text
stringlengths
263
344k
id
stringlengths
47
47
dump
stringclasses
23 values
url
stringlengths
16
862
file_path
stringlengths
125
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
57
81.9k
score
float64
2.52
4.78
int_score
int64
3
5
Published on May 9, 2013 by Amy The Indians who live on the farthest point of the northwest corner of Washington State used to tell stories, not about one Changer, but about the Two-Men-Who-Changed-Things. So did their close relatives, who lived on Vancouver Island, across the Strait of Juan de Fuca. dna testing, dna ancestry testing, ancestry, genealogy, indian genealogy records, paternity testing, turquoise jewelry, native american jewelry When the world was very young, there were no people on the Earth. There were no birds or animals, either. There was nothing but grass and sand and creatures that were neither animals nor people but had some of the traits of people and some of the traits of animals. Then the two brothers of the Sun and the Moon came to the Earth. Their names were Ho-ho-e-ap-bess, which means “The Two-Men-Who- Changed- Things.” They came to make the Earth ready for a new race of people, the Indians. The Two-Men-Who-Changed-Things called all the creatures to them. Some they changed to animals and birds. Some they changed to trees and smaller plants. Among them was a bad thief. He was always stealing food from creatures who were fishermen and hunters. The Two-Men-Who- Changed-Things transformed him into Seal. They shortened his arms and tied his legs so that only his feet could move. Then they threw Seal into the Ocean and said to him, “Now you will have to catch your own fish if you are to have anything to eat.” One of the creatures was a great fisherman. He was always on the rocks or was wading with his long fishing spear. He kept it ready to thrust into some fish. He always wore a little cape, round and white over his shoulders. The Two-Men-Who-Changed-Things transformed him into Great Blue Heron. The cape became the white feathers around the neck of Great Blue Heron. The long fishing spear became his sharp pointed bill. Another creature was both a fisherman and a thief. He had stolen a necklace of shells. The Two-Men-Who-Changed-Things transformed him into Kingfisher. The necklace of shells was turned into a ring of feathers around Kingfisher’s neck. He is still a fisherman. He watches the water, and when he sees a fish, he dives headfirst with a splash into the water. Two creatures had huge appetites. They devoured everything they could find. The Two-Men-Who-Changed-Things transformed one of them into Raven. They transformed his wife into Crow. Both Raven and Crow were given strong beaks so that they could tear their food. Raven croaks “Cr-r-ruck!” and Crow answers with a loud “Cah! Cah!” The Two-Men-Who-Changed-Things called Bluejay’s son to them and asked, “Which do you wish to be–a bird or a fish?” “I don’t want to be either,” he answered. “Then we will transform you into Mink. You will live on land. You will eat the fish you can catch from the water or can pick up on the shore. ” Then the Two-Men-Who-Changed-Things remembered that the new people would need wood for many things. They called one of the creatures to them and said “The Indians will want tough wood to make bows with. They will want tough wood to make wedges with, so that they can split logs. You are tough and strong. We will change you into the yew tree.” They called some little creatures to them. “The new people will need many slender, straight shoots for arrows. You will be the arrowwood. You will be white with many blossoms in early summer.” They called a big, fat creature to them. “The Indians will need big trunks with soft wood so that they can make canoes. You will be the cedar trees. The Indians will make many things from your bark and from your roots.” The Two-Men-Who-Changed-Things knew that the Indians would need wood for fuel. So they called an old creature to them. “You are old, and your heart is dry. You will make good kindling, for your grease has turned hard and will make pitch. You will be the spruce tree. When you grow old, you will always make dry wood that will be good for fires.” To another creature they said, “You shall be the hemlock. Your bark will be good for tanning hides. Your branches will be used in the sweat lodges.” A creature with a cross temper they changed into a crab apple tree, saying, “You shall always bear sour fruit.” Another creature they changed into the wild cherry tree, so that the new people would have fruit and could use the cherry bark for medicine. A thin, tough creature they changed into the alder tree, so that the new people would have hard wood for their canoe paddles. Thus the Two-Men-Who-Changed-Things got the world ready for the new people who were to come. They made the world as it was when the Indians lived in it.
<urn:uuid:d931689b-9877-4ddc-82db-ceb6af1c72ce>
CC-MAIN-2014-23
http://nativeamericanencyclopedia.com/when-the-animals-and-birds-were-created/
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510268363.15/warc/CC-MAIN-20140728011748-00459-ip-10-146-231-18.ec2.internal.warc.gz
en
0.978207
1,139
2.703125
3
For more than four centuries, Germany was a global center for dolls, fostering everything from technical advancements such as the mechanical voice-box to purely imaginative improvements such as the concept of the “baby-doll.” Most of Germany’s dolls were made in the region of Thuringia, where more than 500 different doll-making companies were headquartered. The close proximity of so many producers created a fertile environment for innovation, leading to innovations that we take for granted today, including the toothed, open-mouth design credited to Kämmer & Reinhardt and the range of bisque skin tones produced by Simon & Halbig. During the 17th century, Germany’s earliest dolls or “Docken” were typically cut from a single piece of wood using a foot-powered lathe. These dolls had large, rounded heads and bodies roughly shaped like cones or playing pieces from the tabletop game Skittles. Most had no movable parts and portrayed adult characters rather than children. Eventually, small wood attachments were glued to the solid bodies of these primitive dolls to simulate arms, legs, or even facial features. Wood dolls with flexible limbs attached by peg joints were introduced in the late 18th century, and are often called “Dutch Peg Woodens.” Intricate features were created by sculpting a flour-based substance called “Brotteig,” literally meaning “bread dough,” onto their wooden forms. These dolls were then finished with a bright, durable coating of bismuth paint. Porcelain was adapted to doll production in Germany during the early 1700s. The country’s natural resources allowed many German companies like Armand Marseille, Dressel & Kister, Simon & Halbig, Hertwig, and Limbach to develop a variety of glazed porcelain or bisque dolls. The Gebrüder Heubach factory created particularly emotive bisque doll heads, most of which were sold to other companies for finishing. The detailed expressions on these dolls ranged from shy embarrassment to complete fear, as seen on a frightened Heubach doll with a large black fly perched on her nose. Heubach also made popular mechanical variations like “Whistling Jim,” a doll whose chest was fitted with a bellows system to create a realistic whistle when pushed, as well as character figurines called “Piano dolls” meant for display rather than play. In the early 1800s, German factories embraced a newer papier-mâché or composition technique, whereby a soft mixture of paper pulp and glue was mold-pressed to produce specific parts. Once dry, the individual pieces were sanded, painted, and varnished to make them more durable. Though the composition method helped to standardize production, early papier-mâché dolls were often consumed by mice attracted to the flour contained in their glue mixture. Baby dolls, called “Täuflinge,” were first produced in Germany during the 1850s, initially in a popular waxed papier-mâché style. The popularity of baby-dolls endures to this day, though the waxed composition method was soon dropped because of the rapid deterioration of the material. By the second half of the 19th century, American retailers like FAO Schwarz and Macy’s were selling Armand Marseille’s porcelain dolls, which were designed in every price categor... One of Germany’s most renowned doll designers was Käthe Kruse, who began making detailed cloth dolls for her seven children in 1905. Kruse sold her first group of 150 dolls to New York’s FAO Schwarz toy store, and in 1913, her dolls won the Grand Prix at the Gent World Exhibition. Kruse’s most successful design, called “Doll VIII – The Faithful Child” was modeled after her son, and was the first of her dolls made with a human-hair wig. Another successful female entrepreneur from Germany was Margarete Steiff, who established her doll business in 1877 with simplistic cloth character and animal figures. Her soft stuffed dolls were typically made from felt, plush, or velvet with embroidery or buttons used to create distinctive features. Although most famous for her animals, Steiff also designed charismatic human caricatures, like the dapper “Grosspapa” or Grandfather. Steiff dolls are easily recognizable by the company’s signature button sewed into each doll’s ear. World War I brought an end to Germany’s dominance of the doll world, and its wrecked economy stifled recovery in the years following. Despite this setback and the one that followed World War II, German companies continued to release innovative doll designs, such as the Bild Lilli character. Lilli dolls, first produced in 1955, were based on a newspaper cartoon series featuring a shapely, fashionable, and no-nonsense young woman. It was one of these novelty dolls, often sold in smoke shops rather than children’s stores, that Ruth Hansen brought back to the U.S. in 1956, helping to form her prototype for the Barbie series, which debuted in 1959. Hansen’s Mattel acquired the rights to Bild Lilli in 1964.
<urn:uuid:be2ec8b6-ad04-495a-b4a4-c86d83a5ca2e>
CC-MAIN-2014-35
http://www.collectorsweekly.com/dolls/german
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535921872.11/warc/CC-MAIN-20140909040423-00434-ip-10-180-136-8.ec2.internal.warc.gz
en
0.97382
1,099
3.34375
3
The Economics of Human Cloning AbstractIn this paper, we analyze the extent to which market forces create an incentive for cloning human beings. We show that a market for cloning arises if a large enough fraction of the clone’s income can be appropriated by its model. Only people with the highest ability are cloned, while people at the bottom of the distribution of income specialize in surrogacy. In the short run, cloning reduces inequality. In the long run, it creates a perfectly egalitarian society where all workers have a top ability if fertility is uncorrelated with ability and if the distribution of ability among sexually produced children is the same as among their parents. In such a society, cloning has disappeared. If the distribution of genes, rather than abilities, is preserved by sexual reproduction, then cloning eliminates ability-reducing genes but does not necessarily eliminate inequality; nor does it disappear in the long run. Finally, if fertility is negatively correlated with ability, in the long run a reproductive caste of bottom ability people coexist with a cloned, worker caste of top ability agents, while intermediate ability types have disappeared. [IZA Discussion Paper No. 231] Download InfoIf you experience problems downloading a file, check if you have the proper application to view it first. In case of further problems read the IDEAS help page. Note that these files are not on the IDEAS site. Please be patient as the files may be large. Bibliographic InfoPaper provided by eSocialSciences in its series Working Papers with number id:2767. Date of creation: Aug 2010 Date of revision: Note: Institutional Papers Contact details of provider: Web page: http://www.esocialsciences.org Human capital; income distribution; human cloning; overlapping generations; intergenerational mobility; Other versions of this item: - Saint-Paul, Gilles, 2001. "The Economics of Human Cloning," CEPR Discussion Papers 2674, C.E.P.R. Discussion Papers. - Saint-Paul, Gilles, 2000. "The Economics of Human Cloning," IDEI Working Papers 117, Institut d'Économie Industrielle (IDEI), Toulouse. - Saint-Paul, Gilles, 2000. "The Economics of Human Cloning," IZA Discussion Papers 231, Institute for the Study of Labor (IZA). - J12 - Labor and Demographic Economics - - Demographic Economics - - - Marriage; Marital Dissolution; Family Structure - J13 - Labor and Demographic Economics - - Demographic Economics - - - Fertility; Family Planning; Child Care; Children; Youth - J24 - Labor and Demographic Economics - - Demand and Supply of Labor - - - Human Capital; Skills; Occupational Choice; Labor Productivity - J31 - Labor and Demographic Economics - - Wages, Compensation, and Labor Costs - - - Wage Level and Structure; Wage Differentials - O15 - Economic Development, Technological Change, and Growth - - Economic Development - - - Economic Development: Human Resources; Human Development; Income Distribution; Migration This paper has been announced in the following NEP Reports: - NEP-ALL-2010-08-21 (All new papers) - NEP-DGE-2010-08-21 (Dynamic General Equilibrium) - NEP-MIC-2010-08-21 (Microeconomics) - NEP-NEU-2010-08-21 (Neuroeconomics) You can help add them by filling out this form. For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Padma Prakash). If references are entirely missing, you can add them using this form.
<urn:uuid:77fb3bca-321d-4338-a802-cc555560c19c>
CC-MAIN-2013-48
http://ideas.repec.org/p/ess/wpaper/id2767.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163994768/warc/CC-MAIN-20131204133314-00064-ip-10-33-133-15.ec2.internal.warc.gz
en
0.856872
795
2.546875
3
As the crowd chanted in unison, the eight competitors from all around the world had briefly started warming up. When the contestants were signaled to settle into their starting positions, silence filled the stadium. All eight competitors had immediately put on a serious and eager face. Bang! The crowd broke out of their silence mode and started roaring with excitement as the official shot the starting pistol and the racers had sprung out of their starting positions. As they rapidly approached the finish line, their eager facials had vanished when the race official had notified that six competitors had false started and only two had made it into the finals. With disappointed impressions the six participants walked out of the stadium, when suddenly the crowd started chanting with anger. “Retry, retry, retry!” The race official stood there looking speechlessly at the mad audience and not knowing what to do. As the crowd continued shouting loudly for another round, the official had no choice but to restart the race. _________________________________________________________________________________WALT: This week in literacy most of our focus has been on writing. Our task was to find an image about the modern Olympics and write a narrative about it. There are three types of sentences that we needed to include in our writing; simple, compound and complex.
<urn:uuid:1ff4aed1-aa13-4b5c-93f4-df6d0d0fb9b4>
CC-MAIN-2017-43
http://pesseinim.blogspot.com/2016/08/olympics-narrative.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825900.44/warc/CC-MAIN-20171023111450-20171023131450-00633.warc.gz
en
0.981112
256
3.484375
3
Asthma is one of the most common long-term diseases of children, but adults can have asthma, too. Asthma affects all races, ages, and genders. Asthma attacks can happen when you are exposed to asthma triggers. We don’t know all the things that can cause asthma, but we do know that genetic, environmental, and occupational factors have been linked to developing asthma. The Tracking Network uses data from the U.S. Census Bureauexternal icon, hospital and emergency department data provided by state and local health departments, CDC’s Behavioral Risk Factor Surveillance Survey (BRFSS), and death certificates from CDC’s National Center for Health Statistics to calculate state and local data about asthma. Asthma data on the Tracking Network provide insights about people diagnosed and living with asthma and about people who experience asthma attacks. The Tracking Network provides data on asthma hospital stays, emergency department visits for asthma, and asthma prevalence, which is the number of people diagnosed with and living with asthma. Asthma Prevalence among Adults and Children * Prevalence estimates are organized by different variables to estimate the number of people with asthma in different time periods and geographic areas, such as states and counties. These data are collected from the Behavior Risk Factor Surveillance Survey (BRFSS), CDC’s National Asthma Control Program’s Asthma Call-back Survey (ACBS), and from CDC’s Population Level Analysis and Community Estimates (PLACES) Project. PLACES data on the Tracking Network are available at the census tract level for all 50 states. Emergency Department Visits for Asthma * ¶ This indicator estimates the number and rate of emergency department visits for asthma. These data can be used to identify trends and patterns of emergency department visits over time and in different geographic areas, such as states and counties. Hospitalizations for Asthma * ¶ This indicator can be used to identify trends and patterns in the occurrence of asthma hospitalizations across time and space * Asthma hospital admissions tend to be for more severe asthma attacks and do not include asthma among individuals who do not receive medical care, who are not hospitalized, or who are treated in outpatient settings. Differences between geographic areas may be the result of differences in the underlying population or in the diagnostic or coding techniques used by the reporting hospital. ¶ These data are supplied by health departments funded by the CDC Tracking Program. You can use Tracking Network asthma data to: - Develop interventions to reduce the health burden from this disease - Identify which populations need targeted interventions - Evaluate prevention and control efforts - Discover trends and patterns over time and in different geographic areas In addition, you can use the Tracking Network to review asthma data in relation to data on environmental conditions, health problems, and population characteristics to create a more complete picture of a community’s environmental public health. Read these success stories to learn about asthma related work in our funded Tracking Programs.
<urn:uuid:61fc9f20-1fb3-4eb5-87f9-ee4204a8d2e7>
CC-MAIN-2023-40
https://www.cdc.gov/nceh/tracking/topics/asthma.htm
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510983.45/warc/CC-MAIN-20231002064957-20231002094957-00519.warc.gz
en
0.90726
613
4.03125
4
Keep Personal Items Personal Any tools or implements that may have a bit of blood on them from infected people are potential sources of hepatitis B or C transmission. Toothbrushes, nail clippers, razors, needles, and washcloths may all contain trace amounts of blood that can transmit infection. Keep personal items such as these to yourself and never use personal items that belong to others. Undercooked And Raw Shellfish Shellfish are animals that filter the water from their surroundings. Because of this, they can become contaminated with hepatitis A virus if they are grown in polluted waters. To be safe, cook shellfish thoroughly before eating it. Undercooked shellfish like oysters, mussels, and clams may harbor and transmit hepatitis A. You may prefer the taste of raw oysters, but cooked shellfish really is safer. Protect your health and skip the raw oyster bar. How Does Hepatitis C Progress When someone is first infected with hepatitis C, most likely they have no symptoms and are unaware. Occasionally people experience fatigue, loss of appetite, weakness or sometimes having a yellow color in their skin or eyes. Although having any symptoms at all is rare, if they do occur, they usually go away within a few weeks. Around 15-25% of people who are infected will spontaneously fight off the virus on their own and they will not have a chronic hepatitis C infection and no long term damage occurs. But around 75-85% of people will develop chronic infection. Most of the time, people with chronic hepatitis C have no symptoms at the time of infection and no symptoms for years or even decades of chronic infection. The virus will be with them until they are successfully treated with hepatitis C medications. Around 10-20% of people with chronic infection will slowly have gradual damage in the liver over years and will eventually develop cirrhosis . This can take 20 years or more from the time of the initial infection. Cirrhosis is the replacement of liver cells with permanent scar tissue. Cirrhosis can lead to problems such as bleeding from veins in the esophagus, fluid buildup in the belly, and damaged brain function.Approximately 15% of people with cirrhosis will develop liver cancer during their lifetime. Drinking excessively can double the chance of liver cancer in people infected with HCV. Also Check: Hepatitis E Causes And Treatment Are There Supplements That Are Bad For My Liver Taking too many vitamin and mineral supplements may do more harm than good to a damaged liver. Treatment For Alcoholic Liver Disease If you haven’t reached the cirrhosis stage yet, the liver damage may heal if you stop drinking alcohol. Those who are alcohol dependent may require professional treatment to break their addiction. If you have cirrhosis, your healthcare provider will discuss how to manage your specific complications. Some patients at this late stage will require a liver transplant. You May Like: What Vitamins Are Good For Hepatitis B Can You Get A Vaccine To Prevent Hepatitis C Vaccines are a way to expose your body to a virus before you encounter the live virus naturally. A vaccine contains traces of a dead virus, so your body can form a memory of the virus. Your body then remembers how to attack and destroy the virus if you ever come into contact with it. There isnt a vaccine for hepatitis C at this time. Hepatitis C has many different subtypes and strains, so creating a vaccine that protects against all the different types is complicated. Vaccines are available for both hepatitis A and B, but one for hepatitis C hasnt been approved. If you have hepatitis C, your doctor may suggest you get the vaccine for both hepatitis A and B. These two types of viruses cause liver damage, so the added protection is a smart idea. Screening For Gastroesophageal Varices Among persons with cirrhosis, gastroesophageal varices develop at a rate of approximately 8% per year, and varices often develop without initially causing any symptoms or bleeding. All patients with cirrhosis should undergo screening for gastroesophageal varices with an upper endoscopy to identify those individuals who may benefit from taking a nonselective beta-blocker for prophylaxis. The subsequent management is based on the findings at endoscopy and is discussed in detail in Module 3, in the topic review Screening for Varices and Prevention of Bleeding. Don’t Miss: Can Hepatitis A Be Cured What Are Genotypes And What Do They Mean Viruses have genes, too. The genotype of virus you have can be one of six different groups, or genotypes. Most patients with hepatitis C in the United States have genotype 1a or 1b, but in other parts of the world, other genotypes are more common. There isn’t a “better” or “worse” genotype to have. In the past , genotype 1 was the most difficult to successfully cure but this is no longer the case. All the new direct-acting antiviral medicines work extremely well in treating all genotypes. Sometimes genotype 3 is a little harder to cure, but in general, all genotypes now have extremely high likelihoods of being cured with hepatitis C treatment. Contagious And Incubation Periods The incubation periodâthe time it takes for symptoms to appear after the hepatitis C virus has entered your bodyâis from 2 weeks to 6 months. But not all people have symptoms when they are first infected. You can spread the virus to someone else at any time after you are infected, even if you don’t have symptoms. Read Also: How Can You Tell If You Have Hepatitis C How Can I Cover Medication Costs New therapies called direct-acting antivirals are effective and can achieve cures of over 90%. Because these new therapies are very new, they remain very expensive. As such, drug coverage from both government and private companies may require that your liver disease has progressed to a certain stage before they are willing to cover the cost of these drugs. Talk with your healthcare provider about financial support that may be available. Below are useful resources when looking for financial assistance:Private health insurance or drug plansIf you have private health insurance or a drug plan at work, you may be able to have the medication paid through your plan. Please consult your private health insurance or drug plan provider to see if your drug is covered. Publicly funded plansEach provincial and territorial government offers a drug benefit plan for eligible groups. Some are income-based universal programs. Most have specific programs for population groups that may require more enhanced coverage for high drug costs. These groups include seniors, recipients of social assistance, and individuals with diseases or conditions that are associated with high drug costs. For more details, please contact your provincial or territorial health care ministry, or click on the appropriate link below. Available Patient Assistance Programs for Hepatitis C treatment Holkira Pak Maviret MerckCare Hepatitis C Program 1 872-5773 Zepatier Is It Safe To Take Aspirin Or Tylenol If I Have Hepatitis C Tylenol is an over-the-counter pain killer. It can be harmful in high doses. If you have hepatitis or liver disease, then you can take Tylenol, but no more than 2,000 mg total over 24 hours. In general, this could be one 500 mg tablet every 6 hours, at the most. Acetaminophen is also included as an ingredient in some opiate medications and in some over-the-counter cold/flu medications, so please be aware of the dose of acetaminophen you may be taking from some combination medicines. Aspirin, ibuprofen , naproxen , and other nonsteroidal anti-inflammatory drugs , can be harmful if you have cirrhosis. They are safe in hepatitis patients who do not have cirrhosis. But, if a patient has cirrhosis, then NSAIDs cannot be taken at all. If you are not sure, always check with your provider. Recommended Reading: Do They Have A Cure For Hepatitis C Traveling With Hepatitis C Hepatitis C wont prevent you from traveling, but going away on vacation can be challenging if youre managing medications or dealing with fatigue. Before you leave home, compile a list of pertinent medical information just in case. This includes a copy of your current prescriptions, your doctors name and number, and emergency contact information, recommends the Centers for Disease Control and Prevention . Keep this information in your wallet. Bring enough medication for the entire trip, and identify pharmacies in your destination city before leaving home, in case something happens with your medication, suggests Adalja. Also, never pack your medication in a checked bag. Keep it in your carry-on luggage, advises the CDC. You might get sick while away, so contact your health insurance company to see if your policy covers urgent care or emergency room visits in a different state. U.S. health insurance policies dont typically provide coverage outside the country, so consider travelers insurance if youre traveling abroad. What Does It Mean When Different Types Of Blood Tests For Hepatitis C Give Different Results The first test your provider probably will perform is called an “antibody” test. A positive result means that you were exposed to the hepatitis C virus at some point in your life. If the result is positive, your provider will perform a second test called hepatitis C virus RNA to see if the virus is still in your body. If the RNA test result is positive, then you have chronic hepatitis C infection. So what does it mean if you have a positive result for the first test but a negative result for the second? Recommended Reading: Is Milk Thistle Good For Hepatitis C Scientists Discover Hepatitis C Virus Can Remain Infectious Outside Of The Body For Up To 6 Weeks Dr. Ronald ValdiserriA recent study by researchers from the Yale Schools of Medicine and Public Health revealed that the hepatitis C virus can remain infectious for up to 6 weeks on surfaces at room temperatureresulting in a much longer period for potential transmission than was previously appreciated. Prior to this study, scientists believed that HCV could survive for up to four days on surfaces outside of the body. These findings have implications for the safety of patients and workers in healthcare settings as well as for reducing viral hepatitis transmission associated with drug useboth of which are priority areas outlined in the national Action Plan for the Prevention, Care and Treatment of Viral Hepatitis. Our findings clearly demonstrate that strict infection control practices and universal precautions are needed in the clinical setting to avoid contact with infectious agents such as HCV that can survive on surfaces, noted study co-author Professor Robert Heimer of the Yale School of Public Health in a release announcing the study findings. The implications go beyond the clinic to the risk environment of people who use syringes outside of medical care settings. Unsafe practices, such as sharing of syringes by people who inject drugs or careless handling of human blood during home delivery of intravenous medications, can lead to HCV transmission. Implications for Preventing Healthcare-Associated HCV Transmission Dr. Jag H. Khalsa Surveillance For Hepatocellular Carcinoma The development of cirrhosis is the single most important risk factor for developing hepatocellular carcinoma . Accordingly, all persons with cirrhosis should undergo surveillance for HCC with hepatic ultrasound every 6 months. For patients with chronic HCV infection and cirrhosis, surveillance for HCC should continue after treatment for HCV, even if the individual obtained a sustained virologic response. Some experts also recommend surveillance for HCC in persons with chronic HCV infection and Metavir stage F3 although the data in support of screening in this subpopulation is limited. Don’t Miss: How Does Hepatitis C Transmitted What To Consider Before Joining A Clinical Trial Before signing up for a clinical trial, the NIH recommends asking the following questions: What is the purpose and length of the study? Will you have to travel to a different state? If so, are you responsible for your own transportation, hotels, and meals? Its also important to know the risks associated with participating. You may have side effects from treatment, some severe. Mortality And Survival Rates If you are diagnosed with advanced cirrhosis of the liver you will be assessed to predict your short-term prognosis. The 30-day mortality rate for alcoholic hepatitis has a wide range from zero to 50% and there are scoring models to assess individual prognosis based on your laboratory test results. One scoring system for cirrhosis is the Child-Turcotte-Pugh system. It can be interpreted with these survival rates: - 5 to 6 points : one-year survival 100%, two-year survival 85% - 7 to 9 points : one-year survival 80%, two-year survival 60% - 10 to 15 points : one-year survival 45%, two-year survival 35% One large factor in mortality is whether the person discontinues alcohol. Overall, the five-year survival is 60% for those who stop drinking and less than 30% in those who continue to drink. Recommended Reading: Genotype 2a Hepatitis C Virus Distinguishing Compensated Versus Decompensated Cirrhosis Prognosis and survival are markedly better in persons with compensated cirrhosis than in those with decompensated cirrhosis and . In addition, the presence of decompensated cirrhosis can have major implications regarding management and prevention of cirrhosis-related complications, as well as the potential need for a referral for liver transplantation evaluation. In general, any person with decompensated cirrhosis should receive evaluation and medical care by a hepatologist or liver diseases specialist. Some experts have proposed a 4-stage cirrhosis classification system that risk stratifies individuals according to the presence of ascites, esophageal varices, and variceal bleeding to differentiate and stage compensated and decompensated disease . Can I Drink Alcohol Once In A While If I Have Hepatitis C Alcohol can clearly contribute to worsening liver disease. You must discuss with your health care provider if any amount of alcohol is safe for you. Alcohol can cause inflammation and scarring in the liver. If you have any underlying liver condition, such as hepatitis C or hepatitis B or damage from long-term alcohol use, your liver will be more sensitive to alcohol. When you have hepatitis C virus, alcohol on top of the hepatitis C can cause the inflammation and scarring to be worse, and overall damage to the liver may happen much faster when you drink alcohol. Here is some helpful information about alcohol and hepatitis: Also Check: Hepatitis A Vaccine At Cvs Is It True That If You Get A Piercing Or Tattoo Youll Get Hepatitis C Even licensed, commercial tattoo studios can have spotty hygiene and cleaning practices. If the equipment the tattoo artist or piercer uses is clean and sterile, you dont have an increased risk of getting hepatitis C. If the equipment looks less then pristine or you have any hesitations after meeting with the artist, reconsider your choice, and look for a more sterile alternative. very rare . This statistic is based on heterosexual partners in monogamous sexual relationships. Your risk for contracting hepatitis C through a sexual encounter is higher if you have multiple partners, engage in rough sex, or already have an STD. Today, most people are infected with hepatitis C after sharing dirty needles or other paraphernalia for drug use. In rare cases, you can contract hepatitis C by using a tool that has an infected persons blood on it, such as toothbrushes and razors. When To Seek Medical Advice See your GP if you persistently have any of the later symptoms above, or if they keep returning. They may recommend having a blood test that can check for hepatitis C. Read more about diagnosing hepatitis C. None of the symptoms above mean you definitely have hepatitis C, but it’s important to get them checked out. You should also speak to your GP about getting tested if there’s a risk you’re infected, even if you don’t have any symptoms. This particularly includes people who inject drugs or have done so in the past. Read about the causes of hepatitis C for more information about who’s at risk of having the infection. You May Like: Hepatitis C And Treatment Options
<urn:uuid:9ddd46d3-e337-44dc-b360-76c488dadc5a>
CC-MAIN-2023-40
https://www.hepatitisprohelp.com/how-long-can-you-live-with-hepatitis-c/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506479.32/warc/CC-MAIN-20230923030601-20230923060601-00837.warc.gz
en
0.919807
3,463
2.953125
3
“Indeed, it has been said that democracy is the worst form of government except all those other forms that have been tried from time to time.” “The best argument against democracy is a five-minute conversation with the average voter.” Democracy has been around since all the free men of Athens gathered to vote around 500 BC. As I suspect we all know, a democracy is a government in which decisions are made by the people, not senators, not presidents, not aristocrats, and certainly not kings. I suppose it may shock a lot of people here when I tell you that the United States of America is not technically a democracy, and I am glad of it! In a democracy, general votes are held on every single issue. That’s just not practical once you get more than a few dozen people. (In my experience, it’s no longer practical with more than about three people!) Instead, the US and most other democracies are actually republics, where the people vote to select their leaders. These leaders then make most of the decisions themselves. However, most of the time when we talk about democracy we’re referring to these wonderful republics. “Obey your leaders and submit to their authority. They keep watch over you as men who must give an account. Obey them so that their work will be a joy, not a burden, for that would be of no advantage to you.”
<urn:uuid:ac4b54e8-7832-4ca7-9a92-79785e8f8408>
CC-MAIN-2017-34
https://ayearofholidays.wordpress.com/2012/09/15/september-15-international-day-of-democracy/
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105961.34/warc/CC-MAIN-20170820015021-20170820035021-00327.warc.gz
en
0.978595
301
2.53125
3
As winter approaches and we begin to warm our houses, let’s not forget about our pet rabbits that live outside. In the wild, rabbits escape the cold and wet weather by hiding in their warrens underground - protecting them from freezing temperatures. Our pet rabbits need the same protection from wind, rain and cold temperatures when in their hutches. Healthy rabbits can generally manage the colder temperatures of winter as long as they have a warm, cosy and secure home. Start by ensuring your rabbit's hutch is in good repair. Ensure the roof is waterproof, the floor is damp proof and that no water can get inside the hutch. Ensure the walls are in good condition and are varnished suitably. Get all repairs done now before the weather deteriorates. Moisture and damp will rise into a hutch that is placed on the ground. Raise the hutch off the floor using bricks or a table frame to allow the circulation of air and prevent the base from becoming damp and rotten. You can buy a specially made hutch cover to place across the front of the mesh on your rabbit's home — or make your own DIY version using plastic covers or Perspex — allowing your bunny to see outside but preventing wind and rain entering. Remember to leave a gap of several inches to allow for ventilation. Position the hutch carefully and, if possible, move away from the wind and rain or consider building something around the hutch or use windbreakers for added protection. If possible, move into a garage or shed (not one where a car is kept). Hutches moved into sheds or garages still require insulating through the winter. Adding extra bedding is really important to help your bunny stay warm. Line the bottom with newspaper and provide a layer of straw (a better insulator than hay). Cover this with hay for your rabbit to eat as straw is not sufficient. Provide a cardboard box with an entrance hole and line it with bedding materials; a smaller area will warm up quicker and be ideal for your bunny to sleep in. Regular cleaning is essential as wet bedding will not keep your bunny warm. If the weather becomes very cold then you can use pet-safe heated sleep pads (ensure these are well-wrapped to avoid burns and scolds, and always monitor your rabbit when using them). Do not use any mains-powered heating pads or hot water bottles, as your rabbit may chew the wires. Rabbits still need to run, jump, play and stretch during the winter months. It is fine for them to have access to an outdoor run as long as they still have somewhere to retreat to should they choose. Ensure the run is covered to protect it from rain as you don’t want your bunny getting wet. Providing areas in the run for your rabbit to rest and hide in is also important. Rabbits who live outdoors will require more calories through the winter months as they will use more energy trying to keep themselves warm. Ensure they have access to plenty of clean, dry hay and monitor their weight regularly. If using a water bottle check it several times a day as it may freeze or become too cold. Very often the metal ball in the spout becomes frozen — preventing water being dispensed. Insulating the bottle can help; specific covers can be purchased, or you can use items found at home such as bubble wrap and socks. If possible, keep a spare bottle in case the other freezes, cracks or breaks. It can also be moved inside the hutch. Observe your rabbits daily — especially if older, underweight or very young — as they are particularly prone to cold-related health problems. Rabbits do not hibernate, so it’s important to monitor the amount they are eating, drinking, toileting, and moving about. If anything changes, make them an appointment to see your Veterinary Surgeon. Rabbits are prey animals, which means they tend to hide illness to avoid becoming a target for predators, so you will need to react quickly. If you would like more information on any of the services that Leading the Way Pet Care provides, please contact us via please contact us via email or phone us on 0800 027 9846.
<urn:uuid:d59c803a-28ae-486d-8ec8-ba082aa13a82>
CC-MAIN-2020-24
https://www.leadingthewaypetcare.co.uk/blog/article/caring-for-your-rabbit-in-winter/
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347385193.5/warc/CC-MAIN-20200524210325-20200525000325-00154.warc.gz
en
0.947724
867
2.515625
3
The Nature of Space and Time is a collection of the theories of two greatest theoretical physicists of the age, Stephen Hawking and Roger Penrose. In the group of essays, the two scientists present their opposing views about the universe from how it originated to its ultimate fate, as well as including concepts of entropy with regards to black holes. “In a sense the debate between Penrose and Hawking is a continuation of that earlier argument, with Penrose playing the role of Einstein and Hawking that of Bohr.” Not recommended as a light read, this book includes complex concepts which are meticulously laid out. Fascinating for all scientists and especially physicists, both Hawking and Penrose layout formulas and arguments with the assumption that the reader has a deep understanding of Maths and quantum mechanics. The two physicists argue concepts such as why time moves forwards instead of backwards, how black holes can evaporate and what happens to the information when they do. While Penrose supports quantum mechanics as a final theory for the origin of the universe, Hawking argues that a quantum theory of gravity and the no-boundary hypothesis can explain the universe, with their final debate expressing their diverging views on the matter. An educational and fascinating read, ‘The Nature of Space and Time’ is highly recommended to theoretical physicists who wish to gain a ‘fly on the wall’ perspective of two views of the greatest minds in the field.
<urn:uuid:c96b0d04-8cc8-40d1-83f7-fc4f1652c0bb>
CC-MAIN-2017-43
https://www.goldmoney.com/research/library/books/the-nature-of-space-and-time-stephen-hawking-2000
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824104.30/warc/CC-MAIN-20171020120608-20171020140608-00375.warc.gz
en
0.950353
288
2.625
3
A file is a collection of information. This is the basic unit of storage on the computer disk. SHAZAM makes use of files for input of information and output of results. Input files (such as data files and SHAZAM command files) must be created and/or managed by the user. Input files can be created and modified with a text editor . An editor is a program that is like a word processor but much simpler and with fewer features. Windows SHAZAM provides an editor window for preparing SHAZAM command files. Alternatively, examples of editors that can be used are: Note: As a general rule do not use the TAB key when preparing data files or SHAZAM command files. Use the space bar to line things up. If a word processor is used to create data files and SHAZAM command files, the file must be saved in ASCII (.txt extension) format. In the word processor, from the [SHAZAM Guide home]
<urn:uuid:5641204c-4c56-46f4-9b60-61a07c2d6109>
CC-MAIN-2023-14
http://econometrics.com/intro/file.htm
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943698.79/warc/CC-MAIN-20230321131205-20230321161205-00524.warc.gz
en
0.845005
212
3.3125
3
From Austen to Wodehouse, Blyton to Hardy, Dorset’s stunning countryside has inspired some of Britain’s most prominent literary names with its scenic, almost ineffable landscapes igniting the imagination which has affected these authors in various ways. Take a stroll with us (in no particular order) as we lead you through a literature lover’s guide to discovering these authors’ works and all the pleasures Dorset has. Persuasion: This historic title takes place around the Lyme Regis area which many call “Pearl of Dorset” but more commonly known as Jurassic Coast which is also a world heritage site and the title itself is Austen’s final novel which was published shortly after her death in 1817. Austen visited Lyme Regis in 1803 and 1804, having stayed for weeks throughout that time which were later the setting for the book. The popularity of this title led to an overflow of fans to the town in which many of the events take place. Why not immerse yourself in the footsteps of Austen and take a walk on the Cobb, have a weekend trip or drive along the Coast where you can still find pre-historic fossils along the way to experience what she did which left such a lasting impression that it was captured so eloquently within her final novel. Tess of the D’Urbervilles: Initially this appeared as a censored and serialised version which was published by the British illustrated newspaper (The Graphic) in 1891; and later in book form which spanned three volumes. For many, this novel represented Hardy’s literary/fictional masterpiece which challenged the sexual morals of the Victorian era. All of Hardy’s novels are inspired by the South and South West areas of England which he named Wessex, after the medieval Anglo-Saxon kingdom that existed in this area of England prior to the unification of Athelstan. The Vale of Blackmore, is also the main setting for Tess and is a short stones’ throw away from Stonehenge. Tess herself is seen as a representation of nature and her affiliation with animals throughout the novel which impressed and fascinated the reader of the “idea” or representation of the South and how it inspired the events that took place. Like many before and after Hardy, the beauty of the South is ideally conveyed and reinforces the plots of the novels. Famous Five: “The Famous Five” is a series of children’s novels written by author Enid Blyton who went by the name of Mary Pollock within some of her published works. The novels feature the adventures of a group of young children and their dog and typically find themselves stumbling upon an adventure which usually involves criminals and treasure. Oftentimes, these excursions they find themselves in are close to Georgina/George’s family home which is based in Dorset. Regardless of the book, many times the settings themselves take place in rural areas which were directly inspired by the area of Dorset. Though there was only originally going to be six/eight within the series, the popularity and sales of the books grew tremendously to the point that in the end, twenty-one “Famous Five” novels were written as well as several television and film adaptations based on the novels. Enid Blyton is considered to be one of the world’s best selling authors since the 1930s having sold in excess of 600 million copies. This series of books itself will capture the imagination in what it was like as a child to discover idealistic, remote locations such as these which made reading these books engaging, leaving the reader to reminisce on the days we all had a group of friends with a dog having your own adventures. For those wishing to really re-live the days of childhood, why not follow in the footsteps of the famous five by visiting the iconic locations written within the book such as Kirrin Castle, Corfe Castle, idealistic seaside town of Swanage, then onto Brownsea Island, in Poole harbour which is accessible by ferry and then end the day with an excursion onto Bournemouth located five miles from Poole harbour. Love among the chickens: Is a novel by Wodehouse and was first published in June of 1906 and is the only novel to feature the recurring character of Stanley Featherstonehaugh Ukridge who otherwise is confined to short stories. The plot focuses on Jeremy Garnet who decides to leave London for a time to focus on his next book, but is interrupted by the arrival of his friend Ukridge accompanied by his wife Millie who then explains a business proposal involving producing hens’ eggs on a farm in Dorset and invite Garnet by enticing him of the idea of golf and plenty of sea-bathing. Though somewhat bizarre, the novel effortlessly displays the serene landscapes afforded by Dorset and transition to sandy beaches and warm sunny days. Wodehouse’s work has gained in popularity since his death, and many of his works have been adapted for television and film and as of 2015, his works are sited in the Oxford English Dictionary with over 1,700 quotes. Today, his legacy is commemorated with a memorial stone in Westminster Abbey which is open to the public. Additionally, if it is golf that you are fancying, Dorset offers great golf courses throughout the area such as Isle of Purbeck, Lyme Regis, Remedy Oak and Bridport & West Dorset Golf Club. Thomas Edward Lawrence/Lawrence of Arabia T.E. Lawrence who is globally better known as Lawrence of Arabia (autobiography written by Jeremy Wilson about Lawrence who helped lead the Arab Revolt against the Ottoman empire during WWI), was a British archaeologist, army officer, diplomat and writer. Lawrence published three major texts in his lifetime. The most significant was his account of the Arab Revolt in Seven Pillars of Wisdom. Homer’s Odyssey and The Forest Giant. Shortly after his military career ended, Lawrence settled by Wareham, Dorset in a cottage named Clouds Hill. Shortly thereafter, he was fatally injured in an accident on his Brough Superior (motorcycle) near his cottage and died six days later. Today Lawrence is buried in the separate burial ground of St. Nicholas’ Church, Moreton which is nestled in between Weymouth and Corfe Castle and a short drive away to the sandy beaches of Bournemouth. Both where he is interred as well as his cottage are open to the public and receive numerous visitors throughout the year to pay their respects Lawrence who himself had a prolific life with the accomplishments he garnered throughout his lifetime. The French Lieutenant’s Woman: Set in the mid-nineteenth century, the novel’s protagonist Sarah Woodruff, lives in the coastal town of Lyme Regis as a disgraced woman abandoned by a French ship’s officer who had returned to France and married. This novel gained notoriety due to is writing structure. Though more popular now in film and television, the book’s style of writing ends up bringing the reader into the book as a character themselves with the possibility of the protagonist having multiple endings. Again set in the historic Dorset area, this novel embodies the simplicity of coastal/scenic living. Frankenstein; or, The Modern Prometheus: Is a novel written by English author Mary Shelley; which ultimately is what she is most known for through the numerous adaptations her novel brought about through print, television and cinema. Though she is most known for Frankenstein, Shelley was an accomplished author with various other works that are now being given acclaim for her literary style. She also edited and promoted the works of her husband, romantic poet and philosopher Percy Bysshe Shelley. Though not native or having lived in Dorset, her son Sir Percy Florence Shelley, bought Boscombe Cottage, which he had built in 1801 and intended to turn it into a home for his mother; unfortunately, Mary died from a brain tumour in 1851 prior to the completion of the home. Mary Shelley wanted to be buried with her parents, so her son had their coffins exhumed and placed in a family plot at St. Peter’s Church in Bournemouth. An interesting fact about Shelley, after her husband Percy Shelley died from drowning and his body cremated, she decided to keep his heart in a silken shroud and it is rumoured that she carried it with her nearly everywhere for years. Today you can visited her burial site with the cemetery being open to the public and afterwards can cross the street to eat, drink or dance at a pub named after her or walk a few minutes further to reach Bournemouth beach and pier. Whether taking a drive along the Jurassic Coast or opening a hen farm business, what these famous writers all have in common are the portrayal of one of the best areas of the UK that anyone would be thrilled to visit whether it be to have an adventure, road-trip or have a holiday. Discover Dorset Experience Discover Dorset and all its beauty. Enjoy Dorset cream tea on arrival, a full English breakfast each morning and dinner every evening using some of the finest Dorset produce. We will even provide you with a suggested itinerary of what to see and do! Stay 4 nights,we’ll upgrade you to a sea facing room with private balcony (subject to availability). Just £59 pppn Available Sunday – Thursday (offer excludes July & August). Minimum stay of 2 nights applies. Check availability and book now! If you would like to find out more about these authors’ works’, the areas of Dorset or just take a gander at scenic postcard like shots, feel free to hit the links below.
<urn:uuid:4b53e747-5d9d-4cc4-aa92-9ae7c7879303>
CC-MAIN-2020-24
https://www.rivierabournemouth.co.uk/blog-post/love-persuasion-and-lashings-of-ginger-beer-a-literary-guide-to-discovering-dorset
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347396163.18/warc/CC-MAIN-20200527204212-20200527234212-00014.warc.gz
en
0.980875
1,999
2.671875
3
The data being explored for this research are drawn from the larger literacy and learning readiness study. Although we did not initially set out to explore social and familial roles, sex-linked characteristics or the role of gender on learning readiness or literacy acquisition; it became apparent that participants’ ideas about their roles in the community (whether consciously or unconsciously) regardless of age were being heavily influenced by and influencing their responses. This recognition led researchers to explore perceptions of gender and related social and familial roles and their expression in rural Uganda. The study aims to explore whether the stories told by child and adult caregiver participants in two rural Ugandan villages feature sex-linked characteristics (Bem, 1981). Since ideas relating to gender stereotypes and the concepts of masculinity and femininity may be transmitted from parents and other primary caregivers to children, this study also explores how the sex-linked characteristics in the stories told by the adult caregivers relate to the stories told by the children. Lastly, this study explores how sex-linked characteristics in the children's stories map onto a thematic framework of social and familial roles. This study uses a coding frame proposed by Taylor (2003) and a grounded theory approach as advanced by Auerbach and Silverstein (2003) as part of a mixed-methods exploration of these stories. Click here for a presentation at Austen Riggs, May, 2017. Check out this related article: The Beast Had to Marry Balinda: Using Story Examples to Explore Socializing Concepts in Ugandan Caregivers’ Oral Stories.
<urn:uuid:c37ab475-f17c-44ee-9a2b-f60b3f63ac83>
CC-MAIN-2020-24
http://www.rurallibrariesresearchnetwork.net/gender-and-social-roles-study.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347405558.19/warc/CC-MAIN-20200529152159-20200529182159-00154.warc.gz
en
0.928285
311
3.078125
3
Intel HEX format Intel Hex is one of the oldest file formats available and is adopted by many newcomers on the market. Therefore this file format is almost always supported by various development systems and tools. All data lines are called records and each record contains the following fields: Every record begins with a colon (ASCII value $3A). Records contain only ASCII characters! No spaces or tabs are allowed in a record. In fact, apart from the 1st colon, no other characters than 0..9 and A..F are allowed in a record. Interpretation of a record should be case insensitive, so it does not matter if you use a..f or A..F. The byte count cc counts the actual data bytes in the current record. Usually records have 32 data bytes, but any number between 0 and 255 is possible. This is the address where the first data byte of the record should be stored. After storing that data byte the address is incremented by 1 to point to the address for the next data byte of the record. And so on, until all data bytes are stored. target address = segment*16+aaaa In case of Upper Linear Base Address mode the upper 16 bits of the 32 bit address are pre-set by a special record type. In this case the address space is expanded to 32 bits, which gives us a total range of 4Gb. target address = ulba*65536+aaaa There are 5 record types defined: '00' = Data Record Type '00' is the main record type. The real data are sent using this record type. The 1st data byte of the record is stored in the address specified by the address field of the record (plus the pre-set Segment or Linear Base Address). After that the address of the address field is incremented and the next data byte is stored on the next address. The address in the address field is 16 bits, so a rollover from $FFFF to $0000 can occur. This will not produce a carry into the Segment or Linear Base Address, so addressing space is wrapped back! Type '01' is the End Of File record. The receiver of the file will stop waiting for new records after receiving this record. The byte count and the address field of this record must always be $00. Because the contents of this record type is fixed, the checksum field is always $FF. Type '02' records are used to pre-set the Extended Segment Address. With this segment address it is possible to send files up to 1Mb in length. The Segment address is multiplied by 16 and then added to all subsequent address fields of type '00' records to obtain the effective address. By default the Extended Segment address will be $0000, until it is specified by a type '02' record. The address field of a type '02' record must be $00. The byte count field will be $02 (the segment address consists of 2 bytes). The data field of the type '02' record contains the actual Extended Segment address. Bits 3..0 of this Extended Segment address always should always be 0! Type '03' records don't contribute to file transfers. They are used to specify the start address for Intel processors, like the 8086. So if you would upload a file to an Intel based development board, the starting address of the code can be specified with this record type. This starting address will be loaded into the CS and IP registers of the processor. For normal file transfers the type '03' records can be ignored. The byte count of type '03' record is $04, because 4 data bytes will be sent. The address field remains $0000. The data field of type '03' records contain 4 bytes, the first 2 bytes represent the value to be loaded into CS, the last 2 bytes are the value to be loaded into IP. Bytes are sent MSB first. Type '04' records are used to pre-set the Linear Base Address. This 16 bit Linear Base Address, specified in the data area, is used to obtain a full 32 bit address range when combined with the address field of type '00' records. With this LBA it is possible to send files of up to 4Gb in length. The Linear Base Address is used as the upper 16 bits in the 32 bit linear address space. The lower 16 bits will come from the address field of type '00' records. By default the Linear Base Address will be $0000, until specified by a type '04' record. The address field of a type '04' record must be $0000. The byte count field will be $02 (the LBA consists of 2 bytes). The data field of the type '04' record contains the actual 2 byte Linear Base Address. MSB is sent first. Type '05' records don't contribute to file transfers. They are used to specify the start address for Intel processors, like the 80386. If you would upload a file to an Intel based development board, the starting address of the code can be specified with a type 05 record. This starting address will be loaded in the EIP register of the processor. For normal file transfers the type '05' records can be ignored. The byte count of type '05' records is $04, because 4 data bytes will be sent. The address field remains $0000. The data field of type '05' records contain the 4 byte linear 32 bit starting address to be loaded into the EIP register of the processor. Data or Offset field This field contains 0 or more data bytes. The actual number of data bytes is indicated by the byte count in the beginning of the record. The data bytes are interpreted as real "payload" data in type '00' records. In other record types the data represent pre-set address values. This field is a one byte (2 hex digits) 2's complement checksum of the entire record. To create the checksum make a 1 byte sum from all fields of the record: byte count + both address bytes + record type + all data bytes. Then take the 2's complement of this sum to create the final checksum. Checking the checksum at the receiver's end is simply done by adding all bytes together including the checksum itself, discarding all carries, and the result must be $00. In the example above you can see a piece of code with normal 16 bit addressing. The first 4 lines have 16 bytes of data each, which can be seen by the byte count, the first byte of each line. The 5th line has only 4 bytes because the program is at its end there. Here you see an example with an address gap. The first part of the program starts at address $0000. After the second record the address has suddenly changed to $1000. All date in the addresses in between remain unchanged, or are undefined. It is even possible to fill in these "blanks" later, without destroying the code presented in this example. As you can see not all lines have the same number of data bytes, which is no problem. In this final example I show you a piece of code with Extended Segment records in it. The first record is one of them. Here the Extended Segment address is set to $2BC0, which means that $2BC00 is added to all subsequent address fields to obtain the target address of the data. E.g. the first data byte of the 2nd record is stored at location $2BC00+$1234=$2CE34.
<urn:uuid:04a8d493-d816-4296-aa46-15dd3b18b9a8>
CC-MAIN-2013-20
http://www.sbprojects.com/knowledge/fileformats/intelhex.php
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699036375/warc/CC-MAIN-20130516101036-00082-ip-10-60-113-184.ec2.internal.warc.gz
en
0.899374
1,582
3.3125
3
(NaturalNews) Milk thistle is a flowering plant that is part of the daisy family. It gets its name from its bristly and prickly nature and the "milky" sap that oozes out of the plant. The leaves, fruits and seeds of milk thistle have been used for centuries as a natural medicine. Milk thistle is one of the world's most powerful liver detoxifying agents. Milk thistle was used by medical herbalists in the late 19th century to treat varicose veins and liver, spleen and kidney disorders. Today, it is primarily used to improve the function of the liver, kidneys and gastrointestinal system. Many individuals have seen dramatic improvement using milk thistle for health issues such as psoriasis, menstrual problems, jaundice and poor circulation. Milk thistle and liver health The active antioxidant compound within milk thistle is the flavonoid complex called Silymarin. This anti-oxidant is one of the most powerful liver detoxifying agents. It helps to boost glutathione and superoxide dismutase which are two the bodies master super antioxidants. One study found that silymarin increased glutathione content in the intestines and liver by up to 50 percent. Boosting glutathione helps protect the intestines from inflammatory damage that leads to ulcers and colitis. Milk thistle guards the liver's numerous hepatic cell membranes and slows the rate at which toxins can be absorbed into the liver. Research has shown that silymarin enhances protein synthesis to enhance liver cell regeneration and counteract the effects of poisons on the liver . It has been used to treat alcoholic hepatitis, alcoholic fatty liver, cirrhosis-liver poisoning and viral hepatitis. Silymarin and kidney health Silymarin concentrates in kidney cells where it helps repair and regenerate protein enzymes and DNA. One study indicated that it increased kidney cell replication by 25-30 percent over control groups. This is extremely important for individuals who have suffered milk to severe kidney damage from infections, kidney stone formation or environmental toxins. The kidneys are one of the major organs that are damaged by chemotherapy agents. Research has shown that the major compounds in silymarin protect the kidneys from these dangerous drugs. In particular, they protect the cell membrane of the kidney cells allowing for healthy cell receptor activity. Silymarin is considered to be 10 times as potent as vitamin E and increases the activity of the powerful antioxidant superoxide dismutase (SOD) in red and white blood cells in patients suffering with liver disease. This increases oxygenation and immunity. Studies have shown that the major compounds of silymarin are silybin and silychristin. These compounds have low absorption rate at about 20-50 percent. It is better to use milk thistle in a standardized extract. Milk thistle can also be fermented in an organic acid base for optimal digestion and nutrient assimilation. Milk thistle as a demulcent Milk thistle is a demulcent that improves the health of the bodies mucous membranes. This reduces inflammation within the skin cells, sinus and respiratory tract and kidney and bladder wall lining. It also reduces inflammatory stress in the bile duct and inhibits the formation of gall stones. This improves the functionality of the gall bladder and allows for complete bile release. Milk thistle also helps soften and improve the moisturizing of the skin. This is especially helpful for individuals with acne and eczema and other skin impurities. It has also been shown to improve the overall glow and radiance of the skin quality.Sources for this article include:http://www.newsmax.comhttp://www.motherearthliving.comhttp://silymarin.com/?p=how.worksAbout the author: Dr. David Jockers owns and operates Exodus Health Center in Kennesaw, Ga. He is a Maximized Living doctor. His expertise is in weight loss, customized nutrition & exercise, & structural corrective chiropractic care. For more information go to www.drjockers.com To find a Maximized Living doctor near you go to www.maximizedliving.com Dr. Jockers is also available for long distance phone consultations to help you beat disease and reach your health goals
<urn:uuid:3037010f-8920-4304-84d6-b2ae895d6371>
CC-MAIN-2014-10
http://www.naturalnews.com/039821_milk_thistle_natural_medicine_silymarin.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394021547621/warc/CC-MAIN-20140305121227-00062-ip-10-183-142-35.ec2.internal.warc.gz
en
0.921011
894
2.96875
3
By Samuel Burke, CNN The Bangladesh factory collapse two weeks ago has, at last count, killed over 1,000 people. The country’s prime minister, Sheikh Hasina, has laid part of the blame for that tragedy on the Western retailers that flock to that country to take advantage of cheap labor. Minimum wage in Bangladesh is a measly $38 a month, but the heartbreaking images of people being pulled out of rubble could be a catalyst for Western consumers and retailers to insist on better conditions for workers there. The Walt Disney Company has already pulled out – but is that the right way to make things better? Some of the biggest retailers in the world, like Walmart, H&M, Gap and JCPenney still remain. Michael Posner was the U.S. assistant secretary of state for democracy, human rights and labor, and he's now starting up the first business and human rights center in this country at New York University’s Stern Business School. “I don't think what Disney did is right,” Posner told CNN’s Christiane Amanpour. “I think it's important for companies to make a commitment, to stay in countries like Bangladesh, to make a long-term commitment, to work with each other and to recognize that they can't keep running after the cheapest labor cost.” If American and Western consumers want to help people get out of poverty, it is important for them to have a presence in countries like Bangladesh, according to Posner. “The reality is there are four-million people, mostly young women, working in these factories in Bangladesh. They're often the only breadwinners in their families,” Posner believes that the companies there should be working together to make conditions better, instead of competing against each other. “There needs to be a way in which the companies come together,” Posner said. “Let's say the 100 biggest retailers came together and they said, we have a collective plan. We're going to push the government of Bangladesh to do better. We're also going to contribute to the solution.” There is a precedent for this type of cooperation. Years ago, Posner worked with little kids stitching soccer balls in a small town in Pakistan. “Twenty brands came together, the big companies - Adidas, Nike - and they said, we're going to figure this out together, with the World Bank, with the U.S. government.” They built a stitching center, which Posner said improved conditions and could serve as a model for Western retailers invested in Bangladesh.
<urn:uuid:72b04a9b-f82f-4240-bcc1-8af6e6ff6616>
CC-MAIN-2014-15
http://amanpour.blogs.cnn.com/2013/05/10/cut-and-run-bangladesh/?hpt=hp_bn9
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223203235.2/warc/CC-MAIN-20140423032003-00204-ip-10-147-4-33.ec2.internal.warc.gz
en
0.965175
544
2.5625
3
Lithography was invented around 1796 in Germany by an otherwise unknown Bavarian playwright, Alois Senefelder, who accidentally discovered that he could duplicate his scripts by writing them in greasy crayon on slabs of limestone and then printing them with rolled-on ink. Because the local limestone retained so relentlessly any crayon marks applied to its surface, even after repeated inking and printing, lithographs (so called from the Latin for stone, litho, and mark, graph) could be printed in almost unlimited quantities. Thanks to ease of production and economical distribution, it did not take long for lithography to find a broad range of applications in art and commerce. As a means of multiplying drawings, it was embraced by portraitists and illustrators, especially those associated with the popular press and it proved an effective means of graphic invention for many of the period’s greatest artists (Figure 1). Early in the century, Romantic painters such as Théodore Gericault (Figure 2) and Eugène Delacroix came to appreciate the shifts of tone that could be achieved with lithography: stirring, dramatic effects like those produced with charcoal or black chalk. Some of the Impressionists used the medium to capture fugitive effects of weather or light. James McNeill Whistler (Figure 3) [born in Lowell, MA], an American who made his career in Europe, used the medium to capture the subtle grays of a seascape veiled in fog and Edgar Degas explored the varied forms of natural and artificial lighting at night. Near the end of the nineteenth century, similarly artful manipulations of black and white characterized the work of Symbolists searching for the means to evoke the world of dreams and the unconscious. When improvements in printing technology made it possible to add color to lithography and increase the size of the printing base, commercial possibilities ballooned. Advertising was revolutionized in the 1880s and 1890s by the production of bright mural posters (Figure 4) and art collectors began to enjoy a greater range of offerings in color prints and illustrated books. Department of Drawings and Prints, The Metropolitan Museum of Art Figure 1 - The Races (Les Courses,) Artist: Édouard Manet (French, Paris 1832–1883 Paris) Figure 2 - Boxers, Artist: Théodore Gericault (French, Rouen 1791–1824 Paris) Figure 4 - Moulin Rouge: La Goulue, Artist: Henri de Toulouse-Lautrec (French, Albi 1864–1901 Saint-André-du-Bois), Printer: Affiches Américaines, Charles Lévy (Paris), Date: 1891
<urn:uuid:5c787d40-0e07-40b3-8b66-ae58602ad735>
CC-MAIN-2023-40
http://www.saugushighschoollearningcommons.org/andersonville-prison.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510983.45/warc/CC-MAIN-20231002064957-20231002094957-00422.warc.gz
en
0.924257
586
3.875
4
Have you ever thought you needed to withhold your feelings because if you expressed yourself you would hurt someone else's feelings, and now the world seems out of your control? Have you avoided social situations because you were sure that you would make a fool of yourself, and now you believe you are bound to be awkward? If you answer yes, like many of us will, you may be unfairly undermining your own happiness. Cognitive Analytic Therapy (CAT) is a model of therapy developed by Dr. Anthony Ryle that also focuses on flawed thinking and how it can prevent us from reaching our goals. CAT reduces the wide array of mistakes we can make in our thoughts into three distinct categories: traps, snags, and dilemmas. CAT is unique for it's focus on our self-evaluation that takes place after our appraisal of the event and responding behavior have completed. These evaluations may be the best we can do, but sometimes they are self-sabotaging. Traps, snags, and dilemmas can lead us into feel limited in our choices and our problems become inescapable. For example: April, 25, feels uncertain about herself and openly admits that she has issues with self-esteem. When in social and work situations, she often strives to please others by doing what they seem to want. This, however, leaves an opportunity for others to direct April around and take advantage of her. Now, April feels depressed, angry, and worthless because her believed role as a less-than person has remained unchanged. This amplifies her original uncertainties and validates her trap. In the example above, we see April try to remedy her self-esteem issues with the best coping skill she can command. This strategy, however, supports the very issues that cause her negative self-image in the first place. In conclusion, it is the coping strategy, not anything inherently wrong with her, that is the culprit for her self-esteem issues. With reflection and help from a therapist, she may be able to challenge this trap to come up with a new strategy. If she were to believe, for instance, that demonstrating confidence can earn acceptance and respect, she may achieve her desired social reward and find that her previously held beliefs about herself have been disproven. Snags and dilemmas may feature different road blocks, but they work in very much the same way and should be similarly challenged to create new and more helpful strategies. To explore and reframe these thoughts, please feel free to contact me and schedule your first session. Reference: Ryle, Anthony, and Ian B. Kerr. Introducing Cognitive Analytic Therapy: Principles and Practice. Chichester, England: John Wiley & Sons, 2002.
<urn:uuid:e11f35eb-e80b-4c32-8fa2-b49b5e953cab>
CC-MAIN-2017-39
http://www.whatbringsyouintoday.com/blog-source/2015/1/12/traps-snags-and-dilemmas-3-ways-your-thoughts-are-keeping-you-from-being-happy
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818687484.46/warc/CC-MAIN-20170920213425-20170920233425-00375.warc.gz
en
0.968169
554
2.734375
3
Photo by lovelornpoets Intelligence may get students through school with high marks, but out there in the wild, a high-performing brain can only get one so far. We need to explicitly help our students learn to relate to those around them. Judith Halsted, in Using Books to Meet the Social and Emotional Needs of Gifted Students writes: as they grow, gifted children must… learn to build relationships with other people, many of whom do not share their abilities and interests Let’s help our kids make these relationships. We’ll start with a student-friendly goal: Learn to be friendly with others, even if they don’t share your abilities or interests. Learn To Build Relationships For anyone, starting a conversation with those outside a friend group is difficult, but add in our gifted kids’ tendency to over-think and their increased sensitivity, and they have even more of a challenge. We can give them simple rules for beginning conversations with new people. In essence, we’re teaching kids to “small talk.” Rule 1: Ask Questions About the Other Person To set up a successful conversation, students should be outwardly focused, asking questions about the other person. Rule 2: Begin With General Questions Since the student may not know this person, initial questions should be general enough that anyone can answer: - What are you going to do this weekend? - What video games do you play? - What schools have you gone to? These questions should be open-ended to encourage longer answers and get the discussion going. - “Did you see The Avengers?” is closed, since the person might say: “No.” - “What’s the last movie you saw?” is open, since the person will have an answer that leads to more questions. Take five minutes to brainstorm opening questions with your students. Rule 3: Get More Specific As students start to understand the other person’s interests, they will be able to ask more specific questions. What’s great is that they don’t have to know anything about the topic to ask questions. So even if a partner loves cricket, Esperanto, or Japanese pop music, students simply ask about the topic. - Oh, I don’t know anything about cricket. How is it different from baseball? - Really? So do you have a favorite team? - Hmm. Do young people play? Is there a “little league” for cricket? Rule 4: Avoid Controversy Remind students of some “off-limits” topics that are controversial, personal, or otherwise uncomfortable: But sometimes, students might accidentally stumble on an uncomfortable topic. Perhaps someone’s family isn’t around or they had to leave their last school because of an embarrassing incident. Talk to kids about tactfully retreating and shifting to a less sensitive topic rather than giving up on the conversation. Rule 5: Answer Questions With Complete Sentences During the course of the conversation, the student will field some questions as well. When replying to others’ questions, avoid one-word answers. Tell kids to keep the conversation alive by giving a thoughtful, complete answer. Practice answering in complete sentences. Practice in Class! As with any skill, we need to model these conversations and offer structured practice to help kids improve. The modeling part is fun, since you get to ham it up! Call up a student who enjoys the spotlight and go through a mock conversation with them. Model how to ask general questions. Model the art of getting more specific. Show them how to retreat from a topic that was unintentionally awkward. Brainstorm safe, general topics to ask about first with the whole class. Then set up parters and practice. When Do I Do This!? This is great way to differentiate instruction for “speaking and listening” skills during a language development period. Perhaps spend a week introducing the skills and practicing. Then come back to it once a week or so. This activity could be a good opener or closer for your day also. Get Monthly Updates Join over 9,500 educators! No spam. It's free. Unsubscribe whenever.
<urn:uuid:2a826737-0fca-463f-aaee-81c21b74b001>
CC-MAIN-2013-48
http://www.byrdseed.com/build-relationships-with-small-talk/
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164036407/warc/CC-MAIN-20131204133356-00081-ip-10-33-133-15.ec2.internal.warc.gz
en
0.940562
896
3.734375
4
Let's start with the basics. Most of the wireless gateways/ routers have the encryption disabled by default. Make sure to enable either WEP (Wired Equivalent Privacy) or WPA (WiFi Protected Access) wireless encryption.Using WPA is recommended because it's more secure, but is sometimes a bit harder to set up than WEP. If you want your wireless network to really be secure, WPA is the preferred method. NOTE: We do not recommend disabling Encryption. Make sure you are using WEP or WPA for your wireless network. Change Your Gateway/Router SSID name (Wireless Network Name) refers to the name of your wireless connection that you see on Available Wireless Connections while trying to connect from your computer. Changing the name itself doesn't protect your completely but it may discourage someone from hacking your network. Don't use something like your name, address, birth date, or other things that make it easy for someone to identify you. If you leave it '2wire2701' (or whatever the default is on your gateway/router), your computer automatically connects to every other network it encounters with the same name, and not every wireless network is a good and secure thing to connect to. Check the SSID on your AT&T provided gateway/router. Do Not Disable SSID Broadcast Do not disable the SSID Broadcast feature of your gateway/router. Hackers have sophisticated tools that can easily get information, so disabling SSID Broadcast won't improve your security. If you disable SSID Broadcast, it makes it difficult to connect other computers and devices, like wireless gaming consoles, printers etc., to your network. Additionally, if you have SSID Broadcast disabled, hackers can use technology to pretend to be your gateway/router and gain access to your computer. Enable MAC Address Filtering If you want to go one step further in locking down your network there is another step that only allows access to trusted devices. You can enable MAC Address (Media Access Control) filtering on your gateway/router. The MAC address is a unique identifier attached to the network adapter on a device like your notebook computer or wireless gaming console. If you enable Mac Address filtering on your network, you need to find and enter into your gateway/router the 12-character MAC address of every system that connects to the network. This can be time consuming to set up, especially if you have a lot of wireless devices and if there are a lot of different users on your network.
<urn:uuid:16960270-4cf0-4c7b-bddf-275122db6275>
CC-MAIN-2020-16
https://www.att.com/support/smallbusiness/article/smb-internet/KM1186942
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370500482.27/warc/CC-MAIN-20200331115844-20200331145844-00353.warc.gz
en
0.909084
518
2.796875
3
A new study conducted by the World Health Organization (WHO) finds an alarming obesity cancer connection, with as many as half a million cases of cancer a year occurring as a direct result of people being either overweight or obese. The research looked at data from 2012, particularly focusing on body mass index (BMI). Individuals with a BMI of 25 or more are considered overweight, and a BMI of 30 or higher is considered obese. In the study, published in the recent issue of the journal The Lancet Oncology, the WHO's International Agency for Research on Cancer (IARC) explained that high BMIs, while already a risk factor for a number of health problems, have also become a major risk factor for developing cancer. In 2012, approximately 3.6 percent of cancer cases were directly related to obesity and a high BMI. That amounted to 481,000 cancer cases in 2012 alone. North America ranked highest in the obesity cancer connection with 111,000 cases—23 percent—of the global cancer cases in 2012 that resulted from a high BMI. “[W]omen are disproportionately affected by obesity-related cancers,” reports Reuters, with an estimated ten percent of breast cancer cases preventable with proper weight management, the study found. While the number of cancer cases connected to obesity were higher in developed countries throughout North America and the EU, the number of cancers “linked to obesity and overweight is expected to rise globally along with economic development," Christopher Wild, IARC's director said to Reuters. Already, Asian countries are seeing “tens of thousands” of obesity cancer connections, with China accounting for 1.6 percent of new cases in 2012. Africa’s obesity cancer connection amounted to about 1.5 percent in 2012. In the U.S., not only is obesity a major cause of cancer, it's also the second most expensive "preventable" problem, found a recent study. Find Jill on Twitter @jillettinger Related on Organic Authority
<urn:uuid:03c148b2-f0b9-4b75-8bfc-cb598ee466cb>
CC-MAIN-2020-29
https://www.organicauthority.com/buzz-news/the-obesity-cancer-connection-half-a-million-cancers-caused-by-high-body-mass-index
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657155816.86/warc/CC-MAIN-20200715035109-20200715065109-00313.warc.gz
en
0.941557
409
3.109375
3
The Department of Posts observed National Post Week from October 9-15 in various districts across the country to highlight why handwritten letters are still relevant and important in today’s India. According to the World Energy Outlook survey from 2015, around 237 million Indians in rural areas live without electricity leave alone the internet. It is impossible for the people living in these areas to communicate with the outside world through electronic media. In 2015, there were around 1,54,939 post offices in India and 1,39,222 (89.86%) of these were located in rural areas. On October 24, 1,000 children from eight schools in Kottayam, Kerala, wrote personalised handwritten messages to the District Chief of Police (DCP), N Ramachandran, about various issues of concern to them. These letters were written on postcards that were handed out to the kids free of cost by the postal department in the district. The DCP has now formed a special team to take immediate action to solve the problems that the children brought up in the letters. Alexin George, the Division Senior Superintendent of the Postal Department in Kottayam, spoke to The Better India about this Kutty (child) Thapal (post) project. What was the inspiration behind this project? Alexin says, “The DCP was the keynote speaker during an exhibition organised at a local school. He expressed his disappointment at the fact that we’ve grown completely out of touch with art of writing letters and the children were quite enthused by his speech. During the National Post Week, post offices across the country find new ways to introduce children to letter writing through competitions on various subjects. But this time around, we thought we’d experiment with an idea that is more sustainable and impactful.” “It is a novel concept as far as the general public in Kerala is concerned. We organised the event to revive the culture of writing personal messages among young people in our district. Letters are a very potent form of self-expression and they are a medium through which children can make their voices heard. We can get rid of boredom, isolation and self-centred attitudes through this exercise because it allows the children to reflect on their thoughts,” says DCP N. Ramachandran, who inspired the children. The Postal Department of Kottayam has four subdivisions, and workers from these centres went to various schools across the district to raise awareness about the exercise. Over the course of the Postal Week, each child was given the opportunity to write a letter about anything he/she wanted – from voicing a grievance to praising the good work of the police. “We received 1,000+ letters over the past few weeks and handed them over to the police on October 24. We are not entitled to read the letters but the District Police Officer told us he was able to find out about so many problems that children face daily,” said Alexin. Children brought up pertinent issues, which they would find difficult to discuss through any other medium. They wrote about harrowing personal experiences – of being touched inappropriately in buses, fearing harassment from eve-teasers, and being victims of bullying in the classrooms. “The exercise was not just about writing a letter as a nostalgic experience. It’s about giving children the opportunity to introspect and refine their thoughts. It was meant for the children to participate with the police, to be proactive in protecting their neighbourhoods and themselves,” said M. Ramachandran. The DCP has constituted a special team of six members to look into the problems that were mentioned and intervene immediately. He said, “If it’s a major issue we will identify the children and approach them. We will have personal interaction with the child and try our best to address his/her grievance. And the kids are eagerly awaiting a solid response from a competent team.” However, this is not the first time that the Indian Postal Service officer Alexin George has used the power of his position for the betterment of society. He belongs to the Civil Services Batch of 2013 and was posted to Coimbatore in the same year. During a chance visit to tribal hamlets in the Western Ghats in 2015, he realised that many tribals were not aware of/making use of government schemes that were meant to help them. Post offices are especially relevant in areas where there is limited connectivity because they have very high penetration in such areas. They are important as facilitators, connecting people in these areas with not just relatives and friends but also the government so they can avail of beneficial schemes that will give them financial security. One such scheme is the Sukkanya Samriddhi Yojana introduced in January 2015. This is a saving scheme that allows parents of under-18 daughters to deposit money in a recurring scheme through the post office and use the money, with accrued interest, for her education or other expenses later. Alexin had all 23 girls living in seven hamlets enrol in this scheme through the Siruvani Adivaram Post Office in Coimbatore. He says, “This was the first time in the country that all the girls from seven tribal villages in a district were enrolled into the Sukkanya Samriddhi Yojana.”
<urn:uuid:20d275ae-2b4f-4c2e-a4fd-d23c6d2543b0>
CC-MAIN-2017-34
http://www.thebetterindia.com/73298/kutty-thappal-alexin-george-kottayam-postal-department/
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886107744.5/warc/CC-MAIN-20170821080132-20170821100132-00513.warc.gz
en
0.981255
1,098
2.59375
3
Holy League (1571) The Holy League (Spanish: Liga Santa, Italian: Lega Santa) of 1571 was arranged by Pope St. Pius V and included almost all the major Catholic maritime states in the Mediterranean. It was intended to break the Ottoman Turks' control of the eastern Mediterranean Sea and was formally concluded on 25 May 1571. Its members were the Papal States, the Habsburg states of Spain, Naples and Sicily, the Republic of Venice, the Republic of Genoa, the Grand Duchy of Tuscany, the Duchies of Savoy, Parma and Urbino and the Knights of Malta. These states were to have a force of 200 galleys, 100 other ships, 50,000 infantry, 4,500 cavalry and adequate artillery ready by 1 April each year. Don Juan de Austria, illegitimate half-brother of King Philip II of Spain, was designated supreme commander. The League kept membership open for the Holy Roman Empire, France and Portugal, but none of them joined. The Empire preferred to maintain its truce with Istanbul, while France had an active anti-Spanish alliance with the Ottomans. Portugal was heavily engaged in its own Moroccan campaign and its ongoing maritime confrontations with the Ottomans in the Red Sea and the Indian Ocean and had no forces to spare. The League initially assembled a fleet to aid the Venetian defenders of Cyprus which was invaded by Ottoman forces under the command of Lala Mustafa in July 1570, but was too late to prevent the island's capture by the Ottomans. On 7 October 1571, however, the League won a crushing victory over the Ottoman fleet at the Battle of Lepanto off the western Greek coast. On the signing of the peace treaty in 1573, the League was disbanded, a short time after Pope Pius V died. - "Battle of Lepanto (1571)". Encyclopedia Britannica. Retrieved 8 October 2013. - The Story of Don John of Austria - Luis Coloma, SJ, trans. Lady Moreton, (New York: John Lane Company, 1912), pp. 265-271. |This European history–related article is a stub. You can help Wikipedia by expanding it.|
<urn:uuid:9bf29f55-c3c1-4e08-8667-2c3912e7541c>
CC-MAIN-2014-23
http://en.wikipedia.org/wiki/Holy_League_(Mediterranean)
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1404776416489.79/warc/CC-MAIN-20140707234016-00000-ip-10-180-212-248.ec2.internal.warc.gz
en
0.962215
459
3.265625
3
In John Locke’s “Essay Concerning Human Understanding”, he tries to determine the limits of human understanding by developing the empirical theory of knowledge and refuted Descartes’ theory that ideas are innate in the human intellect. He also believed all knowledge comes through experience from internal and external sources of sensation and reflection, and the human mind at birth is a blank slate. He argued that if innate ideas existed they would be present in children, those who have not had any education. All Knowledge comes to us through experience, no mans knowledge can go beyond his experience. Locke argues that everything in our mind is a idea, and that all ideas take one or two routes to arrive in our mind, either they come in through the senses or else they come through our minds reflection on its own operation. The basis for understanding Locke is that he sees all people as having natural God given rights. As Gods creations, this denotes certain equality, at least in a abstract sense. This religion acts as the foundation for all of Locke’s theories, including the theories of individuality, private property, and the state. He believed that humans were autonomous individuals who although lived in a social setting, could not be articulated as a herd or social animal. Locke believed a person to stand for , a thinking intelligent being , that has reason and reflection, and can consider itself as itself , the same thinking thing in different times and places, which it only does by consciousness which is inseparable from thinking. [continues] Cite This Essay (2010, 11). Essay Concerning Human Understanding. StudyMode.com. Retrieved 11, 2010, from http://www.studymode.com/essays/Essay-Concerning-Human-Understanding-475565.html "Essay Concerning Human Understanding" StudyMode.com. 11 2010. 11 2010 <http://www.studymode.com/essays/Essay-Concerning-Human-Understanding-475565.html>. "Essay Concerning Human Understanding." StudyMode.com. 11, 2010. Accessed 11, 2010. http://www.studymode.com/essays/Essay-Concerning-Human-Understanding-475565.html.
<urn:uuid:dc60aa54-b919-4a4a-a642-5d44afe2f2e2>
CC-MAIN-2013-20
http://www.studymode.com/essays/Essay-Concerning-Human-Understanding-475565.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703035278/warc/CC-MAIN-20130516111715-00056-ip-10-60-113-184.ec2.internal.warc.gz
en
0.915965
461
3.390625
3
Edwin Vose Sumner was a life-long military man who rose to the rank of Major General during the Civil War. Born in 1797 in Boston, he enlisted in the United States Army in 1819. For the next 44 years, the military was his life. His service took him all over the western territories. In 1846, he was promoted to Major and fought in the Mexican War. It was at the Battle of Cerro Gordo that a musket ball glanced off Sumner's head, thus earning him the nickname, "Bull Head," which was later shortened to "Bull" Sumner. The mid-1850s saw Edwin Sumner right in the middle of "Bleeding Kansas." A few years later the storm clouds of Civil War gathered over the nation, and Edwin Sumner was appointed Brigadier General of Volunteers. Sumner led the Second Corps of the Army of the Potomac at the Battles of Antietam and Fredericksburg. In March, 1863 he died in Syracuse, New York. His daughter, Sarah, had married Syracuse native, William W. Teall. Sumner was on his way west for reassignment when he stopped in Syracuse to visit his family. He caught pneumonia and died on March 21. He is buried along with his wife, Hannah, in the Teall family plot in Oakwood Cemetery. To read General Sumner's obituary, click here.
<urn:uuid:8b44a06d-4824-4292-afe3-891cc4804c4c>
CC-MAIN-2014-23
http://localhistory.morrisville.edu/sites/cwrt/the-general.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00355-ip-10-146-231-18.ec2.internal.warc.gz
en
0.988074
293
2.921875
3
Indiana, Spencer County river mile 732 What an odd park! It has a broad entrance road, some big trees, and an expansive rustic picnic shelter with fireplace and chimney. There is a beautiful view across the Ohio River but no access to Ohio. What is it? Seemingly it is a remnant park, the remnant of a Lincoln sesquicentennial or bicentennial? It is defined as a location on the Ohio River Scenic Byways. But why would anyone go there? There is no access to the Ohio, or to the Anderson River which debuts into the Ohio there. Seemingly it is a competitor, in Spencer County, with the Troy Public Access Site, just across the Anderson River and mile or so away in Perry County. Troy is far less charming but far more accessible. And as for Lincoln? The details seem to be so lost that practically every small town along this section of the Ohio River in Indiana claims some connection to Lincoln. Often it’s the same connection: here, or here, or here Lincoln and his family a) crossed into Indiana for the first time or b) established a ferry that competed with existing ferries, thus propelling Lincoln into studying law. The outline of the story is compelling, but in the absence of the historical details it is frustrating to see it being repeated over and over again at these various sites. Here’s what the National Park Service website says: “Beginning at age seventeen, Abraham Lincoln obtained jobs working on the Ohio and Anderson Rivers. His first job, with Dennis Hanks, and Squire Hall, was cutting wood for passing steamboats. He received twenty-five cents per cord. Later that year James Taylor offered Abraham a job of running the Anderson Ferry, earning six dollars a month. The ferry landing became an interesting place to gather. Abraham, with a wealth of stories, attracted listeners to hear his stories and recitations. While working at the ferry landing, during his spare time, Abraham built a small row boat. ‘As he [Lincoln] stood at the landing, a steamer approached, coming down the river. At the same time two passengers came to the river’s bank that wished to be taken out to the packet with their luggage. Looking among the boats at the landing, they singled out Abraham’s, and asked him to scull them to the steamer. This he did, and after seeing them and their trunks on board, he had the pleasure of receiving upon the bottom of his boat, before he shoved off, a silver half dollar from each of his passengers.’ In his 1866 Lincoln biography, J.G. Holland relates the story Abraham Lincoln told Secretary of State William Steward.” This would be a pleasant stop for bicyclists or paddlers — broad lawns, inviting picnic shelter. Unfortunately there are no amenities: no toilet, no water. But the public access site in Troy is only half a mile away, so it might be do-able. There may be one or two restaurants in Troy. Next park: Grandview, Harold Schroeder Park Field research September 2015
<urn:uuid:d63339b2-0264-4fb1-b5cd-43150f0f3d21>
CC-MAIN-2020-29
https://ohioriverparksproject.com/the-parks/lincoln-ferry-park/
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657138752.92/warc/CC-MAIN-20200712144738-20200712174738-00411.warc.gz
en
0.961604
649
2.90625
3
The US solar industry experienced major growth within a decade, from 2.5 gigawatts of capacity in 2010, to over 81 gigawatts by mid-2020. In great part, this has been possible thanks to the federal tax credit for solar power systems, which is 26% as of 2020. However, solar power has not been adopted equally in all states, and California currently produces over 30% of the US solar generation. Before other states gave priority to solar power, California had over 50% of the nation’s installed capacity. Many factors have contributed to the growth of solar power in California. The state has abundant sunshine and favorable legislation, combined with high kilowatt-hour prices that improve the business case for going solar. This article will provide an overview of the factors that have driven solar power adoption in California, which could be replicated in other states. The state of New York has also emerged as a solar power leader in the US. While NY does not have the Californian sun, it offers incentives and favorable policies for solar power in homes and businesses. NY also has expensive electricity, increasing the monetary value of solar generation. Improve your building resilience with on-site power generation. Renewable energy sources can make buildings and communities more resilient during emergencies like the COVID-19 pandemic. Power plants fired by fossil fuels depend on global supply chains, while most forms of renewable generation use local resources. The main challenge is managing the variable power output of solar panels and wind turbines. However, emerging energy storage methods are a promising solution, once their upfront cost is reduced. How Sunshine and Expensive Electricity Increase Solar Savings Solar arrays of all scales use the same building blocks: solar panels, which are also known as photovoltaic panels or solar modules. Since solar panels and other components are highly standardized, their installed costs show little variation throughout the US. - Before deducting tax credits and incentives, a small residential system will typically cost $3 per watt of capacity. - A medium-sized business installation will typically cost around $2/watt. - Large commercial, industrial and utility systems can cost less than $1/watt. On the other hand, sunshine and electricity prices are highly variable throughout the US, and both affect the financial return of solar power. Each solar panel produces more kWh per year in a sunny place, and expensive electricity increases the value of each kWh. California happens to have both conditions: the abundant sunshine boosts productivity, and expensive electricity makes solar energy very valuable. Assuming a cost of $3/watt, a 6-kW solar power system costs around $18,000, which is reduced to $13,320 with the 26% federal tax credit. A system of this capacity can produce over 10,000 kWh annually in a good site, and electric tariffs above 20 cents/kWh are typical in California. Assuming annual savings of $2000, the PV system in this example has a payback period of 6-7 years, which is great for an investment that lasts over 25 years. California’s Solar Policy and Incentive Programs The combination of abundant sunshine and expensive electricity has been beneficial for the California solar industry. However, the state has also created favorable legislation for solar power, and there are several financing options available. The Renewable Portfolio Standard in California is one of the most ambitious in the US, with a goal of 100% carbon-free electricity by 2045. The RPS is legally binding for electric companies, and those who miss the target will be charged major fines. A solid RPS supports legislation and incentive programs that favor clean energy, including solar power. California also has an excellent net metering law, and you get credit for any surplus electricity from your solar panels. The Single-Family Affordable Solar Homes (SASH) program targets the low income segment, and it offers a solar incentive of $3/watt. Since this is the typical cost of a residential installation, eligible households can go solar at little or no cost. SASH incentives are available for homeowners below 80% of the area median income, and their property must be classified as affordable housing. The benefit applies for customers of the three largest power companies in California: PG&E, SDG&E and SCE. Financing Options for Solar Power in California California also offers financing options for solar power. Along with Florida, it is one of the two states with the Property Assessed Clean Energy (PACE) program. These loans can have a repayment period of up to 25 years, and they are charged along with property taxes. The interest rates of PACE loans vary, but they are typically below 10%, and can be as low as 2.5%. The only drawback of PACE loans is that they bring a property lien, which is removed until the loan is fully paid. Selling a property with a lien can be difficult, and for this reason, a PACE loan is only recommended if you have no plans to move. Other financing options include a Home Equity Line of Credit (HELOC) and a PowerSaver Second Mortgage from the Federal Housing Administration (FHA). While these loans are not exclusive for California, and they provide more options if you cannot get favorable conditions with PACE financing. - Both loan types are characterized by long repayment periods: typically 10-15 years for a HELOC, and up to 20 years for PowerSaver Second Mortgage. - Their interest rates vary: HELOCs below 5% are available depending on your credit record, and the PowerSaver Second Mortgage is typically between 4.99% and 9.99%. Loan financing is an excellent option for going solar. The 26% tax credit can be claimed even when a solar power system is financed with a loan, and these funds become available for debt service. In addition, electricity savings start right away after deploying solar panels, and these funds can be used to pay the loan as well. In a few words, a solar power system can pay for itself, and the net cost for the owner becomes zero.
<urn:uuid:4be9775d-aff0-479c-ad87-e42c84ca8849>
CC-MAIN-2023-23
https://www.ny-engineers.com/blog/why-are-solar-panels-so-popular-in-california
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224657169.98/warc/CC-MAIN-20230610095459-20230610125459-00789.warc.gz
en
0.950675
1,252
3.1875
3
Any system can be the victim of malware. For example, the technological difference between e.g. your friendly desktop search indexer and a malware syphoning of your private data is negligible. That said, there has been no (well-known) malware so far for OS X that: - Did not require active user involvement (like starting the program) and - worked without exploiting a vulnerability in essentially 3rd party code (e.g. Flashback used Java, which is no longer installed by default anyway). Some malware even requires users to enter their Administrator password during the installation. Anti-virus software uses two basic mechanisms to detect malware: - Known malware is identified through a specific pattern provided in the database by the anti-virus vendor. This is only capable of identifying widespread, known malware and requires you to keep your AV product and subscription updated. - Dynamic (behavioral) and static (structural) characteristics of programs. This leads to false positives with software with legitimate use cases (like remote desktop/remote control software), and false negatives if there's no behavior legitimate software doesn't use — malware can still transfer your personal data to some remote server, and look as harmless as Dropbox or some other cloud/local syncing service. So, while malware for OS X exists, it's far from the "receive a packet over the network and you're infected" quality that plagued early Windows XP. It's mostly trojans, exploiting social behavior patterns and other user vulnerabilities, instead of the OS. And for those, it really depends on how tech-savvy your users are. OS X Mountain Lion, released earlier this week, includes Gatekeeper, a security feature that should keep most of these malware exploiting users' gullibility out, by only allowing execution of downloaded programs that are signed by developers registered with Apple. If you don't give your users administrative access and the power to run arbitrary software, instead restricting them e.g. to the App Store, you should be as good as technically possible. Remember, an AV product is no panacea. Note that this is no excuse to skip doing backups, run software downloaded from file sharing networks or file hosters with unknown origin, and other similar sense precautions.
<urn:uuid:721a6b00-b095-48a7-888a-9b2b21df250a>
CC-MAIN-2014-35
http://superuser.com/questions/454375/what-is-the-risk-of-not-running-an-anti-virus-on-a-mac?answertab=votes
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500830903.34/warc/CC-MAIN-20140820021350-00156-ip-10-180-136-8.ec2.internal.warc.gz
en
0.925481
462
2.640625
3
Project Aquila, a solar-powered aircraft destined to create a 50km communications radius, was first announced in March 2014 as part of Facebook’s initiative to bring free and easily-accessible internet services to developing countries. However, Facebook recently announced that they would stop building the aircraft after the project had failed to meet its objectives. Professor Christian Fuchs commented on the failure of the project: “Unmanned aerial vehicles and driverless vehicles are prone to accidents, just like Facebook’s algorithms lack human control and therefore have recently resulted in threats to democracy”. He added: “Facebook’s drones seem to fail in automated landing procedures. What we can learn from these failures is that it is dangerous when humans are out of control of technological systems.”
<urn:uuid:4b40ea55-1f07-44a4-ba41-5d8ad01426ad>
CC-MAIN-2020-05
https://www.westminster.ac.uk/news/verdict-facebook-cancels-project-aquila-but-what-happened
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250590107.3/warc/CC-MAIN-20200117180950-20200117204950-00266.warc.gz
en
0.970849
161
2.578125
3
When doctors recommend imaging tests such as magnetic resonance imaging (MRI) or computed tomography (CT) scans, many people don't ask questions—they just assume that it's the right thing to do. Yet medical imaging isn't always necessary or appropriate, reports the November 2013 Harvard Women's Health Watch. For up to one-third of imaging tests performed in this country, the benefits don't outweigh risks such as radiation exposure, according to a survey published in JAMA Internal Medicine. Yet more people are undergoing medical imaging tests than ever before. Between 1996 and 2010, the use of CT scans nearly tripled, from 52 scans per 1,000 people to 149 per 1,000. Rates of MRI scans almost quadrupled during the same time period, from 17 scans per 1,000 people to 65 scans per 1,000. There are good reasons for having imaging tests. By providing an extremely detailed internal view of your body, scans can identify diseases and injuries and help your doctor plan your treatment. "For many conditions, diagnostic imaging tests provide valuable information to a practitioner, which may account for the increase in utilization," says Dr. James Brink, radiologist-in-chief at Massachusetts General Hospital and professor of radiology at Harvard Medical School. Usually there's little risk from having an annual dental x-ray or screening mammogram, but when tests that emit higher levels of radiation—such as CT and PET scans—are used excessively or without good reason, they have the potential to cause needless side effects. A 2007 study in The New England Journal of Medicine suggested that 20 million American adults may be unnecessarily exposed to radiation from CT scans each year. Accumulation of radiation doses can lead to cancer. Whether to have a diagnostic test is a decision you should make in partnership with your doctor after carefully considering and weighing your options. In some cases, the answer is clearly yes. "If a patient is coming into the emergency room with concerns of appendicitis, the risk of not doing the scan and missing the appendicitis is exponentially greater than the exposure risk," Dr. Brink says. In other cases—for example, if you've already been diagnosed with a condition and the scan won't significantly influence your treatment—it might be better to say no. Ask questions and make sure that the benefit is going to exceed the risk. Read the full-length article: "What you need to ask before getting an imaging test"
<urn:uuid:d341fb67-5859-4b63-8659-5c2fc16c85de>
CC-MAIN-2014-35
http://www.health.harvard.edu/press_releases/some-imaging-tests-not-worth-the-costs-and-risks
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500823333.10/warc/CC-MAIN-20140820021343-00300-ip-10-180-136-8.ec2.internal.warc.gz
en
0.95252
496
2.90625
3
COVID-19 is a new illness that can affect your lungs and airways. It's caused by a virus called Coronavirus. People have been asked to stop: - Non-essential contact with others e.g going to pubs, clubs, concerts, theatres and other social venues - All unnecessary travel.This advice is particularly important for people over 70, for pregnant women and for those with some health conditions. - How long to stay at home for: - If you live alone and you have symptoms of coronavirus illness (COVID-19), however mild, stay at home for 7 days from when your symptoms started - If you live with others and you or one of them have symptoms of coronavirus, then all household members must stay at home and not leave the house for 14 days. The 14-day period starts from the day when the first person in the house became ill. - If possible, you should not go out even to buy food or essentials, other than for exercise, and in that case at a safe distance from others - If necessary, you should ask for help from others for your daily necessities - If that is not possible, then you should do what you can to limit your social contact when you leave the house to get supplies. Do not go to a GP surgery, pharmacy, walk-in centre or hospital. You do not need to contact 111 to tell them you're staying at home. Read advice about staying at home. Use the NHS 111 online Coronavirus service if: - You feel you cannot cope with your symptoms at home - Your condition gets worse - Your symptoms do not get better after seven days. Visit NHS 111 online here. Only call 111 if you cannot get help online. How Coronavirus is spread Because it's a new illness, we do not know exactly how coronavirus spreads from person to person. Similar viruses are spread in cough droplets. It's very unlikely it can be spread through things like packages or food. How to avoid catching or spreading Coronavirus - Wash your hands with soap and water often – do this for at least 20 seconds - Always wash your hands when you get home or into work - Use hand sanitiser gel if soap and water are not available - Cover your mouth and nose with a tissue or your sleeve (not your hands) when you cough or sneeze - Put used tissues in the bin immediately and wash your hands afterwards - Try to avoid close contact with people who are unwell. - Do not touch your eyes, nose or mouth if your hands are not clean. Treatment for Coronavirus There is currently no specific treatment for Coronavirus. Antibiotics do not help, as they do not work against viruses. Treatment aims to relieve the symptoms while your body fights the illness. You'll need to stay in isolation, away from other people, until you have recovered. Government response and action plan Find out more: The best thing is regular and thorough hand washing, preferably with soap and water. Coronavirus spreads when an infected person coughs small droplets - packed with the virus - into the air. These can be breathed in, or cause an infection if you touch a surface they have landed on, then your eyes, nose or mouth. So, coughing and sneezing into tissues, not touching your face with unwashed hands, and avoiding close contact with infected people are important for limiting the spread.
<urn:uuid:19b4ed3d-4085-422b-8da5-87bfed4493be>
CC-MAIN-2020-24
https://www.cavendishmedicalpractice.co.uk/pages/CORONAVIRUS
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347413551.52/warc/CC-MAIN-20200531151414-20200531181414-00465.warc.gz
en
0.937443
738
2.984375
3
Back to School Guide: Overcoming shyness NEW YORK (WABC) -- Each new school year provides a child with the opportunity to make new friends. If you want to find out if your child is having trouble making friends at school, just ask them with specific questions like, "Who did you talk to?" and "What are your friends' names?" If you are having trouble getting information out of your child, pay attention to changes in behavior. You can always turn to your child's teacher. "Practicing a situation, identifying a topic of conversation, If you want to initiate a conversation with another child, what can you talk about?" the Cleveland Clinic's Dr. Kate Eshleman said. "So working ahead and identifying some of those things, practicing talking to those, the child and parent can practice. Get the next door neighbor involved. Have them practice as well." Experts say getting your children involved in some extra-curricular activities can also help them overcome shyness. WAKE UP WITH EYEWITNESS NEWS! Click here to download the WABC Eyewitness News Alarm Clock app from iTunes. or search WABC or 7online in the app store. Get Eyewitness News Delivered back to school guide, seasonal - 2 killed in Queens motorcycle accident 14 min ago - AccuWeather: Record Warmth - Live: Eyewitness News on 7online streamed live! - iWitness Photos and Videos - 4 arrested in deadly NJ mall carjacking - Teen who was shot at Colorado school dies - LI burglary foiled by man watching on webcam in China - GWB repair work will close upper level lanes - Long Island driver charged with DWI in hit and run - Target offers discount, free credit monitoring after data breach - Pan Am 103 bombing anniversary marked by memorials - Knicks lose to Grizzlies, 95-87 - Video: Holiday shoppers enjoying warm weather - Photos: Fatal shooting at the Short Hills Mall
<urn:uuid:04928ca3-dbd4-4dfd-acd7-5b6420c1c5fc>
CC-MAIN-2013-48
http://abclocal.go.com/wabc/story?section=resources/lifestyle_community/seasonal&id=8793597
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1387345776833/warc/CC-MAIN-20131218054936-00000-ip-10-33-133-15.ec2.internal.warc.gz
en
0.92414
410
2.59375
3
5 key Important Factors for the Future of Fish Farming Nutrition Global aquaculture has come a long way since people first began fish farming. Over the years, improvements in management systems and aquaculture feed mean that we can now produce more food than ever before. However, with the demand for food fish rising alongside a growing global population, the future will see further changes in this industry. Here are some of the current main developments that will define the next steps in aquaculture’s legacy. Increased application of recirculating aquaculture systems (RAS) Recirculating aquaculture systems (RAS) are not a new topic. This farming method has been around since the 1980s and used intensively in the Atlantic salmon industry for many years. However, it has taken the rest of the aquaculture industry almost 20 years to embrace it. There are several reasons why RAS is the future, but the primary reasons are: To operate a successful RAS, feed must be optimized to increase palatability, reduce water pollution and allow both the system and the fish perform at their best. As RAS facilities are land-based operations, there is reduced pressure on pond/sea stocks. Also, advancements have been made to recycle existing water in these facilities, preventing a further drain on resources. Further developments in this area have seen the development of RAS systems for shrimp, revolutionizing shrimp farming by allowing more controlled environments and easing long-term environmental challenges. Furthermore, we are seeing a shift in governmental legislation and movement from cage farming for environmental reasons, such as maintaining freshwater quality and protecting wild fish populations, including aquatic plants and animals. This implies a very strong future for RAS. Removing fishmeal and fish oil from aquaculture feed Feed, essentially, provides energy and nutrients to support the development of each species, but the fish has no preference regarding how the energy and nutrients are sourced. The percentage of fishmeal in aquatic diets has significantly reduced since 2000, and the move from fishmeal and fish oil for many fish species is not very far away. Plant proteins and other ingredients can replace the fishmeal component in fish food. However, they are majorly constrained by issues of low digestibility. Formulations must be highly digestible, and each ingredient must add value and enrichment to the diet to impact performance. Utilizing enzymes in aquafeed can help fish and shrimp digest feed better to support a healthy digestive system and help increase cost-efficiency. Choosing a feed that is right for your farm means you could potentially: Use less feed Reduce environmental impact Unfortunately, there is a hidden risk when increasing the quantity of plant-based raw materials on aquaculture farms. Mycotoxin contamination is known as a silent enemy for producers as it is visibly difficult to detect. Long-term ingestion of feed with low/acute or high exposure levels can be a reason for poor growth and unexplained mortalities on fish farms. Correct management at all relevant production points is crucial in handling this threat. Feed supplements can also help negate the effects of mycotoxins in the digestive tract and prevent them from being absorbed by the body. READ ALSO: Profitable Method of Fish Farming Additionally, logistics are increasing at an alarming rate. This provides an opportunity to improve sustainable practices and become less dependent on imports. The quality team at Alltech Coppens has focused on sourcing quality local ingredients and adapting the formulations to suit these conditions and provide the most benefit to the fish. Advancements in feed formulation, a significant move to net energy formulations “Aquaculture net energy” Feed production must be efficient and cost-effective for the producer. To produce a feed that can provide the fish with optimal energy levels for production, understanding the digestibility parameters of each raw material is crucial. The gross energy is the total energy is available in the feed to the animal. When the animal digests feed, it uses digestible energy. Further energy will be lost due to metabolic processes, and what remains becomes net energy. READ ALSO: How to Improve Fish Farming Efficiency and Productivity The fish can use net energy to grow and maintain its health status. Micronutrients are key to maximizing this growth, but their efficiency can vary. Recent research in the Alltech Coppens Aqua Centre has shown that metabolic energy losses can range from 30–40% if the feed is not correctly formulated, impacting the growth of the fish. Comparing the net energy of different types of feed, as well as considering palatability and sustainability, can help producers choose the best feed for performance. A healthy gut is the key to success Achieving optimal health status in fish is one of the main goals for aquaculturists. Disease and/or significant growth reduction will increase costs for the producer. Poor health status can account for some of the biggest losses in the fish farming industry. . A healthy gut can digest and absorb the maximum amount of nutrients. The intestinal microflora, gut morphology, immune system and nutrient uptake — plus how each of these elements interacts — all play a role in the health and performance of fish and shrimp. Animals in farmed environments also require essential nutrients to meet their basic nutritional needs. A fish’s skin, gut and gills are the primary points of interaction with external environmental factors that can impact its health. These organs must be protected, both internally and externally. The more robust the animal, the less vulnerable it will be to stress throughout the production cycle, ensuring the highest levels of efficiency. Potential stress factors to look out for include: The rigors of production Quality of the feed Each of these can cause an imbalance in the gut, leading to increased disease susceptibility. The subsequent adverse effects on growth rates and immunity can then have negative financial impacts. Protecting their health will provide the most benefit to the farmer. Providing food security for future generations requires careful management of our present environment. Sustainable aquaculture is the solution; the FAO announced that by 2030, 60% of food fish will come from aquaculture. The environment needs to be considered in every aspect of production. If we truly understand the needs of fish, quantify the different necessary micronutrients and analyze the composition of feces, we can better understand how to improve water quality. READ ALSO: Could Insects be Alternative to Fish Meal in Fish Farming? Poor water quality leads to environmental impacts and economic losses that can be avoided by carefully selecting a balanced selection of supplements that support a healthy culture system and environments for the future. RAS environments and the move from marine-based ingredients, as discussed above, have made positive impacts, and all of these will provide access to sustainable marine protein sources for future generations. Contributed by: Ronald Faber Click here to join World Farmers Centre Whatsapp group to get and read more articles like this and interact with other farmers
<urn:uuid:0f00b070-fc38-4b5c-8a4d-0a3c503f34b7>
CC-MAIN-2023-14
https://worldfarmerscentre.com/2022/04/28/5-key-important-factors-for-the-future-of-fish-farming-nutrition/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949107.48/warc/CC-MAIN-20230330070451-20230330100451-00651.warc.gz
en
0.935203
1,463
2.59375
3
Gender Equality and Women’s Empowerment The current global developmental agenda – the Sustainable Developmental Goals (SDG) – came into force in 2016 and Ethiopia responded positively to the challenges of meeting the SDG targets by 2030. Achieving the targets for women’s empowerment over time has not been easy, partly due to the complexity involved in defining, measuring and addressing this dimension of wellbeing in the country. There is a need for a better understanding of women-related outcomes in Ethiopia to achieve the SDG 5 targets of empowering all women and girls. This research brief presents the results of a trend analysis of women’s empowerment in Ethiopia over an 11-year period and analyses the relationships between women’s empowerment and child wellbeing in the domains of nutrition, health, health-related knowledge, education, and female genital mutilation (FGM). This is also the first time that an official indexed measurement of women’s empowerment has been constructed within Ethiopia’s country context. The Women’s Empowerment Index (WEI) provides contextualized findings to measure progress in women’s empowerment in the country and to design and implement policies through actions to achieve further progress towards the SDG 5 targets by 2030. The conceptualization of women’s empowerment in Ethiopia followed a three-step process. First, the international conventions on women’s rights8 were reviewed to define and select parameters and indicators for the measure. Second, the indicators and parameters were contextualized using the legislation and policy documents and strategies of Ethiopia. Finally, a consultation process was carried out with national stakeholders and development partners to discuss and approve selected indicators and parameters. Download the full report from UNICEF. Download the research brief from UNICEF.
<urn:uuid:f606db81-6d74-4f5b-b91a-e59d1210550f>
CC-MAIN-2023-40
https://spriglobal.org/portfolio/ethigen/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510358.68/warc/CC-MAIN-20230928031105-20230928061105-00184.warc.gz
en
0.929949
366
2.84375
3
What is Vitamin A? Vitamin A, also known as retinoid, is an active ingredient that fights wrinkles in skincare products. It is a naturally occurring compound in your body. This vitamin helps improve your eyesight, your immune system, tissue health, and your eye health. Retinoid is a generic term that can be used to refer to both retin A and retinol. Vitamin A is the weaker version of Vitamin A. The latter is a derivative. You may have heard of retinoic acid and tretinoin in products. (Looking at you, curology!) You can take a sigh of relief because they are also included in this category. Why is this important? Normally, our skin regenerates every 30 to remove dead skin cells. Retinoids can speed up this process by allowing it to take between 14 and 21 days. Our skin sheds and allows our newly regenerated cells to start from a clean slate. Vitamin A has many benefits for the skin. Vitamin A benefits the skin in many ways, including improved pigmentation and sun spot reduction, reduced fine lines and wrinkles, and even acne. What does it mean for our skin? Vitamin A is a vitamin that benefits the skin by stimulating the dermis (the lower and deeper layers) of the skin. This stimulates collagen production and regenerates new cells. It also pushes out old cells to the surface, revealing clean, fresh skin.
<urn:uuid:74411503-1eb5-4089-910b-28aa8061c5d4>
CC-MAIN-2023-40
https://ecoistkausa.com/blogs/news/benefits-of-vitamin-a-for-skin
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510676.40/warc/CC-MAIN-20230930113949-20230930143949-00491.warc.gz
en
0.954925
298
3.046875
3
Scientists raise spectre of cancer-causing packaging cancer-causing agents, according to a worrying new study from the Researchers at Fox Chase Cancer Center in Philadelphia, US claim to have demonstrated that two plasticiser compounds, BPA and BBP, are environmental estrogens capable of affecting gene expression in the mammary glands of young female laboratory rats exposed to the compounds through their mothers' milk. Plastic products used to wrap or contain food and beverages have therefore aroused concerns as possible cancer-causing agents because they can sometimes leach out of the plastic and migrate into the food. The scientists found that this was especially true after heating or when the plastic is old or scratched. "Development of breast cancer entails multiple events, in which estrogen appears to play an important role," said Jose Russo, director of the Breast Cancer and the Environment Research Center at Fox Chase. "Estrogenic agents involved in breast development and possibly in breast cancer may include foreign estrogens, or xenoestrogens, that are used in manufacturing a number of products. The studies of BPA and BBP in young rats were designed to see whether exposure to these hormonally active biological compounds could alter the genomic signatures of the mammary gland during critical stages of development." BPA (bisphenol A) is a synthetic resin used in food packaging and polycarbonate plastic products. BBP (n-butyl benzyl phthalate) is a widely used plasticiser used in food wraps and cosmetics. "In exposing prepubescent female rats to BPA and BBP, our aim was to determine what effects, if any, each compound had on mammary gene expression during at different ages," said postdoctoral associate Raquel Moral. "Our results showed that exposure to BPA changes the gene expression profile of mammary tissues as a function of age. That is, there was a significant increase in protein production governed by various genes at increasing ages from 21 to 100 days." These included proteins regulating cell proliferation and differentiation, including tumour-suppressing proteins and a large number of unknown proteins. The exception was decreased expression of the GAD1 gene. It encodes a key enzyme of the GABA-ergic system, which could be involved in hormonal regulation and breast cancer development. GAD1 has consistently been overexpressed in primary breast cancer. "In contrast, the BBP exposure modified the genomic signature of the mammary gland primarily at 21 days of age and had less effect later," said Moral. However, future studies are needed to determine whether exposure to such xenoestrogens leads to breast cancer in rats and whether these estrogens bring about similar gene alterations in human breast tissue.
<urn:uuid:f6c1f553-6c41-4b5a-a7c1-f1c3c01bb83a>
CC-MAIN-2023-23
https://www.bakeryandsnacks.com/Article/2005/04/20/Scientists-raise-spectre-of-cancer-causing-packaging
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224657169.98/warc/CC-MAIN-20230610095459-20230610125459-00771.warc.gz
en
0.951184
554
2.625
3
What is AWS? AWS or Amazon Web Services is defined as a secure platform providing various types of cloud services, providing resources for computational power, helps in content delivery and database storage solutions including other essential functionalities that allow businesses to grow and scale bigger. Table of Content 1. What Is Cloud Computing? The term ‘cloud computing’ can be defined as the availability of various types of online computing resources on-demand, such as data storage solutions, online servers, networking solutions, databases, analytics, software and so on, without any active management done directly by the user who is using such resources. It is the utilization of remote servers on the internet to store, manage and process information rather than a local server or PC. Amazon Web Service or AWS is a cloud service offered by Amazon, for creating or deploying any type of application or software using the cloud. In 2006, Amazon started a cloud service to make the working style a little easy. Using this cloud, we do not have to worry about the servers and other storing places that consume so much time and money. Cloud computing is the use of remote servers for storing, managing, and processing data instead of keeping it in a local server or pc. It is an internet-based service, where you need a strong internet connection. Here, we pay only for what we use without any extra expensive, and thus, AWS is cost-efficient. Cloud, can spin numerous servers in a minute and delivers an instant output. It is much more reliable, cost-efficient, and scalable when compared with the local server. With the cloud, an organization can easily access storage resources and shared computing, instead of building an own separate infrastructure. With cloud computing, you can enjoy, multiple features, such as: - Users can access the resources as per their requirements (not less not more). - Depending on the cloud, resources can be scaled up or down. - The customers are supposed to pay depending on the type of resources that are used. Now, let’s get some ideas on the types of cloud and understand each of the types. There are essentially 3 categories in cloud computing: Types of Cloud Basically, there are three types of clouds: In this type of cloud, third-party service providers allow their customers to access their resources and service via the internet. All the data of the customers are stored at the third party’s infrastructure that is offering the cloud service. A private cloud is similar to the public cloud but here you use private hardware. However, as the name suggests, the private cloud is used by large organizations to manage their data. This type of cloud provides more control over customizability, scalability, and flexibility. In this type of cloud, the major control is with the owner of the infrastructure. Hybrid cloud is a grouping of both public with a private cloud. This type of cloud provides more flexibility, control over the critical operations, improve security. Choosing either of cloud service depends on various factors such as the sensitivity of your data, a requirement of standards, etc. For example, Users can use a public cloud for interacting with other end-users while securing their data using the private cloud. Cloud Service Models Cloud computing is not just one technology; rather, it is the whole system that offers three services, such as Iaas, Paas, and Saas. Iaas or infrastructure as a service is a method where you deliver everything from the operating system to servers using the IP. Using the service, the users can comfortably develop their application on these resources. It typically provides access to the networking features and data storage area. Paas or Platform as a service is the most complex one out of all the three layers of service. Paas and Saas are more and less similar to each other. It eliminates the necessity of building infrastructure (hardware and operating system). The user can comfortably focus on deploying and managing their own applications. The service providers handle the resources and other data backups. Saas or Software as a service is one of the services that you can avail from the cloud. Here, the third-party providers provide an end-user application for their customers. While using SaaS, you need not worry about how your service is maintained or how the infrastructure is managed. You just need to focus on how to avail the fullest of particular software. Advantages of Cloud Computing Each technology has its own advantages and disadvantages. Let’s have a look at each of the topics separately. Cloud computing has the potential of offering plenty of benefits. Some of them are: Cost-Efficient: Buying your own servers and other tools are time-consuming. Apart from this, it also expensive to buy, install and then configure the expensive hardware requirements. However, by using cloud computing, we have to pay only for what we use or how much we use. Reliability: Reliability is one of the biggest plus points which we can avail by using cloud computing. Cloud computing offers reliable and consistent service to any firm. It delivers a consistent service throughout the year. Even if any one of the servers fails to do, then your files can be transferred to the available server. Speed: Speed is the other important feature of this cloud computing. It allows accessing the service as soon as possible. Within a few snaps, your file s and folders are ready to access. Unlimited storage capacity: Cloud computing offers limitless storage. It permits the user to expand their storage as their requirement. Here, we need to think about running out of storage capacity. Back up and restoring data: Once the user stores their data in the cloud, it gets easier to retrieve the data than storing it in other devices. Using the cloud you can retrieve your data at any time. Easy accessibility: By registering in the cloud, the users are allowed to access your account at any time from anywhere if you have a strong internet connection. There are various storage and security that can vary depending on the type of account you are choosing. Disadvantages of Cloud Computing Along with a few advantages, there are a few disadvantages or drawback that comes while using cloud computing: A few of them are listed below: Technical problems: In cloud computing, there is always the possibility of technical issues. Then even after you use, best cloud service providing firm, you may find some technical problems. Other than this, if you have any internet issues, you will not be able to access the data or server. Security issue: Security is one of the most concerned problems when it comes to cloud computing. Though, the cloud providers claim to offer the best security possible, storing the data and credentials is always risky. However, AWS provides the most secure network. The customers can access the application of the data easily and securely. Switch to service providers: When it comes to switching the cloud service to another platform, it becomes a hectic job to do that. Most companies find the integration to other platform processes a little hard. AWS training, it’s a more amount of an IaaS, moving along, we should bring a deep dive into AWS and analyze what all services it brings to offer us, but before that let’s Analyze why there is a lot of buzz in the business about AWS which subsequently leads this wonderful AWS training! 2. Why Cloud Computing? With the help of the cloud, you can easily obtain access to a wider range of different technologies using which you can quickly innovate on your task at hand and thereby build the things that you want efficiently. You can quickly gather and use resources, just as you require without having to worry about the infrastructure. Cloud computing services can be deployed very quickly, in a matter of just minutes, allowing you to implement your idea faster than ever. This will help you provide the freedom that you need to test or experiment with new ideas for differentiating your customer user-experience and thereby enhance your business statistics. By using cloud computing, you don’t have to provision for resources up-front to cope up with your business activities’ peak usage, which will be used at a later stage. You’ll only provision for the resources that you need at the current moment and time. Moreover, you can easily scale up or down these resources whenever you like, just at the click of a button – which means better usage of business resources. The Savings In Terms Of Cost Cloud computing will aid you in trading your capital expenses for other various variable expenses in your business and only pay for the IT (Information Technology) resources that you’ll be using. Furthermore, you’re business’ variable expenses will also get reduced as well, because of the overall economies of scale. Click Here-> Cloud Computing Vs Big Data 3. What is AWS? AWS stands for Amazon Web Services. AWS is a cloud-computing platform developed by the e-commerce giant Amazon.com. With the use of Amazon’s cloud computing services governments, companies, and individuals have access to a powerful cluster of computers over the internet. The virtual computers provided by Amazon are similar to the physical computer in the sense that they display all the attributes such as CPUs & GPUs, RAM, Storage drives (HDDs or SDDs). The user can also choose the preferred operating system, software, and more. Users access the computing power of these virtual computers through any of the modern web browsers. The web browser acts similarly to a Windows on a real computer allowing the user to log in and customize the virtual computer. Click Here-> What is AWS Cognito 4. Why AWS? The Platform With The Most Functionality AWS provides substantial more functionality, features, and services that other cloud service providers including computational and technologies related to infrastructure. AWS also incorporates AI (Artificial Intelligence), machine learning, Internet of Things (IoT), analytics, data lakes and so on. The Community is Huge With the most dynamic and largest community, the community of AWS includes millions and billions of users regular customers and business partners on a global basis. Such customers include public and private sector organizations, enterprises, start-ups, and the likes. It has been reported that AWS is one of the most secure as well as flexible cloud computing services available on the face of planet earth. The security of the AWS servers matches the security requirements of numerous global banking organizations, military organizations and other entities where data security is at its highest priority. AWS has been in the cloud computing industry for the last thirteen years and thereby has unmatched experience when it comes to reliability, maturity, security and overall performance that customers all around the world can depend upon. 5. Why Top MNC Companies Choose AWS? The main reason why most MNC companies choose the AWS cloud computing platform is because of its extensive infrastructure on a global basis. There is no other cloud service provider available in the world that has so many multiple regions of platform availability connected not only through high transfer speeds, but also low latency and networking procedure that is redundant enough. The AWS platform has its coverage over 22 geographic locations with 69 zones of availability – all around the world. The company has announced further 13 more zones AWS availability zones shortly with four more geographical locations such as in Spain, Italy, South Africa, and Indonesia. Must Read: AWS CloudFormation 6. AWS Services |Amazon EC2||Server Hosting And Configuration with optimization for computational power, storage, and memory.| |Amazon S3||Helps in data movement and storage across servers, around the globe.| |AWS Elastic Load Balancer||Service includes a scalable and power load-balancing solution so that requests from the clients are sent to the servers that are appropriate and thereby avoiding server hotspots.| |Amazon Cloudfront||A global content delivery system that is used to deliver online content with optimized cost and speed besides improving the overall user-experience.| |AWS Elastic Block Storage||Services providing storage volumes at block level for all the Amazon EC2 instances with extremely low latency. There are options to layer the security with encryption and lists for access control.| |Amazon Route 53||Handling numerous DNS routes with low-cost solutions yet high effective speeds.| |Amazon Cloudwatch||The native service for monitoring all your applications and resources running on the AWS platform.| |AWS Lambda||It allows developers to only focus on running their programming codes while avoiding the entire complexity of not only managing but also configuring the AWS infrastructure that is responsible for running the code.| |AWS Config||It helps the user to not only stay secure and compliant but also keep a bird’s eye view on the entire AWS infrastructure that is being used.| |AWS Elastic Beanstalk||The online management tool that is used for managing and also deployment of various web applications, that are designed in most of the popular programming languages.| |AWS CloudTrail||Provides the interface for the user to audit and monitor the online activity on the AWS infrastructure, while meeting regulations and standards such as HIPAA and PCI.| |Amazon Elastic File System||A simple web interface that easily and quickly creates various file systems for the user.| |Amazon Kinesis||An analyzing tool that is used to fine-tune the overall multimedia data flow, which mainly loads and also analyses the data or information that is being streamed.| |AWS VPC Flow||Records and stores all the detailed reports and log files of the entire IP traffic that is passing from one line port to the other, through a subnet or your entire VPC environment.| |Amazon RDS||Supported by a section of the AWS team, the RDS platform allows the user to run numerous dedicated instances for databases in just a matter of mere minutes, which are also capable of supporting database engines such as SQL and PostgreSQL.| |Amazon SNS||A notification system that allows developers to integrate the application of their choice, be it Node, PHP, Python or any other.| |Amazon Elasticache||Supporting Redis and Memcache, the Elasticache platform is all about the system for memory caching for the AWS infrastructure.| |Amazon Auto Scaling||The online management tool which is capable of giving the user the resources to control any number of server fleets and also the incoming/outgoing traffic that the user’s application demands.| |Amazon DynamoDB||A NoSQL, fully-managed database in the AWS platform. It’s high flexibility and availability make it perfect to be used for mobile applications, gaming and much more.| 7. Most Popular Top 10 AWS Services Amazon Web Services offers more than 90 services in a wide range of fields. However, not all of them are as useful as the rest. To prevent you from getting lost among the services, we have listed the top 10 services that are most sought and trending. With the help of these services you can develop a flawless infrastructure, the services are: - Amazon EC2 - Amazon RDS - Amazon S3 - Amazon CloudFront - Amazon SNS - Amazon VPC - Amazon Elastic Beanstalk - Amazon Lambda - Amazon Auto Scaling - Amazon Elasticache 1. Amazon EC2 Amazon Elastic Cloud 2 abbreviated EC2 is a virtual machine provided by Amazon Web services; it provides the users with virtual computers on which they can run software applications. The platform eliminates the hassle and expense of maintaining a local server at the same time provides the user with the processing power of a server for a determined fee. The features included in EC2 are operating systems, persistent storage, automated scaling, elastic IP addresses, and Amazon CloudWatch. 2. Amazon RDS RDS short for Relational Database System helps simplify the architecture. The web service eases the setup, operation, and scalability of a relational database. It provides several benefits to a business such as cost-effectiveness, and more. The platform supports MySQL, Microsoft SQL Server DB Engines, PostgreSQL, MariaDB, and Oracle. 3. Amazon S3 Simple Storage Service (S3) is a cloud-based storage service that allows companies to store, access, and analyze data from any geographical location. The platform is highly secure and comes with 99.99 percent of uptime, meaning that you will only experience a downtime of fewer than 43 minutes per month. The S3 can be used for web hosting, storage of backups, and image hosting. 4. Amazon CloudFront This is a content delivery network provided by Amazon. The platform helps deliver applications, videos, and APIs to users worldwide with minimal latency, high transfer speed, and in a friendly environment. It uses it several proxy servers all around the world to cache content, which reduces the load time of a webpage for the end-user. CloudFront has servers in the UK, Ireland, The Netherlands, Hong Kong, Singapore, Japan, Taiwan, Australia, South America, and the United States. 5. Amazon SNS SNS stands for Simple Notification Service; this is a notification service, which comes as a part of the Amazon Web Services. It is a low-cost infrastructure that can be integrated with any application such as PHP, Node, Python, etc. The service allows you to send a message to all the users at once be it any platform mobile, Android, web, or iOS. 8. Features of AWS The following are some of the most unique features of the AWS platform: - Provides mobile-friendly access with the help of AWS Mobile SDK and Mobile Hub. - It allows the user to not only run their programming applications but also helps them to scale it either higher or lower, with the help of Amazon Gateway and Amazon API services. - Issues databases to the user as required and the obtained databases are completely managed by the AWS support team. - AWS provides flexible, economical and also easy-to-use storage databases, which can not only be provided independently but also in combination with the user’s needs. - AWS allows the user to obtain maximum security through their services and thereby gives the user an option to innovate and scale their businesses. - With the help of the AWS marketplace, the customer can search for any specific software in the online store and then purchase it for enhancing their business operations. 9. Advantages of AWS There’s no denying the global presence of AWS with more than 22 geographic locations and 69 availability zones. Brilliant PaaS Offerings AWS has managed services that are highly scalable for multiple offerings such as transcoding, data warehousing, backup, storage, application management, infrastructure management, and the likes. The platform has highly-secure, world-class infrastructure, not only over the internet but physically at server-level as well. Various programming languages include APIs for helping the user to manage the entire infrastructure from a programming viewpoint. Pay As Per Usage Various scale features of the AWS platform are available to the user mainly based on the actual usage that is being utilized. 10. Disadvantages of AWS Confusing Billing Process The billing process for AWS can be pretty confusing for non-techy, small infrastructure users, which is why it’s better to work with a reseller as they’ll understand the invoicing procedure. Limits Of Amazon EC2 Depending upon the region that you’ll be living in, you’ll be limited by the number of resources that you’ll have access to. Fees Charged By Dedicated AWS Support The additional costs that a user has to encounter when opting for dedicated AWS support is momentarily high and is not economical for budget users. The owner should be prepared to invest in relevant knowledge for the team’s education on the ways to use the platform, which is also an additional cost. Security Feature Limitations The user will not only face limitations in terms of maximum resources that can be used but also the security features that can be obtained as well. When migrating to the AWS cloud computing platform, users are faced with the risks of data leaks, server downtime issues, privacy problems, limited control and so on. 11. Benefits of Amazon Web Services Amazon Web Services is one of the most used cloud-computing services around the world. Some of the top companies in the world use AWS such as Dow Jones, Netflix, Expedia & LinkedIn, SAP, Coursera, Vodafone, 99Designs, NASA/JPL, Reddit, Thomson Reuters, Flipboard, Pinterest, and more. Here are the top 5 reasons people prefer to use the service. The common thought that goes with such a high-end technology is that it must be very expensive. However, to the contrary, AWS makes it a level playing field for startups and large multinational with economical pricing. Pay as you Go: Any of the services offered by Amazon be it the content delivery network, Hadoop clusters, hosting a website, scalable email service, etc. come at an hourly charge. You can cancel it anytime allowing you to save money. Pay as you Use: Amazon Web Services allows you to pay for only what you use. It provides you an infinite backup space, allowing you to launch servers, downscale the server as per need or upscale if the traffic grows, and several other scalable services. AWS offers one of the world’s most secure cloud computing and data storage services. Some of the security undertakings adopted by the company are only unique to the company. 12. AWS Competitors The following are some of the top competitors for the AWS cloud computing platform: - Microsoft Azure - Google Cloud - Alibaba Cloud - Century Link - NTT Communications 13. AWS Vs Microsoft Azure Vs Google Cloud |Caching||Elastic Cache||Redis Cache||Cloud CDN| |Processor||128 vCPUs||128 vCPUs||96 vCPUs| |Application Testing||Device Farm||DevTest Labs||Cloud Test Lab| |Marketplace||AWS Marketplace||Azure Marketplace||GSuite Marketplace| |Platform As A Service||Elastic Beanstalk||Cloud Services||Google Application Engine| |GIT Repositories||AWS source||Azure source||Cloud source| |Storage||AWS S3||Block Blob||Cloud Storage| |Data Warehousing||Redshift||SQL Warehouse||Big Query| |File Storage||EFS||Azure Files||Avery and ZFS| |Management Of APIs||Amazon API||Azure API||Cloud Endpoints| |Media Services||Amazon Elastic Transcoder||Azure Media Services||Cloud Video Intelligence API| |Computing Using Serverless Infrastructure||Amazon Lambda||Azure Functions||Cloud Functions| 14. Move your framework and business to Amazon Web Services Is your organization hoping to migrate from your on-reason Data Center? Is it possible that you are needing to use the huge scope of what AWS has to offer, however, are attempting to comprehend where to begin? Our curated substance can help control you through the do’s and don’ts that will empower you to effectively finish your venture and take advantage of the administrations accessible. Cloud Academy offers Learning Paths, following the adventure from beginning to end, alongside individual courses that attention on valuable subjects when strategizing a movement. You can locate our full rundown of courses in the AWS Training Library. 15. AWS Security and Governance Security must be the focal point of each deployment. We have a huge wealth of substance encompassing a wide bunch of AWS security and administration controls and administrations in our library to ensure all bases are completely secured. See how to ensure, secure, forestall and distinguish shortcomings, dangers and dangers while in the meantime keeping up compliance with governance and compliance programs with our top pick of training assets. 16. AWS Certifications The following is a list of all the AWS Certifications provided by Amazon: - AWS Certified DevOps Engineer - AWS Certified Solutions Architect - AWS Certified Big Data - AWS Certified Advanced Networking - AWS Certified Alexa Skill Builder - AWS Certified Security - AWS Certified Machine Learning - AWS Certified Solutions Architect - AWS Certified Solutions Architect - AWS Certified Developer - AWS Certified SysOps Administrator - AWS Certified Cloud Practitioner Which AWS Certification Is Best For Freshers And Experience? The AWS Certified Cloud Practitioner certification is the newest one and is considered the best in this regard. This entry-level certification is generally designed to validate the candidate’s internal understanding of the overall infrastructure of the AWS cloud computing platform. The prerequisites include at least six months of experience in the AWS Cloud department (any role), while the exam format is multiple-choice questions. The length of the exam is 1 hour and 30 minutes and the cost incurred would be $100. For experienced candidates, they can go with either of the associate certifications, namely: Manage, design and implement applications using relevant tools on the platform. Multiple answers and multiple-choice questions with exam time and cost being 130 minutes and $150 respectively. Maintaining and developing various AWS-based apps. Multiple choice and answer questions with exam cost and time being $150 and 80 minutes respectively. Geared towards system administrators. Multiple answers and multiple-choice questions with the exam time being 80 minutes and cost being $150. Preparation Guide for AWS Certified Security Speciality Exam AWS Alexa Skill Builder Speciality Exam AWS Certified Big Data Speciality Exam AWS Certified Cloud Practitioner Exam AWS Certified DevOps Engineer Professional Exam AWS Certified Solution Architect Associate Exam 17. AWS for Developers AWS has allowed the conceivable outcomes and domains of what can be achieved by your developers to explode exponentially. Drive your organization forward by focusing on business arrangements and open the potential and abilities of your advancement group by presenting the accepted procedures, systems and administration information encompassing the contributions that AWS brings to the table by means of our Development focused training content. So, how can you become an AWS Architect? To turn into an AWS Architect you will require extensive knowledge and hands-on training with AWS services. This Amazon Web Services ( AWS ) Online Training is intended for every one of the experts who are interested to find out about Cloud Computing and will help you in goal paths aimed for AWS Solution Architect. After you complete this AWS Online Training, you will be trained in AWS.
<urn:uuid:1d4b4fac-b94c-4f57-9dff-83c7ad418219>
CC-MAIN-2020-29
https://www.gangboard.com/blog/what-is-aws/
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657147031.78/warc/CC-MAIN-20200713225620-20200714015620-00121.warc.gz
en
0.917607
5,499
3.0625
3
|THE FORGOTTEN KURDS OF SYRIA| By: Joseph Puder While one may be familiar with the Kurds of Iraq and their suffering under the Iraqi Arab dictator Saddam Hussein, the strife the Kurds of Turkey have endured for decades, and some may even know about the hanging of Iranian Kurds last year at the hands of the repressive Ayatollahs, little has been written about the Kurds of Syria. Like their more “famous brothers” in Iraq, Syrian Kurds have been systematically repressed for as long as the Alawi-Arab led regime has been ensconced in Damascus, and even earlier. To Washington in general, and the Obama administration in particular, the plight of the Kurds has never been a priority issue, what does matter is accommodating the Palestinians and pandering to the Saudis. Trouble for the Syrian Kurds began with the September 1961 breakup of the United Arab Republic - a union led by Egypt ’s dictator Abdul Nasser that had united Egypt and Syria . In its interim constitution, Syria declared itself an Arab Republic and in reinforcing its ethno-centric Arab identity denied cultural and legal rights to all non-Arab groups – including the non-Arab Kurds. Kurds were required to change their Kurdish names to Arabic and no private Kurdish schools were allowed. All printed materials, including Kurdish books and newspapers, had to be in Arabic rather than in their native Kurmanji (the predominant language among Kurds in Syria and Turkey ). In the span of 20 years, from 1949-1969, Syria experienced 20 coup plots - nine of which succeeded - and 11 that brought their architects to the gallows or subjected them to a life in exile or in prison. In 1961 the presidency of Syria changed three times. It was held first by Maamun al-Kuzbari who was replaced by Izzat an-Nuss, and then Nazim al-Kudsi took over until the Baathist plot overthrew him in 1963. In 1970, Hafez Al Assad took over in a bloodless coup and his son Bashar Al Assad has ruled since his death in 2000. On August 23, 1962, the government of Al-Kudsi ordered a special population census for the province of Jazira , a predominantly Kurdish province, which resulted in 120,000 Kurds being categorized as aliens. Their identity cards were taken away thus depriving them of their basic rights - including ownership of property, government employment, the ability to register for school, travel abroad, receive state aid, or even go to a hospital. The Syrian government openly engaged in a campaign of incitement against the Kurds with slogans such as Save Arabism in Jazira! Fight the Kurdish threat! Accusations of their being “Zionist agents” were also leveled against them. The discovery of oil in the Kurdish areas of Syria motivated the Syrians to increase their intimidation of the Kurds prompting many to flee. With the area now ethnically cleansed the Syrians gave the land over to Arabs settlers. At that same time the Iraqi dictator, Abdul Karim Qasim, was waging a war against the Kurdish Peshmergas, led by Mustafa Barzani (aided by Israel) who was seeking autonomy for the Kurds in northern Iraq . The Baathist government, in 1965, decided to create an Arab cordon in the Kurdish areas and clear the border area (the Jazira region) with Turkey . The implementation of the Arab cordon only began in 1973 under the rule of Syrian dictator Hafez Assad. The Syrian regime then brought Arab-Bedouins in and resettled them in Kurdish areas. Simultaneously, they deported about 140,000 Kurds from their lands to the Southern desert of Al-Raad . Saddam Hussein’s defeat in 2003, by U.S. and coalition forces, and the creation of the autonomous Kurdistan Regional Government in Northern Iraq infused Syrian Kurds with new energy. They demanded autonomy for their distinct people and culture. In March 2004, following an incident at a football game in the Kurdish city of Qamishli and subsequent protests that broke out throughout the Kurdish areas of Northern Syria, “harassment of Syrian Kurds increased further as a result of the demonstrations.” Syrian authorities proceeded to react with lethal force, killing at least 36 people, injuring over 160, and detaining more than 2,000, amidst widespread reports of torture and ill- treatment of detainees. Most detainees were eventually released, including 312 who were freed under an amnesty announced by President Bashar Assad on March 30, 2005. The discriminatory law - Decree 49 - implemented on 10/09/2008 by the Assad regime makes it a requirement for a license to be obtained for building, renting, selling, and buying property in the Kurdish areas - but licenses are not given to Kurds. This policy is forcing Kurds to move out of their area into the cities. The Syrian regime in Damascus has provided strips of land to Arabs while pushing Kurds out of their indigenous areas. The Syrian government policy seeks to “break up Kurdish geographical and cultural cohesion.” Ever since the 1963 Baathist takeover (The Baath Party was founded by Michel Aflaq-a Christian, as secular nationalist and socialist party with such catchwords as Arab unity, freedom from colonialism, and secularism. The Arabic word means “renaissance), a state-of-emergency has existed in Syria . While ostensibly the reason was to counter alleged threats from Israel , the state-of-emergency has been used to make arbitrary arrests, imprison political activists indefinitely without trial, ban political parties, and divert all resources to the military while controlling economic activities. A U.S. Institute for Peace April 2009 Special Report summarized the situation of the Kurds in Syria as follows: “Kurds in Syria have been denied basic social, cultural, and political rights, in many cases stemming from the Syrian state’s refusal to grant Kurds citizenship. Kurdish political opposition in Syria is fractured. Though some join Kurds in other countries in calling for the emergence of a separate Kurdish state, many Kurds reject separatism and have generally been committed to peaceful democratic struggle. Democratic reforms in Syria that improve the human rights situation for Kurds and non-Kurds could go a long way to alleviate the tension between the Kurds and the Syrian State . The problems that Syrian Kurds face cannot be truly solved without an effort both to improve the human rights of Kurds throughout the region, and to foster their political inclusion in their state of residency. The U.S. and the European Union should use any diplomatic tools at their disposal to promote appropriate reforms in Syria and in the region.” Sherkoh Abbas, President of the Kurdistan National Assembly-Syria (Kurdnas), in a conversation with this writer emphasized the following: “Kurdnas is committed to democracy, human rights, and religious freedom in Syria , and the granting to Kurds their equal rights as citizens. We seek cultural and political autonomy in Syria , but we would prefer a federal state in Syria where Kurds and other religious and ethnic minorities would be able to govern themselves.” Given the Obama administration’s obsession with the creation of a Palestinian State , it seems rather hypocritical that over 2 million Kurds in Syria and 40 million Kurds in the wider region have been forgotten by Washington . And since the Arabs already have 22 repressive states, don’t the Kurds deserve at least one democratic state or an autonomous region within Syria ? At the very least their case for self determination should carry as much weight as that of the Palestinians in Ramallah or Gaza .
<urn:uuid:6d71bc41-caa6-4142-a18b-4319724cc8ff>
CC-MAIN-2013-48
http://kurdnas.com/en/index.php?option=com_content&view=article&id=123:the-forgotten-kurds-of-syria&catid=35:opinion&Itemid=55
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164019268/warc/CC-MAIN-20131204133339-00093-ip-10-33-133-15.ec2.internal.warc.gz
en
0.965552
1,552
2.875
3
On December 15, 1989, a pilot who had flown a 747 passenger jet all the way from Amsterdam was looking forward to landing in Anchorage. There, he would take a short break before continuing to Tokyo. Descending over Southcentral Alaska, he and his co-pilot saw what looked like an inky storm cloud ahead. Flying into it, the pilot powered up the four engines in an attempt to climb to clear sky. What happened next changed how we monitor volcanoes all over the world, and made the Alaska Volcano Observatory what it is today. On that December morning 30 years ago, volcanic ash from Mount Redoubt melted inside all four jet engines of that 747. The ash cooled, coating the engines with glass and restricting air flow. The engines responded by shutting down. Powerless, the plane dropped more than 2 miles, heading for the Talkeetna Mountains. Their visibility restricted by the ash-scoured windscreen, the pilot and co-pilot tried restarting the engines six or seven times. After eight minutes, two engines coughed to life at 17,500 feet, allowing the pilots to level the aircraft. At, 13,300 feet, as the mountains got closer, the glassy engine-coating cooled and shattered into crystals, falling away. The other two engines started. The pilots turned the reborn aircraft and landed in Anchorage. All 231 passengers aboard reported no injuries. But some vowed never to fly again, after the next available set of planes carried them home. Tilly Barella was a passenger on the 747 that flew through the Mount Redoubt ash cloud in 1989. She lived in Holland, and was on her way to a vacation in Japan. Anchorage Times reporter Todd Bensman interviewed her at the airport the next morning. “The air went dark through the window, and the engines stopped, and the lights went out. It was dark all over. It was so dark,” Barella said. “And then we just fell, and I knew that was the last minute of my life.” That terrifying eight minutes was a turning point for volcano research all over the world, and especially in Alaska. Though volcanic ash clouds had previously disabled a jet aircraft in Indonesia, the near-tragedy of KLM Flight 867 happened over America, in U.S. airspace peppered with volcanoes. An immediate beneficiary of the flight’s near miss was the fledgling Alaska Volcano Observatory, formed a year before to help monitor the dozens of volcanoes in Alaska. The observatory is a team of scientists from the U.S. Geological Survey, UAF’s Geophysical Institute and the Alaska Division of Geological and Geophysical Surveys. “(AVO’s) budget went from $500K (per year) to $6 million almost overnight,” said John Power, former head of the observatory who now has the title of USGS research geophysicist. “Before Redoubt, we were monitoring four volcanoes close to Anchorage. Now, we’re monitoring 32 volcanoes in Alaska with instruments in the ground, and we track activity at others with satellites and infrasound.” Thirty years ago, Power was one of the first employees of the observatory, working in Fairbanks at the Geophysical Institute. He was among several people who noticed Redoubt shaking with dozens of small earthquakes in the days before the eruption. “It really came out of nowhere,” said Power, who spent many hours watching the jumpy seismometers scientists had installed on the volcano’s flanks just one year earlier. Power and his colleagues issued a warning on a faxed sheet, one that the Dutch pilots did not see as they readied for their flight over the top of the world. The warning system in place today was a direct result of the 1989-1990 Redoubt eruption. “The aviation color code (yellow for elevated unrest, red for an ash-spewing eruption) was developed on the fly during the Redoubt eruption,” Power said. USGS volcanologist Tom Casadevall traveled from Denver to Anchorage to monitor Redoubt’s gas emissions as the eruption was going on. When he arrived at Anchorage International Airport, Casadevall saw the KLM aircraft sitting idle on a taxiway. In that era of lesser security, Casadevall drove out to the plane and met two engineers, one from General Electric and one from Boeing. The men were supervising the removal of two of the engines they would ship back to GE, to find out precisely what had happened. Casadevall became interested in how solid silicate particles spewed by the volcano had shut down the jet engines. He became a student and teacher of the hazards of volcanic ash, later becoming one of a few scientists to spread the message. “The lessons we learned from Redoubt, we took around the world,” he said. The eruption also resulted in collaboration between government entities like the Federal Aviation Administration and National Weather Service, and pilot training that included what not to do (make engines hotter by powering up) when encountering an ash cloud. “The pilots didn’t understand what to do when flying a jet into an ash cloud,” Power said. “We hope the same thing would not happen today.” Redoubt, the 10,000-foot volcano 60 miles west of Kenai across Cook Inlet, erupted for half a year, from December 1989 to May 1990. Redoubt also erupted 10 years ago, in March and April of 2009, sending up dark clouds of ash through which no pilot flew.
<urn:uuid:8bcca65e-b6df-4fa7-abb1-3340d4a34c9a>
CC-MAIN-2020-10
https://www.adn.com/alaska-news/science/2019/12/07/mount-redoubts-eruption-30-years-ago-changed-how-we-monitor-volcanoes-around-the-world/
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875143505.60/warc/CC-MAIN-20200218025323-20200218055323-00027.warc.gz
en
0.969242
1,174
3.140625
3
About this Book: Seoul National University presents an ideal series for short-term Korean study: Active Korean. Active Korean series developed by the Language Education Institute of Seoul National University, help learners develop their communicative skills in Korean in effective ways within a short period of time. This book is composed of essential vocabulary, grammar and expressions for beginners derived from everyday situations and functions of real-life. Various tasks and activities are provided to enable learners to acquire the target grammar and apply it to practical situations. Units are organized in consideration of class structure and learners. Grammar and expressions related to the topic and the give situations, a simple dialogue based on the topic and an extended conversation are presented in order in every unit to suit a general class structure and to facilitate learners' undertsnading and application. A widely variety of photos and illustrations are provided to arouse learners' interests in learning and enable learners to have an accurate understanding of the given meanings and situations. This book can be used not only as a textbook for classes but also as a self-study book. Studying each unit in order will lead learners to successfully learn on one's own. To facilitate learners's understanding, explanations on grammar and instructions are presented in English, and self-assessment is possible as well. It is recommended to buy this book along with the Active Korean (Workbook) to practice all content of the Textbook. Table of Contents How to Use This Book Scope and Sequence UNIT 1 Hangul (Korean Alphabet) UNIT 2 Greeting and Introduction UNIT 3 Restaurant UNIT 4 Shopping UNIT 5 Daily Activities UNIT 6 Time UNIT 7 Appointment UNIT 8 Location and Direction UNIT 9 Telephone
<urn:uuid:3e2c148d-6d5f-4a4b-9e70-5565dd99a8e7>
CC-MAIN-2020-24
https://www.aprendecoreanohoy.com/en/textbooks/812-active-korean-1-student-book-cd-included-9788953912298.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347391923.3/warc/CC-MAIN-20200526222359-20200527012359-00477.warc.gz
en
0.927142
362
3.09375
3
Symmetry and Group Theory Aesthetics of Symmetry, essay and design tips by Jeff Chapman. Jim Propp asks whether the two farthest apart points, as measured by surface distance, on a symmetric convex body must be opposite each other on the body. Apparently this is open even for rectangular boxes. - Associating the symmetry of the Platonic solids with polymorf manipulatives. pattern gallery. Oklahoma State U. class project displaying examples of the seven types of symmetry (frieze groups) possible for linear patterns in the plane. - Cognitive Engineering Lab, Java applets for exploring tilings, symmetry, polyhedra, and - Conceptual proof that inversion sends circles to circles, G. Kuperberg. Archimedean polychoremata, 4-dimensional analogues of the semiregular solids, described by Coxeter-Dynkin diagrams representing their symmetry groups. topology. C. Johnson and M. Burnett of Oak Ridge National Lab use topological methods to understand and classify the symmetries of the lattice structures formed by crystals. (Somewhat technical.) now, tutorial on the seventeen plane symmetry groups by - Diamond theory. Steven Cullinane studies the symmetries of the shapes formed by splitting each square of a grid into dark and light triangles. screen-saver module makes patterns with various Kaleidoscopic symmetries. combinatorial patterns, D. Schattschneider, Elect. J. Combinatorics. - Michael Field's gallery of symmetric chaos images. See his home page for more links to pages on dynamics, symmetry, and chaos. - Figure eight knot / horoball diagram. Research of A. Edmonds into the symmetries of knots, relating them to something that looks like a packing of spheres. The MSRI Computing Group uses diagram as their logo. - Fractal patterns formed by repeated inversion of circles: Inversion graphics gallery, Xah Lee. Inversive circles, W. Gilbert, Waterloo. - Gavrog, a Java package for visualizing 2d and 3d ornamental patterns with high degrees of symmetry. - Geometry and the Imagination in Minneapolis. Notes from a workshop led by Conway, Doyle, Gilman, and Thurston. Includes several sections on polyhedra, knots, and symmetry groups. - The Graph of the Truncated Icosahedron and the Last Letter of Galois, B. Kostant, Not. AMS, Sep. 1995. Group theoretic mathematics of buckyballs. See also J. Baez's review of Kostant's paper. John Conway discusses the possible symmetry groups of hundred-sided polyhedra. - The icosahedron, the great icosahedron, graph designs, and Hadamard matrices. Notes by M. Brundage from a talk by M. Rosenfeld. Patterns: Symmetry and Tessellations. Companion site to a middle school text by Jill Britton, with links to many other web sites involving symmetry or tiling. open-source software for visualizing Cayley graphs of Coxeter groups as symmetric 4-dimensional polytopes. - Joe's Cafe. Java applets for creating images of iteration systems a la Field and Golubitsky's "Symmetry in Chaos". on G6. Carlo Séquin investigates how to draw a 12-vertex complete graph as symmetrically as possible on a six-handle surface (the minimum genus surface on which it can be drawn without crossings). geometry, Ephraim Fithian. software for making symmetrical drawings based on any of the 17 plane surface. Nice ray-traced pictures of a quartic surface with lots of Klein's quartic meets the Rubik's cube, by Roice Nelson. - Mirror Curves. Slavik Jablan investigates patterns formed by crisscrossing a curve around points in a regular grid, and finds examples of these patterns in art from various cultures. - Models of Platonic solids and related symmetric polyhedra. transformations revealed. Video by Douglas N. Arnold and Jonathan Rogness explaining 2d Moebius transformations in terms of the motions of a 3d sphere. See also MathTrek. - Origami: a study in symmetry. M. Johnson and B. Beug, Capital H.S. isometry of an ideal hyperbolic triangulation. Animation by John Griffin. solids and quaternion groups, J. Baez. - Platonic spheres. Java animation, with a discussion of platonic solid classification, Euler's formula, and sphere symmetries. tesselations of Riemann surfaces, Gerard Westendorp. interactive shockwave museum exhibits for exploring geometric concepts such as symmetry, tiling, and wallpaper groups. with polyhedra and numbers, Some questions about labeling edges of platonic solids with numbers, and their connections with group theory. maps with symmetries. Buff and Henriksen investigate rational functions invariant under certain families of Möbius transformations, and use them to generate symmetric Julia sets. tilings. Abstract of Serge Elnitsky's thesis, "Rhombic tilings of polygons and classes of reduced words in Coxeter groups". He also supplied the picture below of a rhombically tiled 48-gon, available with better color resolution from his website. - Sighting point. John McKay asks, given a set of co-planar points, how to find a point to view them all from in a way that maximizes the minimum viewing angle between any two points. Somehow this is related to monodromy groups. I don't know whether he ever got a useful response. spherical patterns generated by reflections that form rational angles to each Julia set with dodecahedral symmetry discovered by McMullen and Doyle in their work on quintic equations and rendered by Update 12/14/00: I've lost the big version of this image and can't find DonM anywhere on the net -- can anyone help? In the meantime, here's a link to - Steve's sprinklers. An interesting 3d polygon made of copper pipe forms various symmetric 2d shapes when viewed from different directions. Stothers' Cabri pages. Geometric animations teaching projective conics, hyperbolic geometry, and the Klein view of geometry as symmetry. windows shareware for creating paint patterns, symmetry roses, tessellated art and symmetrically decorated 3D polyhedron models. - Symmetries of torus-shaped polyhedra tilings, and polyhedra, S. Dutch. - Symmetry and Tilings. Charles Radin, Not. AMS, Jan. 1995. See also his of Tilings of the Plane, Bull. AMS 29 (1993), which proves that the pinwheel tiling is ergodic and can be generated by matching rules. in Threshold Design in South India. - Symmetry web, an exploration of the symmetries of geometric figures. - Tales of the dodecahedron, from Pythagoras to Plato to Poincaré. John Baez, Reese Prosser Memorial Lecture, Dartmouth, 2006. Java software for generating symmetric Islamic-style star patterns. dodecahedrally decorated Japanese thread ball. See also Summer's temari gallery for many more. - Morwen Thistlethwait, sphere packing, computational topology, symmetric knots, and giant ray-traced floating letters. - Thoughts on the number six. John Baez contemplates the symmetries of the icosahedron. Windows software for creating symmetric patterns with rhombi. - Tiling the integers with one prototile. Talk abstract by Ethan Coven on a one-dimensional tiling problem on the geometry and number theory, with connections to factorization of finite See also Coven's paper with Aaron Meyerowitz, Tiling the integers with translates of one finite set. Lecture notes from the Clay Math Institute, by Richard Stanley and Federico Ardila, discussing polyomino tilings, coloring arguments for proving the nonexistence of tilings, counting how many tilings a region has, the arctic circle theorem for domino tilings of diamonds, tiling the unit square with unit-fraction rectangles, symmetry groups, penrose tilings, and more. In only 21 pages, including the annotated bibliography. A nice but necessarily concise introduction to the subject. (Via Andrei Lopatenko.) - Tilings and visual symmetry, Xah Lee. - Transformational geometry. Leslie Howe illustrates various plane symmetry types with Cabri animations. - The uniform net (10,3)-a. An interesting crystal structure formed by packing square and octagonal helices. - Vision test. Can you spot the hidden glide reflection symmetry lurking in (the infinite continuation of) this pattern? - Wallpaper groups. An illustrated guide to the 17 planar symmetry patterns. See also Xah Lee's wallpaper group page. patterns, R. Morris. Kaleidoscope-like Java applet for making and transforming symmetric tilings out of uploaded photos. - A word problem. Group theoretic mathematics for determining whether a polygon formed out of hexagons can be dissected into three-hexagon triangles, or whether a polygon formed out of squares can be dissected into restricted-orientation triominoes. From the Geometry Junkyard, and recreational geometry pointers. Send email if you know of an appropriate page not listed here. from a common source file.
<urn:uuid:db98a2be-e31d-43bd-b81b-ef89031d2dcf>
CC-MAIN-2014-15
http://www.ics.uci.edu/~eppstein/junkyard/sym.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609539066.13/warc/CC-MAIN-20140416005219-00329-ip-10-147-4-33.ec2.internal.warc.gz
en
0.795917
2,178
2.8125
3
Widespread use of the non-steroidal anti-inflammatory drug (NSAID) diclofenac to treat livestock has resulted in dramatic declines in the populations of vultures across India. This has become an issue of considerable concern as vultures are a keystone species and their decline has a range of socio-economic, as well as cultural and biodiversity impacts. In this paper, we review these impacts and estimate in detail the economic cost of one of them: the human health impacts of the vulture decline. Livestock carcasses provide the main food supply for vultures, and are also eaten by dogs. Dogs are the main source of rabies in humans in India, and their populations have increased substantially in parallel with the vulture decline. The potential human health impact of rabies associated with the vulture decline is found to be significant. This, and a wide range of other impacts suggest that significant resources should be put into (1) testing of pharmaceutical products to ensure that similar situations are not repeated, (2) helping vulture populations to recover through the use of alternative drugs to diclofenac that are of low toxicity to vultures, and (3) through conservation breeding programmes.
<urn:uuid:048e75f7-1b03-45d3-b958-5a8aa55255ad>
CC-MAIN-2013-48
http://econpapers.repec.org/article/eeeecolec/v_3a67_3ay_3a2008_3ai_3a2_3ap_3a194-204.htm
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164019268/warc/CC-MAIN-20131204133339-00045-ip-10-33-133-15.ec2.internal.warc.gz
en
0.953547
250
2.9375
3
- Tram Ho The World Health Organization (WHO) representative said people with symptoms of Covid-19 should not take ibuprofen antipyretics. The recommendation came after French Health Minister Olivier Véran warned that anti-inflammatory drugs could make Covid-19 worse. Previously, a study in the Lancet medical journal suggested a hypothesis that anti-inflammatory drugs like ibuprofen may enhance an enzyme, and this enzyme could make Covid-19 a condition. should be serious. Asked about the study, WHO spokesman Christian Lindmeier said experts at the UN health agency ” looked at this for additional guidance”. “In the process, we recommend paracetamol antipyretics and do not arbitrarily use ibuprofen. This is a very important note,” he said. The WHO spokesman’s warning came after a post on Twitter by the French Minister of Health. In it, Mr. Olivier Véran wrote that the use of ibuprofen and similar anti-inflammatory drugs may be a factor causing Covid-19 disease to worsen. ” In case you have a fever, take paracetamol,” Olivier Véran wrote, adding that patients who have been treated with anti-inflammatory drugs such as ibuprofen should consult their doctor about the problem. Ibuprofen is a popular antipyretic drug, thanks to its longer lasting effect than Paracetamol and also anti-inflammatory effect. However, to use ibuprofen people often need a doctor’s prescription and instructions. Paracetamol is an over-the-counter medication, but you also need to use it carefully. By taking an overdose of paracetamol can harm, even damage the liver. To date, the Covid-19 pandemic has occurred in more than 100 countries, infecting more than 191,000 people and killing more than 7,800 of them. The illness often manifests as mild symptoms such as cough and fever, which makes many people think they can take fever-reducing medicines by themselves for treatment. However, experts have warned that Covid-19 is very different from the common cold. It is dozens of times more dangerous, because it can quickly lead to pneumonia, in some cases multiple organ failure and death. Before Covid-19 broke out in Europe, the French authorities sounded a warning bell about serious ” infection complications ” related to the use of ibuprofen, sold under various brands such as Nurofen and Advil and other anti-inflammatory drugs. Ibuprofen is a popular antipyretic drug, thanks to its longer lasting effect than Paracetamol and also anti-inflammatory effect. A spokeswoman for Reckitt Benckiser, a British pharmaceutical company that produces ibuprofen under the Nurofen brand, said it was aware of concerns about “the use of steroids and nonsteroidal anti-inflammatory products (NSAIDs), including including ibuprofen, to ease COVID-19 symptoms. “ ” Consumer safety is our number one priority,” Reckitt Benckiser spokesman wrote in a statement. However, the drug firm also emphasized that “i buprofen is a good drug and for over 30 years it has been safely used as a self-reliever and analgesic, even in medical conditions.” virus “. ” We currently do not believe that there is any proven scientific evidence related to the use of over-the-counter ibuprofen that aggravates Covid-19, ” the statement said. The spokesman said Reckitt Benckiser had “joined with WHO, EMA (European Health Agency) and other local health authorities” to address these concerns, and will provide “all information.” or necessary instructions so people can safely use our products. “ Some health professionals agree with them that the problem needs to be clarified. ” I have not seen any study specifically indicating ibuprofen increases the risk of Covid-19 complications ,” said Dr. Eudene Harry, medical director at Oasis Wellness & Rejuvenation Center, USA. Covid-19 is a very new disease, we need more time to conduct extensive research on it, including examining the effect of ibuprofen on the progression or worsening status in patients. However, according to Dr. Harry, it is true that people should be cautious when using this drug. ” There is a good reason to avoid taking ibuprofen, because it can exacerbate acute kidney damage, but is due to any illness, not just Covid-19.” ” Doctors can recommend that patients use paracetamol instead of nonsteroidal anti-inflammatory products (NSAIDs) such as ibuprofen if the patient has Covid-19 with other underlying conditions,” said Dr. Harry. In fact, patients with Covid-19 who already have cardiovascular disease, diabetes, cancer or other chronic conditions such as kidney disease still have a higher risk of complications. Dr. Harry says it is best when you have Covid-19 symptoms, you should contact your doctor, for the most accurate professional advice, including the medication you are taking. * Do you know how to handle Covid-19 infection? Take the quiz below to check: Refer to Sciencealert Nguồn bài viết : Genk
<urn:uuid:9128d871-92a5-4f66-979f-84d2a64ae92f>
CC-MAIN-2020-29
https://itzone.com.vn/vi/article/who-canh-bao-khong-tu-y-dung-thuoc-ha-sot-ibuprofen-khi-co-trieu-chung-covid-19-vi-no-co-the-khien-benh-tro-nang/
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657149205.56/warc/CC-MAIN-20200714051924-20200714081924-00577.warc.gz
en
0.95548
1,150
2.578125
3
How to rotate image? -At first select image or select part of image area. -Create a new layer -Paste image in the window -Click Edit menu What is the Ruler? Ruler is the measurement system in the Photoshop. We can use ruler to draw any object in perfect measurement. -At first, clicks to view menu. -Click to the rulers for insert Ruler. -Alternatively, Press Ctrl + R from key board to insert rulers. -We will insert two horizontal and two vertical lines from ruler areas. -To draw/insert lines, click to the ruler areas and drag to the window/page. -After dragging from the ruler, we will see a line in the page/window. -Accordingly bring two horizontal and two vertical lines. -We can use these lines to create any object/project in perfect measurement. -And we can remove these lines. -To remove lines, click on the line and drag from the page to the ruler area. -We can remove ruler from the page/window. -To remove ruler, click to view menu then click to the Rulers. -Alternatively, we can use keyboard shortcut key Ctrl + R to remove ruler. We can learn more using of ruler to the “project-1”.
<urn:uuid:d5354677-367d-44f3-b213-ac703b2b2b06>
CC-MAIN-2017-43
http://photoeditbd1.blogspot.com/2012/12/how-to-rotate-image-at-first-select.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823067.51/warc/CC-MAIN-20171018180631-20171018200631-00605.warc.gz
en
0.818068
279
3.109375
3
One of the things that's amenable to scientific study is how we communicate information about science. Science education should, in theory at least, produce a scientifically literate public and prepare those most interested in the topic for advanced studies in their chosen field. That clearly hasn't worked out, so people have subjected science education itself to the scientific method. What they've found is that an approach called active learning (also called active instruction) consistently produces the best results. This involves pushing students to work through problems and reason things out as an inherent part of the learning process. Even though the science on that is clear, most college professors have remained committed to approaching class time as a lecture. In fact, a large number of instructors who try active learning end up going back to the standard lecture, and one of the reasons they cite is that the students prefer it that way. This sounds a bit like excuse making, so a group of instructors decided to test this belief using physics students. And it turns out professors weren't making an excuse. Even as understanding improved with active learning, the students felt they got more out of a traditional lecture. One of the challenges of tracking this sort of thing is that every class will have a different range of talents, and some instructors will simply have been better at teaching. Figuring out how to control for this variability is essential if you want to understand the impact of teaching methods. Fortunately, the Harvard team came up with a clever way of doing so. They essentially split a physics class in two. One half would get a standard lecture. The person teaching the other half would use the same slides and class materials but lead these students through an active learning process during the class. Then, two weeks later, the two groups of students would swap places; the first would now have an active learning class on a different physics topic, and the second would receive a standard lecture. That way, the same students experience both regular lectures and active learning, and the instructors would bring any talents they had to both approaches. After each class, the students were surveyed about the experience, and they took a short quiz to determine how well they understood the subject of the class. The whole thing was done for both the spring and fall semesters of a class to provide a larger sample size. As expected from past studies, the students in the active learning classes consistently outperformed their peers (and themselves), scoring a half a standard deviation higher on the quizzes. But based on the surveys, the students would have been surprised to find out that's the case. The students found the active learning classroom to lack a bit of coherence, and it suffered from the frequent interruptions, which made the experience frustrating and confusing. When asked how much they felt they learned, students in the active learning classroom consistently rated themselves as having learned less—the exact opposite of what the quizzes indicate. The students also indicated that they would prefer that all their future classes be standard lectures. So why is an extremely effective way of teaching so unpopular? The researchers come up with a number of potential explanations. One is simply that active learning is hard. "Students in the actively taught groups had to struggle with their peers through difficult physics problems that they initially did not know how to solve," the authors acknowledge. That's a big contrast with the standard lecture which, being the standard, is familiar to the students. A talented instructor can also make their lecture material feel like it's a straight-forward, coherent packet of information. This can lead students to over-rate their familiarity with the topic. The other issue the authors suggest may be going on here is conceptually similar to the Dunning-Kruger effect, where people who don't understand a topic are unable to accurately evaluate how much they knew. Consistent with this, the researchers identified the students with the strongest backgrounds in physics, finding that they tended to be more accurate in assessing what they got out of each class. Whatever the cause, it's not ideal to have students dislike the most effective method of teaching them. So, the authors suggest that professors who are considering adopting active learning take the time to prepare a little lecture on it. The researchers prepared one that described the active learning process and provided some evidence of its effectiveness. The introduction acknowledged the evidence described above—namely, that the students might not feel like they were getting as much out of the class. In part thanks to this short addition to the class, by the end of the semester, 65% of the students reported feeling positive toward active learning. That's still not exactly overwhelming enthusiasm, but it might be enough to keep instructors from giving up on an extremely effective teaching technique.
<urn:uuid:940417a5-1ddc-434c-996e-8b41bf272bce>
CC-MAIN-2020-16
https://arstechnica.com/science/2019/09/college-students-think-they-learn-less-with-an-effective-teaching-method/?comments=1&post=37920503
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370519111.47/warc/CC-MAIN-20200404011558-20200404041558-00473.warc.gz
en
0.97365
951
3.921875
4
The 40th anniversary of the Watergate break-in presents an ideal opportunity to reconsider the greatest scandal in U.S. political history. Many then and since have celebrated President Richard Nixon’s resignation as a constitutional triumph — proof that “the system worked.” This has become conventional wisdom. But it’s based on three myths — all untrue. Myth 1: Two Washington Post cub reporters, Bob Woodward and Carl Bernstein, uncovered the massive wrongdoing that destroyed the Nixon presidency. Story Continued Below The truth is Woodward and Bernstein largely printed information improperly obtained from the career head of the FBI (Mark Felt) and a Watergate grand juror (“Z”) — about what federal prosecutors were presenting to the grand jury. At most, the public learned details about the wrongdoing a few months before it would have come out at trial. Recent books by Max Holland (“Leak: Why Mark Felt Became Deep Throat”) and Jeff Himmelman (“Yours in Truth: A Personal Portrait of Ben Bradlee”) as well as Himmelman’s recent New York magazine article seriously undermine Myth 1. As well as these two reporters’ reputation for veracity. Myth 2: Nixon’s conduct was so heinous, abusive and unique that his removal was necessary and appropriate — and done in full accord with our Constitution. The truth is that nothing alleged against Nixon or his compatriots differed from that done by other administrations. We now know, for example, that every president, beginning with Franklin D. Roosevelt, secretly taped Oval Office conversations; that Nixon’s own campaigns were bugged in 1960, in 1962 and in 1968; that Robert F. Kennedy approved more national security wiretaps than the 17 placed on National Security Council staff by the Nixon administration. RFK’s included the grossly invasive and politically motivated taps placed on Martin Luther King Jr. — his home, his offices at the Southern Christian Leadership Conference, the Student Nonviolent Coordinating Committee and in various hotel rooms. We now know that Nixon’s concurrence in Internal Revenue Service audits on 16 “enemies” — which were never carried out — pales in comparison to the Kennedy administration’s Ideological Organizations Audit Project — which resulted in audits of some 10,000 contributors to conservative causes. The 1975-76 Church Committee hearings, particularly FBI testimony about actions undertaken for the Kennedy and Johnson administrations, and The Growth of Domestic Intelligence report, document that such abuses of power hardly began with Nixon. This doesn’t make Nixon’s actions right, nor does it absolve him of blame. It just means that his actions weren’t unique. Yet only Nixon was forced to resign — and prevented from completing the second term he had won in a landslide. The Nixon takedown, led by Democrats who probably knew full well of similar offenses by preceding administrations, trashed the notion of separation of powers enshrined in our Constitution.
<urn:uuid:d78550b2-443c-4654-b128-cdbdb25a05c4>
CC-MAIN-2017-30
http://www.politico.com/story/2012/06/exposing-myths-about-watergate-077437
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424148.78/warc/CC-MAIN-20170722202635-20170722222635-00063.warc.gz
en
0.958649
616
2.609375
3
On the basis of climate change data and recorded heat wave data, with proper study of different regions, action plans will have to be prepared at the local level according to different regions. Read Akshit Joshi’s analysis Rising temperature is a cause of concern for India. Soon after the IPCC AR6 Synthesis Report 2023, the Center for Policy Research (CPR) on Monday released a report analyzing 37 Heat Action Plans (HAPs). Spread over 18 states, 9 cities, 13 districts, 15 states come in these 37 places. Several opportunities were also identified to strengthen them. The document suggested a variety of solutions (62 different types of solutions) for HAP, ranging from promoting green roofs to awareness programs in schools at the state level. world facing warming The report titled ‘How is India adapting to heatwaves?: An assessment of heat action plans with insights for transformative climate action’ comes at a time when both India and the world are facing the hottest temperatures ever recorded in human history India witnessed unprecedented heat in 2022 and February 2023 was declared by the India Meteorological Department as the warmest February since 1901. Europe also saw its warmest January on record. The fifth warmest January was recorded in North America and the sixth warmest January in Africa. A study by World Weather Attribution last year analyzed heatwaves in India and found that human actions have accelerated the forecast of extreme heat events thirtyfold. Make it mandatory to take fast and better action against. This is emphasized in the report. Most of the findings of the report are about the structural problems inherent in HAPs in India. Our plans were not made according to the local level The first and most basic point is how our plans are not localised. A uniform climate and temperature reduction plan cannot be implemented in a country with diverse geography and climate zones like India. If the problem is to be addressed for the entire country, then locational differentiation and specificity in action is necessary. The report also highlighted that vulnerable groups were not identified properly and the problem was not targeted and attacked with full force. “Almost all HAPs fail to identify and work on vulnerable groups – Only two HAPs were successful in doing the right assessment (systematically finding out where the most affected people are in a city, district or state). Most HAPs highlight broad categories of vulnerable groups (elderly, outdoor workers, pregnant women). The solutions they offer do not necessarily focus on these groups,” the report says. Lack of funds is also a big reason It was also said that most of the HAPs are short of funds. According to the report, out of 37 HAPs, only three identify funding sources. 8 HAPs themselves demand resources from the awarding department, which makes it clear that HAPs are severely short of funds, says the CPR report. It has also been pointed out that the HAPs in the country are neither completely transparent nor do they have a strong legal basis. The report mentions the problems we are facing as a nation regarding climate change and global warming. Without the strong will and effort of the government, it will be difficult to take any meaningful change on the ground. With the situation constantly deteriorating, this cannot go on for long. what is the way forward If India really wants to face the recent extreme heat wave or the heatwave crisis this year or the very high temperatures in the coming times, then it should heed the recommendations of the CPR report. As mentioned above The first step would be to take concrete action at the policy and structural level. During the tenure of Prime Minister Narendra Modi, India has taken many positive steps in the fight against climate change. Many of these are at the policy level which will have long lasting impact in India and globally. Proper budget allocation should also be a priority if we want to strengthen HAP. Action plan will have to be made at the local level On the basis of climate change data and recorded heat wave data, with proper study of different regions, action plans will have to be prepared at the local level according to different regions. This may require a classification similar to the way we classify areas for earthquakes. Measures to deal with hotspots in western countries can help make HAP more efficient in India as well. The right action plan made in this way can prove useful to combat this problem. Heatwaves are not expected to subside in the near future. It is advisable to make such HAPs in which pre-risk actions are taken and not post-risk disaster management. According to the CPR report, the HAP plans among the common citizens Risk management and prevention with increased awareness and education is the way to deal with the long term effects of heat and rising global temperatures that we are facing these days. : Language Inputs
<urn:uuid:e8a2adee-d5cb-4fe7-899f-955c63176d93>
CC-MAIN-2023-23
https://www.newsncr.com/knowledge-utility/the-world-is-heating-up-due-to-rising-temperature-understand-why-this-is-a-challenge-for-india/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647459.8/warc/CC-MAIN-20230531214247-20230601004247-00029.warc.gz
en
0.959895
986
3.140625
3
Mice are the experimental tool of choice for the majority of immunologists and the study of their immune responses has yielded tremendous insight into the workings of the human immune system. However, as 65 million years of evolution might suggest, there are significant differences. Here we outline known discrepancies in both innate and adaptive immunity, including: balance of leukocyte subsets, defensins, Toll receptors, inducible NO synthase, the NK inhibitory receptor families Ly49 and KIR, FcR, Ig subsets, the B cell (BLNK, Btk, and λ5) and T cell (ZAP70 and common γ-chain) signaling pathway components, Thy-1, γδ T cells, cytokines and cytokine receptors, Th1/Th2 differentiation, costimulatory molecule expression and function, Ag-presenting function of endothelial cells, and chemokine and chemokine receptor expression. We also provide examples, such as multiple sclerosis and delayed-type hypersensitivity, where complex multicomponent processes differ. Such differences should be taken into account when using mice as preclinical models of human disease.
<urn:uuid:f34ba943-37ca-4cfd-ac0c-64aaee9313e0>
CC-MAIN-2023-40
https://www.vetvaccnet.ac.uk/publications/mice-and-not-men-differences-between-mouse-and-human-immunology
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506686.80/warc/CC-MAIN-20230925051501-20230925081501-00397.warc.gz
en
0.925024
235
2.703125
3
Published March 28, 2011 The United States is home to 104 nuclear plants, 15 of which are located in the what's known as the New Madrid Seismic Zone, a region defined by a fault line of the same name. But while the U.S. earthquake zone is active, scientists say the ingredients do not exist there for a Japan-style nuclear disaster. "There is that uncertainty when you hear that something has happened because you don't understand," said Jeff King, interim director of the Nuclear Science and Engineering Program at the Colorado School of Mines. "I would say Americans should actually be very comfortable (about) those plants." King, a former Department of Energy nuclear facility on-site inspector, is not working directly with officials on the Japan disaster, and he noted that it will be some time before a final report is completed. But he told Fox News that the early diagnosis for the nuclear accident in Japan had more to do with the tsunami that followed the March 11 earthquake and the power loss to the Fukushima Daiichi nuclear facility than the 8.9 magnitude temblor. "The distinction, the earthquake and the tsunami is kind of an important one," he said. "The plant survived the earthquake with minimal problems, there's some questions about the spent fuel pools, but minimal problems, and then it was an hour later when the tsunami hit and they lost all of the their backup power." The U.S. Department of Homeland Security is scheduled to conduct a large-scale, interagency disaster response exercise in the New Madrid Seismic Zone this spring. It's an annual exercise held by the federal government, and Homeland Security Secretary Janet Napolitano's office said the location of this year's drill is not connected to events in Japan. "With respect to the United States, we are constantly practicing" disaster response, Napolitano recently told an audience in Denver. Robert Williams, a scientist with the U.S. Geological Survey's Hazards Team, said the New Madrid Seismic Zone involves eight states, and it's an active earthquake area in the central United States that follows the Mississippi River between Missouri, Kentucky, Arkansas and Tennessee. "It's an area that is currently experiencing earthquakes and has a history of magnitude 7 to 8 earthquakes," Williams said. "But the shaking from a New Madrid quake would involve a much larger area. So it runs along that border and it's of concern to those communities in the Mississippi River valley as well as Memphis and St. Louis." Should a large seismic event strike this part of the country, seismologists offer Christchurch, New Zealand, rather than Japan as an example of what to expect. In February, Christchurch suffered a 6.3 magnitude quake and billions of dollars in losses. "Christchurch has a building infrastructure that's a lot like what you find in the central U.S. main street, 100-year-old brick buildings, no reinforcement, no consideration of earthquake shaking," Williams said. King, who used to live in the New Madrid region, agreed that infrastructure outside the nuclear plants is the bigger concern. "If I still lived in that area, my biggest worry would be the loss of my utilities, the loss of my power and water," he said. "The real tragedy in the case of a natural disaster is going to be the natural disaster, not the nuclear power plant."
<urn:uuid:aff9f06d-ea82-408b-bd20-293a499edcf7>
CC-MAIN-2013-48
http://www.foxnews.com/politics/2011/03/28/preps-nuclear-disaster-drills-scientists-reassure-quake-zone-facilities/print
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164746201/warc/CC-MAIN-20131204134546-00092-ip-10-33-133-15.ec2.internal.warc.gz
en
0.964814
692
2.640625
3
You must be signed in to read the rest of this article. Registration on CDEWorld is free. Sign up today! Forgot your password? Click Here! The ADAA has an obligation to disseminate knowledge in the field of dentistry. Sponsorship of a continuing education program by the ADAA does not necessarily imply endorsement of a particular philosophy, product, or technique. Complementary and Alternative Medicine (CAM) is a set of procedures considered to be outside the practice of conventional medicine. Conventional medicine procedures are performed by medical doctors and other healthcare professionals; they are also called allopathy, Western, orthodox, or regular medicine and biomedicine. Allopathy is further defined as the use of antagonists to treat disease or abnormal conditions. Allopathy, or conventional medicine, uses antibiotics toxic to a microorganism to kill it, or provides a vitamin to treat a vitamin deficiency. Complementary medicine procedures are used in conjunction with conventional medicine procedures. Alternative medicine procedures are used in place of conventional medicine procedures. When CAM therapies are used with conventional medicine it is called Integrative Medicine. Conventional Dentistry is also called traditional or fee for service dentistry, which means every diagnosis has a corresponding diagnostic and procedural insurance code. In dentistry, conventional procedures are performed by dentists and allied oral healthcare professionals. A dental example of a complementary medicine procedure is using aromatherapy before, during or after dental procedures. An example of an alternative medicine procedure is using hypnosis instead of drugs or medication for pain/anxiety control. CAM seeks to treat the patient in a holistic fashion, meaning treating the individual as a whole entity. The word holistic is of Greek origin and means "relating to the whole." Holistic dentistry considers all things related to the patient. While some holistic procedures seem unorthodox to mainstream dentistry, new research and patient testimonials may prove their safety and effectiveness, eventually allowing their adoption into the conventional oral healthcare practice standard of care. Dentists who use nontraditional or CAM procedures for patient care may be referred to as alternative or holistic dentists. Any dental procedure performed on the patient that doesn't have an associated American Dental Association (ADA) diagnosis or procedure insurance code is considered nontraditional treatment. Because dentists have a legal duty to use standard dental treatments, additional written informed consent must be obtained from the patient. Because of increasing public use and demand of CAM, the National Institutes of Health (NIH) has established the National Center for Complementary and Alternative Medicine agency (NCCAM) to study CAM using scientific methodology and to inform the public. CAM procedures are frequently used when a patient with a chronic health problem hasn't responded well to conventional treatment. These conditions include chronic pain, colds and flu, anxiety and depression, gastrointestinal disorders, and sleep disorders. The most common condition treated using CAM is musculoskeletal pain. CAM practitioners that help conventional and holistic dentists include chiropractors, pharmacists, acupuncturists, acupressurists, massage therapists, and nutritionists. General Categories of CAM There are five general categories of CAM: 1. Alternative Medical Systems 2. Mind-Body Interventions 3. Biologically Based Therapy 4. Manipulative and Body Based Methods 5. Energy Therapy Alternative Medical Systems Alternative Medical Systems are based on theory and practice separate from Conventional/Allopathic medicine. These systems include homeopathy, naturopathy, Ayurveda, Chinese medicine and chiropractic manipulation. Homeopathy is a set of procedures using highly diluted medications made from animal, mineral and vegetable sources. These "remedies" are used as substitutes for antibiotics bined from the Greek words homoios meaning similar, and pathos meaning disease. The principles of homeopathy date back to Hippocrates. Homeopathy emerged as a highly systematic medical science in the late 1700's in Germany by the practice of Dr. Samuel Hahnemann and is practiced by homeopathic doctors around the world. This methodology incorporates the use of small quantities of medicaments to cause symptoms the patient is experiencing. It is a natural system of medicine that stimulates the body to heal itself. A homeopathic dose of Arnica in dentistry is thought to speed healing, whereas Hypericum desensitizes a tooth. There are three principles of Homeopathy. The Law of Similars (similia similibus curentur) is "let likes be cured with likes." Homeopathic extracts are administered in an infinitesimal dose to create symptoms similar to those experienced by the patient. The second principle is the Dilution or "minimal dose" concept of the higher the dilution, the stronger the effect. A small dose of a single remedy is diluted thousands of times to address all the symptoms: mental, emotional, and physical. A homeopathic doctor utilizes an extract to cover all symptoms reported by the patient. The third principle is Dynamisation, meaning vigorous shaking to activate the extract. Naturopathy is an alternative medical system based on therapies of nutrition, medicinal plants, dietary supplements, natural foods, light, warmth, massage, fresh air, regular exercise and the avoidance of medications. Dietary Supplements are products (other than tobacco) taken by mouth that may include vitamins, minerals, herbs, botanicals, amino acids, enzymes, organ tissues (glandular products) and metabolites. They are considered foods, not drugs, and are regulated by the Food and Drug Administration. Ayurveda (meaning "science of life") is an alternative medical system that emphasizes body, mind and spirit remedies. Diet, exercise (yoga), meditation, herbs, massage, exposure to sunlight and controlled breathing are used to treat and prevent disease. It has been practiced on the Indian subcontinent for over 5,000 years. Ayurvedic medicine strives to restore the harmony of the individual. Yoga is a discipline that focuses on the body's musculature, posture, breathing and consciousness. It is practiced for health and well-being. Traditional Chinese Medicine Traditional Chinese medicine is the ancient system of healthcare from China based on the concept of qi (pronounced "chee") energy that flows through the body. Qi energy is thought to regulate spiritual, emotional, mental and physical forces that are influenced by negative energy (yin) and positive energy (yang). Disease occurs when qi is disrupted, causing a yin and yang imbalance. Therapies include herbal/nutritional remedies, physical exercise, meditation, acupuncture and curing massage. Qi Gong (pronounced "chee gung") is a practice that combines movement, meditation, and breathing to improve qi, circulation and immune function. Ginseng is a botanical dietary supplement thought to improve heart function, work as an aphrodisiac and stimulant. Botanicals are plants or parts of plants used for medicinal or therapeutic properties, flavor or scent. Acupuncture involves placing fine needles into acupuncture points. Acupuncture therapy is divided into several treatment modalities; auricular therapy, Ryodoraku, acupressure, moxibustion, and Chinese acupuncture, which have an indirect influence on the endocrine and reticular formation of the brain stem. The theory behind acupuncture therapy is that the body is made of 14 main channels that include 12 paired meridians and two vessel systems that contain 700-800 acupuncture points. Energy flow from organ to organ is thought to be through these channels. Nerves can be stimulated or sedated by the placement of needles into acupuncture points. Needles are placed into these points and activated by twirling or electric stimulation. Auricular therapy is the stimulation of internal organs or body parts by placing needles into one or more of 73 different points on the ear. Ryodoraku, the Japanese form of acupuncture, is the electrical stimulation of acupuncture points. Acupressure is the use of finger pressure on acupuncture points until the patient feels a sensation used to reduce the need for pain medication and to promote healing. Moxibustion therapy is the use of burning a tuft soaked in the herb, Artemisia vulgaris, over an acupuncture point. Another technique using acupuncture principles is drug injection. Drugs such as local anesthetics, vitamins B1 or B12, saline or antibiotics injected into acupuncture points that affect a specific organ, are believed to be more effective than intravenous or intramuscular injections. The indications for acupuncture are anesthesia allergies, acute abscess or cellulitis, patient preference, sinus problems, cold symptoms, or other respiratory disease, or as a supplement to local or general anesthesia (Figure 1). Contraindications for acupuncture are dermatitis, hemophilia, pregnancy, uncooperative patients, patients that may make sudden or uncontrolled movements, exhausted, fasting, emotionally upset or perspiring patients. Mind-Body Interventions are based on the theory and practice of enhancing the mind to affect body functions and disease symptoms. They include prayer, meditation, mental healing, and creative outlets such as art, music or dance. The most frequently used CAM therapy is prayer: people pray for themselves for health reasons and ask others to pray for their health. Religious prayers are well documented for use in healing and spiritual insight. During the Middle Ages, when a person had a toothache, a prayer was made to Saint Appolonia, the patron saint of dentistry for healing or pain relief (Figure 2). Dental practitioners may use imagery, relaxation, rehearsals, biofeedback, hypnosis, and paranormal health remedies as complementary or alternative techniques for conventional dental treatment. Many of these nontraditional therapies are recommended for the dental phobic patient. A phobia is a severe anxiety reaction, which leads to avoidance of situations, animals or people. Dental phobics are people with irrational fear of dentistry. It is estimated that there are ten to twelve million people in the United States who are severe dental phobics. Further, it is estimated that 35 million other individuals are very anxious. Both groups of people delay seeking dental care and repeatedly fail to keep appointments. Reasons for dental anxiety can be from direct experience or indirect experience. An example of a direct experience that causes anxiety can be a past painful dental procedure. An example of an indirect experience that causes anxiety is word of mouth or media induced descriptions of dental treatment that produce fear in the dental phobic. Whatever the reason, affected people will avoid oral health care and self-treat their chronic dental pain. These patients will seek dental care when they can no longer tolerate the pain. Both anxiety and fear are related to pain. Pain is the interpretation of the nervous system and is a response influenced by learning and early development. Assessing the patient for dental phobia is the first step in building a working relationship. Increase your level of attention to the patient's verbal and nonverbal communication. Communication based upon trust and rapport is always the cornerstone of effective patient management. Use visual, auditory or kinesthetic modes of communication, depending on what the patient uses, to reassure the patient and help establish rapport. The patient who uses visual communication will answer by saying, "I see." The patient who uses auditory communication will answer by saying, "I hear you." The patient who uses kinesthetic communication will answer by saying, "I understand you." Patients need a sense of control. When you use predictable behavior, explain procedures, and give encouragement and reinforcement, the patients feel a sense of control and know they can stop any treatment at any time. Some dental phobic people require seeing a psychologist first. When the patient is ready to see the dentist, an initial oral exam is scheduled. After the patient is treatment planned, coping mechanisms are incorporated into their psychological visits. Imagery, Relaxation and Rehearsals Desensitization is the most common approach to treating the dental phobic, using relaxation and imagery to calm the anxious or fearful patient. Relaxation techniques and visual imagery techniques are often practiced together. Relaxation is the cessation of body or mental effort. Imagery is using all of our senses in the absence of stimuli to create a perception. Controlled breathing is a technique of relaxation. Teaching the patient to breathe normally helps to relax the patient because people who are fearful hold their breath. Rehearsals are another technique of desensitization in which the patient is placed in a situation and is able to control the stimuli so that the patient can feel a sense of control in the situation. The patient and therapist spend long periods of time becoming accustomed to a source of anxiety and practice the event, such as an anesthesia injection. We know that adequate pain control eliminates the hurt and can help encourage the phobic patient to return for needed oral health care. Biofeedback is a behavioral science in which humans learn to develop conscious control or change internal body processes using imagery and relaxation techniques. People have forgotten how to relax, which is a key component in biofeedback treatment. Many of the body's responses to stress are controlled by the sympathetic nervous system, the network of nerve tissues that helps prepare the body to meet emergencies by "flight or fight." People calm down when a stressful event is over or when they have done something to cope with it. When the body is repeatedly aroused, one or more functions may become permanently overactive and damage to body tissues results. Biofeedback changes habitual reactions to stress that can cause pain or disease. Measurements of how physical processes react to stress are used to teach the patient how their bodies react. Devices such as electroencephalograms, electrocardiograms and thermometers measure physical changes such as brain activity, blood pressure, heart rate, muscles and temperature during biofeedback. Scientists cannot yet explain how biofeedback works. Patients who benefit from biofeedback are trained to relax and modify their behavior. Biofeedback is used to improve the body's immune system for healing, for the treatment of the dental phobic patient and the patient with temporomandibular disorders (TMD). Not all people respond to hypnosis, but biofeedback can be used for everybody. Hypnosis is a technique that uses a natural altered state of consciousness. The hypnotic state is a deeply relaxed state that is similar to the experience felt prior to falling asleep. It is suggested that up to 85% of people do not have good hypnotic ability. For the people who do have hypnotic ability, there are many therapeutic uses of hypnosis. See Figure 3 for the uses of hypnosis in dentistry. A determination is made as to whether the patient is suggestible for hypnotic induction. Once the patient is tested on how receptive they will be for hypnosis, the next step is to induce hypnosis using verbal suggestions or eye fixation. Eye fixation over stimulates the subject's eye muscles. Once the hypnotic state is entered, physiologic changes occur in the patient, such as eye movement, facial relaxation and slower deep breathing. After the operative procedure, the patient is dehypnotized. The patient was never "asleep," therefore the patient is not awakened, but dehypnotized. Paranormal Health Remedies Paranormal health remedies and divinations are less frequently used Mind-Body Interventions. They include past life regression and divinations. Factors that influence past life regression therapy are problems that have not responded to other traditional forms of therapy and phobias that may have roots in a past life. Skeptics claim it is true that patients recall past lives, however, it is highly improbable that their memories are accurate. These memories are from experience in this life, they are imagined, suggested by the hypnotherapist, or they are a mixture of this life experiences and imagination. Divination means predicting the future or any outcome using a specific course of action. It includes reading astrological charts, numerology, I Ching readings (3 coins are cast, or, the yarrow sticks are divided, and the result is referenced in the I Ching or "Book of Changes," one of Confucianism's Five Classics), Fortune tellers, Tarot cards or tea leaves. Biologically Based Therapy Biologically Based Therapy is the theory and practice of using substances found in nature. Practitioners use herbs, foods, dietary supplements, aromatherapy and specific regimens to treat or prevent disease. Biologically Based Therapies have become the CAM technique most frequently used after prayer. Dental mouthrinses containing herbal essences of calendula, chamomile, echinacea, ginkgo biloba, golden seal, green or orange pekoe tea, licorice, myrrh, melissa, peppermint, sanguanaria, tea tree, or watercress are thought to help prevent periodontal problems. Echinacea herbal supplements are thought to stimulate T cell lymphocytes and to increase the production of interferon to protect cells against viral and bacterial infections and to heal inflammation, wounds and swelling. Dietary supplements in the form of antioxidant vitamins C and E are recommended for gingival inflammation. Ginkgo biloba herbal supplements are recommended for gingival inflammation. Dietary supplements of the mineral magnesium citrate are recommended to improve muscle function in an individual with a high-fat, high-protein diet. Nutritional diets such as Dr.'s Atkins, Ornish, Pritikin, and Weil are thought to prevent or control illness and to promote health and wellness. Orthomolecular therapies treat disease with varying concentrations of chemicals, such as magnesium, melatonin, and mega doses of vitamins. Other nutritional diets include vegetarian, macrobiotic and the Zone. Dentists may work with a nutritionist to test and balance body chemistry by analyzing hormones, enzymes, digestion, assimilation, vitamins, minerals, carbohydrates, fats, proteins, and other body constituents. Incorporating body chemistry analysis and providing nutritional guidance can be practiced by holistic dentists. Holistic dentists will use dental materials they believe have few side effects. While amalgam restorations and nickel containing crowns are traditional dentistry, holistic dentists may choose ceramic, porcelain, gold, or composite dental materials. Biological therapies such as the use of laetrile and shark cartilage are used to treat cancer. Bee pollen is used to treat autoimmune and inflammatory diseases. Aromatherapy is the inhalation or application on the skin of essential oils to promote healing and wellness. Wellness is the achievement of a good existence. Low doses of essential oils are believed to be the safest when diluted in a carrier oil. Diluted oils are massaged directly over the area that needs treatment, such as on the chest for congested lungs or on the stomach for indigestion. Application by inhalation or bath is also appropriate for essential oil therapy. They can be used in combination with herbs, which is thought to be more effective. Some herbal adjuncts are taken several times a day in the form of teas, tinctures, capsules or tablets. There are 50 essential oils that are extremely concentrated. One drop of essential oil often represents the potency of one ounce of plant material. Essential oils kill pathogenic bacteria by disrupting their life cycle, leaving beneficial bacteria intact. Bacteria typically do not acquire a resistance to essential oils as they do to antibiotic drugs. Essential oils act quickly in the body, some are detectable on the breath within minutes, and are eliminated from the body within several hours. Repeated applications may be required, especially when treating acute disorders that require keeping a constant level of essential oil active in the body. Figure 4 lists the ten basic essential oils and their effects. Dilution of essential oil can be in cold-pressed almond, apricot, hazelnut, olive, grape seed or sesame vegetable oils. A safe and effective dilution is 2 percent. Too much essential oil may cause adverse reactions. The amount of Lavender for sedating is in low dilution, whereas high dilution is stimulating. Body massage oils are blends with a saturated oil. The more saturated the oil, the thicker it becomes, causing it to stay longer on the skin. Vitamin E oil is an antioxidant that may be added to extend the shelf life of most vegetable oils. Vegetable oils high in vitamins A, E and F are soothing, contain nutrients that enrich the skin and are among the best carrier oil for essential oils. Refrigerated blends of essential and vegetable oil may be kept six months or more. Manipulative and Body-Based Methods Manipulative and Body-Based Methods use the theory and practice of manipulation and/or movement of the body. Dentists may incorporate the use of physical therapy, chiropractic or massage therapies when a patient's chief complaint is chronic facial pain of the head, mouth, neck or throat. Some dentists use physical therapy for relief of facial pain, the treatment of jaw malalignment, muscle tightness and spasm, and Temporomandibular disorders (TMD) because muscular involvement is a major component of the disorder. Figure 5 outlines the physical therapy treatment regimens used in dentistry. Chiropractic Manipulation is the theory and manipulation of the hard tissue structures of the body. This method of care dates back to the 1890s. Skeletal adjustments are made to correct the vertebral alignment of the spine to restore normal brain and nerve transmission and help recovery from illness. There are two categories of chiropractic medicine. "Straight" chiropractors locate and eliminate subluxations. The majority of chiropractors practice "mixer" chiropractory, a combination of spinal adjustments with other therapies such as hot or cold treatments and nutrition counseling. The chiropractic diagnosis consists of taking an accurate medical history, an examination focused on detecting muscle strength versus weakness and the range of motion of the spine. Radiographs are exposed to identify "vertebral misalignments" and areas of spinal stress. Chiropractic treatment consists of adjustments (spinal manipulations). The recoil thrust requires the patient to lie face down on a special table that moves slightly downward as thrusts are made to accomplish adjustments. The rotational thrust requires the patient to lie with the upper body twisted counter to the pelvis. Then short, fast thrusts are applied to the spine. Massage is the manipulation of the soft tissues of the human body. Swedish massage of the head and neck uses various methods of soft tissue manipulation to stimulate circulation through the soft tissues of the body. Effleurage are long flowing or gliding massage strokes toward the heart, tracing the outer contours of the body. Petrissage are massage strokes that lift, roll, or knead the tissue. Friction massage uses circular strokes and vibration. Tapotement massage uses percussion or tapping. Energy Therapy is the theory and practice of manipulating biofields and bioelectromagnetic fields to affect energy. Biofields have not been proven scientifically but are thought to be energy fields that surround and penetrate the human body. The application of pressure and/or manipulating the body by placing the hands in or through biofields is thought to improve circulation, immune function, and healing. A common biofield therapy is therapeutic touch ("laying-on of hands") that involves passing the clinician's hands over the patient to promote healing. Bioelectromagnetic fields are electrical currents generated by muscle and nerve tissue. The use of pulsed, alternating or direct current, and magnetic fields treats asthma, cancer, manages pain, or migraine headaches. Complementary and alternative medicine in dentistry includes various treatment modalities. Many procedures are under scientific investigation to determine effectiveness. Dental patients request CAM therapy in an attempt to save money and to prevent invasive procedures. The Alternative Medical Systems are methods of alternative therapy different from Conventional/Western medicine. Mind-Body Interventions are methods of affecting body functions using prayer, meditation, mental imagery and creativity. Biologically Based Therapy is the use of substances found in nature to promote healing and wellness. Manipulative and Body- Based Methods are based on the manipulation and/or movement of the body to treat for pain and wellness. Energy therapy is based on manipulating energy fields of body. CAM procedures may eventually become standard practice after scientific verification of efficacy. Allopathy - conventional medicine - use of antagonists to treat disease or abnormal conditions. Alternative Medicine - used in place of conventional medicine procedures. Alternative Medicine Systems - theory and practice separate from Western/Allopathic medicine. Arnica - herb used as a tincture for external application. Ayurveda - alternative medical system that emphasizes body, mind and spirit remedies of diet, exercise (yoga), meditation, herbs, massage, exposure to sunlight and controlled breathing practices to treat and prevent disease. Biologically Based Therapy - theory and practice of using substances found in nature. CAM - acronym for Complementary and Alternative Medicine. Cellulitis - inflammation of connective or cellular tissue. Complementary Medicine - used in conjunction with conventional medicine procedures. Conventional Dentistry - traditional, fee for service based on diagnostic and procedural insurance coding. Dental Phobic - people with irrational fear of dentistry. Dermatitis - inflammation of the skin. Dietary Supplements - products taken by mouth other than tobacco or FDA approved drugs. Energy Therapy - theory and practice of manipulating biofields and bioelectromagnetic fields of energy. Hemophilia - disorder where the blood does not clot. Holistic - dealing with the whole body and its interconnection. Homeopathy - set of procedures using highly diluted medications made from animal, mineral and vegetable sources. Hypericum - commonly known as St. John's wort. Integrative Medicine - use of combination of CAM therapies and conventional medicine procedures. Manipulative and Body-Based Methods - theory and practice of manipulation and/or movement of the body. Mind-Body Interventions - theory and practice of enhancing the mind to affect body functions and disease symptoms, including prayer, meditation, mental healing, and creative outlets such as art, music or dance. Naturopathy - alternative medicine system based on therapies of nutrition, medicinal plants, dietary supplements, natural foods, light, warmth, massage, fresh air, regular exercise and the avoidance of medications. Subluxation - partial dislocation of a bone within the joint. Bassett. Metzger, Achieving Excellence, Aspen Publications, 1986. Blasutta ML, "Alternative Medicine for your Mouth," Longevity Mag. Elsea. Blitz, "Building a Solid Foundation of Trust," RDH Mag. May 1993. Fultz, O., "New-Age Dentistry," Popular Mechanics, Feb. 1991. Hoewisch, C., "Relaxation and Imagery for the Fearful Patient," Access, Jan. 1993. Ingersol, B., Behavioral Aspects in Dentistry, Appleton-Century-Crofts, 1982. Ingersol, B., Patient Management Skills for Dental Assistants and Hygienists, Appleton- Century-Crofts, 1986. "Is Alternative Medicine Right for You?" Personally Speaking, NEA Today. Nov. 1993. Kier, Wise, Krebs, Medical Assisting Administrative and Clinical Competencies, Delmar Pub. 1993. King, L., "Treating the Anxious Patient," Access. Sept./Oct. 1991. Lieber, Levine, Dervitz, Management Principles for Health Professionals. Aspen Pub. Rockville MD. 1984. Majeski, J., "Phobias: Facts on Fear," Access, Jan. 1993. Marzano, Arredondo, "Tactics for Thinking," Mid-Continent Regional Education Laboratory. Aurora, CO. 1986. McCarthy, Palmer, "Don't Be Fooled by Nutrition Misinformation," Dent Hyg News. Sum 1993. McCutcheon, M., Exploring Health Careers. Delmar Pub. 1993. NCCAM, National Institute of Health (NIH) website URL: http://www.nccam.nih.gov. Accessed Sep 2006. NCCAM, National Institute of Health (NIH) Pub No. D190. Available from URL: http://www.nccam.nih.gov. Accessed Sep 2006. NCCAM, National Institute of Health (NIH) Pub No. D191. Available from URL: http://www.nccam.nih.gov. Accessed Sep 2006. NCCAM, National Institute of Health (NIH) Pub No. D156. Available from URL: http://www.nccam.nih.gov. Accessed Sep 2006. Sklar B. Hypnosis as an Alternative in Dentistry. Access. Jan 1993. Tennant D. Mind Over Matter. Virginian-Pilot and Ledger Star. Sun Mar 13, 1994. Umiker W. Management Skills for the New Healthcare Supervisor. Aspen Pub. Rockville MD. 1988. Wilkins E. Clinical Practice of the Dental Hygienist. Lippincott, Williams and Wilkins. 8th Ed. 2005. About the Author Esther Andrews CDA, RDA, RDH, MA Esther Andrews earned a Master of Arts from Michigan State University in East Lansing, MI; an Associates of Applied Arts and Science from Grand Rapids Community College in Grand Rapids, MI; and a Bachelor of Science and Associates of Applied Science from Ferris State University in Big Rapids, MI. Currently she practices dental hygiene in Chicago. Her newest textbook, titled Practice Management for Dental Hygienists was published by Lippincott, Williams and Wilkins in Baltimore, MD. Honors and awards bestowed include: • 2005 Dental Assisting National Board Achievement for 30 year continuous Certification, • 2004 American Dental Assistants Association Journal Award, and • 2000 Life membership in the American Dental Assistants Association. She is a frequent contributor to the Journal.
<urn:uuid:391f8866-9057-45ec-a255-820d7fa2f4d5>
CC-MAIN-2020-29
https://cdeworld.com/courses/21542-complementary-and-alternative-medicine-techniques-available-for-dentistry
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655890566.2/warc/CC-MAIN-20200706222442-20200707012442-00180.warc.gz
en
0.911172
6,193
3
3
Extruder Screw Rebuilding Many people don’t realize the importance of making sure that the screw flight diameter clearance has a significant effect on the performance of their screws. There are some companies that do pull their screws, measure the flight diameter, and record the information. By doing this regular maintenance routine will help production to predict when they may need their next shut down to have a screw repaired or the purchase of a new screw. Typically, it is not recommended to rebuild any size screw more then 3 times. This is mainly because of the dilution of the base metal that occurs between the hard surface weld material and the 4140 H.T. or carbon steel base metal. Also, geometric dimensions start to deteriorate, such as flight widths, channel depths and channel radius. The geometry of the screw changes because every time that the screw is rebuilt it is either milled or flight ground to clean the over weld on the sides of the flights and the root is polished is remove possible root wear or scarring due to the fact that a foreign object had entered the screw. If the root of the screw in the metering section is polished deeper then by deepening the screw channel can affect the pumping or melting capacity of the screw. Also, if the screw is rebuilt and the concentricity between the flight outside diameter and the root is not maintained, then the variation of the channel depth could cause the stability of the screw. This is more of an issue with small screws (2.5” and smaller) than larger screws. Also if a screw is rebuilt too many times not only is the metallurgy of the base material degraded but as mentioned earlier, the narrowing of the flights can cause an even more increase in wear due to less flight land width to support the screw. The best tool when it comes to screw maintenance is to do regular measuring of the flight OD and record the data along with the production rate as a means to predict a preventative maintenance shut-down.
<urn:uuid:c8481299-4df7-40ef-955f-a7b177267c3f>
CC-MAIN-2023-14
https://www.rbplasticsmachinery.com/extruder-screw-rebuilding/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945144.17/warc/CC-MAIN-20230323100829-20230323130829-00135.warc.gz
en
0.956683
404
2.65625
3
Notes On The Grateful Dead and Native Americans Notes on the Grateful Dead and Native Americans Wes Lang's Indian Girl. Wes Lang’s evocation of a Native American take on the Grateful Dead’s iconography for the Spring 1990 boxed set has deep roots in the Dead’s milieu. A fascination with all things Indian was a big part of the Haight-Ashbury, and the Dead were no exception. Band members were as intrigued with Native American heritage as they were with the Anglo side of Americana and the West, which can be seen in photographs, posters, and other artifacts in the Grateful Dead Archive at UC Santa Cruz. Some aspects of the band’s association with Native Americans were even closer to home. In 1969, Native Americans occupied Alcatraz Island in the San Francisco Bay in an historic bid to raise awareness of a variety of social and political issues; and over the years, the Dead supported Native American charitable organizations and invited Native American groups to perform as opening acts as well. Probably the most famous link between the Dead and Native Americans was their friendship with Rolling Thunder, “an authentic healer and a fascinating character,” as Dennis McNally put it, who inspired Mickey in particular—see Hart’s album of the same name, which features an invocation by Rolling Thunder. But RT, as he was affectionately dubbed, was a friend to the whole band, someone to whom Weir turned for help when an apparition spooked both him and his dog on a songwriting trip to Wyoming. NC Wyeth's Indian illustration. Native Americans also haunt the periphery of the Dead’s world, just as they do the broader cultural context that frames America in all its complexity, like the NC Wyeth illustration of an Indian stretching out his hands that inspired Weir to remark to Barlow, “Looks like rain,” which became the title of the song they were writing. And most fans can think of several iconic posters advertising Dead shows that feature Native American motifs and themes, such as Bill Graham dressed in complete warrior regalia for the Dead’s New Year’s 1990 poster. Similar trappings have been a part of Deadhead style since its genesis in the Haight-Ashbury, but some fans have had deeper commitments to Native American causes. One group, called the Grateful Dead Indians, handed out flyers at Dead shows in the ’90s, a gesture that captured the imagination of Yale historian Philip J. Deloria, who wrote about them in his book Playing Indian. Most recently, Grateful Dead Scholars Caucus presenter Jeremy Vaughan gave a paper at last year’s conference called “‘Indians Are Better Than Cowboys’: The Grateful Dead and Native Americans” that surveyed that connection. Wes Lang updates and honors that long tradition with his truly breathtaking imagery for this release. Fans owe Wes a big thanks for his creativity and art: His work for Spring 1990 represents a magnificent continuation of an important strand in the band’s long, strange trip through American culture. Grateful Dead Archivist UC Santa Cruz Just wanted to share where my work can be read. I am the Topic Writer for Native American History at About.com (a New York Times Company): I also contribute to Indian Country Today Media Network: that pic is very Hollywood Indian. It reminded me more than anything of Natalie Wood in 'The Searchers'. So I looked up a picture to check and found this now look closely...is that some kind of modified stealie she is wearing? Spooky. Interesting and educational discussion folks, thanks. It's a thn line between paying homage and cultural appropriation. Once in awhile you can get shown the light....... And that's why forums like this are so important, even (especially!) when the topic matter is delicate, controversial and difficult like this is. As Native scholars, we like to think we're making progress in being able to talk about these things without being told yet again that we're being overly sensitive or that we just need to "get over" the past. I appreciate the conversation Nick. Do you know if there is an online connection to Vaughn's paper? Would love to read it. May the four winds blow you safely home. Rather than post a list or Rex grantees since 1983, which would derail this thread completely, I refer folks to the listing on the Rex site. Lots of cool groups have benefited from Rex grants over the years... My thanks to Dina for weighing in with her thoughtful post. My article is entitled "Notes" for a reason: it is a very brief, non-academic sketch of the connections, both substantive and casual, between the Dead phenomenon and Native Americans. In no way did I make a value judgment on any of those connections - - either implied or otherwise. Rolling Thunder, for example, is considered controversial by some Native Americans; that does not mean that historians should not acknowledge his involvement in the Dead's world. In fact, my reason for citing both Deloria and Jeremy Vaughan's conference paper was to ensure that knowledgeable readers would recognize that the sketch does recognize the very real issues to which Dina alludes. Deloria's book is quite critical, as Dina points out; the fact that he chose to frame his final chapter with the Dead phenomenon is what I was pointing out as significant. The fact that I made it a point to include the book is also significant. Likewise, Vaughan's paper is often quite critical as well, given his deep involvement in Native American causes, although he also points out how complex that terrain is. Which was the intention of my piece as well: to sketch those connections and point that complexity. As someone who is sensitive to the scholarship on Native American expropriation, I appreciate her concerns and respect them. The illustration of the Native on horseback was really done by N.C. Wyeth father of Andrew Wyeth. The American Indian Benefit at Winterland was March 5, 1972. Would need further research to see if it was for A.I.M.. The Rex Foundation has helped Native people for years. Would be good to find out what groups have been benefited from Rex. I appreciate the article and one of the things I've always loved about the Dead (and the Deadheads) is their obvious affection for Native culture. I am myself a Deadhead from way back, but I am also a scholar in Native American studies, and Native by birth. My view is from both perspectives, Deadhead and Indian. As a Native person, Wes Lang's cartoon Indian girl is offensive. It is offensive for the usual reason cartoon Indians are offensive...it automatically relegates Indians to an imaginary space where we are stuck in an idealized past and irrelevant (or non-existent) in the present. What would happen if the artist tried to pass off an image of a black slave with the same kind of reverence and longing for an American past that this image invokes? This particular image while beautiful, is also very culturally inaccurate. Women don't wear eagle feather headdresses in Native cultures. Only men do. Phillip Deloria does indeed devote the concluding chapter in his book "Playing Indian" to the Grateful Dead Indians, but not in the flattering way that Nick implies. The book is an interrogation about how Americans have historically appropriated (i.e. taken, or used) Indian identities for various purposes. The overall message is that Americans have never completely accepted their brutal history of genocide and plunder of Indians and their lands, but that they have needed Indians to validate their own sense of identity which is not entirely European, but not Native (one could say indigenous). It is about the search for an elusive authentic identity. As Deloria says in the chapter "To play Indian has been to connect with a real Self, both collective and individual, and there was no better way to find such reassurance" (pg. 183). Not sure about some of the artwork. The skull in the headdress is almost too well drawn; it looks to me rather too much like an anthropological illustration, reminding me of museums and bone collections, and darker still, mass graves and massacres. I think I prefer my skeletons rather more cartoony ( as indeed many of Wes Lang’s others are). This is a Beach Boys favorite apparently as well Really befits a Grateful Dead rendition. The Dead had many ties, the greatsest of which perhaps the UC Berkeley AIM Benefit in 72. If Wes' work is a continuation of that energy we all wish him more success as per the current tour and his Rolling Thunder ties so close we all wish the greatest blessings
<urn:uuid:f2387864-abf7-4c92-aee0-806ae43fb056>
CC-MAIN-2014-15
http://www.dead.net/features/native-americans/notes-grateful-dead-and-native-americans?page=1
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609539776.45/warc/CC-MAIN-20140416005219-00205-ip-10-147-4-33.ec2.internal.warc.gz
en
0.965701
1,786
2.609375
3
32-bit IP addressing is the IP address scheme used in Internet Protocol 4 (IPv6 uses a 128-bit system). In IPv4, an IP address is a 32-bit number that identifies each sender or receiver of information that is sent in packets across the Internet.The 32-bit IP address (we have a separate definition of it with IP address) is often depicted as a dot address (also called dotted quad notation) - that is, four groups (or quads) of decimal numbers separated by periods. Here's an example: Each of the decimal numbers represents a string of eight binary digits. Thus, the above IP address really is this string of 0s and 1s: As you can see, we inserted periods between each eight-digit sequence just as we did for the decimal version of the IP address. Obviously, the decimal version of the IP address is easier to read and that's the form most commonly used. Some portion of the IP address represents the network number or address and some portion represents the local machine address (also known as the host number or address). IP addresses can be one of several classes, each determining how many bits represent the network number and how many represent the host number. The most common class used by large organizations (Class B) allows 16 bits for the network number and 16 for the host number. Using the above example, here's how the IP address is divided: <--Network address--><--Host address--> 130.5 . 5.25 If you wanted to add subnetting to this address, then some portion (in this example, eight bits) of the host address could be used for a subnet address. Thus: <--Network address--><--Subnet address--><--Host address--> 130.5 . 5 . 25 To simplify this explanation, we've divided the subnet into a neat eight bits but an organization could choose some other scheme using only part of the third quad or even part of the fourth quad. Once a packet has arrived at an organization's gateway or connection point with its unique network number, it can be routed within the organization's internal gateways using the subnet number. The router knows which bits to look at (and which not to look at) by looking at a subnet mask, which is a screen of numbers that tells you which numbers to look at underneath.
<urn:uuid:23ea8b96-4691-4b27-a9dc-22a5136492b2>
CC-MAIN-2020-05
https://searchnetworking.techtarget.com/definition/32-bit-IP-addressing
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251779833.86/warc/CC-MAIN-20200128153713-20200128183713-00543.warc.gz
en
0.939373
487
4.125
4
BROADCAST DATE: TUESDAY, FEBRUARY 26, 2008 11 AM AND 1 PM EST Every fall, gray whales migrate from cold nothern seas near Alaska all the way south to warmer waters off the shores of Mexico. This 6,000-mile journey is the longest migration of any mammal, and it provides a spectacular scene for visitors. In this EFT, we'll also get up close and personal with these giant mammals who range from 40-50 feet long and can weigh up to 73,000 pounds. We will learn about migratory patterns, life cycles, dangers faced by gray whales, ecosystems, research, and how we can protect these majestic mammals. WEBSITE | BROADCAST | WEBISODES
<urn:uuid:0568bf8a-8bfe-46f8-aa67-3ed5bbb2bc55>
CC-MAIN-2014-35
http://www.bsu.edu/eft/home2/32fieldtrip.php?tripID=133
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535921872.11/warc/CC-MAIN-20140909032242-00084-ip-10-180-136-8.ec2.internal.warc.gz
en
0.85786
154
2.578125
3
Many people suffer from chronic diarrhea, not realizing that many times the cause can be found and corrected. Chronic diarrhea is defined as loose stools that last for at least 4 weeks. It usually means more than 3 or 4 loose bowel movements per day. Chronic diarrhea can have a substantial negative impact on quality of life and overall health. Many people with this problem have to stay near a toilet and are afraid to even leave the house because of fear that they will not be able to control their bowel action. It is particularly troubling if there is associated incontinence. Chronic diarrhea can be caused by intestinal infections, endocrine disorders, inflammatory bowel disease, food sensitivity or allergy and a side effect of medications. These problems can often be diagnosed with a careful history and appropriate diagnostic testing. There is one particular disorder called microscopic colitis that is often left undiagnosed with resultant debilitating diarrhea. Episodes of diarrhea from this problem can last for weeks, months or years. There may be brief periods when the diarrhea goes into remission. This problem is particularly common in people over the age of 45 and especially in women. A common history is that of a woman with chronic diarrhea for the previous year or 2 which has severely compromised her quality of life. The main forms of microscopic colitis are lymphocytic colitis and collagenous colitis. Lymphocytic colitis is manifested by an excessive number of white blood cells called lymphocytes in the colon wall which appear to cause diarrhea. Many scientists believes that this is an abnormal immune response attracting lymphocytes to the colon triggered by an unknown antigen or irritating substance in the colon. This immune response leads to a leaky colon wall with reduced ability to absorb electrolytes and minerals in the body and resulting in increased fluid secretion into the colon with resultant diarrhea . Collagenous colitis is likely an extension of the lymphocytic colitis process with development of a layer of collagen or scar tissue in the colon wall. Scientists believe that one's genes may make it more likely to develop microscopic colitis. Investigation for this problem includes elimination of medications and checking for a history of certain infections which have been associated with microscopic colitis. Colonoscopy examination reveals a surprisingly normal-appearing colonic mucosa. It is necessary to do biopsies from several areas in the colon to finding microscopic abnormalities characteristic of this disease. One has to be looking for this diagnosis to find it. Effective therapy is available for microscopic colitis which often leads to return of normal bowel movements and a considerable improvement in quality of life. If you or someone you know suffers from chronic diarrhea, I would recommend consulting a gastroenterologist for further evaluation.
<urn:uuid:1599962c-cefe-4e22-a8d7-15d9bec2a6f4>
CC-MAIN-2014-15
http://www.swedish.org/about/blog/february-2013/do-you-have-chronic-diarrhea
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223202457.0/warc/CC-MAIN-20140423032002-00197-ip-10-147-4-33.ec2.internal.warc.gz
en
0.948892
541
3.25
3
The basic obstetric history includes the patient’s gravidity, or number of pregnancies. A pregnancy can be a live birth, miscarriage, premature birth (less than 37 weeks of gestation), or an abortion. Details about each live birth are noted, including birthweight of the infant, sex, number of weeks at delivery, and type of delivery. The patient should be asked about any pregnancy complications, such as diabetes, hypertension, and preeclampsia, and whether she has a history of depression, either before or after a preg-nancy. A breastfeeding history is also useful information. If a patient has a history of infertility (generally de-fined as failure to conceive for 1 year with sufficiently frequent sexual encounters), questions concerning both partners should cover previous diseases or surgery that may affect fertility, previous fertility (previous children with the same or other partners), duration that preg-nancy has been attempted, and the frequency and timing of sexual intercourse.
<urn:uuid:dc833f72-e531-4934-9de5-69baaa08ee09>
CC-MAIN-2023-40
https://www.brainkart.com/article/Obstetric-History_25582/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511369.62/warc/CC-MAIN-20231004120203-20231004150203-00180.warc.gz
en
0.930575
205
2.65625
3
A world of driverless, or autonomous, cars is much closer than we may think, and it will leave an indelible mark on retail real estate development, according to a GlobeStreet interview with Angelo Carusi, a principal at architecture and design firm Cooper Carry. According to numerous automobile industry experts, driverless cars will be in use and on the roads within the next 10 years. At the outset, Carusi explains that the widespread use of driverless cars may result in more efficient uses of real property. He says that “land areas used for commercial real estate could change due to the reduced number of parking spaces needed,” and shopping centers will be able to purchase cheaper and smaller sites that only serve one purpose: to house driverless cars. Carusi then expounds on how this more efficient use of real estate could alter the structure and design of the retail areas themselves, saying, “The shopping center portion of the center itself will become much smaller as driverless vehicles will need less road and parking dimensions to maneuver.” He points out that this could also “revolutionize what we now consider the walkable environment,” and explains that shopping and retail centers could transform into a sort of compact “district,” rather than linear streets lined with shops. Later in the interview, Carusi illustrates how driverless cars could alter other aspects of the retail experience: driverless delivery from retail stores; driverless transportation of an older population that may otherwise find it difficult to visit retail areas; the use of the driverless car as an integral part of a seamless leisure experience. In the interim, landlords, developers and their retained professionals will need to be wary of these ongoing developments in driverless technology, and would be wise to adjust their sails accordingly.
<urn:uuid:ef88194d-52ed-4b74-887d-bddcab430037>
CC-MAIN-2017-26
http://www.lexology.com/library/detail.aspx?g=a2d5a8b9-31d8-4634-be3c-6ee9c34b8c31
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320395.62/warc/CC-MAIN-20170625032210-20170625052210-00649.warc.gz
en
0.952545
368
2.546875
3
Late in the reign of Solomon ca. 943 BC, a new Pharaoh named Shoshenq I arose in Egypt, although his interactions were with Solomon’s successors rather than Solomon himself (1 Kings 11:40). Shoshenq I continued to reign after the death of Solomon and into the early period of the Divided Kingdom. This king of Egypt appears around the time of the kings Jeroboam of Israel and Rehoboam of Judah, who were the first kings after the death of Solomon and the split of the kingdom into north and south. In absolute chronology, this is sometime around roughly 930 BC.
<urn:uuid:fa501a2f-4aa9-4e04-bd00-2a47f5fd3ab9>
CC-MAIN-2017-43
http://apxaioc.com/tags/kings
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824068.35/warc/CC-MAIN-20171020101632-20171020121632-00642.warc.gz
en
0.974742
129
3.4375
3
Can we be sure which mummy was the daddy? When a state-of-the-art DNA analysis of Tutankhamun and other ancient Egyptian royals was published last year, its authors hailed it as "the final word" on the pharaoh's family tree. But others are now voicing doubts. The analysis of 11 royal mummies dating from around 1300 BC was carried out by an Egyptian team led by Egypt's chief archaeologist Zahi Hawass. The project was overseen by two foreign consultants, Albert Zink of the EURAC Institute for Mummies and the Iceman in Bolzano, Italy, and Carsten Pusch of the University of Tübingen, Germany. Read more: New Scientist
<urn:uuid:fccdff0e-90f5-4017-b547-91e79d73511d>
CC-MAIN-2017-34
http://egyptologynewsnetwork.blogspot.com/2011/01/royal-rumpus-over-king-tutankhamuns.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886106990.33/warc/CC-MAIN-20170820204359-20170820224359-00336.warc.gz
en
0.963723
148
2.65625
3
A depiction of a Maccabee's shield and two spears. The shield is adorned by a lion and text reading "Yisrael" (Israel) in the Paleo-Hebrew alphabet. "Maccabee" also appears in English. The Maccabees were Jewish rebels who freed Judea from the yoke of the Seleucid Empire. Chanukkah is not just a mid-winter festival featuring candles and fried delicacies. it celebrates a military victory, and securing religious freedom, over the Seleucid Empire. Additionally, the revlt was a civil war involving those Jews who were loyal to G-d and those who had adopted the Hellenism of the Seleucids.
<urn:uuid:b4e8ad58-d402-44ec-aa28-6718b093c529>
CC-MAIN-2017-34
http://ilove-tshirts.blogspot.com/2013/11/zazzle-t-shirt-from-emunah-designs.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886109670.98/warc/CC-MAIN-20170821211752-20170821231752-00299.warc.gz
en
0.969449
146
3.140625
3
The concept of mestizaje expresses the tensions, contradictions, and ambiguities of its birth in the New World. More important, it is a concept that continues to have spiritual and aesthetic dimensions. Mestizaje refers to racial and/or cultural mixing of Amerindians with Europeans, but the literal connotation of the word does not illuminate its theoretical applications and its more recent transformations. Since its inception in the New World and during those moments when race was a significant factor in social standing, mestizaje has been invoked to remedy social inequality and the misfiring of democracy. In 1925 José Vasconcelos, the Mexican philosopher and educator, wrote La raza cósmica both to challenge Western theories of racial superiority and purity and to offer a new view about the mixing of African, European, and indigenous peoples in Mexico and throughout Latin America. The essay was an effort to undercut the maligned position of indigenous people and their material domination since the conquest, but it was unable to break completely from the civilizing motives of New Spain. Mestizaje was the political ideology of modern national identity, unity, and social progress. Yet Vasconcelos's vision pointed to Iberian culture, particularly Christianity, as the source for modernization and progress. Mexican nationalism has continued to construct its citizens as mestizos. The material and ideological weight of the conquest was also difficult to shake in earlier formations of mestizaje. Even while under Spanish rule, criollos exalted the Aztec or Inca past and condemned the conquest, but their celebration of mestizaje did not include the elimination of economic domination, political disempowerment, and cultural genocide of indigenous populations. Throughout New Spain, claims of mestizaje were meant to indicate a bond against the peninsulares, the Spanish settlers with exclusive rights to high political office, and to legitimate creole equality with peninsulares at home and in Europe. Other classifications of mixture in the caste system were not exalted, and the status of mulattos and others was not reconsidered. Historians agree that during the colonial, independence, and revolutionary periods, mestizaje functioned to reduce cultural, linguistic, and political diversity in Mexico and to authorize the privileged status of ruling elites. In short, the original concept emphasized the assimilation and appropriation of indigenous cultures and the promise of progress and justice through Europe. As such, hybridity was cloaked under the banner of national unity. For the Mexican philosopher Octavio Paz (1914–1998), however, the trauma of mestizaje serves as a symbol of illegitimacy, a concept he develops in Labyrinth of Solitude (1961) and a foundation of his argument on Mexican national character. Chicanos and Mestizaje In contrast, contemporary expressions of mestizaje emphasize hybrid cultural experiences and the relations of power. The social position of contemporary thinkers somewhat explains the late-twentieth-century formulations of mestizaje. Whereas Mexican philosophers were members of the dominant sectors of society, Chicana and Chicano social critics, artists, and creative writers who reformulated mestizaje beginning in the late 1960s did not enjoy such a place in the United States or Latin America. In multiple genres, the earliest Chicano articulations of mestizaje were a strategy of affirmation, liberation, and identity. Mexican Americans join three historical moments and expand the original concept of mestizaje. The first event occurred in 1521 with the Spanish conquest of the Aztec Empire; el segundo mestizaje (the second cultural mixing) occurred at the end of the Mexican-American War (1846–1848), in which the United States annexed over half of Mexico's territory; and the third event is the contemporary cultural interchange among Chicanos and European Americans. All three moments originate in disempowerment and suggest a rebirth. Particularly since the second historical moment, Chicanos and Chicanas have positioned mestizaje as an alternative to the social contract of assimilation. In making parallel the historical legacies of the seventeenth and nineteenth centuries, mestizaje no longer serves a pluralist agenda. In the United States, it functions as an antidote to modern anti-Indian and anti-Mexican sentiments, and although alliances with Native American populations in the American Southwest have been formed, they do not continue to anchor Chicano thought in the same way that Mexico's indigenous and pre-Columbian civilizations inform Chicano and Chicana mestizaje. Chicano mestizaje enacts a void and a congested condition. For example, the poem "I Am Joaquin" (1967) by Rodolfo "Corky" Gonzales expresses a fusion of two opposites, Mexico and the United States, which are blended to form a third cultural experience: Chicano. The hybrid Chicano is neither Mexican nor American. Artists such as Amado Peña (with "Mestizo," silkscreen, 1974) and Emanuel Martinez (with "Mestizo Banner," silkscreen on canvas, 1967) produced the fusion in graphic form with a mestizo tripartite head in which two profiles faced left and right and were united in the third face in frontal position. Other artistic and scholarly proposals overdetermined a gendered mestizaje, emphasizing select indigenous characteristics and a masculine repertoire. Critique and Reformulation While social analysts agree that mestizaje has recuperative properties for Mexican Americans and that it successfully challenges Paz's diagnosis of a mixed nation as pathological, the neoindigenous emphasis can be ironically similar to Western distortions of native peoples, as both rely on a timeless, primordial culture. Chicano/a social critics such as Norma Alarcón and Chon A. Noriega point out that this use of mestizaje constructs a "pure" origin and relies on a static and unchanging past. The essentialist disposition of mestizaje, particularly the romantic neoindigenous perspective, clashes with the reality of Native American experiences as well as indigenous social and political struggles throughout the Americas. Furthermore, as Chicana feminists point out, an essentialist view of Mexican-origin people in the United States also distorts differences and inequalities within said communities. Chicana feminist challenges to patriarchy and homophobia helped to develop the critique of essentialism, and this had a lasting effect on the contemporary notion of mestizaje. In her foundational book, Borderlands/La Frontera: The New Mestiza (1987), Gloria Anzaldúa fleshes out and complicates mestizaje. Performing a postmodern style that mixes autobiography, poetry, mythology, historical document, and documentation into theoretical proclamation, she problematizes conventions of race, nation, sexuality, and gender, drawing attention to fluidity within identity rather than a singular subject position. According to Anzaldúa, mestizaje is the demystification of social boundaries and territorial borders. Thus conceived, the spaces between cultures and nations are porous and flexible. However, it is not just her acknowledgment of internal complexities that makes a mestiza consciousness significant. Anzaldúa does not imagine distinctions in opposition to each other but acknowledges concurrent identities, shifting strategies, and capacities for change. The reformulated concept is more successful at challenging the premise of white racial superiority, purity, and essentialism. Mestizaje is a source of creativity, survival, and triumph. Unlike Mexican and Chicano cultural-nationalist formulations of mestizaje, Anzaldúa acknowledges all combinations and the places of contradiction that can result. Always synthesizing, mestizaje is a force of movement, combination, and transformation. Her own thinking about mestizaje fuses with the Nahuatl concept of nepantla (middle place or place of passage), thereby adding the potential for agency within the concept. Spread and Influence Nonlinear thought and unfixed identities have intellectual and political appeal for numerous fields, especially those also influenced by poststructural and postmodern schools of thought. Because of the liberatory dimensions of the concept of mestizaje, it is widely used in postcolonial, ethnic, and feminist studies and Latino theology. Most credit Anzaldúa with creating the aperture for understanding and theorizing about the ability to have multiple social perspectives and positions with concrete material forms of oppression or privilege. The scholars Chela Sandoval and Emma Pérez, as well as the Latino theologian Virgilio Elizondo, explore the implications of mestiza consciousness for U.S. Third World feminists, including Chicana feminists and Latino Catholic congregations, respectively. For Elizondo, mestizaje is divine grace, which elevates the spiritual qualities of mestizaje as articulated by Vasconcelos but without the Eurocentric imperative. Mestizaje becomes the existence that resurrects humanity, and all have the potential for salvation since Elizondo ultimately describes all cross-cultural contacts as mestizaje. Expansions of the concept by Elizondo and others have been met by intense criticism. Most Latino theologians, such as María Pilar Aquino and Gloria Inés Loya, present its historical specificity as an important term of its experience and path to salvation. The recuperative properties of mestizaje are significant for postcolonial scholars. Both Chicana feminists Pérez and Sandoval reveal how the new mestizaje offers a political method or compass for mobilizing oppositional forms of consciousness that will produce equity. It is a method that develops and exceeds the modes of assimilation, revolution, supremacy, and separatism, each of which is a strategy unable to reconcile or allow for the multiple social positions and perspectives as delineated by Anzaldúa. By the early twenty-first century, the concept of hybridity and cross-cultural contact had permeated social science and humanities scholarship. It also continued to travel North, and French-Canadian scholars relate it to métissage (French; "mixed blood"). Whether universal or not, the contemporary reconfiguration explores sites of convergence and disjuncture with attention to the pressure of power, and its meaning can be used to assess the distance between mestizaje and métissage. Nevertheless, reformulations of mestizaje have recuperative power for those maligned by nation and empire, sexism and homophobia, material and political displacement. If the analysis of intercultural exchange includes attention to ambiguity and contradiction, mestizaje can continue to offer a strategy of resistance and liberation in the twenty-first century. See also Creolization, Caribbean ; Ethnicity and Race ; Identity, Multiple . Alarcón, Norma. "Chicana Feminism: In the Tracks of 'the' Native Woman." In Living Chicana Theory, edited by Carla Trujillo, 371–382. Berkeley, Calif.: Third Woman Press, 1998. Anzaldúa, Gloria. Borderlands/La Frontera: The New Mestiza. San Francisco: Spinsters/Aunt Lute, 1987. Aquino, María Pilar, Daisy L. Machado, and Jeanette Rodríguez. A Reader in Latina Feminist Theology: Religion and Justice. Austin: University of Texas Press, 2002. Elizondo, Virgilio. The Future Is Mestizo: Life Where Cultures Meet. Rev. ed. with a new foreword by Sandra Cisneros and introduction by Davíd Carrasco. Boulder: University Press of Colorado, 2000. Gonzales, Rodolfo "Corky." "I Am Joaquin." In Latino/a Thought: Culture, Politics, and Society, edited by Francisco H. Vázquez and Rodolfo D. Torres, 75–87. Lanham, Md.: Rowman and Littlefield, 2003. Noriega, Chon A. "Between a Weapon and a Formula: Chicano Cinema and Its Contexts." In Chicanos and Film: Representation and Resistance, edited by Chon A. Noriega. Minneapolis: University of Minnesota Press, 1992. Loya, Gloria Inés. "Pathways to a Mestiza Feminist Theology." In A Reader in Latina Feminist Theology: Religion and Justice, edited by María Pilar Aquino, Daisy L. Machado, and Jeanette Rodríguez, 217–240. Austin: University of Texas Press, 2002. Paz, Octavio. The Labyrinth of Solitude: Life and Thought in Mexico. Translated by Lysander Kemp. New York: Grove Press, 1961. Pérez, Emma. The Decolonial Imaginary: Writing Chicanas into History. Bloomington: Indiana University Press, 1999. Sandoval, Chela. "Mestizaje as Method: Feminists-of-Color Challenge the Canon." In Living Chicana Theory, edited by Carla Trujillo, 352–370. Berkeley, Calif.: Third Woman Press, 1998. Vasconcelos, José. The Cosmic Race: A Bilingual Edition. Translated and annotated by Didier T. Jaén; afterword by Joseba Gabilondo. Reprint, Baltimore: Johns Hopkins University Press, 1997. Karen Mary Davalos
<urn:uuid:a08069de-85c0-425a-95b0-ea81fd917dbe>
CC-MAIN-2023-14
https://www.encyclopedia.com/history/dictionaries-thesauruses-pictures-and-press-releases/mestizaje
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948708.2/warc/CC-MAIN-20230327220742-20230328010742-00249.warc.gz
en
0.892772
2,835
3.921875
4
Edward Seymour Somerset, duke of Somerset, Edward Seymour, duke of, 1506?–1552, protector of England. He served on various military and diplomatic missions for Henry VIII and, after the marriage of his sister Jane to the king, was created Viscount Beauchamp (1536) and earl of Hertford (1537). In 1544, as lieutenant general in the north, he invaded Scotland and captured and burned Edinburgh. He took part in the 1545 expedition against Boulogne and became captain general there in 1546. On the death (1547) of Henry VIII Seymour gained custody of the young heir, Edward VI (who was Seymour's nephew) and was named protector of the realm by the council of regency. Shortly thereafter he took the posts of lord treasurer and earl marshal and the title duke of Somerset. He managed to free himself from the restrictions of the council and wielded almost royal authority in effecting major Protestant reforms in the church and in relaxing such measures as the heresy and treason laws. He was ably seconded by Archbishop Thomas Cranmer, and their efforts resulted in the adoption of the first Book of Common Prayer, whose use was required by an Act of Uniformity in 1549. Meanwhile Somerset tried to enforce a marriage treaty arranged by Henry VIII between the young Edward VI and Mary Queen of Scots. He invaded Scotland, crushed his opponents at Pinkie (1547), and completely alienated the Scots when he laid waste to SE Scotland. The fall and execution (1549) of his brother, Baron Seymour of Sudeley, lord high admiral, was a strong blow to the protector's authority and power, and John Dudley, earl of Warwick (later duke of Northumberland) took advantage of this and other misfortunes. Joining Thomas Wriothesley, earl of Southampton, and others, he deprived (1549) Somerset of the protectorate and imprisoned him in the Tower of London. Somerset was released in 1550, but a revival of his influence led Warwick to arrest (1551) him again, whereupon he was convicted (1552) on a charge of felony and beheaded. Somerset was a man of firm beliefs and military ability. See M. L. Bush, The Government Policy of Protector Somerset (1975). The Columbia Electronic Encyclopedia, 6th ed. Copyright © 2012, Columbia University Press. All rights reserved. More on Edward Seymour duke of Somerset from Fact Monster: See more Encyclopedia articles on: British and Irish History: Biographies
<urn:uuid:ce517284-e1dc-4e3e-99da-b24060accc78>
CC-MAIN-2013-48
http://www.factmonster.com/encyclopedia/people/somerset-edward-seymour-duke-of.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164580801/warc/CC-MAIN-20131204134300-00003-ip-10-33-133-15.ec2.internal.warc.gz
en
0.968125
528
3.46875
3
The photosynthetic scheme begins when the pigments of the light‐ harvesting complex absorb a photon of visible light. The absorption of light excites the pigment to a higher energy state. The pigments transfer their excitation energy to the reaction center chlorophyll molecule. Two types of reaction centers exist, generally called Photosystem I (PSI) and Photosystem II (PSII). Thus, two types of overall reactions make up photosynthesis—the light and dark reactions—while two more types of reactions compose the light reaction—those carried out by PSI and PSII. Absorption of a photon causes either type of chlorophyll to become more easily oxidized—that is, to give up an electron. The electron given up by either chlorophyll molecule flows through an electron transport chain, just as the electron given up by a mitochondrial cytochrome flows through the mitochondrial electron transport chain. Just as in mitochondrial electron transport, the flow of electrons leads to a proton gradient, which is used to synthesize ATP. Unlike mitochondrial electron transport, the terminal electron acceptor isn’t oxygen but rather NADP. The photosystem pigment of PSII is a form of chlorophyll termed P680, because it is a pigment that absorbs light with a wavelength of 680 nanometers . Absorption of a photon by P680 leads to the excited form of the pigment, called P680*. P680* but not ground‐state P680 gives up an electron to another molecule, plastiquinone Another way of stating this relationship is that P680* has a more negative reduction potential than does P680. The following equation gives the free energy of the reduction reaction. The conversion of the P680 to P680* means that the free energy of its accepting an electron becomes more positive (the reaction is unfavored). A molecule that has a more positive free energy of reduction has a more negative free energy of oxidation. In other words, the P680* molecule is more easily oxidized than is P680. The electron from P680* is transferred to a series of plastiquinone (PQ) derivatives, leaving behind an oxidized P680 molecule, as shown in Figure . The reduction of plastoquinone is similar to that of Coenzyme Q in mitochondrial oxidation/reduction, in that PQ can accept either one or two electrons at a time. Plastiquinone molecules accept a proton (H+) from the stroma for each electron they accept. This leaves the stroma more basic than it was before, creating part of the gradient that will be used for ATP synthesis. From the quinones, the electron is transferred to plastocyanin and then to cytochrome bf. The two H + ions (protons) left behind remain in the thylakoid lumen. As the electrons move down this electron transport chain, protons are pumped into the thylakoid lumen. Eventually the transported electron is given up to the oxidized P700 chlorophyll of Photosystem I. This movement of an electron to PSI from P680* leaves P680 in a non‐excited, oxidized state. Oxidized P680 must be reduced to give up another electron. Hydrogen atoms derived from H 2O reduce it according to the reaction: This oxidation transfers four electrons to the Manganese Center, a complex metalloprotein, which then donates the electrons through an intermediate to oxidized P680. The protons derived from water are transported into the thylakoid lumen. The protons pumped into the thylakoid lumen by PSII are used to make ATP through the action of coupling factor, in a mechanism similar to that of mitochondrial ATP synthesis. Just as the absorption of a photon of light converts P680 to P680*, which is a better reductant, so too does the absorption of light convert the chlorophyll of PSI to a species that gives up an electron more easily. P700* donates an electron to a series of mobile quinones and then to a ferredoxin protein. The ferredoxin reduces NADP to NADPH. This provides reducing power for conversion of CO 2 to carbohydrate. After P700* donates the electron to the quinones, oxidized P700 accepts an electron from the cytochrome bf, which is the acceptor of the electron from Photosystem II. The reduced P700 is now poised to absorb a photon’s energy and the cycle can start over.
<urn:uuid:3712a838-5956-433d-910f-acea19f27237>
CC-MAIN-2014-15
http://www.cliffsnotes.com/sciences/biology/biochemistry-ii/photosynthesis/light-reactions
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609537804.4/warc/CC-MAIN-20140416005217-00464-ip-10-147-4-33.ec2.internal.warc.gz
en
0.900746
941
3.96875
4
Earth's atmosphere protects Earth's surface by burning up most objects and pieces of space debris as they fall through it. Because Mercury doesn't have a true atmosphere, its surface is riddled with thousands of craters. None of them quite compare, however, to Mercury's largest crater. Astronomers believe that a 100 km wide asteroid hit Mercury about 4 billion years ago, creating a area of impact 1,525 km wide. This crater, called the Caloris Basin, is so large that the entire U.S. state of Texas (about 1,244 km wide) would fit inside it, with plenty of room to spare.
<urn:uuid:84f943f3-30f0-40d9-907d-b6612034c830>
CC-MAIN-2023-40
https://www.experimonkey.com/facts/astronomy/mercury
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511170.92/warc/CC-MAIN-20231003160453-20231003190453-00809.warc.gz
en
0.960903
126
3.890625
4
"They seized him, beat him, and sent him away empty-handed. Again he sent them another servant. And that one they beat over the head and treated shamefully." Mk 12: 3-4 Charles Lwanga, a catechist who refused to renounce his faith even after seeing many of his Ugandan companions martyred, reminds us again of the power of God's grace. Despite being lured by King Mwanga into the royal court and promised real power over others, Charles would not deny his faith. More, even after he was condemned to die, he continued to urge others to follow Christ. Although it is sometimes forgotten or ignored by Catholics, Charles was killed along with nine Anglican young men who might not be called martyrs but certainly gave their lives for the Gospel, and deserved to be honored for their sacrifice. Although Charles is revered in Africa and throughout the world for his willingness to die for his beliefs, his life is also a good reminder to work together with other Christians for a just world. While we might disagree about how to speak of the Eucharist or the role of the Holy Father, we surely do agree about what it means to serve and cling God in the face of persecution. Today, accept whatever suffering comes to you because of your commitment to the Gospel. What do you most admire in people willing to give their lives for the faith?
<urn:uuid:eeeeb108-8773-41e9-86fe-07de54281623>
CC-MAIN-2020-24
http://brjackspreachingministry.blogspot.com/2019/06/st-charles-lwanga-and-companions.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347414057.54/warc/CC-MAIN-20200601040052-20200601070052-00377.warc.gz
en
0.984333
285
2.515625
3
For the very first time, scientists have managed to create tiny, embryonic brains in test tubes. Say hello to baby Frankenstein. Researchers at the Institute of Molecular Biotechnology of the Austrian Academy of Science have successfully created "cerebral organoids," little balls of brain just a few millimeters in size that actually have the same distinct, defined sections that a real, developing brain would have. They are the babiest of brains. Each cerebral organoid is the equivalent of the sort of brain you'd expect to find in a nine-week-old embryo. So they're developing, but not quite developed. Madeline Lancaster, one of the paper's authors, described the brains this way to The Guardian: The cerebral organoids display discrete regions that resemble different areas of the early developing human brain. These include the dorsal cortex identity – the dorsal cortex is the largest part of the human brain – they also include regions representing the ventral forebrain and even the immature retina. Even at this super early stage of development, scientists expect that these organoids could be a big help in discovering the secrets of how neurological problems like schizophrenia and autism are expressed in early development. On top of that, they could be useful for testing drugs on something more human than a rate or petri dish of isolated cells. The organoids were created by throwing some stem cells into a vat of gel designed to mimic the human womb. And after just a few weeks, they began to coalesce into the tiny brain-balls. That's where the growth stops though, and so far it seems impossible that they could ever grow any larger or more complex without the sophisticated sort of arterial plumbing that natural brains can grown on their own. So we're not quite on our way to brains in jars, but scientists have now successfully created heart tissue that can beat, 3D-printable kidneys, and stem cell brainlets. And as amazing as this all is, don't expect and full-sized jar-grown brains anytime in the near future. Then again, that sounds creepy enough to be worth avoiding. [The Guardian, New Scientist]
<urn:uuid:e0a0452b-1291-4394-8996-5f9f94411005>
CC-MAIN-2017-43
https://gizmodo.com/scientists-have-grown-tiny-human-brains-in-test-tubes-1216019761
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823153.58/warc/CC-MAIN-20171018214541-20171018234541-00080.warc.gz
en
0.956317
431
3.453125
3
Our ideal picture of our chickens is usually of a quietly clucking flock making their way through green pasture, collecting healthy bugs and plants on the way. But it's not always like that. Chickens have a very strong sense of hierarchy – who should be the dominant bird in even a small flock, who deserves first place in the food queue, who gets the best place on the roost at night. And that can sometimes cause problems. It's called the "pecking order", and this article covers: Pecking order: theory and meaning. The pecking order was first identified back in 1922 by a Norwegian zoologist, Thorleif Schjelderup-Ebbe. He first conceived of the term "pecking order" after watching his own flock of chickens and the way they interacted. His findings were widely published in 1935(1). Since then, it's been identified in many other species, and the name in academic research has morphed to become "dominance hierarchy". In chicken circles, it's still known as the pecking order. It just fits. It's basically quite a complex social system which will be formed in any flock of more than three chickens(2). Some chickens – Schjelderup-Ebbe called them the "despots" – are allowed to peck everyone, and are therefore top of the pecking order. Others are ranked less high, until at the bottom of the ladder there are those who never peck, but are always the recipients of pecking. Birds at the top of the pecking order will normally have the best of everything: food, water, treats, nest box, place on the roost, room in the dust bath, and access to the rooster or hen of choice for mating... Others must take their place as defined by where they are in the hierarchy. Meaning that some birds can find their lives made miserable, chased from the feeder or even prevented from entering the coop. Chickens can be ruthless. If you've ever raised chicks, you'll know that fighting to establish a pecking order can start very early – research suggests as quickly as two weeks post-hatch(3). Baby chicks are naturally curious, so it's important not to make snap judgements but to watch their behaviour. These two, for example, could be checking each other out, or spoiling for a fight. In fact, they were just curious. There was no pecking order nastiness and they ended up being the best of friends in my coop. To identify pecking order behaviour you'll see chicks "charging" at each other, chasing their brooder-mates or actively and constantly pecking smaller chicks. There's a difference between groups based on size and gender, though: The key to Schjelderup-Ebbe's research was his view of chickens as individuals, not a general species(1). He recognised that individual differences play their part in forming the flock's hierarchy. Those differences include... It can and does(1). As with all relationships, it's a dynamic rather than static situation, so as the make-up of the flock changes, so will the pecking order. That change can be slow, over a number of months, or very quick if a situation arises which challenges it. Some of the known reasons for change are: In the photo below, you can see my well established flock (outside the run) visiting a new group of adults. The new flock is kept in a run placed inside the main fenced run, so that both flocks can see and hear each other but not yet integrate. When the two groups are mingled, the pecking order is likely to change as the chickens work out where the newbies fit into the hierarchy. The fact that the two groups have been able to get to know each other at a distance is likely to reduce the incidence of pecking order problems when they're mixed. The best and only way to do this is, as all researchers have done, to spend time with your flock. Having all the information about what the pecking order means and how it's formed makes watching your chickens' behaviour and the relationships between members of your flock fascinating. Take note of who dominates and who loses out by watching who... Managing the pecking order is a natural behaviour which should be left to the flock to sort out. You won't be able to change it, no matter how unpleasant it may seem. However, there are times when it can descend into bullying behaviour. A full-on pecking order fight can be vicious – sometimes fatal. Chickens who persistently bully other chickens are detrimental for the flock and need to be managed. Research scientist Eli Strauss says this: "The view that dominant animals act as benevolent leaders of their groups is wishful thinking... Individuals holding high status use their status to advance their personal interests"(4). And in his original research, Schjelderup-Ebbe goes even further: "The face of the despot would radiate with joy of satisfied pecking-lust and the fury could clearly be observed in its eyes". So bullying can simply be a dominant chicken becoming a little too full of him / herself and wanting total flock domination rather than using her position to ensure the smooth running of relationships. It can take forms other than full-on fighting though, such as... Watch for these signs within your flock. If you see any of them, it's time to act. She was dealt with by isolating her from the flock until she had learned some manners. Bullying can be reduced in a number of ways, including isolating the bully. This in itself can cause problems though, so there are a number of other steps to try first. 1. Make sure your chickens have enough space both inside and outside the coop. Having insufficient space is known to lead to feather-pecking, a known symptom of bullying. 2. If possible, allow your flock to free range. As well as having individual space, being able to forage widely distracts and stimulates, so bullying becomes far less likely. 3. If free-ranging is not possible – and it's always risky – design as large a run as possible, making sure it's securely fenced. 4. If your dominant chicken is guarding feeders and waterers, other flock members will potentially die. Make sure that there are two or three different points in the run where they can access food and drink. 5. Add "boredom busters" (known in the chicken industry as "environmental enrichment") to the run and coop to create more distractions. Find 25 different ways to prevent boredom, here and put some of them into action now! 6. Whatever you do, do not remove the victim(s) from the coop unless she has been physically injured. The time comes when the only option to stop chicken bullying is to remove the offender from the flock. When is that time? If, despite all your efforts, the bully is persistent to the extent of drawing blood, for example, or if the victim(s) are clearly miserable, then it's time to take decisive action – even if the offender is very young. The earliest I've had to isolate was a two week old chick. He grew up to be a superb dominant guardian but needed teaching manners at that young age. He spent three days in a penned-off corner of the brooder and came out a different chick. Using solitary confinement should be the last resort. It takes careful planning both to remove the offender and to reinstate him / her at the right time. How to manage isolating a chicken: click this link for a detailed article. And always remember: you cannot change the pecking order of a flock. You can simply deal with the problems if it becomes an issue of bullying. A lot of "facts" you'll find on the internet are often people's individual views, based on inaccurate information repeated from poor quality sources. The information I provide in this article and others is based not just on my own experience, but on evidenced facts from scientific, peer-reviewed research and books from highly respected and experienced poultry keepers such as Gail Damerow. Some of the trusted sources I have used in this article are these. 1. Schjelderup-Ebbe, T: Social behavior of birds. Pub. A handbook of social psychology, Clark University Press, 1935. 2. Scarf, Damian: Pecking Order. Pub. Encyclopedia of Animal Cognition and Behavior, 2019. 3. Jacob, Dr. J: Normal behaviors of chickens in small and backyard poultry flocks. Pub. University of Kentucky, 2020. 4. University of Cincinnati. Unlocking the mysteries of the pecking order. Pub. ScienceDaily, 2022. 5. Strauss, Eli, et al: The centennial of the pecking order: current state and future prospects for the study of dominance hierarchies. Pub. The Royal Society, Biological Sciences, 2022. 6. Schjelderup-Ebbe, T: Contributions to the social psychology of the domestic chicken. Pub. Dowden, Hutchison and Ross, 1975.
<urn:uuid:f6787e5a-7fbf-42b5-af4c-3a1b703a3e41>
CC-MAIN-2023-40
https://www.raising-happy-chickens.com/pecking-order.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510481.79/warc/CC-MAIN-20230929022639-20230929052639-00433.warc.gz
en
0.955633
1,940
3.375
3
It is generally assumed that the Earth's surface was warm during most of its early history but that significant cooling occurred between 2.45 and 2.22 Ga leading to the first global and cyclical glacial epoch. This onset of snowball Earth conditions was coeval with a large pulse of oxygenation that permanently oxygenated the atmosphere and shallow oceans (Great Oxygenation Event, GOE), though it is not known whether one influenced the other or if they were independent events. Hereafter we used a General Circulation climate Model (GCM) to estimate the partial pressures of atmospheric CO2 (pCO2) and CH4 (pCH4) required to account for the onset of snowball Earth conditions during the Paleoproterozoic. We show that Earth's surface can be maintained in an ice-free state under atmospheric CO2 concentrations lower than 2.6 × 10 -2 bar without invoking the need of high CH4 concentrations. Assuming that the cooling of the Earth's surface is related to the collapse of atmospheric greenhouse gases, we tested the relevance of different scenarios including (i) the collapse of pCH4 in response to the GOE and (ii) the drawdown of pCO2 due to both a decrease in volcanic outgassing rate and an increase in global weathering efficiency. We show that the cyclical character of Paleoproterozoic glaciations is best explained by a long-lasted decrease of pCO2. To support this scenario, we examine how the long-term carbon cycle and the equilibrium pCO2 respond to the emplacement of large subaerial basaltic provinces (LIPs) and to a temporary shutdown of volcanism as supported by geologic data. We show that the sink of pCO2 through silicate weathering is limited by the absence of terrestrial higher plants. In such conditions, the equilibrium pCO2 remains high enough to preclude the onset of snowball conditions regardless the intensity of the pCH4 collapse. The combination of an increase in weathering efficiency and a decrease in volcanic outgassing rate can significantly reduce the equilibrium pCO2, thus favoring the onset of glaciations. Such a buffering of atmospheric CO2 cannot initiate global glaciations alone. Yet, it remains a required condition for the initiation of a snowball Earth event in response to the collapse of pCH4, possibly after 2.32 Ga. © 2014 Elsevier B.V. Teitler, Y., Le Hir, G., Fluteau, F., Philippot, P., & Donnadieu, Y. (2014). Investigating the Paleoproterozoic glaciations with 3-D climate modeling. Earth and Planetary Science Letters, 395, 71-80. https://doi.org/10.1016/j.epsl.2014.03.044
<urn:uuid:b2807bb7-2107-4a53-baa0-4628c1f9f850>
CC-MAIN-2020-16
https://research-repository.uwa.edu.au/en/publications/investigating-the-paleoproterozoic-glaciations-with-3-d-climate-m
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371656216.67/warc/CC-MAIN-20200406164846-20200406195346-00463.warc.gz
en
0.889785
575
2.921875
3
Goldman Sachs’ Black Women Initiative Reveals Financial Struggles Caused By Workplace Disparities Goldman Sachs’ One Million Black Women Initiative asked over 2,500 adults, including 600 Black women, about their finances to shed light on the critical workforce disparities impacting Black women and families across the country, Business Insider reports. The “Money Matters: One Million Black Women Economic Mobility Survey” is a first-of-its-kind report that reveals the current economic state of Black women in America. Findings show that 40% of Black women in the United States have annual household incomes under $50,000, compared to 24% of adults in the U.S. who earn the same amount. The study also finds that 71% of Black women say they live paycheck to paycheck, compared to 63% of the general population. As a result, Black women are forced to live check to check while carrying growing debt, including student loans and medical bills. Other disparities include access to quality, affordable childcare, lack of career advancement, and adequate health insurance, among many others. The grim findings highlight the 42% of Black women who work full-time or part-time and say they lack opportunities for career advancement or promotion. This is compared to 35% of U.S. adults who feel the same. While Black women have health insurance, only 43% receive it through their employer compared to 53% of adults nationwide. Retirement savings are more difficult for Black women as only 49% have a 401(k) or other retirement savings, compared to 62% of the overall U.S. adult population. Paid sick leave sees only 50% of Black women receiving the benefit compared to 56% of the rest of the general population. For Black women on the job search, 19% report childcare as a barrier affecting their job search, while only 11% of U.S. adults say the same. Despite the grim findings, 63% of Black women report optimism about their financial futures. Goldman Sachs hopes the report will help spark systemic change and close the earnings gap for Black women. By seeing Black women grow financially, the U.S. annual GDP could rise by as much as 2.1% each year and generate 1.2 to 1.7 million U.S. jobs since Black women are the fastest-growing group of entrepreneurs in the country. “Goldman Sachs research has shown that one of the fastest ways to accelerate change and effectively begin to address the racial wealth gap is to listen to and invest in Black women,” Asahi Pompey, Global Head of Corporate Engagement and President of the Goldman Sachs Foundation said.
<urn:uuid:635709d2-a5fa-4d60-a7d4-9119b41d5cee>
CC-MAIN-2023-50
https://www.blackenterprise.com/goldman-sachs-black-women-workplace-disparities/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100047.66/warc/CC-MAIN-20231129010302-20231129040302-00773.warc.gz
en
0.949012
546
2.546875
3
why pollen is important h Spring, you've been missed. Would have loved you more, if you choose not to bloom and send out the pollen all at the same time... but it would not be so beautiful! Talking of pollen, did you know that the study of pollen is called Palynology and that each type of flower produces its own specific shape of pollen . . just like snowflakes?? I had studied this many many moons ago and it is fascinating! Truly - no geek talk here. A decent microscope, some simple dyes, a slide and a slide cover, some sunshine and you'll see all sorts of amazing shapes of pollen, and patterns on the pollen surface! It is a great way to get kids out in the garden too if they are not already covered in mud by now - as mine often is this time of the year. Pollen is meant to help most plants propagate and make seeds. Plants therefore need either wind, water or a carrier (human / animal / bug / bird) to take pollen from its original flower to another, so seeds can be made, fruits and vegetables can grow etc. The shape of pollen and its overall patterns etc help it go from one plant / flower to another by either sticking to the carrier, having the ability to float on a liquid surface, or float - in the air until a few of them reach the desired target... meaning we are all sneezing and itching, because we are either breathing or carrying pollen during this time of the year! The different kinds of pollen also helps us in the garden. Interplanting vegetables with suitable flowers (or even other vegetables) is always encouraged - so that it becomes easier for pollen to move between two plants. Some plants naturally attract bug-predators too. I often will plant zinnia's and marigolds with my tomatoes for a bountiful harvest. So, think of all these things when you are beginning your gardens! In my garden - we are going to wait a little before I plant anything. I cant wait to find what survived this strange winter we've had in Georgia. Hopefully my peonies come back - they always do better with a little dusting of snow but we had a little more than that. I am fearful that my ginger-lilies did not make it, but have my fingers crossed. Our vegetables often serve as a salad bar for all the critters, so we may not provide those this year (also because I may be travelling during the summer), but instead I will be planting a handful of tall and colorful sunflowers along the deck, so I can watch all the birds come by. I hope you are making some exciting progress with your gardens and enjoying the weather as much as you can! I know I am :) <a href="http://www.bloglovin.com/blog/13860063/?claim=ejzw9t2askz">Follow my blog with Bloglovin</a>
<urn:uuid:3f3db988-adb0-4dc4-8d1e-66a142a7f8e8>
CC-MAIN-2020-29
https://www.currycravingskitchen.com/single-post/2015/03/20/The-first-day-of-Spring-Aaachooo
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655886516.43/warc/CC-MAIN-20200704170556-20200704200556-00104.warc.gz
en
0.964906
609
2.578125
3
[mam-uh l] /ˈmæm əl/ any vertebrate of the class Mammalia, having the body more or less covered with hair, nourishing the young with milk from the mammary glands, and, with the exception of the egg-laying monotremes, giving birth to live young. any animal of the Mammalia, a large class of warm-blooded vertebrates having mammary glands in the female, a thoracic diaphragm, and a four-chambered heart. The class includes the whales, carnivores, rodents, bats, primates, etc 1826, anglicized form of Modern Latin Mammalia (1773), coined 1758 by Linnaeus for the class of mammals, from neuter plural of Late Latin mammalis “of the breast,” from Latin mamma “breast,” perhaps cognate with mamma. Any of various warm-blooded vertebrate animals of the class Mammalia, whose young feed on milk that is produced by the mother’s mammary glands. Unlike other vertebrates, mammals have a diaphragm that separates the heart and lungs from the other internal organs, red blood cells that lack a nucleus, and usually hair or fur. All mammals but the monotremes bear live young. Mammals include rodents, cats, dogs, ungulates, cetaceans, and apes. A class of vertebrates characterized by the production of milk by the females and in most cases, by a hairy body covering. Most mammals give live birth to their young. Human beings are mammals. /ˈmæmæˌplæstɪ/ noun (pl) -ties 1. cosmetic surgery to alter the size or shape of the breast mammaplasty mam·ma·plas·ty or mam·mo·plas·ty (mām’ə-plās’tē) n. Reconstructive or cosmetic plastic surgery to alter the size or shape of the breast. [mam-uh-ree] /ˈmæm ə ri/ adjective, Anatomy, Zoology. 1. of or relating to the or breast. /ˈmæmərɪ/ adjective 1. of, relating to, or like a mamma or breast adj. 1680s, from French mammaire (18c.), from Latin mamma “breast,” probably from the child’s word for “mother” (see mamma). mammary mam·ma·ry (mām’ə-rē) adj. Of or relating to a […] noun 1. . noun, Anatomy. 1. any of several arteries that distribute blood to the muscles and organs of the thorax: used as a replacement artery in coronary bypass surgery. mammary artery n. The internal thoracic artery or the lateral thoracic artery. thoracic artery n. - Mammary duct mammary duct n. See lactiferous duct.
<urn:uuid:49ecbd71-cc0c-43be-afa3-6650ccea4a8a>
CC-MAIN-2017-26
http://definithing.com/define-dictionary/mammals/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128329372.0/warc/CC-MAIN-20170629154125-20170629174125-00208.warc.gz
en
0.830107
660
2.875
3
In Australia, copyright law is contained in the Australian Copyright Act 1968. A simple definition of copyright is that it is a bunch of rights in certain creative works such as text, artistic works, music, computer programs, sound recordings and films. The rights are granted exclusively to the copyright owner to reproduce the material. Copyright owners can prevent others from reproducing or communicating their work without their permission or may sell these rights to someone else. In Australia, copyright protection is automatic. A work will be protected as soon as it is put into material form. The Australian Copyright Council (ACC) believes in the values copyright laws protect: creative expression. Click on the link below to access copyright resources. The ACC grants permission to download and print one copy of an information sheet per user. Creative Commons is a global nonprofit organisation that enables sharing and reuse of creativity and knowledge through the provision of free legal tools. Turnitin is an electronic text matching system. The database contains copies of electronic text on the Internet, in published works, on commercial databases, and in assignments previously submitted to Turnitin by students all over the world. Turnitin provides an Originality Report in which 'matched' text is underlined, colour coded, and linked to either the original source or a similar document on its database. The report also provides a Similarity Index. The library has an up-to-date collection of Australian Copyright Council publications available on the shelf: 346.940482 AUS Check the the library catalogue links for availability or to place a hold. The National Copyright Unit (NCU) has produced copyright guidelines, information sheets and notices for Australian Schools and TAFE.
<urn:uuid:3056bf9b-c8c3-4749-a60b-e63a0a7e2506>
CC-MAIN-2020-29
https://libguides.anmf.org.au/anmfvic/copyright
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655898347.42/warc/CC-MAIN-20200709034306-20200709064306-00127.warc.gz
en
0.903158
344
3.328125
3
This paper reports a normative study on the phonological development of British English-speaking children. Speech samples of 684 children, aged between 3;0 and 6;11 years, randomly selected from nurseries and schools in eight different areas throughout the UK, were collected and analysed to obtain normative data. This paper reports on two aspects of speech development: the age of acquisition of sounds (phonetic acquisition) and the age that error patterns were suppressed (phonemic acquisition). It discusses the effects of age, gender and socio-economic status on speech sound development. The study found that older children had more accurate production and fewer error patterns in their speech. It found no gender differences in the younger age groups. However, in the oldest age group, it found the phonological accuracy measures of girls' better than boys. It found no significant effects of socio-economic status on any of the phonological accuracy measures.
<urn:uuid:7698cd90-b0bf-49c9-9ecb-5ca866775261>
CC-MAIN-2023-23
https://pubmed.ncbi.nlm.nih.gov/14977026/?dopt=Abstract
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644867.89/warc/CC-MAIN-20230529141542-20230529171542-00574.warc.gz
en
0.96556
184
2.703125
3
Tutorial: Intensity or Loudness A sound wave’s amplitude is the change in pressure as the sound wave passes by. If you decrease the amplitude, you are making the sound softer. Characteristics that scientists use to describe sound, such as amplitude, can be related to a picture of a wave. The amplitude of a wave is related to the amount of energy it carries. A high amplitude wave carries a large amount of energy; a low amplitude wave carries a small amount of energy. The average amount of energy passing through a unit area per unit of time in a specified direction is called the intensity of the wave. As the amplitude of the sound wave increases, the intensity of the sound increases. Sounds with higher intensities are perceived to be louder. Relative sound intensities are often given in units named decibels (dB).
<urn:uuid:bd14eed7-1b05-485f-8101-a0e30e0ce737>
CC-MAIN-2017-47
http://dosits.org/tutorials/science/tutorial-intensity/
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934804610.37/warc/CC-MAIN-20171118040756-20171118060756-00318.warc.gz
en
0.907275
171
4.375
4
Many know of the life and accomplishments of Mother Teresa, but not many know of her upbringing and early life. Of course, the way children are raised plays a big part in how they grow up and who they grow up to be. By learning about the early life of Mother Teresa, we can see how the way her parents raised her played a big part in her personality and later life. She grew up to be one of the most well known woman in the world for her good deeds and helping the poor of the world, due at least in part due to her parents. Here are some lessons that parents can learn from Mother Teresa’s life. Not having a lot of money is not necessarily a bad thing Some parents feel like they have to give their children al the latest toys and electronics, and if they can’t afford extravagant gifts for holidays and birthdays, or can’t afford to put their kids in several extracurricular activities, that they are doing a disservice to their child. This is not the case. Often children who grow up with less learn to appreciate things so well. When Mother Teresa was a young girl, her father died, and her family became poor. However, Mother Teresa did not let that negatively affect her. Even if you have the money for a lot of things, try teaching your children to use it to give to charities or good causes. Mother Teresa had a good life at first, and she always shared what she had with others. The advice you give your kids matters We often remember the advice our parents give us when we’re young. The points of view of parents often influences their children’s, and this was true in the case of Mother Teresa and her parents. When they were well off, her father advised her and her siblings to share everything they had. So she and her brother and sister often shared what they had. “Never eat a single mouthful unless you are sharing with others”, he told them. Their mother further advised them that when they do good, it should be done quietly, “as if you were throwing a stone in the sea.” Therefore they knew not to brag or expect any reward for what they did. And when she grew up, Mother Teresa was extremely generous, without expecting anything in return.
<urn:uuid:80067136-3216-44f4-836d-e6bd965d2c3a>
CC-MAIN-2017-39
https://kidsteachers.wordpress.com/2014/11/12/the-story-of-mother-teresa-and-the-importance-of-good-parenting/
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818685993.12/warc/CC-MAIN-20170919183419-20170919203419-00239.warc.gz
en
0.986982
475
2.890625
3
While the past decade has seen great strides in medical technology, it hasn’t seen solutions to all of our health problems. There were novel viruses that threatened to kill us all. There were toxins in our children’s toys, and we were told to worry about the junk they were eating. Some of these threats turned out to be almost nonexistent. Others were arguably overblown. Some caused widespread harm. So what new threats have been robbing you of sleep since the annual odometer rolled over from 1999 to 2000? Here’s a list from ABC News of the top ten new threats of the last ten years. 1) Swine Flu (H1N1) Since it came to public attention in the United States in April, the largest health scare of 2009 has been swine flu. While other forms of the virus typically peak in February and largely affect the elderly, this strain of the H1N1 flu virus came out of season and mostly affected younger people. In June, the World Health Organization declared the virus a pandemic, meaning that it was widespread on multiple continents. Manufacturers began producing vaccine at the end of the spring, but there were shortages nationwide, even late into the fall. While the majority of cases of the flu have been mild, thousands of American deaths have been attributed to the virus. But no matter the severity, many health experts agree there are lessons to be learned. “We just have to note, and this was a bit scary, that when H1N1 came along in communities… our capacity to take care of [patients] was stretched,” said Dr. William Schaffner, Chair of the Department of Preventive Medicine at Vanderbilt University Medical Center. “We don’t have a lot of reserve in the health care system anymore.” Here are some of my blogs on the topic: 2) Bisphenol A (BPA) While much of the alarm over the chemical bisphenol A, or BPA for short, has come lately, scientists have been looking at it for years. In January of 2000, an article in the Journal of the American Dental Association discussed how BPA — which is used in some dental sealants — was not found at detectible levels in the body more than a few hours after the treatments. Since then, studies have shown the chemical to cause birth defects in lab animals, and even create some problems in humans in high doses. The chemical, used in household plastics, has also been found in babies, leading to increased scrutiny from regulatory bodies. But while we know it is present in humans and can create problems at high levels, it remains unclear what the effect of BPA is in humans at lower doses. “I would say that there’s growing evidence that it is a significant concern, but it’s not clear yet how much of a concern,” said Joel Schwartz, a professor of epidemiology at the Harvard School of Public Health and director of the Harvard Center for Risk Analysis. “There’s a lot of things that still need to be understood, but there’s certainly enough things to say, ‘Yes, this is something that needs to be on our radar screen.'” Here are some of my blogs on the topic: 3) Lead Paint On Toys From China In 2007, a number of products made in China were recalled — but perhaps the recall that drew the most attention was of children’s toys containing lead paint, including some from the popular Thomas the Tank Engine line. The problem wasn’t so much one of scientific analysis as it was of enforcement. “We do know that lead is bad for you,” said Schwartz. “Kids and toys are a bad place to put that exposure together. That’s a case where that’s just outrageous.” The exact effects of the oversight are unknown, but it did shine a spotlight on imported goods. “It’s doing a little more to make sure this stuff doesn’t keep slipping in,” said Schwartz. Concern over trans-fats — found in such crowd-pleasing but doctor-disapproved foods as doughnuts and French fries — came to a head in 2006, when New York City became the first city to ban trans-fats from restaurants. “The issue became viral, and a lot of it was related to population studies that came out of Harvard University,” said Keith-Thomas Ayoob, director of the nutrition clinic at the Albert Einstein College of Medicine. “The problem with them is they tend to raise bad cholesterol and lower good cholesterol.” In response to doctors’ concerns, most trans-fats have been removed from food products — but in many cases they may have been replaced by saturated fat, which can also be harmful in excess. Ayoob said trans-fats were “an easy whipping post.” Trans-fats may have disappeared because they were easy to replace with other ingredients. And ultimately, the virtual disappearance of trans-fats may be a better testament to the power of economics in responding to consumer demand than that of regulation responding to public complaints. “It’s box office poison now, is what it is. No one really wants to list that on an ingredient list,” said Ayoob. “That’s one where the food industry responded much more quickly than government ever would have. It just didn’t pay to keep it in there.” Here are a couple of my blogs on the topic: 5) Bird Flu (H5N1) This year’s swine flu pandemic wasn’t the first time Americans were concerned with a strain of flu named for an animal. At the beginning of the decade, avian influenza was a concern in Southeast Asia because of the devastation it was causing in chicken populations. But concerns soon arose about its spread to humans and the possibility it would mutate into a form that could spread from person to person. “These new influenza viruses usually are modified viruses that come from birds, and now, we know, swine,” said Schaffner. “We know that influenza viruses change on an annual basis… The world’s population will be or will virtually be completely susceptible.” But concerns over avian flu did have one positive effect for the flu vaccine industry, which has been maligned for its reliance on old technologies to create the vaccine each year. Because antigens for flu vaccines are grown in chicken eggs, it was hard to develop a vaccine for a virus that was deadly to birds, and so work had to be done to begin developing a means of creating antigen without using eggs. Although the new manufacturing processes are not available yet, “It was exactly H5N1 bird flu that stimulated a number of new ways to create new vaccine,” said Schaffner. “What we see now actually came forward as a consequence of all that concern with H5N1.” 6) Severe Acute Respiratory Syndrome (SARS) SARS was the first novel virus to captivate the world’s attention this decade after it was identified by the World Health Organization in February 2003. The respiratory infection was first reported in Asia and then spread to North America, South America and Europe before being contained. Like influenza, the virus could spread through airborne particles, but it was far more deadly when it infected someone. According to the WHO, 8,096 people were infected worldwide. 774 people died. The virus receded by the end of 2003. “SARS-like infections, I think, epitomize the emerging infectious diseases,” said Schaffner. As for whether the strain could re-emerge, he said, “My crystal ball is pretty cloudy about that… Trying to anticipate whether it would come back or not would be very, very difficult.” 7) Methicillin-Resistant Staphylococcus Aureus (MRSA) MRSA is the best-known of a number of bacteria that resist many of the antibiotics used to treat them. The emergence of MRSA and other bacteria has been blamed on a combination of heavy use of antibiotics and a lack of incentives for drug companies, leaving these bacteria, as Schaffner calls it, “a real, very vital threat” Schaffner said the existence of these bacteria puts responsibility on both food producers and people who would use antibiotics to be more prudent. But he also said the problem could be compounded by the fact that there is currently little financial incentive for drug companies to devise new antibiotics that could fight the threat. “Clearly, pharma sees the development of new antibiotics to help us treat these drug-resistant infections as high-risk and low-profit,” said Schaffner. “I can think of no new product in any line of industry that, once it’s released, the experts in that area say, ‘Don’t use it,’ and that’s the circumstance when any new antibiotic is created.” MRSA is not untreatable, but when using the stronger antibiotics for it, “You get yourself into a very restricted corner,” Schaffner said. “You get patients to whom these drugs are incredibly toxic or you may need to keep patients in the hospital rather than send them home.” Here’s one of my blogs on the topic: 8) Hormone Replacement Therapy At the start of the decade, millions of women were using hormone replacement therapy to relieve unpleasant symptoms of menopause. It was also used prevent osteoporosis and bone fractures, and heart disease as well. But as early as 2000, some doctors were recommending against the treatment because of a study in the Journal of the American Medical Association suggesting that it increased the risk of breast cancer. That alarm greatly increased in 2002 when researchers cut short the Women’s Health Initiative study of the treatment, citing concerns over heart problems and strokes in women in the study who received HRT. Some researchers supported the decision to stop the study, leading many women to stop their HRT, but others felt that it discouraged women who should continue the treatments. Meanwhile, studies have come out with contradictory findings, further confusing women who were unsure what to do. Controversy over HRT continued in 2008, when the International Menopause Society released new guidelines saying that HRT was effective for post-menopausal symptoms and should be considered by women and their physicians. Following the release of the new guidelines, ABC News contributor Dr. Marie Savard wrote a column for this site in which she tried to clear up some of the confusion. “There is no question that for a woman with severe hot flashes, sleep disturbance and an annoyingly dry vagina, nothing else works as well as estrogen,” Savard wrote. “But the risks of breast cancer, stroke and blood clots from estrogen are hard to ignore… So once again, women are asked to balance the benefits of hormones with the risks and make the best decision for them.” Here are some of my most popular blogs on the topic: Here are some of my logs on Bio-identical Hormones: After the collapse of the World Trade Center in 2001, five people died after inhaling anthrax bacteria sent through the mail. But the public at large had little to fear from a tainted envelope. “That was obviously not a major health problem but a significant problem for a small number of people who have been getting exposed,” said Schwartz. “I think the primary concern was this might be being used to kill some people.” Senators Tom Daschle of South Dakota and Patrick Leahy of Vermont, among other public figures, had letters mailed to their offices containing anthrax. No one was ever convicted of sending the letters, but the Federal Bureau of Investigation reportedly planned to charge government researcher Bruce Ivins in the case before he committed suicide in the summer of 2008. 10) Cell Phones As cell phones became more popular this past decade, concerns over the radiation they emit – and what effect they might have on human health — have proliferated. Some have worried that their use may be linked to the development of brain tumors. Thus far, however, most research suggests there is little to worry about. Animal studies have shown that magnetic fields can affect melatonin levels, so while radiation only shows up in low levels, it’s unclear what effect it has on humans. And a Scandinavian study released last week in the Journal of the National Cancer Institute confirmed what many have been saying about cell phone safety, showing no increase in brain cancer among cell phone users. “Whether they do something worth worrying about, that’s another question,” said Schwartz. Similar questions are raised about high-voltage power lines, but Schwartz urged calm. “It seems to be an issue where it hasn’t completely resolved, but I would say the evidence is that if something is going on it’s not that big.” Of course, cell phones present an unquestioned safety hazard to Americans, but not for reasons related to radiation. Studies have shown that their use while driving poses a very real hazard. “That’s pretty clear – talking on a cell phone and driving is like driving drunk,” said Schwartz. “The radiation effects – that doesn’t look like that’s a major public health issue. That doesn’t look very compelling.” Here is a blog of mine on the topic:
<urn:uuid:9da5619d-d08a-430b-a63c-6e53bee551f1>
CC-MAIN-2014-41
http://www.drwalt.com/blog/tag/bpa/
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1412037663718.7/warc/CC-MAIN-20140930004103-00348-ip-10-234-18-248.ec2.internal.warc.gz
en
0.968464
2,879
2.8125
3
The framework is designed for implementers and evaluators of literacy programs, who are looking to design or re-design the measurement strategy for their program. The framework may be particularly useful for individuals at small-medium-sized organizations with limited monitoring and evaluation resources. Sections I & III (Program Performance and Measurement How-To's) are generally relevant regardless of the level(s) of readers your program is working with. Section II (Literacy Outcomes) contains individual dimensions that may be more relevant for specific populations. Broadly, we define these populations as: Emerging readers: Individuals who are still learning the building blocks of literacy, but can't yet read. These individuals can recognize print, interpret pictures, and have gained control of (mother tongue) oral language skills (spoken or signed). This group generally includes young children before they are of school-going age, preschoolers, etc, or older children and adults just beginning learning a second or third language. Early readers: Individuals who are beginning to link together letters and sounds (decode) to those who can read basic texts. Early readers are starting to be able to read short sentences and whole, simple texts. Intermediate readers: Individuals who are able read a range of texts with fluency, and engage with the meaning of these texts on increasingly more advanced levels. Intermediate readers are generally able to use reading as a tool for learning and acquiring information. This group may include students from upper primary school through middle grades. Advanced Readers: Individuals who are able to read complex, longer texts, synthesize and interpret these texts, pick up on more subtle cues within the texts and manage competing information. This includes reading and understanding texts with unfamiliar structure and being able to critically evalute texts. This group may include students in secondary school and beyond. Note, these levels of literacy are used for the sake of categorization, but in real life situations they may not be as neat and organized-- these categories are not mutually exclusive, nor linear, and there may be overlap between levels; that is, readers may be advanced more advanced in certain contexts and topics, but are operating with lower reading level when dealing with others. Additionally, these levels are not necessarily age-specific, as adult readers may also be reading at any of these levels. In multilingual environments in particular, readers may be at multiple different stages simultaneously, perhaps at more advanced stages in a mother tongue and more elementary levels in their second or third languages. No, there may be some outcomes or activities that are relevant to your individual program that are not listed here. As an example, some educational programs include both a literacy and a numeracy component, however this framework does not go into numeracy. The framework should not be considered an exhaustive list, but a broad overview of areas to consider with regards to measurement in literacy programs. No, this framework is designed as a starting point to work from, to give you new ideas to consider with regards to designing your measurement strategy and how to make it more holistic, and to provide you with resources you may not have known about. Not every dimension will be relevant for your program. This framework includes a wide variety of resources that may be relevant to measurement activities in literacy programs. This includes academic papers, toolkits, practical guides, program evaluations and relevant websites. The resources may provide direct guidance on monitoring, evaluation and learning, or they may serve as examples of how other organizations have approached measurement. Generally the resources are relevant to multiple dimensions, as well as topics not covered by this framework, and in the case of longer documents, users may need to skim them to find the specific information that is relevant to them. While the importance of the dimensions listed here are well-documented throughout literacy research, resources and guidance is scarce for some of them. One of the goals of this framework is to highlight areas where more research, tools and guidance are needed. We will update this framework periodically to add more resources, so please feel free to share links with us through the form at the bottom of the home page, and, where applicable, encourage your own organization to consider developing knowledge products that address any of the underresourced dimensions listed here. No, this framework does not address national standards for literacy assessment for individual countries. The framework addresses broad concepts that are relevant to measurement to literacy programs.
<urn:uuid:bf327761-fc5a-401a-8241-943bfc4edd19>
CC-MAIN-2023-23
https://cei-resources.webflow.io/faq
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648911.0/warc/CC-MAIN-20230603000901-20230603030901-00760.warc.gz
en
0.945971
886
3.234375
3
Blue ArchitectureCopyright: © Verena Hake Blue as the color of the sky and the sea is almost omnipresent in nature. Traditionally connotated with vastness and distance, with longing and infinity, blue also stands for the dematerialized, the divine, for the incomprehensible, for the ephemeral. The reasons for the use of blue in visual arts and its recurrent thematization in literature are well researched. Thus – to give just two examples – Mary's mantle is frequently depicted in blue from about the 12th century onwards, and numerous texts of the Romantic period repeatedly deal with the topos of the search for the "blue flower". Architectural history research, on the other hand, has never taken a fundamental look at the motives for the use of blue in architecture. This is even more astonishing since the blue color of those buildings usually does not automatically result from the main building material. Rather, one can observe that they are wrapped in a blue robe only after their structural completion, and that they are undergoing a chromatic finish through the application of plaster, a coat of paint, or glazed ceramics. Accordingly, the presence of the color blue in architecture is never a coincidence or automatism, but always to be understood as the deliberate result of a specific design decision, as an intentionally created characteristic of the building that it dresses. The research project "Blue Architecture" systematically deals with searching and finding, documenting and interpreting blue architecture from Babylon to the present. Following a diachronic, cross-cultural and cross-typological research approach, blue spaces of all scales are investigated – entire cities, individual buildings and interiors. The goal of the research project is to precisely describe the effects and atmosphere of these spaces, to trace the particular genesis of "their" blues, and thus to uncover and to understand their multifaceted layers of meaning, which are often inextricably linked to the color. The results of the research project are currently being summarized in the form of an English-language catalog volume supplemented by a scientific essay section.
<urn:uuid:bf69a912-83b3-404b-9b36-423d9342dada>
CC-MAIN-2023-40
https://ages.rwth-aachen.de/cms/AGES/Forschung/Forschungsprojekte-A-Z/~idcfp/Blaue-Architektur/lidx/1/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510334.9/warc/CC-MAIN-20230927235044-20230928025044-00411.warc.gz
en
0.95209
424
2.890625
3
The CFD General Notation System (CGNS in short) provides a general, portable, and extensible standard for the storage and retrieval of computational fluid dynamics (CFD) analysis data. It consists of a collection of conventions, and free and open software implementing those conventions. It is self-descriptive, machine-independent, well-documented, and administered by an international steering committee. It is also an American Institute of Aeronautics and Astronautics (AIAA) Recommended Practice. The system consists of two parts: (1) a standard format for recording the data, and (2) software that reads, writes, and modifies data in that format. The format is a conceptual entity established by the documentation; the software is a physical product supplied to enable developers to access and produce data recorded in that format. The CGNS system is designed to facilitate the exchange of data between sites and applications, and to help stabilize the archiving of aerodynamic data. The data are stored in a compact, binary format and are accessible through a complete and extensible library of functions. The API (Application Program Interface) is platform independent and can be easily implemented in C, C++, Fortran and Fortran90 applications. How can CGNS help you? * It improves the longevity (archival quality) of data * It makes it easier to share data files between sites and collaborators * It is easily extendible to include almost any type of additional data you can think of The CGNS project originated in 1994 as a joint effort between Boeing and NASA, and has since grown to include many other contributing organizations worldwide. In 1999, control of CGNS was completely transferred to a public forum known as the CGNS Steering Committee. This Steering Committee is made up of international representatives from government and private industry. Additional history on the development of CGNS is available here. The principal target of CGNS is data normally associated with compressible viscous flow (i.e., the Navier-Stokes equations), but the standard is also applicable to subclasses such as Euler and potential flows. The CGNS standard includes the following types of data. * Structured, unstructured, and hybrid grids * Flow solution data, which may be nodal, cell-centered, face-centered, or edge-centered * Multizone interface connectivity, both abutting and overset * Boundary conditions * Flow equation descriptions, including the equation of state, viscosity and thermal conductivity models, turbulence models, multi-species chemistry models, and electromagnetics * Time-dependent flow, including moving and deforming grids * Dimensional units and nondimensionalization information * Reference states * Convergence history * Association to CAD geometry definitions * User-defined data Much of the standard and the software is applicable to computational field physics in general. Disciplines other than fluid dynamics would need to augment the data definitions and storage conventions, but the fundamental database software, which provides platform independence, is not specific to fluid dynamics. - Release 3 implements CPEX 0027 (Time-dependent Connectivities), CPEX 0030 (Zone Sub-Regions) and CPEX 0031 (General SIDS Improvements). Also includes Marc Poinet's fix to return HDF5 children in creation order.
<urn:uuid:77d8e263-8803-4b15-a42c-6908077481a6>
CC-MAIN-2013-48
http://linux.softpedia.com/get/Programming/Libraries/CFD-General-Notation-System-41872.shtml
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163037952/warc/CC-MAIN-20131204131717-00047-ip-10-33-133-15.ec2.internal.warc.gz
en
0.917582
689
2.609375
3
LibreOffice is exactly the same as OpenOffice. However, OpenOffice became the property of the company Oracle when Oracle bought Sun Microsystems that oversaw the development of OpenOffice. Some people fear that Oracle might make changes that go against the philosophies of open source software. LibreOffice was created by taking the exact same code as OpenOffice, and releasing it under a name that was not owned by Oracle. So, to answer your question from the point of view of usage, there is no advantage or difference in terms of using the OpenOffice or LibreOffice... at least, not yet, as, so far as I know, Oracle has no significantly changed it. Ubuntu decided to use LibreOffice simply because the developers did not want to be connected to Oracle.
<urn:uuid:967bdef7-3294-461b-a4a0-e316aa9aaa2e>
CC-MAIN-2014-23
http://askubuntu.com/questions/180232/why-ubuntu-12-04-is-shipped-with-libre-office/180234
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997883898.33/warc/CC-MAIN-20140722025803-00008-ip-10-33-131-23.ec2.internal.warc.gz
en
0.97008
157
2.625
3
Baku Ateshgah ”Fire Temple” The Baku Ateshgah or “Fire Temple” is an ancient Hindu castle-like religious temple dedicated to Jwala Ji in Surakhani, a suburb of greater Baku, Azerbaijan, which was initially recognized as a Zoroastrian fire worship place. The pentagonal complex, which has a courtyard surrounded by cells for monks and a tetrapillar-altar in the middle, was built during the 17th and 18th centuries. It was abandoned after 1883 when oil and gas plants were established in the vicinity, ending the flow of natural gas to the temple and extinguishing the holy fire. The Baku Ateshgah was a pilgrimage and philosophical centers of fire worshipers from Multan (now located in Pakistan), who were involved in trade with the Caspian area via the famous “Grand Trunk Road”. The four holy elements of their belief were: ateshi (fire), badi (air), abi (water), and heki (earth). The temple ceased to be worshiped after 1883 with the installation of petroleum plants (industry) at Surakhany. The complex was turned into a museum in 1975. The annual number of visitors to the museum is 15,000. The Temple of Fire “Ateshgah” was nominated for List of World Heritage Sites, UNESCO in 1998 by Gulnara Mehmandarova. Read more http://en.wikipedia.org/wiki/Ateshgah_of_Baku
<urn:uuid:d592528a-2644-443e-95e7-8bd9d314d84f>
CC-MAIN-2017-47
http://gailvoice.com/baku-ateshgah-fire-temple/
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805894.15/warc/CC-MAIN-20171120013853-20171120033853-00645.warc.gz
en
0.975243
325
2.609375
3
Chihayahuru (ちはやふる) is a manga series illustrated by Yuki Suetsugu (末次由紀). Because it features a girl who plays Karuta, the series Chihayahuru can play an important role in introducing Karuta to people beyond Japan. Karuta (かるた or カルタ), a traditional card game in Japan, has been played since the Genroku period (1688-1704). There are a several types of Karuta – Iroha Karuta, Uta Karuta, and Kyodo Karuta, to name a few. Each type of Karuta is based on a different theme. For example, Iroha Karuta is based on proverbs, and each card starts with a different Hiragana character. Since Iroha Karuta were created before the standard order of Hiragana was changed after WWII, these cards follow the pre-war order of hiragana. Karuta games are usually played for fun, but they are also used pedagogically to teach children Japanese letters. Karuta is a simple and fun game and it is a good opportunity to learn about Japanese culture. For information on how to play Karuta, wikihow.com offers detailed English instructions. To learn more about Karuta, check out the following Japanese language books in OSUL: - Iwanami Iroha Karuta Jiten (岩波いろはカルタ辞典) by Tokita Masamizu (2004 Iwanami Shoten)- a dictionary of Iroha Karuta. It explains the metaphor of the poems and include sample images of the Karuta cards. - Edo no Yūgi (江戸の遊戯) by Namiki Seishi (2007 Seigensha) – introduces kaiawase(貝合わせ) and sugoroku (すごろく). Kaiawase was very similar to Karuta except instead of playing cards, Kaiawase used elaborately painted sea shells. Sugoroku is a game similar to “chutes and ladders” and was first played during the Edo period. The book also explains the difference among various kinds of Karuta.
<urn:uuid:751bec0e-4c8b-4b59-918e-8443575b746f>
CC-MAIN-2017-43
https://library.osu.edu/blogs/manga/author/hosoi-1osu-edu/
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187821017.9/warc/CC-MAIN-20171017091309-20171017111309-00705.warc.gz
en
0.932245
486
3.109375
3
For many years parents have warned their children about strangers. Although the “stranger danger” mantra is quite catchy, is this the best way to protect our children from people that may hurt them? Although parents often fear that strangers will abuse their children, according to the Australian Bureau of Statistics’ (2005) Personal Safety Survey, only 11% of children victimised sexually were victimised by a stranger. More often, children are abused by someone they know such as relatives, neighbours or family friends. Child abusers usually begin with the offender building trust and friendship. They are unlikely to fit the strange, lurking man at the park stereotype. And even if a child has not previously met the person, once the person introduces themselves and strikes up a conversation then guess what? This person is no longer a stranger! So you can see how warning children against strangers may not be the most effective way to teach personal safety. What do we do instead? Pattie Fitzgerald, a child safety expert from Safely Ever After suggests we teach children about Tricky People. Books to start the conversation about personal safety:
<urn:uuid:b7c428c7-a996-44fd-a441-50c3654c9f6a>
CC-MAIN-2023-50
https://www.hopscotchandharmony.com.au/blog/goodbye-stranger-danger-introducing-the-tricky-person
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100164.87/warc/CC-MAIN-20231130031610-20231130061610-00578.warc.gz
en
0.954201
224
2.765625
3
While the flat plates like the above are certainly indefinite in pitch, cymbals can be made and turned to such a fine degree that they do acquire a recognizable pitch. However, since they are rarely if at all, instruments for melody they are here included with the plates. Cymbals are musically definable as a pair of large or small concave bell-metal or brass plates. The two sections, similar in all respects, are clashed against each other. The collision may be face to face or rim to rim (tinkling), either vertically or horizontally. In shape they fall somewhere between a full cup (bells, etc.) and plain plates. Though they can be said to be roughly 'concave', the actual shapes are many. The simplest is just concave without any noticeable flat rim. Others have narrow or wide rims with a central deep concavity, the boss. Deep cup-shaped cymbals are also known. Further, the two parts may be tied together by means of string or held separately. In either case, there is a hole in the centre of the cymbals through which the thread passes. The general term for such idiophones is Tal or Talam. This is obviously related to the word and act of rhythm. Often, even the word Kartal is employed. Indeed, any two pieces held in hands and clashed become a Kartal. The present author has seen in an interior village of Orissa a tribal using the bases of oil Drutais as a Kartal and even calling them so. The regional varieties are also many and so are the names. The instrument is not used in concert music, except perhaps with the Nagasvaram, but is an invariable rhythmic accompaniment to devotional music- Bhajan, Abhang, Devarnama, as well as in some forms of dance. In dance the Nattuvanar or the dance conductor employs it as his principal rhythm keeper. The larger sized plates go under various names like: Brihattala Brahmatala and so on. Similarly, the Assamese Bortal is a big bronze cymbal slightly thin, but with a large boss. Indeed, these Brihattalas may have a diameter anywhere from 15 to 30 cm. They are also called Jhanj or Jhallari (Jhallara) in some parts of north India and the corresponding word in south India is Jalra. The smaller variety (about 7 cm in diameter) comprises the Manjeera or Tal (north India) and Tala or Kaajam (south India). Other types are the Elattalam and Kuzhittalam from Kerala; both are of bronze, about 12 cm diameter and half a centimeter in thickness. The former is more or less flat and the latter has a deep boss. The Tchechka and Thiski (Thiska) are rhythm keepers found among the tribes of Bihar and Madhya Pradesh. In the case of struck plates, a plate of metal is beaten with a rod, a mallet or the hand; that is, the two-parts of the instrument are not the same in shape and quality. The commonest is a bronze plate struck with a wooden rod, which may be a plain stick or hammer-shaped, and is used in tribal and folk music. The metal disc has usually a diameter of 20 cm. A general practice is to convert the plate used for eating food, as and when the occasion arises, into a musical instrument: hence the name thali for the instrument in the northern areas of the country (thali-plate). The methods of playing also vary. The names differ according to the region and language: Chenkala or Chennala (Malayalam), Semmankalam (Tamil), Jagte Orjagante (Kannada), Thali (Hindi), Ghadiyal (Rajasthani) and so on. While the plates generally seen are of fairly uniform thickness the Ghanto (Orissa) and Kansi (Bengal), for instance, are thicker in the centre than at the periphery, thus capable of giving out different tones. The best known shaken plates are the Chimta, of Punjab and Haryana, or the Chimpia of Rajasthan and the Lezim of Maharashtra. |More Articles in Percussion Instruments (37)|
<urn:uuid:72641e09-4be7-4967-ae9a-3ced71102148>
CC-MAIN-2023-23
https://www.indianetzone.com/52/plates.htm
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224645089.3/warc/CC-MAIN-20230530032334-20230530062334-00095.warc.gz
en
0.948785
919
3.15625
3
One way to think about the role of responsibility in a free society is to imagine a society where freedom is absent. Writers from ancient times have drawn sketches of just this sort of society. These imagined Utopias–conjured up by Plato, Thomas More, and the medieval monk Campanella–have all been similar in their broad outlines. Property is held in common and distributed by the magistrates according to need. Children are raised collectively. There is no freedom of association, freedom of education, or freedom to enter or exit the community. And since individual decision-making is forbidden, developing a sense of responsibility is a moot point. Our ancestors enjoyed reading such thought experiments for amusement, enchantment, and philosophic reflection, but they were never considered plausible political programs. Until this century. Between these earlier Utopian visions and us today stands the imposing figure of Marx. His speculations must be put in a different category from the older Utopias because he was not performing a mental experiment but, rather, advancing a political platform. Because of our tragic experience of the ghastly totalitarian regimes of this century, we know all too well that such schemes as Marx’s result not in Utopia, but in chaos and darkness. The end of freedom is, by necessity, the end of responsibility, and the end of responsibility is the end of civilization. By assuming responsibility for ever-expanding sectors of society, government renders the rest of society less responsible. Charles Murray put his able finger on this problem when he wrote that “the most important change in social policy during the last thirty years” was “Not the amount of money government spent. Not how much was wasted. Not even the ways in which the government hurt those it intended to help. Ultimately, the most important effect of government’s metastasizing role was to strip daily life of much of the stuff of life”–that “stuff of life” being, “feeding the hungry, succoring the sick, comforting the sad, nurturing the children, tending the elderly, and chastising sinners.” To make individuals more responsible, we must ask government to assume less control over their lives, for resolution to social problems is more often achieved, not by experiments in the uses of power, but by relations characterized by virtue and its necessary predicate, liberty. Intelligent discussion about liberty and responsibility requires an examination of the role of coercion in social relationships, and it is on this score that we are required to look at the extent to which government has assumed, or has been permitted to assume, responsibility in areas of life that were previously under the domain of civil society. It would be a mistake to construe this project as essentially anti-government; it is no more anti-government than a lifeguard is anti-water. When swimmers behave irresponsibly around water, or when the undercurrent of the tide is, unknown to the swimmer, strong and deadly, then it is time for the lifeguard to sound the alarm. When observing its proper tasks–national security, enforcement of contracts, defense of property, and, above all, protection of the right to life–government is a good thing. But to say government is a necessary institution is not to say it is the morally primary one. We cannot achieve heaven here on earth, nor should we try. We can, however, recapture freedom and a traditional understanding of responsibility. If this is to be done, though, the crucial instruments of change will not be the functionaries of the state, but the father whose faithfulness to his family forms the moral tenor of succeeding generations and the mother whose reverence for and nourishing of life ensures the very existence mankind’s future.
<urn:uuid:3d1428a6-f47c-47cf-aa77-f6170f866a3e>
CC-MAIN-2017-43
https://acton.org/pub/religion-liberty/volume-8-number-4/role-responsibility-free-society
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824537.24/warc/CC-MAIN-20171021005202-20171021025202-00212.warc.gz
en
0.962865
763
2.921875
3
The Clise planetarium, on the first floor of the Hall of Science, serves to introduce students to the constellations, coordinate systems, and seasonal changes in the night sky. In addition, the Astronomy Department provides planetarium presentations for local groups (e.g., school classes); these presentation are usually given by advanced astronomy students who are interested in improving their speaking and teaching skills. Equipment includes a Spitz 512 instrument and computers and projectors for multimedia presentations. If you are a group leader wanting to schedule a visit, contact Andrea Dobson by email ([email protected]). - The observing lab on the roof of the Hall of Science has a dozen small telescopes available during (clear) evening lab periods for astronomy student use. These include 8-10-inch Newtonians, 8-inch Celestron Schmidt-Cassegrains, a 4-inch Takahashi refractor, a 9-inch refractor, a 14-inch dobsonian, and a particularly fine 4-inch Alvan Clark refractor. The Celestron telescopes are equipped to do white-light solar observing and a narrow-band H-alpha filter is available on the Takahashi. - A dome on the roof houses a 14-inch Celestron used for student research projects. It is mounted on a Paramount Go-To mount and primarily utilizes a SBIG STL-1100M CCD camera with UBVRI, LRGB, and H-alpha filters. - The Bracher observatory 9 miles north of town houses a 16-inch Newtonian (and also serves as a dark-sky site for introducing students to fainter constellations). - The department is also part of the AASTA consortium which is installing a 30-inch telescope at a dark site between Walla Walla and the Tri-Cities. That telescope will be available for student research projects when it becomes available in the near future. The Astronomy Department computer lab has eight computers with five Windows-based machines and three Macs along with a flatbed scanner and the departmental laser printer. Students doing research have access to several additional computers running Linux including a six-core Xeon workstation. A wide range of scientific and astronomical software (such as IRAF and IDL) is available for student use. Color and poster printing are available using equipment shared with other science departments. On the roof of the Hall of Science is a weather station is connected to a console located on the first floor of the Science Building in the display case next to the seismograph and streamflow station. Readings from the weather station are displayed in real time at weather.whitman.edu.
<urn:uuid:b77f61b2-b93a-4256-97cb-2acc379d3b7e>
CC-MAIN-2014-41
http://www.whitman.edu/academics/courses-of-study/astronomy/facilities
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1412037663007.13/warc/CC-MAIN-20140930004103-00406-ip-10-234-18-248.ec2.internal.warc.gz
en
0.920039
550
2.703125
3
21 Things You May Not Know About the Indian Act: Helping Canadians Make Reconciliation with Indigenous Peoples a Reality written by Bob Joseph founder of Indigenous Corporate Training Inc. is a member of the Gwawaenuk Nation. This 178-page book is an essential guide to understanding the legal document and its repercussion on generations of First Nations, written by a leading cultural sensitivity trainer. Since its creation in 1876, the Indian Act has shaped, controlled, and constrained the lives and opportunities of First Nations, and is at the root of many enduring stereotypes. In the first 105 pages the author writes with clarity about the history of this legislation that defines a First Nation person from birth to death. Using everyday language interspersed with humour he allows secondary level students as well as the general public access to a piece of legislation not many Canadians understand. The remainder of the book provides lists such as a chronology of residential school history, the Truth and Reconciliation Commission's Call to Action, and terminology. Also provided are selected classroom activities and discussion questions and selected quotes from John A. Macdonald and Duncan Campbell Scott. This highly recommended book is a must have for secondary schools (Civics and Citizenship 10) as well as public libraries.
<urn:uuid:04e305bb-1d4a-4850-9e5c-f903ec213eba>
CC-MAIN-2023-23
https://goodminds.com/products/9780995266520
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224657720.82/warc/CC-MAIN-20230610131939-20230610161939-00061.warc.gz
en
0.950027
251
3.109375
3
The use of cannabidiol (CBD) has gained significant popularity in recent years due to its potential health benefits. One area where CBD has shown promise is in promoting heart health. In this article, we will explore the potential benefits of CBD for heart health and how it may help improve cardiovascular function. Before diving into the benefits of CBD for heart health, it is essential to understand what CBD is. CBD is one of the many cannabinoids found in the cannabis plant. Unlike its counterpart, tetrahydrocannabinol (THC), CBD does not have psychoactive properties, meaning it does not cause a “high” sensation. CBD interacts with the endocannabinoid system (ECS) in our bodies, which is responsible for regulating various physiological processes, including cardiovascular function. By interacting with the ECS, CBD may help promote balance and homeostasis within the body, potentially benefiting heart health. The Role of CBD in Promoting Heart Health Reducing Inflammation: Inflammation plays a significant role in the development and progression of cardiovascular diseases. CBD has been shown to possess anti-inflammatory properties, which may help reduce inflammation in the cardiovascular system. By reducing inflammation, CBD may contribute to better heart health and reduce the risk of heart-related conditions. Lowering Blood Pressure: High blood pressure (hypertension) is a common risk factor for heart disease. Studies have suggested that CBD may help lower blood pressure levels. One study found that a single dose of CBD reduced resting blood pressure in healthy individuals. By reducing blood pressure, CBD may help alleviate strain on the heart and improve overall cardiovascular function. Preventing Oxidative Stress: Oxidative stress occurs when there is an imbalance between the production of harmful free radicals and the body’s ability to neutralize them. This imbalance can lead to damage to various organs, including the heart. CBD has been shown to possess antioxidant properties, which may help prevent oxidative stress and protect the heart from damage. Managing Anxiety and Stress: Chronic stress and anxiety can have detrimental effects on heart health. CBD has been widely studied for its potential to reduce anxiety and stress levels. By promoting a sense of calm and relaxation, CBD may help lower heart rate and blood pressure, reducing the strain on the cardiovascular system. How to Incorporate CBD for Heart Health Now that we understand the potential benefits of CBD for heart health, let’s explore how to incorporate it into our daily routine: Consult with a Healthcare Professional: Before starting any new health regimen, it is crucial to consult with a healthcare professional. They can provide personalized advice and guidance on whether CBD is suitable for you, considering your medical history and current medications. Choose Quality CBD Products: There are various CBD products available in the market, including oils, capsules, and topicals. When purchasing CBD, opt for reputable brands that provide third-party lab testing to ensure product quality and purity. Start with a Low Dosage: It is advisable to start with a low dosage of CBD and gradually increase it as needed. Each individual’s response to CBD may vary, so finding the optimal dosage might require some experimentation. Monitor Your Response: Pay attention to how your body responds to CBD. Keep a journal, noting any changes in symptoms, stress levels, or overall well-being. This information can help you determine if CBD is positively impacting your heart health. Maintain a Healthy Lifestyle: While CBD may offer potential benefits for heart health, it should not replace a healthy lifestyle. Regular exercise, a balanced diet, and stress management techniques are equally important for maintaining a healthy heart. In conclusion, CBD shows promise as a potential aid in promoting heart health. Its anti-inflammatory, blood pressure-lowering, antioxidant, and stress-reducing properties may contribute to cardiovascular well-being. However, it is important to note that more research is needed to fully understand the long-term effects of CBD on heart health. If you are considering incorporating CBD into your routine, consult with a healthcare professional to ensure its suitability for your individual circumstances. What is CBD? - CBD is one of the cannabinoids found in the cannabis plant that does not cause a high sensation and interacts with our body’s endocannabinoid system. How does CBD promote heart health? - CBD promotes heart health by reducing inflammation in the cardiovascular system, lowering blood pressure levels, preventing oxidative stress, and managing anxiety and stress. Can CBD reduce inflammation in the cardiovascular system? - Yes, CBD has anti-inflammatory properties that can help reduce inflammation in the cardiovascular system, contributing to better heart health. Does CBD lower blood pressure? - Studies have suggested that CBD may help lower blood pressure levels, which can alleviate strain on the heart and improve overall cardiovascular function.
<urn:uuid:076e82a0-842a-4a1b-a679-4c6521fa913b>
CC-MAIN-2023-40
https://utahhealthsciences.net/cbd/cannabidiol-for-heart-health/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506479.32/warc/CC-MAIN-20230923030601-20230923060601-00882.warc.gz
en
0.924031
1,017
2.75
3
The Silent Battles of PTSD and Depression Post-traumatic stress disorder (PTSD) and depression are two of the most debilitating mental health conditions that a person can experience. These conditions often occur together and can lead to devastating consequences if not properly treated. Unfortunately, people who suffer from these illnesses often suffer in silence, because the stigma surrounding mental health often discourages them from seeking help. PTSD is a condition that is triggered by experiencing or witnessing a traumatic event. The symptoms of PTSD can include flashbacks, nightmares, severe anxiety, and avoidance behaviors. Depression, on the other hand, is a pervasive feeling of sadness and hopelessness that can make it difficult to function normally. People who suffer from PTSD and depression face a daily battle that is often invisible to those around them. They may feel overwhelmed, anxious, and depressed for no apparent reason. They may find it difficult to concentrate or complete everyday tasks. They may feel isolated and withdrawn from their friends and loved ones. The silent battles of PTSD and depression are particularly difficult because they often go unnoticed by others. People with these conditions may appear fine on the outside, but they are struggling to cope with their feelings and emotions on the inside. This can make it difficult for them to seek help or support, as they may feel ashamed or embarrassed about their condition. It’s important to remember that PTSD and depression are not weaknesses, but rather medical conditions that require proper treatment. Therapy, medication, and support groups are all effective ways of managing these conditions. People who suffer from PTSD and depression can take steps to improve their mental health, including getting enough sleep, eating a healthy diet, and practicing self-care activities such as exercise and meditation. If you have a friend or loved one who is struggling with PTSD or depression, it’s essential to offer them support and encouragement. Let them know that they are not alone and that there is no shame in seeking help. Encourage them to seek professional help and offer to go with them to their appointments or support group meetings. In conclusion, the silent battles of PTSD and depression are often overlooked, but they are very real and can have serious consequences if left untreated. It’s essential to recognize the signs of these conditions and seek help when needed. With the right treatment and support, people with PTSD and depression can manage their symptoms and lead healthy, fulfilling lives.
<urn:uuid:f7f7bb8d-35b2-4513-9d07-d4e9a176206b>
CC-MAIN-2023-23
https://www.mentalhealthblurb.com/the-silent-battles-of-ptsd-and-depression/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656869.87/warc/CC-MAIN-20230609233952-20230610023952-00144.warc.gz
en
0.970227
484
3.40625
3
Learning Through Playing Games The other night we played Rummikub , a game with tiles that are placed on the table. It seems to be a numerical cross between scrabble and the card game rummi. We had a great time once we got the hang of playing. With most new games we relax the rules until we've learned how to play. Playing games like this has always been more of a cooperative, friendly past-time rather than an emphasis on competitiveness. Yesterday I woke up with a combined game and craft activity buzzing around my head. It's for younger children, but the craft activity could suit an older child. I called it Hickory Dickory A Clock & Counting Game . When my children were young I loved making up games. Sometimes they'd pop into my head but most of the time I'd have a particular skill I wanted the children to learn and would create a game to suit. Games included ones like Hickory Dickory; dice, board or card games; role playing games; or games with toys. Playing games with my children was the easiest way to educate them! If you have a game you like to play, or one that you've modified to suit your children, or one that you've made up and you'd like to share it with others on the Homeschool Australia website, please email me . Was this article helpful? Was it worth $1.00 to you? Your gift of $1 or more helps to keep this site operating offering encouragement and reassurance to families wanting better outcomes for their children. Together with the support of my family, my aim is to help parents educate their children in stress-free, nurturing environments. In addition to building and maintaing this website, I continue to create and manage local and national home educating networks, help to organise conferences and camps, as well as write for, edit and produce newsletters, resource directories and magazines. I am an active support of national, state, regional and local home education groups. I am currently giving this site a much needed facelift! Welcome to the We began educating our three children in 1985, when our eldest was aged five years. In truth, we had helped them learn what they need to learn as they grew and explored and discovered this amazing world since the moment they were born. I am a passionate advocate of allowing children to learn unhindered by unnecessary stress and competition, meeting developmental needs in ways that suit their individual learning styles and preferences. Ours was a homeschooling, unschooling and natural learning family! There are hundreds of articles on this site to help you build confidence as a home educating family. I hope that your home educating adventure is as satisfying as ours was! The information on this website is of Home education is a legal alternative Without revenue from advertising Thank you for visiting! Beverley Paine, The Educating Parent The opinions and articles included on this website are not necessarily those of Beverley and Robin Paine, nor do they endorse or recommend products listed in contributed articles, pages, or advertisements. Site Map. Text and images on this site © All Rights Reserved 1999-2017.
<urn:uuid:15e56242-0269-43c8-949c-41a51c66ddeb>
CC-MAIN-2017-43
http://theeducatingparent.com/articles/learnthroughplay.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824537.24/warc/CC-MAIN-20171021005202-20171021025202-00738.warc.gz
en
0.970124
649
2.515625
3
There’s a foundational question that every project starts with: accept the freedom to roll your own solutions along with the burdens that go with it, or take the chance to use sensible defaults that allow you to move quickly, but hide a multitude of decisions and set you on a prescriptive path. Deciding whether or not to use an opinionated framework for your next project will have significant implications, both over the short term of getting the product to market on time and over the long haul. It can affect how easy your application will be to maintain and modify in order to meet changing needs. The answer may not always be clear or easy, but it'll help you learn when to choose the big opinionated framework. In this article, we'll look at some opinionated versus non-opinionated frameworks and what use cases make sense for taking either path. We’ll also apply this thinking to use cases that are a better fit for an opinionated platform as a service (PaaS) or for a less opinionated infrastructure as a service (IaaS). This will help you make the best choice when building your own apps. What are “Opinionated” Frameworks? A framework, by definition, makes some assumptions about architecture, best practices, and conventions. This is often helpful to developers and architects as it provides a well-trodden path for future architectural decisions, and it can also help you end up with a codebase that is predictable, consistent, and easy for other developers to understand. But even when two different frameworks are written in the same language, they can vary dramatically based on how well-trodden that path is. At one extreme, a framework is called "opinionated." This means the framework designers have built a “happy path” that makes development easier and faster for people using their framework — as long as they follow specific assumptions. Choosing an opinionated framework can greatly facilitate development of your application, when your needs match or align to the purpose of the framework. The enforced or strict conventions can also make it easier for new developers to join and start providing value right away. However, it also sometimes means those assumptions are intentionally difficult to violate. This can mean a number of things in practice, from strict or enforced conventions to a lack of extensibility or perhaps restriction to a single toolset. Ultimately, being opinionated means the framework works best as it was originally intended, and varying from it can sometimes only be done with great pain. Deciding to use an opinionated framework is as much as business decision as it is a technical one. While you may benefit from ease of startup, the decision to use an opinionated framework may come at a future cost if what you need to extend your application exceeds the framework’s capabilities. To add depth, let’s look at some specific examples of frontend and backend frameworks. We’ll look at Angular vs React and Django vs Flask, but this line of thinking will also apply to other frameworks like Vue, Ruby on Rails, and more. Angular versus React For the sake of argument, we’ll consider React an un-opinionated framework, whereas Angular is a strongly opinionated one. Both of these frameworks provide the ability to create full-featured single-page web applications and offer rich component libraries plus large user bases. For comparison purposes, let’s consider how each framework handles data binding. Angular provides two-way data binding out of the box, where React provides one-way data binding. To dive into this more deeply, Angular assumes an MVVM- or MVC-type architecture and provides two-way linkages between your model (where your data lives) and your view (what is rendered on the page). That means when a user changes something on the page, your model is automatically updated. React, on the other hand, forces you to manage this update yourself. As a strongly opinionated framework, Angular makes assumptions about how you will be providing data to your components and make state available. It provides all the necessary linkages so that all you have to do is declare a variable and use it in the model, without worrying about how the view is updating. This is called data binding, and it’s something Angular does out of the box. React, on the other hand, does not provide this because you have to explicitly handle change events in your components. In the case of model changes that are not initiated by the UI, you have to explicitly update the state by calling setState or by using a state hook, which will then automatically ensure that the view is updated. This can result in more code in each component, or even using other libraries such as Redux to help manage state across components — but it also offers a higher degree of customization. React is also lighter weight than Angular, so if you don’t need all the integrated capabilities of Angular, then React could reduce the data usage and load time for end users, as well as the cognitive burden on developers working on your app. Angular makes similar assumptions on network connectivity, language choice, and build toolchains, for example. This will save time when you want a fully integrated environment that “just works” without having to consider each component separately. Ultimately this comes down to a matter of preference. Having a choice made for you can simplify development and send you down a prescriptive path, which can save you a lot of time when rapidly building an application. All things being equal and assuming you have both Angular- and React-capable developers, if you’re building a rapid application prototype and you don’t want to undergo the headache of setup and initial investment required to build a React application, Angular is a comfortable and easy choice. Using it can help get your application off the ground quickly as fewer decisions have to be made and less code has to be integrated in order to get to a working solution. Build toolsets are also very standardized for Angular, and a large number of create scripts exist for getting projects started quickly. If on the other hand, you know you’re developing a very customized web/mobile application and you want to have the flexibility to do things in a piecemeal manner in order to create a highly performant and capable web application, React is most certainly a better choice. Django versus Flask The same arguments can be made around the choice between Django and Flask, but with different use cases. Django is highly opinionated; Flask is not. Django provides a full-featured experience, including an ORM, admin panel, and a convention-based directory structure for all of your applications. Flask, on the other hand, provides absolute simplicity, a high degree of control, and the ability to follow almost any architectural path you’d like. It’s also lighter weight than Django because it integrates fewer features. Both frameworks run on WSGI and offer templating out of the box. You’ll want to use Django over Flask when you’re building a fairly standard web application or service, such as a news site, organizational website, e-commerce website, or perhaps a blog. Django provides a ton of examples, starter apps, and an easy and well-trodden path for you to follow. If you’re creating a product with very minimal needs, like a small internal API — or if you need to select specific components, such as custom authentication or data layer access — then Flask is a better choice. It lets you pick and choose components at every stage of your product architecture. It’s also a better choice if you’re building something entirely custom and you don’t have a common functional and architectural path to follow. Flask allows you to be more flexible when making decisions and doesn’t force you down a predefined path. PaaS versus IaaS Frameworks can be opinionated. And so can the pieces of your infrastructure. If you ask yourself how opinionated your deployment platform is, the difference between PaaS and IaaS becomes a lot more evident. PaaS offerings give you a turnkey environment on which to build your apps where network considerations, infrastructure configuration, compute, and storage are all managed for you. In our analogue, PaaS is the opinionated framework, making many of the deployment and runtime architecture assumptions for you. Heroku and Elastic Beanstalk are examples of PaaS platforms. What you gain with PaaS is a cost-effective, easily scalable, managed platform that lets you focus on building and deploying your application. Conversely, IaaS frameworks are relatively unopinionated, providing a flexible infrastructure that you can easily customize, provision and deploy. Although the datacenter and server infrastructure is managed, you have to specifically consider and address sizing, capacity planning, infrastructure support, service integration, and application architecture. Microsoft Azure, AWS, and GCP all offer IaaS. IaaS is a great choice when flexibility is a necessity or when an application needs: - A specific OS - A dedicated, non-shared compute environment - Resources deployed in a virtual network - A deployment environment not covered by traditional PaaS offerings Simply put, use PaaS when you want to build your product quickly without reinventing the wheel, and choose IaaS when you have custom or non-standard needs. Chances are PaaS will work for the majority of use cases, and will save you from wasting your time managing and troubleshooting layers of your stack that you wish would just work. Heroku is a more established PaaS product that scales with your application and offers a variety of platform options, so that you don’t get trapped by early architectural or language decisions. It uses design patterns like the twelve-factor app to help you build a scalable and maintainable application and avoid making unintentional mistakes. And if you ever hit the limits of the platform, they make it easy to migrate to a less opinionated IaaS, where you’ll have the freedom (and responsibility) to manage more complex parts of your infrastructure. If you have a clear target and are following a well-trodden development or architectural path, opinionated frameworks can help save you time and money by making applications easier to develop and deploy. An opinionated framework gives you guard rails, tons of starter code, and optimizes your path. But if you know that things will go off path very quickly, then you should consider using a non-opinionated framework out of the gate. For example, If you want to build a quick UI or you know your UI will use standard components—and you have little to no need to customize or alter the behavior of those components in non-standard ways—then the opinionated framework Angular may be a good choice over React. However, if you need flexibility in your Python web frameworks—or are building a custom product for which Django might not have examples or open source base code—then you may need to consider using the non-opinionated Flask. Extending the concept of opinionated versus unopinionated to deployment options gives us a handy way to look at PaaS versus IaaS. If you want a turnkey environment, you should consider the opinionated PaaS option. For highly customized needs, go with the flexibility of IaaS.
<urn:uuid:04e553d6-0775-4af7-ad1c-3c0fd7a01270>
CC-MAIN-2020-05
https://hackernoon.com/opinionated-or-not-choosing-the-right-framework-for-the-job-6x1u2ga0
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250604397.40/warc/CC-MAIN-20200121132900-20200121161900-00370.warc.gz
en
0.930765
2,383
2.5625
3
JavaTM 2 Platform Std. Ed. v1.6.0 - Type Parameters: V - the result type of method call - All Known Subinterfaces: public interface Callable<V> A task that returns a result and may throw an exception. Implementors define a single method with no arguments called The Callable interface is similar to Runnable, in that both are designed for classes whose instances are potentially executed by another thread. A Runnable, however, does not return a result and cannot throw a checked exception. Executors class contains utility methods to convert from other common forms to Callable classes. - See Also: Computes a result, or throws an exception if unable to do so. - Computes a result, or throws an exception if unable to do so. - computed result Exception - if unable to compute a result Copyright 2003 Sun Microsystems, Inc. All rights reserved
<urn:uuid:909cd12a-9141-4bf7-a979-49b4d1cb89f1>
CC-MAIN-2023-14
https://javasearch.developpez.com/j2se/1.6.0/docs/api/java/util/concurrent/Callable.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949093.14/warc/CC-MAIN-20230330004340-20230330034340-00361.warc.gz
en
0.736254
292
2.578125
3
- A tax on foods or drinks considered unhealthy and whose consumption is believed to be linked to rising rates of obesity: critics say a fat tax would hit the poor hardest because they spend 30 per cent of their income on foodMore example sentences - But it would be a mistake to drop his "fat tax" on soda liquid candy, as health advocates call it. - But opponents are calling it a fat tax. - It is expected to pour cold water on Downing Street plans to subsidise gym membership and impose a 'fat tax' on unhealthy foods. More definitions of fat taxDefinition of fat tax in: - The British & World English dictionary
<urn:uuid:a789782d-6408-44a5-a75c-2980e2668bf1>
CC-MAIN-2014-10
http://www.oxforddictionaries.com/us/definition/american_english/fat-tax
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999650477/warc/CC-MAIN-20140305060730-00024-ip-10-183-142-35.ec2.internal.warc.gz
en
0.935197
133
2.78125
3
Fear, Anger, Grief and Joy are part of our navigation system. They are meant to help you. JOIN ME: Join Tuesday February 16th 4pm EST We often identify fear, anger and grief as negative emotions however, any discomfort we may feel when experiencing one of these emotions is often a defense mechanism (towards the basic emotion, not the emotion itself). Kids with learning differences experience more fear, more anger and grief through their experiences and that is why this is an important topic to review to a help us understand what these emotions really mean and how we can support our children to listen to the emotions and why they are here. In this talk, you will find out: • The real purpose of the 4 basic emotions and how you are born with this wisdom and what they are saying to you, you just have to reconnect to it. Join Kristina Buk as she shares with her his insights during her live SYT Learn Call Tuesday February 16th 4pm EST ** we ask that you donate what you can to support those that can't afford to pay as much. Together we can change how we approach and view learning differences. Text by shiftyourthinkingld.com
<urn:uuid:ccb3b0b7-63fd-4aec-9cd0-703a6df30c33>
CC-MAIN-2023-40
https://kristinabuk.com/pages/events-coming-up
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510225.44/warc/CC-MAIN-20230926211344-20230927001344-00075.warc.gz
en
0.978377
254
2.703125
3
It's the largest killer ever to walk the Earth. Razor sharp teeth... meter long jaws... sickle-shaped claws. And if you think we're talking about T Rex... think again. This is Spinosaururs. Its massive proportions and the 6-foot sail lining its back-make it one of the most bizarre creatures ever discovered. It's also among the most mysterious. Only one Spinosaurus skeleton that was more than just a few bones has ever been discovered. That was one hundred years ago in the Egyptian desert by a German aristocrat named Ernst Stromer. 35 years later, it was destroyed in World War Two. Now, a new skeleton has emerged from the Sahara, with all the telltale signs of Spinosaurus and palaeontologists Paul Sereno and Nizar Ibrahim race to introduce it to the world. In detective story fashion, we follow the scientists through their cloak and dagger attempt to track down the skeleton's origins, reimagine the dinosaur digitally, and reassemble it in all its predatory glory. Archival photographs and drawings from Stromer's lost skeleton combine with CT-scanned modern day bones to make Spinosaurus the first life size predatory dinosaur machined from a digital model. And it's one from the record books. The new data confirms this was not only the biggest carnivore ever to walk the earth 49 feet in length, 15% longer than the largest Tyrannosaurus - it was also amphibious, the only water-going dinosaur ever found. Cutting-edge science. African adventures. World Wars. Nazis. Clandestine fossils. All converge in one incredible saga to resurrect one of the most mysterious creatures ever to walk the Earth. National Geographic Channel is on Starhub Channel 411 and Singtel TV Channel 201.
<urn:uuid:a95d3003-15f2-43b7-b9a9-351815198d65>
CC-MAIN-2017-39
http://www.okjdiscoveries.com/calendar/documentary-premieres/2015/6/bigger-than-t-rex
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818690591.29/warc/CC-MAIN-20170925092813-20170925112813-00501.warc.gz
en
0.924727
365
2.828125
3
UK: Grade-AI student: How ChatGPT is shaking up education UK/April 12, 2023/Source: https://www.maddyness.com/ Artificial though it may well be, ChatGPT sure is intelligent — some argue that we’re just a couple of updates away from the chatbot replacing the lot of us. Since its public release back in November of last year, anyone with an internet connection has been able to jump on and chew the fat with OpenAI’s intelligent language-processing model, which now enjoys the traffic of over 100 million active users. With a little input from humans, the tool has managed to write children’s fiction, create and debug lines of code, and even complete the licence-level tests needed to pursue a career in medicine, business, or law. So, if AI is training up to ace all of our exams, what implications could this have for education? How could AI affect education? ChatGPT has been touted as an asset that could assist teaching across the medical and legal spheres, as the tool shows evidence of being able to interpret unique datasets and apply high-level concepts. The rationale goes that, if ChatGPT can emulate the knowledge needed to pass exams, it could be used as a handy teaching tool for those same tests. However, I would argue that ChatGPT’s ability to ‘understand’ and rephrase the information it’s been fed does not compare to real human knowledge. The tool is based on a language algorithm, and responds with a relevant text output — it doesn’t innately comprehend these ideas in the same way that a human can, much less a teacher, whose job it is to educate budding learners about challenging medical concepts. And for all its smarts, these cracks do show. By OpenAI’s own admission, ChatGPT has the tendency to respond with “plausible-sounding but incorrect or nonsensical answers”. To the uninformed reader, yes, ChatGPT may talk the talk — but at its current stage of development, with “no source of truth”, it cannot walk the walk. Cheating and plagiarism ChatGPT is open to the public and has undoubtedly entered mainstream awareness, so it should come as no surprise that the tool is already being put to work to complete tech-savvy students’ homework. For youngsters all the way up to the university level, the days of missing deadlines or blaming the hungry dog are over. Instead, they can feed their maths problems and essay assignments in as ChatGPT prompts and get tailored answers back in seconds — workings and all. Of course, students have been using traditional search engines as research tools for years — the difference being that ChatGPT can provide a customised, point-for-point response to your query. The likes of Google, on the other hand, tend to feed relevant resources back to the user to synthesise their own response. But as Microsoft looks set to add ChatGPT’s functionality to Bing, and Google prepares to send Bard out into the world, chatbot AI could become the new normal. There are concerns that this could significantly threaten educational standards. If ChatGPT is capable of fooling notoriously challenging clinical exams with a passing grade, it could easily be used as a workaround for all kinds of assignments — particularly as schools continue to push their working methods online. Should parents be worried? So, the race to have the smartest AI assistant is heating up, but where exactly are the tracks headed? Do we need to fear chatbot AI? The global market for this kind of tech is set to grow tenfold by 2030, as more investors enter the fray and drive the industry to an expected value of $1,597 billion. There’s no doubt about it: AI is here to stay. This could be bad news for education, as it will only get more intelligent — and more human — as time goes on. Inevitably, it will become harder to check whether students’ work really belongs to them or to chat-enabled search engines. OpenAI is developing its own detection tools to prevent plagiarism — but we could still see teachers making some hasty steps back into the classroom, returning to pen-and-paper methods. Parents will need to be more diligent than ever to ensure that children are learning and applying their understanding. Admittedly, pressures have been growing for years now — but AI has the potential to turn yet another long-standing institution on its head. It’s up to families, educators, and the AI powers that be, to make sure that this tech is used as an asset for expanding human knowledge, not replacing it. Edward Coram-James is CEO of digital marketing agency Go Up. Deja un comentario
<urn:uuid:b02d8b68-5e81-4511-a332-1b5341d0dd1f>
CC-MAIN-2023-23
https://sarrauteducacion.com/2023/04/12/uk-grade-ai-student-how-chatgpt-is-shaking-up-education/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656833.99/warc/CC-MAIN-20230609201549-20230609231549-00059.warc.gz
en
0.957656
1,059
2.59375
3
Many teachers and parents are scrambling to find engaging activities for children to do at home as they quickly prepare distance learning activities. In this post, I’ve gathered 10 of my favorite science activities that can be used as at-home science lessons for kids. Whether you are planning for a school closure, illness, or a scheduled summer break this collection of high engagement science activities will keep students learning even while they are out of school. Most, if not all, of these activities use simple materials that you probably already have in your classroom or at home. Click on each picture to read the posts. Properties of Matter Cracker Lab This edible Cracker Lab focused students on observing and describing the attributes and properties of matter using crackers! Easy Seed Science Experiments Germinating seeds gets even more educational as students dissect and label the parts of a seed and observe their seeds as they grow. These Easy Seed Science Experiments lend themselves well to incorporating math by measuring the seedlings as they grow. Milk & Cookies and the Scientific Method Milk & Cookies and the Scientific Method is a fun way to investigate buoyancy and practice conducting a scientific experiment. Students investigate properties of cookies and test to see if they sink or float. Cheese Powder Pollination An all-time favorite in my classroom, learn how to use mac and cheese powder to do a Pollination Simulation! Changing Matter Lab: Ice Cream in a Bag Who doesn’t love ice cream? This fun and frozen Ice Cream in a Bag Experiment is a great way to observe how matter changes when its temperature is changed. Seed Dispersal: Make An Exploding Seed Pod Another huge hit with my students is making exploding seed pods. Students plan, build, investigate and measure lengths in this STEM activity that explores seed dispersal. Pop Rocks Science Experiment Remember the old Mentos and Diet Coke exploding experiment? This Pop Rocks Experiment doesn’t explode, and it isn’t quite as dramatic, but it’s a great way to have students combine a solid and liquid to form a gas. Exploring Properties of Matter: Flexibility A unique properties of matter experiment for students to explore flexibility. Chlorophyll Paintings: Science Based Art Project A science based art activity, Chlorophyll Paintings are a creative way to explore chlorophyll as students learn about parts, of a plant, the job of the leaves, and how plants make their own food through photosynthesis. Arctic Animal Adaptations Blubber Experiment Students make a blubber glove to simulate and test how blubber keeps an arctic animal warm. In this outdoor plant needs investigation students explore how the shape of a leaf helps a plant get the right amount of sunlight it needs. Making Models STEM Activity Designing, building, and testing models is a key component of Next Generation Science Standards as students learn engineering practices in science. In this easy to do activity students design and build models of plant adaptations. Get Free Science Activities Kids Can Do At Home Try these engaging science lessons at home or in the classroom! This FREE science mini-unit includes both printable + digital activities on Google Slides that make it easy to learn science no matter where you are! Adding hands-on science activities to your homeschool, classroom, or distance learning plans keeps your student engaged and learning in fun and creative ways. I hope you have found some ideas you can use. Please help another teacher make it easier to plan by sharing this post on your social media platforms. For more At-Home Learning Activities visit these posts: FREE Learn At Home Menus That Don’t Need Devices Butterfly Life Cycle Activities & Free Printables Happy teaching at home or at school! Thank you for sharing these great activities. As an educator, it greatly appreciated. You’re welcome, Yvonne!
<urn:uuid:9cdd8f2b-6d54-4126-ac0b-75ec1b1564d8>
CC-MAIN-2023-14
https://aroundthekampfire.com/2020/03/10-fun-science-lessons-kids-can-do-at-home-distance-learning-activities.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945376.29/warc/CC-MAIN-20230325222822-20230326012822-00791.warc.gz
en
0.910049
824
3.671875
4
Have you ever wondered what Indigenous cuisine is all about? Well, get ready to embark on a culinary adventure that will not only tickle your taste buds but also give you a glimpse into the rich cultural heritage of Indigenous peoples around the world. Indigenous cuisine is characterized by its use of locally sourced ingredients and traditional cooking methods passed down through generations. From North America to Australia, from South America to Africa, each region has its own unique flavors and dishes that are sure to surprise and delight. One staple ingredient in many Indigenous cuisines is corn. Used in various forms such as tortillas, tamales, or even popped like popcorn, corn adds a hearty texture and sweet flavor to dishes. Another popular ingredient is wild game meat like bison or venison, which provides lean protein and a distinct taste. For those with a sweet tooth, Indigenous desserts offer a range of delights. Take frybread for example – it’s a simple yet delicious fried dough that can be enjoyed plain or topped with honey or powdered sugar. And let’s not forget about maíz morado from Peru; this vibrant purple corn pudding infused with cinnamon and cloves will transport your taste buds to another dimension! Indigenous cuisine isn’t just about the food itself; it’s about the connection between people and nature. It’s about honoring traditions while adapting them to modern times. So next time you’re looking for new flavors to explore, don’t forget to dive into the diverse world of Indigenous cuisine – it’s an experience that will leave you both satisfied and culturally enriched!
<urn:uuid:77acdecc-7592-47b0-8cca-6b3903c7c39e>
CC-MAIN-2023-50
https://wynterwellness.com/2023/09/23/embark-on-a-culinary-adventure-with-indigenous-cuisine/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679516047.98/warc/CC-MAIN-20231211174901-20231211204901-00844.warc.gz
en
0.915642
330
3.03125
3
Unique opportunity: ESA announces new research opportunities in space ESA's Directorate of Human Spaceflight calls for new research ideas for experiments to be conducted on the International Space Station, in bed rest study analogues and on sounding rockets. These Announcements of Opportunity strongly promote international research teams and the participation of industrial R&D partners. The overall Announcement of Opportunity 2009 is made in the framework of the European Programme for Life and Physical Sciences (ELIPS). The International Life Science Research Announcement (ILSRA) from the ISS Partners covers experiments in life sciences on the International Space Station (ISS), and is complemented by ESA’s Announcement of Opportunity for physical sciences using the ISS. Additionally, the announcement covers all research domains on sounding rockets, parabolic flights and bed rest studies. In 2008, Europe completed two major elements of its contribution to the Station; the on-orbit delivery of the European Columbus laboratory and the flight of ESA’s first Automated Transfer Vehicle. These and other events marked the start of a new phase of the utilisation of the ISS by all the International Partners and by ESA in particular. The research facilities launched together with Columbus were commissioned on orbit, and the first series of experiments were started. Europe has since become a main scientific user of the ISS and as a result has been able to expand its international competitiveness in various aspects of health research, innovative materials and processes and has achieved important scientific results in plasma and fluid physics, exobiology and space biology. Further research facilities and series of experiments are already scheduled for flight in the coming months and years. This Announcement of Opportunity also comes at a time when the ISS Partners are discussing a possible long-term extension of the lifetime of the Station past 2015. New research experiments To stay at the forefront of scientific research in microgravity, ESA is now asking the scientific community to propose new research experiments for the ISS, bed rest analogue studies for exploration preparation and sounding rockets. As done in the past, all proposals will be peer group reviewed in order to maintain the outstanding quality of the experiments so far conducted in the framework of ELIPS. "ELIPS has already lead to scientific advances in a variety disciplines since its inception in 2001, advances that have, and will have, a positive impact on European citizens and processes on Earth as well as on future spaceflight activities," says Simonetta Di Pippo, ESA Director of Human Spaceflight. "Now the third ELIPS period will further strengthen Europe’s very strong position in research, building on the capabilities already in place." To help scientists find the optimum way through the proposal process, a researcher workshop will be held on 22-23 June 2009 at ESA's research and technology centre, ESTEC, in Noordwijk, the Netherlands. Non-binding Letters of Intent are due on 15 June 2009. The deadline for submitting proposals is 14 September 2009. For more details of the Announcement of Opportunity 2009, visit http://www.esa.int/spaceflight/ao2009. The ELIPS programme is intended to prepare and perform research in fundamental and applied life and physical sciences on the ISS and other mission platforms such as sounding rockets, parabolic flights and drop towers. ELIPS ensures that Europe's investment in the development and exploitation of the ISS produces the best scientific results. To achieve this, ELIPS promotes global cooperation, international peer review of research proposals and European coordination in facility development and resource utilisation. In order to enable and enhance worldwide cooperation in space life sciences, the International Life Science Research Announcement (ILSRA) is coordinated between the ISS Partners and released in parallel with them.
<urn:uuid:f4ed4f65-78ab-4fd3-ba46-8077671024e8>
CC-MAIN-2014-23
http://www.esa.int/Our_Activities/Human_Spaceflight/Unique_opportunity_ESA_announces_new_research_opportunities_in_space
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510274979.56/warc/CC-MAIN-20140728011754-00431-ip-10-146-231-18.ec2.internal.warc.gz
en
0.916833
745
2.546875
3
February is when the cold days are accompanied by dark mornings and evenings. If you are one of those affected by seasonal affective disorder (SAD), then it gets worse. You’d probably have gray days as well. Asides from SAD, as a nurse, February blahs can reduce your productivity drastically, which isn’t great for you or your patients. This brings us to the question, “how do you deal with February blahs?” The cold and gray days in February are right at the middle of winter. Even for someone not suffering from SAD, they can be quite depressing. Here are a few ways to deal with February blahs as a nurse: Sleep is a very important factor when dealing with any kind of depression or stress. A poor sleep routine is not the best for a nurse even though we know our work schedule doesn’t give us so much time. Sticking to a regular sleep routine means sleeping and waking up at the same times every day of the week. The first step to doing this is to choose your sleeping and waking times and set up a proper bedtime ritual. It will properly take you a few days to get used to so you should work with an alarm clock to keep you accountable. Another way to deal with February blahs is to exercise daily. You don’t have to spend two hours at the gym. All you need is 20 to 30 minutes of mild workout to get your blood flowing properly. A study shows that engaging in about 20 minutes of exercise four times every week will help you against a depressive mood. You can sign up at a nearby gym or work out from home. Alternatively, you can try running or riding a bike every morning before work. According to Pavlovich, when you get your mind active by engaging in a new interest, it helps in reducing the symptoms of SAD. This means that you can get through February without feeling blue by simply engaging in a new hobby. You can choose anything from keeping a journal to knitting, singing, writing a blog, or exercising. The idea is to have a new activity that tickles your fancy. This way, you have something to concentrate on rather than the gloomy February days. Socializing has always been great therapy for depressive moods. It is great for your mental and emotional states and can help with the February blahs. Who better to hang out with than your loved ones? Make an extra effort to connect more with your loved ones this month. On your off days, accept invitations to social events with them, even if you’d be there for only an hour or two. If you have tried everything else on our list to no avail, then you should consider joining a support group. Here, you can share your experience, and learn from the experiences of others. This is always very therapeutic and will brighten you up. February blahs, if not properly dealt with, can affect the quality of your service delivery as a nurse. This post has shown you five ways to deal with this issue. Do you have any others? Kindly share them with us in the comments section. Meanwhile, spend some time perusing our articles on Natty Nurses to help you become a better nurse.
<urn:uuid:4d3ddaba-3c98-45d6-8582-efd6c733d4b4>
CC-MAIN-2023-40
https://www.nattynurses.com/post/how-to-deal-with-february-blahs
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506676.95/warc/CC-MAIN-20230925015430-20230925045430-00570.warc.gz
en
0.972702
666
2.640625
3
Ear Canal Problems (Swimmer's Ear) Swimmer's ear (otitis externa) is a painful inflammation and infection of the ear canal. It occurs when the protective film that covers the ear canal (lipid layer) is removed. This causes the ear canal to look red and swollen. The ear canal may be narrower than normal and is tender when the outside of the ear is gently pulled up and back. Swimmer's ear may develop when water, sand, dirt, or other debris gets into the ear canal. Since it often occurs when excess water enters the ear canal, a common name for this inflammation is "swimmer's ear." If you have had swimmer's ear in the past, you are more likely to get it again. A rare but serious infection called malignant external otitis can develop if bacteria invade the bones inside the ear canal and spread to the base of the skull. Not many people get this infection—it is mainly seen in older adults who also have diabetes, people who have HIV, and children who have impaired immune systems—but it can be fatal. Symptoms include ear pain with sudden facial paralysis, hoarseness, and throat pain. Antibiotics are used to treat this infection. Other causes of inflammation or infection of the ear canal include: You are more likely to get swimmer's ear if: Symptoms can include itching, pain, and a feeling of fullness in the ear. Your ear canal may be swollen. You may have moderate to severe pain, drainage, or hearing loss. Unlike a middle ear infection (acute otitis media), the pain is worse when you chew, press on the "tag" in front of the ear, or wiggle your earlobe. You may be able to prevent swimmer's ear. Symptoms often get better or go away with home treatment. Check your symptoms to decide if and when you should see a doctor. eMedicineHealth Medical Reference from Healthwise To learn more visit Healthwise.org © 1995-2014 Healthwise, Incorporated. Healthwise, Healthwise for every health decision, and the Healthwise logo are trademarks of Healthwise, Incorporated.
<urn:uuid:6f7bcf7a-f50a-44b3-9e8c-19603ffb70e0>
CC-MAIN-2017-47
https://www.emedicinehealth.com/script/main/art.asp?articlekey=134461&ref=127911
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934804666.54/warc/CC-MAIN-20171118055757-20171118075757-00456.warc.gz
en
0.935438
450
3.609375
4