assistance”, he added.
“You’re allowed to have a wind no greater than 2m per second to count for record purposes, so without becoming any faster he has huge scope to improve,” Prof Barrow told BBC News.” | <urn:uuid:3404343d-1939-4308-a801-8706e58669f7> | CC-MAIN-2020-29 | https://holistictriathlete.wordpress.com/tag/aerodynamics/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657143365.88/warc/CC-MAIN-20200713100145-20200713130145-00103.warc.gz | en | 0.975667 | 242 | 2.578125 | 3 |
As concerned as we are about economic justice, the American Jewish community has failed to understand, on a gut level, a glaring reality: adults with disabilities in the U.S. disproportionately experience poverty. According the census bureau, about one in five Americans has a disability. That means twenty percent of us.
Eighty percent of adults with disabilities are unemployed or under employed not because they cannot work, but because they are denied the opportunity to work at jobs they are qualified to do. Employment discrimination makes people poor!
With unemployment rates consistently double that of the general population, people with disabilities experience poverty rates at twice the national average as well. In the wealthiest nation in the world, this is not only morally intolerable, but also economically inexcusable.
We Jews must understand and admit that we, too, discriminate by not demanding that Jews with disabilities have equal access not only to our front doors, but to all things Jewish, including jobs. Synagogues rightly worry about access to the bima, but what about jobs on the bima or jobs in Jewish organizations, agencies, schools or camps?
It would be very hard for our communities to discriminate if the jobs seekers presented outstanding Jewish resumes. But the only way that Jews with disabilities can build such resumes is by being offered a great Jewish education, beginning at an early age and continuing through Jewish schools of higher learning.
Where are our twenty percent? They are not in our classrooms. Synagogue religious schools that offer classes or programs for students with special needs are few and far between. Almost nonexistent are synagogue religious schools that ask for IEPs (Individualized Education Programs, the document that ensures that a person with a disability receives the necessasry programs and services) on their religious school intake forms. Jewish day schools are often perceived as excluding children who must be accommodated in order to learn and too often, that perception is justified.
In Mishnah Torah, [Hilchot Talmud Torah, 10] Maimonides taught: “Every member of the People of Israel is obligated to study Torah – regardless of whether one is rich or poor, physically able or with a physical disability.” That was 900 years ago! Why has it taken us so long to heed his teachings?
Promoting inclusion of those with all kinds of disabilities in Jewish studies educates and benefits all those in the classroom. Inclusion teaches us from an early age to see past the disability and acknowledge the Jewish soul first.
Furthermore, the Jewish community must realize that Jews with disabilities are a minority within a minority. In the public sphere, some employers recruit minority applicants. It should be so in the Jewish world as well. We have to not only educate and train Jews with disabilities, but also recruit them for Jewish jobs.
It is especially imperative that we help alleviate such poverty by looking beyond religious job openings. We must educate all members of our community and urge all businesses, employers and CEOs to seek qualified Americans with disabilities as job applicants to fill open positions.
In 2013, this is a mandate for all religious communities that seek to alleviate poverty.
Rabbi Lynne Landsberg is the Religious Action Center of Reform Judaism’s senior adviser on disability issues, co-chair of the Jewish Disability Network and co-chair of the Committee on Disability Awareness and Inclusion of the Central Conference of American Rabbis. | <urn:uuid:f9b144b1-dff9-4fd8-b5dd-653430540f0f> | CC-MAIN-2020-05 | https://jewishweek.timesofisrael.com/maimonides-preached-inclusion-but-we-still-dont-seem-to-get-it/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250603761.28/warc/CC-MAIN-20200121103642-20200121132642-00052.warc.gz | en | 0.968036 | 682 | 2.828125 | 3 |
Portuguese parliament has approved Friday a bill that will allow same-sex married couples to adopt their partner’s bilological or adopted children. The bill was approved with 99 votes in favor, 94 votes against, and 9 abstentions.
The bill was supported by the ruling center-right Social Democratic Party (PSD) and the progressive Socialist Party (PS). A co-proposal to allow same-sex married couples to adopt children together was defeated.
The Portuguese parliament had approved the right to same-sex marriages in 2010, but without adoption rights. The law allowed gay couples the same rights as married heterosexual couples, including taxes, inheritance and housing, but didn’t offer the right to adopt children.
Portugal is among the first 10 counties in the world to allow same-sex marriage. As recently as 1982, homosexuality was a crime in Portugal.
Today, Portugal has wide-ranging anti-discrimination laws and is one of the few countries in the world to contain a ban on discrimination based on sexual orientation in its Constitution.
The first same-sex marriages in the world took place in the Netherlands on April 1, 2001. The countries that followed were Belgium, Spain, Canada, South Africa, Norway, Sweden, Portugal, Iceland, Argentina and Brazil.
Countries where gay adoption is legal include Guam, Andorra, Belgium, Iceland, the Netherlands, Norway, Sweden, South Africa, Spain, the United Kingdom. It is also legal in some parts of Australia, Canada, and the United States.
LGBT Rights in Portugal >> Wikipedia >> | <urn:uuid:ac0bcd69-215c-4928-afc3-d46a3146bc01> | CC-MAIN-2017-30 | http://portuguese-american-journal.com/lgbt-portuguese-parliament-approves-right-to-adoption-portugal/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423808.34/warc/CC-MAIN-20170721182450-20170721202450-00431.warc.gz | en | 0.965432 | 322 | 2.71875 | 3 |
The site of a former 1950’s gasoline filling station in Wanamaker, Indiana has received the State of Indiana’s Covenant Not to Sue after completing voluntary site remediation and documentation of site activities.
Around 1959, the Sinclair gas station closed for business, taking the underground storage tanks out of service at the site (i.e., the fuel was removed and the USTs were filled with water) according to standards of the time. However, upon their removal in recent years, an analysis of soil and groundwater determined small amounts of petroleum hydrocarbons, consisting primarily of gasoline, had leaked from the tanks into the immediate surrounding area.
Mundell was contacted by landowners in to perform further analysis of areas outside the tank area to identify any potential impacts to human health and the environment. After undertaking drilling, sampling, chemical analysis of the soil and groundwater, plus additional geophysical investigations of metal detection and an electromagnetic conductivity survey, Mundell identified the contamination had spread outside the initial tank pit and delineated the boundaries of the groundwater plume. No critical threats to the environment were apparent and, over the next several years, monitoring and plume stability analysis concluded the plume was stable, may be shrinking in size, and would remain within the confines of the boundaries, attenuating naturally through time.
Based on the data that indicated the impacts were limited to the area (the contaminants are not mobile), the dissolved hydrocarbon plume is stable or shrinking in size, and the site is not within a geologically susceptible area, wellhead protection area or near private drinking wells, Mundell recommended site closure under the conditions that the site can only be used for non-residential purposes in the future.
On December 15, 2017 the Commissioner of the Indiana Department of Environmental Management approved the site closure by issuing a Certificate of Completion of the Voluntary Remediation program and on February 2, 2018 Governor Eric Holcomb signed the Covenant Not to Sue, protecting future landowners and allowing industrial development on the site to proceed.
What is a Covenant Not to Sue?
When the State of Indiana issues a Covenant Not to Sue for a project completed via the Voluntary Remediation Program, the holder of the certificate (a current or future landowner) is protected against any public or private claims in connection with the hazardous substance as detailed in each specific project. | <urn:uuid:4d4a6279-ce69-4257-8fdd-527e3210b626> | CC-MAIN-2020-29 | https://mundellassociates.com/company-news/governor-holcomb-signs-covenant-not-to-sue-former-gas-station-wanamaker/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655878639.9/warc/CC-MAIN-20200702080623-20200702110623-00503.warc.gz | en | 0.956078 | 478 | 2.609375 | 3 |
Bloomeries of the Scottish Highlands
The National Monuments Record for Scotland notes the existence of more than 150 sites of Medieval and post Medieval bloomery mounds. These are small conical mounds or horseshoe shaped mounds of slag associated with bloomery furnaces geographically situated in the Highlands of Scotland. Dated by pottery assemblages and radiocarbon dates between the 13th and 17th century they reflect an industry rich in natural resources (ore and fuel) but also self -reliant, serving a culture proud in its cohesiveness and self reliance.
SASAA has carried out technical analyses of the metallurgical waste from a number of sites excavated in association with GUARD, the archaeological field unit of Glasgow University and as part of a study funded by Historic Scotland (1996-1998).
Excavations at Tamveich Burn, Argyllshire showed that bloomery iron was produced in low shaft furnaces. These furnaces were of the non-tapping type. Excavations at Allt na Caerdach (the burn of the smith), Loch Eck, Argyllshire revealed another type of furnace, rather rare, but nevertheless known, namely the bloomery hearth. given the shallowness of the hearth, it was inevitably being tapped in the course of smelting. The slags showed a high manganese oxide content.
Tamveich Burn excavations (left: SASAA images).
Furnace plan (right: Atkinson and Photos-Jones (1996). The Scottish Bloomeries Project - Interim Report. GUARD 268.2/SASAA 3.6 Internal Report).
While Tamveich Burn, reflects the operations of the "farmer-smith" returning to the locations where he knew he would find his ore and making enough iron to suit his needs, Allt na Caerdach reflects the combined activities of a number of smiths, perhaps hereditary clan smiths working for particular clans. The scale of the manufactories would be expected to be greater as indeed the quantity and quality of their products. No settlements were found in the immediate vicinity of either of these sites (see Photos-Jones et al. 1998; Atkinson and Photos-Jones 1999).
Allt na Caerdach: left: site, right: furnace (SASAA images).
Analyses revealed that the Highland smith relied on sources of iron ore that were renewable, like the iron oxyhydroxides associated with (red) springs-in Highland folklore some red springs (meinn) were renowned for their healing properties. Bog iron ore, also iron oxyhydroxides, rich in manganese and phosphorous, was also utilised. Barium sulphate is another mineral which can be used to fingerprint these ores. The same fingerprinting elements that are seen in slags can also be sought in the slag inclusions trapped within iron artefacts, in this case traditional weapons like the two handed broad sword or claymore. This technique is able to effectively fingerprint artefacts of Scottish origin. The extraction and use of bog and red spring ores reflects not only technological but also cultural practices. Bog ore of one type or another seems to be the predominant source of iron in the Highlands (see Hall and Photos-Jones 1998) as opposed to a much broader range of sources used in the Lowlands.
Contrary to what is often assumed to be the case, self reliance in iron, be it knives or agricultural tools, was the norm rather than the exception throughout much of Scotlland's history. It is almost certain that the farmer doubled up as a smith when the necessity arose, although some farmers may have been more skilled in iron making/smithing than others. Given that the making of the raw material was most likely a skill that many were trained to do -with some being better than others - it is almost certain that the iron making/smithing divide did not exist for most of Scotland's iron making history. (see Photos-Jones 2000). It was not only the Highland smiths who were apparently self sufficient in their own resources, the iron smiths of medieval burghs like Perth appear to have been able to provide themselves with the raw material, thus "bringing down" the divide between town and country. This seems to have been true for access to bog ores (see Photos-Jones and Atkinson 2000).
SEM-BS image of a slag inclusion in an iron bloom from a 13th century context in Rothesay Castle, Isle of Bute.
Dendrites of wustite are shown in a matrix of iron silicate. Metal is ferritic.
Some castle smithies produced their own raw materials.
Scotlandís earliest dated (2nd - 1st centuries BC) furnace was recently excavated by Glasgow University Archaeological Research Division (GUARD) at Tarras farm, in Forres, near Inverness. A box-like furnace (figure below) of the Catalan type appears to have had the air supply directed from above. The slag was viscous and could not have been tapped; it appears highly unlikely that the furnace would have been manipulated. Bloomery furnaces and their associated slag heaps, the bloomery mounds, are a common feature in the rural settlements of the Scottish Highlands, the implications being that, like with all other necessities, iron had to be produced locally. No metal was found associated with the Forres furnace (SASAA Report 40, 1998).
The Forres bloomery furnace ( Will (1998) Tarras by Forres, GUARD 567 Internal Report). | <urn:uuid:9269c9bf-f0e9-47d4-b5dc-acef9f17c00e> | CC-MAIN-2017-30 | http://sasaa.co.uk/case%20studies%205.htm | s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549426234.82/warc/CC-MAIN-20170726162158-20170726182158-00426.warc.gz | en | 0.960048 | 1,153 | 3.484375 | 3 |
"Once there were two towers side by side." This is the first sentence of the nonfiction picture book The Man Who Walked Between the Towers by Mordicai Gerstein. I believe the first sentence of a book sets the theme for the entire story and this sentence does not disappoint. The towers stood side by side in strength and dignity. But in memory, there are still there. In this book, Gerstein tells the brave true story of Philippe Petit while paying a respectful tribute to 9/11.
The cover of this text is an immediate draw-in for children and adults alike. What a thrilling scene we have been thrown into without even reading! This book is sure to promise adventure and suspense. The story begins explaining the setting: the infamous New York City. It is then that we are introduced to our main character, a then nameless man, who is a unicycle street performer. However, his favorite performance act is walking and dancing on a rope he tied between trees. While describing this man’s love for this job, the illustrations are brightly colored, lots of blue skies, and framed with a thin black border. Then, the man notices the twin towers and decides he wants to walk on rope in the space between the towers. The illustration’s point of view is from behind the man as he stares at these two, enormous buildings. But from where the reader is looking, the man looks almost as big and mighty as the buildings. Perhaps this was Gerstein’s way of exhibiting this tightrope walker’s bravery and confidence in his dreams and in himself. The man has a flashback (shown by a squiggly border) to when he danced on a wire in Paris and the authorities thought he was crazy. On to bigger and better adventures!
It is not until we are introduced to the conflict of the story (that this man wants to tightrope between the twin towers but is afraid they won’t let him), that we learn his name. Philippe. Perhaps not giving the character’s name right away was Gerstein’s way of giving the reader a non-biased first perspective of his story. He gave the reader a chance to pretend they were in Philippe’s shoes. What would you do?
The story continues as Philippe and his friends set up his wire across the two towers during the night but not without some difficulty. The artwork on these pages is dark shades of blue and purple. These colors illicit a peaceful and tranquil mood for Philippe which would have been a nerve wracking time for anyone else! They finish setting up the wire just as the sun is beginning to rise and the people below begin their day with this astonishing fleet. “He was not afraid. He felt alone and happy and absolutely free,” Gerstein wrote as birds flew fearlessly around him. There are two fold out pages at this time; one to show the vast distance of which Philippe was dominating and one to show the enormity of the towers. The effect of these two over-sized pages does not go unnoticed as the reader comprehends how difficult and amazing of a task this was. It was humorous to watch Philippe taunt the policeman as he enjoyed himself on the rope. But just when the reader starts to realize he HAS to come down some time, it begins to rain (similar to the disappointment we feel), and Philippe gives himself up. Despite being arrested and going to court, Philippe still holds a smile. He continues to hold his positive attitude as he later performed in the park for the children of the city.
The end of the story caught my attention. I wondered how and if Gerstein would address 9/11. He did so tastefully and positively. “Now the towers are gone,” is matched with a NYC skyline without the towers. The sky is blue and the birds are singing. It is difficult to tell whether the white masses are clouds or smoke; I think it could be purposefully be either depending on your perspective. Do you choose to be negative or positive? Then, on the last page the illustration shows the skyline again but this time with an outline of the twin towers and Philippe walking across. “But in memory, as if imprinted on the sky, the towers are still there.” Instead of focusing on the negativity and evil that surrounded 9/11, Gerstein decided to end the book with a positive memory that NYC shared with the twin towers and Philippe Petit. | <urn:uuid:a0e0ebee-f42a-41f5-8891-7ef46ed3dbf7> | CC-MAIN-2017-30 | http://alissamccormick.blogspot.com/2014/01/the-man-who-walked-between-towers.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424909.50/warc/CC-MAIN-20170724182233-20170724202233-00541.warc.gz | en | 0.975759 | 912 | 2.84375 | 3 |
Today’s post was written by Nathanial Patch, Subject Matter Expert for Navy Records and Reference Archivist at the National Archives in College Park.
From Carrier to the Thick of the Fight
On a cold and bleak day in December 1950 off the coast of the Korean Peninsula, the USS Leyte (CV 32) turned into the wind and prepared to launch the afternoon flight for close air support. On deck and ready for take-off were six World War II era F4U-4 Vought Corsairs from Fighter Squadron 32 (VF 32). The Navy Blue planes with their massive Pratt & Whitney R-2800-18W radial engines roared with life, taxing into a queue and unfolding their sleek gull wings, readying for take-off. Each plane was armed with six .50 caliber machine guns, six 5-inch High Velocity Aircraft Rockets (HVARs) and one Napalm bomb. Their mission was to attack the North Korean and Communist Chinese forces in order to delay their pursuit of the US Marines evacuating to Hungnam.
At 1:20 pm, the flight crew on deck signaled for the first plane to throttle up and start its way down the runway. Building up speed, the Corsair transitioned from the force of gravity to the lift aerodynamics, flying aloft when the flight deck ran out and soaring above the blue-gray ocean. As the first plane reached altitude, the other awaiting planes took off from the carrier, then grouped up before heading towards that day’s target.
The almost daily reconnaissance and close air support missions in the Chosin area were becoming routine for the US Navy and Task Force 77. VF 32 was a unique squadron because one of its section leaders was Ensign Jesse L. Brown, USNR of Hattiesburg, MS, the first African American naval aviator.
Ens. Jesse Leroy Brown – Biography
Jesse Leroy Brown was born in Hattiesburg, Mississippi on October 13, 1926. His mother, Julia, was a schoolteacher and his father, John, was a grocery warehouse worker, who later became a sharecropper in Lux, MS following the Great Depression. Jesse was one of six children, all of whom attended a single room schoolhouse in the deeply segregated South. His parents taught their children that their education and adherence to hard work were the keys to escaping their impoverished situation and making changes for the future.
In among schoolwork and preparing for a prejudiced world, John Brown incidentally laid a seed of hope in his son by taking him to an air show at the age of six. Jesse dreamed of flying from that point forward. His lofty dreams of flight caused him to frequent a nearby airfield, much to the chagrin of the mechanics there, who routinely shooed him away.
Nonetheless, Jesse embraced his parent’s wisdom and began working at an early age to prepare for his future. He started off as a paperboy delivering the Pittsburgh Courier, an African American paper. In the newspaper, he read about Black pilots and aviators, which continued to fuel his ambitions. He was an avid reader and read aviation magazines including Chicago Defender, later stating that the Chicago Defender helped influence him to become a naval aviator.
While attending Eureka High School, a segregated school in Hattiesburg, Jesse was not only a good student, but also participated in basketball, football and track and field. After graduating high school in 1944, Jesse wanted to go to college. His principal encouraged him to attend an all-black college, but Jesse instead followed in the footsteps of Jesse Owens, the African-American Olympic runner of the 1936 Olympics by attending Ohio State University.
At Ohio State, Jesse majored in Architectural Engineering and joined the track and field team. He lived in a segregated part of town at a boarding house. He later had to abandon playing sports because of financial difficulties. He got a number of small jobs to make ends meet including loading box cars for the Pennsylvania Railroad and being a janitor at a nearby department store. He had good grades despite his workload and side jobs, but his dream to become a pilot proved difficult.
During his first year at Ohio State, Jesse repeatedly applied to the school’s aviation program, but was turned down due to his ethnicity. With racism and financial problems, his dreams of flying seemed stymied. But during his second year, events took an unexpected turn for the better. He learned of the US Navy’s V-5 Aviation Cadet Training Program. His decision to attend Ohio State was fortuitous, as this naval program was only offered in 52 universities, none of which were historically black colleges and universities. He applied to the program and after passing the entrance exams and pushing past the resistance of naval recruiters, he was admitted to the program.
On July 8, 1946, Jesse L. Brown enlisted in the US Navy, becoming Seaman Apprentice Brown and a member of the Naval Reserve Officer Training Corps (NROTC). With his new Navy pay, Jesse could leave his other jobs and focus on flying and school. Jesse graduated from Ohio State in 1947 as one of 14 other African-Americans out of the more than 5,600 NROTC candidates that year.
In March 1947, Jesse started flight school as the only African-American in the program. In April, he achieved the rank of midshipman, the more traditional rank for an officer in training. During training and throughout his naval career Jesse Brown often faced resentment from many corners, both for being black among the white aviators, as well as being a cadet and later an officer among the black cooks, stewards, and janitors.
Midshipman Brown became Ensign Brown in April 1949 after completing basic and advanced flight training and passing carrier landing qualifications. After earning his Naval Aviator Badge, his accomplishment became widely publicized in a feature article by the Associated Press, and his photograph published in Life Magazine. Jesse felt that he had breached the “color barrier” in naval aviation, clearing the way for other African-Americans to follow in his path.
Before he was commissioned in April, Midshipman Brown was assigned to Fighter Squadron 32 (VF 32) and assigned to the USS Leyte (CV 32). From this point until August 1950, the USS Leyte, VF 32, and the other squadrons performed training missions along the East Coast and in the Mediterranean. During these training missions, Ens. Brown developed the prestige of a highly capable pilot, earning the position of an effective section leader within the squadron.
Ens. Brown and the rest of VF 32 had entered the Korean Theater on October 12, 1950 aboard the USS Leyte, one of several aircraft carriers bringing close air support to ground forces and attacking Communist strategic and logistical targets deep behind enemy lines.
The Leyte arrived after the Marine landings at Inchon and the Pusan Breakout, which routed the North Korean invaders north past the 38th Parallel. The Leyte arrived in time for the crossing of the border into North Korea by the United Nations Forces led by General Douglas MacArthur, who were in pursuit of the North Korean forces in order to unite the Korean Peninsula. The North Korean retreat went up against and past the Yalu River that borders Manchuria, China. The war seemed to be all but won by mid-October. The UN Forces moving into North Korea tipped the balance and threatened the People’s Republic of China. Beginning as early as October 19, 1950, elements of the People’s Volunteer Army (PVA), so named not to be confused with the People’s Liberation Army (PLA), China’s regular army, crossed the Yalu River to attack South Korean forces. News of this intervention was not well received or believed by American forces until November 1, 1950 when the first of the Chinese forces engaged US Army 8th Cavalry Regiment at Unsan.
With the entrance of the Chinese volunteers, the tide of war had turned. Throughout November 1950, the US Army 8th Army’s X Corps, the 1st Marine Division, and other UN military were forced to defend themselves as they made their way to port cities and into awaiting amphibious ships to redeploy them to South Korea. The 1st Marine Division and British Marines made their way to Hungnam. On December 1, 1950, Far East Air Forces released all tactical air support to the 1st Marine Air Wing, which also brought in the naval aviators of Task Force 77 to cover the UN Forces departure from Chosin. The US Marine Corps had perfected Close Air Support of ground troops since the First World War during the early days of Marine aviation. The Navy also excelled at Close Air Support and utilizing squadrons of the carriers of Task Force 77, including the USS Leyte, with which they could keep the Communists busy as the Marines went to meet the ships at Hungnam.
The flight of six Corsairs who had taken off from the Leyte on that December morning reached an altitude of 5000 feet flying northwest over churning gray waters of the Sea of Japan before crossing the coastline into Korea towards their target area around the Chosin Reservoir.
Around 1430 to 1500, the Corsairs of VF 32 began their mission to strike at oncoming PAV forces and the North Korean Army. They also attacked an undescribed building occupied by enemy forces with Napalm. The Chinese and North Koreans fired on the planes with their rifles and light machine guns because they did not have any specific anti-aircraft weapons.
At 1515, while searching for Marines in trouble west of the Reservoir near Yudam-ni and Hagaru-ri, Ens. Brown’s plane was hit by small arms fire in the engine. A lucky shot severed the main fuel line. Another pilot in the flight, Koenig, noticed that his plane began to leak fuel. Due to the damage, Ens. Brown lost all control of his plane, crashing over two miles northwest of the Chosin Reservoir. In the crash, Ens. Brown’s Corsair broke into two at the cockpit. The wings crumbled and buckled under the strain of the crash, and the nose and engine section caught on fire. Because the plane broke at the cockpit section, Ens. Brown’s right leg was pinned, and he was unable to escape the plane.
From Wreck to Grave
Not long after Ens. Brown’s plane crashed, it was apparent to the other pilots that he was not able to evacuate and that he might have been badly injured. The flight leader called for assistance from a Marine rescue facility in Hagaru-ri, while the other planes circled to stand watch over their fallen friend.
Meanwhile, the situation on the ground was steadily worsening, as the fire of Ens. Brown’s plane continued to burn and Ens. Brown himself remained in the plane. LTJG Thomas Hudner, Ens. Brown’s wingman landed his plane with the wheels up near the crash site. Hudner exited his plane and rushed to Ens. Brown to try to assist him. He found that the fire was not as intense as it appeared, although it proved to be difficult to put out with a fire extinguisher. After the extinguisher failed to work, he piled snow onto the fire, which was successful in extinguishing the flames.
Eventually, the rescue helicopter arrived, and Hudner and LT Charles Ware attempted to pull Ens. Brown from his plane. Time was now against them as the Sun began to sink behind the mountains and into the East China Sea. In spite of their efforts and their desire to free Ens. Brown, who was now going in and out of consciousness, they were unable to free him from the plane. With night fast approaching and the enemy encroaching on their position, LT Ware was forced to pull Hudner away from the wreck and his wingman. The two officers boarded the HO3S helicopter and returned to the Leyte.
Based on the circumstances of the crash and attempted rescue, officials concluded that Ens. Jesse L. Brown likely died from his wounds from the crash, exposure to the elements of a Korean winter, or both. Thomas Hudner wanted to go back to the crash site and recover his wingman’s body. He argued with senior officers of the Leyte and the Carrier Air Group, but because of the decaying situation around the Chosin Reservoir and the enemy’s tightening grip on the area, his requests were denied.
To prevent Ens. Brown’s remains, his aircraft, and Hudner’s aircraft from falling into enemy hands, on December 7, a flight from VF 32 conducted a Napalm run on the site. As the site of the crash was being burned, the Last Rites were said to commit the remains of Ens. Brown to the next life.
Searching the Records
The National Archives in College Park has a few relevant series in which these events are documented. The two most important series are in Record Group 38: Records of the Chief of Naval Operations in War Diaries, 1946-1953 (National Archives Identifier 23857291) with the December 1950 War Diary of the USS Leyte (CV 32).
RG 38 Air Attack and Ship Action Reports, 1950-1953 (National Archives Identifier 4487047) and the aircraft action reports of USS Leyte for December 1950, which includes VF 32 description of the loss of Ens. Brown on December 4, 1950.
Surprisingly, there was not a whole lot of information in the deck log of the USS Leyte regarding the loss of Ens. Brown, other than the weather conditions in the columnar page, when the flight took off, and when the surviving planes returned.
Both Ens. Brown and his wingman earned decorations for their actions during the Korean War and this action. Their citations for awards can be found in Record Group 428: Records of the Department of the Navy in Awards Citation Files, 1941-1970 (National Archives Identifier 599836).
For additional research into the loss of Ens. Jesse L. Brown and to dig deeper into the US Navy’s participation in the Korean War, there are several series in Record Group 313: Records of the Naval Operating Forces that relate to the period and this conflict. The series in RG 313 are first divided into naval “flag” commands. For this topic, there are series for Commander, Naval Forces, Far East and Commander, 7th Fleet.
Aftermath and Legacy
For their actions, Ens. Brown was awarded the Distinguished Flying Cross for fighting the North Korean aggressors from October to December 1950, and LTJG Hudner was awarded the Medal of Honor for putting his life in danger to assist a fellow officer incapacitated from injuries sustained from the crash of his plane.
Though this story may seem like a brief incident among the broader context of the Korean War, it stands out due to Ens. Brown’s historical achievement as the first African-American naval aviator, who’s white wingman put himself in harm’s way to save the life of his colleague despite his ethnicity. Ens. Brown helped pave the way for wider integration of the U.S. Navy by prevailing through its systemic racism, ultimately furthering the fight for greater civil rights for those eager to serve. Because of Hudner’s “exceptionally valiant action and selfless devotion” that “enhance(d) the highest traditions of the United States Naval Service,” naval aviation was, at least for a moment, colorblind.
In honor of Ens. Jesse L. Brown, a newly completed Knox-class Frigate was christened the USS Jesse L. Brown (DE/FF 1089) and placed into commission on February 17, 1973.
In 2015, Adam Makos published Devotion: an epic story of heroism, friendship and sacrifice, which is provides a a broader and deeper background to this event. In 2022, Makos’ book was developed into a major motion picture by Black Label Media entitled Devotion, featuring actor Jonathan Majors as Ens. Jesse L. Brown and actor Glen Powell portraying LTJG Thomas Hudner.
In Ens. Brown’s hometown of Hattiesburg, MS on December 3, 2022, Ens. Brown’s family and the cast and crew of Devotion met at the African-American Military History Museum for a special presentation. After the presentation, the hosts and the attendants went to a special showing of Devotion at the Saenger Theater.
Cagle, Malcom W. and Frank A. Manson. The Sea War in Korea. Annapolis: Naval Institute Press,1957
MacGregor, Morris J. Integration of the Armed Forces, 1940-65. Washington DC: Center of Military History, 2001
Makos, Adam. Devotion: An Epic Story of Heroism, Friendship, and Sacrifice. New York: Ballantine Books, 2015
Marolda, Edward J. The U. S. Navy in the Korean War. Annapolis: Naval Institute Press, 2007
Simmons, Edwin H. Frozen Chosin: U. S. Marines at The Changjin Reservoir. Quantico: US Marine History and Museum Division, 2002.
Taylor, Theodore. The Flight of Jesse Leroy Brown. New York: Avon Books, 1998
Dictionary of American Naval Fighting Ships (DANFS) USS Jesse L. Brown (FF 1089) Naval History and Heritage Command.
December 4, 1950 Deck Log of USS Leyte (CV 32); December 1950 Deck Log of USS Leyte (CV 32); US Navy Deck Logs, 1941-50; Records of the Bureau of Naval Personnel, Record Group 24; National Archives in College Park.
December 4, 1950 Aircraft Action Report (ACA) for Fighter Squadron 32 (VF 32) from the USS Leyte (CV 32); USS Leyte December 1950; Air Attack and Ship Action Reports, 1950 – 1953; Records of the Chief of Naval Operations, Record Group 38; National Archives in College Park. (VF 32 Action Reports)
Theodore Taylor, The Flight of Jesse Leroy Brown (New York: Avon Books, 1998), 26-27
Taylor, 25
Taylor, 30-31
Adam Makos, Devotion: An Epic Story of Heroism, Friendship, and Sacrifice (New York: Ballantine Books, 2015), 36
Taylor, 13
Morris J. MacGregor, Integration of the Armed Forces, 1940-65 (Washington DC: Center of Military History, 2001), 246-247.
Taylor, 13-22
Taylor, 77
Taylor, 176-177
Taylor, 182-188
October 1950 War Diary, USS Leyte (CV 32); 12 Sep. 1950-31 Jan. 1951 War Diaries, USS Leyte (CV 32); Post-1946 War Diaries; Records of the Chief of Naval Operations, Record Group 38; National Archives in College Park (War Diaries)
Edwin H. Simmons, Frozen Chosin: U. S. Marines at The Changjin Reservoir (Quantico: US Marine History and Museum Division, 2002), 6-8.
Simmons, 74.
VF 32Action Report
VF 32 Action Report
VF 32 Action Report
Marolda, page 240
VF 32 Action Report/War Diary
Cagle, Malcom W. and Frank A. Manson, The Sea War in Korea, Naval Institute Press, Annapolis, MD 1957, p. 177; In The U. S. Navy in the Korean War edited by Edward J. Marolda on pages 241-242, the pilot is listed as 1st LT Charlie Ward, USMC
VF 32 Action Report/War Diary
Makos, 360-363
Citation for Ens. Jesse L. Brown’s Distinguished Flying Cross and LT(JG) Thomas J. Hudner’s Congressional Medal of Honor; Board of Decorations and Medals Alphabetical Awards Citation Files, 1920-1970; Records of the Department of the Navy (post-1947), Record Group 428; National Archives in College Park
USS Jesse L. Brown (DE/FF 1089); Dictionary of American Naval Fighting Ships; Naval History and Heritage Command https://www.history.navy.mil/research/histories/ship-histories/danfs/j/jesse-l–brown–de-1089-.html viewed on December 2022. | <urn:uuid:9ee65d09-db7f-47a4-91b4-da7beae6348c> | CC-MAIN-2023-23 | https://rediscovering-black-history.blogs.archives.gov/2023/03/23/blue-star-turned-to-gold-the-loss-of-ens-jesse-l-brown/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652494.25/warc/CC-MAIN-20230606082037-20230606112037-00380.warc.gz | en | 0.960989 | 4,359 | 3.328125 | 3 |
Faced with increasing antisemitism in Europe towards the end of the 19th century, many Jews chose to join the great waves of European emigration to the United States. Since the high middle ages, most of the … Read more here ➔
The political campaign by English evangelicals to get to get Jews to Palestine started with Shaftesbury around 1840 and has continued through the Balfour Declaration to this day.
In 1915 Sir Henry McMahon, British High Commissioner in Egypt, offered Sherif Hussein of Mecca an independent Arab state if he would help the British fight against the Ottoman Turks. Hussein’s interest in throwing off his Turkish overlords converged with Britain’s war aim of defeating the Ottomans.
In 1907 Yitzhak Epstein, a Russian-born teacher who had settled in Palestine, published an article entitled “The Hidden Question” in the Hebrew periodical Ha-Shiloah. Its subject was the attitude of the Jews toward the Arabs of Palestine. “Among the grave questions raised by the concept of our people’s renaissance on its own soil,” wrote Epstein, “there is one that is more weighty than all the others put together. This is the question of our relations with the Arabs.” This question, he added, “has not been forgotten, but rather has remained completely hidden from the Zionists, and in its true form has found almost no mention in the literature of our movement.” Read the article here
My dictionary defines Zionism as “a movement for the re-establishment of a Jewish national homeland and state in Palestine.” This was realized in May 1948 when the State of Israel was established. Many Jews are Zionists and committed to the quest for freedom and sovereignty of their people. But the majority of the world’s Zionists aren’t Jewish. Read more
Delivered at the first Balfour Project conference organised in collaboration with the Church of Scotland, Edinburgh, 2nd November 2012. In this presentation we are going to trace some of the significant events and individuals that … Read more here ➔
Anthony Ashley – Cooper, 7th Earl of Shaftesbury, 1801-1885. After a lonely, loveless childhood, when, like many earlier members of the British aristocracy, the only affection the growing child received came from his nanny, Shaftesbury was elected as … Read more here ➔
McMahon, Sykes, Balfour: Contradictions and Concealments in British Palestine Policy 1915-1917 by William Mathew
Three bits of policy, all belonging to the short period October 1915 to November 1917 – the first two, the McMahon-Hussein correspondence and the Sykes-Picot Agreement, the work of the Asquith Liberal government; and the third, the Balfour Declaration, coming from the succeeding Lloyd George coalition. Read more
What motivated the Balfour Declaration? (Powerpoint of Key Players) There is still conflict as to which motive for the Balfour Declaration is stronger – there are at least three motives, and some may interlock Read more
Following the discussion in the British Cabinet of an early draft of a letter to Lord Rothschild which was to become the Balfour Declaration, Edwin Montagu, the only Jew in the cabinet, submitted a memorandum to the cabinet in which he writes I wish to place on record my view that the policy of His Majesty’s Government is anti-Semitic and in result will prove a rallying ground for Anti-Semites in every country in the world.
1840 Shaftesbury takes an advert in the Times RESTORATION OF THE JEWS… A memorandum has been addressed to the Protestant monarchs of Europe on the subject of the restoration of the Jewish people to the land of Palestine. Read more | <urn:uuid:4ad4c06d-4e88-42af-aaeb-45476d43b02a> | CC-MAIN-2023-40 | https://balfourproject.org/evangelicals-and-christian-zionism/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510259.52/warc/CC-MAIN-20230927035329-20230927065329-00800.warc.gz | en | 0.959957 | 796 | 2.5625 | 3 |
Glossary of Terms
Active layer — the top layer of the ground, that freezes and thaws.
Adaptation- any action that reduces the negative impacts of climate change or takes advantage of potential new opportunities.
Climate- weather conditions over a long period of time.
Climate change- a change in the distribution or irregularity of weather patterns that carries on for a long time.
Excess ice — the extra volume of ice in the ground over and above the total amount of water under natural unfrozen conditions.
Frost boil- small mounds of earth or mud formed by frost action.
Frost heave — the upward or outward movement of the ground surface caused by ice formation in the soil.
Frost jacking — upward movement of objects in the ground due to freezing and thawing.
Frozen ground- ground containing ice
Glacier- a slow-moving mass or river of ice formed by compacted snow over a period of time.
Hummocky ground- land surface covered with small mounds.
Ice lens — a mainly horizontal, lens-shaped body of ice.
Ice-rich permafrost — permafrost containing excess ice.
Ice wedge- ice in a triangle shape pointing downward below the active layer, often occurring with regular-shaped patterns of ground or vegetation.
Icing- sheets of ice on the ground or on top of lake or river ice, caused by freezing water from the ground.
Pad and wedge- stacks of wood that hold a building off the ground and keep the building level. These blocks of wood should be on a gravel pad and may need annual adjustment using wedges to keep the building level.
Permafrost — ground (soil, rock, water, and ice) that remains at or below 0°C for several years. Permafrost may not be permanent, because changes in the climate or landscape may cause the temperature of the ground to rise above 0°C.
Screw jacks- adjustable jacks that hold a building off the ground and keep the building level. These jacks are placed on wooden platforms on a gravel pad to spread the weight. Annual maintenance may be needed.
Space frames- a web of aluminum tubes that spread the weight of a building onto many points. This system is often used when there is a high chance of unstable permafrost in the ground underneath.
Steel piles — long slender columns drilled deep into the ground to provide support for buildings. Piles that are not drilled deep enough into the permafrost can shift up and down during the year as permafrost freezes and thaws.
Solifluction- slow downslope movement of wet ground, also known as a landslide.
Subsidence- downward movement of ground after thawing.
Talik — an area of unfrozen ground in permafrost terrain, often under lakes or rivers.
Thaw-sensitive permafrost —frozen ground that may experience significant downward movement if it thaws.
Thaw Slump- frozen ground that thaws and caves in causing a hole.
Thermosyphon — a refrigeration device using no electricity, that transfers heat from the ground to the air and helps keep the area below a building cool.
Thermokarst -- The annual thawing of the active layer that results in soil flow and the soil surface collapsing.
Weather- the current state of the atmosphere. Weather is often what you think of when you look outside on a given day. | <urn:uuid:82bb572d-199b-4755-b80a-00e607a090d2> | CC-MAIN-2017-47 | https://climatechangenunavut.ca/en/node/3921 | s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934809392.94/warc/CC-MAIN-20171125032456-20171125052456-00421.warc.gz | en | 0.924613 | 724 | 4.03125 | 4 |
International relations scholars often talk about the “security dilemma,” which you may remember if you ever took a college course on international relations. This purports to explain how two states that really would be just fine with peace and the status quo might end up in a war nonetheless.
Given the apparent compatibility of the stated main goals, it is tempting to argue that the current crisis is an example of the “security dilemma” in action. Some analyses implicitly or explicitly invoke the idea.
But this is not what is going on here. The underlying problem — which is further complicated by a variety of psychological and personality issues — is that no U.S. administration, Trump’s or any other, can commit itself not to act to help replace Kim’s government if it were to face major domestic instability.
What is the security dilemma?
The security dilemma refers to two related ideas. The first is very simple: Things that one state does to make itself more secure typically have the effect of making other states less secure. For example, Kim is trying to develop a nuclear intercontinental ballistic missile (ICBM) capability to make his government more secure, but this has the effect of making the United States less secure. The second is about how this fact could lead states whose leaders are both basically interested in maintaining a non-conflict status quo to end up in a very costly war.
How might this work? Imagine two states, State A and State B, that both prefer the status quo to a military conflict. The problem is that while each state knows that it prefers the status quo, it doesn’t know that the other state does, too. So State A might build weapons, or do some other militarily competitive thing, to try to make itself more secure in case State B is in fact an aggressive type. State B, which really prefers the status quo, sees this action, and becomes more worried that State A is aggressive and expansionist, even though State A was really just motivated by fear of State B. So State B increases its arms (or takes some other such action, such as invading a buffer state or establishing a colony). This then confirms or increases State A’s belief that State B must be an aggressive type.
The net effect, according to this story, is a “spiral of hostility” that might lead to war, especially a preventive or preemptive war in which one state thinks it needs to act against the other before it is too late. Substitute North Korea for State A and the United States for State B for the example of the moment.
The security dilemma story has some puzzling features. For one thing, it is not clear whether the inferences driving the spiral of hostility make sense. Why shouldn’t State B realize that State A would arm, whether it was an aggressive type or just afraid of B, in which case seeing A arming itself does not provide B with any new information about whether A prefers the status quo or aggression? The same is true for State A’s inferences about B. Furthermore, if the states’ leaders both just want to preserve the status quo, why can’t they signal this by showing some restraint?
Robert Jervis’s classic statement of the problem in his “Perception and Misperception in International Politics” starts out saying that the “spiral of hostility” might occur between states with rational leaders. But then he pretty quickly shifts into arguments about how psychological biases drive the unnecessary escalation, arguing that state leaders tend to see themselves as nonthreatening and to assume, incorrectly, that others understand that they are not threatening or aggressive also. As a result, when State B sees A arming itself, its leaders think: “They know that we pose no threat to them, so this can only mean that they are aggressive and want to attack us or do something with those weapons that we won’t like.”
However, the North Korea crisis is probably not the result of this security dilemma dynamic
In the security dilemma story, escalation and war might happen even though both sides are in fact just interested in maintaining the status quo. Neither has any underlying ‘revisionist’ aims (i.e. aims to change the larger international situation and their own role in it) that the other side needs to worry about.
That’s not the problem between the United States and North Korea. U.S. leaders have long hated the North Korean regime and would love to see it gone, just as successive U.S. administrations hated the Gaddafi regime in Libya. And there are truly excellent reasons for the leaders of a democratic country — or really anyone who cares about human rights — to hate the North Korean government and want to see it change.
But from Kim’s perspective, the fact that the United States would ideally like to see him and his gang of thieves and murderers gone makes the United States the revisionist power. Secretary of State Rex Tillerson can say in public that “we do not seek a regime change” and that “we are not your enemy,” but Kim knows that this is cheap talk. If the opportunity for regime change arose, there is no way that the United States (and South Korea) could make a credible promise not to support opposition to Kim. Just look at Libya. Gaddafi negotiated to end his nuclear program, and then later NATO intervened to help overthrow him when there was an uprising.
So this is not a situation where two states each mistakenly worry that the other is hostile. Rather, it’s what international relations scholars might call a classic problem of anarchy, in the sense that there is no power above states that can enforce agreements they make with each other. Here, the United States can’t credibly commit not to take actions to help depose Kim in certain circumstances. Kim thinks, with some reason, that being able to strike the U.S. mainland would lower this risk. This in turn leads U.S. leaders to think about a preventive war.
Of course, there may be other dynamics in play. In particular, some part of Kim’s nuclear policy is aimed at increasing his legitimacy with domestic audiences, shoring up legitimacy and status, and so trying to lower the odds of a domestic uprising to begin with.
Questions follow about Trump’s approach
What is puzzling is that the Trump administration seems to think that threats and coercion from the United States and China can work to get Kim to agree to stop his missile program in a verifiable way. Defense Secretary Jim Mattis, national security adviser H.R. McMaster and Joint Chiefs of Staff Chairman Gen. Joseph F. Dunford Jr. have said things in recent weeks that suggest a real willingness to try a preventive war rather than allow North Korea to acquire a fully functional capability to hit the U.S. mainland. This isn’t even to mention Trump’s more extreme statements. At the same time, Trump and his advisers also say things that suggest they want to use the threat of war to press the North Koreans to make a deal (including via pressure from China).
But threats and coercion just reinforce Kim’s sense that his safety — from the United States and China — requires a working nuclear weapons capability. Due to the commitment problem just described, he is likely to try to develop this capability whether we make threats and raise nuclear risk or not. So the question is really whether the United States would be willing to undertake a preventive war at this point. Why rattle sabers and draw red lines if you don’t have a clear path to a feasible deal? | <urn:uuid:e35a406a-5175-4f0b-8185-59790468fe48> | CC-MAIN-2020-05 | https://www.washingtonpost.com/news/monkey-cage/wp/2017/08/16/the-big-problem-with-north-korea-isnt-that-we-cant-trust-them-its-that-they-cant-trust-us/?tid=a_inl&utm_term=.3b552f1433b4&tid=lk_inline_manual_14 | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250601040.47/warc/CC-MAIN-20200120224950-20200121013950-00213.warc.gz | en | 0.959799 | 1,571 | 3.265625 | 3 |
How Do You Switch to Organic?
Switching to organic is a tough decision for many families. By choosing organic versions of the family’s most consumed foods, you can increase the percentage of organic food in your diet without big changes to your shopping cart or your spending. Opting for organic produce, for instance, doesn’t necessarily have a big impact, depending on what you eat. The key is to be strategic in your organic purchases. But how do you switch to organic? Like this.
According to the Environmental Working Group, commercially-farmed fruits and vegetables vary in their levels of pesticide residue. Here’s their standard of when to choose organic and when it’s OK to go conventional.
Dirty Dozen—These should always be organic: Nectarines, Celery, Pears, Apples, Cherries, Berries, Imported Grapes, Spinach, Potatoes, Bell Peppers, Lettuce.
Clean fifteen—It’s OK to opt for conventional here: Onions, Avocados, Sweet corn, Pineapple, Mangos, Asparagus, Sweet peas, Kiwi, Cabbage, Eggplant, Papaya, Watermelon, Broccoli, Tomato, Sweet potato. (Tip: Print this and slip it in your wallet.)
Nutrient Dense: Reports of organic food not being better for you are outdated. A brand new analysis of about 100 studies, including more than 40 published in the past 3 years, found that the average levels of nearly a dozen nutrients are 25% higher in organic produce.
Consume Fewer Toxins: Eating the 12 most contaminated fruits and vegetables exposes you to about 14 pesticides a day. A study supported by the EPA measured pesticide levels in children’s urine before and after a switch to an organic diet. After just 5 days, the chemicals decreased to trace levels.
TOP ORGANIC PICKS
1. Milk: Most children drink milk everyday or in large quantities so this is one product not to skimp out on when it comes to choosing between organic and non. Also, when you choose a glass of conventional milk, you are buying into a whole chemical system of agriculture. Organic milk doesn’t contain the harmful antibiotics, artificial and growth hormones and pesticides that are used in commercial dairy.
2. Potatoes: Potatoes are a staple of the North American diet—an alarming fact in itself—one survey found they account for 30% of our overall vegetable consumption. A simple switch to organic potatoes has the potential to have a big impact because commercially-farmed potatoes are some of the most pesticide-contaminated vegetables. Root vegetables absorb herbicides, pesticides, and fungicides that wind up in soil. Potatoes are treated with fungicides during the growing season, and then sprayed with herbicides to kill off the fibrous vines before harvesting. After they’re dug up, the potatoes are treated yet again to prevent them from sprouting. Try this experiment: Buy a conventional potato in a store, and try to get it to sprout. It won’t. 81% of potatoes tested still contained pesticides after being washed and peeled, and the potato has one of the highest pesticide contents of 43 fruits and vegetables tested, according to the Environmental Working Group.
3. Peanut butter: More acres are devoted to growing peanuts than any other fruit, vegetable or nut, according to the U.S.D.A. More than 99% of peanut farms use conventional farming practices, including the use of fungicide to treat mold, a common problem in peanut crops. Given that some kids eat peanut butter often, this seems like a simple and practical switch. Commercial food firms now offer organic brands in the regular grocery store. Even opt for grinding your own in store. Kids love the process watching the nut transform into paste!
4. Ketchup: For some families, ketchup accounts for a large part of the household vegetable intake—another sad fact in itself. About 75 percent of tomato consumption is in the form of processed tomatoes, including juice, tomato paste and ketchup. Notably, recent research has shown organic ketchup has about double the antioxidants of conventional ketchup.
5. Apples: Apples are the second most commonly eaten fresh fruit, after bananas. But apples are also one of the most pesticide-contaminated fruits. Why? They are individually grafted (descended from a single tree) so that each variety maintains its distinctive flavor. So apples don’t develop resistance to pests and are sprayed frequently. The industry maintains that these residues are not harmful. Don’t buy that. So minimize exposure by avoiding the most pestiside doused produce but choosing organic apples. The good news is that organic apples are easy to find.
6. Popcorn: Chemicals, like perfluorooctanoic acid (PFOA), in the lining of the microwave popcorn bags, are part of a class of compounds that may be linked to infertility in humans. Studies show that microwaving causes the chemicals to migrate into your popcorn and accumulate in the body for years. Many manufacturers will phase out PFOA by 2015 under a voluntary EPA plan, but millions of bags of popcorn will be sold between now and then. The solution: Pop organic kernels the old-fashioned way—in a skillet. For flavorings, add real butter, olive oil, or dried seasonings, such as dill, vegetable flakes or nutritional yeast. Bonus is that air-popped popcorn is a whole food, high in nutrients and a way cheaper snack food option.
7. Canned Tomatoes: The resin linings of tin cans contain bisphenol-A, a synthetic estrogen that has been linked to ailments ranging from reproductive problems to heart disease, diabetes and obesity. Unfortunately, acidity—a prominent characteristic of tomatoes—causes BPA to leach into your food. Choose tomatoes in glass bottles (which do not need resin linings). Substitute low sodium organic jarred pasta sauce for canned tomatoes when a recipe calls for canned tomatoes and none are on hand.
8. Meat and Poultry: A study in the journal Meat Science compared the nutritional content of organic and nonorganic chicken meat. The researchers found that the organic samples contained 28% more omega-3s which are linked to reducing rates of heart disease, depression, type 2 diabetes, high blood pressure, inflammation and Alzheimer’s disease. Animals raised organically are not given antibiotics, growth hormones or feed made from animal by-products (read: they don’t eat their own species).
Money Saving Tricks When Buying Organic
In-Season Savings: Hunt for produce at your local farmer’s markets. Buy organic produce in season (preferably local), when it’s most affordable—usually at half the cost. Not only does your wallet benefit, but also do the local farmers. Produce is farm fresh with a much zingier taste as it was probably just picked that day. Plus, little energy was wasted in its journey from the farm to kitchen.
Buy in Bulk: Organic options can be found at Costco—like organic bagged brown rice, whole-wheat flour and quinoa. Stock up on these, They don’t go bad and you will use them more often when on hand. You can also find many organic grains—brown rice, whole oats, pastas, flours, dried fruits, and nuts in bulk sections of stores for far less.
Portion Control: The recommended portion size for meat and poultry is three ounces, the size of a deck of cards. Stick to this amount and round out your meal with less expensive whole grains and veggies not only to cut meal costs, but also to drastically improve nutritional intake.
Organics to Skip: Which products don’t require the hefty price tag? Step into any health food store and you’ll find an organic version of just about everything, including junk food. While it’s true that organic is still better for you, soda is still soda, even with an organic label. A six-pack of organic soda contains 160 calories and zero nutrients. So skip it entirely. Cutting back on sweets and nutritionally void extras altogether is the best step to better health and won’t sabotage your shopping budget that should be spent on healthy whole foods.
- Alyssa-Schottland Bauman received her training to practice Health Counseling at the Institute for Integrative Nutrition, which is the only nutrition school integrating all the different dietary theories—combining the knowledge of traditional philosophies with modern concepts like the USDA food pyramid, the glycemic index, the Zone and raw foods. www.nourished.ca | <urn:uuid:53daa149-a902-4cb6-a2f4-5d46109aa686> | CC-MAIN-2014-15 | http://www.urbanmommies.com/recipes/how-do-you-switch-to-organic/ | s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609532480.36/warc/CC-MAIN-20140416005212-00469-ip-10-147-4-33.ec2.internal.warc.gz | en | 0.927161 | 1,799 | 2.578125 | 3 |
Beef rings are cooperative groups of anywhere from six to twenty-four farms, with each member of the cooperative being required to supply one animal over the course of the summer to the cooperative for slaughter (either done locally on the farm or at a slaughterhouse at the member's expense).
Beef rings were common among North American farmers who had no means for refrigeration of meat until the turn of the 20th century. Although pigs were small enough that a smoked pork carcass could be consumed by a single farming family before the meat spoiled, the same was not true of cattle, and smoked or salted beef was not popular in any case.
After obtaining the slaughtered steer, the meat would be distributed amongst the members of the cooperative, providing them with a steak, a roast, and a boiling joint each week. By slaughtering each animal in sequence, the cooperative ensured that all members received fresh meat throughout the summer. Distributions were weighed, so that each member received a fair share of the meat.
Beef rings died out for several reasons, including technological advances in refrigeration, greater economic prosperity for farmers, greater independence, and the ability of farmers to buy meat at butchers' shops rather than slaughter and store it themselves.
|This meat-related article is a stub. You can help Wikipedia by expanding it.|
|This agriculture article is a stub. You can help Wikipedia by expanding it.|
|This history article is a stub. You can help Wikipedia by expanding it.| | <urn:uuid:6bf1a782-3058-416c-928b-5d498d3bff91> | CC-MAIN-2014-10 | http://en.wikipedia.org/wiki/Beef_ring | s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999642306/warc/CC-MAIN-20140305060722-00030-ip-10-183-142-35.ec2.internal.warc.gz | en | 0.977002 | 306 | 3.796875 | 4 |
Researchers at Northwestern University’s Simpson Querrey Institute for BioNanotechnology say that they have developed a polymer that might one day be used in artificial muscles or other lifelike materials; for delivery of drugs, biomolecules, or other chemicals; in materials with self-repair capability; and even for replaceable energy sources. These functions require new hybrid polymers with both rigid and soft nano-sized compartments with extremely different properties that are organized in specific ways.
“We have created a surprising new polymer with nano-sized compartments that can be removed and chemically regenerated multiple times,” said materials scientist Samuel I. Stupp, director of the Querrey Institute. He is a leader in the fields of nanoscience and supramolecular self-assembly, the strategy used by biology to create highly functional ordered structures.
“Some of the nanoscale compartments contain rigid conventional polymers, but others contain the so-called supramolecular polymers, which can respond rapidly to stimuli, be delivered to the environment and then be easily regenerated again in the same locations. The supramolecular soft compartments could be animated to generate polymers with the functions we see in living things,” he explains.
The hybrid polymer combines the two types of known polymers: those formed with strong covalent bonds and those formed with weak non-covalent bonds, well known as “supramolecular polymers.” The integrated polymer offers two distinct compartments with which chemists and materials scientists can work to provide useful features. (See Figure 1)
“Our discovery could transform the world of polymers and start a third chapter in their history: that of the ‘hybrid polymer,’” Stupp says. “This would follow the first chapter of broadly useful covalent polymers, then the more recent emerging class of supramolecular polymers.
“We can create active or responsive materials not known previously by taking advantage of the compartments with weak non-covalent bonds, which should be highly dynamic like living things. Some forms of these polymers now under development in my laboratory behave like artificial muscles,” he explains.
Polymers get their power and features from their structure at the nanoscale. The covalent rigid skeleton of the first hybrid polymer has a cross-section shaped like a ninja star—a hard core with arms spiraling out. In between the arms is a softer material, which can be animated, refreshed, and recharged. These abilities could prove useful in a range of valuable applications.
“The fascinating chemistry of the hybrid polymers is that growing the two types of polymers simultaneously generates a structure that is completely different from the two grown alone,” says Stupp. “I can envision this new material being a super-smart patch for drug delivery, where you load the patch with different medications, and then reload it in the exact same compartments when the medicine is gone.”
Stupp and his research team also discovered that the covalent polymerization that forms the rigid compartment is “catalyzed” by the supramolecular polymerization, thus yielding much higher molecular weight polymers.
The strongly bonded covalent compartment provides the skeleton, and the weakly bonded supramolecular compartment can wear away or be used up, depending on its function, and then be regenerated by adding small molecules. After the simultaneous polymerizations of covalent and noncovalent bonds, the two compartments end up bonded to each other, yielding a very long, perfectly shaped cylindrical filament.
For more information, visit www.northwestern.edu/newscenter . | <urn:uuid:09604371-ad29-432a-8d50-ce2862056f49> | CC-MAIN-2023-14 | https://www.medicaldesignbriefs.com/component/content/article/mdb/pub/briefs/24283 | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945473.69/warc/CC-MAIN-20230326142035-20230326172035-00615.warc.gz | en | 0.930036 | 774 | 3.203125 | 3 |
NASA’s “Juno” spacecraft will make its fifth overpass over the mysterious treetops of Jupiter clouds today, on Monday, March 27, at 8:52 UTC.
During the maximum approach to the planet, “Juno” will be at an altitude of 4400 kilometers above the tops of the clouds of Jupiter, moving at the speed of about 57.8 kilometers per second in relation to the giant planet. All eight scientific instruments of the probe “Juno” will be included and will collect scientific data during the entire span.
“This will be our fourth rapprochement with Jupiter for collecting scientific data – and we look forward to new discoveries from Juno,” said Scott Bolton, project manager for Juno from the Southwest Research Institute in San Antonio, USA. “Whenever our apparatus flies over the tops of the clouds of Jupiter, we learn about this planet new, amazing things!”
At present, the mission’s scientists continue to analyze the data on the magnetic field of Jupiter collected by this spacecraft during its previous flight past the planet.
The mission of Yunona was launched into space on August 5, 2011 from Cape Canaveral, Florida, USA, and arrived in orbit to Jupiter on July 4, 2016. Throughout its research mission, the probe dropped to an altitude of 4,100 kilometers above the upper layer of the clouds of Jupiter. During these encounters, the instruments of the Juno collect data on the structure of the underlying layers of clouds and the aurora in them, in order to gain a deeper understanding of the origin of the planet, its structure, the structure of its atmosphere and the magnetosphere. | <urn:uuid:7d1072db-f36b-416c-a435-4ff058626fc0> | CC-MAIN-2017-34 | http://earth-chronicles.com/space/juno-is-moving-closer-to-jupiter.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886120194.50/warc/CC-MAIN-20170823113414-20170823133414-00315.warc.gz | en | 0.908767 | 343 | 3.046875 | 3 |
|Coloured powder paint ready to throw. © Copyright photo: |
Sikhs also celebrate where in the Punjab it's known as "Hola Mahalla" or the festival of Nihangs. Guru Gobind Singh started the festival for Sikhs to practice their military exercise and practice battles. Sikhs celebrate through martial arts led by Gurdwara nishan sahibs.
|Nihangs - Sikh warriors celebrate Hola Mohalla with coloured powders, Punjab, India. |
© Copyright photo: http://www.boston.com/bigpicture/2009/03/holi_the_festival_of_colors.html
|Cleaning a pan ready for Hola Mohalla - the festival of Nihangs in Punjab, north India. |
© Copyright photo:
History of Holi
It's believed that the festival's origin comes from Krishna who was a mischievous boy that threw coloured water over the milkmaids. The fun and jokes developed into Holi, the tradition of lighting bonfires symbolises good overcoming evil and is about the king's son prince Prahlad. His auntie Holika was immune from fire and tricked her nephew Prahlad into sitting on her lap in a bonfire to kill him. But as she was using her powers for evil, her plan failed, instead the flames killed Holika and Prahlab was unharmed. Today in some parts of India effigies of Holika are burned and the bonfires ashes are thought to bring good luck.
|The tradition of lighting bonfires in India symbolises good over evil. © Copyright photo: http://www.boston.com/bigpicture/2009/03/holi_the_festival_of_colors.html| | <urn:uuid:ae1d4cca-050a-4a1c-b377-90b3d138864f> | CC-MAIN-2017-43 | http://monsoonarts.blogspot.com/2012/03/holi-indian-festival-of-colour.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187822145.14/warc/CC-MAIN-20171017163022-20171017183022-00743.warc.gz | en | 0.913812 | 370 | 2.765625 | 3 |
By Scott Faber, Environmental Working Group
More than ever, Americans want to know everything about our food, cosmetics, cleaners and other everyday products we bring into our homes.
We want to know what’s in it, why it’s in there, where it’s been and who made it. Mostly we want to be trusted to do our own homework and make our own decisions.
It’s not just consumers who are demanding more transparency. Legislators and regulators are requiring more disclosures and cracking down on misleading claims.
But transparency is not an end in itself. Consumers want to know more because we want to make choices that reflect our values.
We want products that are sustainable and products that are safe. Increasingly, safe means safe from dangerous synthetic chemicals, not just from dangerous organic pathogens. And we are increasingly aware that many of the chemicals used in everyday products are either lightly regulated or not regulated at all.
- More than 40 nations have restricted or banned more than 1,400 chemicals in cosmetics and other personal care products. But the U.S. Food and Drug Administration has only restricted or banned nine, for safety.
- More than 2,000 chemicals are directly added to food, but many have been deemed safe by food and chemical companies themselves – not by the FDA.
- Only two of 16 chemicals in sunscreens have been found safe and effective by the FDA.
- Roughly two-thirds of pesticides have been approved through “conditional” registrations – that is, without complete health and safety studies.
- Few of the chemicals in cleaners have been reviewed and regulated by the Environmental Protection Agency. Efforts by Congress to modernize the Toxic Substances Control Act have been undermined by the Trump Administration.
Since the government isn’t looking out for us, no wonder we like to do our own homework and make our own decisions.
Here’s what else consumers have figured out. Many of these chemicals are simply unnecessary.
Conventional packaged food can include thousands of chemicals. But fewer than 40 synthetic substances are allowed in organic packaged foods. Organic packaged foods last just as long, taste just as good and look just as appetizing.
EWG scientists have compiled a list of the “Toxic Twenty” chemicals that should be banned from cosmetics, including formaldehyde, mercury, asbestos and lead. Thankfully, many cosmetics brands already don’t use any of these chemicals. The same is true for cleaning products.
The digital revolution has made it easier than ever for consumers to find the products that reflect their values. In an average week, almost 100,000 people use Skin Deep®, EWG’s free online guide to 70,000 cosmetics and other personal care products.
Twenty-six million people visit EWG’s website annually, consulting not only Skin Deep, but also our Guide to Sunscreens, or our guides to packaged foods and cleaners. Millions more connect with EWG through social media, email or our Healthy Living App, which puts our ratings for more than 120,000 products in the palm of your hand.
Digital tools have not only changed the way we shop. They have also changed our expectations about access to information. We want more information about our everyday products, not less. We may not always use that information to make choices, but we expect it to be available.
Many companies are reformulating products away from chemicals of concern. More than 100 companies are working with EWG right now to do so. And many are making sweeping disclosure commitments that will raise the bar for the rest of their industry.
Our health, and the health of our families, will always be our top priority.
But increasingly, consumers want to know what steps companies are taking to address urgent environmental challenges like drinking water pollution and the climate crisis. A recent study found that 86 percent of consumers expect companies to act on social and environmental issues, and climate change was high on their list.
Companies are not just being measured by their commitment to coming clean but also by their commitment to being clean. As one expert put it, “Consumers are no longer just asking ‘What do you stand for?’ but also ‘What do you stand up for?’ ” | <urn:uuid:81d1c640-35d6-4f6c-9f1c-7f5346041f60> | CC-MAIN-2020-10 | https://sensiblesafeguards.org/for-consumers-being-clean-is-as-important-as-coming-clean/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145500.90/warc/CC-MAIN-20200221080411-20200221110411-00357.warc.gz | en | 0.960156 | 875 | 3.140625 | 3 |
PRACTICAL HORTICULTURE COURSE - DISTANCE LEARNING
Learn to be a Horticulturalist with the best practical skills!
A practical approach to horticultural education..
How do you learn the practical side of horticulture by distance education?
Although all ACS courses are practically and well as theoretically focused - this course was developed for those people who feel that they will gain more from a course that places MOST of the learning experience on learning theory - through practice. There are lots of practical horticultural tasks to develop your skills and knowledge covered in this course. So if you are a student that prefers practical learning, then this course is the ANSWER, and it really does work! Best taken online, or on CD, where you can make full use of interactive learning tasks and coloured photography on the computer.
There are 10 lessons in this course:
Seed Propagation (including seed identification)
Potting up and After Care of young plants
Maintenance of Established Plants
Practical Plant Identification
Pest and Disease Identification
Each lesson culminates in an assignment which is submitted to the school, marked by the school's tutors and returned to you with any relevant suggestions, comments, and if necessary, extra reading.
What You Will Do
Test soils to determine characteristics which would be valuable to management of any given soil in a horticultural situation
Identify sandy loam, silty loam, and clay loam soils by feel; and pH testing by soil indicator; and relate to plant selection
Identify and sow a range of different types of seeds, in different situations, in a way that will optimise successful propagation.
Propagate a range of plants using different vegetative propagation techniques
Pot up and provide after care for a range of propagated seedlings and cuttings.
Plant a range of (different types) plant material.
Maintain the desired growth type and habit for a range of plants.
Identify significant woody plants including: Trees; Shrubs; Groundcover; & Conifers
Identify a range of significant plant problems including pests, diseases and others.
Identify a range of non woody and indoor plants of horticultural significance.
Conduct a risk assessment of a horticultural workplace to determine safe working practices and select appropriate personal safety clothing and equipment.
Tips -Practical Gardening over Winter in response to Climate Change
Climate Change and global warming is impacting everywhere; Sub tropical areas and temperate areas are both recording unseasonal temperatures -and this calls for practical adaptations to how we garden everywhere.
Some years are difficult than ever to predict garden problems that may transpire over winter. What problems are we likely to face this winter then; and how do we handle them? Many years of drought has changed the populations of insects and diseases - not only pests but also predators. Things are out of balance - and it may take a season or two to restore it!
Temperature extremes are affecting both local indigenous fauna and garden plants; if vegetation dies or thins, it affects the buffering capacity of local environments (ie. with more vegetation, low temperatures don’t go as low and hot days don’t get as hot. Once plants die due to extremes, the area becomes even hotter in summer or colder in winter. Strong winds now rip through the remnant vegetation, foliage dries out faster then water can be up-taken by the roots - causing wilting and more damage.
Unexpected cold snaps can bring frosts or cold winds – in the tropics plants may not be acclimatised to these swift changes in temperature. Cold reduces growth and also flowering and fruit development and can even kill parts or all of a cold sensitive plant.
To protect from frosts cover plants with hessian or some other physical protection such as horticultural fleece.
Alternatively put sprinklers on for a few hours just before dawn when the chance of frost is greatest (i.e. the slightly higher temperature of the water is often enough to prevent frost damage).
Pests and Diseases
With the recent rains, pests and diseases now have a great opportunity to flourish – however the population of predators is low, their population won’t boom until after the pests have boomed and provided them with a food supply.
You Can Help Restore Balance in Your Garden
- attract birds to the garden
- buy and Introduce good parasites to eliminate aphis, mites etc
- use natural controls (eg. biological traps) for pest populations until natural predators build
- be vigilant - inspect often and use a “soft” spray like pyrethrum to control populations before they explode
- understand the life cycles of pests and diseases – this is the best way to prevent or combat problems
- learn to identify pest and disease problems – so you can choose the appropriate treatment
- avoid blanket spraying – this will eliminate a struggling predator population’s chance of re-establishing
- practice bio-diversity - to attract natural predators and confuse pests
- practice crop rotation in the vegie patch to prevent build up of pests and diseases
- mulch after rains only to establish healthy plants
- healthy soils grow healthy plants - add compost and well decomposed animal manures – this helps problems from starting in the first place
- plant to suit the situation – it is best to choose plants suited to your area rather then change and area to suit your plants
- feed and water your plants regularly – stressed plants attract pest and disease problems
- thick mulching can help buffer temperatures, both hot and cold, and keep moisture in the ground
- reduce materials like stone, brick, ceramic and asphalt - these can act as heat banks in heat waves; and in a cold snap will get colder faster than a bank of trees, shrubs or even grass
- protect your garden and plants from hot or cold wind with thickly planted edges or hedges | <urn:uuid:f23d8be6-ce39-4ea9-9250-93e6bb4590dd> | CC-MAIN-2020-34 | https://www.acsedu.com/courses/practical-horticulture-1-856.aspx | s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735792.85/warc/CC-MAIN-20200803083123-20200803113123-00515.warc.gz | en | 0.916114 | 1,229 | 3.546875 | 4 |
Viewing and studying content material on web sites is inherently more durable to do on iPhones on account of comparatively small displays. This course will provide students with a deeper understanding of the technologies used to defend a network against safety attacks. In an affiliate’s diploma program in computer know-how, students find out about computer hardware and software program and the important skills needed to repair, troubleshoot, program and design computer programs.
Whereas many sectors of the American job market have been stagnant for years, computer and know-how careers are nonetheless on the best way up, at all ranges, from entry-stage programmer to administration. And college students who are extra analytical can attempt a area like knowledge science. Ratings and evaluations apply in all places, from a restaurant you need to try to a new digicam you’re thinking of shopping for and video games you may wish to play.
2018 was less favorable to Twitter, who reported declines in global lively users of their two past earnings bulletins This downward pattern is clearly seen within the platform’s advertising viewers numbers too, which point out that Twitter’s total addressable viewers has fallen by 1.5 percent since October. Layanan ini tersedia setiap Senin-Jumat (pukul 08.00-19.00 WIB), dan Sabtu (09.00-sixteen.00 WIB), kecuali hari libur nasional.
The vast majority of this system consists of courses in systems programming, software development, testing and upkeep. Multimedia devices are electronic units used to retailer and expertise multimedia content material. Our Cyber Intelligence and Safety college students are trained in actuality-based mostly situations that educate them to defend software and computer networks in opposition to crippling cyber attacks.
Step 16: In your net browser, return to your Google video account. Cakram keras yang menyimpan informasi berbentuk biner dan dianggap sebagai bentuk fisik media digital. Program improvement and programming are becoming vital components that decide alternatives for additional increasing the sphere of software of computer technology. The affect of the digital revolution may also be assessed by exploring the quantity of worldwide mobile good gadget customers there are.
Computer And Electronics Technology
Tech Information MSN News
Computer Expertise Help | <urn:uuid:05a0a547-861b-4a3b-a021-db82432cabba> | CC-MAIN-2023-14 | https://ymlp324.net/computers-know-how-majors-careers-job-salaries.html | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943695.23/warc/CC-MAIN-20230321095704-20230321125704-00045.warc.gz | en | 0.878757 | 478 | 2.546875 | 3 |
What chickens eat and what chickens should eat are not always the same thing. Chickens are omnivores. That means they’ll snarf down just about anything, or at least try to! I’ve seen a hen catch and slurp down a snake like spaghetti. I’ve seen a chicken snatch a toad by it’s leg and all of the other hens go in a raucous chase after it, only, at the end to discover that a toad is not good eating. Chickens also eat less exciting foods, like vegetables, fruits, flowers and grass. They eat grains and seeds. They scratch the ground and find bugs and specks of things that we can’t see. So, the question isn’t really what chickens eat, but what the right diet is for them.
In the 19th century most chickens were barnyard scavengers. They hatched out under their mamas and were taught to look for grain in the horse stalls, and for bugs and greens in the garden. The farm wife tossed stale bread and kitchen scraps to the hens. Chickens destined for the table were fattened on sour milk. Sometimes, in the winter, they’d be given a handful of grain. The hens back then laid only a few eggs a week. This haphazard diet was enough sustenance for them. But, flocks became larger and more confined. Chickens were bred to lay more and more eggs. Instead of 90 eggs a year, a hen now might lay over 300. With the increase in egg production came an increase in the nutritional requirements of the flock.
Laying Hen Pellets
Commercial laying hen pellets (or crumbles which are the same thing but smaller) are designed for today’s productive hens. Creating a daily egg is depleting. The pellets have the right proportion of protein, minerals and energy for the chickens. These pellets should make up the bulk of your flock’s diet. Your chickens should have access to the pellets all day long. They should go to bed with full crops (the crop is the pouch in their throat where the food is first stored after it is swallowed.) It takes over 25 hours to create one egg. During the night, as the hen is sleeping, she is still building that egg. She gets the materials for making that egg from digesting food. If her digestive tract is empty she can’t make the egg. So, let your hen eat what she wants from sunup to sundown.
Oyster Shell and Grit
Even though the commercial feed contains calcium, it is good to provide another source. Coarsely broken up oyster shell is the most easily absorbed form (even better than finely-ground.) I put it in a rabbit feed hopper, which keeps it tidy and prevents waste. Chickens also need grit – tiny rocks- that the hens need so that their gizzards can grind up food. Without grit, digestion is slowed and the hens are less efficient at extracting nutrients from feed. Like oyster shell, grit should be offered free choice.
Vegetables, Table Scraps and Free-Ranging
As good as it is, commercial feed should not be the only thing that your hens eat. A standard-sized hen will eat between 1/4 and 1/3 pound of pellets a day, if it’s the only food offered. However, it remains essential for our backyard hens to have a varied diet beyond the pelleted ration. Greens and dirt to scratch in are key components to keeping your flock healthy. If you can let your hens free-range, they’ll find plenty to eat. However, for those of us who live where there are severe winters, or who keep hens on small lots, or have too many predators to allow free-ranging, you have to provide a varied diet in other ways.
Chickens appreciate table scraps. They’ll eat most anything, from coffee grinds to stale toast to soggy green beans. Some things they won’t eat, and sometimes it’s a matter of personal preference. Mine don’t like raisins, and yet it’s a favorite treat for a friend’s flock. Not all of the foods tossed in the compost pile are ideal for chickens, but if your hens are getting most of their food intake from laying hen pellets, then it’s unlikely that they will overeat any one item in the scrap pile. There’s only one item that I know of that is lethal to chickens and that is avocados. Contrary to what you might have read out there, potato skins and eggplant leaves aren’t going to cause any harm. But, some foods are better than others. If you offer too many carbs, like bread and stale cereal, your hens will get fat and won’t get enough protein. So, dole those out judiciously. In the summer, you can toss all of your garden waste, including bug-softened zucchini, weeds and grubs in with your chickens. Your hens will eat what they like and shred the rest. I don’t give them grass clippings, as that can cause impacted crops. The same goes for long scallion stalks. But, it’s not a good idea to simply throw kitchen scraps and garden waste into the run, as it will become a mess. To keep everything tidy and healthy I have a compost bin in the chicken run. What the hens don’t eat gets churned into tiny bits and quickly turns into good dirt. It’s an easy, healthy system.
In the winter, when the compost bin is frozen, I hang cabbages inside the coop for rousing games of cabbage tether ball. I also put treats in suet feeders. Outside, I’ll cut a hole in a pumpkin and the hens will spend days pecking at it – even when frozen it will keep them busy and healthy.
Scratch Grains, Meal Worms and Other Treats
We all love to give our hens treats. Unlike so many others in our lives, chickens are raucously grateful for the smallest offerings. But, I’ve seen a disturbing trend to over-indulgence in the feeding of backyard hens. You can make your chicken sick – or even kill her – with too many of the wrong treats. One food that chickens love is cracked corn. It’s like candy to them. But, it has no nutritional value other than calories. It’s okay to give a little in the winter when the weather is really cold, but otherwise it has no benefit. It does quickly make hens fat, which can lead to serious egg-laying glitches. So, as much as your girls are gleeful about cracked corn, don’t feed it.
On the other end of the spectrum, I am especially concerned about all of the people feeding their hens mealworms. A small amount, like a tablespoon a day, is a fine treat. But, people are feeding handfuls. They’re practically feeding their hens pure protein (mealworms are up around 50%) The chicken expert at my local feedstore just told me about hens dying from kidney failure due to being fed mealworms as the main part of their diet. Besides the health dangers, mealworms are very expensive. Yes, it’s good for chickens to eat bugs, bugs they have worked for and found themselves, bugs that are part of an active life, and one in which the insects are part of other things that the chickens are sorting through and ingesting. A chicken should have to work for her treats, by scratching and exploring. Chickens should fill their crops over the course of a long day, not at one time. Tossing in a large handful of mealworms or corn to your hens is the exact opposite of what is best for them. Because hens that are active and outside are the healthiest, I keep a compost pile in the chicken run. It keeps them busy scratching and there’s always bugs and tidbits for them to find and eat.
Hulled sunflower seeds are a nice treat – in moderation. They have that extra bit of protein, and also contain good essential fats. My retired girls get about a teaspoon per bird per day. Plenty! Don’t feed the seeds with the shells on, as too many can cause an impacted crop. The sunflower seeds, and sometimes a small bit of cracked corn) are what I use to call my hens. If you’ve seen my YouTube video, you know how fast my hens come when called. Since they rarely get such treats, when they hear that can shake, they know something very, very special is waiting for them.
You might see large, solid blocks of chicken treats a the feed store and are supposed to be placed outside for foraging hens. These blocks attract chipmunks and mice to your run, and they don’t encourage the hens to move about and search for food. They also are sweet and so the hens prefer it to their pellets. If your girls are stuck indoors during the winter, a block can keep them busy. Otherwise, I don’t think they’re a good idea.
But all of this doesn’t mean that you can’t spoil your hens. A piece of crumbled stale bread, a bowl of yogurt, a bruised tomato, will all cause a happy commotion in the chicken yard.
The one most essential thing to provide your flock is fresh water. Even though it does seem as if chickens prefer muddy pools (rather like toddlers in a rain puddle) always have clean water for them. Put the water font up off the ground (a few bricks work for this) so that it stays clean. Scrub the water font weekly. In the winter, if you are located in an area with freezing temperatures, either use an electric heating stand under the waterer (these are designed for chicken waterers) or be prepared to swap frozen waterers for fresh several times a day. A chicken without water will die within a day. In the summer I put an extra waterer out in the pen near the shady area where the hens like to hang out. Chickens overheat easily and water will go a long way to keeping them healthy and alive.
To wrap it up, what your hens need are laying hen pellets, fresh water, greens, fresh air and exercise. Indulge them by giving them an interesting environment, compost to shred, and your delighted attention. Once in awhile, toss them something really special (but keep it special by doing this sparingly!) Your treat will be having healthy, active, laying, hens.
For the first two days of life the chick makes use of the yolk that is still inside of it. After that, the chick needs food and water. Chicks should be given free-choice finely ground feed that is 18% protein. They shouldn’t eat laying hen pellets because it is too high in calcium and too low in protein. The easiest way to feed chicks is to purchase chick starter. Do not purchase chick finisher or special “grow” feeds, as those are for meat birds that are slaughtered before maturity. Chicks remain on the chick feed for the first 14 to 18 weeks, which is about when they are mature enough to lay. Some people use medicated feed to protect the chicks against a protozoan disease called coccidia. I don’t believe in using medicated feeds unless the chicks show symptoms of illness. So far, I’ve never had to use it.
Most chicks are kept in brooders, which are essentially heated boxes bedded with pine shavings. These are safe places for the chicks to grow but not ideal. I think it is essential to give the chicks a clod of dirt with some greens attached the first week. The clump of earth is beneficial to the chicks in many ways. It exposes them to small amounts of local microbes so that they develop natural immunity. It gives them something to do, as even chicks get bored! It gets a bit of grit into their gizzards. Most importantly, it teaches the chicks to peck the ground and not each other. Providing that clod of dirt will greatly reduce aggression and pecking issues later. Do make sure, though, that there isn’t fine grass clinging to it. The greens should be sturdy so that the chicks peck little bits off. Dandelions are perfect for this. You don’t want them getting impacted crop from fine blades of grass. It is tempting to give the chicks other treats as well, everything from sunflower seeds to strawberries. But, remember that if the chicks were outside with a mamma, that they’d be moving and eating tiny bits of things and not standing still and gorging. You can give them treats, but in very small amounts, and make sure that they fill up on chick feed first. As soon as it is warm enough the chicks can go outside and peck and eat whatever they want. Just make sure that the bulk of their diet is a balanced chick feed that they get free choice.
For more about feeding chickens for the first 20 weeks, go here. | <urn:uuid:eb33b2a0-cf83-44be-92ed-8f52705c769c> | CC-MAIN-2017-39 | http://hencam.com/faq/what-to-feed-your-chickens/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818685698.18/warc/CC-MAIN-20170919131102-20170919151102-00647.warc.gz | en | 0.964481 | 2,792 | 2.703125 | 3 |
We’re bombarded with information – and often misinformation – about food. In newspapers and magazines, on Facebook and Twitter, in our day-to-day conversations. It’s no wonder anxious consumers are wringing their hands and asking more questions. Is organic better for me? Should I eat processed foods? Will GM foods harm me and my family?
It’s part of a growing skepticism among consumers about “big food.” The “factory farms” and “corporations” producing our food just can’t be trusted. They believe that mass production creates more opportunity for error, that industrialized food production is inherently impersonal, and that big companies will put profits ahead of public interest.
So how do we overcome this “big is bad” bias and ensure consumers that modern food production is worthy of their trust?
It boils down to transparency. Our annual research has shown that transparency builds trust. But what is transparency? Now we know.
The 2013 CFI consumer trust research defines transparency and provides a roadmap for agriculture and food to create Trust-Building Transparency. In our latest research, we identified seven components in our Trust-Building Transparency model.
- Motivation – Act in a manner that is ethical and consistent with stakeholder interests.
- Disclosure – Share publicly all information, both positive and negative.
- Stakeholder Participation – Engage those interested in your activities or impact.
- Relevance – Share information stakeholders deem relevant.
- Clarity – Share information that is easily understood and easily obtained.
- Credibility – Share positive and negative information that supports informed stakeholder decision making and have a history of operating with integrity.
- Accuracy – Share information that is truthful, objective, reliable and complete.
We then tested 33 attributes of the seven elements.
The results show that our definition of Trust-Building Transparency rings true with the public. More than half the respondents gave ratings of 8-10 on a 10-point scale on all 33 attributes. Their responses provide clear direction on exactly what we can do to overcome their bias and skepticism and earn their trust.
As a result, we’ve developed a Seven Steps to Trust-Building Transparency model and are excited to bring it to companies and organizations interested in building trust with their stakeholders and consumers. If you’d like to learn more please contact me, [email protected]. We’d be happy to partner with you as we work toward our shared goal of restoring consumer confidence.
P.S. I invite you to register for our free 2013 Consumer Trust Research webinars!
Food plays such an integral role in each of our lives. Consumed for both health and pleasure, in 3-square meals or snacks throughout the day, food is sustenance, pleasure and the root of so many conversations.
Food Day is a multi-dimensional national initiative created by the Center for Science in the Public Interest that celebrates “healthy, affordable and sustainably produced food and a grassroots campaign for better food policies.” The annual event will take place throughout the nation on Thursday, Oct. 24. Click here for more information about Food Day 2013.
As an integral partner in the food system, the Center for Food Integrity (CFI) believes that it’s important to be a visible and active participant in the messaging surrounding Food Day 2013 activities. This includes online interactions that share information from our more than 150 university experts on BestFoodFacts.com about subjects such as food production, responsible sustainability and being a transparent partner in the food system.
This year, CFI will highlight the topics of Education, Hunger Reduction and Support for Farms and Farmers for its focus during Food Day 2013.
- Education Best Food Facts, the consumer-facing website offers research on food resources and production.
- Hunger Reduction How can we use enhanced technology including genetically modified crops to feed the growing world populations? Global Hunger Solutions 2013.
- Support for Farms and Farmers Find first-account information from America’s farmers through CFI’s Farmers Feed US, Meet America’s Farmer YouTube channel and Seasons on Farm.
For more information about Food Day and how you can become involved, please visit www.cfiengage.com. We hope you’ll join us in celebrating food!
More than ever before, the way people get their information is rapidly changing.
According to CFI research, consumers are increasingly turning to online sources for information about the food system. How many times have you heard somebody say, “I read it on the internet!” Consumers also receive information from friends and family, their local television station, newspapers and radio as well.
Each of these sources of information provides an opportunity for you to engage with consumers. Offering yourself as a trusted source of information to local reporters is one way you can contribute accurate and meaningful content to stories about today’s food system.
We also encourage you to monitor local sources and make your voice heard when you see:
- Misinformation or inaccuracies - If you see an article or blog posting that contains misinformation about farming or the food system, contact the reporter, write a letter to the editor, or submit an online comment. Tell your story and present truthful information so consumers can see another side of the story.
- Opportunities to promote the benefits of today's food system - Oftentimes, there are numerous opportunities to proactively promote the benefits of today's food system, particularly during community events and holidays. Tie into the theme of the event or holiday and write an opinion-editorial article or post a short story online that delivers a timely and beneficial message.
Teddy Roosevelt said it best: “People don’t care how much you know until they know how much you care.”
Most consumers today are more than two generations removed from the farm. They don’t understand why farms look like they do today, why beneficial technology is used, or other recent advances in food production. What they want to know first and foremost is that farmers are doing the right thing and share their values.
For more information about shared values communication, please check out www.cfiengage.com.
Posted by Abby.
The media landscape today is a large canvas that can be painted from every imaginable angle with a spectrum of color. We’re more tuned in than ever before, and are constantly being bombarded with messages, advertisements, information and misinformation. Topics we’ve never heard of suddenly become mainstream issues that evoke panic and fear among the masses. And industry terms that we use every day can be misconstrued and, suddenly, we have an issue spiraling out of control that wasn’t even an issue just yesterday.
How does this happen? People’s use of media has changed. For example:
- Roughly two billion people are now connected to the internet
- Social media accounts for nearly 25 percent of time spent online
- Everyone with a cell phone has the potential to be a cinematographer
- Employees, consumers, customers, bloggers, social media food communities, activists, NGOs and others can all directly influence the public conversation about individual companies/brands/industries in a matter of seconds
- By the year 2015, 80 percent of the global population will have a personal mobile device that can be both a receiver and a transmitter
So how do we manage the influx of messages? At CFI, we utilize a proprietary media monitoring process to keep track of issues and trends within the food system. Our Strategic Intelligence and Trend Evaluation (SITE) process monitors more than 190,000 traditional news media sources as well as more than 300 million social media conversations. Our members have access to custom monitoring reports on issues that may impact their organization – from food safety to animal welfare to nutrition to environment – and can keep them up-to-date on developing and emerging issues.
So the next time the paintbrush strokes the canvas, we can monitor it to make sure the colors don’t run together.
Posted by Jenny.
A few years ago, funding opened up for the United States Department of Agriculture (USDA) to fund horse-harvesting facilities again. What does this mean for The Unwanted Horse?
The USDA has been working with harvesting facilities in New Mexico, Missouri and Iowa. In order for these facilities to start, they must be USDA inspected. Even though the horse meat will be exported, it will still go through the same process of inspection as beef, pork, and chicken. There is no worry for horse meat getting mixed in with other meat. The USDA Food Safety and Inspection Service (FSIS) said in a recent article from Farmers Futures that with the “stringent inspection process, testing capabilities, and labeling requirements, American consumers should not be concerned that horse meat will be labeled and sold as meat of another species.”
Horse slaughter is a sensitive topic. There are people who are all for it and ready to get the harvest facilities back open. Other people are completely opposed -- horses have been a part of history for such a long time, and they have gone from being a working livestock animal to a companion animal. Growing up, I wanted a pet horse just like every other girl, and this makes me hesitant to take sides. Many young girls and boys grow up wanting horses and seeing them as pets. This makes the topic of horse slaughter even more sensitive. There are animal rights groups that are taking action to prevent the facilities from opening.
So what are horses? Do they go in the same group with other livestock animals like cows, pigs and chickens? Or do they become permanent companion animals and live out their long lives?
One thing is for certain -- this is a topic that will continue to resurface with multiple opinions for years to come.
Posted by Kristin. | <urn:uuid:d943c4ca-871f-4864-b818-61e3961e9131> | CC-MAIN-2013-48 | http://www.foodintegrity.org/blog/posts/5 | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163785316/warc/CC-MAIN-20131204132945-00094-ip-10-33-133-15.ec2.internal.warc.gz | en | 0.935361 | 2,039 | 3.078125 | 3 |
Determination of the Basal Metabolic Rate
(BMR) - Schofield equation
Basal Metabolic Rate (BMR)
Basal metabolic rate (BMR) is the amount of energy required to
maintain the body's normal metabolic activity, such as respiration,
maintenance of body temperature (thermogenesis), and digestion.
Specifically, it is the amount of energy required at rest with no
additional activity. The energy consumed is sufficient only for the
functioning of the vital organs such as the heart, lungs, nervous
system, kidneys, liver, intestine, sex organs, muscles, and skin.
The resting and basal metabolic rate generally decrease with age or
if there is a decline in lean body mass. Activities that tend to
increase muscle mass (lean tissue) such as body building or strength
training (anaerobic activities), will also increase the basal or
resting metabolic rate. Aerobic activities such as running, skating,
or rope jumping may improve endurance but have little effect on the
basal or resting metabolic rate (see post-exercise expenditure
below). Other factors that may affect the BMR or RMR include stress,
illness, hormone levels (e.g. thyroid), environmental (e.g.
temperature or altitude) or any other factor that effects the normal
functioning of one or more vital organs.
Lean tissue requires significantly more energy to maintain because
of the increased level of metabolic activity. In contrast, fat
tissue requires very little energy to maintain and has little
influence on the resting or basal metabolic energy needs.
Greater lean body mass = Greater BMR or RMR.
Because individuals can increase their total lean body mass through
strength training (corresponding increase in skeletal muscle), it is
possible to increase the overall basal energy requirements at rest.
Current daily activity level?
Select a custom stress/activity factor:
Definition of activity levels: The activity level above will be used along with the BMR derived from the
Schofield equation to calculate an estimate of the daily energy needs (kcal/day)
|Male stress factor
||Female stress factor
Sedentary. Little to no
exercise. Inactive in both work and leisure.
Lightly active: Intensive exercise for at least 20 minutes once or twice
per week or daily routine includes some walking. Example: student.
Generally you do not exercise regularly, but you maintain a busy
life style that requires you to walk frequently for long periods.
Moderately active: Intensive exercise for at least 20 to 45 minutes 3 to
4 times per week or a job with a lot of walking, or a moderate intensity
Very active: Intensive exercise for 60
minutes or greater 5 to 7 days per week.
Labor-intensive occupations also qualify for this level. Labor-intensive
occupations include construction work (brick laying, carpentry, general labor,
etc.). Also farming, landscape worker or similar occupations.
Extremely active: Exceedingly active
and/or very demanding activities:
Examples include: athlete with an almost unstoppable training
schedule with multiple training sessions throughout the day or a very demanding job, such as shoveling coal or working long
hours on an assembly line. Generally, this level of activity is very difficult to achieve.
Dieting - BMR - RMR
Several of these calculators may be particularly useful for dieters. Just
about every single MAJOR calorie/ energy equation that has been released
over the last 90 years is included below. Each calculator has a customized
printout option for easy analysis. Recommendation: Try each calculator -
print out the results - then compare!
Estimated 'Calorie' Calculators
Estimation of total calories needed. MOST widely used equation for calculating basal metabolic rate and total calories.
Revised Harris-Benedict Equation:The original Harris Benedict equation was revised in 1984. This updated equation can be used to calculate the basal metabolic rate and total calories.
RESTING Metabolic Rate (RMR):
Resting Metabolic Rate Calc - This equation can be used to calculate the RESTING metabolic rate and total calories. Mifflin-St Jeor equation.
Schofield equation (BMR)
This equation was part of the previous government guidelines to formulate RDA's and can be used to calculate the basal metabolic rate and total calories needed.
Institute of Medicine Equation- LATEST EQUATION:
IOM Equation-Estimated Energy Requirement (EER) Estimation of total calories needed. This equation is behind the 2005 Dietary Guidelines for Americans and the new food pyramid, MyPyramid.
Check out the new BMR multi-calc
The Schofield Equation
allows one to estimate the basal metabolic rate (BMR) in calories based on
a few simple variables: gender, age, and weight. Height is not
required. The final result is given as a range and is adjusted upward or
downward from the calculated value based on the 'standard error of estimated' or
SEE (provided by the author). Individuals that have a much higher lean
body mass (reduced body fat), should use the upper end of the range, while
individuals with a greater body fat percentage should use the lower end of the
These equations were also published in 1989 in the government dietary guidelines
and were used to formulate the recommend daily allowances (RDA's) for energy
needs. In 2002, these equations were replaced by the Institute of Medicine
Schofield - Basal Metabolic Rate equations:
||BMR = 17.686 x (wt kg) + 658.2 SEE = 105
||BMR = 13.384 x (wt kg) + 692.6 SEE = 111
||BMR = 15.057 x (wt kg) + 692.2 SEE = 153
||BMR = 14.818 x (wt kg) + 486.6
SEE = 119
||BMR = 11.472 x (wt kg) + 873.1
SEE = 167
|BMR = 8.126 x (wt kg) + 845.6
SEE = 111
||BMR =11.711 x (wt kg) + 587.7
SEE = 164
|BMR =9.082 x (wt kg) + 658.5
SEE = Standard error of estimation
Basal metabolic rate (BMR) is the amount of energy required to maintain the
body's normal metabolic activity, such as respiration, maintenance of body
temperature (thermogenesis), and digestion. Specifically, it is the amount of
energy required at rest with no additional activity. The energy consumed is
sufficient only for the functioning of the vital organs such as the heart,
lungs, nervous system, kidneys, liver, intestine, sex organs, muscles, and skin.
Post-exercise energy expenditure
Skeletal muscle: 18%
: the amount of additional
energy (above the resting or basal metabolic needs) expended after an activity
depends on the intensity and duration of the exercise session. More intense
sessions tend to increase resting energy needs for longer time periods. These
increased energy requirements occur during the cool-down phase and are
short-lived. Sustained increases in the resting or basal metabolic rate can only
be obtained through regular strength training routines that increase lean body
Aerobic activity: short lived increases in RMR/BMR (cool-down period)
Anaerobic activity (regular): increases in lean body weight (LBW) --> Sustained
increases in RMR/BMR.
: The baseline BMR or RMR can be used along with
stress/activity factors to estimate the daily caloric needs of an individual - (Total Energy
Expenditure (TEE) (kcal/day)). See error rate below.Total Energy
The total energy expenditure (amount of calories needed per day) is composed of
three primary factors: (1) Resting or basal metabolic rate (2) Thermic effect of food (3) Activities of daily living (ADL) - physical
Thermic effect of food (TEF):
Rough estimation: TEF = Total calories consumed/day x 0.1
Example: 2000 kcal diet. TEF = 2000 x 0.1 = 200
TEF of protein >>carbohydrates>>fats.
versus predictive equations:
: Method: direct or indirect calorimetry.
BMR: Conditions: measured under very restrictive circumstances
and strict adherence to protocols. This method is generally impractical in
RMR: less restrictive conditions and more easily obtained. The
resting metabolic rate is only marginally different from the BMR.Predictive equations
An alternative method is to use predictive equations that can provide a rough
of the basal or resting metabolic rate. The basal or the
resting metabolism is the largest component of the total energy expenditure
(TEE).... usually 60 - 75%. The RMR or BMR is usually at the higher end of
this range for sedentary individuals (70-75%) and at lower the end for athletes.
Error rate of
The various predictive equations for determining the resting or basal metabolic
rates may significantly under or overestimate the total calories needed to
maintain the current weight of an individual when combined with stress/activity
factors that are selected by the user. This variance can approach 20% (over or
underestimation) depending on differences in body composition (lean versus
obese), actual activity levels (athletic versus sedentary lifestyle), and
energy levels expended in thermogenesis.
Predicting basal metabolic rate, new standards and review of previous work.
Hum Nutr Clin Nutr. 1985;39 Suppl 1:5-41. | <urn:uuid:09991a9c-fc7b-4f62-86ef-647327c6dddb> | CC-MAIN-2023-23 | https://globalrph.com/medcalcs/schofield-equation-bmr/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654097.42/warc/CC-MAIN-20230608035801-20230608065801-00455.warc.gz | en | 0.870101 | 2,412 | 3.40625 | 3 |
IT'S NOT the mice that were blind to danger at a bio-tech research facility in Newark, N.J. It was somebody at the Public Health Research Institute on the campus of the University of Medicine and Dentistry of New Jersey who apparently absconded with three mice carrying deadly strains of plague.
It begs the question of who, in the name of federal bioterrorism research, is minding the store at one of the top-level containment laboratories in New Jersey? And why did it take more than two weeks for the nearby community to be informed that the three missing mice were infected with the bacteria responsible for bubonic plague?
Apparently once it was discovered that the rodents had disappeared from separate cages in the lab, an intense but quiet investigation was launched by federal and state authorities. The Star-Ledger of Newark reported the FBI is on the case. The Centers for Disease Control and Prevention is also investigating, according to the newspaper.
But even as the search was under way, health experts assured the public there was scant risk from the disease-carrying mice infected with the deadly plague. State Health Commissioner Fred Jacobs said even if the mice got outside the lab they probably died already from the disease.
Not so reassuring.
Health officials say the bubonic plague is contracted through infected rodents or fleas by 10 to 20 people in the United States every year. Most cases can be treated with antibiotics, but about one in seven incidents is fatal.
The plague is not contagious, but left untreated can transform into a pneumonic plague, which can be spread from person to person.
The New Jersey research lab is involved in a six-year federal bio-defense project to discover new vaccinations for the plague- which some fear could be used as a biological weapon.
So the mice vanishing into thin air is more than a little troubling. And federal officials concede they may never be found if they were stolen, even eaten by other lab animals, or somehow misplaced in a colossal accounting error.
How is it that critical government missions to fortify national security through highly sensitive experimentation can themselves be so poorly guarded against security breaches or sloppy oversights?
Such lapses are inexcusable and frightening.
Guidelines: Please keep your comments smart and civil. Don't attack other readers personally, and keep your language decent. Comments that violate these standards, or our privacy statement or visitor's agreement, are subject to being removed and commenters are subject to being banned. To post comments, you must be a registered user on toledoblade.com. To find out more, please visit the FAQ. | <urn:uuid:eaea86a3-59a8-4ab0-9d3a-86b7778ca92e> | CC-MAIN-2017-26 | http://www.toledoblade.com/Editorials/2005/09/20/See-how-they-run.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321025.86/warc/CC-MAIN-20170627064714-20170627084714-00125.warc.gz | en | 0.966177 | 530 | 2.65625 | 3 |
"Solomon's reputation for possessing extraordinary wisdom fits the Ecclesiastes profile. David recognized his son's wisdom (1 Kings 2:6 & 9) before God gave Solomon an additional measure. After he received a 'wise and understanding heart' from the Lord (1 Kings 3:7-12), Solomon gained renown for being exceedingly wise by rendering insightful decisions (1 Kings 3:16-28), a reputation that attracted 'all the kings of the earth' to his courts (1 Kings 4:34). In addition, he composed songs and proverbs (1 Kings 4:32), activity befitting only the ablest of sages. Solomon's wisdom, like Job's wealth, surpassed the wisdom 'of all the people of the east' (1 Kings 4:30)." -The MacArthur Study Bible (NKJV Version), The Book of Ecclesiastes: Background and Setting
WHO WAS KING SOLOMON? Ecclesiastes 1:1
"The Words of the Preacher, the son of David, king in Jerusalem."
1) Preacher - qoheleth - n. masculine public speaker; speaker in an assembly
Unlike the modern, common use of the word "preacher" (a minister of religion), the use of the word here to identify Solomon is better defined as public speaker, particularly one who speaks to an assembly on the discourse of human affairs. (Gesenius's Lexicon) Rather than viewing Solomon as a preacher who stood in a pulpit to speak on religion, he is better viewed in a similar vein to a Greek orator. This is most likely because the matters of the holy Temple were attended to by the Levitical Priesthood while a king was concerned with ruling his kingdom.
2) Son - ben - n. masculine male child; child by characterization; member of a guild, order, or class
Solomon defined as "son" here first speaks to his relationship to David through procreation. He was indeed the biological male child of David. However, the second definition (by characterization) speaks more to Solomon's identity in light of his father's reputation and authority. He was not only David's biological child, he was also one who was obedient to David in David's role as king or lord over his kingdom. (Gesenius's Lexicon) Finally, Solomon is defined as a member of the "guild" of David, with David's kingdom being as one body (as is Christ's church - 1 Corinthians 12:12) and Solomon as a member of that body.
3) King - melek - n. masculine king; royal
Just as expected, "king" used here to identify Solomon eludes to his rule over his kingdom and his royalty. However, looking at melek more closely we find that the authority given as king here is not through an election by men, but by the appointment of Yehovah (the proper name of the one true God). (Gesenius's Lexicon) Specifically this applies to the king of Israel and of individual Israelites. (Gesenius's Lexicon) Melek is also used when referring to the worship of idols. (Gesenius's Lexicon)
**Have questions or comments? E-mail me at [email protected] or leave them in the comment section below. Discussion is welcome!** | <urn:uuid:50f08c1a-a20d-4c03-a575-a32ca4c688a0> | CC-MAIN-2017-39 | http://discoveringtheshepherd.blogspot.com/2016/05/solomon-decoded-who-was-king-solomon.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818695439.96/warc/CC-MAIN-20170926103944-20170926123944-00008.warc.gz | en | 0.96585 | 696 | 3.0625 | 3 |
What are immunization and vaccination?
Immunization is the process of becoming protected against a disease. But it can also mean the same thing as vaccination, which is getting a vaccine to become protected against a disease.
Why are vaccines important?
Vaccines are important because they protect you against many diseases. Since these diseases can be very serious, it is safer to get immunity from a vaccine than from getting sick with the disease. And for a few vaccines, getting vaccinated can actually give you a better immune response than getting the disease would.
Vaccines not only protect you; they also protect the people around you. This idea is called community immunity or herd immunity.
Normally, germs can travel quickly through a community and make a lot of people sick. If enough people get sick, it can lead to an outbreak. But when enough people are vaccinated against a certain disease, it's harder for that disease to spread to others. This means that the entire community is less likely to get the disease.
Community immunity is especially important for the people who can't get certain vaccines. For example, they may not be able to get a vaccine because they have weakened immune systems. Others may be allergic to certain vaccine ingredients. And newborn babies are too young to get some vaccines. Community immunity can help to protect them all.
Are vaccines safe?
Vaccines are safe. They must go through extensive safety testing and evaluation before they are approved in the United States.
What is a vaccine schedule?
A vaccine, or immunization, schedule lists which vaccines are recommended for different groups of people. It includes who should get the vaccines, how many doses they need, and when they should get them. In the United States, the Centers for Disease Control and Prevention (CDC) publishes the vaccine schedule.
It's important for both children and adults to get their vaccines according to the schedule. This makes sure that you get protection from the diseases at exactly the right time. | <urn:uuid:7fe62f90-5538-4dd9-a79b-60905402395c> | CC-MAIN-2023-23 | https://medsafe.io/vaccines-types/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649177.24/warc/CC-MAIN-20230603064842-20230603094842-00129.warc.gz | en | 0.973228 | 402 | 3.765625 | 4 |
Like supporting actors and actresses who never enjoy the spotlight, data types in SQL Server play critical roles and yet rarely receive attention. In fact, selecting the best data types for columns is one of the most important decisions during SQL Server table design. For that reason, let’s take a few moments to review some of the fundamental features of the most commonly used SQL Server data types.
Character data in SQL Server can be represented either by a one-byte-per-character data type or Unicode, a two-byte per character representation. In Unicode, the codes for written English contain zero in their first byte and the ANSI code for that character in the second byte. In other words, if you are using a Unicode type to store English, you are doubling your storage requirements and cutting your data read performance in half. Save Unicode for those cases where it is necessary.
Character data in SQL Server can also be saved in variable-length and fixed-length data types. If your data does not take up the full allotted space in a fixed-length column, the data is padded with spaces so it does. In contrast, in variable-length columns only the actual data characters are stored. While this seems to suggest that variable-length columns are better, variable-length columns incur overhead. For this reason, you should only use variable-length columns when the advantages are significant. As a rough rule of thumb, the first variable-length column in a table costs you four extra bytes per row. Each additional variable-length column in the table costs an additional two bytes per row. Furthermore, there is a small amount of additional processing associated with variable length data.
CHAR – fixed-length ANSI characters
VARCHAR – variable-length ANSI characters
NCHAR – fixed-length Unicode characters (The “N” stands for “national”.)
NVARCHAR – variable-length Unicode characters
In addition, VARCHAR(MAX) and NVARCHAR(MAX) can be used when data may (or actually does) exceed the roughly 8000 byte limit for fitting row data on an SQL Server page.
BINARY, VARBINARY and VARBINARY(MAX) are exactly analogous to CHAR, VARCHAR, and VARCHAR(MAX). The only difference is that the bytes in the binary data types are not assumed to represent character data. The SQL functions that operate on character data generally operate on binary data in exactly the same way.
The integer numeric data types are easy to understand. Since we want our table rows to take up as few bytes as possible, we simply select the smallest integer data type that can do the job.
BIGINT – an eight-byte type with a range of roughly minus to plus nine quintillion (not a number you bump into every day).
INT – a four-byte type with a range of
SMALLINT – two bytes, from
TINYINT – One byte. SQL Server’s only unsigned data type ranging from 0 to 255.
BIT – a single bit can be used to represent true/false, yes/no, up/down, or any other binary choice.
Of course, real world data ofter involves fractional quantities. For historical reasons, there are two names, DECIMAL and NUMERIC, for SQL Server’s exact decimal fraction data types. Doesn’t matter which name you use. Here, we’ll stick with DECIMAL. A DECIMAL declaration includes two specifications, precision and scale. Precision specifies the total number of digits and scale represents the number of digits to the right of the decimal point (In other words, how “big” the number is.) For example,
is suitable for a number that requires two places to the right of the decimal and a maximum of seven digits. The largest number that can be represented in this declaration would be 99999.99. DECIMAL supports a precision up to 38 digits, but as always we only declare a data type as big as we really need.
MONEY and SMALLMONEY
MONEY and SMALLMONEY are not ANSI standard data types and today are something of an anachronism, They were created in an era when the storage of DECIMAL data was inefficient for currency values. But Microsoft has improved the efficiency of the DECIMAL data type and MONEY not longer provides an advantage for data storage. Making matters worse, calculations using the MONEY date type can yield erroneous results. Don’t worry; if you only do sums your calculations will be correct. But this is not necessarily the case for calculations involving division. For example, an analyst may wish to calculate the fraction that each product contributes to the total revenue. In this calculation we are likely dividing small numbers by a substantially larger one. In such a case, we may well get an answer that is close, but not quite numerically correct. If you would like to learn more about the MONEY data type, Learning Tree has a blog on the topic: https://blog.learningtree.com/is-money-bad-the-money-datatype-in-sql-server/.
The FLOAT and REAL data types support the IEEE 754 standard for floating point data. For commercial applications, however, it is generally better to use the exact DECIMAL data type to represent decimal fractions. FLOAT and REAL incur roundoff error in ways often not appreciated by businesspeople. Best to leave floating point data to the scientists and engineers.
DATETIME is the oldest and still the most commonly used datetime data type in SQL Server. The precision is just a tad over three milliseconds. In many business applications saving time to the nearest minute is good enough, making SMALLDATETIME a better choice and saving four bytes for each data point.
Microsoft has introduced a number of new datetime data types which provide many advantages. DATE stores only the date with no time value, not only saving bytes but avoiding mishaps when query writers forget about the possible impact of time in the DATETIME data type, particularly when querying over intervals of time. DATETIME2 (not the most imaginatively named data type) provides greater precision. DATETIMEOFFSET can be valuable for global organizations, as it saves the time zone as well as the date and time.
We don’t have the time and space here to discuss all of SQL Server’s data types in the detail they deserve, but here are a few observations on some of the more specialized data types.
XML stores xml text in SQL Server, but is much more powerful than storing xml as a text data type as it provides the additional tools of XQuery and XPath to aid in the querying and manipulation of this data.
UNIQUEIDENTIFER is a huge number, sixteen bytes, that is required in some applications including merge replication and the use of filestream data storage. In general, however, uniqueidentifier is a poor choice for keys. Keys usually appear in multiple locations in a database, and unnecessarily repeating sixteen byte keys is generally wasteful. Use UNIQUEIDENTIFIER only when it is required by the task at hand.
GEOMETRY and GEOGRAPHY are types used to represent spatial data. Spacial data could include diagrams and office floor plans, but is quite often map data. Geometry is a flat representation and geography takes into account the curvature of the earth. Clearly these are specialty items; you either don’t need them or you need them a lot.
Selecting the most suitable data types in SQL Server is a task that should receive careful attention. We’ve provided a brief overview here, but this should only be the beginning of a careful exploration of SQL Server data types. including the advantages and disadvantages of each.
AUTHOR: Dan Buskirk
SQL Server Training | <urn:uuid:cbd6c774-2c4e-4c8c-a7b2-ad0531138e41> | CC-MAIN-2020-24 | https://blog.learningtree.com/uk/quick-guide-sql-server-data-types/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347419056.73/warc/CC-MAIN-20200601145025-20200601175025-00596.warc.gz | en | 0.900523 | 1,641 | 2.96875 | 3 |
A scientifically proven medical plan.
Skin cancer is a growth of abnormal skin cells. There are different types on skin cancer, melanoma being the most dangerous and basal cell being the most common. Skin cancers may have many different appearances and therefore, anything suspicious should be looked at by a physician.
Suspicious skin conditions include spots that appear shiny, scaly, rough, firm and red, crusty or bleeding. Any suspicious mole, sore or skin growth should be looked at by a physician immediately as the outlook depends on how quickly it is diagnosed.Minimized sun exposure and the protection of SPF sunscreen applied every two hours are the most effective methods of preventing skin cancer. | <urn:uuid:f809d68b-3ad4-4d35-94bf-90b8326f28d7> | CC-MAIN-2017-34 | http://www.renucosmeticlaser.com/medical-services/skin-cancer/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886117911.49/warc/CC-MAIN-20170823074634-20170823094634-00514.warc.gz | en | 0.953752 | 138 | 3.265625 | 3 |
Firstborns may be at higher risk for heart disease and diabetes than their later-born counterparts, new findings suggest.
In a small study from New Zealand, researchers looked at 50 overweight men ages 40 to 50, and compared the body mass indexes (BMIs) of the men who were firstborn in their family, with those who were born second. The researchers also examined the men's level of sensitivity to insulin, the hormone that regulates blood sugar levels.
They found that although the two groups of men had similar average heights, the firstborns were 15 pounds heavier on average. And among firstborns, the average BMI was 29, compared with 27.5 for second-born men. People with higher BMIs are known to be at increased risk of heart disease.
Insulin sensitivity in firstborns was 33 percent lower than in second-born men, according to the study. In people with low sensitivity to insulin, body cells are less able to respond to insulin, so the pancreas has to make more to compensate. The condition brings an increased risk of developing Type 2 diabetes.
The results held after the researchers controlled for other factors that could affect BMI and insulin sensitivity, such as the men's body fat, age and physical activity, according to the study published February 6th in the journal Scientific Reports.
The findings suggest that birth order could potentially have long-term health effects, according to the study researchers at the University of Auckland. However, larger studies that, ideally, compare siblings to each other are needed to confirm the findings, they said.
Several earlier studies suggested that birth order may influence metabolism and body composition in children. Research has shown for example, that firstborns weigh less at birth but grow faster during infancy, and have reduced insulin sensitivity and higher daytime blood pressure, as well as higher cholesterol during young adulthood.
It's unclear how birth order might influence metabolism, but it is possible that differences in placenta blood flow play a part, the researchers said. During a woman's first pregnancy, the blood vessels in the uterine lining undergo lasting structural changes, providing a more favorable environment for subsequent fetuses.
The researchers cautioned that their study only looked at overweight men, living in urban areas, and the findings may not apply to other groups of people.
Copyright 2014 LiveScience, a TechMediaNetwork company. All rights reserved. This material may not be published, broadcast, rewritten or redistributed. | <urn:uuid:4d6485da-2216-4a59-aaa7-b67c63cb0608> | CC-MAIN-2017-30 | http://www.foxnews.com/health/2014/02/07/firstborns-may-have-higher-heart-disease-diabetes-risks.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424559.25/warc/CC-MAIN-20170723122722-20170723142722-00683.warc.gz | en | 0.966973 | 497 | 3 | 3 |
Definition of Segawa dystonia
Segawa Dystonia: An important variant form of dopa-responsive dystonia (DRD).
DRD typically begins in childhood or adolescence with progressive difficulty in walking and, in some cases, with spasticity. DRD, by definition, can be successfully treated with dopa.
In Segawa dystonia, the symptoms fluctuate during the day from relative mobility in the morning to increasingly worse disability in the afternoon and evening and after exercise.
Last Editorial Review: 8/28/2013
Back to MedTerms online medical dictionary A-Z List
Need help identifying pills and medications? | <urn:uuid:16a09d3b-5cb5-4bf3-9bdd-99e82406de1b> | CC-MAIN-2014-23 | http://www.medterms.com/script/main/art.asp?articlekey=5441 | s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997894289.49/warc/CC-MAIN-20140722025814-00001-ip-10-33-131-23.ec2.internal.warc.gz | en | 0.90853 | 134 | 2.578125 | 3 |
Products from Amazon.com
Price: Out of stock
Price: Check on Amazon
Botanical Name: Epigaea repens
Species: E. repens
Common Names: Mayflower or Trailing arbutus
Habitat: Epigaea repens is found from Newfoundland to Florida, west to Kentucky and the Northwest Territories. It is found in sandy soil in many parts of North America, in the shade of pines. Its natural home is under trees, and it will thrive in this country only in moist, sandy peat in shady places. It has long been known in cultivation here as an ornamental plant, having been introduced into Great Britain in 1736. Like the common Arbutus, or the Strawberry Tree and the Bearberry, it belongs to the order Ericacece, the family of the heaths.Slow growing, it prefers moist, acidic (humus-rich) soil, and shade. It is often part of the heath complex in an oak-heath forest.
Epigaea repens is a small evergreen creeping shrub, It grows but a few inches high, with a trailing, shrubby stalk, which puts out roots at the joints, and when in a proper soil and situation multiplies very fast. The evergreen leaves are stalked, broadly ovate, 1 to 1 1/2 inches long, rough and leathery, with entire, wavy margins and a short point at the apex. Branches, leaf-stalks and nerves of the leaves are very hairy. The flowers are produced at the end of the branches in dense clusters. They are white, with a reddish tinge and very fragrant, divided at the top into five acute segments, which spread open in the form of a star. The plant flowers in April and May, but rarely produces fruit in England. It is stated to be injurious to cattle when eaten by them.
The species flowers are pink, fading to nearly white, very fragrant, about .5 inches (1.3 cm) across when expanded, few or many in clusters at ends of branches. Calyx of five dry overlapping sepals; corolla salver-shaped, the slender, hairy tube spreading into five equal lobes; 10 stamens; one pistil with a column-like style and a five-lobed stigma. Stem: Spreading over the ground (Epigaea = on the earth); woody, the leafy twigs covered with rusty hairs. Leaves: Alternate, oval, rounded at the base, smooth above, more or less hairy below, evergreen, weather-worn, on short, rusty, hairy petioles.
Landscape Uses:Rock garden, Woodland garden. Requires an open lime-free humus-rich soil and shade from direct sunlight. Grows well in the shade of other calcifuge plants such as rhododendrons and also under pine trees. A very cold-hardy plant but it is often excited into premature growth by mild winter weather and is then subject to damage by frost. The flower buds require a period of chilling to about 2°c before they will open. The flowers are deliciously and strongly scented with a rich spicy perfume. There are some named varieties, selected for their ornamental value. A difficult plant to grow in cultivation and very hard to transplant successfully. Another report says that although the genus is generally difficult to cultivate, this species is relatively easy to grow. Special Features:Attractive foliage, Fragrant flowers.
Seed – best sown as soon as it is ripe in a shady position in a cold frame. Another report says that the seed requires no pre-treatment and can be sown in late winter in a cold frame. Surface sow and place the pot in light shade, do not allow it to dry out. The seed usually germinates in 3 – 5 weeks. As soon as they are large enough to handle, pot up the seedlings into individual pots. Be very careful since they strongly resent root disturbance. Grow them on in light shade in the greenhouse and plant them out in their permanent positions in the late spring of their second years growth. Cuttings of half-ripe wood, July/August in a frame.Take the cutting with a part of the previous year’s growth. (This report is unclear as to whether it means a heel of older wood or just a small section of older wood) Plants self-layer and can be divided in the spring but this must be done with great care since they deeply resent root disturbance.
Edible Uses: Flowers – raw. Fragrant, with a spicy slightly acid flavour, they are eaten as a wayside nibble or are added to salads. Thirst quenching.
Astringent; Diuretic; Tonic.
Mayflower is rarely used medicinally, even in folk medicine, though it is a strong urinary antiseptic and is one of the most effective remedies for cystitis, urethritis, prostatitis, bladder stones and particularly acute catarrhal cystitis. The leaves are astringent, diuretic and tonic. An infusion is made from the dried leaves, or a tincture from the fresh leaves. A tea made from the leaves is used in the treatment of kidney disorders, stomach aches, bladder disorders etc. It is of special value when the urine contains blood or pus. Use with caution, the plant contains arbutin and, although this is an effective urinary disinfectant, it hydrolyzes to hydroquinone which is toxic. The leaves can be used fresh or can be harvested in the summer and dried for later use
Plants can be grown for ground cover, they should be spaced about 25cm apart each way and form a carpet of growth. This species is probably not very worthwhile for ground cover in Britain because of its difficulty to cultivate.
Disclaimer : The information presented herein is intended for educational purposes only. Individual results may vary, and before using any supplement, it is always advisable to consult with your own health care provider. | <urn:uuid:bf94c2f0-03f2-4faf-859d-3ecfff732a3d> | CC-MAIN-2017-47 | http://findmeacure.com/tag/arbutus/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805687.20/warc/CC-MAIN-20171119153219-20171119173219-00046.warc.gz | en | 0.940534 | 1,252 | 2.96875 | 3 |
Distance between two points
If two perpendicular line passes through any point O then we called point O as origin .in above figure YOY' is perpendicular to XOX' and passes through point O so O is origin and YOY' is called y-axis and XOX' become x-axis. both perpendicular line known as a axis of coordinates. We describe axis as positive and negative From origin O right side line OX is positive and left side line OX' is negative and same rule applied for Y axis from origin O , OY is positive and OY' is known as negative.
perpendicular line XOX' and YOY' divided the plane into four part that parts are known as quadrants .in the above figure YOX is first quadrant , YOX' is second quadrant,X'OY' is third quadrant and XOY' is known as forth quadrant.
values of x and y in respective to quadrant
First quadrant values x>0 and y>0
Second quadrant values x<0 and y>0
Third quadrant values x<0 and y<0
Forth quadrant values x>0 and y<0
coordinates of origin is always (0,0)
Find points location in coordinates
X and Y coordinates of point P is x=2, y=2 both are positive so points lies in first coordinates.
X and Y coordinates of point Q is x=-5, y=2 here x is negative and y is positive so points lies in second coordinates.
X and Y coordinates of point R is x=-4, y=-5 here x is negative and y is also negative so points lies in third coordinates.
X and Y coordinates of point S is x=3, y=-7 here x is positive and y is negative so points lies in forth coordinates.
According to these axis and quadrant we can find location of points for example if any point P(x,y) located in these coordinate and value of x and y is (1,3) both are positive then that points located in first quadrants .
Find distance between points
Distance between two points is a length of straight line that use to join both point in plane or quadrants.
in above figure point P(1,3) and point Q(4,1) joining by line PQ so distance between points is length of line PQ.
Formula for finding distance between two point P an Q is:
Put the value of point P(x1,y1,) and Q(x2,y2) and get distance between point | <urn:uuid:133c75ed-1529-407a-8f4c-b8f9ec786575> | CC-MAIN-2017-34 | http://www.mathsolution.net/co-ordinate-geometry/distance-between-two-points.php | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105304.35/warc/CC-MAIN-20170819051034-20170819071034-00549.warc.gz | en | 0.937584 | 541 | 4.25 | 4 |
Diphtheria is a bacterial infection caused by Corynebacterium diphtheria which is transmitted through close contact with an infected individual, usually through respiratory secretions in the air. It is known as “The Strangler” because the toxins produced by the bacteria causes a thick film to develop in the throat which makes it more and more difficult to breath, ultimately leading to strangulation. The spread of the toxin in the body can also lead to serious issues with the heart, and other vital organs. It was found that some people were chronic carriers without knowing it or contracting the disease.
Medical reports of the “strangling disease” first appeared in the 1600's. Becoming a great threat as cities grew and became more populated. The more people, the greater the spread of the disease. In the 19th century, diphtheria became a major cause of death, fueled by the Industrial Revolution and the increased population in urban communities. Though mostly a disease associated with the poor and a particular threat to children, diphtheria did not discriminate by class or age. It's cause, route of spread, and a cure remained a mystery until the last part of the 19th century.
Underscoring diphtheria's broad threat was demonstrated with the death of Princess Alice, daughter of Queen Victoria of England, in 1878 at the age of 35. Alice fell ill after 4 of her 7 children and her husband, Duke of Hesse-Darmstadt were all stricken with the disease. Alice and her youngest child died. Ironically none of the rest of the 60 members of the household were affected. It was thought that the disease could be spread by the kiss of a mother and child which is where the term “kiss of death” come from.
|Princess Alice - 1870's ( Public image from Wikipede)|
Diphtheria raged through the United States and Canada during the same time period. While doing research for my Tombstone Tuesday blog I came across the Utter family in my family tree. Daniel Utter was born in Wentworth Ontario, Canada in April 10, 1831. Julia Ann Hainer was the daughter of John and Nancy (Bowman) Hainer. She was born on October 2, 1838 in Brant, Ontario. ( I am related to Julia Ann through the Hainer family.) They were married in Brant, Ontario on April 16, 1855. Daniel was a Blacksmith in Burford, Brant County, Ontario.
They began their family in 1859 with the birth of a son, John and every couple of years or so they had another child; Next was Annie born in 1862, then Melissa born in 1864, then Mary in 1866, Charles in 1871, Rosa Belle in 1872, William in 1874 and Nancy in 1875.
In the 18th of December, Mary became sick with diphtheria and she died on December 24th. On December 21st, Anne became ill, on the 23rd Nancy and Melissa became ill and by the 25th, Charles became ill all stricken with diphtheria. Five children from this family became ill within a week. On December 27th, Anna, Charles and Nancy all died on the same day. Melissa died the following day on the 28th of December. On December 28th Rose Belle became ill and on January 2nd William became ill. William died on January 7th and Rose Belle died on January 8th, 1878.
It is very hard for me to imagine what it must have been like to watch and try to care for each of these children as they died this horrific death. Julia and Daniel lost 7 children to diphtheria beginning on December 18th of 1877 and ending on January 8th of 1878. They had one child who did not get diphtheria, that was the oldest son, John. He would have been 18 years old at the time and was likely working somewhere out side of the home. With the onset of the disease, the house would have been placed under quarantine. John would have to stayed away.
|Seven graves of the Utter Children|
In the 1881 Canadian Census, John is still living at home and is age 22 and Julia and Daniel have begun the rebuild their family. They have a son William who is 3 years old and a daughter Nancy who is 7 months old. By the 1891 Census, they have another son, Elroy who is 5 years old.
Julia Ann died in December 27, 1899 of a Liver disease. Daniel remarried and is found in the 1901 census with his new wife Catherine and the two youngest children, 20 year old Nancy and 15 year old Elroy. Catherine Ann Utter, Daniel's Second wife died on April 24, 1920 and is buried in Brookton Ontario. Daniel died November 22, 1920 at the age of 84.
The Diphtheria Bacterium was finally identified in the late 1880's and in the 1890's a diphtheria antitoxin was developed in Germany to treat victims of the disease. The antitoxin was prepared after horses were injected with larger and larger does of the toxin. The toxin cause no harm in horses and it stimulated an immune response and the white blood cells were processed into an antitoxin. The antitoxin, when given in time and in large doses, saved lives but it did not prevent diphtheria nor did it stop it from spreading.
In 1924, there were 9000 cases of diphtheria in Canada resulting in 2000 deaths. In 1923, Gaston Ramon, at the Pasteur Institute in Paris, discovered that when the Diphtheria Toxin was exposed to minute quantities formaldehyde and heated, the toxin became nontoxic and could stimulate the immune system and the first vaccine was born.
I just could not pass up the chance to tell this tragic story. I know that diphtheria had tragic results in many families. I know that through my research I have seen other child who died from this disease but to have 7 children from the same family died in a span of about three weeks was just very hard for me to comprehend. | <urn:uuid:a1bb05a1-7d34-4258-8dae-e85e57e252de> | CC-MAIN-2017-30 | http://jlsmithfamilyhistory.blogspot.com/2016_04_01_archive.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424154.4/warc/CC-MAIN-20170722222652-20170723002652-00588.warc.gz | en | 0.990047 | 1,266 | 3.546875 | 4 |
Math Monday: Kirigami Polyhedra
JUNE 28, 2010
Kirigami is a traditional art of cutting paper. Ulrich Mikloweit takes it a step further by assembling many pieces of kirigami into intricate mathematical models. This is a snub dodecadodecahedron made from 924 cut and colored facets.
Ulrich has dedicated years to making hundreds of such hand-cut models, which can be seen on his website.
The simplest possible polyhedron is the tetrahedron. It consists of just four triangles, but it is still visually interesting when made by Ulrich with his hand-cutting techniques.
This compound of five tetrahedra (one in each of five colors) shows how the faces continue in the interior of the form and how the cutouts allow you to see the many levels of internal structure. | <urn:uuid:a7fb5449-ef11-4450-9b24-fcc08d5b2f64> | CC-MAIN-2013-48 | http://momath.org/home/math-monday-06-28-10/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164029048/warc/CC-MAIN-20131204133349-00030-ip-10-33-133-15.ec2.internal.warc.gz | en | 0.955083 | 181 | 2.90625 | 3 |
- SHALMANESER III
- (reigned 858–824 B.C.)Assyrian king, son and successor of Ashurnasirpal II. Having inherited the vast empire his father had built, he was hard-pressed to maintain Assyrian hegemony in the face of widespread revolts. He relied on diplomacy coupled with a show of force when deemed necessary and thus managed to expand Assyrian influence even further. The most persistent problems were in Syria. Here a coalition of local rulers was formed who assembled their troops for a violent confrontation with Assyrian forces. This alliance was commanded by the sheikh of the Bit-Adini, who were a powerful tribe. Sennacherib defeated them, and Bit-Adini became an Assyrian province. Some time later, though, he faced a much more serious contingent of rebellious polities led by the kings of Hamath and Damascus. Here, too, he claimed victory in a great battle at Qarqar on the Orontes in 853, but the coalition was to continue its resistance activities for some years after that.Shalmaneser was on friendly terms with Babylonia and supported its king, Marduk-zakir-shumi, when he faced a rebellion by his own brother. Sennacherib used the opportunity to show his strength to the Aramean and Chaldean tribes and made a tour of the major Babylonian temples. He also campaigned in Anatolia, especially against Urartu. In his capital, Kalhu, he built temples, a ziggurat, and a large fortress.
Historical Dictionary of Mesopotamia. EdwART. 2012. | <urn:uuid:eefec88d-c477-4ce2-9d83-dad557e5fcae> | CC-MAIN-2017-34 | http://mesopotamia.enacademic.com/308/SHALMANESER_III | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105927.27/warc/CC-MAIN-20170819220657-20170820000657-00521.warc.gz | en | 0.975354 | 343 | 3.28125 | 3 |
Presentation on theme: "Sarah Teetzel, PhD, True Sport Champion April 28, 2011 MPESA meeting."— Presentation transcript:
Sarah Teetzel, PhD, True Sport Champion [email protected] April 28, 2011 MPESA meeting
Canadas national movement for sport and community.
What is a Movement? Derek Sivers: How to start a movement Please view the clip at: http://www.youtube.com/watch?v=V74AxCqOTvg
to help sport live up to its full potential as a public asset by making a significant contribution to the development of youth and quality of life in our communities. The True Sport Movements Core Mission …
2002 Public Opinion Research Over 90% of Canadians believe in sports capacity to contribute to the moral and character development of young people. Yet, less than 20% felt the current sport system in Canada was delivering on this promise. The Sport we HAVE is not the Sport Canadians WANT!
2008 The True Sport Report – What Sport Can Do International literature review to support the notion of sport as a valued public asset Benefits of good community sport include: Improved health and well being Positive life course for children and youth Stronger more inclusive communities Economic development and renewal Greater environmental sustainability
At the heart of True Sport is a simple idea … good sport can make a great difference …a great difference in the lives of those who participate in it and a great difference in the communities that support it
W e call good sport True Sport … the sport Canadians want
Fairness o Excellence o Inclusion o Fun True Sport Values
Go For It o Play Fair o Respect Others o Keep It Fun o Stay Healthy o Give Back Principles for Sport
Recognize Sport as a Valuable Community Asset o Champion Ethical Conduct o Promote Inclusion o Strengthen Connections o Support Excellence o Foster Healthy, Active Lifestyles o Create Safe and Welcoming Environments o Celebrate Contribution Principles for Communities
True Sport Members Teams & Clubs Sport Organizations Schools Facilities Communities Allies Citizens
Join TRUE SPORT Commit Live TRUE SPORT Lead by example Grow TRUE SPORT Encourage others Stages of Engagement
Guided Direction o What You Can Do Guide o Council Resolutions o Presentations o True Sport Day o Values Agreement o E-learning o Engagement Kits
Why True Sport? Initiate a discussion Come together as a community AND become part of our larger True Sport community Gain access to our tools and resources Public expression of what you stand for Work towards the good sport that Canadians want
Current School-Based Members in MB Henderson Elementary School, Dauphin Sigurbjorg Stefansson School, Gimli WebWeb Lakewood School, Winnipeg The Horse Connection Inc., Winnipeg
True Sport offers many resources for Schools and Teachers http://www.truesportpur.ca/en/page-40-schools
For more Information True Sports website has many resources for schools http://www.truesportpur.ca/en/page-111-schools Please consider encouraging the schools in your division to become a True Sport School by making a conscious decision to join the True Sport Movement. Involving the administration and student council in the decision helps spread the True Sport message. | <urn:uuid:3c4a7e11-c6c3-4a57-8555-cd813e1c90ca> | CC-MAIN-2017-43 | http://slideplayer.com/slide/1528782/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825900.44/warc/CC-MAIN-20171023111450-20171023131450-00801.warc.gz | en | 0.878139 | 665 | 2.609375 | 3 |
For this article in Spanish, read it here.
Tobacco use remains the leading cause of preventable death in Washington. While helping smokers to quit is important, it is also critical to prevent young people from ever first starting to smoke or vape.
On January 1, 2020, Engrossed House Bill 1074 raised the legal age of the sale of tobacco and vapor products in Washington from 18 to 21 to protect youth from accessing these unhealthy products. The bill also states a person who sells or gives, or permits to be sold or given to any person under the age of 21 years any cigar, cigarette, cigarette paper or wrapper, tobacco in any form, or a vapor product is guilty of a gross misdemeanor.
According to the Center for Disease Control and Prevention, nearly 9 out of 10 cigarette smokers first try smoking by age 18 and 95 percent first tried smoking by the age of 21. Also, alarming is that each day in the U.S. about 1,600 youth under 18 years of age smoke their first cigarette and nearly 200 youth under 18 years of age become daily cigarette smokers.
In Washington, the number of youth using cigarettes in 2018 is less than half of what it was in 2008. Yet with the introduction of vape products, there’s been a significant increase in the use of those products among Washington’s young people. Between 2016 and 2018, E-cigarette/vapor product use in 8th-grade students rose from six to 10 percent, in 10th graders vaping increased from 13 to 21 percent and in high school seniors, vape use rose 10 percent and is now seen to be at 30 percent.
Often teens believe vaping is safer than smoking. Only about one-third of 10thgrade youth perceived great risk of harm from using electronic cigarettes regularly, although almost three-fourths perceived great risk from smoking one or more packs of cigarettes a day.
The Washington State Healthy Youth Survey conducted in 2018 shows alarming statistics. In Lewis County, the numbers are even higher with the results of the survey conducted in 2018 showing even more youth here using tobacco compared to the state numbers.
The 2018 Washington State Healthy Youth Survey also shows that youth find vapor products accessible with 68 percent of 10th graders reporting they borrowed vapor products, asked someone to purchase them or get them from a family member.
Young teens may not be buying tobacco products themselves, yet it is evident that many older teens and young adults are the people who purchase cigarettes and vape products for minors. By raising the minimum age to buy these products there is a decrease of access to tobacco products to students who use social sources like older friends and classmates to access them.
The National Institute of Medicine predicts that by increasing the age of sale for tobacco products to 21, there is a significant reduction in the number of adolescents and young adults who start smoking, reduced deaths from smoking and an immediate improvement of the health of adolescents and young adults.
The National Institute of Medicine also estimates by raising the minimum age for the sale of tobacco products to 21 will, over time, reduce the smoking rate by about 12 percent and smoking-related deaths by ten percent in the United States.
It has worked before when the minimum legal age for purchasing alcohol was raised. Nationally the increase was successful in reducing adverse effects of alcohol consumption including reduced drinking among youth, decreased alcohol dependence and less drunk driving fatalities.
By reducing the youth smoking rate, it not only saves lives but also reduces health care costs. In Washington every year, 2.81 billion dollars in health care costs are directly attributed to tobacco use. Yearly, the cost to individual households in Washington is $821.
By raising the age to buy tobacco and vaping products to 21, lawmakers are protecting the youth of Washington by reducing the number of kids who develop a lifelong addiction to nicotine. “This is a step forward for health in our community and across the state,” says JP Anderson, MSW Director for Lewis County Public Health & Social Services. | <urn:uuid:4cd0031e-d61f-43e6-a3b8-4d2b826b55d1> | CC-MAIN-2020-24 | http://www.lewistalk.com/2020/05/18/raising-the-legal-tobacco-age-from-18-to-21-saves-lives/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347432521.57/warc/CC-MAIN-20200603081823-20200603111823-00217.warc.gz | en | 0.951672 | 811 | 3.125 | 3 |
Saturday, December 14, 2013
An experiment created by Palmetto Scholars Academy (PSA) students is headed for outer space through the national science, technology, engineering and mathematics (STEM) program called the Student Spaceflight Experiments Program (SSEP) aboard the Orb-1 Cygnus Rocket for Mission 4 to the International Space Station whick left on Dec. 8.
“SSEP is designed to empower the student as scientist, and within the real-world context of science. Student teams design a real experiment, propose for a real flight opportunity, experience a formal proposal review process and go through a NASA flight safety review. They even have their own science conference at the Smithsonian’s National Air and Space Museum, where they are immersed in their own community of researchers”, said Dr. Jeff Goldstein, creator of SSEP and National Center for Earth Science Space Education (NCESSE) Center Director. “With Palmetto Scholars Academy participating in Mission 4, for the first time hundreds of South Carolinian students will become real microgravity researchers as part of SSEP.”
“This is the first time that a South Carolina school has participated in the Student Spaceflight Experiments Program,” states Kellye Voigt, PSA Science teacher and SSEP Community Program Director. “The combined efforts of the board, administration and faculty have made it possible to provide this STEM-based research experience to our students.”
The SSEP is undertaken by the NCESSE (http://ncesse.org), a project of the 501(c)(3) Tides Center, in partnership with Nanoracks, LLC (http://www.nanoracksllc.com).
This on-orbit educational research opportunity is enabled through NanoRacks, which is working in partnership with NASA under a Space Act Agreement as part of the utilization of the International Space Station as a National Laboratory. | <urn:uuid:09764499-a087-4b43-8e15-3de6ae675958> | CC-MAIN-2014-41 | http://www.moultrienews.com/article/20131214/MN06/131219940/1007/MN06/palmetto-scholars-academy-students-experiment-heads-to-space | s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657133417.25/warc/CC-MAIN-20140914011213-00196-ip-10-196-40-205.us-west-1.compute.internal.warc.gz | en | 0.928171 | 401 | 2.921875 | 3 |
|In court? Need assistance? JurisDictionary|
Portions of this publication are copyrighted by Delta Spectrum Research. Permission is hereby granted to any individual or entity to copy this booklet as long as it is presented in its entirety and no pages, quotations, or text are omitted, and that this copyright notice appears in its original form on all copies.
Want to learn more about The Law? Join our discussion list.
Our American Common Law
Common Law is a real thing. It is a real system of laws derived from centuries of work, study and sacrifice of millions of people. It is not trivial and inconsequential as some would have you think. It is the Common Law that is most represented within Our Constitution, Declaration of Independence and Our Bill of Rights. These documents were designed to limit and eliminate the vicious Equity, Maritime or Admiralty Law which was what we revolted against as Our Revolution against the totalitarianism of England.
Did you know the Anglo-American system (Our system) of jurisprudence is the only one which developed out of what is called the Common Law, that is, the general law of private property known in the British Isles? It is true - Common Law was designed through the centuries to secure the rights of individuals (you and me) to property and to make it difficult for property to be taken away from us by a government or governmental structure (bureaucracy) without due process of law. The Common Law was expounded over the years in hundreds of thousands of case decisions as a result of trials in which the Common Law jury acted as the Judges, and in which they exercised the authority to hear and decide questions of both Law and fact. Common Law deals with legal relationships, powers and liabilities, and types of actions rather than theoretical definitions of abstract legal concepts. The Common Law was recognized by Our Founding Fathers and is the basis of all law in America today.
The Common Law recognizes the Power of Government lies in the common people and not in an elite group of power brokers. It is the terrible Equity, Maritime or Admiralty Laws (laws of contract) that steals this power from the people and centralizes it into the hands of a few power oriented men. The Common Law deals in real property whereas the Equity Laws deal in written abstractions of performance (agreements or contracts). In other words, Masters own their own property, work and destiny. We are all Masters when we truly own our own property. Slaves do not own property, they usually rent property of another and are compelled to perform upon or with that rented (tenured) property according to some agreement or contract.
It is from such controversies involving property that all of our Rights have come. Property is known as Substance at the Common Law, and includes hard Money in the form of gold and silver coin as required by Our federal Constitution and every other State Constitution as they were all drafted to be in perfect harmony one with another.
Controversies involving these matters carry with them a Law jurisdiction, a jurisdiction in which all of our Rights are found. The Judge in a Court of Common Law is an impartial referee of the dispute, and he is bound to protect the Rights of the parties to the dispute, or he will have lost whatever jurisdiction he may have had, or claimed to have had. It is the Jury who decides whether or not the Facts of the case are valid and they also decide the Law - does it apply? Is it correct for this case?, etc. Only judges acting under equity law can decide law...
You know you are in an Equity/Admiralty Court when an American flag is displayed that has a GOLD trim. The gold trim denotes military jurisdiction and not Common Law or Constitutional jurisdiction. Wherever this flag is flown the Constitution is NOT. To see the civilian flag click here.
Gold and silver Coin are the only Things recognized at Law (within our Constitution) to be real and lawful money. Money is Substance in possession and not a Chose (thing) in action. When a debt is paid, at Law, the debt is extinguished; debt no longer exists; the debt is paid. Debt can only be paid with gold and silver Coin, or certificates redeemable on demand, at par, in gold and silver Coins. This is the legal meaning of the expression "tender in payment of debt", as found in Article I, Section 10 of the Constitution of the United States. Federal Reserve Notes are not money - they are bills/notes and/or certificates of indebtedness as each and every one of them are owed back to the Federal Reserve Bank who lent them to Us - plus interest.
Thomas Jefferson placed great emphasis on the concept of Rights. He said we did not bring the English Common Law, as such, to this continent; we brought the Rights of Man as evidenced through and by the tried and true ancient system of Common Law.
The Common Law of the States of the United States is the Common Law of England adopted by the original Constitution of the United States, so far as not modified by any alterations made by the Constitution of the State at the time of admission to the Union, and so far as not in direct conflict with the Constitution of the United States of America.
And the Common Law of the States may not be modified, limited nor abrogated either by an act of the legislature (Congress or State Legislature) or by a ruling of some judge or by any county board of commissioners or any other servant to the people. Federal and state bureaucracies are constantly writing and presenting code, rules or statutes in an attempt to circumvent the original Common Law foundation of Our Constitution. A major part of the problem that we are in is a result of these unlawful attempts by legislatures, judges and bureaucracies to modify or abrogate Common Law and thus Our Constitution.
While, in England, this Law was derived from feudal tenures in real property as held by a pyramid of proprietors (land owners) holding their rights given them from the King (or Crown) on down the line. The American Revolution destroyed any and all allegiance to the British Crown, including the rights of property in land, and all feudal tenures and dues were overthrown. All Rights of property in land in the United States became ALLODIAL TITLES in Allodial Freehold, existing under no lord or overlord whatsoever, including the authority of the Colony or State. The ties that bound property use or ownership to a higher or superior power were entirely and completed severed, destroyed and made as though they never existed.
This is the reason why our founding fathers considered that they had made every man a "King" on his own property. They got rid of the controls from the King and 'castle keep' owners (feudalism) within property ownership.
In England, William Pitt summarized the concept of private property under Common Law, as follows:
'The poorest man may, in his cottage, bid defiance to all the forces of the Crown. It may be frail; its roof may shake; the wind may blow through it; the storms may enter; the rain may enter; but the King of England cannot enter; all his forces dare not cross the threshold of the ruined tenement. "
As a result of all of this, the Common Law of the States is founded and grounded upon substantive titles in real property. No mere legislative enactment by Congress or State Legislature nor judicial ruling by Federal or State Courts can operate to deprive the People of their Rights at Law. This includes their Rights inherent in their Allodial Land Titles and to be Merchants and/or Traders at Law on the cash basis, and their Rights to access to Courts of Law and to a jurisdiction where their Rights are protected.
In the same vein no county or city ordinance, code, rule, policy, regulation or 'law' can override these same absolute guarantees. The same applies to corporate or private policies of business conduct which are often used to override Common Law or Constitutional guarantees. In other words, business or corporate policy cannot supersede Constitution Rights even though nearly every corporation in America ignores Our Constitution in pursuit of ever more bogus Federal Reserve Notes.
As contrasted with the Common Law of England, the system of law as practiced on the Continent of Europe (European Common Market) is called Civil Law, or Roman Civil Law, which is derived from the Law of the Ecclesiastical Chancellors. This is partly the ancient Law of Rhodes, the law of merchant traders upon commercial documents. The Civil Law is prosecuted by the Chancellor (the King's agent); he is not an impartial referee of the dispute.
This Civil Law of Roman origin has never been part of the Laws of England and has been declared not of the Laws of the Realm by the Parliament and by many experts of England in jurisprudence, such as Coke, Blackstone and Sir John Fortescue.
"The Common Law is absolutely distinguished from the Roman
or Civil Law systems. "
People v Ballard
155 NYS 2d 59
The Roman Civil Law has always been outside of Common Law, operating on SUMMARY PROCESS, in gross violation of our RIGHTS TO DUE PROCESS.
As English society developed over the years, situations were met in the Common Law for which the Courts could provide no relief by any precedent. The controversies did not involve property, or substance. The parties thus had no other recourse than to go to the King. And when they did, he delegated his first minister to solve these problems. The minister was called a Chancellor (the same title as used on the Continent) and the relief granted was called Equity. This "Equity" meant what would be fair if the Common Law principle were extended and applied to the case at hand, as the Chancellor, in his sole discretionary judgment, chose to do. This is the so- called "law" we see being applied by "Judge" Wapner in the well known fake TV court program. He alone decides the law and facts of each case.
There thus developed in England and America two distinct systems of law and courts, each having a peculiar and particular application and jurisdiction. Equity is a jurisdiction in which the individual does not have any Rights, and one to which the individual can be subjected only if he volunteers or gives his informed consent. In the Common Law we have recognized inherent rights whereas in the Equity Law we have no rights whatsoever except those which may be bestowed upon us by the graces of the chancellor -(judge) wholly at his sole discretion.
In Equity there are no jury trials. The powers of the Common Law jury to hear and decide questions of both Law and Fact are exercised exclusively by the Chancellor. However, there may be "advisory juries" to advise the Chancellor of certain facts, but they are not permitted to hear any arguments regarding the Law. (Does this sound familiar today?) The controversies are decided by the Chancellor, who, besides being the Chief Prosecutor, (or Inquisitor, if you will), can go to any source he chooses, even to his own "conscience", to prove or justify his decision. In Equity, the parties do not have any Rights; the Constitution is stated by the Chancellor to be "frivolous"; and any so-called "rights" in his Court are actually "privileges" granted by the Chancellor, which he can also take away. Today this all powerful person is not called a Chancellor. She/He is called a Judge and she/he operates in all levels of "courts" throughout Our Land.
During the past century, the Congress of the United States and the Legislatures of the several States, as well as the Judges have presumed to exercise the authority to "merge" the procedures of Law and Equity. This is authority they do not have, yet this, too, is part of the problem we face today all over Our Land.
When we realize that a Court of Common Law proceeds "according to the course of the Common Law ", and that the parties have a Right to trial by a Common Law jury, where the jury exercises the authority to hear and decide questions of both Law and Fact, we can then know that if we are in a Court where the procedures have been "merged" with Equity, then we can know that we are not in a Court of Common Law ! Such a court does not recognize and refuses, to We The People, our Constitutional Rights to self and property.
For instance, the Constitution of the State of Iowa, Article V, Section 6, states, in part, as follows:
"The District Court shall be a court of law and equity, which shall be distinct and separate jurisdictions, . . . ."
Obviously, the two court systems have not been lawfully merged, and We The People do not have to accept the idea that they have been merged simply because a 'judge" or bureaucrat says a code, rule, statute or regulation makes it so. Remember that these lesser rules and regulations MUST be in harmony with the State and federal Constitutions in order to be valid and lawful. Otherwise they are null and void.
We must realize that the principles of Common Law and of Equity are those as distinguished and defined in England, before the adoption of the Constitution of the United States of America. Any modifications in definition or practice of either Law or Equity in England since the adoption of the Constitution of the United States of America have no significance, bearing or authority in the United States, since we are no longer under the jurisdiction of either Parliament or the Judges of England. Yet there are those in this country who claim that Equity jurisdiction (otherwise known as Chancery jurisdiction) in this country is the same in nature and extent as Equity jurisdiction in England!
Where the Constitution of the United States of America, or the Constitution of the State of Iowa, or of any State, mentions "law", it means "Common Law"; it does not mean any other "kind" of law! ! In addition to the above mentioned jurisdictions of Law (meaning Common Law ) and Equity, which are the only Judicial jurisdictions authorized either by the Constitution of the United States of America, or by the Constitution of the State of Iowa, or of any State, as drafted in conformance thereto, and being second thereto, there is also a private, political jurisdiction which is operative only on those who volunteer into it's private domain, outside of the Constitution. It is known as Law Merchant (lex mercatoria) the private rule of the bankers and merchants.
It is this system of 'legal' snares that has all of We The People by the throat...."
Law Merchant is neither Law nor Equity, but is only raw, private, political power, alien and illegal to our Constitution whatsoever, and operates outside of the Constitution .
The Law Merchant is an independent, parallel system of law, like Equity or Admiralty. The Law Merchant is not even a modification of the Common Law; it occupies a field over which the Common Law does not and never did extend. Common Law deals with the Money of Substance belonging to the People (Gold and Silver Coins); while the Law Merchant deals with the law of Bills, Notes and Checks, (in other words, with negotiable instruments and commercial paper). The Law Merchant is closely allied to the Equity system of agreements and contracts which it uses extensively because the Constitutions of Our States recognizes Equity law. Equity Law is the 'back door' used by Law Merchants (bankers, etc.) to gain access to what used to be Allodial Title or absolute ownership previously enjoyed by all Americans.
Our Declaration of Independence charges that America had been progressively subjected to "a jurisdiction foreign to our Constitution" (meaning the unwritten English Constitution), This foreign jurisdiction was a jurisdiction of lawless ad hoc equity derived out of the Roman Civil Law under the stark cover of such obscenities as the Writs of Assistance (which our Courts of today also claim to have the authority to issue) which allowed summary plundering of the colonists' wealth and substance TO THE ADVANTAGE OF the East India Company which controlled the Parliament. (As today, it allows the summary plundering of the American citizens' wealth and substance TO THE ADVANTAGE OF the banks and other financial (lending, insurance, etc.) institutions which control the Congress and State legislatures). It has been recognized and stated for over one hundred years that "we have the best Congress that money can buy" ! !
These Writs, even as only one wrong perpetrated by the commercial interests in the Parliament, were given authority by an Equitable jurisdiction called a debt action in assumpsit. This action, which gave satisfaction pursuant to the customs of the Law Merchant, (having been voluntarily entered into), had been an old debt action triable in a Court of Common Law (merely as a courtesy of the Common Law Courts, and not inherently a part of Common Law) (and triable by a Common Law Jury, as a protection to the Defendant), until lord Mansfield, Chief Justice of the Kings Bench, in 1760, arbitrarily and on his own authority, denied trial by jury in debt actions in assumpsit AND REMOVED THAT ACTION FROM THE Courts of Common Law into the Courts of Equity, where a trial by jury could not be had, and where there was merely a summary proceeding with no semblance of a "due process of Law". In other words, a merchant can, with a flick of his Pen, deprive anyone of their property without due process of Law (Common Law). Sound familiar?
This case is known as:
Moses y MacFerian
2 Burroughs 1005
and is the case that sparked the American Revolution and caused Thomas Jefferson to say that English law since that date (1760) should not ever be used over here as Equity/Merchant laws had become an instrument through which merchants could, from then on, assume power over anyone else's property solely at their discretion and whim.
It was this Equitable debt action in assumpsit which the Seventh Amendment of the Constitution of the United States was specifically meant to outlaw, by specifically providing that
"In suits at Common Law, where the value in controversy shall exceed twenty dollars, the right of trial by jury shall be preserved..."
The significance of this is pointed up by the fact that any controversy involving Money (Gold and Silver Coins) in an amount greater than twenty dollars, or any property such as real estate can only be tried in a Court of Common Law with the right of trial by jury who decides Law as well as the Facts of the case!
This means that any Mortgage Foreclosure action can be tried only in a Court of Common Law, and that the State Legislature has no Constitutional authority to provide, by statute (statutes are not real Law but are in reality 'color' of Law only and therefore are only binding on a voluntary or mutually agreed upon basis), that mortgage foreclosure actions shall be Equity actions! This means that Sheriff's Sales as a result of these Equitable Mortgage Foreclosure actions are null and void! ! And that the Sheriffs have participated in criminal confiscation of real property in violation of the Constitution and of their oaths of office! !
So, it can be seen that summary and arbitrary confiscation of income and property is nothing new in American tradition and history out of an illicit (meaning unlawful and unconstitutional) Equitable jurisdiction. It is precisely this Equitable jurisdiction wherein the Chancellor enforces the combination of unconstitutional Executive and Legislative Equity which is the jurisdiction foreign to our Constitution referred to in the Declaration of Independence. This is precisely what our American Revolution was all about and what our Bill of Rights was designed to prevent.
It is also a measure of the extent that the Bankers (both foreign and domestic) and other merchants, and their stooges, the lawyers and Judges, as well as the politicians of both major political parties, have betrayed the Public Trust and have attempted to place us in a Dictatorship of Unelected Rulers (being the "judges" and bureaucrats) ! !
Thus it can be seen that there is a direct similarity of our political/legal situation today with what it was in the years immediately preceding the Revolution of 1776. Only today we have a written Constitution that spells out our Rights and our freedoms, giving us precedents, whereas two hundred years ago they did not.
The Common Law Jury members (acting as judges of the Law) were sworn to "Do equal law, and execution of Right, to all the King's subjects, rich and poor, without having regard to any person" and that they will deny no man Common Right; but they were NOT sworn to obey or execute any statute of the King, or of the King and Parliament. Indeed, they are virtually sworn NOT to obey or execute any statutes that are against "Common Right", or contrary to the Common Law, or "Law of the Land"; but to certify the King thereof "... that is, to notify the King that his statutes are against the Common Law;.... and then proceed to execute the Common Law, notwithstanding such legislation to the contrary. The words of the oath on this point are these:
"That we deny no man Common Rights by (virtue of) the King's letters, nor none other mans', nor for none other cause; and in case any letters come to you contrary to the Law, (that is, the Common Law) that ye do nothing by such letters, but certify the King thereof, and proceed the execute the Law (that is, the Common Law), notwithstanding the same letters"
In Federalist Papers #48, Alexander Hamilton wrote in part, "No legislative act contrary to the Constitution can be valid." "The Constitution is, in fact, and must be regarded by judges as a fundamental law."
The Sheriff is also a servant of the People, elected and paid by and for Them; upon taking office he takes an oath to uphold the Constitution (the People's Law) and keep the peace.
In American Jurisprudence, on Sheriffs, Police and Constables, we find the following:
Origin of office: The office of sheriff is an ancient one, dating back to at least the time of Alfred, King of England, and the holder thereof has always been the chief executive officer and conservator of the peace in his shire or county. He is a county officer representing the executive or administrative power of the state within his county. In this country, the office is generally an elective one, and anciently in England, sheriffs were elected by freeholders of the county, although gradually, it became the custom for the Crown to appoint the Sheriff."
Abraham Lincoln stated the following on February 12, 1865:
"The people are the rightful masters of both Congress and the Courts. Not to overthrow the Constitution, but to overthrow the men who pervert the Constitution."
The general misconception is that any statute passed by legislators bearing the appearance of law constitutes the law of the land. The U. S. Constitution is the supreme Law of the Land, and any statute to be valid, must be in agreement. It is impossible for both the Constitution and a statute violating it to be valid. In such a dispute, one must prevail, and that is the Constitution .
In Volume 16, American Jurisprudence, 177, we find the following:
"The general rule is that an unconstitutional statute, though having the form and name of law, is in reality no law, but is wholly void, and ineffective for any purpose; since unconstitutionality dates from the time of its enactment, and not merely from the date of the decision so branding it. An unconstitutional law, in legal contemplation, is as inoperative as if it had never been passed. Such a statute leaves the question that it purports to settle just as it would be had the statute not been enacted.
"Since an unconstitutional law is void, the general principles follow that it imposes no duties, confers no rights, creates no office, bestows no power or authority on anyone, affords no protection, and justifies no acts performed under it. . . .
A void act cannot be legally consistent with a valid one. An unconstitutional law cannot operate to supersede any existing valid law. Indeed, insofar as a statute runs counter to the fundamental law of the land, it is superseded thereby.
No one is bound to obey an unconstitutional law and no courts are bound to enforce it. "
The Constitution guarantees the right of a freeholder to protect his property from Criminal Trespass.
It is the sworn duty of the Sheriff to obey and uphold the Constitution and to protect the property and Rights of the freeborn, Sovereign American individuals of the County.
County Sheriffs must be advised of the instances where unlawful acts of officials or agencies of government are committed. It is the duty of the Sheriff to protect the local citizens from such unlawful acts, even when they are committed "under color of law".
There is no lawful authority for Judges and the Courts to direct the law enforcement activities of a County Sheriff. The Sheriff is accountable and responsible only to the citizens who are inhabitants of his County. He is under Oath of Office, and need not receive unlawful Orders from Judges or the Courts. He is responsible to protect citizens, even from unlawful acts of officials of government. He should not allow his office to be used as an unlawful "lackey" of the Courts or Federal agents or agencies.
Since the formation of our Republic, the local County (or Parish) has always been the seat of government for the body politic (the People). A County (or Parish) government is the highest authority of government in our Republic as it is closest to the body politic (the People) who are, in fact, THE GOVERNMENT.
The Common Law of the States is founded and grounded upon substantive titles in real property, and no mere legislative enactment by Congress, State legislature or County Commissioners. Neither can judicial ruling by Federal, State or County Courts operate to deprive the People of their Rights at Law, including the Rights inherent in their Allodial Land Title Rights.
The Constitution of the United States of America, Article III, Section 2, authorizes Courts of Law and Courts of Equity; Judicial Equity is authorized; but nowhere does the Constitution of the United States of America authorize a single bit of either Federal Executive branch of government Equity jurisdiction, or Federal Legislative branch of government Equity jurisdiction. In other words, the promulgation and enforcement of Presidential/Congressional/Judicial edicts, dictates, rules, regulations or policies whether directly or through any Federal agent or agency such as the FBI, CIA, EPA, OSHA, IRS, etc. or with the aid and assistance of State or local lackeys is unauthorized.
For instance, the Constitution of the State of Iowa, as drafted in conformance to the Constitution of the United States of America, and being second thereto, Article V, Section 6, authorizes Courts of Law and Courts of Equity; Judicial Equity is authorized; but nowhere does the Constitution of the State of Iowa authorize a single bit of either State Executive branch of government Equity jurisdiction or State Legislative branch of government Equity jurisdiction.
The Federal Bill of Rights was drawn and adopted to guarantee an estoppel (or bar) to the abhorrent Federal Executive and Legislative Equity jurisdiction, and therefore, the State Bill of Rights is also a guaranteed estoppel against any actual or de facto abhorrent State Executive and Legislative Equity jurisdiction; this is an abhorrent and oppressive Equity, because it purports to be able to administer, adjust and deny said Common Law Rights without first pursuing the appropriate remedy at Common Law and thus denying due process. Equity administration is in fact theft of Our Rights and a vicious dictatorship by those who exercise it.
In other words, Federal, Stale and County governments, both Executive branch and Legislative branch, must be at Law working within the Common Law), and may not impose any form of Equity jurisdiction upon the People, by compulsion, fraud or otherwise, without their knowledge and informed consent; otherwise any such enactments become and are nullities and do not exist at Law, because the Rights of freeborn, Sovereign American individuals would be violated if they were to be forced to obey them.
If any agency of the Federal, State or County government, including the court, would act as if it were Principal, and Freeman, against it's true Principal, the People, this would be an inversion of the legal principle of Sovereignty of the People. By so acting, any agency of the government, including the court, would be a pretender to the power, and as a pretender, it's acts would be a nullity and would not exist, at Law; that is to say, that it would be null and void, and of no force and effect, at Law. That, in fact, it would not be government at all, but would be a private, criminal operation, imposing a rule of force, fraudulently pretending to be government, since, in this country, the only legitimate function of government is to protect the Rights and freedoms of the People. Such acts are not unlike the privately owned and operated Mafia who demands our money (taxes, fees, etc.) in exchange for them not committing violence against us or our property. Sound familiar?
Each freeborn, Sovereign American individual has the authority and the Right to deny and to disavow all Equity jurisdiction, and to refuse to acquiesce to the jurisdiction of Courts of Equity, or to Equity jurisdiction of any Executive or Legislative branch of government agency or agent, State or Federal or County.
The Constitution of the United States of America, Article IV, Section 4, guarantees a Republican Form of government to every State.
The definition of a "Republic" is as follows:
"Republic: A state in which the sovereign power resides in a certain body of the people (the electorate), and is exercised by representatives elected by, and responsible to, them; "
Webster's Collegiate Dictionary, Fifth Edition .
The Courts of Iowa are nullities, and do not exist, either at Law or in Equity, because unelected State Judges have no jurisdiction at Law or in Equity, over any one or any thing, being in direct violation of each freeborn, Sovereign American individual's Right to a Republican Form of Government; which in this case is his Right to have an Elected Judge. This also includes the Right to Separation of Powers, because the Governor, as Chief Executive of the State, has no Judicial Power to delegate to an appointee. The Governor is of the Executive branch and has (lawfully) no say or jurisdiction within or over the Judicial branch.
The Governor of this or any other State is not a Chancellor (appointed by a King or dictator), nor are any officials appointed under him authorized to exercise any Judicial powers. There can be no delegated power in Chancery law to be executed under the alien, outlawed and illegal Roman Civil Law, unless agreed to by the freeborn, Sovereign American individual.
That evil and alien jurisdiction, the de facto Equity jurisdiction of the Roman Civil Law, allows judges to enforce the unlawful summonses of IRS agents, Highway Patrol Officers, city policemen, building inspectors, OSHA agents, FDA agents, and the agents of all other equally unlawful regulatory bodies of so-called government, who attempt to impose a jurisdiction in which the Rights of freeborn, Sovereign American individuals are unrecognized and violated.
That evil and vicious Roman Civil Law allows the 'judges' to have We The People arrested, jailed, and property taken away from us, or our property to be criminally trespassed upon and destroyed; all without a Common Law Trial by Jury, or just compensation, or due process of law. These violent acts by unelected dictators are committed often over simple idiocies such as "willful failure to file" a paper or failure to properly fill out a form or unknowingly not following some obscure and stupid procedure, rule or regulation.
Under the Common Law (Our Constitution), no bureaucrat can dictate what happens to Our liberty or Our property. The only entity that can determine punishment (pass sentence) upon a freeborn, Sovereign American individual is a lawfully constituted Common Law Jury.
Aiding and abetting the IRS (foreign agents to the States) and similar agencies in enforcing their unlawful summonses, fraudulent liens and assessments constitute an enforcement of the alien and evil Roman Civil Law and is in fact fascist totalitarianism.
Compelling a freeborn, Sovereign American individual to do anything, except upon the verdict of a Common Law Jury, constitutes an enforcement of the alien and evil Roman Civil Law and is in fact fascist totalitarianism.
Thomas Jefferson has been credited with the warning how the judicial branch of government would usurp the authority of the Executive and Legislative branches of government and turn the country into a judicial dictatorship.
He was right - it has happened.
"All of the confusions and distress in America arise, not
from defects in their Constitution, not from want of honor or virtue,
so much as from the downright ignorance of the nature of coin, credit
[paper money] and circulation."
John Adams (1781)
So began admonishments to us from 200 years ago by one who knew what awaited his countrymen (us). What has happened to Our money is criminal. In fact, it is beyond criminal and nearly beyond credibility. Just after World War II America had nearly one billion ounces of gold coin in circulation and untold millions of ounces of silver coins. These metals in circulation represented real undiluted debt-free capital. It was ours and we owed no one anything for it. This $400,000,000,000 pool of liquid capital belonged to private American citizens and represented the wealth of our great nation. What happened to all this wealth?
Before most of us were born money was a real thing. It was gold and silver coin as specified by Our Constitution, the founding law of Our country:
ARTICLE 1, SECTION 8
"The Congress shall have the power ... to coin Money, regulate the value thereof"
ARTICLE 1, SECTION 10
"No State shall ... coin Money; emit Bills of Credit (paper money); make any Thing but gold and silver Coin a Tender in Payment of Debts."
In other words no federal or state government was permitted, by law, to mint or issue anything other than gold and silver coins as lawful money. Neither are they permitted to accept or pay debts with anything other than gold and silver coin. What? Where did all this paper come from and what is it if it isn't Money? Listen up - this gets real interesting...
Well guess what happened? If you are lucky enough to have any 'money' in your pocket take it out and examine it. On the front (near the portrait) of the bill you will find the words: "This note is legal tender for all debts, public and private". Across the lop of the bill you will read the words: "Federal Reserve Note". Nowhere on this bill are the words: gold, silver or money. This is because this bill is not money as defined by Our Constitution (see above). It is not money at all. It says what it is - it is a note issued by a private, tax-exempt, for profit bank - the Federal Reserve Bank(s). Which are all owned privately by people living outside of America.
A 'note' is: 'a paper acknowledging a debt or promising to pay (also called note of hand); also a certificate, as of a government or a bank, passing current as money.' The portion "passing current as money" means passing from one person to another and generally accepted as money. This implies that it is not money but is only accepted as money. It is the Constitution that defines what real money is: it is gold and silver coin. The bill in your pocket is in actuality an instrument of debt - it is owed to somebody - The Federal Reserve Banks and their foreign owners.
"Money is not only a medium of exchange, but it is a
standard of value. Nothing can be such standard which has not
intrinsic value, or which is subject to frequent changes in
Justice Fields (1883)
Now so much for definitions. What does paper or metal money have to do with anything? Are you working harder now and enjoying it less? Are you really better off now then when you began working so many years ago? Are your children making it better or worse than you did when you started out? Why does it take two people working very hard to not make ends meet worse now than when one was working in the 50s and 60s? The answer to this question lies in the money. Our money has become nearly worthless. Remember back in the late 60s a new Volkswagen bug cost less than $2,000. Today that same car (with a different body) cost about $7,000. These are the same 'dollars' you have in your pocket. A soda pop cost a nickel back then and now how much is the very same item? Herein lies the evilness of paper money. The Federal Reserve Banks (and their stooges) can print as much of it as they want whenever they want. This flooding the market (your pocket) with more and more cash is called 'fractional reserve' banking when coupled with the local bank's privilege of signing money into existence whenever they want more to lend some to you.
It is a fantasy that Our government prints (issues) money.
It really works like this: The US Congress desires to spend (that' s how they stay in office) more money to buy our votes. There is a problem here as there is no money because the Congress of 1913 gave their own Constitutional right to coin real money away to a bunch of foreign bankers - the Federal Reserve Banks. The Congress must request the Federal Reserve to issue and then lend them (Us) some Federal Reserve notes. The privately owned, tax exempt Federal Reserve Bank lends these notes to the U.S. Government (you and me and our children and neighbors). The tax-exempt Fed only pays the U.S. Treasury about 3 cents per bill for these (regardless of denomination) as printing cost. But when we get these funny pieces of paper we have to pay the full face value back with our blood sweat and tears PLUS ANY INTEREST the thieves think is appropriate for them. Guess what didn't happen in this transaction? The thieving Fed never printed the interest! So we can maybe pay back 100% of what we borrowed but there are no more Fed notes to pay the interest! Every time Our government employees borrows more from the private Fed we get further and further into debt - a debt that can never be paid!
"The burden of debt is as destructive to Freedom as
subjugation by conquest."
In the beginning we paid this bogus and illegal debt with real money - gold - until it was all gone on March 9, 1933 when Roosevelt literally, willfully and without due process of law took the gold away from the American citizen (Us) and gave it to the bunch of thieves at the Fed in exchange for paper. Paper which could only do one thing - put us further into irretrievable debt. Why put America into deeper and deeper debt? Reread Franklin's quote in the previous paragraph. The idiotic process continued until 1968 when they took the balance of our silver to pay for even more of these worthless notes.
"If Americans ever allow banks to control the issue of their
currency, first by inflation and then by deflation, the banks will
deprive the people of all property until their children will wake up
On June 5, 1933, as a result of a prearranged banking crisis, the Congress of the United States passed House Joint Resolution No. 192, suspending the Gold Standard (they did not abolish it), which means they disestablished the fixed content of the Gold Dollar and took away the Law jurisdiction of the U. S. Standard Dollar Lawful Money. In effect, the entire country, every State and every freeborn, Sovereign American individual, became insolvent and was effectively put into bankruptcy, making it impossible for each State and each individual to either pay their debts, at Law, or to be paid, at Law. This was, in actuality, a criminal act of usurpation of the sovereignty of We The People, by Congress.
Instead of being able to demand payment at Law, or to make payment in Standard Gold Dollars as Lawful money, or the equivalent Treasury currency, redeemable on demand, at Par, We The People were forced on to the credit of the private banks, the Federal Reserve Banks and the commercial banks, and began to pass around their debt instruments, as though it were real money, making use of their debt-claims for the money, and thereby, by the operation of House Joint Resolution No, 192, into an alien and unlawful Federal Executive Equity Jurisdiction, known as lex mercatoria, or the Law Merchant, which is the private rule of the bankers, and from which jurisdiction our forefathers fought, and won, a revolution to be free, and from which jurisdiction our Constitution and Bill of Rights protects Us.
When you can pay your debts in Standard Gold Dollars, you operate on a cash basis in a Federal Common Law jurisdiction based on Article I, Section 10, clause 1, of the Constitution of the United States of America regarding tender in payment of debts. This is the General Federal Common Law jurisdiction deriving from the Union, which the Bill of Rights was designed to protect, particularly the Seventh Amendment which guarantees the Right of Trial by Common Law Jury in suits at Common Law where the value in controversy shall exceed twenty dollars. But, when you pass around evidences of debt as if it were the money itself, you are passing around the debt-claims for the money, and you no longer have a jurisdiction at Law, where the individual has access to his Rights, but you are in an entirely different court, or jurisdiction. You are in an Equity jurisdiction, one in which the individual does not have any Rights. And this is the practical effect which Congress intended to bring about by passing House Joint Resolution No. 192. Even one hundred years ago it was stated that "we have the best Congress that money can buy".
"Paper Money is Theft!"
By the operation of House Joint Resolution No. 192, individuals, and States, have been compelled to "perform services", in order, not to pay (no one could "pay" anymore because there was no real money with which to "pay"), but to "discharge obligations" to pay.
What is called "fractional reserve banking", with irredeemable paper, creates multiple demands upon a common substance. That is, banks can issue or create "money" simply by making a ledger entry. These newly created dollars (ledger entries) are "backed" by the same few dollars already held on deposit. In fact a bank, can "create" 20 dollars for every one on deposit, lend them to you, collect the principle and interest and then simply write the money back into nonexistence. In other words, you are forced at the point of the Sheriff's gun to pay for something that was created out of thin air - plus interest. With multiple demands, no one can ever satisfy all his claims and no one can ever "pay" at Law in substance, that is, with Standard Gold Dollars, but instead, can only "perform services" as evidence of his willingness to "discharge the obligation to pay". Payment, as such, is thus forever postponed; one only promises the payment.
Overnight, the entire country was placed in an entirely new regime of Equity, which never "pays" a thing but only compels services forever to the private banks, and the debts to private bankers constantly increases, the interest obligations, known as "debt service", constantly compounds and the performance of services in order to "discharge the obligation to pay" this interest are never- ending, being a greater and greater burden upon ourselves and our children, and our children's' children.
In other words, a feudalistic real property law, in the guise of Equitable discharge of obligations to tender in Equity and not "pay" at Law, was instituted in violation of our Allodial Property Rights, and compels Sovereign American individuals into a feudalistic peonage, or involuntary servitude to the private banks (Federal Reserve Banks, National Banks, State Banks), in violation of the 13th Amendment to the Constitution of the United States of America. Because of the jurisdiction of the Law Merchant, we are not under Common Law, we do not have access to our Right to a Common Law Jury, and as a result our property can be, and every day is, taken without due process of Law. If we do not "perform the services" our property is taken from us by Equity courts imposing the Law Merchant.
The Sheriff, in unknowing and unthinking acceptance of this situation, has become the "bag man" for a bunch of private criminals, and thereby is committing crimes himself, and is therefore a criminal. It is a crime to violate Constitutional Rights and his oath of office to support and defend the Constitution of the United States of America and the Constitution of his own State, it being drafted in conformance thereto, and being secondary thereto.
The Banks, including the Federal Reserve Banks and the National Banks, are incorporated by the State and operate under Banking Statutes (you will notice I do not use the word Laws), These statutes allow, or at least do not prohibit, the creation of "demand deposits" or "checkbook money", which is not really money, but is actually credit, or debt, created on the spot out of thin air on two levels. One by the Federal Reserve Banks (they write checks on themselves, thereby creating Federal Reserve Credit "out of thin air", in order to "purchase investments", such as U. S. Government Securities. These then become part of the National Debt, and provide the banking system with new Reserves). On the strength of these newly purchased Securities, they are able to obtain from the Treasury, newly printed Federal Reserve Notes, to cover the new checks when they are cashed. They only have to tender about three cents for each new Federal Reserve Note regardless of denomination. They are practically given the new paper Notes and they still hold the Bonds, which are part of the National Debt, and collect interest on them. The second level is by the local commercial bank which creates bank credit, denominated "demand deposits", every time they make a loan. The Federal Reserve Bank (is a private Anglo-German-American owned corporation. It is for-profit, and is tax-exempt!) creates public credit (National Debt), while the commercial banks create private credit (private debt) when they make a loan.
The Federal Reserve Note, at least the one issued in accordance with Title 12, United States Code, Section 411, which requires that they "shall be obligations of the United States and shall be redeemable on demand . . .", has a double jurisdiction. It is what you may call a legal tender for an equitable interest. That means it passes at Law as money, being a legal tender, but the only interest it passes along is a mere demand or promise. Hence, though it is "legal" or at Law, it never pays the gold because of House Joint Resolution No. 192, which illegally and criminally prohibited payment of the U. S. Standard Dollar Lawful Money, at par, and thus at Law.
It should be noted that Congress did not (could not) take away our Rights to use bank notes at Law, or demand deposits at Law; they just took away our money.
We have a Right, to take a twenty dollar bill, which means a bill for twenty dollars, into a bank and demand a twenty dollar gold piece. Congress did not take that Right away; since we have unalienable Rights which cannot be taken from us or be forced to give them up; Congress just took away the gold. This was and is a criminal usurpation of the Sovereignty of We The People on the part of Congress; and the State of Iowa, and each other State, by allowing it to happen at that time, and by continuing to allow it to happen to this date, has become party to this crime against We The People.
Instead of going into bankruptcy, everyone, including the States, was provided with the opportunity to use the new Federal Reserve Notes, called (incorrectly) "lawful money" grounded in perpetual debt of the "eligible paper" which formed the assets of the Federal Reserve and the National Banks, These are also known as "units of monetized debt". Everyone thus became the creditor/debtor of everyone else, since no one has paid or been paid for anything since that infamous day of June 5, 1933 when Roosevelt willfully and knowingly stole Our gold and gave it to a bunch of foreign bankers. (Lawfully, debts can only be paid with money - money as defined by the Law of the Land - The Constitution - being gold and silver coin. Anything else is not lawful money and cannot therefore lawfully "pay a debt".) Thus, overnight, We The People became liable for specific performance on the basis of a debt action of assumpsit under the private Law Merchant, operating outside of the Constitution and imposing an Equitable jurisdiction. A jurisdiction in which no one has any rights, where one can be compelled summarily to deliver his property without trial by Common Law jury. And the debts to the private bankers keep mounting ever higher.
A freeborn, Sovereign American individual cannot be forced into perpetual debtorship and involuntary servitude, that is, feudalistic performance on behalf of, and for the benefit of, any person, real or juristic, against his Thirteenth Article of Amendments to the Constitution of the United States of America. Nor can He be compelled, by Law, to accept, or to give informed consent to accept, an Equitable jurisdiction foreign to his Bill of Rights.
Article III, Section 2 of the Constitution of The United States of America, states in part:
"The Judicial Power shall extend .. . . . to all Cases of Admiralty and Maritime jurisdiction; ... . ."
At the very beginning of government under the Constitution , Congress conferred on the federal district courts exclusive cognizance "of all civil causes of admiralty and maritime jurisdiction, . . . . . . ; saving to suitors, in all cases, the right of a Common Law remedy, where the Common Law is competent to give it;. . ." (1 STAT 77, Section 9 (1789))
As this jurisdiction is held to be exclusive, the power of legislation on the same subject must necessarily be in the national legislature and not in the state legislatures.
Congress enacted the Limited Liability Act on March 3, 1851. It is codified at Title 46, United States Code, Sections 181-189, as amended in 1875, 1877, 1935, 1936 and the Act of 1884. It intended to cover the entire subject of limitations, and to invest the U. S. District Courts with exclusive original cognizance of all cases of admiralty and maritime jurisdiction, exclusive of the States. This means that the States do not have any jurisdiction in admiralty and maritime matters, at all.
Admiralty and maritime jurisdiction comprises two types of cases: (1) those involving acts committed on the high seas or other navigable waters, and (2) those involving contracts and transactions connected with shipping employed on the seas or navigable waters. In other words, the second type of case must have a direct connection with maritime commerce.
Suits in admiralty traditionally took the form of a proceeding in rem against the vessel, and, with exceptions to be noted, such proceedings in rem are confined exclusively to federal admiralty courts, because the grant of exclusive jurisdiction to the federal courts by the Judiciary Act of 1789 has been interpreted as referring to the traditional admiralty action, the in rem action, which was unknown to the Common Law.
State courts are forbidden by the Constitution to have Admiralty jurisdiction. While State courts are permitted to handle and try Admiralty cases if the suitor desires, it must be an Admiralty matter to begin with and it must involve property, otherwise there would not be a Common Law remedy. In other words, the Common Law courts would not be competent to handle it. More than this, it would need to be tried in a Common Law court, following Common Law procedures (not Equity procedures) with a Trial by a Common Law jury.
Therefore, any attempt by a State court to impose a judgment in rem is in violation of the Constitution and is null and void. When a sheriff attempts to enforce a judgment in rem he is attempting to impose the alien and unlawful Roman Civil Law, in violation of his oath of office, and he is thereby committing a criminal act.
The Sovereign American people are beginning to catch on to and realize the nature of the Dictatorship of Unelected Rulers that has been set up in this country, and They are no longer quietly accepting such vile treatments.
As the issues become clarified, each public official will need to make a decision: shall he be on the side of the Constitution and protect the Rights and freedoms of We The People (of which he is one), as required by his oath of office; or shall he be a party to the criminal usurpation of the Sovereignty of We The People?
The Sheriff is a key person in all of this: he can either be a tool of the evil forces who have set this up and provide the oppressive force that binds the innocent victims to the chains of slavery, all in the name of "doing his duty", or he can be the instrument of liberation for We The People by preventing the imposition of the unconstitutional Equitable jurisdiction (the Roman Civil Law) upon Us, the victims and Our property and protecting Our Rights and freedoms.
Another Constitutional issue that each of us needs to understand is the issue of Individual Common Law Rights of We the People of the United States of America. This directly concerns the limits of authority of all branches of government over each of us as individuals: the Authority of the Executive, Legislative and Judicial Branches of Government.
As stated in the Declaration of Independence, we are endowed by our Creator with certain Unalienable Rights, that among these are Life, Liberty and the Pursuit of Happiness.
Thomas Jefferson placed great emphasis on the concept of Rights. He said we did not bring the English Common Law, as such, to this continent; we brought the Rights of Man. The reason why he said that is that it is from the Common Law controversies, all of which involved property, that all of our Rights have come to be recognized in the Law.
In a legal sense, Property is a bundle of Rights, a bundle of Powers, wherein one claimant to these Rights possesses these Rights to the exclusion of all other claimants to These Rights, as these Rights pertain to The possession, occupancy and use of a specific piece of property.
So, at Common Law, Rights is the name of the game.
The Bill of Rights was added to the Constitution of the United States of America because the Founding Fathers believed these Amendments should be added to avoid misconstruction of the provisions of the Constitution of the United States of America by Judges and to avoid an abuse of powers by Judges of The sort that had already, at that time, taken place in England and from which abuse of powers we had just fought, and won, a revolution to be free. (See the Preamble to the Bill of Rights. The original Constitution has it, and in some sources which print the Constitution, this Preamble is included.) This abuse had been committed by Judges who were not tied down by any written Constitution in England, and who had started to whittle away at the Common Law Rights in England and the Colonies, by their decisions, with the cooperation of the statutes passed by the Parliament and enforced by the Crown. This is precisely the combination of Executive and Legislative Equity (otherwise known as Roman Civil Law) which our Bill of Rights prevents and protects us from.
As example, the Constitution of the Iowa has its Bill of Rights, comprising Article I. The first two sections deserve special emphasis :
Section 1. All men are, by nature, free and equal, and have certain inalienable rights -- among which are those of enjoying and defending life and liberty, acquiring, possessing and protecting property, and pursuing and obtaining safety and happiness.
Section 2. All political power is inherent in the people. Government is instituted for the protection, security, and benefit of the people, and They have the right, at all times, to alter or reform the same, whenever the public good may require it.
So the Constitution of the State of Iowa for example expressly includes the Right of acquiring, possessing and protecting Property, although it is high on the Priority List of Common Law Rights. This is an example of a Constitution securing Rights which come from the Common Law.
Back in 1921 someone wrote:
It is not the Right of property which is protected, but the Right to property. Property, as such, has no rights; but the individual -- the man -- has three great Rights, equally sacred from interference: the Right to his LIFE; the Right to his LIBERTY; the Right to his PROPERTY. ...
The three Rights are so bound together as to be essentially one Right, To give a man his life but deny him his liberty, is to take from him all that makes life worth living. To give him his liberty but take from him the property which is the fruit and badge of his liberty, is to still leave him a slave.
Thomas Jefferson said:
"Our rulers can have no authority over [our] natural rights, only as we have submitted to them. The rights of conscience we never submitted. We are answerable for them to our God. The legitimate powers of government extend to such acts only as are injurious to others."
This points up the significance of the requirement of the procedures of the Common Law that there be an injured party, that the injured party make a sworn complaint as to the injury that has been done to him by the alleged Defendant. That unless this is done, the Court does not have jurisdiction over the Defendant.
We have been told. from childhood, that we have unalienable Rights, and we do! Unalienable means that they cannot be taken from us, and that we cannot be forced to give them up. There are those who point out that, strictly speaking, we cannot even give them up voluntarily. However, if we submit to those who would rule over us, it is true that our Rights were not taken from us -- as Thomas Jefferson said, -- we have submitted to their rule. We have allowed ourselves to become their slaves. There is one important fact concerning slavery, of any sort, the institution of slavery depends upon the cooperation of the slaves! Without the cooperation of the slaves, there can be no slavery.
In Common Law Courts our Rights are protected. The Rules and Procedures of the Common Law Courts were established to protect our Property Rights -- to make it difficult for Property to be taken from someone without Due Process of Law. The Right to require That an injured party swear under oath as to damage or injury that he claims that you caused to him; the Right to a Corpus Delicti : The body of the offense: " the essence of the crime." : Under the Common Law, the Courts do not have an automatic jurisdiction. The Common Law Rules and Procedures specify certain steps, or procedures, which must be done, and certain things which must not be done -- all as a protection to the Rights of the Accused. And, as we have pointed out previously, Rights are inherent in Property, and Property is inherent in Rights. We have the Right to have our controversy, once the Common Law Court has acquired jurisdiction, tried before a Common Law Jury of our Peers, wherein the Jury has the authority to hear and decide questions of both Law and Fact. There is no monkey business of pretending that arguments involving the Law must be held outside of the hearing of the Jury and that their supposed only function is to hear and decide questions of Fact presented in evidence and that the Judge will tell them what the Law is !
As evidence that the Founding Fathers operated under the Common Law, in addition to the wording of the Constitution of the United States of America, the following was included in the instructions to the Jury in the first case ever tried before the United States Supreme Court, as a court of original jurisdiction, which means that a Trial by Jury was held in front of the Supreme Court, with Chief Justice John Jay presiding:
"It is presumed, that juries are the best judges of facts;
it is, on the other hand, presumably, that the courts are the best
judges of law. But still both objects are within your power of
decision. You have a right to take upon yourselves to judge both, and
to determine the law as well as the fact in controversy. "
STATE OF GEORGIA vs. BRAILSFORD . 3 Dall I (1794 )
Our Property Rights are inseparable from our individual Rights and our individual Rights are inseparable from our Property Rights. Both types of Rights are protected in the Procedures and Due Process of the Courts of Common Law.
The Bill of Rights in both Constitutions have to do with matters that the Governments, both of the United States and of the State, have to do with matters that the government, and its agents and agencies, have no authority over at all to enact statutes, or to issue rules and regulations, binding on the individual, dealing with such Rights as are included in the Bill of Rights. It should be emphasized that the Ninth Amendment includes all of the Common Law Rights which are not listed, or enumerated, anywhere else. In other words, the Bill of Rights are prohibitions against government at any level over the individual.
The Constitution authorizes Courts of Law and Courts of Equity. When the Constitution says Law, it means Common Law, because that's what the Founding Fathers meant when they said Law. In Courts of Law your Rights are protected by the Constitution and the Rules and Procedures of the Common Law, known as Due Process of Law; and the Bill of Rights was adopted to avoid misconstruction and abuse of powers, by the Judges; but in Courts of Equity, by the nature of Equity jurisdiction, you don't have any Constitutional Rights.
Within the existing Equity Courts the only rights you might acquire for yourself are the terrible so-called Civil Rights or the rights under the Uniform Commercial Code. These are much lesser rights than those of the Constitution because these latter are Natural God given rights whereas the former are granted privileges from an artificial government of bureaucrats.
You know you are in an Equity/Admiralty Court when an American flag is displayed that has a GOLD trim. The gold trim denotes military jurisdiction and not Common Law or Constitutional jurisdiction. Wherever this flag is flown the Constitution is NOT. To see the civilian flag click here.
In order for you to understand the full import of what is happening, I must explain certain laws to you.
When passing new statutes, the Federal government always does everything according to the principles of law. In order for the Federal Government to tax a Citizen of one of the several states, they had to create some sort of contractual nexus. This contractual nexus is the "Social Security Number".
In 1935, the federal government instituted Social Security. The Social Security Board then created 10 Social Security "Districts". The combination of these "Districts" resulted in a "Federal area" which covered all the several states like a clear plastic overlay.
In 1939, the federal government instituted the "Public Salary Tax Act of 1939". This Act is a municipal law of the District of Columbia for taxing all federal and state government employees and those who live and work in any "Federal area".
Now, the government knows it cannot tax those state Citizens who live and work outside the territorial jurisdiction of Article I, Section 8, Clause 17 (1:8:17) or Article 4, Section 3, Clause 2 (4:3:2) in the U.S. Constitution . So, in 1940, Congress passed the "Buck Act", 4 U.S.C.S. Sections 105-113. In Section 110(e), this Act authorized any department of the federal government to create a "Federal area" for imposition of the "Public Salary Tax Act of 1939". This tax is imposed at 4 U.S.C.S. Sec. 111. The rest of the taxing law is found in the Internal Revenue Code. The Social Security Board had already created a "Federal area" overlay.
4 U.S.C.S. Sec. 110(d). The term "State" includes any Territory or possession of the United States.
4 U.S.C.S. Sec. 110(e). The term "Federal area" means any lands or premises held or acquired by or for the use of the United States or any department, establishment, or agency of the United States; and any Federal area, or any part thereof which is located within the exterior boundaries of any State, shall be deemed to be a Federal area located within such State.
There is no reasonable doubt that the federal "State" is imposing an excise tax under the provisions of 4 U.S.C.S. Section 105, which states in pertinent part:
Sec. 105. State, and so forth, taxation affecting Federal areas; sales or use tax
(a) No person shall be relieved from liability for payment of, collection of, or accounting for any sales or use tax levied by any State, or by any duly constituted taxing authority therein, having jurisdiction to levy such tax, on the ground that the sale or use, with respect to which such tax is levied, occurred in whole or in part within a Federal area; and such State or taxing authority shall have full jurisdiction and power to levy and collect any such tax in any Federal area within such State to the same extent and with the same effect as though such area was not a Federal area.
Irrespective of what the tax is called, if its purpose is to produce revenue, it is an income tax or a receipts tax under the Buck Act [4 U.S.C.A, Secs, 105-110]. Humble Oil & Refining Co. v. Calvert, 464 SW 2d. 170 (1971), affd (Tex) 478 SW 2d. 926, cert. den. 409 U.S. 967, 34 L.Ed. 2d. 234, 93S. Ct. 293.
Thus, the obvious question arises: What is a "Federal area"? A "Federal area" is any area designated by any agency, department, or establishment of the federal Government. This includes the Social Security areas designated by the Social Security Administration, any public housing area that has federal funding, a home that has a federal bank loan, a road that has federal funding, and almost everything that the federal government touches through any type of aid. Springfield v. Kenny, 104 N.E, 2d 65 (1951 App.). This "Federal area" attaches to anyone who has a Social Security Number or any personal contact with the federal or state governments. Through this mechanism, the federal government usurped the Sovereignty of the People, as well as the Sovereignty of the several states, by creating "Federal areas" within the boundaries of the states under the authority of Article 4, Section 3, Clause 2 (4:3:2) in the federal Constitution, which states:
2. The Congress shall have Power to dispose of and make all needful Rules and Regulations respecting the Territory or other Property belonging to the United States, and nothing in this Constitution shall be so construed as to prejudice any claims of the United States, or of any particular State.
Therefore, all U.S. citizens [i.e, citizens of the District of Columbia] residing in one of the states of the Union, are classified as property, as franchisees of the federal government, and as an "individual entity". See Wheeling Steel Corp, v. Fox, 298 U.S. 193, 80 L.Ed. 1143, 56 S. Ct, 773. Under the "Buck Act", 4 U.S.C.S. Secs. 105-113, the federal government has created a "Federal area" within the boundaries of all the several states. This area is similar to any territory that the federal government acquires through purchase, conquest or treaty, thereby imposing federal territorial law upon all people in this "Federal area". Federal territorial law is evidenced by the Executive Branch's yellow-fringed U.S. flag flying in schools, offices and all courtrooms. To see the civilian flag click here.
You must live on land in one of the states in the Union of several states, not in any "Federal State" or "Federal area", nor can you be involved in any activity that would make you subject to "federal laws". You cannot have a valid Social Security Number, a "resident" driver's license, a motor vehicle registered in your name, a "federal" bank account, a Federal Register Account Number relating to Individual persons [SSN], (see Executive Order Number 9397, November 1943), or any other known "contract implied in fact" that would place you within any "Federal area" and thus within the territorial jurisdiction of the municipal laws of Congress, Remember, all acts of Congress are territorial in nature and only apply within the territorial jurisdiction of Congress. (See American Banana Co, v. United Fruit Co., 213 U.S. 347, 356-357 (1909); U.S. v. Spelar, 338 U.S. 217, 222, 94 L.Ed. 3, 70 S, Ct. 10(1949); New York Central R.R. Co, v. Chisholm, 268 U.S. 29, 31-32, 69 L.Ed, 828, 45 S. Ct. 402 (1925).)
There has been created a fictional Federal "State within a state". See Howard v. Sinking Fund of Louisville, 344 U.S. 624, 73 S. Ct. 465, 476, 97 L.Ed, 617 (1953); Schwartz v. O'Hara TP. School Dist., 100 A. 2d, 621, 625, 375 Pa. 440, (Compare also 31 C.F.R. Parts 51.2 and 52.2, which also identify a fictional State within a state.) This fictional "State" is identified by the use of two-letter abbreviations like "CA", "AZ" and "TX", as distinguished from the authorized abbreviations like "Calif.", "Ariz." and "Tex.", etc. This fictional State also uses ZIP codes which are within the municipal, exclusive legislative jurisdiction of Congress.
This entire scheme was accomplished by passage of the "Buck Act", 4 U.S.C.S. Secs. 105-113, to implement the application of the "Public Salary Tax Act of 1939" to workers within the private sector. This subjects all private sector workers who have a Social Security number to all state and federal laws "within this State", a "fictional Federal area" overlaying the land in California and in all other states in the Union. In California, this is established by California Form 590, Revenue and Taxation. All you have to do is to state that you live in California. This establishes that you do not live in a "Federal area" and that you are exempt from the Public Salary Tax Act of 1939 and also from the California Income Tax for residents who live "in this State".
The following definition is used throughout the several states in the application of their municipal laws which require some sort of contract for proper application. This definition is also included in all the codes of California, Nevada, Arizona, Utah and New York:
"In this State" or "in the State" means within the exterior limits of the State ... and includes all territories within such limits owned or ceded to the United States of America.
This definition concurs with the "Buck Act" supra which states:
110(d) The term "State" includes any Territory or possession of the United States.
110(e) The term "Federal area" means any lands or remises held or acquired by or for the use of the United States or any department, establishment, or agency of the United States; and any Federal area, or any part thereof which is located within the exterior boundaries of any State, shall be deemed to be a Federal area located within such State.
So, do some research. I have given you all the proper directions in which to look for the jurisdictional nexus that places you within the purview of the federal government.
Wake up! Get active!!!! Do something!!! Do a little research! We can all do something -no matter how seemingly insignificant.
We can: pass along pamphlets like this one. We can attend weekly meetings assembled for no other purpose than to figure out what to do. We can attend city and county council meetings and see that our servants don't steal the store. We can participate in local and state elections. The federal elections are reported to be totally rigged. We can have a positive influence on local and state affairs, PTAs and school boards. It takes little more than writing a letter, sending a FAX or making a phone call to your various servants. They listen when enough of us take the time to get their attention.
"Hey! Buddy! You work for We The People! not the Japanese, the bankers or Europeans. You will take care of our business and do it right!"
If your local servants refuse to obey the Constitution and your neighbors get someone who will to run for their office, Then get out there and make sure they get elected. This is the only way We The People can take back our government from the special interest groups.
This is happening all over the country. Counties have been taken back in Indiana, Alabama, New Mexico, Nevada and California. Why not yours? It is a simple thing to do.
Do it! Millions of Americans are beginning to find out who they really are and who the government really is.
"Compelling a freeborn, Sovereign American individual to do anything, except upon the verdict of a Common Law Jury, constitutes an enforcement of the alien and evil Roman Civil (Equity) Law and is in fact fascist totalitarianism. "
"There is no lawful authority for Judges and the Courts to direct the law enforcement activities of a County Sheriff. The Sheriff is accountable and responsible only to the citizens who are inhabitants of his County, He is under Oath of Office, and need not receive unlawful Orders from Judges or the Courts. He is responsible to protect citizens, even from unlawful acts of officials of government. He should not allow his office to be used as an unlawful "lackey" of the Courts or Federal agents or agencies." | <urn:uuid:31c6e467-b9d0-4038-9d13-24064ab4ea7f> | CC-MAIN-2013-20 | http://www.svpvril.com/OACL.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704658856/warc/CC-MAIN-20130516114418-00050-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.962725 | 15,500 | 2.921875 | 3 |
Mystery sandpiper photo by Corey Finger, who relates the whole story hereNow this photo (above) has been posted and discussed on ID-Frontiers, with no consensus on the identification, but with Least and Sharp-tailed - two species of very different sizes - both getting votes. Again I was intrigued by the question of size judgment. I traced bird outlines from two photographs to compare body size and proportions.
These outlines (below) show two species, different sizes in life but adjusted here so that the wing length and body size are about the same.
In this demonstration, the most striking difference is the relative size of the head, making the upper bird look big-headed while the lower bird looks small-headed. There also appears to be a difference in the back end, at least in these two images, but I can cover up that part of the image and still get a strong size impression from just the front half of these two birds.
The upper sketch is traced from a Least Sandpiper photograph, the lower is traced from a Sharp-tailed Sandpiper photograph (both photos in Crossley, Karlson, and O'Brien, The Shorebird Guide).
Does this actually help identify the mystery sandpiper in the photo above? I think so. To me the mystery bird's head size matches the Least Sandpiper better than the Sharp-tailed. And I think head size is also the key to judging the size of the flying sandpipers in the earlier mystery photos. It may not be definitive, but it's another point to add to the mix.
This is not to say that larger birds of all species look relatively small-headed (Cooper's vs. Sharp-shinned Hawk is an obvious exception) but whenever we are judging size in the field or from photos it's worth pausing to think about what goes into that judgment. Most often it does not involve actual direct comparison of sizes, and I suspect that experienced observers subconsciously rely on body proportions in a lot of cases. | <urn:uuid:d47e48e8-7038-44ac-ab8d-415d4494bf0e> | CC-MAIN-2013-20 | http://sibleyguides.blogspot.com/2007/08/judging-size-of-birds.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368710274484/warc/CC-MAIN-20130516131754-00097-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.948018 | 417 | 2.640625 | 3 |
Every year, North America's Marine Protected Areas contribute millions of dollars to the economy.
Much of the sustainably caught seafood you see in grocery stores and eat in restaurants comes from the Gulf of Mexico.
Marine protected areas here protect coastal wetlands that are essential nursery grounds for shrimp and other commercially important fish.
In Banco Chinchorro and Sian Ka'an biosphere reserves, fishermen have established cooperatives that market sustainably caught lobster. These cooperatives support local communities dependent upon marine resources.
Millions of people also visit these and other marine protected areas nearby to relax on the beach and enjoy a variety of water sports. This generates thousands of jobs in tourism and related businesses.
Along Canada's West Coast, kelp forests and herring help sustain First Nations communities. Herring eggs laid on kelp are harvested as a delicacy.
For the Haida people, protecting fish habitat is a way of life.
Up and down North America's coasts, whale watching brings people and local benefits from all over the world. In these and many other marine protected area across North America, tourists come to see these magnificent creatures.North America's marine protected areas contribute to the economy and help many people sustain a way of life. | <urn:uuid:f524a044-abec-40c3-9411-56dc0f3b2c7f> | CC-MAIN-2014-15 | http://oceantoday.noaa.gov/nampan_jobs/welcome.html | s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223203841.5/warc/CC-MAIN-20140423032003-00344-ip-10-147-4-33.ec2.internal.warc.gz | en | 0.921938 | 254 | 3.25 | 3 |
BATTLE, NICHOLAS WILLIAM
BATTLE, NICHOLAS WILLIAM (1820–1905). Nicholas William Battle, judge and soldier, was born on January 1, 1820, in Warren County, Georgia, the son of Thomas and Mary (Baker) Battle. The elder Battle was a Methodist minister. Nicholas Battle was educated in Monroe County, Georgia, and in 1842 graduated from the College of William and Mary with a degree in law. He returned to Georgia, continued his legal studies, and was admitted to the bar at Macon in 1844. In 1846 he married Mary Ann Cabaniss. He established a practice in Forsythe, but in 1850 moved to Texas and settled in Waco.
In 1854 and 1856 Battle was elected district attorney, and in 1858 he was elected judge of the Third Judicial District. In May 1852 he was a leader in the movement to bring the railroad to Waco. In December 1852 he was appointed chairman of a committee to plan and build the Waco Masonic Institute, a "Female Academy and Male High School." With the outbreak of the Civil War Battle resigned his seat on the bench to join the army and was soon elected lieutenant colonel of Col. Edward Jeremiah Gurley's Thirtieth Texas Cavalry, also known as the First Texas Partisan Cavalry. This regiment was organized in late 1862 and served primarily in Indian Territory. In August 1862, soon after the regiment's formation, Battle transferred to the staff of Brig. Gen. Samuel Bell Maxey and served as his inspector general.
At the end of the war Battle resumed his practice in Waco and in 1874 was appointed district judge by Governor Richard Coke. One of his decisions on the bench was that no freedman could sell himself into slavery under the laws of the state of Texas and that any such contract was ab initio null and void. His opinion was upheld by the Texas Supreme Court in the case of Westbrook vs. the State. Judge Battle's district was abolished by the Constitution of 1876.
Battle was a Baptist. In 1888 he moved to Seattle to live with his sons. He died there August 22, 1905, and is buried in Seattle’s Lake View Cemetery. The community of Battle in southeast McLennan County was named for him.
Biographical Encyclopedia of Texas (New York: Southern, 1880). James D. Lynch, The Bench and Bar of Texas (St. Louis, 1885). A Memorial and Biographical History of McLennan, Falls, Bell, and Coryell Counties (Chicago: Lewis, 1893; rpt., St. Louis: Ingmire, 1984). Texas State Gazette, June 19, December 25, 1852.
The following, adapted from the Chicago Manual of Style, 15th edition, is the preferred citation for this article.Thomas W. Cutrer, "BATTLE, NICHOLAS WILLIAM," Handbook of Texas Online (http://www.tshaonline.org/handbook/online/articles/fbaaj), accessed September 02, 2014. Uploaded on June 12, 2010. Modified on July 7, 2011. Published by the Texas State Historical Association. | <urn:uuid:07fe9fda-aa4a-4330-a7cc-4d275f21a393> | CC-MAIN-2014-35 | http://www.tshaonline.org/handbook/online/articles/fbaaj | s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535921872.11/warc/CC-MAIN-20140909040059-00335-ip-10-180-136-8.ec2.internal.warc.gz | en | 0.979624 | 658 | 2.578125 | 3 |
We all agree that learning to read is a critical step in a child's education. But teaching children to read is controversial. In classrooms, legislatures, universities, school districts -- even courtrooms -- there is debate about what makes a good literacy program. Is phonics the answer? Whole language? A mix of both?
Amid the controversy, it can be difficult to know how to approach literacy instruction. In developing this video library, we focused on "what works" by featuring the instruction of exemplary teachers who, year after year, successfully teach students to read. Collectively, these teachers represent a range of teaching styles and practices. Each teacher's instruction, crafted to meet the needs of individual students, blends the best from different approaches. These teachers show, by way of example, that there is not one way to teach reading.
As you watch the videos, use the Observational Checklist (PDF), to help you focus on the important aspects of a literacy classroom. The Literacy Teaching Practices you'll see require varying levels of teacher support, from more (as in read-aloud) to less (as in independent reading). Each practice addresses one or more of the Essential Components of Literacy Development, which we've adapted from the findings of the National Reading Panel. | <urn:uuid:6bd4ab3f-41ed-4189-9df4-812a789eac29> | CC-MAIN-2013-48 | http://www.learner.org/libraries/readingk2/front/method.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163037952/warc/CC-MAIN-20131204131717-00008-ip-10-33-133-15.ec2.internal.warc.gz | en | 0.940637 | 257 | 4.34375 | 4 |
The solar powered Impulse HB-SIA has successfully completed its maiden voyage over a picturesque Swiss airfield.
Test pilot Markus Scherdel spent most of the 87 minute flight familiarizing himself with the prototype’s “behavior” and “controllability” at a top altitude of 1200 meters before making the first landing on the Vaudois tarmac.
“This first flight was for me a very intense moment,” Scherdel said as he stepped down from the aircraft.
“The HB-SIA behaved just as the flight simulator told us! Despite its immense size and feather weight, the aircraft’s controllability matches our expectations!”
However, Solar Impulse Chairman Bertrand Piccard acknowledged that the solar powered plane still had a “long way to go” until it was capable of flying at night and an even “longer way” before it could successfully navigate around the world.
“But today, thanks to the extraordinary work of an entire team, an essential step towards achieving our vision has been taken,” explained Piccard.
“Our future depends on our ability to convert rapidly to the use of renewable energies. Solar Impulse is intended to demonstrate what can be done already today by using these energies and applying new technologies that can save natural resources.”
The Impulse – which was constructed over the course of six years – is powered by 12,000 solar cells, 880 pounds of lithium batteries and four 10-horsepower electric motors. The plane is eventually expected to attain an average flying speed of 70 kms per hour and achieve a maximum altitude of 8,500 meters, or 27,900 feet. | <urn:uuid:de8bc3ba-dcf4-4a00-ac2e-e1ce3ad5959e> | CC-MAIN-2023-50 | https://tgdaily.com/science/solar-powered-plane-soars-over-swiss-skies/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100545.7/warc/CC-MAIN-20231205041842-20231205071842-00147.warc.gz | en | 0.94844 | 353 | 2.75 | 3 |
Hubble's Visual History of Mars
The orbits of the planets Earth and Mars provide a geometric line up that is out of this world! Every 26 months Mars is opposite the Sun in our nighttime sky. Since the repair of the Hubble telescope in 1993, Mars has been at such an "opposition" with the Sun six times. A colour composite from each of the six Hubble opposition observations has been assembled in this mosaic to showcase the beauty and splendor that is "The Red Planet."
About the Image
About the Object
|Type:||• X - Solar System Images/Videos| | <urn:uuid:4b43ae8a-6acb-4708-b352-22fdb9134749> | CC-MAIN-2013-48 | http://www.spacetelescope.org/images/opo0534e/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163052909/warc/CC-MAIN-20131204131732-00084-ip-10-33-133-15.ec2.internal.warc.gz | en | 0.90062 | 121 | 3.078125 | 3 |
Bird Counts and Surveys in Timiskaming District
There are a number of ongoing bird surveys and monitoring programs that are being carried out in Timiskaming District. All are conducted by knowledgeable volunteers to improve our understanding of local bird populations and how they may be changing over time, while simultaneously contributing to Provincial and North American databases that are used by scientists to understand regional and continental trends in bird populations. This data helps provide us with early warning signs of species and habitats that may be in need of special conservation attention.
The Audubon Christmas Bird Count is an annual event that takes place throughout North, Central and South America between mid-December and early January. Each count takes place during a single calendar day and covers the area within a circle measuring 24 kilometers in diameter. The birders are often out from dawn to dusk recording not only the different species seen, but also the number of individuals of each species. There are three currently active count circles in Timiskaming District where Christmas Bird Counts are conducted annually, Haileybury, Mountain Chutes, and Hilliardton Marsh. For count results, click HERE.
In addition to the formal Audubon Christmas Bird Counts conducted in Timiskaming District each year, the Kirkland Lake Nature Club has conducted a very similar annual count since 1952. It is conducted in the same manner as an Audubon count, but because they do not confine the count to the inside of a circle 24 kilometers in diameter, the results are considered non-standard, and therefore not accepted by the Audubon Society. Nevertheless, it is the longest continuously running survey in Timiskaming District, and has great value in providing some historical context to the early winter bird picture in Timiskaming. For count results, click HERE. | <urn:uuid:49966cfc-23cd-4224-bddb-3aa3447bceeb> | CC-MAIN-2017-30 | http://timbirds.info/surveys.htm | s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549425751.38/warc/CC-MAIN-20170726022311-20170726042311-00278.warc.gz | en | 0.940065 | 359 | 2.890625 | 3 |
zSpace a Potential Game Changer for Students With Disabilities
DES MOINES, Iowa (August 3, 2016) -- Today at the 2016 School Administrators of Iowa Conference, Iowa Vocational Rehabilitation Services (IVRS) announced that it is incorporating virtual reality (VR) technology into its curriculum to ignite the interest of special needs students in STEM (Science, Technology, Engineering and Math) careers and support their development of 21st-century work skills. Using zSpace, an interactive VR technology, students learn STEM subjects using 3D, virtual-holographic images that they can move and manipulate. Initial pilots with the technology indicate that zSpace could transform the way students with disabilities are taught.
The active participation and enthusiasm students exhibit with zSpace are some of the reasons Kenda Jochimsen, bureau chief of Iowa Rehabilitation Services, is expanding the usage of virtual reality at IVRS.
“I knew students loved anything technology and did not doubt the value of the medium by which students would be presented information,” she said. “But when I observed students in high school who have disabilities, who are in special education, use zSpace’s virtual reality computer, I was convinced that this could be a potential game changer for students with disabilities.”
Observers watch as zSpace draws students together
Jochimsen described one of the initial learning sessions with zSpace. At the start of the session, the students were quiet, and one student was unable to maintain much eye contact with an adult and reticent to get involved.
Another male student with significant written language deficits was not confident enough to even ask aloud for assistance. A female student who was more outgoing appeared to be excited and interested, but she and another female student approached the system as isolated learners.
Within 15 minutes three of the students began interacting with one another, and within 20 minutes the young male student was asking the other two students how to spell words that needed to be entered into the unit being studied.
Gradually, over the course of about 45 minutes, the student who repeatedly refused to get involved began to move forward in her chair, unlock her arms, and within an hour was on the edge of her seat participating, and actually indicated an interest in taking the lead on a botany unit.
Learning 21st-century workforce skills
Students at IVRS can use zSpace to engage in activities such as dissecting virtual biological specimens and performing troubleshooting exercises on an electricity unit. However, for Jochimsen, the most exciting occurrence is that students demonstrate the exact skills the instructors at IVRS try to instill in all their students -- 21st-century skills that every employer looks for, such as:
“I have rarely heard a student in special education want to stay at a lesson even when it was time to go home,” said Jochimsen. “They’re also interacting with each other and the instructors like they never have before. Students in different social groups are working together, and the student who was reticent to be involved said good bye and looked me in the eye as she left.”
IVRS is going to incorporate zSpace into two districts to determine the impact on measurable skill gains, generating interest in STEM, and development of career goals due to the connection with career exploration the system offers as our counselors work with the district to connect the zSpace system with the needs of local employers.
“It appears that zSpace could transform learning for students in special education,” said Jochimsen. “Given the results we’ve seen so far, we are going to evaluate if what we’ve seen can continue and create a lasting impact.”
About Iowa Vocational Rehabilitation Services
The mission of the Iowa Vocational Rehabilitation Services is to work for and with individuals who have disabilities to achieve their employment, independence and economic goals. For more information, visit http://www.ivrs.iowa.gov
zSpace is a leading-edge technology provider that delivers a new way of learning with its flagship product, zSpace®. Focused on K12 education, zSpace inspires and accelerates understanding through real world virtual reality. zSpace was named “Cool Vendor” by Gartner, Inc. and awarded “Best in Show at ISTE” by Tech and Learning Magazine for the past three years. zSpace is a privately held, venture backed company located in Sunnyvale, California, and has been granted more than 30 patents for its innovative technologies. For more information, visit www.zspace.com, or follow on Twitter @zSpace. | <urn:uuid:b8491867-45b2-4413-a22b-175c43560a3f> | CC-MAIN-2017-47 | http://zspace.com/about/press-releases/iowa-vocational-implements-virtual-reality-technology | s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934809746.91/warc/CC-MAIN-20171125090503-20171125110503-00662.warc.gz | en | 0.967167 | 959 | 3.171875 | 3 |
The owner of the UK’s biggest gas distribution network, with 80,000 miles of pipes, explains how gas has a role in the net zero future
If you manage a public building, run your own business, or own your own home, you’re no doubt thinking right now about how you can make it carbon neutral. Before you start a massive, costly overhaul, pause and find out why your options may involve less disruption than you think…
This is set to be a pivotal year for UK action and decisions on climate change. The nation now has a course firmly set for ‘net zero’ by 2050 and an Energy White Paper is expected to land. The UK is also due to host the United Nations Conference on Climate Change (COP26) in Glasgow in November.
It is a pivotal year too for Cadent, the owner of the biggest gas network in the UK. It manages over 80,000 miles of underground pipes, distributing gas to more than 11 million properties.
Cadent knows the gas carried through those pipes needs to be much greener to support a clean energy future. That’s why Cadent is involved in the climate change debate, advising decision-makers as they plot the pathway to cutting carbon emissions, at both regional and national level.
Cadent’s central argument is for a ‘whole systems’ approach – advocating that the UK opts for multiple, sustainable means to meet its energy needs, and not rely on one single energy source.
Of all the options on the table, repurposing the gas network to carry greener energy will be the least disruptive and the least-cost. The Committee on Climate Change has determined that the use of hydrogen in our energy system is necessary in order to reach the net zero target.
“There is no one-size-fits-all answer to reaching net zero,” said Dr Angela Needle, Director of Strategy at Cadent.
“To be realistic and truly sustainable, we need to look at a range of solutions and choices. For some things, renewable electricity will be the answer, but for others – such as decarbonising heavy industry, how we heat our homes and public buildings, and how we power many of our vehicles – it’s clear that gas is going to continue to have a role too; greener gas, such as hydrogen.”
Heating homes and businesses accounts for half of the UK’s energy use and one third of its carbon emissions. Some 85% of buildings are heated by gas – and for good reason.
Gas is the best technology for delivering and storing large volumes of heat energy. For example, Cadent’s London network alone provides 24GW at peak hours in winter – this would require the equivalent output of seven Hinkley Point C nuclear power stations if this heat was electrified.
Gas is also very flexible: it can cope with the huge seasonal and in-day variations in heat demand. And, in a move set to transform the UK energy landscape, this gas we rely on is getting much greener – with Cadent-backed projects on track for large-scale use of hydrogen as soon as 2024.
The UK is no stranger to hydrogen – it was a substantial component of the ‘town gas’ that heated our homes until the discovery and switch to methane-rich North Sea gas more than 50 years ago.
Now, in 2020, Cadent is a leading player in seeking to put it back into the network – and, in so doing, achieve huge reductions in UK carbon emissions. Unlike methane (i.e. most of the gas we use now), hydrogen produces ZERO carbon at point of use. So, using it to help heat homes and public buildings, as well as for heavy industry and transport (fuel for HGVs, busses and trains) will massively reduce carbon emissions.
Cadent is leading the charge. Late in 2019, HyDeploy, a project led by Cadent, began at Keele University in Staffordshire. Hydrogen is being distributed via existing pipes, into existing appliances, to around 100 homes and 30 faculty buildings. It is being blended with natural gas at volumes up to 20% – at that volume, there is no need to change any pipes or appliances. Customers use gas exactly the same way, but with one big difference: overnight, they have substantially reduced their carbon footprint. Two more demonstrations will conclude before the end of 2022.
And these then lead into a Cadent-backed plan to introduce hydrogen at the same 20% volume to around 2 million homes in North West England. This is part of a wider project, HyNet, conceived by Cadent and now backed by industry, business and political leaders. As well as heating homes, the HyNet project envisages using hydrogen also for meeting the colossal heat demand from energy-intensive heavy industry in the North West region, as well as a fuel for transport.
It is impossible to overstate the importance of these projects. They are not only the first practical demonstration and first large-scale use of hydrogen in a modern gas network in the UK: they could also be the launchpad for a wider hydrogen economy, fuelling industry and transport, bringing thousands of new jobs, and making Britain a knowledge-hub and world-leader in this technology.
Cadent believes that repurposing the existing gas network to take green gases like hydrogen and also biomethane means we can decarbonise heat while minimising the disruption and cost to all consumers, including those who can least afford expensive new technologies.
Dr Needle added: “Blending is a great place to start. It allows us to make carbon savings now without members of the public having to do anything at all: no change in how warm we are; no change in behaviour; no change in heating systems; and no disruption. Rolled out across the country, the UK would save 6 million tonnes of carbon dioxide every year – the equivalent to taking 2.5 million cars off the road.
“A 20% blend of hydrogen and natural gas alone won’t get us to net zero but it does open the door to that possibility. Blending would kickstart the hydrogen supply chain and the scale of hydrogen production needed to reach higher hydrogen blends or even 100% hydrogen.
“Importantly too, blending means carbon savings now while other low carbon technologies are being developed, and while Government frameworks and policies are being put in place to allow hydrogen to become part of our energy mix.”
Please note: This is a commercial profile | <urn:uuid:d0ff8484-c473-4ca0-81b0-28121de99e8e> | CC-MAIN-2020-24 | https://www.openaccessgovernment.org/cadent-using-hydrogen-for-a-net-zero-future/85053/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347428990.62/warc/CC-MAIN-20200603015534-20200603045534-00060.warc.gz | en | 0.94604 | 1,355 | 2.53125 | 3 |
Fixed limit gauges are precision devices generally used in a production environment for rapid, accurate and full proof inspection of component parts during and after a production process. There are certain basic rules which need to be followed to ensure the gages perform to their expected accuracy and have a long operational life.
• Ensure at all times the gauge, and in particular the gauging surfaces, are kept clean and free from dirt, grease and in particular abrasive material.
• Always take into account the abrasive action of the component part on the gauge. For example, cast-iron, cast-aluminium and steel are more abrasive than brass, copper or plastic, consequently particular care and more frequent calibration should be in-place when inspecting components produced from abrasive materials.
• Fixed limit gauges should always be held either by hand or in a suitable gage holder.
• A common challenge is to ensure different operators achieve consistent gauging result when using pin and plug gauges. This can be assured by simply using the weight of the gauge rather than operator load to determine the Go, No Go status.
• When the gauge is not in use it should be stored in a suitable drawer where each gauge is located in its own dedicated space and there is no opportunity for damage.
• Reversible Pin and Tri-Lock Plug Gauges should be regularly calibrated using a traceable standard, when excessive wear is recorded the pins or gauge members should be reversed thereby doubling the gauge life.
• When setting Adjustable Snap Gauges always use a traceable standard for setting the Go and No-Go gauge dimensions, using either gauge blocks or master setting pins.
• YPG gauges are produced to the highest standards using top quality materials, despite this, when used round the clock gauging tens of thousands of component wear could occur. It could take years of service life for errors to become noticeable regular calibration will ensure gauge integrity. The guidelines above will minimize any problems. | <urn:uuid:7156a43b-f382-40e9-8505-d320098f6fe8> | CC-MAIN-2023-23 | https://www.ypg-ltd.com/applications/care-and-usage/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648209.30/warc/CC-MAIN-20230601211701-20230602001701-00696.warc.gz | en | 0.910777 | 396 | 2.640625 | 3 |
Today marks a extremely sad moment in US history, the end of the Space Shuttle program. STS135, the mission name for the final shuttle mission of Atlantis, the last shuttle to visit the ISS, was a resounding success. Now, the aging ship is scheduled to be mothballed.
The Space Shuttle program began in 1981, and ran for an impressive thirty years; the longest any space flight program has ever run. The first fully functional shuttle was the Columbia, which launched on 12 April, 1981. This was followed by four more shuttles, Challenger, Discovery, Endeavour and Atlantis. The orbiters were built with the purpose of creating a reusable ship that could perform short distance space operations such as launching satellites, performing experiments in space and servicing satellites such as the Hubble Telescope.
Space travel does have massive risks, and this was realized during two missions. On January 28, 1986, Space Shuttle Challenger was destroyed in a horrifying accident, breaking apart 73 seconds into flight causing all seven members of the crew to perish. This disaster put the shuttle program on hold for 32-months and it was discovered that the cause of the accident was due to an O-ring seal failing. Challenger was later replaced by Endeavour.
Seventeen years later, on February 1, 2003, Columbia was also involved in a tragedy, where it broke up on re-entry to the atmosphere, killing all seven members of the crew. The mission was originally delayed 18 times before launch, and when it finally did launch a large piece of foam damaged the thermal tiles that protect the ship from hot gasses, which tragically destroyed the ship.
However, despite the disasters of the Space Shuttle program, it has achieved many great victories in thirty years. Clocking up 135 flights, and a whopping total of 1331 days of flight time. During their lifetimes, the space craft were able to make many achievements such as taking the first American woman to space, refurbishing satellites that were already in orbit, deploying satellites such as the Hubble Space Telescope and launching spacecraft like the Magellan to explore Venus.
The Space Shuttle program was always destined to be retired in 2011, but was scheduled to be replaced with Project Constellation which was intended "to gain significant experience in operating away from Earth's environment, develop technologies needed for opening the space frontier, and conduct fundamental science." The destiny of the crafts is now museums across the US, as they are decommissioned and made safe for the public to view over the coming days.
The next space program was already being planned, but unfortunately under the new Obama administration NASA had its funding cut and the project was officially shut down upon signing of the new NASA Authorization act on October 10, 2010. According to the new program, deep space flight may not be possible until 2030 at the earliest.
The Space Shuttle program holds a special place in many hearts worldwide, and will be sorely missed. In the final words of the NASA team from the live feed today, "Job well done, America." | <urn:uuid:1397ed71-4c96-438e-89ea-332d066f0a96> | CC-MAIN-2013-20 | http://www.neowin.net/news/goodbye-space-shuttle-atlantis-touches-down-for-the-last-time | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697420704/warc/CC-MAIN-20130516094340-00083-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.975439 | 612 | 3.3125 | 3 |
“Universal health coverage is a human right.” This was a welcome statement from the new Director General of the World Health Organization, Dr Tedros Adhanom Ghebreyesus. Europe, as one of the most affluent parts of the world with an admirable history of social protection and welfare states, should be leading the way in ensuring that this human right is not violated for anyone, regardless of ethnicity, sex, language, colour or immigration status. And yet The European Network to Reduce Vulnerabilities in Health Observatory Report, published today by Doctors of the World (Médecins du Monde), provides evidence of the systematic failure of European health systems for many people currently living within the region.
The Observatory Report provides an overview of the European programmes run by Doctors of the World and partner non-governmental organisations across Europe. It contains data from 43,286 people who were a mixture of EU nationals, EU and non-EU/EEA migrants, and seen in clinics in 13 different European countries in 2016. The report describes the plight of individuals who were unable to access healthcare services, detailing how they were excluded and outlining their underlying health needs. 55.2% of individuals attending Doctors of the World associated programmes stated that they had no access to healthcare coverage, with a further 18.3% reporting coverage for emergencies only. Administrative barriers, cost, and fear of being arrested were all common reasons for the lack of access. The introduction of upfront charging of overseas visitors using the NHS, and disclosure of patients’ data to the UK Home Office for immigration enforcement, are examples of the drivers of these findings and must be condemned and withdrawn. [4,5]
This lack of access, to even basic healthcare provision, could have severe consequences for many. For example, all pregnant women should have early access to antenatal care and yet the majority—58.4%—had not received any such care before seeking help from Doctors of the World. This lack of attendance to healthcare facilities puts the lives and health of these mothers and their children at great risk. Urgent plans should be put in place across Europe to ensure these women gain the same standard of antenatal care as others, wherever they reside.
Vaccination levels in children, who made up one fifth of those seen, were low and present an ongoing risk to European-wide communicable disease control. Measles requires vaccination coverage levels over 90% to ensure herd immunity, and yet reported levels of MMR vaccination were only at 68.5% in children under 18. Public Health colleagues across Europe should review their vaccination provision for the groups highlighted in the report and ensure there is an equitable service that can reach children currently being missed or excluded. A failure to take this enlightened self-interest approach will result in non-discriminatory outbreaks that affect everyone.
The needs of individuals seen in Doctors of the World clinics were significant and illustrate the extent to which some individuals in our society remain highly marginalised. It highlights how people who are living in precarious circumstances, poverty, those who lack social networks, or who have migrated to a new country, are received by our healthcare systems. The only conclusion that can be made from the data is that European healthcare systems do not serve these individuals well, that their rights are not being met, and that healthcare coverage remains far from universal.
The EU and its constituent national governments need to take urgent action to respond to the findings of this report. The EU should support European-wide solutions to assist policy making to meet the health needs of the groups seen by Doctors of the World. National governments must ensure that administrative and economic barriers are removed for everyone in society, and make unequivocal guarantees that healthcare systems will not be used to enforce border control policies—vulnerable people should not fear arrest when seeking healthcare. These reassurances and changes in practice will benefit all people in Europe, not just the marginalised who are currently falling through the cracks in universal healthcare coverage.
Rob Aldridge is a Wellcome Trust Clinical Research Career Development Fellow at the Institute of Health Informatics. He qualified in medicine from University College London in 2007, gained an MSc in Epidemiology at The London School of Hygiene and Tropical Medicine in 2010 and completed his PhD at University College London in 2015.
Competing interests: RA was paid as a consultant to analyse and contribute to the writing of the the European Network to Reduce Vulnerabilities in Health Observatory Report. He is currently funded by a Wellcome Trust Clinical Research Career Development Fellowship (206602/Z/17/Z) and is a Commissioner on the UCL-Lancet Commission on migration and health.
Delan Devakumar is a NIHR Clinical Lecturer in public health in the Institute for Global Health, University College London. He qualified in medicine from the University of Manchester and worked in clinical paediatrics in the UK and New Zealand and with Medecins Sans Frontieres in Pakistan, South Sudan and Myanmar.
Competing interests: DD an unpaid consultant contributing to the European Network to Reduce Vulnerabilities in Health Observatory Report. He is currently funded by an NIHR Clinical Lectureship and is a Commissioner on the UCL-Lancet Commission on Migration and Health.
Ibrahim Abubakar is professor of infectious disease epidemiology and Director of the UCL Institute for Global Health (IGH). He is honorary Consultant at Public Health England, an NIHR Senior Investigator and honorary professor at LSHTM.
Competing interests: IA was paid as a consultant to analyse and contribute to the writing of the European Network to Reduce Vulnerabilities in Health Observatory Report. He is currently employed by UCL as fulltime academic with research funding from the NIHR, MRC and the Wellcome Trust. He is the chair of the UCL-Lancet Commission on migration and health.
1 Ghebreyesus TA. All roads lead to universal health coverage. Lancet Glob Health 2017;5:e839–40. doi:10.1016/S2214-109X(17)30295-4
2 Universal Declaration of Human Rights. 2015.http://www.un.org/en/universal-declaration-human-rights/ (accessed 2 Nov 2017).
3 Robert W Aldridge, Anna Miller, Bethany Jakubowski, et al. Falling through the Cracks: The Failure of Universal Healthcare Coverage in Europe. London: : European Network to Reduce Vulnerabilities in Health 2017.
4 Hiam L, McKee M. Upfront charging of overseas visitors using the NHS. BMJ 2017;359:j4713. doi:10.1136/bmj.j4713
5 Casla K, Roderick P, Pollock AM. Disclosure of patients’ data to the UK Home Office must stop. BMJ 2017;358:j3613. doi:10.1136/bmj.j3613
6 Cockman P, Dawson L, Mathur R, et al. Improving MMR vaccination rates: herd immunity is a realistic goal. BMJ 2011;343:d5703. doi:10.1136/bmj.d5703 | <urn:uuid:877651db-572e-4c22-a63f-283aa2b28180> | CC-MAIN-2017-47 | http://blogs.bmj.com/bmj/2017/11/08/doctors-of-the-world-vulnerable-people-should-not-fear-arrest-when-seeking-healthcare/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806708.81/warc/CC-MAIN-20171122233044-20171123013044-00038.warc.gz | en | 0.938507 | 1,471 | 2.71875 | 3 |
Pottery is one of the oldest art forms on Earth, but it didn't start out being considered art. For years, pottery was created by craftspeople strictly for utilitarian purposes with little consideration for how they looked. These pots were hand-built, fired in bonfires and served the purpose of carrying grains, water and other liquids, as well as storing seeds. Shortly thereafter they began to use pots for cooking.
Pottery is broken down into three wares -- earthenware, stoneware and porcelain. These are all considered ceramics, which explains why potters are often referred to as ceramic artists. It's a tactile, often meditative form of making art with a scientific bent. A good ceramic artist understands the tricky relationship between human and clay. Clay can be temperamental and the act of shaping, heating, hardening, cooling and glazing all take a lot of practice to get just right. There are many steps involved in creating a ceramic piece and entire volumes of books have been written about the intricacies of the craft.
The distinction between art and craft is hazy at best and pottery is considered both. Crafting has made a big comeback in recent years with both men and women discovering the fun of activities their parents enjoyed in the 1960s and 1970s like pottery, sewing, knitting and woodworking. It's become big business these days, too. The American Hobby Industry Association states that the craft industry grew by almost $10 million between 2000 and 2004 and in 2008, was a $31 billion dollar industry [source: hobby.org].
Whether working with hand-built pieces or on a potter's wheel, creating a ceramic piece can be a lot of fun. Read on to find out a little more history of this ancient art and craft. | <urn:uuid:7c3b46ee-03e7-4677-a2d2-493ce6f7f6c1> | CC-MAIN-2017-39 | http://home.howstuffworks.com/green-living/pottery.htm | s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818696696.79/warc/CC-MAIN-20170926212817-20170926232817-00624.warc.gz | en | 0.980397 | 367 | 3.09375 | 3 |
MIT spinoff Quaise Energy is building a drill that vaporizes rock — so that we can tap into the geothermal energy miles below our feet.
Geothermal energy: Earth’s core is as hot as the surface of the sun, but we don’t have to go too far below the surface to start feeling the heat — in the Mponeng gold mine in South Africa, which has a depth of 2.5 miles, rock temperatures can reach 140 degrees Fahrenheit.
Geothermal power generates electricity from this natural heat, and there’s enough of it to meet the energy needs of the entire world — if you can get to it.
The problem: Current drilling equipment, like that used for oil and gas, can’t withstand the super high temperatures and pressure at extreme depths, so our supply of geothermal power is mostly limited to volcanic regions (like Iceland or El Salvador) or hot water reservoirs near the surface.
Drilling with existing technology also gets exponentially more expensive the deeper you go — drilling twice as deep costs way more than twice as much.
This drastically limits where we can feasibly build geothermal plants, and good locations are not evenly distributed. This is one reason the U.S. has just 64 geothermal power plants, which produce a scant 0.4% of its electricity.
The idea: Quaise Energy is developing a new kind of drilling system that uses millimeter wave energy to melt and vaporize rock. It claims this system has the potential to drill to depths up to 12 miles — miles deeper than the deepest hole ever drilled with physical drill bits.
At those depths, temperatures will reach several hundreds degrees pretty much wherever you are. And when water gets that hot — “supercritical” — you can extract a ton of energy from it. Pumping water into these super-heated wells could produce steam to spin turbines and generate electricity.
Such a system would theoretically allow us to harness the power of geothermal energy almost anywhere, but Quaise proposes drilling first at the sites of existing traditional fossil fuel power plants.
The U.S. has thousands of these power stations, which burn coal or gas to run steam turbines. That means they already have the infrastructure and equipment in place to harness steam from geothermal energy and send it to the grid.
Looking ahead: Quaise has just raised another $40 million to further develop its drilling technology, and CEO Carlos Araque told Axios the company expects to demonstrate the tech in lab-controlled outdoor conditions this year, reaching depths of 10 meters — a far cry from the miles they’re ultimately aiming for.
However, the company says that a field-ready machine capable of reaching depths between 100 and 1,000 meters should be ready for demos in 2024. Their timeline calls for the first repurposed fossil fuel plant to be using geothermal power to generate electricity by 2028, although it’s not clear where or at what depth they’d be drilling at that point.
“By using current infrastructure, we can re-power our planet using significantly fewer resources.”Mark Cupta
The big picture: Quaise has a lot of work ahead of it to reach its deep goals, but if the company is successful in making geothermal widely accessible, the transition away from fossil fuels could become a lot simpler.
We wouldn’t need to clear huge swathes of land for solar installations and wind turbines or install huge battery backups — we could just drill down next to existing power plants and essentially plug geothermal energy right into it. The grid could function much the same way it does now.
“Quaise’s approach offers a lower geographical and environmental impact,” Mark Cupta, Managing Director at Prelude Ventures, one of Quaise’s investors, told ZDNet. “By using current infrastructure, we can re-power our planet using significantly fewer resources.”
We’d love to hear from you! If you have a comment about this article or if you have a tip for a future Freethink story, please email us at [email protected]. | <urn:uuid:21c6dc0d-9540-49d2-a1dc-d42b204150a9> | CC-MAIN-2023-40 | https://www.freethink.com/energy/geothermal | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506339.10/warc/CC-MAIN-20230922070214-20230922100214-00312.warc.gz | en | 0.927886 | 859 | 3.359375 | 3 |
Although most college students are part of the 17 percent of Americans not included in the Centers for Disease Control and Prevention's vaccine recommendations, a new study suggests that they may be among the major beneficiaries of a flu shot.
The study, in this weeks issue of the Archives of Pediatric and Adolescent Medicine, found that college students who have been immunized against the flu were 30 percent less likely to contract an influenza illness, and were also less likely to miss class or become unable to complete work because of flu-like illness.
"Influenza-like illness is responsible for a substantial disease burden among college students, and vaccination is associated with substantial benefits," said Dr. Kristin Nichol, chief of medicine at the Minneapolis VA Medical Center and one the study's authors.
The researchers conducted an online survey of University of Minnesota students at the Twin Cities campus for four flu seasons, with each year's survey beginning in October and ending in April. For the final year of the study, researchers also collected data from students at St. Olaf's college in Northfield, Minn.
In addition to the 30 percent reduction in flu illness, vaccinated students were 47 percent less likely to visit a doctor for flu, 32 percent less likely to miss class and 47 percent less likely to do poorly on a test.
In addition to the reduced illnesses for the students themselves, the study authors noted that immunizations of college students could help keep influenza from spreading.
"They're a population that has interaction and access with lots of folks in the community." said Dr. Edward Ehlinger, director of the University of Minnesota's health service and another of the study's authors.
Ehlinger noted that the communities would not be the only ones affected by students carrying the flu virus.
"During the peak of the flu season, they're traveling all over the world," he said. "They're a perfect vehicle to spread influenza around."
While praising the overall study, Dr. William Schaffner, chairman of the department of preventive medicine at Vanderbilt Medical School noted a few complications with the study.
"Students who are much more organized in their lives," and are more likely to get the flu vaccine, "are going to be the ones that go to class," he said. "The results are consistent with those from other studies. But looking at this paper, that would be the issue."
Minneapolis' Nichol conceded that while the message of the study remains, there were some difficulties in controlling how similar the unvaccinated and vaccinated groups of students were.
"There is always the possibility of what we call 'residual confounding' in a study that is not a clinical trial," she said.
While Nichol said she would encourage college students to get vaccinated against the flu, she stopped short of saying the CDC should change its flu shot recommendations to include everyone.
"I certainly believe that studies like this help to inform those discussions, as they consider whether or not we should expand recommendations into other groups," Nichol said.
Certainly, college students saw stronger benefits from the flu vaccine than other groups, particularly in years where the vaccine was not a great match with the dominant flu strain. | <urn:uuid:14984985-ccd5-4eb9-a97e-a9db9c9c91f3> | CC-MAIN-2013-20 | http://abcnews.go.com/Health/ColdandFluNews/story?id=6370879&page=1 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382705/warc/CC-MAIN-20130516092622-00082-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.978803 | 648 | 2.9375 | 3 |
Citronella - Plant
Description for Citronella
Citronella oil is one of the essential oils obtained from the leaves and stems of different species of Cymbopogon. The oil is used extensively as a source of perfumery chemicals such as citronellal, citronellol, and geraniol.
|Common name||Flower colours||Bloom time||Height||Difficulty|
|Horse balm||Light yellow||August to September||2.00 to 4.00 feet||Moderately easy|
Planting and care
|Full sun/Partial sun||Well-drained soil||Keep soil moist throughout the growing season||27/21° or 32/27°C||Apply any organic fertilizer|
Caring for Citronella
- Mosquito plant is actually a scented geranium.
- The plant produces a pretty pinkish colored blooms in summer.
- Plant in spring after the danger of frost has passed and the soil has warmed, about the same time you plant tomatoes.
- Select a location with a little afternoon shade, and space plants 18 to 24 inches apart.
Typical uses of Citronella
Special features: Best grown in woodland, native plant or wildflower gardens.
Culinary use: NA
Ornamental use: The plant is used for ornamental purpose. Can be kept indoor in living room and in terrace area.
Medicinal use: NA | <urn:uuid:071722f8-228d-451e-8a04-806957d5b8c3> | CC-MAIN-2017-34 | https://nurserylive.com/buy-insect-repellent-plants-online-in-india/citronella-plants-in-india | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886109470.15/warc/CC-MAIN-20170821172333-20170821192333-00629.warc.gz | en | 0.801653 | 308 | 2.875 | 3 |
“An ambitious project with few precedents. . . . González-Tennant argues that the underlying causes of the Rosewood Massacre can be traced to historical antagonisms of a national scale, and reflects the underlying patterns of many such events throughout American history.”—Historical Archaeology
"An innovative, forward-thinking, and sensitive account. The use of multiple lines of evidence, combined with a strong GIS component, significantly advances knowledge about racially motivated violence and speaks directly to cultural resilience in the face of power and domination."—Charles E. Orser Jr., author of The Archaeology of Race and Racialization in Historic America
"González-Tennant's original archaeological analyses reveal new information about the Rosewood pogrom and provide us with significant insights into the nature of racial violence (past and present) in the United States."—Randall H. McGuire, author of Archaeology as Political Action
The Rosewood Massacre investigates the 1923 race riot that, in a weeklong series of events, devastated the predominantly African American community of Rosewood, Florida. The town was burned to the ground by neighboring Whites, and its citizens fled for their lives, never to return. None of the perpetrators were convicted. Very little documentation of the event and the ensuing court hearings survives today. The only signs that there was once a vibrant town are a scattering of structural remains and a historical marker erected in 2004 declaring the site a Florida Heritage Landmark.
Drawing on new methods and theories, Edward González-Tennant uncovers important elements of the forgotten history of Rosewood. He uses a mix of techniques such as geospatial analysis, interpretation of remotely sensed data, analysis of census data and property records, oral history, and the excavation and interpretation of artifacts from the site to reconstruct the local landscape. González-Tennant interprets these and other data through an intersectional framework, acknowledging the complex ways class, race, gender, and other identities compound discrimination. This allows him to explore the local circumstances and broader sociopolitical power structures that led to the massacre, showing how the event was a microcosm of the oppression and terror suffered by African Americans and other minorities in the United States.
González-Tennant connects these historic forms of racial violence to present-day social and racial inequality and argues that such continuities demonstrate the need to make events like the Rosewood massacre public knowledge.
Edward González-Tennant is lecturer of anthropology at the University of Central Florida.
A volume in the series Cultural Heritage Studies, edited by Paul A. Shackel
There are currently no reviews available | <urn:uuid:dbe8df10-8aca-4856-a698-49129fa2501c> | CC-MAIN-2020-29 | http://upf.com/book.asp?id=9780813056784 | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655891654.18/warc/CC-MAIN-20200707044954-20200707074954-00200.warc.gz | en | 0.922201 | 542 | 2.859375 | 3 |
What is SAN Storage?
SAN storage definition
SAN (storage area network) storage is a network of block storage devices that can be accessed by multiple users. Using SAN storage, storage devices can be made local, improving performance and expanding storage utilization rates (because storage is no longer dependent on individual devices).
Why SAN storage?
SAN storage is useful when several people need to connect to multiple storage devices at once. It creates a network of devices that may have otherwise been completely disconnected from one another, and it somewhat solves the issue of storage utilization rates with block storage devices.
HPE SAN storage products and services
HPE is bringing the power of flash and other enterprise storage capabilities down to the price and simplicity levels that can benefit nearly any organization in the market for shared storage.
ESG Lab Review: Automated SAN and federated zoning
See how to automate and simplify SAN and Federated SAN zoning configuration by using HPE 3PAR StoreServ Storage and HPE Smart SAN for 3PAR Software. This ESG Lab Review documents hands-on testing on how Smart SAN for 3PAR leverages industry standards-based FCIA T11 with target-driven peer zoning to transform complex and error-prone manual zoning process into an orchestrated, rapid, automated, error-free process.
- Simplify Fibre Channel zoning and storage provisioning
- Little or no FC expertise required
- A single command provisions storage in storage, server, and FC switch | <urn:uuid:f9ac6099-4870-405d-ad15-23d64ae702bd> | CC-MAIN-2020-29 | https://www.hpe.com/us/en/what-is/san-storage.html | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655902377.71/warc/CC-MAIN-20200709224746-20200710014746-00226.warc.gz | en | 0.883366 | 295 | 2.546875 | 3 |
Vehicle manufacturer [SU;RU]
Found on http://www.jedsite.info/index.html
• (a.) Pertaining to, or designating, the Urals, a mountain range between Europe and Asia.
Found on http://thinkexist.com/dictionary/meaning/ural/
Ural is a computer series built in Soviet Union. == History == The Ural was developed at the Electronic Computer Producing Manufacturer of Penza in the Soviet Union and was produced between 1959 and 1964. In total 139 were made. The computer was widely used in the 1960s, mainly in the socialist countries, though some were also ex
Found on http://en.wikipedia.org/wiki/Ural_(computer)
Ural (Ура́л) is a geographical region located around the Ural Mountains, between the East European and West Siberian plains. It extends approximately from north to south, from the Arctic Ocean to the bend of Ural River near Orsk city. The boundary between Europe and Asia runs along the eastern side of the Ural Mountains. Ural
Found on http://en.wikipedia.org/wiki/Ural_(region)
Ural is a cultivated variety of potato.
Found on http://www.probertencyclopaedia.com/browse/QU.HTM
Ural (yoor'ul, Rus. OOräl') , river, c.1,580 mi (2,540 km) long, rising in the S Urals, flowing through Russia and Kazakhstan. Part of the traditional boundary between Europe and Asia, the Ural flows S past Magnitogorsk and Orenburg, then through NW Kazakhstan, past Oral, and into the C...
Found on http://www.infoplease.com/ce6/world/A0850157.html
No exact match found | <urn:uuid:ff99fa3f-74af-4852-a71b-d03f897a393b> | CC-MAIN-2014-23 | http://www.encyclo.co.uk/define/Ural | s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510272584.13/warc/CC-MAIN-20140728011752-00027-ip-10-146-231-18.ec2.internal.warc.gz | en | 0.947242 | 397 | 2.859375 | 3 |
Sled dog care and mushing program leads children into the future
[by Jayme Dittmar]
People and dogs have coexisted and worked in unison for thousands of years across North America and Siberia. The oldest archeological evidence suggests that humans started using dogs as an integral part of their nomadic lifestyle as long ago as 14,000 years, in their migration across the Bering Land Bridge. The essential relationship to an animal counterpart that is arguably engrained in our genetics helped establish human habitation in the north, including Alaska.
It wasn’t until recently that humans no longer depended on their canine partners for travel. In an understandable drive to travel farther faster, wheeled, tracked, and winged machines started outnumbering sled dogs in the Alaskan villages in the 1960s. But it wasn’t just the sled dogs that disappeared. Rapid “progress” brought an outside values system that impacted traditional skills and livelihoods in the villages. Children, especially, felt an overwhelming lack of identity. This in combination with other complex factors, escalated suicide rates as well as drug and alcohol abuse that now deeply impact Alaska Natives.
George Attla was at the height of his mushing career when this photo was taken in 1978 with one of his lead dogs at his North Pole kennel. He was known for his strong connection to his dogs, and always said that dogs never make mistakes—it is always the musher.
Legendary dog man and musher, the late George Attla would likely say the solution is to bring sled dogs back to the communities of the Interior, and to not only reintegrate them back into daily life, but they may be so important that dog care and mushing should be incorporated in school curriculum. Attla dedicated the final years of his life to strengthening young people physically and mentally, and deepening cultural pride across all generations, through a shared vision to revive dog mushing and all of the lessons the sport had to offer. With the help of his partner, Kathy Turco, this vision expanded to A-CHILL, The Alaska Care and Husbandry Instruction for Lifelong Living project, a thriving school curriculum that integrates sled dogs into classrooms throughout two different school districts.
Amanda Attla, culture teacher of A-CHILL and George’s daughter, says that the program started simply. “From the time I was a little kid, we were always taking in the wild, misbehaving kids,” she said. “But we learned how to take care of ourselves by going to fish camp, mushing and doing all the cultural things it takes to raise a dog team. My dad and mom raised 17 kids through the years, and they concentrated on what it would take for not only us to survive, but for our people to survive.”
George Attla was also a profound advocate for the unconditional love and acceptance that dogs provide. “No matter what kid it is, whether it’s a shy kid, talkative kid, dogs accept them as they are,” he said in a previous interview. “They don’t care what you look like, they don’t care what you sound like. They will accept you.”
As a child, George was nomadic with the rest of his family, moving seasonally from camp to camp. However, at age eight, he was sent to the hospital in Sitka to be treated for tuberculosis. Here he was provided the white and western perspective of education. Nine years later on his return, he started to see that villages had also assimilated western education in schools without acknowledging the social, educational, and values systems of Native culture.
After a professional sled dog racing career, George faced the unexpected death of his son. While grieving, he was inspired to start a sled dog care, culture, and mushing program in Huslia.
George and Kathy started seeking support from volunteers and private companies to help launch the pilot Frank Attla Youth and Sled Dog program, instituted at Jimmy Huntington School. Partnered with the teachers and volunteers from the community, they instituted traditional practice into mathematics, history, biology, and literature. Dog care and culture were studied through field trips to dog yards twice a week where students learned from some of the greatest mushers and dog men of Alaska.
“It takes a tribe to raise a child,” Amanda said. “To provide for a dog team, the community has to be involved. You have to hunt and fish together, as a tribe, as a people. That is one of my favorite parts to this.” George Attla passed away in 2015 from bone cancer, but his legacy continues. Kathy wrote every aspect of the Frank Attla Youth and Sled Dog program into a manual and distributed it widely. The result was the A-CHILL community-based project, funded with a grant from the U.S. Department of Indian Education serving the Alaska Gateway School District and the Yukon-Koyukuk School District, which include the villages of Dot Lake, Tanacross, Tok, Mentasta, Northway, Tetlin, Eagle, Allakaket, Hughes, Huslia, Ruby, Koyukuk, Nulato, Kaltag, Manley Hot Springs, Minto, and Rampart.
Teachers, children, elders, and communities all across Alaska are realizing just in time what there is to be gained in renewing something that is becoming lost. In harnessing dogs, we harness the rapid changes of Alaska today, to determine what values we leave and what we carry into the future. But Amanda said it best, “Dogs will go to the end of the earth for you, they will do something for you that you won’t find anywhere else.”
Jayme Dittmar is an outdoors enthusiast, journalist, and visual storyteller based in Alaska. She has been mushing, packrafting, and traveling in the villages of the Interior for the last five years while directing her work to protect northern lands and livelihoods. | <urn:uuid:2e4faa6e-6102-4334-b47f-d3f666a14f1d> | CC-MAIN-2023-14 | https://alaskamagazine.com/authentic-alaska/culture/harnessing-change/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944606.5/warc/CC-MAIN-20230323003026-20230323033026-00204.warc.gz | en | 0.973832 | 1,254 | 3.078125 | 3 |
A pedagogical regular-expression engine
Most major programming languages support regular expressions, but the features, performance, and matching behavior depend on the engine. Therefore we think it is pedagogically useful for students to see how a regular expression engine works, and for that purpose, the simpler the engine the better. We present a regular-expression engine written in 70 lines of Python 2.7, of which only 44 relate to matching. The engine is driven by the structure of the regular expression and tracks sets of all possible ending positions of a match. We believe it is much simpler than an implementation using backtracking or based on finite automata. The engine runs in polynomial time, always finds the longest possible match, and can be trivially modified to find the shortest possible match. Its expressive power is exactly that of the regular languages; it does not support nonregular features like backreferences. However, it does support general intersection and complement, powerful operators unavailable in most engines. There are a number of obvious extensions to the engine that would make excellent student projects.
Shade, Eric D. "A pedagogical regular-expression engine," Journal of Computing Sciences in Colleges" 28, no. 5 (2013): 160-167.
Journal of Computing Sciences in Colleges | <urn:uuid:6b8762b7-cf04-432d-87ba-c8e3ff79198c> | CC-MAIN-2020-29 | https://bearworks.missouristate.edu/articles-cnas/9/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657139167.74/warc/CC-MAIN-20200712175843-20200712205843-00535.warc.gz | en | 0.90479 | 259 | 3.421875 | 3 |
We're glad you are here. From concept to classroom, the WISE Toolkit is a practical guide to help schools implement sex education. As you read through the toolkit, please keep in mind that the WISE Method is primarily written for state-based or regional non-profits who work with school districts to implement sex ed. If you work within a school district there's a lot of helpful information for you too.
The Four Phases
The purpose of this phase is to gain an understanding of the sex education landscape to inform an action plan for sex education institutionalization.
The purpose of this phase is to assess school readiness and ensure ownership and active participation among key school district stakeholders.
The purpose of this phase is to create the systems, processes, policies, and guidelines that will be the backbone of long-term, sustainable sex education. | <urn:uuid:a1b2cf97-a546-4a25-882f-05fcd06192d9> | CC-MAIN-2020-29 | http://wisetoolkit.org/toolkit | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655890105.39/warc/CC-MAIN-20200706042111-20200706072111-00414.warc.gz | en | 0.945474 | 172 | 2.515625 | 3 |
Physics and science of the Atomic Grade
Physics and science of the Atomic Level
Physics – especially physics of their atomic degree – can be looked at as telling the upcoming . In math, there’s just a law of conservation of each and every molecule, molecule, ion, etc.. , behave at a mechanical manner as a machine. Even though we do not understand the scientific laws of mathematics in a method that is tangible , up to now, the http://utanfutopark.hu/whats-transpiring-in-math/ machine analogy works. The machine analogy includes.
With all that said, all thing is in its own totality – non living or alive – within God’s universe. This is first thing to state, and this really is the foundation for science and a great many philosophy fiction. We can’t clarify how atoms interact with each other, however we all know every quadrant of thing interacts with the rest of the matter’s electrons. Atoms are subject within their most elementary, fundamental shape. Atom atoms that socialize with each other have certain houses that we predict”materials” – fluids, fluids, official statement gases, etc..
The atom’s”face” may be your nucleus, the atom’s principal constituent, and that face has 4 compound bonds – both 2 of these are electrons, and also one other one is the electron plus an oxygen molecule. All these four bonds behave as electric rates, they tell the way and also the way it is broken down. Once you look at it it is not at all a wonderful movie. But we can’t explain the way a five smallest electrons can move the nucleus, and we are not able to explain the 2 oxygen atoms in each of the oxygen molecules can move around one another, but that is a portion of this quantum mechanical substance of this universe.
Matter is not like a whole lot of sterile particles also so it makes sense when the process will get the job done only to ask. This will be to mention the sections of the system has to be dependable. The parts must be in sync with one another. they works if the pieces of the machine come in sync with one another, and it will do the job, if they do the job .
Physicists www.paramountessays.com and our scientists are really asking the question: How can we create these portions of the atom in order which they are in sync with one another? They want to be capable of going in the starting point, and that’s matter, to telling them the prospective about the molecules and also the direction they will act. As the future will probably come about centered on what happens in the molecule, That is telling the near long run. This is the way science operates .
There are three parts where math will be used by us. When people consider the atom, A single is. The atom’s experience is that the nucleus, also this face contains four compound bonds. Two of those bonds are electrons, and also one flip side is a electron and an air atom. These 2 bonds act as charges, they tell the way in which the molecule has been built, and the way. The 4 bonds behave as electrical rates, they tell the way the molecule is constructed, and also the way.
After one of these bonds fractures, this act, called”electron transport”, happens and proceeds on to proceed further down the”factors”, the electrons. Now one will be telling the future in regards to the molecules as well as the electrons. One will be telling the future in regards to the electrons as well as the atoms, plus so they are able to tell the prospective in regards to the regions of the atom. This really is the way science operates .
You will find some additional atoms, plus a few of them, since we all watched from the last paragraph, have been in synch with the other molecules. This is the way science worksout. It is telling the future about electrons and atoms, and we have the ability to make them in sync. We have the ability to earn particles to stay an eye on the construction, and we have the ability. Their”real time” behaviour. At a sense. | <urn:uuid:d43a499f-b693-4b50-88ec-5e3988928a56> | CC-MAIN-2020-16 | https://suncity.gr/physics-and-science-of-the-atomic-grade/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371624083.66/warc/CC-MAIN-20200406102322-20200406132822-00026.warc.gz | en | 0.950107 | 883 | 3.0625 | 3 |
Anyone hearing the loud singing coming from Isaac Chereger’s farm would be forgiven for thinking it was a particularly enthusiastic church gathering.
Instead, it was a group of women calling to order a meeting of a local religious charity that teaches villagers how to conserve the forest around their homes in this south-western Kenya community, to help stop the Mara River from drying.
For more than a decade, environmental groups have raised the alarm over the Mara River, warning that population growth, illegal logging and overuse of its waters by communities struggling through drought have caused a dramatic drop in the river’s water levels.
At the meeting on Chereger’s farm, some villagers volunteered to plant saplings where their fields meet the river, while others agreed to get training on why the unplanned felling of trees along the river could worsen the impact of drought.
Chereger told the Thomson Reuters Foundation he is proud of the conservation work his community does, but has long wondered if it was enough.
That’s why the Empowering Lives International Centre – which put on the meeting on his farm – has joined other local organisations in an effort to give their traditional conservation work some technological muscle.
The pilot scheme run by the Stockholm Environment Institute, an international research organisation, trains villagers to use a water evaluation and planning (WEAP) tool that generates a digital forecast on the health of a water source.
When communities know what to expect from the Mara River’s changing water levels, they can more quickly adapt and find the most effective ways to slow the drying of the river, the institute’s researchers say.
The group in Ilula village say they are keen to add the system to their conservation tool belt.
“The Mara River gives us pasture and water for our cattle. If this innovation can help in preventing bad use of the river, then we are ready to work with it,” said Chereger.
There are currently no official figures on how much water levels in the Mara River basin, home to about a million people, have dropped over the past few decades.
But Nkoinko Siposha, from Oloroito village in the upper basin, recalled that in the 1990s it was impossible for his cattle to wade through any part of the river because of its depth.
These days, even goats walk leisurely through the drying river to graze on the other side of its shores, the 65-year-old herder told the Thomson Reuters Foundation.
Starting in the Mau forests, in south-western Kenya, the Mara River basin stretches over 13,750 square kilometres (5,300 square miles), through the Maasai Mara National Reserve in Kenya and Tanzania’s Serengeti plains, before it spills into Tanzania’s Lake Victoria.
Tom Ogol, a former researcher at the Stockholm Environment Institute, told the Thomson Reuters Foundation there are several key threats to the river.
They include loss of forests along its shores and unsustainable agricultural activity, such as farmers illegally siphoning water from the river for irrigation.
Both are “aggravating what climate change has already altered”, with increasingly long droughts now a problem, Ogol said.
In October last year, Rift Valley commissioner George Natembeya said the growing number of flower farms cropping up along the river are a problem, with some farmers using petrol-powered pumps to suck water from the river.
Such pumps are restricted in the county due to the pollution they cause.
According to Natembeya, water demand in the Mara River basin is over 20 million cubic metres per year, with irrigated agriculture accounting for about half of that.
“This demand is too much. The river cannot provide it all because its water sources, which are in the basin, are drying up due to climate change,” Natembeya said during a press briefing.
He then delivered a dire prediction.
“The Mara River will be dead in three years,” he warned.
Technology has become a vital tool for protecting the river, said Emmanuel Nkurunziza, director general of the Nairobi-based Regional Centre for Mapping of Resources for Development.
Digital innovations such as the WEAP have made it easier for communities, development organisations and governments to detect changes in the Mara’s water level and quality, and helped them reverse or adapt to those changes, he said.
“Technology enables the tracking of threats to the Mara river over a period of time. With this it is possible to identify whether these threats are caused by human activities or climate change,” Nkurunziza told the Thomson Reuters Foundation.
Ogol described WEAP as a “user-friendly” software tool that collects data on the river’s status provided by communities and government agencies such as the meteorological department.
The system looks at factors such as rainfall and crop requirements for water, he said.
Farmers involved in the project can also use text messaging to report other farmers or corporations who take too much water out of the river or withdraw water without a license.
The system then combines that information with other pressures on the water supply, such as changing weather patterns and population figures, to predict how the river will cope with demand in the future.
“The data can be used to plan and allocate resources that help communities living there to adapt and build resilience” to climate change, Ogol said.
Because the project is still in the pilot phase, Ogol said he does not yet have figures on how many farmers are taking part.
Nkurunziza was confident the system would play an important role in tackling climate change threats.
But, he told the Thomson Reuters Foundation, how much the system will benefit farmers living along the Mara River depends on the decisions local lawmakers make based on the data.
“We might be able to identify what is happening to the Mara River, but the political circumstances surrounding the causes of the problems might determine whether there is action or not,” he said. | <urn:uuid:748fa48a-cacb-4c11-a29e-8ef0d3d7815a> | CC-MAIN-2020-16 | https://www.alleastafrica.com/2019/10/02/kenyan-farmers-mix-tradition-with-tech-to-protect-drying-mara-river/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370500331.13/warc/CC-MAIN-20200331053639-20200331083639-00328.warc.gz | en | 0.952549 | 1,262 | 2.953125 | 3 |
By: SPACE.com Staff
Published: 05/07/2012 06:26 AM EDT on SPACE.com
Astronomers have caught four dying stars in the act of chowing down on rocky alien planets similar to Earth, a destructive cosmic process that may one day play out in our very own solar system, a new study reveals.
Evidence of the distant celestial meals was found around four white dwarfs — stars that are in the final stages of their lives. The stars are surrounded by dust and rocky debris from shattered alien planets that appear to have once shared very similar compositions to Earth, according to astrophysicists at the University of Warwick in the U.K.
"What we are seeing today in these white dwarfs several hundred light-years away could well be a snapshot of the very distant future of the Earth," said study leader Boris Gänsicke, a professor in the department of physics at the University of Warwick, in a statement.
The researchers used the Hubble Space Telescope to examine the atmospheres of more than 80 white dwarf stars within a few hundred light-years of the sun. They found that the most common chemical elements in the dust around four of the white dwarfs were oxygen, magnesium, iron and silicon — the four elements that make up roughly 93 percent of the Earth, the astronomers said. [Gallery: Dying Stars Consume Rocky Alien Planets]
The inner region of an exoplanetary system, where four terrestrial planets orbit a sun-like star.
The dusty veils of material also contained an extremely low proportion of carbon, which is similar to what is found with Earth and the other rocky planets that orbit closest to the sun. According to the researchers, this is the first time that such low proportions of carbon have been measured in the atmospheres of white dwarf stars surrounded by cosmic debris.
These observations indicate that the stars once hosted at least one rocky planet that has since been destroyed. The astrophysicists also determined that they are witnessing the final phase in the deaths of these alien worlds.
Last gasps of dying stars
White dwarfs are the compact stellar remains of relatively small stars, like our sun, that have exhausted their fuel, leaving behind dim, fading cores of material. The sun, and more than 90 percent of the stars in the Milky Way galaxy, will one day end up as white dwarfs, astronomers have said.
The atmospheres of white dwarfs are typically made up of hydrogen and helium, so heavier elements that are incorporated into their atmospheres are dragged downward to the stellar core by its intense gravity, and are usually out of sight within a matter of days, the researchers explained.
Since the astronomers were able to detect oxygen, magnesium, iron and silicon in the atmospheres of four of the white dwarfs, they must have been observing the final phase of the planets' death, as shattered material rained down on the stars at staggering rates of up to 2.2 million pounds (1 million kilograms) per second.
One white dwarf in particular, called PG0843+516, stood out from the rest because of its seemingly overabundant stores of iron, nickel and sulfur in the dust in its atmosphere. Iron and nickel are elements typically found in the cores of terrestrial planets, as gravity pulls them into the center during the formation of planets.
This suggests that PG0843+516 is in the midst of swallowing up the remains of a rocky planet that had a similar composition to Earth, the researchers said.
"It is entirely feasible that in PG0843+516 we see the accretion of such fragments made from the core material of what was once a terrestrial exoplanet," Gänsicke said.
Rocky material in orbit around a white dwarf star (center). Collisions turn larger material into dust, some of which then rains down on to the white dwarf.
Preview of Earth's fate?
But while this process is occurring hundreds of light-years away, the cannibalistic scene could be a harbinger for the eventual fate of our planet.
"As stars like our sun reach the end of their life, they expand to become red giants when the nuclear fuel in their cores is depleted," Gänsicke said. "When this happens in our own solar system, billions of years from now, the sun will engulf the inner planets Mercury and Venus. It's unclear whether the Earth will also be swallowed up by the sun in its red giant phase — but even if it survives, its surface will be roasted."
As the sun sheds large amounts of its mass, the planets will migrate further out, he said, which will wreak havoc in the solar system.
"This may destabilize the orbits and lead to collisions between planetary bodies as happened in the unstable early days of our solar system," Gänsicke said. "This may even shatter entire terrestrial planets, forming large amounts of asteroids, some of which will have chemical compositions similar to those of the planetary core. In our solar system, Jupiter will survive the late evolution of the sun unscathed, and scatter asteroids, new or old, towards the white dwarf."
The detailed results of the study will be published in the journal Monthly Notices of the Royal Astronomical Society. | <urn:uuid:c304eebc-aa3c-4969-914e-11324c2c0d69> | CC-MAIN-2014-35 | http://www.huffingtonpost.com/2012/05/07/dying-stars-eat-planets-solar-system_n_1495530.html | s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535922087.15/warc/CC-MAIN-20140909050937-00268-ip-10-180-136-8.ec2.internal.warc.gz | en | 0.954101 | 1,068 | 3.265625 | 3 |
from The American Heritage® Dictionary of the English Language, 4th Edition
- adj. Conducive to sound health or well-being; salutary: simple, wholesome food; a wholesome climate.
- adj. Promoting mental, moral, or social health: wholesome entertainment.
- adj. Sound; healthy. See Synonyms at healthy.
from Wiktionary, Creative Commons Attribution/Share-Alike License
- adj. Promoting good health and well-being.
- adj. Promoting moral and mental well-being.
- adj. Sound and healthy.
- adj. Promoting virtue or being virtuous.
from the GNU version of the Collaborative International Dictionary of English
- adj. Tending to promote health; favoring health; salubrious; salutary.
- adj. Contributing to the health of the mind; favorable to morals, religion, or prosperity; conducive to good; salutary; sound.
- adj. Sound; healthy.
from The Century Dictionary and Cyclopedia
- Healthy; whole; sound in mind or body.
- Tending to promote health; favoring health; healthful; salubrious: as, wholesome air or diet; a wholesome climate.
- Contributing to health of mind or character; favorable mentally or morally; sound; salutary: as, wholesome advice; wholesome doctrines; wholesome truths.
- Profitable; advantageous; hence, prosperous.
- Clean and neat.
- Synonyms Salutary, etc. (see healthy), nourishing, nutritious, invigorating, beneficial.
from WordNet 3.0 Copyright 2006 by Princeton University. All rights reserved.
- adj. conducive to or characteristic of physical or moral well-being
- adj. sound or exhibiting soundness in body or mind
Thankfully, Davila seems committed to keeping the title wholesome and honest.
His vigorous will seemed to dominate over the whole household; he would drag me out peremptorily for what he called wholesome exercise, which meant long, scrambling walks, which sent me home with tingling pulses and exuberant spirits, until the atmosphere of the sick room moderated and subdued them again.
That is what I call wholesome and healthy - so we are as we always were prior to this little blip.
Just good lookin ', wholesome gals I wished lived next door.
They can be made dairy free, still be delicious, and contain wholesome goodness.
The taste of the public has, of late years, been accustomed to very high stimulants: no plain wholesome food will go down; and every thing must be hashed and stewed with some "sauce piquante," which however delicious to one palate, may be very offensive and disgusting to another.
When they eat they get together, three or four of them in wholesome fellowship.
Being of Somo, No-ola, Langa-Langa, and far Malu they were in wholesome fear, did they lose the protection of their white masters, of being eaten by the Su'u folk, just as the Su'u boys would have feared being eaten by the Somo and Langa-Langa and
The poor should know how much more wholesome is a broth made from remnants of stale bread, than soups of coarse spaghetti – often dry and seasoned with meat juice.
Oswald does not particularly want his story to be remembered, but he wishes to tell the truth, and perhaps it is what father calls a wholesome discipline to lay bare the awful facts. | <urn:uuid:77e54352-7b68-4b38-b026-063451c3586c> | CC-MAIN-2014-15 | https://www.wordnik.com/words/wholesome | s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609537864.21/warc/CC-MAIN-20140416005217-00312-ip-10-147-4-33.ec2.internal.warc.gz | en | 0.919823 | 755 | 2.828125 | 3 |
Caring for Someone with Alzheimer's
Safety is an important issue in caring for a person with Alzheimer's disease. Even with the best-laid plans, accidents can happen. Checking the safety of your home, keeping the person from wandering and preventing him or her from driving when driving skills decline are some ways you can minimize hazardous situations.
Changes in Home Management Skills
Over time, people with Alzheimer’s disease become less able to manage things around the house. For example, they may not remember
- if they turned off the oven or left the water running
- how to use the phone in an emergency
- to stay away from dangerous things around the house, such as certain medicines or household cleaners
- where things are in their own home.
Create a Safe Home Environment
Here are some things you can do in your home environment to help keep the person with Alzheimer’s safe.
- Simplify your home. Too much furniture can make it hard to move freely.
- Get rid of clutter, such as piles of newspapers and magazines.
- Have a sturdy handrail on your stairway. Put carpet on stairs or add safety grip strips.
- Put a gate across the stairs if the person has balance problems.
Use Home Safety Devices
As a caregiver, you can do many things to make a house safer for people with Alzheimer’s. Add the following to your home if you don't already have them in place.
- smoke and carbon monoxide alarms in or near the kitchen and in all bedrooms
- emergency phone numbers (ambulance, poison control, doctors, hospital, etc.) and your home address near all telephones
- safety knobs on the stove and a shut-off switch
- childproof plugs for unused electrical outlets.
Lock Up or Remove Some Items
Lock up or remove the following from your home.
- all prescription and over-the-counter medicines
- cleaning products, dangerous chemicals such as paint thinner, matches, scissors, knives, etc.
- small throw rugs
- poisonous plants—call the U.S. National Poison Control Hotline at 1-800-222-1222 to find out which houseplants are poisonous
- all guns and other weapons
- gasoline cans and other dangerous items in the garage.
Reduce the Risk of Falls
To reduce the risk of falls, make sure the person has good floor traction for walking or pacing. Good traction lowers the chance that people will slip and fall. Three factors affect traction:
- The kind of floor surface. A smooth or waxed floor of tile, linoleum, or wood may be a problem for the person with Alzheimer’s. Think about how you might make the floor less slippery.
- Spills. Watch carefully for spills and clean them up right away.
- Shoes. Buy shoes and slippers with good traction. Look at the bottom of the shoe to check the type of material and tread.
Many people with Alzheimer's wander away from their home or caregiver. Knowing how to limit wandering can prevent a person from becoming lost or hurt.
Video length: 1 min 13 sec
Click to watch this video
- Make sure the person carries some kind of identification or wears a medical bracelet. If he or she gets lost and cannot communicate clearly, an ID will alert others to his or her identity and medical condition.
- Consider enrolling the person in the Alzheimer's Association’s Safe Return program. This program helps find people with Alzheimer's disease who wander off or get lost. Call 1-888-572-8566 for more information.
- Let neighbors know that the person with Alzheimer’s tends to wander.
- Keep a recent photograph or video of the person to assist police if the person becomes lost.
- Keep doors locked. Consider a keyed deadbolt, or add another lock placed up high or down low on the door. If the person can open a lock, you may need to get a new latch or lock.
- Install an “announcing system” that chimes when the door opens.
When Driving Skills Decline
A person with mild memory loss may be able to drive safely sometimes. But, he or she may not be able to react quickly when faced with a surprise on the road. This can lead to dangerous results. If the person's reaction time slows, then you need to stop the person from driving.
The person may be able to drive short distances on local streets during the day, but may not be able to drive safely at night or on a freeway. If this is the case, then limit the times and places that the person can drive.
Signs That a Person Should Stop Driving
When the person with Alzheimer’s disease can’t think clearly and make good decisions, he or she should stop driving. One sign that someone should stop driving is new dents and scratches on the car. Another sign is taking a long time to do a simple errand and not being able to explain why, which may indicate that the person got lost.
Some people with memory problems decide on their own not to drive. Others don't want to stop driving and may deny that they have a problem. As the caregiver, you need to explain why it’s important to stop driving. Do this in a caring way. Understand how unhappy the person may be to admit that he or she has reached this new stage.
Tips to Stop Someone from Driving
Here are some ways to stop people with Alzheimer’s disease from driving.
- Ask your doctor to tell the person to stop driving. The doctor can write "Do not drive" on a prescription pad and you can show this to the person. Some States require doctors to tell them if a person with Alzheimer’s should no longer drive.
- Contact your State Department of Motor Vehicles. Ask about a medical review for a person who may not be able to drive safely. He or she may be asked to take a driving test. The person's license could be taken away.
- Ask family or friends to drive the person.
- Take the person to get a driving test.
- If the person won't stop driving, hide the car keys, move the car, take out the distributor cap, or disconnect the battery.
- Find other ways for the person to travel on his or her own. Transportation services include free or low-cost buses, taxi services, or carpools for older people. Some churches and community groups have volunteers who take seniors wherever they want to go. To find out about transportation services in your area, contact your local Area Agency on Aging or the National Transit Hotline at 1-800-527-8279. | <urn:uuid:fa41e41a-b0f5-40b8-b31e-99d6296e0dac> | CC-MAIN-2014-15 | http://nihseniorhealth.gov/alzheimerscare/homesafety/01.html | s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609523429.20/warc/CC-MAIN-20140416005203-00011-ip-10-147-4-33.ec2.internal.warc.gz | en | 0.930026 | 1,390 | 2.8125 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.